Verified Document

Information Technology Amazon.com Situation Analysis Term Paper

#9, in what way have phones and computers converged? Why is this convergence occurring?

The personal productivity tasks of communication as it relates to the use of telephones and computer systems has long been an area developers and entrepreneurs have poured time and money into. Now with the concept of the Mobile Web, it's possible to have PDAs and cell phones that make it possible to access any website, any e-mail account, from any location there is a cell phone signal. The impetus is the overlap of personal productivity processes.

Computer Security):

Q.#9, Read the information on the Thawte Web site about how users can be authenticated (Web of Trust). Briefly explain how the system works. Do you think this is a secure and reliable system?

The system uses as series of authentication algorithms to verify the identify a person is who they say there are. This is a secure and reliable system to the extent developers use the Application Programmer Interfaces (APIs) and other mechanisms for integrating these techniques into applications.

Transaction and Operations):

Review questions 2, What is electronic data interchange (EDI)? Why has EDI taken so long to catch on? Will business ever use EDI for all transactions?

EDI is a batch-oriented protocol used for completing transactions between companies, and has been in use as an order processing, validation and transaction technique for over forty years. EDI has many limitations, foremost being its approach to batch-oriented processing (most companies run it overnight) and the highly defined series of commands it uses. There is little flexibility in the programming of EDI commands; it is very inflexible. As a result of these factors and the fact that it is slow and increasingly out of touch with the needs of businesses running real-time systems, EDI is stagnating at the minority of transactions today.

6, Why has it taken so long for new payment mechanisms to be adopted?

Because each company's order management system is uniquely different and aligned with their specific...

No two companies do business and manage orders the same way, hence the wide variation in how new payment systems are implemented and adopted.
What is meant by the term "data quality"? Give three examples of problems with data quality.

Data quality refers to the attribute of data that is represents what it is supposed to. Three examples of data quality problems include incomplete data, incorrectly entered data, and misanalyzed data.

On the basis of the cost figures in the text, create a spreadsheet and compare the estimated annual costs for the carious online payment mechanisms for three hypothetical companies. The first company sells digital content for about $20 each and anticipates about 5,000 sales per year. The second company sells music for $0.75 per song, but expects people to download and pay for 5 to 10 songs at a time. It anticipates 500,000 customers. The third company sells stereo and video equipment ranging from $400 to $2,000 per item, and expects about 10,000 sales the first year. On the basis of the data, recommend a payment mechanism for each company.

A customers songs or units price per song or unit

For the song sales, there needs to be an online order capture and management system that can handle all forms of credit card transactions. For the second site with the small transaction size of 75 cents, there needs to be an account-based order system created where customers can create a debit balance and then get credits against it. Finally the larger appliance sales there is the need for managing more complex forms of credit including the definition of credit terms and the offer of a credit card to cover the purchase itself.

Enterprise Integration)

Q.#4 What are the primary features and capabilities of an enterprise resource planning system (ERP)?

An ERP system acts as the central coordination system for the production operations of a company, and includes control over supply chain, production scheduling, production operations, pricing, fulfillment and service.

A and #9, Why is

Cite this Document:
Copy Bibliography Citation

Related Documents

Amazon.com a Strategic Assessment of Amazons' E-Strategies
Words: 4490 Length: 13 Document Type: Essay

Amazon.com A Strategic Assessment of Amazons' e-Strategies Amazon's remarkable ascent as one of the top online global retailers can be attributed to the foresight they had in creating a comprehensive distributed order management, Enterprise Resource Planning (ERP), Supply Chain Management (SCM) and e-commerce series of systems. The many other e-commerce sites that rose quickly with massive infusions of venture capital just as quick exited the market, flaming out due to a lack

Information Technology Holds Great Promise for Improving
Words: 3297 Length: 12 Document Type: Term Paper

Information Technology holds great promise for improving the way a government serves its citizens in various services it conducts to the citizens. This rapid adoption of information technology has produced substantial benefits to the citizens, tax payers, and businesses alike. It is therefore recommended for every particular government to develop digital services to streamline all its operations. One area where governments should enhance its key functions is the establishment of

Financial Analysis of Amazon.Com, Inc. 2012 Annual Report
Words: 3982 Length: 15 Document Type: Term Paper

AMZN Company Overview Amazon is a Fortune 100 company, recording over $61 billion in revenue in the 2012 fiscal year, with a net loss of $39 in that period. The company is a retailer, operating almost exclusively online. Amazon runs a large family of retail websites, several of which are the market leaders. The flagship site Amazon.com is ranked as the #11 website in the world in terms of traffic by Alexa,

Technology Issue in Information Assurance
Words: 3012 Length: 10 Document Type: Term Paper

S. Department of Defense (DOD) uses over two million computers and more than ten thousand local area networks, most of which are linked to, and vulnerable to attack from, users of the larger Internet. (2008, p. 276) These increasing threats correspond to the growing reliance on information systems to manage the entire spectrum of modern commerce and energy resources, making the disruption of a single element in the integrated system a

Technology on Personal Relationships the
Words: 13203 Length: 50 Document Type: Dissertation

In many ways, students live both in the land-based or physical world as well as in the virtual world; leading what some considers parallel lives. Helliwell & Putman (2004) posit that social networking sites may offer an avenue for the development of greater social capital which may serve to further reinforce students' likelihood of integrating Facebook and other social media sites into their regular routines. A suggestion made as to the

Amazon Capital Decisions
Words: 2243 Length: 6 Document Type: Essay

There are many firms that exist and operate within the capital management realm. Some companies operate and expand via their internal income and operations. There are other firms that are not currently self-solvent. However, the latter is commonly able to expand through capital investment and fundraising. The goal with such firms, of course, is to ramp up business levels, pricing structures and so forth so as to get to a

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now