Figure 7.1 The value chain.
Download
Report
Transcript Figure 7.1 The value chain.
Chapter 6
E-Business: Intra-Business
E-Commerce
Internal Communication
Historically, paper
Updating a paper procedures manual
B2Employee E-commerce
Outdated material
Numerous misunderstandings
Some legal actions
Maintain online – Web site
E-business more general than B2E
Copyright © 2003, Addison-Wesley
Figure 6.1 Miami University’s online
publications and policies.
Copyright © 2003, Addison-Wesley
B2C vs. Intra-business E-commerce
Consumer oriented B2C
Revolutionary
Aggressive and risky
First movers
Intra-business and B2B
Evolutionary
Methodical
In business context
Copyright © 2003, Addison-Wesley
Figure 6.3 The value chain.
Inbound
logistics
Production
processes
Outbound
logistics
Sales and
marketing
Customer
service
Information technology infrastructure
Upstream
Downstream
The key to intra-business e-commerce is
improving value chain efficiency.
Copyright © 2003, Addison-Wesley
Inbound logistics
Purchase components
Purchase raw materials
Production
R&D
Engineering/product design
Order components
Order raw materials
Manufacture products
Figure 6.4 The
value chain for a
personal computer
manufacturer.
Outbound logistics
Inventory management
Order entry
Order fulfillment
Sales &
marketing
Information technology infrastructure
Copyright © 2003, Addison-Wesley
Customer
service
Inbound
logistics
Figure 6.5
Each value
chain process
consists of
sub-processes.
Production
R&D
Engineering/product design
Order components
Order raw materials
Manufacture products
Design/build/maintain production line
Manufacture components
Configure/setup production runs
Deliver materials to production line
Manufacture subassemblies
Configure/setup production runs
Deliver components to production line
Assemble final product
Configure/setup production runs
Deliver subassemblies to production line
Outbound
logistics
Sales &
marketing
Information technology infrastructure
Copyright © 2003, Addison-Wesley
Customer
service
Efficiency and Effectiveness
Objective: reduce operating costs
Efficiency gains
Within individual processes
Across the value chain
Efficiency-based competitive advantage
Hidden from public view
Relatively easy to sustain
Copyright © 2003, Addison-Wesley
Figure 6.6 The organizational pyramid.
CEO
Before computers,
companies organized
along functional lines.
Functional groups
exchanged paperwork.
Early computer
applications supported
a single function.
Operations
Marketing &
Sales
CFO
CIO
Production
Sales
Accounting
Operations
Purchasing
Advertising
Payroll
Database
administrator
Warehouse
Market
research
Auditing
Systems &
programming
Distribution
Finance
Product
development
Personnel
Copyright © 2003, Addison-Wesley
Figure 6.7 A manual payroll system.
Collect
timesheets
Record
timesheets
Payroll was done
manually until at least
the late 1950s.
Compile
payroll
Prepare
checks
Deliver
checks
Copyright © 2003, Addison-Wesley
Figure 6.8 Automating selected processes
made payroll more efficient.
Automate expensive processes
first
Automate remaining manual
processes next
Compile payroll
Prepare (print) paychecks
Record timesheets
Record
timesheets
Compile
payroll
Print
checks
Objective—process optimization.
Copyright © 2003, Addison-Wesley
Figure 6.9 Islands of automation.
Other functional groups
Sales
Accounting
Purchasing
Inventory
Production
Island A
Sales
Sales report
Sales report
Sales report
Island B
Payroll
Independent fiefdoms
Office political base
Sub-optimization
Island D
Accounts
recievable
Island C
Inventory
A/R report
Bills
Copyright © 2003, Addison-Wesley
Island E
Billing
Figure 6.10 The competitive advantage model.
Competition forced
Information sharing
Integration across
value chain
Including legacy
applications
Stimulus for action
First major move
Customer acceptance
Competitor catch up moves
First mover expansion moves
Commoditization
Copyright © 2003, Addison-Wesley
Incompatibilities
Hardware, software, and data
Data redundancy was a major problem
Same data value on multiple files
Independently maintained
Values differed
Data formats differed
Solution – central database
Copyright © 2003, Addison-Wesley
New Approaches to System Development
Information system planning
Information technology infrastructure
Basic blueprint for technology integration
Enterprise data model (EDM)
Business process reengineering
Elevated to strategic level
Process improvements in context
Problem – legacy applications
Copyright © 2003, Addison-Wesley
Partitioning Order Entry
Client
Display online order
form
Display order
acknowledgement
Error-check form
data
Server
Record order
Read quantity on
hand
Access A/R
Validate stock
Check credit
Either – Calculate taxes and total
Copyright © 2003, Addison-Wesley
Figure 6.17 A two-tier client/server
application.
Maintenance problem
Server
Data/information logic
Multiple copies of software on
multiple clients
Development problem
Multiple client platforms
Middleware
Fat clients
Presentation logic
Business logic
Copyright © 2003, Addison-Wesley
Figure 6.18 A three-tier client/server
application.
Web Server
Business logic
Transaction management
Middleware
Database Server
Data/information logic
Middleware
Thinner clients
Presentation logic
Some business logic
Copyright © 2003, Addison-Wesley
Figure 6.19 Enterprise application integration.
Objective: coordinate all
applications, databases,
and info technologies.
Legacy
applications
Enterprise resource
planning (ERP)
Means of implementing
the EAI principle
Purchased
applications
EAI
New and old
client/server
applications
Copyright © 2003, Addison-Wesley
Web based
applications
Virtual Value Chain
Digital picture of value chain
Coordinate and monitor processes
Organizational (not local) efficiency
Applications
Fuel business process reengineering
Mirror or replace physical processes
Data mining
Copyright © 2003, Addison-Wesley
Web Services
Application server software
Application service provider (ASP)
A server for middleware
Scalable platform
Intermediary that supplies applications
Including mission-critical applications
Management service provider (MSP)
Intermediary that manages IT services
Copyright © 2003, Addison-Wesley
Corporate Intranets
Private corporate network
Uses standard Internet protocols
TCP/IP
HTML and HTTP
Browser and Web server
Internet and intranet differences
Intranet is smaller in scope
Intranet limited to organization’s employees
Copyright © 2003, Addison-Wesley
Legacy application
Legacy message
Figure 6.22 Encasing
a legacy message in a
TCP/IP wrapper allows
a legacy application to
communicate with the
intranet.
Middleware
TCP/IP
wrapper
Legacy message
Company
intranet
Company
intranet
Copyright © 2003, Addison-Wesley
Figure 6.23 Some examples of
groupware.
E-mail
Scheduling and calendars
Whiteboarding
Chat rooms and bulletin boards
Video conferencing
Electronic meetings
Document management
Workflow management
Collaborative writing
Group decision support systems
Copyright © 2003, Addison-Wesley
Figure 6.24 Typical enterprise portal
services.
Structured data
management
Unstructured data
management
Content
management
Information filtering
Search capabilities
Collaboration
User administration
Expense account
management
Ordering supplies
Security
Personalization
Copyright © 2003, Addison-Wesley
Geographically Dispersed Value Chains
Value chain more complex
Options
Secure private network
Value added network
Public network (e.g., Internet)
Virtual private network
Security
Firewalls
User identification
Authentication
Copyright © 2003, Addison-Wesley