Title:
Electronic commerce
Personal Author:
Edition:
7th annual ed.
Publication Information:
Australia : Course Technology, 2007
ISBN:
9781418837037
Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010105483 | HF5548.32 S36 2007 | Open Access Book | Book | Searching... |
Searching... | 30000010133909 | HF5548.32 S36 2007 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Electronic Commerce, Seventh Edition covers emerging online technologies and trends and their influence on the electronic commerce marketplace. This edition highlights important security issues, such as spam and phishing, their role in organized crime and terrorism, identity theft, and online payment fraud. The pedagogical value of this new edition is enhanced through a fresh 4-color interior, and new and updated material that balances the technological with the strategic aspects of successful e-commerce.
Author Notes
Gary Schneider is an Associate Professor of Accounting and Information Systems at the University of San Diego School of Business
Table of Contents
Preface | p. xvii |
Part 1 Introduction | |
Chapter 1 Introduction to Electronic Commerce | p. 2 |
Electronic Commerce: The Second Wave | p. 4 |
Electronic Commerce and Electronic Business | p. 5 |
Categories of Electronic Commerce | p. 5 |
The Development and Growth of Electronic Commerce | p. 8 |
The Dot-Com Boom, Bust, and Rebirth | p. 9 |
The Second Wave of Electronic Commerce | p. 11 |
Business Models, Revenue Models, and Business Processes | p. 14 |
Focus on Specific Business Processes | p. 14 |
Role of Merchandising | p. 15 |
Product/Process Suitability to Electronic Commerce | p. 15 |
Advantages of Electronic Commerce | p. 17 |
Disadvantages of Electronic Commerce | p. 18 |
Economic Forces and Electronic Commerce | p. 20 |
Transaction Costs | p. 21 |
Markets and Hierarchies | p. 22 |
Using Electronic Commerce to Reduce Transaction Costs | p. 24 |
Network Economic Structures | p. 24 |
Network Effects | p. 25 |
Using Electronic Commerce to Create Network Effects | p. 26 |
Identifying Electronic Commerce Opportunities | p. 26 |
Strategic Business Unit Value Chains | p. 26 |
Industry Value Chains | p. 28 |
SWOT Analysis: Evaluating Business Unit Opportunities | p. 30 |
International Nature of Electronic Commerce | p. 31 |
Trust Issues on the Web | p. 32 |
Language Issues | p. 33 |
Culture Issues | p. 34 |
Culture and Government | p. 36 |
Infrastructure Issues | p. 38 |
Summary | p. 41 |
Key Terms | p. 41 |
Review Questions | p. 42 |
Exercises | p. 42 |
Cases | p. 43 |
For Further Study and Research | p. 47 |
Chapter 2 Technology Infrastructure: The Internet and the World Wide Web | p. 51 |
The Internet and the World Wide Web | p. 53 |
Origins of the Internet | p. 54 |
New Uses for the Internet | p. 54 |
Commercial Use of the Internet | p. 55 |
Growth of the Internet | p. 56 |
Emergence of the World Wide Web | p. 57 |
Packet-Switched Networks | p. 60 |
Routing Packets | p. 60 |
Internet Protocols | p. 62 |
TCP/IP | p. 62 |
IP Addressing | p. 63 |
Domain Names | p. 64 |
Web Page Request and Delivery Protocols | p. 66 |
Electronic Mail Protocols | p. 66 |
Unsolicited Commercial E-Mail (UCE, Spam) | p. 67 |
Markup Languages and the Web | p. 68 |
Standard Generalized Markup Language | p. 69 |
Hypertext Markup Language | p. 70 |
Extensible Markup Language (XML) | p. 76 |
HTML and XML Editors | p. 81 |
Intranets and Extranets | p. 82 |
Intranets | p. 82 |
Extranets | p. 83 |
Public and Private Networks | p. 83 |
Virtual Private Network (VPN) | p. 84 |
Internet Connection Options | p. 85 |
Connectivity Overview | p. 85 |
Voice-Grade Telephone Connections | p. 86 |
Broadband Connections | p. 86 |
Leased-Line Connections | p. 88 |
Wireless Connections | p. 88 |
Internet2 and the Semantic Web | p. 92 |
Summary | p. 94 |
Key Terms | p. 95 |
Review Questions | p. 97 |
Exercises | p. 97 |
Cases | p. 98 |
For Further Study and Research | p. 101 |
Part 2 Business Strategies for Electronic Commerce | |
Chapter 3 Selling on the Web: Revenue Models and Building a Web Presence | p. 106 |
Revenue Models | p. 107 |
Web Catalog Revenue Models | p. 108 |
Digital Content Revenue Models | p. 115 |
Advertising-Supported Revenue Models | p. 117 |
Advertising-Subscription Mixed Revenue Models | p. 121 |
Fee-for-Transaction Revenue Models | p. 122 |
Fee-for-Service Revenue Models | p. 130 |
Revenue Models in Transition | p. 132 |
Subscription to Advertising-Supported Model | p. 133 |
Advertising-Supported to Advertising-Subscription Mixed Model | p. 133 |
Advertising-Supported to Fee-for-Services Model | p. 133 |
Advertising-Supported to Subscription Model | p. 134 |
Multiple Transitions | p. 134 |
Revenue Strategy Issues | p. 136 |
Channel Conflict and Cannibalization | p. 137 |
Strategic Alliances and Channel Distribution Management | p. 138 |
Mobile Commerce | p. 139 |
Creating an Effective Web Presence | p. 140 |
Identifying Web Presence Goals | p. 140 |
Achieving Web Presence Goals | p. 141 |
Web Site Usability | p. 146 |
How the Web Is Different | p. 146 |
Meeting the Needs of Web Site Visitors | p. 147 |
Trust and Loyalty | p. 149 |
Rating Electronic Commerce Web Sites | p. 150 |
Usability Testing | p. 150 |
Customer-Centric Web Site Design | p. 151 |
Connecting with Customers | p. 151 |
The Nature of Communication on the Web | p. 152 |
Summary | p. 155 |
Key Terms | p. 155 |
Review Questions | p. 156 |
Exercises | p. 157 |
Cases | p. 157 |
For Further Study and Research | p. 161 |
Chapter 4 Marketing on the Web | p. 165 |
Web Marketing Strategies | p. 167 |
Product-Based Marketing Strategies | p. 168 |
Customer-Based Marketing Strategies | p. 170 |
Communicating with Different Market Segments | p. 171 |
Trust and Media Choice | p. 172 |
Market Segmentation | p. 173 |
Market Segmentation on the Web | p. 175 |
Offering Customers a Choice on the Web | p. 176 |
Beyond Market Segmentation: Customer Behavior and Relationship Intensity | p. 176 |
Segmentation Using Customer Behavior | p. 176 |
Customer Relationship Intensity and Life-Cycle Segmentation | p. 179 |
Acquisition, Conversion, and Retention of Customers | p. 181 |
Customer Acquisition, Conversion, and Retention: The Funnel Model | p. 183 |
Advertising on the Web | p. 184 |
Banner Ads | p. 185 |
Other Web Ad Formats | p. 189 |
Site Sponsorships | p. 190 |
Effectiveness of Online Advertising | p. 190 |
E-Mail Marketing | p. 191 |
Permission Marketing | p. 191 |
Combining Content and Advertising | p. 192 |
Outsourcing E-Mail Processing | p. 192 |
Technology-Enabled Customer Relationship Management | p. 193 |
CRM as a Source of Value in the Marketspace | p. 193 |
Creating and Maintaining Brands on the Web | p. 195 |
Elements of Branding | p. 195 |
Emotional Branding vs. Rational Branding | p. 196 |
Brand Leveraging Strategies | p. 197 |
Brand Consolidation Strategies | p. 197 |
Costs of Branding | p. 197 |
Affiliate Marketing Strategies | p. 198 |
Viral Marketing Strategies | p. 199 |
Search Engine Positioning and Domain Names | p. 201 |
Search Engines and Web Directories | p. 201 |
Paid Search Engine Inclusion and Placement | p. 202 |
Web Site Naming Issues | p. 204 |
Summary | p. 207 |
Key Terms | p. 207 |
Review Questions | p. 209 |
Exercises | p. 209 |
Cases | p. 210 |
For Further Study and Research | p. 213 |
Chapter 5 Business-to-Business Strategies: From Electronic Data Interchange to Electronic Commerce | p. 217 |
Purchasing, Logistics, and Support Activities | p. 219 |
Purchasing Activities | p. 220 |
Direct vs. Indirect Materials Purchasing | p. 222 |
Logistics Activities | p. 223 |
Support Activities | p. 225 |
E-Government | p. 226 |
Network Model of Economic Organization | p. 228 |
Electronic Data Interchange | p. 229 |
Early Business Information Interchange Efforts | p. 230 |
Emergence of Broader EDI Standards | p. 231 |
How EDI Works | p. 232 |
Value-Added Networks | p. 237 |
EDI on the Internet | p. 239 |
Open Architecture of the Internet | p. 240 |
Financial EDI | p. 241 |
Supply Chain Management Using Internet Technologies | p. 242 |
Value Creation in the Supply Chain | p. 242 |
Increasing Supply Chain Efficiencies | p. 244 |
Using Materials-Tracking Technologies with EDI and Electronic Commerce | p. 245 |
Creating an Ultimate Consumer Orientation in the Supply Chain | p. 247 |
Building and Maintaining Trust in the Supply Chain | p. 247 |
Electronic Marketplaces and Portals | p. 248 |
Independent Industry Marketplaces | p. 248 |
Private Stores and Customer Portals | p. 251 |
Private Company Marketplaces | p. 251 |
Industry Consortia-Sponsored Marketplaces | p. 252 |
Summary | p. 254 |
Key Terms | p. 254 |
Review Questions | p. 255 |
Exercises | p. 256 |
Cases | p. 256 |
For Further Study and Research | p. 259 |
Chapter 6 Online Auctions, Virtual Communities, and Web Portals | p. 263 |
Auction Overview | p. 264 |
Origins of Auctions | p. 265 |
English Auctions | p. 265 |
Dutch Auctions | p. 266 |
First-Price Sealed-Bid Auctions | p. 267 |
Second-Price Sealed-Bid Auctions | p. 267 |
Open-Outcry Double Auctions | p. 267 |
Sealed-Bid Double Auctions | p. 268 |
Reverse (Seller-Bid) Auctions | p. 268 |
Online Auctions and Related Businesses | p. 269 |
General Consumer Auctions | p. 270 |
Specialty Consumer Auctions | p. 276 |
Consumer Reverse Auctions and Group Purchasing Sites | p. 276 |
Business-to-Business Auctions | p. 279 |
Business-to-Business Reverse Auctions | p. 283 |
Auction-Related Services | p. 284 |
Virtual Communities and Web Portals | p. 288 |
Mobile Communications Technology | p. 289 |
Mobile Business | p. 290 |
Intelligent Software Agents | p. 290 |
Virtual Communities | p. 291 |
Early Web Communities | p. 292 |
Web Community Consolidation | p. 294 |
Web Communities in the Second Wave of Electronic Commerce | p. 294 |
Revenue Models for Web Portals and Virtual Communities | p. 296 |
Summary | p. 300 |
Key Terms | p. 300 |
Review Questions | p. 301 |
Exercises | p. 302 |
Cases | p. 303 |
For Further Study and Research | p. 305 |
Chapter 7 The Environment of Electronic Commerce: Legal, Ethical, and Tax Issues | p. 309 |
The Legal Environment of Electronic Commerce | p. 311 |
Borders and Jurisdiction | p. 311 |
Jurisdiction on the Internet | p. 314 |
Conflict of Laws | p. 317 |
Contracting and Contract Enforcement in Electronic Commerce | p. 318 |
Use and Protection of Intellectual Property in Online Business | p. 322 |
Web Site Content Issues | p. 322 |
Domain Names, Cybersquatting, and Name Stealing | p. 326 |
Protecting Intellectual Property Online | p. 327 |
Defamation | p. 328 |
Deceptive Trade Practices | p. 329 |
Advertising Regulation | p. 329 |
Online Crime, Terrorism, and Warfare | p. 331 |
Online Crime | p. 331 |
Online Warfare and Terrorism | p. 333 |
Ethical Issues | p. 333 |
Ethics and Web Business Policies | p. 334 |
Privacy Rights and Obligations | p. 334 |
Communications with Children | p. 339 |
Taxation and Electronic Commerce | p. 340 |
Nexus | p. 341 |
U.S. Income Taxes | p. 341 |
U.S. State Sales Taxes | p. 342 |
European Union Value Added Taxes | p. 343 |
Summary | p. 344 |
Key Terms | p. 345 |
Review Questions | p. 345 |
Exercises | p. 346 |
Cases | p. 346 |
For Further Study and Research | p. 349 |
Part 3 Technologies for Electronic Commerce | |
Chapter 8 Web Server Hardware and Software | p. 354 |
Web Server Basics | p. 356 |
Types of Web Sites | p. 356 |
Web Clients and Web Servers | p. 357 |
Dynamic Content | p. 358 |
Various Meanings of "Server" | p. 360 |
Web Client/Server Communication | p. 361 |
Two-Tier Client/Server Architecture | p. 361 |
Three-Tier and N-Tier Client/Server Architectures | p. 362 |
Software for Web Servers | p. 363 |
Operating Systems for Web Servers | p. 364 |
Web Server Software | p. 364 |
Finding Web Server Software Information | p. 367 |
Electronic Mail (E-Mail) | p. 367 |
E-Mail Benefits | p. 367 |
E-Mail Drawbacks | p. 367 |
Spam | p. 368 |
Solutions to the Spam Problem | p. 369 |
Web Site and Internet Utility Programs | p. 377 |
Finger and Ping Utilities | p. 378 |
Tracert and Other Route-Tracing Programs | p. 378 |
Telnet and FTP Utilities | p. 379 |
Indexing and Searching Utility Programs | p. 380 |
Data Analysis Software | p. 380 |
Link-Checking Utilities | p. 380 |
Remote Server Administration | p. 381 |
Web Server Hardware | p. 381 |
Server Computers | p. 381 |
Web Server Performance Evaluation | p. 383 |
Web Server Hardware Architectures | p. 384 |
Summary | p. 388 |
Key Terms | p. 388 |
Review Questions | p. 389 |
Exercises | p. 390 |
Cases | p. 390 |
For Further Study and Research | p. 394 |
Chapter 9 Electronic Commerce Software | p. 397 |
Web Hosting Alternatives | p. 398 |
Basic Functions of Electronic Commerce Software | p. 400 |
Catalog Display | p. 401 |
Shopping Cart | p. 403 |
Transaction Processing | p. 407 |
Advanced Functions of Electronic Commerce Software | p. 407 |
Middleware | p. 407 |
Enterprise Application Integration and Databases | p. 408 |
Web Services | p. 410 |
Integration with ERP Systems | p. 413 |
Electronic Commerce Software for Small and Midsize Companies | p. 415 |
Basic Commerce Service Providers | p. 415 |
Mall-Style Commerce Service Providers | p. 418 |
Estimated Operating Expenses for a Small Web Business | p. 420 |
Electronic Commerce Software for Midsize to Large Businesses | p. 421 |
Web Site Development Tools | p. 421 |
Electronic Commerce Software for Large Businesses | p. 423 |
Enterprise-Class Electronic Commerce Software | p. 424 |
Customer Relationship Management Software | p. 426 |
Supply Chain Management Software | p. 428 |
Content Management Software | p. 428 |
Knowledge Management Software | p. 429 |
Summary | p. 430 |
Key Terms | p. 430 |
Review Questions | p. 431 |
Exercises | p. 431 |
Cases | p. 433 |
For Further Study and Research | p. 435 |
Chapter 10 Electronic Commerce Security | p. 438 |
Online Security Issues Overview | p. 440 |
Managing Risk | p. 441 |
Computer Security Classifications | p. 442 |
Security Policy and Integrated Security | p. 442 |
Security for Client Computers | p. 444 |
Cookies | p. 444 |
Web Bugs | p. 447 |
Active Content | p. 447 |
Java Applets | p. 449 |
JavaScript | p. 449 |
ActiveX Controls | p. 450 |
Graphics and Plug-Ins | p. 450 |
Viruses, Worms, and Antivirus Software | p. 451 |
Digital Certificates | p. 455 |
Steganography | p. 458 |
Physical Security for Clients | p. 458 |
Communication Channel Security | p. 459 |
Secrecy Threats | p. 459 |
Integrity Threats | p. 461 |
Necessity Threats | p. 462 |
Threats to the Physical Security of Internet Communications Channels | p. 463 |
Threats to Wireless Networks | p. 463 |
Encryption Solutions | p. 464 |
Ensuring Transaction Integrity with Hash Functions | p. 471 |
Ensuring Transaction Integrity with Digital Signatures | p. 472 |
Guaranteeing Transaction Delivery | p. 473 |
Security for Server Computers | p. 474 |
Web Server Threats | p. 474 |
Database Threats | p. 475 |
Other Programming Threats | p. 475 |
Threats to the Physical Security of Web Servers | p. 476 |
Access Control and Authentication | p. 478 |
Firewalls | p. 479 |
Organizations that Promote Computer Security | p. 481 |
CERT | p. 482 |
Other Organizations | p. 482 |
Computer Forensics and Ethical Hacking | p. 483 |
Summary | p. 484 |
Key Terms | p. 485 |
Review Questions | p. 486 |
Exercises | p. 487 |
Cases | p. 487 |
For Further Study and Research | p. 490 |
Chapter 11 Payment Systems For Electronic Commerce | p. 493 |
Online Payment Basics | p. 495 |
Payment Cards | p. 497 |
Advantages and Disadvantages of Payment Cards | p. 499 |
Payment Acceptance and Processing | p. 499 |
Electronic Cash | p. 503 |
Micropayments and Small Payments | p. 504 |
Privacy and Security of Electronic Cash | p. 504 |
Holding Electronic Cash: Online and Offline Cash | p. 505 |
Advantages and Disadvantages of Electronic Cash | p. 506 |
How Electronic Cash Works | p. 507 |
Providing Security for Electronic Cash | p. 507 |
Electronic Cash Systems | p. 508 |
Electronic Wallets | p. 513 |
Microsoft .NET Passport | p. 514 |
Yahoo! Wallet | p. 514 |
W3C Micropayment Standards Development Activity | p. 515 |
The ECML Standard | p. 515 |
Stored-Value Cards | p. 517 |
Magnetic Strip Cards | p. 517 |
Smart Cards | p. 518 |
Internet Technologies and the Banking Industry | p. 520 |
Check Processing | p. 520 |
Phishing Attacks | p. 521 |
Organized Crime, Identity Theft, and Phishing Attacks | p. 523 |
Phishing Attack Countermeasures | p. 524 |
Summary | p. 526 |
Key Terms | p. 526 |
Review Questions | p. 527 |
Exercises | p. 527 |
Cases | p. 529 |
For Further Study and Research | p. 531 |
Part 4 Integration | |
Chapter 12 Planning for Electronic Commerce | p. 536 |
Planning Electronic Commerce Initiatives | p. 537 |
Identifying Objectives | p. 538 |
Linking Objectives to Business Strategies | p. 538 |
Measuring Benefits | p. 539 |
Managing Costs | p. 540 |
Comparing Benefits to Costs | p. 547 |
Return on Investment (ROI) | p. 547 |
Strategies for Developing Electronic Commerce Web Sites | p. 548 |
Internal Development vs. Outsourcing | p. 549 |
Selecting a Hosting Service | p. 553 |
New Methods for Implementing Partial Outsourcing | p. 554 |
Managing Electronic Commerce Implementations | p. 555 |
Project Management | p. 555 |
Project Portfolio Management | p. 557 |
Staffing for Electronic Commerce | p. 557 |
Postimplementation Audits | p. 560 |
Summary | p. 561 |
Key Terms | p. 561 |
Review Questions | p. 562 |
Exercises | p. 562 |
Cases | p. 563 |
For Further Study and Research | p. 566 |
Glossary | p. 569 |
Index | p. 601 |