06 02 MIS Notes - Ecommerce PDF
06 02 MIS Notes - Ecommerce PDF
Ankit Mehrotra
Benefits of E-Commerce
Organizational benefits
Global reach
Cost reduction
Supply chain improvement
Extended hours
Customization
New business models
Societal benefits
Telecommuting: more people work and shop at home.
Higher standard of living: competetive prices allow lower income
earners to shop more
Hope for the poor: great opportunity for the poor to sell, buy and
learn new skills
Availability of public services: health care, education, and distribution
of government social services acan be done at a reduced cost to a
large numebr of people.
Consumer benefits
Ubiquity: EC allows shopping 24/7/365 from almost any location.
More products and services: EC gives more choices.
Cheaper products and services: EC provides price varity for goods and services.
Instant delivery: In certain cases EC provides instant delivery, e.g. digitized product.
Information availability: relevant and detailed information in seconds.
Particpation in auctions: virtual auctions
Electronic community: consumers can interact with other consumers.
Get it your way: customization and personalization of products and services
Behavioral targeting takes place at two levels: At individual Web sites and on various advertising
networks that track users across thousands of Web sites. Most e-commerce Web sites collect data
on visitor browser activity and store it in a database. They have tools to record the site that users
visited prior to coming to the Web site, where these users go when they leave that site, the type
of operating system they use, browser information, and even some location data. They also
record the specific pages visited on the particular site, the time spent on each page of the site, the
types of pages visited, and what the visitors purchased. Firms analyze this information about
customer interests and behavior to develop precise profiles of existing and potential customers.
EDI Documents
Following are few important documents used in EDI
Invoices
Purchase orders
Shipping Requests
Acknowledgement
Business Correspondence letters
Financial information letters
Steps in an EDI System
Following are the steps in an EDI System.
A program generates the file which contains the processed document.
The document is converted into an agreed standard format.
The file containing the document is send electronically on network.
The trading partner receives the file.
An acknowledgement document is generated and sent to the originating organization.
Advantages of an EDI System
Following are the advantages of an EDI System.
Reduction in data entry errors. Chances of errors are much less being use of
computer in data entry.
Shorter processing life cycle As orders can be processed as soon as they are entered
into the system. This reduced the processing time of the transfer documents.
Electronic form of data It is quite easy to transfer or share data being in electronic
format.
Reduction in paperwork As lot of paper documents are replaced with electronic
documents there is huge reduction in paperwork.
Cost Effective As time is saved and orders are processed very effectively, EDI proves
to be higly cost effective.
Standard Means of communication EDI enforces standards on the content of data and
its format which leads to clearer communication.
With current GIS, geospatial, and geocoding technologies and platforms, GISs be easily
incorporated and managed within data analytics and visualization software.
With the GIS moving into the cloud, developers of enterprise applications based
on SAP, Microsoft Office, SharePoint, MicroStrategy, IBM Cognos, and Microsoft Dynamics
CRM are using it to create a wide range of mobile applications.
RFID Radio Frequency Identification Technology
RFID Radio Frequency Identification is a technology that is used for identification in everything
from shop tagging to vehicle tracking and many more applications.
The use of RFID, Radio Frequency Identification technology has become widespread within
many areas of industry. RFID, Radio Frequency Identification provides an ideal technology for
tracking assets and identifying them by using a simple low cost antenna attached to the item in
question.
Alongside RFID provides automatic data collection for which there are now several standards,
and this enables RFID technology to be deployed in an effective and known manner. With RFID
technology standardised, users are able to rely on the technology to provide the results they need.
RFID - the benefits
RFID technology provides many benefits for organisations ho use the system. RFID provide an
easy way in which data can be collected and assets tracked:
RFID technology provides a low cost form of data collection and asset management.
RFID technology is widely used and therefore the economies of scale can be utilised to
advantage.
RFID technology enables data collection in environments that are unsuitable for workers as
RFID tags can provide data in harsh environments.
RFID is able to provide many reads and write functions per second, although it is not a very
high data rate system, it is sufficient for most data monitoring applications.
Data on an RFID tag can be altered repeatedly.
RFID technology can be used with existing systems including bar codes and Wi-Fi
As a result, RFID technology is being used increasingly as organisations need automatic methods
of tracking assets and collecting data.
RFID - the applications
RFID systems can be used in a variety of ways. There are many RFID applications which have
gained popularity over the past years:
Store product identification - RFID technology can be used within shops and stores as a form
of alert for goods that have / have not been paid for.
Asset tracking - RFID systems can monitor when RFID tags pass given points and in this way
track the assets.
Airline baggage identification - airlines need to monitor where baggage is and route it to the
required destination. RFID tags can be attached to the bags to automate baggage routing
Parts identification - Data can be written to an RFID tags defining the identity of a part. This
can then be used within a manufacturing, stock holding or other process to identify and locate
parts.
Production control - when items are manufactured they pass through many stages. RFID tags
can be attached to items. These can be updated each time the item passes through a stage in
production. This will enable the manufacturing system to track all items and know what stage
they are at, and any other information such as test failures, etc.
Employee access control - many companies today require intelligent access control systems.
RFID technology is able to provide control as well as tracking, noting when cards pass
particular access points, etc.
Supply chain control - with manufacturing working to much tighter timescales with items
such as Just-In-Time techniques being involved tracking of the items in a supply chain
becomes more critical. RFID tags can be added to items to enable this to be undertaken
accurately and more quickly.
Vehicle tracking - RFID technologycan be used to determine when vehicles have passed
particular points and in this way their location can be approximately determined.
Livestock identification - RFID tags can be injected into animals, under the skin and this
enables accurate determination of which animal is which so that injections, etc can be given
to the correct animal.
These represent some of the more standard applications for RFID technology. Many more
specialised applications are also in use.
What is RFID? - the basics
RFID technology is a simple method of exchanging data between two entities namely a reader/
writer and a tag. This communication allows information about the tag or the element carrying
the tag to be determined and in this way it enables processes to be managed more easily.
An RFID system comprises a number of elements:
RFID reader / writer: The reader write is used to communicate with the tags that may pass
within range. The RFID reader writer will normally be located in a fixed position and will be
used to interrogate an RFID tag. Dependent upon the application and the format of the system
and the RFID reader / writer, data may also be written to the RFID tag
RFID tag: RFID tags may also be called RFID transponders and are typically located on
items that are mobile. They are small and generally cheap so that they can be attached to low
cost (or high cost) items that need to have information associated with them. They are also
generally considered as being disposable. The RFID tag contains data that is relayed to the
reader, and in some systems it may also be possible to update the data within the tag to
indicate that the tag and hence the item has undergone a specific stage in a process, etc.
RFID application software: Like all systems these days, RFID systems need application
software to run the overall system. With many systems there will be a number of different
reader / writers and the data to and from these needs to be coordinated and analysed.
Application software will be required for these.
Although each RFID system will vary according to its requirements, these are the main elements
which can be found.
Cloud computing
Cloud computing refers to the delivery of computing resources as a service. This term generally
makes reference to a three tiered architectural computing model or cloud stack that is inclusive of
SaaS (software as a service), PaaS (platform as a service) and IaaS (infrastructure as a service)
delivery that may be obtained from a variety of cloud solution providers or hosted internally via a
private cloud. Cloud computing may also include the delivery of other types of IT assets as a
service; including: storage as a service, databases as a service, security as a service and backend
as a service offerings.
Private Cloud
Private Clouds consist of cloud infrastructure that is deployed solely for a single organization,
whether managed internally or hosted by a third-party externally. They require a significant level
of engagement from both management and IT departments to virtualize the business
environment, and also mean evaluating how existing resources should be reallocated in the cloud.
Private Clouds offer scope for advanced security, high availability or fault tolerant solutions that
are not possible in a Public Cloud. However, as they are effectively stand-alone solutions in
their own right, building a Private Cloud still involves significant investment, and does not
therefore deliver the shorter-term economies that Public Cloud can.
Suited to Businesses that must comply with strict regulations or that have highly
critical applications will choose internal Private Clouds. With a private cloud,
businesses install their own server and storage hardware but have the flexibility to
shift workloads among servers as usage spikes or they deploy new applications.
Hybrid Cloud
As the name suggests, a hybrid cloud comprises both private (internal) and public (external)
cloud services. Typically a business might run an application primarily on a private cloud, but
rely on a public cloud to accommodate spikes in usage. Customized rules and policies govern
areas such as security and the underlying infrastructure, with tasks allocated to internal or
external clouds as necessary.
Suited to E-commerce. Because e-commerce sites must respond to fluctuations in
traffic both on a daily and seasonal cycle, the actual work of processing the orders can
benefit from the elastic characteristics of public cloud resources. On the other hand,
legal regulations strictly govern how personal and payment information can be
handled, and this type of sensitive data is more secure if it stays on-premise in the
Private Cloud. This hybrid solution represents the best of both worlds as it places the
order processing and transactional front-end of the shop where it can take advantage
of resource scalability, while it keeps the payment and account management services
strictly private.