E-business and e-commerce Deitel Internet and WWW  How to Program Ch. 32: iw3-e-biz.pdf
1. Introduction <ul><li>Successful business: match needs with offers/services </li></ul><ul><li>Terms: </li></ul><ul><ul><...
<ul><li>Needs: technical, marketing (including advertising) </li></ul><ul><li>Expectations: 24/7, reliability, functionali...
1.2 E-business models <ul><li>Supply-chain management: strategic management of distribution channels and the process that ...
1.2.1 Storefront model <ul><li>It is the typical e-business </li></ul><ul><li>Provides: transaction processing, security, ...
Shopping cart technology <ul><li>Shopping cart: e-commerce enabling technology </li></ul><ul><li>Related to: product catal...
1.2.3 Auction model <ul><li>Auction selling (example: eBay): </li></ul><ul><ul><li>Sellers: post items for sale </li></ul>...
1.2.4 Portal model <ul><li>Find acces/links to many types of information in one place </li></ul><ul><li>Types: </li></ul><...
1.2.5 Other models <ul><li>Name your price </li></ul><ul><li>Comparison-pricing model </li></ul><ul><li>Demand sensitive p...
1.3 Building an e-business <ul><li>Types of e-businesses: </li></ul><ul><ul><li>Turnkey (offered by yahoo, banks) </li></u...
1.4 Marketing <ul><li>Brand (logo, name, symbol) – identifies a company </li></ul><ul><li>Look-and-feel  </li></ul>1.4.1 B...
1.4.2 Marketing research <ul><li>Marketing mix </li></ul><ul><ul><li>Specific to each company </li></ul></ul><ul><ul><li>I...
Other marketing techniques <ul><li>E-mail marketing </li></ul><ul><li>Promotions </li></ul><ul><li>Consumer tracking </li>...
1.5 Online payments <ul><li>Credit cards (point of sale, card-not-present) </li></ul><ul><li>Digital cash and e-wallets </...
1.6 Security - Issues <ul><li>Privacy – information not captured/transmitted to a 3 rd  party </li></ul><ul><li>Integrity ...
1.6 Security - Technologies <ul><li>Cryptography (symmetric, public key) </li></ul><ul><li>Digital signatures </li></ul><u...
1.7 Legal issues <ul><li>Privacy </li></ul><ul><li>Defamation </li></ul><ul><li>Copyright/patents </li></ul>
Upcoming SlideShare
Loading in …5
×

E Business And E Commerce

663
-1

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
663
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
31
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

E Business And E Commerce

  1. 1. E-business and e-commerce Deitel Internet and WWW How to Program Ch. 32: iw3-e-biz.pdf
  2. 2. 1. Introduction <ul><li>Successful business: match needs with offers/services </li></ul><ul><li>Terms: </li></ul><ul><ul><li>E-commerce: online exchange between a business and its customers/partners </li></ul></ul><ul><ul><li>E-business: e-commerce and other activities (production, development, management, corporate infrastructure) </li></ul></ul><ul><li>Technologies: very dynamic </li></ul><ul><li>Currently: pay bills, write and cash checks, trade stocks, loans/mortgages, manage assets </li></ul>
  3. 3. <ul><li>Needs: technical, marketing (including advertising) </li></ul><ul><li>Expectations: 24/7, reliability, functionality, speed, user-friendliness, service, personalization </li></ul><ul><li>Personalization: invasion of privacy </li></ul>1. Introduction (2)
  4. 4. 1.2 E-business models <ul><li>Supply-chain management: strategic management of distribution channels and the process that supports them </li></ul><ul><ul><li>Can be better implemented by e-business </li></ul></ul><ul><li>Beginnings: </li></ul><ul><ul><li>Electronic Funds Transfer (ETF) </li></ul></ul><ul><ul><li>Electronic Data Interchange (EDI) </li></ul></ul><ul><ul><li>E-business: coined in early 90s </li></ul></ul><ul><li>Models: Amazon, eBay, Yahoo </li></ul>
  5. 5. 1.2.1 Storefront model <ul><li>It is the typical e-business </li></ul><ul><li>Provides: transaction processing, security, online payments, information storage </li></ul><ul><li>Enables merchants to sell online </li></ul><ul><li>Requires: </li></ul><ul><ul><li>Online catalogs </li></ul></ul><ul><ul><li>Order placing via website </li></ul></ul><ul><ul><li>Secure e-payments </li></ul></ul><ul><ul><li>Send/ship merchandise to buyers </li></ul></ul><ul><ul><li>Manage customer data </li></ul></ul><ul><ul><li>Marketing </li></ul></ul>
  6. 6. Shopping cart technology <ul><li>Shopping cart: e-commerce enabling technology </li></ul><ul><li>Related to: product catalog (resides in a database) </li></ul><ul><li>Amazon.com: </li></ul><ul><ul><li>Founded: 1994 </li></ul></ul><ul><ul><li>Millions of products, 17 million customers in 160 countries </li></ul></ul><ul><ul><li>Sells: books, DVDs, electronics </li></ul></ul><ul><ul><li>Models: client-server, multitier </li></ul></ul><ul><ul><li>Cross-reference products </li></ul></ul><ul><ul><li>Personalized service </li></ul></ul><ul><ul><li>To purchase: add to shopping cart, proceed to check out </li></ul></ul><ul><ul><li>1-click payment system </li></ul></ul><ul><ul><li>Account maintenance </li></ul></ul>
  7. 7. 1.2.3 Auction model <ul><li>Auction selling (example: eBay): </li></ul><ul><ul><li>Sellers: post items for sale </li></ul></ul><ul><ul><li>Bidders (place bids </li></ul></ul><ul><li>Reverse auction model: buyers set prices, sellers compete to match/beat them (example: priceline) </li></ul><ul><li>Successful bids are binding </li></ul><ul><li>eBay: </li></ul><ul><ul><li>One of the world’s most profitable businesses </li></ul></ul><ul><ul><li>Adds 450 k items per day </li></ul></ul><ul><ul><li>Uses a database to manage its auctions </li></ul></ul><ul><ul><li>Does not maintain inventory, does not deal with shipping and handling </li></ul></ul>
  8. 8. 1.2.4 Portal model <ul><li>Find acces/links to many types of information in one place </li></ul><ul><li>Types: </li></ul><ul><ul><li>Horizontal (broad): google </li></ul></ul><ul><ul><li>Vertical(specialized): yahoo, hotbot </li></ul></ul>
  9. 9. 1.2.5 Other models <ul><li>Name your price </li></ul><ul><li>Comparison-pricing model </li></ul><ul><li>Demand sensitive pricing: discounts offered to groups of shoppers </li></ul><ul><li>Bartering model: offer items in exchange for other items </li></ul>
  10. 10. 1.3 Building an e-business <ul><li>Types of e-businesses: </li></ul><ul><ul><li>Turnkey (offered by yahoo, banks) </li></ul></ul><ul><ul><li>Using templates: more personalized </li></ul></ul><ul><ul><li>Outsource: very personalized (expensive) </li></ul></ul>
  11. 11. 1.4 Marketing <ul><li>Brand (logo, name, symbol) – identifies a company </li></ul><ul><li>Look-and-feel </li></ul>1.4.1 Branding and look-and-feel
  12. 12. 1.4.2 Marketing research <ul><li>Marketing mix </li></ul><ul><ul><li>Specific to each company </li></ul></ul><ul><ul><li>Includes </li></ul></ul><ul><ul><ul><li>Product and service details and development </li></ul></ul></ul><ul><ul><ul><li>Effective pricing </li></ul></ul></ul><ul><ul><ul><li>Promotion and distribution </li></ul></ul></ul><ul><li>Marketing research </li></ul><ul><ul><li>Focus groups </li></ul></ul><ul><ul><li>Interviews, paper and phone surveys, questionnaires </li></ul></ul><ul><ul><li>Secondary research (based on previous data) </li></ul></ul><ul><li>Goal: learn about internet demographics </li></ul><ul><li>Use focus groups to present the company </li></ul>
  13. 13. Other marketing techniques <ul><li>E-mail marketing </li></ul><ul><li>Promotions </li></ul><ul><li>Consumer tracking </li></ul><ul><li>Electronic advertising </li></ul><ul><li>Search engines </li></ul><ul><li>Affiliate programs </li></ul><ul><li>Public relations </li></ul><ul><li>Customer relationship management </li></ul>
  14. 14. 1.5 Online payments <ul><li>Credit cards (point of sale, card-not-present) </li></ul><ul><li>Digital cash and e-wallets </li></ul><ul><li>Micro-payments (less then $10) </li></ul><ul><li>Smart cards (privacy) </li></ul>
  15. 15. 1.6 Security - Issues <ul><li>Privacy – information not captured/transmitted to a 3 rd party </li></ul><ul><li>Integrity – information not compromised </li></ul><ul><li>Authentication </li></ul><ul><li>Non-repudiation – be able to prove that a message was sent/received </li></ul><ul><li>Availability </li></ul>
  16. 16. 1.6 Security - Technologies <ul><li>Cryptography (symmetric, public key) </li></ul><ul><li>Digital signatures </li></ul><ul><li>Private Key Infrastructure </li></ul><ul><li>Secure Socket Layer </li></ul>
  17. 17. 1.7 Legal issues <ul><li>Privacy </li></ul><ul><li>Defamation </li></ul><ul><li>Copyright/patents </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×