الأحد، 5 يناير 2014




Sultan Qaboos University, located in Al Khoudh in the Muscat Governorate, is the only public university in the Sultanate of Oman.
Most students entering the university are selected based on their performance in high school final examinations. Student enrollment has grown from 500 in 1986 to more than 10,000 in 2005. More than half of the students live off campus due to space constraints. It currently has around 15,357 students of which 7,942 are female students and 7,415 are male students.








Sultan Qaboos University
Sultan Qaboos University.jpg
Established1986
TypePublic
LocationMuscat, Oman
Websitewww.squ.edu.om

real madrid C.F

Real Madrid
Real Madrid C.F. emblem
Full nameReal Madrid Club de Fútbol[1]
Nickname(s)Los Blancos (The Whites) Los Merengues (The Meringues) Los Vikingos (The Vikings)[2]
Founded6 March 1902; 111 years ago (1902-03-06)
as Madrid Football Club[3]
GroundEstadio Santiago Bernabéu
Ground Capacity85,454[4]
PresidentFlorentino Pérez
ManagerCarlo Ancelotti[5]
LeagueLa Liga
2012–13La Liga, 2nd
WebsiteClub home page
Home colours
Away colours
Third colours
Current season
Real Madrid Club de Fútbol (Spanish pronunciation: [reˈal maˈðɾið ˈkluβ ðe ˈfuðβol]; Royal Madrid Football Club), commonly known as Real Madrid, is a professional football club based in Madrid, Spain.
Founded in 1902 as Madrid Football Club, has traditionally worn a white home kit since. The word Real is Spanish for royal and was bestowed to the club by King Alfonso XIII in 1920 together with the royal crown in the emblem. The team has played its home matches in the 85,454-capacity Santiago Bernabéu Stadium in downtown Madrid since 1947. Unlike most European football clubs, Real Madrid's members (socios) have owned and operated the club since its inception.
The club is the world's richest football club in terms of revenue, with an annual turnover of €513million, and the most valuable sports team, worth €3.3billion.[6][7][8] It is one of three clubs to have never been relegated from the top flight of Spanish football, along with Athletic Bilbao and Barcelona. Real Madrid holds many long-standing rivalries, most notably El Clásico with FC Barcelona and El Derbi madrileño with Atlético Madrid.
The club established itself as a major force in both Spanish and European football during the 1950s. Domestically, Real Madrid has won a record 32 La Liga titles, 18 Copas del Rey, 9 Supercopas de España, 1 Copa Eva Duarte and 1 Copa de la Liga.[9] Internationally it has won a record nine European Cup/UEFA Champions League titles and a joint record three Intercontinental Cups, as well as two UEFA Cups, and one UEFA Super Cup.

Electronic Commerce: Applications and Issues

Overview of E-Business & E-Commerce:
o Electronic commerce (e-commerce, EC) describes the buying, selling, transferring or exchanging of products, services or information via computer networks, including the Internet.
o E-business is a broader definition of EC, including buying and selling of goods and services, and also servicing customers, collaborating with partners, conducting e-learning and conducting electronic transactions within an organization.

o Types of E-Commerce:
1. Business-to-Consumer (B2C)
2. Business-to-Business (B2B)
3. Consumer-to-Consumer (C2C)
4. Business-to-Employee (B2E)
5. E-Government
6. Mobile Commerce (m-commerce)

o Benefits of E-Commerce:
§ Benefits to organizations
          o Makes national and international markets more accessible.
          o Lowering costs of processing, distributing, and retrieving information.

§ Benefits to customers
o Access a vast number of products and services around the clock (24/7/365).

§ Benefits to Society
o Ability to easily and conveniently deliver information, services and products to people in cities, rural areas and developing countries.

o Limitations of E-Commerce:
§ Technological Limitations
          o Lack of universally accepted security standards
          o Insufficient telecommunications bandwidth
          o Expensive accessibility
§ Non-technological Limitations
          o Perception that EC is unsecure
          o Unresolved legal issues
          o Lacks a critical mass of sellers and buyers

· Business-to-Consumer (B2C) Electronic Commerce:

o An electronic storefront is a Web site that represents a single store.
o Electronic malls are collections of individual shops under a single Internet address.
o B2C electronic commerce is also known as e-tailing.

o Issues in E-Tailing:
§ Channel conflict occurs when manufacturers disinter mediate their channel partners, such as distributors, retailers, dealers, and sales representatives, by selling their products directly to consumers, usually over the Internet through electronic commerce.
§ Order fulfillment involves finding the product to be shipped; packaging the product; arrange for speedy delivery to the customer; and handle the return of unwanted or defective products.

· Business-to-Business (B2B) Electronic Commerce:
o In B2B e-commerce, the buyers and sellers are organizations.

o B2B Sell-Side Marketplace:
 § In the sell-side marketplace, organizations sell their products or services to other organizations electronically from their own Web site and/or from a third-party Web site.

 

 
o B2B Buy-Side Marketplace:
§ The buy-side marketplace is a model in which organizations buy needed products and services from other organizations electronically.


 

 
o Electronic Exchanges:
§ Exchanges have many buyers and many sellers.




 

 
· Electronic Payments:


o Electronic payment systems enable you to pay for goods and services electronically.
§ Electronic checks (e-checks)
§ Electronic credit cards
§ Purchasing cards
§ Electronic cash
          1. Stored-value money cards
          2. Smart cards
          3. Person-to-person payments

Electronic Commerce: Applications and Issues

 Overview of E-Business & E-Commerce:
o Electronic commerce (e-commerce, EC) describes the buying, selling, transferring or exchanging of products, services or information via computer networks, including the Internet.
o E-business is a broader definition of EC, including buying and selling of goods and services, and also servicing customers, collaborating with partners, conducting e-learning and conducting electronic transactions within an organization.

o Types of E-Commerce:
1. Business-to-Consumer (B2C)
2. Business-to-Business (B2B)
3. Consumer-to-Consumer (C2C)
4. Business-to-Employee (B2E)
5. E-Government
6. Mobile Commerce (m-commerce)

o Benefits of E-Commerce:
§ Benefits to organizations
          o Makes national and international markets more accessible.
          o Lowering costs of processing, distributing, and retrieving information.

§ Benefits to customers
o Access a vast number of products and services around the clock (24/7/365).

§ Benefits to Society
o Ability to easily and conveniently deliver information, services and products to people in cities, rural areas and developing countries.

o Limitations of E-Commerce:
§ Technological Limitations
          o Lack of universally accepted security standards
          o Insufficient telecommunications bandwidth
          o Expensive accessibility
§ Non-technological Limitations
          o Perception that EC is unsecure
          o Unresolved legal issues
          o Lacks a critical mass of sellers and buyers

· Business-to-Consumer (B2C) Electronic Commerce:
o An electronic storefront is a Web site that represents a single store.
o Electronic malls are collections of individual shops under a single Internet address.
o B2C electronic commerce is also known as e-tailing.

o Issues in E-Tailing:
§ Channel conflict occurs when manufacturers disinter mediate their channel partners, such as distributors, retailers, dealers, and sales representatives, by selling their products directly to consumers, usually over the Internet through electronic commerce.
§ Order fulfillment involves finding the product to be shipped; packaging the product; arrange for speedy delivery to the customer; and handle the return of unwanted or defective products.

· Business-to-Business (B2B) Electronic Commerce:
o In B2B e-commerce, the buyers and sellers are organizations.

o B2B Sell-Side Marketplace:
 § In the sell-side marketplace, organizations sell their products or services to other organizations electronically from their own Web site and/or from a third-party Web site.
 
 
o B2B Buy-Side Marketplace:
§ The buy-side marketplace is a model in which organizations buy needed products and services from other organizations electronically.

 
 
o Electronic Exchanges:
§ Exchanges have many buyers and many sellers.


 
 
· Electronic Payments:


o Electronic payment systems enable you to pay for goods and services electronically.
§ Electronic checks (e-checks)
§ Electronic credit cards
§ Purchasing cards
§ Electronic cash
          1. Stored-value money cards
          2. Smart cards
          3. Person-to-person payments

Information Systems: Ethics, Privacy and Information Security

I have learned many concepts and information from this chapter. I summarized them as follow:

· Ethical Issues:
Ethics. A branch of philosophy that deals with what is considered to be right and wrong.
A Code of Ethics is a collection of principles that are intended to guide decision making by members of an organization.

· Fundamental Tenets of Ethics:
         o Responsibility means that you accept the consequences of your decisions and actions.
         o Accountability means a determination of who is responsible for actions that were taken.
         o Liability is a legal concept meaning that individuals have the right to recover the damages done to them by other individuals, organizations, or systems.

· The Four Categories of Ethical Issues:
         o Privacy Issues involve collecting, storing and disseminating information about individuals.
         o Accuracy Issues involve the authenticity, fidelity and accuracy of information that is collected and processed.
         o Property Issues involve the ownership and value of information.
         o Accessibility Issues revolve around who should have access to information and whether they should have to pay for this access.

· Privacy
Privacy is the right to be left alone and to be free of unreasonable personal intrusions.

· Threats to Privacy:
         o Data aggregators, digital dossiers, and profiling
         o Electronic Surveillance
         o Personal Information in Databases
         o Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites

· Protecting Privacy:
         o Opt-out model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
         o Opt-in model of informed consent means that organizations are prohibited from collecting any personal information unless the customer specifically authorizes it.

· Threats to Information Security:
Key Information Security Terms:
         o A threat to an information resource is any danger to which a system may be exposed.
         o The exposure of an information resources is the harm, loss or damage that can result if a threat compromises that resource.
         o A system’s vulnerability is the possibility that the system will suffer harm by a threat.
         o Risk is the likelihood that a threat will occur.
         o Information system controls are the procedures, devices, or software aimed at preventing a compromise to the system.

o Categories of Threats to Information Systems:
         1. Unintentional acts
         2. Natural disasters
         3. Technical failures
         4. Management failures
         5. Deliberate acts
· Protecting Information Resources:
o Risk Management:
         1. Risk: The probability that a threat will impact an information resource.
         2. Risk management: To identify, control and minimize the impact of threats.
         3. Risk analysis: To assess the value of each asset being protected, estimate the probability it might be compromised, and compare the probable costs of it being compromised with the cost of protecting it.

o Risk mitigation is when the organization takes concrete actions against risk. It has two functions:
         1. Implement controls to prevent identified threats from occurring.
         2. Developing a means of recovery should the threat become a reality.

· Information Systems Auditing:
o Types of Auditors and Audits:
         1. Internal. Performed by corporate internal auditors.
         2. External. Reviews internal audit as well as the inputs, processing and outputs of information systems.
o IS Auditing Procedure:
         1. Auditing around the computer means verifying processing by checking for known outputs or specific inputs.
         2. Auditing through the computer means inputs, outputs and processing are checked.
         3. Auditing with the computer means using a combination of client data, auditor software, and client and auditor hardware.

The Modern Organization Functioning in a Global Environment

I have learned many concepts and information from this chapter about business processes and business process management, business pressures. I summarized them as follows:

A business process is a collection of related activities that produce a product or a service of value to the organization, its business partners, and/or its customers.
 
Business process management is a management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes.
 
Data Item: Elementary description of things, events, activities and transactions that are recorded, classified and stored but are not organized to convey any specific meaning.
 
Information: Data organized so that they have meaning and value to the recipient.
 
Knowledge: Data and/or information organized and processed to convey understanding, experience, accumulated learning and expertise as they apply to a current problem or activity.
 
Information Technology Architecture: A high-level map or plan of the information assets in an organization, which guides current operations and is a blueprint for future directions.






Information Technology Infrastructure: The physical facilities, IT components, IT services and management that support an entire organization.



IT components consist of hardware, software, telecommunications and networks, and wireless communications.
 
IT services consist of data management, managing security and risk, and systems development.
 
IT infrastructure consists of IT components, IT personnel, and IT services.