Search and Find

Book Title

Author/Publisher

Table of Contents

Show eBooks for my device only:

 

Introduction to E-commerce

of: Zheng Qin

Springer-Verlag, 2010

ISBN: 9783540496458 , 180 Pages

Format: PDF, Read online

Copy protection: DRM

Windows PC,Mac OSX,Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Read Online for: Windows PC,Mac OSX,Linux

Price: 128,39 EUR



More of the content

Introduction to E-commerce


 

Preface

5

Table of Contents

9

Part 1 Fundamentals

16

1 Fundamentals of E-commerce

17

1.1 The Origin and Development of E-commerce

18

1.1.1 The Origin and Development of E-commerce

18

1.1.2 The Definitions of E-commerce

21

1.1.3 E-commerce in China

23

1. E-commerce based on EDI (1990 1993)

24

2. “Three Golden Projects” carried out by governments in 1993 1997 establish, the foundation of e-commerce

24

3. E-commerce based on Internet since 1998

25

4. The pragmatic development phase in 2000

25

1.2 Influence of Related Basic Sciences on E-commerce

28

1.2.1 Influence of Mathematics on E-commerce

29

1. Probability model

29

2. Queuing theory model

30

3. Nonlinear dynamic model

31

4. Graph theory model

32

1.2.2 The Impact of Computer Science Upon the E-commerce

34

1.2.3 Impact of Communications Science upon the E-commerce

35

1.2.4 The Impact of Management Science upon E-commerce

37

1.3 Categories of the E-commerce

38

1.3.1 B2B

39

1. Volume of business transaction of B2B takes up the majority of the total trading volume in e-commerce

39

2. The B2B e-commerce companies hold an advantage in lowering operation cost

40

3. B2B e-commerce companies are more suitable for modern logistics management

40

4. B2B e-commerce companies are competitive in guaranteeing credit and capital security during operation course

40

5. E-commerce of B2B is more mature in both theory and practice

40

1.3.2 B2C

41

1. Online subscription categories

42

2. Advertisements-supported categories

43

3. Online donation categories

43

1.3.3 B2G

44

1.3.4 G2G

46

1. Government procurement

49

2. The electronic taxation

49

1.3.5 C2C

50

1.4 The Constitution of the E-commerce

53

1.4.1 Portal of the Network

53

1.4.2 Customer Relationship Management

56

Client Intelligence (CI)

57

1.4.3 Supply Chain Management

59

1. SCM Pattern

60

2. Functions of SCM

61

3. Components of SCM

61

1.4.4 Logistic Management

62

1.4.5 Decision Support

65

1.5 Supporting Environments for E-commerce

69

1.5.1 Technical Environment

69

1. Internet infrastructure

70

2. Multimedia and online publication

70

3. Newspapers and information communication infrastructure

70

4. Commercial service infrastructure

70

5. Public policies, laws and privacy

70

6. Technology standard

71

1.5.2 Legal Environment

71

1. Legal problems in e-commerce contracts

72

2. Legal protection on e-commerce transaction

72

3. Problems in the electronicization of banks

72

1.5.3 Credit Environment

73

1. Pattern of market operation and legislation guide

73

2. Pattern of government-driven and direct supervision

74

1.5.4 Financial Environment

76

1. Financial service in e-commerce era

77

2. Online financial services

78

1.6 M-commerce

79

1.6.1 The Origin of M-commerce

79

1.6.2 M-commerce Components

81

1.6.3 The Development of M-commerce

83

1.6.4 The Application of M-commerce

85

1.7 Summary

87

References

88

Part 2 Technology

91

2 E-commerce Supporting Technologies

92

2.1 E-commerce Fundamental Technology

93

2.1.1 Web Technology

93

2.1.2 HTML

94

2.1.3 XML

94

2.1.4 Java

96

1. Platform-independent

96

2. Security

97

3. Object-oriented

97

4. Distributed

97

5. Robust

97

2.2 Computer Communication Technology

98

2.2.1 TCP/IP Protocols

98

2.2.2 HTTP Communication Protocol

99

2.2.3 EDI Communication Protocol

101

2.2.4 WAP Communication Protocol

104

2.2.5 WLAN Protocol

107

1. IEEE 802.11X

108

2. HIPERLAN

110

3. HomeRF

110

4. WLAN standards in China

111

2.2.6 Bluetooth Protocol

111

2.3 Information Processing Technologies in E-commerce

115

2.3.1 Global Positioning System (GPS)

115

1. Pseudo-range difference

118

2. Carrier phase difference

118

2.3.2 Geographical Information System (GIS)

118

1. GIS vs. general database

119

2. GIS vs. digital map

119

2.3.3 Decision Supporting System (DSS)

119

2.3.4 Group Decision Supporting System (GDSS)

122

2.3.5 Intelligent Decision Supporting System (IDSS)

124

2.4 Summary

125

References

126

3 Payment Technologies for E-commerce

128

3.1 Online Bank

129

3.1.1 The Development of Online Banks

129

3.1.2 The Function of Online Bank

132

1. Commercial banking business

132

2. Online payment

133

3. New business domain

133

3.1.3 Online Banking Technologies

133

3.2 E-payment Tools

136

3.2.1 E-payment System

136

3.2.2 Intelligent Card

137

3.2.3 E-check

139

3.2.4 E-wallet

140

3.2.5 E-cash

143

3.3 Summary

145

References

145

4 Security Technologies in E-commerce

148

4.1 Introduction to Security Problems in E-commerce

148

4.2 Reliability of E-commerce System

150

4.3 Data Encryption Technology

152

4.3.1 Symmetric Encryption System

153

4.3.2 Public Key Encryption Algorithm

155

4.3.3 Mixed Encryption Technology

156

4.4 Digital Signature

157

4.4.1 Sign the Document with Public Key Algorithm

157

4.4.2 Signature with One-way Hash Function and Public Key System

158

4.5 Authentication Technology

159

4.5.1 Digital Authentication Technology

159

4.5.2 Biological Verification Technology

160

1. Fingerprint Authentication

160

2. Iris Authentication

160

3. Face Authentication

161

4. Hand Shape Authentication

161

5. Palmprint Authentication

161

6. Gait Authentication

162

7. Manual Signature Authentication

162

8. Voice Authentication

163

9. Comparison of biological Authentication technology

163

4.6 Firewall Technology

163

4.6.1 Introduction to Firewall

163

4.6.2 Functions of the Firewall

164

1. Defending function

164

2. Security characteristic

165

3. Management function

165

4. Record and report

166

4.6.3 Categories of Firewall

166

1. Packet filtering firewall

166

2. Application proxy firewall

167

3. Hybrid firewall

167

4.7 Intrusion Detection Technology

168

4.7.1 Introduction to Intrusion Detection

168

4.7.2 Intrusion Detection Method

170

1. Technical classification

170

2. Commonly used detection methods

171

4.8 Secure Payment Technology

172

4.8.1 SSL Protocol

172

4.8.2 SET Protocol

176

4.9 Summary

179

References

179

Part 3 Management

182

5 E-commerce and the Law

183

5.1 Legal Problems in E-contract

184

1. True intentions

184

2. The offer and acceptance in e-contracts

184

3. The entry-in-force of the acceptance in e-contracts

185

4. The signature

185

5. Paperwork problem

186

6. The evidence effect of e-commerce documents

186

7. Proof of computer records

187

8. The admissibility of evidence in e-commerce

187

9. The submission of originals

187

5.2 Legal Problems in E-banks

188

1. Elements of electronic fund transfer

188

2. Procedures in electronic fund transfer

189

3. Problems of safety brought by computer crimes

190

4. The issuance and management of e-currency

190

5. The unity of Certification Authority (CA) and payment gateway

190

5.3 The legal Problems in the Electronic Fund Transfer

191

The definition of the subjects in the electronic fund transfer

191

5.4 The Intellectual Property Protection in the E-commerce

192

5.4.1 Legal Problems Brought forth by Domain Names

192

1. The legal conflict between domain names and name rights

193

2. The legal conflict between domain names and enterprise name rights

193

3. The legal conflict between domain names and trademark rights

194

4. The conflict between domain names and other domain name rights

195

5.4.2 The Coordination of the Conflicts Between Domain Names and Intellectual Property

195

1. Define the legal status of domain names

195

2. Establish the communication and coordination channel between the domain name registration mechanism and the legal system of intellectual property protection

195

3. Proposals concerning domain names by the international community

196

5.4.3 WIPO's Coordination About the Conflicts Between Domain Names and Intellectual Property

197

1. Measures to avoid domain name conflicting in the registration phase

197

2. Measure taken towards inaccurate and insecure information

197

3. Measures concerning uniqueness

197

4. A globally unified mechanism to solve domain name conflicts

198

5. Protection of famous and well-known trademarks

198

5.4.4 Copyright Issues in E-commerce

198

1. Conflicts between services in e-commerce and traditional copyright

199

2. Online bookstores and copyright

199

3. Copyright protection of databases

199

4. Current status of database protection in the US

200

5.5 Legal Problems of E-commerce Security

200

5.5.1 Security Problems in E-commerce

200

1. Security elements in e-commerce

200

2. General situation of e-commerce security legislation

201

3. Current status of e-commerce security legislation in China

201

5.5.2 Legal Systems Concerning the E-commerce Security

201

5.5.3 Legal Responsibilities for the Violation of E-commerce Security Laws

203

1. Administrative penalty

203

2. Administrative responsibilities for the violation of e-commerce security systems

203

5.6 Consumer Rights Protection in E-commerce

203

5.6.1 Impacts of E-commerce on Consumers

203

1. The change of roles of consumers promoted by network

204

2. New legal problems of consumer protection initiated by e-commerce

204

3. Problems about e-commerce websites

204

4. Responsibility cognizance

204

5. Responsibility investigation

205

6. Jurisdiction problem

205

5.6.2 E-commerce and Consumer Privacy Protection

205

1. Main contents of consumer privacy protection

206

2. Legal strategies to protect consumer privacy by all countries and international organizations

206

3. Problems to be discussed: the balance between privacy protection and the benefits of e-commerce operators

207

4. Strategies to protect online consumers rights by all countries and international organizations

207

5.7 Legal Liability in E-commerce

207

5.7.1 Civil Liability in E-commerce

207

1. Concept of civil liability in e-commerce

207

2. Contract liability in e-commerce

209

3. Tort liability principle in e-commerce

209

4. Torts of violation of e-commerce laws

209

5. Several major torts in violation of personal privacy

210

6. Tort liability forms in e-commerce

211

5.7.2 Administrative Liability in E-commerce

211

1. Administrative liability in e-commerce

211

2. Administrative liability about intellectual property involved in e-commerce

212

3. Administrative liability about copyright involved in e-commerce

212

4. Administrative liability about customer rights protection in e-commerce

212

5.7.3 Criminal Responsibility in E-commerce

213

1. Phenomena and features of crimes in e-commerce

213

2. Crimes and criminal responsibilities in e-commerce

213

3. Problems and challenges in the application of criminal laws

214

4. Blind area of current criminal law

214

5.8 Brief Introduction to the "Electronic Signature Law of the PRC"

215

5.9 Summary

217

References

217

6 E-commerce and Tax

219

6.1 An Outline of Tax in E-commerce

220

1. The categorization of traditional tax revenue

220

2. The concept of tax jurisdiction

220

6.2 Features of E-commerce Tax

222

6.3 Problems in E-commerce Tax

223

1. Problems concerning international tax distribution and domestic tax revenue

223

2. Restatement about the taxation

224

3. Taxation Jurisdiction

226

4. Common matters in domestic e-commerce

227

6.4 E-commerce and Tax Administration

230

6.5 Strategies in E-commerce Taxation

232

1. The scholars’ perspective: open new taxes. New taxes proposed include bit tax and Tobin tax

232

2. The US perspective

232

3. Solution to e-commerce taxation by OECD

234

4. Canada

234

5. Method of EU to solve the problem of e-commerce taxation

237

6. Strategies of ECTSG

237

7. Strategies of developing countries

237

8. The strategy of e-commerce taxation in our country

237

6.6 Summary

239

References

239

7 Network Enterprise Management

240

7.1 Overview of Network Enterprises

241

7.1.1 Background and Basic Characteristics of Network Enterprises

241

7.1.2 Knowledge Management

242

7.1.3 Virtual Enterprise

249

7.2 Supply Chain Management of Network Enterprises

252

7.2.1 Overview of Supply Chain Management

252

7.2.2 Construction of Supply Chain Management

253

7.2.3 Cooperation Management of Supply Chain

255

7.3 Logistics Management of Network Enterprise

257

7.3.1 Logistics Management Overview

257

7.3.2 Environmental Logistics

262

7.3.3 The Third Party Logistics

267

7.4 Human Resources Management of Network Enterprise

272

7.4.1 Overview of Human Resources Management

272

7.4.2 Realization of Human Resources Management

275

1. Integrality and integration

276

2. Easy to use

276

3. Network function and self-service

276

4. Open

277

5. Flexibility

277

6. Intelligentization

277

7. Powerful report forms/graph output function

277

8. System security

277

7.5 Summary

279

References

279

Part 4 Practice

281

8 E-commerce Architecture and System Design

282

8.1 E-commerce Architecture

283

8.1.1 Infrastructure

283

8.1.2 Data Flow of Infrastructure

284

8.1.3 Process Control of Infrastructure

286

1. A sends a business request to C

286

2. C accepts A’s Request, and prepares to start agent to search the appropriate entity B

287

3. C sends a response to A, and starts an agent to search the appropriate entity B at the same time

288

4. Start payment process

289

8.1.4 Optimizing Method of Infrastructure

290

1. Reachability

290

2. Boundedness

291

3. Conservativeness

291

4. Activity

292

5. Resumption

292

6. Common optimizing models

292

8.1.5 Event Process Control of Infrastructure

293

1. Sequential relation

293

2. Conflict relation

293

3. Collision relation

293

4. Concurrent relation

294

8.2 E-commerce Security System

295

1. OSI security architecture

295

2. E-commerce security factor

296

8.3 E-commerce Payment System

299

8.3.1 E-commerce and Online Payment

299

8.3.2 Data Flow and Process Control of Payment System

300

1. Cardholder register and apply

300

2. Purchase request

301

3. Handling of the request information by the seller

303

4. Receiving the purchase response by the cardholder

303

5. Getting Payment

304

8.4 Architecture and Design Method of E-commerce Application System Software

305

8.4.1 Architecture of E-commerce Application System Software

305

1. Basic system model

306

2. Software architecture

307

8.4.2 Design Method of Application E-commerce System

309

1. Client

310

2. Web application server

311

3. Infrastructure service

312

8.5 Summary

312

References

312

9 Portal Site Design of Virtual Enterprise

315

9.1 E-commerce and Portal Site

316

9.1.1 Concept of Portal Site

316

9.1.2 Meaning of Portal Site

316

1. Upgrade enterprises’ image

316

2. Make enterprises acquire network-communicating capability

316

3. Can introduce corporation and its products in detail

316

4. Can tie up with customers

316

5. Can build business relation with potential customers

317

6. Can reduce communication cost

317

7. Can receive customers feedback in time

317

8. Can make corporation serve customers better

317

9.2 Online Virtual Shop

317

9.2.1 Virtual Shop Mode

317

9.2.2 Virtual Shop Design

318

9.2.3 Implementation of Virtual Shop

319

9.3 Design Method of Product Catalog

320

9.3.1 Product Information Storage

320

1. Organization of information

320

2. Information grouping

320

3. Structure of product information database

321

4. Relation among tables

321

9.3.2 Product Information Inquiry Function

322

1. Design principle

322

2. Inquiry Example

322

9.4 Design of Online Shopping Cart

323

9.4.1 Online Shopping Cart and Implementation Technology

323

1. Definitions and analysis of online shopping cart

323

2. Implementation technology of online shopping cart

323

9.4.2 Database of Online Shopping Cart and Actual Implementation Policy

324

1. Design ideology of online shopping cart based on database technology

324

2. Implementation of online shopping cart based on database technology

325

9.5 Processing of Electronic Order

327

9.5.1 Processing Flow of Order

327

1. Order data input

328

2. Checking out and confirmation of order data

328

3. Storage distribution

328

4. Order form data processing output

330

9.5.2 Gathering the Payment Online

330

1. Payment gateway technology

330

2. Validation of credit card

332

9.6 Search and Inquiry of Website

332

9.6.1 Application of Advanced SQL

332

1. Grouping result function

332

2. Embedded inquiry

334

3. Defined variables in SQL*Plus

334

9.6.2 Optimizing Database Inquiry

335

1. Classification of optimization

335

2. Optimization skill

336

9.7 Customer Service in E-commerce Time

337

9.7.1 Component Technology and Build Method of Call Center

337

1. Key technology of call center

337

2. Construction solution to call center

338

9.7.2 Application of Electronic Mail List

339

1. Effect of electronic mail list on enterprise

339

2. Website

340

3. Stock information

340

4. News release

340

5. Organizations and club

340

6. Mail order service

340

9.8 Release Technology of Web Database

341

9.9 Summary

344

References

344

10 Computer System Integration and E-commerce

347

10.1 Overview of System Integration

348

10.1.1 Production and Development of System Integration

348

10.1.2 Principle of System Integration

350

10.2 Hardware System Integration of E-commerce

351

10.2.1 Integration of Server

351

1. Method of server integration

351

2. Integration of server

353

3. Integration of high performance server

355

10.2.2 Integration of Communication Network

357

1. Integration of LAN

357

2. WAN integration

359

3. Integration of high speed network

360

10.3 Integration of E-commerce Application System Software

363

10.3.1 Integration Mode of E-commerce Application System Software

363

1. Synchronous replication

363

2. Asynchronous replication

364

3. Brokering Application

366

4. Application-to-application B2B

367

10.3.2 Integration of Protocols

371

1. Security protocol of Internet

371

2. Main secure protocol of Internet—SSL security protocol

372

3. The second main security protocol of Internet—SET security protocol

373

4. Secure Hyper Text Transmission Protocol (SHTTP)

373

5. Secure Transaction Technology (STT)

374

6. UN/EDIFACT standard

374

10.3.3 Application System Software Environment Integration

375

1. Integration based on C/S

375

2. Integration based on B/S

376

3. Integration based on distributed three-layer model

379

10.4 Summary

381

References

381

Part 5 E-commerce Application

384

11 E-commerce and International Trade

385

11.1 E-commerce and International Trade

386

11.1.1 The International Trade Calls for the Emergence of E-commerce

386

11.1.2 E-commerce Promotes the Development of the International Trade

390

11.1.3 E-commerce Brings about Changes to the International Trade

392

11.2 Applying E-commerce to International Trade

393

11.2.1 Using E-commerce Technology to Obtain Commercial Information

394

11.2.2 Using E-commerce in the Business Negotiation

395

1. Applications in preparing goods

395

2. Applications in inspection

395

3. Applications in the delivery

396

4. Applications in the covering insurance and customs declaration

396

5. Applications in obtaining export licenses

396

6. Applications in export rebates

396

7. Applications in export paperwork

396

11.2.3 Application in the Technology and Service Trade

397

1. Applications in the international technology trade

397

2. Application in the international service trade

397

3. Applications in international financial trade

398

4. Applications in international tourism

399

11.3 E-commerce and International Trade Network Marketing

399

11.3.1 The Foundation of Internet Marketing

400

11.3.2 Network Marketing Tool

401

1. E-mail

401

2. Search engine

402

3. Log File

403

4. Mail List

404

11.3.3 Network Marketing Technology

406

1. The stage of understanding Internet

406

2. Network marketing stage

407

11.4 Designing an International Trade E-commerce System

409

11.4.1 The International Trade Business Analysis

409

11.4.2 Frame of international Trade E-commerce System

412

11.4.3 International Trade E-commerce System Design

414

11.4.4 EDI-based International Trade E-commerce System

415

11.5 Summary

417

References

418

12 Network Application Psychology

419

12.1 Introduction to Network Application Psychology

420

1. Comment of philosophy on psychology

420

2. Localization of application psychology

421

12.1.1 Appearance of Network Application Psychology

423

12.1.2 Research Content of Network Application psychology

424

1. Network society and psychology

424

2. Network and psychology

425

3. Construction of network application psychology

426

12.1.3 Significance of Network Application psychology

426

1. Attention should be paid to the importance of network application psychology

426

2. Significance of network application psychology research

427

12.2 Network Interaction Psychology

430

12.2.1 Network Interaction

430

1. Content of network interaction

430

2. Form of network interaction

430

3. Characteristics of network interaction

432

4. Form of network interaction in realistic society

433

12.2.2 The Appearance and Analysis of Network Interaction Psychology

437

1. The need of acquiring information, help and study

437

2. The need of Emotional Interaction and mental communication

440

12.2.3 The Effect of Network Interaction Psychology

442

1. The network interaction speeds up the development of the network

442

2. Fun with the network interaction

443

3. Network interaction—coexistence of happiness and unhappiness

444

4. New campus fashion: online moral education

445

12.3 Network Application Psychology

447

12.3.1 Psychology Characteristic of Network Application

447

1. Psychology problem in network

447

12.3.2 Analysis on Psychology Characteristic of Network Application

450

1. Concepts of Internet addiction

451

2. Measurement tools of Internet addiction

452

3. The advantages and disadvantages of investigative methods of Internet addiction

453

4. Academic model of Internet addiction

454

12.4 Network Management Psychology

456

12.4.1 General Psychology of Network Management

456

1. General psychology of online game management

456

2. Trend of human-computer interaction

456

3. The psychological momentum of the human-human interaction pattern

457

4. The demand psychology of network information service user

459

5. The defense psychology of the network information services users

461

12.4.2 Behavior Psychology of Network Management

461

1. Online discussion

461

2. Synchronous space psychology

463

12.5 Summary

463

References

464

13 E-commerce Case Analysis

468

13.1 Methods of E-commerce Analysis

469

13.1.1 Methods of the Evaluation and Analysis of E-commerce Websites

469

13.1.2 Method of E-commerce Case analysis

477

1. PEST analysis (general environment analysis)

477

2. Competition factor analysis

477

3. BCG Matrix and Value Chain Analysis

478

4. SWOT Analysis

478

5. Three ways to analyze competitiveness

479

6. Model analysis of five forces

480

13.2 Case Study

481

13.2.1 Case Study of China's Agricultural Products E-commerce

481

13.2.2 Case Analysis of E-commerce Supply Chain Management

485

Present situation of supply chain management in Shanghai bell corporation

487

13.2.3 Case Analysis of E-commerce in Commodities Circulation Areas

491

1. Individual (consumers)

491

2. Enterprise (Group)

492

3. Case of online shopping

501

13.2.4 Case Study of E-commerce in the Financial Industry

503

13.2.5 Case Analysis of E-commerce in Petrochemical Industry

519

13.3 Summary

525

References

525