图书介绍

Electronic Commerce Fourth Annual Edition 电子商务2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

Electronic Commerce Fourth Annual Edition 电子商务
  • (美)施奈德(Schneider,F.P.)著 著
  • 出版社: 北京:机械工业出版社
  • ISBN:7111124111
  • 出版时间:2003
  • 标注页数:624页
  • 文件大小:122MB
  • 文件页数:649页
  • 主题词:电子商务-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

Electronic Commerce Fourth Annual Edition 电子商务PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Introduction2

Chapter 1:Introduction to Electronic Commerce2

Traditional Commerce and Electronic Commerce4

Traditional Commerce7

Electronic Commerce12

International Electronic Commerce17

Economic Forces and Electronic Commerce18

Transaction Costs19

Markets and Hierarchies20

The Role of Electronic Commerce21

Network Economic Structures22

Network Effects23

Value Chains in Electronic Commerce24

Strategic Business Unit Value Chains24

Industry Value Chains26

SWOT Analysis:Evaluating Business Unit Opportunities28

The Role of Electronic Commerce29

Summary31

Key Terms31

Review Questions32

Exercies32

Case32

For Further Study and Research34

Chapter 2:Technology Infrastructure:The Internet and the World Wide Web37

The Internet and World Wide Web38

Origins of the Internet39

New Uses for the Internet40

Commercial Use of the Internet40

Growth of the Internet41

Emergence of the World Wide Web42

Packet-Switched Networks45

Routing Packets46

Internet Protocols47

TCP/IP48

IP Addressing48

Domain Names50

Electronic Mail Protocols51

Web Page Request and Delivery Protocols51

Markup Languages and the Web53

Standard Generalized Markup Language54

Hypertext Markup Language(HTML)55

Extensible Markup Language(XML)61

HTML and XML Editors66

Intranets and Extranets68

Intranets68

Extranets68

Public and Private Networks69

Virtual Private Network(VPN)69

Broadband Connections71

Voice-Grade Telephone Connections71

INTERNET Connection Options71

Connectivity Overview71

Leased-Line Connections74

Wireless Connections74

Internet2 and the Semantic Web77

Summary78

Key Terms78

Review Questions80

Exercises81

Case82

For Further Study and Research83

Chapter 3:Selling on the Web:Revenue Models and Building a Web Presence88

Business Strategies For Electronic Commerce88

Revenue Models for Selling on the Web89

Web Catalog Revenue Models89

Digital Content Revenue Models97

Advertising-Supported Revenue Models99

Advertising-Subscription Mixed Revenue Models103

Fee-for-Transaction Revenue Models104

Fee-for-Service Revenue Models111

Revenue Models in Transition113

Subscription to Advertising-Supported Model114

Advertising-Supported to Advertising-Subscription Mixed Model114

Advertising-Supported to Fee-for Services Model114

Multiple Transitions115

Advertising-Supported to Subscription Model115

Revenue Strategy Issues117

Channel Conflict and Cannibalization117

Strategic Alliances and Channel Distribution Management118

Creating an Effective Web Presence121

Identifying Web Presence Goals121

Achieving Web Presence Goals122

Web Site Usability127

How the Web is Different127

Meeting the Needs of Web Site Visitors128

Trust and Loyalty130

Rating Electronic Commerce Web Sites131

Usability Testing132

Connecting With Customers135

The Nature of Communication on the Web135

Summary139

Key Terms139

Review Questions140

Exercises140

Case141

For Further Study and Research142

Chapter 4:Marketing on the Web146

Web Marketing Strategies148

Product-Based Marketing Strategies149

Customer-Based Marketing Strategies151

Communicating with Different Market Segments153

Trust and Media Choice153

Market Segmentation154

Market Segmentation on the Web156

Offering Customers a Choice on the Web158

Beyond Market Segmentation:Customer Behavior and Relationship Intensity159

Segmentation Using Customer Behavior159

Customer Relationship Intensity and Life-Cycle Segmentation162

Acquisition, Conversion, and Retention of Customers165

Banner Ads167

Advertising on the Web167

Other Web Ad Formats171

E-mail Marketing172

Permission Marketing173

Technology-Enabled Customer Relationship Management174

CRM as a Source of Value in the Marketspace175

Creating and Maintaining Brands on the Web177

Elements of Branding177

Emotional Branding vs. Rational Branding178

Brand Leveraging Strategies179

Brand Consolidation Strategies179

Costs of Branding180

Affiliate Marketing Strategies180

Viral Marketing Strategies182

Search Engine Positioning and Domain Names183

Search Engines and Web Directories183

Web Site Naming Issues185

Summary188

Key Terms188

Review Questions189

Exercises190

Case190

For Further Study and Research191

Chapter 5:Business-to-Business Strategles:From Electronic Data Interchange to Electronic Commerce195

Purchasing Activities197

Purchasing, Logistics, and Support Activities197

Direct vs. Indirect Materials Purchasing199

Logistics Activities200

Support Activities201

E-Government203

Network Model of Economic Organization205

Electronic Data Interchange206

Early Business Information Interchange Efforts206

Emergence of Broader EDI Standards207

How EDI Works209

Value-Added Networks213

EDI on the Internet216

Open Architecture of the Internet216

Financial EDI217

Supply Chain Management219

Value Creation in the Supply Chain219

Internet Technologies and the Supply Chain220

Building and Maintaining Trust in the Supply Chain223

Electronic Marketplaces and Portals224

Industry Marketplaces224

Private Stores and Customer Portals227

Private Company Marketplaces227

Industry Consortia-Sponsored Marketplaces228

Summary230

Key Terms230

Exercises231

Review Questions231

Case232

For Further Study and Research233

Chapter 6:Web Auctions, Virtual Communities, and Web Portals237

Auction Overview238

Origins of Auctions239

English Auctions239

Dutch Auctions240

First-Price Sealed-Bid Auctions240

Second-Price Sealed-Bid Auctions241

Open-Outcry Double Auctions241

Sealed-Bid Double Auctions241

General Consumer Auctions243

Web Auctions and Related Businesses243

Specialty Consumer Auctions249

Business-to-Business Auctions252

Auction-Related Services255

Seller-Bid(Reverse)Auctions256

Group Purchasing Sites258

Virtual Community and Portal Strategies259

Mobile Commerce259

Electronic Marketplaces260

Intelligent Software Agents261

Push Technology263

Virtual Communities263

Early Web Communities264

Web Community Consolidation265

Web Portal Strategies265

Summary269

Key Terms269

Review Questions270

Exercises270

Case271

For Further Study and Research272

Chapter 7:The Environment of Electronic Commerce:International, Legal, Ethical, and Tax Issues275

International Nature of Electronic Commerce276

Trust and Culture on the Web277

Language Issues278

Culture Issues281

Infrastructure Issues287

The Legal Environment of Electronic Commerce290

Borders and Jurisdiction290

Jurisdiction on the Internet293

Contracting and Contract Enforcement in Electronic Commerce296

Web Site Content Issues302

Web-Based Crime, Terrorism, and Warfare307

Ethical Issues308

Ethics and Web Business Policies309

Privacy Rights and Obligations309

Communications with Children312

Taxation and Electronic Commerce314

Nexus314

Income Taxes314

Sales Taxes316

Summary317

Key Terms318

Review Questions318

Exercises318

Case319

For Further Study and Research320

Technologies for Electronic Commerce326

Chapter 8:Web Server Hardware and Software326

Web Server Basics327

Types of Web Sites328

Web Clients and Web Servers329

Dynamic Content330

Various Meanings of “Server”331

Web Client/Server Communication331

Two-Tier Client/Server Architecture332

Three-Tier and N-Tier Client/Server Architectures334

Software for Web Servers335

Operating Systems for Web Servers335

Web Server Software337

Finding Web Server Software Information342

Finger and Ping Utilities343

Web Site and Internet Utility Programs343

Tracert and Other Route-Tracing Programs344

Electronic Mail345

Telnet and FTP Utilities347

Indexing and Searching Utility Programs349

Data Analysis Software349

Link-Checking Utilities350

Remote Server Administration351

Web Server Hardware352

Server Computers352

Web Server Performance Evaluation354

Web Server Hardware Architectures356

Web Hosting Choices359

Key Terms363

Summary363

Review Questions364

Exercises364

Case365

For Further Study and Research366

Chapter 9:Electronic Commerce Software368

Basic Functions of Electronic Commerce Software369

Catalog Display370

Shopping Cart371

Transaction Processing375

Middleware376

Advanced Functions of Electronic Commerce Software376

Application Integration and Databases377

Web Services379

Integration with ERP Systems381

Electronic Commerce Software for Small and Mid-Sized Companies382

Basic Commerce Service Providers384

Mall-Style Commerce Service Providers386

Estimated Operating Expenses for a Small Web Business389

Electronic Commerce Software for Medium-Sized to Large Businesses390

Web Site Development Tools390

Intershop Enfinity391

IBM WebSphere Commerce Professional Edition392

Microsoft Commerce Server 2002393

Electronic Commerce Software for Large Businesses394

Enterprise-Class Electronic Commerce Software395

Customer Relationship Management Software397

Supply Chain Management Software397

Content Management Software398

Knowledge Management Software399

Summary401

Key Terms401

Review Questions402

Exercises402

Case403

For Further Study and Research404

Chapter 10:Security Threats to Electronic Commerce406

Internet Security Issues Overview407

Computer Security Classifications409

Security Policy and Integrated Security409

Intellectual Property Threats411

Cybersquatting411

Name Changing413

Name Stealing413

Threats to the Securith of Client Computers414

Active Content414

Steganography425

Threats to the Security of Communication Channels425

Secrecy Threats426

Necessity Threats429

Integrity Threats429

Threats to the Physical Security of Internet Communications Channels430

Threats to Wireless Networks430

Threats to the Security of Server Computers431

Web Server Threats431

Database Threats434

Common Gateway Interface Threats434

Other Programming Threats435

Threats to the Physical Security of Web Servers436

Organizations that Promote Computer Security437

Key Terms440

Summary440

Review Questions441

Exercises441

Case442

For Further Study and Research443

Chapter 11:Implementing Electronic Commerce Security445

Electronic Commerce Security Objectives446

History of Security in Computer Information Systems446

Security Requirements for Electronic Commerce447

Protecting Intellectual Property448

Protecting Privacy of Web Site Customers451

Digital Certificates454

Protecting Client Computers454

Client Security in Microsoft Internet Explorer457

Client Security in Netscape Navigator460

Using Autivirus Software462

Protecting Electronic Commerce Communication Channels462

Encryption463

Encryption Algorithms and Standards467

Secure Sockets Layer(SSL)Protocol468

Secure HTTP(S-HTTP)472

Ensuring Transaction Integrity with Hash Functions474

Ensuring Transaction Integrity with Digital Signatures474

Protecting the Web Server476

Guaranteeing Transaction Delivery476

Access Control and Authentication478

Operating System Controls480

Firewalls481

Computer Forensics and Ethical Hacking483

Physical Security484

Summary485

Key Terms485

Review Questions486

Exercises486

Case487

For Further Study and Research488

Chapter 12:Payment Systems for Electronic Commerce490

Online Payment Basics492

Payment Cards494

Advantages and Disadvantages of Payment Cards495

Payment Acceptance and Processing496

Electronic Cash499

Holding Electronic Cash:Online and Offline Cash502

Advantages and Disadvantages of Electronic Cash502

How Electronic Cash Works503

Providing Security for Electronic Cash504

Electronic Cash Systems505

Electronic Wallets512

Microsoft NET Passport514

Yahoo! Wallet515

WЗC Micropayment Standards Development Activity516

The ECML Standard517

Stored-Value Cards519

Magnetic Strip Cards520

Smart Cards520

Summary525

Key Terms525

Review Questions526

Exercises526

Case527

For Further Study and Research527

Chapter 13:Planning for Electronic Commerce532

Integration532

Planning Electronic Commerce Initiatives533

Identifying Objectives533

Linking Objectives to Business Strategies534

Measuring Benefit Objectives535

Measuring Cost Objectives536

Comparing Benefits to Costs541

Return on Investment(ROI)541

Strategies for Developing Electronic Commerce Web Sites543

Internal Development vs. Outsourcing544

Selecting a Hosting Service547

New Methods for Implementing Partial Outsourcing548

Project Management550

Managing Electronic Commerce Implementations550

Project Portfolio Management552

Staffing for Electronic Commerce552

Post-Implementation Audits554

Summary556

Key Terms556

Review Questions557

Exercises557

Case558

For Further Study and Research559

Glossary562

Index595

热门推荐