rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781584500643

Electronic Commerce

by ;
  • ISBN13:

    9781584500643

  • ISBN10:

    1584500646

  • Edition: 4th
  • Format: Paperback
  • Copyright: 2003-08-21
  • Publisher: Charles River Media
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.95
We're Sorry.
No Options Available at This Time.

Summary

Text gives a complete overview of the electronic commerce environment. Revised and updated to reflect the most recent trends in e-commerce, including new material on security technologies, server options, enterprise applications, and investing online. Previous edition: c2000. Softcover. DLC: Electronic commerce.

Table of Contents

Foreword xxv
Preface xxvii
Acknowledgments xxxix
Part I Overview of E-Commerce Technology 1(94)
1 What Is Electronic Commerce?
3(34)
E-Commerce: Doing Business on the Internet
4(9)
Direct Marketing, Selling, and Service
4(1)
Financial and Information Services
5(4)
Value Chain Integration
9(2)
Issues in Implementing Electronic Commerce
11(1)
Workflow Technology
12(1)
The Scope of the Internet and the Web
13(2)
The Benefits of SIP
14(1)
Enabling Multimedia E-Commerce with SIP
14(1)
Using the Web to Reach Customers
15(8)
The Shift to E-Business
16(1)
New Medium and New Expectations
17(2)
Acquisition, Retention, and Referrals
19(1)
Poor Performance and Failure
20(2)
Ensuring the Customer Experience
22(1)
Benefits of the E-Commerce Market
23(9)
Increasing Interest in Interfacing Technologies
23(2)
TMM Business Benefits
25(4)
The Service Provider Advantage
29(1)
TMM Costs
29(1)
Roadblocks to E-Commerce
30(1)
Old Dogs Have Learned New Tricks
30(1)
Trying Not to Antagonize Your Customers Helps Immensely
31(1)
Privacy, Please
31(1)
Summary
32(3)
Developing the Business Case for TMM Technology Use
34(1)
References
35(2)
2 Types of E-Commerce Technology
37(34)
E-Commerce Technology
37(13)
Strong Intellectual Property Protection
38(4)
Online Trust: Security and Privacy
42(3)
Free and Open International Trade
45(1)
Enforcing the Trade-Related Intellectual Property Rights (TRIPs) Agreement
46(2)
Investing in a Technology Infrastructure
48(2)
The Internet Environment
50(18)
Simple B2B Connectivity Using Punchout
54(6)
Marketplace Connectivity for Asynchronous Processes
60(3)
Connectivity Using a B2B Protocol Exchange
63(5)
Summary
68(1)
References
69(2)
3 Types of E-Business Models and Markets
71(14)
E-Business Models
74(8)
Solid Strategies
76(1)
Knowledge Management Techniques
77(1)
Effective E-Business Processes
77(5)
E-Business Markets
82(1)
Summary
83(1)
References
83(2)
4 Types of E-Commerce Providers and Vendors
85(10)
Traditional Buy/Build Approach
86(4)
Real Profit Drivers Distraction
89(1)
Scalability and Reliability Struggle
89(1)
Third-Party Service Relationships and Integration Management
90(1)
Online Sales Channels: Internet Selling Environment
90(2)
The Integration of Business Services and Applications
91(1)
Business Intelligence Service
91(1)
Advisory Service
91(1)
Infrastructure of Hosted Technology
91(1)
The Advantages of Outsourcing an Infrastructure to an ECISP
92(1)
Better Return on Investment
92(1)
Focus and Decision-Making Improvement
92(1)
Solution Dynamics
93(1)
Summary
93(1)
References
94(1)
Part II Designing and Building E-Commerce Web Sites: Hands-On 95(76)
5 E-Commerce Web Site Creation
97(18)
The Elements of E-Commerce
97(15)
Step 1: Establishing Your Online Identity with the Right Web Address
98(2)
Step 2: Building a User-Friendly Site
100(3)
Step 3: Setting Up Your Web Server-Or Selecting an ISP to Host Your Site
103(1)
Step 4: Securing Your Site
104(5)
Step 5: Accepting and Managing All Kinds of Payments
109(2)
Step 6: Test, Test, Test
111(1)
Step 7: Promoting Your Site
112(1)
Step 8: Now, Start Selling
112(1)
Summary
112(1)
References
113(2)
6 Managing E-Commerce Web Site Development
115(16)
Web Site Server
115(2)
Business-to-Consumer (B2C) Sites
117(1)
Business-to-Business (B2B) Sites
117(1)
Developing a Commerce Site
117(2)
Scope
118(1)
Prototype
118(1)
Design
118(1)
Implementation
118(1)
Testing and Deployment
118(1)
Requirements for Your Site
119(1)
Building the Prototype
119(1)
Building the Site
120(4)
Design
121(3)
Implementation
124(4)
Database Implementation
124(1)
Editing the Pipeline
125(1)
Securing the Site
125(1)
Database Access
125(2)
Security
127(1)
SSL and HTTPS
127(1)
Site Managers
127(1)
Configuring the Network Against External Intrusions
127(1)
Summary
128(1)
References
129(2)
7 Building Shopping Cart Applications
131(12)
A Shopping Cart Scenario
132(1)
The CustomerServlet
133(2)
The BasketBean
134(1)
The Pages
134(1)
A Real-World Application Model
135(2)
Loose Component Coupling
137(1)
Summary
138(3)
References
141(2)
8 Mobile Electronic Commerce
143(14)
Wireless Industry Standards
144(1)
Wireless Communication Platforms for LANs
145(3)
On Demand Mode (Peer-to-Peer)
146(1)
Infrastructure Mode (Wireless LAN)
146(1)
802.11b
147(1)
802.11a
148(1)
802.11g
148(1)
Bluetooth
148(1)
Wireless WANs
148(1)
Code Division Multiple Access (CDMA)
149(1)
Global System for Mobile (GSM)
149(1)
Facilitators of a Wireless Environment
149(3)
Wireless Hardware
149(1)
Wireless Operators
150(1)
Wireless Software
151(1)
Concerns for the Mobile Enterprise
152(3)
Security
152(1)
Management
153(1)
Information Access
154(1)
Return on Investments
154(1)
Summary
155(1)
References
155(2)
9 Enhancing a Web Server with E-Commerce Application Development
157(14)
The Changing Face of Application Development
157(2)
Business Demands
158(1)
Challenges for E-Business Development
158(1)
Enterprise Development Needs
159(3)
Maximizing Business Value
160(1)
Increasing IT Effectiveness
160(2)
Controlling Complexity
162(1)
Enhanced Web Server-Based E-Commerce Site Business Objectives
162(1)
Categories of Business Value
163(2)
Improved Customer Communications
163(1)
Streamlined Business Processes
164(1)
Improved Service Efficiencies and Customer Satisfaction
164(1)
Meeting Customer Needs and Wants
165(1)
Assessing a Site's Current Business Value
165(1)
Improving Business Value
166(1)
Managed Solutions
167(1)
Summary
168(1)
References
169(2)
Part III Implementing and Managing E-Commerce Web Sites 171(34)
10 Strategies, Techniques, and Tools
173(6)
E-Business Now
173(2)
What E-Business Offers Now
175(2)
Using E-Business to Concentrate on Core Businesses
175(1)
Using E-Business to Develop New Competencies
175(2)
Building an Effective E-Business Strategy
177(1)
Identifying Measurable Business Objectives
177(1)
Defining Costs and Impact
177(1)
Aligning IT Architecture
178(1)
Identifying Value Propositions
178(1)
Summary
178(1)
References
178(1)
11 Implementing Merchandising Strategies
179(8)
Internet Business Development Merchandising Strategies
179(1)
The Challenge: Content Management
180(1)
Online Merchandising Strategies
181(4)
Flexible Merchandising
181(1)
Product Locators
182(1)
Problem-Solving Techniques
183(1)
Customer Relationship Tools
184(1)
Summary
185(1)
References
185(2)
12 Implementing E-Commerce Databases
187(10)
Implementing the E-Commerce Database Interface Solution
187(4)
Embedded SQL
188(1)
ODBC
188(1)
OLE DB
189(1)
Java and JDBC
189(1)
DBI-PERL
190(1)
Heterogeneous Development
191(1)
The Future
191(2)
Java Servlets
192(1)
XML
192(1)
CORBA
193(1)
Summary
193(2)
References
195(2)
13 Applying and Managing E-Business Intelligence Tools for Application Development
197(8)
E-Business Requirements for Rapid Application Development
198(2)
Managing Training Costs
198(1)
Handling Single Source Issues
199(1)
Meeting IT Requirements
199(1)
Deploying Across the Enterprise
199(1)
Deploying to Multiple Platforms
200(1)
Providing Administration and Security
200(1)
The Future of Web Commerce Tools for Application Development
200(2)
Web Application Development Software
202(1)
Summary
202(1)
References
203(2)
Part IV Designing, Building, and Implementing E-Commerce Security 205(86)
14 Types of Security Technologies
207(10)
The Internet
207(1)
The Internet Is Big Business
208(1)
The New Economy
208(1)
Where Old Meets New
208(1)
Flawed Infrastructure
209(1)
Emergence of Cyber Crime
209(1)
Outside Attacks
210(1)
Unauthorized Intrusion
210(1)
Service Denial
210(1)
Malicious Downloads
210(1)
Inside Attacks
211(1)
Threats Due to Lack of Security
211(1)
Cyber Security Need
212(1)
Internet Security Education
213(1)
Products
213(1)
Services
213(1)
Training
213(1)
E-Commerce Application Security Technology Essentials
213(3)
A Growing Threat
214(1)
Rigorous Client-Side Testing Is Required
215(1)
Summary
216(1)
References
216(1)
15 Protocols for the Public Transport of Private Information
217(6)
Profiling, Personalization, and Privacy
217(2)
Net Privacy: In the Eyes of the Consumer
218(1)
Privacy: A Vital E-Business Enabler
219(2)
Trust
220(1)
Customers' Trust
220(1)
Respecting Privacy
220(1)
Customer Privacy Needs
220(1)
Heightening E-Business Results
221(1)
Summary
221(1)
References
222(1)
16 Building an E-Commerce Trust Infrastructure
223(20)
New Customers
223(1)
Cost-Effective Delivery Channel
223(1)
Streamlined Enrollment
224(1)
Better Marketing Through Better Customer Knowledge
224(1)
How to Build an Infrastructure for Trusted E-Commerce
224(9)
Public Key Cryptography and Digital Certificates
225(8)
SSL Server Certificates
233(7)
SSL Defined
233(1)
How SSL Server Certificates Work
234(3)
Securing Multiple Servers and Domains with SSL
237(3)
Online Payment Services
240(1)
Summary
241(1)
References
241(2)
17 Implementing E-Commerce Enterprise Application
Security Integration
243(1)
The Challenge
243(1)
The Solution: Application Security Integration
244(1)
Security as an Enabler for E-Commerce Applications
244(1)
On the Internet
245(1)
Via Extranets
245(1)
With an Intranet
245(1)
E-Commerce Applications Increase Risks
245(1)
Information Security Goals: Enable Use, Bar Intrusion
246(1)
E-Commerce Solutions Create New Security Responsibilities
246(2)
E-Commerce
247(1)
Cross-Selling and Customer Relationship Management
247(1)
Supply Chain Management
247(1)
Bandwidth on Demand
247(1)
Risk Management Holds the Key
248(1)
Information Security: A Proven Concern
249(1)
Distributed Systems, Distributed Security, Enterprise Control
250(1)
Security Challenges in Distributed Component Environments
251(2)
End-to-End Enterprise Application Security Integration (EAST)
253(2)
EAST Requirements
255(1)
EAST Solutions
256(1)
EAST Framework
257(4)
Applications
257(1)
Application Programming Interfaces (APIs)
258(1)
Core Security Services
259(1)
Framework Security Facilities
260(1)
Security Products
260(1)
EAST Benefits
261(1)
Principles of EAST
261(3)
Authentication
262(1)
Authorization
262(1)
Accountability: Audit Early, Not Often
263(1)
Security Administration
263(1)
Security Association
264(1)
Summary
264(1)
References
265(2)
18 Strong Transaction Security in Multiple Server Environments
267(10)
Security Solutions: The Digital ID System
268(5)
What Is a Digital ID?
268(1)
How Do Digital IDs Work?
268(1)
How Do SSL Certificates Work?
269(1)
What Do End Users See?
270(3)
The Needs of Your Organization
273(1)
The Size of Your Network
273(1)
Change within Your Network
273(1)
Cross-Departmental Coordination
273(1)
The Needs of Your End Users
274(1)
The Managed PKT for SSL Certificates System
274(1)
The Managed PKT for SSL Certificates Administrator
274(1)
Instant Enrollment for SSL Certificates
275(1)
Summary
275(1)
References
276(1)
19 Securing and Managing Your Storefront for E-Business
277(14)
Securing Your Web Storefront with an SSL Certificate
278(9)
Presenting Your Credentials via an SSL Certificate
278(2)
Simplifying Management of Multiple SSL Certificates
280(1)
Learning More About Your Customers Through Client Authentication
280(1)
Deploying Strong Security for Worldwide Commerce
280(1)
Facilitating Payments with Payment Services
280(1)
Step-By-Step Instructions
281(1)
Before You Begin
282(3)
Options for Obtaining Payment
285(2)
Why Is Authenticated SSL Necessary?
287(1)
Encryption
287(1)
Authentication
287(1)
Digital Certificates
288(1)
Summary
288(2)
References
290(1)
Part V Electronic Payments Technology 291(52)
20 Payment Technology Issues
293(10)
Online Payment Processing Basics
293(5)
The Payment Processing Network
294(2)
How Payment Processing Works
296(2)
What You Should Know About Fraud
298(1)
What to Look for in a Payment Processing Solution
299(1)
Getting Started Now
300(1)
Summary
300(1)
References
301(2)
21 Electronic Payment Methods Through Smart Cards
303(12)
The Solution
304(2)
EMV Specifications
305(1)
Visa Specifications
305(1)
MasterCard Specifications
305(1)
Other Specifications
306(1)
How to Help Banks Move to Smart Cards
306(6)
Enhancements to the Card Issuing Process
307(1)
Enhancements to the Card Personalization Process
307(1)
Enhancements to the Systems that Handle Card Transactions
307(1)
The Personalization Preparation Process (P3)
307(5)
Smart Card Credit, Debit, Visa Cash Load, and Unload Processing HSM Functions
312(1)
Summary
312(1)
References
313(2)
22 Electronic Payment Systems
315(8)
State of the EBPP Market
316(2)
Payment Considerations
318(1)
Using Payment Service Providers
319(2)
Future Direction
321(1)
Summary
321(1)
References
322(1)
23 Digital Currencies
323(20)
Introducing Digital Currencies
323(2)
Applications
325(1)
Characteristics of Purely Electronic Digital Currencies
326(1)
Characteristics of Stored-Value Cards
326(1)
Using Digital Currencies
327(3)
Digital Currencies Are Cheaper!
327(1)
Digital Currencies Are Faster!
328(1)
Digital Currencies Are International!
328(1)
Digital Currencies Are Safer!
328(1)
Digital Currencies Allow Person-to-Person Payments!
329(1)
Digital Currencies Allow You to Protect Your Privacy!
329(1)
The Economic Consequences of Using Digital Currencies
330(3)
Anonymity
330(1)
The End of Fiat
331(1)
Currency Competition Restored
332(1)
Regulating the Regulators
332(1)
The Future of Digital Currencies
333(8)
Policy Implications of Digital Payments Systems
335(5)
Recommendations
340(1)
Summary
341(1)
References
341(2)
Part VI E-Commerce Solutions and Future Directions 343(60)
24 International E-Commerce Solutions
345(6)
E-Commerce Credit Card Payment Alternatives: U.S. and International
345(1)
Alternative International E-Commerce Payment Solutions
346(4)
Auction Resources
348(1)
Smart Cards
349(1)
Digital Wallets
349(1)
Person-to-Person Payments
349(1)
Micropayment Systems: eCash
350(1)
Token Value and Store-Based Credit
350(1)
Summary
350(1)
References
350(1)
25 Business-to-Business and Business-to-Consumer
351(30)
Roles and Challenges in Business-to-Business E-Commerce
352(1)
The Supplier's Perspective
353(2)
A Variety of Selling Channels
355(1)
Why Item Number and Price Aren't Enough
355(1)
Basic Supplier Challenges
355(3)
Making Products and Services Available to Multiple Business Customers
356(1)
Receiving Orders from Multiple Customers
357(1)
Managing the Online Business
357(1)
Enabling Technologies
358(1)
Business-to-Consumer
359(20)
E-Commerce Information System Architecture
360(2)
E-Commerce Information System Architecture Stakeholders
362(2)
The Principal Problem with E-Commerce Information Systems
364(2)
Problem One: A Highly Available and Highly Scalable E-Commerce Operational Infrastructure
366(2)
Problem Two: The Design and Implementation of an Effective Clickstream/Callstream Data Warehouse
368(9)
Problem Three: Alignment of Information Technology Vendor and E-Commerce Enterprise Business Goals
377(2)
Summary
379(1)
References
380(1)
26 Summary, Conclusions, and Recommendations
381(22)
Summary
381(2)
The Next Generation of E-Business
382(1)
The Next-Generation Infrastructure
382(1)
Conclusions
383(8)
Build versus Buy
384(2)
Open Systems: Pathway to Freedom?
386(1)
The Reality of Plug and Play
387(1)
Scalability and Performance: Practical Definitions
388(1)
Easing Integration and Speeding Time to Market
389(1)
Considering the Total Cost of Application
389(2)
Recommendations
391(9)
Why E-Service?
391(2)
The Top 15 Proven Best Practices for E-Service
393(1)
People and Processes
393(2)
Site Smarts
395(3)
Software Smarts
398(1)
Getting Started
399(1)
References
400(3)
Part VII Appendixes 403(58)
Appendix A Internet Glossary and Abbreviations
405(20)
Appendix B Electronic Commerce Online Resources
425(10)
World Wide Web Resources
425(8)
Electronic Commerce Companies
425(3)
Financial Institutions
428(1)
General Catalog and News Services
429(2)
Online Commerce Organizations
431(1)
Online Marketing, Buying, and Selling
432(1)
Specifications and Standards
433(1)
CommerceNet
433(20)
CommerceNet Charter
433(1)
CommerceNet Participation
433(1)
What CommerceNet Offers
434(1)
Appendix C Electronic Data Interchange Transaction Codes
435(8)
Appendix D Listing of E-Commerce Conferences
443(10)
Appendix E E-Commerce Case Studies
453(8)
Case Study 1: Share Dealing
453(1)
Preparing for the New Net Economy
453(1)
Meeting Demand
454(1)
Case Study 2: Taxpayer Benefits
454(1)
Solution
454(1)
And That's Just the Beginning
455(1)
Case Study 3: Outsourcing Solutions
455(6)
The Business Challenge
456(1)
Capitalizing on Sun and Oracle Excellence
456(1)
IT Built for Performance and Availability
456(1)
Building, Hosting, and Managing Client Sites
457(1)
Storage that Delivers
458(1)
Trained for Service and Support
458(1)
Business Advantages
458(1)
Positioned for Growth
459(2)
Index 461

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program