Tuesday, April 2, 2019

Literature Review Of Mph Bookstore Information Technology Essay

Literature Review Of Mph Book computer storage Information applied science EssayFor this section, it is every last(predicate) well-nigh the literature review on mph bookstore with E-commerce corpse which is commonly apply in to twenty-four hour period transmission linees interlock environment, their strengths and to achieve culture on its history and how stage championshipman operate their headache with current architecture. The generator give burst an E-commerce organization for enchant the network login.1.2 History of mph BookstoreIn 1815, mph Bookstores has originally root when William Milne, a young pioneer, starts a lasting mission enter in Malacca. The establishment migrated to Singapore when 1890 with the environmental objective of printing literature.During 1906, the organization dislodge into the Methodist con chalk upe Ho part. In 1927, it was formed into a legal mountain as Malaya Publishing House after it became a public listed comp both. fit to the not ification of the Malaysian nation in 1963, the company moved its describe to Malaysia Publishing House with new bookstores were avail sufficient in Malaysia (Penang, Malacca and Kuala Lumpur). To the public, Malaysia Publishing House as kn induce as mph.In 1972, Jack Chia from Hong Kong acquired miles per hour. However, miles per hour became cognise as Jack Chia-MPH Ltd. In March 2000, current company budged its name into MPH Ltd in March 2000 to throw back the incompatible in its studyity ownership since 1998. MPH Bookstores Sdn Bhd was 100% owned by MPH Group Pte Ltd which in turn was a envisionled by a holding of MPH Ltd, the public company revealed on the stock transfigure of Singapore.In 2002, Malaysian company owned MPH Bookstores (S) Pte Ltd, Jalinan Inspirasi Sdn Bhd, which is part of a large Malaysian conglomerate owned by Malaysian communication channelman Tan Sri Syed Mokhtar Al-Bukhary. However, MPH becomes a entirely Malaysian-owned company. As the MPH crowd (Jalinan Inspirasi) to throw back its core businesses and it now owns MPH Bookstores (In through with(p)sia, Singapore and Malaysia), MPH Distributors (Singapore and Malaysia). (mphonline, 2009)1.3 MPH Bookstores Business OperationFigure 1 this is sheath of MPH bookstores onlineOn wholly MPH Bookstores web rate, the moods they implement their e-business ar to yield the consumer croupe sop up the latest book with cheaper prices and unloosen delivery work. To chronicle as their memberships, consumer bay window register without delay through the official web situation. The site contains a obtain cart, gear up from listing products or wait ons selected and confidence card payment. At the same measure, to trace it become much attractive, they offered consumer whitethorn get the latest release books, cheaper prices for online accomplishments, and on the spot view the assort or information. With e-commerce system that gived by MPH bookstores, consumers go forth now hold up the power to enjoy their services in remediate federal agency. The prices displayed from the official website were no diametrical with physical bookstores.For the delivery stage, for West Malaysia delivery it takes from 3 to 5 business days, for East Malaysia it takes inwardly 14days and excessively available for orbicularly. If the consumers received the books were damaged, MPH bookstore policy supports for a refund. However, the policy requires that the damaged book be returned to the following address deep down 7 days from the date of know of the book. Besides that, the objectives of this business operation ar cause visitors to come to a place or participate in a venture by offering nighthing of interest or advantage. If the MPH bookstore runs come to the fore of stock, consumers underside order book from MPH online for Rm4 postage, if order above RM80 it will free delivery.1.3.1 What should consumers do if they forget their word?Consumers require clicking on the Forget parole option, and then(prenominal) enter in your drug user Id and discussion. You will be prompted for an set to the question of your choice. Once the answer is justified, the forgotten password will be displayed on the website.1.3.2 What argon the standardised browser versions?MPH bookstores online is preferred with earnings Explorer 6.0 and above.Technology infrastructure for E-business systemE-business infrastructure is vital to all companies adopting e-business. The infrastructure directly affects the quality of service experienced of users of the systems in impairment of speed and responsiveness. E-business infrastructure refers to the combine of hardw be much(prenominal)(prenominal) as servers and guest PC in an organization, the network used to link this hardwargon and the software package applications used to deliver services to workers within the e-business and also to its partners and customers. Infrastructure also includes the architecture of th e networks, hardware and software and where it is located. Finally, infrastructure can also be considers to include the date and documents accessed through e-business applications.Introduction of E-commerceNow we are sound in an eagerness age of human innovation, where only one contemporaries can witness very great skids in engine room and focus of life. E-commerce not only just big, is also major refer to careing, services and buying products over internet or reckoner networks. Millions of companies that selling products to early(a) companies view as bring bug out that the wind vane not only provides a 24hours services and show that their products can reach a quick way to reach the right people in a company for the smash detail.(Ecommerce explanation,2006)2.1.1 The E-commerce commercialiseplaceIn this section we look at how electronic communication theory have changed relationships in the midst of the different participants of commercial transactions. Since the nat ure of these changes according to whether the transaction is mingled with business and consumer or between businesses (inter-organizational, we start by reviewing differences between these types of transactions. We then look at how the channel structures of organizations have been changed through the puzzle out of disintermediation and reinter mediation. Locations for trading and weapons of commercial exchange in the electronic marketplace are then reviewed. Management terms have difficult decisions to take about which of these new models of trading is relevant to them, so we questioning approach, looking at some illustrations that have worked and some that havent it.2.1.2 Benefits of EcommerceEcommerce enables people to go in businesses without the protracted movement of time or distance. E-commerce systems can operate all day every day, one time consumers access to the Internet at any point of time whenever day or night and purchase or sell anything one desires through the mouse clicking. The internet braces the world market through web businesses operate is the global market and wide. However it is mathematical to run business with any business or people who are connected to the Internet. For simple local businesses, as specialist record stores are enabling to market and selling use e-commerce. This is the current global luck is attend to the fact, different from handed-down communications methods, users are not allow to charged according to the distance over which they are communicating.2.2 Identify the e-business phylogenesisNowadays, as we discovered on Electronic business, it play a major role in the current worlds economy. Business phylogeny is a combination of marketing, strategic analysis, trade, regular occupation and sales. To perform your organization and business evolution universe successful and greater is reliant on go against intimacy of centering theories and regular practice.Business development professional occupation is ty pically to identify new business opportunities whether that path latest markets, partnerships with other businesses, decorous ways to reach alive markets, and product or service offerings to better meet the needs of existing markets and then to go out and make full use of those opportunities to bring in more revenue.Business development professionals are able to connect in everything to the development of their employers services and products. (E-business development, 2003)2.3 field of operations on the innovations of e-commerce systemThe maturation ubiquity of current information technology is enabling the development of advanced services which consumers can access with existing devices such as computers or mobile phones. One of the innovations of e-commerce has affected the way people buy goods, services, choice, convenience and cost. Consumers may wish to give their own impressions of such sites, but better grades may be secured where farther investigate is carried out, fo r example consumer surveys. It may also be possible to gain an taste into the benefits of using such websites through contact with e-commerce businesses. Second, consumers should be encourages to use the position technical terminology in all the brief reports or descriptions produced for this unit. It is judge that higher grade consumers will use the correct terminology in their reports and will also produce more considered reports rather than one example of a benefit and/or limitation as would be evaluate for pass consumers.2.4 Management Innovation Strategies in E-commerce EraWhen goes into the Era of e-commerce, business endeavors have some(prenominal) different features. To receive full benefits of e-commerce, enterprises should bring out curb management innovations. Enterprise innovation management allow dowry enterprises to achieve great rate development to win over business opportunities and get opportunity to approach into markets and obtain higher profits. This stag e is to investigate the new requirements on enterprise management through an e-commerce era, including occurring continuously modify thoughts of business management, flat organizational structure, management epitaxial expansion, informationization of means of production and marketing, flexile production management. Facts reveals that the business process reengineering, organizational development, creativity, cultural transformation, skill management and communication management have serious impinge on the enterprise development in terms of management and innovation. (Management Innovation Strategies in E-commerce Era, 2008)E-Commerce StrategiesThe virtual(prenominal)ly importance ecommerce strategy is to enforce a proper secure E-commerce website. The appropriate way to achieve this is to protect the websites with security department protocols and digital certificates. Major clients are attracted to ecommerce sites because of the good security and transaction mechanism. With eco mmerce web site certified from the star(p) online security agencies is one of good way to promote E-commerce and supply the mechanism more authenticity and the quality of cosmos trusted.Besides that, ensure that control the ecommerce operational specifications are brought out promptly tables and the informationbases are authentic using computer programming words skills which display down all the data launch in a queue. Maintaining the record of the entire transactions which are brought out using the ecommerce mechanism can help the system to track all the complete details in more convenient and timely manner.E-commerce site design also plays an important role in its effectiveness. The inter manifestation of E-commerce sites is for the most part design to be user friendly and easily operational by the consumers so that they can make the online transaction more convenient or easily and in a manner which is very clear to the clients. settle the research on the existing website sStudy on existing website with security enhancementsFigure 2.1 this is one of the security enhancements that what Digi company had implemented. To primal in username and password must through provided clicking the button provided.Figure 2.2 this figure show the guerilla example of security enhancements.The figure 2.1 and 2.2 given on the top is the some part of the website of Lelong and Digi company in Malaysia how they operation their businesses.Lelong.com users can use standard or secure mode in security position. For the Digi company, they design a simple virtual keyboard on the registration web scallywag to avoid the data key by user can be protected from malicious key logger a harmful application which has been designed to buzz off keystrokes. security measures enhancements genuine for to prevent intruders go into certain network or user broadsheet to store media to view or retrieve the client information. With different security features implemented, users might attrac t with those security development.3.2 Investigate the Security emerge3.3 Digital Signatures and CertificatesA digital signature is a common a way to enable that an electronic document (e-mail, spreadsheet or text file, etc.) is authentic. dependable refer to that you know who created the document and know that it has not been changed in any way since that person created it.Digital signatures bound on several types of encryption to enable the authentication. Encryption is the process of data taken of computer, when sending to some other computer and encoding it into a form that only the destination computer will be able to de order. Authentication is to process of ensure that information is coming from a trusted tooth root.There are several ways to authenticate a person or information on a computer countersignatureThe function of username and password provide the most customary method of authentication. Users can key in their name and password when prompted by the computer. It ch ecks the username and password against a secure file to confirm. If either the username or password does not match with default registered, then users are not allowed further access.ChecksumPossible only one of the origin methods of ensuring that data is accurate, checksums will provide a form of authentication when the wrong checksum suggests that the data has been compromised. The checksum is remaining in one of two ways. Assume the checksum of packet is around 1 byte long, which means that it can provide a maximum value of 255. If either the sum in other bytes in the packet is 255 or less then, then the checksum will contains that exact value. Yet if the sum of other bytes is more than 255, so the checksum is the remainder of the total value after it has been divided by 256. The example given for following pageByte 1Byte 2Byte 3Byte 4Byte 5Byte 6Byte 7Byte 8TotalChecksum21223254cxxxv244151798011511271151 divided by 256 equals 4.496 (round to 4)Multiply 4 X 256 which equals 102411 51 minus 1024 equals 1273.4 Digital certificatesTo enforce the public key encryption on a large scale, such as a secure blade server might need, requires a different approach. This is where digital certificates come in. A digital certificate is elementalally a bit of information that says the tissue server is trusted by self-reliant source as cognize as a Certificate Authority. The Certificate Authority pretends as the divisor that both computers trust. It ensures that each computer is in fact who they say they are and then provides the public keys for each computer.3.5 stop up Socket Layers (SSL)In network environment, SSL stands for Secure Sockets Layer. SSL is a protocol that developed for sending information securely over the Internet. Many websites use SSL for secure for their sites, such as user account pages and online checkout. Usually, when you are asked to log on on a website, the consequent page is secured by SSL.SSL encrypts the data being transmitted so that a tr iad party cannot retrieve while the transmission and view the data being transmitted. Only the executive director and the secure server are able to pull in the data. SSL help to keeps information such like name, address, and credit card between users and merchant to which users are providing it. Without this kind of protocol, online shopping would be far excessively insecure to be practical. When you view a Web address starting signal with http or https indicates the website is secure. These websites frequent using SSL certificates to verify their authenticity.3.6 Virtual Keyboard for Web portFigure 3 this is the layout of virtual keyboardA virtual keyboard development is to improver the security for those users had their own user account for several E-commerce services website by entering the username and password. Besides that, the virtual keyboard login is an applicationin which a data entry layout will change once the page is refreshed. In general, virtual keyboard can help protect from malicious Spywares and Trojan Programs designed to capture keystrokes. Consequently, you can reduce risk of use and allow secure and safer authentication.Chapter 4 System Analysis4.1 Fact-FindingFact-finding is the method that used for the system developers to collect the information from groups or individuals. In this method, the analyst sits face to face with peoples and records their feedback or responses. As the interviewer, they can clear and cross check the doubts in that location itself by collected information with accurate and reliable. Through the fact-finding, it would make their business requirements such as good understanding of the organization and its business objectives.4.2 User requirement4.2.1 System AdministratorThe duty of system executive usually plays an important role to managing the information, installing, updating, supporting and maintaining serves for computer systems. For this section, the proposed system administrator is responsible to man age the books information, tag prices and quantity arrangement for consumers.Input / turn the controlAdministrator allows change the information, uploading the photo or catalogue, updating and responding to service outages and other problems.Maintaining the server performance and efficiency.OutputThe catalogue, book titles, prices, and information will show.ProcessProcessing the StorageLocate the information of books ,CD or videodisk or prices in the database motionNone4.2.2 MPH bookstores consumersThe consumers will frequently enter the MPH bookstores official websites to view the latest updates and informations such as promotion or new release. The reason why of MPH launched this online shopping or e-business is to make their consumers shopping with more convenient way.Input clatter on the option and it will automatically add to the cart.OutputLogin Username and Password/ forgot your password option.The proposed system will display the appropriate information of the books once t he consumers had selected through the options that available on website embrasure.ProcessThe book information or prices label will get directly from the database.ControlNonePerformanceNoneChapter 5.0 Choose on appropriate tools or software5.1OverviewFor this chapter, the creator had review on available tools on the internet is performed in order to select suitable tools to be used to develop the system.5.2 Study on available development software.5.2.1 coffeeFigure 4.1 this is interface of java programming language coffee bean is a high-level programming language that developed by sunshine Microsystems. Java was originally called OAK, it was develop for several proposes such like handheld devices and set-top boxes. Oak was unsuccessful so in 1995 Sun changed the name to Java and modified the language to take benefits of the burgeoning World all-embracing Web.Java is an object-oriented language which is similar to C++, but simplified to get rid of language features that cause commo n programming errors. Java source enroll files (a .java extension) are compiled into a format called byte engrave (files with a .class extension), which can then be performed by a Java interpreter. Compiled Java code can execute on most computers because Java interpreters and runtime environments, known as Java Virtual Machines (VM), available for major operating systems, including Windows OS, the Macintosh OS, and UNIX/LINUX. Byte code able to converted directly into machine language instructions by using just-in-time compiler (JIT).In general, the purpose of java programming language with a number of features those make the language suitable for use on the World Wide Web. Small Java applications are called Java applets and able downloaded from a Web server and execute your computer by a Java-compatible Web browser, such as Microsoft Internet Explorer, Mozilla Firefox and Netscape Navigator.5.2.2 asp.NETFigure 4.2 this is interface of asp.net programming languageasp viper.NET, t he next version of ASP, is a programming framework used to create enterprise-class Web Applications. These applications are accessible on a global basis leading to efficient information management. Microsoft has been continuously working to shift its focus from Windows-based plans to the Internet. As a result, Microsoft introduced ASP (Active Server Pages) in November 1996. ASP offered the efficiency of ISAPI applications along with a new level of simplicity that make it easy to understand and use. However, ASP script was an interpreted script and basicallyunstructured code and was difficult to debug and maintain.The web contain many different technologies, software integration for Web development was complicated and required to understand many different technologies. An application grew bigger in size and became more complex, the number of lines ofsource code in ASP applications increaseattractive and was difficult to maintain.Therefore, the architecture was needed that would a llow development of Web applications in a structured and consistent way. (Asp.net, 2004)5.2.3 optical sanctioned.NetFigure 4.3 this is interface of visual basic.net programming languageMicrosoft-created object-oriented programming language as known as opthalmic Basic.NET which combines features of Microsofts .NET Framework and Web Services, such as SOAP, which is originally, developed using XML. Visual Basic.NET, which thought would be a sequel to Visual Basic 6.0, has a totally different language core. There is no backward or forward compatibility between Visual Basic 6.0 projects and code and Visual Basic.NET projects and code. Visual Basic.NET is a language developed to create .NET applications, Windows or Web applications, and Web Services. (Visual Basic, 2006)5.3 Comparison on Java, Asp.net and Visual BasicJavaAdvantagesIn general, advantages of Java are platform-independent One of the most significant advantages of Java is its ability to move easily from one computer system to another. The ability to run the same program on many different systems is polar to World Wide Web software, and Java succeeds at this by being platform-independent at both the source and binary levels. Java is distributed Distributed computing involves several computers on a network working together. Java is designed to make distributed computing easy with the networking capability that is inherently coordinated into it.DisadvantagesFor the performance, Java can be perceived as significantly poky and more memory-consuming than natively compiled languages such as C or C++. Java is predominantly a single-paradigm language. However, with the addition of static imports in Java 5.0 the procedural paradigm is better accommodated than in earlier versions of Java and default interface and feel of graphical user interface design is too complicated.ASP.NETAdvantagesThe latest set of controls that are able to use in the same way with HTML control like Calendars controls. It will execute without the requirement of ActiveX Control and without bringing up issues of Browser compatibility. ASP .NET Server take over the Controls that have an object model from the traditional HTML and provide single set of properties and methods that can make the change of the outlook and behavior of the controls and reduces the amount of code required to build great applications.DisadvantagesThe control of Asp.net coding is inbuilt with the web server controls so users have no much of direct control on these controls.Visual BasicAdvantagesFor the visual basic language, its simple language. Some program that might be difficult to program with other language can be done in Visual Basic very easily. It is because Visual Basic is so popular beginner can find the answers to your programming problems much more easily than other programming languages.DisadvantagesThe disadvantages of Visual Basic are virile language, but its not suit for programming really sophisticated games and slower than other languages.5.4 Study on available data management softwareMicrosoft SQL Server 2008SQL Server 2008 delivers on Microsofts Data Platform vision by helping any organization to manage data, place, and time management. It provides can store data from structured, semi-structured, and unstructured documents, such as images and rich media, directly within the database. SQL Server 2008 hand over a rich set of integrated services that enable you to do more with your data such as query, search, synchronize, report, and analyze. SQL Server 2008 provides the highest levels and advanced of security, reliability, and scalability for your applications. To take newer advantage of new opportunities in nowadays is fast-moving into business world, companies need the capacity to create and deploy data-driven solutions quickly. SQL Server 2008 is reduces time management, cost of management and development of applications.SQL server 2008 is able to access the data from your enterprise and provide c ontrol over your data, no matter where its stored from the largest servers within the data center to desktops to mobile devices. SQL Server 2008 provides a comprehensive platform that delivers intelligence where your users want it. For the Information workers can access data directly using the tools they use every day, such as the Microsoft Office system that provide by Microsoft. (MicrosoftSqlServer2008, 2010)5.5 The elect software to be used for the proposed systemThe author selects Microsoft SQL Server 2008 as the database management system and Visual basic language design for web interface. It is because SQL Server 2008 provides the common function by helping manage the data, place and time and Visual Basic is easier to mulct and popular compare with other language such as (Java or C++ ) and yet it is enough powerful programming language to develop certain system. SQL provides the highest levels of security, reliability and scalability. In other way, the reason why the author c hosen the Microsoft SQL Server 2008 is because it has the ability to support with the system which means that be able to connect with Visual Basic language tool that has been chosen as the development tool or software for proposed system.REFERENCES (BACKGROUND READING MATERIALS)MPH Bookstores Sdn Bhd, 2009, MPHonline, online, cited on 13th Jan 2010. Available from http//www.mphonline.com/welcome/welcome.aspxMPH online, 2009, About the MPH, online, cited on 15th Jan 2010.Available from http//www.mphonline.com/help/aboutus.aspxMariosalexandrou, 2010 E-commerce definition, online , cited on 20th Jan 2010.Available from http//www.mariosalexandrou.com/definition/ecommerce.aspFreetutes, 2008 Learn Visual Basic online, cited 15th Feb 2010. Available from http//visualbasic.freetutes.com/Techterms, 2010 ASP.Net online, cited 17th Feb 2010. Available from http//www.techterms.com/definition/aspnetJava,2010 Definition of Java ,cited 13th Feb 2010. Available from http//www.pcmag.com/encyclopedia _term/0,2542,t=Javai=45557,00.aspMicrosoft, 2010 Microsoft SQL Server 2008, cited 14th Feb 2010. Available from http//blogs.technet.com/dataplatforminsider/ record/2008/01/25/microsoft-sql-server-2008-roadmap-clarification.aspx.Digi, 2010 Online Customer Service, cited 22th Feb 2010. Available from https//www.digi.com.my/sso/try_login?v=1pid=2pssid=379e2d9011216b706f93f84247ce3e88baca7d3150cd33bfdb5f6c01e0699d4dprid=19a30572366f1c0df3b4cea76759a1afpurl=https%3A%2F%2Fwww.digi.com.my%2Focs%2Fmyaccount%2Fmain%2Fhome.do%3Fssologin%3Dtruecurl=http%3A%2F%2Fwww.digi.com.my***END OF REPORT***

No comments:

Post a Comment