Professional Documents
Culture Documents
Learning Objectives:
• Definition and functioning of Electronic Data Interchange (EDI) — benefits, limitations
and its security aspects.
• Enterprise Resource Planning (ERP) — Evolution, definition, characteristics and the
enterprise model.
• Objectives, functioning of Data Warehousing (DW) and role of Data Mining.
• Understanding Corporate Information Management System (CIMS).
• Evolution of the concept of e-business; E-commerce — procedure, elements, models,
security aspects and benefits.
• Inter-relation between e-commerce and Internet — development and management of
Web-sites and functioning of related technologies.
• Mobile-Commerce or M-Commerce, a technology boon for modern life.
• Application of electronic technology (Internet, etc.) in other fields of human activities
such as: e-governance, electronic banking, GIS, etc.
• Why and how the World is getting transformed into a ‘Global village’ concept.
S u p p lier
O n e -to -M a n y
M a n u f a ctu rer S u p p lier
S u p p lier
M a n y -to -M a n y
M a n u f a c tu r er S u p p lier
T h ird
M a n u f a c tu r er P a rty S u p p lier
V en do r
M a n u f a c tu r er S u p p lier
le P ro
op du
Pe c ts
gy P ro
o lo n ces
ech T s
18.1 E-Commerce
E-commerce refers to conducting business electronically using some form of communication link.
E-commerce refers to the paperless exchange of business information using Electronic Data Interchange, electronic
mail, electronic bulletin board, electronic funds transfer and other network based technologies. It is not only
automated manual processes and paper transactions but also help organisations move to a fully electronic
environment and change the way they operate.
The key indicators, which exhibit poor business performance, calling for e-commerce initiatives, are the following.
o Longer processing cycles
o High inventory at all locations
Chapter 4 BUSINESS INTEGRATION AND E-BUSINESS 4.9
o Employees spending too much time in searching and accessing information
o Critical resources idle
o Rapid loss of market share
o Organisation top heavy
o Market share of loyal customers on the decline.
E-commerce uses different technologies to transfer conventional business methods to e-enabled methods. It begins
with intranet for in-company seamless integration of systems. It uses web enabled systems to deal with text based
information. Along with supply chain management systems (ERP), customer relations management systems (CRM)
are implemented. Intranet then is extended to trusted business partners with complete security measures to protect
information from exposure to unauthorized people. When you extend intranet to trusted business partners, it is
called extranet. Once the systems are stabilized on Intranet/Extranet, Internet connectivity is obtained for
messaging and transaction processing applications. The Internet is now accessible on wireless devices such as lap-
top, mobile phones, etc. Internet is used to develop web applications. Internet is a universal network and web is an
application running over it.
18.5.1 Cryptography
Data/information Security is the act of protecting of vital quality of information (such as secrecy, or safety, or even
wealth) from infringement, resulting in relief from fear and anxiety. It is the ability to engage and defeat attempts to
damage, weaken, or destroy a vital quality. Information security, is the form of assuring the secrecy of information
while in storage or transit, is the fundamental role of cryptography.
The word Cryptography is derived from the Latin words crypto (itself derived from the Greek word kryptos)
meaning “hidden” and graphy meaning “writing”. The term cryptanalysis refers to the systematic study of
techniques by which secret communications may be revealed. The term cryptology is used to refer to the entire area
of cryptography and cryptanalysis.
Cryptography is the art and science of transforming information into an intermediate form which secures that
information while in storage or in transit; thereby protecting it from unauthorised access/modification and hence
acting as a shield.
Cryptography seeks to render a message unintelligible even when the message is completely exposed. It is all about
communication in the presence of adversaries. Observe that cryptography is necessary for secure communications,
but it is not sufficient only by itself.
The general concept of protecting things is with a "lock," thus making those things available only if one has the
correct "key."
20.0 M-Commerce
Cellular phones are wireless personal telephones. A cellular system partitions geographical areas into cells; each
cell has a base station with a radio transmitter, a receiver, an antenna and a computer. Cellular phone technology
uses a low-power transmitter attached to each cell (a small area), thus increasing the number of frequencies
considerably available to mobile phone customers. Incoming calls are transmitted to a user’s telephone with radio
waves, using a unique set of radio frequencies for each cell, while a central computer and other communication
devices send, receive track and manage cells and handoff from one to another cell.
Mobile Commerce, commonly referred to as m-commerce, means the ability to pay for merchandise services of
information through a mobile phone.
The technology which enables Mobile or other Wireless devices to access and utilise Internet, is known as
“Wireless Application Protocol” or WAP, in short.
M-commerce is gradually gaining significance due to reasons, such as —
• Mobile phones are ‘personal’ in true sense and therefore the most secured device for oneself. This is
because no one (generally) needs to share Mobile, and if in extreme case, requires sharing Mobile phone,
shares with very very near ones, who can be highly trusted.
• Mobile is a portable device, which can be carried anywhere, anytime with least effort. Mobile can serve at
location (considering there is tower strength) — e.g. on the 15 th floor, as well as on the ground floor; even
while travelling in car, or walking the footpaths, or climbing the stairs.
• Mobile, being a wireless device, does not need any wire-set or connection-box, etc. in order to be
connected to the Internet, or the Mobile network.
• Power backup (i.e. battery charge) is sufficient for, at least one day’s work and normally a charger is not
needed to be carried (unlike say, Laptop, etc.)
• Mobile is truly portable in all aspect; take for example a laptop, which weighs more or less 1 kilo and needs
a separate carry-bag.
WAP provides needed medium to connect in a secure, fast, nimble, online, interactive way with services,
information and other users.
WAP applications have a major role to play in easing business processes in every situation where information
exchange is a critical need. WAP is being used to develop enhanced forms of existing applications and view
versions of today’s emerging applications.
WAP, in mobile, is so convenient that, if Law and Technology permits, the taxi driver may be paid over WAP
through mobile, etc.
21.2 E-Governance
Electronic Technologies (such as Networking, Communication, Internet and Computing) applied in performing
Governmental duties and activities, constitutes ‘e-governance’.
E-governance is defined as a mere government services and information to the public using electronic means.
E-governance aims at providing public a platform to interact with Government in its planning/decision-
making/implementing phases, such that the Government could function as a real open-system model, with
suggestions, ideas and feedback from its citizens. E-governance also helps to bypass a middle tier which would
otherwise be concerned with collecting such feedback and suggestions, etc.
Communicating with Government using electronic technologies — is not what e-governance is. E-governance is
beyond that, where citizens are invited to provide supportive and executive role in Governmental activities. To do
these, Citizens need to communicate and to some extent interact with the Government, using electronic
technologies such as e-mail, etc.
E-governance reduces cost, increases efficiency. Using e-governance, one Governmental departmental
officer/minister can video conference with another, situated at remote geographical area, which would otherwise
need personal visit by traveling over many kilometers and incurring costs about many times that of video
conferencing.
Summary
• Electronic Data Interchange or EDI facilitates transfer of
electronic data between different (i.e. intra) organisations,
without the need for data conversion for transportation. EDI is best
beneficial since it avails low-cost; prompt, if not instant;
paperless; less-human involvement-oriented transfer of data. The
disadvantage is that initial implementation cost is so high that it
is not advisory for small concerns to adapt EDI.
• Mobile phones or Cellular phones are most portable and most personal
devices; which are best suited for personal-transactions. Commerce
through Mobile is known as M-Commerce.
Self-test Questions
1. State the concept, working procedure, components, advantages and disadvantages of EDI, ERP, and
Data Warehousing.
2. What does Data Mining do? Where is it used? What is Meta Data?
3. What are virtual organisations and how do they operate business through e-commerce?
4. Why are Mobile Phones, also known as Cellular phones? What is the purpose of using ‘Cell’ concept?
5. Explain M-commerce; mention the advantages, disadvantages and limitations regarding M-commerce.
6. What is e-Governance?
7. Elaborate the topic “Global Village”.
Chapter 4 BUSINESS INTEGRATION AND E-BUSINESS 4.21
—