Digital Economy In 10 years from now the term will be completely obsolete. They backbite about you on the internet Definition What do we understand by “business” ? All activities that have to do with buying, selling , providing, paying, handling, administrating etc. of goods, services or information. What do we understand by E-business ? IBM E-business is what happens when you combine the broad reach of internet with the vast resources of traditional information technology systems. It is dynamic and interactive. Automotive Industry Action Group The application of advanced information technology to increase the effectiveness of the business relationships between partners. Other Definitions Electronic Commerce ( EC ) Narrower than electronic business Limited to the pure trading activities Electronic Commerce A new concept covering buying and selling of products, services and information via computer networks, including the internet. EC applies different technologies, varying from EDI till e-mail. In fact we can also consider buying food at a POS automate using a smart card as a form of electronic commerce. B2B and B2C Business to Business Business to Customer E-Commerce : B2B « B2b or not 2b » Internet changes the way of doing business. 4/2/2000 ‘B-2-B’ Growth of commerce via Internet Business to Business Retail trade Closed The real impact of the Internet at the long term? The internet improves the transparency of the economy • easier prise comparisons (buyers - sellers) • eliminates intermediaries • reduces the cost of a transaction • lowers the entry barriers The internet brings economy closer to the classical model of the free competition: • abundance of information • cost of transaction almost zero What will be the real long-term impact of IT and the Net? “The biggest winner will probably be the consumers and the entreprises of the old economy (the automobile sector, chemical sector, ...) that use e-commerce B2B within the framework of a business process reengineering effort” April 1, 2000 Strategic Networks ! • Internet - The textbook model of perfect competition: abundant information, zero transaction costs and no barriers to entry. The most important effect of the “new” economy may be to make the “old” economy more efficient The Economist April 1, 2000 • L’ Ubiquité. L’internet transforme le mode de fonctionnement des entreprises : tous les acteurs du marché seront dotés d’une plus grande connectivité • Les réseaux stratégiques de partenariat deviennent la meilleure façon d’être compétitif. Le Monde 27/4/1999 Survival Guide • REORGANIZE YOUR COMPANY – CHANGE THE OLD ENTERPRISE MODEL March 22 1999 Example: US Feb 1998 31/1/2000 The Economist Jan 14 2000 The US Job Machine “We woz wrong” Eito-RIPE July 1999 Au s Ge tria rm an y Ire lan d Fr an ce Sp ain Ita Po ly rtu ga l Gr ee ce UK Fin lan No d rw De ay nm a Sw rk Ne ed e th er n Sw lan itz ds er lan Be d lgi um July 1999 Internet hosts per 100 population e-penetration innovation 10 9 70 8 7 60 6 50 5 40 4 30 3 2 20 1 10 0 0 Internet hosts '99-'98 internet growth Internet hosts per 100 population in Western Europe 80 Internet growth Obstacles privacy cost security wait & see 0 5 10 15 20 25 EITO 99 30 Obstacles Essentially Cultural • A generation of managers has to redo their exams” ”Connect yourself, boss” (BusinessWeek) • The public The value of the network grows by the square of the number of users The Internet soap-bubble? • The railway companies in the 19th century: most lines bankrupted over investments created excess capacity and deadly competition • the good news: after the collapse of the shares, the railways remained operational good for the whole economy Ethical e-business mainly for self-defense ‘High standards of ethical conduct by businesses should be the main method of fostering consumer confidence in the Internet’ US Secretary of Commerce Daley Global Business Dialogue On E-Commerce, Sept 13, 1999 Paris • non-transparancy : not accepted by the consumer • 100% data protection : extremely high cost • changing mentality: examples Dell-IBM • citizen follows more ‘open’ society ? Dot-Coms Needed a Double Dose of Reality... Traditional commercial and legal precepts that govern capitalism must also apply to the Net. High-tech entrepreneurs must address these problems as the price for continued access to capital: • Privacy. • Should be respected • Transparency. • About real cost • Patents. • Patenting widespread business methods to create a monopoly and inhibit rivals. The US Patent Office changed its mind. • Monopoly. • The courts have ruled that Microsoft violated the 100-year-old Sherman Anti-Trust Act. Investors sent Microsoft's stock down. BUSINESSWEEK : APRIL 17, 2000 Dot.business ? Most companies must become Internet firms if they are to survive The Economist 26/2/2000 Merely adding a website on to an existing business is not enough : the whole business needs to be redesigned around the cost-saving, communication-easing properties of the net e-Economy Threshold Timing Germany Italy UK France Denmark Austria Portugal Norway Belgium Finland Greece Switzerland Spain Sweden Netherlands Ireland U.S. 1998 1999 2000 2001 2002 2003 2004 Forrester Research - TM@B 18/5/1999 2005 Online markets ‘Seller beware’ • e-procurement to cut costs and speed supplies (General Electric and Wall-Mart) • third-party exchanges: independent firms that bring together many buyers and sellers to create a genuine market (auction market) • giants of an industry create large virtual markets: General Motors, Ford, DaimlerChrysler, Toyota, Renault, Nissan abandon stand-alone efforts and join forces • markets intellectual property: TechEx (Yale) 400 inventions looking for a licence e-Logistics E-technology transition ... EDI era – Large companies – Proprietary – Batch – Bilateral – High cost Internet era – All companies – Public – Online – Networks – Low cost … Results in cost (and quality) discontinuity: Cost to process an order: >10x improvement, plus better quality!! The Zero-Latency Organization Zero-Latency Enterprises or organizations that can act quickly on new information have a competitive advantage and deliver better services. Latency is the time it takes for a system to respond to an input all parts of the organization can respond to events as soon as they become known to any one part of the organization. Requires reengineering the business processes. Zero-latency strategy is needed. Zero-latency Strategy A zero-latency strategy requires: A network and software infrastructure that is capable of quickly exchanging information across technical and organizational boundaries End-user interface tools and other application programs that are capable of sending and receiving information in a timely fashion A business strategy that leverages fast action to achieve a real business benefit (by managers) A set of business policies, processes and product offerings that have been engineered to implement that business strategy it can affect the way tasks are done or goods are delivered An organization that can implement the new processes function of workgroups and departments may change Zero-latency Strategy A zero-latency strategy is any strategy that exploits the immediate exchange of information across technical and organizational boundaries to achieve business or organizational benefits. Technical boundaries different operating systems different DBMS’s different programming languages Organizational boundaries inter-department inter-organizational The Virtual Enterprise Source: Gartner group Inside report June 1998 Virtual Organization Cooperation between independent organizations that operate to the outside world as a unit. Temporary cooperation to gain competitive advantage or to make up from arrears (Airbus) Works well if the objective is clear Legal problems can occur in case of conflicts Intensive but non-definitive relationship Essential is that partners can survive after a divorce e.g. Toyota with partners is not a virtual organization Seen from user point-of-view Clients and suppliers are seen as part of the network organization is not seen as a unit of buildings and resources, but is always and everywhere accessible via IT networking organization Focussing on Core Competencies Increased customer access to information allows them to search among product and services to select the best-of-breed enterprises narrow their focus on core competencies add customer value differentiate products and services in the marketplace add value across multiple products and services over time enterprises narrowing the focus + need to offer broader product range Virtual companies Virtual Company Basic set of ideas outsourced non-core competencies focus on core strength or business little or no physical presence or infrastructure network of business alliances heavy reliance on telecommunications. The combination of independent enterprises required to fulfill a defined customer need. The IT-enabled Virtual Enterprise Virtual Enterprise Business 1 Partners Product and Service Creation Suppliers Internal Operations Physical Enterprise Sales and Marketing Customers Fulfillment and Delivery Virtual Enterprise 2 Industry network Virtual Enterprise 3 Source: GartnerGroup Types of Virtual Companies Project oriented (airbus) Competence based Kernel partner (Mc Donnalds) With or without mission overlap IT-enabled Existed for a long time as a business concept Made feasible by IT A chain of enterprises is required to deliver a single product Some enterprises offer multiple bundles of products and services Enterprises rely on a virtual enterprise of coordinated service providers (value web) IS departments must be ready to provide necessary IT-services to rapidly changing partners Need for rapid IT infrastructure, application development capabilities and security strategies Could you check my agenda and tell me who are the people with whom I'am having this lovely lunch ? Characteristics and examples Elements usually present alliances brand identity knowledge base marketing strategy problem solving research and development Elements usually absent Human resources Inventory Manufacturing Materials Offices Storefronts Examples: • Airbus: Aerospatial, DASA, Aerospace, CASA, SABCA • Virgin • Construction companies Knowledge: Key Differentiator The virtual company will: constantly scan the environment constantly scan own internal processes identify opportunities and challenges sense changes among its suppliers, competitors, customers, … innovate products, services, communications, … Constant mutation and change will be the norm Knowledge Based Critical Success Factors Extensive interoperability between constituent parts Subsume non-differentiating business processes for key functions that facilitate application interoperability packaged solutions: Baan, Oracle, Peoplesoft, SAP, … Standards for the meaning and presentation of information Key technology enablers application interoperability (interenterprise, intraenterprise ) high speed networks rapid application development terabyte database management systems interenterprise collaborative computing security Electronic Commerce Interorganisational Systems Information flow between two or more organisations efficient transaction processing no bargaining, only execution pre-defined formats, no telephone calls nor paper Drivers reduced cost for routine business transactions (SWIFT) improved quality of the procedures because of less errors reduced processing time (Singapore) lower cost for paper handling business process easier for the users Types EDI, EFT, e-mail shared databases Establishing Trust Without trust between parties online, the value of electronic transactions remains limited. The concept of a certificate authority, trusted by all parties involved in electronic transactions, is at the heart of new security practices for E-business. Outsourcing trust is not always the best solution; it has consequences for vulnerability and the degree of comfort. E-commerce Buying, selling products, services or information via a computer network • • • • Purchaser EDI SWIFT Tradenet ... Order Purchase order •Reply on information request •purchase confirmation •shipping note •payment acknowledgment Payment authorization request Payment approval Bank of the purchaser Seller Electronic Market Order reply Approvals by Trusted party EFT Transaction Handlers bank bank Supplier Role of the certificate Authority Facilitate E-commerce among parties. Identify and authenticate certificate requesters and users. Maintain records on certificates issued. Audit itself and (as appropriate) its subscribers. Where possible, avoid or resolve disputes due to the use of certificates. Absorb risk and take fiduciary responsibility for certificate issuance. Electronic Market Clients and providers negotiate on an on-line or off-line sales transaction. Network of interactions and relations where information, products, services and payments are exchanged. The business center is not a physical building but a network-based location. Participants: sellers, buyers, brokers, providers, clients they are on different locations sometimes they don’t know each other Push and Pull possibilities Advantages for the Organisation Lower cost for handling, creation and storage of paper information electronic purchasing system electronic payment 95% cheaper than check Reduced stock and overhead with “pull-type” delivery Reduced time between sales and payment Supports BPR efforts , leading to higher efficiency Advantages for the Client More alternatives from various vendors Cheaper products and services Often immediate delivery 24 hours service Relevant information can be obtained after seconds instead of after days Constraints Lack of security standards Insufficient bandwidth Problems with Interoperability Accessibility of the internet Remaining legal aspects (digital signature) Still in full evolution: code of conduct Clients do not like changes Still limited number of buyers and sellers Problems with human relationships. SET Secure Electronic Transaction 1. Client initiates a transaction by sending a request and a signed, encrypted authorization. The supplier can not access the credit card number because it is encrypted. 2. The supplier passes on authorization. The bank can decrypt this and see the credit card number. It can also check the signature. 3. Acquiring bank checks credit card with card issuer. 4. Card issuer authorizes and signs transaction. 5. Bank authorizes merchant and signs transaction. 6. Customer gets goods or service and a receipt. 7. Supplier asks to capture the transaction and get the money. 8. Supplier gets paid according to its contract. 9. Customer gets monthly bill from card issuer. E-cash Electronic Cash 1. Customers open an account with a bank and either buy or receive free special software for their PC,s. 2. The customers buy electronic money by using the software. Their accounts are debited accordingly. 3. The bank sends an electronic money note to this customer, endorsing it with a digital signature (made with its private key). Customers then inquire whether the money is available by using the bank’s public key. 4. The money is stored on the buyer’s PC and can be spent in any store that accepts E-cash. 5. The software is used to transfer the E-cash to the seller’s computer. The seller uses the bank’s and customer’s public keys to verify that the money belongs to the specific buyer and is indeed at hand. 6. The seller then deposits the E-cash in the bank, crediting his regular or electronic account. Electronic Credit Cards Encrypted payments 1. Customer sends the encrypted credit card information and digital signature to the supplier. 2. The merchant validates the customer’s identity as the owner of the credit card account. 3. The supplier checks the information with his own bank or credit card processor. Authorization is obtained by contacting the customer’s bank. 4. When the authorization is sent to the supplier’s bank, the deal can be concluded. 5. The customer’s account is debited and the supplier’s account is credited. Electronic checks similar to regular checks, secured by public key cryptography. 1. The customer establishes a checking account with a bank. 2. The customer contacts a supplier, buys a product or service and emails an encrypted electronic check. 3. The supplier deposits the check in his account; money is debited in the buyer’s account and credited to the seller,s account. E-checks carry an encrypted digital signature and additional information. Can be exchanged between financial institutions via electronic clearinghouses. Can be used as payment instruments in EDI-applications. The NetCheck system. Accept paper checks in exchange for crediting customer’s NetCheck account. Integrated with financial institutions. Electronic Payment Cards Traditional bank cards Payment cards for specific companies (transportation) Smart cards: electronic purse Information Services Evolution in information services Information Broker Content Specialist Electronic Market Facilitator Information Broker Identify an unfilled need for high-value information contentthat is difficult to access through available channels Build a community of interest between suppliers and customers Penetrate quickly through”giveaway” strategies, contracts and partnership arrangements Deliver value toall parties initially through linkages, information collection and categorization, and transaction coordination. Content Specialist While paying careful attention to private rights, collect information on market transactions Create organizational capabilitiesto make sense of information and use it to add value to products and services Distribute value to to all members of the community Electronic Market Facilitator Build a web of alliances to extend scale and scope of community Develop interactive tools to establish closer links with community members and to facilitate linkages among community members Develop intelligent agents and filters to customize the experience of all members of the community Build organizational capabilities to deepen commitment and loyalty of all community members.