Upload
arabella-dixon
View
212
Download
0
Embed Size (px)
Citation preview
2001 Prentice Hall, Inc. All rights reserved.
1
Chapter 32 - e-Business & e-Commerce
Outline32.1 Introduction32.2 E-Business Models
32.2.1 Storefront Model32.2.2 Shopping-Cart Technology32.2.3 Auction Model32.2.4 Portal Model32.2.5 Name-Your-Price Model32.2.6 Comparison-Pricing Model32.2.7 Demand-Sensitive Pricing Model32.2.8 Bartering Model
32.3 Building an e-Business32.4 e-Marketing
32.4.1 Branding32.4.2 Marketing Research2.4.3 e-Mail Marketing32.4.4 Promotions32.4.5 Consumer Tracking32.4.6 Electronic Advertising
2001 Prentice Hall, Inc. All rights reserved.
2
Chapter 32 - e-Business & e-Commerce
32.4.8 Affiliate Programs32.4.4 Promotions32.4.9 Public Relations32.4.10 Customer Relationship Management
(CRM)32.5 Online Payments
32.5.1 Credit-Card Payment32.5.2 Digital Cash and e-Wallets32.5.3 Micropayments32.5.4 Smart Cards
32.6 Security32.6.1 Public-Key Cryptography32.6.2 Secure Sockets Layer (SSL)32.6.3 WTLS32.6.4 IPSec and Virtual Private Networks (VPN)32.6.5 Security Attacks32.6.6 Network Security
2001 Prentice Hall, Inc. All rights reserved.
3
Chapter 32 - e-Business & e-Commerce
32.7 Legal Issues32.7.1 Privacy32.7.2 Defamation32.7.3 Sexually Explicit Speech32.7.4 Copyright and Patents
32.8 XML and e-Commerce32.9 Internet and World Wide Web Resources
2001 Prentice Hall, Inc. All rights reserved.
4
32.2.3 Auction Model
Fig. 32.1 eBay home page. (These materials have been reproduced by Prentice Hallwith the permission of eBay, Inc. COPYRIGHT EBAY, INC. ALL RIGHTS RESERVED.)
2001 Prentice Hall, Inc. All rights reserved.
5
32.2.3 Auction Model
Fig. 32.2 Placing a bid on eBay. (These materials have been reproduced by Prentice Hall with the permission of eBay, Inc. COPYRIGHT EBAY, INC. ALL RIGHTS RESERVED.)
2001 Prentice Hall, Inc. All rights reserved.
6
32.6.1 Public-Key Cryptography
Fig. 32.3 Encrypting and decrypting a message using public-key cryptography.