Electronic Business - Personal Homepages
Download
Report
Transcript Electronic Business - Personal Homepages
Digital Economy
In 10 years from now the term
will be completely obsolete.
They backbite about you
on the internet
Definition
What do we understand by “business” ?
All activities that have to do with buying, selling , providing,
paying, handling, administrating etc. of goods, services or
information.
What do we understand by E-business ?
IBM
E-business is what happens when you combine the broad
reach of internet with the vast resources of traditional
information technology systems. It is dynamic and interactive.
Automotive Industry Action Group
The application of advanced information technology to
increase the effectiveness of the business relationships
between partners.
Other Definitions
Electronic Commerce ( EC )
Narrower than electronic business
Limited to the pure trading activities
Electronic Commerce
A new concept covering buying and selling of products,
services and information via computer networks, including
the internet.
EC applies different technologies, varying from EDI till e-mail.
In fact we can also consider buying food at a POS automate
using a smart card as a form of electronic commerce.
B2B and B2C
Business to Business
Business to Customer
E-Commerce : B2B
« B2b or not 2b »
Internet changes the
way of doing business.
4/2/2000
‘B-2-B’
Growth of commerce via Internet
Business
to
Business
Retail trade
Closed
The real impact of the Internet
at the long term?
The internet improves the transparency of the
economy
• easier prise comparisons (buyers - sellers)
• eliminates intermediaries
• reduces the cost of a transaction
• lowers the entry barriers
The internet brings economy closer to the
classical model of the free competition:
• abundance of information
• cost of transaction almost zero
What will be the real long-term
impact of IT and the Net?
“The biggest winner will probably be the
consumers and the entreprises of the old
economy (the automobile sector, chemical
sector, ...) that use e-commerce B2B within
the framework of a business process reengineering effort”
April 1, 2000
Strategic Networks !
• Internet - The textbook model of perfect
competition: abundant information, zero
transaction costs and no barriers to entry.
The most important effect of the “new”
economy may be to make the “old” economy
more efficient
The Economist April 1, 2000
• L’ Ubiquité. L’internet transforme le mode de
fonctionnement des entreprises : tous les
acteurs du marché seront dotés d’une plus
grande connectivité
• Les réseaux stratégiques de partenariat
deviennent la meilleure façon d’être
compétitif.
Le Monde 27/4/1999
Survival Guide
• REORGANIZE YOUR
COMPANY – CHANGE THE
OLD ENTERPRISE MODEL
March 22 1999
Example: US
Feb 1998
31/1/2000
The Economist Jan 14 2000
The US Job Machine
“We woz wrong”
Eito-RIPE July 1999
Au
s
Ge tria
rm
an
y
Ire
lan
d
Fr
an
ce
Sp
ain
Ita
Po ly
rtu
ga
l
Gr
ee
ce
UK
Fin
lan
No d
rw
De ay
nm
a
Sw rk
Ne ed
e
th
er n
Sw lan
itz ds
er
lan
Be d
lgi
um
July 1999 Internet hosts per 100
population
e-penetration
innovation
10
9
70
8
7
60
6
50
5
40
4
30
3
2
20
1
10
0
0
Internet hosts
'99-'98 internet growth
Internet hosts per 100 population in Western Europe
80
Internet growth
Obstacles
privacy
cost
security
wait & see
0
5
10
15
20
25
EITO 99
30
Obstacles
Essentially Cultural
• A generation of managers has to redo
their exams”
”Connect yourself, boss” (BusinessWeek)
• The public
The value of the network grows by the square of the
number of users
The Internet soap-bubble?
• The railway companies in the 19th century:
most lines bankrupted over investments created
excess capacity and deadly competition
• the good news: after the collapse of the shares, the
railways remained operational good for the whole
economy
Ethical e-business
mainly for self-defense
‘High standards of ethical conduct by businesses should be the main method of fostering consumer confidence in the Internet’
US Secretary of Commerce Daley Global Business Dialogue On E-Commerce, Sept 13, 1999 Paris
• non-transparancy :
not accepted by the consumer
• 100% data protection : extremely high cost
• changing mentality: examples Dell-IBM
• citizen follows more ‘open’ society ?
Dot-Coms Needed a Double Dose of Reality...
Traditional commercial and legal precepts that govern
capitalism must also apply to the Net. High-tech
entrepreneurs must address these problems as the
price for continued access to capital:
• Privacy.
• Should be respected
• Transparency.
• About real cost
• Patents.
• Patenting widespread business methods to create a monopoly and
inhibit rivals. The US Patent Office changed its mind.
• Monopoly.
• The courts have ruled that Microsoft violated the 100-year-old
Sherman Anti-Trust Act. Investors sent Microsoft's stock down.
BUSINESSWEEK : APRIL 17, 2000
Dot.business ?
Most companies must become Internet firms
if they are to survive
The Economist 26/2/2000
Merely adding a
website on to an
existing business is not
enough : the whole
business needs to
be redesigned around
the cost-saving,
communication-easing
properties of the net
e-Economy Threshold Timing
Germany
Italy
UK
France
Denmark
Austria
Portugal
Norway
Belgium
Finland
Greece
Switzerland
Spain
Sweden
Netherlands
Ireland
U.S.
1998
1999
2000
2001
2002
2003
2004
Forrester Research - TM@B 18/5/1999
2005
Online markets
‘Seller beware’
• e-procurement to cut costs
and speed supplies (General Electric
and Wall-Mart)
• third-party exchanges:
independent firms that bring together
many buyers and sellers to create a
genuine market (auction market)
• giants of an industry create large
virtual markets: General
Motors, Ford, DaimlerChrysler,
Toyota, Renault, Nissan abandon
stand-alone efforts and join forces
• markets intellectual
property: TechEx (Yale) 400
inventions looking for a licence
e-Logistics
E-technology transition ...
EDI era
– Large companies
– Proprietary
– Batch
– Bilateral
– High cost
Internet era
– All companies
– Public
– Online
– Networks
– Low cost
… Results in cost (and quality) discontinuity: Cost to
process an order: >10x improvement, plus better quality!!
The Zero-Latency Organization
Zero-Latency
Enterprises or organizations that can act quickly on
new information have a competitive advantage and
deliver better services.
Latency is the time it takes for a system to respond to
an input
all parts of the organization can respond to events as soon as
they become known to any one part of the organization.
Requires reengineering the business processes.
Zero-latency strategy is needed.
Zero-latency Strategy
A zero-latency strategy requires:
A network and software infrastructure that is capable of quickly
exchanging information across technical and organizational
boundaries
End-user interface tools and other application programs that are
capable of sending and receiving information in a timely fashion
A business strategy that leverages fast action to achieve a real
business benefit (by managers)
A set of business policies, processes and product offerings that
have been engineered to implement that business strategy
it can affect the way tasks are done or goods are delivered
An organization that can implement the new processes
function of workgroups and departments may change
Zero-latency Strategy
A zero-latency strategy is any strategy that exploits the
immediate exchange of information across technical
and organizational boundaries to achieve business or
organizational benefits.
Technical boundaries
different operating systems
different DBMS’s
different programming languages
Organizational boundaries
inter-department
inter-organizational
The Virtual Enterprise
Source: Gartner group Inside report June 1998
Virtual Organization
Cooperation between independent organizations that
operate to the outside world as a unit.
Temporary cooperation to gain competitive advantage or to
make up from arrears (Airbus)
Works well if the objective is clear
Legal problems can occur in case of conflicts
Intensive but non-definitive relationship
Essential is that partners can survive after a divorce
e.g. Toyota with partners is not a virtual organization
Seen from user point-of-view
Clients and suppliers are seen as part of the network
organization is not seen as a unit of buildings and resources,
but is always and everywhere accessible via IT
networking organization
Focussing on Core Competencies
Increased customer access to information allows them
to search among product and services to select the
best-of-breed
enterprises narrow their focus on core competencies
add customer value
differentiate products and services in the marketplace
add value across multiple products and services over time
enterprises narrowing the focus
+
need to offer broader product range
Virtual companies
Virtual Company
Basic set of ideas
outsourced non-core competencies
focus on core strength or business
little or no physical presence or infrastructure
network of business alliances
heavy reliance on telecommunications.
The combination of independent enterprises
required to fulfill a defined customer need.
The IT-enabled Virtual Enterprise
Virtual
Enterprise
Business
1
Partners
Product and
Service Creation
Suppliers
Internal
Operations
Physical
Enterprise
Sales and
Marketing
Customers
Fulfillment
and Delivery
Virtual
Enterprise 2
Industry
network
Virtual
Enterprise
3
Source: GartnerGroup
Types of Virtual Companies
Project oriented (airbus)
Competence based
Kernel partner (Mc Donnalds)
With or without mission overlap
IT-enabled
Existed for a long time as a business concept
Made feasible by IT
A chain of enterprises is required to deliver a single
product
Some enterprises offer multiple bundles of products
and services
Enterprises rely on a virtual enterprise of coordinated
service providers (value web)
IS departments must be ready to provide necessary
IT-services to rapidly changing partners
Need for rapid IT infrastructure, application
development capabilities and security strategies
Could you check my agenda
and tell me who are the people
with whom I'am having this
lovely lunch ?
Characteristics and examples
Elements usually present
alliances
brand identity
knowledge base
marketing strategy
problem solving
research and
development
Elements usually absent
Human resources
Inventory
Manufacturing
Materials
Offices
Storefronts
Examples:
• Airbus: Aerospatial, DASA, Aerospace, CASA, SABCA
• Virgin
• Construction companies
Knowledge: Key Differentiator
The virtual company will:
constantly scan the environment
constantly scan own internal processes
identify opportunities and challenges
sense changes among its suppliers, competitors,
customers, …
innovate products, services, communications, …
Constant mutation and change will be the norm
Knowledge Based
Critical Success Factors
Extensive interoperability between constituent parts
Subsume non-differentiating business processes for key
functions that facilitate application interoperability
packaged solutions: Baan, Oracle, Peoplesoft, SAP, …
Standards for the meaning and presentation of information
Key technology enablers
application interoperability (interenterprise, intraenterprise )
high speed networks
rapid application development
terabyte database management systems
interenterprise collaborative computing
security
Electronic Commerce
Interorganisational Systems
Information flow between two or more organisations
efficient transaction processing
no bargaining, only execution
pre-defined formats, no telephone calls nor paper
Drivers
reduced cost for routine business transactions (SWIFT)
improved quality of the procedures because of less errors
reduced processing time (Singapore)
lower cost for paper handling
business process easier for the users
Types
EDI, EFT, e-mail
shared databases
Establishing Trust
Without trust between parties online, the value
of electronic transactions remains limited.
The concept of a certificate authority, trusted
by all parties involved in electronic
transactions, is at the heart of new security
practices for E-business.
Outsourcing trust is not always the best
solution; it has consequences for vulnerability
and the degree of comfort.
E-commerce
Buying, selling products, services or information via a computer network
•
•
•
•
Purchaser
EDI
SWIFT
Tradenet
...
Order
Purchase order
•Reply on information request
•purchase confirmation
•shipping note
•payment acknowledgment
Payment authorization request
Payment approval
Bank of the purchaser
Seller
Electronic
Market
Order reply
Approvals by
Trusted party
EFT
Transaction Handlers bank
bank Supplier
Role of the certificate Authority
Facilitate E-commerce among parties.
Identify and authenticate certificate requesters and
users.
Maintain records on certificates issued.
Audit itself and (as appropriate) its subscribers.
Where possible, avoid or resolve disputes due to the
use of certificates.
Absorb risk and take fiduciary responsibility for
certificate issuance.
Electronic Market
Clients and providers negotiate on an on-line or off-line
sales transaction.
Network of interactions and relations where information,
products, services and payments are exchanged.
The business center is not a physical building but a
network-based location.
Participants: sellers, buyers, brokers, providers, clients
they are on different locations
sometimes they don’t know each other
Push and Pull possibilities
Advantages for the Organisation
Lower cost for handling, creation and storage
of paper information
electronic purchasing system
electronic payment 95% cheaper than check
Reduced stock and overhead with “pull-type”
delivery
Reduced time between sales and payment
Supports BPR efforts , leading to higher
efficiency
Advantages for the Client
More alternatives from various vendors
Cheaper products and services
Often immediate delivery
24 hours service
Relevant information can be obtained after
seconds instead of after days
Constraints
Lack of security standards
Insufficient bandwidth
Problems with Interoperability
Accessibility of the internet
Remaining legal aspects (digital signature)
Still in full evolution: code of conduct
Clients do not like changes
Still limited number of buyers and sellers
Problems with human relationships.
SET Secure Electronic Transaction
1.
Client initiates a transaction by sending a request and a signed,
encrypted authorization. The supplier can not access the credit
card number because it is encrypted.
2.
The supplier passes on authorization. The bank can decrypt this
and see the credit card number. It can also check the signature.
3.
Acquiring bank checks credit card with card issuer.
4.
Card issuer authorizes and signs transaction.
5.
Bank authorizes merchant and signs transaction.
6.
Customer gets goods or service and a receipt.
7.
Supplier asks to capture the transaction and get the money.
8.
Supplier gets paid according to its contract.
9.
Customer gets monthly bill from card issuer.
E-cash Electronic Cash
1. Customers open an account with a bank and either buy or receive
free special software for their PC,s.
2. The customers buy electronic money by using the software. Their
accounts are debited accordingly.
3. The bank sends an electronic money note to this customer,
endorsing it with a digital signature (made with its private key).
Customers then inquire whether the money is available by using
the bank’s public key.
4. The money is stored on the buyer’s PC and can be spent in any
store that accepts E-cash.
5. The software is used to transfer the E-cash to the seller’s
computer. The seller uses the bank’s and customer’s public keys
to verify that the money belongs to the specific buyer and is
indeed at hand.
6. The seller then deposits the E-cash in the bank, crediting his
regular or electronic account.
Electronic Credit Cards
Encrypted payments
1. Customer sends the encrypted credit card information
and digital signature to the supplier.
2. The merchant validates the customer’s identity as the
owner of the credit card account.
3. The supplier checks the information with his own bank
or credit card processor. Authorization is obtained by
contacting the customer’s bank.
4. When the authorization is sent to the supplier’s bank,
the deal can be concluded.
5. The customer’s account is debited and the supplier’s
account is credited.
Electronic checks
similar to regular checks, secured by public key cryptography.
1. The customer establishes a checking account with a bank.
2. The customer contacts a supplier, buys a product or service and emails an encrypted electronic check.
3. The supplier deposits the check in his account; money is debited in
the buyer’s account and credited to the seller,s account.
E-checks carry an encrypted digital signature and additional
information.
Can be exchanged between financial institutions via electronic
clearinghouses.
Can be used as payment instruments in EDI-applications.
The NetCheck system.
Accept paper checks in exchange for crediting customer’s NetCheck
account.
Integrated with financial institutions.
Electronic Payment Cards
Traditional bank cards
Payment cards for specific companies
(transportation)
Smart cards: electronic purse
Information Services
Evolution in information services
Information Broker
Content Specialist
Electronic Market
Facilitator
Information Broker
Identify an unfilled need for high-value
information contentthat is difficult to access
through available channels
Build a community of interest between
suppliers and customers
Penetrate quickly through”giveaway”
strategies, contracts and partnership
arrangements
Deliver value toall parties initially through
linkages, information collection and
categorization, and transaction coordination.
Content Specialist
While paying careful attention to private rights,
collect information on market transactions
Create organizational capabilitiesto make
sense of information and use it to add value to
products and services
Distribute value to to all members of the
community
Electronic Market Facilitator
Build a web of alliances to extend scale and
scope of community
Develop interactive tools to establish closer
links with community members and to facilitate
linkages among community members
Develop intelligent agents and filters to
customize the experience of all members of the
community
Build organizational capabilities to deepen
commitment and loyalty of all community
members.