Modul Analisis Dan Desain
Modul Analisis Dan Desain
CHAPTER 11
ANALYSIS AND DESIGN
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.2
Learning outcomes
Summarize approaches for analyzing requirements
for e-business systems
Identify key elements of approaches to improve the
interface design and security design of e-commerce
systems.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.3
Management issues
What are the critical success factors for analysis and
design of e-business systems?
What is the balance between requirements for usable
and secure systems and the costs of designing them in
this manner?
What are the best approaches for incorporating new
IS solutions with legacy systems into the architectural
design of the
e-business?
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.4
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.5
Workflow management
Workflow is
‘the automation of a business process, in whole or part
during which documents, information or tasks are
passed from one participant to another for action,
according to a set of procedural rules.’
Examples:
Booking a holiday
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.6
BizFlow
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.7
Process modelling
Often use a hierarchical method of establishing
the processes and their constituent
sub-processes
the dependencies between processes
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.8
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Figure 11.1 An example task decomposition for an estate agency
Source: Adapted from Chaffey (1998)
Slide 11.10
Process dependencies
Summarize the order in which activity occur
according to the business rules
Data flow diagrams and flow charts are widely
used as diagramming techniques
Flow process charts
Network diagrams
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Figure 11.2 Symbols used for flow process charts
Flow process chart showing the main operations performed by users
Figure 11.3
when working using workflow software
Table 11.5 Elements of the event-driven process chain (EPC) model
Figure 11.4 General model for the EPC process definition model
Slide 11.15
Data modelling
Uses well established techniques used for relational
database design
Stages:
1. Identify entities
2. Identify attributes of entities
3. Identify relationships.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Figure 11.5 Generic B2C ER diagram
Slide 11.17
Identify entities
Entities define the broad groupings of information such as
information about different people, transactions or products.
Examples include customer, employee, sales orders, purchase
orders. When the design is implemented each design will form a
database table.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.18
Identify attributes
Entities have different properties known as attributes that
describe the characteristics of any single instance of an entity.
For example, the customer entity has attributes such as name,
phone number and e-mail address. When the design is
implemented each attribute will form a field, and the collection
of fields for one instance of the entity such as a particular
customer will form a record.
Attribute A property or characteristic of an entity,
implementation as field.
Field Attributes of products, example date of birth.
Record A collection of fields for one instance of an entity,
example Customer Smith.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.19
Identify relationships
The relationships between entities requires identification of which fields are
used to link the tables. For example, for each order a customer places we
need to know which customer has placed the order and which product they
have ordered. As is evident from Figure 11.5, the fields customer id and
product id are used to relate the order information between the three tables.
The fields that are used to relate tables are referred to as key fields. A
primary key is used to uniquely identify each instance of an entity and a
secondary key is used to link to a primary key in another table.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.20
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Figure 11.6 Three-tier client server in an e-business environment
Slide 11.22
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Figure 11.7 E-business architecture for The B2C Company
Slide 11.24
User-centred design
Unless a web site meets the needs of the intended users
it will not meet the needs of the organization providing
the web site.
(Bevan, 1999a)
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.25
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.26
Usability
An approach to web-site design intended to enable
the completion of user tasks
Involves two key project activities:
Expert reviews
Usability testing
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.27
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.28
Use-case analysis
The use-case method of process analysis and modelling was
developed in the early 1990s as part of the development of
object-oriented techniques. It is part of a methodology known as
Unified Modelling Language (UML) that attempts to unify the
approaches that preceded it such as the Booch, OMT and
Objectory notations.
Use-case modelling A user-centred approach to modelling
system requirements.
Unified Modelling Language (UML) A language used to
specify, visualize and document the artefacts of an object-
oriented system.
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.29
Benefits of personas
Fostering customer centricity
Identifies detailed information needs and steps
Test existing web-site design
To compare and test the strength and clarity of
communication
Can be linked to marketing
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.30
Developing a persona
1. Build personal attributes into personas
2. Remember that personas are only models of
characteristics and environment
3. Different scenarios can be developed for each
persona
Info-seeking scenario
Purchase scenario
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.31
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Relationship between actors and use-cases for The B2C Company, sell-
Figure 11.8
side e-commerce site
Figure 11.9 Primary use-case scenario for an entire e-commerce purchase cycle
Slide 11.34
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Figure 11.10 Primary scenario for the Register use-cases for The B2C Company
Clear user scenario options at the RS Components site
Figure 11.11
(www.rswww.com)
Slide 11.37
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Site structure diagram (blueprint) showing layout and relationship
Figure 11.12
between pages
Figure 11.13 Example wireframe for a children’s toy site
Slide 11.40
Principle 1: Standards
‘Users spend most of their time on other sites. This
means that users prefer your site to work the same
way as all the other sites they already know…
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.43
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.44
Customer orientation
Web users are notoriously fickle
Nielsen www.useit.com
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.45
Dell.com
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Figure 11.14 Different types of audience for the web site of The B2B Company
Slide 11.47
Browser configuration
Text size
Plug-ins.
www.usability.serco.com
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.48
Site personality
How would you describe the site if it were a person? E.g.
Formal, Fun, Engaging, Entertaining, Professional
Site style
Information vs graphics intensive
Cluttered vs Clean
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.49
(d)
(c)
Back
DTI Cisco
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.50
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Figure 11.15 (a) Narrow and deep and (b) broad and shallow organization schemes
Slide 11.52
Navigation (Continued)
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.53
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.54
Web accessibility
Number of visually impaired people
Number of users of less popular browsers or
variation in screen display resolution
More visitors from natural listings of search engines
Legal requirements
http://www.w3.org/TR/WCAG10/
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.55
Priority levels
Priority 1 (Level A)
Web developer must satisfy this checkpoints
Priority 2 (Level AA)
Web developer should satisfy this checkpoints
Priority 3 (Level AAA)
Web developer may address this checkpoints
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.56
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Figure 11.16 HSBC Global home page (www.hsbc.com)
Slide 11.58
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Figure 11.17 UK information security breaches
Source: DTI (2006) Department of Trade and Industry Information Security Breaches Survey. Executive Summary 2006
Slide 11.60
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Figure 11.18 The geographic spread of the ‘Slammer’ worm 30 minutes after release
Source: Code Red (CRv2) Spread Animation. Copyright © 2001 The Regents of the University of California www-cse.ucsd.edu/~savage/ papers/IEEESP03.pdf
Slide 11.62
Monitoring of electronic
communications
Employee communications monitoring
Acceptable-use policy
Scanning software
Filtering software
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Figure 11.19 Staff misuse of web and e-mail
Source: DTI (2006) Department of Trade and Industry Information Security Breaches Survey
Figure 11.20 Example rules triggered by e-mail in MailMarshal SMTP from Marshal
Source: Marshal Ltd. www.marshal.com
Figure 11.21 Employee controls (a) governance and (b) technical solutions
Source: DTI (2006) Department of Trade and Industry Information Security Breaches Survey
Slide 11.66
E-mail management
To minimize the volume
Spam
Internalbusiness email
External business e-mail
Personal e-mail
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Figure 11.22 Proportion of global e-mail traffic which is spam
Source: MessageLabs (2006)
Slide 11.68
Minimizing spam
1. Avoid harvesting of addresses
2. Educate staff not to reply to spam
3. Use filters
4. Use ‘peer-to-peer’ blocking services
5. Use blacklist services
6. Use whitelist services
7. Ensure anti-virus software and blocking is effective
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Figure 11.23 Progression of attempts to combat spam
Slide 11.70
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Slide 11.71
Security Attacks
Hacking
Phishing
Denial-of-service attacks
Dave Chaffey, E-Business and E-Commerce Management, 3rd Edition © Marketing Insights Ltd 2007
Figure 11.24 Public-key or asymmetric encryption