When it comes to IT Information Planning, it is very import to lay out the details of each area of this business. The IT Information Planning stage is when to decide on the IT Infrastructure which encompasses the technology and equipment required from the front end to the backend of the system. In this case, that will involve beginning with the customer as they enter a Starbucks store, browse the Apple iTunes music store, browse, and purchase and then download music back to the customers’ device. This will include the technology and equipment required from the customer, Starbucks and iTunes to make the transactions all complete. Along with the planning for the successful completion it is necessary to plan for when failures will occur. This includes planning for the points in the process where the failure(s) can occur and what resolution for each failure will be, along with who will be responsible for the resolution. It is important to understand what the long term effects of the failure could mean to the business. One very good way to document this information is with an Information Flow Diagram. This will depict the resources involved in the flow of information throughout the process. Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are required. The protocol for connecting wirelessly to access points must be of the highest quality. The security of the connection between access points must be the best it possibly can be. And finally, the security from the device itself must be effective to safeguard any monetary transactions and data.
Information Flow (Part I)
ITunes has made it very easy to log on and create an account with them. Creating an account is free. All you need to do is log on to http://www.itunes.com . There is a button you can click on to log-in and another you can click on to register. Click on the button to register. You will need to enter your email address, First and Last Name, Billing Address and Credit Card Information. Your email address will be used if ITunes needs to contact you about your account for any reason. Your Name and Address, along with your Credit Card information will be used to bill for any items you purchase from the ITunes store. Using banking services for micropayments is very expensive. ITunes is able to avoid the high cost because of the volume of business they conduct. They are able to negotiate a transaction fee with the credit card issuers and banks that cost them very little. Figure 1.1 is the Information Flow Diagram which will show the process for registering with iTunes and then ordering music for downloading.
Customer accesses iTunes store online to purchase music. Customer clicks on Registration Button, and then enters Registration Information. iTunes verifies Credit Card information from Bank.
Sends Customer confirmation.
Bank verifies Credit Card information for iTunes.
Customer searches for item(s) to purchase. Click buy, confirm. iTunes sends payment information to customers’ bank. Once confirmation is received the download process is initiated. Bank deducts payment amount from customer account and sends it to iTunes account.
Music is downloaded to Customer.
iTunes retrieves the correct music...
Please join StudyMode to read the full document