Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
14Activity

Table Of Contents

1.1.3 Definition Of E-Commerce:
1.1.4 Classifications of E-Commerce Applications
1.1.5 Types of e-commerce
1.1.6Scope of E-Commerce
1.1.7 E- Commerce in Action
1.1.8.1 Electronic Commerce Application Services
1.1.8.2 Information Brokerage and Management
1.1.8.3 Interface and Support Services
1.1.8.4 Secure Messaging and Structured Document Interchange Services
1.1.8.5 Middleware Services
1.1.9 Advantages of E-Commerce
1.1.10 Disadvantages of E-Commerce
1.2.1 Environmental factors that create Business Pressures:
1.2.2 Critical response activities by Organizations:
1.2.3 E-Commerce Communities
1.2.4 Is e-Commerce the Same as e-Business?
1.3.1.1. Benefits to Organizations
1.3.1.2 Benefits to Consumers
1.3.1.3 Benefits to Society
1.3.2.1 Technical Limitations of EC
1.3.2.2 Non-technical Limitations
1.4.1.1. What is Data Mining?
1.4.2 The Scope of Data Mining
1.4.3 Techniques used in Data Mining
1.4.4 How Data Mining Works
1.4.5 Profitable Applications
1.4.6 Trends that Effect Data Mining
1.5.1 What Is Data Warehousing?
1.5.3 ADVANTAGES OF DATA WAREHOUSE
1.5.4 Types of Data warehouses:
1.5.5 Aspects of Data Warehouse Architecture
1.6.1 The Existing Network
1.6.2 Network Infrastructure Components
1.6.3 Planning Your Network Infrastructure Layout
1.7.1 Introduction to TCP/IP:
1.7.2 Internet Protocols:
1.7.3 What is TCP/IP?
1.7.4 TCP/IP Services
1.7.5 Features Of Tcp/Ip
1.7.6 TCP/IP Terminology
1.7.7 TCP/IP – Connectionless technology:
1.8.1.1 Universal Resource Locator (URL)
1.8.1.2 Hypertext Transfer Protocol (HTTP)
1.8.2 Mark Uplanguages and The Web
1.8.3 Hypertext Markup Language (Html)
1.9.1 Introduction:
1.9.2 What is OLAP?
1.9.3 OLAP Server
1.9.4 Uses Of Olap
1.9.5 OLAP Benefits:
1.10.1 Introduction to Cryptography
1.10.2 Cryptographic services
1.10.3 Cryptographic primitives
1.10.4 Authentication primitives
1.10.5 Cryptographic protocols
2.1.1 Electronic Commerce and Retailing
2.1.2 E-Retailing
2.1.3 Difference between Traditional retailing and E-retailing
2.1.4 Benefits of E-Retailing
2.1.5 Models of E-Retailing
2.1.6 Features of E-Retailing
2.1.7 Changing Retail Industry Dynamics
2.2.1 What is Internet Marketing?
2.2.2 Scope of Internet Marketing
2.2.3 E-Business Issues & Internet Marketing
2.2.4 The Seven Stages of Internet Marketing
2.2.5 Customer Relationship Management(CRM)
2.2.6 Benefit from an e-Commerce Sales Strategy
2.2.7 Critical success factors for internet marketing executives
2.3.1.1. Web-Enabled Services
2.3.1.2 Matchmaking Services
2.3.2 Electronic Commerce and Banking
2.3.3. Banking Via Online Services
2.4.1.1 Reasons expected for the increase in Advertising spending
2.4.1.2 Better Measurement of Advertising Effectiveness
2.4.1.3 Digital Copyrights and Electronic Publishing
2.4.2.1 Online Publishing Strategies
2.4.2.2 Online Publishing Approaches
2.5.1 B2B - Business to Business E-Commerce
2.5.2 Automated Ecommerce Transactions
2.5.3 Characteristics of B2B EC
2.5.4 What is B2B Marketing Communications?
2.5.5 E-Marketplace
2.5.6 EDI Standards
2.5.7 Business - TO - Business Actions
2.5.8 Business – TO – Business Services
3.1.1 What is the Internet?
3.1.2 Internet Structure
3.1.3 The Internet and its Characteristics
3.1.4 The Internet Tools and their Characteristics
3.1.5 Web based Client/Server
3.1.6 Elements of Internet Architecture
3.1.7 Common uses of the Internet
3.1.8 Marketing
3.1.9 Online Internet Business Models
3.2.1What is an Intranet?
3.2.2 TCP/IP protocol suite
3.2.3 The benefits of Intranets
3.2.4 Basic intranet structure
3.2.5 Internet Architecture
3.2.6 Internet/Intranet Applications
3.3.1 What is an Extranet?
3.3.2 Features of Extranet
3.3.3 Industry use
3.3.4 Extranet applications
3.3.5 Disadvantages
3.3.6 E-Commerce Business Models
4.1.1 Electronic Payment Systems
4.1.2 Designing Electronic Payment Systems
4.1.3 Secure Electronic Transaction (SET) Protocol
4.2.1 Security Issues
4.2.2.1 Encryption
4.2.2.2 Firewall
4.2.3 Creating a Secure System
4.2.4 Storing Secure Information
4.3.1 What is EFT?
4.3.2 Where do we find EFT?
4.3.3 Advantages of EFT:
4.3.4 Electronic Funds Transfers Initiated By Third Parties
4.3.5 Online Catalogs
4.3.6 Intelligent Agents
4.4.1 What is credit card?
4.4.2.1 Security Overview
4.4.2.2 Credit card numbering
4.4.3 Credit cards in ATMs
4.4.4 Credit Card payment-online networks
4.4.5 Encryption and Credit Cards
4.4.6 Advantages and Disadvantage of credit cards:
4.4.7 Infrastructure for On-Line Credit Card Processing
4.4.8 Risks from Mistake and Disputes: Consumer Protection
4.5.1 What is a debit card?
4.5.2 Types of debit card
4.5.3 Online and offline debit transactions
4.5.4 Advantages and Disadvantages
4.6.1 E-Checks
4.6.2 Benefits of Electronic Checks
4.6.3 How do Electronic Check works?
4.6.4 Why do we use e-checks?
4.6.5 Comparison with other payment instruments
4.7.1 Smart Cards
4.7.2.1 Relationship-Based Smart Cards
4.7.2.2. Electronic Purses and Debit Cards
4.7.3 Electronic or Digital Cash
4.7.4 Using the Digital Currency
4.7.5 Drawback of E-cash
4.7.6 Business Issues and Electronic Cash
4.7.7 Operational Risk and Electronic Cash
4.7.8 Legal Issues and Electronic Cash
4.7.9 Electronic Tokens
4.7.10 Other Emerging Financial Instruments
5.1.1 Legal issues
5.1.2 Copyright and the Internet
5.1.3 Issues Related to Jurisdicary
5.1.4 Service Provider liability
5.1.5 Formation of an Enforceable Online Contract
5.2.1 Ethics, Social and Political issues
5.2.2 Basic Ethical Concepts: Responsibility Accountability, and Liability
5.2.3 Privacy and Information Rights
5.3.1 Intellectual Property Rights
5.3.2.1 Copyright: The Problem of Perfect Copies and Encryption
5.3.2.2 Patents: Business Methods and Processes
5.3.2.3 Trademarks: Online Infringement and Dilution
5.4.1 Cyber law
5.4.2 Contracting and Contract Enforcement in EC
5.4.3 Warranties on the web
5.5.1 Introduction on Taxation
5.5.2 Current Law - A Moratorium on Internet Taxes
5.5.3 Taxation of Ecommerce - The Significant Issues
5.5.4 The Future for Ecommerce Taxation
5.5.5 Encryption policy:
5.5.6 Customer’s Trust Online
5.5.7 Steps to Plan Successful E-Commerce
6. Define privacy
7. Define Intellectual property
8. Describe the three main types of intellectual property protection
9. What is contracting? How is it enforced in EC
10.Discuss taxation in EC
11.Describe the significant issues of taxation in EC
12.Define encryption policy
13.Define DES
0 of .
Results for:
No results containing your search query
P. 1
e.commerce

e.commerce

Ratings: (0)|Views: 801 |Likes:
Published by san143

More info:

Published by: san143 on Jan 06, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/06/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 43 are not shown in this preview.
You're Reading a Free Preview
Pages 46 to 308 are not shown in this preview.

Activity (14)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Hurricane210 liked this
judybee liked this
akbisoi1 liked this
akbisoi1 liked this
Siva Ajay liked this
ratish kakkad liked this
sandip liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->