You are on page 1of 4

CHAPTER 7 E-commerce Systems - must protect resources from threats

E-commerce – doing business online 2. Profiling and personalizing – based on personal data
- Online process of developing, marketing, selling, Personalization – process of tailoring pages
delivering, servicing, and paying for products & services
3.Search management – helps find specific product or service
transacted
Software – may include search engine component
3 BASIC CATEGORIES
Search engine – coordinated set of programs that includes:
1. Business-to-Consumer – sell products/ services to
consumers ● Spider – goes every website and reads it
2. Business-to-Business – involves electronic business
● Indexer – creates index from pages that have been read
marketplaces and direct market between businesses
3. Consumer-to-Consumer – between consumers ● Searcher – receives search request, compares it to entries in
E-commerce Architecture index, and returns results

Infrastructure of foundation 3 TYPES OF WEB


● Internet - communication network that extends globally ● Free web ● Deep web ● Dark web
● Intranet - restricted to a particular place and can be
considered as a private network 4. Content and catalog Management
● Extranet - system is protected even more and is only - personalize content of the website
accessible to particular people
Content management software – develop text data and
Functional Scopes multimedia information
● Customers - secure information, marketing, transaction 5. Workflow Management System
processing and payment
● Trading and business partners - Exchange information and - determines if the process is ready to move to the next process
secure transaction Workflow Systems – proper transactions, decisions and work
● Employees - Manage the content of operation activities
E–commerce Processes
- Correct data are routed
- support operation of e-commerce
6. Event Notification – notifies when an event occurred
- also seen in traditional business processes
7. Collaborating and Trading – supports collaboration
1. Access control and security – must establish mutual trust arrangement and trading services
and secure access
Introduction to Database Systems DATABASE SYSTEM
Why Study Databases? A database system consists of:
Databases are useful ● Data (the database) ● Hardware
● Software ● Users
 deal with large amounts of information
 give a set of tools for storing, searching and managing Database systems allow users to:
this information
● Store ● Organise
Databases in CS ● Update ● Protect their data
● Retrieve
 Databases are a ‘core topic’ in computer science
DATABASE USERS
DATABASE – collection of information
1. End users - Use the database system to achieve some goal
- A set of information held in a computer (Oxford English 2. Application developers - Write software
Dictionary) 3. Database Administrator (DBA) - Designs & manages the
- One or more large structured sets of persistent data, database system
usually associated with software to update and query the 4. Database systems programmer - Writes the database
data (Free On-Line Dictionary of Computing) software itself
- A collection of data arranged for ease and speed of
search and retrieval (Dictionary.com) DATABASE MANAGEMENT SYSTEMS

DATABASES EXAMPLE - software that controls the information

● Web indexes ● Airline bookings Examples:

● Library catalogues ● Credit card details ● Oracle ● Ingres


● DB2 (IBM) ● PostgreSQL
● Medical records ● Student records ● MS SQL Server ● MySQL
● Bank accounts ● Customer histories ● MS Access

● Stock control ● Stock market prices - Provides users with

● Personnel systems ● Discussion boards ● Data definition language (DDL)

● Product catalogues ● Data manipulation language (DML)

● Telephone directories ● Data control language (DCL)

● Train timetables
DBMS PROVIDES • Data integrity
● Persistence ● Security • Data manipulation
● Concurrency ● Data independence ANSI / SPARC ARCHITECTURE
● Integrity ● ANSI - American National Standards Institute
DATA DICTIONARY – METADATA ● SPARC - Standards Planning and Requirements Committee
- or catalog stores information about the database ● 1975 - proposed a framework for DBs
- This is data about data or ‘metadata’
A THREE-LEVEL ARCHITECTURE
● Descriptions of database objects (tables, users, rules, views,
1. INTERNAL LEVEL (systems designers)
indexes)
– Deals with physical storage of data
● Information about who is using which data (locks)
2. CONCEPTUAL LEVEL (database designers and
● Schemas and mappings
administrators)
File based systems – Data is stored in files
– Deals with the organisation of the data as a whole
Problems:
3.EXTERNAL LEVEL (database users)
● No standards ● No way to generate ad hoc queries
– Provides a view of the database tailored to a user
● Data duplication ● No provision for security, recovery,
Parts of the data may be hidden
● Data dependence concurrency
MAPPINGS
Problems with early databases:
– translate information from one level to the next
● Navigating the records requires complex programs
● External/Conceptual ● Conceptual/Internal
● There is minimal data independence
PROVIDE DATA INDEPENDENCE
● No theoretical foundations
● Physical data independence – changes to internal level
RELATIONAL SYSTEMS shouldn’t affect conceptual level
- Information is stored as tuples or records in relations or ● Logical data independence – Conceptual level changes
tables shouldn’t affect external levels
• The relational model covers 3 areas: Introduction to DBMS (Database Management Systems)
• Data structure STAGES OF INFORMATION SYSTEM
● Stage 0: Manual Information System • Make the database more efficient
• Records • Prevent the same data from being stored in more than
• Files one place (called an “insert anomaly”)
• Index Cards
• Prevent updates being made to some data but not others
● Stage 1: Sequential Information Systems (called an “update anomaly”)
• Tapes • Prevent data not being deleted when it is supposed to be,
• Files or from data being lost when it is not supposed to be
• slow, non-interactive, redundancy (called a “delete anomaly”)
● Stage 2: File Based Information Systems • Ensure the data is accurate
• Disk (direct access) • Reduce the storage space that a database takes up
• application program has its own file
• Ensure the queries on a database run as fast as possible
data dependence
• data redundancy Anomaly – issue in the data that is not meant to be there
● Stage 3: DBMS based Information Systems Normal form – transforms the data to a certain structure
• Generalized data management software Primary keys – must contain unique values
• Transaction processing
Foreign key – refers to the primary key in another table
DATA INDEPENDENCE – Immunity of application to change in
storage structure and access strategy ● First Normal Form –There are no repeating groups of
columns
FUNCTIONS OF DBMS
● Second Normal Form – The table is in first normal form and
 Data Definition Language (DDL) all the columns depend on the table’s primary key.
 Data Manipulation Language (DML) ● Third Normal Form – table is in second normal form and all
of its columns are not transitively dependent on the primary key
 Data Security and Integrity
 Data Recovery and Concurrency
 Data Dictionary
 Performance
Database normalization/ normalization
– is a process used for data modelling

You might also like