E-Commerce - Study Materials
E-Commerce - Study Materials
INTRODUCTION TO E-BUSINESS
E-Business is a superset of business cases which have been digitized and work on the internet.
E-Business is the process of buying and selling or exchanging of products, services and
information through telecommunication and computer networks including the internet.
The business in developing countries that want to increase their export potential using the internet should
build their website to serve their customers.
E-COMMERCE
E-commerce is the use of technology towards the automation of business transactions and
workflow.
Forms of E-commerce:
1. Pure E-Commerce
Information (Digital)
Delivery (Digital)
Buyer Seller
Payment (Digital)
2. Partial E-Commerce
Information (Digital)
Delivery (Physical)
Buyer Seller
Payment (Digital)
Information (Digital)
Delivery (Digital)
Buyer Seller
Payment (Physical)
The need for E-Business increase the demand within business & government to make better use of computing & to
better apply computer technology to improve customer interaction, business processes & information exchange both
within an enterprise & across enterprises.
During 1970’s, the introduction of EFT (Electronic Funds Transfer) between banks over secure private networks
(VPNs) changed financial markets.
During the late 1970’s & early 1980’s, E-business become wide-spread within companies in the form of Electronic
Messages such as EDI (Electronic Data Interchange) & E-mail (Electronic Mail)
E.g. LOTUS Notes (Taking existing Non Electronic Methods & grafting them onto an electronic platform
for improved business process efficiency)
In 1990’s Internet (WWW) has rapid growth to millions of potential customers, the term electronic
commerce was coined and e-business applications expanded rapidly. The main reason for the rapid
application was the development of networks, protocols, software and specifications for e-
business activities.
1. E-Commerce
2. E-Auctioning
3. E-Banking & E-Payment
4. E-Directories
5. E-Engineering
6. E-Gambling
7. E-Learning
8. E-Mailing
9. E-Marketing
10. E-Supply
11. E-Trading
12. E-Jobsearch
13. E-Traveling
14. E-Matrimonial
15. E-Fashion
REQUIREMENT OF E-BUSINESS
1. CONSUMABLES
A. Computer Stationary – Paper Rolls, Printer Ribbons, Coated Papers.
B. Refills & Inkjet
C. Toner Cartridges
D. Laser Toner
E. Computer Paper Data Binder.
3. STAND BY EQUIPMENTS
A. Stabilizer
B. Inverter / UPS
C. Generator.
1. Global Reach: Helps to reach a more geographical customer based and more business
partners as compared to the traditional business methods.
2. Reduction in Paper Costs: Through the use of EDI it has reduced the cost for paper and
become more secure.
4. Faster Access to Information: Because of Internet the information can spread faster and easily.
5. Lower Telecommunication Costs: Low cost of connecting to the internet, small and medium
businesses can easily afford business on the internet.
6. Improved Customer Service: Helping the customer to access information before, during and
after a sale.
7. New Found Business Partners: Internet based E-commerce enables businesses to find new
business partners globally on the web, thus not restricting themselves to a specific choice of
suppliers.
8. Reduced Production Cycle Time: By allowing teams to electronically share design
specifications and refinement processes.
1. Convenience of shopping at Home: Anytime the customer can shop without considering
the store hours.
2. Virtual Auctions: E-commerce has made it possible for customers to participate in virtual
auctions for buying and selling.
3. Increased Choice of vendors and Products: Customers can have an increased choice of
vendors or products because they are no longer geographically constrained to reach a
vendor or a product.
E.g. Amazon.com, epaper.timesofindia.com etc.
6. Quick Delivery of Digitized Products / Services: E-commerce allows quick delivery in the
case of digitized products such as music, software etc.
1. Economy
2. Better Customer Service
3. Greater Profit Margin
4. Knowledge Markets
5. Information Sharing & control.
6. Better Team Work.
7. Increase Margins
8. Faster Business Transactions
9. New Services
10. Lower Business Setup & Transaction Cost.
11. 365 Days, 24 X 7 Open.
3. Problems with Online Environment: Merchant & customers can be both fake.
5. Expensive Security
7. Providing a sense of community: Chat room, discussion boards, soliciting customers input, loyalty
schemes can help in this respect
A company’s business model is the way in which it conducts business in order to generate revenue /
profit.
In the new economy, companies are creating new business models and reinventing old models.
Based on these categories of e-business models are divided into two broad categories:-
A. E-business model based on the relationship of transaction parties. B. E-business model based on the
relationship of transaction types.
5. Business-to-Government (B2G): Business selling to local, state & central govt. E.g. www.Igov.com
1. Buying and Selling goods and services, usually referred to as electronic markets.
A. EDI
B. EFT
C. Electronic Forms
D. Integrated Messaging
E. Shared Database
F. SCM: Supply Chain Management: Co-operation between a company and its suppliers or company
regarding inventory management, demand forecasting and order fulfillment. This can reduce
inventories, speed shipments and enable just-in-time manufacturing.
B2B APPLICATIONS
- Electronic Marketing
- Procurement Management
- Just-in-Time (JIT) delivery
-
Electronic Data Interchange (EDI)
ENTITIES / COMPONENTS IN B2B E-COMMERCE
1. Selling Company
2. Buying Company
3. Electronic Intermediary: Which is a third- party intermediating service provider when the selling
and buying companies are not interacting with each other directly.
4. Network Platform: Can be Internet, an Intranet or an Extranet.
5. Communication Protocols: i.e. EDI
6. Back-end Information System: ERP (Enterprise Resource Planning) e.g. SAP’s R/3, Bayan etc.
and DBMS (Database Management System) e.g. Oracle, SQL etc.
MAJOR DIFFERENCES BETWEEN B2C BUYERS AND B2B BUYERS
A Classic example of a supplier-oriented B2B marketplace is that of Cisco connection online (CCO) which
operates Cisco’s electronic marketplace.
The various services of B2B that cisco’s website provided to its customers
1. Customer Service
2. Online Ordering
3. Tracking Order Status.
Advantages / Benefits of B2B for Supply Oriented Marketplaces:-
e.g. http://shoppoint.co.kr/
The buyer-oriented B2B E-commerce has benefits for both Buyers and Sellers.
e.g. Tricon Restaurant International which operates 10,000 KFC, Pizza Hut etc. in 83 countries.
A. Independent Auctions: A co. may use a third- party auctioner to create the site and sell its goods. E.g.
www.fairmarket.com
B. Commodity Auctions: Many buyers and sellers come together to a third-party web site for the auction
of the same product. E.g. www.fastparts.com
C. Private Auctions: Many co’s auction their products themselves on their own sites, without taking the
help of intermediaries. Such auctions may be open or by invitation only. E.g. www.auctionblock.com
6. THE VIRTUAL CORPORATIONS B2B E- COMMERCE (Networking between Business
Partners)
A Virtual corporation is an organization consisting of several business partners or businesses which are
sharing costs and resources for the purpose of producing a product or service.
Businesses may agree to enter into virtual corporation alliances for many reasons:
1. Excellence
2. Utilization
3. Low Cost
EDI – ELECTRONIC DATA INTERCHANGE
EDI is the exchange of documents in standardized electronic form, between organization, in an automated
manner, directly from a computer application in one organization to an application in another.
EDI is defined as the transfer of structured data by agreed message standards from computer to
computer by electronic means.
Easy & cheap communication of structured information throughout the corporate community.
In EDI, the computer applications of both the sender and the receiver
have to agree upon a common format of the business document which is being sent as a data file over the
communications channel.
1. Increased Time
2. Low Accuracy
3. More Chances of Errors
4. High Labour Charges
5. Increased Uncertainty
The information produced by the source computer in an organization is converted into an EDI format by translation
software and is sent to the receiving computer over a digital network. On the receiving side, the translation software
converts the EDI format into the form required by the business application at that end.
Benefits of EDI
A. Direct Benefits
1. No Need for rekeying the information
2. Cost of processing EDI documents is much less than that of processing the paper documents.
3. Improved customer service is enabled.
4. Business documents move faster.
5. Information is managed more efficiently.
B. Strategic Benefits
1. Reduction in product costs is achieved.
2. Better customer and supplier relations through more effective and faster communication and exchange of
information.
3. More accurate forecasting and business planning is achieved due to information availability at the right place
and right time and with the help of data mining techniques.
DRAWBACKS of EDI
1. Unpopular
2. Expensive
3. Point-to-point
4. Requires expensive VAN networking
5. Not easy to use, learn, or implement
1. EDI Standards: E.g. UN/EDI FACT(The United Nations Standards for EDI for Administration Commerce
and Transport)
2. EDI Software:
Major Functions of the EDI Software are Data Conversion, Data formatting & Message Communication.
3. Network infrastructure for communications: The communications networks used may be Private networks,
Value Added Networks (VANs), or the Internet.
VANs work on the concept of store and forward mechanism, where the documents are sent by the sender without
knowing whether the receiver is ready to receive them or not. The documents are kept preserved in an “Electronic
Mailbox” and are delivered whenever the recipient becomes ready to accept the document.
Some of the well-know EDI VAN Service providers: AT&T, British Telecom (BT), Infonet etc.
Sender
FINANCIAL EDI
• Electronic transmission of payments between a payee and a payer via their respective banks
• Allows businesses to replace labor-intensive activities of collecting,
disbursing & processing payments
• Improves certainty of payment flows
The three principal types of Non-Cash Payment instruments used for B2B Payments are:
1. Cheques
2. EFT (Electronic Fund Transfer)
3. ACH (Automated Clearing House)
Are credit transfers between banks where funds flow directly from the payer’s bank to the payee’s bank based on the
instructions to the payers. EFT ensures timeliness and certainty of Payments.
Are used for services such as preauthorized credits (e.g. Direct Deposit of Pay Rolls), Pre authorized Debits (e.g.
Repetitive Bill Payments) and Consumer Initiated Payment.
STRATEGIES IN E-COMMERCE
1. To get the right product, to the right place, at the right time & with least cost.
2. To keep inventory as low as possible
3. To reduce the cycle times between customer orders and dispatch of finished products.
1. Supplier Management: Geographically discrete Suppliers & reducing the number of suppliers.
2. Inventory Management: Shortening the cycle time between order and dispatch and keeping the inventory
levels to a minimum.
3. Distribution Management: Using EDI to move documents, such as order, purchase bills, shipment notices
etc.
4. Channel Management: Distribute the information about changing operation conditions (Policies, Prices,
Delivery Schedules etc.) to trading partners
5. Payment Management: through EFT.
6. Sales Force Management: Improving the communication & flow of information among the sales, customer
service & production functions through automation.
JIT manufacturing focuses mainly on the reduction in inventories during the manufacturing process. It Emphasis that
in a production plant the needed materials are to be supplied just-in-time, no earlier or later than is demanded by
the manufacturing process.
Benefits of JIT:
3. Procurement Management
Procurement in the traditional business consisted of inefficient buying, redundant processes, and non-strategic
sourcing resulting in long and costly procurement processes.
With the increase use of the e-commerce, easy-to-use web based procurement applications have helped to make the
procurement process more efficient and less costly.
E-Procurement has shifted from paper-based processes to automation, thereby increasing efficiency and effectiveness.
E-PROCUREMENT CHAIN
E-Procurement Chain function’s
1. Management Control: Deals with decisions on which products are available to the employees, who are the
approved vendors, who is authorized to approve an order and so on.
2. Online Product Selection
3. Electronic Ordering
4. Application Integration: A good e-procurement system should be integrated with the existing applications such
as general ledger, accounts payable, purchasing and human resource applications.
5. Information & Reporting: A good procurement system should be able to track, what was purchased, by whom,
from whom, at what price and how long it took to complete each step of the cycle.
Mobile Commerce popularly known as M-Commerce is conducting commercial transactions with the help of mobile
devices like mobile, PDA (Personal Digital Assistant) etc.
Mobile Commerce is concerned with E-commerce applications via the media of wireless(WAP) and mobile computing.
A mobile commerce environment allows the users to access personal or business information and carry out all e-commerce
activities while travelling away from home or workplace.
Mobile Commerce extends the benefits of ecommerce to both businesses and consumers. Through M-Commerce,
businesses in their constant effort to increase their reach are able to reach to even larger number of consumers in
comparison to that offered by Internet. For consumers, M-Commerce makes E-Commerce available in their finger tip at
any place at any time.
Mobile commerce is increasingly becoming popular due to the fact that a mobile device is no longer being used only for
making phone calls but as a communication device for any type of communication need.
The key feature of mobile computing environment is that the user need not maintain a fixed position in the network.
Wireless is a transmission method that enables mobile computing i.e. it enables communication without wires. Mobile
Computing focuses on the application side. Choices for mobile computing include infrared, cellular, packet radio
services, microwave and satellite service.
Mobile Commerce is about the explosion of applications and services that are becoming accessible from internet-enabled
mobile devices. It involves new technologies, services and business models. It is quite different from traditional e-
commerce. Mobile phones or PDAs impose very different constraints than desktop computers.
Mobile Computing: A technology that allows transmission of data, via a computer, without having to be connected to a
fixed physical link.
MOBILE COMPUTING connects mobile people to the information and applications they need-anytime, anywhere on
demand. Move the workplace to any space, using wireless and voice middleware on the server side to support the broadest
spectrum of mobile networks and a wide array of devices on the client side. Enable users of telephones, wired or wireless,
to conduct business transactions or access information simply by speaking.
1 Mobility
2 Ease of Installation in difficult-to-wire areas
3 Reduced installation time
4 Increased reliability
5 Long-term cost savings.
Ideally any application that is offered on PC based E-Commerce can also be offered through Mobile Commerce;
but it will depend on usefulness of the application whether it will be successful on Mobile commerce.
The key factors which will dictate the success of an M-Commerce application are:
5. Tickets Reservation
Infrastructure & Technologies of Mobile Commerce Frame required for mobile computing
Micro Browser
Mobile Wired E-Commerce
Device Infrastructure
Contents in WML
Wireless Channel
WAP
Contents in
Gateway HTML
The mains aspects of M-Commerce infrastructure that are different from a normal E- Commerce
infrastructure are:
1 Wireless Enabled Device: i.e. Bluetooth, IRDA (Infrared Adapter), GPS (Global Processing
System), Wi-Fi (Wireless Fidelity) etc.
4 Others: There are also other components that are normally used to take care of security, transaction
processing and other aspects of E-Commerce transactions.
4. Limited bandwidth.
Privacy
Integrity of data
Authenticity of parties involved in a transaction.
In addition, it is also desirable to provide functionality such as copy protection, preventing denial of
service attacks, filtering to viruses & malicious code and in
some cases anonymous communication.
1) User Identification: Attempts to ensure that only authorized entities can use the appliances.
2) Secure Storage: The Security of sensitive information such as passwords, PINs, Keys etc are reside
in secondary storage of the Mobile Appliance.
3) Secure Network Access: That only authorized device can connect to a network or service.
4) Secure Data Communication: Considers the privacy & integrity of data communicated to / from
the mobile appliance.
5) Secure Content: Content that is downloaded or stored in the appliance is used in accordance with
the terms set forth by the content provides (e.g. read only, no copying etc)
6) Secure Software Execution: Ensure security of the hardware implementation from various
physical and electrical attacks.
The Subscriber Identify Module (SIM) is used for storing the cryptographic keys; of its unique identify called
International Mobile Subscriber Identify (IMSI). The Authentication server of the wireless GSM network stores the
matching key and the IMSI of the subscriber as well.
Much any European nations and, the Asia Pacific Region using GSM
TDMA – Time Division of Multiple Access – In US we are using this kind of Network Technologies for
Mobile Communications.
CDMA – Code Division of Multiple Access – Reliance InfoComm, is using CDMA and US.
Service Technologies
In the traditional computing environment it was necessary to come to the computer to do some work on it.
All computers were connected to each other, to networks, servers, etc. Via Wires. Mobile Computing
The first phase was to make computers small enough so they can be easily carried- Mobile devices
The Second solution to the need for mobile computing was to replace wires with wireless
communication media.
The third phase was a combination of the first two, namely to use mobile devices in a wireless environment.
Referred to as wireless mobile computing, this combination enables real-time connections between mobile
devices and other computing
environments.
M-Commerce and M-Business is any E-Commerce or E-Business activities performed in a wireless environment. It
is not merely a variation on existing Internet services; it is a natural extension of e-business creating new
opportunities.
Typical Applications Include:
- Financial Applications
- Inventory Management
- Field Services Management
- Product Locating
- Real Estate
1. Remote Communications
2. Remote Data Access
E.g. Mobile Workers such as field sales personnel will need access of libraries of reference files
containing product and price information.
3. Services
Electricity, Gas & Water meter reading
Parking fine issuing
Customer field service
4. Other Applications
Agricultural and forestry data collection
Travel ticket issuing.
Personal digital Assistant (PDA): A small portable computer, such as palm handhelds and pocket PC
devices.
Short Message Services (SMS): A technology, in existence since 1991, that allows sending short text
messages.
Enhanced Messaging Service (EMS): The next generation of wireless messaging, this
technology will be able to deliver rich media.
Wireless Application Protocol (WAP): A technology that offers Internet browsing from wireless devices.
Smart Phones: Internet-enabled cell phones that can support mobile applications.
Wi-Fi (Wireless Fidelity): Refers to a standard 802.11b which most of the wireless local area
networks are based on.
Global Positioning System (GPS): A satellite based tracking system that enables the
determination of a GPS device’s location.
WLAN: Wireless local area network.
Mobile computing has two major characteristics that differentiate it from other forms of computing: Mobility and Broad
Reach.
Mobility (and localization) implies portability based on the fact that user carry a mobile device
everywhere they go. Therefore, users can initiate real-time contact with other systems from wherever
they happen to be.
Broad reach: is the characteristic that describes the accessibility of people. They can be reached at any
time.
BUSINESS MODELS
A Buyer-oriented e-commerce system.
A Seller-oriented e-commerce system.
A virtual market place with multiple buyers and sellers.
Selection of suppliers;
Payment.
Intra-company activities;
Inter-company activities.
Integration Issues
Intercompany Integration
• Logistics.
• Inventory.
Product catalogue;
Product configuration;
Customer service;
Systems include:
E.g. Boeing’s PART – allows airlines to purchase spare parts from different suppliers.
Virtual Organization (VO) or Company is one whose members are geographically apart, usually working by
computer e-mail & groupware while appearing to others to be a single, unified organization with a real physical
location.
A Virtual Organization is a temporary network of independent companies having several different roles connected
through a communication network in order to share skills and competencies to access new markets. Virtual
Organization will only exist for a temporary time limit that is the time needed to satisfy its purpose.
In India VO is still in its nascent stage. It will take a couple of years for India to Start competing for Virtual
Offices.
Electronic Payments
The Electronic Payments allow sellers and consumers to clear payments, dues and engage in cash payments, dues and
engage in cashless trading on the internet. Electronic payment is a financial exchange that takes place online between
buyer & seller. The information as a financial exchange is usually some form of digital financial instrument
(Electronic Cash, Electronic checks & encrypted plastic card numbers) that is indirectly produced by a bank or an
intermediary.
o Electronic Payment Systems are indispensable in today’s business process as companies are looking for
innovating ideas to serve customers faster and at low cost.
o Prompt and secure payment, clearing and settlement of credit or debit claims are the important aspects of
electronic payment system.
o E-commerce capability of reducing transaction time, its cost and providing security is the main reason of its
growth.
1. Payment instruments must be secure, have a low processing cost and be accepted widely as global
currency tender.
2. The forms and characters of payment instrument e.g. electronic cash, credit/debit cards should be
desirable to consumer.
3. The issues regarding privacy, fraud, mistakes, bank features should be guarded by proper security
features as authentication / privacy etc.
4. The issues regarding the protocols that connect one financial institution to the other.
Electronic Payment System (EPS) or Electronic Funds Transfer (EFT) can be divided into
three broad categories:
I. Token Based
1. Cash or real time:. The transactions are settled with the exchange of electronic currency
3. Credit or Postpaid: The Customer purchases goods first, which is authenticated by server. The value of
purchase is deposited later in bank.
SMART CARDS
Smart Cards are credit, debit cards & other card products enhanced with microprocessors capable of holding information.
E.g. (Metro Card) Smart Cards are basically of two types.
1. Relationship Based Smart Cards: A relationship based smart card is an enhancement of existing
card service that a financial institution delivers to its customers via a chip based card. The new services may
include. The new services may include:
o Access to Multiple Financial Accounts.
o Value Added Market etc.
o A Variety of functions, such as cash access, bill payments, balance inquiry or funds transfer.
2. Electronic Purses Based Smart Cards: The Electronic Purses are Wallet size smart cards embedded with
programmable microchips that store sums of money for people to use instead of cash.
CREDIT CARD
A Credit card is a small plastic card that has a magnetic strip on the exterior. The magnetic strip carries some form of
encodedinformation about the card number and the card holder.
1. Visa
2. Master Card
3. American Express.
4. Diners
5. Discover
6. Mestro
Is a plastic card which provides an alternative payment method to cash when making purchases. Physically the
card is an ISO-7810 card like a credit card. It Functionality is more similar to writing cheque as the funds are
withdrawn directly from either the card holder’s bank account. In Some countries the debit card is multipurpose
acting as the ATM card for withdrawing cash and as a check guarantee card. Merchants can also offer “Cash
Back” / “Cash Out” facilities to customers, where a customer can withdraw cash along with the purchase.
DIGITAL SIGNATURE
A digital signature or digital signature scheme is a type of asymmetric cryptography used to simulate the security
properties of a handwritten signature on paper. Digital signature schemes normally give two algorithms, one for
signing which involves the user's secret or private key, and one for verifying signatures which involves the user's
public key. The output of the signature process is called the "digital signature."
A signature provides authentication of a "message". Messages may be anything, from electronic mail to a contract,
or even a message sent in a more complicated cryptographic protocol. Digital signatures are used to create public
key infrastructure (PKI) schemes in which a user's public key (whether for public-key encryption, digital
signatures, or any other purpose) is tied to a user by a digital identity certificate issued by a certificate authority.
PKI schemes attempt to unbreakably bind user information (name, address, phone number, etc.) to a public key,
so that public keys can be used as a form of identification.
A publication is information, regardless of its format or method of delivery that is made available to the general
public, or to an identified public, either free of charged or for charged. In theory, these include everything publicly
available via the internet.
Once the sales are made the publishers create username and password for the customer so that the customer can
login to the publisher’s site and access the contents. The customers uses the username and password and can
creates more user accounts for there staff or students so that they can access the material online and can take
the tests online, and their results are automatically captured and analyzed.
But gradually the publishers started realizing that presence on web was not sufficient to make money, they had to
develop business model that:-
1. Early Movers – High rated publishers who are skilled and experienced in their job and have good system of
direct marketing and efficient order fulfillment capability are able to tap the new media of internet, They act as
initiators of online publishing. They understand and learn the tricks of online publishing and selling and are
able to develop required business model for online publishing.
2. Watchers – big traditional publishing houses which are doubtful about online publishing in the initial years
wait and watch. When channel costs become economical and distribution system efficient they enter online
publishing business. These publishers generally are not established brand and cannot bear the heavy expenses
involved in starting the online publishing.
3. Testers – these are publishers who are eager to compete in the online medium and ready to take the challenge.
Such publishers are generally established brand and take the web medium as an alternative to beat their
competitors.
1. The Online archive approach: This is new to the web, but is a logical extension of the trends in
electronic delivery over the past several years.
Those publishers who have an existing digital archive turn to web to provide electronic material of the same,
besides utilizing the other medium like print media, CD-ROM etc. Example: the library catalogues databases are
made online. Many websites offer these databases free of cost to the users. Many magazines, library catalogues,
full text search providers are now on the Internet providing easy access to users.
2. The new medium approach: This is more troublesome and more difficult to implement, but also more
exciting.
Many print publishers have taken Internet as a complete medium and are providing personalized news delivery and
entertainment to the users. Web as a medium requires its own material and acts as an alternative to print media not
a replacement. However technology is a constraint for such customized web pages, unlike print media formatting
becomes difficult in web media.
3. The publishing intermediation approach: This is an online extension of the third-party publisher role off-
line.
Many publishers understand the need for providing intermediation on web. With the difficulty in locating
specific web services and sites and e-markets on Internet many publishers houses have turned to act as
intermediary service providers on net. For example Yahoo.com providing additional information for
books, games, brands, services, products etc.
4. The dynamic and just-in-time approach: in this approach, content is assembled in real-time and
transmitted in the format best suited to the user’s tastes and preferences.
The online content can be created in real time and transmitted to desired location and can be varied according
to user requirements and preferences. The dynamism is added as web pages customize according individual
taste and needs.
CNN.com Aajtak.com
Starnews.com
NDTV.com
LiveIndia.tv
ShahraSamay.com
BBCWorld.com
But above these excellent news sites the online news was failure.
A dynamic news delivery system requires:
1. The act of learning through a medium that both educates and entertains.
2. Any of various media, such computer software, that educate and entertain.
1. Easy to manipulate
2. Inexpensive to duplicate
3. Easily reproduced with no loss in quality
4. Easily distributed across the Internet.
Online Copyright Protection Methods
1. Identifying users and controlling which objects they can access (Host based access control)
2. Username / Password Restriction
3. Setting up the restricted directory.
1. Technical Issues
2. Organization Issues
3. Financial Issues
4. Political Issues
SCM Fundamental
“A Supply chain is a network of facilities and distribution options that performs the functions of
procurement of material, transformation of these materials into intermediate and finished products, and
distribution of these finished products to customers.”
1. The Supply – concentrates on how, where from and when raw materials are procured and supplied
to manufacturing
2. Manufacturing - converts these raw materials to finished products &
3. Distribution - These finished products reach the final customers through network of
distributors, warehouses and retailers.
Delivering the right product to the right place, at the right time and at the right price. It is one of the
leading cost saving and revenue enhancement strategies in use today. SCM deals with planning and
execution issues involved in managing a supply chain.
Functions of SCM
1. Supplier Management
2. Inventory Management
3. Distribution Management
4. Channel Management
5. Payment Management
6. Financial Management
7. Sales force productivity
Components of SCM