Chapter 3 - Repository UNIKOM

  Electronic Commerce Electronic Commerce

  

  Electronic commerce is the use of Electronic commerce is the use of computers to facilitate the firm’s operations computers to facilitate the firm’s operations

  • – internal (finance, marketing,

  internal (finance, marketing, manufacturing, ...) manufacturing, ...)

  • – external (customers, suppliers,

  external (customers, suppliers, government, ...) government, ...) Environmental Responsibilities Environmental Responsibilities of Functional Areas of Functional Areas

   Human Information

  Finance Resources Services Manufacturing Marketing Customers

  X X

  Suppliers

  X X

  Stockholders

  X Labor Unions

  X X

  Government

  X X

  X X

  X Financial Community

  X Global Community Electronic Commerce Benefits Electronic Commerce Benefits

   Improved service, especially to

  Improved service, especially to customers customers

   Improved relationships to suppliers and

  Improved relationships to suppliers and the financial community the financial community

   Increased return on stockholder and

  Increased return on stockholder and owner investments owner investments

  Electronic Commerce Electronic Commerce

  Constraints Constraints

   High costs

  High costs 

  Security concerns Security concerns

   Immature or unavailable software

  Immature or unavailable software

  New Electronic Commerce Era New Electronic Commerce Era

  

Instead of specialized software, firms

  

Instead of specialized software, firms

are designing systems to use Internet

are designing systems to use Internet

  Browsers Browsers

   Making a common interface for

  Making a common interface for customers and electronic commerce customers and electronic commerce partners partners

  

Selection of Electronic Commerce

Selection of Electronic Commerce

Strategy, Methodology, and Technology

  

Strategy, Methodology, and Technology

  Business Intelligence

  Competitive Advantage

  Strategic Business Plan Enabling strategy Interorganiza- tional Electronic data interchange

  Enabling methodology System life cycle Business process redesign

  Enabling technology Direct connectivity Value-added networks The Internet Business Intelligence (BI) Business Intelligence (BI)

   Evolved from simply gathering data

  Evolved from simply gathering data about competitors to data gathering about competitors to data gathering about all environmental elements about all environmental elements Data

  5

  4

  3

  2

  1 Collect Analyze Evaluate Store Intelligence Disseminate data data data intelligence intelligence Data

  Intelligence External Databases External Databases

  

  Important commercial databases that Important commercial databases that provide information on virtually any subject provide information on virtually any subject

  • – LEXIS-NEXIS, DIALOG, DOWJONES.COM
  • – Over 1,000 data service sites listed by

  Over 1,000 data service sites listed by YAHOO.COM YAHOO.COM

  

  Less expensive to use database services Less expensive to use database services than to perform research than to perform research

  Search Engines Search Engines

  

  Special computer programs that ask users Special computer programs that ask users for a word or group of words to be found at for a word or group of words to be found at

  Internet sites Internet sites

  

  Yahoo, Excite, AltaVista, HotBot, Lycos, Yahoo, Excite, AltaVista, HotBot, Lycos, and Webcrawler are examples and Webcrawler are examples

  

  Government databases Government databases

  Extranets Extranets

  

  Allow sharing of sensitive computer-based Allow sharing of sensitive computer-based information using Internet technology information using Internet technology

  

  Limited to trusted suppliers and large Limited to trusted suppliers and large customers customers

  

  Security and privacy issues Security and privacy issues

  • – Firewalls

  Firewalls Interorganizational System (IOS) Interorganizational System (IOS)

   These link two or more firms so that they

  These link two or more firms so that they function as a single function as a single system system to accomplish a to accomplish a common goal common goal

   Generate internal efficiency in addition to

  Generate internal efficiency in addition to interorganizational efficiency interorganizational efficiency

   Provides customers with unique product

  Provides customers with unique product features, reduced search-related costs, and features, reduced search-related costs, and raises the customer’s switching costs raises the customer’s switching costs Electronic Data Interchange (EDI) Electronic Data Interchange (EDI)

   Consists of direct computer-to-computer

  Consists of direct computer-to-computer transmissions among multiple firms of data in a transmissions among multiple firms of data in a machine-readable, structured format

   machine-readable, structured format Typical linkages

  Typical linkages

  • – Supply side

  Supply side

  • – Customer side

  Customer side

  • – Transaction set

  Transaction set Vendor stock replenishment (VSR)

  Vendor stock replenishment (VSR) Electronic Funds Transfer (EFT)

  Electronic Funds Transfer (EFT) Electronic Data Interchange (EDI) Electronic Data Interchange (EDI)

  Adheres to Standard Formats Adheres to Standard Formats

  Request for a pric e quot e quote

  Price

Purchase order

  Suppliers The Firm

  Acknowled ge P.O. rec eipt Invoice

  3-15 Selected EDI Transaction Sets Selected EDI Transaction Sets and Sample Invoice Data 104 Air Shipment Information 130 Student Educational Record (Transcript) and Sample Invoice Data 311 Canadian Customs Information 810 Invoice 152 Statistical Government Information 300 (Booking Request) (Ocean) Name Marking, Packaging, Loading Address Information Industry Code Tax Information Currency Quantity Terms of Sale / Deferred Terms of Sale Item Physical Details Pricing Information Invoice Shipment Summary Product / Item Description Carrier Detail

Mapping Software Translates Data to Mapping Software Translates Data to and from Standard Formats and from Standard Formats

  Sending firm’s computer Application software Mapping software

  Standard EDI format Receiving firm’s computer Application software Mapping software Degree of EDI Implementation Degree of EDI Implementation

  Level-one users Level-one users

  • – One or two transmission sets sent to limited trading

  One or two transmission sets sent to limited trading partners

   partners Level-two users

  Level-two users

  • – Many transaction sets transmitted to large number of

  Many transaction sets transmitted to large number of trading partners

   trading partners Level-three users

  Level-three users

  • – Many transaction sets transmitted to large number of

  Many transaction sets transmitted to large number of trading partners and firm’s computer applications are trading partners and firm’s computer applications are tailored to EDI approach tailored to EDI approach

  Adoption Influences Adoption Influences

  

  Competitive pressure, Competitive pressure,

  this is reactive this is reactive

  

  Exercised power, Exercised power,

  this is proactive this is proactive

  

  Internal need, Internal need,

  this is proactive this is proactive

  

  Top management support, Top management support,

  this is both this is both proactive and reactive proactive and reactive Internal and Environmental Internal and Environmental

  Influences on EDI Adoption Influences on EDI Adoption

  Environmental Influences Pressure Exercised Power

  

Internal Influences

Internal

Need

Top

  

Management

Support

Competitors

  Trading Partners EDI Benefits EDI Benefits

   Direct

  Direct

  • – Reduced errors

  Reduced errors

  • – Reduced costs

  Reduced costs

  • – Increased operational efficiency

  Increased operational efficiency 

  Indirect Indirect

  • – Increased ability to compete

  Increased ability to compete

  • Improved relationships with trading partners

  Improved relationships with trading partners

  • – Improved customer service

  Improved customer service EDI Direct and Indirect Benefits EDI Direct and Indirect Benefits

  Indirect Benefits Direct Benefits Reduced

  Errors Increased Operational Efficiency

  Reduced Costs Competitors

  Trade Partners Increased Ability to Compete

  Improved Service Improved Relationships A Challenge to EDI A Challenge to EDI

  

  Extensible markup language (XML) Extensible markup language (XML)

  • – Extension of HTML

  Extension of HTML

  • – Provides file formatting structure and means for

  Provides file formatting structure and means for describing data describing data

  • – Allows Web pages to perform many EDI

  Allows Web pages to perform many EDI functions functions

  Electronic Commerce Electronic Commerce

  Technology Technology

   Direct Connectivity

  Direct Connectivity

  • – Uses dial-up or private lines to connect

  Uses dial-up or private lines to connect 

  Value-Added Networks (VANs) Value-Added Networks (VANs)

  • – Circuit provided by vendor

  Circuit provided by vendor

  • – Vendor provides additional services

  Vendor provides additional services 

  The Internet The Internet

  • – Global communications network

  Global communications network

  Internet Evolution Internet Evolution

   Derived from the Advanced Research Projects Agency network (ARPANET)

   Designed to let computer-to-computer communications continue even during military attacks

   ARPANET joined with Computer Science Network (CSNET) and National Science Foundation Network (NSFNET) to form today’s Internet

  Internet Evolution [cont.) Internet Evolution [cont.)

   During the 1970’s various other networks were connected

   This led to the 1980’s Internet concept which means each network can seamlessly interconnect with other networks

  

Businesses began using the new Internet with

workstations and local area networks

  

The Internet has become a network of networks

  Internet Evolution (cont.) Internet Evolution (cont.)

   In 1989, Tim Berners-Lee of CERN came up

  In 1989, Tim Berners-Lee of CERN came up with the hypertext concept with the hypertext concept

   World-Wide Web is really the application of

  World-Wide Web is really the application of hypertext documents and other materials hypertext documents and other materials

   Hypertext is conceptually a ‘speed dial’

  Hypertext is conceptually a ‘speed dial’ feature in that a user points to and presses the feature in that a user points to and presses the

hypertext link and the system automatically

hypertext link and the system automatically

goes to that location goes to that location

  Key Web Terminology Key Web Terminology

  Website Website

  Hypertext link Hypertext link

  Web page Web page

  Home page Home page

  Universal resource locator (URL) Universal resource locator (URL)

  • – Protocol

  Protocol

  • – Domain name

  Domain name

  • – Path

  Path

  Browser Browser

  FTP (File Transfer Protocol) FTP (File Transfer Protocol)

  Parts of a URL Parts of a URL

  

http://aisvm1.ais.com/abra7883/index.html

hypertext transmission protocol domain name path (directory and file name on the web server ) hypertext markup language

  Internet Client/Server Internet Client/Server

  Information Retrieval Systems Information Retrieval Systems

  

  Gopher Gopher

  

  Wide Area Information Servers (WAIS) Wide Area Information Servers (WAIS)

  

  USENET USENET

  Each of these predates the WWW and Internet Client/Server Architecture Terminal Emulator PC or Macintosh Unix X11 NextStep

  Addressing schema, Protocols, Format negotiation Gateway is

  FTP Gopher HTTP

  HTTP server plus other application.

  News WAIS

  Database, info Internet Security Internet Security

  

Any resources linked to data communications

  

Any resources linked to data communications

have risk have risk

   Security by physically separating the Web site

  Security by physically separating the Web site from the firm’s computer resources from the firm’s computer resources

   Security by using passwords that allow access

  Security by using passwords that allow access to computing resources to computing resources

   ‘

  ‘ Firewalls’ using routers, intermediary

  Firewalls’ using routers, intermediary computers or application-level methods computers or application-level methods

  An Application-Level Firewall An Application-Level Firewall

  Internet Internet Connectivity Internet Connectivity Internet Incoming packets from the Internet pass Incoming packets from the Internet pass Supplier’s Network Supplier’s Network through the connectivity supplier’s network through the connectivity supplier’s network to a router and to the organization to a router and to the organization Router Router the function of the external router

The packet goes to a router box that duplicates

the function of the external router The packet goes to a router box that duplicates Isolation Mechanism Isolation Mechanism Border Router Border Router Rather than routing the packet directly to its destination, the an IP “choke” host an IP “choke” host router redirects traffic through an external services host and router redirects traffic through an external services host and Rather than routing the packet directly to its destination, the IP Choke IP Choke Services Services External External The external services host runs desired apps such as E-mail interface interface The external services host runs desired apps such as E-mail The IP choke performs actual protocol filtering The IP choke performs actual protocol filtering Protocol Filter Protocol Filter Service Gateway Service Gateway Internal/External Internal/External Internal Router Internal Router security policy security policy on the internal network, configured according to internal on the internal network, configured according to internal Traffic is sent through a gateway to a separate router box Traffic is sent through a gateway to a separate router box

  Intranet Intranet

  

  Internet technology used for internal Internet technology used for internal communications and applications communications and applications

  

  Used for many business applications Used for many business applications requiring communication requiring communication

  Business Applications Business Applications for the Internet for the Internet

  

  Marketing research Marketing research

  

  Competitive intelligence Competitive intelligence

  

  Retailing applications Retailing applications

  

  The future impact of the Internet on The future impact of the Internet on business is enhanced as the National business is enhanced as the National

  Information Infrastructure programs Information Infrastructure programs become established become established

  Successful Internet Use Successful Internet Use

   specific users’ needs Make the interface

   community Get help if you need it

  Create a sense of community

   location Create a sense of

  Be in the right Web location

   intuitive Be in the right Web

  Make the interface intuitive

  Target content to Target content to specific users’ needs

   Make sure your Web

  Look beyond customers customers

  Update often Look beyond

   flexible and intuitive Update often

  Make sure your browser and database browser and database structure are both structure are both flexible and intuitive

   site is robust Make sure your

  Make sure your Web site is robust

  Get help if you need it Summary Summary

   E-Commerce begins with business intelligence

  E-Commerce begins with business intelligence 

  Primary and secondary data comprise business Primary and secondary data comprise business intelligence intelligence

   Reasons for IOS

  Reasons for IOS

  • – Comparative efficiency

  Comparative efficiency

  • – Bargaining power

  Bargaining power 

  Three levels of EDI Three levels of EDI

  Summary [cont.] Summary [cont.]

  

  Internet Internet

  • – Network of networks

  Network of networks

  • – Security concerns

  Security concerns

  • – Firewalls

  Firewalls 

  Intranets Intranets

  

  National information infrastructure National information infrastructure