Slide 1 - Binus Repository
Download
Report
Transcript Slide 1 - Binus Repository
Introduction to Information Technology
2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
The Internet, Intranets, and Extranets
(continue …)
Prepared by:
Roberta M. Roth, Ph.D.
University of Northern Iowa
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-1
Internet Challenges
New Technologies
Adopted by vendors more rapidly than users and
customers can implement them
Web developers cannot assume that users can run
their innovations successfully
Internet Regulation
Technical organizations (e.g., World Wide Web
Consortium) develop standards governing the
Internet’s functionality
These organizations are not formally charged in any
legal or operational sense with responsibility for the
Internet
How to control controversial content on the Web?
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-2
Internet Challenges (continued)
Internet Expansion
Tremendous Internet traffic growth has strained some
elements of the network
• Slower retrieval times
• Unreliable data transmission
• Denial of service by overloaded servers
Approaches to overcoming this congestion include
• Improved hardware technology
• Improved Web management software
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-3
Internet Challenges (continued)
Internet Privacy - Web sites collect information with and
without consumers’ knowledge
Cookie - small data file placed on users’ hard drives when a
site is first visited. Collects data on pages visited and content
viewed.
Three potential approaches to the privacy issue
• Government lets groups develop voluntary privacy standards;
does not take any action now unless real problems arise
• Government recommends privacy standards for the Internet;
does not pass laws at this time
• Government passes laws now for how personal information
can be collected and used on the Internet
Financial transaction security also a concern
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-4
Intranets
A private network that uses Internet
software and TCP/IP protocols
Provide employees with easy access to
corporate information
Used to deploy corporate applications
• Examples – policies and procedures manuals;
human resource forms; product catalogs
Security is a concern
• Security measures include – public key security,
encryption, digital certificates, firewalls
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-5
Extranets
An extension of an intranet to selected outside
business partners, such as suppliers, distributors,
and key customers
Provide business partners with easy access to corporate
information and easy collaboration
Security
Critical to prevent unwanted entry into internal systems
Virtual private networks (VPNs) are often used to add
security to Internet communication
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-6
Extranets (continued)
Extranet configurations
One company sets up a Extranet for its dealers,
customers, or suppliers
Companies within an industry set up a collaborative
Extranet for mutual benefit
Several companies collaborate over an Extranet for
joint venture
Benefits include –
Lower communication costs; better communication;
improved order entry and customer service;
improvement in business effectiveness
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-7
Other Web-based Applications
Enterprise Information Portals
Users have single point of access to internal and
external stored information
Mobile Internet
Use of wireless communication telecommunication
devices to access Web-based applications
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-8
Chapter Summary
Internet is a network of network
Internet provides communication and information
retrieval services, as well as the World Wide Web
The World Wide Web enables a huge variety of
applications for businesses, including intranets and
extranets
Many challenges exist when using the WWW,
including congestion, privacy, and security
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-9
Copyright © 2003 John Wiley & Sons, Inc. All rights reserved. Reproduction
or translation of this work beyond that permitted in Section 117 of the 1976
United Stated Copyright Act without the express written permission of the
copyright owner is unlawful. Request for further information should be
addressed to the Permissions Department, John Wiley & Sons, Inc. The
purchaser may make back-up copies for his/her own use only and not for
distribution or resale. The Publisher assumes no responsibility for errors,
omissions, or damages, caused by the use of these programs or from the
use of the information herein.
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
7-10