Electronic Business: What Is E-Business?
Electronic Business: What Is E-Business?
What is e-Business? As per IBM, e-Business is the transformation of key business processes through the use of internet technologies. As a concept, e-Business is applied in two main ways with an organisation: As a concept which can be applied to strategy and operations As an adjective to describe businesses that mainly operate online
As per Department of Trade and Industry, When a business has fully integrated information and communication technologies (ICTs) into its operations, potentially redesigning its business processes around ICT or completely reinventing its business model e-business, is understood to be the integration of all these activities with the internal processes of a business through ICT. Opportunities in e-Business Reach: Number of potential customers a business can interact with or number of different categories a customer interface (e.g. store, catalogue or website) can cover. Reach is improved in both senses, one by low cost customer reach provided by search engines and second by online stores and malls. Richness: Internet enables more detailed information about products, prices and availability, more interactivity and customisation to engage customers and provide more up to date information. Affiliation: Refers to effectiveness of links with partners. In online context an organisation with the most and richest links gets the most benefits.
Risks in e-Business Site down because of high traffic Hackers and spam, identity theft issues Lack of or low grade email customer support
Electronic Commerce
Definition of e-Commerce As per HM Government Cabinet Office (1999) Electronic Commerce is the exchange of information across electronic networks, at any stage in the supply chain, whether within an organisation, between businesses and consumers or between the public & private sector, whether paid or unpaid. The use of ICT to enable external activities and relations with individuals, groups of people, and other business can be described as components of e-Commerce. It is a type of transaction completed over computer networks involving transfer of ownership or a right to use goods and/or services. It is a system that combines the resources of information systems with the reach of network connectivity, to directly link the key business constituents, customers and businesses, to improve the efficiency structures and elements of commerce. Impact of e-Commerce Lower coordination costs favour electronic markets Multiple choice preferences based shopping Minimized delivery costs, trade-off in market participation Low connectivity cost can transform and expand products to make them suitable for e-market
Electronic Commerce as a subset of e-Business Electronic Business offers online transactions but also extends to all internet based interactions with business partners. These online interactions are aimed at improving or transforming business processes and efficiency. ICT in e-Commerce is used for inter-organisational transactions but in e-Business ICT helps enhance ones business itself, thus also handling intra-organisational transactions over ICT. Similarly whereas e-Commerce seeks to add revenue streams, e-Business is strategic and much more function oriented in nature.
Types of e-Commerce
Different types of Sell Side e-Commerce Transactional e-Commerce sites (enable online buying) Brand building sites (provide an experience to support the brand) Portal or media sites (provide information or news about a range of topics) Service oriented relationship-building websites (provide information to stimulate purchase and build relations Searching for info. Purchasing physical goods Online receipts for information goods (e.g. MP3 files) Second largest and earliest of eCommerce forms Originated with e-Retailing Most common applications are o Product purchase o Information purchase o Personal finance management Reduces transaction (search) costs Reduces market entry barriers Considerable savings on info. goods o o o
Other types (base of relations) Business to Business (B2B) Comprises 80% of e-Commerce, fast growth expected Two primary components: o e-Infrastructure o e-Markets e-Infrastructure is architecture of B2B o Logistics (transportation etc.) o Application services providers (hosting etc.) Many e-Commerce functions can be outsourced Auction solutions, CMS, purchasing automation etc. Most B2B applications are either o Supplier management o Inventory management o Distribution management o Channel management o Payment management B2B e-Commerce has reduced costs for: o Search costs for buyer o Transaction processing costs (invoicing etc.) o Inventory & logistics costs Electronic commerce removes intermediaries brings pricing transparency and helps bring economies of scale
Business to Government Use of internet for public procurement, licensing procedures and other govt. operations Public sector has leading role as they have a need to make their procurement effective and efficient Brings procurement transparency Government to Business setup brings govt. functions to business over the internet
Limitations and Barriers of e-Commerce Not useful for perishable goods business Might take time to generate return on investment Integration of various databases might pose problems Reach issues in face of poor network connectivity Lack of skilled manpower Ambiguous legal environment Consumer resistance to online buying
Timmers 11e-Commerce models for businesses 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. e-Shop e-Procurement e-Mall (collection of e-Shops) e-Auctions Virtual communities Collaboration platforms Third party marketplaces (e.g. B2B alibaba.com) Value chain integrators Value chain service providers Information brokerage Trust and other services (Verisign etc.)
Although relative importance of these two kinds of chains depends on the characteristics of the products and services, their integration plays a critical role in the success of e-Commerce. In e-Commerce, more and more value chain activities are conducted electronically therefore a business should understand the implications of virtual value chain activities. This value chain in virtual mode offers a number of distinct advantages over physical value chain. Some advantages lie in forging alliances between customers and manufacturer advertising products and services selectively with effects of audio, visual and graphics and saving time and money in efficient processing of customer orders and enquiries. Flexibility in option pricing and customisation of products and service by reducing space and time constraints is another advantage of e-Commerce. Value chain management in e-Business helps you understand strengths and weaknesses of the organisation identify gaps and fill them. Inbound logistics including e-Procurement system, automatic ordering and EDI. Production process including ERP (intranet), Distribution systems, Extranet, RFID etc Sales and marketing including CRM and online sales systems Workplace admn. with Building Management Systems and Business to Employee Systems
Framework of e-Business
e-Commerce Applications (e-Banking, e-Ticketing) Information superhighway is a two way connectivity infrastructure that can support multimedia content. Common Business Service Infrastructure (Payment gateway, security technologies) Messaging and Information Distribution Network (Protocols) Multimedia Content (Text, Audio Video) Information Superhighway (i-Way) Legal and Policy Framework (IT Act 2000)
Consumer Premises Equipment Global Distribution Network Telecom Network Cable TV Network
Intranet
An intranet is a computer network that uses Internet Protocol technology to share information, operational systems, or computing services within an organization. The term is used in contrast to internet, a network between organizations, and instead refers to a network within an organization. Sometimes, the term refers only to the organization's internal website, but may be a more extensive part of the organization's information technology infrastructure, and may be composed of multiple local area networks. Companies may provide intranet access to offsite employees over VPN or through other authentication and encryption systems. Uses of Intranet Increasingly, intranets are being used to deliver tools, e.g. collaboration (to facilitate working in groups and teleconferencing) or sophisticated corporate directories, sales and customer relationship management tools, project management etc., to advance productivity. Intranets are also being used as corporate culture-change platforms. For example, large numbers of employees discussing key issues in an intranet forum application could lead to new ideas in management, productivity, quality, and other corporate issues. Increasingly, intranets are being used to deliver tools, e.g. collaboration (to facilitate working in groups and teleconferencing) or sophisticated corporate directories, sales and customer relationship management tools, project management etc., to advance productivity. Intranets are also being used as corporate culture-change platforms. For example, large numbers of employees discussing key issues in an intranet forum application could lead to new ideas in management, productivity, quality, and other corporate issues.
Composition of Intranet
An intranet comprises of various computing and network devices that function as: An open, multi-way communication vehicle: Top Down, Bottom Up, Peer-to-Peer Facilitator system for enterprise collaboration Business transactions execution system Business knowledge gateway and repository Employee engagement support system
It should comprise of systems from all departments like HR, Marketing, Workplace Administration, Quality and Operations and of course IT department.
Workplace Administration Transport management system Seat and supplies management system
ICT department Devices and equipment assignment system Communication services provisioning system Incident or service information system
Finance department Employee tax management system Company accounts and billing system Vendor management system
Marketing department CRM system Corporate communication portal Brand management system
Extranets
An extranet is a computer network that allows controlled access from the outside, for specific business or educational purposes. In a business-to-business context, an extranet can be viewed as an extension of an organization's intranet that is extended to users outside the organization, usually partners, vendors, and suppliers, in isolation from all other Internet users. In contrast, business-to-consumer (B2C) models involve known servers of one or more companies, communicating with previously unknown consumer users. An extranet is similar to a DMZ in that it provides access to needed services for channel partners, without granting access to an organization's entire network. Relationship to an intranet An extranet can be understood as an intranet mapped onto the public Internet or some other transmission system not accessible to the general public, but managed by more than one company's administrator(s). For example, military networks of different security levels may map onto a common military radio transmission system that never connects to the Internet. Any private network mapped onto a public one is a virtual private network (VPN), often using special security protocols. Advantages Exchange large volumes of data using Electronic Data Interchange (EDI) Share product catalogues exclusively with trade partners Collaborate with other companies on joint development efforts Jointly develop and use training programs with other companies Provide or access services provided by one company to a group of other companies, such as an online banking application managed by one company on behalf of affiliated banks
Disadvantages Extranets can be expensive to implement and maintain within an organization (e.g., hardware, software, employee training costs), if hosted internally rather than by an application service provider. Security of extranets can be a concern when hosting valuable or proprietary information.
Application layer consists of actual business applications that are going to be connected through the EDI system for exchange of electronic information. These applications may use their own electronic records formats for storing, retrieving and processing the information within each companys system. Standard Formats layer is the second important and critical building block of EDI. It ensures that all parties in EDI system are able to read and process the information and documents being sent. Two common documents standards that operate at this layer are EDIFACT and ANSI X12. Data Transport layer consists of services that automate the task of electronic transfer of messages. The layer utilises any of the available network transport services as e-Mail, FTP, Telnet or HTTP. Interconnection layer refers to the network infrastructure that is used for the exchange of information between trading partners. It may consist of dial up lines, leased lines, or I-way or any combination of two or more of these.
This massive increase in the uptake of eCommerce has led to a new generation of associated security threats, but any eCommerce system must meet four integral requirements: Privacy information exchanged must be kept from unauthorized parties Integrity the exchanged information must not be altered or tampered with Authentication both sender and recipient must prove their identities to each other and Non-repudiation proof is required that the exchanged information was indeed received Distributed Denial of Service (DDoS) attacks and Denial of Service Attacks leading to: Unusually slow network performance Unavailability of a particular web site Inability to access any web site Dramatic increase in the number of spam emails received DoS attacks can be executed in a number of different ways including: ICMP Flood (Smurf Attack) Teardrop Attack. Phlashing Distributed Denial-of-Service Attacks
These basic maxims of eCommerce are fundamental to the conduct of secure business online. Further to the fundamental maxims of eCommerce above, eCommerce providers must also protect against a number of different external security threats like technical and non technical attacks. Technical Attacks Brute Force Attacks