Tuesday, June 4, 2019

Literature Review Of Mph Bookstore Information Technology Essay

Literature Review Of Mph Book hold on Information Technology EssayFor this section, it is tout ensemble intimately the literature review on miles per hour bookstore with E-commerce formation which is comm completely drug ab hired in today teleph wholeness circuites net in lift environment, their strengths and to achieve learning on its memoir and how telephone lineman check their employment with modern architecture. The author provide extend an E-commerce system for enchant the net login.1.2 History of miles per hour BookstoreIn 1815, MPH Bookstores has originally roots when William Milne, a young pioneer, starts a lasting mission enter in Malacca. The establishment migrated to Singapore when 1890 with the environmental objective of printing literature.During 1906, the memorial tablet change into the Methodist Publishing nursing home. In 1927, it was formed into a legal corporation as Malaya Publishing House after it became a public listed company. gibe to the not ification of the Malaysian nation in 1963, the company moved its name to Malaysia Publishing House with new bookstores were operable in Malaysia (Penang, Malacca and Kuala Lumpur). To the public, Malaysia Publishing House as roll in the hayn as MPH.In 1972, Jack Chia from Hong Kong acquired MPH. However, MPH became know as Jack Chia-MPH Ltd. In March 2000, current Company changed its name into MPH Ltd in March 2000 to throw back the incompatible in its majority ownership since 1998. MPH Bookstores Sdn Bhd was 100% own by MPH Group Pte Ltd which in turn was a insureled by a holding of MPH Ltd, the public company revealed on the stock win over of Singapore.In 2002, Malaysian company owned MPH Bookstores (S) Pte Ltd, Jalinan Inspirasi Sdn Bhd, which is part of a large Malaysian conglomerate owned by Malaysian businessman Tan Sri Syed Mokhtar Al-Bukhary. However, MPH becomes a entirely Malaysian-owned company. As the MPH group (Jalinan Inspirasi) to throw back its core businesses a nd it now owns MPH Bookstores (Indonesia, Singapore and Malaysia), MPH Distri simplyors (Singapore and Malaysia). (mphonline, 2009)1.3 MPH Bookstores Business OperationFigure 1 this is framework of MPH bookstores onlineOn wholly MPH Bookstores website, the ways they implement their e-business ar to allow the consumer fanny get the a la mode(p) book with cheaper prices and free sales pitch serve. To register as their memberships, consumer arouse register now done the official website. The site contains a shopping cart, order from listing products or services selected and credit tease apart payment. At the equivalent time, to make it become more attractive, they offered consumer may get the latest release books, cheaper prices for online transactions, and on the spot view the catalogue or information. With e-commerce system that provided by MPH bookstores, consumers will now have the ability to enjoy their services in better way. The prices displayed from the official websit e were no different with physical bookstores.For the deli very(prenominal) stage, for West Malaysia delivery it takes from 3 to 5 business days, for East Malaysia it takes within 14days and also available for orbiculately. If the consumers received the books were damaged, MPH bookstore polity allows for a refund. However, the policy requires that the damaged book be returned to the following address within 7 days from the date of receipt of the book. also that, the objectives of this business operation are exploit visitors to come to a place or participate in a venture by offering something of interest or advantage. If the MPH bookstore runs issue of stock, consumers arsehole order book from MPH online for Rm4 postage, if order above RM80 it will free delivery.1.3.1 What should consumers do if they forget their word?Consumers require clicking on the Forget countersignature preference, and therefore enter in your drug user Id and password. You will be prompted for an answe r to the question of your choice. Once the answer is justified, the forgotten password will be displayed on the website.1.3.2 What are the standard browser versions?MPH bookstores online is p pre waitered with Internet Explorer 6.0 and above.Technology nucleotide for E-business systemE-business infrastructure is vital to all companies adopting e-business. The infrastructure directly affects the quality of service experienced of users of the systems in terms of speed and responsiveness. E-business infrastructure refers to the combination of hardware such(prenominal) as servers and client PC in an organization, the network used to link this hardware and the software applications used to deliver services to workers within the e-business and also to its partners and customers. Infrastructure also includes the architecture of the networks, hardware and software and where it is located. Finally, infrastructure can also be considers to include the date and documents accessed through e-bus iness applications.Introduction of E-commerceNow we are survive in an eagerness age of human innovation, where only one generation can witness very great shifts in technology and way of life. E-commerce not only just big, is also major refer to selling, services and buying products over internet or electronic computer networks. Millions of companies that selling products to new(prenominal) companies have found give away that the sack not only provides a 24hours services and show that their products can reach a quick way to reach the right people in a company for the complete detail.(Ecommerce Definition,2006)2.1.1 The E-commerce food marketIn this section we look at how electronic communications have changed relationships between the different participants of commercial transactions. Since the nature of these changes fit in to whether the transaction is between business and consumer or between businesses (inter-organizational, we start by reviewing differences between these t ypes of transactions. We then look at how the channel structures of organizations have been changed through the abut of disintermediation and reinter mediation. Locations for trading and mechanisms of commercial exchange in the electronic marketplace are then reviewed. Management terms have difficult decisions to take about which of these new models of trading is relevant to them, so we questioning approach, looking at some examples that have worked and some that havent it.2.1.2 Benefits of EcommerceEcommerce enables people to go in businesses without the longer movement of time or distance. E-commerce systems can operate all day every day, once consumers access to the Internet at any point of time whenever day or night and purchase or sell anything one desires through the mouse clicking. The internet braces the world market through web businesses operate is the global market and wide. However it is viable to run business with any business or people who are connected to the Intern et. For unproblematic local businesses, as specialist record stores are enable to market and selling using e-commerce. This is the current global opportunity is attend to the fact, different from traditional communications methods, users are not allow to charged according to the distance over which they are communicating.2.2 Identify the e-business victimisationNowadays, as we discovered on Electronic business, it play a major role in the current worlds economy. Business development is a combination of marketing, strategic analysis, trade, regular occupation and sales. To perform your organization and business development existence successful and greater is reliant on better knowledge of focussing theories and regular practice.Business development professional occupation is typically to identify new business opportunities whether that means latest markets, partnerships with other businesses, proper ways to reach existing markets, and product or service offerings to better meet t he packs of existing markets and then to go out and make full use of those opportunities to bring in more revenue.Business development professionals are able to connect in everything to the development of their employers services and products. (E-business development, 2003)2.3 translate on the innovations of e-commerce systemThe maturation ubiquity of current information technology is enabling the development of advanced services which consumers can access with existing devices such as computers or mobile phones. One of the innovations of e-commerce has affected the way people buy goods, services, choice, convenience and cost. Consumers may wish to give their own impressions of such sites, but better grades may be secured where get along research is carried out, for example consumer surveys. It may also be possible to gain an insight into the benefits of using such websites through contact with e-commerce businesses. Second, consumers should be encourages to use the correct techn ical terminology in all the brief reports or descriptions produced for this unit. It is expected that higher grade consumers will use the correct terminology in their reports and will also produce more considered reports rather than one example of a benefit and/or limitation as would be expected for pass consumers.2.4 Management Innovation Strategies in E-commerce EraWhen goes into the Era of e-commerce, business enterprises have several different features. To receive full benefits of e-commerce, enterprises should bring out allow wariness innovations. Enterprise innovation management allow helping enterprises to achieve great rate development to win over business opportunities and get opportunity to approach into markets and obtain higher profits. This stage is to investigate the new requirements on enterprise management through an e-commerce era, including occurring continuously modify thoughts of business management, flat organizational structure, management epitaxial expansio n, informationization of means of production and marketing, flexible production management. Facts reveals that the business process reengineering, organizational development, creativity, cultural transformation, skill management and communication management have serious impinge on the enterprise development in terms of management and innovation. (Management Innovation Strategies in E-commerce Era, 2008)E-Commerce StrategiesThe most importance ecommerce strategy is to bring down a proper secure E-commerce website. The appropriate way to achieve this is to protect the websites with protective covering protocols and digital certificates. Major clients are attracted to ecommerce sites because of the good security department and transaction mechanism. With ecommerce web site certified from the leading online security agencies is one of good way to promote E-commerce and supply the mechanism more authenticity and the quality of being trusted.Besides that, ensure that control the ecomme rce operational specifications are brought out promptly tables and the entropybases are developed using programming lyric poem skills which display down all the data entry in a queue. Maintaining the record of the entire transactions which are brought out using the ecommerce mechanism can help the system to track all the complete details in more convenient and timely manner.E-commerce site material body also plays an important role in its effectiveness. The port wine of E-commerce sites is generally design to be user friendly and easily operational by the consumers so that they can make the online transaction more convenient or easily and in a manner which is very clear to the clients.Make the research on the existing websitesStudy on existing website with security enhancementsFigure 2.1 this is one of the security enhancements that what Digi company had implemented. To line in username and password must through provided clicking the button provided.Figure 2.2 this figure show the second example of security enhancements.The figure 2.1 and 2.2 wedded on the top is the some part of the website of Lelong and Digi company in Malaysia how they operation their businesses.Lelong.com users can use standard or secure mode in security position. For the Digi company, they design a simple virtual keyboard on the registration webpage to avoid the data keyed by user can be protected from vicious key logger a harmful application which has been designed to capture keystrokes. Security enhancements developed for to prevent intruders go into certain network or user account to store media to view or retrieve the client information. With different security features implemented, users might attract with those security development.3.2 Investigate the Security Issue3.3 digital Signatures and CertificatesA digital signature is a common a way to enable that an electronic document (e-mail, spreadsheet or text file, etc.) is authentic. Authentic refer to that you know who created the document and know that it has not been changed in any way since that person created it.Digital signatures bound on several types of encryption to enable the authentication. Encryption is the process of data taken of computer, when sending to another computer and encoding it into a form that only the destination computer will be able to de order. assay-mark is to process of ensure that information is coming from a trusted root.There are several ways to authenticate a person or information on a computerPasswordThe get of username and password provide the most usual method of authentication. Users can key in their name and password when prompted by the computer. It checks the username and password against a secure file to confirm. If either the username or password does not match with default registered, then users are not allowed further access.ChecksumPossible only one of the origin methods of ensuring that data is accurate, checksums will provide a form of authentication when the wrong checksum suggests that the data has been compromised. The checksum is remaining in one of two ways. Assume the checksum of packet is around 1 byte long, which means that it can provide a maximum look upon of 255. If either the sum in other bytes in the packet is 255 or less then, then the checksum will contains that exact value. Yet if the sum of other bytes is more than 255, so the checksum is the remainder of the total value after it has been divided by 256. The example given for following pageByte 1Byte 2Byte 3Byte 4Byte 5Byte 6Byte 7Byte 8TotalChecksum21223254135244151798011511271151 divided by 256 equals 4.496 (round to 4)Multiply 4 X 256 which equals 10241151 minus 1024 equals 1273.4 Digital certificatesTo enforce the public key encryption on a large scale, such as a secure Web server might need, requires a different approach. This is where digital certificates come in. A digital certificate is basically a bit of information that says the Web server is trusted by s elf-reliant source as known as a Certificate Authority. The Certificate Authority pretends as the agent that both computers trust. It ensures that each computer is in fact who they say they are and then provides the public keys for each computer.3.5 Secure Socket Layers (SSL)In network environment, SSL stands for Secure Sockets Layer. SSL is a protocol that developed for sending information securely over the Internet. Many websites use SSL for secure for their sites, such as user account pages and online checkout. Usually, when you are asked to log on on a website, the consequent page is secured by SSL.SSL encrypts the data being transmitted so that a third party cannot retrieve while the transmission and view the data being transmitted. Only the administrator and the secure server are able to recognize the data. SSL help to keeps information such like name, address, and credit card between users and merchant to which users are providing it. Without this kind of protocol, online sho pping would be far too insecure to be practical. When you view a Web address starting with http or https indicates the website is secure. These websites frequent using SSL certificates to verify their authenticity.3.6 Virtual Keyboard for Web InterfaceFigure 3 this is the layout of virtual keyboardA virtual keyboard development is to increase the security for those users had their own user account for several E-commerce services website by entering the username and password. Besides that, the virtual keyboard login is an applicationin which a data entry layout will change once the page is refreshed. In general, virtual keyboard can help protect from malicious Spywares and Trojan Programs designed to capture keystrokes. Consequently, you can reduce risk of use and allow secure and safer authentication.Chapter 4 System depth psychology4.1 Fact-FindingFact-finding is the method that used for the system developers to collect the information from groups or individuals. In this method, th e analyst sits face to face with peoples and records their feedback or responses. As the interviewer, they can clear and cross check the doubts there itself by collected information with accurate and reliable. Through the fact-finding, it would make their business requirements such as good netherstanding of the organization and its business objectives.4.2 User requirement4.2.1 System AdministratorThe duty of system administrator usually plays an important role to managing the information, installing, updating, supporting and maintaining serves for computer systems. For this section, the proposed system administrator is responsible to manage the books information, tag prices and quantity arrangement for consumers.Input /Modify the controlAdministrator allows change the information, uploading the photo or catalogue, updating and responding to service outages and other problems.Maintaining the server performance and capacity.OutputThe catalogue, book titles, prices, and information wi ll show.ProcessProcessing the StorageLocate the information of books ,CD or videodisc or prices in the databasePerformanceNone4.2.2 MPH bookstores consumersThe consumers will frequently enter the MPH bookstores official websites to view the latest updates and informations such as advancement or new release. The reason why of MPH launched this online shopping or e-business is to make their consumers shopping with more convenient way.InputClick on the option and it will automatically add to the cart.OutputLogin Username and Password/ forgot your password option.The proposed system will display the appropriate information of the books once the consumers had selected through the options that available on website interface.ProcessThe book information or prices label will get directly from the database.ControlNonePerformanceNoneChapter 5.0 Choose on appropriate tools or software5.1OverviewFor this chapter, the author had review on available tools on the internet is performed in order to select suitable tools to be used to develop the system.5.2 Study on available development software.5.2.1 burnt umberFigure 4.1 this is interface of java programming vocabularyJava is a high-level programming language that developed by temperateness Microsystems. Java was originally called OAK, it was develop for several proposes such like handheld devices and set-top boxes. Oak was unsuccessful so in 1995 Sun changed the name to Java and modified the language to take benefits of the burgeoning World Wide Web.Java is an object-oriented language which is similar to C++, but simplified to get unloosen of language features that cause common programming errors. Java source label files (a .java extension) are compiled into a format called byte code (files with a .class extension), which can then be performed by a Java interpreter. Compiled Java code can execute on most computers because Java interpreters and runtime environments, known as Java Virtual Machines (VM), available for maj or operating systems, including Windows OS, the Macintosh OS, and UNIX/LINUX. Byte code able to converted directly into machine language instructions by using just-in-time compiler (JIT).In general, the project of java programming language with a number of features those make the language suitable for use on the World Wide Web. Small Java applications are called Java applets and able downloaded from a Web server and execute your computer by a Java-compatible Web browser, such as Microsoft Internet Explorer, Mozilla Firefox and Netscape Navigator.5.2.2 ASP.NETFigure 4.2 this is interface of asp.net programming languageASP.NET, the next version of ASP, is a programming framework used to create enterprise-class Web Applications. These applications are accessible on a global basis leading to efficient information management. Microsoft has been continuously working to shift its focus from Windows-based platforms to the Internet. As a result, Microsoft introduced ASP (Active waiter Page s) in November 1996. ASP offered the efficiency of ISAPI applications along with a new level of simplicity that made it easy to understand and use. However, ASP script was an interpreted script and essentiallyunstructured code and was difficult to debug and maintain.The web contain many different technologies, software integration for Web development was complicated and required to understand many different technologies. An application grew bigger in size and became more complex, the number of lines ofsource code in ASP applications increasedattractive and was difficult to maintain.Therefore, the architecture was indispensable that would allow development of Web applications in a structured and consistent way. (Asp.net, 2004)5.2.3 Visual rudimentary.NetFigure 4.3 this is interface of visual basic.net programming languageMicrosoft-created object-oriented programming language as known as Visual Basic.NET which combines features of Microsofts .NET Framework and Web Services, such as SOAP, which is originally, developed using XML. Visual Basic.NET, which thought would be a mischance to Visual Basic 6.0, has a totally different language core. There is no backward or forward compatibility between Visual Basic 6.0 projects and code and Visual Basic.NET projects and code. Visual Basic.NET is a language developed to create .NET applications, Windows or Web applications, and Web Services. (Visual Basic, 2006)5.3 Comparison on Java, Asp.net and Visual BasicJavaAdvantagesIn general, advantages of Java are platform-independent One of the most significant advantages of Java is its ability to move easily from one computer system to another. The ability to run the same program on many different systems is crucial to World Wide Web software, and Java succeeds at this by being platform-independent at both the source and binary levels. Java is distributed Distributed computing involves several computers on a network working together. Java is designed to make distributed compu ting easy with the networking capability that is inherently integrated into it.DisadvantagesFor the performance, Java can be perceived as significantly slower and more memory-consuming than natively compiled languages such as C or C++. Java is predominantly a single-paradigm language. However, with the addition of static imports in Java 5.0 the procedural paradigm is better accommodated than in earlier versions of Java and default interface and purport of GUI design is too complicated.ASP.NETAdvantagesThe latest set of controls that are able to use in the same way with hypertext mark-up language control like Calendars controls. It will execute without the requirement of ActiveX Control and without bringing up issues of Browser compatibility. ASP .NET Server take over the Controls that have an object model from the traditional HTML and provide single set of properties and methods that can make the change of the outlook and behavior of the controls and reduces the amount of code req uired to build huge applications.DisadvantagesThe control of Asp.net coding is inbuilt with the web server controls so users have no much of direct control on these controls.Visual BasicAdvantagesFor the visual basic language, its simple language. Some program that might be difficult to program with other language can be done in Visual Basic very easily. It is because Visual Basic is so popular beginner can find the answers to your programming problems much more easily than other programming languages.DisadvantagesThe disadvantages of Visual Basic are powerful language, but its not suit for programming really sophisticated games and slower than other languages.5.4 Study on available data management softwareMicrosoft SQL Server 2008SQL Server 2008 delivers on Microsofts Data Platform vision by helping any organization to manage data, place, and time management. It provides can store data from structured, semi-structured, and unstructured documents, such as images and rich media, dire ctly within the database. SQL Server 2008 hand over a rich set of integrated services that enable you to do more with your data such as query, search, synchronize, report, and analyze. SQL Server 2008 provides the highest levels and advanced of security, reliability, and scalability for your applications. To take newer advantage of new opportunities in today is fast-moving into business world, companies need the capacity to create and deploy data-driven solutions quickly. SQL Server 2008 is reduces time management, cost of management and development of applications.SQL server 2008 is able to access the data from your enterprise and provide control over your data, no matter where its stored from the largest servers within the data center to desktops to mobile devices. SQL Server 2008 provides a comprehensive platform that delivers intelligence where your users want it. For the Information workers can access data directly using the tools they use every day, such as the Microsoft Offic e system that provide by Microsoft. (MicrosoftSqlServer2008, 2010)5.5 The chosen software to be used for the proposed systemThe author selects Microsoft SQL Server 2008 as the database management system and Visual basic language design for web interface. It is because SQL Server 2008 provides the common function by helping manage the data, place and time and Visual Basic is easier to learn and popular compare with other language such as (Java or C++ ) and yet it is enough powerful programming language to develop certain system. SQL provides the highest levels of security, reliability and scalability. In other way, the reason why the author chosen the Microsoft SQL Server 2008 is because it has the ability to support with the system which means that be able to connect with Visual Basic language tool that has been chosen as the development tool or software for proposed system.REFERENCES (BACKGROUND READING MATERIALS)MPH Bookstores Sdn Bhd, 2009, MPHonline, online, cited on 13th Jan 2 010. Available from http//www.mphonline.com/welcome/welcome.aspxMPH online, 2009, About the MPH, online, cited on 15th Jan 2010.Available from http//www.mphonline.com/help/aboutus.aspxMariosalexandrou, 2010 E-commerce definition, online , cited on 20th Jan 2010.Available from http//www.mariosalexandrou.com/definition/ecommerce.aspFreetutes, 2008 Learn Visual Basic online, cited 15th Feb 2010. Available from http//visualbasic.freetutes.com/Techterms, 2010 ASP.Net online, cited 17th Feb 2010. Available from http//www.techterms.com/definition/aspnetJava,2010 Definition of Java ,cited 13th Feb 2010. Available from http//www.pcmag.com/encyclopedia_term/0,2542,t=Javai=45557,00.aspMicrosoft, 2010 Microsoft SQL Server 2008, cited 14th Feb 2010. Available from http//blogs.technet.com/dataplatforminsider/archive/2008/01/25/microsoft-sql-server-2008-roadmap-clarification.aspx.Digi, 2010 Online Customer Service, cited 22th Feb 2010. Available from https//www.digi.com.my/sso/try_login?v=1pid=2ps sid=379e2d9011216b706f93f84247ce3e88baca7d3150cd33bfdb5f6c01e0699d4dprid=19a30572366f1c0df3b4cea76759a1afpurl=https%3A%2F%2Fwww.digi.com.my%2Focs%2Fmyaccount%2Fmain%2Fhome.do%3Fssologin%3Dtruecurl=http%3A%2F%2Fwww.digi.com.my***END OF REPORT***

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.