Cyberspace and The Information Superhighway
Cyberspace and The Information Superhighway
Cyberspace and The Information Superhighway
There are two terms associated with the Internet and the Web. One is Cyberspace and the other
is the information superhighway. The term cyberspace was coined in 1984, when author
William Gibson used it in this book Neuromancer to describe as society that had been a slave
to technology.
In spite of this depressing origin the term became associated with the layer of electronic
computer transmissions that blanket the globe. Today, cyberspace means the world of the
Internet and the World Wide Web (WWW).
The term information superhighway is also used in the same context, but there is not complete
agreement concerning its eventual impact on society. The term is normally used to describe a
positive force that gives everyone access to the wealth of information that exists in our modern
society.
Information Superhighway
“There will be a road that will not connect two points. It will connect all points”
“There will be no more there. We will all only be here.”
Internet Model
Both the Internet and the Web conform to client/server architecture. This is currently the most
popular way to use an enterprise-wide network in business, and it involves the central computer
performing the role of server and the user at their workstation representing clients.
In addition to the Web, there are other client/server information retrieval system that can use
the Internet. Three of these systems include Gopher, WAIS and USENET.
WAIS – WAIS (Wide Area Information Server) is a system used for locating and retrieving
textual material. It has limited navigational ability, and for that reason it has not enjoyed as
much popularity as Gopher and the Web
USENET – The Internet has made it possible for persons with similar interest, called
newsgroups, to exchange information electronically, USENET is the name given to the sites that
have agreed to participate in the transmission of message among thousands of news groups.
USENET can be accessed from the Web browser
Figure 3.15
Figure 3.15 is an Internet model that shows how FTP, Newsgroups, Gopher, WAIS and HTTP
are integrated into the Internet client/server architecture. The clients are the top, using a variety
of hardware platforms. The various addressing schemes protocols connect the clients to the
server, which provides access to the database of hypermedia.
Internet Standards
A major reason why the Internet and the Web have been received with open arms by computer
users around the world is because the two work together as a single system that can be used
from any computer platform. A user at a Dell PC or a Sun workstation can retrieve the same
Web page as a user at Power Mac. To make this possible, everyone contributing to the Internet
and Web Architecture must follow the same rules
Two organizations have assumed roles of leadership in established Internet and Web standards.
The Internet Society was formed in 1992 to promote commercial uses and has delegated
responsibility for Internet standards to the IETF (Internet Engineering task Force). Web
standards come from the World-Wide-Web Consortium (w3c)
Example of rules: Using font-family in the css rule to display the font usage in any platform.
Another for every HTML tag it should be closed (</body>).
Internet Security
There are not many flaws in the Internet, but one that has the potential to constrain business
use is the lack of security. In Chapter 22, when we discuss the information services function, we
describe how firms go to great lengths to keep their information resources secure. The resources
have maximum risk exposure when they are linked to a data communication network, and when
that network has the scale and number of users of the Internet, the risks increase significantly.
Hackers and other computer criminals can enter a firm’s computer network through its Web
site.
Normally, if someone holds the trademark on a name, he or she is entitled to the URL even
though someone else may already have it. When there is a conflict, Network Solutions put the
URL “on hold,” and nobody can use it until the issue is resolved by the two parties – in or out of
the court
One approach is to physically separate the Web site from the firm’s internal
network, which contains its data and information resources. Another is to provide trading
partners with passwords that enable them to enter the internal network through
the Internet. A third approach is to build a protective wall (Firewall). This is the same
strategy used by buildings to keep fires from spreading from one unit to another
Firewall on
Construction
Firewalls can provide varying degrees of security depending on the type Three types include
packet-filtering, circuit-level, and application-level.
Circuit-Level Firewall A step up from the router is a computer that is installed between the
Internet and internal network. The computer makes it possible to integrate a higher level of
authentication logic into the filtering process. However, the limitation of a single point of
security still applies. The network programmer creates the necessary code that the computer
executes for all transactions.
Simply put the Internet can be used for any business application that involves data
communication, including both communications inside the firm and with the environment.
Many firms used the Internet for internal communications, an application communications
called the Intranet. We describe the Intranet in Chapter 11 when we address data
communications. In the previous chapter we discussed Electronic Commerce,
IOS(Interorganizational System), and EDI(Electronic Data Interchange) they can all use the
Internet.
The Internet can be used with any computer with any computer platform without making a
special effort. This is a big advantage. The Web protocol and browser are also much easier to
learn and use than the query languages that are normally used to retrieve information from
databases. In addition, the internet makes it possible to transmit a wider variety of media than
may firms handle over their conventional networks.
All areas of the firm can use the internet, but if there’s an area that would truly benefit the full
potential of internet, it would be marketing area. That is because so many of the Internet users
are potential consumer of the firm’s products and services. In addition, the Internet provides
marketers with a way of staying current on competitors.
Marketing Research
The Golden Rule of marketing could well be: “Know your customer.” The reasoning is that if you
do not know what the customer needs, you cannot meet those needs. A big segment of
marketing is industrial marketing
Diagram
Gopher WAIS
USENET
Internet Web