版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
BUSINESS4
B4InformationSystemandCommunications
【本章概述】
Organizationalneedsassessment
Systemsdesignandotherelements3.Security
Theinternet:Implicationsforbusiness
Typesofinformationsystemsandtechnologyrisks
Disasterrecoveryandbusinesscontinuity1OrganizationalNeedsAssessment
Introductiontoinformationsystemsandcommunications
Datacapture
Processing
Reporting
Roleofinformationtechnologyinbusinessstrategy
IntroductiontoinformationsystemsandcommunicationsIntroductiontoInformationSystemsandCommunications
Components
Hardware,software,data,network,people
Hardware
Physicalcomputeranddevices
Software
Systemsoftware
DOS,Windows,Mac
Programminglanguages
C,C++,Java
Applicationsoftware
MSoffice,auditprogram
Network
Cable,fiber,wireless,satellites
People
ITdepartmentroles
Date/Info.
Data
Rawfacts
Information
Processedandorganizeddata
BusinessInformationSystem
Categories
Transactionprocessingsystems
Managementinformationsystems
Decisionsupportsystems
Executiveinformationsystems
PrimaryRoles
Processdetaileddata
Provideinfo.usedformakingdailydecisions
Provideinfo.usedfordevelopingbusinessstrategies
Takeordersfromcustomers
DataCapture
DataCaptureTechniques
Manualentries–humanerrors
Automation-moreaccurate
DataAccuracy
Well-designedinputscreens–validation
Auto-entryfields–auto-numbering
ProcessingCollectProcess
StoreTransformDistribute
Objectives
Valid(existence,completeness)
Classify
Value(accuracy)
Cutoff
Presentation
TransitionCycles
Revenuecycle
Expenditurecycle
Productioncycle
Humanresources/payrollcycle
FinancingCycles
RevenueCycle
Customerordersandcreditverification
Accountsreceivable
Cashreceipts
ExpenditureCycle
Purchasing
Inventorycontrol
Accountspayable
Cashdisbursements
ProductionCycle
Productiondesignandproductionplanning
Productionmanufacturing
Inventorycontrol
HumanResourcesCycle
Humanresources
Timeandattendance
Payrolldisbursements
Payrolltaxreporting
FinancingCycle
Issuanceofstockordebtfinancing
Paymentofdividendsorinterests
DataprocessingCycle
Datainput
Issues
Alltransactionsofinterestareaccountedfor(completeness)
Accountedforinthecorrectaccount(classification)
Peopleoriginatingthetransactionsareidentified
Verification
(vouch)
Sourcedocuments(purchaseorder)
Turnarounddocuments
Procedures
Prenumbered–completeness
Efficientlydesigned
Verifiedpriortoacceptance
Datastorage
Methods
Journalsandledgers
Coding
Sequencecodes
Blockcodes
Groupcodes
Chartsofaccounts
ComputerStorage
Entity–thesubjectofthestoredinformation
Attributes–specificitemsofinterestforeachentity
Field–asinglepieceofinformation(anattribute)oftheentity
ComputerStorage
Entity–thesubjectofthestoredinformation
Attributes–specificitemsofinterestforeachentity
Field–asinglepieceofinformation(anattribute)oftheentity
Record–allattributesaboutasingleinstanceofanentity
Datavalue–thecontentsoffields
File–recordsaregroupedintofiles
·Masterfile–similartoledger
·Transactionfile–similartojournal
Database–filesthatareinterrelatedancoordinated
Sequencecode
Blockcode
Groupcode
记字001
收字001
收字010001
记字002
收字002
收字010002
记字003
付字001
收字021001
记字004
付字002
收字021002
记字005
转字001
付字010001
转字002
付字010002
付字021001
DataProcessing
Functions
Addition–addingnewrecordstothedatabase
Updating–revisionstoamasterfile
Deletion–removalofrecordsfromdatabase
Methods
Batchprocessing–updateperiodically
Onlinereal-timeprocessing–updateinreal-time
Informationoutput
Documents(operationaldocuments)
Reports–internal,external
Query–generateuponrequest
Batchprocessing
OLRTprocessing
Transactionsarecollectedandgroupedbytypeof
transaction,andprocessedperiodically
Masterfilesareupdatedasthe
transactionsareentered
Alwaysatimedelay
Immediateprocess(nodelay)
Step1,createtransactionfile
Step2,updatethemasterfile
1step
Comparemanualandcomputer-generatedbatchcontrol
totals
Oftenusedintraditionalsystems
Oftenusedinnetworkedsystems
Centralizedprocessing
Decentralizedprocessing
Maintainalldataandperformalldata
processingatacentrallocation
Computingpower,applications,andworkare
spreadoutovermanylocations
·Enhanceddatasecurity
·Moreconsistent
Reducingtheprocessingburdenonthecentral
computer
·Possiblehighcost
·Reductioninlocalaccountability
·Bottlenecks
·Delayinresponsetime
·Increasedvulnerability
Reporting
Periodicscheduled
reports
Madeavailableonaregularbasistoendusers
E.g.,monthlyfinancialstatement
Exceptionreport
Producedwhenaspecificconditionorexceptionoccurs
E.g.,overdueA/Rreport
Demandreport
Availableondemand(pull)
Pushreport
Areportwindowdisplaysup-to-datereportseverytimeanenduserlogs
intoacomputernetwork
AdHocreport
Createdondemand,withouthavingtogetasoftwaredeveloperinvolved
Query
Dashboardreport
Presentsummaryinformationnecessaryformanagementaction
XBRL
XBRLisanopen,royalty-free,internet-basedinformationstandardfor
businessreportingoffinancialdata.
XBRLdefinesthedatasothatuserscancreatemacrosorotherprograms
thatcanautomateanalysisofthedata.
RoleofInformationTechnologyinBusinessStrategy
Technologydecisionsshouldbeaninputtothestrategyprocess,helpingtodefineinnovationsandseekingtoincreaserevenue,ratherthanmerelyanafter-the-facttoolforachievinggoals.
Commonprinciplesoftechnology-drivenstrategydevelopment
·Technologyisacoreinputtothedevelopmentofstrategy;
·Strategydevelopmentmustbeacontinualprocess
·Innovativeemergingbusinessopportunitiesmustbemanagedseparatelyanddifferently;
·Technologyhasthepowertochangelong-heldbusinessassumptions;
·Managedfromtwoperspectives:1)itsabilitytocreateinnovationinexistingbusinesses;2theabilityofemergingtechnologiestocreatenewmarkets/products;
·Thefocusshouldbeoncustomerprioritiesaswellasinternalefficiencies
Theroleoftechnologyininformationandcommunications
Theselectionofspecifictechnologiestosupportenterpriseriskmanagementforanorganizationtypicallyisareflectionofthe:
·Entity’sapproachtoenterpriseriskmanagementanditsdegreeofsophistication;
·Typesofeventsaffectingtheentity;
·Entity’soverallinformationtechnologyarchitecture;
·Degreeofcentralizationofsupportingtechnology
Enterpriseriskmanagementincludesanumberofkeycomponentsthatenableanorganizationto
identify,assess,andrespondtorisk.
Informationmanagementapproaches
Shareinformationthroughouttheorganization
Availabilityandusefulnessofdata
Greaterconnectivityandusabilityofdata
Typesofeventsaffectingtheentity
Adverseorpositive
Informationtechnologyarchitecture
Customizedsystems
Openarchitecture
【Question1】Whichoneofthefollowingstatementsaboutanaccountinginformationsystem(AIS)isincorrect?
AnAISsupportsday-to-dayoperationsbycollectingandstoringdataaboutanorganization'stransactions.
TheinformationproducedbyAISismadeavailabletoalllevelsofmanagementforuseinplanningandcontrollinganorganization'sactivities.
AnAISisbestsuitedtosolveproblemswherethereisgreatuncertaintyandill-definedreportingrequirements.
AnAISisoftenreferredtoasatransactionprocessingsystem.
『正确答案』C
SystemDesignandOtherElements
Businessprocessdesign
Informationtechnology(IT)controlobjectives
Roleoftechnologysystemsincontrolmotoring
Operationaleffectiveness
ITresponsibilitiesandsegregationofduties
BusinessProcessDesign
Categoriesofbusinessinformationsystems
Transactionprocessing
systems
Processandrecordtheroutinedailytransactionsnecessarytoconduct
business
Management
informationsystem
Provideuserspredefinedreportsthatsupporteffectivedecisions
Decisionsupport
systems
ExtensionofanMISthatprovidesinteractivetoolstosupportdecision
making
Executiveinformation
systems
Seniorexecutiveswithimmediateandeasyaccesstointernaland
externalinformationtoassistinstrategicdecisionmaking
Systemdevelopmentlifecycleprovidesaframeworkforplanningandcontrollingthedetailedactivitiesassociatedwithsystemsdevelopment.
Waterfallapproach
―Analysis
―Planning
―Design
―ImplementationPrototypingmodel
―Prototype
―Approximationoffinalsystemisbuilt,tested,reworked
―Completesystemisdevelopedfromtheprototype
1.Systemsanalysis
Definethenatureandscopeoftheproject
In-depthstudy,determinetechnologicalandeconomicfeasibility
Identifytheinformationneedsofsystemusers
Documenttheinformationneedsofsystem
Summarizereportandsubmit
2.Conceptualdesign
Identifyandevaluateappropriatedesignalternatives(decideshowtomeetuserneeds)
—Buyingsoftware
—Developingsoftwarein-house
—Outsourcingsystemsdevelopment
3.Physicaldesign
Beginningthedesignprocess(writecomputerprograms)
4.Implementationand
conversion
5.Training
6.Testing
7.Operationsand
maintenance
Participantsinbusinessprocessdesign
Management
Supportandencouragement
Accountants
Determineinformationneedsandrequirements
Helpmanagesystemdevelopment
Takeanactiveroleindesigningsystemcontrols,periodically
monitoringandtestingthesystem
Informationsystems
steeringcommittee
Planandoverseetheinformationsystemsfunctionandaddressthe
complexitiescreatedbyfunctionalanddivisionalboundaries
Projectdevelopment
team
Responsibleforthesuccessfuldesignandcomplementationofthe
businesssystem
Externalparties
Majorcustomersorsuppliers
InformationTechnology(IT)ControlObjectives
TheControlObjectivesforInformationandRelatedTechnology(COBIT)frameworkprovidesmanagers,auditorsandinformationtechnologyuserswithasetofmeasures,indicators,processesandbestpracticestomaximizethebenefitofinformationtechnology.
BusinessObjectives
Effectivedecisionsupport
Efficienttransactionprocessing
Compliance(e.g.reportingrequirements,securityrequirements)
GovernanceObjectives
Strategicalignment–linkagebetweenbusinessandITplans
Valuedelivery–promisedbenefits,satisfyingcustomers,optimizingcosts
Resourcemanagement–optimizationofknowledgeandinfrastructure
Riskmanagement-ERM
Performancemeasurement–tracingandmonitoringstrategyimplementation,projectcompletion,resourceusage,processperformance,and
servicedelivery
InformationCriteria
Integrity
Accuracy,completeness,andvalidity
Confidentiality
Protectionofsensitiveinformationfromunauthorizeddisclosure
Efficiency
Lowcostwithoutcompromisingeffectiveness
Reliability
Informationrepresentswhatitpurportsto
Availability
Providingcurrentandfutureinformationasrequired
Compliance
Complywithpolices,laws,regulationsandcontractualarrangements
Effectiveness
Relevantorpertinent
DomainsandProcessesofCOBIT
PlanandOrganize
Providesdirectiontosolutionandservicedelivery
Acquireand
ProvidessolutionsforITneeds
Implement
DeliverandSupport
ProvidesITservicestousers
MonitorandEvaluate
Ensurethatthedirectionprovidedintheplanningandorganizingsteps
arefollowed
RoleofTechnologySystemsinControlMonitoring
GeneralControls
Ensureanorganization’scontrolenvironmentisstableandwell-managed
Systemsdevelopmentstandards,securitymanagementcontrols,change
managementprocedures,softwareacquisition,development,operationsandmaintenancecontrols
ApplicationControls
Prevent,detect,andcorrecttransactionserrorandfraudandare
application-specific,providingreasonableassuranceastosystem
Accuracy,completeness,validity,authorization
InputControls
Datavalidationatthefieldlevel
Prenumberingforms
Well-definedsourcedatapreparationprocedures
ProcessingControls
Datamatching–matchingtwoormoreitemsofdatapriortotakinganaction
Filelabels–ensuresthecorrectandmostcurrentfilesareupdated
·External–readablebyhumans
·Internal–machine-readable
Recalculationofbatchtotals
Cross-footingandzerobalancetests
Databaseprocessingintegrityprocedures
OutputControls
Userreviewofoutput–examinationbyusers
·Reasonableness,completenessandverification
Reconciliationprocedures
Externaldatareconciliation
Outputencryption–authenticityandintegrity
·Reducethechancefordatainterception
OperationalEffectiveness
Evaluatingtheongoingeffectivenessofcontrolpoliciesandproceduresprovidesaddedassurancethatcontrolsareoperatingasprescribedandachievingtheirintendedpurpose.
Diagnosticcontrolsystemvs.actualperformance
Diagnosticcontrolsaredesignedtoachieveefficiencyinoperationsofthefirmtogetthemostfromresourcesused.
PrinciplesofControl
StrategicMasterPlan
Amulti-yearstrategicmasterplanshouldbedevelopedandupdated
annually.
Theplanshouldshowtheprojectsthatmustbecompletedtoachieve
long-rangcompanygoalsandaddressthecompany'shardware,software,personnel,andinfrastructurerequirements
Dataprocessing
schedule
Alldataprocessingtasksshouldbeorganizedaccordingtoadata
processingschedule
Steeringcommittee
Guideandoverseesystemsdevelopmentandacquisition
Systemperformance
measurements
Throughput,utilization,responsetime
ITResponsibilitiesandSegregationofDuties
SystemAnalyst
Internallydevelopedsystem
·Determinessystemrequirements
·Designstheoverallapplicationsystem
·Determinesthetypeofnetworkneeded
Purchasedsystem
·Integrateswithexistinginternalandpurchasedapplications
·Providestraining
ComputerProgrammer
Applicationprogrammer–writingand/ormaintainingapplication
programs
Systemprogrammer–installing,supporting,monitoring,andmaintaining
theoperatingsystem
Computer
Operator
Schedulingandrunningprocessingjobs
ITSupervisor
ManageITdepartment
FileLibrarian
Storeandprotectprogramsandtapesfromdamageandunauthorizeduse
DataLibrarian
Custodyofandmaintainstheentity’sdataandensuresthatproductiondata
isreleasedonlytoauthorizedindividualswhenneeded
Security
Administrator
Responsiblefortheassignmentofinitialpasswordsandoftenthe
maintenanceofthosepasswords
SystemAdministrator
Databaseadministrator–responsibleformaintainingandsupportingthe
databasesoftwareandperformingcertainsecurityfunctions
Networkadministrator–supportcomputernetworksthroughperformance
monitoringandtroubleshooting
Webadministrator–responsibleforinformationonawebsite
Data
Administrator
Responsibleforthedefinition,planning,andcontrolofthedatawithina
database
DataInputClerk
Prepare,verify,andinputdatatobeprocessed(endusers)
Hardware
Technician
Setsupandconfigureshardwareandtroubleshootsandresultinghardware
problems
EndUser
Workersinanorganizationwhoenterdataintoasystemorwhousethe
informationprocessedbythesystem
SegregationofDuties
―Systemanalystsvs.computerprogrammers
―Computeroperatorsvs.computerprogrammers
―Securityadministratorsvs.computeroperatorsvs.computerprogrammers
【Question2】Allofthefollowingsareexamplesofadecisionsupportsystem(DSS)exceptfora:
Financialmodelingapplication.
Transactionprocessingsystem.
Databasequeryapplication.
Sensitivityanalysisapplication.
『正确答案』B
【Question3】Whichoneofthefollowingstatementsaboutanexecutiveinformationsystem(EIS)isincorrect?TheEIS:
Providestopexecutiveswithimmediateandeasyaccesstoinformationinahighlyinteractiveformat.
Helpsexecutivesmonitorbusinessconditionsingeneralandassistsinstrategicplanningtocontrolandoperatethecompany.
Isdesignedtoacceptdatafrommanydifferentsources;tocombine,integrate,andsummarizethedata;andtodisplaythisdatainaformatthatiseasytounderstandanduse.
Islikelytobeoneofthemostwidelyusedandthelargestoftheinformationsubsystemsinabusinessorganization.
『正确答案』D
【Question4】Whichofthefollowingisapersonwhoentersdataorusestheinformationprocessedbyasystem?
HardwareTechnician.
NetworkAdministrator.
SoftwareDeveloper.
User.
『正确答案』D
Security
Technologiesandsecuritymanagementfeatures
Policies
TechnologiesandSecurityManagementFeatures
―Safeguardingrecordsandfiles
―Backupfiles
―Uninterruptedpowersupply
―Programmodificationcontrols
―Dataencryption
―Managingpasswords
―Useraccess
Safeguardingrecordsandfiles
―Allcriticalapplicationdatashouldbebackedupandstoredinasecureoff-sitelocation
BackupFiles
Son-father-grandfatherconcept
Mostrecentfileiscalledtheson,secondmostrecentfileis
calledthefather,precedingfileiscalledthegrandfather.
Previousfile+transactionsprocess=masterfile
Alwaysatleasttwobackupfilesthatcanbeusedtore-createthe
destroyedfile
Backupofsystemsthatcanbe
shutdown
Filesordatabasethathavechangedsincethelastbackupcanbe
backedup
Backupofsystemsthatdonot
shutdown
Applyingatransactionlogreapplythosetransactionstoget
backtothepointimmediatelybeforethefailure
Mirroring
Useofabackupcomputertoduplicatealloftheprocessesand
transactionsontheprimarycomputer.(expensive)
UninterruptedPowerSupply(UPS)
Adevicethatmaintainsacontinuoussupplyofelectricalpowertoconnectedequipment
ProgramModificationControls
·Controlsdesignedtopreventchangesbyunauthorizedpersonnel
·Controlsthattrackprogramchangessothatthereisarecordofwhatversionsofwhatprogramsarerunninginproductionatanyspecificpointintime
DataEncryption
Process
Usingapasswordoradigitalkeytoscrambleareadable(plaintext)messageintoanunreadable(ciphertext)message.
Theintendedrecipientofthemessagethenusesanotherdigitalkeytodecryptor
deciphertheciphertextmessagebackintoplaintext.
Encryption
Key
Thelongerthelengthofthekey,thelesslikelyisthemessageortransactiontobe
decryptedbythewrongparty
Methods
Digitalcertificates
Digitalsignatures
E-Signatures
ManagingPasswords
Basicrule
Everyaccountmusthaveapassword
PolicyCharacteristics
Length–requireaminimumof7or8characters
Complexity–featurethreeofthefour
·Uppercasecharacters
·Lowercasecharacters
·Numericcharacters
·ASCIIcharacters
Passwordage–notruestandard
·90-dayisrecommended
·Administrativepasswordsshouldbechangedmorefrequently
Passwordreuse–notruestandard
·Shouldnotbereuseduntilasignificantamountoftimehaspassed
UserAccess
Becauseuseraccountsarethefirsttargetofahacker,caremustbeusedwhendesigning
proceduresforcreatingaccountsandgrantingaccesstoinformation
Initialpasswordsandauthorizationforsystemaccess
HRshouldgeneratetherequestforauseraccountand
systemaccessrights.
Theinformationsecurityofficermayneedtoapprove
theaccount
Changesinposition
CoordinationofeffortbetweenHRandIT
Disableaccountswhenanemployeeleavesan
organization
Policies
Policiesarethemostcrucialelementinacorporateinformationsecurityinfrastructureandmustbeconsideredlongbeforesecuritytechnologyisacquiredanddeployed.
SecurityPolicyDefined
Adocumentthatstateshowanorganizationplanstoprotectitstangibleandintangibleinformationassets.
·Managementinstructions
·High-levelstatementsprovideguidance
·Generalizedrequirementsthatmustbewrittenandcommunicatedtocertaingroups
SecurityPolicy
Goal
Requirepeopletoprotectinformation,whichinturnprotectstheorganization,
itsemployees,anditscustomers
TypesofPolicy
Program-levelpolicy
MissionstatementfortheITsecurityprogram
Program-frameworkpolicy
TheITsecuritystrategy
Issue-specificpolicy
Addressspecificissuesofconcern
System-specificpolicy
Focusonpolicyissuesthatexistforaspecific
system
【Question5】Whichofthefollowingisthestepwheretheintendedrecipientconvertstheciphertextintoplaintext?
Decryptionordecipherment.
Encryption.
Digitalcertificates.
PKI.
『正确答案』A
【Question6】IfFriday'sfileisdestroyed,anewFridayfilecanbereproducedbyusingtheFridaytransactionfile(whichisstoredseparately)andThursday'sfile.Thebackupconceptthatservesasthefoundationforthisprocessisoftencalled:
CriticalApplicationBackup.
DiskOnlyBackup.
Son-Father-GrandfatherConcept.
BackupsofSystemsThatDoNotShutDown.
『正确答案』C
【Question7】Useraccountsarethefirsttargetofahackerwhohasgainedaccesstoanorganization'snetwork.Whichofthefollowingisatruestatementwhenmaintaininguseraccessaccounts?
Itisimportanttohaveproceduresinplacetoaddresspromotionsandlateralmoves.
NoprivilegesshouldbegranteduntilauthorizationiscompletedbyHumanResourcesandtheITSecurityOfficer.
Theremustbeamechanismtodisableaccountsshouldrelationsendbetweentheorganizationandanyofitsemployees.
Alloftheanswerchoicesarecorrect.
『正确答案』D
TheInternet:ImplicationsforBusiness
Electroniccommerceandbusiness
Electronicdatainterchange(EDI)
Opportunitiesforbusinessprocessreengineering
Business-to-business(B2B)
B2BVS.B2C
Enterpriseresourceplanningsystems(ERP)
Supplychainmanagementsystem(SCM)
Customerrelationshipmanagementsystem(CRM)
OtherE-commercetechnologies
Effectsofinternetevolutiononbusinessoperationsandorganizationcultures
Variousdefinitions
ElectronicCommerceandBusiness
Electroniccommerce(E-commerce)–completionofexchange(buyingandselling)transactionsuseaprivatenetworkortheinternet.
Electronicbusiness(E-business)–referstoanyuseofinformationtechnology,particularlynetworkingandcommunicationstechnology,toperformbusinessprocessesinanelectronicform,mayormaynotrelatetothepurchaseandsale.
ElectronicDataInterchange(EDI)
EDIisthecomputer-to-computerexchangeofbusinesstransactiondocumentsinstructuredformatsthatallowthedirectprocessingofthedatabythereceivingsystem.
Benefit–reducedhandlingcostsandincreasedprocessingspeed
Requirement-standarddataformat
Mapping
Theprocessofdeterminingthecorrespondencebetweendataelementsinan
organization'sterminologyanddataelementsinstandardEDIterminology
Standards
XML(extensiblemarkuplanguage)–transmitdatainflexibleformatsinsteadofthestandardformatsofEDI.
XMLtellssystemstheformatofdataandalsowhatkindofinformationthedatais.
Communications–directlinksbetweenorganizations
Intermediary
Valueaddednetworks(VANs)orovertheInternet
Internet-basedEDIisreplacingVAN-basedEDIbecauseitisconsiderablycheaper
CostsofEDI
Legalcosts
Costsassociatedwithmodifyingandnegotiatingtrading
contractswithtradingpartnersandwithcommunicationsproviders
Hardwarecosts
Communicationsequipment
Costsoftranslationsoftware
Costofacquiring/developingmaintainingthetranslation
software
Costsofdatatransmission
Hasbeendecreasing
Processreengineeringand
employeetrainingcosts
Costsassociatedwithsecurity,
monitoringandcontrolprocedures
EDIControls
AudittrailsinEDIsystemsshouldinclude:
·Activitylogsoffailedtransactions
·Networkandsender/recipientacknowledgments
EDIRisks
Greatestriskinanorganization’suseofEDIisunauthorizedaccesstotheorganization's
systems
ComparisonofEDIandE-Commerce:
Item
EDI
E-Commerce
Cost
Moreexpensive
Lessexpensive
Security
Moresecure
Lesssecure
Speed
Slower(Batch)
Faster(OLRT)
Network
VAN(private)
Internet(public)
OpportunitiesforBusinessProcessReengineering
BusinessProcessReengineering
Definition
Theanalysisandredesignofbusinessprocessesandinformationsystemstoachieve
significantperformanceimprovements
Challenges
Tradition–cultureandbeliefs
Resistance
Timeandcostrequirements
Lackofmanagementsupport
Skepticism
Retraining
Controls
Business-To-Business(B2B)
B2B:businesssellsitsproductstootherbusinessesB2C:businesssellsitsproductstothepublic
C2C:consumerssellproductstootherconsumers
ImportanceofB2B
B2Bcommercesitesmakepurchasingdecisionsfaster,simpler,safer,morereliable,andmore
costeffective.
Advantages
Speed
Timing
Personalization
Security
Reliability
B2BVS.B2C
B2Baremorecomplex
OfteninvolvemanymoreparticipantsOfteninvolvemorecomplexproducts
RequiretheorderfulfillmentbemorecertainandpredictablePaymentmechanismsaremuchmorecomplex
EnterpriseResourcePlanningSystems(ERP)
ERP
Definition
Across-functionalenterprisesystemthatintegratesandautomatesthemanybusinessprocessesandsystemsthatmustworktogetherinthemanufacturing,logistics,
distribution,accounting,finance,andhumanresourcefunctionsofabusiness
Functions
Storeinformationinacentralrepository
Actastheframeworkforintegrating
Vitalcross-functionalinformationassistmanagersinthedecision-makingprocess
SupplyChainManagementSystem(SCM)
SCMisconcernedwiththefourimportantcharacteristicsofeverysale:
What
Thegoodsreceivedshouldmatchthegoodsordered
When
Thegoodsshouldbedeliveredonorbeforethedatepromised
Where
Thegoodsshouldbedeliveredtothelocationrequested
Howmuch
Thecostofthegoodsshouldbeaslowaspossible
SCMObjectives–achieveflexibilityandresponsiveness
Planning
Demandforecasting,productpricing,inventorymanagement
Sourcing
Procurementandcreditandcollections
Making
Productdesign,productionscheduling,facilitymanagement
Delivery
Ordermanagementanddeliveryscheduling
CustomerRelationshipManagementSystem(CRM)
CRM
Definition
Providesalesforceautomationandcustomerservicesinanattempttomanage
customerrelationships
Objectives
Increasecustomersatisfaction
Increaserevenueandprofitability
OtherE-CommerceTechnologiesElectronicfundstransfer
Applicationserviceproviders
ElectronicFundsTransfer(EFT)
Definition
Aformofelectronicpaymentforbankingandretailingindustries
Third-party
vendor
Oftenprovidedbythird-partyvendorwhoactsastheintermediarybetweenthe
companyandtheba
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024-2025学年度反射疗法师大赛理论常考点试卷含完整答案详解(全优)
- 中式酒楼施工方案(3篇)
- 健身营养营销方案(3篇)
- 医院安全防范定期自查自纠制度
- 监狱远程探视问题研究报告
- 2026年陕西机电职业技术学院单招职业技能测试题库附参考答案详解(黄金题型)
- 2026年闽南理工学院单招综合素质考试题库含答案详解(满分必刷)
- 高炉布料规律研究报告
- 2026年青岛职业技术学院单招职业倾向性测试题库含答案详解(培优a卷)
- 2026年陕西电子信息职业技术学院单招职业技能测试题库带答案详解(预热题)
- 地调局考试试题及答案
- 《交易心理分析》中文
- 医院无菌技术操作规范
- 2025年驻马店职业技术学院单招(计算机)测试模拟题库及答案解析(夺冠)
- 自动化生产线安装调试规范标准
- 2025年专升本产品设计专业产品设计真题试卷(含答案)
- 2025年市市直事业单位招聘考试《公共基础知识》(主观题)试题及答案解析
- 历年中小学校长招聘考试真题及答案
- 2025中国南水北调集团新能源投资有限公司第二批社会招聘笔试历年参考题库附带答案详解
- 基于图像处理的糖晶体识别技术:原理、方法与应用研究
- 电动葫芦事故案例培训
评论
0/150
提交评论