e Commerce1 2025
e Commerce1 2025
MODULES:
Module – I
Module – II
Convergence: Technological Advances in Convergence – Types, Convergence and its implications,
Convergence and Electronic Commerce. Collaborative Computing: Collaborative product
development, Content Management: Definition of content, Authoring Tools and Content
Management, Content – partnership, repositories, convergence, providers Web Traffic & Traffic
management: Content Marketing. Call Centre: Definition, Need, Tasks Handled, Mode of
Operation, Equipment, Strength & Weaknesses of Call Centre, Customer Premises Equipment
(CPE). Supply Chain Management: E-logistics, Supply Chain Portal, Supply Chain planning
Tools (SCP Tools), Supply Chain Execution (SCE), SCE – Framework, Internet‘s effect on
Supply Chain Power.
Module – III
E-Payment Mechanism; Payment through card system, E-Cheque, E-Cash, E-Payment Threats &
Protections, E-Marketing: Home – shopping, E-Marketing, Tele-Marketing Electronic Data
Interchange (EDI): Meaning, Benefits, Concepts, Application, EDI Model, protocols (UN EDI
FACT / GTDI, ANSIX – 12 Risk of E-Commerce: Overview, Security for E-Commerce,
Security Standards, Firewall, Cryptography, Key Management, Password Systems, Digital
Certificates, Digital Signatures
Module – IV
Enterprise Resource Planning (ERP): Features, capabilities and Overview of Commercial Software,
re-engineering work processes for IT applications, Business Process Redesign , Knowledge
Engineering and Data Warehouse. Business Modules: Finance, Manufacturing (Production),
Human Resources, Plant Maintenance, Materials, Management, Quality Management Sales &
Distribution ERP Package ERP Market: ERP Market Place, SAP AG, People Soft, BAAN, JD
Edwards, Oracle Corporation.EAI(Enterprise application integration
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Chapter-1
1.1 Introduction to Electronic Commerce:
Definition of E-commerce:
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Example: The purchase of goods that are then delivered by post or the booking of tickets that
can be picked up by the clients when they arrive at the event.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
E-commerce de-personalises shopping
Who may want to access your e-commerce site to cause disruption or steal data; for example
competitors, ex-employees, etc...
What level of expertise a potential hacker may possess; if you are a small company that
would not be likely to be considered a target for hackers then expensive, complex security may
not be needed.
Global reach
The technology reaches Commerce is enabled across cultural and across national boundaries,
around the earth. national boundaries seamlessly and without modification.
―Market space‖ includes potentially billions of consumers and millions of businesses worldwide.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Universal standards
There is one set of There is one set of technical media standards technology standards, namely
Internet across the globe.
Richness
Video, audio, and text messages Video, audio, and text marketing messages are are possible.
integrated into a single marketing message and consuming experience.
Interactivity
The technology works Consumers are engaged in a dialogue that through interaction with the user.
dynamically adjusts the experience to the individual, and makes the consumer a co- participant in
the process of delivering goods to the market.
Information density
The technology Information processing, storage, and reduces information costs and raises quality.
communication costs drop dramatically, while currency, accuracy, and timeliness improve greatly.
Information becomes plentiful, cheap, and accurate.
Personalization/Customization
The Personalization of marketing messages and technology allows personalized messages to
customization of products and services are be delivered to individuals as well as groups. based on
individual characteristics.
1.7 Business models of e-commerce:
There are mainly 4 types of business models based on transaction party.
Business-to-Consumer (B2C)
In a Business-to-Consumer E-commerce
environment, companies sell their on-
line goods to consumers who are the end
users of their products or services. Usually
B2C E-commerce web shops have an open
access for any visitor, meaning that there
is no need for a person to login in order to
make any product related inquiry.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Business-to-Business (B2B)
In a Business-to-Business E-commerce
environment, companies sell their on-line
goods to other companies without being
engaged in sales to consumers. In most
B2B E-commerce environments entering the
web shop will require a log in. B2B web shop
usually contains customer-specific pricing,
customer-specific assortments and customer-
specific discounts.
Consumer-to-Business (C2B)
In a Consumer-to-Business E-commerce
environment, consumers usually post their
products or services on-line on which
companies can post their bids. A consumer
reviews the bids and selects the company
that meets his price expectations
Consumer-to-Consumer (C2C)
1.8 E-Governance:
E-governance is the application of information and communication technology (ICT) for
delivering government services, exchange of information communication transactions,
integration of various stand-alone systems and services between government-to-customer (G2C),
government-to-business (G2B), government-to-government (G2G) as well as back office processes
and interactions within the entire government framework.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Through e-governance, government services will be made available to citizens in a convenient,
efficient and transparent manner. The three main target groups that can be distinguished in
governance concepts are government, citizens and businesses/interest groups. In e-governance
there are no distinct boundaries.
Government uses G2C model website to approach citizen in general. Such websites support
auctions of vehicles, machinery or any other material. Such website also provides services like
registration for birth, marriage or death certificates. Main objectives of G2C website are to reduce
average time for fulfilling people requests for various government services.
The Internet was created by the Advanced Research Projects Agency (ARPA) of the U.S.
government in 1960's and was first known as the ARPANet. At this stage the Internet's first
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
computers were at academic and government institutions and were mainly used for accessing
files and to send emails. From 1983 onwards the Internet as we know it today started to form
with the introduction of the communication protocol TCP/IP to ARPANet. Since 1983 the
Internet has accommodated a lot of changes and continues to keep developing.
The last two decades has seen the Internet accommodate such things as network LANs and ATM
and frame switched services. The Internet continues to evolve with it becoming available on
mobile phones and pagers and possibly on televisions in the future.
Advantages of internet:
There many advantages to using the internet such as:
E-mail
Email is now an essential communication tool in business. It is also excellent for keeping in touch with
family and friends. The advantage to email is that it is free ( no charge per use) when compared to
telephone, fax and postal services.
Information
There is a huge amount of information available on the internet for just about every subject known
to man, ranging from government law and services, trade fairs and conferences, market
information, new ideas and technical support.
Services
Many services are now provided on the internet such as on-line banking, job seeking and
applications, and hotel reservations. Often these services are not available off-line or cost more.
Buy or sell products.
The internet is a very effective way to buy and sell products all over the world.
Communities communities of all types have sprung up on the internet. Its a great way to meet
up with people of similar interest and discuss common issues.
A Leading-Edge Image
Presenting your company or organization as leading-edge shows your customers and prospective
customers that you are financially strong, technologically savvy, and ready for the 21st century.
And that you care enough about your customers to take advantage of new technologies for their
benefit. And finally that you have the resources to support your clients in the most beneficial
manner possible.
More and more advertisers on television, radio, magazines, and newspapers are including a Web
address. Now is the time to avoid playing catch-up later.
Improved Customer Service
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
The companies are available to their customers 24 hours a day, 7 days a week. The Internet never
sleeps. Whenever customer needs information about any company, products or services, they can
access the company‘s Web Page.
Market Expansion
The Internet is a global system. Latest estimates are that there are about 40 million people with
access to the Internet, and this number is growing every day. By simply posting a Web Page you
are also addressing International markets.
Low Cost Marketing
Imagine developing a full colour brochure without having to incur the costs of proofs, printers,
wasted paper, long lead times between revisions, and more. Then imagine a full colour product or
services brochure that is interactive and which incorporates text, graphics, audio, and/or video.
One that can be immediately updated without incurring the usual costs of product material updates.
Low Cost Selling
Without the cost of direct selling potential customers can get detailed information about your
products or services at any time. And they can easily order your products over the Internet, or
request additional information be sent to them via a request form on your Web page.
Lower Communication Costs
Your time, and your employees time, is valuable. Most businesses and organizations spend time
answering the same questions over and over again. With a Web page you can make the answers
available to everyone immediately. You can also update your Wed page with new information
quickly and easily.
Intranet:
The objective is to organize each individual's desktop with minimal cost, time and effort to be
more productive, cost efficient, timely, and competitive.
An Intranet may host multiple private websites and constitute an important component and
focal point of internal communication and collaboration.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Any of the well known Internet protocols may be found in an Intranet, such as HTTP (web
services), SMTP (e-mail), and FTP (file transfer protocol). Internet technologies are often
deployed to provide modern interfaces to legacy information systems hosting corporate data.
Uses of Intranet:
Increasingly, intra nets are being used to deliver tools, e.g. collaboration (to facilitate working
in groups and teleconferencing) or sophisticated corporate directories, sales and customer
relationship management tools, project management etc., to advance productivity.
Intra nets are also being used as corporate culture-change platforms. For example, large
numbers of employees discussing key issues in an Intranet forum application could lead to new
ideas in management, productivity, quality, and other corporate issues.
In large intra nets, website traffic is often similar to public website traffic and can be better
understood by using web metrics software to track overall activity. User surveys also
improve Intranet website effectiveness. Larger businesses allow users within their Intranet to
access public internet through firewall servers. They have the ability to screen messages coming
and going keeping security intact.
When part of an Intranet is made accessible to customers and others outside the business, that
part becomes part of an extra-net. Businesses can send private messages through the public
network, using special encryption/decryption and other security safeguards to connect one part
of their Intranet to another.
Intranet user-experience, editorial, and technology teams work together to produce in-house
sites. Most commonly, intra nets are managed by the communications, HR or CIO
departments of large organizations, or some combination of these.
Because of the scope and variety of content and the number of system interfaces, intra nets of
many organizations are much more complex than their respective public websites. Intra nets
and their use are growing rapidly.
Advantages:
Workforce productivity: Intra nets can help users to locate and view information faster and
use applications relevant to their roles and responsibilities. With the help of a web browser
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
interface, users can access data held in any database the organization wants to make
available, any time and — subject to security provisions — from anywhere within the
company workstations, increasing employees' ability to perform their jobs faster, more accurately,
and with confidence that they have the right information.
Time: Intra nets allow organizations to distribute information to employees on an as-needed
basis; Employees may link to relevant information at their convenience, rather than being
distracted indiscriminately by email.
Communication: Intra nets can serve as powerful tools for communication within an
organization, vertically strategic initiatives that have a global reach throughout the organization.
By providing this information on the Intranet, staff have the opportunity to keep up-to-date with
the strategic focus of the organization. Some examples of communication would be chat, email,
and/or blogs. A great real world example of where an Intranet helped a company communicate is
when Nestle had a number of food processing plants in Scandinavia. Their central support
system had to deal with a number of queries every day.
Web publishing: allows cumbersome corporate knowledge to be maintained and easily
accessed throughout the company using hypermedia aand Web technologies. Examples include:
employee manuals, benefits documents, company policies, business standards, news feeds, and
even training, can be accessed using common Internet standards (Acrobat files, Flash files,
CGI applications). Because each business unit can update the on-line copy of a document, the
most recent version is usually available to employees using the Intranet.
Business operations and management: Intra nets are also being used as a platform for
developing and deploying applications to support business operations and decisions across the
internet worked enterprise.
Cost-effective: Users can view information and data via web-browser rather than
maintaining physical documents such as procedure manuals, internal phone list and
requisition forms. This can potentially save the business money on printing, duplicating
documents, and the environment as well as document maintenance overhead.
Enhance collaboration: Information is easily accessible by all authorised users, which
enables teamwork.
Cross-platform capability: Standards-compliant web browsers are available for Windows,
Mac, and UNIX.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Built for one audience: Many companies dictate computer specifications which, in turn,
may allow Intranet developers to write applications that only have to work on one browser (no
cross-browser compatibility issues).
Promote common corporate culture: Every user has the ability to view the same
information within the Intranet.
Immediate updates: When dealing with the public in any capacity, laws, specifications, and
parameters can change. Intra nets make it possible to provide your audience with "live"
changes so they are kept up-to-date, which can limit a company's liability.
Supports a distributed computing architecture: The Intranet can also be linked to a
company‘s management information system, for example a time keeping system.
Web security:
It is a branch of Information Security that deals specifically with security of websites, web
applications and web services.
At a high level, Web application security draws on the principles of application security but
applies them specifically to Internet and Web systems. Typically web applications are developed
using programming languages such as PHP, Java EE, Java, Python, Ruby, ASP.NET, C#,
VB.NET or Classic ASP.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Chapter-2
Digital convergence refers to the convergence of four industries into one conglomerate,
ITTCE (Information Technologies, Telecommunication, Consumer Electronics, and
Entertainment).Previously separate technologies such as voice data and productivity applications,
and video can now share resources and interact with each other synergistically.
Convergent services, such as VoIP, IPTV, Mobile TV, Smart TV, and others, tend to
replace the older technologies and thus can disrupt markets. IP-based convergence is
inevitable and will result in new service and new demand in the market.
Convergent solutions include both fixed-line and mobile technologies. Recent examples of new,
convergent services include:
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Location-based services
Integrated products and bundles
Convergent technologies can integrate the fixed-line with mobile to deliver convergent solutions.
Convergent technologies include:
CPD is a business strategy, work process and collection of software applications that
facilitates different organizations to work together on the development of a product. It is also
known as collaborative product definition management (cPDM).
Collaborative Product Development helps individual users and companies manage, share
and view your CAD projects without the cost and complexity of purchasing an entire PDM or
PLM solution. CPD comes in the form of a Software as a service ddelivery model, which allows
for rapid iterations and little or no downloads and installs.
Exactly what technology comes under this title does vary depending on whom one asks;
however, it usually consists of the Product Lifecycle Management (PLM) areas of: Product Data
Management (PDM); Product visualization; team collaboration and conferencing tools; and
supplier sourcing software. It is generally accepted as not including CAD geometry tools, but does
include data translation technology.
Clearly general collaborative software such as email and chat (instant messaging) is used within
the CPD process. One important technology is application and desktop sharing, allowing one
person to view what another person is doing on a remote machine. For CAD aand product
visualization aapplication and spare product that supports OpenGL ggraphics is required.
Another common application is Data sharing via Web based portals.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Specific to product data
With product ddata an important addition is the handling of high volumes of geometry and meta-
data. Exactly what techniques and technology is required depends on the level of collaboration
being carried out and the commonality (or lack thereof) of the partner sites‘ systems.
Collaboration using PLM and CAx tools requires technology to support the needs of:
People
Effective PLM collaboration will typically require the participation of people who do not have
high level CAD skills. This requires improved user interfaces including tailorable user interfaces
that can be tailored to the skill level and speciality of the user.
Improved visualization capabilities, especially those that provide a meaningful view of complex
information such as the results of a fluid flow analysis will leverage the value of all participants
in the collaboration process. Effective collaboration requires that a participant be freed from the
burden of knowing the intent history ttypically embedded within and constricting the use of
parametric models.
Organizations
Community collaboration rrequires that companies, suppliers, and customers share information in
a secure environment, ensure compliance with enterprise and regulatory rules and enforce the
process management rules of the community as well as the individual organizations.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Data
The most basic collaboration data need is the ability to operate in a MultiCAD
environment. That is, however, only the beginning. Models from multiple CAD sources must
be assembled into an active digital mockup aallowing change and/or design in context.
CMSs are often used to run websites containing blogs, news, and shopping. Many
corporate and marketing websites use CMSs. CMSs typically aim to avoid the need for
hand coding, but may support it for specific elements or entire pages.
The function and use of content management systems is to store and organize files, and
provide version-controlled access to their data. CMS features vary widely. Simple
systems showcase a handful of features, while other releases, notably enterprise systems, offer
more complex and powerful functions. Most CMS include Web-based publishing, format
management, revision control (version control), indexing, search, and retrieval. The CMS
increments the version number when new updates are added to an already- existing file. Some
content management systems also support the separation of content and presentation.
A CMS may serve as a central repository containing documents, movies, pictures, phone
numbers, scientific data. CMSs can be used for storing, controlling, revising,
semantically enriching and publishing documentation.
The content management system (CMS) has two elements:
Content management application (CMA) is the front-end user interface that allows a user,
even with limited expertise, to add, modify and remove content from a Web site without the
intervention of a Webmaster.
Content delivery application (CDA) compiles that information and updates the Web site.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
2.5 Web Traffic:
Web traffic is the amount of data sent and received by visitors to a web site.
Web traffic is measured to see the popularity of web sites and individual pages or sections
within a site. This can be done by viewing the traffic statistics found in the web server log file,
an automatically generated list of all the pages served. A hit is generated when any file is
served.
The following types of information are often collated when monitoring web traffic: The
number of visitors.
The average number of page views per visitor – a high number would indicate that the
average visitors go deep inside the site, possibly because they like it or find it useful.
Average visit duration – the total length of a user's visit. As a rule the more time they
spend the more they're interested in your company and are more prone to contact.
Average page duration – how long a page is viewed for. The more pages viewed, the
better it is for your company.
Domain classes – all levels of the IP Addressing information required to deliver
Web pages and content.
Busy times – the most popular viewing time of the site would show when would be the
best time to do promotional campaigns and when would be the most ideal to perform
maintenance
Most requested pages – the most popular pages
Most requested entry pages – the entry page is the first page viewed by a visitor and
shows which are the pages most attracting visitors
Most requested exit pages – the most requested exit pages could help find bad pages,
broken links or the exit pages may have a popular external link
Top paths – a path is the sequence of pages viewed by visitors from entry to exit, with the
top paths identifying the way most customers go through the site
Referrers; The host can track the (apparent) source of the links aand determine which sites
are generating the most traffic for a particular page.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Content marketing is any marketing that involves the creation and sharing of media and
publishing content in order to acquire and retain customers.
Basically, content marketing is the art of communicating with your customers and
prospects without selling.
Outbound call centres are operated for telemarketing, solicitation of charitable or political
donations, debt collection and market research.
A call centre has an open workspace for call centre agents, with work stations that
include a computer for each agent, a telephone set/headset connected to a Telecom switch, and
one or more supervisor stations. It can be independently operated or networked with additional
centres, often linked to a corporate computer network, including mainframes, microcomputers
and LANs.
The contact centre is a central point from which all customer contacts are managed.
Through contact centres, valuable information about company are routed to appropriate
people, contacts to be tracked and data to be gathered. It is generally a part of company‘s
customer relationship management.
Where a centre is located is critical in terms of the cost of the building but more importantly
the ability to recruit and retain employees to work in the centre. The ease and cost to get to a
centre is important for those employed in the centre but also in the integration with the Head
Office functions that the centre needs to work with. The facilities and working environment
is more critical than for functional line departments because of the intensity with which the
Agents have to sit at their desks and the need to manage resource patterns. Visiting a call
centre and looking at how it might feel to work in it will be extremely telling as to how good
the centres performance is, but also how the organisation view and treat their employees.
Customer
Customers can be anyone, and the Agent needs to have the skills to be able to adapt their
style and vocabulary to suit different customer types. The Agent talks to more customers in
any one day that any other person in the organisation. If you want to know what is going on
with customers, ask the Agents! With average call durations of less than 3 minutes, how do
you form a relationship and build loyalty from a customer in that time. That is one of the
biggest challenges that the Agents face, especially given many customers do not like the
impersonal touch that call centres often provide.
Technology
There are significant amounts of technology available and it is very easy to be bamboozled
by it all! It very much depends on the size and nature of your business as to what you require.
The basic equipment to handle calls is the Automated Call Distributor but these can range
from basic to a Rolls Royce! Many centres do not fully utilise the technology that they have.
In addition there is usually a disjoint between what the technology can do and what it is
actually used for.
Process
Every centre has a multitude of processes, but the biggest challenge that it faces is to
understand the end to end process from the customer perspective. The customer journey is
what happens from the point in time when a customer decides to contact you through to the
completion of that request or transaction. How long does this journey take and what does it
feel like taking the steps along the way. How long is spent waiting? Does the agent have the
customer details to hand? Can the agent answer the query first time? Does the fulfilment
when expected? One very easy but critical way of looking at the customer journey is to
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
mystery shop the centre and to see what it really feels like to be the customer. Put yourselves
in the shoes of your key customer demographic type and call your own centre today.
People
People are the most critical asset in a call centre as it is they who really deliver the business
performance. Unfortunately the investment and perception of your staff may be rather poor.
The people (Agents) often have to deal with difficult situations when things have gone wrong
in your organisation and deal with a large volumes of calls that result, whilst not always
having the necessary training or skills. However, the teams in Centres can be very resilient
and are often very social, making the centre a great place to work. There are many different
roles on offer and so they can a good environment to start and develop a career.
There will be more management information statistics in a call centre than in any other part
of the organisation. The centre is measured from every different angle but unfortunately, this
does not always give a complete picture!
One of the most challenging roles is the planning, measuring and reviewing of performance
because so many centres are under pressure from calls and other expectations, that being able
to step back and take an objective view maybe difficult. Most centres are run to very tight
budgets so factors such as turnover of staff will have a huge impact.
CPE generally refers to devices such as telephones, routers, switches, residential gateways
(RG), set-top boxes, fixed mobile convergence products, home networking adapters and
Internet access gateways that enable consumers to access communications service providers'
services and distribute them around their house via a local area network (LAN).
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Supply chain management must address the following problems:
Distribution Strategy: Centralized versus decentralized, direct shipment, cross docking, pull or
push strategies, third party logistics.
Information: Integrate systems and processes through the supply chain to share valuable
information, including demand signals, forecasts, inventory and transportation.
Inventory Management: Quantity and location of inventory including raw materials, work- in-
process and finished goods.
An ability to source raw material or finished goods from anywhere in the world
A centralized, global business and management strategy with flawless local execution
On-line, real-time distributed information processing to the desktop, providing total supply
chain information visibility
The ability to manage information not only within a company but across industries and
enterprises
The seamless integration of all supply chain processes and measurements, including third-
party suppliers, information systems, cost accounting standards, and measurement systems
The development and implementation of accounting models such as activity based costing
that link cost to performance are used as tools for cost reduction
A reconfiguration of the supply chain organization into high-performance teams going from
the shop floor to senior management.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Source:
Choose the suppliers that will deliver the goods and services you need to create your product.
Develop a set of pricing, delivery and payment processes with suppliers and create metrics for
monitoring and improving the relationships. And put together processes for managing the
inventory of goods and services you receive from suppliers, including receiving shipments,
verifying them, transferring them to your manufacturing facilities and authorizing supplier
payments.
Make:
This is the manufacturing step. Schedule the activities necessary for production, testing, packaging
and preparation for delivery. As the most metric-intensive portion of the supply chain, measure
quality levels, production output and worker productivity.
Deliver:
This is the part that many insiders refer to as logistics. Coordinate the receipt of orders from
customers, develop a network of warehouses, pick carriers to get products to customers and set
up an invoicing system to receive payments.
Return:
The problem part of the supply chain. Create a network for receiving defective and excess
products back from customers and supporting customers who have problems with delivered
products.
2.13 Measuring A Supply Chain’s Performance:
The performance of a supply chain is evaluated by how it reduces cost or increases value.
SCM performance monitoring is important; in many industries, the supply chain represents
roughly 75 percent of the operating budget expense. Three common measures of performance
are used when evaluating SCM performance:
Efficiency focuses on minimizing cost by decreasing the inventory investment or value
relative to the cost of goods sold. An efficient firm is therefore one with a higher inventory
turnover or fewer weeks‘ worth of inventory on hand.
Responsiveness focuses on reduction in both inventory costs and missed sales that comes
with a faster, more flexible supply chain. A responsive firm is proficient in an uncertain
market environment, because it can quickly adjust production to meet demand.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Effectiveness of the supply chain relates to the degree to which the supply chain creates
value for the customer. Effectiveness-focused supply chains are called ―value chains‖
because they focus more on creating customer value than reducing costs and improving
productivity.
To examine the effect of the Internet and electronic commerce on the supply chain is to
examine the impact the Internet has on the efficiency, responsiveness, effectiveness, and
overall performance of the supply chain.
2.14 Advantages of Internet/E-Commerce Integrated Supply Chain:
The primary advantages of Internet utilization in supply chain management are speed,
decreased cost, flexibility, and the potential to shorten the supply chain.
Speed:
A competitive advantage accrues to those firms that can quickly respond to changing
market conditions. Because the Internet allows near instantaneous transfer of information
between various links in the supply chain, it is ideally suited to help firms keep pace with
their environments. Many businesses have placed a priority upon real-time information
regarding the status of orders and production from other members of the supply chain.
Cost decrease:
Internet-based electronic procurement helps reduce costs by decreasing the use of paper and
labour, reducing errors, providing better tracking of purchase orders and goods delivery,
streamlining ordering processes, and cutting acquisition cycle times.
Flexibility:
The Internet allows for custom interfaces between a company and its different clients, helping
to cost-effectively establish mass customization. A manufacturer can easily create a custom
template or Web site for a fellow supply chain member with pre-negotiated prices for various
products listed on the site, making re-ordering only a mouse click away. The information
regarding this transaction can be sent via the Internet to the selling firm‘s production floor and
the purchasing firm‘s purchasing and accounting departments. The accuracy and reliability of
the information is greater than the traditional paper and pencil transaction, personnel time and
expense is reduced, and the real-time dissemination of the relevant information to interested
parties improves responsiveness. These advantages can benefit both firms involved in the
transaction.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Shortening the supply chain:
Dell computers has become a classic example of the power the Internet can have on a
supply chain. Dell helped create one of the first fully Internet-enabled supply chains and
revolutionized the personal-computer industry by selling directly to businesses and consumers,
rather than through retailers and middlemen. In mid-1996, Dell began allowing consumers to
configure and order computers on-line. By 1998, the company recorded roughly $1
billion in ―pure‖ Internet orders. By reducing sales costs and attracting customers who
spend more per transaction, Dell estimates that it yields 30 percent greater profit margins on
Internet sales compared to telephone sales.
Increased interdependence:
Increased commoditization, increased competition, and shrinking profit margins are forcing
companies to increase outsourcing and subcontracting to minimize cost. By focusing on its
core competencies, a firm should be able to maximize its economies of scale and its
competitiveness. However, such a strategy requires increased reliance and information sharing
between members of the supply chain. Increased dependency on various members of the
supply chain can have disastrous consequences if these supply chain members are unable to
handle the functions assigned to them.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Chapter-3
Electronic payment systems and e-commerce are highly linked given that on-line
consumers must pay for products and services. Clearly, payment is an integral part of the
mercantile process and prompt payment is crucial. If the claims and debits of the various
participants (consumers, companies and banks) are not balanced because of payment delay,
then the entire business chain is disrupted. Hence an important aspect of e-commerce is
prompt and secure payment, clearing, and settlement of credit or debit claims.
Electronic payment systems are becoming central to on-line business transactions nowadays as
companies look for various methods to serve customers faster and more cost effectively.
Electronic commerce brings a wide range of new worldwide business opportunities. There is
no doubt that electronic payment systems are becoming more and more common and will play
an important role in the business world. Electronic payment always involves a payer and a
payee who exchange money for goods or services. At least one financial institution like a bank
will act as the issuer (used by the payer) and the acquirer (used by the payee).
Organizations are motivated by the need to deliver products and services more cost
effectively and to provide a higher quality of service to customers.
The emerging electronic payment technology labelled electronic funds transfer (EFT).
EFT is defined as ―any transfer of funds initiated through an electronic terminal
telephonic instrument, or computer or magnetic tape so as to order, instruct, or authorize a
financial institution.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
EFT can be segmented into three broad categories:
Banking and financial payments
Large-scale or wholesale payments (e.g., bank-to-bank transfer) Small-scale or retail
payments (e.g., automated teller machines Home banking (e.g., bill payment)
Retailing payments
Credit Cards (e.g., VISA or Master-card)
Private label credit/debit cards (e.g., J.C. Penney Card) Charge Cards (e.g., American
Express)
On-line electronic commerce payments
Token-based payment systems
Electronic cash (e.g., DigiCash)
Electronic checks (e.g., NetCheque)
Smart cards or debit cards (e.g., Mondex Electronic Currency Card)
Credit card-based payments systems
Encrypted Credit Cards (e.g., World Wide Web form-based encryption) Third-party
authorization numbers (e.g., First Virtual)
3.3 E-Cash:
There are many ways that exist for implementing an e-cash system, all must incorporate a
few common features.
Electronic Cash is based on cryptographic systems called ―digital signatures‖.
This method involves a pair of numeric keys: one for locking (encoding) and the other for
unlocking (decoding).
E-cash must have the following four properties.
Monetary value
Interoperability
Retrievable
Security
• Electronic cash is a general term that describes the attempts of several companies to create
value storage and exchange system that operates on-line in much the same way that
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
• Concerns about electronic payment methods include:
– Privacy
– Security
– Independence
– Portability
• Two methods
– On-line
• Trusted third party, e.g. e-banking, bank holds customers‘ cash accounts
– Off-line
The purchase of e-cash from an on-line currency server (or bank) involves two steps:
Establishment of an account
Maintaining enough money in the account to bank the purchase.
Once the tokens are purchased, the e-cash software on the customer‘s PC stores digital
money undersigned by a bank.
The users can spend the digital money at any shop accepting e-cash, without having to open an
account there or having to transmit credit card numbers.
As soon as the customer wants to make a payment, the software collects the necessary amount
from the stored tokens
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
– Convenience
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
Advantages of Electronic Checks:
1. They work in the same way as traditional checks.
2. These are suited for clearing micro-payments.
3. They create float & availability of float is an important for commerce.
4. Financial risk is assumed by the accounting server & may result in easier acceptance.
Smart cards are credit and debit cards and other card products enhanced with
microprocessors capable of holding more information than the traditional magnetic stripe.
The smart card technology is widely used in countries such as France, Germany, Japan, and
Singapore to pay for public phone calls, transportation, and shopper loyalty programs.
Types of Smart Cards:
It includes access to multiple accounts, such as debit, credit, cash access, bill payment
& multiple access options at multiple locations.
Electronic Purses:
To replace cash and place a financial instrument are racing to introduce electronic purses, wallet-
sized smart cards embedded with programmable microchips that store sums of money for people to
use instead of cash for everything.
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
The electronic purse works in the following manner:
After purse is loaded with money at an ATM, it can be used to pay for candy in a
vending machine with a card reader.
It verifies card is authentic & it has enough money, the value is deducted from balance
on the card & added to an e-cash & remaining balance is displayed by the vending machine.
Credit Card-Based Electronic Payment Systems:
Payment cards are all types of plastic cards that consumers use to make purchases:
– Credit cards
• Such as a Visa or a Master-card, has a preset spending limit based on the user‘s credit limit.
– Debit cards
• Removes the amount of the charge from the card holder‘s account and transfers it to the seller‘s
bank.
– Charge cards
• Such as one from American Express, carries no preset spending limit.
Advantages:
– Payment cards provide fraud protection.
– They have worldwide acceptance.
– They are good for on-line transactions.
Disadvantages:
Payment card service companies charge merchants per-transaction fees and monthly processing
fees.
3.6 Risks in Electronic Payment systems:
Customer's risks
– Stolen credentials or password
– Dishonest merchant
– Disputes over transaction
– Inappropriate use of transaction details
Merchant‘s risk
– Forged or copied instruments
Course: Tutor:
E-Commerce
Institution:
Juma John
Millennium Institute of Development
Studies
– Disputed charges
– Insufficient funds in customer‘s account
– Unauthorized redistribution of purchased items
3.7 Electronic payments Issues:
Secure transfer across internet
High reliability: no single failure point
Atomic transactions
Anonymity of buyer
Economic and computational efficiency: allow micro payments
Flexibility: across different methods
Scalability in number of servers and users
Prior to EDI, business depended on postal and phone systems that restricted
communication to those few hours of the workday that overlap between time zones.
Standards translation:
3.12 E-Marketing:
E-marketing is directly marketing a commercial message to a group of people using
email. In its broadest sense, every email sent to a potential or current customer could be
considered email marketing.
It usually involves using email to send ads, request business, or solicit sales or donations, and
is meant to build loyalty, trust, or brand awareness.
Email marketing can be done to either sold lists or a current customer database. Broadly, the
term is usually used to refer to sending email messages with the purpose of enhancing the
relationship of a merchant with its current or previous customers, to encourage customer
loyalty aand repeat business, acquiring new customers or convincing current customers to
purchase something immediately, and adding advertisements to email messages sent by other
companies to their customers.
An exact return on investment can be tracked and has proven to be high when done
properly. Email marketing is often reported as second only to search marketing as the most
effective on-line marketing tactic.
Email marketing is significantly cheaper and faster than traditional mail, mainly because of
high cost and time required in a traditional mail campaign for producing the artwork, printing,
addressing and mailing.
Advertisers can reach substantial numbers of email subscribers who have opted in (i.e.,
consented) to receive email communications on subjects of interest to them.
Almost half of American Internet users check or send email on a typical day with email
blasts that are delivered between 1 am and 5 am local time outperforming those sent at other times
in open and click rates.
Email is popular with digital marketers, rising an estimated 15% in 2009 to £292 m in the
UK.
If compared to standard email, direct email marketing produces higher response rate and
higher average order value for e-commerce businesses.
Disadvantages:
A report issued by the email services company Return Path, as of mid-2008 email
deliver-ability is still an issue for legitimate marketers. According to the report, legitimate email
servers averaged a delivery rate of 56%; twenty percent of the messages were rejected, and eight
percent were filtered.
Companies considering the use of an email marketing program must make sure that their
program does not violate spam laws such as the United States' Controlling the Assault of Non-
Solicited Pornography and Marketing Act (CAN-SPAM),the European Privacy and Electronic
Communications Regulations 2003, or their Internet service provider's acceptable use policy.
Telemarketing can also include recorded sales pitches programmed to be played over the
phone via automatic dialing.
Telemarketing may be done from a company office, from a call center, or from home. It may
involve a live operator voice broadcasting which is most frequently associated with political
messages.
An effective telemarketing process often involves two or more calls. The first call (or
series of calls) determines the customer‘s needs. The final call (or series of calls) motivates
the customer to make a purchase. Prospective customers are identified by various means, including
past purchase history, previous requests for information, credit limit, competition entry forms,
and application forms. Names may also be purchased from another company's consumer
database or obtained from a telephone directory or another public list. The qualification process
is intended to determine which customers are most likely to purchase the product or service.
Telemarketing techniques are also applied to other forms of electronic marketing using e-
mail or fax messages, in which case they are frequently considered spam by receivers.
Disadvantages:
Telemarketing has been negatively associated with various scams aand frauds, such as
pyramid schemes, and with deceptively overpriced products and services
Telemarketing calls are often considered an annoyance, especially when they occur
during the dinner hour, early in the morning, or late in the evening.
E-Commerce security requirements can be studied by examining the overall process, beginning
with the consumer and ending with the commerce server. Considering each logical link in the
commerce chain, the assets that must be protected to ensure secure e-commerce include client
computers, the messages travelling on the communication channel, and the web and commerce
servers – including any hardware attached to the servers. While telecommunications are certainly
one of the major assets to be protected, the telecommunications links are not the only concern in
computer and e-commerce security. For instance, if the telecommunications links were made
secure but no security measures were implemented for either client computers or commerce and
web-servers, then no communications security would exist at all.
Client threats
Until the introduction of executable web content, Web pages were mainly static. Coded in
HTML, static pages could do little more than display content and provide links to related pages
with additional information. However, the widespread use of active content has changed
this perception.
Active content: Active content refers to programs that are embedded transparently in web pages
and that cause action to occur. Active content can display moving graphics, download and play
audio, or implement web-based spreadsheet programs. Active content is used in e-commerce to
place items one wishes to purchase into a shopping cart and to compute the total invoice amount,
including sales tax, handling, and shipping costs. The best known active content forms are Java
applets, ActiveX controls, JavaScript, and VBScript.
Malicious codes: Computer viruses, worms and trojan horses are examples of malicious code. A
trojan horse is a program which performs a useful function, but performs an unexpected action as
well. Virus is a code segment which replicates by attaching copies to existing executables. A
This is the ability to say that an electronic communication (whether via email or web) does
genuinely come from who it purports to.Without face-to-face contact, passing oneself off as
someone else is not difficult on the internet.
In on-line commerce the best defence against being misled by an imposter is provided by
unforgeable digital certificates from a trusted authority (such as VeriSign). Although anyone can
generate digital certificates for themselves, a trusted authority demands real-world proof of
identity and checks its validity before issuing a digital certificate. Only certificates from trusted
authorities will be automatically recognized and trusted by the major web browser and email client
software.
Authentication can be provided in some situations by physical tokens (such as a drivers license),
by a piece of information known only to the person involved (eg. a PIN), or by a physical property
of a person (fingerprints or retina scans). Strong authentication requires at least two or more of
these. A digital certificate provides strong authentication as it is a unique token and requires a
password for its usage.
Privacy:
In online commerce, privacy is the ability to ensure that information is accessed and changed
only by authorized parties. Typically this is achieved via encryption. Sensitive data (such as
credit card details, health records, sales figures etc..) are encrypted before being transmitted
across the open internet – via email or the web. Data which has been protected with strong 128- bit
encryption may be intercepted by hackers, but cannot be decrypted by them within a short
Authorization:
Authorization allows a person or computer system to determine if someone has the authority to
request or approve an action or information. In the physical world, authentication is usually
achieved by forms requiring signatures, or locks where only authorized individuals hold the keys.
Authorization is tied with authentication. If a system can securely verify that a request for
information (such as a web page) or a service (such as a purchase requisition) has come from a
known individual, the system can then check against its internal rules to see if that person has
sufficient authority for the request to proceed.
In the on-line world, authorization can be achieved by a manager sending a digitally signed email.
Such an email, once checked and verified by the recipient, is a legally binding request for a
service. Similarly, if a web-server has a restricted access area, the server can request a digital
certificate from the user‘s browser to identify the user and then determine if they should be given
access to the information according to the server‘s permission rules.
Integrity:
Integrity of information means ensuring that a communication received has not been altered or
tampered with. Traditionally, this problem has been dealt with by having tight control over
access to paper documents and requiring authorized officers to initial all changes made – a
system with obvious drawbacks and limitations. If someone is receiving sensitive information on-
line, he not only wants to ensure that it is coming from who he expects it to (authentication), but
also that it hasn‘t been intercepted by a hacker while in transit and its contents altered. The speed
and distances involved in on-line communications requires a very different approach to this
problem from traditional methods.
One solution is afforded by using digital certificates to digitally ―sign‖ messages. A travelling
employee can send production orders with integrity to the central office by using their digital
certificate to sign their email. The signature includes a hash of the original message – a brief
What service types (e.g., web, FTP, SMTP) users may have access to?
What classes of information exist within the organization and which should be encrypted
before being transmitted?
What client data does the organization hold. How sensitive is it? How is it to be
protected?
What class of employees may have remote access to the corporate network?
Roles and responsibilities of managers and employees in implementing the security
policy.
How security breaches are to be responded to?
What is the procedure for determining who should be given access? The security policy
regulates the activities of employees just as much as it defines how IT infrastructure will be
configured. The policy should include details on how it is to be enforced
ISO 17799 provides detailed guidelines on how a management framework for enterprise
security should be implemented. It conceives ten security domains. Under each domain there are
certain security objectives to be fulfilled. Each objective can be attained by a number of controls.
The controls may prescribe management measures like guidelines and procedures, or some
security infrastructure in the form of tools and techniques. It details various methods that can be
followed by enterprises to meet security needs for e-commerce. It talks about the need for
security policies, security infrastructure, and continuous testing in
the same manner as has been detailed above.
3.17 Firewall:
A firewall is a network security system that controls the incoming and outgoing network traffic
based on an applied rule set. A firewall establishes a barrier between a trusted, secure internal
network and another network (e.g., the Internet) that is assumed not to be secure and trusted.
Firewalls exist both as software to run on general purpose hardware and as a hardware appliance.
Many hardware-based firewalls also offer other functionality to the internal network they protect,
such as acting as a DHCP server for that network.
Many personal computer operating systems include software-based firewalls to protect against
threats from the public Internet. Many routers that pass data between networks contain firewall
components and, conversely, many firewalls can perform basic routing functions.
Types of Firewall:
There are different types of firewalls depending on where the communication is taking place,
where the communication is intercepted and the state that is being traced.
Stateful firewalls maintain context about active sessions, and use that "state information" to
speed packet processing. Any existing network connection can be described by several
properties, including source and destination IP address, UDP or TCP ports, and the current
stage of the connection's lifetime (including session initiation, handshaking, data transfer, or
completion connection). If a packet does not match an existing connection, it will be evaluated
according to the rule set for new connections. If a packet matches an existing connection based
on comparison with the firewalls state table, it will be allowed to pass without further
processing.
Stateless firewalls require less memory, and can be faster for simple filters that require less
time to filter than to look up a session. They may also be necessary for filtering stateless
network protocols that have no concept of a session. However, they cannot make more
complex decisions based on what stage communications between hosts have reached.
Application-layer firewalls work on the application level of the TCP/IP stack (i.e., all browser
traffic, or all telnet or ftp trtraffic), and may intercept all packets travelling to or from an
application. They block other packets (usually dropping them without acknowledgement to the
sender).
On inspecting all packets for improper content, firewalls can restrict or prevent outright the
spread of networked computer worms aand trojans. The additional inspection criteria can add
extra latency to the forwarding of packets to their destination.
Application firewalls function by determining whether a process should accept any given
connection. Application firewalls accomplish their function by hooking into socket calls to
filter the connections between the application layer and the lower layers of the OSI model.
Application firewalls that hook into socket calls are also referred to as socket
Also, application firewalls further filter connections by examining the process ID of data packets
against a rule set for the local process involved in the data transmission. The extent of the
filtering that occurs is defined by the provided rule set. Given the variety of software that exists,
application firewalls only have more complex rule-sets for the standard services, such as
sharing services. These per process rule sets have limited efficacy in filtering every possible
association that may occur with other processes.
Proxy server:
Proxies make tampering with an internal system from the external network more difficult and
misuse of one internal system would not necessarily cause a security breach exploitable from
outside the firewall. Conversely, intruders may hijack a publicly reachable system and use it as
a proxy for their own purposes; the proxy then masquerades as that system to other internal
machines. While use of internal address spaces enhances security, crackers may still employ
methods such as IP spoofing to attempt to pass packets to a target network.
Network Address Translation:
Firewalls often have network address translation (NAT) functionality, and the hosts
protected behind a firewall commonly have addresses in the "private address range", as defined in
RFC 1918.
Firewalls often have such functionality to hide the true address of protected hosts. Originally, the
NAT function was developed to address the limited number of IPv4 routable addresses that could
Course: Institution: Tutor:
E-Commerce, 2025. Millennium Institute of Development Studies Juma John
be used or assigned to companies or individuals as well as reduce both the amount and therefore
cost of obtaining enough public addresses for every computer in an organization. Hiding the
addresses of protected devices has become an increasingly important defence against network
reconnaissance.
Authentication:
Although messages may often include information about the entity sending a message, that
information may not be accurate. Digital signatures can be used to authenticate the source of
messages. When ownership of a digital signature secret key is bound to a specific user, a valid
signature shows that the message was sent by that user. The importance of high confidence in
sender authenticity is especially obvious in a financial context. For example, suppose a bank's
branch office sends instructions to the central office requesting a change in the balance of an
Integrity:
In many scenarios, the sender and receiver of a message may have a need for confidence that the
message has not been altered during transmission. Although encryption hides the contents of a
message, it may be possible to change an encrypted message without understanding it. (Some
encryption algorithms, known as nonmalleable ones, prevent this, but others do not.) However, if a
message is digitally signed, any change in the message after signature invalidates the signature.
Furthermore, there is no efficient way to modify a message and its signature to produce a new
message with a valid signature, because this is still considered to be computationally infeasible
by most cryptographic hash functions (see collision resistance).
Non-repudiation:
RSA-based signature schemes, such as RSA-PSS DSA and its elliptic curve variant
ECDSA
ElGamal signature scheme as the predecessor to DSA, and variants Schnorr signature aand
Pointcheval–Stern signature algorithm
Rabin signature algorithm
Pairing-based schemes such as BLS Undeniable signatures
Aggregate signature - a signature scheme that supports aggregation: Given n signatures on n
messages from n users, it is possible to aggregate all these signatures into a single signature whose
size is constant in the number of users. This single signature will convince the verifier that the n
users did indeed sign the n original messages.
Signatures with efficient protocols - are signature schemes that facilitate efficient
cryptographic protocols such as zero-knowledge proofs or secure computation.
The most common use of a digital certificate is to verify that a user sending a message is who
he or she claims to be, and to provide the receiver with the means to encode a reply. An individual
wishing to send an encrypted message applies for a digital certificate from a Certificate Authority
(CA). The CA issues an encrypted digital certificate containing the applicant's public key and
a variety of other identification information. The CA makes its own public key readily
available through print publicity or perhaps on the Internet.
The recipient of an encrypted message uses the CA's public key to decode the digital
certificate attached to the message, verifies it as issued by the CA and then obtains the sender's
public key and identification information held within the certificate. With this information, the
recipient can send an encrypted reply.
The most widely used standard for digital certificates is X.509.
Serial Number: Used to uniquely identify the certificate. Subject: The person, or entity
identified.
Signature Algorithm: The algorithm used to create the signature.
Signature: The actual signature to verify that it came from the issuer.
Issuer: The entity that verified the information and issued the certificate. Valid-From: The
date the certificate is first valid from.
Valid-To: The expiration date.
Key-Usage: Purpose of the public key (e.g. encipherment, signature, certificate signing...).
Public Key: The public key.
Thumbprint Algorithm: The algorithm used to hash the public key certificate.
Chapter-4
ERP provides an integrated view of core business processes, often in real-time, using common
databases maintained by a database management system. ERP systems track business resources—
cash, raw materials, production capacity—and the status of business commitments: orders,
purchase orders, and payroll. The applications that make up the system share data across the
various departments that provide the data. ERP facilitates information flow between all business
functions, and manages connections to outside stakeholders.
Enterprise system software is a multi-billion dollar industry that produces components that
support a variety of business functions. IT investments have become the largest category of capital
expenditure in United States-based businesses over the past decade. Though early ERP systems
focused on large enterprises, smaller enterprises increasingly use ERP systems.
The ERP system is considered a vital organizational tool because it integrates varied
organizational systems and facilitates error-free transactions and production. However, ERP
system development is different from traditional systems development.
ERP systems run on a variety of computer hardware aand network cconfiguration,
typically using a database as an information repository.
An ERP system covers the following common functional areas. In many ERP systems these are
called and grouped together as ERP modules:
It is a business management strategy focusing on the analysis and design of workflows and
business processes wwithin an organization.
BPR aimed to help organizations fundamentally rethink how they do their work in order to
dramatically improve customer service, cut operational costs, aand become world-class
competitors.
Business Process Re-engineering (BPR) is the practice of rethinking and redesigning the way
work is done to better support an organization's mission aand reduce costs. Re-engineering starts
with a high-level assessment of the organization's mission, strategic goals, and customer needs.
Within the framework of this basic assessment of mission and goals, re-engineering focuses
on the organization's business processes—the steps and procedures that govern how resources are
used to create products aand services that meet the needs of particular customers or markets. As a
structured ordering of work steps across time and place, a business process can be decomposed
into specific activities, measured, modelled, and improved. It can also be completely redesigned or
eliminated altogether. Re-engineering identifies, analyses, and re-designs an organization's core
business processes with the aim of achieving dramatic improvements in critical performance
measures, such as cost, quality, service, and speed.
Re-engineering recognizes that an organization's business processes are usually
fragmented into sub-processes and tasks that are carried out by several specialized
Many of the early expert systems were developed by large consulting and system integration
firms such as Andersen Consulting. These firms already had well tested conventional waterfall
methodologies (e.g. Method/1 for Andersen) that they trained all their staff in and that were
virtually always used to develop software for their clients. One trend in early expert systems
development was to simply apply these waterfall methods to expert systems development.
Another issue with using conventional methods to develop expert systems was that due to the
unprecedented nature of expert systems they were one of the first applications to adopt rapid
application development methods that feature iteration and prototyping as well as or instead of
detailed analysis and design. In the 1980s few conventional software methods supported this type
of approach.
The final issue with using conventional methods to develop expert systems was the need for
knowledge acquisition. Knowledge acquisition rrefers to the process of gathering expert
knowledge and capturing it in the form of rules and ontologies. Knowledge acquisition has
special requirements beyond the conventional specification process used to capture most
business requirements.
These issues led to the second approach to knowledge engineering: development of custom
methodologies specifically designed to build expert systems.[1] One of the first and most popular
of such methodologies custom designed for expert systems was the Knowledge Acquisition and
Documentation Structuring (KADS) methodology developed in Europe.
Financial Accounting has several sub systems. They are: General Ledger
Accounts receivable and payable
Asset accounting
Legal Consolidation
Controlling
Investment Management:
Investment Management provides extensive support for investment processes right from
planning through settlement.
Investment management facilitates investment planning and budgeting at a level higher than
that needed for specific orders or projects.
You can define an investment program hierarchy using any criteria-for example department-
wise.
Investment program allows you to distribute budgets, which are used during the capital
spending process.
Investment Management provides tools, enabling you to plan and manage your capital
spending projects right from the earliest stage
Investment Management module recognizes the importance of the asset accounting aspects of
investment measures.
The system automatically separates costs requiring capitalization from costs that are not
capitalized, debiting the correct costs to the asset under construction.
Asset accounting provides precise proof of origin for all transactions affecting acquisition
and production costs.
Plant Maintenance:
The achievement of world class performance demands delivery of quality products
expeditiously and economically.Organizations simply cannot achieve excellence with unreliable
equipment.
Component Tracking
Plant Maintenance Calibration Tracking
Plant Maintenance Warranty Claims
Tracking
Quality Management:
The ISO9000 series of standards defines the functions of quality management and the
elements of a quality management system.
The functions in the Quality Management module support the essential elements of such a
system. The other integrated modules in the system complement this functionality.
The ISO standards require that quality management systems penetrate all processes within
an organization.
The task priorities, according to the quality loop, shift form production (implementation
phase) to production planning and product development (planning phase) to procurement and
sales and distribution, as well as into the entire usage phase.
Computer-integrated Quality Management (CIQ) is more appropriate term in comparison to
Computer-Aided Quality Management (CAQ), because an isolated CAQ system
cannot carry out the comprehensive tasks of a quality management system.
Quality planning ( Management of basic data for quality planning and inspection
planning, material specifications, Inspection planning).
Quality Control: (Dynamic sample determination on the basis of the quality level
history, Application of statistical process control techniques using quality control charts.
The Quality Management module uses the system‘s integration to link the tasks of quality
management with those of the other applications, such as materials management, production,
sales/distribution and cost accounting.
SAP-AG BAAN
PeopleSoft
Oracle Corporation
J.D. Edwards
SAP-AG:
SAP is the world's leading provider of business software, SAP delivers products and
services that help accelerate business innovation for their customers. Today, more than
82,000 customers in more than 120 countries run SAP applications – from distinct solutions
addressing the needs of small businesses and mid-size companies to suite offerings for global
organizations.
SAP defines business software as comprising enterprise resource planning and related
applications such as supply chain management, customer relationship management, and supplier
relationship management
SAP AG was founded in 1972 by five German engineers with IBM in Mannheim,
Germany and is one of the top most ERP vendors providing the client server business application
solutions.
SAP serves as a standard in the industries like chemicals, customer products, oil & high
technology. The SAP group has offices in more than 50 countries worldwide & employs a
workforce of over 19300.
SAP‘s ERP package comes in 2 versions i.e. mainframe version (SAP R/2) & client
server version (SAP R/3).(R-Real)
With SAP, customers can install the core system & one or more of the fundamental
components, or purchase the software as a complete package.
SAP has developed extensive library of more than 800 predefined business processes.
These processes may be selected from SAP library & can be included within installed
SAP application solution to suit the user exact requirements.
SAP software has special features like, linking a company‘s business processes & applications,
& supporting immediate responses to change throughout different organizational levels & real time
integration.
Also, the new technologies are available regularly to cop-up with the changes of the new
business trends.
The modules of R/3 can be used individually as well as user can expand it in stages to
meet specific requirements.
BAAN:
Baan company was founded in Netherlands in 1978 by brothers Jan and Paul Baan..
The BAAN Company is the leading global provider of enterprise business software.
The BAAN company products reduce complexity and cost, improve core business
processes, are faster to implement and use, are more flexible in adapting to business
changes.
The products offered by the company supports several business tools. The tools are based
on multi-tier architecture.
Baan DEM provides a business view via a graphical process/model based views. BAAN
products has multi-tiered architecture for maximum and flexible
configuration.
The application supports the new hardware, OS, networks and user interfaces w/o any
modification to the application code.
This is the first s/w company to implement internet computing model for using the
enterprise s/w across the entire product line.
Oracle application consists of 45 plus software modules which are divided into following
categories
Oracle Financials Oracle Manufacturing
Oracle Human Resource Oracle Supply Chain
Oracle Projects Oracle Front Office
Oracle Financial:
– This application transforms a finance organization into a strategic force and also
helps to access the financial management functions.
Oracle Projects:
– These applications increase top line revenues & maintain customer satisfaction &
retention
– This application helps in managing the human resources which directly improve
profitability and contribute to competitive advantage
Oracle Manufacturing:
People Soft:
PeopleSoft Inc.. was established in 1987 to provide innovative software solutions that
meet the changing business demands of enterprises worldwide.
It employs more than 7000 people worldwide.& the annual revenue for the year 1998 was
$ 1.3 million.
PeopleSoft‘s mission is to provide innovative software solutions that meet the changing
business demands of organizations worldwide.
People-soft products support clients running, Microsoft Windows and popular Web
browsers, as well as a range of mainframe, midrange and LAN relational database server
platforms.
The People-soft‘s business management solutions are in the areas given below:-
JD Edwards:
On March 17, 1977 J.D. Edwards was formed, by Jack Thompson, Dan Gregery & Ed- Mc
Vaney.
In early years J.D. Edwards designed software for small & medium sized computers.
In 1980‘s it focused on IBM system/38.
As the company began to out grow, its headquarters in Denver, opened branch offices in
Dallas & Newport Beach, California, Houston, San Francisco & Bakersfield. And then
internationally expanded its Europe headquarters in Brussels & Belgium.
As it grew it became obvious that servicing a large number of customers was creating a
challenge
By the mid of 1980‘s, J.D Edwards was being recognizes as an Industry-leading supplier of
application software for the highly successful IBM AS/400 computer.
Today J.D Edwards is a publicly traded company that has more than 4700 customers with
sites in over 100 countries & more than 4200 employees.
J.D Edwards emphasizes on the following three matters:
These software's are operated in multiple computing environments & also JAVA &
HTML enabled.
Data integration: Ensures that information in multiple systems is kept consistent. This is also
known as enterprise information integration (EII).
Multiple technologies are used in implementing each of the components of the EAI system:
Bus/hub:
Application connectivity:
The bus/hub connects to applications through a set of adapters (also referred to as connectors).
These are programs that know how to interact with an underlying business application. The adapter
performs two-way communication, performing requests from the hub against the application, and
notifying the hub when an event of interest occurs in the application (a new record inserted, a
transaction completed, etc..). Adapters can be specific to an application (e. g., built against the
application vendor's client libraries) or specific to a class of applications (e. g., can interact with
any application through a standard communication protocol, such as SOAP, SMTP or Action
Message Format (AMF)). The adapter could reside in the same process space as the bus/hub or
execute in a remote location and interact with the hub/bus through industry standard protocols
such as message queues, web services, or even use a proprietary protocol. In the Java world,
standards such as JCA allow adapters to be created in a vendor-neutral manner.
To avoid every adapter having to convert data to/from every other applications' formats, EAI
systems usually stipulate an application-independent (or common) data format. The EAI system
usually provides a data transformation service as well to help convert between application-
Integration modules:
An EAI system could be participating in multiple concurrent integration operations at any given
time, each type of integration being processed by a different integration module. Integration
modules subscribe to events of specific types and process notifications that they receive when
these events occur. These modules could be implemented in different ways: on Java-based EAI
systems, these could be web applications or EJBs or even POJOs that conform to the EAI
system's specifications.
When used for process integration, the EAI system also provides transactional consistency across
applications by executing all integration operations across all applications in a single overarching
distributed transaction (using two-phase commit protocols or compensating transactions).
Disadvantages of EAI:
1. Constant change: The very nature of EAI is dynamic and requires dynamic project
managers to manage their implementation.
2. Shortage of EAI experts: EAI requires knowledge of many issues and technical aspects.
3. Competing standards: Within the EAI field, the paradox is that EAI standards themselves are
not universal.
4. EAI is a tool paradigm: EAI is not a tool, but rather a system and should be implemented as
such.
5. Building interfaces is an art: Engineering the solution is not sufficient. Solutions need to be
negotiated with user departments to reach a common consensus on the final outcome. A lack of
consensus on interface designs leads to excessive effort to map between various systems data
requirements.