Figure 7.1 The value chain.

Download Report

Transcript Figure 7.1 The value chain.

Chapter 6
E-Business: Intra-Business
E-Commerce
Internal Communication

Historically, paper

Updating a paper procedures manual




B2Employee E-commerce


Outdated material
Numerous misunderstandings
Some legal actions
Maintain online – Web site
E-business more general than B2E
Copyright © 2003, Addison-Wesley
Figure 6.1 Miami University’s online
publications and policies.
Copyright © 2003, Addison-Wesley
B2C vs. Intra-business E-commerce

Consumer oriented B2C




Revolutionary
Aggressive and risky
First movers
Intra-business and B2B



Evolutionary
Methodical
In business context
Copyright © 2003, Addison-Wesley
Figure 6.3 The value chain.
Inbound
logistics
Production
processes
Outbound
logistics
Sales and
marketing
Customer
service
Information technology infrastructure
Upstream
Downstream
The key to intra-business e-commerce is
improving value chain efficiency.
Copyright © 2003, Addison-Wesley
Inbound logistics
Purchase components
Purchase raw materials
Production
R&D
Engineering/product design
Order components
Order raw materials
Manufacture products
Figure 6.4 The
value chain for a
personal computer
manufacturer.
Outbound logistics
Inventory management
Order entry
Order fulfillment
Sales &
marketing
Information technology infrastructure
Copyright © 2003, Addison-Wesley
Customer
service
Inbound
logistics
Figure 6.5
Each value
chain process
consists of
sub-processes.
Production
R&D
Engineering/product design
Order components
Order raw materials
Manufacture products
Design/build/maintain production line
Manufacture components
Configure/setup production runs
Deliver materials to production line
Manufacture subassemblies
Configure/setup production runs
Deliver components to production line
Assemble final product
Configure/setup production runs
Deliver subassemblies to production line
Outbound
logistics
Sales &
marketing
Information technology infrastructure
Copyright © 2003, Addison-Wesley
Customer
service
Efficiency and Effectiveness

Objective: reduce operating costs

Efficiency gains



Within individual processes
Across the value chain
Efficiency-based competitive advantage


Hidden from public view
Relatively easy to sustain
Copyright © 2003, Addison-Wesley
Figure 6.6 The organizational pyramid.
CEO



Before computers,
companies organized
along functional lines.
Functional groups
exchanged paperwork.
Early computer
applications supported
a single function.
Operations
Marketing &
Sales
CFO
CIO
Production
Sales
Accounting
Operations
Purchasing
Advertising
Payroll
Database
administrator
Warehouse
Market
research
Auditing
Systems &
programming
Distribution
Finance
Product
development
Personnel
Copyright © 2003, Addison-Wesley
Figure 6.7 A manual payroll system.
Collect
timesheets
Record
timesheets

Payroll was done
manually until at least
the late 1950s.
Compile
payroll
Prepare
checks
Deliver
checks
Copyright © 2003, Addison-Wesley
Figure 6.8 Automating selected processes
made payroll more efficient.

Automate expensive processes
first



Automate remaining manual
processes next


Compile payroll
Prepare (print) paychecks
Record timesheets
Record
timesheets
Compile
payroll
Print
checks
Objective—process optimization.
Copyright © 2003, Addison-Wesley
Figure 6.9 Islands of automation.

Other functional groups








Sales
Accounting
Purchasing
Inventory
Production
Island A
Sales
Sales report
Sales report
Sales report
Island B
Payroll
Independent fiefdoms
Office political base
Sub-optimization
Island D
Accounts
recievable
Island C
Inventory
A/R report
Bills
Copyright © 2003, Addison-Wesley
Island E
Billing
Figure 6.10 The competitive advantage model.

Competition forced



Information sharing
Integration across
value chain
Including legacy
applications
Stimulus for action
First major move
Customer acceptance
Competitor catch up moves
First mover expansion moves
Commoditization
Copyright © 2003, Addison-Wesley
Incompatibilities


Hardware, software, and data
Data redundancy was a major problem





Same data value on multiple files
Independently maintained
Values differed
Data formats differed
Solution – central database
Copyright © 2003, Addison-Wesley
New Approaches to System Development

Information system planning


Information technology infrastructure



Basic blueprint for technology integration
Enterprise data model (EDM)
Business process reengineering


Elevated to strategic level
Process improvements in context
Problem – legacy applications
Copyright © 2003, Addison-Wesley
Partitioning Order Entry

Client




Display online order
form
Display order
acknowledgement
Error-check form
data
Server





Record order
Read quantity on
hand
Access A/R
Validate stock
Check credit
Either – Calculate taxes and total
Copyright © 2003, Addison-Wesley
Figure 6.17 A two-tier client/server
application.

Maintenance problem


Server
Data/information logic
Multiple copies of software on
multiple clients
Development problem

Multiple client platforms
Middleware
Fat clients
Presentation logic
Business logic
Copyright © 2003, Addison-Wesley
Figure 6.18 A three-tier client/server
application.
Web Server
Business logic
Transaction management
Middleware
Database Server
Data/information logic
Middleware
Thinner clients
Presentation logic
Some business logic
Copyright © 2003, Addison-Wesley
Figure 6.19 Enterprise application integration.

Objective: coordinate all
applications, databases,
and info technologies.
Legacy
applications

Enterprise resource
planning (ERP)

Means of implementing
the EAI principle
Purchased
applications
EAI
New and old
client/server
applications
Copyright © 2003, Addison-Wesley
Web based
applications
Virtual Value Chain

Digital picture of value chain



Coordinate and monitor processes
Organizational (not local) efficiency
Applications



Fuel business process reengineering
Mirror or replace physical processes
Data mining
Copyright © 2003, Addison-Wesley
Web Services

Application server software



Application service provider (ASP)



A server for middleware
Scalable platform
Intermediary that supplies applications
Including mission-critical applications
Management service provider (MSP)

Intermediary that manages IT services
Copyright © 2003, Addison-Wesley
Corporate Intranets


Private corporate network
Uses standard Internet protocols




TCP/IP
HTML and HTTP
Browser and Web server
Internet and intranet differences


Intranet is smaller in scope
Intranet limited to organization’s employees
Copyright © 2003, Addison-Wesley
Legacy application
Legacy message
Figure 6.22 Encasing
a legacy message in a
TCP/IP wrapper allows
a legacy application to
communicate with the
intranet.
Middleware
TCP/IP
wrapper
Legacy message
Company
intranet
Company
intranet
Copyright © 2003, Addison-Wesley
Figure 6.23 Some examples of
groupware.










E-mail
Scheduling and calendars
Whiteboarding
Chat rooms and bulletin boards
Video conferencing
Electronic meetings
Document management
Workflow management
Collaborative writing
Group decision support systems
Copyright © 2003, Addison-Wesley
Figure 6.24 Typical enterprise portal
services.





Structured data
management
Unstructured data
management
Content
management
Information filtering
Search capabilities






Collaboration
User administration
Expense account
management
Ordering supplies
Security
Personalization
Copyright © 2003, Addison-Wesley
Geographically Dispersed Value Chains


Value chain more complex
Options





Secure private network
Value added network
Public network (e.g., Internet)
Virtual private network
Security



Firewalls
User identification
Authentication
Copyright © 2003, Addison-Wesley