SSA
Use of White Space
Active white space important in well designed website for clarity Passive white space try to eliminate
3 previous names of business intelligence
Decision support system Executive information system online analytic processing
What is is that the users want
Do they want information are they seeking entertainment do they have an biasses regarding your info do they want to download files are they looking for links to other sites
Identify the audience
Do you have a captive audience, such as a base of loyal customers that want up-to-date information
Denial of service attacks
Flood a network or server with service requests prevents actual users access to the system Target internet services Distributed denial of service DDOS attack hundred of thousands of computer work together to bombard a website with thousands of requests for information
Threats
Include sharing passwords with coworkers,leaving a computer unattended while logged on to the network, or even spilling coffee on a keyboard
Steps in Web Site Development
Plan the websites purpose research competition define + analyze audience build your development team Identify and collect your content Plan the web pages Develop the site
On-line Analytic Processing OLAP
Relates subsets of data for "cube" analysis. allows access to some primary data
Scorecards + dashboards
Scorecards - present key performance indicators Dashboards - present business performance in a condensed and simple disk and gauge format
prototypes
Semi functional webpage layouts and will have the user interface and is usually constructed using HTML/CSS and even Javascript for showcasing how the front end interface works
Network of computers
Servers stay on all the time Servers are connected to other servers you connect to the internet by connecting to a server
Advanced and predictive analysis
Similar to OLAP, but allows users full access to primary data rovide maximum analysis potential
Web Design Principles
Solving their problems NOW
Trojan Programs
Named after the trojan horse contains cod intended to disrupt a computer, network or website Usually hidden inside a popular programs
Design tips - presentation
Only one chance to make a first impression appropriate, reasonably sized graphics should download in 8 seconds companies name visible on page Consistant design Cross browser compatibility
Business intelligence
The gathering, storing, analysis, and dissemination of data/information to facilitate informed business decision making
Worms
Travel from computer to computer in a network do not usually erase data Independent programs that can spread themselves without having to be attached to a host programs Replicate into a full blown version that eats up computing resources Well known worms
Logic Bombs
Type of trojan programs used to release a virus, worm or other destructive code Triggered at a certain time or by an event
Viruses
Types of Malware usually given names consists of self propagating program code thats triggered by a specific time or event Best measure against viruses installing and updating antivirus programs
Social engineering
Using people skills to trick other into revealing private information takes advantage of the human element of security Use information they have gathered to break into other secure sites/servers Community used social engineering techniques Dumpster diving and shoulder surfing
Data Warehouse
A large store of data accumulated from a wide range of sources within a company and used to guide management decisions
Storyboarding
A storyboard is used to brainstorm and capture the ideas before taking action. The process of visual thinking generates ideas that can be moved around an put in place. this creates even more ideas.
design tips text
Appropriate amount and grouping of text on page check spelling and grammar common readable fonts no blinking or marques
Alerts and proactive notifications
Automated generation of reports with users subscriptions and alerts to problems and or opportunities
Fault - tolerant Systems
Combination of hardware and softward for improving reliability Uninterrupted power supplies Redundant array of independent disks Mirror disks
Blended Threats
Combined the characteristics of computer viruses, worms and other malicious codes with vulnerabilities found on public and private networks main goal is not just the start and transmit an attack, but also to spread it multi layer security system could guard against blended threats
Efective web design - content
Content is king adress target audience have clear message on homepage have all pages titled with heading TYPE of content Text,Graphics,multimedia only when appropriate.
Availability
Ensure that computers and networks are operational Authorized users can access the information they need
Integrity
Ensures the accuracy of information resources in an organization Financial transactions
Wireframes
Helps clarify exactly what needs to be on the different page types of your website
Who will read the page
Male/female what lvl of education what is there reading / vocab level what lvl of technical aptitude do they have are they international
Why are you building the website
Marketing products online shopping product support provide corporate information Job listing Business partner support customer service
Design tips organization/navigation
No frames n chasing of navigational elements no mystery navigation no click here links consistant and intuitive easy to return to homepage from all other pages main, graphic navigation at the top of the page secondary navigation on side
Design Tips Colors
No more than 3-4 colors sufficient contrast no garish backgrounds
backdoors
Programming routine built into a system by its designer or programmar enable the designer or programmer to bypass system security and sneak back into the system later to access a program of file Systems users aren't aware a backdoor has been activated
Comprehensive security system
Protects the organizations resources including information and computers and networking equipment, emails, invoices transfered via electronic data interchange EDI, new product design, marketing campaigns, and financial statments
Confidentiality
System must not allow disclosing information to anyone who isn't authorized to access it Secure government agencies Business ECommerce
Analyze your competition
Who are your direct competitors who are your indirect competitors how established are they analyze there website for content/design identify websites that impress you describe what made information easy to find list reasons you want to return
Enterprise Reporting
custom reports formatted to provide detailed information to a variety of users this is the most common approach to BI
Mockups
generally focus on the visual design of the site generally close to the final site design generally just image files
Most people visit a website to solve?
one of these 4 problems They want/need information to make a purchase/donation to be entertained to be part of a community
plan the web pages
organize your information first look is what keeps people no more than 2 screens of info Establish a visual connection create a consistant look/feel 3-4 colors that compliment each other