Thursday 28 August 2014

Threats in E.D.I




Types of Threats :


Cost Most companies are discouraged from the use of EDI by its initial and operative cost. The initial cost for installation of an EDI system, training and re-engineering of processes some times is high and cannot be justified by small and medium companies with low volume of transactions.


Business environment

The decision of implementing an EDI system relies as well on business environment of the company its clients and suppliers and the sector of activity. The company has to take into consideration whether its business partners already use or intend to use EDI systems.

Usually the company considers the use of an EDI system if the main client or supplier requires it, or if it is widely used in the sector.


Security

Security is one of the most important aspects when dealing with transmission of documents such as orders, invoices and payments. An EDI communication system must provides the trading partners with:
confidentiality of messages
authenticity of messages
functional acknowledgements of receipt
protection of messages

There are several security methods that are used in an EDI communication system. These are:
passwords, personal identification numbers
cryptography
message authentication code


Legal
 In a lot of national laws commercial transactions must be accompanied by written documents. The replacement of hard-copy documents with electronic ones requires legislature adjustments that usually require more time than technological changes.







#http://www.thalys.gr/pagesuk/edi/ediemplo.htm
nota kaki berbicara
#threats 

No comments:

Post a Comment