Chapter 1

advertisement
MR2350
Instructor Notes
Rob Cashin
Contents
Chapter 1....................................................................................................................................................... 3
Chapter 2....................................................................................................................................................... 6
Chapter 3....................................................................................................................................................... 7
Chapter 4..................................................................................................................................................... 12
Chapter 5..................................................................................................................................................... 17
Chapter 6 – Supply Chains etc. ................................................................................................................... 22
Chapter 10 – Fraud & Security .................................................................................................................... 26
Chapter 11 – Payment Systems .................................................................................................................. 29
Chapter 16 – Regulatory, Ethical, Compliance Issues ................................................................................. 30
Chapter 1


Concepts
o Define eCommerce:
(buy | sell | exchange) (products | services | information) via
computer networks
o Define eBusiness: goes beyond buy/sell/exchange … also service, collaboration, elec
transactions in an organization
o How much ‘e’? See Ex 1.2
 3 dimensions: <> product/service <> process <> delivery <>
 Some names: brick & mortar … click & mortar … pure online
o Can be electronic but not internet (private networks – or paying a vending machine with
a cell phone – yeah, you can)
o Electronic markets (pretty much wide open) … or intra-organizational systems (specific
organizations – 2 or more)
Framework & field
o Note: Internet, intranet, extranet
o Framework
 People, public policy, technical standards, business partners, support services (&
infrastructure)
 See ex 1.3
 That is to say … if you are to ‘know about’ EC, then these are the things you
must know
o Classifications




B2B
B2C
B2B2C - a company pays AOL to provide its employees with Internet access
rather than having each employee pay an access fee directly to AOL.
 C2B – I get airlines to be low bidder for my ticket; or I sell stuff to organizations
 C2C – auctions & online classifieds
 Mobile commerce  Intrabusiness EC – transactions within an organization
 Collaborative commerce – companies work together online, maybe to design a
product
o History – (see text)
 EFT / EDI came before internet
 Successes, failures (often a business model problem), future
eCommerce 2.0
o Social computing – social behaviour meets technology (ex online consumer ratings)
o Web 2.0 – control of info in hands of ‘the people’ (wikis, blogs, etc)
Mr2350
Instructor Notes
o



p4/31
Social networks / services … like, friends / friends on facebook (for example, Facebook is
actually a social network service – the social network is the group of friends itself)
 Name some other networks besides Facebook (LinkedIn, YouTube, Friendster,
Flickr, MySpace, Twitter, LiveJournal, Tumblr, Diaspora)
 What stuff can you do on a social network?
 What do you think of the risk in posting stuff on these? Ex, when you go to get
a job.
o Enterprise social networks … like above, but focus on business. Note in text, how
companies use these (keep in touch with customers; comment / rate products;
sweepstakes & contests; etc)
o Virtual worlds (some people actually earn money in the virtual world)
Digital economy – economy based on digital technology.
o Ex 1.5
o Digital enterprise … uses IT as a fundamental tool in achieving 1 or more of 3 basic
objectives (reach & engage cust, boost productivity, improve efficiency) – see ex 1.6
o Portal – single point of access to an organization’s stuff (ex 1.7)
o Digital society – see all the ways we do things differently – a bunch of stuff, I won’t
cover it all
Drivers – see ex 1.9
1.6 EC Business Models! What do we do?.
o Revenue Model – how do we make money?
 Exercise: Name 1 business where the product is free but you pay for the service
(cell phone), and 1 business where you pay for the product but the service is
free (radio).
 Different models (ask students to give an example of each)
 Sales. Companies generate revenue from selling merchandise or
services over their Web sites. An example is when Wal- Mart, Amazon.
com, or Godiva sells a product online. .
 Transaction fees. A company receives a commission based on the
volume of transactions made. For example, when a homeowner sells a
house, he or she typi-cally pays a transaction fee to the broker. The
higher the value of the sale, the higher the total transaction fee.
Alternatively, transaction fees can be levied per transaction. With online
stock trades, for example, there is usually a fixed fee per trade,
regardless of the volume. .
 Subscription fees. Customers pay a fixed amount, usually monthly, to
get some type of service. An example would be the access fee for AOL.
Thus, AOL’s primary revenue model is subscription ( fixed monthly
payments). .
Mr2350
Instructor Notes




o
Advertising fees. Companies charge others for allowing them to place a
banner on their sites. This is how Google has made its fortune ( see
Chapter 4). .
Affiliate fees. Companies receive commissions for referring customers
to others’ Web sites. .
Other revenue sources. Some companies allow people to play games for
a fee or to watch a sports competition in real time for a fee ( e. g., see
espn. go. com).
Licensing fees ( e. g., datadirect- technologies. com). Licensing fees can
be assessed as an annual fee or a per usage fee. Microsoft takes fees
from each workstation that uses Windows NT, for example.
Benefits and limitations of EC
 Benefits: ex 1.15
 Limitations
 ( 1) resistance to new technology, ( 2) implementation difficulties, ( 3)
security concerns, ( 4) lack of technology skills, ( 5) lack of potential
customers, and ( 6) cost.
 Van Toorn et al. ( 2006) believe that the barriers are sectoral barriers (
e. g., government, private sector, interna-tional organizations), internal
barriers ( e. g., security, lack of technical knowledge, and lack of time
and resources), and external barriers ( e. g., lack of government
support).
 Van Toorn et al. ( 2006) also list the top barriers with regards to global
EC: cultural differences, organizational differences, incompatible B2B
interfaces, international trade barriers, and lack of standards.
 Ethics – can vary by country
Exercise



p5/31
Review RFID info
Break into groups
Come up with as many uses as you can for RFID
Mr2350
Instructor Notes
Chapter 2
Hmmm … notes gone missing … will hunt them down and post …
p6/31
Mr2350
Instructor Notes
p7/31
Chapter 3
(Note: Assignment 2 - http://www.heliohost.org – posted online @
http://mr2350.wordpress.com/2011/01/22/assignment-2-version-2)
3.1 – Internet Marketing & Electronic Retailing
45 % of internet users are shoppers – but growth of users will slow – so they need to get shoppers
spending more

Overview of electronic retailing
o ‘Real world’ - retailer is the middle man (a store owner) – not always required, but
often. ‘e-tailing’ can eliminate the middle man.

Size & growth of B2C market
o B2C EC sales estimates are extremely varied – too many factors. Growing 14% per
year!! Internet also influences brick & mortar sales

What sells on the internet
o See ex 3.2 – computer hw/sw is biggest seller, followed by consumer electronics

Characteristics & advantages of successful etailing
o Same as offline – plus some other stuff, like infrastructure. Ex 3.3 is a good list of the
differences
3.2 – E-tailing business models
How will the company make money?

Classification by distribution channel
o
Direct marketing by mail order companies
o
Direct sales by manufacturers (Usually click & mortar, sometimes pure-play)
o
Pure-play e-tailers – no stores (Amazon)
o
Click & mortar retailers (usu offline adds online, but seeing some online adding offline –
like Dell)
o
Retailing in online malls
 Referring directory … the ‘mall’ just connects you to another store.
Mr2350
Instructor Notes

p8/31
Mall with shared services … the mall provides sellers with services (order,
payment, shipment…)

Other B2C Models & special retailing
o Ex 3.5

B2C in social networks
o Social retailing – making places where people can collaborate, get advice, etc. See how
Amazon provides a place to rate, compare, review, discuss, etc.
3.3 – Travel & Tourism online
Half of all travelers book online, and almost half those researched online. Sites include travel agencies,
search engines, company owned sites (airlines, hotels, etc)
Revenue models include commissions, ads, lead-generation payments, consultancy fees, subscription,
revenue sharing, etc.
Trends: differentiation (adding value); travel bots; social networking

Services provided – same as offline, but much more – Can you think of any?

Special services online
o
Travel-oriented social networks

Benefits & limitations of online travel services
o Lots of info; discounts; sellers can sell empty spots
o Non-internet users; complexity of some arrangements

Corporate travel – set up so employees book through travel companies, who help cut costs

Impact of EC on the travel industry
o Travel agents haven’t gone away 
o But some predict their role may change
3.4 – employment placement and the job market online

The internet job market – now bigger than print!
o Employers and employees moving online to connect (also online are the job agencies,
government etc., consortiums of companies)
o Also, companies setting up employment portals – cuts costs and time
Mr2350
Instructor Notes
o

p9/31
Benefits - Ex 3.6 and 3.8; neat example Ex 3.7
Benefits & limitations of the electronic job market
o Again … people without PCs … companies still use print – but it’s disappearing
o Flooded with apps! Some use ‘intelligent agents’ to match applicants with job
requirements
o Security issues
3.5 – Real estate, insurance, stock trading

Real estate online
o Online advertising now bigger than print
o Buyers doing a lot of research of their own
o MLS – some agents wanted this closed to ‘the public’. But check www.mls.ca!
o But agents have not been ‘disintermediated’ – buyers use net AND agents
o Craigslist etc may cut into traditional ‘classifieds’. Note also ‘MakeMeMove’

Insurance online
o Some presence online – some people don’t trust it, while others like the low price – so
companies are using both online and agents

Online stock trading
o Much lower commission fees
o No busy phone lines, less error (miscommunication); anywhere any time, lots of free
info
o Risks – security !
3.6 – Banking & personal finance – growing !!

Home banking – ex 3.10

Virtual banks – have not been doing well – be careful before dealing – make sure they’re legit.

International and Multiple-currency banking
o quick exchange of currencies
o often international transactions done with CC, but some other services may be required

Online financial transaction implementation issues
o SECURITY !!!
o Access to intranet by customers
o Images (of cheques for ex.)
o Fees … hmmm … do you charge for online, or for offline ? (observation … odd, it costs a
LOT more to do an in-branch transaction than an online one – about $1 vs $.01 – but
Mr2350
Instructor Notes
you get CHARGED for online …. Weird huh?)

Personal finance online
o Paying bills etc. Combine banking with personal finance, trading, etc.
o # of real cheques declining
3.7 – On-demand delivery of products, digital items, entertainment, gaming

On-demand delivery of products

FreshDirect

Online delivery digital products, entertainment, and media

Online entertainment
3.8 – Online purchase / decision aids

Shopping portals

Shopbots software agents

‘Spy’ services

Business ratings sites

Trust verification sites

Other shopping tools
3.9 – Problems with e-tailing – lessons learned

3.10 – Issues in e-tailing

Disintermediation and reintermediation

Channel conflict

Determining the right price

Product and service customization & personalization
p10/31
Mr2350
Instructor Notes

Fraud & illegal activities

How to make customers happy
p11/31
Mr2350
Instructor Notes
p12/31
Chapter 4
4.1 Learning About Consumer Behavior Online

A model of consumer behaviour online
o Individuals and organizations – focus here on individuals
o See Ex 4.1
§ Note ‘uncontrollable’ versus ‘controllable’
o Behaviour process model - AIDA(S) … Attention, Interest, Desire, Action Satisfaction
o Also: Attitude-Intention-Behaviour
4.2 The Consumer Purchasing Decision- Making Process

A generic purchasing-decision model
o 1 – identify needs (marketers help you realize you have a need, and they can fix it!)
o 2 – search for info (product and merchant brokering)
o 3 – alternative evaluation
o 4 – purchase/delivery
o 5 – post-purchase behaviour (customer service; evaluation … lead to repeat
purchases)

Customer decision support in web purchasing
o See Ex 4.2

Players in the consumer decision process
o Initiator; influencer; decider; buyer; user – may not all be the same (give me an
example) – makes the marketer’s job more difficult
4.3 Mass Marketing, Market Segmentation, and One- to- One Marketing
Mr2350

Instructor Notes
p13/31
Mass-marketing to one-on-one marketing
o Note the ‘roadblock’approach by Ford!
o Market segmentation – with internet, you get to one-to-one!
o Instead of selling one product to many customers, you can try selling many products
to one customer
o Do this by collecting detailed customer info after 1st purchase – then tailor your
offering (4 Ps) to the customer

How one-to-one relationships are practiced
o Note http://www.emarketer.com/Article.aspx?R=1008226 - Requiring separate
registration hurts conversion and engagement – many people just leave the site … they
seem to like the idea of logging in with their FB credentials, for example. (So what are
the advantages of this for the marketer? People stay; such social network users may be
better prospects, and; info is more up-to-date)
4.4 Personalization and Behavioral Marketing

Personalization in e-Commerce – how?
o Get info directly from user; use cookies; profiles from previous purchases; marketing
research; inferences

Behavioural marketing and collaborative filtering
o based on your searches and site visits
o ‘customers who bought THIS also bought THAT’
o Ask questions s/a income … direct car ads based on that
o There may be ethical issues (I think FB had some plan to do some of this – follow you
on the web - but scrapped it)
4.5 Loyalty, Satisfaction, and Trust in EC

Customer loyalty – costs more to get ‘em than to keep ‘em ! – note the MANY advantages of
loyalty (lower costs of marketing, advert, transaction, turnover, failure, warranty; keeps
away from competition; lower price sensitivity; better word-of-mouth (remember my Kindle
story))
Mr2350


Instructor Notes
p14/31
Satisfaction in EC (Ex 4.5) online changes it a little – not just friends & fam anymore
Trust in EC (Ex 4.6)
4.6 Market Research for EC

Objectives and concepts of market research online
o Online is cheaper and easier
o They can track your movement through a site – see what people look at, how they
navigate, whether they’re confused (Note my my Bell experience – to change my billing!
And no response!!)

Representative market research approaches
o segmentation … for example, based on your comfort with Internet shopping
o Email, surveys, focus groups, chatrooms, forums, blogs, tracking web activity …

Limitations of online market research and how to overcome them
o Too much data! – automate with data warehousing & data mining
o No face-to-face … L … but also offers anonymity
o Not truly representative (why?)

Biometric marketing – to make sure YOU is YOU.
4.7 Web Advertising



Overview of web advertising – trad mkt expensive because most ads are wasted. Web allows
you to mkt interactively to people who are interested in your stuff.
Why internet advertising? – TV viewers going to net; more time on net; mode educated,
higher income; more precise, targeted
Advertising networks – like DoubleClick. They track you and target ads to you (based on
stuff like the sites you’ve visited)
4.8 Online Advertising Methods

Banners, banner exchanges – we’re getting immune – click-through is declining
o Swapping – A posts B’s ad, B posts A’s. Banner exchanges help arrange this
Mr2350




Instructor Notes
p15/31
Pop-up (pop-under) and similar ads. Annoying.
Email advertising - low cost, include a banner. Sent to subscribing members. Unsolicited =
spam. Send to email, and now PDAs & phones – will soon see use of current physical
location for targeting ads! – note hoaxes and frauds.
Newspaper-like and classified ads
Search engine advertisement – free! But hard to be #1 hit.
o Ads linked to your search keywords (Google service, 90% of their $$$!!!
o SEO !!!! – different methods



Google – online advertising king (think about it – is Google’s main purpose to help you
search? Or to help companies advertise …)
Advertising in chat rooms – VERY targeted. The marketers can actually post and chat. Or
view competitors’ rooms
Other forms of advertising – press releases, video ads (YouTube), ‘advergaming’
4.9 Advertising Strategies and Promotions

Social network advertising
o Facebook Beacon - Your FB friend Bob buys product X – YOU get a notification!
Sketchy.
o Direct ads on FB
o Groups & Pages – if you ‘Like’ a page you get entered in a draw.

Video ads on the web and in social advertising
o Tracking: looks at the behaviour of ad viewers – did you watch it, how long, click on
an ad? did you share it, etc.




Viral marketing – gets around ‘word of mouth’ – use on social networks – Sears let shoppers
share dress selections on FB – genius!
Other advertising strategies – affiliate marketing (A refers customers to company B); paid
viewing of ads; sell space by pixel; personalized ads
Online events, promotions, and attractions
Mobile marketing and advertising – phones, PDAs, even taxis. – cool example … send
Chapters coupon to you as you enter Chapters.
4.10 Special Advertising and Implementation Topics



Permission advertising – what it says
Some implementation issues
Ad management
Mr2350



Localization
Ad content
Intelligent agents and applications
Instructor Notes
p16/31
Mr2350
Instructor Notes
p17/31
Chapter 5
5.1 Concepts, characteristics, models
o
o
o
Intro

Concepts: transactions over a network (not necessarily the internet) with supply chain,
government, other businesses etc.
 Benefits: Collaboration, intra-organization integration, reduce delays etc.
 $15 TRILLION ! 85 or 90% of online business.
 Ex 5.1 good – this chapter does gen 2 & 3
Types of transactions and activities – ex 5.2
 (sell-side) One seller – many buyers
 (buy-side) One buyer many sellers
 (Exchange) Many to many
 Supply chain improvements & collaborative commerce (what’s the supply chain?)
 1:m and m:1 – private emarketplace (one company does all the buying – or all the selling)
 M:M – trading exchanges (public)
 Supply chain improvement (manufacturing, raw materials, shipments, logistics); and
collaborative commerce (cx, design, planning, info etc between companies – more than just
financial)
B2B characteristics
 Parties to the transactions (buyers, sellers, intermediaries)
 Types of transactions
o spot buying – buy as you need, at going rate, may not know seller – ex stock exchange
o strategic sourcing – long term contracts, parties know each other
 Types of materials
o direct – raw materials, usu scheduled & planned, large volume, extensive negotiating
o indirect – supplies (called MRO – maint, repair, operation) – aka nonproduction
materials
 direction of trades
o vertical – a marketplace specializing in car stuff
o horizontal – products & services used in many industries – like supplies, computers
 Supply Chain Relationships
o The buy/sell/movement along the line from raw materials to consumer purchase … B2B
can change this, make it more efficient, eliminate steps, create competitive advantage
etc.
 Service Industries
o See list (travel, finance, etc)
 Benefits & Limitations of B2B
o P200 - list
 Content of B2B Field – see ex 5.3
Mr2350
Instructor Notes
p18/31
5.2 One-to-many: sell-side e-marketplaces



Sell-side models – B2C uses storefront – B2B uses an extranet
o A manufacturer or wholesaler selling to wholesaler, retailer, individual business
o Like B2C, but the processes are a little different – usu separate the two
o In addition to goods, can provide service (like product support to businesses as well as
consumers)
Sales from catalogues
o Often a common catalogue, plus custom ones for large customers
o Try to integrate with large buyer systems for efficiencies
o Can be channel conflict
o Possible customization
o Benefits & problems
 Benefits obvious
 Problems
 finding buyers! How to ‘advertise’ for them
 channel conflict
 EDC can be expensive to customer
(Online direct sales)
5.3 Selling via distributors & other intermediaries

Manufacturers may sell directly to large buyers, but often farm the job out to distributors to
supply many smaller companies (SAMS for Walmart) usu horizontal, but can be vertical market
(Boeing PART)
5.4 Selling via e-auctions




Auctions on sell side – sell off your assets – forward auction – obvious benefits
Auctions from company’s site – diy if you’re big enough – don’t pay a middleman
Intermediaries in auctions – conduct private auctions for a company, or the company may just
go to a 3rd party host – like ebay – a lot of efficiencies there – 3rd party takes care of the
mechanics – can also keep it ‘quiet’
(B2B forward auctions – examples)
5.5 One-from-many: Buy-side e-marketplaces & e-procurement


Overview: Going to a seller’s (sell-side) marketplace can be inefficient (entering info into your
own system for example, or ‘shopping around’. A buyer’s (buy-side) marketplace helps solve
this. I have a ‘store’ with all the things I want to buy – sellers browse around and offer to sell
me their stuff.
Different ways to buy: bid, buy from mfctr/wholesaler/retailer, from intermediary, from internal
buyers calatogue (like ‘standing offer’ stuff), group purchasing (advantages?), exchanges,
collaborate with supplies – JIT stuff. (Walmart good example?)
Mr2350



Instructor Notes
p19/31
Types of e-procurement (buying goods & services for organizations) EX 5.5
o Buy on the buyer’s website
o Buy at seller’s store
o Buy at exchanges
o Buy at other emarket sites
o E-sourcing, e-tendering, e-reverse auction, e-inform, web-based ERP, e-marketsites, eMRO
Traditional inefficiencies
o 80% if items make up 20% of value, lot of time wasted on data entry, error corrections,
etc.
o Maverick buying
Goals & benefits of e-procurement
o List, p 212-13 … improving process (info, payment, etc) , getting better prices, min
errors, etc.
5.6 Buy-side e-marketplaces: reverse auctions



There’s so many, you can’t watch em all – there’s directories, and ‘agents’ (software)
Or an intermediary
Can also have group tendering sites (> 1 buyer)
5.7 Other e-procurement methods






Combine the catalogues of all suppliers into a single buying catalogue – ‘internal procurement
marketplace’ – faster, cheaper (b/c of volume), fewer suppliers required, easy controls
Also have a buying card (for MRO) … kinda like a pre-approved ‘credit card’ for buyers.
Seller’s e-auctions
Group purchasing – internal, and even external (3rd party like buyerzone.com helps)
Purchasing DIRECT goods – 50-80% of stuff! Many benefits beyond price (inventory, unit cost,
shortages, production etc)
Bartering – trade ‘stuff’
5.8 B2B Electronic exchanges
Ex 5.10 is good
Mr2350




Instructor Notes
Functions
o Match buyers/sellers
o Facilitate transactions
o Maintain policies & infrastructure
Dynamic pricing
Ex 5.2 – gains & risks for buyers & sellers
o Example – what if the marketplace folds?
Different revenue models, as discussed earlier in text
5.9 B2B Portals, directories, ownership of B2B marketplaces




Portal provides INFO
Horizontal (Alibaba) or vertical (vortal)
Some evolving to provide transactions
Who ‘owns’ them?
o 3rd parties, who may try to MATCH buyers & sellers also (not just provide info)
o Consortiums – many large companies joined together in the venture
5.10 Partner and supplier relationship management
p20/31
Mr2350


Instructor Notes
p21/31
PRM – Partner Relationship Management (my buying history, the sellers’ inventory levels, etc)
Communities – chat, BBS, personalized web pages
5.11 B2B in the web 2.0 environment & social networking

New, growing – lots of opportunities (p230)
o Participate, monitor, use existing apps
5.12 Internet Marketing in B2B EC



Ex 5.14
Fewer buyers, but bigger purchases, more complex, group buyers/decision makers
Marketing & advertising – in physical world it’s tradeshows, personal calls, industry magazine
ads ..
o In e-world, online directories, matching services, affiliate services, contacts through
trade assns, infomediaries & data mining, etc
Mr2350
Instructor Notes
p22/31
Chapter 6 – Supply Chains etc.
SCM – the ‘back-end’; management of the flow of materials, information, services, and money into an
organization. VERY important – the ‘competitive differentiator’. Wal-Mart etc credit much of their
success to managing this well.
Chapter focuses on SCM in e-commerce (e-supply chain) plus related topics like collaboration &
integration along chain
? Examples of supply chain activities ?
-
Getting raw materials, getting paid,
Very long, complex, involve many partners (outside your control) – so, prone to problems!
What kinds of problems (or results) could happen?
-
Delays, products not in place @ right time, customer dissatisfaction, lost sales, higher expenses
Ex 6.1 – (doesn’t show reverse chain – what is that?)
Not just the movement of product/service – also the supporting procedures, plus the info & money, and
the organizations and people involved. Can even extend to product disposal (note ink cartridges)
Upstream – Internal – Downstream
Upstream (‘left’) – activities of company with its suppliers (manufacturers, assemblers, service
providers), and THEIR upstream people (‘2nd tier’). Goes back to farms, mines, etc. major activity is
Procurement.
Internal – ‘in-house’ processes used to transform stuff into your output (product). From entry to
organization, through to exit from organization to distribution. Major activity is Production
Management, Manufacturing, Inventory Control. Activities inside here are called the ‘value chain’;
primary activities (ops, outbound logistic, sales & support), and secondary activities (HR, finance, IT) …
that you do to get a product ‘out’. Objective – to add value along the internal supply chain.
Downstream – delivering product to final customers. Main concerns: distribution, warehousing,
transportation, after-sale service
MANAGEMENT of Supply Chains – a big deal
-
Minimize inventory levels (why?), optimize production, increase throughput, decrease
manufacturing time, optimize logistics & distribution, streamline order fulfillment, reduce costs
Mr2350
Instructor Notes
p23/31
of all these. VERY DIFFICULT … complex, out of your control, different time zones, customers,
internal depts, external companies. Esp bad for fast moving goods (? Example: supermarkets)
Information Technology
-
SCM (procurement)
ERP
Tough (but very important job) job to link the web side with all your other stuff!
Now, ENTERPRISE SYSTEMS … job is to link
MANAGING SUPPLY CHAINS





All partners should view collaboration as a strategic asset!
Information visibility along entire chain (accessible, well-defined,managed…)
Speed,cost,quality, tight integration
Activities
o SC replenishment – keep in sync
o E-procurement
o RFID!
o Bar codes, wireless … automatic re-ordering on inventory trigger
o Collaborative planning – share info
o Collaborative design/development
o E-logistics – acquisition, warehousing, transportation
Infrastructure – all the networks, portals, softwareetc
PROBLEMS & SOLUTIONS






Can lose business – and wars!
Pure play are moreprone – may rely on externals like Amazon
Bullwhip effect – results from supply/demand fluctuations, esp when uncertain – you get
stockpiling all along the chain – it gets magnified!
Must SHARE info well
Solutions include tech to manage visibility, order taking, order fulfillment, payments, risk, min
inventories, collaborative forecasting
Mobile tech- ensures synch of supply chains – how?
RFID


Very important technology! Track individual items (can even put them in people)
Can replace car keys,credit cards,etc – can relay info such as temp; batch checkout!
Mr2350
Instructor Notes

 cost, range, harsh environments (though better than barcodes), accuracy, privacy; who
manages tag on a product (mfctr,retailer,etc)
RuBee is new,complimentary tech

p24/31
COLLABORATIVE COMMERCE (c-commerce)




Collaboratively plan, design, develop, manage, research products & services; uses Web2 tools
Ex: Boeing working with parts mnfctr
Collaboration hub – many collaborative spaces
Collaborative networks – not as ‘linear’ left-to-right along the supply chain – each node
connects to others
(SOME EXAMPLES)
BARRIERS


Tech stuff – standards, security, privacy, distrust, skills, even language & culture
Will come as ppl see advantage of smoothing supply chain etc
COLLABORATIVE PLANNING
CPFR: collab planning, forecasting, replenishing
share planning & demand forecasting, so inventory levels along the chain are optimal
APS:
advanced planning & scheduling
mathematical models for optimal solutions to constraint bound problems
PLM:
product life cycle management
shares data over broader life cycle – design & development
SUPPLY CHAIN INTEGRATION
‘interorganizational business process re-design’
Integration of your OWN systems in your own company – databases with each other; front-end with
back-end (uses ERP)
PLUS
integration of your OWN systems with OTHER companies – my order system with my supplier’s
fulfillment system – this relies on a set of standards called ‘Web Services’
(INTEGRATION ALONG SUPPLY CHAIN)
CORPORATE (ENTERPRISE) PORTALS
Mr2350



Instructor Notes
p25/31
Overview: gateway to a corp web site & other info sources; may have separate portals for
insiders & outsiders
Types:
o Suppliers & other partners – suppliers can see what they sold you, plus your inventory
levels
o Customers – view products & services, place orders; make payment, arrange deliveries
o Employee – like at CNA – I can view my paycheque, submit IT requests
o Executive/supervisor – do managery stuff – scheculing etc
o Mobile – use your smart phones to access (mobile versions of web pages)
Issues – what to offer, how, etc.
COLLABORATIVE-ENABLING ENVIRONMENTS AND TOOLS

Goals: improve collaboration, efficiency, cx with customers, reduce travel costs, supplier
collaboration
Workflow: SKIP IT
COLLABORATION AND GROUPWARE
General • Built- in e- mail, messaging system, instant messaging • Browser interface • Joint Web- page
creation • Sharing of active hyperlinks • File sharing ( graphics, video, audio, or other) • Built- in search
functions ( by topic or keyword) • Workflow tools • Use of corporate portals for communication,
collaboration • Shared screens • Electronic decision rooms • Peer- to- peer networks
Note diff between synchronous and asynchronous
Synchronous ( same time) • Webinar • Webcast • Videoconferencing, multimedia conferencing •
Audioconferencing • Shared whiteboard, smart whiteboard • Text chart • Brainstorming, polling (
voting), and other decision support ( consensus builder, scheduler)
Asynchronous ( different times) • Threaded discussions • Voice mail • Users can receive/ send e- mail,
SMS • Users can receive activity notification via e- mail • Users can collapse/ expand threads • Users can
sort messages ( by date, author, or read/ unread) • Chat session logs • Bulletin boards, discussion
groups • Use of blogs, wikis • Web publishing • Collaborative planning and/ or design tools

Virtual Teams
o Drivers: work anywhere anytime, flexible, productive, 24/7
o Benefits: travel costs, parking, offices, can incl p/t & telecommuters, physical handicaps,
best talent
o Not clearly defined – Wikipedia might be a good example
VIRTUAL MEETINGS

Ex- GoTMeeting.com, conferencing, IM, blogs, wikis, forums, …
Mr2350
Instructor Notes
p26/31
Chapter 10 – Fraud & Security
SECURITY ISSUES



Drivers of EC security problems
o Internet is inherently vulnerable
o Shift from ‘recreational hacking’ to profit
o Internet underground economy – selling info you find (like credit card info)
o Innovation, insiders
Attacks
o Unintentional
 human error (programming, data entry, etc)
 environmental (flood, fire…)
 computer malfunctions (faulty hardware, poor testing)
o Intentional
 Theft of data and hardware; misuse of data; vandalism; sabotage; viruses; fraud
Can the web site visitor trust the site? Can the site trust the visitor?
ATTACK METHODS
Technical vs non-technical
Technical





Malware is the generic term for nasty software, which includes:
Viruses – a program that gets into your computer, ‘propagates’, and does stuff in varying
degrees of nasty
o Worms – spreads without human intervention
o Macro virus or worm
o Trojan horse – appears to have a useful function but hides something nasty
Denial of service – flood a site or network and overload it
Server/page hijacking – uses tricks to direct you to a crap site instead of the one you really want
Botnet – bunch of hijacked computers that all forward spam or viruses. Your computer could be
a bot
Non-technical (Phishing, Fraud, Spam, Social engineering)



Phishing – “Hey, this is Visa – we need to verify your account info – please log in with your Visa
#,password, etc” (skip ‘man-in-the-middle’ method)
Fraud – all kinds of stuff. Fake banks to get your deposits; taking down-payments on stuff you
don’t get; fake escrow; identity theft;
Spam – 100 billion per day! – ‘splogs’- sites created only to link to a crap site – raises it’s ranking
Mr2350


Instructor Notes
p27/31
Spyware – gets on your PC and watches you, collects personal info, changes computer settings
Social engineering – getting info by going on social networking and media sites (fb,
twitter,blogs,etc)
DEFENSE METHODS





Authentication – is that really you?
Authorization – are you allowed in here to do that?
Auditing – who did what, when? Can we roll back?
Availability – redundancy to make sure system can handle the transactions
Norepudiation – ways to ensure that you can’t ‘repudiate’ – say you didn’t agree to something
(purchase, transaction etc) when in fact you did.
Encryption
‘Plaintext’ is the actual data. You encrypt it using an algorithm and a key. (The algorithm might say,
‘add the first digit of the key to every number, add the second digit to every second number). So if
someone intercepts your encrypted data, they can’t easily read it. Can be cracked, especially since
many algorithms are widely known. Bad guys then only have to guess the key, which is easy using a
computer! But if the possible number of keys is large enough, it can take forever!
Certificates
(From Wikipedia: http://en.wikipedia.org/wiki/Certificate_authority)
Public-key cryptography can be used to encrypt data communicated between two parties. This can
typically happen when a user logs on to any site that implements the HTTP Secure protocol. In this
example let us suppose that the user logs on to his bank's homepage www.bank.example to do online
banking. When the user opens www.bank.example homepage, he receives a public key along with all the
data that his web-browser displays. When the user enters some information to the bank's page and
submits the page (sends the information back to the bank) then the data the user has entered to the
page will be encrypted by his web browser using the public key that was issued by www.bank.example.
The key that can be used to decrypt the information is called the private key and it is only known to the
bank, therefore even if someone can access the data that was communicated from the user to
www.bank.example, the data that the user has entered can only be decrypted by the bank as only the
bank knows the private key.
This mechanism is only safe if the user can be sure that it is the bank that he sees in his web browser. If
the user types in www.bank.example, but his communication is hi-jacked and a fake web-site (that
pretends to be the bank web-site) sends the page information back to the user's browser, the fake webpage can send a fake public key to the user. The user will fill the form with his personal data and will
submit the page which will be encrypted by the fake public key. The fake web-page will get access to the
user's data since the fake web-page owns the fake private key.
Mr2350
Instructor Notes
p28/31
A certificate authority is an organization that stores public keys and their owners and every party in a
communication trusts this organization. When the user's web browser receives the public key from
www.bank.example it can contact the certificate authority to ask whether the public key does really
belong to www.bank.example. Since www.bank.example uses a public key that the certification authority
certifies, a fake www.bank.example can only use the same public key. Since the fake www.bank.example
does not know the corresponding private key, it cannot decrypt the user's answer.
(There are two ways that you can determine whether a site is secure: 1) There is a small icon of a lock
located at the bottom right hand corner of the web browser indicating that the website is encrypted,
and 2) In the address section of your web browser, the URL will start with "https://" rather than
"http://." The "s" indicates that encryption is active.)
There are 3rd parties called Certificate Authorities that provide this service, for a fee, to the organization
hosting the web site. Well-known CAs are VeriSign, Thawte, Geotrust, Comodo, Entrust, DigiCert,
GoDaddy, and Network Solutions. There are many more, some cheaper or even free – and supposedly
just as good.
Firewall
Hardware and/or software that sits between your PC and the internet. Your computer receives data in
little chunks called packets, and each packet contains the unique IP address of the source computer.
The firewall ‘watches’ the addresses of incoming data and can filter out any data it doesn’t like before it
gets ‘into’ your computer. How does it know to admit packets from all the sites you visit? Because the
firewall knows if a packet comes in that is not in response to one you sent.
Mr2350
Instructor Notes
p29/31
Chapter 11 – Payment Systems
Payment Systems
PROBLEM – example of e-books



Buy a whole book – ok for fiction; what abt textbooks, travel guides, etc.
Pay-per-view pages (or chapters)
BUT … Transaction fee is to large compared to item cost
People use mostly Credit Cards to purchase online (abt 70% - includes debit cards). PayPal is fairly
common alternative.
What to use? VERY hard sell – people aren’t likely to use it until it catches on !?#! Chicken & Egg
Important factors in a payment system:









Independence – from special hardware etc.
Interoperability & portability – your system must work with CC, banks, PayPal etc.
Security
Anonymity – as with cash
Divisibility – huge and tiny purchases, and anything in between. ‘Micropayments’ would be
things like, buying a bar for $.50, or an iTunes song for $.70 … one way to accommodate this is
to let the purchases accumulate and bill @ end of month.
Ease of use – VERY important
Transaction fees – esp important for smaller pchses
International support
Regulations – complex, rigid
SMARTCARDS – your credit card, with the ‘chip’




The chip is memory whose contents can be read, PLUS - possibly - a microprocessor, which
allows modification of data
Contact and non-contact cards – non-contact cards can be read from some distance (good for
toll-booths, security doors, etc.)
Needs a reader – obviously – this jumps the cost
Uses:
o Banking/payment
o Loyalty and promotions
o Access control
o Stored value
o Identification
o Ticketing
o Parking and toll collection
Mr2350

Instructor Notes
p30/31
e-cash is cash is represented by two models
o One is the on-line form of e-cash (introduced by DigiCash) which allows for the
completion of all types of internet transactions.
 CyberCash – a system for servicing online credit card transactions over the
Internet since April 1995. Bought by VeriSign, which was then bought by PayPal
(which is owned by eBay). See diagram attached.
o The other form is off-line; essentially a digitially encoded card that could be used for
many of the same transactions as cash.
 Example: Mondex – money on a card (MasterCard)
(http://www.mondex.com/faq.html)
Chapter 16 – Regulatory, Ethical, Compliance
Issues
INTELLECTUAL PROPERTY LAW p671




Copyright – the right to print, copy, sell, etc – goes for (depending on country) 50, 70 years after
creator’s death – forever for corporations.
o ‘Infringement’ is when you break the copyright law
o DRM – digital rights management – technologies to prevent copying of digital stuff
o (Why is copying music a bigger deal now, versus in the days of cassettes & vinyl?)
Patent – rights to an invention
Trademark – a symbol
Trade secret – KFC recipe
FREE SPEECH, PRIVACY – all of p680


What is free speech?
Are there limits on free speech (examples?)
Privacy – how much privacy must people give up to allow for our own protection? Why is this more
important in the digital age? []
Buyer
Merchant
1
2
3
10
4
9
CyberCash
Server
5
8
6
Card-issuing
Bank
Merchant’s
Bank
7
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
The buyer clicks BUY on merchant's website.
The merchant's CyberCash program sends invoice to the buyer's CyberCash Wallet program.
Buyer selects a credit card from the ones bound to their wallet, clicks OK. Buyer's CyberCash Wallet digitally
signs and encrypts the invoice and credit card information with the key assigned to that Wallet-ID. The
encrypted packet is then sent to the Merchant's CyberCash program.
The merchant software adds info to the packet, requesting authorization. The merchant's CyberCash software
digitally signs and encrypts the packet with their CyberCash key. The packet is sent to the CyberCash server.
(The merchant never sees the customer’s credit card number. The packet is encrypted twice before arriving at
CyberCash's server, once by the buyer's software and once by the merchant's.)
The CyberCash server decrypts the message and checks for tampering. The credit card info and the merchant's
authorization request are encrypted. This information is sent over dedicated lines to the merchant's acquiring
bank.
The merchant's bank processes the merchant's request as it would any other credit card transaction. It forwards
the request to the card issuing bank.
The card-issuing bank sends an approval or denial code back to the acquiring bank.
The acquiring bank then sends this code to CyberCash.
CyberCash sends the merchant an encrypted message indicating success or failure of the credit card payment
transaction.
The merchant's SMPS software then sends a message back to the buyer's CyberCash Wallet indicating success or
failure of the payment transaction
Download