E-Business, E-Commerce
|
|
- Domenic Douglas
- 5 years ago
- Views:
Transcription
1 ACS-1803 Introduction to Information Systems Instructor: Kerry Augustine E-Business, E-Commerce Lecture Outline 10 ACS-1803 Introduction to Information Systems
2 E-Business Vs E-Commerce Cattails 2
3 Learning Objectives Explain the differences between extranets and intranets as well as show how organizations utilize these environments Describe electronic commerce and how it has evolved Describe the strategies that companies are adopting to compete in cyberspace Describe the stages of business-to-consumer electronic commerce and the key drivers for the emergence of mobile commerce Understand the keys to successful electronic commerce applications Understand general ebusiness security fundamentals 3
4 Network Computing Spectrum - Intranet/ Extranet/ Internet 4
5 Team Network Computing Spectrum Intracompany Intercompany Global Network LAN Intranet Extranet Internet (WWW) 5
6 Internet and the World Wide Web Capabilities The Internet Changed Everything Intranet internal, private network using Web technologies to facilitate transmission of proprietary information within the organization Extranet two or more firms using the Internet to do business together Internet and World Wide Web created an entirely new communications capability for the emergence of Electronic Business (ebusiness) The Internet opened up access to markets by lowering barriers to entry. 6
7 Network Computing Spectrum 7
8 Network Computing Spectrum Team Intracompany LAN Intranet 8
9 Intranet Architecture 9
10 Intranet Applications Collaboration Training Intranet Hub Online Entry of Information Application Integration Real-time Access To Information 10
11 Intranet Applications Training Provides online access to a host of training functions including course catalogs, registration, content (video, slides, other materials) and evaluation Provides significant increases in productivity and standardization, and cost reductions (e.g. travel costs) Application Integration Allows for integration and consolidation of information from disparate systems into a single point of access Increases employee productivity and output quality Real-time Access to Information Allows employees access to real-time system information. This reduces customer service needs by giving all authorized and interested parties direct system access 11
12 Intranet Applications Online Entry of Information Allows for direct online input to streamline routine business processes (e.g. expense reporting) Provides for significant cost reductions from reducing administrative support and shifting maintenance functions back to the employee (i.e. sick leave applications) Collaboration Allows employees to communicate business activities across geographic and departmental boundaries Allows for shorter development cycle times Allows employees to stay abreast of current projects, corporate, and market conditions 12
13 Network Computing Spectrum Team Intracompany Intercompany LAN Intranet Extranet 13
14 Extranets Extranets Extranets are secure network architectures that provide customers, suppliers, and employees with access to internal systems. Extranets enable two or more firms to use the Internet to do business together. They are an excellent use of B2B to allow companies to achieve a positive return on their tech investments. Extranet Benefits Improves timeliness and accuracy of communications, thereby reducing errors and misunderstandings Uses Electronic Data Interchange (EDI) as the standard protocol for allowing disparate computing platforms to communicate without additional investments in the application systems. Easy to use, requires little training Used to automate transactions, reducing cost and cycle time 14
15 Electronic Data Interchange (EDI) Electronic Data Interchange The transmission of electronic business forms between business partners (e.g. purchase order) Typically used by large organizations via VAN very expensive The internet (VPN) has opened this technology to smaller firms Utilizes universal standard transmission protocols to communicate and transmit data between different systems. How it works EDI transactions are supported by two types of network methods: 1. VAN (Value Added Network) 2. VPN (Virtual Private Network) 15
16 Value Added Network (VAN) VAN (Value Added Network) providers are private network operators that provide guaranteed delivery.the VAN is responsible for routing, storing and delivering EDI messages. They also provide delivery reports.vans may be operated by various entities: telecom companies; industry group consortia; a large company interacting with its suppliers/vendors. 16
17 Value Added Network (VAN) 17
18 Virtual Private Network (VPN) Virtual Private Network (VPN) is a secure network technique to protect extranet communications over an IP network Uses a technique called tunneling to encapsulate, encrypt, and transmit data over the Internet Requires server authentication (verify user with password) to allow operation May be managed as a fully integrated, end-to-end dedicated private network. Similar to a VAN utilizes the IP network backbone and is a more cost-effective option for SME s. 18
19 Extranet Applications Procurement Portals Supply Chain Management Exchanges Real-Time Info Access Distribution Portals Enterprise Portals Collaboration 19
20 Extranet Applications Supply Chain Management Used to exchange supply and manufacturing information between customers and suppliers The extranet contains features allowing participants to purchase online, check supplier inventory, transfer design specifications, and other business related tasks Real-time Access to Information Allowing business partners and customers access to realtime system information This reduces customer service needs by giving all authorized and interested parties direct system access 20
21 Extranet Applications Collaboration Allows companies to respond proactively to marketplace changes by working directly with suppliers and customers Allows for shorter development cycle times Allows for reorganization of the purchasing function turning buyers into supplier relationship managers Enterprise Portals These are access points (front doors) combined from multiple extranets where business partners access secure, proprietary company information This provides a single point of access for information that comes from a variety of disparate systems Benefits include faster access for business partners, reduced maintenance cost by reduction in total extranets 21
22 ebusiness/ ecommerce - B2C, B2B, B2E, C2C 22
23 Electronic Business Defined Electronic Business is using electronic information to improve performance, create value and enable new relationships between business and customers Electronic Commerce is the marketing, selling and buying of products and services on the Internet Internet Commerce is the online exchange of information and services utilizing network technologies Web Commerce 23
24 Types of Electronic Commerce 24
25 Stages of E-Commerce Maturity Web sites that globally disseminate only static information about the company and its products available 24/7. (e.g. Electronic Brochure) Web sites that are integrated with corporate databases to extract and display the appropriate information for a customer request. (e.g. displaying a bank balance) Web sites that allow customers to enter orders and make payments directly online (e.g. buying a book) 25
26 E-Commerce Impact to Competiveness Enables new products and services Encourages substitute products Lowers barrier to entry Changes balance of power of customers and suppliers Transforms some industries Creates new opportunities for creating new markets, building brands, and large customer bases 26
27 ebusiness/ ecommerce - Strategy and Competitiveness 27
28 Traditional vs Strategy Support Process Example AVIS RENTA CAR Using handheld technology combined with a reengineered business process to create a competitive advantage 28
29 Impact of the Web: Disintermediation Disintermediation Removal of the intermediary (middleman) in a sale. Companies can sell directly to customers (retail or wholesale) without assistance using the Internet Manufacturer or Service Provider Intermediary (Middleman) Sell Direct = Disintermediation Customer (Consumer or Business) Example Airlines selling directly to flyers without a travel agent or customer service representative 29
30 ecommerce Business Strategies Business Strategies come in one of the following three types. All require a sound business model to be successful (see next) 30
31 Brick-and-Mortar & Click-and-Mortar Strategies Brick-and-Mortar Operate a firm solely in traditional physical markets Approach business activities traditionally by operating physical locations (e.g. stores, offices, manufacturing plants) Click-and-Mortar Operate a firm in physical locations and has added an EC component to their business Requires maximization of business opportunities in both the physical and virtual environments This strategy requires a significant investment in systems and space 31
32 Click-Only Strategy Business transactions are only conducted virtually Can require significant expertise and investment in technology and systems staff There are many different revenue models 32
33 " The Virtual Enterprise Uber, the world s largest taxi company, owns no vehicles. Facebook, the world s most popular media owner, creates no content. Alibaba, the most valuable retailer, has no inventory. Airbnb, the world s largest accommodation provider, owns no real estate. 33
34 ebusiness/ ecommerce - Establishing a Web Presence 34
35 Front & Back-End Systems Front-End System Back-End System 35
36 Front-End Systems Front- end (client) systems are those processes with which a user interfaces, and over which a customer can exert some control. For an ebusiness, front-end systems are the Web site processes that customers use to view information and purchase products and services. 36
37 Back-End Systems Back-end (server) systems are those processes that are not directly accessed by customers. Back-end systems include the business s TPS and MIS systems that handle the accounting and budgeting, manufacturing, marketing, inventory management, distribution, order-tracking, and customer support processes. 37
38 Establishing an ecommerce Web Site Dedicated Server - business sets up own server to serve ebusiness web pages - connect to Internet through a dedicated line - install proper software for managing server and creating Web pages - expert staff required - offers most control 38
39 Web Hosting Services Hosting company offers space on its server for the hosting of Web sites - may provide software tools for flexible page development - majority of businesses do not maintain their own Web server; they use host services; 39
40 Showing Your ebusiness to Customer - Storefront: can have your own business on one separate web page OR - Cybermall hosts pages of many businesses and users browse them all - user who enter one mall store may also visit yours out of curiosity 40
41 Outsourcing ebusiness Operations Using a web hosting service provides an ebusiness with several advantages. A web hosting service has a staff available 24 hours a day with the technical knowledge to keep the servers and network connections running. A web hosting company can provide a level of redundancy that an ebusiness may not be able to provide for itself, including redundant hard drives on the servers, backup power from generators, and redundant connections to the internet. 41
42 Outsourcing ebusiness Operations One disadvantage of outsourcing Web site operations is lack of control. One solution to this lack of control is for an ebusiness to provide its own servers and software and simply colocate its servers at the Web hosting company facilities. 42
43 ecommerce Payment Systems Payment cards = general term for plastic cards Credit card most common for EC, has spending limit, pay off portion/all of the balance Debit card transfers sales amount from client account to merchant account Charge card spending limits set by card, entire amounts charged to card, payment due at end of billing period Advantages and disadvantages Some payment cards provide fraud protection Some limit cardholder s liability to $50 in case of fraud Many payment cards accepted worldwide Easy electronic checkout no special hardware needed Merchants charged per-transaction fee and monthly processing fees 43
44 Payment Acceptance and Processing To accept credit cards: Open merchant account: get bank approval, apply, sign contract, pay setup fee Purchase credit card processing software (also called credit card gateway) CyberCash and CyberSource provide software that accepts credit card numbers and transfers them to/from credit card system Integrate credit card processing software into transaction system Steps followed by payment card transaction: Merchant authenticates card Merchant checks issuer/clearinghouse to ensure available funds, holds amount on credit line Settlement occurs, funds transfer between banks, funds into merchant account 44
45 ebusiness/ ecommerce - General ebusiness Security 45
46 General ebusiness Security Businesses must protect against the unknown. New methods of attacking networks and Web sites and new network security holes are being constantly discovered or invented. An ebusiness cannot expect to achieve perfect security for its network and Web site 46
47 General ebusiness Security cont d How is the data protected once it is delivered to the ebusiness? How are credit card transactions authenticated and authorized? The biggest potential security problem in an ebusiness is of human, rather than electronic, origin. The weakest link in any security system is the people using it. 47
48 Network and Web Site Security An entire glossary of words and phrases identifies network and web security risks, such as hacker, cracker, Trojan horse, and more. As part of planning a startup ebusiness s security, management should become familiar with network and web server security risk terminology 48
49 Hacker vs. Cracker Hacker: A person who delights in having an intimate understanding of the internal working of a system, computers and computer networks in particular. The term is often misused in a pejorative context, where cracker would be the correct term Cracker: someone whose purpose is to circumvent or break security measures. Many use their powers for evil, however, as we are all too painfully aware Definitions taken from: Perrin, Chad (2009). Hacker Vs. Cracker. 49
50 Denial of Service Attacks A type of attack designed to disable a web site by flooding it with useless traffic or activity. Distributed denial of service attack uses multiple computers to attack in a coordinated fashion. Risk is primarily centered around downtime or lack of web site availability. Defenses exist for these attacks. 50
51 Credit Card Fraud & Data Theft ebusiness is at risk from credit card fraud from stolen data. Secure your own data. Verify the identity of your customers and the validity of the incoming credit card data. Identity theft by a criminal masquerading as someone else, is a too common problem. 51
52 Spyware, Spam, and Cookies *MC Spyware Any software that covertly gathers information about a user through an Internet connection without the user s knowledge Problems: uses memory resources, uses bandwidth, and can cause system instability Prevention: Firewalls and Anti-spyware software Spam Electronic junk mail or junk newsgroup postings usually for purpose of advertising some product and/or service Problems: nuisance, wastes time deleting, uses storage Prevention: Spam Blocker software Cookies A message passed to a browser from a Web server. Used by legitimate programs to store state and user information Problems: can be used to track user activities Prevention: browser settings, firewall 52
53 Security Threat: Viruses Viruses Programs that can attack a computer and/or a network and delete information, disable software, use up system resources, etc. Prevention Steps: AntiVirus software: Install this software which is designed to block all known viruses and offers automatic or manual updates to virus patterns to block future viruses No Disk Sharing Viruses can be transferred to clean computers by inserting disks containing infected files Delete Suspicious Messages Do not open suspicious messages Delete Only! Report Viruses If you get a virus, report it to you network administrator immediately! 53
54 Security Technology: Biometrics Biometrics A sophisticated authentication technique used to restrict access to systems, data and/or facilities Uses biological characteristics to identify individuals such as fingerprints, retinal patterns in the eye, etc. that are not easily counterfeited Has great promise in providing high security 54
55 Security Managerial Techniques Organizational Policies and Procedures Acceptable Use Policies formally document how systems should be used, for what, and penalties for non-compliance Backups and Disaster Recovery Backups taking periodic snapshots of critical systems data and storing in a safe place or system (e.g. backup tape) Disaster Recovery Plans spell out detailed procedures to be used by the organization to restore access to critical business systems (e.g. viruses or fire) Disaster Recovery executing Disaster Recovery procedures using backups to restore the system to the last backup if it was totally lost 55
56 ebusiness/ ecommerce - Web 2.0/ M-Commerce 56
57 The Evolution of the Web 1 'Grassroots of ebusiness' 2 'Rise of the Internet' 3 'Stock market crash' 4 'Synergy' Points Web 1.0 Business Web 45% Web 2.0 Social Web During the past decade, ebusiness companies have passed through four distinct periods, as is reflected in the evolution of the NASDAQ Launch of Amazon.com Source: NASDAQ quotes taken from Factiva.com Year 57
58 Web Web 2.0 Web 1.0 = display simple pages, allow non-linear navigation Web 2.0 = user-centered applications and social media technologies User-generated content and communication Highly interactive, social communities Large audiences; yet mostly unproven business models Examples: Twitter, YouTube, Instagram, Wikipedia, Tumblr 58
59 Web 2.0 Features and Services Blogs Personal Web page that typically contains a series of chronological entries by its author, and links to related Web pages Really Simple Syndication (RSS) Program that allows users to have digital content automatically sent to their computers over the Internet 59
60 Web 2.0 Features and Services Podcasting Audio presentation stored as an audio file and available for download from Web Wikis Allows user to easily add and edit content on Web page New music and video services Video-casts Digital video on demand 60
61 The Mobile Platform Most recent development in Internet infrastructure Enables access to the Internet via wireless networks or cell-phone service Mobile devices include Tablets Smartphones Ultra-lightweight laptops 61
62 Mobile Commerce in Perspective Global M-commerce spending: Mobile retail sales grew from $20.9 billion (2012) to $34.2 billion (2013) or 64% E-Bay accounts for $20 billion sales 90% of consumers trust recommendations from friends, and another 70% trust consumer opinion and brand websites Only 62% of consumers trust TV, and only about four in 10 (41%) trust search engine ads By 2019, 60 percent of the projected 9.3 billion mobile subscriptions will be for smartphones. 3G networks will cover 90 percent of the world's population, while 65 percent will be covered by 4G LTE networks. 62
63 B2B vs B2C vs MC 63
64 Transforming Web 2.0 to Web
65 65
66 The Next Wave! CONSUMERIZATION of IT Consumerization will force more IT changes over the next 10 years than any other trend. - Gartner MOBILITY 66
67 Security in the Cloud Bypasses traditional IT You put your data where!!! On demand services (OPX Vs CAPX) Location of data Impacts on data privacy legislation Foreign government search Lack of control Moves IT from service provider to contract manager (Service Level Agreements) Ability to audit Exit Strategy (How do you get your data out) 67
E-Business, E-Commerce
E-Business, E-Commerce Lecture Outline 11 Instructor: Kevin Robertson ebusiness vs ecommerce Introduction to Information Systems Explain the differences between extranets and intranets as well as show
More information08/01/2019. ACS 3907 E-Commerce. Administration. Course Overview. Instructor: Kerry Augustine January 10 th 2019
ACS 3907 E-Commerce Instructor: Kerry Augustine January 10 th 2019 Administration Lectures: Wed 6-9pm Office Hours: Mon 5:00-6:00pm E-mail: k.augustine@uwinnipeg.ca My approach: Core academic ideas, procedures,
More informationFundamentals of Information Systems, Seventh Edition
Fundamentals of Information Systems, Seventh Edition Chapter 5 Electronic and Mobile Commerce and Enterprise Systems Fundamentals of Information Systems, Seventh Edition 1 Why Learn About Electronic and
More informationFundamentals of Information Systems, Seventh Edition
Fundamentals of Information Systems, Seventh Edition Chapter 5 Electronic and Mobile Commerce and Enterprise Systems Fundamentals of Information Systems, Seventh Edition 1 Principles and Learning Objectives
More informationE Commerce By: Vitthal Jagtap SBPCOE Indapur.
E Commerce By: Vitthal Jagtap SBPCOE Indapur www.vitthaljagtap.com CONTEXT: Definition of E-Commerce. History of E-Commerce. Advantages and Disadvantages of E-Commerce. Some of E-Commerce Websites Types
More informationChapter by Prentice Hall
Chapter 9 E-Commerce: Digital it Markets, Digital Goods 9.1 2007 by Prentice Hall STUDENT LEARNING OBJECTIVES What are the unique features of e-commerce, digital markets, and digital goods? How has Internet
More informationManagement Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION GLOBAL EDITION
Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION GLOBAL EDITION Chapter 10 E COMMERCE: DIGITAL MARKETS, DIGITAL GOODS VIDEO CASES Case 1: M Commerce: The Past, Present, and Future
More informationE- Publishing: Successful e-commerce efforts to e- publishing online newspapers and independent and independent publication through the internet.
E- Advertising: Advertising and information are currently the largest commercial activities on the web. EXAMPLE: WEBSITES, BANNERS, E- COMMERCE Portals like www.yahoo.com, news groups. E- Catalogs: E-
More informationCSC342 : Computer Applications to Business 2
CSC342 : Computer Applications to Business 2 Muhammad Umair CSC342 : Introduction Course introduction Instructor s introduction Class introduction Course website & resources Grading policy Comments / Views
More informationInformation Technology for Business
Information Technology for Business Business Essentials 9e Ebert/Griffin chapter thirteen After reading this chapter, you should be able to: 1. Discuss the impacts information technology has had on the
More information14. E-Commerce Applications and Infrastructures
14. (Contents) E-Commerce Applications and Infrastructures Contents 14. E-Commerce Applications and Infrastructures Building E-Commerce Applications and Infrastructures Code: 166140-01+02 Course: Electronic
More informationLesson 1 Foundations of Electronic Commerce
Lesson 1 Foundations of Electronic Commerce 1 Learning Objectives Define electronic commerce and describe its various categories Distinguish between electronic markets and interorganizational systems Describe
More informationTHE DIGITAL FIRM: ELECTRONIC COMMERCE AND ELECTRONIC BUSINESS
Chapter 4 THE DIGITAL FIRM: ELECTRONIC COMMERCE AND ELECTRONIC BUSINESS 4.1 2003 by Prentice Hall OBJECTIVES How has Internet technology changed value propositions and business models? What is electronic
More informationE-Business & E-Commerce
Essentials of E-Business & E-Commerce Pokhara University : BBA, BBA-BI, BBA-TT & BCIS Tribhuvan University : BBA & BScCSIT Contents Unit 1 Introduction Background... 1 Introduction to E-Business... 2 Global
More informationn Business Paper Proposal Due 1/29 n Database Assignment 1 Due 2/3 n Reading for Thursday n Messerschmitt Ch 4
Class Announcements TIM 50 - Business Information Systems Lecture 7 n Business Paper Proposal Due 1/29 n Database Assignment 1 Due 2/3 Instructor: John Musacchio UC Santa Cruz n Reading for Thursday n
More informationChapter 2 E-Marketplaces: Structure, Mechanisms, Economics, and Impacts
Electronic Commerce 2006 Chapter 2 E-Marketplaces: Structure, Mechanisms, Economics, and Impacts True-False Questions 1. A central role of markets in an economy is to facilitate the exchange of information,
More informationCHAPTER 9 Electronic Commerce Software
CHAPTER 9 Electronic Commerce Software 2017 Cengage Learning. May not be scanned, copied or duplicated, or posted to a. publicly accessible website, in whole or in part, except for use as permitted in
More informationPresentation by: Supichaya Smerchuar
Chapter 5 B2B E-Commerce: E Selling and Buying in Private E-MarketsE Presentation by: Supichaya Smerchuar This presentation is part of : Faculty of Information and Computer Technology, Mae Fah Luang University.
More informationChapter 1. Overview of Electronic Commerce
Chapter 1 Overview of Electronic Commerce Learning Objectives 1. Define electronic commerce (EC) and describe its various categories. 2. Describe and discuss the content and framework of EC. 3. Describe
More informationChapter 1. Overview of Electronic Commerce
Chapter 1 Overview of Electronic Commerce Electronic Commerce: Definitions and Concepts electronic commerce (EC) The process of buying, selling, or exchanging products, services, or information via computer
More informationINFS 401 AUTOMATION OF INFORMATION SYSTEMS
INFS 401 AUTOMATION OF INFORMATION SYSTEMS Session 11 THE FUNDAMENTALS OF E-COMMERCE Lecturer: Prof. Ellis Edwin Badu, Dept. of Information Studies Contact Information: eebadu@ug.edu.gh College of Education
More informationChapter 2. E-Marketplaces: Structures, Mechanisms, Economics, and Impacts
Chapter 2 E-Marketplaces: Structures, Mechanisms, Economics, and Impacts E-Marketplaces Markets (electronic or otherwise) have three main functions: 1. Matching buyers and sellers; 2. Facilitating the
More informatione-commerce Technologies
Unit 16: e-commerce Technologies Unit code: K/601/1975 QCF Level 4: BTEC Higher National Credit value: 15 Aim The aim of this unit is to give learners an understanding of the functionality and technology
More informationChapter 2 E-Commerce Business Models
Chapter 2 E-Commerce Business Models Copyright 2013 Pearson Education Teaching Objectives Identify the key components of e-commerce business models. Describe the major B2C business models. Describe the
More informatione-commerce WEEK7 Learning Objectives
IMS9043 IT IN ORGANISATIONS Learning Objectives Describe electronic commerce, its dimensions, benefits, limitations, and process. e-commerce WEEK7 Describe the major applications of e- commerce in the
More informationChapter 3. Learning Objectives. Learning Objectives. Retailing in Electronic Commerce: Products and Services
Chapter 3 Retailing in Electronic Commerce: Products and Services 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Learning Objectives 1. Describe electronic retailing (e-tailing)
More informationHELLENIC CONFEDERATION OF COMMERCE&ENTREPRENEURSHIP
HELLENIC CONFEDERATION OF COMMERCE&ENTREPRENEURSHIP E-COMMERCE AND BUSINESSES The major benefits of electronic commerce for businesses The use of Information and Communication Technologies (ICT) in the
More informationManagement Information Systems. B02. Information Technologies: Concepts and Management
Management Information Systems Management Information Systems B02. Information Technologies: Concepts and Management Code: 166137-01+02 Course: Management Information Systems Period: Spring 2013 Professor:
More information1 P a g e. IT Tailored to Your Needs
1 P a g e IT Tailored to Your Needs Bluescope Technologies is a leading provider of IT services to businesses of all sizes in a wide range of industries. Bluescope s headquarters are situated in Limerick,
More informationTreasury Management Solutions
Sales Support T3 Tech Support Team Live Chat @ www.texasbankandtrust.com 903-237-1881 1-800-263-7013 rev 20431 12/2017 Treasury Management Solutions THE TBT DIFFERENCE Established in 1958, Texas Bank and
More informationThe Digital Firm: Electronic Business and Electronic Commerce by Prentice Hall
The Digital Firm: Electronic Business and Electronic Commerce 4.1 2006 by Prentice Hall Internet Technology and the Digital Firm Information technology infrastructure: The Internet provides a universal
More informationUniversity of Benghazi Faculty of Information Technology. E-Commerce and E-Marketing (IS475) Instructor: Nasser M. AMAITIK (MSc IBSE) Lecture 02
University of Benghazi Faculty of Information Technology Instructor: Nasser M. AMAITIK (MSc IBSE) Fall 2011/2012 Lecture 02 E-Marketplaces: Structures and Mechanisms E-Marketplaces E-Marketplace: An online
More informationQM 351-Chapter 1 The Digital Firm: Electronic Commerce and Electronic Business Prepared by Dr Kamel ROUIBAH / Dept. QM & IS
QM 351-Chapter 1 The Digital Firm: Electronic Commerce and Electronic Business Prepared by Dr Kamel ROUIBAH / Dept. QM & IS Dr K. ROUIBAH Chapter 1 (351) / dept QM & IS ١ Objectives Explain how the basic
More informationIT Plan Instructions for FY18-FY19
IT Plan Instructions for FY18-FY19 Introduction and General Instructions The information technology plan for FY18-FY19 is web-enabled. You can navigate to the various sections of your agency s plan by
More informationCHAPTER 6. E-Business and E-Commerce
CHAPTER 6 E-Business and E-Commerce 6.1 Overview Electronic commerce (e-commerce, EC) describes the buying, selling, transferring or exchanging of products, services or information via computer networks,
More informationThe Verifone Best Practice Guide to e-commerce
The Verifone Best Practice Guide to e-commerce Ocius.enquiries@verifone.com www.verifone.co.uk Setting the Scene In Britain e-commerce is booming, with more than 70% of the country s shoppers using online
More informationThe World of e-business Management Information Systems
The World of e-business 406.306 Management Information Systems Jonghun Park jonghun@snu.ac.kr Dept. of Industrial Engineering Seoul National University 9/20/2007 electronic commerce The buying and selling
More informationPart IV: Developing an Extended Network Enterprise Part V: Obtaining Value beyond the Basic Enterprise
Contents at a Glance Introduction... 1 Part I: Developing the Architecture... 7 Chapter 1: Planning for Enterprise Realignment...9 Chapter 2: Exploring Tasks, Roles, and Tools...17 Chapter 3: Pondering
More informationUse examples from a specific company (companies) to support your points.
Discussion Please review the Discussion Board Participation grading rubric on your course Syllabus. This is important information to ensure you earn the maximum points. Topic 1: Transitioning to Bricks
More informationIntroduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright Chapter 5
Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 E-Business and E-Commerce 2 Chapter Outline Overview of E-Business and E-Commerce Major EC Mechanisms
More informationInformation Technologies: Concepts and Management
Information Technologies: Concepts and Management Management Information Code: 164292-02 Course: Management Information Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic
More informationChapter 01. Introduction to Electronic Commerce. By: M.F. Rashida Lecturer in MIT Department of MIT Faculty of Management and Commerce, SEUSL
Chapter 01 Introduction to Electronic Commerce By: M.F. Rashida Lecturer in MIT Department of MIT Faculty of Management and Commerce, SEUSL Learning Objectives 1. Define electronic commerce (EC) and describe
More informationWhy outsourcing vital processes is your best strategy. digitalriver.com
Key Considerations for Global Ecommerce Why outsourcing vital processes is your best strategy. digitalriver.com 1 Cloud-based SaaS is the Right Choice According to industry reports from both Forrester
More informationnamib I A UnIVERSITY OF SCIEnCE AnD TECHnOLOGY
namib I A UnIVERSITY OF SCIEnCE AnD TECHnOLOGY Computing and Informatics Department of Informatics QUALIFICATION: Bachelor of Informatics, Bachelor of Computer Science, Bachelor of Logistics and Supply
More informationInformática Administrativa
Informática Administrativa Mtro. Josué R. Sánchez Martínez Universidad del Valle de México Learning Objectives 1. Define electronic commerce (EC) and describe its various categories. 2. Describe and discuss
More informationOverview of Electronic Commerce
Overview of Electronic Commerce INTRODUCTION - 1 E-Commerce includes Buying & Selling of goods and services on the Internet B2B & B2C transactions Substantial cost savings Introduction - 2 Demands of E-commerceE
More informationE COMMERCE DEFINITION- According to Philip Kotler: E-Commerce can be defined from different perspectives communication perspective
E COMMERCE The term electronic commerce has evolved from electronic shopping, to imply all aspects of business and market processes enabled by the Internet and World Wide Web technologies. DEFINITION-
More informationCHAPTER 17 ADVANCED TOPICS IN ASSURANCE SERVICES
CHAPTER 17 ADVANCED TOPICS IN ASSURANCE SERVICES 1 AUDITING IN AN E- COMMERCE ENVIRONMENT E-commerce defined: The use of electronic transmission mediums (telecommunications) to engage in the exchange,
More informationE Business and E Commerce
E Business and E Commerce Management Information Code: 164292-02 Course: Management Information Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic Commerce 1 00. Contents
More informationACS 3907 E-Commerce. Instructor: Kerry Augustine January 24 th Bowen Hui, Beyond the Cube Consulting Services Ltd.
ACS 3907 E-Commerce Instructor: Kerry Augustine January 24 th 2019 1 Building an E-commerce Site: A Systematic Approach Develop clear understanding of your business objectives What information needs to
More informationPresentation by: Supichaya Smerchuar
Chapter 2 E-Marketplaces Presentation by: Supichaya Smerchuar This presentation is part of : 1301383 Electronic Commerce Faculty of Information and Computer Technology, Mae Fah Luang University. Academic
More informationElectronic Commerce. Electronic Commerce
Electronic Commerce Electronic Commerce Code: 008023-01+02 Course: Electronic Commerce Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic Commerce 1 00. Contents 01.
More informationPCI COMPLIANCE PCI COMPLIANCE RESPONSE BREACH VULNERABLE SECURITY TECHNOLOGY INTERNET ISSUES STRATEGY APPS INFRASTRUCTURE LOGS
TRAILS INSIDERS LOGS MODEL PCI Compliance What It Is And How To Maintain It PCI COMPLIANCE WHAT IT IS AND HOW TO MAINTAIN IT HACKERS APPS BUSINESS PCI AUDIT BROWSER MALWARE COMPLIANCE VULNERABLE PASSWORDS
More informationIntroduction to emanagement MGMT 230 WEEK 3: JANUARY 22
Introduction to emanagement MGMT 230 WEEK 3: JANUARY 22 Assessing the value of e-commerce, information management systems Internet marketing basics for emerging managers Today s Class Understanding and
More informationKARACHI UNIVERSITY BUSINESS SCHOOL UNIVERSITY OF KARACHI
KARACHI UNIVERSITY BUSINESS SCHOOL UNIVERSITY OF KARACHI BBA VI (Hons.) Course Title : COMPUTER APPLICATION TO BUSINESS (E COMMERCE) Course Number : BA (H) 512 Credit Hours : 03 Objective Globalization
More informationLesson 01 Organizational Performance: IT Support and Applications
Lesson 01 Organizational Performance: IT Support and Applications ICT 41013, ICT in Business and Governance By S.Sabraz Nawaz Senior Lecturer in Management & IT Department of MIT Faculty of Management
More informationForm no. (11A) Knowledge and skills matrix for a course
Arab Academy for Science and Technology & Maritime Transport College of Computing and Information Technology University/Academy: Arab Academy for Science and Technology & Maritime Transport Faculty/Institute:
More informationE-Commerce-Impact on Society
E-Commerce-Impact on Society E-commerce Why study it?! Maybe the most emphasized area of technology applications " important! What are the likely impacts of e-commerce on society both positive and negative?!
More informationEbusiness: A Canadian Perspective for a Networked World, 4e Chapter 2 Internet Business Models and Strategies
1) Which of the following would be appropriate when defining a business model? A) the manner in which a business organizes itself so as to achieve its objectives B) traditional business models have usually
More informationUnit-4: Security Environment:
Unit 1: E-Business: E-Business Fundamentals E-Business framework, E-Business application Technology Infrastructure for E-Business Strategies for Electronic Business, Business Models for E-business Web
More informationCHAPTER 3 USING INFORMATION TECHNOLOGY TO ENGAGE IN ELECTRONIC COMMERCE
CHAPTER 3 USING INFORMATION TECHNOLOGY TO ENGAGE IN ELECTRONIC COMMERCE Management Information Systems, 10 th edition, By Raymond McLeod, Jr. and George P. Schell 2007, Prentice Hall, Inc. 1 Learning Objectives
More informationVoIP Solution How to Make the Best Choice for Your Business
Choosing the Right VoIP Solution How to Make the Best Choice for Your Business Section Title - 1 TABLE OF CONTENTS Introduction 3 CH. 1 What is VoIP? Why Do I Need It? 4 CH. 2 What Type of VoIP Solutions
More informationESSENTIALS OF E-COMMERCE (UNIT-2) PROCESS OF ELECTRONIC TRANSACTIONS AND THE INDIAN PAYMENT MODEL
ESSENTIALS OF E-COMMERCE (UNIT-2) PROCESS OF ELECTRONIC TRANSACTIONS AND THE INDIAN PAYMENT MODEL 1. INTRODUCTION Hello students, today we are going to study the subject E-commerce. The second unit covers
More informationEmerging Information Technology Issues in Leasing
Emerging Information Technology Issues in Leasing EXECUTIVE SUMMARY Rapid changes in information technology will trigger profound changes in the leasing industry. That is the conclusion of the Emerging
More informationMobile & Online Banking
Mobile & Online Banking Digital banking - no longer a matter of nice to have In today s world, online and mobile banking are no longer nice to have on the consumer s mind. Consumer s daily lives are seamlessly
More informationAT77 E-COMMERCE JUNE 2013
Q2 (a) Briefly discuss some of the key strength of using the internet for businesses. Key strength of using the internet for business is as follows: (i) 24 7 operation: Round the clock operation is an
More informationInformation Strategy Tutorial -1-Answer Guide
Information Strategy Tutorial -1-Answer Guide Use the following guidance to build the answer Lecture-1- Introduction to Information Systems Questions 1. a. Define the terms Data and Information. Data-
More informatione-comma E-commerce developer BM 01: Project planning e-comma e-commerce Developer BM 01: Project Planning
e-comma E-commerce developer BM 01: Project planning E-commerce developer BM 01: Project Planning Training Contents 1. E-commerce: Introduction to Product Planning 2. E-commerce Tools and Solutions 2.1.
More informationBuilding Web Business Blueprint
Building Web Business Blueprint Page 1 Introduction to the Building Web Business Blueprint Welcome to the Building a Web Business Blueprint. If you already have a business and are not really using the
More informationLESSON 02 E-COMMERCE BUSINESS MODELS. ISM Electronic Commerce By: S. Sabraz Nawaz Senior Lecturer in MIT
LESSON 02 E-COMMERCE BUSINESS MODELS ISM 41113 Electronic Commerce By: S. Sabraz Nawaz Senior Lecturer in MIT LEARNING OBJECTIVES Understand the unique characteristics of e-commerce Identify the key components
More informationSetting the Vision p. 1 Market Predictions p. 1 Defining Vision p. 3 Traditional Business Vision vs. E-Vision p. 5 Rethink Your Revenue p.
Preface p. xiii Setting the Vision p. 1 Market Predictions p. 1 Defining Vision p. 3 Traditional Business Vision vs. E-Vision p. 5 Rethink Your Revenue p. 6 Reengineer Your Business p. 8 Empower Your Customers
More informationPaper Reference IT Paper Reference(s) IT201/01 Edexcel Principal Learning Information Technology Level 2 Unit 1: The Potential of Technology
Centre No. Candidate No. Surname Signature Paper Reference(s) IT201/01 Edexcel Principal Learning Information Technology Level 2 Unit 1: The Potential of Technology Thursday 15 January 2009 Morning Time:
More informationChapter 7. E-Supply Chains, Collaborative Commerce, Intrabusiness EC, and Corporate Portals
Chapter 7 E-Supply Chains, Collaborative Commerce, Intrabusiness EC, and Corporate Portals Learning Objectives 1. Define the e-supply chain and describe its characteristics and components. 2. List supply
More informationCS200-Chapter12-Homework
Name: Class: Date: CS200-Chapter12-Homework Multiple Choice Identify the choice that best completes the statement or answers the question. 1. A typical enterprise like the one in the accompanying figure
More informationThe Systems Management. Solution designed specifically. for ebusiness. SystemWalker
The Systems Management Solution designed specifically for ebusiness SystemWalker Table of Contents EXECUTIVE SUMMARY...1 ebusiness RAISES THE BAR ON NETWORK MANAGEMENT...2 Growing Network Complexity...2
More informationPart 1: Why choose online?
The Accountant s Guide to Moving Clients Online Part 1: Why choose online? Brush up on the benefits of moving online and find out how to match your clients with the QuickBooks product that will best suit
More informationCHAPTER 3 ENTERPRISE SYSTEMS ARCHITECTURE
CHAPTER 3 ENTERPRISE SYSTEMS ARCHITECTURE 1 Learning Objectives Examine in detail the enterprise systems modules and architecture. Understand the effects of a well-designed architecture on ERP implementation.
More informationAn Introduction to Oracle Identity Management. An Oracle White Paper June 2008
An Introduction to Oracle Identity Management An Oracle White Paper June 2008 An Introduction to Oracle Identity Management INTRODUCTION Oracle Identity Management's best-in-class suite of identity management
More informationKARACHI UNVERSITY BUSINESS SCHOOL UNIVERSITY OF KARACHI
KARACHI UNVERSITY BUSINESS SCHOOL UNIVERSITY OF KARACHI BBA V (Hons.) Course Title : Computer Application To Business (E Commerce) Course Number : BA (H) 561 Credit Hours : 03 Objectives Globalization
More informationThe Internet & IS. Chapter 7 Electronic Business A.SARI
The Internet & IS Chapter 7 Electronic Business A.SARI Technology Toolbox: Paying for Transactions Technology Toolbox: Choosing Web Server Technologies Cases: Retail Sales Outline What types of products
More informationExecutive Guide. Strategically Managing Your Company s E-Commerce Capability. E-Commerce: Business transacted over the Internet.
NAED NATIONAL ASSOCIATION OF ELECTRICAL DISTRIBUTORS Executive Guide Strategically Managing Your Company s E-Commerce Capability # 3 Table of Contents Wait on B2B Customers 2 Save Customers Time 6 What
More informationSyllabus. CSC 142 Fundamentals of Information Systems
General Information Syllabus CSC 142 Fundamentals of Information Systems Date July 12th, 2018 Author April Devaux Department Computing Sciences Course Prefix CSC Course Number 142 Course Title Fundamentals
More informationElectronic Business. Electronic Business: Digital Markets and Digital Goods
Electronic Business Electronic Business: Digital Markets and Digital Goods Lecturer: Richard Boateng, PhD. Lecturer in Information Systems, University of Ghana Business School Executive Director, PearlRichards
More informationAQU Information Systems Fundamentals Spring Pg Reading notes for chapter 4 in the textbook
AQU Information Systems Fundamentals Spring 2012. Pg. 4.1 c h a p t e r 4 THE DIGITAL FIRM: ELECTRONIC COMMERCE & ELECTRONIC BUSINESS 4.1 Reading notes for chapter 4 in the textbook Chapter 4 is on the
More informationThis tutorial takes adopts a simple and practical approach to explain the governing principles of e-commerce.
About the Tutorial E-Commerce or Electronics Commerce is a methodology of modern business, which addresses the requirements of business organizations. It can be broadly defined as the process of buying
More informationFOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION
FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION MAKE THE SWITCH TO MONEXgroup ecommerce I Mobile I Wireless I Integrated I Countertop Solutions PAYMENTS IN-STORE PAYMENTS ON-THE-GO PAYMENTS ONLINE Accept
More informationSurvey on e-commerce and ICT 2017
Survey on e-commerce and ICT 2017 Your CSO reference number Before you begin, you will need The form should take approximately 15 minutes to complete Enter your CSO reference number: (Please TAB or use
More informationCHAPTER 10 E-COMMERCE: DIGITAL MARKETS, DIGITAL GOODS AND BUSINESS MODELS. By: S. Sabraz Nawaz Senior Lecturer in Management & IT
CHAPTER 10 E-COMMERCE: DIGITAL MARKETS, DIGITAL GOODS AND BUSINESS MODELS By: S. Sabraz Nawaz Senior Lecturer in Management & IT ELECTRONIC COMMERCE: DEFINITIONS AND CONCEPTS electronic commerce (EC) The
More informationAvangate SkyCommerce Suite
Sky Suite Customer Centric for Software and Cloud Reach New Markets Instantly. Transact at Every Customer Touch Point. Optimize New Business Models on the Fly. For software and cloud services, the line
More informationE-Commerce and Web Technologies
GRADUATE SCHOOL OF MANAGEMENT ST. PETERSBURG STATE UNIVERSITY Course Outline E-Commerce and Web Technologies Lecturer: Yablonsky Sergey, PhD, Information Technologies in Management Department, serge_yablonsky@hotmail.com
More informationWhitepaper. Abstract. Introduction
Whitepaper Proxy Ethereum for Everyone We do not offer securities or a collective investment scheme. You are advised to read this document carefully in full, and perform due diligence. According to the
More informationThe Changing Landscape of Card Acceptance
The Changing Landscape of Card Acceptance Troy Byram Vice-President Sr. E-Receivables Consultant February 6, 2015 Agenda EMV (Chip and Pin) PCI Compliance and Data Security New Regulations for Municipalities
More informationEMV THE DEFINITIVE GUIDE FOR US MERCHANTS AND POS RESELLERS
EMV THE DEFINITIVE GUIDE FOR US MERCHANTS AND POS RESELLERS WHAT IS EMV EMV is a global standard for credit and debit card processing designed to replace magnetic stripe cards. Also referred to as chip
More informationPayment Acceptance Solutions
Payment Acceptance Solutions Increase sales, enhance agility, and mitigate risks with CyberSource CyberSource is a Visa solution Businesses today are developing new strategies for acquiring and retaining
More informationPaper Reference IT Paper Reference(s) IT201/01 Edexcel Principal Learning Information Technology Level 2 Unit 1: Potential of Technology
Centre No. Candidate No. Paper Reference(s) IT201/01 Edexcel Principal Learning Information Technology Level 2 Unit 1: Potential of Technology Friday 22 May 2009 Morning Time: 1 hour Materials required
More informationAND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR
SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS Course / Branch : MCA Subject Name Faculty Name : E-Commercee : K. Saravananathan Semester /
More informationManaging information system & communication technology
Managing information system & communication technology 1 2 (IT) Information Technology The process and applications that create new methods to: 1. Solve problems 2. Perform tasks 3. Manage communication
More informationΜΑΘΗΜΑ: : ΤΕΧΝΟΛΟΓΙΕΣ & ΕΦΑΡΜΟΓΕΣ
ΠΑΝΕΠΙΣΤΗΜΙΟ ΑΙΓΑΙΟΥ ΤΜΗΜΑ ΜΗΧΑΝΙΚΩΝ ΠΛΗΡΟΦΟΡΙΑΚΩΝ ΚΑΙ ΕΠΙΚΟΙΝΩΝΙΑΚΩΝ ΣΥΣΤΗΜΑΤΩΝ ΠΡΟΠΤΥΧΙΑΚΟ ΠΡΟΓΡΑΜΜΑ ΣΠΟΥ ΩΝ ΜΑΘΗΜΑ: : ΤΕΧΝΟΛΟΓΙΕΣ & ΕΦΑΡΜΟΓΕΣ ΗΛΕΚΤΡΟΝΙΚΟΥ ΕΜΠΟΡΙΟΥ ιδάσκων: ΑΝΑΠΤΥΞΗ ΣΥΣΤΗΜΑΤΩΝ ΗΛΕΚΤΡΟΝΙΚΟΥ
More informationABRIA CORPORATE OVERVIEW
CORPORATE OVERVIEW Since our inception in 1997, AbriaCloud Technologies has been a leading all-in-one Provider of Information Technology Solutions. We offer a full portfolio of computing services to create
More informationConsumer oriented Ecommerce:
Consumer oriented Ecommerce: The convergence (union) of money, commerce, computing and networks is laying the foundation for a global consumer market place. Some fundamental business issues must be addressed
More information