Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES IT Environment IT strategy IT infrastructure IT function Systems development process Business Strategy and the Value Chain Alternative strategies IT and value-chain management IT and Multi-User Systems Terminal emulation File-server approach Client-server systems E-Business E-business basics Static and dynamic Web pages for e-business applications Client tier Middle tier Bottom tier E-Business E-business and business processes Interacting with customers Interacting with suppliers Internal operations Organizing and Analyzing Data Data warehousing Integrated data Nonvolatile data Summary and detailed data Multi-dimensional data Data mining E-commerce and data mining Integrating Business Processes, Data, and Applications Enterprise resource planning (ERP) systems Magnitude and scope of ERP systems Selection and use of ERP Integration of the supply chain through e-commerce Integrating Business Processes, Data, and Applications XML (Extensible Markup Language) Relational databases and data integrity Customer relationship management systems IT and Business Processes: Risks and Controls Privacy Data collection User control Privacy policies Secure transactions Encryption and authentication Digital signatures, hashing, and message integrity Digital certificates Timestamping IT and Business Processes: A Role for Accountants Assurance services Analyze IT investments Design and implement IT solutions Enhance value of current services KEYTERMS Asymmetric key encryption Bottom tier Classification tree Client-server system Client tier Cookie Customer relationship management (CRM) system Data mining KEYTERMS Data warehouse Dynamic Web pages E-business E-commerce Electronic data interchange (EDI) Enterprise resource planning (ERP) system KEYTERMS Extranets File server Firewall Genetic algorithm HTML (Hypertext Markup Language) Information technology (IT) environment KEYTERMS Internet protocol (IP) address Intranet IT function IT infrastructure IT strategy Local area network (LAN) KEYTERMS Middle tier Multi-dimensional analysis Neural nets OLTP OLAP Personally identifiable information Static Web pages KEYTERMS Statistical analysis Symmetric key encryption Systems development process Terminal emulation Three-tier, client-server architecture KEYTERMS Value chain Wide area networks (WAN) XML (Extensible Markup Language) XML Schema XSL (Extensible Style Sheet Language)
© Copyright 2026 Paperzz