Thursday 6 June 2013

E-COMMERCE PADA ZALORA INDONESIA

Halaman Utama Zalora
http://www.zalora.co.id/

Gambaran Umum Sistem Penjualan Zalora 
Sistem penjualan pada Zalora merupakan B2C ( Business to Customer) dimana target pemasaran mereka adalah individu. Sistem penjualan pada Zalora ingin memberikan pengalaman yang berbeda dari pembelian secara fisik.
Zalora berfokus kepada penjualan produk seperti pakaian, sepatu, tas, aksesoris, sports, bahkan produk kecantikan. Zalora menawarkan produk-produk dari berbagai brand terkemuka baik lokal maupun internasional.
Beberapa keunggulan yang diberikan oleh Zalora adalah :
1. menawarkan sistem layanan antar gratis khusus pulau Jawa dan Bali. untuk pulau Sumatra dan Kalimantan dikenakan biaya pengiriman apabila pembelian dibawah Rp 200.000 . Sedangkan wilayah Indonesia Timur dan Nusa Tenggara akan dikenakan biaya kirim apabila pembelian dibawah Rp 300.000. 
2. Sistem COD di berbagai kota besar di Indonesia. Selain itu Zalora juga menyediakan layanan COD menggunakan debit card dan credit card untuk wilayah Jakarta Selatan dan Jakarta Pusat.
3. & hari garansi uang kembali *berlaku ketentuan
Perusahaan juga menyediakan layanan Customer Service untuk seputar pertanyaan, bantuan, dan belanja via telepon dengan nomor : 02129490100
- Senin s.d Jumat : 09.00 - 21.00 WIB
- Sabtu : 09.00 - 13.00 WIB
email : help@zalora.co.id 

Sistem  Pembelian di Zalora (Langkah Kerja)
1. Log in / Daftar
Jika anda sudah pernah berbelanja sebelumnya maka anda akan memiliki akun untuk log in, namun jika anda belum pernah maka anda harus mendaftarkannya terlebih dahulu seperti tampilan berikut ini
Log in / Create

Create ID
Pendaftaran Sukses
Jika anda telah mengikuti step seperti di atas maka anda sudah memiliki akun yang dapat anda gunakan untuk belanja.
contoh :
tampilan memesan produk
Gambar diatas adalah contoh jika anda akan memesan sebuah produk, setelah menentukan yang cocok lalu klik tombol pesan dan secara otomatis akan masuk ke dalam daftar "pesanan saya"
tampilan daftar "pesanan saya"

2. Metode Pembayaran
Zalora menerapkan sistem pembayaran secara online. 
a. Pembayaran bisa dilakukan dengan menggunakan e-credit card. sistem pembayaran ini dapat dilakukan dengan kartu kredit yang dikeluarkan oleh Visa dan Master Cards.
b. Pembayaran bisa dilakukan secara bank transfer, dimana pembeli dapat menggunakan dua sistem rekening yang tersedia yaitu menggunakan BCA atau Mandiri. jika anda memilih membayar dengan cara ini, maka anda diharuskan melakukan konfirmasi seperti pada gambar berikut ini
konfirmasi pembayaran

c. Pembayaran juga dapat dilakukan dengan sistem COD 
3. Sistem Pengiriman Barang
Zalora mengirimkan barang ke seluruh Indonesia dengan melakukan kerjasama beberapa jasa pengiriman barang seperti JNE, Go-jenk, RPX, Ningrat Muda Mandiri, First Logistics. Produk akan dikirim tepat waktu, namun pihak Zalora tidak menjamin apakah produk tersebut sampai di tangan anda tepat waktu. 
Anda dapat melakukan pengecekan status order anda seperti pada gambar berikut ini
Cek status order

Thursday 30 May 2013

Encryption and Decryption

Encryption          :
is a process of converting a plain text or data into cipher text so everyone can not read the data except the sender and the receiver itself. Encryption is the best tool to protect data, privacy, and your secret.

Decryption         :  
is a process of converting a cipher text become data which is needed by the recipient to understand what the sender wants from the encrypted data.

Advantages of encryption :
Guarantee the confidentiality of any information,
Tackling the phone tapping,
Prevent unwanted access to documents and e-mail messages,
High encryption level is difficult to break.

Disdvantages of encryption :
Messages can not be read when the message receiver forget or lost keys
Encryption of terorist planning  

Advantages of Decryption :
Easy to understanding the content of the message

Disadvantages of Decryption :
Because the encryption program can use the same algorithm in different ways, thats why the recipient of the encrypted information must have the same program with the sender to decrypt the data they receive.

Methods of Encryption 
      1. Symetric key encryption

Is a method where the sender and the receiver make a secure internet session by create a single encryption key, so the sender and receiver use the same key.
Symetric encryption is easy and fast to use, but it is not safe because someone could intercept the key and decode the message. But because of its speed, it's commonly used in e-commerce transactions. The strength of the encryption key is measured by its bit length. Today, a typical key will be 128 bits long (a string of 128 binary digits).

2. Public key encryption (asymetric) 
is a method which is more safety than symetric key encryption because it used two keys : one shared (or public key) and one totally private key. 
The public key is made available to anyone who wants to send encrypted information. They just can encoding, not decoding the data. 
The private key stays safe with you. When people want to send encrypted information, they using your public key. When you receive the cipher text, you decrypt it with your private key. Asymetric encryption added level of security to your data, but there is more computing time required, so the process is longer than the symetric key encryption. 
      
How the Symetric key encription and the Public key encryption works?
Symmetric and public key encryption uses two different algorithms to produce ciphertext.
In symmetric encryption, the algorithm breaks down the data into small pieces called blocks. Then it would replace the letters position, change the information in each block into numbers, compresses and expands the data, and then run it through a mathematical formula including the key in it. Then the algorithm will repeats the process.
In Public key encryption (asymetric), the algorithm treats the text as a large number, then multiply it to a larger number, and calculates the remainder after dividing by other third-largest number. Finally, the rest of the number is converted to text back. This algorithm is used in a large and dynamic communication network.

Thursday 4 April 2013

CASE 1 - CHAPTER 8

WHEN ANTIVIRUS SOFTWARE CRIPPLES YOUR COMPUTERS



1. What management, organization, and technology factors were responsible for McAfee's software problem?
  •      Management Factor which causing the McAfee’s software is when the test simulation     were done, management didn’t run these for windows XP with service pack 3. Users using the McAfee Virus Scan were using Widows XP service pack 3 and the viruse scan version 8.7, these affected to faulty update download.
  •      Organization Factor is when the staff didn’t work efficiently. McAfee update  the virus scan that was intended to deal with the new virus named ‘w32/wecorl.a”. but the company doesnt detect the problem that this virus could make itself appears as the name svchost.exe, which a windows file that is critical to PC’s performance.
  •     Technology problem is without the svchost.exe, windows can’t boot properly. McAfee determined that the majority of affected machines were using windows XP  service pack 3 combined with MCAfee Virus scan 8.7. they also noted that  the “Scan Process on Enable” opyion of virus scan, off by default in most Virus scan installation, was turned on in the majority of effected computers.

2.  What was the business impact of this software problem, both for McAfee and for its costumers?
  •  The business impact is the reputation to the McAfee company was dropped. Besides that, the customer also get the impact because the users’ computer were crippled or totally not functional.

3. If you were a McAfee enterprise costumer, would you consider McAfee's response to the problem be acceptable? Why or why not?
  •     If i were an enterprise customer, I would consider McAfee’s response to the problem is not be acceptable. Because the slipup caused the system becomes unsecured. McAfee also makes a mistake that without the svchost.exe, windows can’t boot properly. Virus scan users applied the update, tried rebooting their systems, and were powerless to act as their systems went haywire, repeatedely rebooting, losing their network capabilities and their ability to detect USB drivrs, which is the only way of fixing affected computers.

4. What should McAfee do in the future to avoid similar problems?
  •            They should implement the additional QA protocols for any releases that directly impact critical system files. McAfee is also rolling out additional capabilities in Artemis that will provide another level of protection against false positives by leveraging an expensive whitelist of critical system files and their associated cryptographic hashes.





Group : 
  1. Indah Purnamasari E (C1L011007) , http://indahpurnamasarieroika.blogspot.com/
  2. Handhika Tiyakusuma (C1L011010) , http://handhikatiyakusuma.blogspot.com/
  3. Parama Anisa F (C1L011016)
  4. Santy Arlieza W (C1L011021) , http://santyarlieza.blogspot.com/

Thursday 21 March 2013

PURPOSES OF INFORMATION SYSTEM

  • TRANSACTION PROCESSING SYSTEM

Computerized system that performs and record the daily routine transaction of the business.
Examples : accounting system , purchase order processing.

  • PROCESS CONTROL SYSTEM
Is a process that controlling and monitoring process in an industry.
Examples : electricity

  • ENTERPRISE COLLABORATION SYSTEM
Information system used to facilitate sharing document between team, and make us work together easily and effectively.
Examples : email, video conference, project management tools.

  • MANAGEMENT INFORMATION SYSTEM
Provide information needs of an organization's management at every level in making strategic decision.
Examples : sales analysis, financial report.

  • DECISION SUPPORT SYSTEM
Provides the management operations, planning levels of an organization to help making decision.
Examples : risk analysis system, profit prediction.

  • EXECUTIVE INFORMATION SYSTEM
an information system from MIS or DSS that support the managers and executives in decision making.
Examples : action of competitors, economic analysis.

  • EXPERT SYSTEM
Is aknowledge-based information system that use its knowledge to act like an expert consultant for user.
Examples : diagnostic maintenance system

  • KNOWLEDGE MANAGEMENT SYSTEM
is a knowledge-based system that support the creation, organize, improved performance of business knowledge.
Examples : sales proposal strategies, e-learning tools.

  • STRATEGIC INFORMATION SYSTEM
Support operation that provide a firms strategic product, services, and capabilities for competitive advantages.
Examples : e-commerce, e-business.

  • FUNCTIONAL BUSINESS SYSTEM
an information system that support operational and managerial application of the basic business of a company.
Examples : human resource.