Electronic Business Technology
Post on 20-Jan-2015
Embed Size (px)
DESCRIPTIONContains different applications of EBT
- 1. ELECTRONIC BUSINESSTECHNOLOGYPRESENTED BY,VARNANA NAIRMONISHA T.B.ABDUL NAFIYRAHUL K.V.
2. The term "e-business" was coined byIBMs marketing and Internet teamsin 1996. 3. DEFINITION: Electronic business, or e-business, may be definedas the application of information and communicationtechnologies (ICT) in support of all the activities ofbusiness. It is also defined as the conduct of industry, trade,and commerce using the computer networks. 4. E-Business Vs. E-CommerceSl. No. E-Business E-Commerce1. It focusses on the functions thatoccur using electronic capabilities.E-Commerce is a subset of E-Business.2. E-Business helps to link acompanies internal and externaldata systems efficiently in order towork more closely with suppliersand partners.It seeks to add revenue streamsusing the World Wide Web andInternet. 5. Internal Communication E-Commerce 6. I. INTERNAL BUSINESS SYSTEMSa) Customer Relationship Management (CRM)b) Enterprise Resource Planning (ERP)c) Document Management Systems (DMS)d) Human Resources Management (HRM) 7. A. Customer RelationshipManagement (CRM) CRM is a model for managing a companysinteractions with current and future customers. It involves using technology to organize, automate,and synchronize sales, marketing, customer service,and technical support. 8. ExampleCustomer Service and Support CRMs can be used to create,assign and manage requestsmade by customers, such as callcenter software which help directcustomers to agents. CRM software can also be usedto identify and reward loyalcustomers over a period of time.Major Vendors: SAP AG, Oracle,Salesforce.com, Microsoft CRM 9. B. Enterprise Resource Planning (ERP) ERP systems integrate internal and external managementof information across an entire organization. It embraces finance/accounting, manufacturing, salesand service, customer relationship management, etc. Report generated by ERP 10. (Contd.) ERP systems automate this activity with anintegrated software application. ERP facilitates information flow between all businessfunctions inside the organization, and managesconnections to outside stakeholders. 11. Example Large corporations like Wal-Martuse a just-in-time inventorysystem. This increases inventorystorage and delivery efficiency,since it helps avoid wastefulstorage days and lack of supply tosatisfy customer demand.Leading ERP Vendors: Oracle, MSDynamics, mySAP, Tally 12. C. Document ManagementSystem (DMS) A DMS is a computer system (or set of computerprograms) used to track and store electronicdocuments. It is also capable of keeping track of the differentversions modified by different users (historytracking). 13. Example Banks store all KYC forms filled induring registration by clients inelectronic format. Companies store resumes in theform of e-docs.Skelts DMS 14. D. Human Resource ManagementSystem(HRMS) A HRMS refers to the systems and processes at theintersection between HRM and IT. HRMS encompasses: Payroll, Time and attendance,Performance appraisal, Benefits administration,HRIS, Recruiting/Learning Management,Performance record, Employee self-service,Scheduling, Absence Management and Analytics. 15. Example Using HRMS a company canrecord all the details of anemployee, his attendancerecord, performance and theycan decide on his promotion orsalary increase. 16. II. ENTERPRISE COMMUNICATION AND COLLABORATION:a) VoIPb) Content Management Systemc) E-maild) Voicemaile) Web Conferencingf) Digital work flows or business process management 17. A. Voice over Internet Protocol (VoIP) Voice over IP is a methodologyand group of technologies for thedelivery of voicecommunications and multimediasessions over InternetProtocol (IP) networks, such asthe Internet. Example: Skype, Viber, GoogleTalk 18. B. Content Management System (CMS) A software application used to upload,edit and manage content displayed ona website. A content management system canperform a variety of different tasks fora website including regulating whencontent is displayed, howmany times the content is shown to aspecific user, and managing how thecontent connects or interacts withother elements of the website.Providers: MS Sharepoint Foundation, IBMEnterprise Content Management 19. C. E-Mail It has emerged as the major formof business communication. Apart from helping in Enterprisecollaboration, e-mails are alsoused to advertise new productsand offers. Providers: Gmail, Hotmail, Yahoo,AOL 20. D. Voice Mail Voice mail allows businessprofessionals access to messages-- even when theyre away fromthe office. Types: PC based: Skype Cell phone based: Provided byoperators Business voice mail: Guided byan automated attendant 21. E. Web Conferencing Web conferencing refers to aservice that allows conferencingevents to be shared with remotelocations. The service allows real-time point-to-point communications as wellas multicast communicationsfrom one sender to manyreceivers.Service Providers: Cisco WebEx, MSOffice Live Meeting, Team Viewer 22. E. Business Process Management (BPM) BPM has been referred to as aholistic management approach toaligning an organizations businessprocesses with the wants andneeds of clients. It promotesbusiness effectiveness and efficiency while striving for innovation,flexibility, and integration withtechnology. 23. III. ELECTRONIC COMMERCE - B2B OR B2C:a) Internet Shopb) Supply Chain Managementc) Online Marketing 24. A. Internet Shop Online shopping or onlineretailing is a form of e-commerce which allowsconsumers to directly buy goodsor services from a seller overthe Internet using a web browser.Examples: Flipkart, eBay, myntra,Junglee, Amazon, lenskart 25. B. Supply Chain Management They manage firms relationshipwith suppliers. Share information about orders,production, inventory levels,delivery of products and servicesProviders: SAP, Oracle SCM, SiemensPLM software 26. C. Online Marketing It is the marketing or promotionof products and services over theinternet. Examples include ads on searchengine results pages, banner ads,blogs, rich media ads, socialnetwork advertising, etc.Providers: Microsoft, Yahoo, Google,Rediff 27. When organizations go online, they have to decidewhich e-business models best suit their goals. A business model is defined as the organization ofproduct, service and information flows, and thesource of revenues and benefits for suppliers andcustomers. 28. Currently the most adopted e-business models are: E-shops E-procurement E-malls E-auctions Virtual Communities 29. A. E-Shops Allows consumers to directly buygoods or services from a sellerover internet. Providers: Flipkart, eBay, Amazon,myntra, Junglee(Amazon India). 30. B. E-Procurement It is B2B, B2C and B2G purchaseand sale of supplies, work andservices through internet It is a system to manage tendersthrough a website. 31. C. E-Mall It is a website that displayselectronic catalogs from severalsuppliers and chargescommission from them for salesrevenue generated at that site. It is usually a B2B marketplace. Providers: IndiaMART, eBay,Amazon 32. D. E-Auctions E-Auctions enable organizationsto conduct online auctions. The system automates thecomplete auction process fromcreation of an event toconducting the auction. Providers: C1 India-www.bankeauctions.com, BSNL-Premium Number Auction,Auction of Tea Leaves 33. E. Virtual Communities A virtual community is a socialnetwork of individuals whointeract through specific socialmedia. They can be used for businesscommunication and also tocommunicate with consumers. Providers: LinkedIn, forumsprovided by Companies. 34. Potential Concernsa) Securityb) Privacy and Confidentialityc) Authenticityd) Data Integritye) Non-repudiationf) Access Controlg) Availability 35. A. Security Hackers are one of the great threats to the security of e-businesses. Some of the methods of protecting e-business security and keepinginformation secure include Physical Security Anti-virus software Firewalls Encryption http://www.youdzone.com/signature.html https://www.irctc.co.in/ 36. B. Privacy & Confidentiality Confidentiality is the extent to which businessesmakes personal information available to otherbusinesses and individuals. Tools such as encryption and firewalls manage thisspecific concern within e-business. 37. C. Authenticity E-business transactions pose greater challenges forestablishing authenticity due to the ease with whichelectronic information may be altered and copied. Virtual Private Network Digital Signatures 38. D. Data Integrity Data integrity answers the question "Can the informationbe changed or corrupted in any way?" A business needs to be confident that data is notchanged in transit, whether deliberately or by accident. Firewalls Backing up Data 39. E. Non Repudiation A business must have assurance that the receivingparty or purchaser cannot deny that a transactionhas occurred, and this means having sufficientevidence to prove the transaction. Digital Signatures 40. F. Access Control When certain electronic resources and information islimited to only a few authorized individuals, a businessand its customers must have the assurance that no oneelse can access the systems or information. This concern is addressed using Firewalls, accessprivileges, user identification and authenticationtechniques (such as passwords and digital certificates)and VPN. 41. G. Availability Messages must be delivered in a reliable and timelyfashion, and information must be stored and retrieved asrequired. Examples to address this include data backup, fire-suppression systems, Uninterrupted Power Supply (UPS)systems, virus protection and ensuring that there issufficient capacity to handle the demands posed byheavy network traffic. 42. E-Cheque They work just like ordinary cheques and are legallybinding promise to pay. It would be impossible for a e-cheque to bounce. 43. E-Cash Electronic money is money that isexchanged electronically. This involves the us