Description
This is presentation highlighting on e-business basics.
?
? ? ?
Customer - More Demanding, Better informed Competition Supplier - a Business Partner Change - Shorter Life Cycles
? ? ?
Cost Leadership Differentiation Focus
? ? ? ?
Key Issues Awareness Usability Flexibility
? ? ? ? ?
Key Issues: Speed Availability Consistency Reliability
? ? ? ? ?
Key Issues Security Resilience Manageability Quality of service
?
1950 - 1970 : EDP Era 1970 - 1990 : MIS Era
?
?
1990 -
INTERNET Era
? ?
? ?
ARPANET - US Dept of Defense 1969 Late 1970’s experimental networks between University Depts NSFNET, CSNET TCP/IP (Transmission Control Protocol/Internet Protocol) in 1982
?
?
TCP/IP - FTP (File Transfer Protocol) and SMTP (e-mail protocol) 1989 European Lab for Particle Physics (CERN) in Geneva - tool to link textual information between scientists - overcome computer incompatibility and utilise new way of linking called “Hypertext”
?
? ? ? ?
1993 - National Center for Supercomputing Applications (NCSA) - “Mosaic” - GUI Gopher, Archie, Veronica World Wide Web 1994 - Netscape browser Browser Wars - Explorer vs Netscape
? ?
?
Industry specific EDI Standards ODETTE: European Motor Industry (Organisation for Data Exchange by Teletransmission in Europe) Predecessor to ODETTE: VGA - German motor industry
?
?
?
TRADACOMS: Early UK Standard for general trade USA - UCS for grocery industry and ORDERNET for Pharma industry these early standards are now converging towards EDIFACT
? ? ?
EDI E-Commerce E-Business
?
? ? ?
IT for Functional effectiveness:American Express CAS IT for Operational Efficiency:JIT , Chrysler IT for Customer Satisfaction:Sabre IT for locking out competitors:AHS
?
Discussion Point: Explain how Information Technology is used to give a competitive advantage to the organisation that you worked for.What suggestions do you have on leveraging IT to give your company a competitive edge?
?
Discussion Point: Do you agree with this statement:”Competitive advantage through IT is only temporary”?Why or why not
? ?
? ?
Gartner Group: Type A : Bleeding Edge –15-25% of revenue in invested into IT Type B: Leading Edge – 10-12% of revenue Type C: Followers – 1-4% of revenue
? ?
Type A: Financial Services , Telecom , Travel Type C: Low Tech Manufacturing industries
? ? ? ? ? ?
Requirement Analysis Design Development Testing Implementation Maintenance
?
?
As a programmer you focussed on Development As a Business Manager you will need to focus extensively on Requirement Analysis
?
?
?
REMEMEBER – E-BUSINESS IS ABOUT BUSINESS FIRST AND FOREMOST. Less than 5% of Cos prefer “Big Bang” approach Preference of evolutionary approach
?
? ?
? ?
Map current state of orgn and Business Process Chart out desired goal Develop high level process specs and requirements Choose the right vendor and consultant Keep it simple
? ? ? ?
Database ERP ERP-II (Beyond ERP) ERP II includes CRM , SCM , KM , BI and EBusiness encapsulates all this
? ? ? ? ?
Assemble-to-order Industries Automotive Suppliers Automotive Assemblers Engineer-to-order Industries Highly Engineered Project Industries
? ? ? ? ?
Long implementation times Communication gaps - Users and IT Most packages seem to say “DIRFT” (drift??!!) Improper Knowlede transfer and Management Inadequate Training and Documentation
? ?
“Everybody is doing ERP” Where is the Competitive Advantage??
?
Competitive Advantage comes from how ERP is IMPLEMENTED and exploit resulting data. ERP systems capture data about historical activity,current operations,future plans and organise it in a way people can use
?
?
?
?
Concentrate on Business and standardise Business Process globally “Force co. not to reinvent the wheel you move along with the state-of-the-art” - CIO Boeing “ERP Package - set of building blocks - how the blocks are put together determines Competitive Advantage” - CIO John Deere and Co.
? ? ? ?
“set of activities” triggered by events” “objective” “culminate in a situation”
? ? ? ?
?
Order Fulfilment Process Input event - Orders received Output - Goods or services rendered Activities - order verification, design, prototyping,manufacturing,despatching, billing Black Holes of Communication often exist
?
?
Investing in IT to support ineffective Processes does not result in effective outputs Process Design - “Where are we” and “Where do we want to go”
? ? ? ? ?
Confidentiality Integrity Authentication Non-Repudiation Access Controls
?
? ? ?
False sites - Steal Credit Card Information Spy on visitor’s drive,Steal visitor’s ID and Passwords,Interception (Man-in-the-middle attack) Theft of Customer data from ISP’s Cookies and Privacy Virus
? ? ?
Customer Impersonation Denial of Service attacks Data Theft
? ? ? ? ? ? ?
Probing/Scanning of Systems Compromised email documents Introduced Virus Compromised Trade Secrets Download Data Manipulated Data Integrity Installed a Sniffer
14.6% 12.6% 10.6% 9.8% 8.1% 6.8% 6.6%
?
?
?
Some Intranets are very large - eg Chase Manhattan Bank had 15,000 browsers and 70 Intranet servers in 1998 Maintenance and security of large Corporate Intranets is a major concern eg Boeing found it had 2300 intranet sites Computer Security Institute - more insiders intrude than outsiders
?
? ? ? ?
PriceWaterhouseCoopers Risk Management Services: Strategic Risk Management Financial Risk Management Operational and Systems Risk Management Technology Risk Services
?
?
?
Software Engineering Institute definition of Risk Management: 1.Assessing potential of future events that can cause adverse effects 2.Implementing cost-efficient strategies that can deal with these risks
? ? ? ? ?
Human Factor Controls - Social Controls Bad Judgement Honest Errors Fraud Virus Damage
? ? ?
?
IT Risk Management is a continuous process Proactive - Identify potential IT risks before they become a problem Analyze these risks after identification probability of occurrence,potential impact Classify types of risks and prioritize wrt urgency
?
? ?
After classification,evaluate firm’s resources and develop a plan Monitor the plan Evaluate Risk Management Plan and control for deviations
? ? ? ?
Three Factor Authentication Token (Something you have) PIN (Something you know) Fingerprints (Something you are)
?
?
Symmetric Cryptography - entities share a common secret key Public Key Cryptography - Asymmetric - Each entity has a unique key pair
?
?
Binding the sender of message with exact contents of message NIST Digital Signature Standard
? ? ? ?
Password Maintenance Key Length Key Management Policies Compressed Files
? ? ?
Certification Authority Registration Authority Certificate Repository
doc_109539413.pptx
This is presentation highlighting on e-business basics.
?
? ? ?
Customer - More Demanding, Better informed Competition Supplier - a Business Partner Change - Shorter Life Cycles
? ? ?
Cost Leadership Differentiation Focus
? ? ? ?
Key Issues Awareness Usability Flexibility
? ? ? ? ?
Key Issues: Speed Availability Consistency Reliability
? ? ? ? ?
Key Issues Security Resilience Manageability Quality of service
?
1950 - 1970 : EDP Era 1970 - 1990 : MIS Era
?
?
1990 -
INTERNET Era
? ?
? ?
ARPANET - US Dept of Defense 1969 Late 1970’s experimental networks between University Depts NSFNET, CSNET TCP/IP (Transmission Control Protocol/Internet Protocol) in 1982
?
?
TCP/IP - FTP (File Transfer Protocol) and SMTP (e-mail protocol) 1989 European Lab for Particle Physics (CERN) in Geneva - tool to link textual information between scientists - overcome computer incompatibility and utilise new way of linking called “Hypertext”
?
? ? ? ?
1993 - National Center for Supercomputing Applications (NCSA) - “Mosaic” - GUI Gopher, Archie, Veronica World Wide Web 1994 - Netscape browser Browser Wars - Explorer vs Netscape
? ?
?
Industry specific EDI Standards ODETTE: European Motor Industry (Organisation for Data Exchange by Teletransmission in Europe) Predecessor to ODETTE: VGA - German motor industry
?
?
?
TRADACOMS: Early UK Standard for general trade USA - UCS for grocery industry and ORDERNET for Pharma industry these early standards are now converging towards EDIFACT
? ? ?
EDI E-Commerce E-Business
?
? ? ?
IT for Functional effectiveness:American Express CAS IT for Operational Efficiency:JIT , Chrysler IT for Customer Satisfaction:Sabre IT for locking out competitors:AHS
?
Discussion Point: Explain how Information Technology is used to give a competitive advantage to the organisation that you worked for.What suggestions do you have on leveraging IT to give your company a competitive edge?
?
Discussion Point: Do you agree with this statement:”Competitive advantage through IT is only temporary”?Why or why not
? ?
? ?
Gartner Group: Type A : Bleeding Edge –15-25% of revenue in invested into IT Type B: Leading Edge – 10-12% of revenue Type C: Followers – 1-4% of revenue
? ?
Type A: Financial Services , Telecom , Travel Type C: Low Tech Manufacturing industries
? ? ? ? ? ?
Requirement Analysis Design Development Testing Implementation Maintenance
?
?
As a programmer you focussed on Development As a Business Manager you will need to focus extensively on Requirement Analysis
?
?
?
REMEMEBER – E-BUSINESS IS ABOUT BUSINESS FIRST AND FOREMOST. Less than 5% of Cos prefer “Big Bang” approach Preference of evolutionary approach
?
? ?
? ?
Map current state of orgn and Business Process Chart out desired goal Develop high level process specs and requirements Choose the right vendor and consultant Keep it simple
? ? ? ?
Database ERP ERP-II (Beyond ERP) ERP II includes CRM , SCM , KM , BI and EBusiness encapsulates all this
? ? ? ? ?
Assemble-to-order Industries Automotive Suppliers Automotive Assemblers Engineer-to-order Industries Highly Engineered Project Industries
? ? ? ? ?
Long implementation times Communication gaps - Users and IT Most packages seem to say “DIRFT” (drift??!!) Improper Knowlede transfer and Management Inadequate Training and Documentation
? ?
“Everybody is doing ERP” Where is the Competitive Advantage??
?
Competitive Advantage comes from how ERP is IMPLEMENTED and exploit resulting data. ERP systems capture data about historical activity,current operations,future plans and organise it in a way people can use
?
?
?
?
Concentrate on Business and standardise Business Process globally “Force co. not to reinvent the wheel you move along with the state-of-the-art” - CIO Boeing “ERP Package - set of building blocks - how the blocks are put together determines Competitive Advantage” - CIO John Deere and Co.
? ? ? ?
“set of activities” triggered by events” “objective” “culminate in a situation”
? ? ? ?
?
Order Fulfilment Process Input event - Orders received Output - Goods or services rendered Activities - order verification, design, prototyping,manufacturing,despatching, billing Black Holes of Communication often exist
?
?
Investing in IT to support ineffective Processes does not result in effective outputs Process Design - “Where are we” and “Where do we want to go”
? ? ? ? ?
Confidentiality Integrity Authentication Non-Repudiation Access Controls
?
? ? ?
False sites - Steal Credit Card Information Spy on visitor’s drive,Steal visitor’s ID and Passwords,Interception (Man-in-the-middle attack) Theft of Customer data from ISP’s Cookies and Privacy Virus
? ? ?
Customer Impersonation Denial of Service attacks Data Theft
? ? ? ? ? ? ?
Probing/Scanning of Systems Compromised email documents Introduced Virus Compromised Trade Secrets Download Data Manipulated Data Integrity Installed a Sniffer
14.6% 12.6% 10.6% 9.8% 8.1% 6.8% 6.6%
?
?
?
Some Intranets are very large - eg Chase Manhattan Bank had 15,000 browsers and 70 Intranet servers in 1998 Maintenance and security of large Corporate Intranets is a major concern eg Boeing found it had 2300 intranet sites Computer Security Institute - more insiders intrude than outsiders
?
? ? ? ?
PriceWaterhouseCoopers Risk Management Services: Strategic Risk Management Financial Risk Management Operational and Systems Risk Management Technology Risk Services
?
?
?
Software Engineering Institute definition of Risk Management: 1.Assessing potential of future events that can cause adverse effects 2.Implementing cost-efficient strategies that can deal with these risks
? ? ? ? ?
Human Factor Controls - Social Controls Bad Judgement Honest Errors Fraud Virus Damage
? ? ?
?
IT Risk Management is a continuous process Proactive - Identify potential IT risks before they become a problem Analyze these risks after identification probability of occurrence,potential impact Classify types of risks and prioritize wrt urgency
?
? ?
After classification,evaluate firm’s resources and develop a plan Monitor the plan Evaluate Risk Management Plan and control for deviations
? ? ? ?
Three Factor Authentication Token (Something you have) PIN (Something you know) Fingerprints (Something you are)
?
?
Symmetric Cryptography - entities share a common secret key Public Key Cryptography - Asymmetric - Each entity has a unique key pair
?
?
Binding the sender of message with exact contents of message NIST Digital Signature Standard
? ? ? ?
Password Maintenance Key Length Key Management Policies Compressed Files
? ? ?
Certification Authority Registration Authority Certificate Repository
doc_109539413.pptx