Slide 1 - Binus Repository

Download Report

Transcript Slide 1 - Binus Repository

Introduction to Information Technology
2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
The Internet, Intranets, and Extranets
(continue …)
Prepared by:
Roberta M. Roth, Ph.D.
University of Northern Iowa
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-1
Internet Challenges
 New Technologies
 Adopted by vendors more rapidly than users and
customers can implement them
 Web developers cannot assume that users can run
their innovations successfully
 Internet Regulation
 Technical organizations (e.g., World Wide Web
Consortium) develop standards governing the
Internet’s functionality
 These organizations are not formally charged in any
legal or operational sense with responsibility for the
Internet
 How to control controversial content on the Web?
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-2
Internet Challenges (continued)
 Internet Expansion
 Tremendous Internet traffic growth has strained some
elements of the network
• Slower retrieval times
• Unreliable data transmission
• Denial of service by overloaded servers
 Approaches to overcoming this congestion include
• Improved hardware technology
• Improved Web management software
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-3
Internet Challenges (continued)
 Internet Privacy - Web sites collect information with and
without consumers’ knowledge
 Cookie - small data file placed on users’ hard drives when a
site is first visited. Collects data on pages visited and content
viewed.
 Three potential approaches to the privacy issue
• Government lets groups develop voluntary privacy standards;
does not take any action now unless real problems arise
• Government recommends privacy standards for the Internet;
does not pass laws at this time
• Government passes laws now for how personal information
can be collected and used on the Internet
 Financial transaction security also a concern
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-4
Intranets
 A private network that uses Internet
software and TCP/IP protocols
Provide employees with easy access to
corporate information
Used to deploy corporate applications
• Examples – policies and procedures manuals;
human resource forms; product catalogs
Security is a concern
• Security measures include – public key security,
encryption, digital certificates, firewalls
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-5
Extranets
 An extension of an intranet to selected outside
business partners, such as suppliers, distributors,
and key customers
 Provide business partners with easy access to corporate
information and easy collaboration
 Security
 Critical to prevent unwanted entry into internal systems
 Virtual private networks (VPNs) are often used to add
security to Internet communication
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-6
Extranets (continued)
 Extranet configurations
 One company sets up a Extranet for its dealers,
customers, or suppliers
 Companies within an industry set up a collaborative
Extranet for mutual benefit
 Several companies collaborate over an Extranet for
joint venture
 Benefits include –
 Lower communication costs; better communication;
improved order entry and customer service;
improvement in business effectiveness
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-7
Other Web-based Applications
 Enterprise Information Portals
 Users have single point of access to internal and
external stored information
 Mobile Internet
 Use of wireless communication telecommunication
devices to access Web-based applications
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-8
Chapter Summary
 Internet is a network of network
 Internet provides communication and information
retrieval services, as well as the World Wide Web
 The World Wide Web enables a huge variety of
applications for businesses, including intranets and
extranets
 Many challenges exist when using the WWW,
including congestion, privacy, and security
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-9
Copyright © 2003 John Wiley & Sons, Inc. All rights reserved. Reproduction
or translation of this work beyond that permitted in Section 117 of the 1976
United Stated Copyright Act without the express written permission of the
copyright owner is unlawful. Request for further information should be
addressed to the Permissions Department, John Wiley & Sons, Inc. The
purchaser may make back-up copies for his/her own use only and not for
distribution or resale. The Publisher assumes no responsibility for errors,
omissions, or damages, caused by the use of these programs or from the
use of the information herein.
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-10