The document discusses e-business applications and information systems. It defines an information system as any organized combination of people, hardware, software, communications networks, and data resources that stores, retrieves, transforms, and disseminates information in an organization. It also discusses types of information technologies including computer hardware, software, telecommunications networks, and data resource management technologies. The document then defines e-business as the use of internet technologies to empower business processes, electronic commerce, and enterprise collaboration within and between organizations. It provides definitions and concepts regarding electronic commerce organizations and where electronic commerce is conducted.
Enterprise systems integrate information across a company's operations on a company-wide basis. They provide a central repository for information that is common to all corporate users. These systems allow seamless sharing of information regardless of where the data is located. Interorganizational systems facilitate information flow between companies to streamline processes. Enterprise systems can be internally or externally focused to coordinate activities within a company or with external partners.
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
This document discusses information system security and controls. It begins by defining an information system as the organized collection, processing, transmission, and spreading of information according to defined procedures. Security policies, procedures, and technical measures are used to prevent unauthorized access, alteration, theft, or damage to information systems. Controls ensure the safety of organizational assets, accuracy of records, and adherence to management standards. The document then examines principles of security including confidentiality, integrity, and availability. It also discusses system vulnerabilities, threats, and various security measures.
This document provides information on decision support systems (DSS). It discusses definitions of DSS and how they support decision making. DSS can take many forms, from model-driven to data-driven systems. The document outlines frameworks for developing DSS and describes different types of DSS including passive, active, and cooperative systems. It also discusses applications of DSS in areas like business and agriculture.
Lecture delivered by Marlon Dumas for the course Introduction to Informatics at University of Tartu on 15 October 2020. The lecture gives an overview of different types of enterprise systems (e.g. ERP, CRM, ECM systems, etc,.) and some of the main their functions covered by each of these systems.
This document discusses management information systems (MIS) and their role in organizations. It begins by defining MIS as a system that provides managers with information to help with decision making, planning, and control. It then discusses different types of information systems at various levels, including operational, knowledge, management, and strategic levels. Transaction processing systems, management information systems, decision support systems, and executive information systems are described. The document also discusses digital firms and how they leverage various applications and technologies to digitally enable core business functions.
This document provides an outline on supply chain management (SCM), customer relationship management (CRM), and enterprise resource planning (ERP). It defines key concepts such as the bullwhip effect in SCM and discusses how vendor managed inventory can help mitigate it. The importance of CRM for customer retention is explained. ERP is introduced as a system for integrating business transactions and providing access to information across an organization. An example illustration demonstrates how an ERP system can coordinate different business functions in real-time.
This chapter provides the basics of Electronic Customer Relationship Management and gives a clear idea about the e-CRM. It also gives the knowledge of changing perspective of the e-CRM practices
Enterprise systems integrate information across a company's operations on a company-wide basis. They provide a central repository for information that is common to all corporate users. These systems allow seamless sharing of information regardless of where the data is located. Interorganizational systems facilitate information flow between companies to streamline processes. Enterprise systems can be internally or externally focused to coordinate activities within a company or with external partners.
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
This document discusses information system security and controls. It begins by defining an information system as the organized collection, processing, transmission, and spreading of information according to defined procedures. Security policies, procedures, and technical measures are used to prevent unauthorized access, alteration, theft, or damage to information systems. Controls ensure the safety of organizational assets, accuracy of records, and adherence to management standards. The document then examines principles of security including confidentiality, integrity, and availability. It also discusses system vulnerabilities, threats, and various security measures.
This document provides information on decision support systems (DSS). It discusses definitions of DSS and how they support decision making. DSS can take many forms, from model-driven to data-driven systems. The document outlines frameworks for developing DSS and describes different types of DSS including passive, active, and cooperative systems. It also discusses applications of DSS in areas like business and agriculture.
Lecture delivered by Marlon Dumas for the course Introduction to Informatics at University of Tartu on 15 October 2020. The lecture gives an overview of different types of enterprise systems (e.g. ERP, CRM, ECM systems, etc,.) and some of the main their functions covered by each of these systems.
This document discusses management information systems (MIS) and their role in organizations. It begins by defining MIS as a system that provides managers with information to help with decision making, planning, and control. It then discusses different types of information systems at various levels, including operational, knowledge, management, and strategic levels. Transaction processing systems, management information systems, decision support systems, and executive information systems are described. The document also discusses digital firms and how they leverage various applications and technologies to digitally enable core business functions.
This document provides an outline on supply chain management (SCM), customer relationship management (CRM), and enterprise resource planning (ERP). It defines key concepts such as the bullwhip effect in SCM and discusses how vendor managed inventory can help mitigate it. The importance of CRM for customer retention is explained. ERP is introduced as a system for integrating business transactions and providing access to information across an organization. An example illustration demonstrates how an ERP system can coordinate different business functions in real-time.
This chapter provides the basics of Electronic Customer Relationship Management and gives a clear idea about the e-CRM. It also gives the knowledge of changing perspective of the e-CRM practices
E-commerce infrastructure requires hardware, software, and networks to support online transactions. Key components include web servers, web server support software, electronic catalogs, web design, and internet access. Developing an initial website allows an organization to provide product/service information and basic interactions like email inquiries. More advanced sites enable functions like online ordering. Website intelligence leverages customer demographics, preferences, transactions, and behaviors to personalize the customer experience through traffic analysis, interaction analysis, and content enrichment. Developing a website requires choosing design versus outsourcing approaches and technologies like HTML, JavaScript, databases, and considering factors like navigation, load times, and screen resolutions.
Amazon was founded in 1995 as an online bookstore and has since expanded into various products and services. It uses a management information system (MIS) to support its business operations such as inventory control, logistics, point-of-sale data collection, and internal communications. The MIS includes features like shopping carts, wish lists, one-click purchasing, analytical reports, and a decision support system. Over time, Amazon has innovated its business model and MIS through strategies like expanding product offerings, implementing affiliate marketing and cloud computing services, and developing expert systems to better predict product success and customer preferences.
This document discusses e-business and related applications. It begins by defining e-business and the types of activities it involves, such as buying and selling goods and services online. It then covers advantages like reduced costs and time savings, as well as disadvantages like security issues. Different e-business models are described, including business-to-business, business-to-consumer, and others. Strategies for e-business growth like affiliate marketing and continuous improvement are outlined. Emerging trends in e-business like mobile technologies, social media, and customization options are also summarized.
The document provides an overview of management information systems (MIS). It defines key concepts such as data, information, and systems. It explains that an MIS is a system for collecting, processing, storing, and distributing data to managers within an organization. The main outputs of an MIS are scheduled reports, key indicator reports, demand reports, and exception reports. These help managers monitor performance and make decisions. Overall, the document serves as an introduction to MIS, covering essential elements like the relationship between data, information, and systems.
Supply chain management in e-commerce involves delivering products to customers through online channels. E-commerce companies like Flipkart use technology to improve their supply chain operations. This helps avoid costs, reduce inventory levels, and speed up production and delivery. Flipkart is a leading Indian e-commerce company that sources products from over 500 distributors and delivers over 30,000 orders daily through partnerships with multiple logistics companies. It offers customers convenient payment options and return policies.
Customer relationship management in mis (2)Sahil Kamdar
This document discusses customer relationship management (CRM) and its implementation at Audi. It begins with defining CRM and outlining the main types of CRM implementation models. It then discusses the benefits and challenges of CRM systems. The document uses Audi as a case study, providing background on the company and its goal of using CRM to create more holistic customer relationships. Specifically, Audi's CRM vision aims to acquire and retain long-term customers by working closely with dealerships to deliver personalized offers to valuable customers and drive loyalty. Audi implemented mySAP CRM 4.0 and SAP BW 3.1 to achieve this vision.
1) Enterprise systems integrate software modules and a common database to collect and share data across business divisions for internal processes.
2) Supply chain management systems help coordinate planning, production, and logistics with suppliers to reduce costs and improve operational efficiency.
3) Implementing new enterprise systems, like SAP, can help struggling companies transform their operations, increase sales, and improve profitability as shown through the example of Tasty Baking Company.
General Electric implemented an online procurement system called TPN to improve its purchasing process. This reduced labor costs by 30%, allowed 60% of staff to be redeployed, and cut purchase order processing time from 18-23 days to 9-11 days. It also found new suppliers and received a 20% discount.
There are different models of business-to-business e-commerce, including supplier-oriented marketplaces driven by manufacturers like Cisco, buyer-oriented marketplaces that benefit large buyers and sellers, and intermediary-oriented marketplaces or exchanges that match buyers and sellers. EDI traditionally standardized business documents but had limitations that internet-based EDI addressed through benefits like lower costs and more flexibility.
E-commerce refers to the buying and selling of goods or services using the internet and involves several types of online transactions between businesses, government, and consumers. It provides advantages like low costs, global reach, and convenience. However, it also poses risks like credit card theft and reliance on internet connectivity. Effective supply chain management is important for businesses and aims to deliver high-quality products to customers efficiently at low costs through electronic information sharing and optimized distribution. E-commerce plays a key role in supply chain management by reducing costs, increasing flexibility, and improving customer service.
The document discusses e-marketplaces, their components and types. It describes private, public and consortia e-marketplaces. It also discusses transactions, intermediaries, electronic catalogs, auctions, bartering, mobile commerce, competition in the digital economy, and the impact of e-commerce on organizations and industries. Key topics covered include different types of intermediaries and their roles, benefits and limitations of auctions, the promise of mobile commerce, and how e-commerce transforms organizations and impacts whole industries.
Security and Control Issues in Information SystemDaryl Conson
This document discusses information systems security. It defines an information system as a set of components for collecting, storing, processing, and delivering information and knowledge. Information systems play an important role in modern society and infrastructures. To protect against potential losses, it is crucial for information systems to have security measures from the outset. Information system security aims to establish policies and controls to guarantee the authenticity, confidentiality, availability, and integrity of information assets. It discusses the importance of controls to provide security and quality assurance for information systems.
Enterprise management systems (EMS) are large-scale software packages that support business processes, information flows, reporting, and data analytics in complex organizations. EMS include components like ERP for operational systems, CAD/CAM/CAE for engineering drawings and design information, AMS for employee attendance tracking, DMS for document management, CMS for communication management, and SMS for security management of people, vehicles, and materials. These systems integrate various business functions and provide inputs for planning and control across the organization.
Enterprise systems integrate key business processes throughout an entire firm into a single software system. This allows information to flow seamlessly between different departments. For example, when a sales representative in Brussels enters a customer order, the factory in Hong Kong receives the order automatically and begins production. Updated sales and production data then flows to accounting and other departments. Managers need to pay attention to business processes because they determine how well an organization can execute tasks and be a potential source of success or failure.
An executive information system (ESS) is a reporting tool that allows executive managers to quickly access and summarize reports from all levels and departments of an organization. It uses computer hardware, software, and user interfaces to extract summary data and solve complex problems by providing rapid access to timely internal and external information and management reports. Components of an ESS include hardware, software, a user interface, and telecommunications capabilities.
Lesson 5: Information Systems PresentationKereen Tatham
This document discusses information systems and their role in organizations. It defines an information system as a set of components that collect, process, and disseminate data to meet organizational objectives. Information systems support decision making at different management levels - operational, tactical, and strategic. Transaction processing systems handle basic business transactions, management information systems provide routine reports, and decision support systems aid complex problem solving. The document also outlines security, privacy, and ethical issues with information systems, and how systems are used in key business functions like finance, marketing, and human resources.
The document outlines 8 key characteristics of a successful CRM implementation: 1) having a clear CRM vision and leadership, 2) developing CRM strategies around objectives, segments, and customer interactions, 3) creating a valued customer experience through understanding needs, monitoring satisfaction, and acting on feedback, 4) fostering organizational collaboration around customer understanding, 5) establishing CRM processes around the customer lifecycle and knowledge management, 6) leveraging CRM information like customer data and analytics, 7) utilizing CRM technology applications and infrastructure, and 8) defining CRM metrics around value, retention, satisfaction and loyalty.
This document provides an overview of chapter 7 from the textbook "Management Information Systems with MISource" which discusses electronic business systems. The chapter identifies cross-functional enterprise systems like enterprise application integration and transaction processing systems. It also explains how internet technologies can support business functions in areas such as accounting, finance, human resources, marketing, production and operations. Key concepts covered include enterprise resource planning, customer relationship management, supply chain management and knowledge management systems.
The document discusses supply chain management (SCM) and enterprise resource planning (ERP) systems. It defines SCM as coordinating an organization's activities to get products to customers efficiently. ERP systems integrate internal business processes across departments like manufacturing, distribution, and accounting. The document also covers customer relationship management (CRM) systems, which manage relationships with customers through activities like sales, marketing, customer service and retention programs.
E-business involves conducting business operations over the internet through activities like online shopping, sales, and customer support. It originated in the 1950s with computers processing internal transactions, and expanded in the 1970s with electronic data interchange between banks. E-business offers advantages over traditional business like reduced errors, lower costs, and faster processing times. Key areas of e-business include banking, healthcare, retail, and tourism. It requires tools like websites, payment systems, and security to function.
The document discusses information systems for businesses and how they have evolved. It covers the need for information systems to support fast and accurate transactions, storage, communication, and decision-making. It also discusses the pressures businesses face in today's global, technology-driven environment and how they are responding through strategic systems, business process reengineering, e-commerce, alliances, and continuous improvement efforts.
This document provides an overview of electronic business (e-business) and its applications. E-business utilizes information and communication technologies to support business activities both internally and externally. It focuses on using ICT to enable relationships between a business and individuals, groups, and other businesses. The web is a key tool for e-business, allowing businesses to attract customers through marketing and advertising, improve customer service, and expand their reach. E-business provides benefits like increased sales, reduced costs, and more accessibility and communication. Its applications include internal systems like CRM and ERP as well as e-commerce, supply chain management, and online/offline marketing. E-marketing, e-commerce, and e-business are related but
The document discusses e-business applications. It defines e-business as conducting business via the Internet, including buying and selling goods and services as well as customer support. The origins of e-business date back to the 1950s when computers were used to process internal transactions, and the 1960s-70s saw the rise of electronic data interchange between banks. Key advantages of e-business include reduced errors, lower costs, and faster processing compared to traditional business. The document also outlines prerequisites, areas, differences between e-commerce and e-business, and defines related terms like EDI, ERP.
E-commerce infrastructure requires hardware, software, and networks to support online transactions. Key components include web servers, web server support software, electronic catalogs, web design, and internet access. Developing an initial website allows an organization to provide product/service information and basic interactions like email inquiries. More advanced sites enable functions like online ordering. Website intelligence leverages customer demographics, preferences, transactions, and behaviors to personalize the customer experience through traffic analysis, interaction analysis, and content enrichment. Developing a website requires choosing design versus outsourcing approaches and technologies like HTML, JavaScript, databases, and considering factors like navigation, load times, and screen resolutions.
Amazon was founded in 1995 as an online bookstore and has since expanded into various products and services. It uses a management information system (MIS) to support its business operations such as inventory control, logistics, point-of-sale data collection, and internal communications. The MIS includes features like shopping carts, wish lists, one-click purchasing, analytical reports, and a decision support system. Over time, Amazon has innovated its business model and MIS through strategies like expanding product offerings, implementing affiliate marketing and cloud computing services, and developing expert systems to better predict product success and customer preferences.
This document discusses e-business and related applications. It begins by defining e-business and the types of activities it involves, such as buying and selling goods and services online. It then covers advantages like reduced costs and time savings, as well as disadvantages like security issues. Different e-business models are described, including business-to-business, business-to-consumer, and others. Strategies for e-business growth like affiliate marketing and continuous improvement are outlined. Emerging trends in e-business like mobile technologies, social media, and customization options are also summarized.
The document provides an overview of management information systems (MIS). It defines key concepts such as data, information, and systems. It explains that an MIS is a system for collecting, processing, storing, and distributing data to managers within an organization. The main outputs of an MIS are scheduled reports, key indicator reports, demand reports, and exception reports. These help managers monitor performance and make decisions. Overall, the document serves as an introduction to MIS, covering essential elements like the relationship between data, information, and systems.
Supply chain management in e-commerce involves delivering products to customers through online channels. E-commerce companies like Flipkart use technology to improve their supply chain operations. This helps avoid costs, reduce inventory levels, and speed up production and delivery. Flipkart is a leading Indian e-commerce company that sources products from over 500 distributors and delivers over 30,000 orders daily through partnerships with multiple logistics companies. It offers customers convenient payment options and return policies.
Customer relationship management in mis (2)Sahil Kamdar
This document discusses customer relationship management (CRM) and its implementation at Audi. It begins with defining CRM and outlining the main types of CRM implementation models. It then discusses the benefits and challenges of CRM systems. The document uses Audi as a case study, providing background on the company and its goal of using CRM to create more holistic customer relationships. Specifically, Audi's CRM vision aims to acquire and retain long-term customers by working closely with dealerships to deliver personalized offers to valuable customers and drive loyalty. Audi implemented mySAP CRM 4.0 and SAP BW 3.1 to achieve this vision.
1) Enterprise systems integrate software modules and a common database to collect and share data across business divisions for internal processes.
2) Supply chain management systems help coordinate planning, production, and logistics with suppliers to reduce costs and improve operational efficiency.
3) Implementing new enterprise systems, like SAP, can help struggling companies transform their operations, increase sales, and improve profitability as shown through the example of Tasty Baking Company.
General Electric implemented an online procurement system called TPN to improve its purchasing process. This reduced labor costs by 30%, allowed 60% of staff to be redeployed, and cut purchase order processing time from 18-23 days to 9-11 days. It also found new suppliers and received a 20% discount.
There are different models of business-to-business e-commerce, including supplier-oriented marketplaces driven by manufacturers like Cisco, buyer-oriented marketplaces that benefit large buyers and sellers, and intermediary-oriented marketplaces or exchanges that match buyers and sellers. EDI traditionally standardized business documents but had limitations that internet-based EDI addressed through benefits like lower costs and more flexibility.
E-commerce refers to the buying and selling of goods or services using the internet and involves several types of online transactions between businesses, government, and consumers. It provides advantages like low costs, global reach, and convenience. However, it also poses risks like credit card theft and reliance on internet connectivity. Effective supply chain management is important for businesses and aims to deliver high-quality products to customers efficiently at low costs through electronic information sharing and optimized distribution. E-commerce plays a key role in supply chain management by reducing costs, increasing flexibility, and improving customer service.
The document discusses e-marketplaces, their components and types. It describes private, public and consortia e-marketplaces. It also discusses transactions, intermediaries, electronic catalogs, auctions, bartering, mobile commerce, competition in the digital economy, and the impact of e-commerce on organizations and industries. Key topics covered include different types of intermediaries and their roles, benefits and limitations of auctions, the promise of mobile commerce, and how e-commerce transforms organizations and impacts whole industries.
Security and Control Issues in Information SystemDaryl Conson
This document discusses information systems security. It defines an information system as a set of components for collecting, storing, processing, and delivering information and knowledge. Information systems play an important role in modern society and infrastructures. To protect against potential losses, it is crucial for information systems to have security measures from the outset. Information system security aims to establish policies and controls to guarantee the authenticity, confidentiality, availability, and integrity of information assets. It discusses the importance of controls to provide security and quality assurance for information systems.
Enterprise management systems (EMS) are large-scale software packages that support business processes, information flows, reporting, and data analytics in complex organizations. EMS include components like ERP for operational systems, CAD/CAM/CAE for engineering drawings and design information, AMS for employee attendance tracking, DMS for document management, CMS for communication management, and SMS for security management of people, vehicles, and materials. These systems integrate various business functions and provide inputs for planning and control across the organization.
Enterprise systems integrate key business processes throughout an entire firm into a single software system. This allows information to flow seamlessly between different departments. For example, when a sales representative in Brussels enters a customer order, the factory in Hong Kong receives the order automatically and begins production. Updated sales and production data then flows to accounting and other departments. Managers need to pay attention to business processes because they determine how well an organization can execute tasks and be a potential source of success or failure.
An executive information system (ESS) is a reporting tool that allows executive managers to quickly access and summarize reports from all levels and departments of an organization. It uses computer hardware, software, and user interfaces to extract summary data and solve complex problems by providing rapid access to timely internal and external information and management reports. Components of an ESS include hardware, software, a user interface, and telecommunications capabilities.
Lesson 5: Information Systems PresentationKereen Tatham
This document discusses information systems and their role in organizations. It defines an information system as a set of components that collect, process, and disseminate data to meet organizational objectives. Information systems support decision making at different management levels - operational, tactical, and strategic. Transaction processing systems handle basic business transactions, management information systems provide routine reports, and decision support systems aid complex problem solving. The document also outlines security, privacy, and ethical issues with information systems, and how systems are used in key business functions like finance, marketing, and human resources.
The document outlines 8 key characteristics of a successful CRM implementation: 1) having a clear CRM vision and leadership, 2) developing CRM strategies around objectives, segments, and customer interactions, 3) creating a valued customer experience through understanding needs, monitoring satisfaction, and acting on feedback, 4) fostering organizational collaboration around customer understanding, 5) establishing CRM processes around the customer lifecycle and knowledge management, 6) leveraging CRM information like customer data and analytics, 7) utilizing CRM technology applications and infrastructure, and 8) defining CRM metrics around value, retention, satisfaction and loyalty.
This document provides an overview of chapter 7 from the textbook "Management Information Systems with MISource" which discusses electronic business systems. The chapter identifies cross-functional enterprise systems like enterprise application integration and transaction processing systems. It also explains how internet technologies can support business functions in areas such as accounting, finance, human resources, marketing, production and operations. Key concepts covered include enterprise resource planning, customer relationship management, supply chain management and knowledge management systems.
The document discusses supply chain management (SCM) and enterprise resource planning (ERP) systems. It defines SCM as coordinating an organization's activities to get products to customers efficiently. ERP systems integrate internal business processes across departments like manufacturing, distribution, and accounting. The document also covers customer relationship management (CRM) systems, which manage relationships with customers through activities like sales, marketing, customer service and retention programs.
E-business involves conducting business operations over the internet through activities like online shopping, sales, and customer support. It originated in the 1950s with computers processing internal transactions, and expanded in the 1970s with electronic data interchange between banks. E-business offers advantages over traditional business like reduced errors, lower costs, and faster processing times. Key areas of e-business include banking, healthcare, retail, and tourism. It requires tools like websites, payment systems, and security to function.
The document discusses information systems for businesses and how they have evolved. It covers the need for information systems to support fast and accurate transactions, storage, communication, and decision-making. It also discusses the pressures businesses face in today's global, technology-driven environment and how they are responding through strategic systems, business process reengineering, e-commerce, alliances, and continuous improvement efforts.
This document provides an overview of electronic business (e-business) and its applications. E-business utilizes information and communication technologies to support business activities both internally and externally. It focuses on using ICT to enable relationships between a business and individuals, groups, and other businesses. The web is a key tool for e-business, allowing businesses to attract customers through marketing and advertising, improve customer service, and expand their reach. E-business provides benefits like increased sales, reduced costs, and more accessibility and communication. Its applications include internal systems like CRM and ERP as well as e-commerce, supply chain management, and online/offline marketing. E-marketing, e-commerce, and e-business are related but
The document discusses e-business applications. It defines e-business as conducting business via the Internet, including buying and selling goods and services as well as customer support. The origins of e-business date back to the 1950s when computers were used to process internal transactions, and the 1960s-70s saw the rise of electronic data interchange between banks. Key advantages of e-business include reduced errors, lower costs, and faster processing compared to traditional business. The document also outlines prerequisites, areas, differences between e-commerce and e-business, and defines related terms like EDI, ERP.
The document discusses e-business applications. It defines e-business as conducting business via the Internet, including buying and selling goods and services as well as customer support. The origins of e-business date back to the 1950s when computers were used for internal record keeping and transaction data was exchanged on paper or magnetic tapes. In the 1970s, electronic data interchange between banks changed the financial market. E-business reduces errors, paperwork, and processing times compared to traditional business. It allows for all-time processing, better service, and global reach but also faces challenges like security issues and lack of customer awareness. Key areas of e-business include tourism, banking, healthcare, stocks, and finance.
E-business refers to conducting business electronically by connecting customers, suppliers, employees, and partners through online transactions and collaborations. E-business has evolved from early electronic data interchange between large companies in the 1970s to widespread e-commerce and online shopping between businesses and consumers today, totaling trillions of dollars annually. E-business offers benefits like global reach, reduced costs, convenience and increased productivity and efficiency. However, e-business also faces challenges around privacy, security, and internet fraud.
The document discusses mobile computing courses and security aspects of mobile devices. It proposes expanding mobile computing courses to include areas of mobile computing like app development, wireless networks, and security. It also describes attacks like cross-site scripting and defending against them using tools like Wireshark, TCP dump, and reverse engineering mobile apps to analyze for malicious scripts or unexpected permissions. The paper focuses on the need to educate students about mobile security vulnerabilities and providing hands-on lab experiences analyzing threats.
The document summarizes 13 interviews conducted over two weeks with architecture and engineering firms. It details the types and sizes of firms interviewed, as well as trends in the design/construction industry observed from the interviews. Key trends included increased use of Building Information Modeling (BIM) software and growth in green building projects. The document also provides background on the Spectrum team members and their initial concept to provide automated building performance feedback early in the commercial design process.
This document presents three models to help managers develop successful e-business strategies:
1. The Strategic Internet Applications Model (SIAM) identifies four areas for e-business strategies to focus on: current customers, new customers, products, or business networks.
2. The Customer Interaction Cycle (CIC) model describes the interaction process between suppliers and customers, highlighting opportunities for suppliers to add value.
3. The ADOF model is a funnel with four sequential stages - Accessibility, Design, Offer, and Fulfillment - that determine a website's operational success based on optimizing each stage.
Together these three models provide a hierarchy to guide managers' strategic, tactical, and operational e-
Transnational Strategic Management-Value Chain Analysis-Write UpMeenaskhi Gaur
Value chain analysis examines the series of activities within an organization that create and build value for customers. Michael Porter identified nine value-creating activities grouped into primary and support activities. This case study examines Zara's value chain. Zara designs, produces, and distributes fashion products in only two weeks to satisfy demand. It manufactures 50% of products internally and uses 300 subcontractors for other production. Zara's integrated design process allows for continuous updates based on customer feedback. Its efficient logistics network distributes products to stores several times per week from its main distribution center.
This presentation from Research Scientist Stacey Frederick provides an overview of a method to identify the firms and organizations involved in the nano economy throughout the value chain and introduces a new web-based platform to disseminate the information.
The document discusses scaling medicine through design and accelerating data to improve quality and lower costs. It suggests that engineers and designers are essential to hack business models and define experiments to test assumptions. Some areas proposed to focus on include incentives, health reform, and the intersection of high tech and med tech. The document outlines several tools that can be used to map and hack healthcare business models, including a business model canvas, care delivery value chain, and health model canvas. It provides the MIT example of Ginger.io and encourages attendees to "please hack healthcare."
Global e-business faces important challenges related to globalization, culture, and language. Companies engaged in the global market can increase revenues but must ensure their websites respect various cultures. Effective global e-business requires considering issues like cultural differences, providing translations into multiple languages using machine or human translators, determining profitability in new markets, pricing in local currencies, and navigating tariffs and quotas set by governments. Proper understanding of these challenges is key to removing geographic barriers and successfully expanding business internationally online.
This document provides a summary of the top 10 entrepreneurs in the world by net worth. It lists each entrepreneur's name, net worth, and a brief description of how they made their fortune and any notable business ventures or investments. The top entrepreneur is Bill Gates, with a net worth of $40 billion from founding Microsoft, despite stock losses over the past year. Carlos Slim Helu comes in third with a net worth of $35 billion primarily from his stake in America Movil. Warren Buffett ranks second with a net worth of $37 billion as the chairman and CEO of Berkshire Hathaway.
The document discusses various topics related to e-commerce and electronic payments including real world cash, electronic money, analyzing cash, checks and cards, secure electronic transaction (SET), B2B e-payments, a general guide to e-payments, and issues and implications. It provides information on different payment methods, standards like SET, benefits of e-payments for B2B transactions, tips for online payments, and questions around consumer needs, corporate processes, strategy and regulation in electronic payments.
role of enterprenur in economic developmentRakhi Seth
The document discusses the role of entrepreneurs in economic development. It states that entrepreneurs promote capital formation, create wealth and employment opportunities, and help develop industries in rural and less developed areas. Entrepreneurs stimulate the overall economy by establishing businesses, inducing backward and forward linkages between industries, and increasing production to raise the gross national product and standard of living. Their activities facilitate balanced regional growth and the country's export trade, making them a crucial factor in a nation's economic development.
The document provides an overview of the business process outsourcing (BPO) industry. It discusses what BPO is, the different types including back office and front office outsourcing. India has emerged as a global leader in BPO due to its large workforce and lower costs compared to countries like the US. The top BPO services include customer support, technical support and data processing. While BPO provides benefits like flexible work schedules, challenges include long working hours and health issues.
- E-commerce is changing the banking industry by allowing customers to access services online and reducing costs. This includes services like bill payment and transferring funds.
- Banks are facing new competition and changing customer needs and demands for services like 24/7 access. They are turning to technology and online banking to reduce costs while improving customer service.
- Factors like increasing computer literacy and awareness of online banking options have led to greater success of e-banking over time compared to earlier attempts. Management must address challenges to provide high quality customized online services.
E-commerce involves buying and selling of goods and services over the Internet, while e-business refers to conducting business processes digitally within a company. Some key differences are:
- E-commerce is a subset of e-business that is limited to monetary transactions, while e-business encompasses additional digital processes.
- E-commerce focuses on external commercial transactions with customers, while e-business also transforms internal business transactions and processes.
- E-commerce requires a website for transactions, but e-business requires additional digital systems like CRM and ERP integrated within the company.
This document provides an overview of a lecture on management information systems and competing with information and communication technology. It defines ICT and discusses its building blocks. It also covers strategic uses of ICT, including leveraging investments in digital technologies to gain competitive advantages like raising barriers to entry, locking in customers and suppliers, and increasing market share. Additionally, it discusses using ICT to improve customer service and strategic positioning of emerging Internet technologies.
This document provides an overview of key concepts related to information systems. It defines data, information, and knowledge, explaining how data is transformed into information and knowledge. It also defines what a system is and its typical components. Different types of information systems are described, including transaction processing systems, ERP, MIS, DSS, and expert systems. The development of information systems is discussed, outlining typical development steps. Lastly, it covers strategic information systems and how organizations can use systems to achieve competitive advantages.
This document provides an overview of key concepts related to information systems. It defines data, information, and knowledge, explaining how data is transformed into information and knowledge. It also defines what a system is and its typical components. Different types of information systems are described, including transaction processing systems, e-commerce systems, ERP systems, and decision support systems. The role of information systems in achieving competitive advantage is discussed. Different organizational structures and their impact on information systems are covered. The document also discusses topics like reengineering, outsourcing, downsizing, and performance-based information systems.
Lecture iii (september 2014)the information system and procurementbosp1
This document provides an overview of supply chain management and procurement concepts. It discusses information exchange in SCM and enterprise resource planning systems. ERP systems integrate business functions like accounting, sales, and operations. The role of purchasing is described as coordinating suppliers to get the right materials at the right time and price. Outsourcing can provide benefits like reducing costs but risks include losing competitive knowledge. Supply chain collaboration where members work towards shared goals is also covered.
Lecture iii (september 2014)the information system and procurementbosp1
This document provides an overview of supply chain management and procurement. It discusses key topics like information exchange in SCM, enterprise resource planning systems, the role of purchasing, and make-or-buy decisions. ERP systems are described as integrated software that coordinates business functions from procurement to invoicing. The benefits of supply chain collaboration are outlined, including reduced costs and inventory through shared information and planning. Outsourcing can provide benefits like economies of scale but also risks if critical knowledge is lost.
Operations Research and ICT A Keynote AddressElvis Muyanja
By Prof. Venansius Baryamureeba, PhD
Uganda Technology And Management University (UTAMU)
www.utamu.ac.ug/barya ; barya@utamu.ac.ug
12th Operations Research Society for Eastern Africa (ORSEA) Conference, October 20-21, 2016, Hosted at the Faculty of Computing and Management Science Building, Makerere University Business School (MUBS), Kampala Uganda
The document defines key terms related to e-business including electronic business, electronic commerce, and electronic business infrastructure. It also discusses how e-business can benefit organizations through increased productivity, selection, and communication. Examples are given of how automobile manufacturers and other industries can apply e-business strategies in areas like sales, customer service, and supply chain management. Potential members of an e-commerce supply chain are also outlined.
This document defines key terms related to e-business and e-commerce. It discusses how e-business involves conducting business processes over computer networks for areas like production, customers, and internal management. E-commerce specifically refers to transactions that transfer ownership or rights to use goods/services. The document provides examples of how automobile manufacturers and other companies have applied e-business strategies. It also outlines various models of e-commerce and potential members of e-commerce supply chains.
This document defines key terms related to e-business and e-commerce. It discusses how e-business involves conducting business processes over computer networks for areas like production, customers, and internal management. E-commerce specifically refers to transactions that transfer ownership or rights to use goods/services. The document provides examples of how automobile manufacturers and other companies have applied e-business strategies. It also outlines various models of e-commerce and potential members of e-commerce supply chains.
This document defines key terms related to e-business and e-commerce. It discusses how e-business involves conducting business processes over computer networks for areas like production, customers, and internal management. E-commerce specifically refers to transactions that transfer ownership or rights to use goods/services. The document provides examples of how automobile manufacturers and other companies have applied e-business strategies. It also outlines various models of e-commerce and potential members of e-commerce supply chains.
This document defines key terms related to e-business and e-commerce. It discusses how e-business involves conducting business processes over computer networks for areas like production, customers, and internal management. E-commerce specifically refers to transactions that transfer ownership or rights to use goods/services. The document provides examples of how automobile manufacturers and other companies have applied e-business strategies. It also outlines various models of e-commerce and potential members of e-commerce supply chains.
This document defines key terms related to e-business and e-commerce. It discusses how e-business involves conducting business processes over computer networks for areas like production, customers, and internal management. E-commerce specifically refers to transactions that transfer ownership or rights to use goods/services. The document provides examples of how automobile manufacturers and other companies have applied e-business strategies. It also outlines various models of e-commerce and potential members of e-commerce supply chains.
This document defines key terms related to e-business and e-commerce such as electronic business, electronic commerce, and computer-mediated networks. It also discusses how e-business can benefit organizations through increased productivity, selection, and information availability. Examples are given of how companies like Cisco, Nike, and Dell have implemented e-business applications. The concluding sections outline strategies for implementing e-commerce and improving e-business operations.
This document defines key terms related to e-business and e-commerce. It discusses how e-business involves conducting business processes over computer networks for areas like production, customers, and internal management. E-commerce specifically refers to transactions that transfer ownership or rights to use goods/services. The document provides examples of how automobile manufacturers and other companies have applied e-business strategies. It also outlines various models of e-commerce and potential members of e-commerce supply chains.
This document defines key terms related to e-business and e-commerce. It discusses how e-business involves conducting business processes over computer networks for areas like production, customers, and internal management. E-commerce specifically refers to transactions that transfer ownership or rights to use goods/services. The document provides examples of how automobile manufacturers and other companies have applied e-business strategies. It also outlines various models of e-commerce and potential members of e-commerce supply chains.
E-business involves conducting business processes over computer networks and encompasses electronic commerce. It allows for increased customization, productivity and customer service. Automobile manufacturers can apply e-business to online sales, customer service, supplier management and more. Potential benefits include more choices, higher productivity and improved communication.
This document provides an overview of information systems in organizations. It defines key concepts like data, information, and knowledge. It discusses why organizations use information systems to achieve operational excellence, develop new products and services, gain customer intimacy, improve decision making, gain competitive advantages, and ensure survival. The dimensions of an information system that must be understood are the organization, management, and technology. A case study of UPS's automated package tracking system is also provided to illustrate how information systems provide benefits.
Information technology in supply chain managemnetpriya rana
The document discusses how information technology can be applied in supply chain management. It describes several key applications of IT, including electronic commerce, electronic data interchange, bar coding and scanners, data warehousing, and enterprise resource planning tools. These technologies help streamline supply chains, connect customers and producers, analyze supply chain options, synchronize production flows, improve communication, and optimize operations. The strategic use of supply chain management software and Internet technologies allows companies to better collaborate with partners and adapt operations to meet customer needs.
The document discusses the importance of aligning business processes and information technology (IT) in supply chain management. It explains that investing in both business processes and IT leads to better supply chain performance than investing in only one. The goals of supply chain IT are described as providing visibility of supply chain data, enabling analysis of that data, and facilitating collaboration with partners. Different components of supply chain management systems are outlined, including decision support systems, enterprise resource planning software, and the use of analytics and artificial intelligence.
This document lists and categorizes different types of birds and mammals. It identifies bald eagle, golden eagle, black kite, hawk, falcon, owl, and vulture as carnivorous birds. Crow, raven, flamingo, woodpecker, and starling are identified as omnivorous birds. Key characteristics and eating habits of mammals are outlined, including examples of herbivorous, carnivorous, and omnivorous mammals such as cows, lions, humans, and more. Hippopotamus, panda, fox, dolphin, skunk, bear, and pig are provided as examples of omnivorous mammals.
The document discusses different types of animals classified based on their characteristics. It describes vertebrates as animals with backbones divided into five groups - fish, amphibians, reptiles, birds, and mammals. It provides details about each group's defining features like temperature regulation, locomotion organs, habitats and diet. Fish live in water and have gills, scales and fins. Amphibians can live on land and water, have moist skin and undergo metamorphosis. Reptiles are scaly and lay eggs, include snakes, lizards, turtles and crocodiles. Birds are warm-blooded, lay eggs and have feathers, beaks and wings to fly with some flightless exceptions.
This document provides information about different types of celestial bodies in our solar system. It discusses the key differences between terrestrial and Jovian planets, as well as their composition and examples. Small planets like Mercury, Venus, Earth and Mars are described. Gas giants like Jupiter, Saturn, Uranus and Neptune are also outlined. Characteristics of dwarf planets such as Ceres, Pluto, Eris, Makemake and Haumea are summarized. Other bodies like comets, asteroids, meteoroids, and black holes are also briefly defined.
The document provides information about the solar system, including its definition, composition, formation via the Big Bang theory, and details about the Sun and eight planets. It describes that the solar system formed nearly 5 billion years ago from a massive explosion called the Big Bang. It is comprised of the Sun, eight planets, dwarf planets, moons, and other celestial bodies that orbit the Sun. Each planet is then defined with key details about its composition, rotation, revolution, and notable features.
Final gs ch p the energy crisis in pakistanazmatmengal
Pakistan is facing a severe energy crisis with electricity outages of 18 hours per day. The crisis is affecting the country's economy and is expected to worsen with shortages of 1000-2000 MW currently and over 3000 MW projected next year. In addition, Pakistan is facing shortages of 80 million tons of oil and 27 million tons of natural gas annually. The key causes of the crisis include fluctuating international oil prices, inefficient distribution systems with 15-20% energy losses, and a lack of implementation following seminars and conferences. Recommendations include paying off debts, investing in distribution infrastructure to reduce losses, converting inefficient gas plants, and developing solar and coal energy resources.
Telepathy is defined as the direct transfer of thoughts from one person to another without using the usual sensory channels of communication. It is considered a form of extrasensory perception. There are different types of telepathy including latent, precognitive, emotional, and super-conscious telepathy. Some signs that a person may have a physical ability for telepathy include knowing who is calling before answering the phone or getting feelings about events that later come true. While telepathy can be developed through techniques, it may not work immediately and has limitations like only being able to focus on one target at a time or being overwhelmed by too many thoughts.
The document outlines the steps of an anti-smoking campaign on a college campus. It will initially post pictures around campus of students smoking with the campaign's symbol and tagline. It will then display environmental and health hazard messages alongside the symbol and tagline. Going forward, it will distribute caps with the symbol and tagline printed on them. It will also hold an interactive event to distribute flyers and caps while building a relationship with students. The campaign will designate smoking areas and apply fines for non-compliance while also analyzing the results of these efforts.
Final gs ch p negative effects of technology on human's wildlifeazmatmengal
Technology has both positive and negative effects on human lives and wildlife. Some key negative impacts include depleting natural resources through overharvesting, pollution from emissions and waste, and contributing to species extinction. Technology can also promote unhealthy lifestyles by reducing outdoor activities and exercise. Children in particular are negatively impacted by excessive screen time which can lead to issues like obesity, addiction, loneliness and depression. The proliferation of technology is also damaging to wildlife through radiation from devices and infrastructure like cell towers, as well as threats from wind turbines.
The document discusses various theories and perspectives on dreams throughout history. It provides details on:
1) Ancient Egyptian theories that dreams were messages from gods and priests would interpret dreams for guidance. Greeks also believed dreams carried divine messages.
2) Sigmund Freud's theory that dreams reflect deepest desires from childhood. Carl Jung disagreed and believed dreams fulfill unconscious wishes.
3) Common dream symbols and their potential meanings such as the sun indicating important people, rain indicating blessings, and trees representing leaders.
4) Types of dreams according to Islamic tradition - true dreams, thoughts during the day, and dreams from Satan. Dreams can have positive or negative meanings.
Digestion is a multi-step process where food is broken down from large insoluble molecules to smaller soluble molecules that can be absorbed into the bloodstream. The main steps are ingestion, digestion, absorption, assimilation, and egestion. There are two types of digestion: extracellular digestion which occurs outside cells and intracellular digestion which occurs inside cells. The alimentary canal aids in digestion, consisting of the mouth, esophagus, stomach, small intestine (made up of the duodenum, jejunum and ileum), and large intestine (made up of the caecum, colon and rectum).
This document discusses light pollution, defining it as the alteration of natural light levels due to artificial light sources. It is most severe in densely populated, industrialized areas of North America, Europe, Japan, and major Middle Eastern and North African cities. Light pollution comes from various exterior and interior lighting sources and has negative effects on the natural environment, humans, and animals. It disrupts ecosystems, increases greenhouse gases, and harms wildlife navigation, behaviors, and food sources. The document recommends reducing light pollution by using dimmer, targeted lighting and motion sensors to turn off unnecessary fixtures.
Noise pollution is unwanted sound that disrupts human and animal life. It can damage hearing at 85 dB or above and cause health issues like heart problems, stress, and sleep disturbances in humans. Major sources include transportation, industrial machines, construction equipment, and loud music. Noise pollution interferes with animal communication, navigation, and reproduction and can cause permanent hearing loss. It also indirectly impacts plants by altering animal behaviors that help disperse seeds and pollinate.
Photosynthesis is the process by which plants convert carbon dioxide and water into glucose and oxygen using energy from sunlight. It requires the ingredients of water, carbon dioxide, light, and chlorophyll. Water is transported through the plant from the roots to the leaves, while carbon dioxide enters through pores in the leaves. Chlorophyll in the chloroplasts captures light energy to drive the reaction that produces glucose and oxygen. At night, plants respire like animals by absorbing oxygen and releasing carbon dioxide. Some plants are carnivorous and obtain nutrients by trapping and digesting animal prey using various trap types like pitfall, snap, flypaper, and suction traps.
Wind energy is generated by converting the kinetic energy of moving air into electrical energy using wind turbines. There are two main types of wind turbines - horizontal axis turbines with three blades rotating parallel to the ground, and vertical axis turbines with blades attached perpendicular to the ground. The size of wind turbines can vary from small residential turbines generating under 30 kW to large utility-scale turbines generating up to 5 MW. Choosing a wind turbine for residential use involves assessing energy needs, determining optimal location based on wind resources, and selecting a turbine matched to average wind speeds in the area.
2hrly gs ch p supernatural belief vs science perspectiveazmatmengal
This document discusses perspectives on beliefs in the supernatural from different cultures and time periods. It provides statistics on beliefs in God, heaven, hell, ghosts, and psychic healing among others from a survey in an unnamed country. The document also discusses a study conducted in South Africa on explanations for illness and finds that while biological explanations are agreed with, supernatural explanations are also commonly supported, especially among adults. It briefly mentions Aokigahara Forest in Japan, known as a suicide forest where many bodies have been found.
2 hrly gs ch p psychological issues and youth amber alitaf shaikhazmatmengal
Psychological Issues and Youth discusses common psychological disorders seen in teenagers. It covers issues like alcohol/drug abuse, anxiety, depression, attention deficit/hyperactivity disorder, eating disorders like anorexia and bulimia, conduct disorder, Tourette's syndrome, sexual abuse, and suicide. The document provides information on symptoms, warning signs, and risk factors for each disorder. It aims to educate about normal psychological development versus psychological problems in youth.
This document discusses personality and how it is determined by both hereditary and environmental factors. Personality is described as the dynamic organization of psychophysical systems that determine a person's unique adjustment to their environment. Personality traits can help with employee selection, career development, and matching people to jobs. Two approaches to measuring personality are described: the Myers-Briggs Type Indicator and the Big Five personality traits. Various methods are also listed for measuring personality through self-reports, observer ratings, and projective tests.
Perception is the process by which individuals organize and interpret their sensory impressions to give meaning to their environment. It involves selecting and organizing stimuli through the senses. An individual's perception is influenced by their characteristics, attitudes, personality, needs, and expectations. As a result, different people can perceive the same stimuli differently. Perception is also shaped by factors in the perceiver, the object or target being perceived, and the context of the situation. How we judge others is explained by attribution theory, which looks at whether we attribute behaviors internally or externally based on factors like distinctiveness, consensus, and consistency.
2hrly gs ch p facts about human skeletonazmatmengal
The human skeleton has several functions including providing structure, producing blood cells, storing minerals, and protecting organs. Babies have around 350 bones that fuse together into 206 bones for adults. The spine anchors all other bones and is made of 33 vertebrae. There are different bone types including long, short, flat, irregular, and sesamoid. Joints connect two or more bones and can be categorized by connection type and mobility, including little mobility, slight movement, and freely movable joints.
The Bermuda Triangle is an area in the western part of the North Atlantic Ocean where a number of aircraft and ships are said to have disappeared under mysterious circumstances. It is bounded by points in Bermuda, Florida and Puerto Rico and covers about 500,000 square miles. While some ships and planes have disappeared in the area leaving little evidence, skeptics believe the number of incidents is relatively low when considering the high volume of traffic and that occurrences can be explained by violent weather or human error.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
2. What is an Information System?
Any organized combination of people,
hardware, software, communications
networks, and data resources that stores,
retrieves, transforms, and disseminates
information in an organization.
3. Types of Information
Technologies
• Computer Hardware Technologies
including microcomputers, midsize servers, and large
mainframe systems, and the input, output, and storage
devices that support them
• Computer Software Technologies
including operating system software, Web browsers,
software productivity suites, and software for business
applications like customer relationship management and
supply chain management
4. Types of Information
Technologies
• Telecommunications Network Technologies
including the telecommunications media, processors, and
software needed to provide wire-based and wireless access
and support for the Internet and private Internet-based
networks
• Data Resource Management Technologies
including database management system software for the
development, access, and maintenance of the databases of
an organization
6. What is E-Business?
Definition:
• The use of Internet technologies to work
and empower business processes, electronic
commerce, and enterprise collaboration
within a company and with its customers,
suppliers, and other business stakeholders.
• An online exchange of value.
7. Electronic Commerce:
Definitions and Concepts
• EC organizations
brick-and-mortar organizations
Old-economy organizations (corporations) that perform
most of their business off-line, selling physical products by
means of physical agents
virtual (pure-play) organizations
Organizations that conduct their business activities solely
online
click-and-mortar (click-and-brick) organizations
Organizations that conduct some e-commerce activities,
but do their primary business in the physical world
8. Electronic Commerce:
Definitions and Concepts
• Where EC is conducted
electronic market (e-marketplace)
An online marketplace where buyers and sellers meet to
exchange goods, services, money, or information
interorganizational information systems (IOSs)
Communications system that allows routine transaction
processing and information flow between two or more
organizations
intraorganizational information systems
Communication systems that enable e-commerce
activities to go on within individual organizations
9. Benefits of EC
Benefits to Organizations
• Global Reach
• Cost Reduction
• Supply Chain
Improvements
• Extended Hours
• Customization
• New Business Models
• Vendors’ Specialization
• Rapid Time-to-Market
• Lower Communication
Costs
• Efficient Procurement
• Improved Customer
Relations
• Up-to-Date Company
Material
• No City Business
Permits and Fees
• Other Benefits
10. Benefits of EC
Benefits to Consumers
• Ubiquity
• More Products and
Services
• Customized Products
and Services
• Cheaper Products and
Services
• Instant Delivery
• Information Availability
• Participation in
Auctions
• Electronic Communities
• No Sales Tax
11. Benefits of EC
• Benefits to Society
–
–
–
–
–
Telecommuting
Higher Standard of Living
Homeland Security
Hope for the Poor
Availability of Public Services
13. Value Chain (Michael Porter, 1985)
• A series of linked activities or processes in
an organization
• IT can improve these processes
14. Strategic Analysis
This is all about the analysing the strength of businesses'
position and understanding the important external factors that
may influence that position. The process of Strategic Analysis
can be assisted by a number of tools, including:
Five Forces Analysis - a technique for identifying the forces
which affect the level of competition in an industry
PEST Analysis - a technique for understanding the
"environment" in which a business operates
Scenario Planning - a technique that builds various credible
views of possible futures for a business
Market Segmentation - a technique which seeks to identify
similarities and differences between groups of customers or
users
SWOT Analysis - a useful summary technique for
summarising the key issues arising from an assessment of a
businesses "internal" position and "external" environmental
influences.
15. The Value Chain
• A framework for identifying core
competencies
– Inside the firm
– In the supply chain
• Can be used to
– Identify strengths and weaknesses
– Identify sources of competitive advantage
– Identify market opportunities
17. Primary Activities and Factors for Assessment
Inbound
Logistics
Soundness of
material and
inventory
control
systems
Efficiency of
raw material
warehousing
activities
Operations
Outbound
Logistics
Productivity of Timeliness and
equipment
efficiency of
compared to
delivery of
that of key
finished goods
competitors
and services
Appropriate
Efficiency of
automation of
finished goods
production
warehousing
processes
activities
Effectiveness
of production
control systems
to improve
quality and
reduce costs
Efficiency of
plant layout
and work-flow
design
Marketing & Sales
Customer
Service
Effectiveness of
market research to
identify customer
segments & needs
Innovation in sales
& promotion
Evaluation of
alternate
distribution
channels
Motivation and
competence of sales
force
Development of
image of quality and
a favorable
reputation
Extent of brand
loyalty among
customers
Extent of market
dominance within
the market segment
or overall market
Means to solicit
customer input
for product
improvements
Promptness of
attention to
customer
complaints
Appropriateness
of warranty and
guarantee
policies
Quality of
customer
education and
training
Ability to
provide
replacement parts
and repair service
18. Secondary Activities and Factors for Assessment
Firm
Infrastructure
Capability to
identify new
product market
opportunities and
potential
environmental
threats
Quality of the
strategic planning
system to achieve
corporate objectives
Coordination and
integration of all
value chain
activities
Ability to obtain
relatively low cost
funds for capital
expenditures and
working capital
Timely & accurate
information on
general and
competitive
environments
Human
Resource
Effectiveness of
procedures for
recruiting,
training, and
promoting all
levels of
employees
Appropriateness
of reward systems
Relations with
trade unions
Levels of
employee
motivation and
job satisfaction
Technology
Development
Success of R&D
activities in leading
to product and
process innovations
Quality of working
relationship between
R&D personnel and
other departments
Timeliness of
technology
development
activities in meeting
critical deadlines
Qualifications &
experience of
laboratory
technicians and
scientists
Ability of work
environment to
encourage creativity
and innovation
Procurement
Development of
alternate sources for
inputs to minimize
dependence on a
single supplier
Procurement of raw
materials on timely
basis at lowest
possible cost and at
acceptable levels of
quality
Development for
criteria for lease-vs.buy decisions
Good, long-term
relationships with
suppliers
19. Technologies in the Value Chain
Information System Technology
Planning and Budgeting Technology
Office Technology
FIRM
INFRASTRUCTURE
Training Technology
Motivation Research
Information Technology
HUMAN
RESOURCE
MANAGEMENT
Product Technology
Computer-Aided Design
Pilot Plant Technology
TECHNOLOGY
DEVELOPMENT
Software Development Tools
Information Systems Technology
Information Systems Technology
Communication System Technology
Transportation System Technology
PROCUREMENT
•Transportation
Technology
•Material Handling
Technology
•Storage and
Preservation
Technology
•Communication
System Technology
•Testing Technology
•Information
Technology
INBOUND
LOGISTICS
•Basic Process
Technology
•Materials
Technology
•Machine Tools
Technology
•Materials Handling
Technology
•Packaging
Technology
•Testing Technology
•I/nformation Tech.
OPERATIONS
•Transportation
Technology
•Material Handling
Technology
•Packaging
Technology
•Communications
Technology
•Information
Technology
•Multi-Media
Technology
•Communication
Technology
•Information
Technology
•Diagnostic and
Testing Technology
•Communications
Technology
•Information
Technology
OUTBOUND
LOGISTICS
MARKETING
AND SALES
SERVICE
20. The Internet Value Chain
Internet
Capability
Benefits
to
Company
Opportunity
for
Advantage
Marketing and
Product
Research
Data for
market
research,
establishes
consumer
responses
Enhance
Efficiency
Sales and
Distribution
Support and
Customer
Feedback
•Low cost
distribution
•Reaches new
customers
•Multiplies
contact points
•Access to
customer comments online
•Immediate response to
customer
problems
Create New
Business
Opportunities
Maintain Valuable
Customers and
Relationships
21. Customer Competition Connectivity
External Drivers
High
Low
Strategic Positioning of Internet
Technologies
Global Market
Penetration
Product and Services
Transformation
Strategy
E-Commerce Website
Value-added IT Services
E-Business; Extensive
Intranets and Extranets
Solution
Cost and
Efficiency
Improvements
Performance
Improvements in
Business
Effectiveness
E-Mail, Chat Systems
Intranets and Extranets
E-Business Processes Connectivity
Internal Drivers
High
22. Customer-Focused E-Business
Let customers
place orders
directly
Let customers
check order history
and delivery status
Build a
community
of customers,
employees,
and partners
Customer
Database
Give all
employees a
complete view
of customers
Let customers
place orders thru
distribution
partners
Transaction
Database
Link Employees
and distribution
partners
24. Porter 5 forces analysis
The Porter 5 forces analysis is a framework for business management developed
by Michael Porter in 1979. It uses concepts developed in Industrial Organization
(IO) economics to derive 5 forces that determine the attractiveness of a market. It is
also known as FFF (Fullerton's Five Forces).
A graphical representation of Porters Five
Forces
25. Turning threats into advantage
• Organisations within the same industry:
– Have same suppliers as rivals
– Have same customers as rivals
– Face same threats of
• New products being developed
• New firms/ organisations starting up in
competition
• Awareness of this can help organisations:
– Improve its competitive position
– Make it less vulnerable to attack
26. Firm-Level Strategy:
Core Competencies
• Core Competencies – an activity in which
the firm excels
– Created based on experience and research
– Ex., best logistics, best customer service, best
optic technology manufacturer
27. Industry-Level Strategy:
Five Forces Model (Michael Porter, 1980)
•
•
•
•
•
Buyer Power
Supplier Power
Threat of Substitutes
Threat of New Entrants
Rivalry among Firms
29. Porter’s model
• Allows the development of a competitive
strategy
• Suggests 5 main forces may be decisive in
helping shape the outcome:
–
–
–
–
–
Suppliers
New Entrants
Substitutes
Buyers
Industrial competitors
30.
31. The Power of Suppliers
• Using the models of market structures developed in Unit 4
assess whether the supplier of your main input has more
market power than your organisation.
– Are they the only suppliers of the input?
– How many other potential suppliers exist?
– Is the input more homogeneous than unique?
– Are there any substitutes available?
– Would there be switch costs?
– On a spectrum of 1-10 where does you bargaining power lie
relative to your main supplier?
32. The Power of Customers
• Customers bargaining power increases if……….
– they buy in large volumes
– the product is homogeneous
– there are many more suppliers
– product represents a substantial fraction of their total costs
• Do you have many customers, a few or one (ie monopsony)?
• In the light of the above assess the bargaining power of your main
customers.
• How does this affects the behaviour of your organisation?
33. The threat of substitute products
• Substitutes often come into the market rapidly, especially
when high profits are being made ie high profits act as an
incentive to develop substitutes. Watch R&D.
• Equally in the public sector governments eager to cut cost
will look for substitute services eg increasing shift towards
voluntary sector provision.
34. The threat of substitute products
• How many substitute products/services have appeared in
your industry in the last 5 years?
• What are they? How different are they?
• Were they introduced by your organisation or others?
• Which organisation in your industry does the most Research
and Development?
• What happens to price, profits and market share when
substitutes are introduced?
• Assess the potential threat!!!
35. Threat of new entrants
•
•
New entrants bring increased capacity to the industry and are
often backed by substantial resources eg Virgin
New entrants can be deterred by ‘barriers to entry’ (Remember in
the theory of perfect competition there are no barriers to entry).
– The main barriers are………
• Economies of scale
• Patents
• Product differentiation
• Capital requirements – both financial and specialist equipment
• Skills
• Access to distribution channels
• Reaction/strategic decisions of incumbents (eg all undercut new entrant)
• Government policy (eg statuary monopoly – but remember these can be
relaxed to allow new entrants)
36. Threat of new entrants
• When was the last time a new entrant entered your market?
• Was it a surprise or in response to changes in the market,
expiry of a patent, or changes in government policy eg
deregulation?
• Are they still there?
• How did they affect the existing participants?
• Using the above information plus your knowledge of barriers,
(overleaf) assess the potential threat of new entry!!!!
37. Five Competitive Strategies
• Cost Leadership
–
–
–
–
Become low-cost producers
Help suppliers or customers reduce costs
Increase cost to competitors
Example, Priceline uses online seller bidding so buyer
sets the price
• Differentiation Strategy
– Develop ways to differentiate a firm’s products from its
competitors
– Can focus on particular segment or niche of market
– Example, Moen uses online customer design
38. Competitive Strategies (cont.)
• Innovation Strategy
– Find new ways of doing business
• Unique products or services
• Or unique markets
• Radical changes to business processes to alter the fundamental
structure of an industry
– Example, Amazon uses online full-service customer systems
• Growth Strategy
–
–
–
–
Expand company’s capacity to produce
Expand into global markets
Diversify into new products or services
Example, Wal-Mart uses merchandise ordering by global
satellite tracking
39. Competitive strategies (cont.)
• Alliance Strategy
– Establish linkages and alliances with
• Customers, suppliers, competitors, consultants and
other companies
– Includes mergers, acquisitions, joint ventures,
virtual companies
– Example, Wal-Mart uses automatic inventory
replenishment by supplier
44. Advantage vs. Necessity
• Competitive Advantage – developing products,
services, processes, or capabilities that give a
company a superior business position relative to
its competitors and other competitive forces
• Competitive Necessity – products, services,
processes, or capabilities that are necessary simply
to compete and do business in an industry
45. Five Forces Model
The Five Forces Model explains factors that determine competitiveness. The five
forces model is used to determine the relative attractiveness of an industry.
Examples of using the Five Forces Model include:
•Buyer Power – there is lots of competition among hotels given the huge number of
hotels available in most markets. Many hotel chains have followed the airline idea
of loyalty programs which give points for each stay.
•Supplier Power – to decrease supplier power is to locate alternative sources of
supply. The business to business marketplace on the Internet can do this.
Information is power.
•Threat of substitute products or services – business professionals can be threatened
when new technology is used – tax preparer or financial services professional can
be replaced by simple software packages for tax preparation or financial planning
•Threat of new entrants – many dotcoms fell victim to this. An entry barrier can be
used to make it more difficult for competitors to jump into the business.
•Rivalry among existing competitors – IT can help make companies more efficient
46. Business Process Reengineering
• Called BPR or Reengineering
– Fundamental rethinking and radical redesign
– Of business processes
– To achieve improvements in cost, quality,
speed and service
• Potential payback high
• Risk of failure is also high
50. Agility
• Agility is the ability of a company to prosper
– In a rapidly changing, continually fragmenting
– Global market for high-quality, high-performance,
customer-configured products and services
• An agile company can make a profit with
– Broad product ranges
– Short model lifetimes
– Mass customization
• Individual products in large volumes
52. Virtual Company
• A virtual company uses IT to link
–
–
–
–
People,
Organizations,
Assets,
And ideas
• Creates interenterprise information systems
– to link customers, suppliers, subcontractors and
competitors
55. Knowledge Creation
• Knowledge-creating company or learning
organization
– Consistently creates new business knowledge
– Disseminates it throughout the company
– And builds in the new knowledge into its
products and services
56. Two kinds of knowledge
• Explicit knowledge
– Data, documents and things written down or
stored on computers
• Tacit knowledge
– The “how-to” knowledge which reside in
workers’ minds
• A knowledge-creating company makes such
tacit knowledge available to others
57. Knowledge issues
• What is the problem with organizational
knowledge being tacit?
• Why are incentives to share this knowledge
needed?
58. Knowledge management techniques
Source: Adapted from Marc Rosenberg, e-Learning: Strategies for Delivering Knowledge in the Digital Age
(New York: McGraw-Hill, 2001), p.70.
The Value Chain is one way to help identify core competencies in your business.
The value chain is a systematic approach to examining the development of competitive advantage. It was created by Michael E. Porter in his book, Competitive Advantage (1980). The chain consists of a series of activities that create and build value. They culminate in the total value delivered by an organization. The 'margin' depicted in the diagram (next slide) is the same as added value. The organization is split into 'primary activities' and 'support activities.
The Value Chain Model can also be used to strategically position a company’s Internet-based applications to gain competitive advantage. The Internet Value Chain Model shown outlines several ways that a company’s Internet connections with its customers could provide business benefits and opportunities for competitive advantage. The model suggests that company-managed newsgroups and chat rooms can be used to support market research, product development and direct sales. Likewise a company’s Internet-enabled connection with its suppliers can be used to support online shipping and scheduling. Multimedia catalogs can also be used to support E-Commerce. All together the model indicates how Internet technologies might be applied to help a firm gain competitive advantage in the marketplace.
Teaching Tips
This slide relates to the material on pp. 64-67.
For Internet technologies to be used strategically applications must be correctly positioned. The strategic positioning matrix shown can be used to help a company optimize the strategic impact of Internet Technologies.
The matrix recognizes two major drivers:
Internal Drivers. The amount of connectivity, collaboration and use of IT within a firm.
External Drivers. The amount of connectivity, collaboration and use of IT by customers, suppliers, business partners, and competitors.
Cost and Efficiency Improvements. When there is a low amount of connectivity, collaboration and use of IT within the company and by customers and competitors, a firm should focus on improving efficiency and lowering costs by using Internet technologies to enhance communications between the company and its customers and suppliers.
Performance Improvement in Business Effectiveness. When there is a high amount of internal connectivity, but external connectivity by customers and competitors is still low, a firm should focus on using Internet technologies like intranets and extranets to make major improvements in business effectiveness.
Global Market Penetration. When there is a high degree of connectivity by customers and competitors and low internal connectivity, a firm should focus on developing Internet-based applications to optimize interactions with customers and build market share.
Product and Service Transformation. When a company and its customers, suppliers, and competitors are extensively networked, Internet technologies should be used to develop and deploy products and services that strategically reposition it in the marketplace.
Teaching Tips
This slide corresponds to Figure 2.4 on p. 52 and relates to material on pp. 52-54.
There are other key strategies enabled by IT that can be used to enable a business to become successful and to maintain their success. These will be discussed on the next slides.
A key strategy for becoming a successful E-Business is to maximize customer value. This strategic focus on customer value recognizes that quality rather than price becomes the primary determinant in a customer’s perception of value. A Customer-Focused E-Business, then, is one that uses Internet technologies to keep customer loyal by anticipating their future needs, responding to concerns, and providing top quality customer service.
As the slide indicates, such technologies like intranets, the Internet, and extranet websites create new channels for interactive communications within a company, with customers, and with suppliers, business partners, and others in the external business environment. Thereby, encouraging cross-functional collaboration with customers in product development, marketing, delivery, service and technical support.
A successful Customer-Focused E-Business attempts to ‘own’ the customer's total business experience through such approaches as:
Letting the customer place orders directly, and through distribution partners
Building a customer database that captures customers' preferences and profitability, and allowing all employees access to a complete view of each customer.
Teaching Tip: Encourage your students to describe the characteristics of a profitable customer. What makes a particular customer valuable to a specific business?
Letting customers check order, history and delivery status
Nurturing an online community of customers, employees, and business partners.
Teaching Tips
This slide corresponds to Figure 2.10 on p. 61 and relates to the material on pp. 59-61.
To counter the threats of competitive forces
Often use the Internet as the foundation for such strategies
Order management consists of several business processes
Crosses the boundaries of traditional business functions
An agile company often uses the Internet to integrate and manage business processes while providing the processing power to treat masses of customers as individuals
This company is using the Internet, intranet and extranets to link to business partners
This creates interenterprise information systems to link customers, suppliers, subcontractors and competitors
Flexible and adaptable virtual workgroups
A company facing a new market opportunity might not have the time or resources to develop the manufacturing and distribution infrastructures, the competencies or the IT needed. By forming a virtual company with an alliance with others it can quickly provide the solution needed.
To have lasting competitive advantage, a company must be a knowledge creating company or learning organization
Tacit knowledge is often some of the most important information within a firm. But its not recorded anywhere since it’s in the employee’s mind.
Issues:
What if the person who has the knowledge leaves the company?
What if someone in another part of the company could use the expertise?
How do you know who knows what you need to know?
How do you find what you need to know
Company wastes money “re-inventing the wheel”
Unless people are given incentive to share the knowledge,
They won’t want to spend time doing something that they are not rewarded for
They will worry about losing their status of having the expertise
Three levels of techniques, technologies, and systems that promote the collection, organization, access, sharing and use of workplace and enterprise knowledge
Create techniques, technologies, systems and rewards for getting employees to share what they know.