Please enable javascript in your browser.
Page
of
0
Electronic commerce 2018 a managerial and social networks perspective
Turban, Efraim
Cataloging brief
Electronic commerce 2018 a managerial and social networks perspective
Author :
Turban, Efraim
Publisher :
Springer International Publishing AG
Pub. Year :
2018
Subjects :
Electronic commerce Electronic commerce Management Management information systems
Call Number :
HF 5548 .32 .T86 2018
Find in content
sort by
page number
page score
Bookmark
Preface
(5)
What’s New in This Edition?
(5)
New Chapters
(5)
New Topics
(6)
New Cases
(6)
New Coauthor
(6)
The Book’s Learning Objectives (Learning Outcomes)
(6)
Features of This Book
(7)
Most Comprehensive EC Textbook
(7)
Managerial Orientation
(7)
Experienced Coauthors and Contributors
(7)
Real-World Orientation
(7)
Solid Theoretical Background and Research Suggestions
(8)
Most Up-to-Date and Current Topics
(8)
Social Media and Commerce
(8)
Integrated Systems
(8)
Global Perspective
(8)
Small- and Middle-Sized Companies
(8)
The Public Sector
(8)
Interdisciplinary Approach
(9)
EC Failures and Lessons Learned
(9)
Online Tutorials
(9)
User-Friendliness
(9)
Links, Links, Links, and References
(9)
Other Outstanding Features
(9)
Organization of the Book
(10)
Part 1: Introduction to e-Commerce and e-Marketplaces
(10)
Part 2: E-Commerce Applications
(10)
Part 3: Emerging EC Platforms
(10)
Part 4: EC Support Services
(10)
Part 5: E-Commerce Strategy and Implementation
(11)
Learning Aids
(11)
Supplementary Materials
(12)
Companion Website: affordable-ecommerce-textbook.com
(12)
Content Contributors
(12)
Acknowledgments
(12)
Reviews
(12)
Contents
(13)
Part I: Introduction to E-Commerce and E-Marketplaces
(29)
1: Overview of Electronic Commerce
(30)
Opening Case How Starbucks Is Changing to a Digital and Social Enterprise
(31)
The Problem
(31)
The Solution: Going Digital and Social
(31)
The Electronic Commerce Initiatives
(31)
Online Store
(31)
The eGift Card Program
(31)
Loyalty Program
(31)
Mobile Payments
(32)
Social Media Projects
(32)
Exploiting Collective Intelligence
(32)
Starbucks’ Activities on Facebook
(32)
Starbucks’ Presence on LinkedIn and Google+
(32)
Starbucks’ Activities on Twitter
(32)
Starbucks’ Activities on YouTube, Flickr, Pinterest, and Instagram
(32)
Starbucks Digital Network
(33)
Global Activities
(33)
Early Adoption of Foursquare: A Failure
(33)
The Results
(33)
1.1 Electronic Commerce: Definitions and Concepts
(34)
Defining Electronic Commerce
(34)
Defining e-Business
(34)
Major EC Concepts
(34)
Pure Versus Partial EC
(34)
EC Organizations
(35)
Cyberspace
(35)
Electronic Markets and Networks
(35)
Section 1.1 Review Questions
(35)
1.2 The Electronic Commerce Field: Growth, Content, Classification, and a Brief History
(35)
The Content and Framework of e-Commerce
(35)
An EC Framework
(36)
Classification of EC by the Nature of the Transactions and the Relationships Among Participants
(36)
Business-to-Business (B2B)
(37)
Business-to-Consumer (B2C)
(37)
Consumer-to-Business (C2B)
(37)
Intrabusiness EC
(38)
Business-to-Employees (B2E)
(38)
Drop-shipping
(38)
Consumer-to-Consumer (C2C)
(38)
Collaborative Commerce
(38)
e-Government
(38)
A Brief History of EC
(39)
The Global Nature of EC
(39)
The Interdisciplinary Nature of EC
(39)
The Google Revolution
(39)
Cyber Monday, Singles’ Day, and Prime Day
(39)
Social Commerce
(39)
EC Failures
(40)
EC Successes
(40)
Case 1.1: EC Application
(40)
The Opportunity
(40)
The Solution
(40)
The Results
(41)
Questions
(41)
Section 1.2 Review Questions
(42)
1.3 Drivers and Benefits of e-Commerce
(42)
The Drivers of e-Commerce
(42)
The Benefits of e-Commerce
(42)
Opportunities for Entrepreneurs
(42)
EC as a Provider of Efficiency, Effectiveness, and Competitive Advantage
(43)
Section 1.3 Review Questions
(43)
1.4 Social Computing and Commerce
(44)
Social Computing
(44)
Web 2.0
(44)
Social Media
(44)
The Difference Between Social Media and Web 2.0
(44)
Social Networks and Social Networking Services
(45)
Social Networking Services
(45)
Social Networking
(45)
Enterprise Social Networks
(45)
Social Commerce
(45)
The Major Tools of Web 2.0
(47)
Section 1.4 Review Questions
(47)
1.5 The Digital and Social Worlds: Economy, Enterprises, and Society
(47)
The Digital Economy
(47)
Sharing Economy
(47)
Sharing Economy and e-Commerce
(48)
The Social Impact
(48)
The Apps Society
(48)
The Digital Enterprise
(48)
The Social Business (Enterprise)
(49)
The Social Business Forum’s Definition
(49)
IBM’s Approach
(50)
The Social Enterprise
(50)
The Digital Revolution and Society
(50)
Some Impacts of the Digital and Social Worlds
(51)
Disruptive Impacts of e-Commerce
(51)
The Social Customer
(51)
Section 1.5 Review Questions
(52)
1.6 Electronic Commerce Business Models
(52)
The Structure and Properties of Business Models
(53)
Revenue Models
(54)
Innovative Revenue Models for Individuals
(54)
Value Proposition
(54)
Functions of a Business Model
(55)
Typical EC Business Models
(55)
Classification of Business Models in e-Commerce
(55)
Section 1.6 Review Questions
(56)
1.7 The Limitations, Impacts, and the Future of e-Commerce
(56)
The Limitations and Barriers of EC
(56)
Ethical Issues
(56)
Overcoming the Barriers
(57)
Why Study e-Commerce?
(57)
The Future of EC
(57)
Section 1.7 Review Questions
(58)
1.8 Overview of This Book
(58)
Part I: Introduction to e-Commerce and e-Marketplaces
(58)
Part II: EC Applications
(58)
Part III: Emerging EC Delivery Platforms
(58)
Part IV: EC Support Services
(59)
Part V: EC Strategy and Implementation
(59)
Online Mini Tutorials
(59)
Managerial Issues
(60)
Summary
(60)
Key Terms
(61)
Discussion Questions
(62)
Topics for Class Discussion and Debates
(62)
Internet Exercises
(62)
Team Assignment and Projects
(63)
Closing Case: e-Commerce at the National Football League (NFL)
(63)
Selling Online
(64)
Selling in China
(64)
Information, News, and Social Commerce
(64)
Videos and Fantasy Games
(64)
Smartphone Experience
(64)
Wireless Applications in Stadiums
(64)
Other Applications
(65)
Questions
(65)
References
(65)
2: E-Commerce: Mechanisms, Platforms, and Tools
(67)
Opening Case Pinterest A New Kid on the E-Commerce Block
(68)
The Opportunity
(68)
The Solution
(68)
The Business and Revenue Models
(68)
Marketing Models
(68)
Selling Data for Market Research and Analysis
(68)
Other Suggestions for Doing Business on Pinterest
(68)
Using Pinterest for Advertising and Marketing
(69)
Results and Managerial Issues
(69)
Legal Concerns
(69)
The Competition
(69)
Conclusion
(69)
2.1 Electronic Commerce Mechanisms: An Overview
(70)
EC Activities and Support Mechanisms
(70)
The Online Purchasing Process
(70)
Section 2.1 Review Questions
(70)
2.2 E-Marketplaces
(70)
Electronic Markets
(71)
The Components and Participants in E-Marketplaces
(72)
Disintermediation and Reintermediation
(73)
Case 2.1: EC Application Blue Nile Inc.: Change and Adaptation in the Online Jewelry Industry
(73)
Changing the Industry
(73)
Adapting to the Market
(73)
Questions
(74)
Types of E-Marketplaces
(74)
Private E-Marketplaces
(74)
Public E-Marketplaces
(74)
Section 2.2 Review Questions
(74)
2.3 Customer Shopping Mechanisms: Webstores, Malls, and Portals
(75)
Webstores
(75)
Microsites
(75)
Electronic Malls
(75)
Web (Information) Portals
(75)
Types of Portals
(75)
The Roles and Value of Intermediaries in E-Marketplaces
(77)
Brokers
(77)
Distributors in B2B
(77)
Section 2.3 Review Questions
(77)
2.4 Merchant Solutions: Electronic Catalogs, Search Engines, and Shopping Carts
(77)
Electronic Catalogs
(77)
EC Search Activities, Types, and Engines
(78)
Types of EC Searches
(78)
Search Engines
(78)
Voice-Powered Search
(78)
Video and Mobile Search
(79)
Mobile Search
(79)
Visual Shopping Search Engine
(79)
Social Network Search Engines
(79)
Shopping Carts
(79)
Product Configuration (Self-Customization)
(79)
Questions and Answers Online
(79)
Section 2.4 Review Questions
(80)
2.5 Auctions, Bartering, and Negotiating Online
(80)
Definition and Characteristics
(80)
Dynamic Pricing
(80)
Traditional Auctions Versus E-Auctions
(80)
Limitations of Traditional Offline Auctions
(80)
Electronic Auctions
(81)
Types of Auctions
(81)
One Buyer, One Seller
(81)
One Seller, Many Potential Buyers
(81)
One Buyer, Many Potential Sellers
(81)
Reverse Auctions
(81)
The Name-Your-Own-Price Model
(82)
Many Sellers, Many Buyers
(82)
Penny Auctions
(82)
Benefits of E-Auctions
(82)
Limitations of E-Auctions
(83)
Minimal Security
(83)
Possibility of Fraud
(83)
Limited Participation
(83)
Online Bartering
(83)
Online Negotiating
(84)
Section 2.5 Review Questions
(84)
2.6 Virtual Communities and Social Networks
(84)
Characteristics of Traditional Online Communities and Their Classification
(84)
Classifications of Virtual Communities
(85)
Public Versus Private Communities
(85)
Classification Categories
(85)
Social Networking Service (Sites)
(85)
A Definition and Basic Information
(85)
A Global Phenomenon
(85)
Representative Capabilities and Services Provided by Social Networking Sites
(86)
Business-Oriented Public Social Networks
(86)
Some Capabilities of Business-Oriented Networks
(86)
Case 2.2: EC Application Craigslist: The Ultimate Online-Classified Community
(87)
Concerns About Craigslist
(87)
Private (or Enterprise) Social Networks
(88)
Business Models and Services Related to Social Networking
(88)
Mobile Social Commerce
(88)
Mobile Social Networking
(88)
Mobile Enterprise Networks
(89)
Examples of Social Mobile Commerce Applications
(89)
Recent Innovative Tools and Platforms for Social Networking
(89)
Mobile Community Activities
(90)
Section 2.6 Review Questions
(90)
2.7 Emerging EC Platforms: Augmented Reality and Crowdsourcing
(90)
Augmented Reality
(90)
Applications in E-Commerce
(90)
Applications in Social Gaming
(91)
Virtual Reality (VR)
(91)
Comparing AR and VR
(91)
Crowdsourcing
(91)
Definitions and Major Concepts
(91)
The Process of Crowdsourcing
(92)
Benefits of Crowdsourcing
(93)
Section 2.7 Review Questions
(93)
2.8 The Future: Web 3.0, Web 4.0, and Web 5.0
(93)
Web 3.0: What Does the Future Hold?
(94)
Web 3.0 and the Semantic Web
(94)
Concerns
(94)
The Technological Environment
(95)
Web 4.0
(95)
Web 5.0
(95)
Section 2.8 Review Questions
(95)
Managerial Issues
(95)
Summary
(96)
Key Terms
(97)
Discussion Questions
(98)
Topics for Class Discussion and Debates
(98)
Internet Exercises
(98)
Team Assignments and Projects
(99)
Closing Case: Driving Customer Engagement with Augmented Reality at Tesco
(100)
The Problem
(100)
The Solution
(100)
The Results
(100)
Questions
(100)
References
(101)
Part II: E-Commerce Applications
(103)
3: Retailing in Electronic Commerce: Products and Services
(104)
Opening Case Amazon.com—E-Commerce Innovator
(105)
The Problem
(105)
The Solution: Innovations and Reaching Out to Customers
(105)
Making Buying Easier
(105)
Creating New Customers
(105)
New Products and Services
(106)
The Results
(106)
3.1 Internet Marketing and B2C Electronic Retailing
(107)
Overview of Electronic Retailing
(107)
Size and Growth of the B2C Market
(107)
Developments in B2C E-Commerce
(108)
Characteristics and Advantages of Successful E-Tailing
(108)
Advantages of E-Tailing
(109)
Section 3.1 Review Questions
(109)
3.2 E-Tailing Business Models
(110)
Classification of Models by Distribution Channel
(110)
Direct Marketing by Mail-Order Companies
(111)
Direct Sales by Manufacturers and Make to Order
(111)
Virtual (Pure-Play) E-Tailers
(111)
Drop-Shipping
(111)
Click-and-Mortar Retailers and Multichanneling
(111)
Convergence and Omnichannel
(112)
Retailing in Online Malls
(112)
Referring Directories
(112)
Malls with Shared Services
(112)
Other B2C Models and Special Retailing
(112)
B2C Social Shopping
(113)
Flash Deals (Deals of the Day)
(113)
Online Group Buying
(113)
Personalized Event Shopping
(113)
Private Shopping Clubs
(113)
Group Gifting Online
(113)
Location-Based E-Commerce
(113)
Drop-Shipping
(113)
The Process of Drop-Shipping
(113)
The Participants in the Process
(114)
The Benefits of Drop-Shipping
(115)
The Disadvantages of Drop-Shipping
(115)
Some Suggestions for Implementation
(115)
Section 3.2 Review Questions
(116)
3.3 Online Travel and Tourism (Hospitality) Services
(116)
Characteristics of Online Travel
(116)
Services Provided
(116)
Using Mobile Devices
(117)
Social Travel Networks
(117)
Case 3.1: EC Application Zillow—Unique Tools For the Real Estate Marketplace
(118)
Questions
(118)
Benefits, Limitations, and Competition in Online Travel Services
(118)
Competition in Online Travel
(118)
Corporate Travel
(119)
Section 3.3 Review Questions
(119)
3.4 Employment and the Online Job Market
(119)
The Internet Job Market
(119)
Online Job Markets on Social Networks
(120)
Global Online Portals for Job Placement
(121)
Benefits and Limitations of the Electronic Job Market
(121)
Section 3.4 Review Questions
(121)
3.5 Online Real Estate, Insurance, and Stock Trading
(122)
Real Estate Online
(122)
Zillow, Craigslist, and Other Web 2.0 Real Estate Services
(122)
Insurance Online
(122)
Online Stock Trading and Investments
(123)
Section 3.5 Review Questions
(124)
3.6 Online Banking and Personal Finance
(124)
E-Banking
(124)
Online Banking Capabilities
(124)
Pure Virtual Banks
(125)
P2P Lending
(125)
Case 3.2: EC Application Security for Online Bank Transactions
(125)
Questions
(126)
Risks
(126)
Online Billing and Bill Paying
(126)
Taxes
(127)
Mobile Banking
(127)
Section 3.6 Review Questions
(127)
3.7 On-Demand Delivery of Products, Digital Items, Entertainment, and Gaming
(127)
On-Demand Delivery of Products
(127)
Speed of Delivery
(128)
Online Delivery of Digital Products, Entertainment, and Media
(128)
Online Entertainment
(128)
iTunes
(128)
Online Ticketing
(129)
Internet TV and Internet Radio
(129)
Internet TV
(129)
Internet Radio
(129)
Pandora Radio
(129)
Social Television (TV)
(129)
Characteristics of Social TV
(130)
Adult Entertainment
(130)
Internet Gaming
(130)
Legal Aspects
(130)
Section 3.7 Review Questions
(130)
3.8 Online Purchasing Decision Aids
(131)
Shopping Portals
(131)
Price and Quality Comparison by Shopbot Software Agents
(131)
Google Enterprise Search and Enterprise Search Appliance
(131)
“Spy” Services
(131)
Ratings, Reviews, and Recommendation Sites
(131)
Comparison Shopping Websites
(132)
Social Network Influence
(132)
Trust Verification Sites
(132)
Concerns About Reviews, Ratings, and Recommendations
(133)
Other Shopping Assisting Tools
(133)
Aggregators
(134)
Digital Coupons
(134)
Self-Service
(134)
Section 3.8 Review Questions
(134)
3.9 The New Face of Retail Competition: Retailers Versus E-Tailers
(134)
The Online Versus Offline Competition: An Overview
(134)
Global Competition
(135)
Retailers Versus E-Tailers
(135)
Convergence and Omnichannel
(135)
Examples of Click-and-Brick Retailers
(136)
Other Strategies
(136)
What Can Traditional Retailers Do?
(136)
Can Small Businesses Survive?
(136)
Going Global
(137)
Conclusion
(137)
Section 3.9 Review Questions
(137)
3.10 Issues in E-Tailing and Lessons Learned
(137)
Disintermediation and Reintermediation
(137)
Resistance to Change
(137)
Channel Conflict
(138)
Product and Service Customization and Personalization
(138)
Lessons Learned from Failures and Lack of Success of E-Tailers
(139)
Section 3.10 Review Questions
(139)
Managerial Issues
(139)
Summary
(140)
Key Terms
(141)
Discussion Questions
(142)
Topics for Class Discussion and Debates
(142)
Internet Exercises
(143)
Team Assignments and Projects
(143)
Closing Case: Etsy—A Social-Oriented B2C Marketplace
(145)
The Company’s Mission
(145)
The Community
(145)
The Business and Revenue Models
(145)
Competition
(145)
Conclusion
(146)
Questions
(146)
References
(146)
4: Business-to-Business E-Commerce
(148)
Opening Case Alibaba.Com—The World’s Largest B2B Marketplace
(149)
The Opportunity
(149)
The Solution
(149)
The Database
(150)
Community Services
(150)
The Competition
(151)
The Results
(151)
4.1 Concepts, Characteristics, and Models of B2B E-Commerce
(151)
Basic B2B Concepts and Process
(151)
The Basic Types of B2B Transactions and Activities
(152)
The Basic Types of B2B E-Marketplaces and Services
(153)
One-to-Many and Many-to-One: Private E-Marketplaces
(153)
Many-to-Many: Public Exchanges (or E-Marketplaces)
(153)
Supply Chain Improvers and Collaborative Commerce
(153)
Collaboration
(153)
Market Size and Content of B2B
(153)
B2B Components
(155)
Parties to the Transaction: Sellers, Buyers, and Intermediaries
(155)
Types of Materials Traded: What Do Firms Buy?
(155)
B2B Marketplaces and Platforms
(155)
Online Service Industries in B2B
(156)
The Benefits and Limitations of B2B
(157)
Section 4.1 Review Questions
(157)
4.2 B2B Marketing: Sell-Side E-Marketplaces
(158)
Sell-Side Models
(158)
B2B Sellers
(158)
Sales from Catalogs: Webstores
(158)
Distributors’ Catalogs
(159)
Self-Service Portals
(159)
Benefits and Limitations of Online Sales from Catalogs
(159)
Comprehensive Sell-Side Systems
(159)
Selling Via Distributors and Other Intermediaries
(160)
Section 4.2 Review Questions
(160)
4.3 Selling Via E-Auctions
(160)
The Benefits of Auctions on the Sell Side
(160)
Auctioning from the Company’s Own Site
(161)
Using Intermediaries in Auctions
(161)
Examples of B2B Forward Auctions
(161)
Section 4.3 Review Questions
(161)
4.4 One-From-Many: E-Procurement at Buy-Side E-Marketplaces
(162)
Inefficiencies in Traditional Procurement Management
(162)
Procurement Methods
(163)
E-Procurement Concepts
(164)
The Goals and Process of E-Procurement
(164)
Types of E-Procurement
(164)
The Benefits and Limitations of E-Procurement
(164)
The Benefits of E-Procurement
(165)
The Limitations and Challenges of E-Procurement
(166)
Section 4.4 Review Questions
(166)
4.5 Reverse Auctions at Buy -Side E-Marketplaces (E-Tendering)
(166)
The Major Benefits of Reverse Auctions
(166)
Conducting Reverse Auctions
(167)
Case 4.1: EC Application Amazon Enters the B2B Market
(167)
The Problem
(168)
The Solution
(168)
The Results
(168)
Questions
(168)
E-Tendering by Governments
(168)
Group Reverse Auctions
(168)
Section 4.5 Review Questions
(169)
4.6 Other E-Procurement Methods
(169)
Desktop Purchasing
(169)
Group Purchasing
(169)
Internal Aggregation of Purchasing Orders
(169)
External Aggregation for Group Purchasing
(169)
Buying from Other Sources
(170)
Acquisition Via Electronic Bartering
(170)
Selecting an Appropriate E-Procurement Solution
(171)
Section 4.6 Review Questions
(171)
4.7 B2B Exchanges (E-Marketplaces): Definitions and Concepts
(171)
Global Exchanges
(171)
Functions of and Services Provided by Exchanges
(171)
Functions and Services of B2B Exchanges
(172)
Ownership of B2B Exchanges
(173)
Third-Party Independent Exchanges
(173)
Consortium Trading Exchanges (CTE)
(174)
Dynamic Pricing in B2B Exchanges
(174)
Advantages, Limitations, and the Revenue Model of Exchanges
(174)
Revenue Models
(175)
Section 4.7 Review Questions
(175)
4.8 B2B in Web 2.0 and Social Networking
(175)
E-Communities in B2B
(175)
The Opportunities of Social Commerce in B2B
(176)
The Use of Web 2.0 Tools in B2B
(176)
B2B Games (Gamification)
(177)
Virtual Trade Shows and Trade Fairs
(177)
Social Networking in B2B
(177)
Using Twitter in B2B
(177)
Examples of Other Activities of B2B Social Networks
(178)
Success Stories
(178)
The Future of B2B Social Networking
(178)
Convergence of B2B, B2C, and Social Networking
(178)
Case 4.2: EC Application: E-Procurement in Healthcare
(178)
The Problem
(179)
The Solution
(179)
The Results
(179)
Section 4.8 Review Questions
(179)
4.9 Collaborative Commerce
(180)
Essentials of Collaborative Commerce
(180)
The Elements and Processes of C-Commerce
(180)
Collaboration Hubs
(180)
Improving Collaborative Commerce
(180)
Representative Examples of Collaborative Commerce
(181)
Vendor-Managed Inventory Systems
(181)
Retailer–Supplier Collaboration
(182)
Reducing Transportation and Inventory Costs
(182)
Reduction of Design Cycle Time
(182)
Elimination of Channel Conflict: Collaboration with Dealers and Retailers
(182)
Social Collaboration
(183)
Barriers to C-Commerce
(183)
Overcoming Barriers to C-Collaboration
(183)
Collaboration Processes and Software
(183)
Section 4.9 Review Questions
(183)
Managerial Issues
(183)
Summary
(185)
Key Terms
(186)
Discussion Questions
(187)
Topics for Class Discussion and Debates
(187)
Internet Exercises
(188)
Team Assignments and Projects
(188)
Closing Case: Maybelline Uses Collaborative Commerce to Manage Distribution
(189)
The Problem
(190)
The Solution
(190)
The Results
(190)
References
(190)
5: Innovative EC Systems: From E-Government to E-Learning, E-Health, Sharing Economy, and P2P Commerce
(192)
Opening Case E-Government in Estonia
(192)
The Problem
(193)
The Solution
(193)
Sample Applications (per Kwang 2017a)
(193)
The Results
(194)
5.1 Digital Government: An Overview
(194)
Definition and Scope
(194)
Government-to-Citizens
(195)
Electronic Voting
(196)
Hackable Elections
(196)
Electronic Benefits Transfer
(197)
Government-to-Business
(197)
Government E-Procurement
(197)
Group Purchasing
(198)
Forward and Reverse E-Auctions
(198)
Government-to-Government
(198)
Government-to-Employees and Internal Efficiency and Effectiveness
(198)
Government-to-Employees (G2E)
(198)
Internal Efficiency and Effectiveness (IEE)
(198)
Implementing E-Government
(199)
The Transformation to E-Government
(199)
E-Government 2.0 and Social Media and Networking
(199)
The Potential of E-Government 2.0 (Social Media)
(200)
M-Government
(200)
Smart Cities
(200)
The Benefits of M-Government
(200)
Some Implementation Issues
(201)
Cutting-Edge Technologies in e-Government
(201)
Artificial Intelligence (AI) Applications
(201)
Virtual Advisors
(201)
Chatbots
(201)
Virtual Reality and Augmented Reality
(201)
How Chatbots Will Affect Government
(201)
Other Areas
(202)
Section 5.1 Review Questions
(202)
5.2 E-Learning, E-Training, and E-Books
(202)
The Basics of E-Learning: Definitions and Concepts
(203)
Benefits and Drawbacks of E-Learning
(203)
Benefits of E-Learning
(203)
Drawbacks and Challenges of E-Learning
(204)
Distance Learning and Online Universities
(205)
Virtual Universities: Real Degrees
(205)
Innovations in E-Learning
(205)
Online Corporate Training
(206)
Using Computer Games for Training Current and New Employees
(206)
M-Learning
(206)
Social Networks and E-Learning
(207)
Some Recent Technology Support of E-Learning
(207)
Visual Interactive Simulation
(207)
Robotics, Chatbots, Telepreser, Robots, and More
(208)
Using Chatbots
(208)
Recent Technologies
(208)
Virtual Assistants
(208)
E-Learning Management Systems
(208)
Electronic Books (E-Books)
(209)
Devices for Reading E-Books
(210)
Combining E-Readers and Tablets
(210)
Advantages and Limitations of E-Books
(210)
A Final Note: Is This the End of Printed Books?
(211)
Section 5.2 Review Questions
(211)
5.3 E-Health
(211)
Definition
(211)
Electronic Medical Record Systems (EMR)
(212)
Doctors’ System
(212)
Patient Services
(212)
Social Media and Commerce
(212)
Medical Devices and Patient Surveillance
(212)
Medical Research
(213)
Administrative Purposes
(213)
Section 5.3 Review Questions
(213)
5.4 Digital Disruption and Sharing Economy Models: Ride and Accommodation Sharing
(213)
Digital Disruption: An Introduction
(213)
Dealing with Disruptive Forces
(214)
Disruptive Companies and Technologies
(214)
Sharing Economy
(214)
Ride (Transportation) Sharing
(214)
Accommodation Sharing
(215)
Free Home Sharing
(215)
Section 5.4 Review Questions
(215)
5.5 Person-to-Person Electronic Commerce Models
(215)
E-Commerce: P2P Applications
(216)
P2P Auctions
(216)
Selling and Buying in P2P
(216)
Peer-to-Peer Money Lending
(216)
Lending Club Is the Largest Commercial Marketplace for P2P Lending
(216)
Case 5.1: EC Application The Lending Club Corp.
(216)
The Business Model
(217)
The Revenue Model
(217)
The Secondary Market
(217)
Problems Faced by Lending Club
(217)
Conclusion
(217)
Questions
(217)
Selling via Classified Ads
(218)
Personal Services Online
(218)
Vacation (Short-Term) Rentals
(218)
Case 5.2: EC Application Airbnb: An E-Commerce Disruption in the Hospitality Industry
(218)
Questions
(219)
File-Sharing Utilities: Napster and Others
(219)
P2P Activities in Social Networks and Trading Virtual Properties
(219)
Section 5.5 Review Questions
(219)
Managerial Issues
(220)
Summary
(220)
5.6 Key Terms
(221)
Discussion Questions
(222)
Topics for Class Discussion and Debates
(222)
Internet Exercises
(222)
Team Assignments and Projects
(223)
Closing Case: Henry Ford Health System Provides Superior Patient Experience Using It and E-Commerce
(224)
The Challenges
(224)
The Solution
(224)
The Results
(224)
References
(225)
Part III: Emerging EC Platforms
(227)
6: Mobile Commerce and the Internet of Things
(228)
Opening Case Hertz Goes Mobile All the Way
(229)
The Problem
(229)
The Solution
(229)
The Results
(230)
6.1 Mobile Commerce: Concepts, Landscape, Attributes, Drivers, Applications, and Benefits
(230)
Basic Concepts, Magnitude, and the Landscape
(231)
The Magnitude of M-Commerce
(231)
The Landscape of M-Commerce
(231)
Mobile and Social: A Powerful EC Combination
(231)
The Attributes of M-Commerce
(232)
An Overview of the Applications of M-Commerce
(233)
The Benefits of M-Commerce
(234)
Benefits for Organizations
(234)
Benefits for Individuals and Customers
(235)
Benefits to Society
(235)
Mobile Commerce Trends
(235)
Section 6.1 Review Questions
(236)
6.2 The Enabling Infrastructure: Components and Services of Mobile Computing
(236)
Overview of Mobile Computing
(236)
Mobile Devices
(236)
Smartphones
(236)
Tablets
(237)
Wearable Devices
(237)
Radio-Frequency Identification (RFID)
(237)
Mobile Computing Software and Services
(237)
Mobile Portals and Content Providers
(237)
Short Message Service
(237)
Multimedia Messaging Services (MMS)
(238)
The Internet of Things (IoT)
(238)
Location-Based Services
(238)
Voice-Support Services
(238)
IVR Systems
(238)
Intelligent Personal Assistants and Robo-advisors
(238)
Voice Portals
(238)
Other Mobile Devices
(239)
Mobile Apps
(239)
Mobile Apps and Their Management
(239)
Putting It All Together
(239)
Section 6.2 Review Questions
(240)
6.3 Mobile Banking and Financial Applications
(240)
Mobile Banking
(240)
Mobile Banking Apps
(240)
Internet-Only Banks
(241)
Selecting a Bank
(241)
Bank of Internet USA (BOFI)
(241)
Using Cutting Edge Technologies in Mobile Banking
(241)
Other Mobile Finance Applications
(241)
Mobile Stock Trading
(242)
Real Estate Mobile Applications
(242)
Section 6.3 Review Questions
(242)
6.4 Mobile Enterprise Solutions: From Supporting the Workforce to Improving Internal Operations
(242)
Defining Mobile Enterprise (Enterprise Mobility)
(242)
A Working Definition of Mobile Enterprise
(243)
The Framework and Content of Mobile Enterprise Applications
(243)
Mobile Workers
(243)
Mobile CRM
(243)
Using Messaging in CRM
(243)
Other Enterprise Mobile Applications
(243)
Transportation Management
(244)
Trends for 2015 And Beyond
(244)
Enterprise Mobility 2017
(244)
Section 6.4 Review Questions
(244)
6.5 Mobile Entertainment, Gaming, Consumer Services, and Mobile Marketing
(244)
Overview of Mobile Entertainment
(244)
Mobile Streaming Music and Video Providers
(245)
Entertainment in Cars
(245)
Mobile Games
(245)
Hurdles for Growth
(246)
Mobile Gambling
(246)
Mobility and Sports
(246)
Service Industry Consumer Applications
(247)
Healthcare
(247)
Hospitality Management: Hotels, Resorts, and Restaurants
(247)
Tablets and Other Mobile Devices in Restaurants
(247)
Other Industries
(248)
Mobile Marketing: Shopping and Advertising
(248)
Mobile Shopping
(248)
Mobile Advertising
(249)
Section 6.5 Review Questions
(249)
6.6 Location-Based Commerce
(250)
Basic Concepts in L-Commerce
(250)
L-Commerce Infrastructure
(250)
Geolocation
(252)
The GPS: Positioning Component
(252)
Location-Based Data
(252)
Using Data Collections
(252)
Locating Customers in Physical Stores
(252)
Geographical Information Systems
(253)
Location-Based Services and Applications
(253)
Four Labs, Inc. and Swarm
(253)
Personnel Tracking
(254)
Social Location-Based Marketing
(254)
Location-Based Applications 2016
(254)
Foursquare and Swarm
(254)
GasBuddy
(254)
Waze
(254)
Glympse
(254)
Dark Sky
(254)
Happn
(254)
Trigger
(255)
Barriers to Location-Based M-Commerce
(255)
The Viability of LBC
(255)
Section 6.6 Review Questions
(255)
6.7 Ubiquitous (Pervasive) Computing
(255)
Overview of Ubiquitous Computing
(255)
Definitions and Basic Concepts
(256)
The Internet of Things (IoT)
(256)
Context-Aware Computing
(256)
From Theory to Practice
(256)
Smart Meters and Grids
(256)
Implementation Issues in Ubiquitous Computing
(257)
Section 6.7 Review Questions
(258)
6.8 Wearable Computing and Smart Gadgets: Watches, Fitness Trackers, and Smart Glasses
(258)
Wearable Computing Applications and Devices
(258)
Sensors
(258)
Enterprise Wearables
(258)
State of the Art
(259)
Smartwatches
(259)
Fitness (Activity) Trackers
(259)
Digital (Smart) Glasses
(259)
Google Glasses
(260)
Augmented Reality Glasses
(260)
Section 6.8 Review Questions
(260)
6.9 Implementation Issues in Mobile Commerce: From Security and Privacy to Barriers to M-Commerce
(260)
M-Commerce Security and Privacy Issues
(261)
Privacy
(261)
Technological Barriers to M-Commerce
(261)
Failures in Mobile Computing and M-Commerce
(261)
Ethical, Legal, Privacy, and Health Issues in M-Commerce
(262)
Enterprise Mobility Management
(262)
The BYOD Issue
(262)
Build (or Bring) Your Own App (BYOA)
(262)
Everything “On-Demand” via Mobile Apps
(263)
Other Managerial Issues
(263)
Conclusion
(263)
Section 6.9 Review Questions
(263)
Managerial Issues
(263)
Summary
(264)
Key Terms
(265)
Discussion Questions
(265)
Topics for Class Discussion and Debates
(266)
Internet Exercises
(266)
Team Assignments and Projects
(267)
Closing Case: Can Uber Continue to Grow in an Evolving Market?
(267)
Business Model
(268)
Regulation
(268)
Competition
(268)
Future Plans
(268)
Questions
(269)
References
(269)
7: Intelligent (Smart) E-Commerce
(272)
Opening Case INRIX Solves Transportation Problems
(272)
The Problem
(272)
The Solution
(273)
The Results
(273)
7.1 Introduction to Intelligent E-Commerce
(274)
An Overview of Intelligent E-Commerce
(274)
Section 7.1 Review Questions
(275)
7.2 The Essentials of Artificial Intelligence
(276)
Artificial Intelligence (AI): Definitions and Characteristics
(276)
The Capabilities of Intelligence
(276)
How Intelligent Is AI?
(276)
Turing Test
(276)
The Content of the AI Field
(276)
Intelligent Agents
(276)
Machine Learning
(277)
Robotics Systems
(277)
Robots are Taking Our Jobs
(278)
Natural Language Processing
(279)
Speech (Voice) Understanding
(279)
Language Translation
(279)
Chatbots
(279)
Chatbots in E-Commerce
(279)
Knowledge Systems
(280)
Section 7.2 Review Questions
(280)
7.3 Recent AI Applications in E-Commerce
(281)
The AI Contribution to E-Commerce
(281)
AI in E-Commerce: Some Illustrative Examples
(281)
Marketing and Advertising
(281)
Customer Service and Advice
(282)
AI in B2B
(282)
Other Applications
(282)
Conclusion
(282)
Section 7.3 Review Questions
(283)
7.4 Knowledge (Expert) Systems
(283)
An Overview of Knowledge Management
(283)
Knowledge Management Types and Activities
(283)
Knowledge Sharing
(284)
How Is Knowledge Management Related to E-Commerce?
(284)
KM and Social Networks
(285)
Expert Systems
(285)
The Major Components of an Expert System
(285)
The Process and Capabilities of Expert Systems
(286)
Knowledge-Based System
(286)
Case 7.1 EC Application Allstate Is Using Knowledge Systems
(287)
The Problem
(287)
The Solution
(287)
The Results
(287)
Questions for the Case
(287)
Section 7.4 Review Questions
(288)
7.5 Intelligent Personal Assistants and Robot Advisers
(288)
Amazon’s Alexa
(288)
Alexa Skills
(289)
Amazon Echo
(289)
Amazon Echo Dot
(289)
Amazon Echo Tap
(289)
Apple’s Siri
(290)
Viv
(290)
Other Personal Assistants
(290)
Facebook and Its CEO
(290)
IBM Watson
(290)
Alfie: Sears Voice-Controlled Shopping Assistant
(291)
Personal Robots
(291)
Application Case 7.2 EC Application Autonomous’ Personal Robot
(291)
The Personal Robot of Autonomous
(291)
Questions for the Case
(292)
Robo Advisors
(292)
Section 7.5 Review Questions
(292)
7.6 The Internet of Things and E-Commerce
(293)
The Essentials of IoT
(293)
Definitions and Characteristics
(293)
The Structure of IoT Applications
(293)
The Major Benefits of IoT
(294)
The Drivers of IoT
(294)
How the IoT Works
(294)
Some Issues in Implementing the IoT
(295)
Section 7.6 Review Questions
(296)
7.7 Selective Demonstrations of IoT in Action
(296)
A Sampler of Existing Applications
(296)
Nest: A Google Company
(296)
Smart Homes and Appliances
(297)
More on Smart Appliances
(297)
New Home Appliances in CES 2016
(298)
Smart Cities
(298)
Smart Cars (Self-Driven)
(299)
Section 7.7 Review Questions
(299)
Managerial Issues
(299)
Summary
(300)
Key Terms
(301)
Discussion Questions
(301)
Topics for Class Discussion and Debate
(301)
Internet Exercises
(302)
Team Assignments and Projects
(302)
Closing Case: CNH Industrial Uses the Internet of Things to Excel
(303)
The Problem
(303)
The Solution
(303)
The Results
(304)
Questions for the Case
(304)
References
(304)
8: Social Commerce: Foundations, Social Marketing, and Advertising
(307)
Opening Case Social Media Wants Your Marketing Dollars
(307)
The Problem
(308)
The Solution
(308)
The Results
(308)
8.1 Social Commerce: Definitions and Evolution
(309)
Definitions
(309)
The Evolution of Social Commerce
(309)
Section 8.1 Review Questions
(310)
8.2 The Content of the Social Commerce Field
(310)
The Landscape and Major Components of the Field
(310)
Social Media Marketing
(311)
Enterprise 2.0
(311)
Examples of Social Enterprise Applications
(312)
The Future
(312)
Section 8.2 Review Questions
(312)
8.3 The Benefits and Limitations of Social Commerce
(312)
Benefits to Customers
(313)
Benefits to Retailers
(313)
Benefits to Other Types of Enterprises
(314)
The Social Business: An IBM Approach
(314)
New or Improved Business Models
(315)
Concerns and Limitations of Conducting Social Commerce
(315)
Section 8.3 Review Questions
(315)
8.4 Social Shopping: Concepts, Benefits, and Models
(316)
Definitions and Drivers of Social Shopping
(316)
The Drivers of Social Commerce
(316)
Concepts and Content of Social Shopping
(316)
Why Shoppers Go Social
(317)
The Roles in Social Commerce
(317)
Benefits of Social Shopping
(317)
What Elements to Expect in a Social Shopping Site
(318)
Traditional E-Commerce Sites with Social Media Additions
(318)
The Major Types and Models of Social Shopping
(318)
Group Buying
(319)
Group Buying in China
(319)
The Process
(319)
Deal Purchases (Flash Sales)
(319)
Shopping Together Online in Real Time
(320)
Shopping Together Sites
(320)
Co-Shopping
(320)
Online Social Shopping Communities
(320)
Examples of Shopping Communities
(320)
Case 8.1: EC Application Polyvore A Trendsetter in Social Shopping
(320)
Questions
(321)
Private Online Shopping Clubs
(321)
Other Innovative Models
(321)
Social Shopping Aids: From Recommendations to Reviews, Ratings, and Marketplaces
(322)
Recommendations in Social Commerce
(322)
Ratings and Reviews
(322)
Social Recommendations and Referrals
(323)
Illustrative Examples of Recommendation Sites
(323)
Buzzillions
(323)
Concerns about Social Reviews and Recommendations
(324)
Other Shopping Aids and Services
(324)
Yelp: The Shoppers’ Best Helper
(324)
How Yelp Works
(324)
Collaborative Product Reviews
(325)
Dealing with Complaints
(325)
Social Marketplaces and Direct Sales
(325)
Direct Sales from within Social Networks
(325)
Socially Oriented Person-to-Person (P2P) Selling, Buying, Renting, or Bartering
(326)
P2P Sharing (Also Known as Collaborative Consumption)
(326)
Shopping for Virtual Goods in a Virtual Economy
(326)
The Virtual Economy
(326)
Why People buy Virtual Goods
(326)
Real-Time Online Shopping
(327)
Social Shopping in the Near Future
(327)
Section 8.4 Review Questions
(327)
8.5 Social Advertising: From Viral Advertising to Microblogging and Other Promotions
(327)
Social ads and Social Apps
(328)
Viral (Word-of-Mouth) Marketing and Social Networking
(328)
Viral Blogging
(328)
Other Viral Marketing Methods
(328)
Using YouTube and Other Social Presentation Sites for Advertising
(329)
Viral Videos
(329)
Why It Works
(329)
Using Twitter as an Advertising and Marketing Tool
(329)
Using Facebook for Advertising
(330)
Banners and Other ads
(330)
Facebook Offers
(330)
Community Presence
(330)
Using LinkedIn
(330)
Other Innovative Ways to Advertise in Social Media
(330)
The Changing Rules of Branding
(331)
Using Blogs
(331)
Using Coupons
(331)
Using Snapchat
(331)
Mobile Advertising
(331)
Section 8.5 Review Questions
(331)
8.6 Social Customer Service and CRM
(332)
How Does Social Networking Empower Customers?
(332)
Social CRM
(332)
Definition
(332)
The Components of Social CRM
(333)
How to Serve the Social Customers
(333)
Methods and Guidelines for Social Customer Service
(333)
Social Listening
(334)
The Benefits of Social CRM
(334)
Case 8.2: EC Application iRobot Uses Social Media for Multichannel CRM
(335)
Social CRM: Serve the Customers While Learning from Them
(335)
Specific Social Media CRM Activities
(335)
General Social Media Activities
(335)
The Evolution of Social CRM
(336)
Multidimensional Presentation SCRM
(336)
Conclusions
(336)
Examples of Implementation of Social Customer Service and CRM
(336)
Social Networking Helps Customer Service in Small Companies
(338)
Reputation Management System
(339)
Section 8.6 Review Questions
(339)
Managerial Issues
(339)
Summary
(340)
Key Terms
(341)
Discussion Questions
(341)
Topics for Class Discussion and Debates
(341)
Internet Exercises
(342)
Team Assignments and Projects
(342)
Closing Case: How Sony Uses Social Media for Improving CRM
(343)
The Problem
(343)
The Solution
(343)
The Results
(344)
Questions
(344)
References
(344)
9: Social Enterprise and Other Social Commerce Topics
(347)
Opening Case Maximizing the Impact of Social Media with a Minimum of Effort in Mortgage Lending
(348)
The Problem
(348)
The Mortgage Industry
(348)
The Solution
(348)
The Results
(348)
9.1 Social Business and Social Enterprise
(349)
Definitions: Social Business and Social Enterprise
(349)
Social Business
(349)
Social Employees
(349)
The Social Enterprise (Enterprise 2.0)
(350)
More Complex Definitions
(350)
The Social Business Forum’s Definition
(350)
Business Networks
(350)
Types of Business Social Networks
(351)
The Benefits and Limitations of Enterprise Social Networking
(351)
Obstacles and Limitations
(351)
How Web 2.0 Tools Are Used by Enterprises
(352)
Accenture
(352)
Salesforce
(352)
Section 9.1 Review Questions
(353)
9.2 Business-Oriented Public Social Networking
(353)
Entrepreneur Networks
(354)
Section 9.2 Review Questions
(354)
9.3 Enterprise Social Networks
(354)
Taxonomy of Social Enterprise Applications
(355)
Characteristics of Enterprise Social Networks
(355)
An Example of a Private Enterprise Network
(355)
How Enterprise Social Networking Helps Employees and Organizations
(356)
Benefits to Organizations
(356)
Support Services for Enterprise Social Networks
(356)
How Companies Interface with Social Networking
(357)
Integration with Other Tools
(358)
Patterns and Speed of Adoption
(358)
Section 9.3 Review Questions
(358)
9.4 Social Network-Based Job Markets
(359)
Social Recruiting
(359)
Recruiting and Job Searching Using Social Networks
(360)
Virtual Job Fairs and Recruiting Events
(360)
Training Employees
(360)
Social Network Privacy and Job Search
(360)
Review Questions for Section 9.4
(361)
9.5 Social Entertainment
(361)
Entertainment and Social Networks
(361)
Mixi
(361)
Last.fm
(361)
Pandora
(362)
Amazon’s Prime Music
(362)
Web Series and Streaming Movies
(362)
Hulu
(362)
Funny-or-Die and Cracked.com
(362)
Multimedia Presentation and Sharing Sites
(362)
Section 9.5 Review Questions
(363)
9.6 Social Games and Gamification
(363)
Games on Social Networks
(363)
The Business Aspects of Social Games
(364)
Case 9.1: EC Application Pokémon GO
(364)
Questions
(364)
Educational Social Games
(365)
Gamers Helped Scientists
(365)
Gamification
(365)
Section 9.6 Review Questions
(366)
9.7 Crowdsourcing and Crowdfunding
(366)
Crowdsourcing as a Distributed Problem-Solving Enabler
(366)
Crowdsourcing Models
(366)
The Process of Crowdsourcing
(367)
Successfully Deployed Crowdsourcing Systems: Some Representative Examples
(367)
Case 9.2: EC Application Kickstarter
(368)
Questions
(368)
Tools for Crowdsourcing
(369)
Crowdfunding and Kickstarter
(369)
Section 9.7 Review Questions
(370)
9.8 Social Collaboration (Collaboration 2.0)
(370)
Essentials of Social Collaboration
(370)
Social Collaboration (Collaboration 2.0)
(370)
Using Blogs and Wikis Inside the Enterprise
(371)
Using Twitter to Support Collaboration
(371)
Using LinkedIn to Support Collaboration
(372)
The Role of Mobile Commerce in Social Collaboration
(372)
Questions and Answers in Social Networks
(372)
Suites of Tools for Social Collaboration
(372)
The Future of Social Commerce
(373)
Conclusion: IBM’s Watson and Social Commerce
(373)
Section 9.8 Review Questions
(373)
Managerial Issues
(374)
Summary
(374)
Key Terms
(375)
Discussion Questions
(375)
Topics for Class Discussion and Debates
(375)
Internet Exercises
(376)
Team Assignments and Projects
(376)
Closing Case: LinkedIn—The Premier Public Business-Oriented Social Network
(377)
Smart Ways to Use LinkedIn
(378)
Mobile Applications
(378)
The Future of LinkedIn
(378)
Some Resources for LinkedIn
(378)
Questions
(379)
References
(379)
Part IV: EC Support Services
(381)
10: Marketing and Advertising in E-Commerce
(382)
Opening Case IKEA Uses Mobile and Augmented Reality
(382)
The Problem
(383)
The Solution
(383)
The Results
(383)
10.1 Online Consumer Behavior
(383)
A Model of Online Consumer Behavior
(384)
The Major Influential Factors
(385)
Consumer Characteristics
(385)
Merchant and Intermediary-Related Factors
(385)
Product/Service Factors
(385)
EC Systems
(385)
Environmental Factors
(385)
Enhancing Customer Loyalty
(386)
Section 10.1 Review Questions
(386)
10.2 Personalization and Behavioral Marketing
(386)
Personalization in E-Commerce
(387)
Web Cookies for Data Collection
(387)
Other Methods for Data Collection
(388)
Using Personalized Techniques to Increase Sales
(388)
Case 10.1: EC Application Using AI at The North Face
(388)
The Problem
(388)
The Solution
(388)
Questions
(389)
Behavioral Marketing and Collaborative Filtering
(389)
Behavioral Targeting
(389)
Collaborative Filtering
(389)
Other Methods
(389)
Rule-Based Filtering
(389)
Content-Based Filtering
(389)
Activity-Based Filtering
(390)
Legal and Ethical Issues in Collaborative Filtering
(390)
Social Psychology and Morphing in Behavioral Marketing
(390)
Case 10.2: EC Application Netflix Uses Technical and Social Systems so You Can Find Something to Watch
(390)
The Technical Approach
(390)
The Social Approach
(391)
Questions
(391)
Section 10.2 Review Questions
(391)
10.3 Market Research for E-Commerce
(391)
Objectives and Concepts of Online Market Research
(391)
What are Marketers Looking for in EC Market Research?
(392)
Representative Market Research Approaches
(392)
Data Collection and Analysis
(392)
Online Surveys
(392)
Web-Based Surveys
(392)
Online Focus Groups
(392)
Hearing Directly from Customers
(392)
Data Collection in Social Networks and Other Web 2.0 Environments
(393)
Observing Customers’ Movements Online
(393)
Transaction Logs
(393)
Cookies and Web Bugs
(394)
Spyware
(394)
Web Analytics and Mining
(394)
Clickstream Analysis
(394)
Web Mining
(394)
Limitations of Online Market Research and How to Overcome Them
(395)
Privacy Issues in Market Research
(395)
Biometric and Smartphone Marketing Helps Market Research
(395)
Section 10.3 Review Questions
(395)
10.4 Why Web Advertising
(396)
Overview of Web Advertising
(396)
The Advertising Cycle
(396)
Basic Internet Advertising Terminology
(397)
Why Internet Advertising?
(397)
Advertising Online and Its Advantages
(397)
Traditional Versus Online Advertising
(398)
Section 10.4 Review Questions
(398)
10.5 Online Advertising Methods
(398)
Major Categories of Ads
(398)
Classified Ads
(398)
Display Ads
(399)
Interactive Ads
(399)
Banners
(399)
Benefits and Limitations of Banner Ads
(399)
Pop-Up and Similar-Type Ads
(399)
Pop-Up Videos
(400)
E-Mail Advertising
(400)
Major Advantages and Limitations of E-Mail Advertising
(400)
Limitations
(400)
Implementing E-Mail Advertising
(401)
E-Mail Hoaxes
(401)
Fraud
(401)
Regulatory Compliance
(401)
Search Engine Advertisement and Optimization
(401)
Search Engine Optimization (SEO)
(401)
Sponsored Ads (Paid Inclusion)
(402)
Google: The Online Advertising King
(402)
Google’s Major Advertising Methods: AdWords and AdSense
(402)
Viral Marketing
(403)
Video Advertising
(404)
Viral Videos
(405)
Consumer-Generated Videos
(405)
Interactive Videos
(406)
Video Click-Throughs
(406)
Live Interactive Videos
(406)
Augmented Reality in Advertising
(406)
Advertising in Chat Rooms and Forums
(406)
Case 10.3: EC Application Supporting Marketing Campaigns with Software Systems
(407)
The Problem
(407)
The Solution
(407)
Questions
(407)
Section 10.5 Review Questions
(407)
10.6 Mobile Marketing and Advertising
(408)
Mobile Marketing and Mobile Commerce
(408)
Defining Mobile Marketing
(408)
Mobile Advertising
(408)
Interactive Mobile Advertising
(409)
Types of Mobile Ads
(409)
Short Message Ads
(409)
Location-Based Ads
(409)
Mobile Marketing and Advertising Campaigns
(410)
Mobile Marketing Implementation Guidelines
(410)
Tools to Support Mobile Advertisement
(410)
Mobile Ad Trends
(411)
Marketing Through Apps
(411)
Section 10.6 Review Questions
(411)
10.7 Advertising Strategies and Promotions
(412)
Permission Advertising
(412)
Other Advertising Strategies
(412)
Affiliate Marketing and Advertising
(412)
Affiliate Networks
(412)
Ads as a Commodity: Paying People to Watch Ads
(412)
Personalized Ads
(413)
Advertising as a Revenue Model
(413)
Choose-Your-Own-Ad Format
(413)
Live Web Events for Advertising
(413)
Localization in Advertising
(413)
Developing an Online Advertising Plan
(414)
Section 10.7 Review Questions
(415)
Managerial Issues
(415)
Summary
(416)
Key Terms
(417)
Discussion Questions
(418)
Topics for Class Discussion and Debates
(418)
Internet Exercises
(419)
Team Assignments and Projects
(419)
Closing Case: Rolex Uses New Media Marketing
(420)
The Problem
(420)
The Solution
(420)
Results
(421)
Questions
(421)
References
(421)
11: E-Commerce Security and Fraud Issues and Protections
(423)
Opening Case Kansas Heart Hospital Becomes a Victim to Ransom
(424)
The Incident
(424)
The Solution
(424)
The Results
(424)
11.1 The Information Security Problem
(425)
What Is EC Security?
(425)
The Status of Computer Security in the United States
(425)
Personal Security
(426)
National Security
(426)
Security Risks for 2017 and 2018
(426)
Security Risks in Mobile Devices
(427)
Cyberwars and Cyberespionage Across Borders
(427)
Cyberwarfare
(427)
Cyberespionage
(427)
Attacking Information Systems
(427)
Types of Cyberwar Attacks
(428)
The Drivers of EC Security Problems
(428)
The Internet’s Vulnerable Design
(428)
The Spread of Computerized Medical Data
(428)
The Shift to Profit-Induced Crimes
(429)
Ransomware
(429)
Thefts of Devices
(429)
Computers Everywhere
(429)
The Increased Volume of Wireless Activities and the Number of Mobile Devices
(429)
The Globalization of the Attackers
(429)
The Explosion of Social Networking
(429)
The Dynamic Nature of EC Systems and the Acts of Insiders
(429)
The Sophistication of the Attacks
(429)
The Darknet and the Underground Economy
(430)
The Underground Internet Economy
(430)
The Internet Silk Road
(430)
The Cost of Cybercrime
(430)
Section 10.1 Review Questions
(430)
11.2 Basic E-Commerce Security Issues and Landscape
(430)
Basic Security Terminology
(431)
Conclusion
(431)
The EC Security Battleground
(431)
The Threats, Attacks, and Attackers
(431)
Unintentional Threats
(431)
Intentional Attacks and Crimes
(432)
The Criminals and Their Methods
(433)
Money Mules
(433)
The Targets of the Attacks in Vulnerable Areas
(433)
Vulnerable Areas Are Being Attacked
(433)
Vulnerability Information
(433)
Attacking E-Mail
(433)
Attacking Smartphones and Wireless Systems
(434)
The Vulnerability of RFID Chips
(434)
The Vulnerabilities in Business IT and EC Systems
(434)
Pirated Videos, Music, and Other Copyrighted Material
(434)
EC Security Requirements
(434)
The Defense: Defenders, Strategy, and Methods
(435)
EC Defense Programs and Strategy
(435)
Information Assurance
(435)
Possible Punishment
(435)
Defense Methods and Technologies
(435)
Recovery
(435)
Section 11.2 Review Questions
(435)
11.3 Technical Malware Attack Methods: From Viruses to Denial of Service
(436)
Technical and Nontechnical Attacks: An Overview
(436)
The Major Technical Attack Methods
(436)
Malware (Malicious Software): Viruses, Worms, and Trojan Horses
(436)
Viruses
(437)
The ILOVEYOU Virus
(437)
Worms
(438)
Macro Viruses and Micro Worms
(438)
Trojan Horse
(438)
Some Security Bugs: Heartbleed and CryptoLocker
(438)
Heartbleed
(438)
CryptoLocker
(439)
Mirai (Malware)
(439)
Denial of Service (DoS and DDoS)
(439)
Web Server and Web Page Hijacking
(439)
Botnets
(439)
Home Appliance “Botnet”
(440)
Malvertising
(440)
Keystroke Logging in the Underground Economy
(440)
Section 11.3 Review Questions
(440)
11.4 Nontechnical Methods: From Phishing to Spam and Fraud
(440)
Social Engineering and Fraud
(441)
Social Phishing
(441)
Spear Phishing
(442)
Other Phishing Methods
(443)
Pharming
(443)
Fraud and Scams on the Internet
(443)
Types of Scams
(443)
E-Mail Scams
(444)
Top 10 Attacks and Remedies
(444)
Identity Theft and Identify Fraud
(445)
Identity Fraud
(445)
Cyber Bank Robberies
(445)
Ransomware
(445)
What Is Ransomware?
(445)
Possible Solutions
(446)
Spam Attacks
(447)
Typical Examples of Spamming
(447)
Spyware
(447)
Social Networking Makes Social Engineering Easy
(447)
How Hackers Are Attacking Social Networks
(447)
Spam in Social Networks and in the Web 2.0 Environment
(448)
Automated Blog Spam
(448)
Search Engine Spam and Splogs
(448)
Data Breach (Leak)
(448)
Section 11.4 Review Questions
(449)
11.5 The Information Assurance Model and Defense Strategy
(449)
Confidentiality, Integrity, and Availability
(449)
Authentication, Authorization, and Nonrepudiation
(449)
E-Commerce Security Strategy
(450)
The Defense Side EC Systems
(450)
Assessing Vulnerabilities and Security Needs
(450)
Penetration Test
(451)
Section 11.5 Review Questions
(451)
11.6 Defending Information Systems and E-Commerce
(451)
The Defense I: Access Control, Encryption, and PKI
(451)
Access Control
(451)
Authorization and Authentication
(452)
Authentication
(452)
Antivirus Protection
(452)
Biometric Systems
(452)
Encryption and the One-Key (Symmetric) System
(452)
Symmetric (Private) Key Encryption
(453)
Public Key Infrastructure
(453)
Public (Asymmetric) Key Encryption
(454)
The PKI Process: Digital Signatures and Certificate Authorities
(454)
Certificate Authority
(454)
Secure Sockets Layer (SSL)
(454)
Other Controls
(454)
The Defense II: Securing E-Commerce Networks
(454)
Firewalls
(454)
The Dual-Firewall Architecture: The DMZ
(454)
Virtual Private Networks (VPNs)
(455)
Intrusion Detection Systems (IDS)
(455)
Dealing with DoS Attacks
(455)
The Defense III: General Controls, Spam, Pop-Ups, and Social Engineering Controls
(455)
General, Administrative, and Other Controls
(455)
Physical Controls
(456)
Administrative Controls
(456)
Protecting Against Spam
(456)
Protecting Your Computer from Pop-Up Ads
(456)
Protecting Against Other Social Engineering Attacks
(456)
Protecting Against Phishing
(456)
Protecting Against Malvertising
(456)
Protecting Against Spyware
(456)
Protecting Against Cyberwars
(456)
Protecting Users of Social Media
(457)
Business Continuity and Disaster Recovery
(457)
SANS’s CIS Critical Security Controls
(457)
Section 11.6 Review Questions
(457)
11.7 Consumer and Seller Protection from Online Fraud
(458)
Consumer (Buyer) Protection
(458)
Representative Tips and Sources for Your Protection
(458)
Third-Party Assurance Services
(459)
Protection by a Third-Party Intermediary
(459)
TRUSTe’s “Trustmark”
(459)
Better Business Bureau
(459)
WebTrust Seal
(459)
Evaluation by Consumers
(459)
The Computer Fraud and Abuse Act (CFAA)
(460)
Seller (Merchant) Protection
(460)
What Can Sellers Do?
(460)
Protecting Marketplaces and Social Networking Services
(461)
Fraud Detection Software
(461)
Protecting Both Buyers and Sellers: Using Electronic Signatures and Other Security Features
(461)
Authentication
(461)
Fraud Detecting Systems
(461)
Section 11.7 Review Questions
(461)
11.8 Implementing Enterprisewide E-Commerce Security
(462)
The Drivers of EC Security Management
(462)
How Serious Is Cybersecurity?
(462)
Senior Management Commitment and Support
(462)
EC Security Policies and Training
(463)
Training to Do Hacking
(464)
Cyber Intelligence
(464)
EC Risk Analysis and Ethical Issues
(464)
Ethical Issues
(464)
Why Is It Difficult to Stop Internet Crime?
(464)
Making Shopping Inconvenient
(464)
Lack of Cooperation by Business Partners
(465)
Shoppers’ Negligence
(465)
Ignoring EC Security Best Practices
(465)
Design and Architecture Issues
(465)
Lack of Due Care in Business Practices
(465)
Protecting Mobile Devices and Mobile Apps
(465)
Mobile Security Issues
(465)
The Defense of Mobile Systems
(465)
The Internet of Things Security
(465)
Section 11.8 Review Questions
(466)
Managerial Issues
(466)
Summary
(466)
Key Terms
(468)
Discussion Questions
(469)
Topics for Class Discussion and Debates
(470)
Internet Exercises
(470)
Team Assignments and Projects
(471)
Closing Case: How Dyn Was Attacked by DDOS?
(471)
The Incident
(471)
The Results
(472)
Using Botnet
(472)
The Motive
(472)
Questions
(472)
References
(472)
12: Electronic Commerce Payment Systems
(476)
Opening Case Cross-Border EC—Costco Partners with China’s Tmall
(476)
The Problem
(476)
The Solution
(477)
The Costco Solution
(478)
The Alibaba Group and Their Tmall and Alipay
(478)
Criteria for Collaboration
(478)
The Results
(479)
12.1 Changing Retail Landscape
(480)
Omni-Channel Retail
(480)
Cash Versus Non-cash Transactions
(480)
Usage of EC Payment Methods
(481)
Amazon’s GO is Changing Retail
(482)
Move to Mobile
(482)
The Cashless Society
(483)
Implications for EC Payments
(483)
Critical Mass
(484)
Factors for Critical Mass
(484)
Section 12.1 Review Questions
(485)
12.2 Using Payment Cards Online
(485)
Credit Card Reading
(485)
Processing Cards Online
(485)
Authorization and Settlement
(486)
Fraudulent Card Transactions
(487)
Methods for Combating Fraud
(488)
Section 12.2 Review Questions
(488)
12.3 Smart Cards
(488)
Types of Smart Cards: Contact and Contactless
(489)
Smart Card Readers
(489)
Stored-Value Cards
(489)
Applications of Smart Cards
(490)
Retail Purchases
(490)
Cards Security
(491)
Contactless in Retailing
(491)
Transit Fares
(491)
Section 12.3 Review Questions
(492)
12.4 EC Micropayments
(492)
Micropayment Models
(492)
Micropayment Options and Costs
(493)
Case 12.1 EC Application Innovative Credit Card Micropayments for the Korean Metropolitan Unified Fare System
(493)
The Problem
(493)
The Solution
(494)
The Results
(494)
Section 12.4 Review Questions
(495)
12.5 PayPal and Other Third-Party Payment Gateways
(495)
PayPal
(495)
Other Third-Party Gateways
(496)
Apple Pay and Google’s Android Pay
(496)
Apple Pay (apple.Com/pay)
(496)
Android Pay (Android.Com/pay)
(496)
Amazon Payments
(496)
Global Gateways
(497)
Section 12.5 Questions
(497)
12.6 Mobile Payments
(497)
Types of Mobile Payments
(497)
Mobile Consumer Payments: Wallets, Clouds, and Loops
(498)
Device-Based Digital Wallets
(499)
Cloud-Based Digital Wallets
(500)
Closed-Loop Systems
(500)
Mobile Point of Sale
(500)
Case 12.2 EC Application Using the Square Magstripe Reader
(501)
Questions for the Case
(501)
Person-to-Person (P2P) Payments
(502)
Section 12.6 Review Questions
(502)
12.7 Digital and Virtual Currencies
(502)
Types of Currencies: Physical and Digital
(502)
Virtual Currency
(502)
Size of the Virtual Currency Market
(503)
Digital Currency Exchanges
(503)
Bitcoin and Other Cryptocurrencies
(503)
Bitcoin Background
(504)
Bitcoin Characteristics
(504)
How Does Bitcoin Work?
(504)
Advantages of Bitcoin
(507)
Disadvantages of Bitcoin
(507)
Bitcoin Competitors and the Future of Math-Based Currencies
(508)
Section 12.7 Review Questions
(508)
Managerial Issues
(508)
Summary
(509)
Key Terms
(511)
Discussion Questions
(512)
Topics for Class Discussion and Debates
(512)
Internet Exercises
(513)
Team Assignments and Projects
(513)
Closing Case
(514)
The Problem
(514)
The Solution
(515)
The Results
(516)
References
(517)
13: Order Fulfillment Along the Supply Chain in e-Commerce
(519)
Opening Case How Amazon.Com Fulfills Orders
(520)
The Problem
(520)
The Solution
(520)
Picking and Packing
(520)
Specialization of Distribution Centers
(521)
The Army of Robots
(521)
Delivery by Drones
(521)
The Results
(521)
13.1 Order Fulfillment and Logistics: An Overview
(522)
Basic Concepts of Order Fulfillment and Logistics
(522)
The EC Order Fulfillment Process and Elements
(523)
Operation Models
(524)
Order Fulfillment and the Supply Chain
(524)
Section 13.1 Review Questions
(525)
13.2 Order Fulfillment in Make-to-Order (MTO) and Mass Customization
(525)
Mass Customization, Make-to-Order, and Assemble-to-Order
(525)
Case 13.1: EC Application Dell’s World-Class Supply Chain and Order Fulfillment System
(526)
Direct-to-Consumer and Configure-to-Order
(526)
Assemble-to-Order
(526)
Segmented Supply Chain
(526)
Results
(528)
Questions
(528)
Make-to-Order and Assemble-to-Order
(528)
Using 3D Printing for Mass Customization
(528)
3D and e-Commerce
(529)
Case 13.2: EC Application Feetz Inc. Is Using 3D for Mass Customization in e-Commerce
(529)
How Does Feetz Work?
(529)
Questions
(529)
Using Robots with Make-to-Order Fulfillment
(530)
Section 13.2 Review Questions
(530)
13.3 Warehousing, Robots, and Warehouse Management Systems
(530)
Using Robots (Bots) in Warehouses
(531)
Warehouse Management System (WMS)
(532)
Section 13.3 Review Questions
(532)
13.4 Delivery to Customers: From Robots to Drones
(532)
Speeding Up Deliveries: From Same Day to a Few Hours
(532)
Same- Day Delivery
(532)
Delivery by Drones
(533)
Obstacles to Drone Delivery
(533)
Additional Examples
(534)
Delivery of Medical Supplies
(534)
Delivery by Robots
(534)
Grocery Delivery in Washington DC by Robots
(535)
Section 13.4 Review Questions
(535)
13.5 Problems in Order Fulfillment along Supply Chains
(535)
Section 13.5 Review Questions
(536)
13.6 Solutions for Order Fulfillment Problems Along the Supply Chain
(536)
Improvements in the Order-Taking Activity
(537)
Changing the Structure and Process of the Supply Chain
(537)
Integrated Global Logistics Program
(538)
Partnering Efforts and Outsourcing Logistics
(538)
Supply Chain Segmentation
(538)
Section 13.6 Review Questions
(538)
13.7 RFID as a key Enabler in Supply Chain Management
(538)
The Essentials of RFID
(538)
Case 13.3: EC Application RFID Supports Macy’s Multichannel Strategy
(540)
Questions
(541)
RFID Applications in the Supply Chain Around the Globe
(541)
RFID at Starbucks
(541)
RFID at Deutsche Post (Germany)
(541)
RFID at Atlantic Beef Products (Ontario, Canada)
(541)
Section 13.7 Review Questions
(542)
13.8 Other Order Fulfillment Topics
(542)
Handling Returns (Reverse Logistics)
(542)
Order Fulfillment in B2B
(543)
Using e-Marketplaces and Exchanges to Ease Order Fulfillment Problems in B2B
(543)
Order Fulfillment in Services
(543)
Innovative e-Fulfillment Strategies
(544)
Section 13.8 Review Questions
(544)
Managerial Issues
(544)
Summary
(545)
Key Terms
(546)
Discussion Questions
(546)
Topics for Class Discussion and Debates
(546)
Internet Exercises
(547)
Team Projects
(547)
Closing Case: Cross-Border EC (Partnering with Tmall Global)
(548)
The Problem
(548)
The Solution
(548)
The Results
(550)
Questions
(551)
References
(551)
Part V: E-Commerce Strategy and Implementation
(553)
14: EC Strategy, Globalization, SMEs, and Implementation
(554)
Opening Case Telstra Corporation Helps Its Corporate Customers Justify EC Initiatives
(554)
The Problem
(555)
The Solution
(555)
Justifying Video Conferencing
(555)
Justifying Teleworking
(555)
Justifying Web Contact Centers
(555)
Justifying Fleet and Field Force Management
(555)
Justifying Green Efficiency
(556)
The Results
(556)
14.1 Organizational Strategy: Concepts and Overview
(556)
Strategy and Performance Cycle
(557)
Strategy Initiation
(558)
Core Competencies
(558)
First-Mover Advantage
(558)
Strategy Formulation
(559)
Selecting E-Commerce Opportunities
(559)
Risk Analysis in Strategy Formulation
(559)
Collaborative Efforts in Strategy Formulation
(559)
Pricing Strategy
(559)
Acquisitions, Partnerships, Joint Venture, and Multi-EC Model Strategy
(560)
Strategy Implementation
(560)
E-Commerce and Social Media Strategy Implementation Process
(560)
Start with a Pilot Project
(560)
Allocate Resources
(560)
Manage the Project
(561)
E-Commerce Strategy Implementation Issues
(561)
Build, Buy, or Rent EC Elements
(561)
Outsource: What? When? To Whom?
(561)
Example: Gartner’s Magic Quadrant
(561)
Strategy Assessment
(561)
Performance Improvement and Innovations
(562)
The Objectives of Assessment
(562)
The Performance Assessment Process
(562)
Section 14.1 Review Questions
(563)
14.2 Why Justify E-Commerce and Social Media Investments? How Can They Be Justified?
(563)
Increased Pressure for Financial Justification
(563)
Other Reasons Why EC and Social Media Justification is Needed
(563)
EC Investment Categories and Benefits
(564)
How Is an EC or Social Media Investment Justified?
(564)
Cost–Benefit Analysis and the Business Case
(564)
What Needs to Be Justified? When Should Justification Take Place?
(564)
Using Metrics in EC and Social Media Justification
(565)
Metrics, Measurements, and Key Performance Indicators
(565)
Case 14.1: EC Application Aldi Supermarket Trying E-Commerce in the United Kingdom
(566)
The Problem
(566)
The Solution
(566)
The Results
(566)
Questions
(567)
Web Analytics
(567)
The Process of Justifying EC and IT Projects
(567)
Quantitative or Qualitative Metrics?
(567)
Section 14.2 Review Questions
(567)
14.3 A Strategy for Global E-Commerce and Social Media
(568)
Benefits and Extent of Global Operations
(568)
Barriers to Global E-Commerce
(568)
Cultural Differences
(569)
Mini Case: Dangdang Inc.
(569)
Language Translation
(569)
Machine Translation
(569)
Legal Issues
(570)
Geographic Issues and Localization
(570)
Web Localization
(570)
Economic and Financial Issues
(571)
Breaking Down the Barriers to Global E-Commerce
(571)
Section 14.3 Review Questions
(571)
14.4 Strategy for Small- and Medium-Sized Enterprises
(572)
Case 14.2: EC Application Website Builders
(573)
The Problem
(573)
The Solution
(573)
Questions
(573)
Globalization and SMEs
(573)
Resources to Support SME Activities in EC and Social Media
(574)
SMEs and Social Networks
(574)
Section 14.4 Review Questions
(574)
14.5 The Implementation Landscape
(575)
The Major Implementation Factors
(575)
Justification/Economics
(575)
Acquire or Self-Develop Your E-Commerce or Social Media Management System
(575)
Organizational Readiness and Impacts of E-Commerce
(575)
How to Succeed
(575)
Case 14.3: EC Application E-Commerce Builders
(576)
The Problem
(576)
The Solution
(576)
Questions
(576)
Using Vendors and Materials
(577)
Section 14.5 Review Questions
(577)
14.6 Development Strategies for E-Commerce and Social Media Projects
(577)
In-House Development: Insourcing
(577)
Insourcing with Applications or Tools
(578)
Advantages and Limitations of Software Solutions
(578)
Outsourcing Development and Implementation
(578)
Project Outsourcing Options
(578)
Case 14.4: EC Application Would You Build an App Online?
(579)
The Problem
(579)
The Solution
(579)
Questions
(579)
Selecting a Development Option
(579)
Section 14.6 Review Questions
(580)
14.7 Opportunities for Success in E-Commerce and Social Media and Avoiding Failure
(580)
Factors that Determine E-Commerce and Social Media Success
(580)
E-Commerce and Social Media Failures
(580)
E-Commerce and Social Marketing Effectiveness
(581)
E-Commerce and Social Media Successes
(581)
Strategies for EC and Social Media Success
(582)
Additional Guidelines for EC and Social Media Success
(582)
Cultural Differences in EC and Social Media Successes and Failures
(582)
Section 14.7 Review Questions
(582)
Managerial Issues
(583)
Summary
(583)
Key Terms
(584)
Discussion Questions
(584)
Topics for Class Discussion and Debates
(585)
Internet Exercises
(585)
Team Assignments and Projects
(585)
Closing Case: Battle of the B2C Titans
(586)
The Leader: Amazon
(586)
A Competitor: Walmart
(586)
A Competitor: Alibaba
(587)
The State of the Market
(587)
Questions
(587)
References
(587)
15: E-Commerce: Regulatory, Ethical, and Social Environments
(590)
Opening Case Fake News: The Austin, Texas, Fiasco
(591)
The Initial Step
(591)
The Story Goes Viral
(591)
Further Events
(591)
False Rumors Spread Much Faster Than True Ones
(591)
15.1 Ethical Challenges and Guidelines
(592)
Ethical Principles and Guidelines
(592)
Business Ethics
(592)
The Issues of Internet Abuse in the Workplace
(592)
Managing Internet Abuse
(592)
Monitoring Employees: Is It Ethical?
(592)
EC Ethical and Legal Issues
(593)
Other Issues
(593)
Internet Use That Is Not Work Related
(593)
Section 15.1 Review Questions
(593)
15.2 Intellectual Property Law and Copyright Infringement
(594)
Intellectual Property in E-Commerce
(594)
Recording Movies, Shows, and Other Events
(594)
Copyright Infringement and Protection
(594)
File Sharing
(595)
Illegal Visits to Torrent, Streaming, and Download Sites (i.e., Piracy)
(595)
Legal Aspects of Infringement
(595)
The RIAA Industry Versus the Violators
(595)
Globalization
(595)
Digital Rights Management (DRM)
(595)
Patents
(595)
Oracle Versus Google
(596)
Trademarks
(596)
Protecting Intellectual Property on Websites
(596)
Section 15.2 Review Questions
(597)
15.3 Privacy Rights, Protection, and Free Speech
(597)
Privacy in E-Commerce
(597)
Social Networks Changing the Landscape of Privacy and Their Protection
(597)
Information Pollution and Privacy
(598)
Global View
(598)
Privacy Rights and Protection
(598)
Opt-In and Opt-Out
(598)
Some Measures of Privacy Protection
(599)
Free Speech Online Versus Privacy Protection
(599)
Free Speech Online Versus Child Protection Debate
(599)
The Price of Protecting an Individual’s Privacy
(600)
Case 15.1: EC Application School Administrators Used Webcams to Spy on Students at Home
(600)
Questions
(600)
The Future of ePrivacy
(600)
How Information About Individuals Is Collected and Used Online
(600)
Cookies
(601)
Spyware as a Threat to Privacy and Intellectual Property
(601)
RFID’s Threat to Privacy
(601)
Monitoring Employees
(601)
Other Methods
(602)
Privacy Protection by Information Technologies
(602)
Privacy Policies and Regulations
(602)
Privacy Issues in Web 2.0 Tools and Social Networks
(602)
Presence, Location-Based Systems, and Privacy
(602)
Privacy Protection by Ethical Principles
(603)
Government Spying on Its Citizens
(603)
P3P Privacy Platform
(603)
Privacy Protection in Countries Other Than the United States
(603)
Section 15.3 Review Questions
(604)
15.4 Other EC Legal Issues
(604)
Selected Legal and Regulatory Environment: E-Discovery and Cyberbullying
(604)
E-Discovery
(604)
E-Discovery and Social Networks
(604)
EDRM
(604)
Cyberbullying
(605)
Top 10 Internet and EC Legal Issues in 2016
(605)
A Sample of Other Issues
(606)
Drivers of EC and Internet Laws
(606)
A Final Note
(606)
Section 15.4 Review Questions
(606)
15.5 Fake Content on the Web
(607)
Fake News
(607)
Google and Facebook Actions
(607)
Other Fake Content Types and Activities on the Internet
(607)
Internet Trolls
(607)
Types of Trolls
(608)
Controlling Trolls
(608)
Difficulties Controlling Fake Content
(608)
Controlling Fake Content
(608)
What to Do When There Is Fake Content About Your Company?
(608)
Tips for Analyzing and Dealing with Various Types of Fake News
(609)
Section 15.5 Review Questions
(609)
15.6 Public Policy, Taxation, and Political Environments
(610)
Net Neutrality
(610)
Taxation of EC Transactions in the United States
(610)
Internet Censorship by Countries
(611)
Section 15.6 Review Questions
(611)
15.7 Societal Issues and Green EC
(611)
The Digital Divide
(612)
Overcoming the Digital Divide
(612)
Telecommuting
(612)
Does EC Increase Unemployment?
(613)
Automation and Job Losses
(613)
The Current Automation Impact
(613)
So What Can Be Done?
(613)
Green EC and IT
(613)
Operating Greener Businesses, Eco-friendly Data Centers, and Cloud Computing
(613)
How to Operate Greener Businesses, Data Centers, and Supply Chains
(614)
Global Green Regulations
(615)
The Electronic Product Environmental Assessment Tool
(615)
Other Societal Issues
(615)
Education
(615)
Public Safety, Surveillance, and Homeland Security
(615)
Health Aspects
(615)
Section 15.7 Review Questions
(616)
15.8 The Future of E-Commerce
(616)
Some Key Factors for the Future of E-Commerce
(616)
New Trends That Are Shaping the Future of B2C
(617)
The B2C Road to 2016
(617)
The Future of B2B
(617)
Zorzini’s List of Trends for 2016 and Beyond
(617)
Other Predictions
(618)
Integrating the Marketplace with the Marketspace
(618)
M-Commerce
(618)
Social Commerce
(618)
Future Technological Trends that May Accelerate the Speed of E-Commerce
(619)
Future Trends That Are Limiting the Spread of EC
(619)
Consumer Behavior
(619)
Conclusion
(619)
Enjoy Some Interesting Videos About the Future of E-Commerce
(620)
L’Oréal of Paris
(620)
Chatbots
(620)
Section 15.8 Review Questions
(620)
Managerial Issues
(620)
Summary
(621)
Key Terms
(622)
Discussion Questions
(622)
Topics for Class Discussion and Debates
(623)
Internet Exercises
(624)
Team Assignments and Projects
(624)
Closing Case: The Pirate Bay and the Future of File Sharing
(625)
An Overview
(625)
The Legal Situation
(625)
Current Operation
(625)
Discussion
(626)
Questions
(626)
References
(627)
Glossary
(630)
Index
(642)