Term
2 purchasing theories- Buygrid Framework |
|
Definition
1.Buygrid Framework- Internal perspective •“We have some type of need for a product, ID what’s needed, find a supplier, have a routine ordering, make the product” |
|
|
Term
2 purchasing theories- Kraljic framework |
|
Definition
2.Kraljic’s Framework or Purchasing Portfolio Model- External Perspective i.Three Basic Steps: 1. Information 2. Negotiation 3. Settlement |
|
|
Term
Kraljic 4 quadrants of framework with location on X/Y axis |
|
Definition
Routine Items(BL)- Low profit impact and Low Supply risk Leverage Items(BR)- High Profit impact and Low Supply risk Bottleneck Items(TL)- Low Profit impact and High Supply risk Strategic Items(TR)- High Profit impact and High Supply risk
X-axis: Profit Impact
Y-axis: Supply Risk |
|
|
Term
Definition of e-procurement
and
Advantages of using it |
|
Definition
Purchase of Supplies and Services over the internet
Electronic procurement Advantage
|
|
|
Term
e-procurement Models-2- Hub and Spoke approach |
|
Definition
Hub and spoke approach: Closed Trading Environment
-
Buyer – centric: The buy organization is at the hub, connecting suppliers at the spokes
-
Seller – centric: The supplier is at the center, with buying organizations connected at the spokes
-
e-Marketplace: A third party is at the hub, with buying and selling organizations trading with each other
|
|
|
Term
e-procurement models-2- Open trading environment |
|
Definition
Open Trading Environment
-
Allows buyers/suppliers to establish systems that meet their requirements, w/o imposing them on their trading partners
-
XML/EDI
-
OBI – Open Buying on the Internet
|
|
|
Term
4 components of e-procurement |
|
Definition
-
Requisition Management
-
Request can be approved by anyone in company, helps speed along request systems
-
Allows orders to flow
-
Transaction Management
-
Helps transfer funds over the internet easier and in larger amounts
-
Transfers order over to supplier, using various types of connections
-
Connectivity Management
-
How the e-procurement system is connected to other systems within a company
-
Content Management
-
Up-to-date Data
-
Technical Functionality is working
|
|
|
Term
|
Definition
Electronic representations of information about products and services of an organization
-
Advantages
-
Greater flexibility, personalize content, standard interface, reduce cost of coordination, data gathering analysis.
-
Disadvantages
|
|
|
Term
|
Definition
-
Supplier managed
-
Buyer managed
-
Electronic marketplace managed catalog
|
|
|
Term
Definition of a network/ network org
|
|
Definition
Network- everyone has their own unique structure but work together for a common goal
|
|
|
Term
|
Definition
-
Operational Network
-
Routine operational work
-
Ex. Walmart and Procter & Gamble
-
Collaborative Networks
-
Companies that interact with each other in a network that can take a piece of the market share
-
Ex. Yahoo joining Microsoft to take a bit of the market share from Google
-
Innovative Networks
-
Companies combining researching and development (R&D). Reducing risk involving R&D
-
Ex. Intel and Nokia creating 3-d interface
-
Interest Group networks
-
Company’s competitors that form a network that have an interest they want to support or work against/ for policy.
-
Ex. Microsoft, Google, Apple, all teaming up to reduce spam.
|
|
|
Term
|
Definition
-
Stable or Dynamic
-
Stable – companies that are not easily broken
-
Dynamic – flexible and easily broken
-
Thick or Thin (Work activities with communication)
-
Thick – Communication about work/ extending employees to outside of work functions
-
Thin – Little work communication outside of work
-
Tightly or Loosely coupled networks (Processes)
-
Tightly coupled – Processes at one company effect processes at another company in the network
-
Loosely coupled – None of the processes are effected or influenced by other companies within the network
|
|
|
Term
Standardization in a network: Interoperability |
|
Definition
-
Technology: Middleware, protocols, security
-
Syntax: Structure or language of messages exchanged
-
Semantics: Meaning of terms
-
Pragmatics: Agreements on practices triggered by specific messages
|
|
|
Term
|
Definition
Steady flow of material through a network
Arranging activities in a particular order |
|
|
Term
Supply Chain management Model- 2 |
|
Definition
Pushed Model – Based off of forecasting what customers will buy
Pull Model – Based off of customers’ orders
|
|
|
Term
|
Definition
-
Policies, Procedures, and Technical Measures
-
Guarantee a proper functioning of Information Systems
-
Security requires a combination of technical, organizational and legal measures
|
|
|
Term
|
Definition
-
Making sure you have enough measurements available, optimal level of quality for service
-
Making sure enough resources are available to ensure a high level of quality for your server.
|
|
|
Term
Quality of service requirements |
|
Definition
|
|
Term
Service Level Agreement (SLA) |
|
Definition
A contract between a service provider to a customer, in measurable terms, what services they are providing and delivering. Mutual understanding and expectations.
|
|
|
Term
|
Definition
-
Man in the Middle Attack
-
Someone who changes information at the time between when it travels from client to server
-
Altering the information/ message and no one knows the difference
-
Spoofing
-
Creating fake websites that look similar to original and stealing information
-
Hacking
-
Unauthorized access into a server
-
Denial of Service Attack
-
Group of individuals will create software that accesses over the number of throughput and crash the server
|
|
|
Term
Information Security Requirements |
|
Definition
-
Authentication: Ensuring user is who they say they are
-
Authorization: Having a secure enough password/username
-
Integrity: Honest and trustworthy
-
Confidentiality: Ensures information is properly secured
-
Availability: Making sure server is available
-
Auditability: Information is saved on the server for audit purposes
-
Non-repudiation: Read receipts, making sure communication was delivered and read
-
Certification: making sure you have security certificates to prove encrypted data
|
|
|
Term
Public Key Infrastructure |
|
Definition
Technology that provides the foundation to implement e-Business security
|
|
|
Term
Digital certificates and signatures
|
|
Definition
Helps secure and safe communication
Files that identify user or organization that owns certificate
Establishes a relationship with public key and the person (or company) that owns the private key
Signatures guarantee that the enterprise/ person represented in the digital certificate sent the message
|
|
|