E-Business Basics

Description
This is presentation highlighting on e-business basics.

?

? ? ?

Customer - More Demanding, Better informed Competition Supplier - a Business Partner Change - Shorter Life Cycles

? ? ?

Cost Leadership Differentiation Focus

? ? ? ?

Key Issues Awareness Usability Flexibility

? ? ? ? ?

Key Issues: Speed Availability Consistency Reliability

? ? ? ? ?

Key Issues Security Resilience Manageability Quality of service

?

1950 - 1970 : EDP Era 1970 - 1990 : MIS Era

?

?

1990 -

INTERNET Era

? ?

? ?

ARPANET - US Dept of Defense 1969 Late 1970’s experimental networks between University Depts NSFNET, CSNET TCP/IP (Transmission Control Protocol/Internet Protocol) in 1982

?

?

TCP/IP - FTP (File Transfer Protocol) and SMTP (e-mail protocol) 1989 European Lab for Particle Physics (CERN) in Geneva - tool to link textual information between scientists - overcome computer incompatibility and utilise new way of linking called “Hypertext”

?

? ? ? ?

1993 - National Center for Supercomputing Applications (NCSA) - “Mosaic” - GUI Gopher, Archie, Veronica World Wide Web 1994 - Netscape browser Browser Wars - Explorer vs Netscape

? ?

?

Industry specific EDI Standards ODETTE: European Motor Industry (Organisation for Data Exchange by Teletransmission in Europe) Predecessor to ODETTE: VGA - German motor industry

?

?

?

TRADACOMS: Early UK Standard for general trade USA - UCS for grocery industry and ORDERNET for Pharma industry these early standards are now converging towards EDIFACT

? ? ?

EDI E-Commerce E-Business

?

? ? ?

IT for Functional effectiveness:American Express CAS IT for Operational Efficiency:JIT , Chrysler IT for Customer Satisfaction:Sabre IT for locking out competitors:AHS

?

Discussion Point: Explain how Information Technology is used to give a competitive advantage to the organisation that you worked for.What suggestions do you have on leveraging IT to give your company a competitive edge?

?

Discussion Point: Do you agree with this statement:”Competitive advantage through IT is only temporary”?Why or why not

? ?

? ?

Gartner Group: Type A : Bleeding Edge –15-25% of revenue in invested into IT Type B: Leading Edge – 10-12% of revenue Type C: Followers – 1-4% of revenue

? ?

Type A: Financial Services , Telecom , Travel Type C: Low Tech Manufacturing industries

? ? ? ? ? ?

Requirement Analysis Design Development Testing Implementation Maintenance

?

?

As a programmer you focussed on Development As a Business Manager you will need to focus extensively on Requirement Analysis

?

?

?

REMEMEBER – E-BUSINESS IS ABOUT BUSINESS FIRST AND FOREMOST. Less than 5% of Cos prefer “Big Bang” approach Preference of evolutionary approach

?

? ?

? ?

Map current state of orgn and Business Process Chart out desired goal Develop high level process specs and requirements Choose the right vendor and consultant Keep it simple

? ? ? ?

Database ERP ERP-II (Beyond ERP) ERP II includes CRM , SCM , KM , BI and EBusiness encapsulates all this

? ? ? ? ?

Assemble-to-order Industries Automotive Suppliers Automotive Assemblers Engineer-to-order Industries Highly Engineered Project Industries

? ? ? ? ?

Long implementation times Communication gaps - Users and IT Most packages seem to say “DIRFT” (drift??!!) Improper Knowlede transfer and Management Inadequate Training and Documentation

? ?

“Everybody is doing ERP” Where is the Competitive Advantage??

?

Competitive Advantage comes from how ERP is IMPLEMENTED and exploit resulting data. ERP systems capture data about historical activity,current operations,future plans and organise it in a way people can use

?

?

?

?

Concentrate on Business and standardise Business Process globally “Force co. not to reinvent the wheel you move along with the state-of-the-art” - CIO Boeing “ERP Package - set of building blocks - how the blocks are put together determines Competitive Advantage” - CIO John Deere and Co.

? ? ? ?

“set of activities” triggered by events” “objective” “culminate in a situation”

? ? ? ?

?

Order Fulfilment Process Input event - Orders received Output - Goods or services rendered Activities - order verification, design, prototyping,manufacturing,despatching, billing Black Holes of Communication often exist

?

?

Investing in IT to support ineffective Processes does not result in effective outputs Process Design - “Where are we” and “Where do we want to go”

? ? ? ? ?

Confidentiality Integrity Authentication Non-Repudiation Access Controls

?

? ? ?

False sites - Steal Credit Card Information Spy on visitor’s drive,Steal visitor’s ID and Passwords,Interception (Man-in-the-middle attack) Theft of Customer data from ISP’s Cookies and Privacy Virus

? ? ?

Customer Impersonation Denial of Service attacks Data Theft

? ? ? ? ? ? ?

Probing/Scanning of Systems Compromised email documents Introduced Virus Compromised Trade Secrets Download Data Manipulated Data Integrity Installed a Sniffer

14.6% 12.6% 10.6% 9.8% 8.1% 6.8% 6.6%

?

?

?

Some Intranets are very large - eg Chase Manhattan Bank had 15,000 browsers and 70 Intranet servers in 1998 Maintenance and security of large Corporate Intranets is a major concern eg Boeing found it had 2300 intranet sites Computer Security Institute - more insiders intrude than outsiders

?

? ? ? ?

PriceWaterhouseCoopers Risk Management Services: Strategic Risk Management Financial Risk Management Operational and Systems Risk Management Technology Risk Services

?

?

?

Software Engineering Institute definition of Risk Management: 1.Assessing potential of future events that can cause adverse effects 2.Implementing cost-efficient strategies that can deal with these risks

? ? ? ? ?

Human Factor Controls - Social Controls Bad Judgement Honest Errors Fraud Virus Damage

? ? ?

?

IT Risk Management is a continuous process Proactive - Identify potential IT risks before they become a problem Analyze these risks after identification probability of occurrence,potential impact Classify types of risks and prioritize wrt urgency

?

? ?

After classification,evaluate firm’s resources and develop a plan Monitor the plan Evaluate Risk Management Plan and control for deviations

? ? ? ?

Three Factor Authentication Token (Something you have) PIN (Something you know) Fingerprints (Something you are)

?

?

Symmetric Cryptography - entities share a common secret key Public Key Cryptography - Asymmetric - Each entity has a unique key pair

?

?

Binding the sender of message with exact contents of message NIST Digital Signature Standard

? ? ? ?

Password Maintenance Key Length Key Management Policies Compressed Files

? ? ?

Certification Authority Registration Authority Certificate Repository



doc_109539413.pptx
 

Attachments

Back
Top