Business Functions and Supply Chains

This week we examine common business functions and the ways in which information systems support those functions. The outline presented here is intended to help point out important topics and terms. It is not intended to replace the lecture (or reading the chapter). If you are following along in the text, this material is covered in chapter three.

Objectives

Note: Since there are many terms and topics covered in this week's notes, highlights have been added to point out some of the more important concepts. Don't ignore the non-highlighted sections, but it would be beneficial to pay extra attention to the highlighted sections.

Terminology

Note: Information systems (IS) can help with BOTH effectiveness AND efficiency.

Business function: Accounting

Business function: Finance

Business function: Engineering

Note: People are often confused about the difference between the way the terms prototype and rapid prototype are used. A rapid prototype is a prototype, but a prototype is quite often NOT a rapid prototype. This is important to recognize since you may be asked what a prototype is. You should not assume it is a rapid prototype (quick 3-D model created to check a design or for testing).

Business function: SCM

SCM: MRP

SCM: MRP II

SCM: Monitoring and Control, Shipping

SCM: RFID in SCM

Business function: CRM

Business function: Human Resource Management

Business function: Inter-organizational SCM

Consumer Privacy

Many companies collect vast amounts of information about their customers (and potential customers). To be responsible, companies should declare and implement privacy and data retention policies which include the following:

Enterprise Resource Planning

ERP software attempts to automate most of the functions discussed in this chapter. The software is extremely complex and quite expensive. SAP and Oracle produce the most common ERP packages. A failure to successfully implement one of these systems could bankrupt a company.

RFID

RFID stands for Radio Frequency IDentification. RFID chips and readers have become quite common. RFID chips range from very low cost chips with no on-board power source, to expensive RFID chips with on-board batteries. Chips with batteries can be read from further distances and can provide a lot more information when requested. The more interesting chips are the low cost chips. But how do they work if they have no on-board power source?

Cheap RFID chips get their power through the air. They have very tiny built-in antennas. When their antenna receives a signal of a specific frequency, the antenna picks up just enough power from that signal to send out a tiny message. An RFID scanner sends out a signal asking RFID chips to identify themselves. If any chips are in range, they can respond back to the scanner with their unique identification number. That number can be looked up in a database by the computer controlling the RFID scanner to see what RFID chips are present.

Please note that the RFID chip must pass close to an RFID scanner to give out its information. If the RFID chip is wrapped in something that interferes with the signal, then scanning can be disrupted. Simply wrapping an RFID chip in aluminum foil can reduce the effective scanning range from around 18 inches to a couple of inches.

People often get the mistaken impression that RFID chips would be great for locating stolen goods because the chips could be tracked like an emergency beacon. The only way that would work is if thieves were considerate enough to carry RFID scanners with them, scan every item they steal, transmit that information to the police along with a continuous update of where they are located, and the police acted on that information promptly to catch the thief with the merchandise.