E Business
E Business
E-business technologies
Hardware
Hardware is both backbone & the engine of e-business. Computers, mobile devices, peripheral equipment
Network
Cabling, fibre optics, wireless connections, electricity
Software applications
Production systems Integrated information systems Integrated electronic data exchange systems
E-business technologies
Collaborative-commerce
The set of technologies and business practices that allows companies to build stronger relationships with their trading partners through integrating complex and cross enterprise processes governed by business logic and rules as well as workflows. Most promising solution which can be used for supply/value chain collaborations & integration is web services They can support integration of (1) between companies, via a standard interface to customers & business partners (2) within the company-reducing time & the cost required to integrated internal system (3) between company and end users by delivering a better user experience
System/Application Integration
Initially integration is mainly internal, between functions, divisions, & business units within countries, or between various locations of company The next step is integration with business partners, customers, & suppliers; while final stage the whole supply/value chain can be interconnected. Internal Integration: Organizational e business applications( such as ERP,CRM & SCM) are interconnected in a way that seek to incorporate principles of flexibility, integration & modularity Integration of different modules from various software vendors & based on different technologies is not easy.
System/Application Integration
To facilitate & simplify system integration between various systems & modules within an organization, enterprise application integration (EAI) has been used. EAI acts as link between two or more different systems. The organizations internal process integration is supported by workflow & document management systems. Workflow management systems are concentrated on managing process logic: process flow is captured & visualized. Function logic, system & application, data & people are incorporated into it.
One-to-one communication: one specific service is invoked by one consumer at a time. Communication is bi-directional
Consumer-based trigger: the flow is initiated by the client( service consumer) Synchronous: Replies are sent back to the consumer in a synchronous way
E-business security
Major issues in e-security are Confidentiality/disclosure: ensuring that data inappropriately by a third party when in transit cannot be accessed
Data integrity: ensuring that data cannot be modified between sender & receiver
Authentication (identification): confirming that the identity of those sending documents or performing operations is known & that only authorized users can access the system Non-repudiability: making sure that the sender or receiver from being identified by an unauthorized persons
Privacy: preventing either sender or receiver from being identified by an unauthorized person Anonymity: respecting user anonymity-especially important in respect of micro-payments
E-business security
Authentication methods
Risks
Benefits delivery risks Technological delivery risks