E-Commerce and E-Business



Similar documents
CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS

contents CHAPTER 1 CHAPTER 2 Strategic Decision Making 32 Information Systems in Business 1 Opening Case: Revving Up Sales at Harley-Davidson 33

Internet Part 2. CS/MIS Department

Chapter 3. Outline the hardware and software technologies used to build an e business. its partners. access to the Internet and hosting of

Wealth Management System

How To Market Online

Electronic Commerce. Chapter Overview

Deploying IP-based Virtual Private Network Across the Global Corporation

E-Business, E-Commerce

Case-study: SwissAir. The Internet Business. Case-study: SwissAir. Case-study: SwissAir. Summary. Summary

IJMIE Volume 2, Issue 5 ISSN:

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. 1

1. Introduction to internet marketing

e-commerce Models. Let us look at each of them in detail. Business-to-Business (B2B) Model

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]

Overview. E-business. What is e-commerce. The difference between E-commerce and E-business. Why IT is not enough

CONTENTS. CHAPTER 2 emarketing Vs. TRADITIONAL MARKETING 32

Community Development and Training Centre Semester IT 245 Management Information Systems

Technical papers Virtual private networks

Cisco Which VPN Solution is Right for You?

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

Outline. Introduction to E-commerce. Why is e-commerce? [Awad] What is e-commerce? Session 1. Yan Wang E-commerce.

Mid-Term #1 Solutions

Chapter 10 Objectives. Chapter 10 E-Commerce: A Revolution in the Way We Do Business. What Is E-Commerce? What Is E-Commerce? What Is E-Commerce?

Mobile Cloud Computing In Business

E-Business, E-Commerce, and Information Systems

ICAB5238B Build a highly secure firewall

ICANWK406A Install, configure and test network security

ELECTRONIC COMMERCE SYSTEMS

資 訊 管 理 個 案. E-commerce: Digital Markets, Digital Goods 1. Facebook, 2. Amazon vs. Walmart (Chap. 10)

SSL VPN vs. IPSec VPN

Network Topology Comparison

Pearson Education Limited 2003

Information Systems for Business Operations

Figure 41-1 IP Filter Rules

Hi, My Name is Karen! GLOBAL E-BUSINESS & TRADE. Karen s Decision. Karen had a beautiful baby boy BUT her son would never know his father 2/24/2015

E Commerce INTRODUCTION LEARNING OUTCOMES

Secure Network Design: Designing a DMZ & VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN

KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Electronic Commerce Management for Business Activities and Global Enterprises:

Module 6. e-business and e- Commerce

Introduction to E-Commerce

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

CHAPTER 11: COMPUTERS AT WORK, SCHOOL, AND HOME

For paid computer support call

Chapter 11: E-Commerce

Trends in Electronic Commerce Among Selected Companies in Metro Manila, Philippines

Cornerstones of Security

How To Configure Apple ipad for Cyberoam L2TP

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Competencies (1 of 2)

,V :HE %DVHG (', IRU <RX" 7LPRWK\ 6]DO ', &RQVXOWLQJ 2SSRUWXQLW\ 0DQDJHU 6U &RQVXOWDQW 1HWZRUN 6HUYLFHV +DQJ 7HQ ZLWK ', $ 'HFDGH RI,QQRYDWLRQ DI1789

Connecting to the FILTER Virtual Private Network (VPN)

How To Configure SSL VPN in Cyberoam

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Introduction to Electronic Commerce

Local Area Networks (LANs) Blueprint (May 2012 Release)

How Virtual Private Networks Work

C - COMMERCE CONCEPTS MODELS STRATEGIES C.S.V. MURTHY

Table of Contents. Introduction

ICAI4099A Build an intranet

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6

E-commerce. Web Servers Hardware and Software

E-BUSINESS CHAPTER 3. Chapter Three Overview 3.1. BUSINESS AND THE INTERNET. Disruptive versus Sustaining Technology. The Internet Business Disruption

Introduction to E-commerce

Understand the Concepts of the Internet, Intranet, and Extranet

Licensing Microsoft SharePoint Server 2013


Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

ACS Final Exam Topic Outline. Functional Area Information Systems. V. Enterprise Information Systems

DIGIPASS Authentication for Cisco ASA 5500 Series

MANAGED FIREWALL SERVICE. Service definition

Chapter 9. The Internet: Information Technology Infrastructure for the Digital Firm. Essentials of Management Information Systems

Network Services Internet VPN

ni.com Remote Connectivity with LabVIEW

THE E-COMMERCE EXTENSION FOR ERP

MANAGEMENT INFORMATION SYSTEMS 8/E

Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. Indicative Content

Network Configuration Settings

Accessing the Media General SSL VPN

Taking a look at different types of e-commerce

Wireless VPN White Paper. WIALAN Technologies, Inc.

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

Appendix C Network Planning for Dual WAN Ports

1) A complete SCM solution includes customers, service providers and partners. Answer: TRUE Diff: 2 Page Ref: 304

L2F Case Study Overview

Transcription:

E-Commerce and E-Business Miguel Rebollo Introduction to Computer Science 2010-2011

Aims Describing the phases a company goes through using Internet for business Describing the forms of e-commerce Describing the purpose and uses of intranets and extranets Describing the use od web sites to support commercial transactions Describing the ethical issues of e-commerce

Contents 1. E-Commerce in perspective 2. Intranets: internal business processes 3. Extranets: business alliances 4. B2C: customer-centered web design 5. Technical requirements for e-commerce 6. Ethical issues of e-commerce

Created in 1994 Opened in July 1995 as a virtual book-stores 20 mill. customers in 160 countries Survivor of.dot crises Powerful recommendation system Jeff Bezos. Amazon founder

E-commerce in Perspective Sharing business information, maintaining business relationships and conducting business transactions through the use od telecomm. networks Involves reorganising business processes

E-comm Transforms Business.com companies (virtual) Essential, or at least important for the rest Increases speed and efficiency of business processes Variants: e-commerce i-commerce (electronic) (internet) m-commerce (mobile)

E-Comm Models B B business-to-business (B2B) C business-to-consumer (B2C) C consumer-to-business (C2B) consumer-to-consumer (C2C) Put examples of each case

Intranets Basis for B2E: internet supporting internal activties Improve comm. inside the company Advantages cross-platform open standards minimal user training

Characteristics of a B2E Intranet physical tech: LAN with Ethernet middleware: software which handles physical comm. (TCP/IP based) firewall sw for security standard web applications: browsers, e-mail clients, file sharing

Characteristics of a B2E Intranet physical tech: LAN with Ethernet middleware: software which handles physical comm. (TCP/IP based) firewall sw for security standard web applications: browsers, e-mail clients, file sharing

How To Use B2E Intranets Information access for employees: centralised databases with a common interface Collaboration and teamwork: distribute information, remote working groups Internal business transactions: increase efficiency and reduces paperwork

Extranets Business Alliances Link intranets of different companies (e-marketplaces) Activities between trusted business partners Functionalities place orders check stock level confirm inoice status exchange business information

Extranets with Public Networks use public, open comm. lines without additional security mechanisms low cost, but low security (and high risk) protection: firewalls and logons

Extranets with Public Networks use public, open comm. lines without additional security mechanisms low cost, but low security (and high risk) protection: firewalls and logons

Extranets with VPN use public, open comm. lines an special protocol creates a virtual tunnel across the intranets VPNs are becoming the preferred method: economical and secure enough

Extranets with VPN use public, open comm. lines an special protocol creates a virtual tunnel across the intranets VPNs are becoming the preferred method: economical and secure enough

Extranets with Private Networks physically attached lines (leased) high cost high security levels extent of access for external users (only business partners)

Extranets with Private Networks physically attached lines (leased) high cost high security levels extent of access for external users (only business partners)

B2C Customer centered web design Often interactive features included CRM: customer relationship management critical without personal contact database with relevant information: preferences, past purchases, communications...

Features of Well Designed Sites Speed of transactions Large, up-to-date selection (the Long Tail ) Ease of use Secure transations After-sale features

Technical Requirements: Web Server Hw&Sw to store pages and handle trafic Only large companies have the know-how and the capability to run their own server

Technical Requirements: Hosting Service Provide space in their own servers and tools to set up business web pages Handle almost all transactions steps (including payments)

Technical Requirements: Software Provides commercial services Database (catalogue) + front-end Capabilities: security, search engine, data analysis

Company Policies A Code of Ethics Privacy policy of the organisation Permission to transmit people data How company inform customers about the use of personal data Ownership about network posting and communications Tracking of user behaviours