Wednesday, 30 May 2012

CRM and MIS

CRM

Definition

Customer relationship management are the processes implemented by a company to handle its contact with its customers. Customer satisfaction is one of the key factors that defines business success. In an automated world, customers have come to expect that each and every communication should form part of a continuous stream of relevant and personalised ‘conversation’. CRM solution  give businesses the power to utilise organisational data to add value to the customer experience.



Organizing Customer Communication

A CRM system is most concerned with the customer record and managing the communications with that customer. Now, there are a lot of different forms of communications that occur with a customer. Typically, these customer communications fall into these kinds of categories: web form inquiries, phone calls, emails (as-needed or scheduled), meetings, advertisements, postal mail, and these days, texts.
This is a lot of different kinds of information, and as you can imagine, all of this communication can get easily lost or separated. This is where a business management CRM comes into play.
A business management CRM allows a company to track these various form of customer communications – all in one place. With the information about all your prospects and customers together, coupled with a record of the communications, you can design targeted action to address customers that are most likely going to purchase your products. Without the CRM tools, it can be nearly impossible to develop and execute on quality action that should lead to revenue-based success.



Purposes of CRM

• Helping an enterprise to enable its marketing departments to identify and target their best customers, manage marketing campaigns and generate quality leads for the sales team.
• Assisting the organization to improve telesales, account, and sales management by optimizing information shared by multiple employees, and streamlining existing processes (for example, taking orders using mobile devices)

• Allowing the formation of individualized relationships with customers, with the aim of improving customer satisfaction and maximizing profits; identifying the most profitable customers and providing them the highest level of service.
• Providing employees with the information and processes necessary to know their customers, understand and identify customer needs and effectively build relationships between the company, its customer base, and distribution partners.

Evaluating Competing CRM Software

Though making CRM comparisons can seem like a tough assignment, industry experts suggest that project managers can make the task much easier than it looks. By evaluating the ten most important CRM differences, purchasers can quickly narrow down a large list of vendors to three or four of the most viable candidates.
• Price
Most companies can find reliable CRM software within their budgets. When making CRM comparisons, purchasers should factor in differences in pricing models
• Connectivity
Some contact management tools rely solely on local databases, while others leverage the power of the Web.
• Compatibility
Some project managers fail to include the price of new hardware when estimating the total cost of ownership for new CRM software.
• Out-of-the-Box Readiness
Companies that want CRM software to help make quick changes can usually get by with stock templates until their systems can be totally customized.
• Customizability
CRM software developers understand that every company manages its operations differently. Therefore, most contact management and sales tracking systems offer modular designs and easy customization. Purchasers should ask vendors about the process to add new features over time.
• Ease of Use
When sales professionals find CRM software difficult to use, it fails to gain a foothold in an organization.
• Support
CRM comparisons should include an honest evaluation of the kind of support a sales team will need during and after implementation.
• Security
When making a customer relationship management comparison, purchasers should ask whether hosted CRM software meets industry standards for privacy and for data security. On-site CRM software solutions should include specific plans and budgets to safeguard dedicated hardware.
• Reliability
Major CRM differences exist between hosted platforms, on-premises systems, and client-based software tools. When hosting CRM software offsite, experts recommend reviewing the track records and the emergency plans of data centers. Likewise, companies planning to host CRM software in house should examine their own infrastructure and support systems.
• Scalability
Finally, any CRM comparison should include a look into the future. Ask whether inexpensive tools can easily grow to serve larger teams through a period of expansion. Discover how CRM software stores data, and how data server speed can be affected by a growing database.



MIS

Definition

Management Information Systems (MIS) is a general name for the academic discipline covering the application of information technology to support the major functions and activities of either a private sector business or public sector institution. In business, information systems support the process of collection, manipulation, storage, distribution and utilization of an organization's information resources, business processes and operations.
As an area of study it is also referred to as information technology management. The study of information systems is usually a commerce and business administration discipline, and frequently involves software engineering, but also distinguishes itself by concentrating on the integration of computer systems with the aims of the organization.



MIS - capabilities

The term 'information system' is a general term for a system that facilitates access to information; however, a ' management information system' refers to integrated data sources and information systems, which meet the particular needs and requirements of planning and decision-making. In an ideal case, the major objectives of MIS are to:
• reach an understanding of the relevant processes on the basis of the available historic information. This element forms the basis for the development of models, required for forecasting and simulation.
• provide information on the current situation, especially for early warning purposes, for instance related to issues impacting on food security, water resources or pest and disease status.
• forecast changes and impacts, either natural or man-made , as an element in vulnerability assessments.
• forecast the consequences of policy decisions and measures before they are implemented in reality. This implies evaluating options for several given scenarios based on the possible results and predicted consequences, and selecting the most acceptable alternative


 

 

Implementations

The majority of information systems are created for, and operated by, people in functional areas (e.g., manufacturing, human resources, accounting, finance and marketing). MIS professionals must possess a combination of business and technical knowledge to develop information systems that address the needs of the organization. They must comprehend organizational structures, objectives, operations including processes and the flows of data between processes and the financial connotations related to these factors. An MIS professional should interrelate effectively with users and design systems that would support their needs.
MIS managers and professionals should keep themselves updated with evolving information technologies. They should have a solid foundation of technical skills to select appropriate technologies and to implement computer-based information systems. Thus, MIS people must be well versed in topics such as systems development tools and techniques, information architecture, network configurations, databases, and systems integration.




Submitted by
Ayoniza (213294)
The collaboration means is idea to provide web services that have very complex names starting with live. The idea is to provide web services that require minimal downloads and enable teams of people to work on various projects .the two offering have some what different feature sets


              Microsoft live is more useful for smaller business that are just getting startedonline ,or if u need quick online storage repository that is free.lotus live has the opportunity to displace more of the web conferencing that is going on with other vendor and can be expensive way to collaborat on presentations or spread sheets .do try both and let me know what do u think it is nice to see an age-old pc software rivalry being updated in the web generation too. 
               Collaboration tool that offers voice video and social networking in one application .through quad people will bee able to search their organizational for content and find collegues with specific expertise ,according to cisco prosumer video is designed for business users who need to store and image video ,according to cisco .the product include in an online video workspace  called focal pointand a business. Grade camcorder name minipro.focal point will allow corporate teams to share and view the same videos ,while mino pros integrated software will let them edit and store the videos on their own pcs before uploading them to focal point .



                 Communicating with employes via email alve has been challenge for allure.the company second renovation crews to vatious sites,and those employees are inadvertently excluded or there are legs in communication between messages 
                 Office collaboration tools may be the killer app for this generation atleast from abusiness perspective collaboration tools are turning into social software for the work place .the share point intrant we use at my company is the single most used application outside of telephony collaboration used to be emailing documents back and forth between a work group.now its acomplex suite of integrated productivity software that we make your work team operate in a high efficient manner .the software developer not only builds application that can enhance collaboration tools but they also must be power users of the tool .collaboration of a softwaredevelopment team is essential and can be difference between a successful prohect and a failed project.we are seeing collaboration move from a company data enter to the cloud to make it easier for tea ms from different companies and possibly even different cultures to interact .

Submitted by
Mohsin Sultan

Monday, 28 May 2012

Cloud Computing

                                                            
Cloud computing could be defined as a tool which has changed the way of organised commercial computing and availing the computing options for very less cost and effort. Thought it has drawbacks as well, but the positive aspects are so influential that they cannot be overlooked, which has been reason for many innovations which has changed the computing scenario. This has dramatically changed the meaning of system and made very sophisticated system accessible to every level of the entities. Speed, scalability, security are the key areas being enjoyed by the users of cloud computers now. All these factors make using the cloud computing worthwhile as they are proving themselves crucial in success of any business. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. We have been using the services of cloud computing for many years now, for example, Google Docs, Amazon’s EC2 (Elastic computing cloud) and S3 (Simple Storage Services).it is also an important evolution in the way that businesses and individuals consume and operate technology. Cloud computing makes IT infrastructure more dynamic, modular, and easy-to-consume. Cloud computing is a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends Information Technology's existing capabilities. It is an on-demand delivery model for IT services or applications with the characteristics of multi-tenant hosting, elasticity (variable capacity) and utility based billing.
Cloud Computing


Cloud Computing is very essential in today’s global e- commerce environment because with cloud computing customers do not own network resources, such as hardware, software, systems, or services; network resources are provided through remote data centre on a subscription basis; and network resources are delivered as services over the web. Now all the business existing are focusing in cost reduction. They tend to provide cheap service to their clients. In addition access to the highly sophisticated system is a crucial need of today’s market as customers are not ready to spend their valuable time for anything. So business are looking forward towards offering cheap and flexible services where cloud computing has proved itself as the base of today’s growing market with prices going downwards with every new development. It has shown many hopes as it is very helpful in reducing costs as the companies no more has to worry about investing in hardware and timely upgrades. In addition business can enjoy high level of flexibility in storage spaces along with highly automated system. Moreover, IT professionals can enjoy more mobility as they now don’t have to stick with their desk and can access to their system and data from almost anywhere in the world where they can find basic computer facilities. This ultimately allows them to focus on other various areas for new innovations apart from traditional problems like upgrades and similar computing issues. Simultaneously, it also saves companies from investing huge amount in systems and hardware which they can use in other areas and reduce the cost of business which in beneficiary both for service providers and users.

Sunday, 27 May 2012

mobile application


LATEST BUSINESS MOBILE PHONE APPLICATION

SAP Business One Mobile App- Latest Version 1.6.0

We couldn’t get by without mobile applications into the businesses. It means there would be great challenge to survive without mobile application.

The biggest reason for using mobile applications are saving time, cost saving etc..

Business mobile phone applications are really important. it can be helpful for the customer to saving time, getting information, offers etc.  And it is very good way to keep in touch with the customer. In today's world most of the people who looks for something (goods or services) they use their mobile phone on the way because its most of the time with them and easy to use.









                           
  Requirements for mobile devices:

The iOS in your iPad or iPhone will need to be updated to iOS 5.x . SAP Business one for iPhone and iPad 1.6.x is not supported by lower versions of iOS

Requirements for SAP Business One solution:

SAP Business One 8.82 patch level (PL) 06 or higher.

Usability

You can use SAP Business One mobile app 1.6.x with older versions of SAP Business One (such as SAP Business One 8.81) however the latest functions introduced in mobile app version 1.6.x will not work. When accessing such function, a pop-up window appears, stating that the desktop application must be upgraded to enable the selected function. All mobile app functions that were supported by the older version of SAP Business One will still work.

As always the mobile app is free to download and to use it you only need a professional, limited, or Starter Package user license of SAP Business One with a valid maintenance contract.





Customers of present business world expect better quality goods and information in a fast and effortless mode. The main benefit of internet is that of speed and convenience. Hence e-business, which depends on the internet as the foundation for business transactions, can be very helpful to make a business more customer-friendly and customer oriented in addition to many other things as well, such as constructing a more competent exchange of information and/or products and services.
Customers require not be in the equivalent substantial place as an e-business and the trade of information and transactions may take place at any time, twenty-four seven a days a week and from any place in the whole world were Internet can easily accessible. A physical location is restricted by size and limited for many businesses and customers are also limited, while an online store has a international marketplace with full of customers and information seekers which are already waiting in line.
In e-business, there is frequently a decline in operating cost which is essential to complete conventional business events. Many traditional business approaches can be eliminated and replaced with electronic means, which are over and over again easier to carry out as well as easier on the note case. For example, compare the cost of sending out 100 direct mailings (paper, postage, staff and all), to sending out a bulk e-mail. Also think about the cost of paying rent at a physical location opposed to the cost of maintaining an online site.
Highly customizable services are available for e-business customers and communication is repeatedly more effective. There is far more flexibility, availability and faster response times with online support. For example, think about the speed of e-mail inquiries and live chat as conflicting to getting on the phone, particularly when that business is closed for the day. There is also a faster delivery phase with online sales, helping strengthen the customer/business connection. The internet is a influential channel for reaching new markets and communicating information to customers and partners. Having a better understanding of your customers will help to improve customer contentment.
The internet opens up a brand new marketplace to businesses moving online. Rivalry via the internet is growing as the internet itself grows and waiting too long to move online may cause you to lose your place in line completely. Easy right of entry to real time information is a most important benefit of the internet, enabling a company to give more competent and official information and helping to gain the competitive advantage over those that are not online.
Even though there are risks relate with e-business, as with most business pronouncement, there is also the risk linked with the failure to adapt to the changing times. Change is predictable in today’s marketplace and should be embraced with open arms and open sites.
MUHAMMAD WAHID
ID: 1184280
MIS 1-2012 Assignment 2

Friday, 25 May 2012

Successful e-businesses need security watchdogs

Abstract (summary)


So what exactly should be done to protect an e-business from these security breaches and other threats? According to [Ken Beyer], the first step is dedicating a fulltime staff to monitor a company's computer systems. For an e-business, constant Web site availability is essential as clients turn to this medium for its speed and time efficiency.

Full text

New York-The e-- business process is easy enough for those using the medium to purchase products and services. Visit a Web site; find a product or service; enter the necessary shipping information; plug in a credit card number; and-before you know it-- your purchase is complete and on its way to your front door.
For those operating the thousands of enterprises found on the Internet, however, the process entails a bit more than a few mouse dicks and some typing on the keyboard. Besides fulfilling orders promptly and efficiently, e-business owners must make sure their customers are provided with a safe and secure purchasing environment-one free from the hassles of computer hacking, viruses and fraud.
"Today almost every business has become an e-business. Everyone has a Web site and so in some ways they've opened themselves to the outside world by putting [that] Web site up," says Ken Beyer, chief technology officer of Atlanta-based MortgageRamp.
Inevitably, as use of the Web has grown more frequent, crimes aimed at companies operating Internet-based businesses have also grown abundant. The Code Red Worm and the "I Love You" bug are just two of thousands of viruses repeatedly launched to invade and debilitate the servers of e-businesses nationwide as hackers regularly break into computer systems to wreak havoc within companies. And of course, the new business medium has also made it simpler for anonymous users to commit fraud using stolen credit card numbers, social security numbers and other personal information.

View Image -   Ken Beyer

For these reasons, many within the industry claim it is essential for e-businesses to devote much more to the security of their companies than the one-time installation of firewalls or anti-virus software.
"You can't invest [in security] once and think you're done," Beyer says. "It's something [that] you have to get up every morning and do every day."

According to the 2001 Computer Crime and Security Survey conducted by the FBI and the Computer Security Institute, 85 percent of survey respondents, which included a number of large companies and government agencies, encountered computer security breaches in the previous 12 months. In addition, 64 percent-about 168 respondents-- acknowledge there have been financial repercussions due to security breaches and report a total loss of approximately $377.8 million.

MortgageRamp, which provides an online commercial finance platform that offers everything from online borrowing and lending to back-office solutions, handles significant amounts of data provided by its various clients on a daily basis. "Our clients have a vast amount of their competitive advantage in their data and we want to make sure that that data does not leak out to anyone else," says Beyer.

So what exactly should be done to protect an e-business from these security breaches and other threats? According to Beyer, the first step is dedicating a fulltime staff to monitor a company's computer systems. For an e-business, constant Web site availability is essential as clients turn to this medium for its speed and time efficiency. And as numerous viruses and hackers don't just destroy data but also strive to completely disable Web sites, Beyer says it is important for e-businesses to remain on constant alert for security threats. "We've dedicated a full-time staff to monitor not only the latest viruses that are out there, but also to monitor intrusion detection for hackers and other people that are trying to tamper with systems," he says. Beyer admits the "I Love You" e-mail virus did penetrate the company's system earlier this year, although it was quickly taken care of so that no damage was felt by MortgageRamp's clients. As for the infamous Code Red Worm, Beyer says MortgageRamp successfully patched all of its servers before the worm found the opportunity to squirm its way in.

Al Decker, director of security and privacy services for EDS, a global services company headquartered in Plano, Texas, says security has become a predominant issue in the e-business world. Without it, a company's e-business initiative will likely suffer greatly, he says. "You need to build trust in that e-business vehicle before it's going to be used by consumers" Decker explains. Furthermore, a strong security system includes everything from good infrastructure, firewalls and anti-virus software to administrators willing to grow and change with technology. "Security is not a point solution. It's a thorough plan and complete architecture that really needs to be assessed, planned, designed, implemented and maintained," Decker notes. "You can't set it and forget it. Today's solution needs to be updated constantly."
And an important catalyst to achieving that, says Decker, is raising issues of security needs to the very senior levels of the organization-including the CEO. "If the CEO is not behind appropriate security and privacy measures, they are likely to not be as effective as they should be."

As for EDS, the company operates by helping clients manage business and technology complexities encountered in the digital economy. In April 2001, EDS launched its Cyber Security Institute (CSI)-a computer security curriculum designed to arm IT professionals and consumers with skills to battle hackers, security breaches and viruses. "The Cyber Security Institute will provide courses all the way from what we call Security 101, which is a very entry-level course that talks about the basic concepts of confidentiality, availability, integrity and protection of information to some very technical courses on the implementation of technologies and building of security architectures," Decker says.

Also an option in strengthening security protocol within e-businesses is hiring audit firms, such as KPMG, which help organizations measure performance, manage risks and leverage knowledge. Larry Street, leader of the technology department and head of the real estate and lending technology group of the Atlanta-based law firm Morris, Manning & Martin, LLP, explains that companies such as KPMG look into the security systems of e-businesses to determine the obvious and not so obvious ways of gaining unauthorized access to corporate servers and sites. "There are risks," says Street, "but there are also solutions to protect against most of the risks."
According to Street, auditors and security consultants work with an "automated hacker" that tests numerous methods of breaking into a computer. If the hacker is successful, the company is notified via an extensive report and the system's administrator is told exactly which "holes to plug."
Street says he and other lawyers within the firm are frequently involved in drafting agreements between e-businesses and audit companies. "It's important to make sure that those people don't hurt your system in the process of helping it" he says. "They are going to be trying to break into the system... to see if you're secure. So in many cases, we need to make sure that companies aren't harmed by the people they are hiring."
What's more is numerous insurance companies now offer e-businesses customized insurance coverage. "Another way of protecting against [security threats] is by buying insurance," says Street. "A lot of companies are now offering insurance to protect against loss resulting from unauthorized access.
Perhaps the most unnerving fact regarding e-business security issues is that one of the most eminent threats to a company comes from within its own ranks. Street and others maintain a company's own employees pose a great threat to security. In fact, both Decker and Beyer assert that 80 to 90 percent of computer break-ins or violations occur internally.

"Either employees are a security problem because they become disaffected, they inadvertently give out information that allows people to break in or they keep information in an unsecure form that people can easily get access to," Street says.
And yet the biggest threat, Decker asserts, most often stems from companies' utterly lax viewpoints on security.

"The greatest threat [to a company is] the feeling that it is not going to happen to them," he says. "Security tends to be put on the back burner as something we'll get around to. The rapid pace of the e-business environment today just cannot be left to chance."


 Reference:

Maria, Pikramenos, 2001. Successful e-businesses need security watchdogs. Successful e-businesses need security watchdogs, [Online]. vol. 36. 10, pp. 1. Available at: http://search.proquest.com.ezproxy.uws.edu.au/docview/236942941?accountid=36155 [Accessed 25 May 2012].

E-business process networks - successful value chains through standards

Abstract (summary)


In the 1990s, companies focused on the design and implementation of their internal business processes to overcome functional barriers. The 2000s are about the integration between enterprises and inter-enterprise processes, particularly the improvement of supply chain management and customer relationship processes, The major enabler is the Internet, which has resulted in entire networks of e-business processes across various organizations. To design and implement those processes efficiently and effectively, more and more organizations use available industry standards in the form of reference models, e.g. the supply chain reference model (SCOR), the RosettaNet Standards, or software reference models. Unclear for many enterprises is how to use those standards. This article describes a comprehensive methodology for the use of reference models, to design and implement inter-enterprise collaborations within value chain networks. The methodology leads to fast and reliable results in value chain improvement. It increases the performance of the implementation procedure and the resulting business processes. [PUBLICATION ABSTRACT]

Full text


Abstract

In the 1990s, companies focused on the design and implementation of their internal business processes to overcome functional barriers. The 2000s are about the integration between enterprises and inter-enterprise processes, particularly the improvement of supply chain management and customer relationship processes, The major enabler is the Internet, which has resulted in entire networks of e-business processes across various organizations. To design and implement those processes efficiently and effectively, more and more organizations use available industry standards in the form of reference models, e.g. the supply chain reference model (SCOR), the RosettaNet Standards, or software reference models. Unclear for many enterprises is how to use those standards. This article describes a comprehensive methodology for the use of reference models, to design and implement inter-enterprise collaborations within value chain networks. The methodology leads to fast and reliable results in value chain improvement. It increases the performance of the implementation procedure and the resulting business processes.

Electronic access

The Emerald Research Register for this journal is available at www.emeraldinsight.com/researchregister
The current issue and full text archive of this journal is available at www.emeraldinsight.com/1741-0398.htm
E-business processes and industry standards
While companies in the 1990s focused on the design and implementation of their internal business processes to overcome functional barriers, the 2000s are about the integration between enterprises, about inter-enterprise processes. These changing management paradigms are reflected in a changing information technology focus: the focus moves from integrated intra-enterprise application packages to Internet-based "e-enabled" and inter-enterprise focused application software.
The improvement of supply chain management (SCM) and customer relationship management (CRM) processes are key to enable the enterprise value chains. The major enabler is the Internet. That is why the resulting processes are called e-business processes, connected to entire networks of processes across various organizations.

In order to design and implement inter-enterprise e-business processes efficiently and effectively, more and more organizations use available industry standards in the form of reference models like the supply chain operations reference (SCOR) model, developed by the Supply Chain Council (SCC), the RosettaNet Standards, or software reference models. It increases the performance of the implementation procedure as well as of the resulting business processes. Standardization organizations like, e.g. the SCC consist of hundreds of member companies, developing reference models that reflect industry best practices. Other reference models are developed by solution providers, e.g. application software vendors or consulting companies. What is unclear for many enterprises is HOW to use those standards. Therefore, the following article describes a methodology for design, implementation and continuous improvement of inter-enterprise e-business processes, leading to successful value chains based on industry standards.
The methodology has been developed within a joint initiative between Intel, Siemens AG SBS, IDS Scheer and various technology partners (Kirchmer et al., 2002).

Available industry standards for e-business processes

Key areas of inter-enterprise value chains are covered by the supply chain operations reference (SCOR) model. Therefore SCOR is an excellent basis for the design of such e-business processes. Using this industry standard facilitates a broad use of the later developed approach. Many organizations to be integrated through e-business processes may already be familiar with SCOR and can use it as a joint communication platform.

In order to specify the detailed interactions between involved companies, the RosettaNet models were chosen. These standards are very common, especially for the high-tech industry. However, alternative models like the OAGI standards, can be used in the same way.

SCOR

The SCOR model (Supply Chain Council, 2001) has been developed and endorsed by the SCC, an independent non-for-profit organization. The SCC was founded in 1996, in the USA, and has now branches all over the world. SCOR is a business process reference model that contains all supply chain activities from a supplier's supplier to a customer's customer. This includes:
* all customer interactions from order entry through paid invoice;
* all product (physical goods, services, ...) transactions including equipment, supplies, spare parts, bulk product, software, etc.; and
* all market interaction from the understanding of the aggregate demand to the fulfillment of each order.
SCOR contains three levels of process detail. The top level (process types) defines the scope and content. It consists of the five top level processes:
(1) plan;
(2) source;
(3) make;
(4) deliver; and
(5) return.

The second level of SCOR, the configuration level (process categories), contains 30 process categories, like:
* "make-to-stock";
* "make-to-order";
* "engineer-to order"; or
* "production execution".

These process categories can be used to "configure" a company's supply chain. Companies implement their operations strategy through the configuration they choose for their supply chain.
The third SCOR level, the process element level (decomposed processes) is used to fine-tune the operations of a company. It consists of:
* process element definitions;
* process element information inputs and outputs;
* process performance metrics;
* best practices;
* system capabilities necessary to support best practices; and
* systems/tools to be used.

Companies implement their supply chain solution on Level 4 (or even more levels of detail). Level 4, called implementation level (decomposed process elements), defines practices to achieve competitive advantage and to adapt to changing business conditions. This level is company specific and therefore not in scope of SCOR. The structure of SCOR is shown in Figure 1.
SCOR also includes a methodology that enables companies to analyze and improve their supply chain operations by helping them communicate supply chain information across the enterprise, measure performance objectively, identify supply chain performance gaps and improvement objectives. The SCOR methodology has essentially four steps:

View Image -   Figure 1 Structure of SCOR
(1) Analyze the basis of competition.
(2) Configure the supply chain.
(3) Align performance levels, practices and systems.
(4) Produce a plan for supply chain improvement backed up with projected ROI.
The methodology is applied to produce supply chain improvement project proposals backed up with sound business cases and high-level specifications of proposed solutions.

RosettaNet

The RosettaNet group is an industry organization that drives collaborative development and rapid deployment of Internet-based business standards, creating a common language and open e-business processes that provide measurable benefits and are vital to the evolution of the global, high-tech trading network (RosettaNet, 2000). RosettaNet has been founded in 1998, in the USA, and has now also achieved a global presence. The RosettaNet standards consist of a three-level business process architecture that supports inter-enterprise e-business interactions:
(1) partner interface processes (PIPs);
(2) RosettaNet dictionaries; and
(3) RosettaNet implementation framework (RNIF).
Relevant for the context of the initiative described in this article is, first of all, the business view described in the PIPs. However, it is an important aspect that the use of the PIP standards also ensures the technical implementation of the defined solutions.

A PIP describes activities, decisions and interactions necessary to fulfill an entire inter-enterprise business transaction. They also define structure and format of business documents. An example of a PIP process definition is shown in Figure 2. It is an excerpt of an event-driven process chain (Scheer, 1998).
The Open Applications Group (2002) or the Business Process Management Initiative (2002) offer similar standards that can be used as an alternative to, or in combination with, the RosettaNet standards.

View Image -   Figure 2 Example of a PIP process model
Others
In order to identify the relevant inter-enterprise supply chain interactions between companies the Y model developed by Scheer (Scheer, 1994a, b) can be used. It includes all relevant business processes of a company, the planning as well as the execution activities. Each involved company can be represented by one Y model based on which the interactions can be easily defined. Since it also includes activities that are not in the scope of SCOR, e.g. research and development, the Y model can, on one hand, be used complementary to the SCOR model, on the other hand, to identify the areas that will be specified using SCOR. The use of the Y model is especially important to create a high-level entry point into inter-enterprise process definition activities. An example for the use of the Y model to describe the collaboration areas between a manufacturer of locomotive engines and a supplier is shown in Figure 3.
On the implementation level, software reference models can be added to the mentioned reference models as, for example offered by SAP (Kirchmer, 1999; Gulledge et al, 2002).
Procedure for the efficient and effective use of standards
After selecting the reference models to be used, a procedural model has to be developed, describing HOW the business reference models for the design of inter-enterprise e-business process networks can be used. The ARIS architecture provides the basis for process description and the eBPI approach provides the framework within which the presented reference models are used.

ARIS architecture as basis for process description

The "architecture of integrated information systems" (ARIS), developed by Scheer (Scheer, 1998a, b; 2002), can be used as a framework to describe business processes efficiently, but nonetheless completely, thus manage the knowledge about business processes. Using ARIS, a process can be examined from five different points of view ( see Figure 4):
(1) Organization view (Who takes part in the process, which companies, departments or people?).

View Image -   Figure 3 Use of the Y-model to identify inter-enterprise collaboration
(2) Function view (What is done in this process?).
(3) Data view (What information is produced or needed?).
(4) Output (result) view (Which outputs/ results/deliverables are produced?).
(5) Control view (How do the four other views interact? Who works on which functions using which data and in which operational logic to produce which deliverables?).

View Image -   Figure 4 ARIS information system views
If it is possible to answer the questions concerning the various views, then a business process is adequately described. All the knowledge necessary for an efficient and effective business process life-cycle management is gathered. The control view, in particular, plays a central role, as it brings together the individual views and thus forms the foundation for successfully functioning business processes. The different views can be described on a pure business concept level, an information technology (IT) specification level (defining IT solution types, e.g. SCM) and an implementation level (defining concrete IT solutions, e.g. a specific SCM system).

Every view of the ARIS architecture can be described by various modeling methods. They can be used to answer and communicate the mentioned questions. The ARIS architecture can be used as structure for information modeling methods. A big advantage for the practical use of the ARIS architecture is the availability of a software tool based on this architecture, the ARIS Toolset.

The ARIS architecture is especially suited for the use in inter-enterprise environments (Kirchmer, 2002):

* The use of the Internet allows companies to change and extend their offerings. Instead of selling CDs, music files can be downloaded directly from the Web, for example. Or packages in transit can be tracked through the Internet - as additional customer service. Therefore the examination of a specific "output (product) view" of business processes, as suggested by the ARIS architecture, is extremely important in an e-business inter-enterprise environment.

* E-business processes enable the efficient and effective collaboration between enterprises, directly or through so-called "e-marketplaces". This means that responsibilities are shared between organizational units of the collaborating enterprises. As a consequence, the examination and maybe change of organizational structures becomes key for design and implementation of e-business processes; again, an aspect handled in a specific view of the ARIS architecture.

* The collaboration of different organizations leads to a "process-to-process" integration, to e-business process networks. The coordination of all aspects necessary to achieve this integration is handled as a key aspect in the control view of the ARIS architecture.

eBPI approach as basis for the procedural model

The eBPI approach is a general procedure to use the ARIS architecture in an inter-enterprise e-business environment (Kirchmer, 2002). The objective of eBPI is to deliver, on one hand, a structure for managing the life-cycle of e-business processes successfully; on the other hand, to leave enough flexibility to adapt procedures continuously to changing environments, typical of an e-business initiative. eBPI is an information model-based approach to e-business, combining aspects of efficiency and effectiveness.
The eBPI approach is structured into four major phases:
(1) development of the e-business process vision;
(2) specification of the resulting e-business processes;
(3) realization of the e-business processes; and
(4) continuous improvement of the e-business processes.

The starting point eBPI is the elaboration of an e-business process vision. Core deliverables are e-business process scenarios, a high-level description of the envisioned collaboration of organizations. These scenarios are further specified in the following phase of eBPI. This specification phase includes the definition of inter-enterprise and intra-enterprise processes, necessary to realize the defined scenarios, and the selection of the required e-enablers, such as application software products. The selected e-enablers are used to realize the e-business processes in the following phase of eBPI, which combines software implementation and e-integration activities. The realization phase triggers a continuous improvement of the implemented e-business processes (CPI). Key is here the definition of an effective business process performance management. The CPI can then restart the whole eBPI procedure in order to reflect customer, new market and technology developments.

While the e-business process vision focuses on complete e-business scenarios consisting of one or more processes, the specification phase focuses on individual e-business processes, and the realization phase on sub-processes or functions to ensure rapid results. Those sub-processes or functions are reassembled to complete business processes, which lay the basis for the continuous process improvement
The phases of eBPI are not just in a "process sequence" with a defined beginning and a defined end. The continuous improvement will trigger - sooner or later - another visioning phase. Also, the different phases influence each other, which may cause changes in preliminary eBPI phases triggered by activities in the current phase.

The structure of eBPI is shown in Figure 5.
Procedure for the integrated use of reference models
The selected reference models reflect all ARIS views of the relevant inter-enterprise business processes. Focus of the procedure to be developed is on the Vision and Specification phases of the eBPI approach.

View Image -   Figure 5 Structure of the e-business process improvement procedure (eBPI)
Starting point of the eBPI procedure is the elaboration of an e-business process vision, which equates to the results of the SCOR methodology as used to identify and prioritize supply chain improvement projects. Core deliverables from the SCOR analysis within the Vision phase are e-business process scenarios in the form of a high-level description of the envisioned collaboration between organizations of the extended supply network.

Therefore, a first modeling step is the identification of scope, both for the relevant process and chosen products (goods, services, others) (Kirchmer, 2002). The relevant activities of each company can be either identified using SCOR, or on a broader base, using the Y model.

The standard elements of the top level of the SCOR definition (the process types "plan", "source", "make", "deliver", and "return") have been found being too general. Therefore, one usually starts the supply chain configuration by defining the roles within each tier of the supply network (e.g. manufacturer at facility X, distributor, customer, etc.) and the major activities using a value added chain diagram (VACD) as method. An example for a level 1 supply chain definition using the VACD structure is shown in Figure 6. This representation is actually one level above the configuration model of SCOR, which would reveal the process categories (e.g. source to stock, make to order, deliver to order, etc.) for each role. This means, the SCOR reference model is used as the basis for the process definition, but it is adapted to the specific use by specifying the high-level activities through the roles of the executing organizational units.

As a result of applying a SCOR analysis to the supply chain, an inter-enterprise e-business scenario can be identified and prioritized based on best practices and specific patterns of the supply chain definition.
The "model object" encapsulating the scenario model is positioned on the supply chain VACD as shown in Figure 6, which refers to an example scenario: "demand response with collaborative reset/replan". It can then be specified using SCOR Level II and III elements as a guideline. This means the scenarios are defined using the SCOR structure, but the process elements are specified according to the specific situation. The scenarios are role-based, so that they can be used in all similar situations. The scenario models define how business processes are distributed between the various roles and which business documents are exchanged. They cover all ARIS process views. An example of an e-business scenario model is shown in Figure 7.

View Image -   Figure 6 Example of a supply chain definition
In order to get a handle on an e-business scenario, we determine the information flow between SCOR Level III process elements on either side of the partner boundary in a particular community of business partners for some segment of a supply chain. The information flow, as defined by the SCOR in/ out data elements, defines the interactions of the scenario.

View Image -   Figure 7 Example of an e-business scenario
The process parts of the e-scenarios exchanging documents between roles and therefore between enterprises can now, as mentioned, be further specified using elements of SCOR Level III and the RosettaNet PIP specifications. Again, all ARTS views are covered. Figure 8 shows an example of such a process specification.

Further RosettaNet PIP elements, especially the detailed process models, can be used on the Levels IV and further, in conjunction with software reference models. The use of SAP and RosettaNet reference models has been positively tested. This highest process specification can now be implemented, based on identified application software packages and the technical components of the RosettaNet standards in the Realization phase of eBPI.

View Image -   Figure 8 Process definition using SCOR and RosettaNet elements
The Realization phase triggers a continuous improvement phase for the implemented e-business processes. Figure 9 shows the described approach in an overview, using the "Intel-Siemens" initiative as an example.

Application of the defined procedure

The developed methodology has been tested within the joint project with Intel, Siemens and IDS Scheer. Workshops were organized to provide realistic examples of the SCOR to RosettaNet mapping methodology, using the ARIS Toolset as the enabling software tool.

Key tool functionality

Since the ARIS architecture had been chosen as the basis for the process description, the ARIS Toolset (ATS), a set of software tools based on ARIS, was a natural fit for this initiative (IDS Scheer AG, 2000). However, several characteristics were especially important for the final selection of the tool.
Key is, of course, that the described methods are supported. But it is also important that the ATS allows UML modeling and interfaces to software development tools. Therefore, developed requirement definitions can be used as a basis for necessary software development very efficiently, without any double work.
Important was also the integration of ARIS to EAI and business process execution environments. This again allows an easy and effective transfer of the developed process models into the process execution. This reusability of process models increases the value of this structured design tremendously.
The next advantage is the availability of all required reference models in the tool: SCOR3 RosettaNet PIP definitions and SAP reference models are available in the ATS. This allows a straightforward use of the business content of those industry standards.

View Image -   Figure 9 Defining e-business process networks with SCOR and RosettaNet
Possibilities to publish models over the Internet and even to support an Internet-based model development were crucial for this inter-enterprise initiative. People of various locations, even of different continents, were involved. Therefore, communication and model exchange over the Web is key.
Also, the availability of ARIS Process Performance Manager, a tool to support the business process controlling, was an interesting aspect. It allows the measurement of the implemented processes.
Overall, the ease-to-use of the tool and the fact that all involved organizations had already been using the ATS is another decision factor. Just as the used reference models are industry standard, the selected tool had also to be widely used to be able to duplicate the developed approach easily.

Lessons learned

The following benefits have been achieved:
* A single integrated repository of SCOR models, standard e-business scenarios, and RosettaNet PIP information enables the support of future Value Chain Projects dealing with inter-enterprise processes.
* The project teams will be able to easily access the business documentation of standards like RosettaNet.
* Once a solid meta-architecture is developed for the SCOR to RosettaNet mapping effort, other standards can be incorporated easier.
* Based on these standard models, project teams then will be able to model their specific processes as necessary. Selecting complete reference models or just specific parts and elements of those will expedite their efforts and lead to a much higher standardization across project teams working off the same reference database.
* The outcome of new projects based on this approach will be additional templates.
All in all, a "business process warehouse" of reference models has been built which creates, together with the defined procedures and the enabling ARIS tool, a "business process factory". This combined software and tool environment enables an efficient and effective design and implementation of e-business process networks.
Sidebar
Sidebar
Sidebar
References
References
Business Process Management Initiative (2002), The Business Process Management Initiative - BPMI, available at: www.bpmi.org
Gulledge, G., Simon, G. and Sommer, R. (2002), "Using ARIS to manage SAP Interoperability", in Scheer, A.-W., Abolhassan, F., Jost, W. and Kirchmer, M. (Eds), Business Process Excellence - ARIS in Practice, Springer, Berlin, New York, NY.
IDS Scheer AG (2000), Bus/ness Process Management - ARIS Too/set Products, White paper, February, IDS Scheer AG, Saarbrucken.
Kirchmer, M. (1999), Business Process Oriented Implementation of Standard Software - How to Achieve Competitive Advantage Efficiently and Effectively, 2nd éd.. Springer, Berlin, New York, NY.
Kirchmer, M. (2002), e-Business Process Improvement (eBPI) - Building and Managing Collaborative e-Business Scenarios, White Paper, Berwyn, PA.
Kirchmer, M., Brown, G. and Heinzel, H. (2002), "Using SCOR and other reference models for e-business process networks", in Scheer, A.-W., Abolhassan, F., Jost, W. and Kirchmer, M. (Eds), Business Process Excellence - ARIS in Practice, Springer, Berlin, New York, NY.
Kirchmer, M. (1999), "Market- and product-oriented definition of business processes", in Elzinga, D.J., Gulledge, T.R. and Lee, C.-Y. (Eds), Business Process Engineering, Kluwer Academic, Norwell, MA, pp. 131-44.
Open Applications Group (2002), Best Practices and XML Content for eBusiness and Application Integration, available at: www.openapplications.org
RosettaNet (2000), RoseftaWet Overview, available at: rosettanet.org (accessed May 2000).
Scheer, A.-W. (1994a), CIM - Computer Integrated Manufacturing, 3rd ed., Berlin, New York, and others.
Scheer, A.-W. (1994b), Business Process Engineering, 2nd ed., Berlin, New York, and others.
Scheer, A.-W. (1998a), ARIS - Business Process Frameworks, 2nd ed., Berlin, New York and others.
Scheer, A.-W. (1998b), ARIS - Business Process Modeling, 2nd ed, Berlin, New York and others.
Scheer, A.-W., Abolhassan, F., Jost, W. and Kirchmer, M. (Eds) (2002), Business Process Excellence - ARIS in Practice, Springer-Verlag, Berlin, New York, NY.
Supply Chain Council (2001), Supply-Chain Operations Reference-model - Overview of SCOR Version 5.0, Supply Chain Council, Pittsburgh, PA.
AuthorAffiliation
The author
Mathias Kirchmer is President and CEO of IDS Scheer, Inc. and a member of the Extended Executive Board of IDS Scheer AG, IDS Scheer, Inc., Berwyn, PA, USA.


Reference 

Anonymous, Kirchmer, 2004. E-business process networks. E-business process networks - successful value chains through standards, [Online]. vol. 17. 1 , pp. 20-30. . Available at: http://search.proquest.com.ezproxy.uws.edu.au/docview/220044419?accountid=36155 [Accessed 25 May 2012].