SlideShare a Scribd company logo
1 of 73
Slide 3.1
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
E-business infrastructure
Chapter 3
Slide 3.2
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Learning outcomes
• Outline the hardware and software
technologies used to build an e-business
infrastructure within an organization and with
its partners.
• Outline the hardware and software
requirements necessary to enable employee
access to the Internet and hosting of e-
commerce services.
Slide 3.3
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Management issues
• What are the practical risks to the
organization of failure to manage e-commerce
infrastructure adequately?
• How should staff access to the Internet
be managed?
• How should we evaluate the relevance of web
services and open source software?
Slide 3.4
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
E-business infrastructure
• Refers to the combination of hardware such as servers and
client PCs in an organization, the network used to link this
hardware and the software applications used to deliver
services to workers within the e-business and also to its
partners and customers.
• Infrastructure also includes the architecture of the networks,
hardware and software and where it is located.
• Finally, infrastructure can also be considered to include the
methods for publishing data and documents accessed
through e-business applications.
• A key decision with managing this infrastructure is which
elements are located within the company and which are
managed externally as third-party managed applications, data
servers and networks.
Slide 3.5
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Why the jargon?
• Why do business managers need to know
about the jargon and technology?
Slide 3.6
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Activity 3.1 Infrastructure risk
assessment
• Make a list of the potential problems for
customers of an online retailer.
• You should consider problems faced by users
of e-business applications who are both
internal and external to the organization.
• Base your answer on problems you have
experienced on a web site that can be related
to network, hardware and software failures or
problems with data quality.
Slide 3.7
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Typical problems
• Web site communications too slow.
• Web site not available.
• Bugs on site through pages being unavailable
or information typed in forms not being
executed.
• Ordered products not delivered on time
• E-mails not replied to
• Customers’ privacy or trust is broken through
security problems such as credit cards being
stolen or addresses sold to other companies.
Slide 3.8
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
continue
• It will be apparent that although most of these
problems are technical, they arise because
humans have not managed the infrastructure
adequately. They have not invested enough to
solve these issues or have not tested
solutions adequately to check for deficiencies.
Additionally, in the case of some problems
such as e-mails not being responded to, this
may be entirely a problem in the process
created (or not created) by managers to deal
with inbound e-mails.
Slide 3.9
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.1 A five-layer model of e-business infrastructure
Slide 3.10
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
E-business infrastructure
components
• Figure 3.1 summarizes how the different
components of e-business architecture which
need to be managed relate to each other.
• The different components can be conceived
of as different layers with defined interfaces
between each layer. The different layers can
best be understood in relation to a typical task
performed by a user of an e-business system.
Slide 3.11
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
• For example, an employee who needs to book a
holiday will access a specific human resources
application or program that has been created to
enable the holiday to be booked (Level I in Figure
3.1).
• This application will enable a holiday request to be
entered and will forward the application to their
manager and human resources department for
approval.
• To access the application, the employee will use a
web browser such as Microsoft Internet Explorer,
Mozilla Firefox or Google Chrome using an operating
system such as Microsoft Windows XP or Apple OS
X (Level II in Figure 3.1).
Slide 3.12
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
• This systems software will then request transfer of
the information about the holiday request across a
network or transport layer (Level III in Figure 3.1).
The information will then be stored in computer
memory (RAM) or in long term magnetic storage on a
web server (Level IV in Figure 3.1).
• The information itself which makes up the web
pages or content viewed by the employee and the
data about their holiday request are shown as a
separate layer (Level V in Figure 3.1), although it
could be argued that this is the first or second level in
an e-business architecture.
Slide 3.13
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Kampas (2000) describes an alternative five-level
infrastructure model of what he refers to as ‘the information
system function chain’:
1. Storage/physical. Memory and disk hardware
components (equivalent to Level IV in Figure 3.1).
2. Processing. Computation and logic provided by the
processor (processing occurs at Levels I and II in Figure
3.1).
3. Infrastructure. This refers to the human and external
interfaces and also the network, referred to as
‘extrastructure’. (This is Level III in Figure 3.1, although
the human or external interfaces are not shown there.)
4. Application/content. This is the data processed by the
application into information. (This is Level V in Figure 3.1.)
5. Intelligence. Additional computer-based logic that
transforms information to knowledge. (This is also part of
the application layer I in Figure 3.1.)
Slide 3.14
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
continue
• Each of these elements of infrastructure
presents separate management issues which
we will consider separately. In this chapter,
infrastructur management issues are
introduced, while more detailed discussion of
management solutions is presented in
Chapters 10, 11 and 12.
• We start our coverage of e-business
infrastructure by considering the technical
infrastructure for the Internet, extranets,
intranets and the World Wide Web which are
Levels II and III in Figure 3.1.
Slide 3.15
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Table 3.1 Key management issues of e-business infrastructure
Slide 3.16
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Table 3.1 Key management issues of e-business infrastructure (Continued)
Slide 3.17
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Activity – www.google.com
• Write down all the different types of hardware
and software involved from when a user types
in a web address such as www.google.com to
the web site being loaded
Slide 3.18
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Internet technology
• Internet:
• The Internet refers to the physical network that links
computers across the globe. It consists of the
infrastructure of network servers and communication links
between them that are used to hold and transport
information between the client computers and web
servers.
• Client/server:
• The client/server architecture consists of client computers,
such as PCs, sharing resources such as a database
stored on a more powerful server computer.
Slide 3.19
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.2 Physical and network infrastructure components of the
Internet. (Levels IV and III in Figure 3.1)
Slide 3.20
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Physical and network infrastructure
components of the Internet (Levels IV and III in
Figure 3.1)
• Figure 3.2 shows how the client computers within
homes and businesses are connected to the Internet
via local Internet service providers (ISPs) which, in
turn, are linked to larger ISPs with connection to the
major national and international infrastructure or
backbones which are managed by commercial
organizations such as AT&T, UUNET and Verizon.
• In the UK, at the London Internet Exchange in the
Docklands area of east London, a facility exists to
connect multiple backbones of the major ISPs within
the UK onto a single high-speed link out of the UK
into Europe and to the world. These high-speed links
can be thought of as the motorways on the
‘information superhighway’, while the links
provided from ISPs to consumers are equivalent to
slow country roads.
Slide 3.21
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.3 Example hosting provider
Rackspace (www.rackspace.com)
• While it is possible for companies to manage their
own services by setting up web servers within their
own company offices, or to use their ISP, it is
common practice to use a specialist hosting
provider to manage this service.
• For example, Rackspace (Figure 3.3) describe
itself as ‘Europe’s fastest growing hosting company’.
Since 2001 Rackspace has been hosting and
supporting mission critical web sites, Internet
applications, e-mail servers, security and storage
services for over 4,000 customers. Rackspace also
has US offices.
Slide 3.22
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.3 Example hosting provider Rackspace
(www.rackspace.com)
Slide 3.23
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.4 Timeline of major developments
in the use of the web
Slide 3.24
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
The Internet timeline
• The Internet is only the latest of a series of
developments in the way that the human race has
used technology to disseminate information.
• Kampas (2000) identifies ten stages that are part of
five ‘megawaves’ of change. The first six stages are
summarized in Table 3.2.
• It is evident that many of the major advances in the
use of information have happened within the last
hundred years.
• This indicates that the difficulty of managing
technological change is likely to continue.
• Kampas goes on to speculate on the impact of
access to lower-cost, higher-bandwidth technologies.
Slide 3.25
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.5 The Netcraft index of number of servers Source:
Netcraft web Server Survey.
http://news.netcraft.com/archives/web_server_survey.html. Netcraft
• There are over one billion Internet users worldwide; but
how big is the infrastructure they are accessing? One
measure is the number of web servers. Netcraft has
regularly surveyed the servers since 1995 to give a
picture of the growth of the Internet through time (Figure
3.5).
• The first survey it ran, launched in 1995, found only
18,957 sites, but by August 2008, there were 176 million!
Note that Netcraft measures registered domains or
Internet IP addresses (explained later in this chapter).
• Some of these domains may not be active with regularly
updated content, as the chart shows.
Slide 3.26
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.5 The Netcraft index of number of servers
Source: Netcraft web Server Survey. http://news.netcraft.com/archives/web_server_survey.html. Netcraft
Slide 3.27
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Intranet applications
• Intranets are used extensively for supporting sell-side e-
commerce from within the marketing function. They are also used
to support core supply-chain management activities as
described in the next section on extranets.
A marketing intranet has the following advantages:
1. Reduced product lifecycles – as information on product
development and marketing campaigns is rationalized we can get
products to market faster.
2. Reduced costs through higher productivity, and savings on
hard copy.
3. Better customer service – responsive and personalized support
with staff accessing customers over the web.
4. Distribution of information through remote offices nationally or
globally.
Slide 3.28
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Intranets are also used for internal marketing communications
since they can include the following types of information:
1. Staff phone directories;
2. Staff procedures or quality manuals;
3. Information for agents such as product
specifications, current list and discounted
prices, competitor information, factory
schedules, and stocking levels, all of which
normally have to be updated frequently and
can be costly;
4. Staff bulletin or newsletter;
5. Training courses.
Slide 3.29
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Firewall
• A specialized software application mounted on a
server at the point where the company is connected
to the Internet.
• Its purpose is to prevent unauthorized access into the
company from outsiders.
• Firewalls are necessary when creating an intranet or
extranet to ensure that outside access to confidential
information does not occur. Firewalls are usually
created as software mounted on a separate server at
the point where the company is connected to the
Internet.
Slide 3.30
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.6 Firewall positions within the e-business infrastructure of the B2B
company
Slide 3.31
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.6 Firewall positions within the e-business
infrastructure of the B2B company
• The use of firewalls within the infrastructure of
a company is illustrated in Figure 3.6.
• It is evident that multiple firewalls are used to
protect information on the company.
• The information made available to third parties
over the Internet and extranet is partitioned by
another firewall using what is referred to as
the ‘demilitarized zone’ (DMZ).
• Corporate data on the intranet are then
mounted on other servers inside the company.
Slide 3.32
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Activity – a common problem with
intranets and extranets
• A B2B Company has found that after an initial
surge of interest in its intranet and extranet,
usage has declined dramatically. The e-
business manager wants to achieve these
aims:
• Increase usage
• Produce more dynamic content
• Encouraging more clients to order (extranet)
• What would you suggest?
Slide 3.33
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Suggested answers
• Identify benefits
• Involve staff with development
• Find system sponsors, owners and advocates
• Train on benefits
• Keep content fresh, relevant and where
possible, fun
• Use e-mail to encourage usage
Slide 3.34
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.8 Transaction log file example
Slide 3.35
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.8 Transaction log file example
Inside transaction log files – why hits stands for ‘how
idiots track success’ Figure 3.8 shows the detail
recorded within a transaction log file. This
shows the level of work that web servers have
to do. This server extract is from
DaveChaffey.com which uses the open-source
Apache server to serve content. This example
shows 10 requests received over a period of 5
seconds. Each line represents a GET request
from a web browser for a file on the server.
For each page, there are multiple lines or hits
since each image or an embedded reference
to a script or stylesheet in the page is
downloaded separately.
Slide 3.36
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.9 Browsershots (www.browsershots.org) – a service for
testing cross-browser compatibility.
Slide 3.37
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.9 Browsershots (www.browsershots.org) – a
service for testing cross-browser compatibility
• An example of a tool for designers to test
compatibility is shown in Figure 3.9.
Slide 3.38
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.10
E-consultancy Blog (www.econsultancy.com/news-blog)
• An example of a useful blog which can keep
marketing professionals up-to-date about e-
business developments is the E-consultancy
blog (Figure 3.10).
Slide 3.39
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Understanding Internet access tools
and concepts – match the definitions
• Atomisation concept
• Blogs
• Feeds
• IPTV
• Peer-to-peer
• Social networks
• Tagging
• VOIP
Slide 3.40
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.11 Personalized feed home page from iGoogle (www.igoogle.com)
Slide 3.41
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.11 Personalized feed home page from
iGoogle (www.igoogle.com)
• Figure 3.11 shows an example of a technology trial to
deliver different personalized content into a personalized
home page.
Slide 3.42
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.12 Joost service
• The growth in popularity of IPTV or ‘Internet TV’,
where TV and video are streamed via broadband
across the Internet, is one of the most exciting
developments in recent years.
• In 2007 services offering streamed viewing of
hundreds of channels from providers such as the
Europe-based Joost (Figure 3.12, www.joost.com)
and the US service Hulu (www.hulu.com) launched,
and there are many competitors such as Babelgum,
Vuze and Veoh. IPTV is sometimes referred to as
non-linear TV or on-demand broadcasting to contrast
it with the traditional broadcasting to schedule.
Slide 3.43
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.12 Joost service
Slide 3.44
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
URLS and domain names
• Web addresses are structured in a standard way as
follows:
• http://www.domain-name.extension/filename.html
• What do the following extensions or global top level
domains stand for?
– .com
– .co.uk, .uk.com
– .org or .org.uk
– .gov
– .edu, .ac.uk
– .int
– .net
– .biz
– .info
Slide 3.45
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Box 3.3. Identify URL components:
http://video.google.co.uk:80/videoplay?docid
=-7246927612831078230&hl=en#00h02m30s
• Protocol
• Host or hostname
• Subdomain
• Domain name
• Top-level domain or TLD
• Second-level domain (SLD)
• The port
• The path
• URL parameter
• Anchor or fragment
Slide 3.46
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
HTML and XML
• HTML (Hypertext Markup Language)
A standard format used to define the text and
layout of web pages. HTML files usually have
the extension .HTML or .HTM
• XML or eXtensible Markup Language
A standard for transferring structured data,
unlike HTML which is purely presentational
Slide 3.47
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.13 The TCP/IP protocol
• Since this protocol is important for delivering
the web pages, the letters http:// are used to
prefix all web addresses.
• HTTP messages are divided into HTTP ‘get’
messages for requesting and web page and
HTTP ‘send’ message as shown in
Figure 3.13.
Slide 3.48
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.13 The TCP/IP protocol
Slide 3.49
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.14 Home page index.html for an example B2B company in a web
browser showing HTML source in text editor
Slide 3.50
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.14 Home page index.html for an example B2B
company in a web browser showing HTML source in
text editor.
• A brief example of HTML is given for a simplified home page for an
example B2B company in Figure 3.14.
• The HTML code used to construct pages has codes or instruction
tags such as <TITLE>. to indicate to the browser what is
displayed. The <TITLE>. tag indicates what appears at the top of
the web browser window. Each starting tag has a corresponding
end tag usually marked by a ‘/’, for example, <B>plastics</B> to
embolden ‘plastics’.
• The simplicity of HTML compared to traditional programming
languages makes it possible for simple web pages to be
developed by non-specialists such as marketing assistants,
particularly if templates for more complex parts of the page are
provided. Interactive forms and brochures and online sales are
more complex and usually require some programming expertise,
although tools are available to simplify these.
Slide 3.51
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.15 Architecture of semantic web system
used at EDF
Slide 3.52
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.15 Architecture of semantic web system used
at EDF.
• Each time a service produces a new document, the
storage system is notified by the plug-ins of our
mediation architecture, saves its RDF data
instantaneously and merges it with other data using
the architecture shown in Figure 3.15.
• This allows us to benefit from a unique view of the
many integrated data sources (e.g. blogs, wikis,
RSS) and to have access to up to date information.
• Then, using the SPARQL query language and
protocol, we can query across the many data
sources, and services can be plugged on top of the
central storage system.
Slide 3.53
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Table 3.3 Internet tool Summary Applications of
different Internet tools:
• Blogs Web-based publishing of regularly updated information in an
online diary-type format using tools such as Blogger.com, Type pad or
WordPress.
• Electronic mail or e-mail Sending messages or documents, such as
news about a new product or sales promotion between individuals is
a key Internet capability. In a 2007 report on global e-mail volume,
IDC predicted that a staggering 97 billion e-mails would be sent daily
in 2007, over 40 billion of which were spam (which we discuss in
Chapter 4).
• Feeds Really Simple Syndication (RSS) is a well-known XML-
based content distribution format commonly used for syndicating and
accessing blog information. Standard XML feed formats are also used
by merchants updating price comparison sites.
• FTP file transfer The File Transfer Protocol is used as a standard for
moving files across the Internet. Commonly used to upload HTML and
other files to web servers. FTP is still used for e-business applications
such as downloading files such as product price lists or specifications.
• Gophers, Archie and WAIS These tools were important before the
advent of the web for storing and searching documents on the
Internet. They have largely been superseded by the web and search
engines.
Slide 3.54
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Table 3.3 Internet tool Summary Applications of
different Internet tools
• Secure Shell (SSH) and Telnet These allow remote command-line access to
computer systems. SSH is a more secure replacement for Telnet. For
example, a retailer could check to see whether an item was in stock in a
warehouse using SSH.
• Peer-to-peer file sharing Peer-to-peer file-sharing technology used to
enable sharing of large audio and video files in BitTorrent or approaches such
as Kontiki.
• Podcasting A method of downloading and playing audio or video clips
(webcasts), targeting portable devices such as the iPod or MP3 players or
fixed devices.
• Voice over Internet Protocol Technology for digitally transmitting voice over
a LAN or Internet. (VOIP)
• Widget A badge or button incorporated into a site or social network space by
its owner, with content or services typically served from another site, making
widgets effectively a mini-software application or web service. Content can be
updated in real time since the widget interacts with the server each time it
loads.
• World Wide Web Widely used for publishing information and running
business applications over the Internet accessed through web browsers.
Slide 3.55
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Table 3.3 Internet tool Summary Applications of
different Internet tools
• Instant Messaging (IM) and These are synchronous
communications tools for text-based ‘chat’ between different Internet
Relay Chat (IRC) users who are logged on at the same time. IM, from
providers such as Yahoo and MSN and Twitter (described in Mini
Case Study 3.4), has largely replaced IRC and provides opportunities
for advertising to users.
• IPTV Digital TV channels are made available via broadband Internet
either as streamed live broadcasts or as archived broadcasts of TV
programmes. This is discussed towards the end of this chapter.
• Usenet newsgroups Forums to discuss a particular topic such as a
sport, hobby or business area. Traditionally accessed by special
newsreader software, but now typically accessed via a web browser
from http://groups.google.com.
• Content: The design, text and graphical information that forms a web
page. Good content is the key to attracting customers to a web site
and retaining their interest or achieving repeat visits.
• Wiki: A collaborative interactive web service which
enables users to modify content contributed by others.
Slide 3.56
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
XML example
Product>
<Action Value5”Delete”/>
<ProductID>118003-008</ProductID>
</Product>
<Product Type5”Good” SchemaCategoryRef5”C43171801”>
<ProductID>140141-002</ProductID>
<UOM><UOMCoded>EA</UOMCoded></UOM>
<Manufacturer>Compaq</Manufacturer>
<LeadTime>2</LeadTime>
<CountryOfOrigin>
<Country><CountryCoded>US</CountryCoded></Country>
</CountryOfOrigin>
Slide 3.57
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Media standards
• GIF (Graphics Interchange Format) A graphics
format and compression algorithm best used for
simple graphics.
• JPEG (Joint Photographics Experts Group) A
graphics format and compression algorithm best
used for photographs.
• Streaming media Sound and video that can be
experienced within a web browser before the
whole clip is downloaded e.g. Real Networks.rm
format.
• Video standards include MPEG and .AVI.
• Sound standards include MP3 and WMA.
Slide 3.58
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.17 (a) Fragmented applications infrastructure, (b) integrated applications
infrastructure
Source: Adapted from Hasselbring (2000)
Slide 3.59
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Managing e-business applications infrastructure
• Management of the e-business applications infrastructure
concerns delivering the right applications to all users of e-
business services. The issue involved is one that has long been a
concern of IS managers, namely to deliver access to integrated
applications and data that are available across the whole company.
Traditionally businesses have developed applications silos or islands
of information, as depicted in Figure 3.17(a).
• This shows that these silos may develop at three different
levels: (1) there may be different technology architectures
used in different functional areas, giving rise to the
problems discussed in the previous section, (2) there will
also be different applications and separate databases in
different areas and (3) processes or activities followed in
the different functional areas may also be different.
Slide 3.60
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
continue
• To avoid the problems of a fragmented applications
infrastructure, companies attempted throughout the 1990s
to achieve the more integrated position shown in Figure
3.17(b).
• Here the technology architecture, applications, data
architecture and process architecture are uniform and
integrated across the organization. To achieve this many
companies turned to enterprise resource planning
(ERP) vendors such as SAP, Baan, PeopleSoft and
Oracle.
Slide 3.61
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.17 (a) Fragmented applications infrastructure, (b) integrated applications
infrastructure (Continued)
Source: Adapted from Hasselbring (2000)
Slide 3.62
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.18 Differing use of applications at levels of management within companies
Slide 3.63
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.18 Differing use of applications at levels of
management within companies
• Figure 3.18 only shows some types of applications, but it
shows the trial of strength between the monolithic ERP
applications and more specialist applications looking to
provide the same functionality.
• Enterprise resource planning (ERP) applications:
Software providing integrated functions for major business
functions such as production ,distribution, sales, finance
and human resource management.
Slide 3.64
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.19 Elements of e-business infrastructure that require management
Slide 3.65
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.19 Elements of e-business infrastructure that
require management.
• Figure 3.19 summarizes some of these
management issues and is based on the
layered architecture introduced at the start of
this section with applications infrastructure at
the top and technology infrastructure towards
the bottom.
Slide 3.66
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.20 Google apps (www.google.com/apps)
Slide 3.67
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.20 Google apps (www.google.com/apps)
• As an indication of the transformations possible through
web services . Figure 3.20 which shows how Google’s
mission to ‘manage the World’s information’ also applies
to supporting organizational processes. Google Apps
enables organizations to manage many of their activities.
• The basic service is free with the Premier Edition which
includes more storage space and security being $50 per
user account per year.
Slide 3.68
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.21 Salesforce.com (www.salesforce.com)
Slide 3.69
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Figure 3.21 Salesforce.com (www.salesforce.com)
• Figure 3.21 shows one of the largest SaaS or utility
providers Salesforce.com where customers pay from £5
to £50 per user per month according to the facilities used.
The service is delivered from the Salesforce.com servers
to over 50,000 customers in 15 local languages.
Slide 3.70
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Cloud computing
• Cloud computing: The use of distributed storage and processing
on servers connected by the Internet, typically provided as software or
data storage as a subscription service provided by other companies.
• In descriptions of web services you may hear confusingly, that
they access ‘the cloud’ or the term ‘cloud computing’, where the
cloud referred to is the Internet (networks are often denoted as
clouds on diagrams of network topology).
• For example, if you are accessing your Google Docs then they
will be stored somewhere ‘in the cloud’ without any knowledge of
where it is or how it is managed since Google stores data on many
servers. And of course you can access the document from any
location. But there are issues to consider about data stored and
served from the cloud: ‘is it secure, is it backed up, is it always
available?’. The size of Google’s cloud is indicated by Pandia
(2007) which estimated that Google has over 1 million servers
running the open-source Linux software.
Slide 3.71
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Virtualization
• Virtualization: is another approach to managing IT resource
more effectively. However, it is mainly deployed within an
organization.
• VMware was one of the forerunners offering virtualization services
which it explains as follows (VMware, 2008):
• The VMware approach to virtualization inserts a thin layer of
software directly on the computer hardware or on a host
operating system.
• This software layer creates virtual machines and contains a virtual
machine monitor or ‘hypervisor’ that allocates hardware resources
dynamically and transparently so that multiple operating systems
can run concurrently on a single physical computer without even
knowing it.
• However, virtualizing a single physical computer is just the
beginning. VMware offers a robust virtualization platform that can
scale across hundreds of interconnected physical computers and
storage devices to form an entire virtual infrastructure.
Slide 3.72
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Service-oriented architecture (SOA)
• The technical architecture used to build web services is formally known
as a ‘service oriented architecture’. This is an arrangement of software
processes or agents which communicate with each other to deliver the
business requirements.
• The main role of a service within SOA is to provide functionality.
This is provided by three characteristics:
1. An interface with the service which is platform-independent (not
dependent on a particular type of software or hardware). The interface is
accessible through applications development approaches such as
Microsoft .Net or Java and accessed through protocols such as SOAP
(Simple Object Access Protocol) which is used for XML-formatted
messages, i.e. instructions and returned results to be exchanged
between services.
2. The service can be dynamically located and invoked. One service
can query for the existence of another service through a service directory
for example an e-commerce service could query for the existence of a
credit card authorization service.
3. The service is self-contained. That is, the service cannot be influenced
by other services; rather it will return a required result to a request from
another service, but will not change state. Within web services,
messages and data are typically exchanged between services using
XML.
Slide 3.73
Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009
Mobile commerce
• In Chapter 1 we explained that e-commerce refers to both
informational and financial transactions through digital
media.
• Similarly mobile commerce (m-commerce) refers to the use of
wireless devices such as mobile phones for both informational and
monetary transactions.
• While fixed access to the Internet has dominated to-date in many
developed countries, in future this situation will change due to the
ubiquity of the mobile phone and the adoption of higher-speed
services and more sophisticated handsets. In some countries such
as Japan and China, the majority of web access is via mobile
phone and we can expect to see increased mobile use in all
countries. In China there are more mobile subscribers (over half a
billion) than the whole US population (Belic, 2007) and according
to the regularly updated Comscore panel dat
(www.comscore.com), use of the web by mobile devices in Japan
is equal to that of traditional computer access.

More Related Content

Similar to security.ppt

Internship report
Internship reportInternship report
Internship reportpradipkc3
 
Australian IT Pros Survey: Network Complexity
Australian IT Pros Survey: Network ComplexityAustralian IT Pros Survey: Network Complexity
Australian IT Pros Survey: Network ComplexitySolarWinds
 
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docxCHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docxcravennichole326
 
CO_Scenario_InfoDelivTr_FINAL ENGLISH
CO_Scenario_InfoDelivTr_FINAL ENGLISHCO_Scenario_InfoDelivTr_FINAL ENGLISH
CO_Scenario_InfoDelivTr_FINAL ENGLISHLeonardo Sepulcri
 
IBM Start Now Collaboration - Information Delivery and Tracking
IBM Start Now Collaboration - Information Delivery and TrackingIBM Start Now Collaboration - Information Delivery and Tracking
IBM Start Now Collaboration - Information Delivery and TrackingLeonardo Sepulcri
 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology EssayPamela Wright
 
An E-Business Integration And Collaboration Platform For B2B E-Commerce
An E-Business Integration And Collaboration Platform For B2B E-CommerceAn E-Business Integration And Collaboration Platform For B2B E-Commerce
An E-Business Integration And Collaboration Platform For B2B E-CommerceAndrew Parish
 
E commerce technologies
E commerce technologiesE commerce technologies
E commerce technologiesAnne ndolo
 
Activities of e business infrastructure
Activities of e business infrastructureActivities of e business infrastructure
Activities of e business infrastructureAta Ul Hassnain Awan
 
Module_9 Developing an Enterprise Architecture Management Plan (1).pptx
Module_9 Developing an Enterprise Architecture Management Plan (1).pptxModule_9 Developing an Enterprise Architecture Management Plan (1).pptx
Module_9 Developing an Enterprise Architecture Management Plan (1).pptxreiscristelle
 
Development of Web-based Job Fair Information System
Development of Web-based Job Fair Information SystemDevelopment of Web-based Job Fair Information System
Development of Web-based Job Fair Information SystemEditor IJCATR
 
Development of Web-based Job Fair Information System
Development of Web-based Job Fair Information SystemDevelopment of Web-based Job Fair Information System
Development of Web-based Job Fair Information SystemEditor IJCATR
 
North America IT Pros Survey: Network Complexity
North America IT Pros Survey: Network ComplexityNorth America IT Pros Survey: Network Complexity
North America IT Pros Survey: Network ComplexitySolarWinds
 
German IT Pros Survey: Network Complexity
German IT Pros Survey: Network ComplexityGerman IT Pros Survey: Network Complexity
German IT Pros Survey: Network ComplexitySolarWinds
 

Similar to security.ppt (20)

Internship report
Internship reportInternship report
Internship report
 
Web engineering
Web engineeringWeb engineering
Web engineering
 
3 tier architecture
3 tier architecture3 tier architecture
3 tier architecture
 
Australian IT Pros Survey: Network Complexity
Australian IT Pros Survey: Network ComplexityAustralian IT Pros Survey: Network Complexity
Australian IT Pros Survey: Network Complexity
 
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docxCHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
CHAPTER 10 SystemArchitectureChapter 10 is the final chapter.docx
 
CO_Scenario_InfoDelivTr_FINAL ENGLISH
CO_Scenario_InfoDelivTr_FINAL ENGLISHCO_Scenario_InfoDelivTr_FINAL ENGLISH
CO_Scenario_InfoDelivTr_FINAL ENGLISH
 
IBM Start Now Collaboration - Information Delivery and Tracking
IBM Start Now Collaboration - Information Delivery and TrackingIBM Start Now Collaboration - Information Delivery and Tracking
IBM Start Now Collaboration - Information Delivery and Tracking
 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
 
An E-Business Integration And Collaboration Platform For B2B E-Commerce
An E-Business Integration And Collaboration Platform For B2B E-CommerceAn E-Business Integration And Collaboration Platform For B2B E-Commerce
An E-Business Integration And Collaboration Platform For B2B E-Commerce
 
E commerce technologies
E commerce technologiesE commerce technologies
E commerce technologies
 
Strategic plan
Strategic planStrategic plan
Strategic plan
 
Activities of e business infrastructure
Activities of e business infrastructureActivities of e business infrastructure
Activities of e business infrastructure
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 
Module_9 Developing an Enterprise Architecture Management Plan (1).pptx
Module_9 Developing an Enterprise Architecture Management Plan (1).pptxModule_9 Developing an Enterprise Architecture Management Plan (1).pptx
Module_9 Developing an Enterprise Architecture Management Plan (1).pptx
 
Development of Web-based Job Fair Information System
Development of Web-based Job Fair Information SystemDevelopment of Web-based Job Fair Information System
Development of Web-based Job Fair Information System
 
Ijcatr04071001
Ijcatr04071001Ijcatr04071001
Ijcatr04071001
 
Development of Web-based Job Fair Information System
Development of Web-based Job Fair Information SystemDevelopment of Web-based Job Fair Information System
Development of Web-based Job Fair Information System
 
North America IT Pros Survey: Network Complexity
North America IT Pros Survey: Network ComplexityNorth America IT Pros Survey: Network Complexity
North America IT Pros Survey: Network Complexity
 
German IT Pros Survey: Network Complexity
German IT Pros Survey: Network ComplexityGerman IT Pros Survey: Network Complexity
German IT Pros Survey: Network Complexity
 
Ecommerce_Ch3.ppt
Ecommerce_Ch3.pptEcommerce_Ch3.ppt
Ecommerce_Ch3.ppt
 

Recently uploaded

Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 

Recently uploaded (20)

Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 

security.ppt

  • 1. Slide 3.1 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 E-business infrastructure Chapter 3
  • 2. Slide 3.2 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Learning outcomes • Outline the hardware and software technologies used to build an e-business infrastructure within an organization and with its partners. • Outline the hardware and software requirements necessary to enable employee access to the Internet and hosting of e- commerce services.
  • 3. Slide 3.3 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Management issues • What are the practical risks to the organization of failure to manage e-commerce infrastructure adequately? • How should staff access to the Internet be managed? • How should we evaluate the relevance of web services and open source software?
  • 4. Slide 3.4 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 E-business infrastructure • Refers to the combination of hardware such as servers and client PCs in an organization, the network used to link this hardware and the software applications used to deliver services to workers within the e-business and also to its partners and customers. • Infrastructure also includes the architecture of the networks, hardware and software and where it is located. • Finally, infrastructure can also be considered to include the methods for publishing data and documents accessed through e-business applications. • A key decision with managing this infrastructure is which elements are located within the company and which are managed externally as third-party managed applications, data servers and networks.
  • 5. Slide 3.5 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Why the jargon? • Why do business managers need to know about the jargon and technology?
  • 6. Slide 3.6 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Activity 3.1 Infrastructure risk assessment • Make a list of the potential problems for customers of an online retailer. • You should consider problems faced by users of e-business applications who are both internal and external to the organization. • Base your answer on problems you have experienced on a web site that can be related to network, hardware and software failures or problems with data quality.
  • 7. Slide 3.7 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Typical problems • Web site communications too slow. • Web site not available. • Bugs on site through pages being unavailable or information typed in forms not being executed. • Ordered products not delivered on time • E-mails not replied to • Customers’ privacy or trust is broken through security problems such as credit cards being stolen or addresses sold to other companies.
  • 8. Slide 3.8 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 continue • It will be apparent that although most of these problems are technical, they arise because humans have not managed the infrastructure adequately. They have not invested enough to solve these issues or have not tested solutions adequately to check for deficiencies. Additionally, in the case of some problems such as e-mails not being responded to, this may be entirely a problem in the process created (or not created) by managers to deal with inbound e-mails.
  • 9. Slide 3.9 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.1 A five-layer model of e-business infrastructure
  • 10. Slide 3.10 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 E-business infrastructure components • Figure 3.1 summarizes how the different components of e-business architecture which need to be managed relate to each other. • The different components can be conceived of as different layers with defined interfaces between each layer. The different layers can best be understood in relation to a typical task performed by a user of an e-business system.
  • 11. Slide 3.11 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 • For example, an employee who needs to book a holiday will access a specific human resources application or program that has been created to enable the holiday to be booked (Level I in Figure 3.1). • This application will enable a holiday request to be entered and will forward the application to their manager and human resources department for approval. • To access the application, the employee will use a web browser such as Microsoft Internet Explorer, Mozilla Firefox or Google Chrome using an operating system such as Microsoft Windows XP or Apple OS X (Level II in Figure 3.1).
  • 12. Slide 3.12 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 • This systems software will then request transfer of the information about the holiday request across a network or transport layer (Level III in Figure 3.1). The information will then be stored in computer memory (RAM) or in long term magnetic storage on a web server (Level IV in Figure 3.1). • The information itself which makes up the web pages or content viewed by the employee and the data about their holiday request are shown as a separate layer (Level V in Figure 3.1), although it could be argued that this is the first or second level in an e-business architecture.
  • 13. Slide 3.13 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Kampas (2000) describes an alternative five-level infrastructure model of what he refers to as ‘the information system function chain’: 1. Storage/physical. Memory and disk hardware components (equivalent to Level IV in Figure 3.1). 2. Processing. Computation and logic provided by the processor (processing occurs at Levels I and II in Figure 3.1). 3. Infrastructure. This refers to the human and external interfaces and also the network, referred to as ‘extrastructure’. (This is Level III in Figure 3.1, although the human or external interfaces are not shown there.) 4. Application/content. This is the data processed by the application into information. (This is Level V in Figure 3.1.) 5. Intelligence. Additional computer-based logic that transforms information to knowledge. (This is also part of the application layer I in Figure 3.1.)
  • 14. Slide 3.14 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 continue • Each of these elements of infrastructure presents separate management issues which we will consider separately. In this chapter, infrastructur management issues are introduced, while more detailed discussion of management solutions is presented in Chapters 10, 11 and 12. • We start our coverage of e-business infrastructure by considering the technical infrastructure for the Internet, extranets, intranets and the World Wide Web which are Levels II and III in Figure 3.1.
  • 15. Slide 3.15 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Table 3.1 Key management issues of e-business infrastructure
  • 16. Slide 3.16 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Table 3.1 Key management issues of e-business infrastructure (Continued)
  • 17. Slide 3.17 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Activity – www.google.com • Write down all the different types of hardware and software involved from when a user types in a web address such as www.google.com to the web site being loaded
  • 18. Slide 3.18 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Internet technology • Internet: • The Internet refers to the physical network that links computers across the globe. It consists of the infrastructure of network servers and communication links between them that are used to hold and transport information between the client computers and web servers. • Client/server: • The client/server architecture consists of client computers, such as PCs, sharing resources such as a database stored on a more powerful server computer.
  • 19. Slide 3.19 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.2 Physical and network infrastructure components of the Internet. (Levels IV and III in Figure 3.1)
  • 20. Slide 3.20 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Physical and network infrastructure components of the Internet (Levels IV and III in Figure 3.1) • Figure 3.2 shows how the client computers within homes and businesses are connected to the Internet via local Internet service providers (ISPs) which, in turn, are linked to larger ISPs with connection to the major national and international infrastructure or backbones which are managed by commercial organizations such as AT&T, UUNET and Verizon. • In the UK, at the London Internet Exchange in the Docklands area of east London, a facility exists to connect multiple backbones of the major ISPs within the UK onto a single high-speed link out of the UK into Europe and to the world. These high-speed links can be thought of as the motorways on the ‘information superhighway’, while the links provided from ISPs to consumers are equivalent to slow country roads.
  • 21. Slide 3.21 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.3 Example hosting provider Rackspace (www.rackspace.com) • While it is possible for companies to manage their own services by setting up web servers within their own company offices, or to use their ISP, it is common practice to use a specialist hosting provider to manage this service. • For example, Rackspace (Figure 3.3) describe itself as ‘Europe’s fastest growing hosting company’. Since 2001 Rackspace has been hosting and supporting mission critical web sites, Internet applications, e-mail servers, security and storage services for over 4,000 customers. Rackspace also has US offices.
  • 22. Slide 3.22 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.3 Example hosting provider Rackspace (www.rackspace.com)
  • 23. Slide 3.23 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.4 Timeline of major developments in the use of the web
  • 24. Slide 3.24 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 The Internet timeline • The Internet is only the latest of a series of developments in the way that the human race has used technology to disseminate information. • Kampas (2000) identifies ten stages that are part of five ‘megawaves’ of change. The first six stages are summarized in Table 3.2. • It is evident that many of the major advances in the use of information have happened within the last hundred years. • This indicates that the difficulty of managing technological change is likely to continue. • Kampas goes on to speculate on the impact of access to lower-cost, higher-bandwidth technologies.
  • 25. Slide 3.25 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.5 The Netcraft index of number of servers Source: Netcraft web Server Survey. http://news.netcraft.com/archives/web_server_survey.html. Netcraft • There are over one billion Internet users worldwide; but how big is the infrastructure they are accessing? One measure is the number of web servers. Netcraft has regularly surveyed the servers since 1995 to give a picture of the growth of the Internet through time (Figure 3.5). • The first survey it ran, launched in 1995, found only 18,957 sites, but by August 2008, there were 176 million! Note that Netcraft measures registered domains or Internet IP addresses (explained later in this chapter). • Some of these domains may not be active with regularly updated content, as the chart shows.
  • 26. Slide 3.26 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.5 The Netcraft index of number of servers Source: Netcraft web Server Survey. http://news.netcraft.com/archives/web_server_survey.html. Netcraft
  • 27. Slide 3.27 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Intranet applications • Intranets are used extensively for supporting sell-side e- commerce from within the marketing function. They are also used to support core supply-chain management activities as described in the next section on extranets. A marketing intranet has the following advantages: 1. Reduced product lifecycles – as information on product development and marketing campaigns is rationalized we can get products to market faster. 2. Reduced costs through higher productivity, and savings on hard copy. 3. Better customer service – responsive and personalized support with staff accessing customers over the web. 4. Distribution of information through remote offices nationally or globally.
  • 28. Slide 3.28 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Intranets are also used for internal marketing communications since they can include the following types of information: 1. Staff phone directories; 2. Staff procedures or quality manuals; 3. Information for agents such as product specifications, current list and discounted prices, competitor information, factory schedules, and stocking levels, all of which normally have to be updated frequently and can be costly; 4. Staff bulletin or newsletter; 5. Training courses.
  • 29. Slide 3.29 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Firewall • A specialized software application mounted on a server at the point where the company is connected to the Internet. • Its purpose is to prevent unauthorized access into the company from outsiders. • Firewalls are necessary when creating an intranet or extranet to ensure that outside access to confidential information does not occur. Firewalls are usually created as software mounted on a separate server at the point where the company is connected to the Internet.
  • 30. Slide 3.30 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.6 Firewall positions within the e-business infrastructure of the B2B company
  • 31. Slide 3.31 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.6 Firewall positions within the e-business infrastructure of the B2B company • The use of firewalls within the infrastructure of a company is illustrated in Figure 3.6. • It is evident that multiple firewalls are used to protect information on the company. • The information made available to third parties over the Internet and extranet is partitioned by another firewall using what is referred to as the ‘demilitarized zone’ (DMZ). • Corporate data on the intranet are then mounted on other servers inside the company.
  • 32. Slide 3.32 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Activity – a common problem with intranets and extranets • A B2B Company has found that after an initial surge of interest in its intranet and extranet, usage has declined dramatically. The e- business manager wants to achieve these aims: • Increase usage • Produce more dynamic content • Encouraging more clients to order (extranet) • What would you suggest?
  • 33. Slide 3.33 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Suggested answers • Identify benefits • Involve staff with development • Find system sponsors, owners and advocates • Train on benefits • Keep content fresh, relevant and where possible, fun • Use e-mail to encourage usage
  • 34. Slide 3.34 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.8 Transaction log file example
  • 35. Slide 3.35 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.8 Transaction log file example Inside transaction log files – why hits stands for ‘how idiots track success’ Figure 3.8 shows the detail recorded within a transaction log file. This shows the level of work that web servers have to do. This server extract is from DaveChaffey.com which uses the open-source Apache server to serve content. This example shows 10 requests received over a period of 5 seconds. Each line represents a GET request from a web browser for a file on the server. For each page, there are multiple lines or hits since each image or an embedded reference to a script or stylesheet in the page is downloaded separately.
  • 36. Slide 3.36 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.9 Browsershots (www.browsershots.org) – a service for testing cross-browser compatibility.
  • 37. Slide 3.37 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.9 Browsershots (www.browsershots.org) – a service for testing cross-browser compatibility • An example of a tool for designers to test compatibility is shown in Figure 3.9.
  • 38. Slide 3.38 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.10 E-consultancy Blog (www.econsultancy.com/news-blog) • An example of a useful blog which can keep marketing professionals up-to-date about e- business developments is the E-consultancy blog (Figure 3.10).
  • 39. Slide 3.39 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Understanding Internet access tools and concepts – match the definitions • Atomisation concept • Blogs • Feeds • IPTV • Peer-to-peer • Social networks • Tagging • VOIP
  • 40. Slide 3.40 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.11 Personalized feed home page from iGoogle (www.igoogle.com)
  • 41. Slide 3.41 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.11 Personalized feed home page from iGoogle (www.igoogle.com) • Figure 3.11 shows an example of a technology trial to deliver different personalized content into a personalized home page.
  • 42. Slide 3.42 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.12 Joost service • The growth in popularity of IPTV or ‘Internet TV’, where TV and video are streamed via broadband across the Internet, is one of the most exciting developments in recent years. • In 2007 services offering streamed viewing of hundreds of channels from providers such as the Europe-based Joost (Figure 3.12, www.joost.com) and the US service Hulu (www.hulu.com) launched, and there are many competitors such as Babelgum, Vuze and Veoh. IPTV is sometimes referred to as non-linear TV or on-demand broadcasting to contrast it with the traditional broadcasting to schedule.
  • 43. Slide 3.43 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.12 Joost service
  • 44. Slide 3.44 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 URLS and domain names • Web addresses are structured in a standard way as follows: • http://www.domain-name.extension/filename.html • What do the following extensions or global top level domains stand for? – .com – .co.uk, .uk.com – .org or .org.uk – .gov – .edu, .ac.uk – .int – .net – .biz – .info
  • 45. Slide 3.45 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Box 3.3. Identify URL components: http://video.google.co.uk:80/videoplay?docid =-7246927612831078230&hl=en#00h02m30s • Protocol • Host or hostname • Subdomain • Domain name • Top-level domain or TLD • Second-level domain (SLD) • The port • The path • URL parameter • Anchor or fragment
  • 46. Slide 3.46 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 HTML and XML • HTML (Hypertext Markup Language) A standard format used to define the text and layout of web pages. HTML files usually have the extension .HTML or .HTM • XML or eXtensible Markup Language A standard for transferring structured data, unlike HTML which is purely presentational
  • 47. Slide 3.47 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.13 The TCP/IP protocol • Since this protocol is important for delivering the web pages, the letters http:// are used to prefix all web addresses. • HTTP messages are divided into HTTP ‘get’ messages for requesting and web page and HTTP ‘send’ message as shown in Figure 3.13.
  • 48. Slide 3.48 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.13 The TCP/IP protocol
  • 49. Slide 3.49 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.14 Home page index.html for an example B2B company in a web browser showing HTML source in text editor
  • 50. Slide 3.50 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.14 Home page index.html for an example B2B company in a web browser showing HTML source in text editor. • A brief example of HTML is given for a simplified home page for an example B2B company in Figure 3.14. • The HTML code used to construct pages has codes or instruction tags such as <TITLE>. to indicate to the browser what is displayed. The <TITLE>. tag indicates what appears at the top of the web browser window. Each starting tag has a corresponding end tag usually marked by a ‘/’, for example, <B>plastics</B> to embolden ‘plastics’. • The simplicity of HTML compared to traditional programming languages makes it possible for simple web pages to be developed by non-specialists such as marketing assistants, particularly if templates for more complex parts of the page are provided. Interactive forms and brochures and online sales are more complex and usually require some programming expertise, although tools are available to simplify these.
  • 51. Slide 3.51 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.15 Architecture of semantic web system used at EDF
  • 52. Slide 3.52 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.15 Architecture of semantic web system used at EDF. • Each time a service produces a new document, the storage system is notified by the plug-ins of our mediation architecture, saves its RDF data instantaneously and merges it with other data using the architecture shown in Figure 3.15. • This allows us to benefit from a unique view of the many integrated data sources (e.g. blogs, wikis, RSS) and to have access to up to date information. • Then, using the SPARQL query language and protocol, we can query across the many data sources, and services can be plugged on top of the central storage system.
  • 53. Slide 3.53 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Table 3.3 Internet tool Summary Applications of different Internet tools: • Blogs Web-based publishing of regularly updated information in an online diary-type format using tools such as Blogger.com, Type pad or WordPress. • Electronic mail or e-mail Sending messages or documents, such as news about a new product or sales promotion between individuals is a key Internet capability. In a 2007 report on global e-mail volume, IDC predicted that a staggering 97 billion e-mails would be sent daily in 2007, over 40 billion of which were spam (which we discuss in Chapter 4). • Feeds Really Simple Syndication (RSS) is a well-known XML- based content distribution format commonly used for syndicating and accessing blog information. Standard XML feed formats are also used by merchants updating price comparison sites. • FTP file transfer The File Transfer Protocol is used as a standard for moving files across the Internet. Commonly used to upload HTML and other files to web servers. FTP is still used for e-business applications such as downloading files such as product price lists or specifications. • Gophers, Archie and WAIS These tools were important before the advent of the web for storing and searching documents on the Internet. They have largely been superseded by the web and search engines.
  • 54. Slide 3.54 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Table 3.3 Internet tool Summary Applications of different Internet tools • Secure Shell (SSH) and Telnet These allow remote command-line access to computer systems. SSH is a more secure replacement for Telnet. For example, a retailer could check to see whether an item was in stock in a warehouse using SSH. • Peer-to-peer file sharing Peer-to-peer file-sharing technology used to enable sharing of large audio and video files in BitTorrent or approaches such as Kontiki. • Podcasting A method of downloading and playing audio or video clips (webcasts), targeting portable devices such as the iPod or MP3 players or fixed devices. • Voice over Internet Protocol Technology for digitally transmitting voice over a LAN or Internet. (VOIP) • Widget A badge or button incorporated into a site or social network space by its owner, with content or services typically served from another site, making widgets effectively a mini-software application or web service. Content can be updated in real time since the widget interacts with the server each time it loads. • World Wide Web Widely used for publishing information and running business applications over the Internet accessed through web browsers.
  • 55. Slide 3.55 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Table 3.3 Internet tool Summary Applications of different Internet tools • Instant Messaging (IM) and These are synchronous communications tools for text-based ‘chat’ between different Internet Relay Chat (IRC) users who are logged on at the same time. IM, from providers such as Yahoo and MSN and Twitter (described in Mini Case Study 3.4), has largely replaced IRC and provides opportunities for advertising to users. • IPTV Digital TV channels are made available via broadband Internet either as streamed live broadcasts or as archived broadcasts of TV programmes. This is discussed towards the end of this chapter. • Usenet newsgroups Forums to discuss a particular topic such as a sport, hobby or business area. Traditionally accessed by special newsreader software, but now typically accessed via a web browser from http://groups.google.com. • Content: The design, text and graphical information that forms a web page. Good content is the key to attracting customers to a web site and retaining their interest or achieving repeat visits. • Wiki: A collaborative interactive web service which enables users to modify content contributed by others.
  • 56. Slide 3.56 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 XML example Product> <Action Value5”Delete”/> <ProductID>118003-008</ProductID> </Product> <Product Type5”Good” SchemaCategoryRef5”C43171801”> <ProductID>140141-002</ProductID> <UOM><UOMCoded>EA</UOMCoded></UOM> <Manufacturer>Compaq</Manufacturer> <LeadTime>2</LeadTime> <CountryOfOrigin> <Country><CountryCoded>US</CountryCoded></Country> </CountryOfOrigin>
  • 57. Slide 3.57 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Media standards • GIF (Graphics Interchange Format) A graphics format and compression algorithm best used for simple graphics. • JPEG (Joint Photographics Experts Group) A graphics format and compression algorithm best used for photographs. • Streaming media Sound and video that can be experienced within a web browser before the whole clip is downloaded e.g. Real Networks.rm format. • Video standards include MPEG and .AVI. • Sound standards include MP3 and WMA.
  • 58. Slide 3.58 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.17 (a) Fragmented applications infrastructure, (b) integrated applications infrastructure Source: Adapted from Hasselbring (2000)
  • 59. Slide 3.59 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Managing e-business applications infrastructure • Management of the e-business applications infrastructure concerns delivering the right applications to all users of e- business services. The issue involved is one that has long been a concern of IS managers, namely to deliver access to integrated applications and data that are available across the whole company. Traditionally businesses have developed applications silos or islands of information, as depicted in Figure 3.17(a). • This shows that these silos may develop at three different levels: (1) there may be different technology architectures used in different functional areas, giving rise to the problems discussed in the previous section, (2) there will also be different applications and separate databases in different areas and (3) processes or activities followed in the different functional areas may also be different.
  • 60. Slide 3.60 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 continue • To avoid the problems of a fragmented applications infrastructure, companies attempted throughout the 1990s to achieve the more integrated position shown in Figure 3.17(b). • Here the technology architecture, applications, data architecture and process architecture are uniform and integrated across the organization. To achieve this many companies turned to enterprise resource planning (ERP) vendors such as SAP, Baan, PeopleSoft and Oracle.
  • 61. Slide 3.61 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.17 (a) Fragmented applications infrastructure, (b) integrated applications infrastructure (Continued) Source: Adapted from Hasselbring (2000)
  • 62. Slide 3.62 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.18 Differing use of applications at levels of management within companies
  • 63. Slide 3.63 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.18 Differing use of applications at levels of management within companies • Figure 3.18 only shows some types of applications, but it shows the trial of strength between the monolithic ERP applications and more specialist applications looking to provide the same functionality. • Enterprise resource planning (ERP) applications: Software providing integrated functions for major business functions such as production ,distribution, sales, finance and human resource management.
  • 64. Slide 3.64 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.19 Elements of e-business infrastructure that require management
  • 65. Slide 3.65 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.19 Elements of e-business infrastructure that require management. • Figure 3.19 summarizes some of these management issues and is based on the layered architecture introduced at the start of this section with applications infrastructure at the top and technology infrastructure towards the bottom.
  • 66. Slide 3.66 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.20 Google apps (www.google.com/apps)
  • 67. Slide 3.67 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.20 Google apps (www.google.com/apps) • As an indication of the transformations possible through web services . Figure 3.20 which shows how Google’s mission to ‘manage the World’s information’ also applies to supporting organizational processes. Google Apps enables organizations to manage many of their activities. • The basic service is free with the Premier Edition which includes more storage space and security being $50 per user account per year.
  • 68. Slide 3.68 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.21 Salesforce.com (www.salesforce.com)
  • 69. Slide 3.69 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Figure 3.21 Salesforce.com (www.salesforce.com) • Figure 3.21 shows one of the largest SaaS or utility providers Salesforce.com where customers pay from £5 to £50 per user per month according to the facilities used. The service is delivered from the Salesforce.com servers to over 50,000 customers in 15 local languages.
  • 70. Slide 3.70 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Cloud computing • Cloud computing: The use of distributed storage and processing on servers connected by the Internet, typically provided as software or data storage as a subscription service provided by other companies. • In descriptions of web services you may hear confusingly, that they access ‘the cloud’ or the term ‘cloud computing’, where the cloud referred to is the Internet (networks are often denoted as clouds on diagrams of network topology). • For example, if you are accessing your Google Docs then they will be stored somewhere ‘in the cloud’ without any knowledge of where it is or how it is managed since Google stores data on many servers. And of course you can access the document from any location. But there are issues to consider about data stored and served from the cloud: ‘is it secure, is it backed up, is it always available?’. The size of Google’s cloud is indicated by Pandia (2007) which estimated that Google has over 1 million servers running the open-source Linux software.
  • 71. Slide 3.71 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Virtualization • Virtualization: is another approach to managing IT resource more effectively. However, it is mainly deployed within an organization. • VMware was one of the forerunners offering virtualization services which it explains as follows (VMware, 2008): • The VMware approach to virtualization inserts a thin layer of software directly on the computer hardware or on a host operating system. • This software layer creates virtual machines and contains a virtual machine monitor or ‘hypervisor’ that allocates hardware resources dynamically and transparently so that multiple operating systems can run concurrently on a single physical computer without even knowing it. • However, virtualizing a single physical computer is just the beginning. VMware offers a robust virtualization platform that can scale across hundreds of interconnected physical computers and storage devices to form an entire virtual infrastructure.
  • 72. Slide 3.72 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Service-oriented architecture (SOA) • The technical architecture used to build web services is formally known as a ‘service oriented architecture’. This is an arrangement of software processes or agents which communicate with each other to deliver the business requirements. • The main role of a service within SOA is to provide functionality. This is provided by three characteristics: 1. An interface with the service which is platform-independent (not dependent on a particular type of software or hardware). The interface is accessible through applications development approaches such as Microsoft .Net or Java and accessed through protocols such as SOAP (Simple Object Access Protocol) which is used for XML-formatted messages, i.e. instructions and returned results to be exchanged between services. 2. The service can be dynamically located and invoked. One service can query for the existence of another service through a service directory for example an e-commerce service could query for the existence of a credit card authorization service. 3. The service is self-contained. That is, the service cannot be influenced by other services; rather it will return a required result to a request from another service, but will not change state. Within web services, messages and data are typically exchanged between services using XML.
  • 73. Slide 3.73 Dave Chaffey, E-Business and E-Commerce Management, 4th Edition, © Marketing Insights Limited 2009 Mobile commerce • In Chapter 1 we explained that e-commerce refers to both informational and financial transactions through digital media. • Similarly mobile commerce (m-commerce) refers to the use of wireless devices such as mobile phones for both informational and monetary transactions. • While fixed access to the Internet has dominated to-date in many developed countries, in future this situation will change due to the ubiquity of the mobile phone and the adoption of higher-speed services and more sophisticated handsets. In some countries such as Japan and China, the majority of web access is via mobile phone and we can expect to see increased mobile use in all countries. In China there are more mobile subscribers (over half a billion) than the whole US population (Belic, 2007) and according to the regularly updated Comscore panel dat (www.comscore.com), use of the web by mobile devices in Japan is equal to that of traditional computer access.