E-COMMERCE IWEARUP





iwearUP Overview

iwearUP sales system on a B2C (Business to Customer) where the targets market are individual. System sales in iwearUP want to provide a different experience than buying physical. 

UP focus on selling kinds variety of women's shoes. UP shoes are made-to-order, which helps us minimize waste and inventory cost. By doing so, they are able to offer us affordable prices at the expense of your 14 working-days of wait.

Made-to-order is the other term for "pre-order", where only produce shoes after receiving an order. Doing this allows to minimize our waste and inventory cost as low as possible, which in return enables us to keep the prices low for customers' benefit.

UP only available online because they prefer to keep things simple and cost-efficient. By being cost-efficient, they get to offer customers low prices and great service.


How to Shop

  

1. Go to the shop page
2. Select the shoe you wish to order
3. Choose quantity and size, then click ADD TO SHOPPING BASKET
4. Click I STILL WANT TO SHOOP to continue shopping & add more shoes. When done shopping, click I'M DONE & READY TO ORDER
5. Enter your contact detail. Login if you are already to member. Signup if you are not yet a member.
6. Review your order, read and agree to the disclaimer, then click MAKE ORDER to finalize your order.


How to Pay


A confirmation email acts as an invoice, and consists of post-order information you need to know to finalize your order, basically  their ACCOUNT NO. and your ORDER ID. Kindly transfer your payment to one of the accounts specified in the confirmation email, which is for Indonesian-based customers, you can make payment via Bank Transfer (using ATM, m-banking, e-banking), Cash Deposit (using a Cash Deposit machine or visiting a bank and paying through the teller) or Credit Card (Visa or Masterbank). For international customers, you can either pay via Paypal, Western Union or Credit Card (Visa or Masterbank).

After completing your payment, please visit back the website www.iwearUP.com and click CONFIRM PAYMENT on the top-right to let their know that you have made the payment. On this page, enter your ORDER ID, then fill in the details of the account you used for making your payment. If payment is not completed within 5 days, your order will automatically be cancelled.


Delivery Time and Fee

UP shoes are made-to-order, which help to minimize waste and inventory cost, and offer you affordable prices. Your shoes will be delivered in around 14 working-days after they have verified your payment.
  • Working-days exclude Saturday, Sunday and public holidays.
  • There may be extensions or delay in the production and delivery time especially during times of high demand.
  • Delivery time might take longer for international customers.

The local and international delivery is both done via a local courier service provider. Your delivery fee will appear in the Confirm Order page, which shows after you have selected your shoes and completed your contact details.


Return and Exchange Policy

Returns can be made ONLY if the goods are damaged – communicated to them no longer than 2 days after goods have arrived at your side. If this happens, send an email to iwearUP@gmail.com.
Shoes must be returned new, unused, and inside the shoe box. Returns that are damaged or dirty will not be accepted and may be sent back to the customer.
UP does NOT accept any size exchanges, or exchanges due to dislikes on product, color or style after reception of goods.


Customer Care

Phone : +6221-7070 2749
Monday - Friday
08.00 am - 5.00 pm GMT +7





Encryption and Decryption


Encryption is a way to improve the security of a message or file by converting data into ciphertext form, so it can not be understood by just anyone. Encryption can keep the confidentiality of messages, but still requires other techniques to protect the authenticity of the message. To recover encrypted data, the correct decryption key is required. The key is the algorithm Cancels the encryption algorithm. Alternatively, a computer can used in an attempt to crack the password. Encrypting File System (EFS) is a feature of Windows that allows you to store information on your hard disk in an encrypted format.

To encrypt a folder or file
  1. Right-click the folder or file you want to encrypt, and then click Properties.
  2. Click the General tab, and then click Advanced.
  3. Select the Encrypt contents to secure data check box, and then click OK.


Decryption is the process of converting encoded or encrypted data back into its original form that you or the computer can read and understand. Encryption or decryption is very important in wireless communication because wireless circuits are easier to tap. However, the encryption or decryption is a good idea when doing any kind of sensitive transactions, such as credit card purchases online, or discussion of a company secret between different departments within the organization.

To decrypt a folder or file :

  1. Right-click the folder or file you want to decrypt, and then click Properties.
  2. Click the General tab, and then click Advanced.
  3. Clear the Encrypt contents to secure data check box, and then click OK.

Sources:

Microsoft Access Database Related


Group:
1. Danang Agustiar Rifani   (C1L011002)
2. Rayi Susilo Praharsini     (C1L011015)
3. Farida Nur Aida             (C1L011027)

This is the preview of our database related in Ms. Access






CASE STUDY CHAPTER 7



CASE 1.

1. Yes, Managers should , because it's good action to prevent companies loss profit and productivity. If an employee does anything bad on the internet, the company is responsible for the action, since the computer is under the company name. So, it is just best for the business if managers monitor employee e-mails and internet usage.

2. I will provide the employees 15 minutes a day as their break time. Beyond that though, that time gets deducted from their paycheck because they are technically not on the clock if they are on the internet rather than doing their jobs.

3. The policies should also inform employees whether these activities are monitored and explain why. It would cause the employees to be more productive knowing they can't use the internet for personal use if they're being monitored.


CASE 2.

1. Apple, Google, and Microsoft already compete in an assortment of fields. Google has a huge edge in advertising, thanks to its dominance in Internet search. Microsoft’s offering, Bing, has grown to about 10 percent of the search market, and the rest essentially belongs to Google. Apple is the leader in mobile software applications, thanks to the popularity of the App Store for its iPhones. Google and Microsoft have less popular app offerings on the Web. Microsoft is still the leader in PC operating system and desktop productivity software.

4. I think Google will prevail this epic struggle, because Google has a huge edge in advertising. And Google’s efforts to take on Apple began when it acquired Android, Inc., the developer of the mobile operating system of the same name by adding features that Apple’s offerings lacked, such as the ability to run multiple apps at once.

5. Consumers would be forced to buy only one product and use only one service. They would create a monopoly and the positive would be they would create a standard. This would affect quality; prices would be as high as possible because they would have no competition. No competition means nobody could force a monopolist from the outside to improve products, diversify rang or products and lower price. Right now it is too early to tell who would dominate the internet experience but it is good to have competition than just one market leader.

INFORMATION SYSTEMS



Transaction Processing Systems is an information processing system for the collection, storage, modification and retrieval of all transaction data.
Example: the systems employed by major credit card companies found in retail store

Process Control System is used to control and monitor industrial processes.
Example: thermostat
  
Enterprise Collaboration Systems is an information system which is a combination of groupware, tools, internet, extranets, and other networks used to facilitate efficient sharing of documents and knowledge between teams and individuals in an enterprise.
Example: video conference, email

Management Information Systems is an information system that gives information to help organizations in making decisions and manage themselves better.
Example: sales analysis, inventory performance, production performance

Decision Support Systems is a form of management information systems specifically designed to support planners and stakeholders in decision-making
Example: profit prediction, product pricing

Executive Information System is a type of management information system to inform from MIS or DSS that facilitate and support the decision-making needs of senior executives.
Example: actions of competitors

Expert Systems is a computer systems that perform a task by a human expert and is designed to solve complex problems with reasoning about knowledge.
Example: financial forecasts, diagnose human illnesses, and schedule routes for delivery vehicles

Knowledge Management Systems is an expression that describes a set of strategies, systems and techniques used by organizations to create, represent, distribute and enable adoption of insights and experiences.
Example: term bank construction, system design and specification, documentation or ontology design for language processing

Strategic Information Systems is a computer system that helps organizations in implementing business strategy to achieve a particular aim, or gain an advantage over similar organizations.
Example: e-business, online stock trading

Functional Busines Systems is a process that provides information on daily business operations that is used as a delivery mechanism for providing specific goods or services to customers.
Example: finance, accounting, operations management, marketing
Copyright 2009 Management Information System. All rights reserved.
Bread Machine Reviews | watch free movies online by Blogger Templates