Professional Documents
Culture Documents
ON
SUPPLY CHAIN MANAGEMENT SYSTEM
By:
Rohan Byanjankar
Submitted to:
Baikuntha Sigdel
Department of IT
Sainik Awasiya Mahavidyalaya
1
ACKNOWLEDGEMENT
We would like to express our gratitude to Sainik Awashiya Mahavidyalaya,
Sallaghari, Bhaktapur, for providing the golden opportunity to prepare a project work
on A Report on Supply Chain Management System. Our horizon of knowledge has
expanded and has made us aware about the requirement of Supply Chain Management
System and its importance in contemporary business world. Moreover, we experience
and enjoyed the difficulty in conducting research, however, we got opportunity to
hone our language, knowledge, and talent.
Last but not the least; we would like to express our sincere thanks to employees at
Sainik Awashiya Mahavidyalaya for their direct or indirect contribution in shaping up
this study.
We would be obliged to any suggestions and comments from the readers that will
assist in further improvement of this project work.
Project team
Third semester
2
DECLARATION
We, the project team (Rohan Byanjankar, Aabita Basnet, Nirvik Naresh Neupane,
Niranjan Silwal, and Nirajan Thapa) declare that the work presented in the form of
report entitled SUPPLY CHAIN MANAGEMENT SYSTEM submitted to
department of IT, Sainik Awashiya Mahavidyalaya, is our original work done in the
form of partial fulfillment of the requirement of BBA program MIS course of Third
semester under the supervision of Baikuntha Sigdel, Sainik Awashiya Mahavidyalaya.
Date:
Project team
3
RECOMMENDATION
This is to certify that the report submitted by Rohan Byanjankar, Aabita Basnet,
Nirvik Naresh Neupane, Niranjan Silwal, and Nirajan Thapa entitled SUPPLY
CHAIN MANAGEMENT SYSTEM has been prepared and submitted in the
prescribed format of department of IT, Sainik Awashiya . This report is forwarded for
evaluation.
(Baikuntha Sigdel)
Department of IT
4
EVALUATION SHEET
We have concluded the viva-voce examination of the report prepared and presented
by Rohan Byanjankar, Aabita Basnet, Nirvik Naresh Neupane, Niranjan Silwal, and
Nirajan Thapa entitled SUPPLY CHAIN MANAGEMENT SYSTEM and found the
report to be the original work and according to the prescribed format. We recommend
the report to be accepted as partial fulfilment of the requirements for Management
Information System subject of BBA program.
( Baikuntha Sigdel) ( )
Internal Evaluator External Expert
5
ABSTRACT
The project work is a short account on Supply Chain Management System. The
project, in an introductory phase, encompasses a short description of Supply Chain
Management System along with its objectives. The project work set light on system
prospective of SCMS, which contains background of SCMS that includes basic
criteria for implementation of SCMS and requirements for SCMS to be introduced in
an organization, a short history of supply chain management, Business Intelligence
and SCMS along with uses area of SCMS. Organizational prospective of the system,
which includes helpfulness of system to organization, benefit of SCMS, MIS
dimension of system, and role of system for business operation, has been briefly
described. All systems are vulnerable; Security issue of system includes Security and
control of SCMS, potential security concerns, what security policy organization can
adopt to reduce notorious activities of intruders. The ethical, social, and political
issues addressed by the system, moral dimensions of the system and reasons why
ethical issues are raised in the system are explained. We have included some figures,
and tables to visualize the content vividly.
6
LIST OF FIGURES
Figures Pages
Figure 14: The relationship between Ethical, Social, and Political Issues in an
Information society 32
LIST OF TABLE
Table Pages
7
Table 1:- Mediating Factors 7
8
TABLE OF CONTENT
Chapter Pages
ACKNOWLEDGEMENT II
DECLARATION III
RECOMMENDATION IV
EVALUATION SHEET V
ABSTRACT VI
LIST OF FIGURES VII
LIST OF TABLE VIII
TABLE OF CONTENT XI
ACRONYMS X
CHAPTER 1: INTRODUCTION 1-4
9
3.1 How system is helpful to organization 19
6.1 Conclusion 39
6.2 Learning 39
BIBLIOGRAPHY A
GLOSSARY B
10
ACRONYMS
1. BI = Business Intelligence
2. COGS = Cost Of Goods Sold
3. DDoS = Distributed Denial-of-Service
4. DoS = Denial-of-Service
5. DSS = Decision Support System
6. HP = Hewlett-Packard
7. IBM = International Business Machine
8. IS = Information System
9. IT = Information Technology
10. ITOR = Inventory Turnover Ratio
11. JIT = Just-In-Time
12. LIS = Local Information System
13. MIS = Management Information System
14. NORA = Non-obvious Relationship Awareness
15. OLAP = Online Analytical Processing
16. P&G = Procter & Gamble
17. SCM = Supply Chain Management
18. SCMS = Supply Chain Management System
19. TD = Toronto-Dominion Bank
20. TQM = Total Quality Management
11
This Page has been left intentionally.
1
CHAPTER 1: INTRODUCTION
Background of study
This report was prepared to review the following aspects of SCMS:
1. The history of SCMS along with its application, benefits and business value,
possible threats and security concern, and ethical issues raised by it.
2. The existing IT infrastructure ecosystem which encompasses computer
hardware platform, operating system platform, enterprise software
applications, networking/telecommunications, internet platform, consultants
and system integrators and data management and storage.
3. Use of information technology by organizations and their impact on the
business process.
4. The value add component of the information system to organization.
5. Types of business processes and activities to promote strategic interests of
organization.
i) Aabita Basnet
ii) Rohan Byanjankar
iii) Nirvik Naresh Neupane
iv) Nirajan Thapa
v) Niranjan Silwal
2
and downstream linkages, in the different processes and activities that produce value
in the form of products and services in the hands of the ultimate customer. The
growing competition among firms have made SCMS, the system that serves an
organization for operational excellence, competitive advantage, customer-supplier
intimacy and survival.
3
The primary task of SCMS is to virtually link customer and supplier. The
growing networking advances and development of intranet and extranet have
narrowed down gap between supplier and firm, and firm and its customer.
4. To add value to customer
The core objective of SCMS is to add value to customer. The continence to
customer is the utmost requirement as customers are the king. For example:
Toyota is known for its service after sale. The superior link of Toyota with its
customer have made it possible for Toyota to provide service to customer after
the sale of product too.
5. To promote Total Quality Management (TQM)
TQM is a holistic approach to long term success that views continuous
improvement in all aspects of an organization as a process and not as a short
term goal. Just-In-Time (JIT) method, one of the approaches to supply
chaining, has close association with TQM. JIT promotes TQM, which has
been visualized through continuous improvement in Toyota and Dell.
6. To promote competitive advantage
If a firm can offer similar quality product at lower price or can offer higher
quality product at same price through differentiation than of competitors, then
it is said to be competitive advantage. The lower marginal cost of a firm, the
higher profitability of a firm. SCMS helps to reduce marginal cost through
elimination of wastage, reduction in inventory and superior distribution of
product that adds value to customer.
4
reliable and precise data. We consulted some business websites such as forbes.com,
bloomberg.com, and economictimes.indiatimes.com to get hold of information
regarding contemporary business practices, leading companies, and their inclination
towards information technology.
1. Since the report is based on secondary data, the findings are based on
information collected.
2. This report is conducted under the prescribed format by T.U. for the purpose
of practical exam report of Bachelor degree.
3. The study has been prepared under the constraint of the limited time. Thus,
detail analytical study could not be conducted.
4. It contains the general idea of supply chain management system only, so may
not be felicitous report to those who seek for in-depth analysis of SCMS.
5
firm to acquire right amount of product from their sources to the final destination with
the least possible cost, and least time. SCMS has been one of the integral parts of
every company. The best companies around the world are discovering new techniques
to gain competitive advantage, and has stumbled to Supply Chain Management
System. One of the most significant changes in paradigm of modern business
management is that individual businesses no longer compete as solely autonomous
entities but rather as supply chains. Supply Chain Management System does not call
for superior, complex, and weird resources, and prerequisites. SCMS can be applied
to all firms: manufacturing, retailer, service and public organization.
6
too. The mediating factors, which includes organizations culture, structure,
environment, business process, polities and management decision, acts as a bridge
between them. These factors are the primary intruders and are influencing factors.
These influencing factors determine whether the application of SCMS will be proven
fruitful or not. Organization extract out information regarding the impact of
introduction to SCMS in existing business process, surrounding environment, culture
and management decisions. Organization should have strict vigilance over these
mediating factors in order to successfully integrate information system to its existing
business process.
7
SCMS (Information system)
Mediating Factor
Environment
Culture
Organization Structure
Business Processes
Politics
Management decis
8
Table 1:- Mediating Factors
9
The mediating factors are the determinant of firms techniques, and tactics to conduct
general business operations. The environment of firm drives and diverts the firm.
Firms extract out their strength, opportunities, threat, and weakness through
environmental scanning, and accordingly integrates information system to increase
efficiency of existing business process or to enable entirely new processes that are
capable of transforming the business. Nevertheless, culture, structure, business
processes and politics are highly capable of transforming the business. So, the
application of SCMS highly depends upon these factors. SCMS has high inclination
towards those firms, which have open culture, decentralized structure, innovative
ideology, organizational politics, flexible management, and wide-spread distribution
The requirements of SCMS can be categorized into organizational requirement consisting of open culture, d
network.
Organizational Requirements
1. Open culture
SCMS or any other information system cannot be integrated to business
process if the organization is not in favour of open culture. The organization
advocating in favour of close culture, discards frequent interactions with
external environment, and believes in self-sufficiency and independence
cannot generate value from SCMS. For instance: Dell, the third largest vendor
of PC, uses JIT strategy. The JIT, also Build-to-order, calls for close intimacy
with suppliers and customers. Thus, its unattainable for those organization
adhering to close culture to adopt JIT strategy or any other supply chaining
methods.
2. Decentralized Structure
10
Organization that follows strict chain of command and limits the decision
making authority to mere top level management is very slow to acknowledge
change in environment. The lengthy processes and complex business model
makes the entire operation tiresome, reducing the efficiency. Decentralized
structure is the rudimentary requirement for SCMS. Quick response to
suppliers and customers, defining accurate quantity of product to be acquired
and calculation of lead time with precision are the basis of supply chain
management, which cannot be easily maintained by organizations cohering to
centralized structure.
3. Innovative Ideology
Innovation of new product and introducing them to market has been a general
trend in todays competitive business environment. The application of
Information System fosters if and only if the organization has extensive focus
towards innovation. SCMS is also the consequence of continuous effort of
innumerous business firms to discover new method of achieving competitive
advantage. For instance: Walmart, the largest store in the Earth, has
persistently focused on innovation. The superior replenishment system has
made Walmart, The Largest Company in the World by Revenue, which is
the consequence of innovative ideology adopted by it.
4. Flexible Management
Management decision plays a vital role in introducing new system to an
organization. Management committee that focuses toward transformation and
feels the weeny change in mediating factors readily accepts new technology.
The diversified viewpoint of people of different position in an organization
ensues political struggle for resources, competition and conflict, and creates
hindrance in introducing new system.
Technological Requirement
11
Similarly, best software should be used so that hackers and crackers cannot
easily intrude on the system.
2. Networking Advances
Networking and telecommunication advances is the utmost requirement for
SCMS. Networking and telecommunication virtually connects an organization
with suppliers, customers, and other stakeholders, which makes supply
chaining smooth, flexible, and quick.
3. Advance data analysis
Opulent supply chain management takes place if an organization has adopted
better technologies for advance data analysis. The supply chain leaders such as
Dell, Walmart, Procter & Gamble (P&G), and IBM have adopted superior
technologies for advance data analysis. Without rigorous data analysis, no any
firm can successfully generate value from SCMS.
The evolution of SCM continued into the 1990s due to the intense global competition.
The worlds prominent firms acknowledged the utmost requirement of supply chain
and streamlining of business model due to amplifying global competition. The
multitudinous companies, who were performing their business activities being in
bound of political boundary, were free to set up their business anywhere in the globe.
The firms, who were dominating the domestic market, and were making effort to
fulfil the requirements of domestic consumers, made an envision to get over entire
business world, which was a harrowing ordeal indeed. Myriad firms, such as Dell, HP,
Sony, Apple, and so on, made their core focus towards adding value to customers. The
rush of preeminent business firms to get over one another and to capture larger market
12
share, which called for acquisition of superfluous amount of raw materials, splendid
inventory management, and superior distribution policy, ensuing the concept of
supply chain and logistics management.
Enterprise Era
The commencement of enterprise era is dated from 1992. The growing power of
computer, networking advances, and evolution of global network, the Internet, made
an instigation of enterprise era, where firms use networking to make their business
model to expedite and business process to streamline. The enterprise era is deemed to
the golden era of Information Technology. The integration of suppliers, customers,
and other stakeholders to the mainstream of firms activities was the uttermost need,
which could be achieved through supply chain management. Not to mention, the use
of intranet, and extranet further flourish the concept of supply chain management. For
instance: Intel corporation, the largest manufacturer of microprocessor, and the
dominant figure in Information Technology, uses intranet to create link between its
employees. The intranet of Intel has been viewed for more than 50 million times.
13
F
14
Table 2: Evolution of Supply Chain Management and its application areas.
15
firm. These system helps profitability by lowering costs of moving and making
products and by enabling managers to make better decision about sourcing,
production and distribution of a product. Supply Chain Management (SCM) is
composed of three main components. Procurement, Processing, and Distribution are
the three main pillars of SCM.
Procurement
16
of suppliers is a daunting task. Manually, its quite unattainable, but with the
application of tools of BI, this tedious task can be made easier. The tools of BI
helps to organize and analyse complex data, and help in decision making.
2. Impact on Processing
Processing is the core of any information system. The conversion of raw
material procured from the supplier to finished product is called processing of
material. Firms need to identify production capacity, determine production
schedule, and method of production. BI plays vital role in evaluating
production capacity, preparing the most appropriate schedule for production,
and the least cost production method.
3. Impact on distribution
Distribution is the final activity of supply chain. Distribution is the process of
selling of finished goods and services through the appropriate distribution
channel. Firms need to identify demand, performance of product in market,
and reliable distribution network. BI helps firms to make demand prediction
through trend analysis, and helps to identify conducive distribution channel
through analysis of shipment data, fringe cost data, fuel consumption cost
data, and so on.
1. Manufacturing Firms
SCM was first practiced by manufacturing firms during 1980s. Manufacturing
firms used SCMS to procure raw materials from suppliers in least possible
time with least cost. Moreover, these firms used SCMS to process the raw
materials, and also in distribution of finished products. One of the best
examples of SCM is JIT strategy adopted by Dell. Dell uses SCMS to make
17
virtual link with its suppliers and customers through networking. However,
JIT has been pioneered by Toyota, the largest automotive company.
18
Figure 6: Working Mechanism of JIT Productio
JIT Strategy
Production in JIT system starts with order by customer followed by lead time calculation, contact supplier fo
19
2. Service oriented firms
20
Figure 7: Supply Chain Management at Am
Amazon.com takes order from customer through internet, contacts its supplier online, and deliver the prod
Buy Sid
Inside
21
Service oriented firms proliferated during 1990s. SCMS was first practiced by
service oriented firms in 1995. Majority of these firms began using SCMS
since 2000. Introduction to cloud computing instigated multitudinous service
oriented firms to integrate SCMS to their existing business process.
Amazon.com, the largest e-commerce company, uses superior supply chain
management system to be in contact with its suppliers and customers. One
click technology was pioneered by Amazon.com which tremendously reduced
cost and increased efficiency.
3. Retailer
22
Figure 8: Cross
Cross ducking starts with placement of order, followed by lead time calculation, contact to supplier, route t
Walmart has been synonymous to superior supply chaining. It is the first retail
store to practice cross ducking method, one of the techniques of supply chain
management that is based on direct selling and complete avoidance of
inventory. Not to mention, other retail stores such as K-mart, 7-eleven,
FamilyMart and so on are also using superior supply chain management
system to exist in the market.
4. Restaurants
Restaurants also use supply chain management system to make their business
process to run smoothly. Tracker, and online ordering services are some of the
facilities that restaurants provide their customers. For instance: Dominos has
integrate Pizza Tracker on its website, so customer can easily track their order
from their home.
23
Figure 9: Supply Chain Management
Information
Supplier Automated orde
Material
Dominos has maintained automated ordering system for raw materials, which reduces cost and time for pl
24
CHAPTER 3: ORGANIZATIONAL PERSPECTIVE OF SYSTEM
25
hotels use computers to keep track of guests preferences, such as their
preferred room temperature, check-in time, frequently dialed telephone
numbers, and television programs, and store these data in a large data
repository.
4. Improved decision making
Many business managers operate in an information fog bank, never really
having the right information at the right time to make an informed decision.
Instead, managers rely on forecasts, best guesses, and luck. The result is
overor underproduction of goods and services, misallocation of resources, and
poor
response times. These poor outcomes raise costs and lose customers. In the
past decade, information systems and technologies have made it possible for
managers to use real-time data from the marketplace when making decisions.
5. Competitive advantage
Doing things better than competitors, charging less for superior products, and
responding to customers and suppliers in real time all add up to higher sales
and higher profits that your competitors cannot match. Apple Inc., Walmart,
and UPS, are industry leaders because they know how to use information
systems for this purpose.
6. Survival
Business firms also invest in information systems and technologies because
they are necessities of doing business. Sometimes these necessities are
driven by industry-level changes.
26
2. Close contact with suppliers
The primary task of SCMS is to virtually link customer and supplier. The
growing networking advances and development of intranet and extranet have
narrowed down gap between supplier and firm, and firm and its customer.
3. Smooth flow of resources
SCMS helps in smooth flow of materials over a delicate supply chain and also
make a flow of information. It links customer and supplier in a delicate chain
ensuing smooth flow of resources.
4. Helps to promote competitive advantage
If a firm can offer similar quality product at lower price or can offer higher
quality product at same price through differentiation than of competitors, then
it is said to be competitive advantage. The lower marginal cost of a firm, the
higher profitability of a firm. SCMS helps to reduce marginal cost through
elimination of wastage, reduction in inventory and superior distribution of
product that adds value to customer.
5. Helps to reduce working capital
Working capital is the capital of a business which is used in its day-to-day
trading operations, calculated as the current assets minus the current liabilities.
SCMS helps to reduce working capital as it virtually connects both supplier
and customer and reduces cost of ordering raw materials to suppliers and
receiving order from customer.
27
3.4 Role of system for business operation
Supply chain management systems automate the flow of information among
members of the supply chain so they can use it to make better decisions about
when and how much to purchase, produce, or ship. More accurate information
from supply chain management systems reduces uncertainty and the impact of
the bullwhip effect. Supply chain management software includes software for
supply chain planning and for supply chain execution. Internet technology
facilitates the management of global supply chains by providing the connectivity
for organizations in different countries to share supply chain information.
Improved communication among supply chain members also facilitates efficient
customer response and movement toward a demand-driven model.
Supply Chain Management System helps firm to conduct its business operations
in following ways:
28
CHAPTER 4: SECURITY ISSUES OF SYSTEM
Controls are such methods, policies, and procedures that ensure protection of
organizations assets, accuracy and reliability of records, and operational adherence to
management standards.
29
Figure 11: Wi-Fi Security Challenges
Hackers
Hackers flood a network server or Web server with many thousands of false
communications or requests for services to crash the network in Denial-of-service
(DoS) Attacks. The network receives so many queries that it cannot keep up with
them and is thus unavailable to service legitimate requests. A distributed denial-of-
service (DDoS) attack uses numerous computers to inundate and overwhelm the
network from numerous launch points.
30
For example, during the 2009 Iranian election protests, foreign activists trying to help
the opposition engaged in DDoS attacks against Irans government. The official Web
site of the Iranian government (ahmadinejad.ir) was rendered inaccessible on several
occasions.
Malware
"Malware" is a term for any software that gets installed on your machine and
performs unwanted tasks, often for some third party's benefit. Malware programs can
range from being simple annoyances (pop-up advertising) to causing serious computer
invasion and damage (e.g., stealing passwords and data or infecting other machines on
the network). Additionally, some malware programs are designed to transmit
information about your Web-browsing habits to advertisers or other third party
interests, unbeknownst to you.
Types of malware
Virus - Software that can replicate itself and spread to other computers or are
programmed to damage a computer by deleting files, reformatting the hard disk, or
using up computer memory.
Browser hijacking software - Advertising software that modifies your browser settings
(e.g., default home page, search bars, toolbars), creates desktop shortcuts, and
displays intermittent advertising pop-ups. Once a browser is hijacked, the software
may also redirect links to other sites that advertise, or sites that collect Web usage
information.
Spoofing
31
Spoofing refers to redirecting a Web link to an address different from the intended
one, with the site masquerading as the intended destination. One very common
example of spoofing is when people receive e-mails in their inbox saying that a
message could not be delivered to a recipient, even though they do not remember
sending that message.
Sniffing
General Controls
General controls govern the design, security, and use of computer programs and the
security of data files in general throughout the organizations information technology
infrastructure. On the whole, general controls apply to all computerized applications
and consist of a combination of hardware, software, and manual procedures that
create an overall control environment. General controls include software controls,
physical hardware controls, computer operations controls, data security controls,
controls over implementation of system processes, and administrative controls. Table
3 describes the functions of each of these controls.
32
Table 4: General Controls
33
Application controls
Application controls can be classified as (1) input controls, (2) processing controls,
and (3) output controls. Input controls check data for accuracy and completeness
when they enter the system. There are specific input controls for input authorization,
data conversion, data editing, and error handling. Processing controls establish that
data are complete and accurate during updating. Output controls ensure that the
results of computer processing are accurate, complete, and properly distributed.
Risk assessment
A risk assessment determines the level of risk to the firm if a specific activity or
process is not properly controlled. Not all risks can be anticipated and measured, but
most businesses will be able to acquire some understanding of the risks they face.
Business managers working with information systems specialists should try to
determine the value of information assets, points of vulnerability, the likely frequency
of a problem, and the potential for damage. For example, if an event is likely to occur
no more than once a year, with a maximum of a $1,000 loss to the organization, it is
not be wise to spend $20,000 on the design and maintenance of a control to protect
against that event. However, if that same event could occur at least once a day, with a
potential loss of more than $300,000 a year, $100,000 spent on a control might be
entirely appropriate.
34
Exposure Probability of Loss Range/ Expected Annual
occurrence (%) Average ($) Loss
Power failure 30% $5,000-$200,000 $30,750
($102,500)
Embezzlement 5% $1,000$50,000 $1,275
($25,500)
User error 98% $200$40,000 $19,698
($20,100)
Security Policy
35
Disaster Recovery Planning and Business Continuity Planning
Disaster recovery planning devises plans for the restoration of computing and
communications services after they have been disrupted. It focuses primarily on the
technical issues involved in keeping systems up and running, such as which files to
back up and the maintenance of backup computer systems or disaster recovery
services. Business continuity planning focuses on how the company can restore
business operations after a disaster strikes. The business continuity plan identifies
critical business processes and determines action plans for handling mission-critical
functions if systems go down. For example, Deutsche Bank, which provides
investment banking and asset management services in 74 different countries, has a
well-developed business continuity plan that it continually updates and refines. It
maintains full-time teams in Singapore, Hong Kong, Japan, India, and Australia to
coordinate plans addressing loss of facilities, personnel, or critical systems so that the
company can continue to operate when a catastrophic event occurs.
36
An MIS audit examines the firms overall security environment as well as controls
governing individual information systems. The auditor should trace the flow of
sample transactions through the system and perform tests, using, if appropriate,
automated audit software. The MIS audit may also examine data quality. Security
audits review technologies, procedures, documentation, training, and personnel. A
thorough audit will even simulate an attack or disaster to test the response of the
technology, information systems staff, and business employees.
The audit lists and ranks all control weaknesses and estimates the probability of their
occurrence. It then assesses the financial and organizational impact of each threat.
Figure 8-4 is a sample auditors listing of control weaknesses for a loan system. It
includes a section for notifying management of such weaknesses and for
managements response. Management is expected to devise a plan for countering
significant weaknesses in controls.
37
CHAPTER 5: ETHICAL ISSUES OF INFORMATION SYSTEM
Figure 14: The relationship between Ethical, Social, and Political Issues in an Informa
38
Information system raise new ethical questions for both individuals and society
because they create opportunities for intense social change, and thus threaten existing
distributions of power, money, rights, and obligations. Information system can be used
to achieve social progress like from the technologies like telephone, radio, electricity,
engines etc., but it can be used to commit crimes and threaten established social
values. The development of information technology can be misuse for the benefit of
few at the cost of many. And with the dominance of internet and inclination towards
e-commerce, the urgency of ethical guidance in using information technologies has
ten-folded over years. Moreover issues related to accountability for the consequences
of information systems, quality conformance, rights of concern parties and peoples
quality of life have evolved along with the course of digital evolution.
39
Informed consent is very popular nowadays for gathering information without
arising debatable privacy.
2. Property Rights: Intellectual Property
Intellectual property refers to the creations of the mind in the fields of
inventions, literary and artistic works, scientific works, symbols, names, and
images used in industry, commerce and communication areas. Now, because
of the Internet, such creation can be copied and distributed easily and some
other person may be counting money instead of the creator. Here are some
different formats of intellectual property.
a) Trade secrets:
Any intellectual work product- a formula, devices, pattern, or
compilation of data- used for a business purpose can be classified
as a trade secret provided it is not based on the information in the
public domain. Most of the companies keep their formula,
methodology and so on secret to make their product
distinguishable. For Example: Coca-Cola, the world most valuable
non-technological brand, has not disclosed the formula of
preparing coke even to their indubitable employees.
b) Copyright :
Copyright is the legal protection extended to the owners of the
rights in an original work, which they have created. The Copyright
Act 2002 provides economic and moral rights to the creator
through his/her lifetime and seventy years after his/her death.
Activities such as production, reproduction, communication to
public, duplicate, sell etc. of the owner or against the agreement are
done without authorization of the owner or against the agreement
with the owner are considered copyright violation.
c) Patents :
A patent is an exclusive monopoly rights given on the ideas behind
an innovation for 20 years to the rightful creator. The patent rights
can be renewed after 20 years. Patents are intended to secure full
financial and other rewards to the investors and yet make
widespread use of the inventor gets royalty when another party
uses his inventions for his benefit. For instance: The Door Cooling
System technology has been registered under the patent of LG
electronics.
40
3. Accountability , liability, and control
Accountability refers to condition of being answerable to higher authority or
concerned parties. Liability is the state of being legally responsible for
something, thus subject to paying compensation for any wrong done. Control
means the measure to be adopted the faults as far as practicable in the digital
platform, basically asking who is responsible for controlling the mishaps. For
example: During the last week of September 2009, Toronto-Dominion (TD)
banks 6.5 million customers were temporarily out of funds in their account
because of a computer glitch caused due to a failed attempt of integrating
systems of TD bank and commerce bank. The question is, who is liable for
any economic harm caused to individuals or business that could not access
their full account balances in that period.
Computer software is a bulk of instructions provided to the machine, so if any
harms occur in account of the software, the authors should have been held
liable, but actually law often regards the operator to be liable stating that
software acts like a book, storing and displaying information so users action
is the cause of harm.
4. System Quality: Data Quality and System Errors
The debate over liability and accountability for unintentional consequences of
system use raises a related but independent moral dimension: what is an
acceptable, technologically feasible level of system quality? At what point
should system managers say, Stop testing, weve done all we can to perfect
his software .ship it! Individuals and organizations may be held responsible
for avoidable and consequences, which they have a duty to perceive and
correct. And the area is that some system errors are foreseeable and
correctable only at very large expensive, literally unaffordable. Though no
any system is completely precise and error free, system must comply with
some basic requirement and must fulfil minimum criteria. For example: In
mobile telecommunication, 10% failure is normal and acceptable elsewhere,
but failure beyond 10% is rejected.
41
society is welcomed. For instance: iPhone and iPad became tremendously
successful and were deemed as the game changer or the industry changer
because of its charismatic performance and widespread business application.
3. Networking advances
Networking advances has enabled copying and movement of data from one
location to another and accessing large qualities of personal data from remote
location with ease.
4. Advance data analysis
42
This technological inclination has given organizations greater ability to
analysis personal information of individuals from vast qualities of data
gathered; and also to develop detailed profiles of individual behaviors non-
obvious relationship awareness (NORA).
Table 6: Key Technology Trend That Raise Ethical Issues
Trends Impacts
43
Ethical issues in information systems have given new urgency by the rise of the
Internet and electronic commerce. Internet and digital firm technologies make it easier
than ever to assemble, integrate, and distribute information unleashing new concerns
about the appropriate use of customer information, the protection of personal privacy
and the protection of intellectual property.
CHAPTER 6: CONCLUSION
6.1 Conclusion
Supply Chain is an activity of making a link among suppliers and customers to make
procurement of raw materials from supplier and distribution of finished product to
customer easy and fast. Supply Chain Management System is the information system
44
that govern and integrates the supply chain activity in a unified program. The
extension competition has made SCMS, one of the most desired systems by most of
the worlds prominent organizations. The business world halts without SCMS. The
world is running in quick pace, this quick pace is the consequence of superior supply
chaining. However, SCMS is not free of threats and security concerns. Many intruders
and hackers persistently get engage in disturbing and destroying the system. So,
organization should maintain strong security through impenetrable firewalls, ethical
hackers and so on. Information rights and obligations, property rights and obligations,
accountability and control, system quality, and quality of life are five moral dimension
of SCMS.
6.2 Learning
The project work was really fruitful. We went through many websites, put down
important points which widen our knowledge. We learned many things about SCMS,
which our course did not cover. We learned how the concept of Supply chain
management came into existence, who applied SCM for the first time, and
significance of SCMS in the contemporary competitive business world. We learned
that there is positive correlation between networking advances and SCMS. Also, we
acknowledge that SCMS has positive correlation with firms profitability i.e. the firms
adhering towards superior supply chain management applications were generating
higher revenue, good suppliers and customer responses and vice-versa. We got hold of
many information regarding security concerns of SCMS. SCMS is not free from
vulnerabilities. Many intruders and hackers uses formidable techniques to crash and
destroy system. Snoofing, sniffing, Denial-of-Service (DoS) attack and Disturbed
Denial-of-Service (DDoS) are the techniques used by notorious hackers to leak
privacy, and crash entire system.
We have also learned that Digital data are vulnerable to destruction, misuse, error,
fraud, and hardware or software failures. The Internet is designed to be an open
system and makes internal corporate systems more vulnerable to actions from
outsiders. Hackers can unleash denial-of-service (DoS) attacks or penetrate corporate
networks, causing serious system disruptions. Wi-Fi networks can easily be penetrated
by intruders using sniffer programs to obtain an address to access the resources of the
network. We learned that firewall is the utmost requirement. Firewalls prevent
unauthorized users from accessing a private network when it is linked to the Internet.
45
Intrusion detection systems monitor private networks from suspicious network traffic
and attempts to access corporate systems. Antivirus software checks computer
systems for infections by viruses and worms and often eliminates the malicious
software, while antispyware software combats intrusive and harmful spyware
programs. Use of software metrics and rigorous software testing help improve
software quality and reliability.
46
BIBLIOGRAPHY
GLOSSARY
1
1. Application controls Specific controls unique to each computerized
application that ensure that only authorized data are completely and accurately
processed by that application.
2. Business Intelligence: A collection of software and application tools that help
manager and other enterprise users make more informed decision
3. Cross Docking: a logistics procedure where products from a supplier or
manufacturing plant are distributed directly to a customer or retail chain with
marginal to no handling or storage time
4. Decision Support System: a powerful information system used by middle
level manager to handle unstructured problem.
5. Denial of Service: Flooding of network server with thousands of false request
for service to crash the server.
6. Distributed Denial of Service: Flooding of network server with thousands of
false request of service to crash the server from different computer.
7. Extranet: Private intranet that is accessible to authorized outsiders.
8. General controls: Overall control environment governing the design, security,
and use of computer programs and the security of data files in general
throughout the organization's information technology infrastructure
9. Hacker: A person who gains unauthorized access to a computer network for
profit, criminal mischief, or personal pleasure.
10. Hewlett Packard: A renowned IT company that produces computer, and its
parts.
11. Information Technology (IT): All the hardware and software technologies a
firm needs to achieve its business objectives.
12. Information: Data that have been shaped into a form that is meaningful and
useful to human beings.
13. Internet: Global network of networks using universal standards to
connect millions of different networks.
14. Intranet: An internal network based on Internet and World Wide Web
technology and standards.
15. Inventory Turnover Ratio: The ratio of sales to inventory that shows how
efficiently a firm can sell its inventory.
16. Just In Time: The production process in which production of product will
start when a customer places an order.
17. Local Information System: a form of information system built with business
intelligence tools, designed primarily to support geographic reporting
18. Management Information System: an information system that serves middle
level managers and generates reports from data collected by TPS
19. Network: The linking of two or more computers to share data or
resources, such as a printer.
2
20. NORA: A process of collecting multiple data from various sources to find
hidden obscure relationship on individual, which helps in identifying criminals
21. Online Analytical Processing: computer processing that enables a user to
easily and selectively extract and view data from different points of view.
22. Online processing: A method of collecting and processing data in
which transactions are entered directly into the computer system
and processed immediately
23. Operating system: Software that manages the resources and activities
of the computer.
24. Portal: Web interface for presenting integrated personalized content
from a variety of sources. Also refers to a Web site service that
provides an initial point of entry to the Web.
25. Procter & Gamble: The largest company of consumer goods and cosmetics.
26. Product differentiation: Competitive strategy for creating brand
loyalty by developing new and unique products and services that
are not easily duplicated by competitors.
27. Security: Policies, procedures, and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to information
systems.
28. Total Quality Management: a comprehensive and structured approach to
organizational management that seeks to improve the quality of products and
services through ongoing refinements in response to continuous feedback
29. Transaction Processing System: An information system used in every
organization at lower level to record day to day activity/transaction of business
30. Wi-Fi: Standards for Wireless Fidelity and refers to the 802.11 family of
wireless networking standards