SlideShare a Scribd company logo
University of Barisal
Department of
management studies
Electronic Business
M M Nayon
21 MGT 048
Md Sabuj
21 MGT 050
Hasibur Rahman Shake
21 MGT 049
Farhan Shakhowat
21 MGT 051
Sayeda Akter
21 MGT 052
Mst Ferdauce Akter Sumi
21 MGT 053
M M Nayon
21 MGT 048
My Presentation Topic:
E-business analysis and process modeling.
Definition Of E-Business Analysis
E-business analysis and design refer to the systematic process of understanding,
evaluating, and planning the development or enhancement of electronic business
systems. It involves identifying business requirements, analyzing processes, and
designing solutions to improve the efficiency, effectiveness, and overall performance
of an organization's electronic business operations.
E-Business Process Modeling
E-business process modeling is the practice of representing the flow of
activities, information, and resources within an electronic business
environment using various modeling techniques and notations. It
involves creating visual diagrams that illustrate the steps, interactions,
and dependencies of processes involved in conducting business online.
Here's a more detailed look at e-business process modeling:
1. Purpose Of E-Business Process Modeling: Understanding Business Operations:
Process modeling helps stakeholders gain a clear understanding of how different tasks,
activities, and data interconnect in an e-business.
2. Common E-business Process Modeling Techniques: BPMN (Business Process Model
and Notation): BPMN is a widely used standard for modeling business processes,
including e-business processes. It offers a comprehensive set of graphical symbols to
represent activities, events, gateways, and flows.
3. Steps in E-business Process Modeling: Identify the Scope: Define the boundaries of
the e-business process to be modeled and the specific objectives of the modeling
effort.
4. Benefits of E-business Process Modeling: Improved understanding and visualization
of e-business processes, enhanced process efficiency and productivity, effective
communication among stakeholders.
Hasibur Rahman Shake
21 MGT 049
TASK ANALYSIS
Task analysis is the process of learning about ordinary users
by observing them in action to understand in detail how
they perform their tasks and achieve their intended goals.
Tasks analysis helps identify the tasks that your website and
applications must support and can also help you refine or
re-define your site’s navigation or search by determining
the appropriate content scope.
Task Analysis Process
Task analysis helps you understand:
•What your users’ goals are; what they are trying to achieve
•What users actually do to achieve those goals
•What experiences (personal, social, and cultural) users bring to the
tasks
•How users are influenced by their physical environment
•How users’ previous knowledge and experience influence:
• How they think about their work
• The workflow they follow to perform their tasks
Types of Task Analysis
There are several types of task analysis but among the
most common techniques used are:
•Cognitive Task Analysis is focused on understanding
tasks that require decision-making, problem-solving,
memory, attention and judgement.
•Hierarchical Task Analysis is focused on decomposing a
high-level task subtasks.
Task Decomposition
A task decomposition describes a particular task and then
decomposes it to describe the task's features, such as devices and
interface components used, duration, errors, and feedback. These
categories will be selected by the analyst based on the needs of the
analysis.
For example, you could break it down into product development,
branding, and marketing. Break these down into smaller chunks:
Break each deliverable into smaller, more manageable chunks. For
example, marketing could be broken down into SEO content strategy,
social media, and email marketing.
Process Dependencies
Process dependency analysis enables us to describe
interdependence between processes based on
information, materials or other resources in specific states,
and to describe the influence of time events on the
execution of processes.
Md Sabuj
21 MGT 050
Validating a new process model
Validating a new process model is a
critical step in ensuring its
effectiveness and efficiency. This
involves testing the model under
different scenarios to identify any
potential flaws or weaknesses that
may need to be addressed. This
allows for the identification of any
issues before implementing the
model in a live system.
Data modelling
Data modeling is the process of creating a visual
representation of data and its relationships to other
data. It is an important step in designing a database or
information system, as it helps to ensure that the data is
organized efficiently and accurately.
There are several different types of data models,
including conceptual, logical, and physical models. The
conceptual model focuses on the overall structure of the
data, while the logical model goes into more detail
about the relationships between entities and attributes.
1. Identify entities.
2. Identify attributes for entities.
3. Identify relationship between entities.
Data modelling process
Design for E-business
Designing for e-business requires a deep
understanding of the unique challenges and
opportunities presented by the digital landscape.
One of the key considerations is ensuring that the
user experience is seamless and intuitive, regardless
of the device or platform being used. This requires
careful attention to information architecture,
navigation, and visual design.
Architectural design of e business systems
The architectural design of e-business
systems is a complex process that requires
careful consideration of various factors.
One important factor to consider is the
scalability of the system. As the business
grows, the system should be able to
handle increased traffic and data volume
without sacrificing performance or
reliability.
Farhan Shakhowat
21 MGT 051
Designing the information architecture
of a website is a crucial step in creating
a user-friendly and efficient digital
experience. It involves organizing the
content, navigation, and functionality
of the site in a way that makes sense to
the user. This helps users quickly find
what they are looking for and navigate
through the site with ease.
Designing the information architecture
Information architecture:
The combination of organization, labelling and
navigation schemes composing an information system.
Site map:
A graphical or text depiction of the
relationship between different groups of content on
a website
Card sorting or web classification:
The process of arranging a way of organizing
objects on the website in a consistent manner.
In order to design a successful website,
it is important to keep the customer at
the forefront of your mind. This means
focusing on their needs and
preferences, rather than simply trying
to create something that looks good or
is easy for you to manage. By taking a
customer-oriented approach, you can
ensure that your site is user-friendly
and meets the needs of your target
audience.
Customer Orientation
Customer Orientation elements
• Small office and home users
• Small business
• Medium businesses
• Large business
• Government organizations
A successful website design is
the result of careful planning
and execution. When designing
a website, it is important to
consider both the aesthetic and
functional elements that make
up the user experience.
One major element of site
design is the use of color. Color
can be used to create contrast,
highlight important
information, and evoke
emotions in users.
Elements of site design
Elements of site design
1.Site personality
2.Site organization
3.Site navigation
4.Page design
Mst. Sayeda Akter
21 MGT 052
Security Design for E-business
Security for E-business
• Security for e-business refers to the measures and practices implemented
to protect an electronic business platform from potential threats,
vulnerabilities, and attacks.
• The main concern of security is “information security” : both customers
and internal company data.
⚠️Common security threats for e-
business
• Direct data access(and theft) : if data exist, they can potentially be
viewed or extracted. Avoid storing data that you don’t need on the website
- for example, some data relating to payment card should never be stored.
• Insecure payment systems: weak encryption or improper handling of payment
data can expose customers' financial information to cybercriminals.
• Phishing attack :phishing attacks are the practice of sending fraudulent
communications that appear to come from a reputable source. It is usually done
through email.
• Insecure authentication and authorization: poorly implemented authentication
and authorization mechanisms can make it easier for attackers to gain unauthorized
access to user accounts or sensitive areas of the website.
• Malicious file execution: it occurs when websites and web applications are not
properly validated.
Protecting computer system against
viruses:
• All organizations and individuals require a policy to combat the potential
impact of viruses. There are two approaches that can combined to counter
viruses. They are-
• Using right tools:
1) anti virus software.
2) managed e-mail service.
• Educating staff to change practices :
1.don’t open attachment to email from people you don’t know.
2.Download software only from the official source. Always check for virus
before installing.
3.Turn off macros in word or excel unless you use them regularly
4.Backup important files daily.
Mst Ferdauce Akter Sumi
21 MGT 053
E-mail Management
Email management is the skill of
efficiently handling and organizing
emails. It involves categorizing
messages, responding promptly, and
keeping the inbox organized. This helps
to save time, reduce stress, and improve
productivity in handling email
communication.
Hacking
Hacking refers to the act of gaining
unauthorized access to computer
systems, networks, or software, often
with the intent of manipulating,
stealing data, or causing disruption.
There are two types of hacking
1.Ethical hacking and
2.unethical hacking
Secure e-commerce transactions
Secure e-commerce transactions
involve secure payment gateways,
data privacy, and strong
authentication methods like multi-
factor authentication. Regular
security audits and updates are
crucial to mitigate risks and
protect customer data.
Current approaches to e-commerce security
There are many approaches to
e-commerce security. These are
major Securities. Two-Factor
Authentication (2FA)Regular
security audits Secure payment
gateways Data encryption

More Related Content

Similar to Group-08.pptx

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Assessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docxAssessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docx
galerussel59292
 
Course Description The design of computer based information sy.docx
 Course Description The design of computer based information sy.docx Course Description The design of computer based information sy.docx
Course Description The design of computer based information sy.docx
aryan532920
 
E commerce
E commerceE commerce
E commerce
Hazel Buendia
 
Information Architecture Development
Information Architecture DevelopmentInformation Architecture Development
Information Architecture Development
Achmad Solichin
 
Report
ReportReport
Business Intelligence Module 3
Business Intelligence Module 3Business Intelligence Module 3
Business Intelligence Module 3
Home
 
Securing Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation NotesSecuring Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation Notes
edwinlorenzana
 
11.online library management system
11.online library management system11.online library management system
11.online library management system
Pvrtechnologies Nellore
 
Bi in financial industry
Bi in financial industryBi in financial industry
Bi in financial industry
Souvik Chakraborty
 
Bi in financial industry
Bi in financial industryBi in financial industry
Bi in financial industry
Souvik Chakraborty
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
Gord Reynolds
 
Methods for analysis and design of an information system.pdf
Methods for analysis and design of an information system.pdfMethods for analysis and design of an information system.pdf
Methods for analysis and design of an information system.pdf
JonathanCovena1
 
Information Management aaS AIIM First Canadian presentation
Information Management aaS AIIM First Canadian presentationInformation Management aaS AIIM First Canadian presentation
Information Management aaS AIIM First Canadian presentation
Christopher Wynder
 
Management Information System
Management Information SystemManagement Information System
Management Information System
Maria Stella Solon
 
Unit 1 & 2
Unit 1 & 2Unit 1 & 2
Unit 1 & 2
Neelam Rawat
 
Management ( Six Business Objectives)
Management ( Six Business Objectives)Management ( Six Business Objectives)
Management ( Six Business Objectives)
Abdullateif Abdullkareim, ITIL4
 
Embedded Analytics
Embedded AnalyticsEmbedded Analytics
Embedded Analytics
MITSDEDistance
 
Application of Savings and Loan Cooperative Services
Application of Savings and Loan Cooperative ServicesApplication of Savings and Loan Cooperative Services
Application of Savings and Loan Cooperative Services
YogeshIJTSRD
 

Similar to Group-08.pptx (20)

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Assessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docxAssessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docx
 
Course Description The design of computer based information sy.docx
 Course Description The design of computer based information sy.docx Course Description The design of computer based information sy.docx
Course Description The design of computer based information sy.docx
 
E commerce
E commerceE commerce
E commerce
 
E commerce
E commerceE commerce
E commerce
 
Information Architecture Development
Information Architecture DevelopmentInformation Architecture Development
Information Architecture Development
 
Report
ReportReport
Report
 
Business Intelligence Module 3
Business Intelligence Module 3Business Intelligence Module 3
Business Intelligence Module 3
 
Securing Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation NotesSecuring Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation Notes
 
11.online library management system
11.online library management system11.online library management system
11.online library management system
 
Bi in financial industry
Bi in financial industryBi in financial industry
Bi in financial industry
 
Bi in financial industry
Bi in financial industryBi in financial industry
Bi in financial industry
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
 
Methods for analysis and design of an information system.pdf
Methods for analysis and design of an information system.pdfMethods for analysis and design of an information system.pdf
Methods for analysis and design of an information system.pdf
 
Information Management aaS AIIM First Canadian presentation
Information Management aaS AIIM First Canadian presentationInformation Management aaS AIIM First Canadian presentation
Information Management aaS AIIM First Canadian presentation
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
Unit 1 & 2
Unit 1 & 2Unit 1 & 2
Unit 1 & 2
 
Management ( Six Business Objectives)
Management ( Six Business Objectives)Management ( Six Business Objectives)
Management ( Six Business Objectives)
 
Embedded Analytics
Embedded AnalyticsEmbedded Analytics
Embedded Analytics
 
Application of Savings and Loan Cooperative Services
Application of Savings and Loan Cooperative ServicesApplication of Savings and Loan Cooperative Services
Application of Savings and Loan Cooperative Services
 

More from MohammedDostogirAlam

Group-6.pptx
Group-6.pptxGroup-6.pptx
Group-6.pptx
MohammedDostogirAlam
 
Group-4.pptx
Group-4.pptxGroup-4.pptx
Group-4.pptx
MohammedDostogirAlam
 
e-business-and-e-commerce.ppt
e-business-and-e-commerce.ppte-business-and-e-commerce.ppt
e-business-and-e-commerce.ppt
MohammedDostogirAlam
 
Group- 12.pptx
Group- 12.pptxGroup- 12.pptx
Group- 12.pptx
MohammedDostogirAlam
 
Untitled presentation(2).pptx
Untitled presentation(2).pptxUntitled presentation(2).pptx
Untitled presentation(2).pptx
MohammedDostogirAlam
 
Group-10 .pptx
Group-10 .pptxGroup-10 .pptx
Group-10 .pptx
MohammedDostogirAlam
 
GROUP_01 (Update).pptx
GROUP_01 (Update).pptxGROUP_01 (Update).pptx
GROUP_01 (Update).pptx
MohammedDostogirAlam
 
Group-01 .pptx
Group-01 .pptxGroup-01 .pptx
Group-01 .pptx
MohammedDostogirAlam
 
Group -4 .pptx
Group -4 .pptxGroup -4 .pptx
Group -4 .pptx
MohammedDostogirAlam
 
Group-03.pptx
Group-03.pptxGroup-03.pptx
Group-03.pptx
MohammedDostogirAlam
 
21 MGT 016.pptx
21 MGT 016.pptx21 MGT 016.pptx
21 MGT 016.pptx
MohammedDostogirAlam
 
Group-03.pptx
Group-03.pptxGroup-03.pptx
Group-03.pptx
MohammedDostogirAlam
 
21 MGT 016.pptx
21 MGT 016.pptx21 MGT 016.pptx
21 MGT 016.pptx
MohammedDostogirAlam
 

More from MohammedDostogirAlam (19)

Group-11.pptx
Group-11.pptxGroup-11.pptx
Group-11.pptx
 
Group-2.pptx
Group-2.pptxGroup-2.pptx
Group-2.pptx
 
Group-6.pptx
Group-6.pptxGroup-6.pptx
Group-6.pptx
 
Group-4.pptx
Group-4.pptxGroup-4.pptx
Group-4.pptx
 
e-business-and-e-commerce.ppt
e-business-and-e-commerce.ppte-business-and-e-commerce.ppt
e-business-and-e-commerce.ppt
 
Chapter 3 .pptx
Chapter 3 .pptxChapter 3 .pptx
Chapter 3 .pptx
 
Group -05.pptx
Group -05.pptxGroup -05.pptx
Group -05.pptx
 
Group- 12.pptx
Group- 12.pptxGroup- 12.pptx
Group- 12.pptx
 
Untitled presentation(2).pptx
Untitled presentation(2).pptxUntitled presentation(2).pptx
Untitled presentation(2).pptx
 
Group-10 .pptx
Group-10 .pptxGroup-10 .pptx
Group-10 .pptx
 
Group-7 .pptx
Group-7 .pptxGroup-7 .pptx
Group-7 .pptx
 
Group-9.pptx
Group-9.pptxGroup-9.pptx
Group-9.pptx
 
GROUP_01 (Update).pptx
GROUP_01 (Update).pptxGROUP_01 (Update).pptx
GROUP_01 (Update).pptx
 
Group-01 .pptx
Group-01 .pptxGroup-01 .pptx
Group-01 .pptx
 
Group -4 .pptx
Group -4 .pptxGroup -4 .pptx
Group -4 .pptx
 
Group-03.pptx
Group-03.pptxGroup-03.pptx
Group-03.pptx
 
21 MGT 016.pptx
21 MGT 016.pptx21 MGT 016.pptx
21 MGT 016.pptx
 
Group-03.pptx
Group-03.pptxGroup-03.pptx
Group-03.pptx
 
21 MGT 016.pptx
21 MGT 016.pptx21 MGT 016.pptx
21 MGT 016.pptx
 

Recently uploaded

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 

Recently uploaded (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 

Group-08.pptx

  • 1. University of Barisal Department of management studies Electronic Business
  • 2. M M Nayon 21 MGT 048 Md Sabuj 21 MGT 050 Hasibur Rahman Shake 21 MGT 049 Farhan Shakhowat 21 MGT 051 Sayeda Akter 21 MGT 052 Mst Ferdauce Akter Sumi 21 MGT 053
  • 3. M M Nayon 21 MGT 048 My Presentation Topic: E-business analysis and process modeling.
  • 4. Definition Of E-Business Analysis E-business analysis and design refer to the systematic process of understanding, evaluating, and planning the development or enhancement of electronic business systems. It involves identifying business requirements, analyzing processes, and designing solutions to improve the efficiency, effectiveness, and overall performance of an organization's electronic business operations. E-Business Process Modeling E-business process modeling is the practice of representing the flow of activities, information, and resources within an electronic business environment using various modeling techniques and notations. It involves creating visual diagrams that illustrate the steps, interactions, and dependencies of processes involved in conducting business online.
  • 5. Here's a more detailed look at e-business process modeling: 1. Purpose Of E-Business Process Modeling: Understanding Business Operations: Process modeling helps stakeholders gain a clear understanding of how different tasks, activities, and data interconnect in an e-business. 2. Common E-business Process Modeling Techniques: BPMN (Business Process Model and Notation): BPMN is a widely used standard for modeling business processes, including e-business processes. It offers a comprehensive set of graphical symbols to represent activities, events, gateways, and flows. 3. Steps in E-business Process Modeling: Identify the Scope: Define the boundaries of the e-business process to be modeled and the specific objectives of the modeling effort. 4. Benefits of E-business Process Modeling: Improved understanding and visualization of e-business processes, enhanced process efficiency and productivity, effective communication among stakeholders.
  • 7. TASK ANALYSIS Task analysis is the process of learning about ordinary users by observing them in action to understand in detail how they perform their tasks and achieve their intended goals. Tasks analysis helps identify the tasks that your website and applications must support and can also help you refine or re-define your site’s navigation or search by determining the appropriate content scope.
  • 8. Task Analysis Process Task analysis helps you understand: •What your users’ goals are; what they are trying to achieve •What users actually do to achieve those goals •What experiences (personal, social, and cultural) users bring to the tasks •How users are influenced by their physical environment •How users’ previous knowledge and experience influence: • How they think about their work • The workflow they follow to perform their tasks
  • 9. Types of Task Analysis There are several types of task analysis but among the most common techniques used are: •Cognitive Task Analysis is focused on understanding tasks that require decision-making, problem-solving, memory, attention and judgement. •Hierarchical Task Analysis is focused on decomposing a high-level task subtasks.
  • 10. Task Decomposition A task decomposition describes a particular task and then decomposes it to describe the task's features, such as devices and interface components used, duration, errors, and feedback. These categories will be selected by the analyst based on the needs of the analysis. For example, you could break it down into product development, branding, and marketing. Break these down into smaller chunks: Break each deliverable into smaller, more manageable chunks. For example, marketing could be broken down into SEO content strategy, social media, and email marketing.
  • 11. Process Dependencies Process dependency analysis enables us to describe interdependence between processes based on information, materials or other resources in specific states, and to describe the influence of time events on the execution of processes.
  • 13. Validating a new process model Validating a new process model is a critical step in ensuring its effectiveness and efficiency. This involves testing the model under different scenarios to identify any potential flaws or weaknesses that may need to be addressed. This allows for the identification of any issues before implementing the model in a live system.
  • 14. Data modelling Data modeling is the process of creating a visual representation of data and its relationships to other data. It is an important step in designing a database or information system, as it helps to ensure that the data is organized efficiently and accurately. There are several different types of data models, including conceptual, logical, and physical models. The conceptual model focuses on the overall structure of the data, while the logical model goes into more detail about the relationships between entities and attributes.
  • 15. 1. Identify entities. 2. Identify attributes for entities. 3. Identify relationship between entities. Data modelling process
  • 16. Design for E-business Designing for e-business requires a deep understanding of the unique challenges and opportunities presented by the digital landscape. One of the key considerations is ensuring that the user experience is seamless and intuitive, regardless of the device or platform being used. This requires careful attention to information architecture, navigation, and visual design.
  • 17. Architectural design of e business systems The architectural design of e-business systems is a complex process that requires careful consideration of various factors. One important factor to consider is the scalability of the system. As the business grows, the system should be able to handle increased traffic and data volume without sacrificing performance or reliability.
  • 19. Designing the information architecture of a website is a crucial step in creating a user-friendly and efficient digital experience. It involves organizing the content, navigation, and functionality of the site in a way that makes sense to the user. This helps users quickly find what they are looking for and navigate through the site with ease. Designing the information architecture
  • 20. Information architecture: The combination of organization, labelling and navigation schemes composing an information system. Site map: A graphical or text depiction of the relationship between different groups of content on a website Card sorting or web classification: The process of arranging a way of organizing objects on the website in a consistent manner.
  • 21. In order to design a successful website, it is important to keep the customer at the forefront of your mind. This means focusing on their needs and preferences, rather than simply trying to create something that looks good or is easy for you to manage. By taking a customer-oriented approach, you can ensure that your site is user-friendly and meets the needs of your target audience. Customer Orientation
  • 22. Customer Orientation elements • Small office and home users • Small business • Medium businesses • Large business • Government organizations
  • 23. A successful website design is the result of careful planning and execution. When designing a website, it is important to consider both the aesthetic and functional elements that make up the user experience. One major element of site design is the use of color. Color can be used to create contrast, highlight important information, and evoke emotions in users. Elements of site design
  • 24. Elements of site design 1.Site personality 2.Site organization 3.Site navigation 4.Page design
  • 25. Mst. Sayeda Akter 21 MGT 052 Security Design for E-business
  • 26. Security for E-business • Security for e-business refers to the measures and practices implemented to protect an electronic business platform from potential threats, vulnerabilities, and attacks. • The main concern of security is “information security” : both customers and internal company data.
  • 27. ⚠️Common security threats for e- business • Direct data access(and theft) : if data exist, they can potentially be viewed or extracted. Avoid storing data that you don’t need on the website - for example, some data relating to payment card should never be stored. • Insecure payment systems: weak encryption or improper handling of payment data can expose customers' financial information to cybercriminals. • Phishing attack :phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. • Insecure authentication and authorization: poorly implemented authentication and authorization mechanisms can make it easier for attackers to gain unauthorized access to user accounts or sensitive areas of the website. • Malicious file execution: it occurs when websites and web applications are not properly validated.
  • 28. Protecting computer system against viruses: • All organizations and individuals require a policy to combat the potential impact of viruses. There are two approaches that can combined to counter viruses. They are- • Using right tools: 1) anti virus software. 2) managed e-mail service. • Educating staff to change practices : 1.don’t open attachment to email from people you don’t know. 2.Download software only from the official source. Always check for virus before installing. 3.Turn off macros in word or excel unless you use them regularly 4.Backup important files daily.
  • 29. Mst Ferdauce Akter Sumi 21 MGT 053
  • 30. E-mail Management Email management is the skill of efficiently handling and organizing emails. It involves categorizing messages, responding promptly, and keeping the inbox organized. This helps to save time, reduce stress, and improve productivity in handling email communication.
  • 31. Hacking Hacking refers to the act of gaining unauthorized access to computer systems, networks, or software, often with the intent of manipulating, stealing data, or causing disruption. There are two types of hacking 1.Ethical hacking and 2.unethical hacking
  • 32. Secure e-commerce transactions Secure e-commerce transactions involve secure payment gateways, data privacy, and strong authentication methods like multi- factor authentication. Regular security audits and updates are crucial to mitigate risks and protect customer data.
  • 33. Current approaches to e-commerce security There are many approaches to e-commerce security. These are major Securities. Two-Factor Authentication (2FA)Regular security audits Secure payment gateways Data encryption