(Each Chapter concludes with a "Summary," "Key Words," "Review Questions," "Exercises," "Projects," and "References."
I. INTRODUCTION. 1. What Is Electronic Commerce?
The Dot-com Debacle.
The Bubble Bursts.
Opinions: What Were They Thinking?
Why Study E-Commerce?
The Reality of E-Commerce.
Technology: The Catalyst.
Integrating Islands of Automation.
The Internet and the World Wide Web.
The Value Chain.
Physical and Logical Data.
Opinion: Bits vs. Atoms.
The Supply Chain.
A Bigger Picture.
Technology as a Source of Competitive Advantage.
Business: First Movers and First Followers.
Numbers: The E-Commerce Pie.
A Plan of Attack.
The Business of E-Commerce.
The Future of E-Commerce.
Business: E-Commerce at Dell.
II. THE E-COMMERCE INFRASTRUCTURE. 2. The Infrastructure.
The Underlying Technology.
Plain Old Telephone Service.
Business: Communication Pricing.
The Last Mile Problem.
Opinion: The Demand for Broadband.
Data Communication Protocols.
Local Area Networks (LANs).
Wide Area Networks (WANs).
The Internet's Infrastructure.
Internet Service Providers.
Numbers: The Growth of the Internet.
Regional Internet Service Providers.
TCP/IP, the Internet's Protocols.
The TCP/IP (Internet) Model.
The Application Layer.
The Transport Layer.
The Internet Layer.
The Network Access Layer.
Technology: Domain Name Registration.
The IP Address.
The Domain Name System.
The Media Access Control Address.
Business: Content, Connectivity, and Delivery.
The E-Commerce Infrastructure.3. The World Wide Web.
Business and the Internet.
How the Web Works.
Technology: Search Engines.
Browsers and Web Servers.
The Uniform Resource Locator (URL).
Downloading a Web Page.
Numbers: The Growth of the World Wide Web.
Hypertext Markup Language (HTML).
Page Load Time.
Technology: Page Load Time and Embedded Files.
Adding Interactivity With Scripts and Applets.
Web Information Systems.
Business: Why the Web?
The Server Side.
Personalized Web Pages.
A More Complete View of the E-Commerce Infrastructure.
Opinions: Some Downsides.
III. THE BUSINESS OF E-COMMERCE. 4. The Business Environment.
Some Underlying Business Principles.
Numbers: Evaluating a Company's Financial Health.
The Bottom Line.
Creating a Startup Business Plan.
Business: Some B2C Success Stories.
The E-Commerce Business Environment.
Value Chain and Supply Chain Integration.
Breakthrough Products and Services.
Bits and Atoms.
New Patterns of Competition.
Increased Customer Power.
The Competitive Advantage Model.
The Accelerating Pace of Change.
Technology: The Turnpike Effect.
Evolving E-Commerce Business Strategies.
Reducing Cycle Time.
Business: E-Commerce at Dell.5. Consumer Focused (B2C) E-Commerce.
The Dot-Com Revolution.
Cost of Entry.
Opinion: Wait and See.
Sources of Funding.
The Customer's Investment.
Numbers: E-shopper Demographics.
The Race to Be First.
Back to Business Basics.
Brand Name Recognition as a Competitive Advantage.
Business: Discount Airlines.
Finding Potential Customers.
Numbers: Popular Search Terms.
Creating Repeat Customers.
Achieving a Sustainable Competitive Advantage.
Consumer Focused (B2C) Revenue Sources.
Selling Digital Products.
Selling Physical Products.
Business: Online Auctions.
Opinion: Measure the Right Things.
Usage Charges and Subscription Fees.
Not-for-Profit Consumer Links.
Web Site Service Providers.
Other Forms of E-Commerce.6. Intra-Business E-Commerce.
The Evolutionary Nature of Intra-Business E-Commerce.
The Value Chain.
Efficiency and Effectiveness.
Islands of Automation.
Technology: Innovation and Need.
Integrating the Value Chain.
Hardware, Software, and Data Incompatibilities.
New Approaches to Developing Information Systems.
Integrated Client/Server Applications.
Client/Server Application Logic.
Partitioning the Workload.
Fat and Thin Client Applications.
Opinion: Fat and Thin Clients.
Three-Tier and N-Tier Applications.
Enterprise Application Integration.
The Virtual Value Chain.
Web Information System Services.
Corporate Intranets and Value Chain Integration.
First Generation Intranets.
Opinion: Being "Always On".
Second Generation Intranets.
Business: Management by Exception.
Security and Recovery Services.
Integrating a Geographically Dispersed Value Chain.
Business: mySocrates.7. Business-to-Business E-Commerce.
The Supply Chain.
Business: Inter-Corporate Collaboration.
The Evolutionary Nature of Business-to-Business E-Commerce.
Numbers: The Growth of B2B E-Commerce.
Private Leased Networks.
Value Added Networks.
Virtual Private Networks.
Selecting a Connectivity Option.
Business: Continents of Automation.
Early Systems for Supply Chain Integration.
Electronic Data Interchange (EDI).
Web Based Inter-organizational Systems.
Business: Records Retention.
eXtensible Markup Language (XML).
Technology: J2EE and .NET.
B2B E-commerce Software and Services.
Electronic Invoice Presentment and Payment (EIPP).
Customer Relationship Management.
Supply Chain Management.
Enterprise Resource Planning (ERP).
Business Cisco's $2.2 Billion Inventory Write-off.
IV. GROWING PAINS. 8. Cybercrime and Cyberwarfare.
The Internet Worm.
Hackers, Crackers, Phreakers, and Script Kiddies.
Business: Insider Sabotage.
Opinion: Good Passwords.
Technology: Carnivore/DCS 1000 and TEMPEST.
Time Bombs, Logic Bombs, Rabbits, and Trojan Horses.
Viruses and Worms.
Opinion: Software Security.
Denial of Service Attacks.
Business: The Microsoft Attack.
Technology: EMP Weapons.9. Security.
What Is Security?
Balancing Conflicting Objectives.
Opinion: Airport Security.
Countering Security Attacks.
Opinion: The National Transportation System Smart Card.
Caesar-Shift Substitution Ciphers.
Symmetric Secret Key Cryptography.
Asymmetric Public Key Encryption.
Technology: Public-Key Encryption.
Numbers: Cracking DES.
Asynchronous Encryption Vulnerabilities.
Business: Lost Digital Certificates.
The Secure Sockets Layer (SSL).
Business: Visa's Security Standards.10. Privacy and Other Social Issues. Note: subject to change
Gators and Gator Food.
What Is Privacy?
Privacy and the Law.
The Seal of Approval.
Collecting Personal Information.
Business: Harrah's Total Rewards Program.
Some Legal Sources.
Opinion: National ID Cards.
Finding Missing Pieces.
Capturing Clickstream Data.
Tracking with Cookies.
Tracking with Web Bugs.
Surveillance and Monitoring.
Technology: Magic Lantern.
Really Annoying Ads.
Opinion: Ad Blockers.
Opinion: High-Profile Identity Theft.
Credit Card Fraud.
Scams and Con Artists.
Morally Objectionable Web Sites.
Countering the Bad Guys.
V. THE FUTURE OF E-COMMERCE. 11. Where Do We Go From Here?
Predicting the Future.
Tiered Internet Services.
E-Commerce and Your
B. The TCP/IP Protocols.
C. Creating Web Pages.
D. Cryptography Tools.Glossary. Index.