Friday, November 25, 2011

7.1 Security



There are many threats facing information systems. For example, if a fire were to burn down one of our restaurants, now only would Pizzarama lose property, but the sales data for that restaurant would be unrecoverable. In addition, an earthquake could hit our main data center and cause a loss of data there. To make sure our data is safe, we keep local backups as well as an online sync of backups with multiple datacenters located around the United States. Pizzarama employs many different people, For example, we have those who operate our business functions and those who work in our chains such as delivery personnel and cashiers. Employees must only be allowed to see the data that they are intended to see and to make no modifications beyond what is needed. To prevent unauthorized access and information modification, we require passwords for every change that is being made. Each password is signed to a specific user who must be authorized to access certain areas of the information system. In addition, we require keycards to ensure dual authentication. Although Pizzarama respects its partnerships with Kraft, we also want to protect our servers from corporate espionage. We use similar access-control restrictions to prevent our partners at Kraft from accessing any part of our information system other than the information required to fulfill our order.



Pizzarama must also protect itself from hackers and other outside attackers. It is important to maintain a secure network that is free from intruders. This is done by requiring passwords to login to any wireless network and encrypting data on that network. This helps prevent drive by packet sniffing. In addition, Pizzarama has firewalls on every network. Because a firewall allows us to only enable access to approved connections and applications, it helps secure each network from hackers. Pizzarama also has virus monitoring software installed on every computer used by the company. This software will set up a warning when an employee accidentally opens an email containing a virus or other malicious software and help prevent it from being installed. In addition, local systems are wiped daily so that every 24 hours they are restored to a clean state.



The picture above is demonstrating how encryption works. When someone wants to send data to someone else, but wants to ensure that only the intended receiver may access the file, they can encrypt it. After the file has been encrypted, the receiver will be the only one who can decrypt it. To do this, the receiver must have two keys, a public key and a private key. A public key is actually more like a lock. Anyone can access it and use it to lock or encrypt data. Once data has been encrypted with the public key, only the private key can decrypt it. Because only the receiver has the private key, the sender knows that only the intended recipient will have access to the data. In addition, if a Pizzarama Chef wants to send a recipe back, but they want to ensure that the person at the restaurant getting the recipe knows it is from them, they can encrypt the recipe with their private key. The restaurant would just use Pizzarama’s public key to decrypt the message. Because the public key will only decrypt messages scrambled with the private key, they know it is from a Pizzarama chef. Of course, the recipe will be able to be decrypted by anyone because the public key is public knowledge. However, the restaurant will be safe in knowing that the food cooked for our customers actually came from a Pizzarama chef and not a malicious third party.

6.1 Web 2.0 Pillars

At Pizzarama, we could harness collective intelligence by allowing our customers to look at stores, as well as vote on new recipes. This means that we would be using our customer’s contributions instead of paying money for marketing advice. In addition, we could implement innovative web capabilities to mashup a website, such as Facebook with our own site, so that when people buy a pizza, they may invite their friends to eat with them. This is an example of the many ways that Pizzarama could leverage the data we collect on our customers by applying it to business decisions. Although there is nothing that Pizzarama currently sells to customers that would allow them to use the web as a platform, we believe that Pizzarama should be the hub of every party. If we began to offer peer-to-peer technology, allowing sharing and streaming of media.

Monday, October 24, 2011

5.3 B2E Electronic Commerce

Pizzarama has many promotional events and is always trying out new recipes. In order for all of our stores to keep up, we utilize an intranet. Each store can log in to our main company’s server over the internet and access promotional tools as well as training to enable them to better serve our customers. To keep all private information being transferred over the internet safe, all access is done through a VPN. In addition, a firewall is set up to prevent unauthorized access to Pizzarama’s servers.

Sunday, October 23, 2011

5.2 B2B Electronic Commerce

Our company uses an extranet to share inventory data with our suppliers. For example, each store, acting as a client, can automatically send an order to Kraft over the internet when they are low on pizza ingredients. These requests go to our supplier’s servers where the order is automatically processed and sent out. To ensure no unauthorized third parties are able to access our company’s private data, a firewall is set up on both our network and our supplier’s network. In addition, we connect through a VPN, which allows us to secure our private information

5.1 Critique Your Competitor's E-Commerce Website

There are six rules to getting and keeping customers in e-commerce. I have looked at Papajohns.com to determine how our competitor’s site stacks up against them.

The first rule is that websites should offer something unique. Their site seems to differ very little from the websites of competitors. In addition, one can get basically the same service by calling or picking up. Other than industry standard pizza customization, their website offers nothing unique.

The second rule states that the site should be pleasing. The website isn’t bunched up, but it is poorly designed. The front page has a picture of Papa John holding a football behind a green background. On a widescreen monitor, there is also a picture of a football field. In addition, the bottom of the website has a poor fade to white which contrasts very poorly with the rest of the site.

The third rule is the website must be easy to use and fast. The three main options at the top make it fairly easy to make your own pizza or order from their menu. Making and ordering the pizza also seem to be easy. Once you get into making your own pizza, you can easily select toppings and choose whether or not you want the topping on the whole pizza or just half. Alexa claims the site is faster than 66% of all sites on the web.

The fourth rule is that the website must motivate people to visit. There is nothing unique about the site to get you to visit, but it is easy to make sure you get your order right. In addition, each Papa Johns has special offers for specific areas which can be easily customized to each community and demographic.
 
The fifth rule is that you must advertise your presence on the web. When searching for terms like Pizza or Pizza delivery, Papa was either 2 or 3 on Google with similar results on Bing. According to Alexa all but one query that led people to papajohns.com had the words Papa Johns in it. Because of this, I would argue they are doing a poor job pulling people not already looking for their website in.
 
The sixth rule is to learn from your website. It is difficult to tell how much they are using web analytics to focus their website on the things their users care about. They have updated their pizza customizer to make it more visual, allowing a customer to better see how their custom pizza is constructed. In addition, the focus on speed seems to show they know how quickly a customer will go to a competitor if they have to wait for a page to load.

4.4 Entity Relationship Diagram

            Pizzarama’s entity relationship diagram has been set up to show all of our company’s data relates to each other. There are four entities that we collect data on is the invoice, product, company, and customer. All the data of an entity is collected on their own database table. All of Pizzarama’s customers are listed as a record. All of the data we store on them are listed as attributes of their record. Each attribute has a meaning to the user and must be identified by its attribute type. This is what determines what the attribute is actually representing. In addition, different data types might be used to determine whether data being entered is alpha-numeric, a price, or a data.

            We identify customers by their customer key, which stays the same regardless of phone number change, name change, or address change. Each record has its own unique key that allows us to form a relationship with other database tables. An invoice, for example, will have its own unique key, the customer key of the customer who made the purchase, the product key of the product the customer purchased, as well as the company’s key. By doing this we allow newly created invoices to automatically display any information that has been updated such as a new address or phone number.

4.2 Packet Switching Technology

The picture above shows two clients requesting data from two servers. Each server and client is connected to a router which can be located via its IP address. Because of the large size of the data and limited amount of bandwidth, the data request must be broken up into packets in order to have packet-switching technology. Each packet must have a header that contains all the information required to find the client’s router and to allow that router to reassemble the data properly. It must also delete redundant packets and re-request missing packets. All of this is handled by the TCP, or transmission control protocol, of the router. When a packet fits this standard, it is considered an IP datagram. After being sent from the router, the actual transference of data occurs of the IP or Internet Protocol.

4.1 IFS H/W Infrastructure

The picture above shows a computer displaying the message “Hello,” demonstrating how it translates it to a readable format and what the computer knows. When a user uses an input
technology, such as a keyboard which is hooked up to a computer, to enter a letter, the computer must translate it into a binary. Binary code is made up of 1s and 0s that are read as activated or deactivated electrical charges, respectively, by the CPU, a processing technology. In ASCII, each letter takes up one byte, which in turn is made up of eight bits (a single binary digit). The CPU’s ALU handles all of the mathematical functions of the processor, while the control unit schedules the order in which the data is read. After the computer performs all of these actions, it displays the ASCII letters to an output technology, such as a monitor where it appears to be the English word “Hello.”

Thursday, September 22, 2011

3.2 Selling an IS

At the moment, Pizzarama’s competitors have implemented information systems that leave Pizzarama in the dust. If Pizzarama does not implement this information system, it is possible that the lack of competitive advantage will force Pizzarama out of business. Although, the initial cost of the IS might seem significant, the cost benefit analysis demonstrates how the maintenance costs will go down over time. In addition, the money saved from the system will more than make up for the cost in only two quarters. I believe that when this system is implemented, customers will flock to Pizzarama’s new and improved business model.

3.1 Value Chain Analysis

At Pizzarama we are always trying to improve our business so that it may be as efficient as possible. This allows us to waste less money, be more consistent, and pass the quality and savings on to our customers!
A value chain analysis is a chart that one uses to organize their tasks and determine which ones deserve the funding for information system implementation. By organizing our business processes in such a way, we can determine what our weaknesses are, what the most important components to our business are, and what will give us a competitive advantage over other companies.



The above chart was created by considering the various aspects to selling a pizza, from creation to delivery.

However, there are many things that can be improved by using an information system. For example, we may use an SCM (Supply Chain Management) system to automate the purchase of supplies. This will not only save us time and money with inventory, but will help us determine which ingredients are the most popular and which we should order less of.

As for the handling of our cash registers and credit cards, a transaction processing system will help us better track money and our employees handling of it.

One of the most important information systems that Pizzarama will need to implement to compete with other area franchises is an electronic commerce system. Currently, Pizzarama has no way for customers to purchase pizzas online. However, with an online storefront in place, our customers will be able to order a pizza and have it directly ordered to them. This will help eliminate incorrect orders, save money on employees who need to take orders, and give us a competitive advantage over other pizzerias.


In addition, our delivery team is one of the largest failures of Pizzarama. Often times pizzas are late and gas is wasted as our delivery men and women waste time driving all over the city. However, with the implementation of a Geographical information system (by using a GPS planning system), we can ensure that employees are only given pizzas for deliveries that are in the same vicinity of each other.

Finally, our customers love it when we remember their names and favorite pizzas. With a customer relationship management system, we will be able to create an even greater knowledge base and relationship with our customers and allow such great relationships to extend to all of our customers, rather than just the regulars.

2.2 World Car

 
The automobile industry at the end of Chapter 2 details the effects of globalization on car companies and their reactions to it. American car companies have difficulty sustaining their business in a global economy. One solution to appealing to different markets is to come up with a car that can appeal to all markets with little to no modification. However, the wide varying preferences by different cultures make such a car a near impossibility. Meanwhile, everything in the car industry has changed. Cars and their parts are manufactured in many countries regardless of where the company is located and the internet has even allowed for people to purchase cars from other countries rather than local markets.

Globalization 3.0 is fueling change in the auto industry by forcing companies to rethink the way they manufacture, sell, and design cars. Because of global specializations, cheaper labor, and tax laws, companies offshore much of the manufacturing of a car. The international market has created a demand for cars that fit their lives. Unfortunately, this leaves the car industry without a standardized product to offer the world, creating inefficiencies. The global marketplace created by the internet has also altered the way the auto industry sells cars to international and local markets alike.

Although Globalization 3.0 has marked an open market place, cultural distinctions can make catering to different demographics difficult. For example, cities with smaller streets of some cultures are unable to handle the large cars that another culture may prefer. In addition, some cultures with less personal space may feel lost in a larger car. Because of this, car companies must make cars that are fundamentally different from one another if they want to appeal to every market.

2.1 Flickr

Flickr is a website where users can set up an account and share their photos with friends, family, those with similar interests.The single most important enabler that allows Flickr to function is “uploading.” However, even though Flickr is not the leader in photo sharing, it still must store an incredible amount of data. Because of this, “the steroids” are an incredibly large component of their success. The steroids in this case take the place of the infrastructure and network needed for users to upload and download large photos as well as the data centers required to store that many photos as well as provide access to the many viewers. In-forming allows people to gather the information they want. In this case, Flickr allows users to tag photos which provide information about the photos. Other users may then enter in search parameters to find pictures with certain tags.

1.3 Organizational Chart

Pizzarama’s IS structure begins with the CIO. It is his job to manage and focus each IS division. Below him are three division managers. They act as middle men between the teams they oversee and the CIO.

The IT Support Manager handles the Web Designer and Database Administrator. The Web Designer creates and maintains our online presence. When you order a pizza over the internet, it is thanks to the web designer’s smart, yet clean website. Meanwhile, the Database Manager creates the database that all of our managers utilize to determine what their teams should focus on.

The Development Manager helps determine what digital initiatives the company should take on. Under them is the business analyst who takes those initiatives, writes a strategy of implementation that will allow her teams to work in sync with the rest of the company’s desires. The programmer writes the company’s software. Our Social Network Designer basically handles the way our employees talk to each other. They created the inter-company wiki, our memo system, and help with the tools we use to communicate and collaborate together.

The Maintenance Manager helps make sure everything is still running smoothly. Under his lead is the Information Systems Auditor, a role that ensures our systems are working effectively and are properly secure. Under him is the Hardware Technician. From repairs to upgrades, our hardware technician handles all of the issues that arise when it comes to our physical hardware.

The CIO is the most important role in the IS division. He writes the game plan that the rest of the manager’s and their teams follow. When it comes to the funding and allocation of workers on overarching plans, the decisions all come back to him. Because of this, much of the rate of successes and failures can be directed back to him. Without his vision, there will be no initiatives.

Because they handle both our own security as well as the security of our customer’s data, the Information Systems Auditor is one position that Pizzarama takes particularly serious. Yes, overseeing security isn’t her only function, but when it comes to the data of our customers, mainly college kids, digital protection is our most important concern.

Thursday, September 1, 2011

1.2 Data Discussion

The events will be measured by the sale/ the date and time so every transaction that is processed it will record a number down giving it a certain data into our system so when ever you put the number from the receipt into the system it will bring up the order onto the screen allowing to see what was sold on that ticket/ transaction.

The person will be measured by the student/ customers id so whenever they give us their phone number or student id it will be saved so whenever they come back it will save all their information, and so all they have to do is just give me the id number or phone number and their name and address will pop up so they don't have to tell us where they stay every time they call.

The pizza will be all process through our number system so if you wanted a 14 inch extra cheese pizza it will have its certain id/code so it would look like 14EC which means a 14 inch extra cheese pizza. this would be for several of pizza and other items we have at our store such as cheese sticks (chstx) and so on but this will give us an id so we dont have type in the whole name of what the customer wants on the pizza or order.

Tuesday, August 30, 2011

1.1 Fictional Company Introduction

Pizzarama is  a new business that has been started by three studious students.Joseph Banks, Nick Young, Jon Redic, while attending Ferrum College, they manage to come up with a pizza business that has slowly  been on a rise to take over papa johns in Ferrum College. The business will consist of us three being the founders of the business. We will have people working that will make pizzas and we will have sales by selling slices of variety of pizzas as well selling and delivering medium, large, and extra large pizzas. we will also sell wings and cheese sticks, etc.