6
2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 32 - e-Business & e-Commerce Outline 32.1 Introduction 32.2 E-Business Models 32.2.1 Storefront Model 32.2.2 Shopping-Cart Technology 32.2.3 Auction Model 32.2.4 Portal Model 32.2.5 Name-Your-Price Model 32.2.6 Comparison-Pricing Model 32.2.7 Demand-Sensitive Pricing Model 32.2.8 Bartering Model 32.3 Building an e-Business 32.4 e-Marketing 32.4.1 Branding 32.4.2 Marketing Research 2.4.3 e-Mail Marketing 32.4.4 Promotions 32.4.5 Consumer Tracking 32.4.6 Electronic Advertising

2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 32 - e-Business & e-Commerce Outline 32.1 Introduction 32.2 E-Business Models 32.2.1 Storefront

Embed Size (px)

Citation preview

Page 1: 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 32 - e-Business & e-Commerce Outline 32.1 Introduction 32.2 E-Business Models 32.2.1 Storefront

2001 Prentice Hall, Inc. All rights reserved.

1

Chapter 32 - e-Business & e-Commerce

Outline32.1 Introduction32.2 E-Business Models

32.2.1 Storefront Model32.2.2 Shopping-Cart Technology32.2.3 Auction Model32.2.4 Portal Model32.2.5 Name-Your-Price Model32.2.6 Comparison-Pricing Model32.2.7 Demand-Sensitive Pricing Model32.2.8 Bartering Model

32.3 Building an e-Business32.4 e-Marketing

32.4.1 Branding32.4.2 Marketing Research2.4.3 e-Mail Marketing32.4.4 Promotions32.4.5 Consumer Tracking32.4.6 Electronic Advertising

Page 2: 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 32 - e-Business & e-Commerce Outline 32.1 Introduction 32.2 E-Business Models 32.2.1 Storefront

2001 Prentice Hall, Inc. All rights reserved.

2

Chapter 32 - e-Business & e-Commerce

32.4.8 Affiliate Programs32.4.4 Promotions32.4.9 Public Relations32.4.10 Customer Relationship Management

(CRM)32.5 Online Payments

32.5.1 Credit-Card Payment32.5.2 Digital Cash and e-Wallets32.5.3 Micropayments32.5.4 Smart Cards

32.6 Security32.6.1 Public-Key Cryptography32.6.2 Secure Sockets Layer (SSL)32.6.3 WTLS32.6.4 IPSec and Virtual Private Networks (VPN)32.6.5 Security Attacks32.6.6 Network Security

Page 3: 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 32 - e-Business & e-Commerce Outline 32.1 Introduction 32.2 E-Business Models 32.2.1 Storefront

2001 Prentice Hall, Inc. All rights reserved.

3

Chapter 32 - e-Business & e-Commerce

32.7 Legal Issues32.7.1 Privacy32.7.2 Defamation32.7.3 Sexually Explicit Speech32.7.4 Copyright and Patents

32.8 XML and e-Commerce32.9 Internet and World Wide Web Resources

Page 4: 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 32 - e-Business & e-Commerce Outline 32.1 Introduction 32.2 E-Business Models 32.2.1 Storefront

2001 Prentice Hall, Inc. All rights reserved.

4

32.2.3 Auction Model

Fig. 32.1 eBay home page. (These materials have been reproduced by Prentice Hallwith the permission of eBay, Inc. COPYRIGHT EBAY, INC. ALL RIGHTS RESERVED.)

Page 5: 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 32 - e-Business & e-Commerce Outline 32.1 Introduction 32.2 E-Business Models 32.2.1 Storefront

2001 Prentice Hall, Inc. All rights reserved.

5

32.2.3 Auction Model

Fig. 32.2 Placing a bid on eBay. (These materials have been reproduced by Prentice Hall with the permission of eBay, Inc. COPYRIGHT EBAY, INC. ALL RIGHTS RESERVED.)

Page 6: 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 32 - e-Business & e-Commerce Outline 32.1 Introduction 32.2 E-Business Models 32.2.1 Storefront

2001 Prentice Hall, Inc. All rights reserved.

6

32.6.1 Public-Key Cryptography

Fig. 32.3 Encrypting and decrypting a message using public-key cryptography.