Beruflich Dokumente
Kultur Dokumente
E-Commerce
An Introduction
LAPLAMBERT
Academic Publishing
Amir Manzoor
E-Commerce
An Introduction
Coverbild: www.ingimage.com
Herstellung in Deutschland.
Schaltungsdienst Lange o.H.G., Berlin
Books on Demand GmbH, Norderstedt
Reha GmbH, Saarbrücken
Amazon Distribution GmbH, Leipzig
ISBN: 978-3-8433-7030-1
Copyright @ 2010 by the author and LAP LAMBERT Academic Publishing GmbH & Co. KG
and licensors
All rights reserved. Saarbrücken 2010
Table of Contents
INTRODUCTION TO E-COMMERCE .
E-COMMERCE: THE DEFINITION .......... ..
E-COMMERCE AND .
INTERNET ECONOMY, E-COMMERCE, AND E-BUSINESS...................
DIMENSIONSOF FROMMERCE ........................................................ ..
INTERNETVs NON-INTERNE-rE-COMMERCE .......................................... ..
CATEGORIESOF EKX)MMERCE.................... —
Business-to-Business (B2B)
Business-to-Consumer (B2C) ...„...mm.5
Business-to-Business-to-Consumer (B2B2C)..............
Business-to-Government (B2G) ................. .
Consumer-to-business (C2B)
Consumer-to-Consumer (C2C)
Business-to-Employee .
Government-to-Government
Government-to-Employee .
Government-to-Business (G2B)
Government-to-Citizen (G2C)
Other Forms of E-commerce............................
EIÆCTRONIC DATA INTERCHANGE (EDI)............ .
FORMS OFE- COMMERCE ORGANIZATIONS ... ....... 10
Brick-and-Mortar business....................... ... .. 10
Click-and-Mortar Business . ... 10
Virtual Business
E-marketplaces.................................
INTERMEDIATION, DISINTERMEDIATION, REINIERMEDIATION, HYPERMEDIATION, AND SYNDICATION IN
E-COMMERCE................. .
DEVELOPMENT AND GROWITI OF E-COMMERCE . ... 13
GENERATIONS OF E-COMMERCE ............................ .
E-COMMERCE:CRI'IW'ALSUCCESSFACIORS(CSF) ..... .. . , . ........15
Internal Factors....................... ... ...
External Factors
ECOMMERCE: TECHNOLOGY . . .18
ECOMMFNCE: SUITABILITYOF PRODUCESAND ... ... .. .20
ADVANTAGES AND DISADVANTAGES OF E-COMMERCE ............... ..... ..„......................21
Advantages of E-commerce ...........................„... .
Disadvantages of E-commerce................... ..
IMPACTS ECONOMY AND ORGANIZATIONAL.RESPONSES .. „ ...„......24
i
The New Business Environment.................... .
Business Pressures
Organizational Responses ........................
PROMOTINGGLOBAL E-COMMERCE: INTERNATIONALCOOPERATION,COLLABORATION, AND
REGULATIONS .... . .........28
E-COMMERCE FUTUREOUTLOOK........
REVIEW QUESTIONS.................................................. ..
BIBLIOGRAPHY..................
E-COMMERCE INFRASTRUCTURE.
PRINCIPALCOMPONENIS OF E-COMMERCEINFRASTRUCI*URE.........................
E-COMMERCE AND BUSINESS PROCESSES ...
MAJOR PLAYERS IN E-COMMERCE —
THE INTERNET...........
Switching
TCP/IP...
Workingof ...41
Function of Router
Protocol .
IP
Domain Name Systems (DNS)
URL: Uniform Resource
Internet Servers and Clients
Ports and HTTP....
E-mail
World Wide Web (WWW) .
Markup Languages and the Web................
INTRANETS AND EXTRANETS............................ . .
Intranets....,.,......... ..... . .. ................52
Extranets................ ...................s:
VIRTUAL PRIVATE NETWORK (VPN)............................
SIORAGEAREANETWORKS (SANS) .................... ..
INTERNETCONNECTIVITYOvr10NS ......................................
Dial-up......... ........................s:
Integrated Services Digital Network
Broadband Connections .......................... ...............................s
Wireless
EVOLUTION OF INTERNETAND WORLD WIDE WEB
Internee .....................f
Web 2.0 „
Semantic Web
E-COMMERCE2.0 ............. ....
REVIEW .
BIBLIOGRAPHY............... . .
ELEMENTS OF E-COMMERCE
CLIENT-SERVER COMMUNICATION
............................................... — „ 70
WEB 70
Static Content
Dynamic Content .........
Dynamic Page-GenerationTechnologies...................................„................. 71
SOFTWARE FOR WEB SERVERS ...................................................
Open Source Software Vs Commercial
Web Server Software .......................,............................
Evaluating Efficiency of Your Website
Operating Systems (OS) for Web Servers ... .....„ . .„
Web Server Market
Finding Web Server Information .. .. ..
DatabaseManagementSystems for Web Severs .
E-MAIL.... .. .
SPAM....................................
Solutions to the Spam Problem
CONTENT FILTERING
E-mail Content Filtering ......................„ .
Web Content . . ............ss
Bypassing Content Filtering...........................
WEBSITE AND INTERNET UTILITY PROGRAMS ................ ............ss
Finger and Ping Utilities • . .. ............................85
Traceroute and Other Route-Tracing • .......................,.........86
Telnet and . . . ............................86
Indexing and Searching Utility Programs............................................„........• • ..............................87
Data Analysis ..........................87
Link-Checking
Remote Server Administration Software ............... .... .
E-COMMERCEHARDWARE .. .........ss
Web Server Hardware: Components and ...................................88
Web Server Performance ..................................... ..... .89
Web Server Hardware Architectures . .. .,.................91
E«OMMERCE SOFTWARE.......................
Selecting E-commerce Software .
Basic Functions of E-commerce Software
Advanced Functions Of E-commerce .
E-commerce Software for Small and Medium Enterprise .........
REVIEW
_
E-commerce Software for Mid-size to Large Businesses
Mid-Range E-commerce
E-commerce Software for Large Businesses
BIBLIOGRAPHY......
EMV
OPEN AND CLOSED Loop PAYMENT SYSTEMS ......................... ...
PAYMENT CARDS ....................
Credit Card.....
Debit Card...
Charge Card .
Single-Use Payment Cards......................
EIÆCIRONIC WAI-LEIS .......................
Electronic Wallet Characteristics............„....
Electronic Wallet
SIORED VALUE ...........
Magnetic Strip Cards.....
Smart Cards..... .
PAYMENTGATEWAYS............
How Payment Gateways Works .
Getting a Merchant Account .. .2S0
Selection Process for Payment Gateways ...280
Rate and Fee Structures and their Determination .2S2
Value-Added
Payment Gateways: Available
PAYMENT
ALIERNAIIVE PAYMENTSYSTEMS................................................
Cash on-delivery (COD) ........... .285
Payment by Telephone using the Payment Code
INTERNETTECHNOLOGIESAND BANKING INDUSIRY......„........................... .....
Electronic .„......285
Electronic Checks........... ....
REVIEW . ..„........291
BIBLIOGRAPHY............... ....
vii
E-CRM AND E-SCM.
Ct (CRM) .... ...
REINHONSIIIP MANAGEMENT
... ..................
CUSTOMERREIAIIONSHIP MANAGEMENT(ECRM)
Components of e-CRM .
Benefits of e-CRM
Limitations of e-CRM .
Working of e-CRM .....
Implementing e-CRM .
Integration among CRM, ERP, SCM, and other application systems „
FCCRMSolutions
Choosing the Best CRM Application for Your Business ...... ... ... .................30)
Metrics in Customer Service and CRM .
E-SCM . ....................302
E-SCM: Key Processes and Infrastructure Components ..........................„...... ...
Critical Success Factors for E-supply Chains ..
Benefits of E-supply Chains .............
Functions of E-SCEM Software....................... ... .. ......................304
Categories of e-SCM Solutions..........................................
Preparing for e-SCM
REVIEW ....... . . . . ................308
.................................................
BIBLIOGRAPHY „
E-COMMERCESECURITY
OVERVIEW .. . .......014
COMPUJYR SECURrry..................,.......... ... ... ....... „ .......„..314
CLASSIFICATION OF INFORMATION
Unrestricted Information „ .......31'
Protected Information............... . .„........315
Confidential
Restricted Information .. .
BASIC SECURf1X ISSUES .................... .„.... ..........„...3 10
THREAT, VULNERABILITY, AND COUVIERMEASURES .....
GOVERNANCY OF Ecos1MERCE SECUk11N IN AN ORGANrZATION .................. .. . ................................3 16
Key elements of an E-commerce Security Governance Structure
THREATS 10 E-COMMERCE SYSTEMS
Ulreats to E-commerce Service-side .
Threats to Front-end systems
Threats to Back-end Systems . ...321
Threats to E-commerce Transactions.............
Threats to Client-Side .........
viii
Legal and Regulatory Threats .......................................................
SOLUTIONS FOR EcoMMERCE SECURITY ................................
Solutions for Service Side Security .......... .......
Solutions for E-commerce Transaction Security .............. ..329
Solutions for Client-Side........
Solutions for Legal and Regulatory Issues .................................
REVIEW „
BIBLIOGRAPHY................. .........
MOBILECOMMERCE.
INTRODUCIION..................
M-COMMERCE TERMINOLOGY...........................
WHY M-COMMERCE.............................................. .
SPECIFICCHARACTERISTICSOF M-COMMERCE .................... .... .
Value-AddedAttributedOfM-commerce...............
BUILDING BLOCKS OEM-COMMERCE............... . .
M-Commerce
M-Commerce ...
MobileNetworks............................. .. m.....353
PROS AND CONS OEM-COMMERCE ..... ..... ........354
For Users ......................
For Network Operators .. „....„..354
For Service Providers.................................... . „...„....3S4
APPLICATIONS OF M-COMMERCE ................................................. ................ . .................„..........355
Mobile Financial Applications....................................................... ... ..... „
Mobile Marketing and Advertising......................................................... „
Mobile Auction ......... .
Mobile Booking and Ticketing ...................................... . ...........357
Mobile CRM .
MobileContent . ......„358
Mobile Purchases .................. .
Mobile ......„..3S9
Wireless ... . ......,.........359
Wireless Telemedicine........................
M-COMMERCE SECURITY ISSUES........................................................................
Physical Security Issues . ...................................................360
Transactional Security . . ... ...........„..360
Post-Transaction .... .
MCOMMERCE SECURIIY TECHNIQUES ............. .... ....... 361
SIM-Based Authentication............................„.......
ix