Professional Documents
Culture Documents
E-Business ..
E-Business ..
ITB07207
COLLEGE OF BUSINESS EDUCATION-DSM
Mr. Kikwembo Mlekwa
0714585989
15/06/2023
Mr. Kikwembo D. Mlekwa
00:34
Course Summary
• Introduction to e-commerce • Internet, Intranet, Extranet, and
Protocols
• Models of E-Commerce
• Transactions Processing in E- • E-business threats and measures.
Commerce • SCM and the role of e-business in
SCM
• E-Business and e-Business Process
Model • E-logistics
• Requirements for Creation of Online • Data Warehousing for e-business
Storefront
• E-Business Strategies
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
Course Summary
• E-payment Systems
• E-banking, e-telling and ATM
• Importance of e-commerce to SME’s
in Tanzania
• The role government in e-commerce
• CRM
• BPO
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
An introduction to e-commerce
Lecture one
Digitalization of business
Commerce
Computation Collaboration
Connection Communication
P2P C2C
C2A C2B
B2C
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
b2b
• Companies are involved in the supply chain, such as a manufacturer selling a
product to a wholesaler,
• the wholesaler selling the product to a retailer, all come together to conduct
business with each other using a common portal.
• In such an instance, the manufacturer could have a website / web portal that
could also be used by the wholesaler to place orders for the product; this
order could then be processed and sent to the wholesaler
Payment
3D Printing Gateway
Autonomous
Vehicles Analytics
Social Media
M-Commerce
E- E-
(Mobile
Procurement Government
Commerce)
E-
E-Democracy
Administration
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
M-Commerce
• Is commonly understood as the usage of mobile devices for business purposes,
especially mobile phones and PDA’s.
• Location independence of mobile customers
• High availability of services through well established mobile phones networks
• Increasing computing power of mobile devices, interactivity of mobile devices
(voice and data transfer)
• Security (when using mobile phone networks), localization for customers through
cell structure.
• Accessibility of customers and potential of personalized services/offers.
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
E-Procurement
• Is the automation of an organization’s procurement processes using Web-based
application.
• It enables widely dispersed customers and suppliers to interact and execute purchase
transactions.
• Each step in the procurement process is captured electronically, and all transaction
data is routed automatically, reducing time and cost of procurement.
• E-procurement is seen as the ordering of MRO goods, (MRO =
Maintenance/Repair/Operations) on the basis of Web-based application system
directly by the demand carrier to reduce process costs.
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
E-Government
• Consists of the digital interactions between:
• citizens and their government (C2G),
• government and government agencies (G2G),
• government and citizens (G2C),
• government and employees (G2E) and
• government and business/commerce (G2B).
• Online Marketplace/electronic
malls
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
Transactions Processing in E-
Commerce
Lecture II
Batch Processing
• Through batch processing, a TPS interprets sets, or batches, of
data by grouping items based on similarities.
Real-Time Processing
• Real-time processing is a method to process transactions as they
appear
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
Batch processing
• Batch processing can create a time delay because it reviews several sets of
data simultaneously, requiring more computing power.
• A customer pays for a subscription service at the end of the month, The TPS system
processes the transactions as a batch because they occur at the same time.
• In this case, a delay in processing transactions is acceptable because the system only
interprets batches once per month
Processing systems
Storage
Outputs
invoices
Bills
Coupons
Customer orders
Improved Reliability
Automated Management
Agent/Representative
Licensing Subscription
commissions
• In order to carry out the mission of the business, different activities are
required and certain resources are needed.
• For example, professional employees with specific skills or capabilities can
better perform particular business activities.
Setting Up Strategy
Domain
Name
Payment
Gateway
Security
Promotion
Internet
• The Internet is the global network infrastructure that enables
businesses to conduct e-business activities on a global scale.
• It provides a platform for online marketing, e-commerce, customer
engagement, and global connectivity.
• Businesses can leverage the Internet to reach a wide customer base,
promote their products or services, conduct online transactions, and
expand their market presence
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
Connection to E-Business
Intranet
• Intranets play a crucial role in supporting internal e-business operations
within an organization.
• They facilitate secure internal communication, collaboration, and
information sharing among employees.
• Intranets provide a centralized platform for employees to access e-
business tools, internal resources, databases, and applications necessary for
efficient internal processes, knowledge sharing, and decision-making.
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
Connection to E-Business
Extranet
• Extranets extend the functionality of an intranet by allowing authorized
external entities to access specific information or services.
• In the context of e-business, extranets enable collaboration with
suppliers, partners, or customers.
• They provide a secure channel for sharing product information, supply
chain management, customer self-service portals, and other e-business
activities that involve external stakeholders.
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
Connection to E-Business
Malware
Insider Unauthorized
Threats Access
Threats
Phishing and
Social
Engineering
Malware
• Malicious software, such as viruses, worms, Trojans, ransomware, and
spyware, can infect systems and compromise their security.
Unauthorized Access
• Unauthorized individuals gaining access to sensitive information or
system resources, often through weak passwords, stolen credentials, or
unpatched vulnerabilities.
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
Threats
Data Breaches
• Unauthorized access, disclosure, or theft of sensitive data, including
personal identifiable information (PII) or intellectual property.
Phishing and Social Engineering:
• Deceptive techniques used to trick individuals into revealing sensitive
information, such as passwords or financial details, through emails,
phone calls, or fake websites.
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
Threats
Physical Threats:
• Physical damage or theft of hardware,
such as servers or laptops, leading to
data loss or unauthorized access
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
Measures against Threats
Physical Firewall,
Security IDS/IPS
Awareness
and Training Encryption
Regular
Updates
Access Controls:
• Implement strong authentication mechanisms, such as multi-factor authentication
(MFA), and enforce strict access controls based on user roles and privileges.
Regularly review and update access permissions.
Firewalls and Intrusion Detection/Prevention Systems:
• Deploy firewalls and intrusion detection/prevention systems to monitor and filter
network traffic, preventing unauthorized access and detecting potential threats.
Encryption:
• Implement encryption mechanisms to protect sensitive data at rest and
in transit, including encryption of databases, file systems, and network
communications.
Regular Patching and Updates:
• Keep all software, operating systems, and applications up to date with
the latest security patches and updates to address known vulnerabilities.
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
Measures
Authentication:
• Verifying the identity of users and devices accessing a network or system. This
can involve the use of usernames, passwords, biometrics, two-factor
authentication (2FA), or other authentication mechanisms.
Encryption:
• Protecting data during transmission by encrypting it using cryptographic
algorithms. This ensures that even if intercepted, the data cannot be read or
understood by unauthorized parties.
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
Internet Security
Firewalls:
• Implementing firewalls to control incoming and outgoing network traffic. Firewalls analyze and filter network
packets based on predefined rules to prevent unauthorized access and block potentially malicious activity.
Streamlined Procurement
Sustainability and
Environmental Impact
Mr. Kikwembo D. Mlekwa 24/06/2023 12:14
Ways E-Business have Improved SCM
Streamlined Procurement:
• E-business enables organizations to automate and streamline
the procurement process.
• Online platforms and electronic catalogs allow for efficient
sourcing, supplier selection, and purchase order management.
• This reduces manual paperwork, improves accuracy, and speeds
up the procurement cycle.
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
Ways E-Business have Improved SCM
Personalization Digital
and Targeted Advertising and
Marketing Promotion
Data Analytics
CRM
and Insights
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
E-Business in E-Marketing
E-commerce Capabilities:
• E-business enables organizations to conduct online transactions and
facilitate e-commerce activities.
• This includes setting up secure online payment gateways, managing
product catalogs, implementing shopping cart functionalities, and
providing a seamless online purchasing experience.
• E-commerce platforms enable businesses to sell products or services
directly to customers, expanding their market reach.
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
E-Business in E-Marketing
Mobile Marketing:
• With the rise of mobile devices, e-business facilitates mobile marketing
strategies.
• Mobile-responsive websites, mobile apps, and location-based marketing
allow businesses to reach and engage with customers on their
smartphones and tablets.
• Mobile marketing includes techniques such as SMS marketing, mobile
advertising, and mobile app-based promotions.
Mr. Kikwembo D. Mlekwa 15/06/2023 00:34
E-Business in E-Marketing
Online Requisitioning:
• E-business facilitates the electronic submission and approval
of purchase requisitions.
• Employees can submit purchase requests online, specifying the
required items, quantities, and delivery dates.
• This eliminates manual paperwork, reduces errors, and
accelerates the procurement cycle.
Mr. Kikwembo D. Mlekwa 24/06/2023 12:30
E-Business in E-Procurement
E-Procurement Platforms:
• E-procurement platforms are comprehensive software solutions that
provide end-to-end support for procurement activities.
• These platforms typically include features such as requisitioning, vendor
management, catalog management, purchase order management, contract
management, and integration with other systems like ERP.
• Some popular e-procurement platforms include SAP Ariba, Coupa, Oracle
Procurement Cloud, and Jaggaer.
Mr. Kikwembo D. Mlekwa 24/06/2023 14:03
E-Procurement Tools and Techniques
E-Catalogs:
• E-catalogs are digital catalogs that provide detailed product information, pricing,
and availability.
• E-catalogs can be hosted on e-procurement platforms or accessed through
supplier portals.
• They allow buyers to browse and search for products, compare options, and make
informed purchasing decisions.
• E-catalogs can be created and managed using tools like ProcurementExpress,
Ariba Catalog, or custom catalog management systems.
Mr. Kikwembo D. Mlekwa 24/06/2023 14:07
E-Procurement Tools and Techniques
Transportation Management:
• E-logistics utilizes digital technologies to optimize transportation
activities.
• This includes route planning and optimization, carrier selection, load
consolidation, tracking and tracing of shipments, real-time visibility of
transport status, and performance monitoring.
• E-logistics enables organizations to enhance transportation efficiency,
reduce costs, and improve delivery reliability.
Mr. Kikwembo D. Mlekwa 24/06/2023 14:22
E-Logistic
Warehouse Management:
• E-logistics employs digital tools for warehouse management, such as
warehouse management systems (WMS), barcode scanning, and
automation technologies.
• These technologies enable efficient inventory tracking, order picking
and packing, stock replenishment, and warehouse layout optimization.
• E-logistics helps improve inventory accuracy, reduce stockouts, and
enhance overall warehouse productivity.
Mr. Kikwembo D. Mlekwa 24/06/2023 14:23
E-Logistic
Data Integration:
• E-business generates vast amounts of data from different systems
and sources, such as customer transactions, website interactions,
online sales, marketing campaigns, and supply chain activities.
• Data warehousing integrates this disparate data into a centralized
repository, eliminating data silos and providing a holistic view of
e-business operations
Mr. Kikwembo D. Mlekwa 24/06/2023 14:47
Data Warehousing
Dimensional Modeling:
• Data warehousing for e-business typically adopts dimensional modeling
techniques.
• Dimensional modeling structures the data in a way that facilitates easy and
efficient querying and analysis.
• It involves organizing data into dimensions (descriptive attributes) and measures
(numeric facts).
• This structure enables users to perform ad-hoc queries, drill-down, and aggregate
data for different business perspectives.
Mr. Kikwembo D. Mlekwa 24/06/2023 14:51
Data Warehousing
Decision Support:
• A data warehouse for e-business serves as a decision support
system, providing executives, managers, and analysts with
access to relevant and timely information.
• It enables them to monitor key performance indicators
(KPIs), track business metrics, and make informed decisions
based on comprehensive data analysis.
Mr. Kikwembo D. Mlekwa 24/06/2023 14:54
Data Warehousing
Predictive Analytics
Fraud Detection
Sentiment Analysis
Website Optimization
SAS WEKA
Cryptocurrencies
Online Banking
Online Banking:
• Online banking allows users to initiate
payments and transfers directly from their
bank accounts using internet banking
platforms or mobile banking apps.
Mr. Kikwembo D. Mlekwa 23/06/2023 20:17
Types of E-Payment
E-Wallets:
• E-wallets, also known as digital wallets, store
users' payment information and allow them to
make payments online or in physical stores.
• Examples include PayPal, Venmo, and Alipay.
Mr. Kikwembo D. Mlekwa 23/06/2023 20:29
Types of E-Payments
Cryptocurrencies:
• Cryptocurrencies, such as Bitcoin and Ethereum, are
digital currencies that use cryptography for secure
transactions.
• They operate on decentralized networks and offer
alternative payment methods
Mr. Kikwembo D. Mlekwa 23/06/2023 20:31
Payment Authorization and Processing
• When a customer initiates an electronic payment, the payment system verifies the
customer's identity and authenticity of the payment details, such as card information
or login credentials.
• The payment system authorizes the transaction by checking the availability of funds,
confirming the validity of the payment method, and conducting risk assessments
for fraud prevention.
• Once the transaction is authorized, the payment system processes the payment by
transferring funds from the customer's account to the merchant's account or
through an intermediary.
Infrastructure Development:
• The government invests in the development of digital
infrastructure, such as high-speed internet connectivity and
reliable telecommunications networks, to support the growth
of e-commerce.
• This includes initiatives to expand broadband access in both
urban and rural areas.
Mr. Kikwembo D. Mlekwa 24/06/2023 16:33
The Role of Government
Trade Facilitation:
• The government works towards simplifying and streamlining
cross-border e-commerce trade processes.
• This involves establishing efficient customs procedures,
implementing electronic customs clearance systems, and
participating in international trade agreements that support
e-commerce.
Mr. Kikwembo D. Mlekwa 24/06/2023 16:49
The Role of Government
Consumer Protection:
• The government ensures that consumer rights are protected in
e-commerce transactions.
• This involves enforcing regulations to prevent fraud,
misleading advertising, and unfair business practices.
• Consumer dispute resolution mechanisms may also be
established to address e-commerce-related complaints.
Mr. Kikwembo D. Mlekwa 24/06/2023 16:54
The Role of Government
Marketing Automation:
• CRM platforms often integrate marketing automation features.
• This allows businesses to automate marketing campaigns, track
customer responses, and measure the effectiveness of
marketing efforts.
• CRM systems can segment customers based on various criteria
and enable targeted marketing activities.
Mr. Kikwembo D. Mlekwa 24/06/2023 17:04
The role of CRM
Mobile CRM:
• Many CRM systems offer mobile applications or responsive
web interfaces, enabling access to customer data and CRM
functionalities on mobile devices.
• This facilitates remote access to information, allowing sales
teams and customer service representatives to engage with
customers on the go.
Mr. Kikwembo D. Mlekwa 24/06/2023 17:09
CRM
• The overarching goal of CRM is to create and nurture strong customer
relationships, enhance customer satisfaction, and drive business growth.
• By effectively managing customer interactions, leveraging customer data, and
implementing personalized strategies, businesses can improve customer
retention, increase sales, and gain a competitive edge in the market.