Session Seven: Principles of Distribution and Integration

Objectives:

  • Data security framework for identifying challenges to integration
  • Access controls and authentication - controlling what you share
  • Attribution and audit - data quality and reliability
  • Availability - data distribution, replication, and risk management
  • Scaling your system
  • Questions for vendors

Readings:

  • National Academy of Science, "Concepts of Information Security," Computers at Risk: Safe Computing in the Information Age. National Academy Press, Washington, D.C. 1990 p. 49 - 73.
  • Focus first on p. 49 - 56. See in particular p. 55 - 56 on different security requirements for different applications. Know the framework: integrity, confidentiality, and availability.
  • National Academy of Science, "Technology to Achieve Secure Computer Systems," Computers at Risk: Safe Computing in the Information Age. National Academy Press, Washington, D.C. 1990 p. 74 -101.
  • First read p. 83-88 on security services. Then read from 89 to the end on implementation.

Session Descriptions

Session One: Course Introduction - What is a Value Network?
Session Two: Case Study: EMC
Session Three: Cast Study: Wal-Mart and Cott Beverage
Session Four and Five: Case Study: Dell Computers
Session Six: Data Modeling for Integration
Session Seven: Principles of Distribution and Integration
Session Eight: Supply Chain Coordination Strategies
Session Nine: Supply Chain Systems and Vision
Session Ten: Customer Relationship Management / Information Sharing & Incentives
Session Eleven: After Sales Service and Support / Customer Service Differentiation
Session Twelve: Future Directions