Wednesday, November 30, 2011

(7.1) Information System Security

The five most common threats to ISS are accidents/natural disasters, employees and consultants, links to outside business contacts, outsiders (i.e. hackers), and viruses/worms.In order to safeguard against these threats, Gaming Evolution would first protect against consultants and employees by placing access restrictions on what employees and consultants can and cannot do. They would require a password and username in order to gain access to our database in order to make sure they are not a hacker or some other sort of outsider trying to gain access to our companies system. We would also implement firewalls, wireless LAN controls, and VPN's to project against viruses, worms, and malware. In order to authenticate a user, Gaming Evolution would use biometrics, such as body weight, fingerprints, and retinal patterns along wtih passwords, ID cards, and combinations and if deemed necessary, security questions.

The use of encryption would also be used by Gaming Evolution as a safeguard for the site aswell as B2B interations.

To send an encrypted message, the sender would decide to create a message to send to the receiver. First you use the receivers public key to encrypt the message. Once the message is encrypted the message is sent. When the receiver receives the message, they would then use their own private key to decrypt the message. Once the message is decrypted, they would then be able to read it.

To electronical sign a document, the sender would send a message asking for the sender to authenticate it's identity. The sender would then use their own private key to sign the message. After electronicaly signing the document, they would send them the signed document. When the receiver receives the document, they would use the senders public key to verify the signature. Once the signature has been verified, the receiver can be sure that it was the sender who sent the original document and signed it.

(6.1) Web 2.0

The Pillars of Web 2.0 are harnessing collective intelligence, utilizing the web as a plateform, leveraging the data, and implementing innovative web capabilities. All of these Pillars allow software to continually be updated, offer a wide variety of products, constantly monitor content and behavior of the website, and allow users to contribute to the imporvement of the site's content. Gaming Evolution would utilize these Web 2.0 Pillars by updating the system each for each new game release and continous minitoring which items are selling the best from our website. Gaming Evolution would also use these Pillars in order to allow customers who have brough specific items to give a "Customer Review" in our online forum. A Customer Review is where the customer reviews a purchased item in a one to two short paragraphs so that others can see how other people think about the product. Customers who visit the site would also be able to give feedback to Gaming Evolution so we know what content needs to be improved on our website.

Monday, October 24, 2011

(5.3) B2E Electronic Commerce

This image displays how an employee that is not at his or her corporate computer would be able to access corporate information by going through a VPN using the Internet. The Intranet would basically allow for an employee to gain access to the Corporate server by giving some sort of password or access information to the firewall in order to gain access to the Corporate server.

The Intranet would be very useful for employees who need to work on projects and other work related materials at home because they may not have enough time in the day to complete them at work.

(5.2) B2B Electronic Commerce

Gaming Evolution does business with other companies in order to get its product. An example of another company that Gaming Evolution would partner with would be Activision. Through an Extranet the companies would be able to complete business through a privatly through a Virtual Private Network or VPN on the Internet. Using firewalls, which prevent unwanted access, a strict level of privacy is implemented. Activision would be considered the server while Gaming Evolution would be considered the client because Gaming Evolution is buying from Activision.

(5.1) Critique Your Competitor's E-Commerce Website

Six Rules/Principles of successful E-Commerce websites are as follows:
1. The website should be aesthetically pleasing, which makes the website appealing to the eye. (i.e. nice colors, images, and website structure)
2. The website should offer unique products, which are not offered anywhere else.
3. Advertising the presence; with advertising people will learn more swiftly about the website.
4. The webiste should be fast and easy to use. It shouldn't take too long for the webpage to load because of too many images or advertisments. Toolbars and drop menu's should also be accessable from any page on the website.
5. The customer and owner of the website should both learn from the website. Customers should learn about what the website has to offer, and the owner should learn what customers are intrested in and what is more popular on their website.
6. The website should motivate people to want to visit it. Users should be offered some sort of individuality which makes the customer want to come back.

GameStop is a major competitor for Gaming Evolution. If I were to rate the website of GameStop on a scale of 1-5, I would give it a 5. GameStop offeres all six of the principles for a successful E-Commerce Website. Their webiste is aestheticly pleasing because it offers many images and different types of games. The speed of GameStop.com would easily receive a 5 because it does not take very long to load up at all. The website offers unique things such as sales and information that other websites do not. The website contains a vast amount of information on different video games. The company successfully advertises its self on other websites and on television. Customers can quickly learn from Gamestop.com because of all the information that the website gives. Giving their website information and statistics to alexa.com, alexa.com gives an accurate descriptions of the amount of time, on average, each person spends on their website.

(4.4) Entity Relationship Diagram

This is an example of a Customer Invoice. Each customer of Gaming Evolution would have an individual invoice, which shows each purchase that a customer makes. The invoice displays information about the item purchased, where it was purchased, the price of the item, both with tax and no tax, and the customer that is being billed.

Entity Relationship Diagrams can be used to show specific information about customers, which would especially help Gaming Evolution when the company is trying to show customer individuality. Customers would intern appreciate that Gaming Evolution is taking the time to know which games that the customer specifies. Simply by using the Invoice, customers would be more satisfied and will have a greater want to come back to Gamer Evolution.

(4.2) Packet Switching Technology

Packing Switching is a process where inormation is broken down into small "chunks" which are known as data packets. The packets are then transfered in the packets from computer to computer through the internet.

The above image reprsents computers A and B using packet switching to send messages to computers C and D.

Today, the amount of integration with the internet calls for a mean for communication between computers. A Transmission Control Protocol/Internet Protocol is what is used in order to share data and information between computers. TCP breaks down data into data packets or "chunks" and manages the transfer of these packets from computer to computer. IP decides the order that data packets are put into and which router should be sent the data packets. A router is a device that is used to connect two or more different networks. Data Packets that use IP specifications are called IP Datagrams. Every Datagram is routed to specific addresses called an IP Adress. An IP Adress is an individual Adress for a router, which allows for transmission IP to find it, and not the wrong router.