Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Introduction to Information Technology 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. The Internet, Intranets, and Extranets (continue …) Prepared by: Roberta M. Roth, Ph.D. University of Northern Iowa Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-1 Internet Challenges New Technologies Adopted by vendors more rapidly than users and customers can implement them Web developers cannot assume that users can run their innovations successfully Internet Regulation Technical organizations (e.g., World Wide Web Consortium) develop standards governing the Internet’s functionality These organizations are not formally charged in any legal or operational sense with responsibility for the Internet How to control controversial content on the Web? Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-2 Internet Challenges (continued) Internet Expansion Tremendous Internet traffic growth has strained some elements of the network • Slower retrieval times • Unreliable data transmission • Denial of service by overloaded servers Approaches to overcoming this congestion include • Improved hardware technology • Improved Web management software Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-3 Internet Challenges (continued) Internet Privacy - Web sites collect information with and without consumers’ knowledge Cookie - small data file placed on users’ hard drives when a site is first visited. Collects data on pages visited and content viewed. Three potential approaches to the privacy issue • Government lets groups develop voluntary privacy standards; does not take any action now unless real problems arise • Government recommends privacy standards for the Internet; does not pass laws at this time • Government passes laws now for how personal information can be collected and used on the Internet Financial transaction security also a concern Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-4 Intranets A private network that uses Internet software and TCP/IP protocols Provide employees with easy access to corporate information Used to deploy corporate applications • Examples – policies and procedures manuals; human resource forms; product catalogs Security is a concern • Security measures include – public key security, encryption, digital certificates, firewalls Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-5 Extranets An extension of an intranet to selected outside business partners, such as suppliers, distributors, and key customers Provide business partners with easy access to corporate information and easy collaboration Security Critical to prevent unwanted entry into internal systems Virtual private networks (VPNs) are often used to add security to Internet communication Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-6 Extranets (continued) Extranet configurations One company sets up a Extranet for its dealers, customers, or suppliers Companies within an industry set up a collaborative Extranet for mutual benefit Several companies collaborate over an Extranet for joint venture Benefits include – Lower communication costs; better communication; improved order entry and customer service; improvement in business effectiveness Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-7 Other Web-based Applications Enterprise Information Portals Users have single point of access to internal and external stored information Mobile Internet Use of wireless communication telecommunication devices to access Web-based applications Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-8 Chapter Summary Internet is a network of network Internet provides communication and information retrieval services, as well as the World Wide Web The World Wide Web enables a huge variety of applications for businesses, including intranets and extranets Many challenges exist when using the WWW, including congestion, privacy, and security Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-9 Copyright © 2003 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United Stated Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information herein. Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-10