CHAPTER 2 THEORETICAL FOUNDATION. mediated using digital technology such as Internet or Web. Second,

Size: px
Start display at page:

Download "CHAPTER 2 THEORETICAL FOUNDATION. mediated using digital technology such as Internet or Web. Second,"

Transcription

1 7 CHAPTER 2 THEORETICAL FOUNDATION 2.1 Electronic Commerce (E-Commerce) E-Commerce according to Laudon, K. C., and Traver, C. G can be defined as the use of Internet and the Web to transact business [1]. To elaborate the definition further, something can be considered as an E- Commerce if it has two characteristics. First, transactions must be done or mediated using digital technology such as Internet or Web. Second, transactions must be commercial. This means transactions must involve the exchange of value, such as money, between and among organizations and individuals in return for products or services [1]. Although similar, E-Commerce is different from E-Business. E- Commerce focus on the external boundaries of the business, such as customers and activities that directly generates revenues, while E-Business focus on the internal transactions and activities within the business, such as inventory control and document transfers [1]. Because the concepts of E- Commerce and E-Business intersect, the two concepts are often merged thus often E-Commerce also includes the concepts of E-Business or vice versa. For example, George Beekman and Michael J. Quinn describe E-Commerce as using telecomunication networks to conduct the sharing of business information, maintaining of business relationships, conducting business transactions, reorganizing internal business process and external business alliances, and creating new consumer oriented products [2].

2 In general, E-commerce has eight unique dimensions that differentiate itself with traditional business. The eight unique dimensions are [1]: 8 1. Ubiquity 2. Global Reach 3. Universal Standards 4. Information Richness 5. Interactivity 6. Information Density 7. Personalization/customization 8. Social technology Components of Electronic Commerce E-commerce has typical components or functionalities that sets-up and build a website into an e-commerce. There are several common components and functionalities for e-commerce including [1] [3]: Registration/ Login and Customer Database Customer should be prompted with registration before making transaction online through the e-commerce. The purpose is for authentication and storing customer information for business purpose. Registration process has to be straightforward and easy for the customer. Optional registration/log in such as using Facebook Connect is recommended to provide alternative and convenience for customers that do not want to manage many accounts [3].

3 9 Although registration is widely recognized as a common feature that every e-commerce must have, there had been arguments that registration should be made optional. The reason is because there are customers that feel insecure in sharing their personal information to a business. In addition, customer can be discouraged to register and buy when they found the registration process is too complex. To solve these issues, some solution are designed such as to make registration optional with customer able to purchase without registering and request the customer registration after a customer make a purchase [4]. Information on registered customer should be stored in a customer database. Information that should be stored might include name, address, phone address, and address [1] Product Catalog and Database Product catalog should provide product information to customers who can be presented in the form of text or graphics [1]. A product catalog should be used when the e-commerce is selling multiple product or services. Customer should be able to navigate through the product catalog through a well designed user interface. The objective is for customer to be able to find the product that they are looking for. Therefore, customer should be provided with the capability to search for product based on specific keywords or tags [3].

4 10 Product database is functioning as storage for product catalog information. It should store information such as product description, stocking number, and inventory level [1] Admin Area Admin area refers to the back end of the e-commerce which handled by employees and function as a place to manage the e-commerce. Management might include managing customer details, managing product inventory and details, or sales order processing. [3] Sales Database Sales database refers to the storage of sales transactions when customer purchases a product. It contains information related to sales such as customer information, product purchased, date, and payment details. Sales information stored can then be used for multiple purposes by the business such as to provide after-sale customer support for customer [1] Types of E-Commerce Business-to-Business (B2B) Business-to-Business (B2B) e-commerce refers to the use of e-commerce by businesses to sell or conduct transaction to other businesses [1]. It is the largest form of e-commerce with huge growth potential and the highest revenue generated

5 when compared to other e-commerce types. B2B has two primary business models: Net marketplace. In net marketplace customers and suppliers are gathered into a single Internet platform for them to conduct trade [1]. For example: alibaba.com 2. Industry consortia. Industry owned vertical market that enables buyer to purchase from a limited set of invited participants [1]. This business model is focusing on creating long-term relationships between suppliers and buyers. For example: Exostar, SupplyOn. Another form of B2B is Business-to-Government (B2G) where businesses conduct transaction with government institutions. However, B2G can also be considered as B2B because in most cases the government acts as an independent business unit when conducting transaction [1] Business-to-Consumer (B2C) Business-to-Consumer (B2C) e-commerce refers to the use of e-commerce by businesses or companies to sell products or services to individual consumers [1]. This type of e-commerce is the most common type encountered by consumer. Consumer access online product catalog provided by businesses, search and select the products they wish to purchase, and make product purchases. To help consumer purchase experience, B2C often use the shopping cart feature

6 12 of e-commerce. Shopping cart in e-commerce works the same way as shopping carts in real life. Customers can select multiple products through the online catalog, store it into their shopping cart, and then purchase all the products in their shopping cart in one transaction [1]. Revenue wise, B2C e-commerce did not generate high revenue when compared to B2B e-commerce. However the growth of B2C e-commerce is very fast and it has been growing exponentially making it one of the booming e- commerce types [1]. Example of B2C e-commerce: Amazon.com, Play-Asia.com Consumer-to-Consumer (C2C) Consumer-to-Consumer e-commerce refers to the use of e-commerce by consumer to sell or conduct transactions to each other and often conducted through the help of online market or auction sites. C2C involve platforms where consumer can place their products to sale or auction. The platforms will then create product catalogue from consumers products and allows other consumer to search and make purchases through the platform [1]. In C2C, the business only provides the platform for customers to do transactions in which it is mostly internet based, while data and information for product catalogs are all came from customers. To certain extent, some businesses also provide catalog search engine,

7 payment system, and delivery service that aid customer in buying and selling products. 13 Examples of C2C e-commerce: E-Bay, Craiglist, Tokobagus, Yahoo Auctions Samples of E-Commerce in Hosting Service Provider Hosting service providers (HSP) are businesses or individuals that provide hosting solution and services to its customers. HSPs often make use of e-commerce to publicize and offer their hosting products and services to customers [5]. E-commerce enable customers to conduct various business activities such as browsing through HSP product catalog, compare hosting packages and price information, make purchases, get live support, and requesting for hosting renewal Godaddy.com Figure in 2013) Screenshot of Godaddy.com (taken directly from

8 14 Godaddy.com is one of the leading hosting service providers from United States. Mainly providing hosting needs, Godaddy.com differentiate itself and well known for its complete web hosting solution. In addition to hosting, Godaddy.com also web design service to help people that does not have web building skills. Customers simply only need to purchase the product package and Godaddy.com will handle the whole web development, hosting needs, and maintenance Masterweb.net Figure 2.2 Screenshot of Masterweb.net (taken directly from in 2013) Masterweb.net is currently the leading hosting service provider in Indonesia with the highest market share in web hosting compared to other Indonesia hosting provider [6]. Owning % market share of web hosting in Indonesia based on data from taken on 28

9 15 February Masterweb.net provides variety of hosting needs that includes domain name ordering, web hosting, shared hosting, virtual private server, server hosting, and digital/sslcertificate. Masterweb.net uses its e-commerce mainly as a place to sell their hosting solutions, where customer can seek product information, make order, and seek for 24 hours customer support. They also provides its own knowledge base for customer to learn about the details of products they are offering which really helps non technical users that are not familiar with hosting concepts. 2.2 Hosting Service Hosting is service where business or vendor is providing storage space for housing, serving, and managing customer files or data, typically for website. The businesses that provides hosting service is called Hosting Service Provider (HSP) [5] Types of Hosting Services Domain Name Any devices connected to Internet are called host and uniquely identified by its Internet Protocol (IP) address which are series of numbers separated by dots (.) for example: IP address can be hard for people to memorize thus it is often represented in natural language called Domain Name, for example: [1].

10 16 Domain names are unique which means there cannot be two same domain names exist. Because of this, many domain names are registered by user so that it cannot be used by other people. Hosting service provider often provides domain registration service for customer to name the space they are renting Dedicated Server Dedicated hosting, or dedicated server, is a hosting service in which customer server space and system resources is not shared with other customer [7]. This is done by having the customer lease an entire server. Dedicated hosting provides the customer with several benefits such as greater capacity, increased security, improved reliability through no interaction with other website, and complete control over the configuration [8]. However it comes with drawbacks including higher cost compared to share hosting and higher technical requirement to manage the server Shared Hosting Shared hosting is type of hosting where the server space is used to serve multiple clients. Server space is partitioned into smaller space which customer rent and when configured properly the clients will not be able to see the other clients in the server. The purpose of shared hosting is to reduce the cost of leasing the server space and make server

11 space more affordable for customers. It is very affordable that there are hosting providers offering shared hosting for free [9]. 17 However, shared hosting brings several drawbacks such as performance issue due to shared resources, heavily dependent on the host to manage the server, and security issues such as hackers that may come from the other clients in the server [9] Virtual Private Server Virtual Private Server (VPS) is a type of shared hosting with each server partition runs its own operating system or virtual server. This gives the illusion as if the client is running a dedicated server since client will have full control of its virtual server.vps make use of virtualization software to manage and distribute computer resources to its clients. This technology also allows a virtual server to take resources from multiple machines [9] Virtual Private Network Virtual Private Network (VPN) is a network technology that provides secure access for user to access internal network via the Internet. VPN make use of Point-to- Point Tunneling Protocol (PPTP), an encoding mechanism that securely wraps the delivered message to shield it from external interception. The term virtual is used because user did not actually have dedicated secure communication line, the VPN

12 18 only establish temporary secure communication line between networks [1]. Hosting service provider often provides VPN connection for its customers to connect to their server space securely Cloud Hosting Cloud hosting is a type of hosting where customer website is not necessarily stored in a single server space but it is distributed through cloud (internet) to different server spaces across the network. The main benefits provided by cloud hosting are cost, scalability, and reliability. Customer only needs to pay for the amount of resource they use, unlike other hosting types where customer needs to pay for a fixed amount of resource packages. Cloud hosting has high scalability because customer can easily increase the resource space they needed. Cloud hosting is also more reliable because it is distributed and does not have any single point of failure since a failure in one machine can be replaced with other server on the network [7] Anonymous Hosting Anonymous hosting refers to hosting services that are privately registered and booked using third party name via Proxy ID or ID Protection. The purpose is to keep the information of the customer secret and untraceable, which is useful to keep sensitive information from competitors and hackers [10].

13 19 There are two types of anonymous hosting providers. One is provider that request customer details for record this way customer can still be identified by the provider but it will remain anonymous from the public. The other type is provider that does not require any customer identification at all thus the customer is anonymous to both the provider and public [10]. Example of anonymous hosting provider: anonymoushosting.in, ccihosting.com, shinjiru.com WhoIs WhoIs is a searching protocol for submitting queries to database specifically with specific use of getting details on ownership of domain name, IP network, or Autonomous System Number (ASN). When a server receive WhoIs query, the server will process the query and reply with owner information such as addresses, contact numbers, and other related metadata [11]. One common use of WhoIs is to check domain name registration and expiry information. Since domain names must be unique and there can be no duplicate, availability checking becomes is reqired during domain purchase since people cannot buy reserved domain. One way to buy reserved domain is by making use domain owner s information provided by WhoIs to contact the owner and negotiate to buy and transfer domain name ownership. Domain name also has expiry dates and the owner can will lose its ownership if its

14 not extended. Owner can check domain expiry date using WhoIs and be reminded when they should extend their domain name Business Model According to Alexander Osterwalder and Yves Pigneur, a business model describes the understanding on how an organization or business creates, delivers, and capture values [12]. A business model is vital in order to create a good business strategies, because it act as a blueprint that explains the required activities and resources needs to be done to run the business Business Model Canvas Business Model Canvas is a concept introduced by Alexander Osterwalder and Yves Pigneur as a method to build and analyze a business model. The concept has been applied and tested internationally, and it has been used by various international organization such as IBM and Deloitte [12]. The Business Model Canvas suggest nine building blocks of creating a solid business model and a business model can be considered good if it is be able to clearly defined the nine blocks. The nine building blocks of business model canvas are [12]: Customer Segments (CS) : the customer segments being served by the business. Value Propositions (VP) : how the business is going to solve problems and satisfy customer needs.

15 21 Channels (CH) : the way organization deliver its value proposition to customers. Customer Relationship (CR) : the relationships established and maintained to each customer segments. Revenue Streams (R$) : how the value proposition generate revenue when succesfully offered to customer. Key Resources (KR) : the asset required to create, offer, and deliver the value proposition. Key Activities (KA) : activities performed to transform the key resources to value proposition. Key Partnerships (KP) : resources and activities that acquired form outside of the business. Cost Structure (C$) : the cost inccured to the business from running the business model.

16 22 Figure 2.3 Business Model Canvas (taken from [13]) 2.4 System Development Life Cycle According to Satzinger et al [14] Systems development life cycle (SDLC) is the process of building, deploying, using, and updating an information systems. SDLC is the one of the key fundamental concepts in information system development. There are 5 phases in SDLC which are: Planning Phase: identifying the scope, ensuring feasibility, and developing schedule, resource plan, and budget for the project. In common organizational situation, the plan created during this phase might require approval from top management. Key activity in this phase is to precisely define the business problem and the scope of the required solution.

17 23 Analysis Phase: the objective of analysis phase is to understand and document the business needs and the processing requirements of the new system. Can be achieved through information gathering, analyzing information, and building prototype. Design Phase: transforming the requirements defined and decisions made during analysis into the design of system based solution. Designs might include, network design, application architecture design, user interfaces design, system interfaces design, database design, system controls design, and prototypes. Implementation Phase: during this phase the final system are built, tested, and installed. The objective also includes the training for users and the organization. Support Phase: the objective of this phase is to keep the system running after the system is installed. This may be done through activities such as system maintenance, system enhancement, and providing user support. There are two classifications of SDLC: predictive approach and adaptive approach Predictive Approach Predictive approach is SDLC approach where project planning and organization is conducted in advance, and that the new system will be developed according to plan [14].

18 Predictive SDLC benefits most when used for building systems that are well understood and well defined. 24 Waterfall model is an example of predictive SDLC approach. Waterfall model handle project in sequential method. One phase is to be completed before moving into the next phase. After completing a phase, the phase is frozen therefore it is not possible to return to previous phases [14]. Predictive approach has the advantage of low technical risk because project and specification are planned carefully. However, the inability to return to previous phase is a problem, considering human can always make error and going back might be required. Because of this, pure predictive or waterfall approach is rarely used and many have used a modified waterfall model [14] Adaptive Approach Adaptive approach is the more flexible SDLC approach that assume project cannot be planned in advance and must be modified as it progresses [14]. Adaptive approach is best used for projects where requirements and needs are uncertain. Spiral model is an example of adaptive SDLC. Spiral model handle project in iteration. SDLC phases are repeated over and over on each different system components, with each phase refining the result of the previous phase, until the system

19 is closer to what is ultimately needed. One way of doing spiral approach is by creating prototypes on every iteration [14]. 25 Adaptive approach has the advantage of flexibility being able to cope with changes of requirement in the middle of development. However the flexibility comes with high risk due to not well defined requirements. 2.5 Unified Modeling Language Diagrams Unified Modeling Language (UML) is a modeling language developed by the Object Management Group (OMG) in 1997 with the objective of providing common design language for building of computer system and applications. It provides visual frameworks, such as diagrams and notations, which can be used to visualize and describe system blueprints. It is widely used and it has become the standard modeling notation for system application development [15] Activity Diagram Activity diagram is an UML diagram that describes the sequence of activities conducted by users in a transaction or a business process [14]. The purpose of creating activity diagram is to help describing workflow of a transaction using visualization, particularly when it is difficult to be done written or verbally. Activity diagram is built on symbols such as: Swimlane, which is a rectangular area that represents the user doing the activities.

20 26 Oval shape, which represent a single activity in the workflow. Arrows, that represents the sequence of activities. Diamonds shape which act as decision point that branch out the activities path. Black circles that represent the start and end of a workflow. Figure 2.4 Sample Activity Diagram [14] Event Table Event table is a collection of use cases that lists events in rows and key pieces of information about each event in columns [14]. There are six key pieces of information in event table which are: event, trigger, source, use case, response, and destination. Event table will become the basis for data flow diagram and use case diagrams for further analysis.

21 27 Figure 2.5 Sample Event Table [14] Use Case Diagram Use case diagram is diagrams that visualize different user roles and how the user roles interact with the system [14]. Use case itself is a term that refers to an activity that is carried out by the system which could be the result of a trigger from the user. The purpose of creating a use case diagram is to get visualization on the functional requirement of the systems, which includes the relationship between the user (or actors) to the system, and the relationship between one use case to another use case [15]. In use case diagram, actors or user role is represented as stick figure. Use case is represented as oval shape. Actor participation in a use case is connected using line, and the system boundary is represented by rectangle area.

22 28 Figure 2.6 Sample Use Case Diagram [14] Use case diagram is often come together with a use case description that provides the detailed information of each use cases. Use case description list and describe in detail how each use case are processed. A use case description contains the following information: use case name, scenario, triggering event, brief description, actors, related use cases, stakeholders, preconditions, postconditions, flow of activities for both actor and system, and exception conditions Entity Relationship Diagram Entity Relationship Diagram (ERD) is a model used to define data storage requirements. Data storage requirements include the data entities, data attributes, and relationships between data entities. Data entities are things such as objects or data that the system needs to store information [14].

23 29 ERD consist of three main notations: rectangle that represents data entities, connecting line that represents relationship between data entities, and crow s feet that represent cardinalities between data entities. Cardinalities describe the type of relationship and constraints between entities. There are three types of relationships between data entities: One-to-One One-to-Many Many-to-Many Figure 2.7 Sample Entity Relationship Diagram [14] Data Flow Diagram Data flow diagram (DFD) is a graphical system model that visualizes all of the main requirements of an information system in terms of input/output, process, and data storage [14]. It shows the flow of data from external agent to the system, show how data is moved from one process to another, and show how data is stored in the logical database.

24 30 Figure 2.8 Data Flow Diagram Notations [14] The detail of information presented by a DFD depends on the level of abstraction of the DFD. At the most abstract (high level) view of a system, a DFD is called as Context Diagram. Context diagram is a DFD that provide summary of all processing activity within the system. A high level DFD, such as context diagram, can be decomposed into lower levels which give more details, and a decomposed DFD can be further decomposed to provide more details when needed [14].

25 31 Figure 2.9 Sample Context Diagram [14] 2.6 Database Shared collection of logically related data, and a description of this data, designed to meet the information needs of an organization. [16] Database by definition refers to a collection of related and organized data that is used primarily to support organizational informational needs. Logically related data in the context refers to entities, attributes, and relationships of an organization s information [16]. Database provides the organization with capabilities such as enabling data to be shared to multiple users, enabling user to quickly query/search for data, and provides the user with well processed and meaningful information. Database is usually managed through software called Database Management Systems (DBMS),

26 which enable user to define, create, maintain, and control access to database [16] Relational Database System One of the most common methods to organize data in database is to use Relational Model. Database stored in this method is called Relational Database. In Relational Database, data are organized into tables (relation), consisting rows (record) and column (attribute) [16]. Every record must contain unique attribute (or set of attributes) called Primary Key which is used to uniquely identify a record within a relation and to link a relation with other relations [17]. The collection of tables with rows and columns are the ones that made up relational database. Relational database is managed by Relational Database Management System. In managing database, RDBMS follows three main fundamentals [18]: Information is stored in the form of table Value found in table column should not be repeated Structured Query Language (SQL) must be used 2.7 Interaction Design and User Interface Sharp et al [19] describe interaction design as designing interactive products that enhance and augment, the way people communicate and interact in their everyday lives. Although interaction design can encompass interaction with different varieties of medium, it is commonly associated with

27 33 interaction between human and computers. Interaction design is the umbrella term that emphasizes different designing activities in which one of them includes User Interface Design. The focus of interaction design concerned with user experiences. User experience is how people feel about a product when they are using the product [19]. What people feel may include their pleasure, satisfaction, and the sensual effect from the product they use. User experience cannot be designed by people, what people can do is to create design features that evoke the user experience. The process of interaction design consists of four basic activities [19]: 1. Identifying needs and establishing requirements for user experience. 2. Developing alternative designs that meet the requirements. 3. Building interactive versions of the designs to be communicated and assessed by user. 4. Evaluating what is being built and the user experience it offers.

Module 6. e-business and e- Commerce

Module 6. e-business and e- Commerce Module 6 e-business and e- Commerce 6.1 e-business systems 6.2 e-commerce systems 6.3 Essential e- commerce processes 6.4 Electronic payment processes 6.5 e-commerce application trends 6.6 Web store requirements

More information

Using Use Cases for requirements capture. Pete McBreen. 1998 McBreen.Consulting

Using Use Cases for requirements capture. Pete McBreen. 1998 McBreen.Consulting Using Use Cases for requirements capture Pete McBreen 1998 McBreen.Consulting petemcbreen@acm.org All rights reserved. You have permission to copy and distribute the document as long as you make no changes

More information

Keywords Online food system, Short Massage Service, E-business, notification

Keywords Online food system, Short Massage Service, E-business, notification Volume 5, Issue 12, December 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Online Food

More information

UML TUTORIALS THE USE CASE MODEL

UML TUTORIALS THE USE CASE MODEL UML TUTORIALS THE USE CASE MODEL www.sparxsystems.com.au Sparx Systems 2004 Page 1/5 describes the proposed functionality of the new system. A Use Case represents a discrete unit of interaction between

More information

Database Design Process. Databases - Entity-Relationship Modelling. Requirements Analysis. Database Design

Database Design Process. Databases - Entity-Relationship Modelling. Requirements Analysis. Database Design Process Databases - Entity-Relationship Modelling Ramakrishnan & Gehrke identify six main steps in designing a database Requirements Analysis Conceptual Design Logical Design Schema Refinement Physical

More information

Using UML Part Two Behavioral Modeling Diagrams

Using UML Part Two Behavioral Modeling Diagrams UML Tutorials Using UML Part Two Behavioral Modeling Diagrams by Sparx Systems All material Sparx Systems 2007 Sparx Systems 2007 Page 1 Trademarks Object Management Group, OMG, Unified Modeling Language,

More information

Introduction to BPMN

Introduction to BPMN Stephen A. White, IBM Corporation Abstract This paper is intended to provide a high-level overview and introduction to the Business Process Modeling Notation (BPMN). The context and general uses for BPMN

More information

Introduction to E-Commerce

Introduction to E-Commerce Introduction to E-Commerce 1/12/2016 What is E-commerce? Buying and selling of products or services over electronic systems such as the Internet and other computer networks Online purchase of goods or

More information

Chapter 19. Activity Diagrams

Chapter 19. Activity Diagrams Use a sequence diagram if you want to emphasize the time ordering of messages. Use a collaboration diagram if you want to emphasize the organization of the objects involved in the interaction. Lay out

More information

Announcements. SE 1: Software Requirements Specification and Analysis. Review: Use Case Descriptions

Announcements. SE 1: Software Requirements Specification and Analysis. Review: Use Case Descriptions Announcements SE 1: Software Requirements Specification and Analysis Lecture 4: Basic Notations Nancy Day, Davor Svetinović http://www.student.cs.uwaterloo.ca/ cs445/winter2006 uw.cs.cs445 Send your group

More information

Groupon s Business Model: Social and Local

Groupon s Business Model: Social and Local Electronic Commerce and Social E-Commerce Groupon s Business Model: Social and Local Problem: Competing with other business models utilizing social and local commerce in group couponing Solution? Scale:

More information

Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems

Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Chapter 5 Electronic Commerce System Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Electronic Commerce: Electronic commerce encompasses the entire online

More information

Chapter 11 E-Commerce

Chapter 11 E-Commerce 15 th Edition Understanding Computers Today and Tomorrow Comprehensive Chapter 11 E-Commerce Deborah Morley Charles S. Parker Copyright 2015 Cengage Learning Learning Objectives 1. Explain what e-commerce

More information

Activity: Exploring Business model innovation using the Business Model Canvas

Activity: Exploring Business model innovation using the Business Model Canvas Activity: Exploring Business model innovation using the Business Model Canvas Business models are important because they provide the architecture for creating value out of new ideas. Simply having a good

More information

Business-to-Business EIPP: Presentment Models, Part 1 By: The Council for Electronic Billing and Payment

Business-to-Business EIPP: Presentment Models, Part 1 By: The Council for Electronic Billing and Payment Business-to-Business EIPP: Presentment Models, Part 1 By: The Council for Electronic Billing and Payment Abstract In the short time since the release of the first web browser in 1993, the Internet has

More information

E-Commerce Business Models and Concepts

E-Commerce Business Models and Concepts Copyright 2002 Pearson Education, Inc. Slide 2-1 E-Commerce Business Models and Concepts Created by, David Zolzer, Northwestern State University Louisiana Learning Objectives! Identify the key components

More information

Chap 1. Introduction to Software Architecture

Chap 1. Introduction to Software Architecture Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)

More information

Introduction to Systems Analysis and Design

Introduction to Systems Analysis and Design Introduction to Systems Analysis and Design What is a System? A system is a set of interrelated components that function together to achieve a common goal. The components of a system are called subsystems.

More information

Ecommerce. E-commerce Defined. E-commerce Developments and Themes 2006

Ecommerce. E-commerce Defined. E-commerce Developments and Themes 2006 Ecommerce Copyright 2007 Pearson Education, Inc. Slide 1-1 E-commerce Developments and Themes 2006 More and more people and businesses are using the Internet to conduct commerce The e-commerce channel

More information

Object Oriented Programming. Risk Management

Object Oriented Programming. Risk Management Section V: Object Oriented Programming Risk Management In theory, there is no difference between theory and practice. But, in practice, there is. - Jan van de Snepscheut 427 Chapter 21: Unified Modeling

More information

Use Cases. Reference: Craig Larman, Applying UML and Patterns, Ch. 6

Use Cases. Reference: Craig Larman, Applying UML and Patterns, Ch. 6 Use Cases Reference: Craig Larman, Applying UML and Patterns, Ch. 6 Use Case What it is: Text story Widely used to discover and record (mostly functional) requirements What is it about: Some actor(s) using

More information

2 SYSTEM DESCRIPTION TECHNIQUES

2 SYSTEM DESCRIPTION TECHNIQUES 2 SYSTEM DESCRIPTION TECHNIQUES 2.1 INTRODUCTION Graphical representation of any process is always better and more meaningful than its representation in words. Moreover, it is very difficult to arrange

More information

5 Discussion and Implications

5 Discussion and Implications 5 Discussion and Implications 5.1 Summary of the findings and theoretical implications The main goal of this thesis is to provide insights into how online customers needs structured in the customer purchase

More information

Chapter 10 Objectives. Chapter 10 E-Commerce: A Revolution in the Way We Do Business. What Is E-Commerce? What Is E-Commerce? What Is E-Commerce?

Chapter 10 Objectives. Chapter 10 E-Commerce: A Revolution in the Way We Do Business. What Is E-Commerce? What Is E-Commerce? What Is E-Commerce? Chapter 10 Objectives Chapter 10 E-Commerce: A Revolution in the Way We Do Business Understand how e-commerce has changed today s business practices Discuss the positive impact of e-commerce on global

More information

Collated Food Requirements. Received orders. Resolved orders. 4 Check for discrepancies * Unmatched orders

Collated Food Requirements. Received orders. Resolved orders. 4 Check for discrepancies * Unmatched orders Introduction to Data Flow Diagrams What are Data Flow Diagrams? Data Flow Diagrams (DFDs) model that perspective of the system that is most readily understood by users the flow of information around the

More information

Lecture-2-The Strategic Role of Information Systems

Lecture-2-The Strategic Role of Information Systems Lecture-2-The Strategic Role of Information Systems Thepul Ginige 1 LEARNING OBJECTIVES Analyze roles of 6 types of information systems Describe types of information systems Analyze relationships between

More information

Towards an Integration of Business Process Modeling and Object-Oriented Software Development

Towards an Integration of Business Process Modeling and Object-Oriented Software Development Towards an Integration of Business Process Modeling and Object-Oriented Software Development Peter Loos, Peter Fettke Chemnitz Univeristy of Technology, Chemnitz, Germany {loos peter.fettke}@isym.tu-chemnitz.de

More information

Process Modeling. Chapter 6. (with additions by Yale Braunstein) Slide 1

Process Modeling. Chapter 6. (with additions by Yale Braunstein) Slide 1 Process Modeling Chapter 6 (with additions by Yale Braunstein) Slide 1 PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 John Wiley & Sons, Inc. All rights reserved.

More information

What is a life cycle model?

What is a life cycle model? What is a life cycle model? Framework under which a software product is going to be developed. Defines the phases that the product under development will go through. Identifies activities involved in each

More information

Course Syllabus For Operations Management. Management Information Systems

Course Syllabus For Operations Management. Management Information Systems For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third

More information

written by co-created by designed by Alexander Osterwalder & Yves Pigneur An amazing crowd of 470 practitioners from 45 countries

written by co-created by designed by Alexander Osterwalder & Yves Pigneur An amazing crowd of 470 practitioners from 45 countries You re holding a handbook for visionaries, game changers, and challengers striving to defy outmoded business models and design tomorrow s enterprises. It s a book for the written by Alexander Osterwalder

More information

CONTENTS. CHAPTER 2 emarketing Vs. TRADITIONAL MARKETING 32

CONTENTS. CHAPTER 2 emarketing Vs. TRADITIONAL MARKETING 32 CONTENTS CHAPTER 1 AN OVERVIEW OF THE STUDY 01 1.1 Background of the Study 02 1.2 Importance of the Study 05 1.3 Scope of the Study 07 1.4 Objectives of the Study 09 1.4.1 Academic Disciplines Concerned

More information

THE BCS PROFESSIONAL EXAMINATION Diploma October 2014 EXAMINERS REPORT Systems Analysis and Design

THE BCS PROFESSIONAL EXAMINATION Diploma October 2014 EXAMINERS REPORT Systems Analysis and Design THE BCS PROFESSIONAL EXAMINATION Diploma October 2014 EXAMINERS REPORT Systems Analysis and Design Section A General Comments Many candidates lack the skill of being able to apply theoretical knowledge

More information

Workflow and Process Analysis for CCC

Workflow and Process Analysis for CCC Section 3.6 Design Workflow and Process Analysis for CCC This tool introduces the importance of workflow and process improvement in a community-based care coordination (CCC) program, describes the value

More information

UNIVERSITY OF SURREY. BSc Programmes in Computing. Level 1 Examination. CS183: Systems Analysis and Design. Time allowed: 2 hours Spring Semester 2006

UNIVERSITY OF SURREY. BSc Programmes in Computing. Level 1 Examination. CS183: Systems Analysis and Design. Time allowed: 2 hours Spring Semester 2006 CS/183/17/SS06 UNIVERSITY OF SURREY BSc Programmes in Computing Level 1 Examination CS183: Systems Analysis and Design Time allowed: 2 hours Spring Semester 2006 Answer ALL questions in Section A and TWO

More information

From business models to business plans

From business models to business plans From business models to business plans Barbara Diehl & Dr Maria Nikolou 11 November 2013 The odds... On day one, a start up is a faith- based initiative.(steve Blank) 2 The odds... How do you progress

More information

FLASH DELIVERY SERVICE

FLASH DELIVERY SERVICE Privacy Policy FLASH DELIVERY SERVICE is Committed to Protecting Your Privacy Protecting our customers' privacy is an important priority at FLASH DELIVERY SERVICE and we are committed to maintaining strong

More information

CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY

CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY 2.1 Introduction In this chapter, I am going to introduce Database Management Systems (DBMS) and the Structured Query Language (SQL), its syntax and usage.

More information

Why a single source for assets should be. the backbone of all your digital activities

Why a single source for assets should be. the backbone of all your digital activities Why a single source for assets should be the backbone of all your digital activities Navigating in the digital landscape The old era of traditional marketing has long passed. Today, customers expect to

More information

IBM Maximo Asset Management IBM Tivoli Asset Management for IT IBM Tivoli Service Request Manager. Version 7.1. Workflow Implementation Guide

IBM Maximo Asset Management IBM Tivoli Asset Management for IT IBM Tivoli Service Request Manager. Version 7.1. Workflow Implementation Guide IBM Maximo Asset Management IBM Tivoli Asset Management for IT IBM Tivoli Service Request Manager Version 7.1 Workflow Implementation Guide Note Before using this information and the product it supports,

More information

The Entity-Relationship Model

The Entity-Relationship Model The Entity-Relationship Model 221 After completing this chapter, you should be able to explain the three phases of database design, Why are multiple phases useful? evaluate the significance of the Entity-Relationship

More information

E-Commerce: Digital Markets, Digital Goods

E-Commerce: Digital Markets, Digital Goods Introduction to Information Management IIM, NCKU E-Commerce: Digital Markets, Digital Goods Based on Chapter 10 of Laudon and Laudon (2010). Management Information Systems: Managing the Digital Firm (11th

More information

Advanced Software Test Design Techniques Use Cases

Advanced Software Test Design Techniques Use Cases Advanced Software Test Design Techniques Use Cases Introduction The following is an excerpt from my recently-published book, Advanced Software Testing: Volume 1. This is a book for test analysts and test

More information

Phase 2 Systems Analysis. Dr. Feng-Jen Yang

Phase 2 Systems Analysis. Dr. Feng-Jen Yang Phase 2 Systems Analysis Dr. Feng-Jen Yang Phase Description Systems analysis is the 2nd phase in the systems development life cycle (SDLC) Use requirements modeling, data and process modeling, and object

More information

Mobile Cloud Computing In Business

Mobile Cloud Computing In Business Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud

More information

Software Engineering Question Bank

Software Engineering Question Bank Software Engineering Question Bank 1) What is Software Development Life Cycle? (SDLC) System Development Life Cycle (SDLC) is the overall process of developing information systems through a multi-step

More information

Chapter 4 Software Lifecycle and Performance Analysis

Chapter 4 Software Lifecycle and Performance Analysis Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and

More information

Interaction Diagrams. Use Cases and Actors INTERACTION MODELING

Interaction Diagrams. Use Cases and Actors INTERACTION MODELING Karlstad University Department of Information Systems Adapted for a textbook by Blaha M. and Rumbaugh J. Object Oriented Modeling and Design Pearson Prentice Hall, 2005 INTERACTION MODELING Remigijus GUSTAS

More information

Chapter 11: E-Commerce

Chapter 11: E-Commerce Chapter 11: E-Commerce What is E-Commerce? E-commerce Act of doing business transactions using communications technology Has existed for years via private networks (electronic funds transfers, etc.) Now

More information

Electronic Commerce. Chapter Overview

Electronic Commerce. Chapter Overview Electronic Commerce Chapter Overview This chapter presents an overview of how e-commerce works, from the perspective of the organization and the customer. Businesses and individuals use e-commerce to reduce

More information

B2B Strategies: from EDI to e-commerce. Objectives. In this chapter, you will learn about:

B2B Strategies: from EDI to e-commerce. Objectives. In this chapter, you will learn about: Introduction to e-commerce B2B Strategies: from EDI to e-commerce Objectives In this chapter, you will learn about: Strategies that businesses use to improve purchasing, logistics, and other support activities

More information

In this Lecture you will Learn: Systems Development Methodologies. Why Methodology? Why Methodology?

In this Lecture you will Learn: Systems Development Methodologies. Why Methodology? Why Methodology? In this Lecture you will Learn: Systems Development Methodologies What a systems development methodology is Why methodologies are used The need for different methodologies The main features of one methodology

More information

CS 487. Week 8. Reference: 1. Software engineering, roger s. pressman. Reading: 1. Ian Sommerville, Chapter 3. Objective:

CS 487. Week 8. Reference: 1. Software engineering, roger s. pressman. Reading: 1. Ian Sommerville, Chapter 3. Objective: CS 487 Week 8 Reading: 1. Ian Sommerville, Chapter 3. Objective: 1. To check the understandibility of the students in life cycle and process model for development of a software product. 2. To check if

More information

How To Design An Information System

How To Design An Information System Information system for production and mounting of plastic windows MARCEL, MELIŠ Slovak University of Technology - Faculty of Material Sciences and Technology in Trnava, Paulínska 16 street, Trnava, 917

More information

Fourth generation techniques (4GT)

Fourth generation techniques (4GT) Fourth generation techniques (4GT) The term fourth generation techniques (4GT) encompasses a broad array of software tools that have one thing in common. Each enables the software engineer to specify some

More information

Requirements / Use Case Specification

Requirements / Use Case Specification Object - Oriented Programming & Design Part IX - UML Use Case Diagrams CSCI 4448 - Spring 2002 Requirements / Use Case Specification Your way of echoing to the customer what you heard him/her say he/she

More information

Course Registration Case Study

Course Registration Case Study Course Registration Case Study Table of Contents Case Study...1 Case Study Background... 2 Course Registration System Problem Statement... 2 The Role of Tools... 2 Project Summary... 2 The Inception Phase...

More information

Using UML Part One Structural Modeling Diagrams

Using UML Part One Structural Modeling Diagrams UML Tutorials Using UML Part One Structural Modeling Diagrams by Sparx Systems All material Sparx Systems 2007 Sparx Systems 2007 Page 1 Trademarks Object Management Group, OMG, Unified Modeling Language,

More information

The Software Process. The Unified Process (Cont.) The Unified Process (Cont.)

The Software Process. The Unified Process (Cont.) The Unified Process (Cont.) The Software Process Xiaojun Qi 1 The Unified Process Until recently, three of the most successful object-oriented methodologies were Booch smethod Jacobson s Objectory Rumbaugh s OMT (Object Modeling

More information

CHAPTER 1: INTRODUCTION TO RAPID APPLICATION DEVELOPMENT (RAD)

CHAPTER 1: INTRODUCTION TO RAPID APPLICATION DEVELOPMENT (RAD) CHAPTER 1: INTRODUCTION TO RAPID APPLICATION DEVELOPMENT (RAD) 1. INTRODUCTIONS RAD refers to a development life cycle designed Compare to traditional life cycle it is Faster development with higher quality

More information

Section C. Requirements Elicitation

Section C. Requirements Elicitation This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License. Your use of this material constitutes acceptance of that license and the conditions of use of materials on this

More information

The Need for Strategic Planning for Project Management

The Need for Strategic Planning for Project Management 1 The Need for Strategic Planning for Project Management INTRODUCTION For more than 40 years, American companies have been using the principles of project management to get work accomplished. Yet, for

More information

Business Process Redesign and Modelling

Business Process Redesign and Modelling Business Process Redesign and Modelling The Business Process Redesign the Process Handbook the key idea of the Process Handbook approach is that a richly structured online repository about business processes

More information

Electronic Commerce Engineering

Electronic Commerce Engineering 219322 Electronic Commerce Engineering Lecture 4 Laudon & Traver: Chapter 4 Building an E-commerce Web Site Copyright 2007 Pearson Education, Inc. Slide 4-1 Building an E-commerce Site: A Systematic Approach

More information

E-COMMERCE: DIGITAL MARKETS, DIGITAL GOODS

E-COMMERCE: DIGITAL MARKETS, DIGITAL GOODS E-COMMERCE: DIGITAL MARKETS, DIGITAL GOODS Content What are the unique features of e-commerce, digital markets, and digital goods? What are the principal e-commerce business and revenue models? How has

More information

Logi Ad Hoc Reporting System Administration Guide

Logi Ad Hoc Reporting System Administration Guide Logi Ad Hoc Reporting System Administration Guide Version 11.2 Last Updated: March 2014 Page 2 Table of Contents INTRODUCTION... 4 Target Audience... 4 Application Architecture... 5 Document Overview...

More information

CS 389 Software Engineering. Lecture 2 Chapter 2 Software Processes. Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed.

CS 389 Software Engineering. Lecture 2 Chapter 2 Software Processes. Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed. CS 389 Software Engineering Lecture 2 Chapter 2 Software Processes Adapted from: Chap 1. Sommerville 9 th ed. Chap 1. Pressman 6 th ed. Topics covered Software process models Process activities Coping

More information

[1] http://en.wikipedia.org/wiki/first-mover_advantage [2] http://www.acunote.com

[1] http://en.wikipedia.org/wiki/first-mover_advantage [2] http://www.acunote.com -Gene Sher Software Development Processes: Those in engineering and science will sooner or later either be members of teams solving some large project, or be managing teams solving some large project.

More information

In this Lecture you will Learn: Development Process. Unified Software Development Process. Best Practice

In this Lecture you will Learn: Development Process. Unified Software Development Process. Best Practice In this Lecture you will Learn: Development Chapter 5C About the Unified Software Development How phases relate to workflows in an iterative life cycle An approach to system development Major activities

More information

The role of integrated requirements management in software delivery.

The role of integrated requirements management in software delivery. Software development White paper October 2007 The role of integrated requirements Jim Heumann, requirements evangelist, IBM Rational 2 Contents 2 Introduction 2 What is integrated requirements management?

More information

Skills Knowledge Energy Time People and decide how to use themto accomplish your objectives.

Skills Knowledge Energy Time People and decide how to use themto accomplish your objectives. Chapter 8 Selling With a Strategy Strategy Defined A strategy is a to assemble your resources Skills Knowledge Energy Time People and decide how to use themto accomplish your objectives. In selling, an

More information

FIVE STEPS TO MANAGE THE CUSTOMER JOURNEY FOR B2B SUCCESS. ebook

FIVE STEPS TO MANAGE THE CUSTOMER JOURNEY FOR B2B SUCCESS. ebook FIVE STEPS TO MANAGE THE CUSTOMER JOURNEY FOR B2B SUCCESS ebook TABLE OF CONTENTS Executive Summary Step 1: Map the Customer Journey Step 2: Find the Gaps, Please Step 3: Create a Total Customer View Step

More information

User research for information architecture projects

User research for information architecture projects Donna Maurer Maadmob Interaction Design http://maadmob.com.au/ Unpublished article User research provides a vital input to information architecture projects. It helps us to understand what information

More information

The Stacks Approach. Why It s Time to Start Thinking About Enterprise Technology in Stacks

The Stacks Approach. Why It s Time to Start Thinking About Enterprise Technology in Stacks The Stacks Approach Why It s Time to Start Thinking About Enterprise Technology in Stacks CONTENTS Executive Summary Layer 1: Enterprise Competency Domains Layer 2: Platforms Layer 3: Enterprise Technology

More information

Software Requirement Specification For Flea Market System

Software Requirement Specification For Flea Market System Software Requirement Specification For Flea Market System By Ilya Verlinsky, Alexander Sarkisyan, Ambartsum Keshishyan, Igor Gleyser, Andrey Ishuninov 1 INTRODUCTION 1.1 Purpose 1.1.1 Purpose of SRS document

More information

LECTURE 11: PROCESS MODELING

LECTURE 11: PROCESS MODELING LECTURE 11: PROCESS MODELING Outline Logical modeling of processes Data Flow Diagram Elements Functional decomposition Data Flows Rules and Guidelines Structured Analysis with Use Cases Learning Objectives

More information

Foundations of Information Management

Foundations of Information Management Foundations of Information Management - WS 2012/13 - Juniorprofessor Alexander Markowetz Bonn Aachen International Center for Information Technology (B-IT) Data & Databases Data: Simple information Database:

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

(Refer Slide Time 00:56)

(Refer Slide Time 00:56) Software Engineering Prof.N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-12 Data Modelling- ER diagrams, Mapping to relational model (Part -II) We will continue

More information

Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53

Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53 Preface xvi Part I Introduction and System Engineering 1 Chapter 1 Introduction 2 1.1 What Is Software Engineering? 2 1.2 Why Software Engineering? 3 1.3 Software Life-Cycle Activities 4 1.3.1 Software

More information

Visual Dialogue User Guide. Version 6.1

Visual Dialogue User Guide. Version 6.1 Visual Dialogue User Guide Version 6.1 2015 Pitney Bowes Software Inc. All rights reserved. This document may contain confidential and proprietary information belonging to Pitney Bowes Inc. and/or its

More information

E-Commerce Fundamentals Sukaina Al-Nasrawi Associate IT Officer ICT Division

E-Commerce Fundamentals Sukaina Al-Nasrawi Associate IT Officer ICT Division Workshop on Delivery of E-Services in Civil Society E-Commerce Fundamentals Sukaina Al-Nasrawi Associate IT Officer ICT Division Outline Introduction: What is E-Commerce Categories of E-Commerce E-Commerce

More information

Applying 4+1 View Architecture with UML 2. White Paper

Applying 4+1 View Architecture with UML 2. White Paper Applying 4+1 View Architecture with UML 2 White Paper Copyright 2007 FCGSS, all rights reserved. www.fcgss.com Introduction Unified Modeling Language (UML) has been available since 1997, and UML 2 was

More information

Introduction. Introduction to Data Warehousing

Introduction. Introduction to Data Warehousing Introduction to Data Warehousing Pasquale LOPS Gestione della Conoscenza d Impresa A.A. 2003-2004 Introduction Data warehousing and decision support have given rise to a new class of databases. Design

More information

Advanced Solutions of Microsoft SharePoint Server 2013 Course 20332A; 5 Days, Instructor-led

Advanced Solutions of Microsoft SharePoint Server 2013 Course 20332A; 5 Days, Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Advanced Solutions of Microsoft SharePoint Server 2013 Course 20332A; 5 Days,

More information

Engage your customers. Grow and optimize your online business.

Engage your customers. Grow and optimize your online business. Engage your customers. Grow and optimize your online business. Deliver powerful customer experiences across all channels with one integrated platform. One platform for your (whole) digital world To win

More information

A New Organization Built on a New Tool?

A New Organization Built on a New Tool? A New Organization Built on a New Tool? Wilhelm Widmark 1 Stockholm University Library has seen a rapid increase in the number of electronic resources in its collection and the percentage of the total

More information

BCS HIGHER EDUCATION QUALIFICATIONS. BCS Level 5 Diploma in IT. Software Engineering 1. June 2015 EXAMINERS REPORT

BCS HIGHER EDUCATION QUALIFICATIONS. BCS Level 5 Diploma in IT. Software Engineering 1. June 2015 EXAMINERS REPORT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT Software Engineering 1 June 2015 EXAMINERS REPORT General Comments This is a technical paper about Software Engineering. Questions seek to

More information

Karunya University Dept. of Information Technology

Karunya University Dept. of Information Technology PART A Questions 1. Mention any two software process models. 2. Define risk management. 3. What is a module? 4. What do you mean by requirement process? 5. Define integration testing. 6. State the main

More information

From Brand Management to Global Business Management in Market-Driven Companies *

From Brand Management to Global Business Management in Market-Driven Companies * From Brand Management to Global Business Management in Market-Driven Companies * Emilio Zito ** Abstract Over the past several years, the most competitive mass-market companies (automobile, high-tech,

More information

Brief Contents. Part Three: Decisions and Strategies. Part One: Information Technology Infrastructure. Part Four: Organizing Businesses and Systems

Brief Contents. Part Three: Decisions and Strategies. Part One: Information Technology Infrastructure. Part Four: Organizing Businesses and Systems Brief Contents 1 Introduction Part One: Information Technology Infrastructure 2 Information Technology Foundations 3 Networks and Telecommunications 4 Database Management Part Two: Business Integration

More information

Chapter 3. Technology review. 3.1. Introduction

Chapter 3. Technology review. 3.1. Introduction Technology review Chapter 3 3.1. Introduction Previous chapter covers detail description about problem domain. In this chapter I will discuss the technologies currently available to solve a problem in

More information

44-76 mix 2. Exam Code:MB5-705. Exam Name: Managing Microsoft Dynamics Implementations Exam

44-76 mix 2. Exam Code:MB5-705. Exam Name: Managing Microsoft Dynamics Implementations Exam 44-76 mix 2 Number: MB5-705 Passing Score: 800 Time Limit: 120 min File Version: 22.5 http://www.gratisexam.com/ Exam Code:MB5-705 Exam Name: Managing Microsoft Dynamics Implementations Exam Exam A QUESTION

More information

A UML Introduction Tutorial

A UML Introduction Tutorial A UML Introduction Tutorial 1/27/08 9:55 PM A UML Introduction Tutorial In this tutorial you will learn about the fundamentals of object oriented modelling, the Unified Modelling Language and the software

More information

Welcome to the Data Analytics Toolkit PowerPoint presentation on EHR architecture and meaningful use.

Welcome to the Data Analytics Toolkit PowerPoint presentation on EHR architecture and meaningful use. Welcome to the Data Analytics Toolkit PowerPoint presentation on EHR architecture and meaningful use. When data is collected and entered into the electronic health record, the data is ultimately stored

More information

ecommerce in the Customer Empowerment Era 03/04/2014 Sameer S Paradkar

ecommerce in the Customer Empowerment Era 03/04/2014 Sameer S Paradkar ecommerce in the Customer Empowerment Era 03/04/2014 Sameer S Paradkar Abstract This Article begins with a description of the early years of ecommerce and the limitations of the existing ecommerce systems.

More information

E-Commerce: Digital Markets, Digital Goods

E-Commerce: Digital Markets, Digital Goods Chapter 9 E-Commerce: Digital Markets, Digital Goods 9.1 Copyright 2011 Pearson Education, STUDENT LEARNING OBJECTIVES What are the unique features of e-commerce, digital markets, and digital goods? How

More information

UML basics. Part II: The activity diagram. The activity diagram's purpose. by Donald Bell IBM Global Services

UML basics. Part II: The activity diagram. The activity diagram's purpose. by Donald Bell IBM Global Services Copyright Rational Software 2003 http://www.therationaledge.com/content/sep_03/f_umlbasics_db.jsp UML basics Part II: The activity diagram by Donald Bell IBM Global Services In June 2003, The Rational

More information

Lecture 12: Entity Relationship Modelling

Lecture 12: Entity Relationship Modelling Lecture 12: Entity Relationship Modelling The Entity-Relationship Model Entities Relationships Attributes Constraining the instances Cardinalities Identifiers Generalization 2004-5 Steve Easterbrook. This

More information

White Paper What Solutions Architects Should Know About The TOGAF ADM

White Paper What Solutions Architects Should Know About The TOGAF ADM White Paper What Solutions Architects Should Know About The TOGAF ADM WP0015 October 2011 The Open Group Architecture Framework 1 (TOGAF) is the most widely referenced architecture framework currently

More information