• No results found

E-Commerce and E-Business

N/A
N/A
Protected

Academic year: 2021

Share "E-Commerce and E-Business"

Copied!
25
0
0

Loading.... (view fulltext now)

Full text

(1)

E-Commerce and

E-Business

Miguel Rebollo

Introduction to Computer Science 2010-2011

(2)

Aims

Describing the phases a company goes through using Internet for business

Describing the forms of e-commerce

Describing the purpose and uses of intranets and extranets

Describing the use od web sites to support commercial transactions

(3)

Contents

1. E-Commerce in perspective

2. Intranets: internal business processes 3. Extranets: business alliances

4. B2C: customer-centered web design

5. Technical requirements for e-commerce 6. Ethical issues of e-commerce

(4)

Created in 1994

Opened in July 1995

as a virtual book-stores

20 mill. customers in 160 countries

Survivor of .dot crises

Powerful recommendation system Jeff Bezo s. Ama zo n fo und er

(5)

E-commerce in

Perspective

Sharing business information, maintaining business relationships and conducting business

transactions through the use od telecomm. networks

(6)

E-comm Transforms

Business

.com companies (virtual)

Essential, or at least important for the rest

Increases speed and efficiency of business processes

Variants: e-commerce (electronic) i-commerce (internet)

(7)

E-Comm Models

B C B C business-to-business (B2B) business-to-consumer(B2C) consumer-to-business (C2B) consumer-to-consumer(C2C)

(8)

Intranets

Basis for B2E: internet

supporting internal activties

Improve comm. inside the company

Advantages

cross-platform

open standards

(9)

Characteristics of a B2E

Intranet

physical tech: LAN with Ethernet

middleware: software which handles physical comm. (TCP/IP based)

firewall sw for security

standard web applications:

(10)

Characteristics of a B2E

Intranet

physical tech: LAN with Ethernet

middleware: software which handles physical comm. (TCP/IP based)

firewall sw for security

standard web applications:

(11)

How To Use B2E

Intranets

Information access for employees:

centralised databases with a common interface

Collaboration and teamwork:

distribute information, remote working groups

Internal business transactions:

(12)

Extranets

Business Alliances

Link intranets of different companies (e-marketplaces)

Activities between trusted business partners

Functionalities

place orders

check stock level

confirm inoice status

(13)

Extranets

with Public Networks

use public, open comm. lines without additional security mechanisms

low cost, but low security (and high risk)

(14)

Extranets

with Public Networks

use public, open comm. lines without additional security mechanisms

low cost, but low security (and high risk)

(15)

Extranets with VPN

use public, open comm. lines

an special protocol creates a virtual tunnel across the intranets

(16)

Extranets with VPN

use public, open comm. lines

an special protocol creates a virtual tunnel across the intranets

(17)

Extranets

with Private Networks

physically attached lines (leased)

high cost

high security levels

extent of access for external users (only business partners)

(18)

Extranets

with Private Networks

physically attached lines (leased)

high cost

high security levels

extent of access for external users (only business partners)

(19)

B2C

Customer centered web design

Often interactive features included

CRM: customer relationship management

critical without personal contact

database with relevant information:

(20)

Features of Well

Designed Sites

Speed of transactions

Large, up-to-date selection (the ‘Long Tail’)

Ease of use

Secure transations

(21)

Technical Requirements:

Web Server

Hw&Sw to store pages and handle trafic

Only large companies have the know-how and the

capability to run their own server

(22)

Technical Requirements:

Hosting Service

Provide space in their own servers and tools to set up business web pages

Handle almost all transactions steps (including payments)

(23)

Technical Requirements:

Software

Provides commercial services

Database (catalogue) + front-end

Capabilities: security, search engine, data analysis

(24)
(25)

Company Policies

A Code of Ethics

Privacy policy of the organisation

Permission to transmit people data

How company inform customers about the use of personal data

Ownership about network posting and communications

References

Related documents

The universal service obligation is one such instrument, and acts as a safety net mechanism to 

Consistently with being under a different selective regime, HLA- DPA1 and -DPB1 show a pattern of population differentiation which is different from the other classical HLA loci: F

In our model, connecting passengers are a®ected through the higher costs of schedule delay and travel time, not through an increase in price (marginal cost).. Therefore,

Indicator calculation method Selected spatial units All 15 segments with critical traffic conditions Bridge entries & exits Middle of highway corridors

Art 25(3) sets three requirements which will make the carriers lost defense which including in the exemption clause: he first is that the deck carriage is not in accordance to

Determined by our clients buy property in rhodes town, close to our greek property determined by clicking the feeling of rhodes is proving to find and the village.. Opportunity

Our proposed framework has been successfully applied and tested in the healthcare domain between an XML representation of SCP-ECG, an open format ISO standard communications

Users can send and receive faxes and SMS messages (texting) directly from Microsoft Outlook, Outlook Web access or other email client, making GFI FAXmaker easy to use and learn.