savitribai phule pune university third ... - wordpress.com€¦ · standards by the developers and...

36
Savitribai Phule Pune University Third Year of Computer Engineering (2015 Course) 310244: Information Systems and Engineering Economics Unit-1 Basic of Management Theory & Practices Syllabus:- Role of Information Systems in Organizations, The Information System Manager and his challenges, Concepts of Information Systems, Information Systems and Management Strategy Case Studies - May Include Information Systems in the Indian Railways, Information Systems in an e-Commerce Organization. Purpose of Information Systems The purpose of an information system is to empower its users. There is a wide difference in a simple database which stores data and return it to its users upon request. A database can be created in a way that manages and retrieves information in a sorted manner. This information can help make decision at various levels within an organization. Information system recognize that there are different levels of workers in an organization who have their specific duties and thus provides them information is different ways (Heinrich, 2002). Its purpose is to make sure that the users of the system are quickly able to access, comprehend, and react to the information provided to them. Wiseman (1985) mentions that the information system improves business functionality by automating some of the fundamental information procedures. He further mentions that the information system increases the effectiveness of the management by satisfying their information demands. Information demands of businesses vary at different organizational levels. Various business functions at strategic, tactical and operational level have different types of subsystems of information system to serve their information demands. Some of the commonly used subsystems are as follows: • Management Information Systems (MIS) • Decision Support Systems (DSS) • Knowledge Management Systems (KMS) • Expert Systems (ES) • Executive Information Systems (EIS) • Transaction Processing Systems (TPS) • Accounting Information Systems (AIS) E-commerce An important component of the information and communication technology and indeed one of its most momentous impacts is the provision and empowerment of electronic commerce. Electronic commerce is a process of buying and selling of products or services by means of electronic systems involving the Internet and e-mails .

Upload: others

Post on 03-Jun-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Savitribai Phule Pune University

Third Year of Computer Engineering (2015 Course)

310244: Information Systems and Engineering Economics

Unit-1 Basic of Management Theory & Practices

Syllabus:- Role of Information Systems in Organizations, The Information System Manager and his challenges, Concepts of Information Systems, Information Systems and Management Strategy Case Studies - May Include Information Systems in the Indian Railways, Information Systems in an e-Commerce Organization.

Purpose of Information Systems

The purpose of an information system is to empower its users. There is a wide difference in a simple database which stores data and return it to its users upon request. A database can be created in a way that manages and retrieves information in a sorted manner. This information can help make decision at various levels within an organization. Information system recognize that there are different levels of workers in an organization who have their specific duties and thus provides them information is different ways (Heinrich, 2002). Its purpose is to make sure that the users of the system are quickly able to access, comprehend, and react to the information provided to them. Wiseman (1985) mentions that the information system improves business functionality by automating some of the fundamental information procedures. He further mentions that the information system increases the effectiveness of the management by satisfying their information demands. Information demands of businesses vary at different organizational levels. Various business functions at strategic, tactical and operational level have different types of subsystems of information system to serve their information demands. Some of the commonly used subsystems are as follows:

• Management Information Systems (MIS) • Decision Support Systems (DSS) • Knowledge Management Systems (KMS) • Expert Systems (ES) • Executive Information Systems (EIS) • Transaction Processing Systems (TPS) • Accounting Information Systems (AIS)

E-commerce

An important component of the information and communication technology and indeed one of its most momentous impacts is the provision and empowerment of electronic commerce. Electronic commerce is a process of buying and selling of products or services by means of electronic systems involving the Internet and e-mails .

Commercial activities performed through e-commerce are either business-to-business (B2B) or business-to-consumers (B2C). E-commerce is a very cost-efficient mode of conducting business-to-consumers commercial activities (Graham 2008). E-commerce allows economic agents to reduce the transactional cost to a great extent (Porter 2001). Instead of internal hierarchies, it empowers the market itself to organize economic activities, which in turn increases the efficiency of the not just the business but across the entire commodity chain (Malone et al. 1987).

E-commerce creates a dimension of ‘spacelessness' for economic activities which is one of its most distinctive features. Since the emergence of the Internet and increasing use of e-commerce, the imminent “death of distance” and creation of an ‘eight continent' has been highlighted by researchers which is spurred by the increasing trade and commerce activities conducted electronically. They assert that constraints such as space and distance are becoming less significant for conducting economical activities (O'Brien 1992; Cairncross 1997). A large literature exits regarding various firms having used e-commerce to achieve competitive advantage by finding new and distant customers (for example see Daniel and Grimshaw 2002; Hamill and Gregory 1997; Kim and Mauborgne 1999; O'Keefe et al. 1998; Poon and Swatman 1999). Thus information systems also serve the purpose of communication with external business entities for trade and commerce activities.

Analysis of the problems of gathering data and analysing information

Information systems are a vital tool in achieving competitive advantage for a business by properly managing and analysing the information. However there are many security concerns that have being in the corporate agenda since its early usage. Today organizations are challenged by various and complex information security matters for handling distributed computer networks. Large amount of e-commerce activities, increased usage of internet, and ever changing technologies means new threats and risks and vulnerabilities for businesses as more and more business functions and procedures are becoming paperless. For this purpose, right controls are required within an organization to reduce the risks and ensure effective functioning of the information systems Sushil & Leon, 2004). Information Systems requires certain controls to be implemented for its smooth and effective functionality (Boczko, 2007). Information security managers can put these controls in place to ensure the system is secure against threats, exposure, and risks. (Gertz, 2003).

• A threat can be any possible unwanted occurrence or event that could harm the Accounting Information System or the business.

• The exposure is the possible loss of money that would occur as a result of the threat becoming a reality.

• The risk is the chance that the threat will become reality.

The controls that secure information systems against unfavourable outcomes are as follows:

• Preventive Controls

• Input Controls; Input controls checks upon the information that is being entered into the system.

• Processing Controls; Processing controls checks whether the data is processed properly after it is entered in to the system.

• Output Controls; The output controls ensure the completeness, validity, and accuracy of the data in various output mediums.

• Storage Controls; The storage controls ensures that the data in stored in such a manner that it cannot be tampered with.

• Files Controls; Files controls reduce the errors that occur due the improper storage of files.

• Hardware Security; Hardware security control is very important as any damage or harm to the hardware would mean that the failure of the system therefore the hardware for the information system must be kept in a secure place and with only reliable and relevant personal having access to it. Proper protection against high temperature or power failures and incidents should be made along with backup support.

• Standardization; Standardization controls involves usage of already laid down standards by the developers and operators for the methodology of the system development and operation respectively.

(Basset, 1993)

• Detective controls

• Testing; Testing is required to detect any problems occurring in the system and is thus performed before it is made operational. Testing can shows problems that can occur in the processing and any other errors. It is recommended that testing should be performed on a routine basis or after any new developments.

• Training; the training of the data processing staff ensures proper functioning of the system. The awareness of the staff also helps in pointing any defects in the system which could then be resolved.

• Operation Controls; Operation controls in Dean Plc are controls which record what computer systems and the employees have been doing. The operational controls can include tasks such as rotation of shifts, duty logs, manual of operating instructions,

attendance controls and computer logs, etc. which can referred to whenever a problem is reported.

(Basset, 1993)

• Corrective controls

• When any problem in the system is detected, the management along with the help of Business Analysts and Expert can take relevant steps to correct the problems in the system.

• Certain procedure can be set for reoccurrence of the problems.

Apart from security concerns, there are several other challenges and issues associated with managing information systems. These are:

• Increase costs of a technological solution (developing, implementing and maintaining of the information technologies and systems)

• Reliability for certain processes (information systems require thorough testing before they could be used and are difficult prone to errors leading to potential losses)

• Software tools are not fixed but constantly evolving (information communication technology tools require timely upgrades to meet prevailing standards)

• Integrating digital and non-digital sales and production information (for e-commerce activities)

• Customer fear of personal information being used wrongly (privacy issues)

• Customer have high expectations regarding efficiency and real time responses

• Vulnerability to fraud and other crimes

• Higher employee training required to effectively using the information technology.

Another technological concern regarding information technology is the high volume of data generated from its use and its management. Organizations are required to create robust middleware application that are capable of handling the high amount of data and route it to the appropriate information systems in a timely manner (Ngain and Gunasekaran 2009).

Major sources of relevant data used for management information systems

As mentioned previously, businesses and organizations have a variety of information requirements. Executives at strategic level require information to help them with their planning and strategic decision making. They require a summarized form of information

that can give an overview of the business. Middle management requires more detailed information in order to oversee and control business activities. Operational level employees need basic routine information to carry out their day to day duties. Therefore, businesses have several information systems working altogether at the same time. Different information systems have different sources of gathering data according their purpose. The following presents a list of most commonly used information system and their likely sources of data and users.

Executive Support Systems

Executive Support System helps the senior management of an organization in making strategic decisions. Executive Support Systems shows the status of all key business activities and involves large data analysis to help strategic decision making. Therefore, it is likely to have information from all the internal and external sources which is gathered, analysed and summarized for strategic decision making. Internal sources include information collected from other information systems. External information system can include external data gathered by e-commerce activities, external market analysis and etc.

Management Information Systems

Management information system is concerned with the summarized data of the business transactions that helps middle management to monitor business activities. Therefore it is likely to have information from all the internal sources such as transaction processing systems. It summarizes information into management reports.

Decision-Support Systems

Decision Support Systems are designed to assist middle and top level management in making decisions at uncertain conditions. It informs the user about the possible consequences of their decisions. It gathers internal information to analyse the available options and alternatives. It has a predefined set of logic which is part of its design. It uses complex tools spreadsheets, and databases for creating ‘what if' models.

Knowledge Management Systems

Knowledge Management Systems are created to help organizations and businesses create and share information. The source of such information systems is typically the employees who create new knowledge through their own expertise and then share it along with others within an organization. This share pool of information is created to search new commercial opportunities. Examples of such information systems are web-portals and Intranet portals created by professional lawyers, management consultants and etc. these information systems categorize and distribute information efficiently among users. Information could be contained in any form and formats such as word processed documents, presentations, web pages and etc.

Transaction Processing Systems

Transaction Processing Systems are created to process daily repetitive activities and transaction in an automated efficient manner. The automation increases the accuracy of the information. A business usually involves several reoccurring transactions. Therefore, there are several Transaction Processing Systems such as Billing systems, Payroll systems, Inventory management systems, etc. The sources of these information systems are the employees at the operational level or the organization. Sometimes automated identifications are also used to input data to these systems such as Radio Frequency Identification.

Office Automation Systems

Office Automation Systems are tools that help improve the productivity of employees processing data. Such systems usually work as standalone programs and do not link data to other information systems. Examples of such systems include Microsoft Office Tools, and Computer Operating Systems.

Role of Information Systems in Organizations,

Information systems play a vital role in an organizations’ overall performance. They provide many advantages to their users which range from simple transaction processing at the operational level to difficult tasks such as making important and competitive decisions at the strategic level of the organization. Several roles played by information systems in an organization can be identified but O’Brien and Marakas (2008) have identified three fundamental roles played by information systems in businesses. These are; Information systems support business processes and operations. Secondly, they support decision making of employees and managers and lastly, they support strategies for competitive advantage. These three fundamental roles encompass any other roles played by information systems in an organization.

Information systems support business processes and operations of an organization in many ways. In a hotel for instance, customer check - ins and check-outs are done by computers and software which makes work easy unlike the traditional method of using notebooks and paper to record such information. Customers can now even make their own bookings through the hotels website instead of visiting the hotel in person to do so, which may lead to pressure on front office staff. Systems have now been developed to gather customer information easily and quickly. Now, because of information systems, the various departments of an organization work together with ease. The housekeeping department of a hotel can now inform the front office about which rooms areready for use and which are not, without personal interactions of staff as a result of information systems. The running of an organization has now becomesmoother with well integrated information systems.

Information systems also help employees and managers of a business to make well informed decisions. This is because information systems have the capability of analyzing

data that has been collected from both within the organization and from external sources into useful information which can be used by employees and managers in their decision making process. Decision-making isan integral part of management and occurs in every function and at all levels.

Decisions are better made when accurate information is available which aids the decision maker in making an objective decision (Terry Lucey 2005). Information systems types like Management Information System (MIS), Decisions Support Systems (DSS) and Executive Information Systems (EIS) are specially designed to help management of an organization in their decision making process. These systems generate typical reports and graphs on issues such as trend of orders, customer analysis, product profitability, finished stock positions and forecasts, accident and absentee reports, job evaluation reports and many more. Managers and employees use these reports and graphs as a basis for their decisions. For example, decisions on which meals that need to be added or removed from a hotel menu may be taken by the food and beverage manager after a typically analysis is made by the help of a Decisions Support System.

Finally, information systems also support strategies for competitive advantage. Competition in today’s business is keen and what will become important is how quickly companies can convert their reams of information they collect into knowledge so that they can provide services and products that are ahead of their competitors. Strategic information systems can help provide hospitality operations with the innovative mediums they need to provide products and services that will give them comparative advantage over their competitors. Nhyiem et al (2005) observes that, in the hospitality industry, competitive advantages may result in increased room sales ( through efficient reservation systems and organisational websites), decreased cost of goods ( through reduction in operating cost and less expensive distribution channels), brand awareness(through effective advertising campaigns targeted at the appropriate customer and delivered through the most appropriate cost effective medium), good customer-organizational relationship (by keeping database of customers and their needs)and effective decisions making that are timely.

Organizations strive to be market leaders in their given industry. In climates where factors such as recession, inflationary pressures and increased competition can hinder the achievement of this goal, companies look for strategies that lead to competitive advantages. One such strategy is the adoption of information systems within the company. Information systems help a company make adequate use of its data, reduce workload and assist with compliance with various mandatory regulations.

Information Storage and Analysis

At the date of publication, many companies no longer manage their data and information manually with registers and hard-copy formats. Through the adoption of information systems, companies can make use of sophisticated and comprehensive databases that can contain all imaginable pieces of data about the company.

Information systems store, update and even analyze the information, which the company can then use to pinpoint solutions to current or future problems. Furthermore, these systems can integrate data from various sources, inside and outside the company, keeping the company up to date with internal performance and external opportunities and threats.

Assist With Making Decisions

The long-term success of a company depends upon the adequacy of its strategic plans. An organization’s management team uses information systems to formulate strategic plans and make decisions for the organization's longevity and prosperity. The business uses information systems to evaluate information from all sources, including information from external references such as Reuters or Bloomberg, which provide information on the general economy. This analysis of and comparison to market trends helps organizations analyze the adequacy and quality of their strategic decisions.

Assist With Business Processes

Information systems aid businesses in developing a larger number of value added-systems in the company. For example, a company can integrate information systems with the manufacturing cycle to ensure that the output it produces complies with the requirements of the various quality management standards. Adoption of information systems simplifies business processes and removes unnecessary activities. Information systems add controls to employee processes, ensuring that only users with the applicable rights can perform certain tasks. Further, information systems eliminate repetitive tasks and increase accuracy, allowing employees to concentrate on more high-level functions. Information systems can also lead to better project planning and implementation through effective monitoring and comparison against established criteria.

Considerations

Implementing information systems within an organization can prove to be costly. Implementation costs include not only installation of the systems but also employee training sessions. In addition, employees may see the adoption of information systems as an unwarranted change and, thus, may resist this change. Resistance to change can hinder business operations and can cause employee turnover. Companies should have leadership in place to assess the adequacy of the decision to have an information system and to guide the company through the transition phase and weigh information systems cost against the potential benefits.

To gain the maximum benefits from your company's information system, you have to exploit all its capacities. Information systems gain their importance by processing the data from company inputs to generate information that is useful for managing your operations. To increase the information system's effectiveness, you can either add more data to make the information more accurate or use the information in new ways.

Communication

Part of management is gathering and distributing information, and information systems can make this process more efficient by allowing managers to communicate rapidly. Email is quick and effective, but managers can use information systems even more efficiently by storing documents in folders that they share with the employees who need the information. This type of communication lets employees collaborate in a systematic way. Each employee can communicate additional information by making changes that the system tracks. The manager collects the inputs and sends the newly revised document to his target audience.

Operations

How you manage your company's operations depends on the information you have. Information systems can offer more complete and more recent information, allowing you to operate your company more efficiently. You can use information systems to gain a cost advantage over competitors or to differentiate yourself by offering better customer service. Sales data give you insights about what customers are buying and let you stock or produce items that are selling well. With guidance from the information system, you can streamline your operations.

Decisions

The company information system can help you make better decisions by delivering all the information you need and by modeling the results of your decisions. A decision involves choosing a course of action from several alternatives and carrying out the corresponding tasks. When you have accurate, up-to-date information, you can make the choice with confidence. If more than one choice looks appealing, you can use the information system to run different scenarios. For each possibility, the system can calculate key indicators such as sales, costs and profits to help you determine which alternative gives the most beneficial result.

Records

Your company needs records of its activities for financial and regulatory purposes as well as for finding the causes of problems and taking corrective action. The information system stores documents and revision histories, communication records and operational data. The trick to exploiting this recording capability is organizing the data and using the system to process and present it as useful historical information. You can use such information to prepare cost estimates and forecasts and to analyze how your actions affected the key company indicators.

Challenges Facing Today’s Information System Development

The world today runs on various information systems. Information Systems functionality is increasingly becoming a necessity and not an option. Imagine a company that relies on e-commerce that has its website taken down due to software failure and security issue. This fault in the software can make the company lose thousands if not millions of dollars in revenue. Thus, robustness and security of the system are equally important to ensure system confidentiality, integrity and availability (CIA). The two main challenges facing today’s information systems are operational and technical challenges. These challenges must be addressed from the very beginning to ensure software projects do not fail.

Operational Challenges

Perhaps designing information systems software may have become easier than what it was in the past, however, operational challenges have become even more demanding. Some of the key operational challenges facing today’s information system’s development include:

Bad Communication: Lack of understanding/planning for customer, organization and other stakeholders requirements/needs for the project.

Unclear Requirements: When requirements are not clearly identified, this will lead to change of requirements during middle of the project which will increase project delivery time and anger many customers.

Increasing Cost: All of this will lead to added labor and project cost. Thus making the project less profitable and takes away interest from stakeholders.

Delayed Project Delivery: The result of what mentioned above will cause project milestones to be pushed back and a potential software with less functionality than what agreed upon in the beginning agreement with the client.

Market Pressure: Another important aspect is the rapid development of software to meet the ever-changing market demands.

In order for the project to succeed from an operational perspective all stakeholders including the end-user (customers), managers who influence direction and budget, and software developers must be in full collaboration to ensure successful delivery of the new information system.

Technical Challenges

The other main and important part of information system’s development challenges are the technical challenges. Technical challenges determine the true system functionality, reliability and availability. Today’s information systems challenges include:

Knowing the Technical needs: This is about understanding programing languages, the frameworks, the systems and the algorithms needed for a particular information system to be successful. An important factor today is making sure that your web based information system works on all browsers

and devices. It is also about knowing your developers programming expertise and using that to your advantage.

Right Design Patterns: Identifying the right design patterns for your information system software and establishing an actual design review, quality evaluation criteria and design management is something highly neglected today because of the time and effort it takes.

Quality Control: Sometimes codes are not built with a "sanity in mind" which can lead to significant challenges in the future. Building quality and maintainable code that can scale to multiple systems to serve millions and millions of customers is a key challenge today if addressed can save the company from catastrophes and put them ahead of their competition.

Security: Security is highly important especially with today’s cyber warfare and attacks. Ensuring no leaks are open during information system development is key in safeguarding your customer and employee private data. Educating your employees about reverse engineering is also another key important thing that developers and technical staff overlook.

Always Debugging: You're always on the lookout in fixing logical errors, debugging those infinite loops or divide by zero bugs in the code. According to Linu’s law, always have enough eyeballs to lookout for bugs in the system.

These challenges and many more should be properly addressed and defined way before programmers even start coding. The key takeaway in production quality is to have a polished/optimized/efficient program with strong business logic and always tested and documented information system development project.

The Information System Manager and his challenges:-

Top Three Problems IT Managers Face and How to Overcome Them

oday's business environment has changed drastically from just a few years back. Rather than working exclusively with equipment, data, and systems, today's IT managers face issues such as cross training, personnel management, interdepartmental communication, and a widening job scope for all IT employees.

This expansion of the IT job realm has left many IT managers juggling new challenges. While the problems, in and of themselves, might appear overwhelming, there are simple, proven ways to rise above them.

Problem #1 - Tough Data Flow

Information often flows irregularly and is subject to quantitatively strong fluctuations. These fluctuations can become detrimental if not dealt with. The simple solution is to control the information.

Officially, "information controlling" is the analysis, evaluation, and importance attached to the electronic data that is collected and provided with the data under various criteria.

To achieve this, start by making employees aware of the importance of the data they help to gather. Encourage accuracy and demonstrate to employees how their active participation in the process can reap rewards they might not have thought of.

Because your job as IT manager will continue to get more and more hectic, you'll want to continually look for ways to improve speed and quality while reducing rising costs.

Problem #2 - Rising Costs

Rising costs are a challenge for any manager. They are especially troubling to an IT manager working in the electronic data processing area.

Industry experts show that, despite various "old systems" existing, resources are only used at about 30% of their optimal performance. This leaves room for 70% improvement without an excessive outlay of cash.

To increase ROI using existing resources, consider:

I. Conducting a survey of departments.

Ask what their primary challenges are with the existing systems. The majority of the time the solutions lie within untapped features of existing resources. Search the systems for solutions and provide them.

II. Getting clear definitions of problems.

Oftentimes, employees may not know how to communicate the problems they face in "IT language." This may relate to an ill-suited solution. Take time to work with employees or department heads to clearly outline challenges so you are equipped to find solutions more quickly and accurately.

III. Looking for ways to integrate.

A smooth flow of information always increases productivity. When possible, work to find ways to integrate existing systems. With a little ingenuity on your part, and a little creativity, you can develop solutions without budget increases.

Problem #3 - Insufficient Sensitivity Concerning Data Security

As the complexity of electronic data processing increases, security often decreases. Not only does this pose problems in the form of breaches, it also has legal ramifications with regard to licenses.

From healthcare companies to financial organizations, the US government is cracking down on lax security. The smart IT manager is taking steps now to not only stress the importance of security to those in his/her company, but to also instill the necessary protective measures.

To help others within your organization understand how sensitive certain data is, create a memo or site page explaining:

what security measures are currently in place,

why these measures exist,

the consequences (internally and externally) for not following security procedures, and

whom to contact with questions/issues regarding security.

Although an IT manager's job is continually evolving and becoming more challenging, there are ways to overcome pressing problems. By looking at each situation from a variety of angles, you'll be able to define problems quickly and accurately, and then offer solutions that will benefit you, your team, and your entire company.

Concept of Information System

By Wiki[pedia:- An information system (IS) is an organized system for the collection, organization, storage and communication of information. More specifically, it is the study of complementary networks that people and organizations use to collect, filter, process, create and distribute data.[according to whom?]

"An information system (IS) is a group of components that interact to produce information."[1]

A computer information system is a system composed of people and computers that processes or interprets information.[2][3][4][5] The term is also sometimes used in more restricted senses to refer to only the software used to run a computerized database or to refer to only a computer system.

Information systems is an academic study of systems with a specific reference to information and the complementary networks of hardware and software that people and organizations use to collect, filter, process, create and also distribute data. An emphasis is placed on an information system having a definitive boundary, users,

processors, storage, inputs, outputs and the aforementioned communication networks.[6]

Any specific information system aims to support operations, management and decision-making.[7][8] An information system is the information and communication technology (ICT) that an organization uses, and also the way in which people interact with this technology in support of business processes.[9]

Some authors make a clear distinction between information systems, computer

systems, and business processes. Information systems typically include an ICT

component but are not purely concerned with ICT, focusing instead on the end use of

information technology. Information systems are also different from business

processes. Information systems help to control the performance of business

processes.[10]

The six components that must come together in order to produce an information

system are:

1. Hardware: The term hardware refers to machinery. This category includes

the computer itself, which is often referred to as the central processing unit

(CPU), and all of its support equipments. Among the support equipments are

input and output devices, storage devices and communications devices.

2. Software: The term software refers to computer programs and the manuals

(if any) that support them. Computer programs are machine-readable

instructions that direct the circuitry within the hardware parts of the system

to function in ways that produce useful information from data. Programs are

generally stored on some input / output medium, often a disk or tape.

3. Data: Data are facts that are used by programs to produce useful

information. Like programs, data are generally stored in machine-readable

form on disk or tape until the computer needs them.

4. Procedures: Procedures are the policies that govern the operation of a

computer system. "Procedures are to people what software is to hardware"

is a common analogy that is used to illustrate the role of procedures in a

system.

5. People: Every system needs people if it is to be useful. Often the most over-

looked element of the system are the people, probably the component that

most influence the success or failure of information systems. This includes

"not only the users, but those who operate and service the computers, those

who maintain the data, and those who support the network of computers."

<Kroenke, D. M. (2015). MIS Essentials. Pearson Education>

6. Feedback: it is another component of the IS, that defines that an IS may be

provided with a feedback (Although this component isn't necessary to

function).

Types of information system

The "classic" view of Information systems found in the textbooks[18] in the 1980s was of

a pyramid of systems that reflected the hierarchy of the organization, usually

transaction processing systems at the bottom of the pyramid, followed by management

information systems, decision support systems, and ending with executive information

systems at the top. Although the pyramid model remains useful, since it was first

formulated a number of new technologies have been developed and new categories of

information systems have emerged, some of which no longer fit easily into the original

pyramid model.

Some examples of such systems are:

data warehouses

enterprise resource planning

enterprise systems

expert systems

search engines

geographic information system

global information system

office automation.

The first four components (hardware, software, database, and network) make up what is known as the information technology platform. Information technology workers could then use these components to create information systems that watch over safety measures, risk and the management of data. These actions are known as information technology services.[19]

Certain information systems support parts of organizations, others support entire organizations, and still others, support groups of organizations. Recall that each department or functional area within an organization has its own collection of application programs, or information systems. These functional area information

systems (FAIS) are supporting pillars for more general IS namely, business intelligence systems and dashboards[citation needed]. As the name suggest, each FAIS support a particular function within the organization, e.g.: accounting IS, finance IS, production/operation management (POM) IS, marketing IS, and human resources IS.

In finance and accounting, managers use IT systems to forecast revenues and business activity, to determine the best sources and uses of funds, and to perform audits to ensure that the organization is fundamentally sound and that all financial reports and documents are accurate. Other types of organizational information systems are FAIS, Transaction processing systems, enterprise resource planning, office automation system, management information system, decision support system, expert system, executive dashboard, supply chain management system, and electronic commerce system. Dashboards are a special form of IS that support all managers of the organization. They provide rapid access to timely information and direct access to structured information in the form of reports. Expert systems attempt to duplicate the work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain.

Information Systems and Management Strategy Case Studies:- Indian

Railway

The Centre for Railway Information Systems (CRIS) designs, develops, implements and

maintains most of the important information systems of Indian Railways. It is located in

Chanakyapuri, New Delhi. CRIS was established in 1986 by the Ministry of Railways of

India.

In 1982, Indian Railways (IR) set up a central organisation (COFOIS) to computerise

freight operations.

In 1986 the Ministry of Railways saw the need for a dedicated, autonomous

organisation and established CRIS, an umbrella organisation for all information

technology-related activities on Indian Railways.

It was entrusted with the task of designing, developing and implementing the Freight

Operations Information System (FOIS) and its communications infrastructure. CRIS

began functioning in July 1986 as an autonomous organisation headed by an Executive

Director (later redesignated Managing Director).

A unique feature of CRIS is collaboration by IT specialists and railway experts on

deputation from the Indian Railways. Systems managed by CRIS have received

international recognition from Computerworld.[1][2]

Work

CRIS designs, develops, implements and maintains information systems for Indian

Railways. In addition, CRIS has developed, implemented and maintained IT systems for

the Andaman and Nicobar Islands (the A & N Ship Ticketing system). The number of

projects handled by CRIS has increased from three in 2000 to more than 40 by 2016.

Major IR projects

1. Computerisation of the Freight Operations Information System of Indian

Railways: The FOIS enables management and control of freight movement,

optimised asset utilisation and the generation of freight invoices. Many of

IR's larger freight customers pay through an electronic payment gateway

interfaced with the FOIS. About 72 percent of the railway's freight revenue is

paid electronically.[3]

2. Passenger Reservation System (PRS): A nationwide online passenger

reservation and ticketing system, developed and maintained by CRIS, is

developed in C and Fortran on a Digital OpenVMS operating system using RTR

(Reliable Transaction Router) as middleware. Also known as CONCERT

(Country-wide Network of Computerised Enhanced Reservation & Ticketing),

it interconnects the four regional computing systems (in New Delhi, Mumbai,

Kolkata and Chennai) into a national PRS grid. It allows a passenger anywhere

to book train tickets from any station to any station. PRS handles

reservations, changes, cancellations and refunds, reserving over 1.6 million

seats and berths daily. Complex rules, validations and fare-computation

techniques are interwoven in the application.[4]

3. Next Generation eTicketing (NGeT): The Internet-based E-ticketing

reservation system, developed for IRCTC, that connects at the back-end to

PRS.[5]

4. Computerisation of Indian Railways' Unreserved Ticketing System.

Unreserved ticketing is a major component of IR’s ticket volume and an

important source of revenue. UTS delivers fast unreserved ticketing from

dedicated counters, replacing manual printed-card tickets, EFTs and BPTs

with centralised online sales accounting. The architecture integrates with

handheld terminals, smart cards and vending machines.

5. [ National Train Enquiry System] for latest train running times and live train

tracking.[6]

6. [ Web-enabled claims: Web-based software enables the public to file and

track claims online.[7]

7. Rail Budget Compilation System (RBCS): Developed for budgetary input from

Indian Railways zones and production units, RBCS facilitates data capture,

database construction, demand analysis and estimate pruning for the railway

budget.

1. "Case Monitoring System" the Online Peoples' Representatives Demands Monitoring and Redressal System. Used in Parliament by MR Mukul Roy.

2. "I-Pas" aids the personnel and finance departments. It consists of two modules: Financial Accounting System (FAS) and Payroll System (PS).

3. Workshop Information SystEm (WISE): A MIS project for railway workshops around the country. It is in operation in 14 workshops: Kharagpur, Jagadhri, Ajmer, Kota, Charbagh, Liluah, Kanchrapara, Matunga, Lower Parel, Parel, Bhusawal, Secunderabad, Lallaguda and Jamalpur. WISE provides report for workshop management using the ORACLE DBMS, and is being upgraded to an ERP-based system.

4. Crew management: The Crew Management System (CMS) software provides real-time railway crew information. Information includes location, status and train assignments. It also maintains information on time off and continuing education. The software issues SMS alerts to management and supervisors if crew levels drop below a level likely to affect train operations. It can book crew for coach, shunting and freight service. The software supports the safety monitoring of the crew by inspectors, monitoring crew knowledge through a quiz administered through kiosks in crew lobbies, and provides up-to-date safety circulars.

5. Control Office Application (COA): Enables rail-traffic controllers to manage the trains running in their section, and is operational in all division control offices. The COA interfaces with other applications (such as NTES) to provide train information to passengers and managers.

6. E-Procurement System: Provides a secure, fair and transparent method of materials procurement through a web-based interface. It enables suppliers to securely upload their tenders to a central server in encrypted form, which can be decrypted only by authorised railway officials after the tender opening. All timestamps are authenticated by the National Physical Laboratory. The system is operational on all zonal railways and units, and has been extended to CORE, RDSO, RailTel and the Kolkata Metro. E-Auction was launched in March 2012, and has been adopted by All zonal railways and Production Units. A payment gateway was implemented in January 2012 and approx 280 Crore online funds transferred till Feb 2014 .[8]

7. Software for Locomotive Asset Management (SLAM): Under development, this system will track and allocate electric locomotives.

8. Additional asset-management systems, such as for Diesel locomotives, freight cars, coaches and track, are under development. An ERP-based system was implemented at the Integral Coach Factory, Chennai, in January 2012.

9. Automatic fare-collection and passenger-control systems for Metro Railway in Kolkata using RFID technology.

10. Freight Maintenance Management(FMM): An ERP and Java based system, developed to cover Maintenance of Freight Rolling Stock. ERP part is used for purely maintenance jobs in depots, whereas Java part(known as Central Application) is used for reporting purpose and other mechanical(only freight) department related business processes by Divisional and Zonal HQs and RB. Currently in pilot phase, successfully implemented in Dadri Wagon Depot (NCR), Tuglakabad Wagon depot (NR) & Dhandarikalan Wagon Depot (NR). The BPC(Brake Power Certificate) of freight trains in yards under these depots, are issued through FMM.

11. Locoshed Maintenance Management(LMS): A Maintenance Management System for Diesel Locos.

The first major project launched came in the year 2000; it was the Internet Querying system for PRS (Passenger Reservation System). Passengers could check their PNR S S Mathur, GM – Corporate Coordination, Cris (Centre for Railway Information Systems), talks about the role that CRIS is playing in bringing the benefits of IT to the Indian Railways status on the PRS website.

The site continues to be extremely popular with railway passengers. In 2002, the Unreserved Ticketing System (UTS) was developed in a record time of 8 months and installed in the Delhi area on 15th August.

Prior to the implementation of UTS, unreserved tickets were in the form of small purpose-built cards, specially printed for each origin-destination pair of stations. Disbursing these tickets was a mammoth exercise, requiring mundane and wasteful effort just to keep the tickets in stock.

Passengers faced crowded and chaotic ticket windows, last-minute ticketing glitches, and opaque ticket refund rules.

The UTS has eliminated all these bottlenecks by having a centralised database of tickets, which can be bought in advance from any ticket window.

The introduction of ATVMs (Automatic Ticket Vend-ing Machines) and smart cards has made ticketing even simpler for Mumbai’s suburban passengers.

Accounting of the money received from remote rural stations, which used to take months, is carried out by running regular end-of-day routines.

UTS now runs at more than 5500 stations across the country. It accounts for more than 95% of all unreserved tickets sold.

In a related development, in July 2011, CRIS provided automatic flap-type gates for the Kolkata Metro along with in-house ticketing software to take over from the aging turnstiles.

Managing Train Operations

The FOIS system manages the operations of all freight trains in the Railways. Similarly, the movement and operation of passenger trains is managed by the Integrated Coaching Management System (ICMS). This system collects online information from 220 major yards in the country and provides Railway managers with updated information on passenger train consists, locomotive availability, and maintenance schedules. ICMS was envisaged in 2003 and implementation was completed in 2008.

Two systems that have changed the way the Railways function internally are the Control Office Application (COA) and the Crew Management System (CMS).

COA assists each train controller (Section Controller in Railway parlance), located in the Divisional Control Offices, to manage short-term train movements. Section Controllers prepare their Control Charts on the COA terminal automatically through the COA program.

This frees them up to plan train movements more effectively, leading to more throughputs in each section. The COA provides the controllers with an intuitive interface similar to the manual chart, with which they are fully familiar. Ultimately, the train position will get automatically populated in the chart by transmitting GPS location data from the train locomotive directly into the COA database.

COA also provides spin off benefits to the passengers. COA’s train movement data and movement forecasts are picked up by the National Train Enquiry System (NTES) to provide train position to passengers through the NTES website and the 139 call-centre.

The Crew Management System, on the other hand, benefits running staff (Train Drivers or Loco Pilots, Assistant Loco Pilots, and Guards) by rationalising their working hours, informing them via SMS about impending duty rosters, and providing them with simple kiosk-based sign-on and sign-off facilities. Mileage allowances to compensate for their movement outside their home station are also automatically calculated by this system.

COA was developed in 2005 and remained on trial up to 2007. Thereafter it was implemented in all 70 Divisional Control offices by 2010. CMS also was developed by CRIS during this period and implementation in 340 crew lobbies (all but the smallest ones) was completed

by 2011. Scheduling of passenger trains remains an arcane art in railways worldwide. A large number of factors need to be optimised in order to prepare a workable yet efficient train schedule. Apart from passenger trains, freight trains have also to be provided line capacity to

Maximise freight throughput.

CRIS is in the process of developing the necessary algorithms and programs to enable the design of optimised and stable train schedules, which maximise efficiency in the Railway system. Preliminary work on this system is already over and the first version of the “Sat- sang” (Software aided Train Scheduling and Network Governance) is about to be rolled out.

Material and asset management systems

Indian Railways buys materials worth well over `15,000 crore annually to maintain its assets consisting of more than 7000 stations, 112,000 track Km of permanent way (30 percent of it with overhead electrification equipment), 9000 locomotives, 2,25,000 freight wagons, and 45,000 passenger coaches.

Managing the material is a gigantic task. Material management systems comprising procurement and inventory control functions have been established in all Railway units. However, it is planned to centralise the Material Management systems.

This onerous task has been awarded to CRIS for implementation, and is targeted for completion in the next 3 years. In the meantime, a fully automated and secure e-procurement system had been put in place centrally by CRIS in 2008.

This system has already been used for finalisation of more than 3 lakh tenders, and more than 14000 vendors are enrolled in it.

The entire application is PKI enabled and completely secure. Railway assets are spread out across the country. It becomes easy to manage them effectively if geo-spatial data about the assets is maintained in a central repository.

This aspect has been recently addressed with the initiation of a project for preparation of a geospatial database and GIS map to cover all of the Railways’ fixed and moving assets. IT systems in Indian Railway’s Production Units have evolved over the years.

A landmark was reached in March 2012 when a comprehensive SAP-based ERP system was implemented in the Integral Coach Factory (ICF) after 24 months of design and development effort. The system provides an integrated view of the organisation for all levels of managers and staff.

Conclusion

Indian Railways has used Information Technology to improve the experience of passengers and freight customers. Increasingly, IT applications are being developed to address internal efficiency and effectiveness. Indian Railways now finds itself in an age in which rapid assimilation of IT in all walks of life opens up greater opportunities. The

recent acceleration in development and deployment of IT systems is evidence of Indian Railway’s commitment to the common citizen of India.

Information Systems and Management Strategy Case Studies:- E-

Commerce

Learning Objectives

In this lesson, we will introduce you to e-commerce systems. After you work out

this lesson, you should be able to

➢ Understand the components of an e-commerce system

➢ Explain the trends in e-commerce

➢ Identify the important features of a web storefront

In this lesson, we will discuss the following

➢ E-commerce process

➢ Electronic payment options

➢ Web store requirements

➢ Mobile commerce

Introduction

Electronic commerce or e-commerce refers to a wide range of online business activities for products and services. It also pertains to “any form of business transaction in which the parties interact electronically rather than by physical exchanges or direct physical contact”.

E-commerce is usually associated with buying and selling over the Internet, or conducting any transaction involving the transfer of ownership or rights to use goods or services through a computer-mediated network. Though popular, this definition is not comprehensive enough to capture recent developments in this new and revolutionary business phenomenon.

A more complete definition is E-commerce is the use of electronic communications and digital information processing technology in business transactions to create, transform,

and redefine relationships for value creation between or among organizations, and between organizations and individuals

Types of E-Commerce

The major different types of e-commerce are business-to-business (B2B); business-to-

consumer (B2C); consumer-to-consumer (C2C).

B2B E-Commerce

B2B e-commerce is simply defined as e-commerce between companies. This is the type

of e-commerce that deals with relationships between and among businesses. About

80% of e-commerce is of this type, and most experts predict that B2B e-commerce will

continue to grow faster than the B2C segment.

The B2B market has two primary components e-frastructure and e-markets. E-

frastructure is the architecture of B2B, primarily consisting of the following

➢ Logistics - transportation, warehousing and distribution (e.g., Procter

and

Gamble);

➢ Application service providers - deployment, hosting and management of

packaged

software from a central facility (e.g., Oracle);

➢ Outsourcing of functions in the process of e-commerce, such as Web-

hosting,

security and customer care solutions (e.g., outsourcing providers such as eShare);

➢ Auction solutions software for the operation and maintenance of real- time

auctions in the Internet (e.g., OpenSite Technologies);

➢ Content management software for the facilitation of Web site content

management

and delivery (e.g., ProcureNet); and

➢ Web-based commerce enablers (e.g., Commerce One, a browser-based, XML

enabled purchasing automation software).

E-markets are simply defined as Web sites where buyers and sellers interact with each

other and conduct transactions.

The more common B2B examples and best practice models are IBM, Hewlett

Packard (HP), Cisco and Dell. Cisco, for instance, receives over 90% of its product orders

over the Internet.

Most B2B applications are in the areas of supplier management (especially purchase

order processing), inventory management (i.e., managing order-ship- bill

cycles), distribution management (especially in the transmission of shipping

documents), channel

management (i.e., information dissemination on changes in operational conditions),

and payment management (e.g., electronic payment systems).

B2C E-Commerce

Business-to-consumer e-commerce, or commerce between companies and

consumers, involves customers gathering information; purchasing physical goods

(i.e., tangibles such as books or consumer products) or information goods (or goods of

electronic material or digitized content, such as software, or e- books); and, for

information goods, receiving products over an electronic network.

It is the second largest and the earliest form of e-commerce. Its origins can be

traced to online retailing (or e-tailing). Thus, the more common B2C business models

are the online retailing companies such as Amazon.com. Some of the Indian B2C e-

commerce firms are futurebazaar.com (from Big Bazaar), thehindushopping.com,

indiaverta.com, fabmart.com and so on. Other B2C examples involving information

goods are Travelocity and Expedia.

The more common applications of this type of e-commerce are in the areas of

purchasing products and information, and personal finance management, which

pertains to the management of personal investments and finances with the use of

online banking tools (e.g., Quicken).

B2C e-commerce reduces transactions costs (particularly search costs) by

increasing consumer access to information and allowing consumers to find the

most competitive price for a product or service.

B2C e-commerce also reduces market entry barriers since the cost of putting up and

maintaining a Web site is much cheaper than installing a “brick-and-mortar” structure

for a firm. In the case of information goods, B2C e-commerce is even more

attractive because it saves firms from factoring in the additional cost of a

physical distribution network. Moreover, for countries with a growing and robust

Internet population, delivering information goods becomes increasingly feasible.

C2C E-Commerce

Consumer-to-consumer e-commerce or C2C is simply commerce between private individuals or consumers.

This type of e-commerce is characterized by the growth of electronic marketplaces and online auctions, particularly in vertical industries where firms/businesses can bid for what they want from among multiple suppliers. It perhaps has the greatest potential for developing new markets.

This type of e-commerce comes in at least three forms

➢ Auctions facilitated at a portal, such as eBay, which allows online real- time

bidding on items being sold in the Web;

➢ Peer-to-peer systems, such as the Napster model (a protocol for sharing

files between users used by chat forums similar to Internet Relay Chat) and other file exchange and later money exchange models; and classified ads at portal sites such as Sulekha.com and justdial.com classifieds.

Consumer-to-business (C2B) transactions involve reverse auctions, which empower the consumer to drive transactions.

A concrete example of this when competing airlines gives a traveler best travel and ticket offers in response to the traveler’s post that she wants to fly from one place to another as in www.priceline.com.

Components of a Typical Successful E-Commerce Transaction Loop

E-commerce does not refer merely to a firm putting up a Web site for the purpose of selling goods to buyers over the Internet.

For e-commerce to be a competitive alternative to traditional commercial transactions and for a firm to maximize the benefits of e-commerce, a number of technical as well as enabling issues have to be considered.

A typical e-commerce transaction loop involves the following major players and corresponding requisites The Seller should have the following components

A corporate Web site with e-commerce capabilities (e.g., a secure transaction server);

A corporate intranet so that orders are processed in an efficient manner; and IT-literate employees to manage the information flows and maintain the e-commerce system.

Transaction partners include

Banking institutions that offer transaction clearing services (e.g., processing credit card payments and electronic fund transfers);National and international freight companies to enable the movement of physical goods within, around and out of the country. For business-to- consumer transactions, the system must offer a means for cost-efficient transport of small packages (such that purchasing books over the Internet, for example, is not prohibitively more expensive than buying from a local store); and Authentication authority that serves as a trusted third party to ensure the integrity and security of transactions.

Consumers (in a Business-to-Consumer Transaction) who

Form a critical mass of the population with access to the Internet and disposable income enabling widespread use of credit cards;

Possess a mindset for purchasing goods over the Internet rather than by physically inspecting items.

Firms/Businesses (in a business-to-business transaction) that together form a critical mass of companies (especially within supply chains) with Internet access and the capability to place and take orders over the Internet.

Government, to establish

A legal framework governing e-commerce transactions (including electronic documents, signatures, and the like); and Legal institutions that would enforce the legal framework (i.e., laws and regulations) and protect consumers and businesses from fraud, among others.And finally, the Internet, the successful use of which depends on the following

A robust and reliable Internet infrastructure; andA pricing structure that doesn’t penalize consumers for spending time on and buying goods over the Internet (e.g., a flat monthly charge for both ISP access and local phone calls).

Advantages of E-Commerce for Businesses

E-commerce serves as an “equalizer”. It enables start-ups and small- and medium-sized enterprises to reach the global market.

However, this does not discount the point that without a good e-business strategy, e-commerce may in some cases discriminate against SMEs because it reveals proprietary pricing information. A sound e-business plan does not totally disregard old economy values. The dot-com bust is proof of this.

E-commerce makes “mass customization” possible. E-commerce applications in this area include easy-to-use ordering systems that allow customers to choose and order products according to their personal and unique specifications. For instance, a car manufacturing company with an e-commerce strategy allowing for online orders can have new cars built within a few days (instead of the several weeks it currently takes to build a new vehicle) based on customer’s specifications. This can work more effectively if a company’s manufacturing process is advanced and integrated into the ordering system.

E-commerce allows “network production.” This refers to the parceling out of the production process to contractors who are geographically dispersed but who are connected to each other via computer networks. The benefits of network production include reduction in costs, more strategic target marketing, and the facilitation of selling add-on products, services, and new systems when they are needed. With network production, a company can assign tasks within its non- core competencies to factories all over the world that specialize in such tasks (e.g., the assembly of specific components).

Payments on Internet

Most of online purchases are paid for by a credit card. Merchants like credit card payments because an instant authorization guarantees that the card is valid (as opposed o a check which may bounce). Customers like paying by credit cards because they can easily cancel a transaction in case when they don’t receive products or services according to the agreement in the transaction.

While some of credit card payments for online services are performed by phone, most of such payments are made by filling in an online form.

Credit card information submitted by the customer is sent to the bank which has issued the credit card to verify.

If the transaction is approved, the merchant notifies the customer that the order has been placed. The actual transfer of money from the credit card bank to the merchant may happen in a few hours, or even in a few days.

Merchants who accept credit card payments pay fee (between 1 and 7 percent of the card charge) for each card charge. In addition, in some cases merchants pay authorization fee for each credit card authorization attempt, as well as other fees related to credit card processing.

In case when a customer is not satisfied with the product or a service, or for other reasons, merchants may issue a refund or a charge-back to the customer’s account.

Technical Issues

There are several technical issues involved in online credit card payments as described below

Quick Check for Typos

Since the merchant may be charged for each credit card authorization, it is convenient to check that the credit card number makes sense before sending it to the issuing bank to authorize.

There is an easy algorithm to verify a credit card number the last digit of the credit card number is computed from the other digits using a simple procedure. The details are given here.

The algorithm is public, and therefore can be used only to catch typos and disallow random data, but not to check the validity of a credit card number.

Authenticating the User Protection from Customer Fraud

Since the card is not physically present during the transaction, it is practically impossible for a merchant to distinguish a legitimate credit card user from a thief. In online transactions the user is usually asked to provide additional information, such as their address and phone number, and the card’s billing address, if different from the customer’s address.

However, this information can be easily mistyped. While in a telephone transaction an operator can use their judgment to approve or reject a transaction based on how much of the information has matched and how confident the customer sounds, in an online transaction the level of “tolerance” of typos and mistakes must be set automatically.

Another way of verifying a card number is to ask the user to provide the additional digits on the card (the digits which do not appear on the magnetic strip or on a carbon paper when the print of the card is taken).

However, online customers may be reluctant to provide this information because of fear of merchant’s fraud (see below) or of eavesdropping.

Protecting Card Numbers in Transmission

Since information transmitted in an online transaction is sufficient for approval of a credit card charge, it is essential that this information is protected from eavesdropping.

The most common way of doing it is to encrypt data in transmission.

This is done via SSL. However, many online businesses do not use SSL when transmitting credit card numbers and other customer information, or do not make SSL the default for such transmissions.

While it is theoretically possible to obtain credit card information sent in plain text (in an e-mail message or via an online form), so far there hasn’t been a known case when a credit card number was stolen this way.

Protecting Card Numbers on the Merchant’s Site In practice, the main vulnerability of dealing with credit card numbers is not the transmission, but the storage.

Security experts agree that storing credit card numbers at the merchant’s site is a risky practice, and should be avoided. If credit card numbers need to be stored, they should be stored on a secure machine, and preferably in an encrypted form.

They should not be stored in a database which is (at least partially) accessible to customers, nor should they be stored (in any form) on the web server.

Electronic Payment Systems

Electronic payment systems are non-credit-card online payment systems. The goal of their development is to create analogs of checks and cash on the Internet, i.e. to implement all or some of the following features

1. Protecting customers from merchant’s fraud by keeping credit card numbers unknown to merchants.

2. Allowing people without credit cards to engage in online transactions.

3. Protecting confidentiality of customers.

4. In some cases providing anonymity of customers (“electronic cash”).

The problems in implementing electronic payment systems, especially anonymous electronic money, are

1. Preventing double-spending copying the “money” and spending it several times. This is especially hard to do with anonymous money.

2. Making sure that neither the customer nor the merchant can make an unauthorized transaction.

3. Preserving customer’s confidentiality without allowing customer’s fraud.

While electronic payment systems have not gained a very wide popularity, except for PayPal system used on online auctions, such as eBay, they may become more popular in the future if more businesses start using them.

Electronic payment systems may be more convenient for international online business due to differences in credit card customer protection laws in different countries.

Virtual PIN

Virtual PIN, started in 1994 by a company called First Virtual Holding, was a system for making credit card payments over the Internet without exposing the credit card number to the merchant. It required no special software for a customer to make a purchase. Virtual PIN relied on difficulty of intercepting and forging e-mail. To enroll, a customer gives their credit card information and their e-mail address to the First Virtual (this was done by phone). After the credit card information has been verified, the customer receives their PIN by e-mail.

The procedure for purchasing an item using Virtual PIN is as follows

The customer gives the merchant their Virtual PIN.

➢ The merchant sends the Virtual PIN and the amount of transaction to First Virtual.

➢ First Virtual sends an e-mail to the customer asking to confirm the purchase.

➢ The customer answered “Yes”, “No”, or “Fraud”. If the answer is “Yes”, the merchant is informed that the charge has been accepted.

If “No”, the charge is declined. If the answer is “Fraud”, the charge is investigated.

Even though no encryption was involved, an eavesdropper could not use a virtual PIN without being able to intercept and answer the e-mail message to confirm the purchase.

DigiCash (or E-Cash)

DigiCash (also known as E-cash) is an electronic payment system developed by

Dr. David Chaum, who is widely regarded as an inventor of digital cash. The system was based on digital tokens called digital coins. DigiCash operated as follows

➢ A customer establishes an account with the bank or other organization that could

mint and receive digital coins. The customer’s account was backed by real money

in some form, for instance it could be linked to the customer’s checking account.

➢ The customer also needs to download and install a software called electronic

wallet.

➢ To obtain DigiCash, the customer uses the electronic wallet to create digital coins.

The coins are sent to the bank to sign. When the coins are signed, the equivalent amount of money is withdrawn from the customer’s account.

In the proposed protocol the customer also had an option of “blinding” the coins.

To blind a coin, the customer multiplies it by a random number r before sending it to the bank to sign.

The bank signs the data. After the data and its digital signature are sent to the customer, the customer computes the digital signature of the original (non-multiplied) coin by dividing the bank’s signature by r. This way the bank doesn’t know the coin, but the customer, who knows r, can trace his/her payments. Blind signatures have not been implemented.

To find out why blind signatures work, read the article Cryptography and Number Theory for Digital Cash by Orlin Grabbe. This article explains mathematics behind blind signatures. This material is optional.

When the customer wants to make a purchase, he/she sends signed digital coins to the merchant. The merchant verifies the bank’s signature and deposits the coins to the bank, where they are credited to the merchant’s account.

The DigiCash (or E-cash), produced by the company DigiCash BV based in Amsterdam, has never created a market. The company eventually declared bankruptcy.

However, the algorithms used in DigiCash are considered fundamental in development of digital money.

CyberCash/CyberCoin

CyberCash is a system that allows customers to pay by a credit card without revealing the credit card number to the merchant. To achieve this, a credit card number is sent to the merchant in an encrypted form.

To enroll, a customer installs software called CyberCash wallet on their computer. At the time of the installment the wallet generated a pair of a public and a private key.

The wallet was protected by a passphrase, and a backup key was stored encrypted on a floppy disk.

A CyberCash account was linked to the customer’s credit card. A variation of this scheme called CyberCoin was linked to the customer’s checking account.

A purchase was conducted the following way

➢ When the purchase was initiated, the CyberCash wallet displayed the amount, the merchant’s name, and other information. After the customer approved the transaction, an encrypted payment order was sent to the merchant.

➢ The merchant could decrypt some of the information in the order, such as the

product list, the address, etc., but not the other (such as the credit card information).

The merchant’s software would add its own payment information to the order, digitally sign it, and then send it to the CyberCash gateway.

➢ The CyberCash gateway would decrypt the information. The order would be checked for duplicate requests. The gateway would verify that the customer’s and the merchant’s order information match (i.e. no fraud was committed on either side). Then it would perform the money transfer and send the approval message to the merchant.

The main point of this scheme was to prevent merchant’s fraud, and thus allow customers to do business with more merchants without fear of scam. However, CyberCash and CyberCoin were not able to find the market. The main reasons for the failure were the large size of customer’s software and the fact that very few merchants would accept CyberCash payment. The company was eventually bought by VeriSign.

SET (Secure Electronic Transactions)

SET is the Secure Electronic Transaction protocol for sending money over Internet. It has been developed jointly by MasterCard, Visa, and several computer companies.

SET uses mechanisms similar to CyberCash. However, being a standard protocol, it is built into a wide variety of commercial products.

In SET the order information consists of two parts the part which is private between the customer and the merchant (such as the items being ordered) and information which is private between the customer and the bank (such as the included in a single signed transaction the part private between the customer and the merchant is encrypted using the merchant’s private key, and the part private between the customer and the bank is encrypted using the bank’s public key.

To prevent changing the order information, the customer computes message digests of each part of the message separately, then takes the message digest of the two message digests, and then signs the resulting message digest.

This mechanism, called a dual signature, allows either the merchant or the bank to read and validate the signature on its half of the purchase request without having to decrypt the

other half.

The reason why SET never became popular was pretty much the same as for CyberCash the trouble of getting a digital wallet software and setting it up for each credit card was not worth it for a customer, because very few merchants would accept SET payments.

PayPal is an electronic payment system which can transfer money between its accounts. In order to use PayPal, one has to obtain a PayPal account, which is associated either with the customer’s credit card or with their regular bank account.

The validity of a credit card is checked by the usual ways. The validity of a checking account is checked as follows the customer gives PayPal their account number; PayPal makes two small-amount (less than $1) deposits to the account. If the customer is able to tell PayPal the value of these deposits, then the customer is assumed to be a legitimate user of the account.

PayPal provides easy interface to send money to anyone by giving the person’s e-mail account. In order for the person to retrieve the money, they must have a PayPal account. To avoid fraud, PayPal sends an e-mail message to both the initiator and the recipient of the transaction.

PayPal is used to settle online auctions, such as eBay auctions. The ease of use and the fact that no credit card is required to use it makes PayPal increasingly popular.

Example

Indian Railways online reservation system (operated by IRCTC) is very impressive and it supports a wide range of Internet banking services, credit card payments and other payment systems.

Smart Cards

Smart cards are cards that look like credit cards, but store information on a microprocessor chip instead of magnetic strips. A microchip can hold significantly more information than a magnetic strip. Because of this capacity, a single smart card can be used for many different purposes.

Unlike magnetic strip cards which can be read by any magnetic reader, and are therefore vulnerable to loss or theft, a smart card can be password-protected to guarantee that it’s only used by the owner.

Smart cards can run RSA encryption and can be programmed to generate a pair of public/private keys. The public key is made publicly readable, but the private key is be stored on the card without anyone being able to copy it. Therefore, to use the private key, the user must physically possess the card.

Smart cards are used in European telephones, and are gaining popularity for other purposes both in Europe and in the US.

Advantages and Disadvantages of Online Payment Systems

Typically, Internet merchant accounts are provided through an acquiring bank (or acquirer) that lets you accept credit cards, and sometimes other types of payments, online. As is the case with any business decision, there are advantages and disadvantages to online payment systems and other types of credit card processors.

In general, advantages tend to revolve around having direct control of the payment processing system. Disadvantages tend to revolve around mechanics, security, and logistics of being responsible for the entire payment process.

Advantages of Merchant Accounts and Other Online Payment Systems

Merchant accounts and third party payment processors provide needed online services. Advantages include

➢ Customer convenience - Online merchant accounts save site visitors the extra step of

writing and sending a check or calling in an order.

➢ Increased functionality - Internet processors also enable Web sites to be direct sales generator rather than simply lead generators or online brochures.

➢ Additional direct sales channel - Credit card processors help you add Internet sales as a revenue stream.

➢ Immediate authorization - With automation, you know immediately if an Internet

payment is valid. No waiting for checks to clear.

➢ Streamline payment process - With Internet merchant accounts and other payment

providers, there are fewer steps necessary to assure valid payment as compared to less automated processes.

Disadvantages of Internet Merchant Accounts

Like any other technology, there are disadvantages to online payment systems.

Some of the disadvantages of having your own Internet merchant account include

➢ You are responsible - With your own Internet merchant account, it is your

responsibility to maintain site function, resolve field service issues, etc.

➢ Fees - Various monthly fees are associated with Internet merchant accounts.

➢ Fraud - As a merchant, you may have to directly deal with credit card fraud.

➢ Security issues - Internet merchant accounts are only one piece of a reliable, secure

payment system. Private, sensitive information such as credit card numbers can be

stolen or altered; system integrity can be breached; and Web site spoofing are all risks with weak security systems.

➢ Agreements - Internet merchant accounts come with long agreements. Often, you

are committed to minimum time frames and/or dollar minimums.

Designing an E-Commerce Website Using 7Cs Framework

7Cs framework for e- commerce

website design. The interface is the virtual (and, to date, largely visible) representation of a firm’s chosen value proposition. Similar to a retail storefront, the virtual website provides significant information to current and prospective target market customers.

If designed effectively, the site quickly answers a number of basic questions that confront such users. Is this site worth visiting? What products or services does it sell?

What messages does the site communicate

Exclusivity? Low price? Ease of use? Consistent with a tightly constructed business model, well-designed sites should simultaneously attract target segment customers and repel (or not to appeal) non-targeted customers. Compelling sites communicate the core value proposition of the company and provide a rationale for buying from and/or visiting the site.

The following sections briefly describe the 7C

Context

The Context of the website is aesthetic and functional look-and-feel. Some sites have chosen to focus heavily on interesting graphics, colors, and design features, while others have emphasized more simply utilitarian goals, such as ease of navigation. Figure illustrates a webpage from Landsend.com. Lands’ End balances aesthetic (pastel colors; simple, warm visuals) and functional (crisp, uncluttered) design elements to communicate its core benefits—traditionally designed clothing, great service, and moderate prices.

In sharp contrast, an online apparel retailer - Luckyjeans.com will appear more hip, nontraditional brand; its website is comparatively more edgy, with bolder colors, humor (the “get lucky” slogan), and a more focused product line. Lands’ End customers might not find the Luckyjeans.com site appealing, purely because of its look- and-feel. Luckyjeans.com suggests a younger, more urban, and fashion-forward target segment. Compare the homepages (shown below) of these two online retailers.

Content

Community

Customization

Communication

Connection

Commerce

Note:- All content provided on this blog is for informational purposes only. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. The owner will not be liable for any errors or omissions in this information nor for the availability of this information. The owner will not be liable for any losses, injuries, or damages from the display or use of this information.

********************************* THE END ******************************