Preface |
|
xv | |
Part 1: Introduction |
|
|
Chapter 1 Introduction to Electronic Commerce |
|
|
3 | (54) |
|
The Evolution of Electronic Commerce |
|
|
5 | (4) |
|
Electronic Commerce and Electronic Business |
|
|
5 | (1) |
|
Categories of Electronic Commerce |
|
|
5 | (1) |
|
|
6 | (1) |
|
Relative Size of Electronic Commerce Elements |
|
|
7 | (2) |
|
The Development and Growth of Electronic Commerce |
|
|
9 | (8) |
|
Early Electronic Commerce |
|
|
9 | (1) |
|
The First Wave of Electronic Commerce, 1995-2003 |
|
|
10 | (1) |
|
The Second Wave of Electronic Commerce, 2004-2009 |
|
|
11 | (2) |
|
The Third Wave of Electronic Commerce, 2010Present |
|
|
13 | (4) |
|
|
17 | (1) |
|
Business Models, Revenue Models, and Business Processes |
|
|
17 | (4) |
|
Focus on Specific Business Processes |
|
|
19 | (1) |
|
|
19 | (1) |
|
Product/Process Suitability to Electronic Commerce |
|
|
19 | (2) |
|
Electronic Commerce: Opportunities, Cautions, and Concerns |
|
|
21 | (4) |
|
Opportunities for Electronic Commerce |
|
|
21 | (2) |
|
Electronic Commerce: Current Barriers |
|
|
23 | (2) |
|
Economic Forces and Electronic Commerce |
|
|
25 | (8) |
|
|
27 | (1) |
|
|
27 | (3) |
|
Using Electronic Commerce to Reduce Transaction Costs |
|
|
30 | (1) |
|
Network Economic Structures |
|
|
31 | (1) |
|
|
32 | (1) |
|
Identifying Electronic Commerce Opportunities |
|
|
33 | (6) |
|
Strategic Business Unit Value Chains |
|
|
33 | (2) |
|
|
35 | (2) |
|
SWOT Analysis: Evaluating Business Unit Opportunities |
|
|
37 | (2) |
|
International Nature of Electronic Commerce |
|
|
39 | (8) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (2) |
|
|
43 | (1) |
|
|
44 | (3) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (3) |
|
For Further Study and Research |
|
|
53 | (4) |
|
Chapter 2 Technology Infrastructure: The Internet and the World Wide Web |
|
|
57 | (52) |
|
The Internet and the World Wide Web |
|
|
59 | (4) |
|
|
59 | (1) |
|
New Uses for the Internet |
|
|
60 | (1) |
|
Commercial Use of the Internet |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
63 | (4) |
|
|
64 | (1) |
|
Public and Private Networks |
|
|
65 | (1) |
|
Virtual Private Networks (VPNs) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (5) |
|
|
68 | (1) |
|
|
68 | (2) |
|
Electronic Mail Protocols |
|
|
70 | (1) |
|
Web Page Request and Delivery Protocols |
|
|
71 | (1) |
|
Emergence of the World Wide Web |
|
|
72 | (4) |
|
The Development of Hypertext |
|
|
72 | (1) |
|
Graphical Interfaces for Hypertext |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
Markup Languages and the Web |
|
|
76 | (13) |
|
Hypertext Markup Language |
|
|
77 | (6) |
|
Extensible Markup Language (XML) |
|
|
83 | (6) |
|
Internet Connection Options |
|
|
89 | (6) |
|
|
89 | (1) |
|
Voice-Grade Telephone Connections |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
90 | (5) |
|
Internet2 and the Semantic Web |
|
|
95 | (3) |
|
|
98 | (1) |
|
|
98 | (2) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
For Further Study and Research |
|
|
103 | (6) |
Part 2: Business Strategies for Electronic Commerce |
|
|
Chapter 3 Selling on the Web |
|
|
109 | (52) |
|
Revenue Models for Online Business |
|
|
111 | (22) |
|
Web Catalog Revenue Models |
|
|
111 | (5) |
|
Fee-for-Content Revenue Models |
|
|
116 | (4) |
|
Advertising as a Revenue Model Element |
|
|
120 | (6) |
|
Fee-for-Transaction Revenue Models |
|
|
126 | (5) |
|
Fee-for-Service Revenue Models |
|
|
131 | (1) |
|
Free for Many, Fee for a Few |
|
|
132 | (1) |
|
Changing Strategies: Revenue Models in Transition |
|
|
133 | (4) |
|
Subscription to Advertising-Supported Model |
|
|
134 | (1) |
|
Advertising-Supported to Advertising-Subscription Mixed Model |
|
|
134 | (1) |
|
Advertising-Supported to Subscription Model |
|
|
134 | (1) |
|
Multiple Changes to Revenue Models |
|
|
135 | (2) |
|
Revenue Strategy Issues for Online Businesses |
|
|
137 | (2) |
|
Channel Conflict and Cannibalization |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
Overstock Sales Strategies |
|
|
139 | (1) |
|
Creating an Effective Business Presence Online |
|
|
139 | (2) |
|
Identifying Web Presence Goals |
|
|
139 | (2) |
|
|
141 | (7) |
|
|
142 | (1) |
|
Meeting the Needs of Web Site Visitors |
|
|
142 | (2) |
|
|
144 | (2) |
|
|
146 | (1) |
|
Customer-Centric Web Site Design |
|
|
147 | (1) |
|
Using the Web to Connect with Customers |
|
|
148 | (4) |
|
The Nature of Communication on the Web |
|
|
148 | (4) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (3) |
|
For Further Study and Research |
|
|
158 | (3) |
|
Chapter 4 Marketing on the Web |
|
|
161 | (54) |
|
|
162 | (3) |
|
|
163 | (1) |
|
Product-Based Marketing Strategies |
|
|
163 | (1) |
|
Customer-Based Marketing Strategies |
|
|
164 | (1) |
|
Communicating with Different Market Segments |
|
|
165 | (5) |
|
Trust, Complexity, and Media Choice |
|
|
165 | (3) |
|
|
168 | (1) |
|
Market Segmentation on the Web |
|
|
169 | (1) |
|
Offering Customers a Choice on the Web |
|
|
170 | (1) |
|
Beyond Market Segmentation: Customer Behavior and Relationship Intensity |
|
|
170 | (7) |
|
Segmentation Using Customer Behavior |
|
|
170 | (3) |
|
Customer Relationship Intensity and Life-Cycle Segmentation |
|
|
173 | (2) |
|
Customer Acquisition: The Funnel Model |
|
|
175 | (2) |
|
|
177 | (9) |
|
|
178 | (3) |
|
|
181 | (1) |
|
Rich Media and Video Ad Formats |
|
|
181 | (1) |
|
|
182 | (1) |
|
Mobile Device Advertising |
|
|
183 | (1) |
|
|
183 | (1) |
|
Online Advertising Cost and Effectiveness |
|
|
184 | (2) |
|
|
186 | (2) |
|
Unsolicited Commercial E-Mail (UCE, Spam) |
|
|
186 | (1) |
|
|
187 | (1) |
|
Combining Content and Advertising |
|
|
187 | (1) |
|
Outsourcing E-Mail Processing |
|
|
188 | (1) |
|
Technology-Enabled Customer Relationship Management |
|
|
188 | (2) |
|
|
188 | (2) |
|
Creating and Maintaining Brands on the Web |
|
|
190 | (6) |
|
|
191 | (1) |
|
Emotional Branding vs. Rational Branding |
|
|
192 | (1) |
|
Affiliate Marketing Strategies |
|
|
193 | (1) |
|
Viral Marketing Strategies and Social Media |
|
|
194 | (2) |
|
Search Engine Positioning and Domain Names |
|
|
196 | (7) |
|
Search Engines and Web Directories |
|
|
196 | (1) |
|
Paid Search Engine Inclusion and Placement |
|
|
197 | (3) |
|
|
200 | (3) |
|
|
203 | (1) |
|
|
203 | (2) |
|
|
205 | (1) |
|
|
206 | (2) |
|
|
208 | (2) |
|
For Further Study and Research |
|
|
210 | (5) |
|
Chapter 5 Business-to-Business Activities: Improving Efficiency and Reducing Costs |
|
|
215 | (42) |
|
Purchasing, Logistics, and Business Support Processes |
|
|
217 | (10) |
|
Outsourcing and Offshoring |
|
|
217 | (1) |
|
|
218 | (3) |
|
|
221 | (1) |
|
Business Process Support Activities |
|
|
222 | (2) |
|
|
224 | (2) |
|
Network Model of Economic Organization in Purchasing: Supply Webs |
|
|
226 | (1) |
|
Electronic Data Interchange |
|
|
227 | (9) |
|
Early Business Information Interchange Efforts |
|
|
227 | (1) |
|
Emergence of Broader Standards: The Birth of EDI |
|
|
228 | (1) |
|
|
228 | (5) |
|
|
233 | (3) |
|
|
236 | (1) |
|
Supply Chain Management Using Internet Technologies |
|
|
236 | (8) |
|
Value Creation in the Supply Chain |
|
|
236 | (3) |
|
Increasing Supply Chain Efficiency and Cooperation |
|
|
239 | (1) |
|
Materials-Tracking Technologies |
|
|
240 | (2) |
|
Creating an Ultimate Consumer Orientation in the Supply Chain |
|
|
242 | (1) |
|
Building and Maintaining Trust in the Supply Chain |
|
|
243 | (1) |
|
Online Business Marketplaces and Networks |
|
|
244 | (4) |
|
Independent Industry Marketplaces |
|
|
244 | (2) |
|
Private Stores and Customer Portals |
|
|
246 | (1) |
|
Private Company Marketplaces |
|
|
246 | (1) |
|
Industry Consortia-Sponsored Marketplaces |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
250 | (2) |
|
|
252 | (2) |
|
For Further Study and Research |
|
|
254 | (3) |
|
Chapter 6 Social Networking, Mobile Commerce, and Online Auctions |
|
|
257 | (42) |
|
From Virtual Communities to Social Networks |
|
|
258 | (13) |
|
|
259 | (1) |
|
|
259 | (1) |
|
Social Networking Emerges |
|
|
260 | (4) |
|
Business Uses of Social Networking |
|
|
264 | (3) |
|
Revenue Models for Social Networking Sites |
|
|
267 | (4) |
|
|
271 | (6) |
|
|
272 | (1) |
|
|
272 | (1) |
|
Mobile Device Operating Systems |
|
|
273 | (1) |
|
|
274 | (2) |
|
|
276 | (1) |
|
|
277 | (13) |
|
|
277 | (3) |
|
Online Auctions and Related Businesses |
|
|
280 | (7) |
|
|
287 | (3) |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
293 | (2) |
|
For Further Study and Research |
|
|
295 | (4) |
|
Chapter 7 The Environment of Electronic Commerce: Legal, Ethical, and Tax Issues |
|
|
299 | (56) |
|
The Legal Environment of Electronic Commerce |
|
|
301 | (13) |
|
|
301 | (3) |
|
Jurisdiction on the Internet |
|
|
304 | (4) |
|
|
308 | (1) |
|
Contracting and Contract Enforcement in Electronic Commerce |
|
|
309 | (5) |
|
Use and Protection of Intellectual Property in Online Business |
|
|
314 | (9) |
|
|
315 | (2) |
|
|
317 | (2) |
|
|
319 | (1) |
|
Domain Names and Intellectual Property Issues |
|
|
319 | (1) |
|
Protecting Intellectual Property Online |
|
|
320 | (1) |
|
|
321 | (1) |
|
Deceptive Trade Practices |
|
|
322 | (1) |
|
|
322 | (1) |
|
Online Crime, Terrorism, and Warfare |
|
|
323 | (5) |
|
Online Crime: Jurisdiction Issues |
|
|
323 | (2) |
|
New Types of Crime Online |
|
|
325 | (2) |
|
Online Warfare and Terrorism |
|
|
327 | (1) |
|
|
328 | (8) |
|
Ethics and Online Business Practices |
|
|
328 | (1) |
|
Privacy Rights and Obligations |
|
|
329 | (4) |
|
Communications with Children |
|
|
333 | (3) |
|
Taxation and Electronic Commerce |
|
|
336 | (5) |
|
|
337 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
339 | (1) |
|
European Union Value Added Taxes |
|
|
339 | (2) |
|
|
341 | (1) |
|
|
341 | (2) |
|
|
343 | (1) |
|
|
343 | (2) |
|
|
345 | (2) |
|
For Further Study and Research |
|
|
347 | (8) |
Part 3: Technologies for Electronic Commerce |
|
|
Chapter 8 Web Server Hardware and Software |
|
|
355 | (38) |
|
|
356 | (6) |
|
Dynamic Content Generation |
|
|
358 | (1) |
|
Multiple Meanings of "Server" |
|
|
359 | (1) |
|
Web Client/Server Architectures |
|
|
360 | (2) |
|
|
362 | (2) |
|
Operating Systems for Web Servers |
|
|
362 | (1) |
|
|
363 | (1) |
|
|
364 | (9) |
|
|
365 | (1) |
|
|
365 | (1) |
|
|
365 | (1) |
|
Solutions to the Spam Problem |
|
|
365 | (8) |
|
Web Site Utility Programs |
|
|
373 | (2) |
|
Tracert and Other Route-Tracing Programs |
|
|
373 | (1) |
|
|
374 | (1) |
|
Indexing and Searching Utility Programs |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
375 | (1) |
|
Remote Server Administration |
|
|
375 | (1) |
|
|
375 | (10) |
|
|
375 | (2) |
|
Web Servers and Green Computing |
|
|
377 | (1) |
|
Web Server Performance Evaluation |
|
|
378 | (1) |
|
Web Server Hardware Architectures |
|
|
378 | (2) |
|
|
380 | (2) |
|
Content Delivery Networks |
|
|
382 | (3) |
|
|
385 | (1) |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (2) |
|
For Further Study and Research |
|
|
390 | (3) |
|
Chapter 9 Electronic Commerce Software |
|
|
393 | (30) |
|
|
394 | (1) |
|
Basic Functions of Electronic Commerce Software |
|
|
395 | (6) |
|
|
396 | (1) |
|
|
396 | (3) |
|
|
399 | (2) |
|
How Electronic Commerce Software Works With Other Software |
|
|
401 | (5) |
|
|
401 | (1) |
|
|
401 | (1) |
|
Enterprise Application Integration |
|
|
402 | (1) |
|
Integration with ERP Systems |
|
|
403 | (1) |
|
|
404 | (2) |
|
Electronic Commerce Software for Small and Midsize Companies |
|
|
406 | (2) |
|
|
407 | (1) |
|
|
407 | (1) |
|
Estimated Operating Expenses for a Small Web Business |
|
|
407 | (1) |
|
Electronic Commerce Software for Midsize Businesses |
|
|
408 | (2) |
|
Web Site Development Tools |
|
|
409 | (1) |
|
Midrange Electronic Commerce Software |
|
|
409 | (1) |
|
Electronic Commerce Software for Large Businesses |
|
|
410 | (6) |
|
Enterprise-Class Electronic Commerce Software |
|
|
410 | (2) |
|
Content Management Software |
|
|
412 | (1) |
|
Knowledge Management Software |
|
|
412 | (1) |
|
Supply Chain Management Software |
|
|
413 | (1) |
|
Customer Relationship Management Software |
|
|
413 | (3) |
|
|
416 | (1) |
|
|
416 | (1) |
|
|
417 | (1) |
|
|
418 | (1) |
|
|
419 | (1) |
|
For Further Study and Research |
|
|
420 | (3) |
|
Chapter 10 Electronic Commerce Security |
|
|
423 | (50) |
|
Online Security Issues Overview |
|
|
425 | (4) |
|
Origins of Security on Interconnected Computer Systems |
|
|
425 | (1) |
|
Computer Security and Risk Management |
|
|
425 | (2) |
|
Elements of Computer Security |
|
|
427 | (1) |
|
Establishing a Security Policy |
|
|
427 | (2) |
|
Security for Client Devices |
|
|
429 | (14) |
|
|
429 | (2) |
|
|
431 | (1) |
|
|
432 | (1) |
|
Viruses, Worms, and Antivirus Software |
|
|
432 | (5) |
|
|
437 | (4) |
|
|
441 | (1) |
|
Physical Security for Client Devices |
|
|
442 | (1) |
|
Client Security for Mobile Devices |
|
|
442 | (1) |
|
Communication Channel Security |
|
|
443 | (13) |
|
|
443 | (3) |
|
|
446 | (1) |
|
|
446 | (1) |
|
Threats to the Physical Security of Internet Communications Channels |
|
|
447 | (1) |
|
Threats to Wireless Networks |
|
|
447 | (1) |
|
|
448 | (4) |
|
Encryption in Web Browsers |
|
|
452 | (2) |
|
Hash Functions, Message Digests, and Digital Signatures |
|
|
454 | (2) |
|
Security for Server Computers |
|
|
456 | (6) |
|
|
456 | (1) |
|
|
457 | (1) |
|
Other Software-Based Threats |
|
|
458 | (1) |
|
Threats to the Physical Security of Web Servers |
|
|
458 | (1) |
|
Access Control and Authentication |
|
|
459 | (1) |
|
|
460 | (2) |
|
Organizations That Promote Computer Security |
|
|
462 | (2) |
|
|
462 | (1) |
|
|
462 | (1) |
|
Computer Forensics and Ethical Hacking |
|
|
463 | (1) |
|
|
464 | (1) |
|
|
464 | (2) |
|
|
466 | (1) |
|
|
467 | (1) |
|
|
467 | (2) |
|
For Further Study and Research |
|
|
469 | (4) |
|
Chapter 11 Payment Systems for Electronic Commerce |
|
|
473 | (32) |
|
Common Online Payment Methods |
|
|
474 | (3) |
|
Electronic Bill Presentment and Payment Systems |
|
|
475 | (1) |
|
Micropayments and Small Payments |
|
|
476 | (1) |
|
|
477 | (7) |
|
Advantages and Disadvantages of Payment Cards |
|
|
478 | (1) |
|
Payment Acceptance and Processing |
|
|
479 | (4) |
|
|
483 | (1) |
|
|
484 | (3) |
|
The Double Spending Issue |
|
|
485 | (1) |
|
Advantages and Disadvantages of Digital Cash |
|
|
486 | (1) |
|
|
487 | (2) |
|
Software-Based Digital Wallets |
|
|
487 | (1) |
|
Hardware-Based Digital Wallets |
|
|
488 | (1) |
|
Internet Technologies and the Banking Industry |
|
|
489 | (2) |
|
|
489 | (2) |
|
|
491 | (1) |
|
Payment System Threats: Phishing and Identity Theft |
|
|
491 | (5) |
|
|
491 | (2) |
|
Using Phishing Attacks for Identity Theft |
|
|
493 | (2) |
|
Phishing Attack Countermeasures |
|
|
495 | (1) |
|
|
496 | (1) |
|
|
496 | (1) |
|
|
497 | (1) |
|
|
498 | (1) |
|
|
499 | (2) |
|
For Further Study and Research |
|
|
501 | (4) |
Part 4: Integration |
|
|
Chapter 12 Managing Electronic Commerce Implementations |
|
|
505 | (30) |
|
Identifying Benefits and Estimating Costs of Online Business Initiatives |
|
|
506 | (9) |
|
|
506 | (1) |
|
Linking Objectives to Business Strategies |
|
|
507 | (1) |
|
Identifying and Measuring Benefits |
|
|
508 | (2) |
|
Identifying and Estimating Costs |
|
|
510 | (2) |
|
Funding Online Business Startups |
|
|
512 | (1) |
|
Comparing Benefits to Costs |
|
|
513 | (1) |
|
Return on Investment (ROI) |
|
|
514 | (1) |
|
Strategies for Developing Electronic Commerce Web Sites |
|
|
515 | (5) |
|
Internal Development versus Outsourcing |
|
|
516 | (2) |
|
|
518 | (2) |
|
|
520 | (1) |
|
Managing Electronic Commerce Implementations |
|
|
520 | (7) |
|
|
521 | (1) |
|
Project Portfolio Management |
|
|
522 | (1) |
|
Staffing for Electronic Commerce |
|
|
522 | (3) |
|
Postimplementation Audits |
|
|
525 | (1) |
|
|
526 | (1) |
|
|
527 | (1) |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
529 | (1) |
|
|
530 | (2) |
|
For Further Study and Research |
|
|
532 | (3) |
Glossary |
|
535 | (36) |
Index |
|
571 | |