Transactions and Strategies: Economics for Management download pdf






















Some of the e-commerce questions and answers are mentioned below. You can download the QnA in e-commerce pdf form. Below is the list of e-commerce book recommended by the top university in India. Banking And Insurance study material includes e-commerce notes , e-commerce books , e-commerce syllabus , e-commerce question paper , e-commerce case study, e-commerce questions and answers , e-commerce courses in e-commerce pdf form.

Come on! Save my name, email, and website in this browser for the next time I comment. Skip to content Post last modified: 9 July Reading time: 8 mins read. Table of Contents 1 E-commerce Syllabus 2 B. Download PDF. Sharing is caring More. Guddi 30 Nov Reply. Leave a Reply Cancel reply Comment. Enter your name or username to comment.

Enter your email address to comment. Enter your website URL optional. Search this website Type then hit enter to search. Share via. In the above fig1 transaction cost decreases by the help of IT enable organization then traditional organization. Information technology also can reduce internal management cost. IT by reducing the cost of acquiring and analyzing information, permits organizations to reduce agency cost because it becomes easier for manager to observe a greater number of employees.

IT also expand the power and space of small organizations by allowing them to perform coordinating activities such as processing orders or keep track of inventory with very few clerks and managers.

More firms may operate as virtual organizations where work no longer is tied to geographical location. Virtual organization use networks to link people, assets, and ideas. Another behavioral approach views information systems as the outcome of political competition between organizational groups for influence over the organizations policies, procedures, and resources. Information systems potentially change an organizations structure, culture, politics, and work.

The Internet and Organizations -Internet WWW have an important impact on the relationships between firms and external entities and even on the organizational business process inside a firm. Interpersonal Roles 2.

Informational Roles 3. What are the alternatives? Which should you choose? Is this choice working? Models of Decision Making 1. Organizational Model Considers the structural and political characteristics of an organization.

Bureaucratic Model Whatever organization do is the result of routines and existing business process developed over years of active use. Political Model What an organization does is a key result of political bargains struck among key leaders and interest groups. Strategic Information System SIS It change the goals, operations, products, services or environmental relationships of organizations to help them gain and edge over competitors.

Systems that have these effects may even change the business of organizations. Strategic information system can be used at all organizations. Strategic information system can be used at all organizational levels and it is not restricted to strategic level system.

There are a number of information systems operating at different level of strategy the business, the firm and the industry level Santosh Dhungana MIS Version 1. There are various forces that effect on organizations ability to compete and therefore greatly influence firms business strategy.

There are threats from new market entrance and from substitute products and services. Customers and suppliers develop bargaining power. Traditional competitors constantly adopt their strategies to maintain their market positioning. In fig 2 shows the new competitive force model. The digital firm era requires a more dynamic view of the boundaries between firms, customers and suppliers with competition occurring among industry sets.

Information Systems and Business strategies Business can use strategic information systems to gain an edge over competitors. Such systems change organizations goal, business processes, products, services or environmental relationships driving them into firms of behaviour. Information systems can be used to support strategy at the business, firm and industry level.

At the business level of strstegy, information systems can be used to help firms become the low cost procedures, differentiate products and services or serve new markets. Value chain analysis is useful at the business level to highlight specific activities in the business where information systems are most like to have a strategic impact. At the firm level, information systems can be used to achieve new efficiencies or to enhance services can by trying together the operations of different business unit so that they can function as a whole or promoting the sharing of knowledge across business units.

At the industry level, systems can promote competitive advantage by facilitating cooperation with other firms in the industry, creating consortiums or communities for sharing information, exchanging transactions or coordinating activities. The competitive force model, information partnership and network economies are useful concepts for identifying strategic opportunities for systems at industry level.

Chapter 4 Electronic Business, Electronic commerce and The Emerging digital firms Internet technology and digital firm - The internet is rapidly becoming the infrastructure of choice for electronic commerce because it offers business an even easier way to link with other business and individual at a very low cost. New business models and value propositions - The internet has introduced major changes in the way companies conduct business.

The internet has changed that relationship. Some of the traditional channels for exchanging product information have become unnecessary or uneconomical and business models based on the coupling of information with products and services may no longer be necessary.

Such information can be found now abundance on the way, the investors can use financial websites to place their own trades directly for very small transaction fee. The changing economics of Information Richness Reach Fig: The changing economics of Information The internet and the web have vastly increased the total amount and quality of information available to all market participants, consumers and merchants alike.

It also reduces the search cost, the time and money spent locating a suitable product and determining the best price for that product. Information Asymmetry It is the situation where the relative bargaining power of two parties in a transaction is determined by one party in the transaction then other party.

The web has reduced the information asymmetry surrounding in the business. Before the internet business had to make trade-off between the richness and reach of their information. Richness It is the measurement of the depth and details of information that a business can supply to the customer as well as information the business collects about the customer. Rich It is the measurement of how many people a business can connect with and how many products it can offer to those people.

In the above figure, it shows the changing economics of information. In the past, companies had to trade-off between the richness and reach of their information. Internet connectivity and universal standards for information to large number of people reduce tradeoff. Internet Business Models 1. Virtual Storefront: Sells physical products directly to consumers or to individual business. Eg: amazon. Information broker: Provides product, pricing and availability information to individuals and business.

Generates revenue from advertising or from directing buyers to sellers. Eg: Edmunds. Transaction broker: Saves users money and time by processing online sales transactions, generating a fee each time a transaction occurs. Also provides information on rates and terms. Eg: expedia. Online market place: Provides a digital environment where buyers and sellers can meet, search for products, display products and establish prices for those products. Can provide online auctions or reserve auctions where buyers submit bids to multiple bids to multiple sellers to purchase at a buyer specified price as well as negotiated or fixed pricing.

Eg: ebay. Content provider: Creates revenue by providing digital content such as digital news, music, photos or video ever the wave. The customer may pay to access the content or revenue may be generated by selling advertising space.

Eg: cnn. Online service provider Provides online service for individuals and business. Generates revenue from subscription or transaction fees, from advertising or from collecting marketing information from users. Eg: xdrive. Virtual community Provides online meeting, place where people with similar interest can communicate and find useful information.

Eg: facebook. Portal Provides initial point of entry to the web along with specialized content and other services. Eg: yahoo. Business-to-consumer B2C electronic commerce involve electronic retailing of products and services directly to individual consumers. Such as Milpro. For example, eBay, the giant Web auction site. Until recently almost all e-commerce transactions took place over wired networks. Now cell phones and other wireless handheld digital appliances are internet enabled so that they can be used to send t email or access websites.

The use of handheld wireless devices for purchasing goods and services is called mobile commerce or m-commerce. Customer Centered Retailing 1. Direct Sales over the Web Manufacturers can sell their product and services directly to retail customers bypassing intermediaries such as distributor or retail outlets. Eliminating intermediaries in the distribution channel can significantly lower purchase transaction cost. Operator of virtual storefront such as amazon. Airlines can ell tickets directly to passengers through their own websites or through without paying commission to travel agents.

The removal of organizations or business process layers responsible for intermediary steps in a value chain is called disintermediation. The process of shifting the intermediary function in a value chain to a new source is called reinter mediation.

Fig:- Benefits of Direct sales over web 2. Interactive Marketing and personalization Marketers can use the interactive web pages to hold customers attention or to capture detail information about their taste and interest for one-to-one marketing. Some customer information may be obtained by asking visitors to register online and provide information about them but many companies are also collecting customer information by using software tools that track the activities of website visitors.

By using web personalization technology to modify the web pages presented to each customer , marketers can achieve the benefits of using individual sales peoples at dramatically lowers cost. Personalization can also help firms form lasting relationship with customers by providing individualized content.

Customers Self Service Many companies are using their websites and email to answer customer question to provide customers with helpful information. Automated self-service or other web based response to customer question cost a fraction of the price of using a customer service representation on the telephone.

New products are even integrated the web with customer where customer services problems have been traditionally solved over the telephone. How intranets support electronic business Intranets can help organizations create a richer, more responsive information environment.

Internet corporate applications based on the web page model can be made interactive using a Santosh Dhungana MIS Version 1. A principle use of intranets has been to create online repositories of information that can be updated as often as required.

Organizational benefits of intranet:- 1. Connectively: Accessible from most computing platforms. Can be tied to internal corporate systems and core transactions database. Can create interactive applications with text, audio and video. Easy to use, universal web interface. Low start-up cost. Richer, more responsible information environment. Reduced information distribution cost. Chapter 5 Redesigning the organization with information system 5. IT also includes changes in jobs skills management and organization.

In the socio technical philosophy, one cannot install new technology without considering the people who must work with it. When we design a new information system, we are re- designing organization. One important thing to know about building a new information system is that this process is one kind of planned organizational change.

System builders must understand how a system will affect the organization as a whole, focusing particularly the organizational conflict and changes in the locus of decision making. Managers must also consider how the nature of work group will change under the new system.

Systems can be technical successes but organizational failure because of a failure in the social and political process of building the system. Analyst and designer are responsible for ensuring that key participants members of the organization participate in the design process are permitted to influence the system ultimate shape.

Organization need to develop an information systems plan that supports their overall business plan. One specific project have been selected within the overall context of a strategic plan for the nosiness and the systems area, an information system plan can be developed. The plan serves as road map indicating the direction of systems development, the rationale, the current situation, the management strategy, the implementation plan, and the budget.

How to develop an Information System Plan A good information system plan should address the following topics 1. Current systems i. Major system supporting business functions and processes ii. Current infrastructure capabilities - Hardware, software - Database iii. Difficulties meeting business requirements iv. Anticipated future demands 4.

New developments i. New system projects - Project descriptions and business rationale ii. New infrastructure capabilities required - Hardware, software - Database - Telecommunication and Internet 5. Management strategy i. Acquisition plans ii. Milestone and timing iii. Organizational realignment iv. Internal reorganization v. Management controls vi. Major training initiatives vii. Personal strategy 6. Implementation plan i. Anticipated difficulties in implementation ii. Progress plan 7. Budget requirement i.

Requirements ii. Potential savings iii. Financing iv. Acquisition cycle 5. Two principal methodologies for establishing the essential information requirements of the organization as whole are enterprise analysis and success factors.

Enterprise Analysis Business Systems Planning Enterprise analysis argues that the firm's information requirements can only be understood by looking at the entire organization units, functions, processes, and data Santosh Dhungana MIS Version 1. Enterprise analysis can help identify the key entities and attributes of the organization's data.

The central method used in the enterprise analysis approach is to take a large sample of managers and ask them how they use information, where they get their information, what their environments are like, what their objectives are, how they make decision, and what their data needs are, and how they make decision and what their data needs are.

The results of these large surveys of managers are aggregated into sub units, functions, processes and data matrices. Data elements are organized into logical application groups- groups of data elements that support related sets of organizational processes. The weakness of enterprise analysis is that it produces an enormous amount of data i. Most of the interviews are conducted with senior or middle managers, but there is little effort to collect information from clerical workers and supervisory managers.

CSFs are shaped by the industry, the firm, the manager and the broader environment. An important premise of the strategic analysis approach is that there are a small number of objectives that managers can easily identify and on which information systems can focus. The principle methods used in CSFs analysis is personal interviews 3 or 4 with a number of top manager to identify their goals and resulting CSFs. Then systems are built to develop and deliver information of these CSFs.

The strength of the CSFs method is that it produces a smaller data sat to analyze then enterprise analyze analysis. Only top managers are interviewed and the questions focus on the small number of CSFs rather than a broad enquiry into what information is used or needed.

The CSFs method takes into account the changing environment with which organizations and managers must deal. Unlike enterprise analysis, the CSFs method of focuses organizational attention how information should be handed. Small of these system projects represents radical restructuring of their business processes, whereas others entail more incremental change.

This restructuring of their business processes is called business process re-engineering eliminating repetitive tasks. Work flow management:- The process of stream lining business procedures so that documents can e moved easily and efficiently is called workflow management. Steps in Effective Re-engineering - Senior management needs to develop a broad strategic vision that calls for re- designing business processes. Eg: if the objective of process redesign is to reduce time and cost in developing a new product or finding an order, the organization needs to measure the time and cost consumed by the unchanged process.

Following these steps it does not automatically guaranteed that re-engineering will always be successful. Fear of changes develops resistance, confusion and even conscious to undermine the change effort. The scope of re-engineering projects had widened, adding to their complexity.

TQM Total Quality Management A concept that makes quality control a responsibility to be shared by all people in an organization. Sin Sigma A specific measure of quality, representing 3. How the IS support quality improvements???? Simplifying the product r the production process. Benchmarking: setting strict standards for products, services or activities and measuring organizational performance against those standards.

Use customer demands as a guide to improve products and services. Reduce cycle time. Improve the quality and precision of the design 6. Increase the precision of production. System development The activities that go into producing an information systems solution to an organizational problem or opportunity are called system development. These activities consist of system analysis, system design, programming, testing, conversion and production and maintenance.

These activities usually take place in a sequential order. But some of the activities may need to be repeated or some may to taking place simultaneously depending on approach to system building i. Note that each activities interaction with the organization. Systems Analysis System analysis is the analysis of the problem that the organization will try to solve with an information system.

It consists of defining the problem, identifying it caused, specifying the solution, and identifying the information requirements that must be met by system solution. Generally it is the role of a system analyst to perform these jobs.

The system analysis creates a road map of the existing organization and systems, identifying the primary owner and users of data in the organization. In addition to these organizational aspects, the analyst also briefly describes the existing hardware and software that serve the organization.

Feasibility study The system analysis would include a feasibility study to determine whether that solution was feasible, or achievable, from a financial, technical and organizational stand point.

Normally the system analysis processes will identify several alternative solutions that the organization can pursue. Information Requirements A detailed statement of the information needs that a new system must specify; identifies who needs that information, when that information is needed, where and how the information is needed. System Design It is a detail of how a system will meet information requirements as determined by the system analysis.

Like blueprints of a building or house, it consists of all the specifications. Programming The process of translating the system specifications prepared during the design stage into program code. Testing The exhaustive and through process that determines whether the system produces the desired results under know conditions. Sometimes called program testing.

Unit testing in multiple units results integration test. Alpha test abd Beta test encomprise acceptance test. Conversion Conversion is the process of changing form the old system to the new system.

Four main conversion strategies be employed: the parallel strategy, the direct cutover strategy, the pilot study strategy, and the phased approach strategy.

Production and Maintenance After the new system is installed and conversion is complete, the system is said to be in production. During this stage the system will be reviewed by both user and technical specialists to determine how well it has met its original objectives and decide whether any revisions or modifications are in order. Changes in hardware, software, documentation, or procedures to production system to correct errors, meet new requirements, or improve processing efficiency are termed maintenance.

The introduction of new information technology has a ripple of effect, raising new ethical, social and political issues that must be dealt with on the individual, social and political lavels. Information technology and information systems raise new ethical questions for both individuals and societies because they create opportunities for intense social change and thus threaten existing distributions of power, money, rights, and obligations.

Like other technology such as steam engines, electricity, telephone and radio, IT can be used to commit crimes and threaten social values. The development of information technology will produce benefits for many and costs for others. So ethical and socially responsible course of actions should be understood and identify for using information systems.

Its relation can be shown as above diagram. The relation is the result of ripple effect. From ethical issues social issues are generated which in terms generates political issues. What information rights do individuals and organizations posses with respect to information about them self?

What can they protect? Accountability and Control Who can and will be held accountable and liable for the harm done to individual and collective information and property rights? System Quality What values and system quality as well as standards of data should we demand to protect individual rights and the safety of society? Quality of Life What values should be preserved in information and knowledge based society?

What institution should we protect from violation? What cultural values and practices are supported by the new information technology? Trend Impact 1 Computing power double every 18 months More organization depends on computer system for critical operations. Responsibility: Accepting the potentials costs, duties and obligation for the decision one works.

Accountability The mechanism for accessing responsibility for decision mode and action taken. Liability The existence of laws that permit individual to recover this damage done to them by other actors, systems or organizations.

Identify and describe clearly the facts. Define the conflicts or determine and identify the higher order values involved. Identify the stakeholder. Identify the option that you can reasonably take.

Identify the potential consequences of your option. The moral dimension of IS i. Information Rights:- Privacy and Freedom in the internet age. Privacy:- The claim of individuals to be left alone, free from interference from other individuals, organizations or the state. Laws ii. Users can use P3P to select the level of privacy they wish to maintain when interacting with the website.

Privacy Protection Tools a. Managing Cookies b. Blocking ADS Control ads that pop up based user profiles and prevent ads from collecting or sending information. BHOCop, Adsubstract. Encrypting email or data Scramble email or data so that they cannot be read.

Anonymizers Allow users to surf the web without being identified or to send anonymous email. Example: anonymizer. Property Rights : Intellectual Property a. Trade secrets b. Copyright c. Patents d. Trade Secret Any confidential business information which provides an enterprise a competitive edge bay be considered a trade secret.

Trade secrets encompass manufacturing or industrial secrets and commercial secrets. The subject matter of trade secrets is usually defined n broad terms and incudes sakes method distribution methods, consumer profiles, advertising strategies lists of suppliers and clients and manufacturing processes.

A trade secret is an invented formula practice, process, design, instrument pattern commercial method or compilation of information which is not generally known or reasonably ascertainable by others and by which a business can obtain an economic advantage over competitors or customers.

Copyright It is a legal right created by the law of a country, that grants the creator of an original work exclusive rights to its use and distribution usually for a limited time, with the intention of enabling the creator e. The photographer of a photograph or the author of a book to receive compensation for their intellectual effort. Copyright is a form of intellectual property, applicable to any expressed representation of a creative work.

It is often shared among multiple authors, each of whom holds a set of rights to use or license the work and who are commonly referred to as right holders. Patents It is set of exclusive rights granted by a sovereign state to an inventor or assign for a limited period of time in exchange for detailed public disclosure of an invention An invention is a solution to a specific technology problem and is a product or a process.

Patents are a form of intellectual property. A patent may include many claims, each of which defines a specific property rights. It criminalizes production and dissemination of technology, devices or services intended to circumvent measures commonly known as digital rights management or DRM that control access to copyrighted works.

It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself.

In addition, the DCMA heightens the penalties for copyright infringement on the internet. Accountability, Liability and Control It is challenging existing liability law and social practices for holding individuals and institutions accountable. System Quality Three principle sources of poor system performance are:- 1. Software bugs and errors.

Hardware or facility failure caused by natural or other causes. Poor input data quality. Quality of Life Equity access and boundaries: Computer and IT potentially can destroy valuable elements of our culture and society even while they bring us benefits.

If there is a balance of good and bad consequences of using information system, whom do we hold responsible for bad consequences. Some negative social consequences of social system are a. Balancing power: Center vs. Periphery b. Rapidity of change: Reduced response time to competition.

Maintaining boundaries: Family, work and leisure. Dependence and Vulnerability: Today our business, governments, schools and private associations such as churches are incredibly dependent on information system and on therefore highly vulnerable if these systems should fail.

Computer crime abuse f. Employment: re-engineering loss g. Equity and Access: Increasing racial and social class gaps Eg: Digital divide h. Why systems are vulnerable???? Fig Telecommunication networks are highly vulnerable to natural failure of hardware and software and to misuse by programmers, computer operators, maintenance staff and end-users.

It is possible to tap communications lines and illegally intercept data. High speed transformation over twisted wire communication channels causes interfaces called crosstalk.

Radiations can disrupt a network at various point as well. Internal threats :Employees: see urself Hacker: A hacker is a person who gains unauthorized access to a computer network for profits, criminal mischief, or personal pleasure. Security: Policies, procedures and technical measures used to prevent unauthorized access, atteraction, theft or physical damage to information system. Types of Information System Controls Controls:- Controls consists of all the methods, policies, and organizational procedures that ensure the safety of the organizations assets, the accuracy and reliability of its accounting records, and the operational adherence to management standards.

Generic Control General controls govern the design, security and use of computer programs and the security of data files in general throughout the organizations IT infrastructure. General controls apply to all computerized applications and consist of a combination of hardware, software and manual procedures that create an overall control environment.

General controls include software controls, physical hardware controls, computer operations control, data security controls, controls over the systems implementation process, and administrative control. Most of these controls are designed and maintained by information systems specialist except data security controls and administrative controls which require input and oversight from end users and business managers.

Hardware Control Ensure that computer is physically secure and check for equipment malfunction. Computer equipment should be specially protected against fire and extreme temperature and humanity. Organizations that are critically dependent on their computers also must make provision for backup or continued operation to maintain constant services. Computer Operations Control Oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data.

They include controls over the setup of computer processing jobs and computer operations, and backup and recovery procedures for processing that and abnormally. Data Security Control Ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change or distribution while they are in use or in storage. Administrative Control Formalized standards, rules, procedures and control disciplines to ensure that organizations general and application controls are properly executed and enforced.

Implementation Control Audit the systems development process at various points to ensure that the process is properly controlled and managed. Application Controls Application controls are specific controls unique to each computerized applications such as payroll or order processing.



0コメント

  • 1000 / 1000