SSA

Ace your homework & exams now with Quizwiz!

Use of White Space

Active white space important in well designed website for clarity Passive white space try to eliminate

3 previous names of business intelligence

Decision support system Executive information system online analytic processing

What is is that the users want

Do they want information are they seeking entertainment do they have an biasses regarding your info do they want to download files are they looking for links to other sites

Identify the audience

Do you have a captive audience, such as a base of loyal customers that want up-to-date information

Denial of service attacks

Flood a network or server with service requests prevents actual users access to the system Target internet services Distributed denial of service DDOS attack hundred of thousands of computer work together to bombard a website with thousands of requests for information

Threats

Include sharing passwords with coworkers,leaving a computer unattended while logged on to the network, or even spilling coffee on a keyboard

Steps in Web Site Development

Plan the websites purpose research competition define + analyze audience build your development team Identify and collect your content Plan the web pages Develop the site

On-line Analytic Processing OLAP

Relates subsets of data for "cube" analysis. allows access to some primary data

Scorecards + dashboards

Scorecards - present key performance indicators Dashboards - present business performance in a condensed and simple disk and gauge format

prototypes

Semi functional webpage layouts and will have the user interface and is usually constructed using HTML/CSS and even Javascript for showcasing how the front end interface works

Network of computers

Servers stay on all the time Servers are connected to other servers you connect to the internet by connecting to a server

Advanced and predictive analysis

Similar to OLAP, but allows users full access to primary data rovide maximum analysis potential

Web Design Principles

Solving their problems NOW

Trojan Programs

Named after the trojan horse contains cod intended to disrupt a computer, network or website Usually hidden inside a popular programs

Design tips - presentation

Only one chance to make a first impression appropriate, reasonably sized graphics should download in 8 seconds companies name visible on page Consistant design Cross browser compatibility

Business intelligence

The gathering, storing, analysis, and dissemination of data/information to facilitate informed business decision making

Worms

Travel from computer to computer in a network do not usually erase data Independent programs that can spread themselves without having to be attached to a host programs Replicate into a full blown version that eats up computing resources Well known worms

Logic Bombs

Type of trojan programs used to release a virus, worm or other destructive code Triggered at a certain time or by an event

Viruses

Types of Malware usually given names consists of self propagating program code thats triggered by a specific time or event Best measure against viruses installing and updating antivirus programs

Social engineering

Using people skills to trick other into revealing private information takes advantage of the human element of security Use information they have gathered to break into other secure sites/servers Community used social engineering techniques Dumpster diving and shoulder surfing

Data Warehouse

A large store of data accumulated from a wide range of sources within a company and used to guide management decisions

Storyboarding

A storyboard is used to brainstorm and capture the ideas before taking action. The process of visual thinking generates ideas that can be moved around an put in place. this creates even more ideas.

design tips text

Appropriate amount and grouping of text on page check spelling and grammar common readable fonts no blinking or marques

Alerts and proactive notifications

Automated generation of reports with users subscriptions and alerts to problems and or opportunities

Fault - tolerant Systems

Combination of hardware and softward for improving reliability Uninterrupted power supplies Redundant array of independent disks Mirror disks

Blended Threats

Combined the characteristics of computer viruses, worms and other malicious codes with vulnerabilities found on public and private networks main goal is not just the start and transmit an attack, but also to spread it multi layer security system could guard against blended threats

Efective web design - content

Content is king adress target audience have clear message on homepage have all pages titled with heading TYPE of content Text,Graphics,multimedia only when appropriate.

Availability

Ensure that computers and networks are operational Authorized users can access the information they need

Integrity

Ensures the accuracy of information resources in an organization Financial transactions

Wireframes

Helps clarify exactly what needs to be on the different page types of your website

Who will read the page

Male/female what lvl of education what is there reading / vocab level what lvl of technical aptitude do they have are they international

Why are you building the website

Marketing products online shopping product support provide corporate information Job listing Business partner support customer service

Design tips organization/navigation

No frames n chasing of navigational elements no mystery navigation no click here links consistant and intuitive easy to return to homepage from all other pages main, graphic navigation at the top of the page secondary navigation on side

Design Tips Colors

No more than 3-4 colors sufficient contrast no garish backgrounds

backdoors

Programming routine built into a system by its designer or programmar enable the designer or programmer to bypass system security and sneak back into the system later to access a program of file Systems users aren't aware a backdoor has been activated

Comprehensive security system

Protects the organizations resources including information and computers and networking equipment, emails, invoices transfered via electronic data interchange EDI, new product design, marketing campaigns, and financial statments

Confidentiality

System must not allow disclosing information to anyone who isn't authorized to access it Secure government agencies Business ECommerce

Analyze your competition

Who are your direct competitors who are your indirect competitors how established are they analyze there website for content/design identify websites that impress you describe what made information easy to find list reasons you want to return

Enterprise Reporting

custom reports formatted to provide detailed information to a variety of users this is the most common approach to BI

Mockups

generally focus on the visual design of the site generally close to the final site design generally just image files

Most people visit a website to solve?

one of these 4 problems They want/need information to make a purchase/donation to be entertained to be part of a community

plan the web pages

organize your information first look is what keeps people no more than 2 screens of info Establish a visual connection create a consistant look/feel 3-4 colors that compliment each other


Related study sets

Relativity — Admin Essentials I

View Set

Group & Team Quiz 2: Chp 3,16, 17

View Set