Tuesday, November 15, 2011

7.1-IS Security

Our business could potentially be threatened by the 5 most common threats which are unauthroized access, information modification, computer viruses, denial of service attacks and spyware.


The picture above is our public key encryption diagram

6.1-Web 2.0

The 4 pillars of Web 2.0 are:

1.Utilizing the Web as a Platform
2.Harnessing Collective Intelligence
3.Leveraging the Data
4.Implementing Innovative Web

The 4 pillars could definitely be used in our company. Pillar 1 could be used for clients to interact with the company through the web. Pillar 2 could be used for people to express what they think about our company. Pillar 3 could be used to keep track of our customers. Pillar 4 could be used to make sure the customers can keep up with their accounts.

Sunday, October 23, 2011

5.3 Intranet diagram

The outside client sends data through the VPN to the server. The server stores the data. The data is then transported to the inside client.

5.2 Extranet diagram

The vendor network is on the left. The supplier network is on the right. The VPN is the middle man in the situation

5.1 Competitor's E-Commerce

These are the 6 rules

Rule 1 : The Website Should Offer Something Unique
Rule 2 : The Website Should be aesthetically pleasing
Rule 3 : The Website Must be easy to use and fast
Rule 4 : The Website must motivate people to visit
Rule 5 : You must advertise your presence on the web
Rule 6 : You should learn from your website

I chose Carilion Clinic as a competitor.

I gave them a rating of 4 out of 5 for rule 1 because of the alphabetical word search on the page. I gave them a rating of 5 out of 5 for rule 2 because it has different color schemes. For rule 3 I give them a rating of 5 out of 5 because it is easy navigate around the page. For rule 4 I give them a rating of 2 out of 5 because the website is somewhat dull. For rule 5 I give them a 4 out of 5 because they advertise well. For rule 6 I give them a 2 out of 5 because you don't learn much from their website.

4.3

The invoice is meant to communicate with potential customers. We will keep record of our customer's first and last name, phone, email, and job. The product part is meant for taking in supplies. On each product is a supply id, product code, product name, description, and destination.

4.2 Packet switching

The image shows a shared network system. The client or user can store and move what he/she pleases. The router is what holds all the sections. The TCP sorts and orders the information. The IP completes the delivery.

4.1

The picture shows different parts and functions of the computer. It shows the process of storing data in the computer. It includes input and output technology. It also includes processing technology. The binary code is part of the machine language.

Tuesday, September 20, 2011

3.2 Faith, Fear, and Fact

With this information system your benefits will overcome your costs in just two years. Without this information system your costs will continue to increase to be more than they already are. With this information system in two years your benefits will outweigh your costs by $1600.

3.1 Value Chain

The value chain diagram shows step by step how this company works. The steps are ordered from left to right in the order that they happen.
This company will use a transaction processing system for check people in and out of the system. A management information system to keep track of what supplies are available in the office. Also a supply chain management system to keep the procedures performed in the office fresh in the mind. And last but not least a geographical information system to store and manage important data.

2.2 The Automobile industry

The case study is about the globalization of automobiles. Automobile companies are trying to seek a "world car" or a car that can be sold all over the world. Globalization 3.0 is making it so that many different cars can be sold all over the world. Cultural differences make it very difficult to make a world car. For example, Europeans prefer steel construction over plastic, as in door panels, which is very popular in cars in the United States. Also Asians prefer smaller easy maneuvering cars that can get through narrow and crowded streets while Americans prefer SUVs or pickups.

2.1 Flickr

Flickr allows users to share their photos with others. It lets people post photos of an event so that people who attended the event can view them. It also allows you to tag your photos so that they are easier to find by theme. Flickr is also good for photographers to sell their photos to people who are interested

1.3 Organizational Chart


1.2 Collecting Data

The will be three main things taken down for each customer who enters our system. One will be a customer number which will be a unique series of number. Each customer will be given a card that will have the number printed onto it just in case the customer forgets their number. Another piece of information that will be put into our system will be background information such as medical history or place of employment. This will be mostly for our doctors use. For example if a customer is allergic to a certain chemical our doctor will make sure that the medicine that they write a prescription for does not contain that chemical. Also if someone for example is having back problems and works for a company that requires them to do manual labor, the doctor can write a note to excuse that person from work. We will also take down our customers' social security number just to make sure the person who comes into our office is who they say they are.

1.1 Introduction

Our company name is Health Care. It is an up and coming doctor's office located in Roanoke, Virginia. The company will make money by customers coming in and paying for regular check-ups and also other procedures when illness is possible. Our doctors and nurses are highly trained and very reliable when it comes to these type of procedures. For more information visit www.HealthCareRNVA.org