Electronic Data
Interchange
{
Partially integrated EDI systems
Purchase
requisition
buyer
Search vendor file
and select a vendor
Prepare purchase
order
Mail purchase
order to the vendor
Prepare Cheque &
remittance advice
Mail check &
remittance advice
Vendor
file
Van
invoice
Check
Remittance advice
Van
supplier
Sales order
Electronic notification to
the warehouse for
shipping the goods
Prepare invoice after
the goods are shipped
Prepare deposit
slip & update
records
Deposit slip
6
78
9
10
11
Virtual private
network
Pre-requisites of EDI
• Identify organizational needs for EDI
• Weigh the cost and benefits of EDI
• Identify EDI business partners
• Obtain top management approval
• Form an EDI project team
• Education & training
• Decide on EDI standards
• Decide on the connection options
• Implementation planning
Legal issues Security & privacy issues
» Instantaneous
» Delayed (USPS-
United States Postal
Service)
» Delayed (non-USPS)
» Network level security
» Application level security
» Message level security
1. Encryption
2. Message authentication
3. Message sequence
numbers
4. Hashing
5. Digital signature

electronic data interchange

  • 1.
  • 2.
  • 3.
    Partially integrated EDIsystems Purchase requisition buyer Search vendor file and select a vendor Prepare purchase order Mail purchase order to the vendor Prepare Cheque & remittance advice Mail check & remittance advice Vendor file Van invoice Check Remittance advice Van supplier Sales order Electronic notification to the warehouse for shipping the goods Prepare invoice after the goods are shipped Prepare deposit slip & update records Deposit slip 6 78 9 10 11
  • 4.
  • 5.
    Pre-requisites of EDI •Identify organizational needs for EDI • Weigh the cost and benefits of EDI • Identify EDI business partners • Obtain top management approval • Form an EDI project team • Education & training • Decide on EDI standards • Decide on the connection options • Implementation planning
  • 6.
    Legal issues Security& privacy issues » Instantaneous » Delayed (USPS- United States Postal Service) » Delayed (non-USPS) » Network level security » Application level security » Message level security 1. Encryption 2. Message authentication 3. Message sequence numbers 4. Hashing 5. Digital signature