Kamis, 13 Juni 2013

System Information E-Commerce Goeie Shop

E-Commerce Goeie Shoes Shop



Accesories 

Goeie products are designed by Dita Triwardani. She brings simplicity but elegant concept in all Goeie products. She always takes carefully every detail in Goeie design to emphasize that simplicity can bring special beauty to each of Goeie products. 

Elegant, simple, comfort, & high quality, those words are hoped can remind you with Goeie products. Goeiealways try to give "just the best" items which feels just right to be called simple & elegant. Goeie hope their customer don't have difficulty to find adorable shoes in Goeie. Goeie allocate a big portion in R&D to pay a really close attention and to continuously improve the standard quality in several factors which mainly around comfort matters. Goeie also ensure their quality by placing both great QC team and the QA system to cover the whole production process. 

Great product & amazing services, both words are hoped can remind you with GOEIE as a brand. All time FREE SHIPPING policy within Indonesia & accepting RETURN for un-fit size are just some kind of prove for Goeie commitment of being a customer oriented company. In fact, it's all already within Goeie’s heart to believe: that a great service is our real product. 

1. Home page 


2. Shop


3. Shopping Guides


4. How to Order 

5. Measurement Guides

 6. Return Policy



  • For Contact and Payment





Company Detail

Puri Dewata Indah Blok D2 no 5, Cipondoh

Telp: 082260808069
Fax: 082260808069



Kamis, 06 Juni 2013

System Information

System Information of E-Banking

A. Definition of E-Banking
What is e-banking? E-banking is defined as the automated delivery of bank services and products directly to customers through electronic, interactive communication channels. E-banking includes the systems that enable bank customers, whether individuals or businesses, to access accounts, transact business, or obtain information bank products and services through private or public network, including the Internet. Customers can access e-banking through smart electronic devices such as computers/PCs, PDAs, ATMs, or telephone.

Specifics of the E-Banking which have been applied by banks in Indonesia
1. ATM, Automated Teller Machine or Automatic Teller Machine, this is the channel most popular e-Banking as we know it. Each of us must have an ATM card and use the ATM facility. Traditional features of ATM is to find balance information and make cash withdrawals. During its development, which features increasingly possible to do inter-account transfers, payment (eg credit cards, electricity, and telephone), purchases (al voucher and ticket), and the current transfer to another bank (in the ATM switching network).
2. Phone Banking, this is a channel that allows customers to perform transactions with the bank via telephone.
3. Internet Banking, this includes the latest e-Banking channels that allow customers to make transactions via the internet using a computer / PC or PDA. Transaction feature to do the same with the information Phone Banking services / products the bank, account balance information, transaction transfer between accounts, payment (eg credit cards, electricity, and telephone), purchases (al voucher and ticket), and transfers to other banks .
4. SMS / m-Banking, the channel is essentially a further evolution of phone banking, which allows customers to transact via mobile phone by SMS command. Feature to do the transaction account balance information, transfer between accounts, payments (eg credit cards, electricity, and telephone), and purchase vouchers.

B. Types of E-Banking Technology
1) Automated Teller Machine (ATM). Electronic terminals provided financial institutions or other companies which allow customers to make cash withdrawals from savings accounts at the bank, make deposits, check balances, or transfer of funds.
2) Computer Banking. Service bank that can be accessed by customers via an Internet connection to central bank data, to perform some banking services, receive and pay bills, and others.
3) Debit (or check) Card. Card is used at an ATM or terminal point-of-sale (POS) which allow the customer to obtain funds directly debited (taken) from his bank account.
4) Direct Deposit. One form of payments made by the organization (eg an employer or a government agency) that pays a sum of money (eg salary or pension) through electronic transfer. Funds are transferred directly to each customer's account.
5) Direct Payment (also electronic bill payment). One form of payment that allows customers to pay bills via electronic funds transfer.
6) Electronic Bill Presentment and Payment (EBPP). Bill payment form delivered or disclosed to clients or customers online, such as through email or a note in the bank account.
7) Electronic Check Conversion. The process of converting the information contained in the checks (account number, transaction number, etc.) to the electronic format in order to do electronic funds transfer or further processing.
8) Electronic Fund Transfer (EFT). Transfer of "money" or "borrowing" from one account to another through electronic media.
9) Payroll Card. One type of "stored-value card" issued by the employer in lieu of a check which allows employees to access the terminal pembayaraannya ATM or Point of Sales.
10) preauthorized debit (or automatic bill payment). Forms of payment that allows the customer to authorize routine payments automatically taken from their bank account on the date-specific and usually with a certain amount of payment (eg, payment of electricity, telephone bills, etc.).
11) Prepaid Card. One type of Stored-Value Card that stores monetary value in it and before the customer has paid the value to the card issuer.
12) Smart Card. One type of stored-value card that is embedded in them one or more chips or microprocessors that can store data, perform calculations, or do the process for specific purposes (eg PIN validation, authorization of purchases, verify account balances, and store personal data).
13) Stored-Value Card. Card with saved some monetary value, which is filled by the previous payment by the customer or through savings provided by the employer or any other company.

C. Benefits of E-Banking
Electronic banking (e-banking) is an activity that combines banking services between information systems and technology, e-banking include phone banking, mobile banking, and internet banking. Use functions similar to an ATM machine where the ingredients are different, a customer can do an activity check account balances, transfer funds between accounts or between banks, to the payment of monthly bills such as electricity, telephone, credit card, etc.. By utilizing e-banking are many advantages to be gained customers especially when seen from the amount of time and energy can be saved because of e-banking is obviously free queue and can be done from anywhere along the support means customers have to do is e-banking services.

D. Security In Using E-Banking Facility
How Viruses and Phishing used to defeat security tokens. How do I submit confidential digital documents quickly, safely and practically to the email address of a friend or business colleague. If the file in compress (zip) and given a password or MS Office documents in the given password and relatively easily opened by an unauthorized person with opening tools password (password cracker) that is widely available on the internet (like http://www.astalavista underground.com). By using a brute force dictionary attack or just a matter of time the password will be found. Password Recovery Tools are often misused to open a file that someone else dipassword.

Cost of Service
This is one example of the costs of information systems services through internet banking payments independent.
Regarding the Service Fees: Payment Internet Banking Mandiri
Step 1: Select the payment Else


Step 2: Select the From Account, Service Provider, and enter No. Finpay. Then click Continue


Step 3: Raised number of bills, then click Continue


Step 4: Enter the Code Challenge Token Mandiri Mandiri and enter the PIN on the token issued to Internet Banking, then click Submit


Step 5: Successful Payment, please print and proof of payment


Souce: 
www.wikipedia.com
www.google.com

Kamis, 30 Mei 2013

Encryption and Decryption

Encryption and Decryption
Encryption is a process of how to maintain the security of a message or file by encoding the messages or information in a way that eavesdroppers or hackers cannot read it, but can only be read by authorized personnel.  Encryption also is the process of translating the plain text data (plaintext) into something that appears to be random and meaningless (ciphertext).

Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones,wireless intercom systems, Bluetooth devices and bank automatic teller machines. 

To encrypt and decrypt data, you must use a key with an encryption algorithm that performs a transformation on the data. The .NET Framework provides several classes that enable you to perform cryptographic transformations on data using several standard algorithms. 


Generating Keys for Encryption and Decryption
Creating and managing keys is an important part of the cryptographic process. Symmetric algorithms require the creation of a key and an initialization vector (IV). The key must be kept secret from anyone who should not decrypt your data. The IV does not have to be secret, but should be changed for each session. Asymmetric algorithms require the creation of a public key and a private key. The public key can be made public to anyone, while the private key must known only by the party who will decrypt the data encrypted with the public key. This section describes how to generate and manage keys for both symmetric and asymmetric algorithms.

Encrypting Data
Symmetric encryption and asymmetric encryption are performed using different processes. Symmetric encryption is performed on streams and is therefore useful to encrypt large amounts of data. Asymmetric encryption is performed on a small number of bytes and is therefore useful only for small amounts of data.

Decryption 
Decryption is the process of taking encoded or encrypted text or other data and converting it back into text that you or the computer are able to read and understand. This term could be used to describe a method of un-encrypting the data manually or with un-encrypting the data using the proper codes or keys.
Decrypting Data
Decryption is the reverse operation of encryption. For secret-key encryption, you must know both the key and IV that were used to encrypt the data. For public-key encryption, you must know either the public key (if the data was encrypted using the private key) or the private key (if the data was encrypted using the public key).



Kamis, 16 Mei 2013

Microsoft Access Database Related

Group :
1. Findi Verliana Utami (C1L011029)
2. Mira Nur Fajar S (C1L011030)
3. Ista Oktina (C1L011031)

This is the preview of our database related in Microsoft Access 





Rabu, 03 April 2013

Case Study Chapter 6 Foundations of Business Intelligence: Databases and Information Management


Chapter 6
Case I 
Interactive Session : Technology
WHAT CAN BUSINESSES LEARN FROM TEXT MINING

1. What challenges does the increase in unstructured data present for businesses?
Text mining enables many companies to respond to their customers satisfaction surveys, and web mining enables many web search engines to facilitate collecting data that people need to be more profitable. Now, a huge amount of unstructured data is distributed by these systems. A manager is able to use this system and make an accurate decision for unprecedented cases. information Business intelligence tools deal primarily with data that have been structured in databases and files. However, unstructured data, mostly the kind
of data we generate in e-mails, phone conversations,
blog postings, online customer surveys, and tweets are all valuable for finding patterns and trends that will help employees make better business decisions. 
Text mining tools are now available to help businesses analyze these data. These tools are able to extract key elements from large unstructured data sets, discover patterns and relationships, and summarize the information. Businesses might turn to text mining to analyze transcripts of calls to customer service centers to identify major service and repair issues.

2. How does text-mining improve decision-making?
Text mining system enables airlines to rapidly extract customer sentiments, preferences, and requests for example, when the airlines suffered from unprecedented levels of customer discontent in the wake of a February ice storm in 2007. Managers were concerned about their reputation degrading but there had been no means to glean their responses without text mining. Fortunately, they could make decisions and figure out a lot of measures to respond to customers’ discontent.  The reason is that text mining facilitates gleaning from many unstructured text data and compiles them. This data wouldn’t be analyzed by decision making systems like MIS and DSS because text mining is not structured data. Text mining is indispensable for decision making of unstructured data. text mining improve in decition making by Offering unique insights into customer behaviour and attitudes.

3. What kinds of companies are most likely to benefit from text mining software? Explain your answer.
In the past, only government and large companies tend to use text mining system but now, text mining system can be geared towards small businesses. Restaurants, hotels, supermarkets etc. are applying the system and able to make a decision as well as earn profits. Every company is able to use both structured data and unstructured data. Above all, internet search engines like Google and Yahoo are doing good business because they used AdWord and AdSence which efficient advertising system is kind of web mining.


4. In what ways could text mining potentially lead to the erosion of personal information privacy? Explain.
Nowadays, companies tend to use and manage personal information for their business. Mobile phone companies manages huge amount of privacy data as structured data. However sometimes hacker invade this data and abuse it. 
According to text mining, some companies use personal information as unstructured data which is gathered from survey or questionnaires. This case is different from structured data because unstructured and mining data is not provided by customer. There is a risk to occur some unprecedented accidents.

Case II
Interactive Session : Organizations
CREDIT BUREAU ERRORS – BIG PEOPLE PROBLEMS

1. Assess the business impact of credit bureaus’ data quality problems for the credit bureaus, for lenders, for individuals.
The business impact of credit bureaus' data quality problems for the credit bureaus, for lenders, for individuals is that businesses lease and promote people based on the credit bureaus' data. It said that one of the three entrepreneur look at the credit bureaus' data when leasing and promoting workers. This is the business impact of credit bureaus' data quality.

2. Are any ethical issues raised by credit bureaus’ data quality problems? Explain your answer.
Yes, there are ethical issues raised by credit bureaus' data quality problems, because some people fill out their applications wrong on purpose so other people get their bad credit. That is ethically wrong to do that. More and more people are receiving bad credit that they don't even deserve. These are the ethical issues raised by credit bureaus' data quality problems.

3. Analyze the management, organization, and technology factors responsible for credit bureaus’ data quality problems.
The management factor responsible for credit bureaus is data quality problem is that they need to manage the credit for people better than they have even though it said they can't do it accurately for 3.5 billion people. The organization factor is that they need organize the data better and keep it updated so that people aren't receiving bad credit undeservingly. The technology factor is that the technology needs to keep all the data updated and make sure the technology is up to date as well.

4. What can be done to solve these problems?
The steps to solve the problem is to make sure the information of lenders are up to date and correct. There will be some mistakes, but if you keep a closer eye on the credit data, you can minimize the problem. Another possible solution is to be more strict on the requirements to take out a loan, so lenders actually make sure they have good credit before taking out a loan. This will minimize the problem of people with bad credit, which in cause will minimize the problem of bad credit going to the wrong people.

Group 4 : 
  • Riza Riyanti (C1L011020)
  • Findi Verliana Utami (C1L011029)
  • Mira Nur Fajar S (C1L011030)
  • Ista Oktina (C1L011031)


Kamis, 21 Maret 2013

Management Information System



Management Information System
Information System : is a system any regular combination that collect, transform, and distribute information within an organization that processes the data into a form that is more useful to achieve a goal. Example : communication between people with each other
Operation Support System : is a system that produces a variety of information products that are used to efficiently process business transactions. They support the operations of the organization. Example : in a banking operation
PURPOSES OF INFORMATION SYSTEM
Specialized Processing System: is a system and method that provide special processing based on the source or type of communication and the communication is made. The system includes at least one user device connected to a network via a communication link. Example: is an example of a software data processing system.
Transaction Processing System: is a computerized information system in an organization that is used to process data in routine business transactions. Example: withdrawal of money from bank, selling of goods to the customer,payroll, and inventory.
Process Control System: is an information system where the monitoring process control industry. Example: production system manufacturing, production of adhesives and glues.
Enterprise Collaboration System: is a system that combined information from groupware, tools, internet is used to support the company. Example: the company's communication tools such as email, video conferencing, document collaboration and project management tool.
Management Information System: is an information system that provides information needs that organizations need to manage themselves efficiently and effectively, as well as in decision-making. Example: financial reporting, decision support systems.
Decision Support System: is a computer-based information system that is interactive, which help decision makers utilize data and models to solve unstructured problems. Example: profit prediction.
Executive Information System: is an information system that provides the needs required by the executive and  decision-making needs. Example: analysis of the economic case.
Expert System: system used to provide information for complex problems such as those associated with the classification, diagnosis, process control, scheduling and planning. Example: used in products like antilock braking system, television, plant layout and manufacturing, credit granting and loan analysis.
Knowledge Management System: is a knowledge-based information systems and refers to any type of IT systems that support the business processes of information dissemination. Example: e-learning tools.
Strategic Information System: is an information system that helps companies to achieve a competitive advantage through its contribution to the company's strategic objectives. Example: e-business, e-commerce
Functional Business System: is an information system that support operational application and that functions provide decision-makers and information in business operations. Example: human resources management and operations management.

- http://syn-lab.blogspot.com/2010/12/strategic-information-system.html- http://www.knowledge-management-tools.net/knowledge-management-systems.html- http://www.scribd.com/doc/34106619/Executive-Information-System-EIS