Sharif Digital Repository / Sharif University of Technology
    • [Zoom In]
    • [Zoom Out]
  • Page 
     of  0
  • [Previous Page]
  • [Next Page]
  • [Fullscreen view]
  • [Close]
 
Electronic commerce 2018 a managerial and social networks perspective
Turban, Efraim

Cataloging brief

Electronic commerce 2018 a managerial and social networks perspective
Author :   Turban, Efraim
Publisher :   Springer International Publishing AG
Pub. Year  :   2018
Subjects :   Electronic commerce Electronic commerce Management Management information systems
Call Number :   ‭HF 5548 .32 .T86 2018

Find in content

sort by

Bookmark

  • Preface (5)
    • What’s New in This Edition? (5)
      • New Chapters (5)
      • New Topics (6)
      • New Cases (6)
      • New Coauthor (6)
    • The Book’s Learning Objectives (Learning Outcomes) (6)
    • Features of This Book (7)
      • Most Comprehensive EC Textbook (7)
      • Managerial Orientation (7)
      • Experienced Coauthors and Contributors (7)
      • Real-World Orientation (7)
      • Solid Theoretical Background and Research Suggestions (8)
      • Most Up-to-Date and Current Topics (8)
      • Social Media and Commerce (8)
      • Integrated Systems (8)
      • Global Perspective (8)
      • Small- and Middle-Sized Companies (8)
      • The Public Sector (8)
      • Interdisciplinary Approach (9)
      • EC Failures and Lessons Learned (9)
      • Online Tutorials (9)
    • User-Friendliness (9)
    • Links, Links, Links, and References (9)
    • Other Outstanding Features (9)
    • Organization of the Book (10)
      • Part 1: Introduction to e-Commerce and e-Marketplaces (10)
      • Part 2: E-Commerce Applications (10)
      • Part 3: Emerging EC Platforms (10)
      • Part 4: EC Support Services (10)
      • Part 5: E-Commerce Strategy and Implementation (11)
    • Learning Aids (11)
    • Supplementary Materials (12)
      • Companion Website: affordable-ecommerce-textbook.com (12)
    • Content Contributors (12)
    • Acknowledgments (12)
    • Reviews (12)
  • Contents (13)
  • Part I: Introduction to E-Commerce and E-Marketplaces (29)
    • 1: Overview of Electronic Commerce (30)
      • Opening Case How Starbucks Is Changing to a Digital and Social Enterprise (31)
        • The Problem (31)
        • The Solution: Going Digital and Social (31)
          • The Electronic Commerce Initiatives (31)
            • Online Store (31)
            • The eGift Card Program (31)
            • Loyalty Program (31)
            • Mobile Payments (32)
        • Social Media Projects (32)
          • Exploiting Collective Intelligence (32)
          • Starbucks’ Activities on Facebook (32)
          • Starbucks’ Presence on LinkedIn and Google+ (32)
          • Starbucks’ Activities on Twitter (32)
          • Starbucks’ Activities on YouTube, Flickr, Pinterest, and Instagram (32)
        • Starbucks Digital Network (33)
          • Global Activities (33)
          • Early Adoption of Foursquare: A Failure (33)
        • The Results (33)
      • 1.1 Electronic Commerce: Definitions and Concepts (34)
        • Defining Electronic Commerce (34)
        • Defining e-Business (34)
        • Major EC Concepts (34)
          • Pure Versus Partial EC (34)
          • EC Organizations (35)
          • Cyberspace (35)
        • Electronic Markets and Networks (35)
      • Section 1.1 Review Questions (35)
      • 1.2 The Electronic Commerce Field: Growth, Content, Classification, and a Brief History (35)
        • The Content and Framework of e-Commerce (35)
        • An EC Framework (36)
        • Classification of EC by the Nature of the Transactions and the Relationships Among Participants (36)
          • Business-to-Business (B2B) (37)
          • Business-to-Consumer (B2C) (37)
          • Consumer-to-Business (C2B) (37)
          • Intrabusiness EC (38)
          • Business-to-Employees (B2E) (38)
          • Drop-shipping (38)
          • Consumer-to-Consumer (C2C) (38)
          • Collaborative Commerce (38)
          • e-Government (38)
        • A Brief History of EC (39)
          • The Global Nature of EC (39)
          • The Interdisciplinary Nature of EC (39)
          • The Google Revolution (39)
          • Cyber Monday, Singles’ Day, and Prime Day (39)
          • Social Commerce (39)
          • EC Failures (40)
          • EC Successes (40)
      • Case 1.1: EC Application (40)
        • The Opportunity (40)
        • The Solution (40)
        • The Results (41)
        • Questions (41)
      • Section 1.2 Review Questions (42)
      • 1.3 Drivers and Benefits of e-Commerce (42)
        • The Drivers of e-Commerce (42)
        • The Benefits of e-Commerce (42)
          • Opportunities for Entrepreneurs (42)
          • EC as a Provider of Efficiency, Effectiveness, and Competitive Advantage (43)
      • Section 1.3 Review Questions (43)
      • 1.4 Social Computing and Commerce (44)
        • Social Computing (44)
        • Web 2.0 (44)
        • Social Media (44)
          • The Difference Between Social Media and Web 2.0 (44)
        • Social Networks and Social Networking Services (45)
          • Social Networking Services (45)
          • Social Networking (45)
        • Enterprise Social Networks (45)
        • Social Commerce (45)
        • The Major Tools of Web 2.0 (47)
      • Section 1.4 Review Questions (47)
      • 1.5 The Digital and Social Worlds: Economy, Enterprises, and Society (47)
        • The Digital Economy (47)
          • Sharing Economy (47)
            • Sharing Economy and e-Commerce (48)
          • The Social Impact (48)
            • The Apps Society (48)
        • The Digital Enterprise (48)
        • The Social Business (Enterprise) (49)
          • The Social Business Forum’s Definition (49)
          • IBM’s Approach (50)
          • The Social Enterprise (50)
        • The Digital Revolution and Society (50)
        • Some Impacts of the Digital and Social Worlds (51)
          • Disruptive Impacts of e-Commerce (51)
          • The Social Customer (51)
      • Section 1.5 Review Questions (52)
      • 1.6 Electronic Commerce Business Models (52)
        • The Structure and Properties of Business Models (53)
          • Revenue Models (54)
            • Innovative Revenue Models for Individuals (54)
          • Value Proposition (54)
          • Functions of a Business Model (55)
        • Typical EC Business Models (55)
        • Classification of Business Models in e-Commerce (55)
      • Section 1.6 Review Questions (56)
      • 1.7 The Limitations, Impacts, and the Future of e-Commerce (56)
        • The Limitations and Barriers of EC (56)
          • Ethical Issues (56)
          • Overcoming the Barriers (57)
        • Why Study e-Commerce? (57)
        • The Future of EC (57)
      • Section 1.7 Review Questions (58)
      • 1.8 Overview of This Book (58)
        • Part I: Introduction to e-Commerce and e-Marketplaces (58)
        • Part II: EC Applications (58)
        • Part III: Emerging EC Delivery Platforms (58)
        • Part IV: EC Support Services (59)
        • Part V: EC Strategy and Implementation (59)
        • Online Mini Tutorials (59)
      • Managerial Issues (60)
      • Summary (60)
      • Key Terms (61)
      • Discussion Questions (62)
      • Topics for Class Discussion and Debates (62)
      • Internet Exercises (62)
      • Team Assignment and Projects (63)
      • Closing Case: e-Commerce at the National Football League (NFL) (63)
        • Selling Online (64)
        • Selling in China (64)
        • Information, News, and Social Commerce (64)
        • Videos and Fantasy Games (64)
        • Smartphone Experience (64)
        • Wireless Applications in Stadiums (64)
        • Other Applications (65)
        • Questions (65)
      • References (65)
    • 2: E-Commerce: Mechanisms, Platforms, and Tools (67)
      • Opening Case Pinterest A New Kid on the E-Commerce Block (68)
        • The Opportunity (68)
        • The Solution (68)
          • The Business and Revenue Models (68)
          • Marketing Models (68)
          • Selling Data for Market Research and Analysis (68)
          • Other Suggestions for Doing Business on Pinterest (68)
          • Using Pinterest for Advertising and Marketing (69)
        • Results and Managerial Issues (69)
          • Legal Concerns (69)
          • The Competition (69)
        • Conclusion (69)
      • 2.1 Electronic Commerce Mechanisms: An Overview (70)
        • EC Activities and Support Mechanisms (70)
        • The Online Purchasing Process (70)
      • Section 2.1 Review Questions (70)
      • 2.2 E-Marketplaces (70)
        • Electronic Markets (71)
        • The Components and Participants in E-Marketplaces (72)
        • Disintermediation and Reintermediation (73)
      • Case 2.1: EC Application Blue Nile Inc.: Change and Adaptation in the Online Jewelry Industry (73)
        • Changing the Industry (73)
        • Adapting to the Market (73)
        • Questions (74)
        • Types of E-Marketplaces (74)
          • Private E-Marketplaces (74)
          • Public E-Marketplaces (74)
      • Section 2.2 Review Questions (74)
      • 2.3 Customer Shopping Mechanisms: Webstores, Malls, and Portals (75)
        • Webstores (75)
          • Microsites (75)
        • Electronic Malls (75)
        • Web (Information) Portals (75)
          • Types of Portals (75)
        • The Roles and Value of Intermediaries in E-Marketplaces (77)
          • Brokers (77)
        • Distributors in B2B (77)
      • Section 2.3 Review Questions (77)
      • 2.4 Merchant Solutions: Electronic Catalogs, Search Engines, and Shopping Carts (77)
        • Electronic Catalogs (77)
        • EC Search Activities, Types, and Engines (78)
          • Types of EC Searches (78)
          • Search Engines (78)
          • Voice-Powered Search (78)
          • Video and Mobile Search (79)
          • Mobile Search (79)
          • Visual Shopping Search Engine (79)
          • Social Network Search Engines (79)
        • Shopping Carts (79)
          • Product Configuration (Self-Customization) (79)
          • Questions and Answers Online (79)
      • Section 2.4 Review Questions (80)
      • 2.5 Auctions, Bartering, and Negotiating Online (80)
        • Definition and Characteristics (80)
        • Dynamic Pricing (80)
        • Traditional Auctions Versus E-Auctions (80)
          • Limitations of Traditional Offline Auctions (80)
          • Electronic Auctions (81)
        • Types of Auctions (81)
          • One Buyer, One Seller (81)
          • One Seller, Many Potential Buyers (81)
          • One Buyer, Many Potential Sellers (81)
            • Reverse Auctions (81)
            • The Name-Your-Own-Price Model (82)
          • Many Sellers, Many Buyers (82)
            • Penny Auctions (82)
        • Benefits of E-Auctions (82)
        • Limitations of E-Auctions (83)
          • Minimal Security (83)
          • Possibility of Fraud (83)
          • Limited Participation (83)
        • Online Bartering (83)
        • Online Negotiating (84)
      • Section 2.5 Review Questions (84)
      • 2.6 Virtual Communities and Social Networks (84)
        • Characteristics of Traditional Online Communities and Their Classification (84)
          • Classifications of Virtual Communities (85)
            • Public Versus Private Communities (85)
            • Classification Categories (85)
        • Social Networking Service (Sites) (85)
          • A Definition and Basic Information (85)
          • A Global Phenomenon (85)
          • Representative Capabilities and Services Provided by Social Networking Sites (86)
        • Business-Oriented Public Social Networks (86)
          • Some Capabilities of Business-Oriented Networks (86)
      • Case 2.2: EC Application Craigslist: The Ultimate Online-Classified Community (87)
        • Concerns About Craigslist (87)
        • Private (or Enterprise) Social Networks (88)
        • Business Models and Services Related to Social Networking (88)
        • Mobile Social Commerce (88)
        • Mobile Social Networking (88)
          • Mobile Enterprise Networks (89)
          • Examples of Social Mobile Commerce Applications (89)
        • Recent Innovative Tools and Platforms for Social Networking (89)
          • Mobile Community Activities (90)
      • Section 2.6 Review Questions (90)
      • 2.7 Emerging EC Platforms: Augmented Reality and Crowdsourcing (90)
        • Augmented Reality (90)
          • Applications in E-Commerce (90)
            • Applications in Social Gaming (91)
          • Virtual Reality (VR) (91)
            • Comparing AR and VR (91)
        • Crowdsourcing (91)
          • Definitions and Major Concepts (91)
          • The Process of Crowdsourcing (92)
          • Benefits of Crowdsourcing (93)
      • Section 2.7 Review Questions (93)
      • 2.8 The Future: Web 3.0, Web 4.0, and Web 5.0 (93)
        • Web 3.0: What Does the Future Hold? (94)
          • Web 3.0 and the Semantic Web (94)
          • Concerns (94)
        • The Technological Environment (95)
          • Web 4.0 (95)
          • Web 5.0 (95)
      • Section 2.8 Review Questions (95)
      • Managerial Issues (95)
      • Summary (96)
      • Key Terms (97)
      • Discussion Questions (98)
      • Topics for Class Discussion and Debates (98)
      • Internet Exercises (98)
      • Team Assignments and Projects (99)
      • Closing Case: Driving Customer Engagement with Augmented Reality at Tesco (100)
        • The Problem (100)
        • The Solution (100)
        • The Results (100)
        • Questions (100)
      • References (101)
  • Part II: E-Commerce Applications (103)
    • 3: Retailing in Electronic Commerce: Products and Services (104)
      • Opening Case Amazon.com—E-Commerce Innovator (105)
        • The Problem (105)
        • The Solution: Innovations and Reaching Out to Customers (105)
          • Making Buying Easier (105)
          • Creating New Customers (105)
          • New Products and Services (106)
        • The Results (106)
      • 3.1 Internet Marketing and B2C Electronic Retailing (107)
        • Overview of Electronic Retailing (107)
        • Size and Growth of the B2C Market (107)
          • Developments in B2C E-Commerce (108)
        • Characteristics and Advantages of Successful E-Tailing (108)
          • Advantages of E-Tailing (109)
      • Section 3.1 Review Questions (109)
      • 3.2 E-Tailing Business Models (110)
        • Classification of Models by Distribution Channel (110)
          • Direct Marketing by Mail-Order Companies (111)
          • Direct Sales by Manufacturers and Make to Order (111)
          • Virtual (Pure-Play) E-Tailers (111)
          • Drop-Shipping (111)
          • Click-and-Mortar Retailers and Multichanneling (111)
          • Convergence and Omnichannel (112)
          • Retailing in Online Malls (112)
        • Referring Directories (112)
        • Malls with Shared Services (112)
        • Other B2C Models and Special Retailing (112)
        • B2C Social Shopping (113)
          • Flash Deals (Deals of the Day) (113)
          • Online Group Buying (113)
          • Personalized Event Shopping (113)
          • Private Shopping Clubs (113)
          • Group Gifting Online (113)
          • Location-Based E-Commerce (113)
        • Drop-Shipping (113)
          • The Process of Drop-Shipping (113)
          • The Participants in the Process (114)
          • The Benefits of Drop-Shipping (115)
          • The Disadvantages of Drop-Shipping (115)
          • Some Suggestions for Implementation (115)
      • Section 3.2 Review Questions (116)
      • 3.3 Online Travel and Tourism (Hospitality) Services (116)
        • Characteristics of Online Travel (116)
          • Services Provided (116)
          • Using Mobile Devices (117)
          • Social Travel Networks (117)
      • Case 3.1: EC Application Zillow—Unique Tools For the Real Estate Marketplace (118)
        • Questions (118)
        • Benefits, Limitations, and Competition in Online Travel Services (118)
        • Competition in Online Travel (118)
        • Corporate Travel (119)
      • Section 3.3 Review Questions (119)
      • 3.4 Employment and the Online Job Market (119)
        • The Internet Job Market (119)
          • Online Job Markets on Social Networks (120)
          • Global Online Portals for Job Placement (121)
        • Benefits and Limitations of the Electronic Job Market (121)
      • Section 3.4 Review Questions (121)
      • 3.5 Online Real Estate, Insurance, and Stock Trading (122)
        • Real Estate Online (122)
          • Zillow, Craigslist, and Other Web 2.0 Real Estate Services (122)
        • Insurance Online (122)
        • Online Stock Trading and Investments (123)
      • Section 3.5 Review Questions (124)
      • 3.6 Online Banking and Personal Finance (124)
        • E-Banking (124)
        • Online Banking Capabilities (124)
        • Pure Virtual Banks (125)
          • P2P Lending (125)
      • Case 3.2: EC Application Security for Online Bank Transactions (125)
        • Questions (126)
          • Risks (126)
        • Online Billing and Bill Paying (126)
          • Taxes (127)
          • Mobile Banking (127)
      • Section 3.6 Review Questions (127)
      • 3.7 On-Demand Delivery of Products, Digital Items, Entertainment, and Gaming (127)
        • On-Demand Delivery of Products (127)
          • Speed of Delivery (128)
        • Online Delivery of Digital Products, Entertainment, and Media (128)
          • Online Entertainment (128)
          • iTunes (128)
          • Online Ticketing (129)
        • Internet TV and Internet Radio (129)
          • Internet TV (129)
          • Internet Radio (129)
          • Pandora Radio (129)
        • Social Television (TV) (129)
          • Characteristics of Social TV (130)
          • Adult Entertainment (130)
          • Internet Gaming (130)
        • Legal Aspects (130)
      • Section 3.7 Review Questions (130)
      • 3.8 Online Purchasing Decision Aids (131)
        • Shopping Portals (131)
        • Price and Quality Comparison by Shopbot Software Agents (131)
          • Google Enterprise Search and Enterprise Search Appliance (131)
          • “Spy” Services (131)
        • Ratings, Reviews, and Recommendation Sites (131)
        • Comparison Shopping Websites (132)
        • Social Network Influence (132)
        • Trust Verification Sites (132)
          • Concerns About Reviews, Ratings, and Recommendations (133)
        • Other Shopping Assisting Tools (133)
        • Aggregators (134)
          • Digital Coupons (134)
          • Self-Service (134)
      • Section 3.8 Review Questions (134)
      • 3.9 The New Face of Retail Competition: Retailers Versus E-Tailers (134)
        • The Online Versus Offline Competition: An Overview (134)
          • Global Competition (135)
        • Retailers Versus E-Tailers (135)
        • Convergence and Omnichannel (135)
        • Examples of Click-and-Brick Retailers (136)
          • Other Strategies (136)
        • What Can Traditional Retailers Do? (136)
          • Can Small Businesses Survive? (136)
          • Going Global (137)
          • Conclusion (137)
      • Section 3.9 Review Questions (137)
      • 3.10 Issues in E-Tailing and Lessons Learned (137)
        • Disintermediation and Reintermediation (137)
          • Resistance to Change (137)
        • Channel Conflict (138)
        • Product and Service Customization and Personalization (138)
        • Lessons Learned from Failures and Lack of Success of E-Tailers (139)
      • Section 3.10 Review Questions (139)
      • Managerial Issues (139)
      • Summary (140)
      • Key Terms (141)
      • Discussion Questions (142)
      • Topics for Class Discussion and Debates (142)
      • Internet Exercises (143)
      • Team Assignments and Projects (143)
      • Closing Case: Etsy—A Social-Oriented B2C Marketplace (145)
        • The Company’s Mission (145)
        • The Community (145)
        • The Business and Revenue Models (145)
        • Competition (145)
        • Conclusion (146)
        • Questions (146)
      • References (146)
    • 4: Business-to-Business E-Commerce (148)
      • Opening Case Alibaba.Com—The World’s Largest B2B Marketplace (149)
        • The Opportunity (149)
        • The Solution (149)
          • The Database (150)
          • Community Services (150)
          • The Competition (151)
        • The Results (151)
      • 4.1 Concepts, Characteristics, and Models of B2B E-Commerce (151)
        • Basic B2B Concepts and Process (151)
        • The Basic Types of B2B Transactions and Activities (152)
        • The Basic Types of B2B E-Marketplaces and Services (153)
          • One-to-Many and Many-to-One: Private E-Marketplaces (153)
          • Many-to-Many: Public Exchanges (or E-Marketplaces) (153)
          • Supply Chain Improvers and Collaborative Commerce (153)
            • Collaboration (153)
        • Market Size and Content of B2B (153)
        • B2B Components (155)
          • Parties to the Transaction: Sellers, Buyers, and Intermediaries (155)
          • Types of Materials Traded: What Do Firms Buy? (155)
          • B2B Marketplaces and Platforms (155)
        • Online Service Industries in B2B (156)
        • The Benefits and Limitations of B2B (157)
      • Section 4.1 Review Questions (157)
      • 4.2 B2B Marketing: Sell-Side E-Marketplaces (158)
        • Sell-Side Models (158)
          • B2B Sellers (158)
        • Sales from Catalogs: Webstores (158)
          • Distributors’ Catalogs (159)
          • Self-Service Portals (159)
          • Benefits and Limitations of Online Sales from Catalogs (159)
        • Comprehensive Sell-Side Systems (159)
        • Selling Via Distributors and Other Intermediaries (160)
      • Section 4.2 Review Questions (160)
      • 4.3 Selling Via E-Auctions (160)
        • The Benefits of Auctions on the Sell Side (160)
        • Auctioning from the Company’s Own Site (161)
        • Using Intermediaries in Auctions (161)
        • Examples of B2B Forward Auctions (161)
      • Section 4.3 Review Questions (161)
      • 4.4 One-From-Many: E-Procurement at Buy-Side E-Marketplaces (162)
        • Inefficiencies in Traditional Procurement Management (162)
        • Procurement Methods (163)
        • E-Procurement Concepts (164)
          • The Goals and Process of E-Procurement (164)
          • Types of E-Procurement (164)
        • The Benefits and Limitations of E-Procurement (164)
          • The Benefits of E-Procurement (165)
          • The Limitations and Challenges of E-Procurement (166)
      • Section 4.4 Review Questions (166)
      • 4.5 Reverse Auctions at Buy -Side E-Marketplaces (E-Tendering) (166)
        • The Major Benefits of Reverse Auctions (166)
        • Conducting Reverse Auctions (167)
      • Case 4.1: EC Application Amazon Enters the B2B Market (167)
        • The Problem (168)
        • The Solution (168)
        • The Results (168)
        • Questions (168)
          • E-Tendering by Governments (168)
          • Group Reverse Auctions (168)
      • Section 4.5 Review Questions (169)
      • 4.6 Other E-Procurement Methods (169)
        • Desktop Purchasing (169)
        • Group Purchasing (169)
          • Internal Aggregation of Purchasing Orders (169)
          • External Aggregation for Group Purchasing (169)
        • Buying from Other Sources (170)
        • Acquisition Via Electronic Bartering (170)
        • Selecting an Appropriate E-Procurement Solution (171)
      • Section 4.6 Review Questions (171)
      • 4.7 B2B Exchanges (E-Marketplaces): Definitions and Concepts (171)
        • Global Exchanges (171)
        • Functions of and Services Provided by Exchanges (171)
          • Functions and Services of B2B Exchanges (172)
        • Ownership of B2B Exchanges (173)
          • Third-Party Independent Exchanges (173)
          • Consortium Trading Exchanges (CTE) (174)
        • Dynamic Pricing in B2B Exchanges (174)
        • Advantages, Limitations, and the Revenue Model of Exchanges (174)
          • Revenue Models (175)
      • Section 4.7 Review Questions (175)
      • 4.8 B2B in Web 2.0 and Social Networking (175)
        • E-Communities in B2B (175)
        • The Opportunities of Social Commerce in B2B (176)
        • The Use of Web 2.0 Tools in B2B (176)
          • B2B Games (Gamification) (177)
        • Virtual Trade Shows and Trade Fairs (177)
        • Social Networking in B2B (177)
          • Using Twitter in B2B (177)
        • Examples of Other Activities of B2B Social Networks (178)
          • Success Stories (178)
        • The Future of B2B Social Networking (178)
        • Convergence of B2B, B2C, and Social Networking (178)
      • Case 4.2: EC Application: E-Procurement in Healthcare (178)
        • The Problem (179)
        • The Solution (179)
        • The Results (179)
      • Section 4.8 Review Questions (179)
      • 4.9 Collaborative Commerce (180)
        • Essentials of Collaborative Commerce (180)
        • The Elements and Processes of C-Commerce (180)
        • Collaboration Hubs (180)
        • Improving Collaborative Commerce (180)
        • Representative Examples of Collaborative Commerce (181)
          • Vendor-Managed Inventory Systems (181)
          • Retailer–Supplier Collaboration (182)
          • Reducing Transportation and Inventory Costs (182)
          • Reduction of Design Cycle Time (182)
          • Elimination of Channel Conflict: Collaboration with Dealers and Retailers (182)
        • Social Collaboration (183)
        • Barriers to C-Commerce (183)
          • Overcoming Barriers to C-Collaboration (183)
            • Collaboration Processes and Software (183)
      • Section 4.9 Review Questions (183)
      • Managerial Issues (183)
      • Summary (185)
      • Key Terms (186)
      • Discussion Questions (187)
      • Topics for Class Discussion and Debates (187)
      • Internet Exercises (188)
      • Team Assignments and Projects (188)
      • Closing Case: Maybelline Uses Collaborative Commerce to Manage Distribution (189)
        • The Problem (190)
        • The Solution (190)
        • The Results (190)
      • References (190)
    • 5: Innovative EC Systems: From E-Government to E-Learning, E-Health, Sharing Economy, and P2P Commerce (192)
      • Opening Case E-Government in Estonia (192)
        • The Problem (193)
        • The Solution (193)
          • Sample Applications (per Kwang 2017a) (193)
        • The Results (194)
      • 5.1 Digital Government: An Overview (194)
        • Definition and Scope (194)
        • Government-to-Citizens (195)
          • Electronic Voting (196)
            • Hackable Elections (196)
          • Electronic Benefits Transfer (197)
        • Government-to-Business (197)
          • Government E-Procurement (197)
          • Group Purchasing (198)
          • Forward and Reverse E-Auctions (198)
        • Government-to-Government (198)
        • Government-to-Employees and Internal Efficiency and Effectiveness (198)
          • Government-to-Employees (G2E) (198)
          • Internal Efficiency and Effectiveness (IEE) (198)
        • Implementing E-Government (199)
        • The Transformation to E-Government (199)
        • E-Government 2.0 and Social Media and Networking (199)
          • The Potential of E-Government 2.0 (Social Media) (200)
        • M-Government (200)
          • Smart Cities (200)
          • The Benefits of M-Government (200)
          • Some Implementation Issues (201)
        • Cutting-Edge Technologies in e-Government (201)
          • Artificial Intelligence (AI) Applications (201)
          • Virtual Advisors (201)
          • Chatbots (201)
          • Virtual Reality and Augmented Reality (201)
          • How Chatbots Will Affect Government (201)
          • Other Areas (202)
      • Section 5.1 Review Questions (202)
      • 5.2 E-Learning, E-Training, and E-Books (202)
        • The Basics of E-Learning: Definitions and Concepts (203)
        • Benefits and Drawbacks of E-Learning (203)
          • Benefits of E-Learning (203)
          • Drawbacks and Challenges of E-Learning (204)
        • Distance Learning and Online Universities (205)
          • Virtual Universities: Real Degrees (205)
          • Innovations in E-Learning (205)
        • Online Corporate Training (206)
          • Using Computer Games for Training Current and New Employees (206)
          • M-Learning (206)
        • Social Networks and E-Learning (207)
        • Some Recent Technology Support of E-Learning (207)
        • Visual Interactive Simulation (207)
          • Robotics, Chatbots, Telepreser, Robots, and More (208)
            • Using Chatbots (208)
            • Recent Technologies (208)
            • Virtual Assistants (208)
        • E-Learning Management Systems (208)
        • Electronic Books (E-Books) (209)
          • Devices for Reading E-Books (210)
          • Combining E-Readers and Tablets (210)
          • Advantages and Limitations of E-Books (210)
          • A Final Note: Is This the End of Printed Books? (211)
      • Section 5.2 Review Questions (211)
      • 5.3 E-Health (211)
        • Definition (211)
        • Electronic Medical Record Systems (EMR) (212)
        • Doctors’ System (212)
        • Patient Services (212)
        • Social Media and Commerce (212)
        • Medical Devices and Patient Surveillance (212)
        • Medical Research (213)
        • Administrative Purposes (213)
      • Section 5.3 Review Questions (213)
      • 5.4 Digital Disruption and Sharing Economy Models: Ride and Accommodation Sharing (213)
        • Digital Disruption: An Introduction (213)
          • Dealing with Disruptive Forces (214)
          • Disruptive Companies and Technologies (214)
        • Sharing Economy (214)
        • Ride (Transportation) Sharing (214)
        • Accommodation Sharing (215)
          • Free Home Sharing (215)
      • Section 5.4 Review Questions (215)
      • 5.5 Person-to-Person Electronic Commerce Models (215)
        • E-Commerce: P2P Applications (216)
          • P2P Auctions (216)
          • Selling and Buying in P2P (216)
          • Peer-to-Peer Money Lending (216)
            • Lending Club Is the Largest Commercial Marketplace for P2P Lending (216)
      • Case 5.1: EC Application The Lending Club Corp. (216)
        • The Business Model (217)
          • The Revenue Model (217)
          • The Secondary Market (217)
        • Problems Faced by Lending Club (217)
        • Conclusion (217)
        • Questions (217)
          • Selling via Classified Ads (218)
          • Personal Services Online (218)
          • Vacation (Short-Term) Rentals (218)
      • Case 5.2: EC Application Airbnb: An E-Commerce Disruption in the Hospitality Industry (218)
        • Questions (219)
          • File-Sharing Utilities: Napster and Others (219)
          • P2P Activities in Social Networks and Trading Virtual Properties (219)
      • Section 5.5 Review Questions (219)
      • Managerial Issues (220)
      • Summary (220)
      • 5.6 Key Terms (221)
      • Discussion Questions (222)
      • Topics for Class Discussion and Debates (222)
      • Internet Exercises (222)
      • Team Assignments and Projects (223)
      • Closing Case: Henry Ford Health System Provides Superior Patient Experience Using It and E-Commerce (224)
        • The Challenges (224)
          • The Solution (224)
        • The Results (224)
      • References (225)
  • Part III: Emerging EC Platforms (227)
    • 6: Mobile Commerce and the Internet of Things (228)
      • Opening Case Hertz Goes Mobile All the Way (229)
        • The Problem (229)
        • The Solution (229)
        • The Results (230)
      • 6.1 Mobile Commerce: Concepts, Landscape, Attributes, Drivers, Applications, and Benefits (230)
        • Basic Concepts, Magnitude, and the Landscape (231)
          • The Magnitude of M-Commerce (231)
          • The Landscape of M-Commerce (231)
          • Mobile and Social: A Powerful EC Combination (231)
        • The Attributes of M-Commerce (232)
        • An Overview of the Applications of M-Commerce (233)
        • The Benefits of M-Commerce (234)
          • Benefits for Organizations (234)
          • Benefits for Individuals and Customers (235)
          • Benefits to Society (235)
        • Mobile Commerce Trends (235)
      • Section 6.1 Review Questions (236)
      • 6.2 The Enabling Infrastructure: Components and Services of Mobile Computing (236)
        • Overview of Mobile Computing (236)
        • Mobile Devices (236)
          • Smartphones (236)
          • Tablets (237)
          • Wearable Devices (237)
          • Radio-Frequency Identification (RFID) (237)
        • Mobile Computing Software and Services (237)
          • Mobile Portals and Content Providers (237)
          • Short Message Service (237)
          • Multimedia Messaging Services (MMS) (238)
          • The Internet of Things (IoT) (238)
          • Location-Based Services (238)
        • Voice-Support Services (238)
          • IVR Systems (238)
          • Intelligent Personal Assistants and Robo-advisors (238)
          • Voice Portals (238)
          • Other Mobile Devices (239)
        • Mobile Apps (239)
          • Mobile Apps and Their Management (239)
        • Putting It All Together (239)
      • Section 6.2 Review Questions (240)
      • 6.3 Mobile Banking and Financial Applications (240)
        • Mobile Banking (240)
          • Mobile Banking Apps (240)
        • Internet-Only Banks (241)
          • Selecting a Bank (241)
            • Bank of Internet USA (BOFI) (241)
        • Using Cutting Edge Technologies in Mobile Banking (241)
        • Other Mobile Finance Applications (241)
          • Mobile Stock Trading (242)
          • Real Estate Mobile Applications (242)
      • Section 6.3 Review Questions (242)
      • 6.4 Mobile Enterprise Solutions: From Supporting the Workforce to Improving Internal Operations (242)
        • Defining Mobile Enterprise (Enterprise Mobility) (242)
          • A Working Definition of Mobile Enterprise (243)
        • The Framework and Content of Mobile Enterprise Applications (243)
        • Mobile Workers (243)
          • Mobile CRM (243)
            • Using Messaging in CRM (243)
        • Other Enterprise Mobile Applications (243)
          • Transportation Management (244)
        • Trends for 2015 And Beyond (244)
          • Enterprise Mobility 2017 (244)
      • Section 6.4 Review Questions (244)
      • 6.5 Mobile Entertainment, Gaming, Consumer Services, and Mobile Marketing (244)
        • Overview of Mobile Entertainment (244)
        • Mobile Streaming Music and Video Providers (245)
        • Entertainment in Cars (245)
        • Mobile Games (245)
          • Hurdles for Growth (246)
        • Mobile Gambling (246)
        • Mobility and Sports (246)
        • Service Industry Consumer Applications (247)
          • Healthcare (247)
          • Hospitality Management: Hotels, Resorts, and Restaurants (247)
          • Tablets and Other Mobile Devices in Restaurants (247)
          • Other Industries (248)
        • Mobile Marketing: Shopping and Advertising (248)
        • Mobile Shopping (248)
        • Mobile Advertising (249)
      • Section 6.5 Review Questions (249)
      • 6.6 Location-Based Commerce (250)
        • Basic Concepts in L-Commerce (250)
        • L-Commerce Infrastructure (250)
          • Geolocation (252)
          • The GPS: Positioning Component (252)
          • Location-Based Data (252)
            • Using Data Collections (252)
          • Locating Customers in Physical Stores (252)
          • Geographical Information Systems (253)
          • Location-Based Services and Applications (253)
          • Four Labs, Inc. and Swarm (253)
            • Personnel Tracking (254)
          • Social Location-Based Marketing (254)
          • Location-Based Applications 2016 (254)
            • Foursquare and Swarm (254)
            • GasBuddy (254)
            • Waze (254)
            • Glympse (254)
            • Dark Sky (254)
            • Happn (254)
            • Trigger (255)
        • Barriers to Location-Based M-Commerce (255)
        • The Viability of LBC (255)
      • Section 6.6 Review Questions (255)
      • 6.7 Ubiquitous (Pervasive) Computing (255)
        • Overview of Ubiquitous Computing (255)
          • Definitions and Basic Concepts (256)
            • The Internet of Things (IoT) (256)
          • Context-Aware Computing (256)
        • From Theory to Practice (256)
          • Smart Meters and Grids (256)
        • Implementation Issues in Ubiquitous Computing (257)
      • Section 6.7 Review Questions (258)
      • 6.8 Wearable Computing and Smart Gadgets: Watches, Fitness Trackers, and Smart Glasses (258)
        • Wearable Computing Applications and Devices (258)
          • Sensors (258)
        • Enterprise Wearables (258)
          • State of the Art (259)
        • Smartwatches (259)
        • Fitness (Activity) Trackers (259)
        • Digital (Smart) Glasses (259)
          • Google Glasses (260)
          • Augmented Reality Glasses (260)
      • Section 6.8 Review Questions (260)
      • 6.9 Implementation Issues in Mobile Commerce: From Security and Privacy to Barriers to M-Commerce (260)
        • M-Commerce Security and Privacy Issues (261)
          • Privacy (261)
        • Technological Barriers to M-Commerce (261)
        • Failures in Mobile Computing and M-Commerce (261)
        • Ethical, Legal, Privacy, and Health Issues in M-Commerce (262)
        • Enterprise Mobility Management (262)
          • The BYOD Issue (262)
            • Build (or Bring) Your Own App (BYOA) (262)
          • Everything “On-Demand” via Mobile Apps (263)
          • Other Managerial Issues (263)
          • Conclusion (263)
      • Section 6.9 Review Questions (263)
      • Managerial Issues (263)
      • Summary (264)
      • Key Terms (265)
      • Discussion Questions (265)
      • Topics for Class Discussion and Debates (266)
      • Internet Exercises (266)
      • Team Assignments and Projects (267)
      • Closing Case: Can Uber Continue to Grow in an Evolving Market? (267)
        • Business Model (268)
          • Regulation (268)
        • Competition (268)
        • Future Plans (268)
        • Questions (269)
      • References (269)
    • 7: Intelligent (Smart) E-Commerce (272)
      • Opening Case INRIX Solves Transportation Problems (272)
        • The Problem (272)
        • The Solution (273)
        • The Results (273)
      • 7.1 Introduction to Intelligent E-Commerce (274)
        • An Overview of Intelligent E-Commerce (274)
      • Section 7.1 Review Questions (275)
      • 7.2 The Essentials of Artificial Intelligence (276)
        • Artificial Intelligence (AI): Definitions and Characteristics (276)
          • The Capabilities of Intelligence (276)
          • How Intelligent Is AI? (276)
            • Turing Test (276)
        • The Content of the AI Field (276)
          • Intelligent Agents (276)
          • Machine Learning (277)
          • Robotics Systems (277)
            • Robots are Taking Our Jobs (278)
          • Natural Language Processing (279)
          • Speech (Voice) Understanding (279)
          • Language Translation (279)
        • Chatbots (279)
          • Chatbots in E-Commerce (279)
          • Knowledge Systems (280)
      • Section 7.2 Review Questions (280)
      • 7.3 Recent AI Applications in E-Commerce (281)
        • The AI Contribution to E-Commerce (281)
        • AI in E-Commerce: Some Illustrative Examples (281)
          • Marketing and Advertising (281)
          • Customer Service and Advice (282)
          • AI in B2B (282)
          • Other Applications (282)
          • Conclusion (282)
      • Section 7.3 Review Questions (283)
      • 7.4 Knowledge (Expert) Systems (283)
        • An Overview of Knowledge Management (283)
        • Knowledge Management Types and Activities (283)
        • Knowledge Sharing (284)
        • How Is Knowledge Management Related to E-Commerce? (284)
        • KM and Social Networks (285)
        • Expert Systems (285)
          • The Major Components of an Expert System (285)
          • The Process and Capabilities of Expert Systems (286)
        • Knowledge-Based System (286)
      • Case 7.1 EC Application Allstate Is Using Knowledge Systems (287)
        • The Problem (287)
        • The Solution (287)
        • The Results (287)
        • Questions for the Case (287)
      • Section 7.4 Review Questions (288)
      • 7.5 Intelligent Personal Assistants and Robot Advisers (288)
        • Amazon’s Alexa (288)
          • Alexa Skills (289)
          • Amazon Echo (289)
          • Amazon Echo Dot (289)
          • Amazon Echo Tap (289)
        • Apple’s Siri (290)
          • Viv (290)
        • Other Personal Assistants (290)
          • Facebook and Its CEO (290)
          • IBM Watson (290)
          • Alfie: Sears Voice-Controlled Shopping Assistant (291)
        • Personal Robots (291)
      • Application Case 7.2 EC Application Autonomous’ Personal Robot (291)
        • The Personal Robot of Autonomous (291)
        • Questions for the Case (292)
          • Robo Advisors (292)
      • Section 7.5 Review Questions (292)
      • 7.6 The Internet of Things and E-Commerce (293)
        • The Essentials of IoT (293)
          • Definitions and Characteristics (293)
        • The Structure of IoT Applications (293)
        • The Major Benefits of IoT (294)
        • The Drivers of IoT (294)
        • How the IoT Works (294)
        • Some Issues in Implementing the IoT (295)
      • Section 7.6 Review Questions (296)
      • 7.7 Selective Demonstrations of IoT in Action (296)
        • A Sampler of Existing Applications (296)
          • Nest: A Google Company (296)
        • Smart Homes and Appliances (297)
          • More on Smart Appliances (297)
          • New Home Appliances in CES 2016 (298)
        • Smart Cities (298)
        • Smart Cars (Self-Driven) (299)
      • Section 7.7 Review Questions (299)
      • Managerial Issues (299)
      • Summary (300)
      • Key Terms (301)
      • Discussion Questions (301)
      • Topics for Class Discussion and Debate (301)
      • Internet Exercises (302)
      • Team Assignments and Projects (302)
      • Closing Case: CNH Industrial Uses the Internet of Things to Excel (303)
        • The Problem (303)
        • The Solution (303)
        • The Results (304)
        • Questions for the Case (304)
      • References (304)
    • 8: Social Commerce: Foundations, Social Marketing, and Advertising (307)
      • Opening Case Social Media Wants Your Marketing Dollars (307)
        • The Problem (308)
        • The Solution (308)
        • The Results (308)
      • 8.1 Social Commerce: Definitions and Evolution (309)
        • Definitions (309)
        • The Evolution of Social Commerce (309)
      • Section 8.1 Review Questions (310)
      • 8.2 The Content of the Social Commerce Field (310)
        • The Landscape and Major Components of the Field (310)
        • Social Media Marketing (311)
        • Enterprise 2.0 (311)
          • Examples of Social Enterprise Applications (312)
        • The Future (312)
      • Section 8.2 Review Questions (312)
      • 8.3 The Benefits and Limitations of Social Commerce (312)
        • Benefits to Customers (313)
        • Benefits to Retailers (313)
        • Benefits to Other Types of Enterprises (314)
        • The Social Business: An IBM Approach (314)
        • New or Improved Business Models (315)
        • Concerns and Limitations of Conducting Social Commerce (315)
      • Section 8.3 Review Questions (315)
      • 8.4 Social Shopping: Concepts, Benefits, and Models (316)
        • Definitions and Drivers of Social Shopping (316)
          • The Drivers of Social Commerce (316)
          • Concepts and Content of Social Shopping (316)
          • Why Shoppers Go Social (317)
          • The Roles in Social Commerce (317)
          • Benefits of Social Shopping (317)
          • What Elements to Expect in a Social Shopping Site (318)
        • Traditional E-Commerce Sites with Social Media Additions (318)
        • The Major Types and Models of Social Shopping (318)
          • Group Buying (319)
            • Group Buying in China (319)
          • The Process (319)
          • Deal Purchases (Flash Sales) (319)
          • Shopping Together Online in Real Time (320)
            • Shopping Together Sites (320)
            • Co-Shopping (320)
          • Online Social Shopping Communities (320)
          • Examples of Shopping Communities (320)
      • Case 8.1: EC Application Polyvore A Trendsetter in Social Shopping (320)
        • Questions (321)
          • Private Online Shopping Clubs (321)
        • Other Innovative Models (321)
        • Social Shopping Aids: From Recommendations to Reviews, Ratings, and Marketplaces (322)
          • Recommendations in Social Commerce (322)
          • Ratings and Reviews (322)
          • Social Recommendations and Referrals (323)
          • Illustrative Examples of Recommendation Sites (323)
            • Buzzillions (323)
          • Concerns about Social Reviews and Recommendations (324)
        • Other Shopping Aids and Services (324)
          • Yelp: The Shoppers’ Best Helper (324)
            • How Yelp Works (324)
          • Collaborative Product Reviews (325)
          • Dealing with Complaints (325)
        • Social Marketplaces and Direct Sales (325)
          • Direct Sales from within Social Networks (325)
          • Socially Oriented Person-to-Person (P2P) Selling, Buying, Renting, or Bartering (326)
            • P2P Sharing (Also Known as Collaborative Consumption) (326)
        • Shopping for Virtual Goods in a Virtual Economy (326)
          • The Virtual Economy (326)
          • Why People buy Virtual Goods (326)
        • Real-Time Online Shopping (327)
        • Social Shopping in the Near Future (327)
      • Section 8.4 Review Questions (327)
      • 8.5 Social Advertising: From Viral Advertising to Microblogging and Other Promotions (327)
        • Social ads and Social Apps (328)
        • Viral (Word-of-Mouth) Marketing and Social Networking (328)
          • Viral Blogging (328)
          • Other Viral Marketing Methods (328)
        • Using YouTube and Other Social Presentation Sites for Advertising (329)
          • Viral Videos (329)
            • Why It Works (329)
        • Using Twitter as an Advertising and Marketing Tool (329)
        • Using Facebook for Advertising (330)
          • Banners and Other ads (330)
          • Facebook Offers (330)
          • Community Presence (330)
        • Using LinkedIn (330)
        • Other Innovative Ways to Advertise in Social Media (330)
          • The Changing Rules of Branding (331)
          • Using Blogs (331)
          • Using Coupons (331)
          • Using Snapchat (331)
          • Mobile Advertising (331)
      • Section 8.5 Review Questions (331)
      • 8.6 Social Customer Service and CRM (332)
        • How Does Social Networking Empower Customers? (332)
        • Social CRM (332)
          • Definition (332)
          • The Components of Social CRM (333)
        • How to Serve the Social Customers (333)
          • Methods and Guidelines for Social Customer Service (333)
            • Social Listening (334)
        • The Benefits of Social CRM (334)
      • Case 8.2: EC Application iRobot Uses Social Media for Multichannel CRM (335)
        • Social CRM: Serve the Customers While Learning from Them (335)
          • Specific Social Media CRM Activities (335)
          • General Social Media Activities (335)
        • The Evolution of Social CRM (336)
        • Multidimensional Presentation SCRM (336)
          • Conclusions (336)
        • Examples of Implementation of Social Customer Service and CRM (336)
          • Social Networking Helps Customer Service in Small Companies (338)
        • Reputation Management System (339)
      • Section 8.6 Review Questions (339)
      • Managerial Issues (339)
      • Summary (340)
      • Key Terms (341)
      • Discussion Questions (341)
      • Topics for Class Discussion and Debates (341)
      • Internet Exercises (342)
      • Team Assignments and Projects (342)
      • Closing Case: How Sony Uses Social Media for Improving CRM (343)
        • The Problem (343)
          • The Solution (343)
        • The Results (344)
        • Questions (344)
      • References (344)
    • 9: Social Enterprise and Other Social Commerce Topics (347)
      • Opening Case Maximizing the Impact of Social Media with a Minimum of Effort in Mortgage Lending (348)
        • The Problem (348)
        • The Mortgage Industry (348)
        • The Solution (348)
        • The Results (348)
      • 9.1 Social Business and Social Enterprise (349)
        • Definitions: Social Business and Social Enterprise (349)
          • Social Business (349)
            • Social Employees (349)
          • The Social Enterprise (Enterprise 2.0) (350)
          • More Complex Definitions (350)
            • The Social Business Forum’s Definition (350)
        • Business Networks (350)
          • Types of Business Social Networks (351)
        • The Benefits and Limitations of Enterprise Social Networking (351)
          • Obstacles and Limitations (351)
        • How Web 2.0 Tools Are Used by Enterprises (352)
          • Accenture (352)
          • Salesforce (352)
      • Section 9.1 Review Questions (353)
      • 9.2 Business-Oriented Public Social Networking (353)
        • Entrepreneur Networks (354)
      • Section 9.2 Review Questions (354)
      • 9.3 Enterprise Social Networks (354)
        • Taxonomy of Social Enterprise Applications (355)
          • Characteristics of Enterprise Social Networks (355)
          • An Example of a Private Enterprise Network (355)
        • How Enterprise Social Networking Helps Employees and Organizations (356)
          • Benefits to Organizations (356)
        • Support Services for Enterprise Social Networks (356)
        • How Companies Interface with Social Networking (357)
          • Integration with Other Tools (358)
        • Patterns and Speed of Adoption (358)
      • Section 9.3 Review Questions (358)
      • 9.4 Social Network-Based Job Markets (359)
        • Social Recruiting (359)
          • Recruiting and Job Searching Using Social Networks (360)
        • Virtual Job Fairs and Recruiting Events (360)
          • Training Employees (360)
        • Social Network Privacy and Job Search (360)
      • Review Questions for Section 9.4 (361)
      • 9.5 Social Entertainment (361)
        • Entertainment and Social Networks (361)
          • Mixi (361)
          • Last.fm (361)
          • Pandora (362)
          • Amazon’s Prime Music (362)
          • Web Series and Streaming Movies (362)
          • Hulu (362)
          • Funny-or-Die and Cracked.com (362)
        • Multimedia Presentation and Sharing Sites (362)
      • Section 9.5 Review Questions (363)
      • 9.6 Social Games and Gamification (363)
        • Games on Social Networks (363)
        • The Business Aspects of Social Games (364)
      • Case 9.1: EC Application Pokémon GO (364)
        • Questions (364)
        • Educational Social Games (365)
          • Gamers Helped Scientists (365)
        • Gamification (365)
      • Section 9.6 Review Questions (366)
      • 9.7 Crowdsourcing and Crowdfunding (366)
        • Crowdsourcing as a Distributed Problem-Solving Enabler (366)
          • Crowdsourcing Models (366)
        • The Process of Crowdsourcing (367)
        • Successfully Deployed Crowdsourcing Systems: Some Representative Examples (367)
      • Case 9.2: EC Application Kickstarter (368)
        • Questions (368)
        • Tools for Crowdsourcing (369)
          • Crowdfunding and Kickstarter (369)
      • Section 9.7 Review Questions (370)
      • 9.8 Social Collaboration (Collaboration 2.0) (370)
        • Essentials of Social Collaboration (370)
          • Social Collaboration (Collaboration 2.0) (370)
          • Using Blogs and Wikis Inside the Enterprise (371)
          • Using Twitter to Support Collaboration (371)
          • Using LinkedIn to Support Collaboration (372)
          • The Role of Mobile Commerce in Social Collaboration (372)
          • Questions and Answers in Social Networks (372)
          • Suites of Tools for Social Collaboration (372)
        • The Future of Social Commerce (373)
          • Conclusion: IBM’s Watson and Social Commerce (373)
      • Section 9.8 Review Questions (373)
      • Managerial Issues (374)
      • Summary (374)
      • Key Terms (375)
      • Discussion Questions (375)
      • Topics for Class Discussion and Debates (375)
      • Internet Exercises (376)
      • Team Assignments and Projects (376)
      • Closing Case: LinkedIn—The Premier Public Business-Oriented Social Network (377)
        • Smart Ways to Use LinkedIn (378)
        • Mobile Applications (378)
        • The Future of LinkedIn (378)
        • Some Resources for LinkedIn (378)
        • Questions (379)
      • References (379)
  • Part IV: EC Support Services (381)
    • 10: Marketing and Advertising in E-Commerce (382)
      • Opening Case IKEA Uses Mobile and Augmented Reality (382)
        • The Problem (383)
        • The Solution (383)
        • The Results (383)
      • 10.1 Online Consumer Behavior (383)
        • A Model of Online Consumer Behavior (384)
        • The Major Influential Factors (385)
          • Consumer Characteristics (385)
          • Merchant and Intermediary-Related Factors (385)
          • Product/Service Factors (385)
          • EC Systems (385)
          • Environmental Factors (385)
        • Enhancing Customer Loyalty (386)
      • Section 10.1 Review Questions (386)
      • 10.2 Personalization and Behavioral Marketing (386)
        • Personalization in E-Commerce (387)
          • Web Cookies for Data Collection (387)
          • Other Methods for Data Collection (388)
          • Using Personalized Techniques to Increase Sales (388)
      • Case 10.1: EC Application Using AI at The North Face (388)
        • The Problem (388)
        • The Solution (388)
          • Questions (389)
        • Behavioral Marketing and Collaborative Filtering (389)
          • Behavioral Targeting (389)
          • Collaborative Filtering (389)
          • Other Methods (389)
            • Rule-Based Filtering (389)
            • Content-Based Filtering (389)
            • Activity-Based Filtering (390)
          • Legal and Ethical Issues in Collaborative Filtering (390)
          • Social Psychology and Morphing in Behavioral Marketing (390)
      • Case 10.2: EC Application Netflix Uses Technical and Social Systems so You Can Find Something to Watch (390)
        • The Technical Approach (390)
        • The Social Approach (391)
          • Questions (391)
      • Section 10.2 Review Questions (391)
      • 10.3 Market Research for E-Commerce (391)
        • Objectives and Concepts of Online Market Research (391)
          • What are Marketers Looking for in EC Market Research? (392)
        • Representative Market Research Approaches (392)
          • Data Collection and Analysis (392)
          • Online Surveys (392)
            • Web-Based Surveys (392)
            • Online Focus Groups (392)
          • Hearing Directly from Customers (392)
          • Data Collection in Social Networks and Other Web 2.0 Environments (393)
          • Observing Customers’ Movements Online (393)
            • Transaction Logs (393)
            • Cookies and Web Bugs (394)
            • Spyware (394)
          • Web Analytics and Mining (394)
            • Clickstream Analysis (394)
            • Web Mining (394)
        • Limitations of Online Market Research and How to Overcome Them (395)
          • Privacy Issues in Market Research (395)
        • Biometric and Smartphone Marketing Helps Market Research (395)
      • Section 10.3 Review Questions (395)
      • 10.4 Why Web Advertising (396)
        • Overview of Web Advertising (396)
          • The Advertising Cycle (396)
        • Basic Internet Advertising Terminology (397)
        • Why Internet Advertising? (397)
          • Advertising Online and Its Advantages (397)
          • Traditional Versus Online Advertising (398)
      • Section 10.4 Review Questions (398)
      • 10.5 Online Advertising Methods (398)
        • Major Categories of Ads (398)
          • Classified Ads (398)
          • Display Ads (399)
          • Interactive Ads (399)
        • Banners (399)
          • Benefits and Limitations of Banner Ads (399)
        • Pop-Up and Similar-Type Ads (399)
          • Pop-Up Videos (400)
          • E-Mail Advertising (400)
          • Major Advantages and Limitations of E-Mail Advertising (400)
            • Limitations (400)
          • Implementing E-Mail Advertising (401)
            • E-Mail Hoaxes (401)
            • Fraud (401)
            • Regulatory Compliance (401)
        • Search Engine Advertisement and Optimization (401)
          • Search Engine Optimization (SEO) (401)
            • Sponsored Ads (Paid Inclusion) (402)
        • Google: The Online Advertising King (402)
          • Google’s Major Advertising Methods: AdWords and AdSense (402)
            • Viral Marketing (403)
          • Video Advertising (404)
          • Viral Videos (405)
          • Consumer-Generated Videos (405)
          • Interactive Videos (406)
            • Video Click-Throughs (406)
            • Live Interactive Videos (406)
        • Augmented Reality in Advertising (406)
        • Advertising in Chat Rooms and Forums (406)
      • Case 10.3: EC Application Supporting Marketing Campaigns with Software Systems (407)
        • The Problem (407)
        • The Solution (407)
          • Questions (407)
      • Section 10.5 Review Questions (407)
      • 10.6 Mobile Marketing and Advertising (408)
        • Mobile Marketing and Mobile Commerce (408)
          • Defining Mobile Marketing (408)
          • Mobile Advertising (408)
          • Interactive Mobile Advertising (409)
          • Types of Mobile Ads (409)
            • Short Message Ads (409)
            • Location-Based Ads (409)
          • Mobile Marketing and Advertising Campaigns (410)
        • Mobile Marketing Implementation Guidelines (410)
        • Tools to Support Mobile Advertisement (410)
        • Mobile Ad Trends (411)
        • Marketing Through Apps (411)
      • Section 10.6 Review Questions (411)
      • 10.7 Advertising Strategies and Promotions (412)
        • Permission Advertising (412)
        • Other Advertising Strategies (412)
          • Affiliate Marketing and Advertising (412)
            • Affiliate Networks (412)
          • Ads as a Commodity: Paying People to Watch Ads (412)
          • Personalized Ads (413)
          • Advertising as a Revenue Model (413)
          • Choose-Your-Own-Ad Format (413)
          • Live Web Events for Advertising (413)
        • Localization in Advertising (413)
        • Developing an Online Advertising Plan (414)
      • Section 10.7 Review Questions (415)
      • Managerial Issues (415)
      • Summary (416)
      • Key Terms (417)
      • Discussion Questions (418)
      • Topics for Class Discussion and Debates (418)
      • Internet Exercises (419)
      • Team Assignments and Projects (419)
      • Closing Case: Rolex Uses New Media Marketing (420)
        • The Problem (420)
        • The Solution (420)
        • Results (421)
          • Questions (421)
      • References (421)
    • 11: E-Commerce Security and Fraud Issues and Protections (423)
      • Opening Case Kansas Heart Hospital Becomes a Victim to Ransom (424)
        • The Incident (424)
        • The Solution (424)
        • The Results (424)
      • 11.1 The Information Security Problem (425)
        • What Is EC Security? (425)
          • The Status of Computer Security in the United States (425)
          • Personal Security (426)
          • National Security (426)
          • Security Risks for 2017 and 2018 (426)
        • Security Risks in Mobile Devices (427)
        • Cyberwars and Cyberespionage Across Borders (427)
          • Cyberwarfare (427)
            • Cyberespionage (427)
          • Attacking Information Systems (427)
          • Types of Cyberwar Attacks (428)
        • The Drivers of EC Security Problems (428)
          • The Internet’s Vulnerable Design (428)
          • The Spread of Computerized Medical Data (428)
          • The Shift to Profit-Induced Crimes (429)
            • Ransomware (429)
            • Thefts of Devices (429)
          • Computers Everywhere (429)
          • The Increased Volume of Wireless Activities and the Number of Mobile Devices (429)
          • The Globalization of the Attackers (429)
          • The Explosion of Social Networking (429)
          • The Dynamic Nature of EC Systems and the Acts of Insiders (429)
          • The Sophistication of the Attacks (429)
        • The Darknet and the Underground Economy (430)
          • The Underground Internet Economy (430)
          • The Internet Silk Road (430)
          • The Cost of Cybercrime (430)
      • Section 10.1 Review Questions (430)
      • 11.2 Basic E-Commerce Security Issues and Landscape (430)
        • Basic Security Terminology (431)
          • Conclusion (431)
        • The EC Security Battleground (431)
        • The Threats, Attacks, and Attackers (431)
          • Unintentional Threats (431)
          • Intentional Attacks and Crimes (432)
          • The Criminals and Their Methods (433)
            • Money Mules (433)
        • The Targets of the Attacks in Vulnerable Areas (433)
          • Vulnerable Areas Are Being Attacked (433)
          • Vulnerability Information (433)
            • Attacking E-Mail (433)
            • Attacking Smartphones and Wireless Systems (434)
            • The Vulnerability of RFID Chips (434)
          • The Vulnerabilities in Business IT and EC Systems (434)
          • Pirated Videos, Music, and Other Copyrighted Material (434)
        • EC Security Requirements (434)
        • The Defense: Defenders, Strategy, and Methods (435)
          • EC Defense Programs and Strategy (435)
            • Information Assurance (435)
          • Possible Punishment (435)
          • Defense Methods and Technologies (435)
            • Recovery (435)
      • Section 11.2 Review Questions (435)
      • 11.3 Technical Malware Attack Methods: From Viruses to Denial of Service (436)
        • Technical and Nontechnical Attacks: An Overview (436)
        • The Major Technical Attack Methods (436)
        • Malware (Malicious Software): Viruses, Worms, and Trojan Horses (436)
          • Viruses (437)
            • The ILOVEYOU Virus (437)
          • Worms (438)
            • Macro Viruses and Micro Worms (438)
            • Trojan Horse (438)
          • Some Security Bugs: Heartbleed and CryptoLocker (438)
            • Heartbleed (438)
            • CryptoLocker (439)
        • Mirai (Malware) (439)
          • Denial of Service (DoS and DDoS) (439)
          • Web Server and Web Page Hijacking (439)
          • Botnets (439)
            • Home Appliance “Botnet” (440)
          • Malvertising (440)
          • Keystroke Logging in the Underground Economy (440)
      • Section 11.3 Review Questions (440)
      • 11.4 Nontechnical Methods: From Phishing to Spam and Fraud (440)
        • Social Engineering and Fraud (441)
        • Social Phishing (441)
          • Spear Phishing (442)
            • Other Phishing Methods (443)
            • Pharming (443)
        • Fraud and Scams on the Internet (443)
          • Types of Scams (443)
          • E-Mail Scams (444)
        • Top 10 Attacks and Remedies (444)
        • Identity Theft and Identify Fraud (445)
          • Identity Fraud (445)
        • Cyber Bank Robberies (445)
        • Ransomware (445)
          • What Is Ransomware? (445)
          • Possible Solutions (446)
        • Spam Attacks (447)
          • Typical Examples of Spamming (447)
        • Spyware (447)
        • Social Networking Makes Social Engineering Easy (447)
          • How Hackers Are Attacking Social Networks (447)
          • Spam in Social Networks and in the Web 2.0 Environment (448)
            • Automated Blog Spam (448)
          • Search Engine Spam and Splogs (448)
        • Data Breach (Leak) (448)
      • Section 11.4 Review Questions (449)
      • 11.5 The Information Assurance Model and Defense Strategy (449)
        • Confidentiality, Integrity, and Availability (449)
        • Authentication, Authorization, and Nonrepudiation (449)
        • E-Commerce Security Strategy (450)
        • The Defense Side EC Systems (450)
          • Assessing Vulnerabilities and Security Needs (450)
          • Penetration Test (451)
      • Section 11.5 Review Questions (451)
      • 11.6 Defending Information Systems and E-Commerce (451)
        • The Defense I: Access Control, Encryption, and PKI (451)
          • Access Control (451)
            • Authorization and Authentication (452)
            • Authentication (452)
            • Antivirus Protection (452)
          • Biometric Systems (452)
          • Encryption and the One-Key (Symmetric) System (452)
          • Symmetric (Private) Key Encryption (453)
          • Public Key Infrastructure (453)
            • Public (Asymmetric) Key Encryption (454)
            • The PKI Process: Digital Signatures and Certificate Authorities (454)
            • Certificate Authority (454)
            • Secure Sockets Layer (SSL) (454)
          • Other Controls (454)
        • The Defense II: Securing E-Commerce Networks (454)
          • Firewalls (454)
            • The Dual-Firewall Architecture: The DMZ (454)
          • Virtual Private Networks (VPNs) (455)
          • Intrusion Detection Systems (IDS) (455)
          • Dealing with DoS Attacks (455)
        • The Defense III: General Controls, Spam, Pop-Ups, and Social Engineering Controls (455)
          • General, Administrative, and Other Controls (455)
            • Physical Controls (456)
            • Administrative Controls (456)
          • Protecting Against Spam (456)
          • Protecting Your Computer from Pop-Up Ads (456)
          • Protecting Against Other Social Engineering Attacks (456)
            • Protecting Against Phishing (456)
            • Protecting Against Malvertising (456)
          • Protecting Against Spyware (456)
          • Protecting Against Cyberwars (456)
          • Protecting Users of Social Media (457)
          • Business Continuity and Disaster Recovery (457)
          • SANS’s CIS Critical Security Controls (457)
      • Section 11.6 Review Questions (457)
      • 11.7 Consumer and Seller Protection from Online Fraud (458)
        • Consumer (Buyer) Protection (458)
          • Representative Tips and Sources for Your Protection (458)
          • Third-Party Assurance Services (459)
            • Protection by a Third-Party Intermediary (459)
            • TRUSTe’s “Trustmark” (459)
            • Better Business Bureau (459)
            • WebTrust Seal (459)
            • Evaluation by Consumers (459)
          • The Computer Fraud and Abuse Act (CFAA) (460)
        • Seller (Merchant) Protection (460)
          • What Can Sellers Do? (460)
        • Protecting Marketplaces and Social Networking Services (461)
          • Fraud Detection Software (461)
        • Protecting Both Buyers and Sellers: Using Electronic Signatures and Other Security Features (461)
          • Authentication (461)
          • Fraud Detecting Systems (461)
      • Section 11.7 Review Questions (461)
      • 11.8 Implementing Enterprisewide E-Commerce Security (462)
        • The Drivers of EC Security Management (462)
          • How Serious Is Cybersecurity? (462)
        • Senior Management Commitment and Support (462)
        • EC Security Policies and Training (463)
          • Training to Do Hacking (464)
          • Cyber Intelligence (464)
        • EC Risk Analysis and Ethical Issues (464)
          • Ethical Issues (464)
        • Why Is It Difficult to Stop Internet Crime? (464)
          • Making Shopping Inconvenient (464)
          • Lack of Cooperation by Business Partners (465)
          • Shoppers’ Negligence (465)
          • Ignoring EC Security Best Practices (465)
          • Design and Architecture Issues (465)
          • Lack of Due Care in Business Practices (465)
        • Protecting Mobile Devices and Mobile Apps (465)
          • Mobile Security Issues (465)
          • The Defense of Mobile Systems (465)
          • The Internet of Things Security (465)
      • Section 11.8 Review Questions (466)
      • Managerial Issues (466)
      • Summary (466)
      • Key Terms (468)
      • Discussion Questions (469)
      • Topics for Class Discussion and Debates (470)
      • Internet Exercises (470)
      • Team Assignments and Projects (471)
      • Closing Case: How Dyn Was Attacked by DDOS? (471)
        • The Incident (471)
          • The Results (472)
        • Using Botnet (472)
          • The Motive (472)
        • Questions (472)
      • References (472)
    • 12: Electronic Commerce Payment Systems (476)
      • Opening Case Cross-Border EC—Costco Partners with China’s Tmall (476)
        • The Problem (476)
        • The Solution (477)
        • The Costco Solution (478)
          • The Alibaba Group and Their Tmall and Alipay (478)
          • Criteria for Collaboration (478)
        • The Results (479)
      • 12.1 Changing Retail Landscape (480)
        • Omni-Channel Retail (480)
        • Cash Versus Non-cash Transactions (480)
          • Usage of EC Payment Methods (481)
          • Amazon’s GO is Changing Retail (482)
        • Move to Mobile (482)
          • The Cashless Society (483)
        • Implications for EC Payments (483)
        • Critical Mass (484)
          • Factors for Critical Mass (484)
      • Section 12.1 Review Questions (485)
      • 12.2 Using Payment Cards Online (485)
        • Credit Card Reading (485)
        • Processing Cards Online (485)
          • Authorization and Settlement (486)
        • Fraudulent Card Transactions (487)
          • Methods for Combating Fraud (488)
      • Section 12.2 Review Questions (488)
      • 12.3 Smart Cards (488)
        • Types of Smart Cards: Contact and Contactless (489)
          • Smart Card Readers (489)
        • Stored-Value Cards (489)
        • Applications of Smart Cards (490)
          • Retail Purchases (490)
            • Cards Security (491)
            • Contactless in Retailing (491)
          • Transit Fares (491)
      • Section 12.3 Review Questions (492)
      • 12.4 EC Micropayments (492)
        • Micropayment Models (492)
        • Micropayment Options and Costs (493)
      • Case 12.1 EC Application Innovative Credit Card Micropayments for the Korean Metropolitan Unified Fare System (493)
        • The Problem (493)
        • The Solution (494)
        • The Results (494)
      • Section 12.4 Review Questions (495)
      • 12.5 PayPal and Other Third-Party Payment Gateways (495)
        • PayPal (495)
        • Other Third-Party Gateways (496)
          • Apple Pay and Google’s Android Pay (496)
            • Apple Pay (apple.Com/pay) (496)
            • Android Pay (Android.Com/pay) (496)
          • Amazon Payments (496)
          • Global Gateways (497)
      • Section 12.5 Questions (497)
      • 12.6 Mobile Payments (497)
        • Types of Mobile Payments (497)
        • Mobile Consumer Payments: Wallets, Clouds, and Loops (498)
          • Device-Based Digital Wallets (499)
            • Cloud-Based Digital Wallets (500)
            • Closed-Loop Systems (500)
          • Mobile Point of Sale (500)
      • Case 12.2 EC Application Using the Square Magstripe Reader (501)
      • Questions for the Case (501)
        • Person-to-Person (P2P) Payments (502)
      • Section 12.6 Review Questions (502)
      • 12.7 Digital and Virtual Currencies (502)
        • Types of Currencies: Physical and Digital (502)
          • Virtual Currency (502)
          • Size of the Virtual Currency Market (503)
          • Digital Currency Exchanges (503)
        • Bitcoin and Other Cryptocurrencies (503)
          • Bitcoin Background (504)
          • Bitcoin Characteristics (504)
          • How Does Bitcoin Work? (504)
          • Advantages of Bitcoin (507)
          • Disadvantages of Bitcoin (507)
          • Bitcoin Competitors and the Future of Math-Based Currencies (508)
      • Section 12.7 Review Questions (508)
      • Managerial Issues (508)
      • Summary (509)
      • Key Terms (511)
      • Discussion Questions (512)
      • Topics for Class Discussion and Debates (512)
      • Internet Exercises (513)
      • Team Assignments and Projects (513)
      • Closing Case (514)
        • The Problem (514)
        • The Solution (515)
        • The Results (516)
      • References (517)
    • 13: Order Fulfillment Along the Supply Chain in e-Commerce (519)
      • Opening Case How Amazon.Com Fulfills Orders (520)
        • The Problem (520)
        • The Solution (520)
          • Picking and Packing (520)
          • Specialization of Distribution Centers (521)
          • The Army of Robots (521)
          • Delivery by Drones (521)
        • The Results (521)
      • 13.1 Order Fulfillment and Logistics: An Overview (522)
        • Basic Concepts of Order Fulfillment and Logistics (522)
        • The EC Order Fulfillment Process and Elements (523)
        • Operation Models (524)
        • Order Fulfillment and the Supply Chain (524)
      • Section 13.1 Review Questions (525)
      • 13.2 Order Fulfillment in Make-to-Order (MTO) and Mass Customization (525)
        • Mass Customization, Make-to-Order, and Assemble-to-Order (525)
      • Case 13.1: EC Application Dell’s World-Class Supply Chain and Order Fulfillment System (526)
        • Direct-to-Consumer and Configure-to-Order (526)
          • Assemble-to-Order (526)
        • Segmented Supply Chain (526)
        • Results (528)
        • Questions (528)
        • Make-to-Order and Assemble-to-Order (528)
          • Using 3D Printing for Mass Customization (528)
          • 3D and e-Commerce (529)
      • Case 13.2: EC Application Feetz Inc. Is Using 3D for Mass Customization in e-Commerce (529)
        • How Does Feetz Work? (529)
        • Questions (529)
          • Using Robots with Make-to-Order Fulfillment (530)
      • Section 13.2 Review Questions (530)
      • 13.3 Warehousing, Robots, and Warehouse Management Systems (530)
        • Using Robots (Bots) in Warehouses (531)
        • Warehouse Management System (WMS) (532)
      • Section 13.3 Review Questions (532)
      • 13.4 Delivery to Customers: From Robots to Drones (532)
        • Speeding Up Deliveries: From Same Day to a Few Hours (532)
          • Same- Day Delivery (532)
          • Delivery by Drones (533)
          • Obstacles to Drone Delivery (533)
            • Additional Examples (534)
            • Delivery of Medical Supplies (534)
          • Delivery by Robots (534)
            • Grocery Delivery in Washington DC by Robots (535)
      • Section 13.4 Review Questions (535)
      • 13.5 Problems in Order Fulfillment along Supply Chains (535)
      • Section 13.5 Review Questions (536)
      • 13.6 Solutions for Order Fulfillment Problems Along the Supply Chain (536)
        • Improvements in the Order-Taking Activity (537)
        • Changing the Structure and Process of the Supply Chain (537)
        • Integrated Global Logistics Program (538)
        • Partnering Efforts and Outsourcing Logistics (538)
        • Supply Chain Segmentation (538)
      • Section 13.6 Review Questions (538)
      • 13.7 RFID as a key Enabler in Supply Chain Management (538)
        • The Essentials of RFID (538)
      • Case 13.3: EC Application RFID Supports Macy’s Multichannel Strategy (540)
        • Questions (541)
        • RFID Applications in the Supply Chain Around the Globe (541)
          • RFID at Starbucks (541)
          • RFID at Deutsche Post (Germany) (541)
          • RFID at Atlantic Beef Products (Ontario, Canada) (541)
      • Section 13.7 Review Questions (542)
      • 13.8 Other Order Fulfillment Topics (542)
        • Handling Returns (Reverse Logistics) (542)
        • Order Fulfillment in B2B (543)
          • Using e-Marketplaces and Exchanges to Ease Order Fulfillment Problems in B2B (543)
        • Order Fulfillment in Services (543)
        • Innovative e-Fulfillment Strategies (544)
      • Section 13.8 Review Questions (544)
      • Managerial Issues (544)
      • Summary (545)
      • Key Terms (546)
      • Discussion Questions (546)
      • Topics for Class Discussion and Debates (546)
      • Internet Exercises (547)
      • Team Projects (547)
      • Closing Case: Cross-Border EC (Partnering with Tmall Global) (548)
        • The Problem (548)
        • The Solution (548)
        • The Results (550)
        • Questions (551)
      • References (551)
  • Part V: E-Commerce Strategy and Implementation (553)
    • 14: EC Strategy, Globalization, SMEs, and Implementation (554)
      • Opening Case Telstra Corporation Helps Its Corporate Customers Justify EC Initiatives (554)
        • The Problem (555)
        • The Solution (555)
          • Justifying Video Conferencing (555)
          • Justifying Teleworking (555)
          • Justifying Web Contact Centers (555)
          • Justifying Fleet and Field Force Management (555)
          • Justifying Green Efficiency (556)
        • The Results (556)
      • 14.1 Organizational Strategy: Concepts and Overview (556)
        • Strategy and Performance Cycle (557)
        • Strategy Initiation (558)
          • Core Competencies (558)
          • First-Mover Advantage (558)
        • Strategy Formulation (559)
          • Selecting E-Commerce Opportunities (559)
          • Risk Analysis in Strategy Formulation (559)
          • Collaborative Efforts in Strategy Formulation (559)
          • Pricing Strategy (559)
          • Acquisitions, Partnerships, Joint Venture, and Multi-EC Model Strategy (560)
        • Strategy Implementation (560)
          • E-Commerce and Social Media Strategy Implementation Process (560)
            • Start with a Pilot Project (560)
            • Allocate Resources (560)
            • Manage the Project (561)
          • E-Commerce Strategy Implementation Issues (561)
            • Build, Buy, or Rent EC Elements (561)
            • Outsource: What? When? To Whom? (561)
            • Example: Gartner’s Magic Quadrant (561)
        • Strategy Assessment (561)
        • Performance Improvement and Innovations (562)
          • The Objectives of Assessment (562)
          • The Performance Assessment Process (562)
      • Section 14.1 Review Questions (563)
      • 14.2 Why Justify E-Commerce and Social Media Investments? How Can They Be Justified? (563)
        • Increased Pressure for Financial Justification (563)
        • Other Reasons Why EC and Social Media Justification is Needed (563)
        • EC Investment Categories and Benefits (564)
        • How Is an EC or Social Media Investment Justified? (564)
          • Cost–Benefit Analysis and the Business Case (564)
        • What Needs to Be Justified? When Should Justification Take Place? (564)
        • Using Metrics in EC and Social Media Justification (565)
          • Metrics, Measurements, and Key Performance Indicators (565)
      • Case 14.1: EC Application Aldi Supermarket Trying E-Commerce in the United Kingdom (566)
        • The Problem (566)
        • The Solution (566)
        • The Results (566)
        • Questions (567)
        • Web Analytics (567)
        • The Process of Justifying EC and IT Projects (567)
          • Quantitative or Qualitative Metrics? (567)
      • Section 14.2 Review Questions (567)
      • 14.3 A Strategy for Global E-Commerce and Social Media (568)
        • Benefits and Extent of Global Operations (568)
        • Barriers to Global E-Commerce (568)
          • Cultural Differences (569)
            • Mini Case: Dangdang Inc. (569)
          • Language Translation (569)
            • Machine Translation (569)
          • Legal Issues (570)
          • Geographic Issues and Localization (570)
            • Web Localization (570)
          • Economic and Financial Issues (571)
        • Breaking Down the Barriers to Global E-Commerce (571)
      • Section 14.3 Review Questions (571)
      • 14.4 Strategy for Small- and Medium-Sized Enterprises (572)
      • Case 14.2: EC Application Website Builders (573)
        • The Problem (573)
        • The Solution (573)
        • Questions (573)
        • Globalization and SMEs (573)
        • Resources to Support SME Activities in EC and Social Media (574)
        • SMEs and Social Networks (574)
      • Section 14.4 Review Questions (574)
      • 14.5 The Implementation Landscape (575)
        • The Major Implementation Factors (575)
          • Justification/Economics (575)
          • Acquire or Self-Develop Your E-Commerce or Social Media Management System (575)
          • Organizational Readiness and Impacts of E-Commerce (575)
          • How to Succeed (575)
      • Case 14.3: EC Application E-Commerce Builders (576)
        • The Problem (576)
        • The Solution (576)
        • Questions (576)
          • Using Vendors and Materials (577)
      • Section 14.5 Review Questions (577)
      • 14.6 Development Strategies for E-Commerce and Social Media Projects (577)
        • In-House Development: Insourcing (577)
        • Insourcing with Applications or Tools (578)
          • Advantages and Limitations of Software Solutions (578)
        • Outsourcing Development and Implementation (578)
          • Project Outsourcing Options (578)
      • Case 14.4: EC Application Would You Build an App Online? (579)
        • The Problem (579)
        • The Solution (579)
        • Questions (579)
        • Selecting a Development Option (579)
      • Section 14.6 Review Questions (580)
      • 14.7 Opportunities for Success in E-Commerce and Social Media and Avoiding Failure (580)
        • Factors that Determine E-Commerce and Social Media Success (580)
          • E-Commerce and Social Media Failures (580)
          • E-Commerce and Social Marketing Effectiveness (581)
        • E-Commerce and Social Media Successes (581)
          • Strategies for EC and Social Media Success (582)
            • Additional Guidelines for EC and Social Media Success (582)
        • Cultural Differences in EC and Social Media Successes and Failures (582)
      • Section 14.7 Review Questions (582)
      • Managerial Issues (583)
      • Summary (583)
      • Key Terms (584)
      • Discussion Questions (584)
      • Topics for Class Discussion and Debates (585)
      • Internet Exercises (585)
      • Team Assignments and Projects (585)
      • Closing Case: Battle of the B2C Titans (586)
        • The Leader: Amazon (586)
        • A Competitor: Walmart (586)
        • A Competitor: Alibaba (587)
        • The State of the Market (587)
        • Questions (587)
      • References (587)
    • 15: E-Commerce: Regulatory, Ethical, and Social Environments (590)
      • Opening Case Fake News: The Austin, Texas, Fiasco (591)
        • The Initial Step (591)
        • The Story Goes Viral (591)
        • Further Events (591)
        • False Rumors Spread Much Faster Than True Ones (591)
      • 15.1 Ethical Challenges and Guidelines (592)
        • Ethical Principles and Guidelines (592)
        • Business Ethics (592)
          • The Issues of Internet Abuse in the Workplace (592)
            • Managing Internet Abuse (592)
          • Monitoring Employees: Is It Ethical? (592)
        • EC Ethical and Legal Issues (593)
          • Other Issues (593)
          • Internet Use That Is Not Work Related (593)
      • Section 15.1 Review Questions (593)
      • 15.2 Intellectual Property Law and Copyright Infringement (594)
        • Intellectual Property in E-Commerce (594)
          • Recording Movies, Shows, and Other Events (594)
          • Copyright Infringement and Protection (594)
          • File Sharing (595)
          • Illegal Visits to Torrent, Streaming, and Download Sites (i.e., Piracy) (595)
          • Legal Aspects of Infringement (595)
          • The RIAA Industry Versus the Violators (595)
            • Globalization (595)
          • Digital Rights Management (DRM) (595)
          • Patents (595)
            • Oracle Versus Google (596)
          • Trademarks (596)
        • Protecting Intellectual Property on Websites (596)
      • Section 15.2 Review Questions (597)
      • 15.3 Privacy Rights, Protection, and Free Speech (597)
        • Privacy in E-Commerce (597)
        • Social Networks Changing the Landscape of Privacy and Their Protection (597)
          • Information Pollution and Privacy (598)
          • Global View (598)
        • Privacy Rights and Protection (598)
          • Opt-In and Opt-Out (598)
          • Some Measures of Privacy Protection (599)
        • Free Speech Online Versus Privacy Protection (599)
          • Free Speech Online Versus Child Protection Debate (599)
        • The Price of Protecting an Individual’s Privacy (600)
      • Case 15.1: EC Application School Administrators Used Webcams to Spy on Students at Home (600)
        • Questions (600)
        • The Future of ePrivacy (600)
        • How Information About Individuals Is Collected and Used Online (600)
          • Cookies (601)
          • Spyware as a Threat to Privacy and Intellectual Property (601)
          • RFID’s Threat to Privacy (601)
          • Monitoring Employees (601)
          • Other Methods (602)
        • Privacy Protection by Information Technologies (602)
          • Privacy Policies and Regulations (602)
        • Privacy Issues in Web 2.0 Tools and Social Networks (602)
          • Presence, Location-Based Systems, and Privacy (602)
        • Privacy Protection by Ethical Principles (603)
          • Government Spying on Its Citizens (603)
          • P3P Privacy Platform (603)
        • Privacy Protection in Countries Other Than the United States (603)
      • Section 15.3 Review Questions (604)
      • 15.4 Other EC Legal Issues (604)
        • Selected Legal and Regulatory Environment: E-Discovery and Cyberbullying (604)
          • E-Discovery (604)
          • E-Discovery and Social Networks (604)
            • EDRM (604)
          • Cyberbullying (605)
          • Top 10 Internet and EC Legal Issues in 2016 (605)
          • A Sample of Other Issues (606)
            • Drivers of EC and Internet Laws (606)
          • A Final Note (606)
      • Section 15.4 Review Questions (606)
      • 15.5 Fake Content on the Web (607)
        • Fake News (607)
          • Google and Facebook Actions (607)
        • Other Fake Content Types and Activities on the Internet (607)
        • Internet Trolls (607)
          • Types of Trolls (608)
          • Controlling Trolls (608)
        • Difficulties Controlling Fake Content (608)
          • Controlling Fake Content (608)
          • What to Do When There Is Fake Content About Your Company? (608)
        • Tips for Analyzing and Dealing with Various Types of Fake News (609)
      • Section 15.5 Review Questions (609)
      • 15.6 Public Policy, Taxation, and Political Environments (610)
        • Net Neutrality (610)
        • Taxation of EC Transactions in the United States (610)
        • Internet Censorship by Countries (611)
      • Section 15.6 Review Questions (611)
      • 15.7 Societal Issues and Green EC (611)
        • The Digital Divide (612)
          • Overcoming the Digital Divide (612)
        • Telecommuting (612)
        • Does EC Increase Unemployment? (613)
          • Automation and Job Losses (613)
          • The Current Automation Impact (613)
          • So What Can Be Done? (613)
        • Green EC and IT (613)
          • Operating Greener Businesses, Eco-friendly Data Centers, and Cloud Computing (613)
          • How to Operate Greener Businesses, Data Centers, and Supply Chains (614)
          • Global Green Regulations (615)
          • The Electronic Product Environmental Assessment Tool (615)
        • Other Societal Issues (615)
          • Education (615)
          • Public Safety, Surveillance, and Homeland Security (615)
          • Health Aspects (615)
      • Section 15.7 Review Questions (616)
      • 15.8 The Future of E-Commerce (616)
        • Some Key Factors for the Future of E-Commerce (616)
        • New Trends That Are Shaping the Future of B2C (617)
          • The B2C Road to 2016 (617)
        • The Future of B2B (617)
          • Zorzini’s List of Trends for 2016 and Beyond (617)
          • Other Predictions (618)
        • Integrating the Marketplace with the Marketspace (618)
        • M-Commerce (618)
        • Social Commerce (618)
        • Future Technological Trends that May Accelerate the Speed of E-Commerce (619)
        • Future Trends That Are Limiting the Spread of EC (619)
        • Consumer Behavior (619)
        • Conclusion (619)
        • Enjoy Some Interesting Videos About the Future of E-Commerce (620)
          • L’Oréal of Paris (620)
          • Chatbots (620)
      • Section 15.8 Review Questions (620)
      • Managerial Issues (620)
      • Summary (621)
      • Key Terms (622)
      • Discussion Questions (622)
      • Topics for Class Discussion and Debates (623)
      • Internet Exercises (624)
      • Team Assignments and Projects (624)
      • Closing Case: The Pirate Bay and the Future of File Sharing (625)
        • An Overview (625)
        • The Legal Situation (625)
        • Current Operation (625)
        • Discussion (626)
        • Questions (626)
      • References (627)
  • Glossary (630)
  • Index (642)
Loading...