电子商务导论(双语)所划重点
电子商务导论(双语) chap09
e-care for business partners— dedicated services
providing faster, better information for these important groups
e-care for employees— improving the effectiveness of
Opportunities (O)
Strengths (S)
SO Strategies Generate strategies
here that use strengths to take
advantages of opportunities
Threats (T)
ST Strategies Generate strategies
Describe the key management issues in the strategic planning
© Prentice Hall, 2000
2
IBM’s E-Business’s Strategy
Following four goals:
To lead IBM’s strategy to transform itself into ebusiness and to act as a catalyst to help facilitate that transformation.
Explain the issues involved in EC implementation planning
Experience the role of intelligent agents in the strategic perspective
Characterize how the strategic planning evolves throughout the business cycle
电子商务重点(双语)
第一章1电子商务与传统商务的区别与联系:最大的区别就是网络的介入、电子商务与传统的商务活动方式相比,具有以下几个特点:交易虚拟化、交易成本低、交易效率高、交易透明化。
2电子商务:电子商务是利用现代信息技术所从事的新型商业交易活动。
3电子商务的按照交易对象分类:企业与消费者之间的电子商务,即Business to Consumer(BtoC)、企业与企业之间的电子商务,即Business to Business(BtoB)电子商务。
包括非特定企业间的电子商务和特定企业间的电子商务。
通过上述两种电子商务的基本形式,可以派生出若干种形式,如CtoC (Consumer to Consumer)、BtoG(Business to Government)等。
4电子商务主要盈利模式:网络广告、会员服务费、网络交易费、搜索竞价排名、其他。
5电子商务英语定义:Doing commerce in electronic way(through modern information technology)。
6、BtoB:Businesses sell products or services to other businesses.7、BtoC:Businesses sell products or services to individual consumers.8、CtoC: individuals who buy and sell items among themselves.9、BtoG: Businesses sell goods or services to governments第六章1、计算机网络安全技术有:病毒防范技术、身份识别技术、防火墙技术、虚拟专用网技术。
2、交易安全技术有:加密技术、认证技术、安全认证协议。
3、加密技术分类:对称密钥密码体制、非对称密钥密码体制。
4、电子商务的安全需求:机密性、完整性、认证性、不可抵赖性、有效性。
电子商务导论(双语) chap07
*
The Intranets
An intranet is a corporate LAN and/or Wide Area Network (WAN) that is secured behind company’s firewalls and it uses Internet technologies. Although intranets are developed using the same TCP/IP protocol as the Internet, they operate as private networks with limited access. Only employees who are issued passwords and access codes are able to use them. So, intranets are limited to information pertinent to the company and contain exclusive and often proprietary and sensitive information. Firewalls protect intranets from unauthorized outside access.
Identify the key element of extranets Identify the key technologies for tunneling Discuss the applications of extranets Describe typical industries that use extranets Discuss the business models for extranet applications Describe the concept of embedded extranets
电子商务导论重点
1电子商务的定义Definition and category定义 (1) 电子商务是利用电子通讯来进行商务活动。
电子商务不是技术,也不是一个新业务。
电子商务是公司创建和经营其他业务的一种全新和有效地途径。
(2)电子商务从根本上代表着一个企业和消费者之间的数字化实现,而不是已纸为媒介的基础,包括企业间的商业交易,企业与消费者的商业交易和政府及其公民之间的商务或组织业务。
分类 (1)企业对企业(B2B)的电子商务(又是也被称为电子采购)(B2B2B)(2)企业对消费者(B2C)的电子商务(B2B2C)(3)支持购销活动的业务流程(U2B学校,对企业\M2B军队对企业\H2B医院对企业)(4)消费者对消费者(C2C)电子商务(5)企业对政府(B2G)电子商务2.Describe the benefits of EC to Organizations, consumers and society. 参考43.EFT(electronic funds transfer) used by banksEFI电子资金转账,是计算机在银行业务中得到应用后,银行利用计算机,终端机,电子信息网等电子通讯设备建立的高速划拨资金的电子支付系统EDI(electronic data interchange) 电子数据传输4.Which commerce is more well-suited to Electronic business Process?电子商务 (1)销售\购买书籍和光盘,旅游服务,投资和保险服务(2)软件在线支付(3)网上跟踪货物电子商务+传统 (1)出售\购买汽车和住宅房地产(2)网上银行(3)合租配对服务传统 (1)出售\购买立即使用,高档时尚首饰级古董(需要个人检查的个异性项目;需要触觉嗅觉或自己检查)(2)小面额的采购和销售(因为目前还没有转移少量资金的标准)5.Advantages of E-Commerce?(1)增加销售,降低成本使得小企业获得全球客户群通过电子销售查询,报价和订单受理降低成本(2)为买家提供采购机会(企业可以找出新的供应商和合作伙伴)(3)增加信息交换的速度和准确性,从而降低成本(4)可以每天24小时处理业务(5)购买信息的详细程度由用户选择(6)数字化商品可以立即交付(7)在互联网上分发可以降低退税。
电子商务导论(双语) chap08
orders, and customers need protection against the
merchants’ unjustifiable denial of past payment
© Prentice Hall, 2000
6
Security Schemes
Secret Key Cryptography (symmetric)
it does not protect against all security hazards
it is mature, simple, and widely use
SET ( Secure Electronic Transaction) is a very comprehensive security protocol
© Prentice Hall, 2000
3
SSL Vs. SET: Who Will Win?
A part of SSL (Secure Socket Layer) is available on customers’ browsers
it is basically an encryption mechanism for order taking, queries and other applications
it may be abandoned if it is not simplified/improved
© Prentice Hall, 2000
4
Payments, Protocols and Related Issues
SET Protocol is for Credit Card Payments Electronic Cash and Micropayments Electronic Fund Transfer on the Internet Stored Value Cards and Electronic Cash Electronic Check Systems
电子商务双语目录
Chapter 1 Introduction to E-commerce 电子商务综述Case: (引例:)1.1 The Basic Concept of E-commerce(电子商务的基本概念)1.1.1 The Definition of E-commerce(电子商务的定义)1.1.2 The Contents of E-commerce(电子商务的内容)1.1.3 E-commerce Functional Features(电子商务的功能特性)1.2 E-commerce Emergence and Development(电子商务的产生与发展)1.2.1 The Developing Process of E-commerce(电子商务的发展过程)1.2.2 The Current Situation of E-commerce(电子商务的发展现状)1.2.3 The Trend of the E-commerce Development(电子商务的发展趋势)1.3 E-commerce Influence(电子商务的影响)1.3.1 E-commerce Influence on Economy(电子商务对经济的影响)1.3.2 The Impact of E-commerce on Enterprise(电子商务对企业的影响)1.3.3 The Impact of E-commerce on the Government(电子商务对政府管理的影响)Chapter 2 E-commerce Mechanism and Modes 电子商务机理与模式Case: Digital Beijing Project(引例:首都电子商务工程)2.1 Basic E-commerce Modes(电子商务的基本模式)2.1.1 B2B Mode(B2B模式)2.1.2 B2C Mode(B2C模式)2.1.3 B2G Mode(B2G模式)2.1.4 G2G Mode(G2G模式)2.1.5 C2C Mode(C2C模式)2.2 Framework of E-commerce(电子商务的结构)2.2.1 General Framework of E-commerce(电子商务总框架)2.2.2 Application Framework of E-commerce(电子商务的应用框架)2.3 Elements of E-commerce System(电子商务的系统组成)2.3.1 Major Elements of E-commerce System(电子商务系统的主要组成部分)2.3.2 Network Framework of E-commerce System(电子商务系统的网络架构)2.3.3 Applications Level of E-commerce System(电子商务系统的应用层次)Chapter 3 E-commerce Infrastructural Facilities 电子商务基础设施Case: Covad(引例:Covad)3.1 The Basis of Computer Network(计算机网络基础)3.1.1 Definition of Computer Network(计算机网络的定义)3.1.2 Computer Network Classification(计算机网络的分类)3.1.3 Function of Computer Network(计算机网络的功能)3.2 Network Communication Protocol(网络通信协议)3.2.1 OSI and IEEE 802 Protocol(OSI与IEEE 802协议)3.2.2 TCP/IP Protocol Suite(TCP/IP协议簇)3.2.3 WLAN Communication Protocol(WLAN通信协议)3.3 Internet(互联网)3.3.1 The Emergence and Development of Internet(互联网的产生与发展)3.3.2 Internet Application(互联网的主要应用)3.3.3 IP Address and Domain Name(IP地址和域名)3.3.4 Internet Access(互联网接入方式)3.3.5 Intranet, Extranet and Internet(内联网、外延网和互联网)3.4 Network Program Technology(网络编程技术)3.4.1 Markup Language(标识语言)3.4.2 Java(Java)3.4.3 .NET(.NET)Chapter 4 Information Processing Technology 信息处理技术Case: General Electric(引例:通用电气)4.1 Electronic Data Interchange(电子数据交换)4.1.1 Introduction of EDI(EDI概述)4.1.2 EDI Standards(EDI标准)4.1.3 EDI Network(EDI网络)4.2 RFID Technology(RFID技术)4.2.1 Brief Introduction to RFID(RFID技术简介)4.2.2 Contents of RFID Tracking System(RFID跟踪系统的组成)4.3 GPS Technology(GPS技术)4.3.1 Brief Introduction to GPS(GPS技术简介)4.3.2 Content of GPS Tracking System(GPS跟踪系统的组成)4.4 GIS Technologies(GIS技术)Chapter 5 E-commerce Payment Technology 电子商务支付技术Case: First Internet Bank of Indiana(引例:印第安纳第一网络银行)5.1 E-money(电子货币)5.1.1 Bank Cards(银行卡)5.1.2 E-cash(电子现金)5.1.3 E-check(电子支票)5.1.4 E-wallets(电子钱包)5.2 E-payment System(电子支付系统)5.2.1 E-cash Payment System(电子现金支付系统)5.2.2 Bank Card Payment System(银行卡支付系统)5.2.3 The E-check System(电子支票支付系统)5.3 Internet Technologies and the Banking Industry(互联网技术与银行业)5.3.1 E-bank(网上银行)5.3.2 Mobile Bank(移动银行)Chapter 6 E-commerce Security Technology 电子商务安全技术Case: Bibliofind Company(引例:Bibliofind Company)6.1 Introduction to E-commerce Security(电子商务安全概述)6.1.1 Security Issues in E-commerce(电子商务的安全性问题)6.1.2 The Basic Requirements for Security in E-commerce (EC对安全的基本要求)6.1.3 Measures for E-commerce Security(电子商务安全措施)6.2 Encryption Technology(加密技术)6.2.1 Basic Concept(基本概念)6.2.2 Symmetric Encryption Technology(对称式密钥加密技术)6.2.3 Asymmetric Encryption Technology(非对称密钥加密技术)6.2.4 Mixed EncryptionTechnology(混合加密技术)6.3 Authentication Technology(认证技术)6.3.1 Basic Concept(基本概念)6.3.2 Message Digest and Digital Signatures(数字摘要与数字签名)6.3.3 Digital Certificates and CA Security Authentication (数字证书与CA安全认证体系)6.3.4 Public Key Infrastructure(公钥基础设施)6.4 Firewall Technology(防火墙技术)6.4.1 Basic Concept of the Firewall(防火墙的基本概念)6.4.2 Firewall Principle(防火墙原理)6.4.3 Security Policy and Limitations of Firewall(防火墙的安全策略及局限性)6.5 Security Payment Technology(安全支付技术)6.5.1 Secure Socket Layer(安全套接层协议)6.5.2 Secure Electronic Transaction(安全电子交易协议)6.5.3 Comparison between SSL and SET(SSL与SET比较)Chapter 7 E-commerce and the Law 电子商务与法律Case: Legal Issue Related to Hyperlink on the Website(引例:关于网站中的超链接的法律问题)7.1 Introduction to E-commerce Law(电子商务法介绍)7.1.1 The Legal Issue for E-commerce(电子商务引发的法律问题)7.1.2 Concepts and Features of E-commerce Law(电子商务法的概念及其特征)7.1.3 The Legislation Course of E-commerce(电子商务立法进程)7.2 The Law Issues in E-commerce's Transactions(电子商务交易中存在的法律问题)7.2.1 Electronic Signature Law of the People's Republic of China(《中华人民共和国电子签名法》)7.2.2 Contracting and Contract Enforcement in E-commerce (电子商务中的合同和履行)7.2.3 Digital Signatures and Authentication(电子签名及认证问题)7.3 Intellectual Property in E-commerce(电子商务中的知识产权问题)7.3.1 Copyright(网络著作权的法律保护)7.3.2 Domain Names(有关域名的法律保护)7.3.3 Database(数据库的法律保护)7.4 Customer Right Protection at E-commerce(电子商务中的消费者权益保护)7.4.1 Customer Privacy Protection(消费者隐私权保护)7.4.2 Virtual Property Protection(虚拟财产的保护)Chapter 8 E-commerce and Taxation 电子商务与税收Case:eBay'ers(引例:eBay用户)8.1 Introduction to Taxation in E-commerce(电子商务税收概述)8.1.1 Taxation and Its Significance(税收及其重要性)8.1.2 Characteristics of E-commerce Taxation(电子商务税收的特点)8.2 Taxation Issue in E-commerce(电子商务带来的税收问题)8.2.1 Argument for E-commerce Taxation(电子商务征税的争执)8.2.2 Permanent Establishment(常设机构)8.2.3 Tax Jurisdiction(税收权限)8.3 International Legislation of E-commerce Taxation(国际上电子商务的税收法规)8.3.1 Two Perspectives Over Taxation Policy(电子商务税收政策的两种观点)8.3.2 Nexus(直接关系税)8.3.3 European Union Value Added Taxes(欧盟的增值税)8.3.4 The OECD Five Key Principles for E-commerce Taxation(经济发展与合作组织对于电子商务税收的5点原则)8.3.5 Alternative Ways of Taxing the E-commerc(对电子商务税收的几种方案)Chapter 9 E-commerce and Business Management企业电子商务管理Case:P&G and Wal-Mart(引例:宝洁和沃尔玛)9.1 Critical Success Factors and E-commerce Strategies (关键成功因素与电子商务策略)9.1.1 Critical Success Factors(关键成功因素)9.1.2 Critical Success Factors in E-commerce(电子商务的关键成功因素)9.2 E-commerce and Supply Chain Management(电子商务与供应链管理)9.2.1 Supply Chain Introduction(供应链介绍)9.2.2 E-supply Chain Management(电子商务供应链管理)9.2.3 Supply Chain Integration with the Application of E-commerce(运用电子商务进行供应链整合)9.3 E-commerce and Human Resources Management(电子商务与人力资源管理)9.3.1 HRM in the Context of E-Commerce(电子商务环境下的人力资源管理)9.3.2 Knowledge Management(知识管理)9.4 E-commerce and Logistics(电子商务与物流管理)9.4.1 E-logistics Management(电子商务物流管理)9.4.2 E-logistics Differs from Traditional Logistics(电子商务物流与传统物流的区别)Chapter 10 Construction of E-commerce System电子商务系统建设Case:Sinochem Corporation E-commerce System(引例:中国化工进出口总公司电子商务系统)10.1 System Design of E-commerce System(电子商务系统设计)10.1.1 Framework of E-commerce System(电子商务系统结构)10.1.2 E-commerce Website Design Elements(电子商务网站设计要素)10.2 The Developing Process of E-commerce System(电子商务系统建设过程)10.2.1 Lifecycle of System Development(系统开发周期)10.2.2 System Analysis and Planning(系统分析和规划)10.2.3 System Design and Development(系统设计与开发)10.2.4 System Testing/Implementation/Maintenance(系统测试/实施/维护)10.3 System Software of E-commerce System(电子商务系统的主要软件)10.3.1 Web Server Software(Web服务器软件)10.3.2 Application Server(应用服务器)10.3.3 E-commerce Software Package(电子商务软件包)Chapter 11 E-commerce Website 电子商务网站建设Case:Circuit City's E-superstore(引例:Circuit City的网上超市)11.1 E-commerce and Portal Site(电子商务和门户网站)11.1.1 Types of Portal Site(门户网站的类型)11.1.2 Importance of Web Portals(网络门户网站的重要性)11.2 Website Construction(网站建设)11.2.1 The Pattern of E-shops(网上商店的模式)11.2.2 Launch an Successful Online Business(启动一个成功的网上商业项目)11.2.3 Website Design(网站设计)11.2.4 Actualization of E-shops(网上商店的实现)11.3 E-shop Fore-end(网络商店前台)11.3.1 Online Catalog(网上产品目录)11.3.2 Shopping Cart(购物车)11.3.3 Online Payment(网上支付)11.4 E-shop Back-end(网络商店后台)11.4.1 Order Processing(订单处理)11.4.2 Customer Relationship Management(CRM)(客户关系管理)11.4.3 Logistics(物流配送)Chapter 12 E-commerce and the Latest Development电子商务发展动态Case:The Future Store in Germany(引例:德国的未来超市)12.1 Current Status of E-commerce(电子商务现状)12.1.1 Global E-commerce Latest Development(全球电子商务发展的基本情况)12.1.2 Development of E-commerce in China(中国电子商务的基本情况)12.1.3 Problems in China's E-commerce Development(中国电子商务发展中存在的问题)12.1.4 Policy for the Promotion of E-commerce Development (中国促进电子商务发展的方针政策)12.2 M-commerce(移动电子商务)12.2.1 Technologies of M-commerce(移动电子商务的实现技术)12.2.2 M-tickets(移动电子票务)12.3 Other E-commerce Development(其他电子商务的发展情况)12.3.1 IPTV(数字电视)12.3.2 Blog(博客)。
电子商务导论(双语)所划重点
电子商务导论(双语)所划重点1.Definition and category EC is the use of electronic communication to do business,the transfer of information,over internet.B2B,B2C,C2C,B2G,business processes that supply buying or selling activities(U2B,M2B,H2B),eg.DELLcomputer.2.Describe the benefits of EC to ORGANIZATIONS, CONSUMERS AND SOCIETYOrganizations:global reach/Cost reduction/supply chain improvement/new business model/rapid time-to-market/lower communication costs/improve costomer relation/no city business permits and fees.Consumer: ubiqulity(无处不在)/more products and services/cheeper products and services/instant delivery/information availabilities/no sales tax.Society:telecommuting/higher standard of living/availability of public services.3.EFT(Electronic Funds Transfer) used by banks:电子资金转账,银行业务中高速划拨资金的电子支付系统,如POS系统、ATM系统等。
电子商务重点整理
电⼦商务重点整理第⼀章电⼦商务导论1、电⼦商务(electronic commerce ,EC),就是利⽤计算机⽹络,主要是互联⽹和内联⽹买卖、交换、配送、服务、信息的过程。
2、电⼦业务(e-business),是电⼦商务的⼴义含义。
除了买、卖商品和服务外,还包括客户服务,与商业伙伴之间的协调、合作,利⽤⽹络开展学习活动,以及在机构内部进⾏的电⼦交易。
3、完全电⼦商务与部分电⼦商务(9个维度,图P5)按照数字化(指实体形式向数字形式的转换过程)程度的⾼低,电⼦商务可以有多种形式。
数字化包括:①订单系统数字化(订购、⽀付);②⽣产流程数字化(指产品/服务的制作);③配送⽅式数字化。
在完全电⼦商务模式中,3个维度都是数字的。
商务活动中只要有⼀个要素是数字的,我们就可以认为它属于电⼦商务,但是为“部分电⼦商务”。
4、电⼦商务活动开展(1)电⼦市场:买卖双⽅可以进⾏信息、产品、服务以及资⾦的交换的在线市场(2)跨组织信息系统(IOSs):允许在两个或更多组织之间进⾏⽇常交易处理与信息传递的通信系统(包含了在两个或是更多组织之间的交易过程和信息流)(3)组织内部信息系统:⽀持在独⽴组织内部进⾏电⼦商务活动的信息系统5、电⼦商务组织(EC organizations)(1)brick-and-mortar organizations(完全的实体组织/砖⽡灰浆式组织):主要业务是在实体世界中完成并且通过实体代理⼈销售实体产品的旧经济组织;(2)virtual (pure-play) organizations(虚拟组织/纯电⼦商务组织):所有业务均在⽹上开展;(3)click-and-mortar (click-and-brick) organizations(⿏标加⽔泥模式):该组织进⾏⼀些电⼦商务业务,但主要的业务还是在实体世界中完成。
6、电⼦商务的主体框架(电⼦商务依赖于五个独⽴领域)(1)People(⼈员):买家、卖家、中间商、信息系统及技术专家、其他各种员⼯及形形⾊⾊的参与者共同构成了⼀⼤⽀柱。
电子商务各章节复习重点内容
电子商务各章节复习重点内容第1章电子商务导论1. 电子商务的定义广义理解:电子商务是指在计算机通信网络基础上,利用电子工具实现商业交换和商业作业活动的全过程。
狭义理解:电子商务是利用TCP/IP公众网络和技术进行的在线交易和商业作业活动。
EC被称为狭义的电子商务;主要进行网上交易活动。
EB被称为广义的电子商务;包括对企业外部网和企业内部网的运用一个市场是由三部分组成的,即主体(代理)、产品和过程。
2.电子商务的分类按交易对象分类:B TO C、B TO B、其他对象间的电子商务,如B TO G、C TO C电子商务。
B TO B模式包括:买方采购;垂直社团;电子化市场按照电子商务所使用的网络类型分类:EDI电子商务;互联网电子商务内部网电子商务3. 电子商务的特性:普遍性、方便性、整体性、安全性、协调性4. 电子商务的影响:A电子商务改变商务活动的方式B电子商务改变人们的消费方式C电子商务将改变企业的生产方式D电子商务将给传统企业带来一场革命E电子商务将带来一个全新的金融业F电子商务将转变政府的行为5. 我国电子商务在发展过程中面临哪些问题?A网络基础设施建设问题B安全问题 C 网上支付问题D物流配送问题E电子商务法律问题F企业信息化水平落后问题G企业管理水平落后、经营方式陈旧问题H诚信问题6. 电子商务与传统商务的运作过程比较交易前的准备过程:传统商务:商品信息的发布、查询和匹配电子商务:通过网络,快速、高效率贸易磋商过程:传统商务:口头磋商,通过邮寄传递纸面贸易单证电子商务:电子化,专门的数据交换协议合同与执行过程:传统商务:合同书面形式,通过合同由相应机构仲裁电子商务:网络协议,电子商务应用系统支付过程:传统商务:支票和现金电子商务:信用卡、电子支票、电子现金、电子钱包7. 电子商务的功能:广告宣传、咨询洽谈、网上订购、网上支付(电子账户)、物流服务传递、意见征询、交易管理选择题及思考题第2,3,4,5,8 题第2章电子商务的商业模式1.商业模式的概念:一种包含了一系列要素及其关系的概念性工具,用以阐明某个特定实体的商业逻辑。
电子商务导论英文版第二版第01章
Learning Objectives
6. Describe some EC business models. 7. Describe the benefits of EC to organizations, consumers, and society. 8. Describe the limitations of EC. 9. Describe the contribution of EC to organizations responding to environmental pressures.
1-11
Electronic Commerce: Definitions and Concepts
Internet versus Non-Internet EC
Most EC is done over the Internet, but EC also can be conducted on private networks, such as value-added networks, local area networks, or on a single computerized machine Non-Internet EC includes the use of mobile handwriting-recognition computers used by field reps to write their notes in the field
1-7
Electronic Commerce: Definitions and Concepts
Pure versus Partial EC
EC can take several forms depending on the degree of digitization
电子商务导论(双语)期末重点
题型:1.单选题(2分x20=40分 2多选题(3分x5=15分) 3短语翻译(1分x15=15分)问答题(4分x5=20 分)分析题(10分x1=10分)Chapter 11.电子商务的定义和类别广义—指交易当事人或参与人利用以现代信息技术为基础的互联网所进行的各类商业活动;狭义—指交易当事人通过以因特网为主的计算机网络所实施的各种交易活动。
按交易类型:B2C、B2B、G2B;按商务活动内容:贸易型和服务性;根据使用网络类型不同:EDI商务、因特网商务、内联网商务、移动商务。
2.Describe the benefits of EC to ORGANIZATIONS, CONSUMERS AND SOCIETY3.EFT(Electronic Funds Transfer) used by banks电子资金转账”。
EFT是计算机在银行业务中得到应用后,银行利用计算机、终端机、电子信息网络等电子通讯设备建立的高速划拨资金的电子支付系统。
4.Which commerce is more well-suited to Business Process?E-commerce电子商务E-commerce + Traditional电子商务+传统 Traditional传统5.Advantages of E-Commerce.Increases sales, decreases cost增加销售,减少成本Provides purchasing opportunities for buyers 为买家提供采购机会(企业可以确定新的供应商和合作伙伴)Increase speed and accuracy for exchanged information, thus reducing cost增加信息交换的速度和准确性,从而降低成本Business can be transacted 24hrs a day可以一天24小时交易业务The level of detail of purchase information is selected by user详细级别的购买信息由用户选定Digital products can be delivered instantly数码产品可以立即交付Tax refunds, public retirement and welfare support costs less when distributed over the Internet退税,公共退休和福利支持成本分布在互联网时少Allows products and services to be available in remote areas, e.g. remote learning使产品和服务可在偏远地区,如远程学习6.电子商务国际化当中遇到的问题(文化为主)Culture – the combination of111language and customs 文化,语言和风俗222Culture varies across national boundaries and in many cases regions within nations 文化跨越国界不同,在许多情况下,区域内的国家333Choice of icons on Web pages becomes problematic on international Web sites: 选择的图标在网页上就会有问题,在国际网站上:(In the US a shopping cart is useful, in the UK a shopping basket is more appropriate, Australians c all shopping carts, shopping trolleysIn many places other than Brazil the thumbs up gesture mean s okay, in Brazil it is an obscene gesture在美国一个购物车是有用的,在英国购物篮子是更合适的,澳大利亚人叫购物车,购物手推车,在其他很多地方比巴西大拇指手势意味着好,在巴西是一个淫秽的姿势)7.交易成本transaction costTransaction costs are the total costs that a buyer and seller incur as they gather information and negotiate a purchase/sale transaction交易成本是总成本,买方和卖方承担收集信息和谈判购买/销售事务Transaction costs are the main reason for vertical integration (Ronald Coase)交易成本是垂直整合的主要原因(罗纳德•科斯)Businesses can use e-commerce to reduce transaction costs (e.g. telecommuting rather than phys ical commuting to allow global employment opportunities)企业可以利用电子商务来减少交易成本(如远程办公而不是物理通勤允许全球就业机会) CHAPTER 2WWW(World Wide Web)----> 定义及作用The world wide web (WWW) is a subset of the computers on the Internet that connect in a certai n way, making their content accessible to each other万维网(WWW)是计算机在互联网上的一个子集,以某种方式连接,使其内容可访问The WWW includes an easy to use standard interface facilitating ease of useWWW包括一个易于使用的标准接口方便易用性电子邮件何时出现(in 1972)ISP (Information Service Provider) 信息服务提供商Product-Switched Network(LAN/WAN)产品转换网络Four key rules used by ARPANETndependent networks (e.g. A LAN or WAN) should not require internal changes in order to be con nected to the network独立的网络(如LAN或WAN)应该不需要内部的变化才能连接到网络Packets that do not arrive at their destination must be resent from their source network包,不到达目的地必须对源网络Router computers act only as receiving and forwarding devices; They do not retain information a bout the packets they handle路由器电脑才接收和转发设备;他们不保留他们的信息数据包处理No global control of the network exist没有全球控制网络的存在TCP--> Transmission Control Protocol传输控制协议IP--> Internet Protocol互联网协议Differences between Internet & Extranet有一个Intranet和Internet之间的一个主要区别:互联网是一个开放的,公共空间,而内部网的设计是一个私人空间。
电子商务概论(双语)Schneider AISE PPT Ch08
E-Business, Eighth Edition
2
Web Server Basics
• Chapter topics
– Basic technologies to build online business Web sites
• Server software and hardware • Utility function software
E-Business, Eighth Edition 8
Dynamic Content (cont’d.)
• Server-side scripting
– Used by first Web sites providing dynamic pages – Also called:
• Server-side includes • Server-side technologies
4
E-Business, Eighth Edition
Web Clients and Web Servers
• Client/server architectures
– Client requests services from server
• Client computer
– Uses Web browser software (Web client software)
• Server computer
– More memory and larger, faster disk drives
• Platform neutral Web software
– Various computers communicate easily, effectively – Critical ingredient for rapid spread, widespread Web acceptance
《电子商务导论》双语教学实践探讨
关 键 词 :电子 商 务 导 论 ;双 语 教 学 ; 教 学 改 革
0 引
言
考 虑 到实 际课 时 有 限 . 所 以对 内 容 进 行 适 当节 选 . 主 要
《 电子商务 导论 》 是广西师 范大学计算机科 学与信 息工程学 院信息 管理专业 的基 础课程 .它在整 个课程 体 系中起着关键 的基石作用 该课 程往往安排 在大学
收稿 日期 : 2 0 1 3 —0 4 —2 5 修 稿 日期 : 2 0 1 3 - 0 5 -2 5
作 者 简介 : 李智( 1 9 6 9 一 ) , 男, 广 西桂 林人 , 博 士, 研 究 方 向为 软 件 需 求 工程 、 软件测试、 经验 软 件 工程
现 代 计 算 机 2 0 1 3 . 0 6 上 0
一
选 取 了 电 子 商 务 概 述 、电 子 市 场 、 B 2 B电 子 商 务 、 We b 2 . 0环境 中的社会 网络 、 移动商务 、 电子商 务安全 、 电子商务支付 系统 、订单履行及其他支 持性服务等 章
节 这 样 节 选 的原 因 是 大 多 数 选 课 的学 生 来 源 于 计 算
堂讨论 。 教 师 在 授 课 之 前 仔 细 阅读 原 版 教 材 , 在 保 持 教 学 重 点 核 心 内容 基 础 上 .对 学 生 不 是 很 熟 悉 的 国外 案
★基 金 项 目: 国 家 自然 科 学 基 金 项 目( No . 6 1 2 6 2 0 0 4 ) 、 广 西 自然 科 学基 金 项 目( No . 2 0 1 2 G xNS F C A 0 5 3 0 1 0 ) 、 广 西研 究 生教 育 创 新 计 划 资助 项 目( No . J G Y2 0 1 3 0 2 2 ) 、 2 0 1 3年 度 广 西 高 等教 育教 学 改 革 工 程 项 目( No . 2 0 1 3 J G B1 2 1 )
电子商务导论(双语) chap02
© Prentice Hall, 2000
4
Advantages of Electronic Marketing
Customers can order from cyberstores 24 hours a day, 7 days a week from any place in the world
Direct marketing
Customization
Online customer service
Electronic shopping malls:
Intermediaries (e.g. Internet Mall)
Stores (e.g. Amazon, J.C.Penney Online)
Identify the typical products that sold well in the electronic market
© Prentice Hall, 2000
2
Learning Objectives (cont.)
Observe the reactive strategy of traditional department stores
1,000 48 350 436
850 45 450
200 363 200 1,170 518
117,000 3,500 65,000 46,000
775,000 144,000
580 10,000 228,000
200,000 45,000 23,200 6,579
[Source: OECD, 1997]
Describe the impact of EC on
disintermediБайду номын сангаасtion and re-intermediation in
电子商务导论英文版2版PPT、教师手册、试题库 turban_iec3_tif_10
Introduction to Electronic Commerce, 3e (Turban)Chapter 10 Electronic Commerce Payment Systems10.1 True/False1) The barriers to selling pay-per-page or chapter plans online are technical, not financial. Answer: FALSEDiff: 2 Page Ref: 3842) Purchases under $5 are called micropayments.Answer: TRUEDiff: 1 Page Ref: 3843) The disintermediation of cash and credit cards has been successful in the online world. Answer: FALSEDiff: 2 Page Ref: 3844) Evidence suggests that consumers are willing to use their credit cards for micropayments. Answer: TRUEDiff: 2 Page Ref: 3845) To date, companies such as and Random House have been very successful with their pay-per-page and chapter plans for selling books.Answer: FALSEDiff: 2 Page Ref: 3856) The overwhelming majority of B2C purchases are paid for by credit card.Answer: TRUEDiff: 1 Page Ref: 3857) E-payment methods that require the payer to install specialized security software are likely to succeed.Answer: FALSEDiff: 2 Page Ref: 3868) The success of an e-payment method depends on its interoperability with existing enterprise systems and applications.Answer: TRUEDiff: 2 Page Ref: 3869) Currently, the percent of recurring bills paid electronically hovers around 75 percent. Answer: FALSEDiff: 2 Page Ref: 38610) To succeed, special e-payment methods, such as e-cash, have to maintain anonymity. Answer: TRUEDiff: 2 Page Ref: 38711) E-payment methods that address the lower or higher end of the price continuum are unlikely to be widely accepted because of cost and security issues.Answer: FALSEDiff: 2 Page Ref: 38712) Credit cards and charge cards are e-payment instruments that allow the holder to make purchases up to a fixed limit and charge interest each month on unpaid balances.Answer: FALSEDiff: 2 Page Ref: 38713) With a debit card, the money for a purchased item comes directly out of the holder's checking account with the actual transfer of funds from the holder's account to the merchant's taking place within one to two days.Answer: TRUEDiff: 2 Page Ref: 38714) In the settlement process, the system determines whether a buyer's card is active and whether the cardholder has sufficient funds available for the purchase.Answer: FALSEDiff: 2 Page Ref: 38815) Identification and settlement are the two major phases of card payment processing. Answer: FALSEDiff: 2 Page Ref: 38816) In the authorization process, money is transferred from the buyer's to the merchant's account. Answer: FALSEDiff: 2 Page Ref: 38817) For a given type of payment card and processing system, the processes and participants are essentially the same for off-line (card present) and online (card not present) purchases. Answer: TRUEDiff: 2 Page Ref: 38818) CyberSource is a payment processing service that provides connectivity among merchants, customers, and financial networks that enables authorization and payments.Answer: TRUEDiff: 2 Page Ref: 38819) In the online world, merchants are not held liable for fraudulent transactions.Answer: FALSEDiff: 2 Page Ref: 38920) Recent surveys by CyberSource indicate that fraudulent card transactions are a growing problem for online merchants.Answer: TRUEDiff: 1 Page Ref: 38921) According to a recent CyberSource survey, larger firms are more susceptible to fraud than smaller firms.Answer: FALSEDiff: 2 Page Ref: 39022) One problem with the Address Verification System (AVS) for fraud prevention is the number of false positives, meaning that the merchant rejects a valid order.Answer: TRUEDiff: 2 Page Ref: 39023) One impact of anti-fraud tools is that merchants are rejecting a significant number of both valid and invalid orders due to suspicion of fraud.Answer: TRUEDiff: 2 Page Ref: 39124) Smart cards are more secure than credit cards and can be extended with other payment services.Answer: TRUEDiff: 2 Page Ref: 39325) Regardless of the vendor's point of view, there is substantial evidence, at least in the offline world, that consumers are not willing to use their credit or debit cards for micropayments under $5 to minimize security risks.Answer: FALSEDiff: 3 Page Ref: 39810.2 Multiple Choice1) Systems that aggregate online purchases areA) closed-loop systems.B) open-loop systems.C) payment consolidation systems.D) micropayment aggregation systems.Answer: ADiff: 2 Page Ref: 3842) Factors that determine whether a particular method of e-payment achieves critical mass include each of the following exceptA) hardware and software independence.B) full traceability of the buyers.C) degree of security of the transfer.D) interoperability with other enterprise systems and applications.Answer: BDiff: 2 Page Ref: 3863) Which of the following spurred the use of debit cards by eliminating the requirement for merchants to issue receipts for debit purchases of $15 or less?A) Federal Deposit Insurance ActB) Bank Service Company ActC) U.S. Electronic Funds Transfer ActD) Bank Protection ActAnswer: CDiff: 3 Page Ref: 3864) Each of the following is true regarding trends for B2C merchants except:A) It is hard to run an online business without supporting credit card payments.B) It is increasingly important to support payments by debit cards.C) Merchants interested in international markets should support a variety of e-payment mechanisms.D) Merchants who offer multiple payment types have higher shopping cart abandonment rates and lower order conversion.Answer: DDiff: 2 Page Ref: 3865) Factors influencing whether a particular e-payment method achieves critical mass includeA) independence.B) interoperability and portability.C) security.D) all of the above.Answer: DDiff: 2 Page Ref: 3866) Each of the following is a true statement regarding e-payment methods exceptA) to succeed, special payment methods, such as e-cash, must be well-known.B) e-payment methods that require the payer to install specialized components are less likely to succeed.C) if the risk for the payer is higher than the risk for the payee, then the payer is not likely to accept the method.D) for B2C e-payments, credit cards are the standard due to their ease of use.Answer: ADiff: 3 Page Ref: 386-3877) Each of the following is a payment card type exceptA) debit card.B) video card.C) credit card.D) charge card.Answer: BDiff: 1 Page Ref: 3878) Which of the following provides the holder with credit to make purchases up to a limit fixed by the card issuer?A) charge cardB) credit cardC) debit cardD) rebate cardAnswer: BDiff: 1 Page Ref: 3879) The type of payment card where the money for a purchased item comes directly out of the holder's checking account is aA) credit card.B) charge card.C) debit card.D) rebate card.Answer: CDiff: 1 Page Ref: 38710) The process of determining whether a card is active and whether the customer has sufficient funds for the purchase is calledA) settlement.B) approval.C) authorization.D) procurement.Answer: CDiff: 1 Page Ref: 38811) During the processing of card payments, which of the following involves the transfer of money from the buyer's to the merchant's account?A) acquisitionB) acceptanceC) authorizationD) settlementAnswer: DDiff: 1 Page Ref: 38812) Each of the following is a basic configuration for processing online payments exceptA) own the payment software.B) require the issuing bank to provide the software and the point of sale system.C) use a point of sale system operated by an acquirer.D) use a point of sale system operated by a payment provider.Answer: BDiff: 1 Page Ref: 38813) Which of the following is the basic configuration for processing online payments where the merchant system deals only with order information?A) own the payment softwareB) use a point of sale system operated by a payment service providerC) use a point of sale system operated by an acquirerD) require the payee to utilize specialized softwareAnswer: CDiff: 1 Page Ref: 38814) ________ offer Internet Merchant Accounts, which are special accounts for credit card authorization and payment processing.A) Acquiring banksB) Issuing banksC) Credit card associationsD) Payment processing servicesAnswer: ADiff: 2 Page Ref: 38815) Costs associated with fraudulent transactions includeA) additional fees and penalties imposed by card associations for accepting fraudulent transactions.B) the cost of manually reviewing orders.C) the revenue that is lost from rejecting orders that are valid.D) all of the above.Answer: DDiff: 1 Page Ref: 38816) In a 2008 survey, CyberSource documented each of the following except:A) The total dollars lost to fraud increased substantially, from $1.9 billion in 2003 to $4.0 billion in 2008.B) The fraud rate for international orders is 3.5 times less than the fraud rate for domestic orders.C) In 2008, the median value of fraudulent orders was $200, which was 67 percent higher than the average value of valid orders.D) From 2006-2007, the amount spent on manual review of orders increased over 30 percent, or by about $100 million.Answer: BDiff: 3 Page Ref: 389-39017) The steps merchants have taken to combat fraud include each of the following except:A) In 2008, merchants used more tools than in the past to combat fraud.B) In 2008, the median number of tools used by merchants was 4.7, compared with 3 in 2003.C) Of the .2 percent of online revenue allocated to combating fraud in 2008, most of the money was spent on third-party tools and services.D) Fraud screens and automated decision models were among the key tools used to combat fraud. Answer: CDiff: 3 Page Ref: 39018) Key tools used in combating fraud includeA) address verification.B) manual review.C) card verification number.D) all of the above.Answer: DDiff: 1 Page Ref: 39019) A tool that detects fraud by comparing the address entered on a Web page with the address information on file with the cardholder's issuing bank best describesA) address verification system.B) card verification system.C) billing verification system.D) point of sale system.Answer: ADiff: 2 Page Ref: 39020) A file containing customer status and customer information that is used when processing transactions to identify known problem customers is aA) negative list.B) problem child list.C) cancellation list.D) rejection list.Answer: ADiff: 2 Page Ref: 39121) A smart card containing a small gold plate on the face that when inserted in a smart card readermakes contact and passes data to and from the embedded microchip is aA) plate card.B) contact card.C) proximity card.D) dedicated card.Answer: BDiff: 2 Page Ref: 39222) The type of contact card that is erasable and modifiable isA) EPROM.B) BIOS.C) EEPROM.D) RAM.Answer: CDiff: 2 Page Ref: 39223) Which of the following is an open application operating system for smart cards?A) Linux.B) SMARTS.C) Windows Vista.D) MULTOS.Answer: DDiff: 2 Page Ref: 39224) A ________ has two separate chips embedded in the card, contact and contactless, which eliminates the need to carry multiple cards to support the various smart card readers and applications.A) dual-interface smart cardB) multi-debit cardC) hybrid smart cardD) RFID cardAnswer: CDiff: 2 Page Ref: 39225) The European Commission initiative where all EU banks agreed to use the same basic bank card standard, enabling the use of credit and debit cards throughout the EU isA) SEPA.B) CUPA.C) EECA.D) EUCP.Answer: ADiff: 3 Page Ref: 39326) Stored-value cards that are issued by a specific merchant or merchant group and that can only be used to make purchases from that merchant or merchant group are calledA) open-loop cards.B) closed-loop cards.C) merchant-specific cards.D) designated cards.Answer: BDiff: 3 Page Ref: 39627) The micropayment model where payments from a single consumer are batched together and processed only after a certain time period has expired or a certain monetary threshold is reached describesA) aggregation.B) stored value.C) subscriptions.D) direct payment.Answer: ADiff: 2 Page Ref: 398-39928) The micropayment model where up-front payments are made to a debit account, and then purchases are deducted as they are made isA) aggregation.B) stored value.C) subscriptions.D) direct payment.Answer: BDiff: 2 Page Ref: 39929) An advantage of e-checks is that theyA) involve simple processing systems.B) operate outside the traditional banking industry.C) contain much more information then traditional paper checks.D) fit current business practices, and so require little process reengineering.Answer: DDiff: 2 Page Ref: 40030) The nationwide batch-oriented electronic funds transfer system that provides for the interbank clearing of electronic payments for participating financial institutions is theA) Automated Clearing House Network.B) Federal Reserve System.C) E-bill Presentment and Payment Network.D) Receiving Depository Financial Institution.Answer: ADiff: 2 Page Ref: 40210.3 Fill in the Blank1) Purchases under $5 are ________.Answer: micropaymentsDiff: 2 Page Ref: 3842) The ________ eliminated the requirement for merchants to issue receipts for debit purchases of $15 or less.Answer: U.S. Electronic Funds Transfer ActDiff: 3 Page Ref: 3863) When a credit card is used for payment, the merchant pays a ________ of up to 3 percent of the item's purchase price.Answer: transaction feeDiff: 2 Page Ref: 3874) A number of international, federal, and state ________ govern all payment methods. Answer: regulationsDiff: 1 Page Ref: 3875) ________ are electronic cards that contain information that can be used for payment purposes. Answer: Payment cardsDiff: 2 Page Ref: 3876) A ________ is a type of payment card that provides the holder with credit to make purchases up to a limit fixed by the card issuer.Answer: credit cardDiff: 1 Page Ref: 3877) A ________ is a type of payment card where the balance is supposed to be paid in full upon receipt of the monthly statement.Answer: charge cardDiff: 2 Page Ref: 3878) With a ________, the money for a purchased item comes directly out of the holder's checking account.Answer: debit cardDiff: 1 Page Ref: 3879) In a card payment system, ________ determines whether a buyer's card is active and whether the customer has sufficient funds.Answer: authorizationDiff: 2 Page Ref: 38810) ________ and ________ are the two major phases of processing card payments.Answer: Authorization, settlementDiff: 2 Page Ref: 38811) In the processing of card payments, ________ involves the transfer of money from the buyer's to the merchant's account.Answer: settlementDiff: 2 Page Ref: 38812) ________ is a third-party service connecting a merchant's EC system to the appropriate acquiring bank or financial institution.Answer: Payment service providerDiff: 2 Page Ref: 38813) Most merchants use the fraud detection method known as ________. This method compares the address entered on a Web page with the address information on file with the cardholder's issuing bank.Answer: Address Verification SystemDiff: 2 Page Ref: 39014) ________ detects fraud by comparing the verification number printed on the signature strip on the back of the card with the information on file with the cardholder's issuing bank.Answer: Card verification numberDiff: 2 Page Ref: 39015) A ________ is an electronic card containing an embedded microchip that enables predefined operations or the addition, deletion, or manipulation of information on the card.Answer: smart cardDiff: 2 Page Ref: 39116) The ________ activates and reads the contents of the chip on a smart card, usually passing the information on to a host system.Answer: smart card readerDiff: 1 Page Ref: 39217) A ________ is a smart card containing a small gold plate on the face that when inserted in a smart card reader makes contact and passes data to and from the embedded microchip. Answer: contact cardDiff: 1 Page Ref: 39218) A ________ is a special system that handles file management, security, input/output, and command execution and provides an application programming interface for the smart card. Answer: smart card operating systemDiff: 3 Page Ref: 39219) A ________ card has an embedded antenna that passes data and applications to and from a card reader unit without contact between the card and reader.Answer: contactlessDiff: 2 Page Ref: 39220) In general, smart cards are ________ secure than conventional payment cards.Answer: moreDiff: 1 Page Ref: 39321) A ________ is a card that has monetary value loaded onto it and that usually is rechargeable. Answer: stored-value cardDiff: 3 Page Ref: 39622) ________ and ________ are two varieties of stored-value cards.Answer: Closed loop, open loopDiff: 3 Page Ref: 39623) ________ are small online payments, typically under $10.Answer: E-micropaymentsDiff: 2 Page Ref: 39724) A(n) ________ is a legally valid electronic version or representation of a paper check. Answer: e-checkDiff: 2 Page Ref: 39925) The ________ is a nationwide batch-oriented electronic funds transfer system that provides for the interbank clearing of electronic payments for participating financial institutions.Answer: Automated Clearing House NetworkDiff: 2 Page Ref: 40210.4 Essay1) List nine factors that come into play in determining whether a particular method of e-payment achieves critical mass.Answer: Independence, interoperability and portability, security, anonymity, divisibility, ease of use, transaction fees, international support, and regulations are nine factors.Diff: 2 Page Ref: 386-3872) List the three basic configurations for processing online payments.Answer: The three basic configurations are own the payment software, use a point of sale system operated by an acquirer, and use a point of sale system operated by a payment service provider. Diff: 1 Page Ref: 3883) What costs do online merchants incur for fraudulent transactions?Answer: In the online world, merchants are held liable for fraudulent transactions. In addition to the lost merchandise and shipping charges, merchants who accept fraudulent transactions can incur additional fees and penalties imposed by the card associations. However, these are not the only costs. There also are the costs associated with combating fraudulent transactions. These include the costs of tools and systems to review orders, the costs of manually reviewing orders, and the revenue that is lost from rejecting orders that are valid.Diff: 2 Page Ref: 388-3894) What is a smart card? Briefly describe two types of smart cards.Answer: A smart card is an electronic card containing an embedded microchip that enables predefined operations or the addition, deletion, or manipulation of information on the card. Contact and contactless are two types of smart cards. A contact card contains a small gold plate on the face that when inserted in a smart card reader makes contact and passes data to and from the embedded microchip. The contactless card is a smart card with an embedded antenna, by means of which data and applications are passed to and from a card reader unit or other device without contact between the card and the card reader.Diff: 2 Page Ref: 391-3925) Briefly describe five basic micropayment models.Answer: Aggregation, direct payment, stored value, subscriptions, and à la carte are the five basic micropayment models. Aggregation occurs when payments for a single customer are batched together and processed only after a certain time period has expired or a certain monetary threshold is reached. Direct payment occurs when micropayments are added to a monthly bill for existing services. Stored value refers to up-front payments made to a debit account, and then purchases are deducted as they are made. With subscriptions, a single payment covers access to content for a defined period of time. With à la carte, vendors process purchases as they occur and rely on the volume of purchases to negotiate lower credit and debit card fees.Diff: 2 Page Ref: 398-399。
电子商务导论英文版2版PPT、教师手册、试题库 turban_iec3_tif_03
Introduction to Electronic Commerce, 3e (Turban)Chapter 3 Retailing in Electronic Commerce: Products and Services3.1 True/False1) The top 500 e-tailers accounted for 65 percent of all online sales in 2009.Answer: TRUEDiff: 1 Page Ref: 872) The amount and percentage of goods and services sold on the Internet is increasing rapidly, despite the failure of many dot-com companies.Answer: TRUEDiff: 1 Page Ref: 883) According to Internet Retailer (2009), approximately 75 percent of adult U.S. Internet users shopped online and/or researched offline sales online.Answer: FALSEDiff: 2 Page Ref: 884) As the number of Internet users reaches saturation, the rate of increase of online shoppers will slow, which creates the challenge for e-retailers to increase the amount spent online.Answer: TRUEDiff: 3 Page Ref: 885) A retailer is a sales intermediary, a seller that operates between manufacturers and customers. Answer: TRUEDiff: 1 Page Ref: 886) When comparing retailing to e-tailing, e-tailing has a lower cognitive shopping overhead due to easy-to-establish mutual trust.Answer: FALSEDiff: 3 Page Ref: 927) Commodities with standard specifications (e.g., books, CDs, airline tickets) are expected to facilitate higher sales volumes.Answer: TRUEDiff: 1 Page Ref: 938) A business model is a description of how an organization intends to generate revenue through its business operations.Answer: TRUEDiff: 2 Page Ref: 939) Marketing done online between any seller and buyer is indirect marketing.Answer: FALSEDiff: 1 Page Ref: 9410) Direct marketers are firms that sell directly to consumers over the Internet without maintaininga physical sales channel.Answer: FALSEDiff: 2 Page Ref: 9411) A click-and-mortar retailer is a combination of both the brick-and-mortar retailer and an online transactional Web site.Answer: TRUEDiff: 1 Page Ref: 9612) Competition among online travel e-tailers is fierce, with low margins, little customer loyalty, and increasing commoditization of products and services.Answer: TRUEDiff: 3 Page Ref: 9913) WAYN is a social networking Web site with a goal of uniting college student travelers from North America.Answer: FALSEDiff: 2 Page Ref: 10114) The electronic job market can create high turnover costs for employers by accelerating employees' movement to other jobs.Answer: TRUEDiff: 2 Page Ref: 10515) When compared to the traditional job market, an advantage of the online job market is its long life cycle.Answer: TRUEDiff: 1 Page Ref: 10216) An advantage of the electronic job market for job seekers is that they can assess their market value.Answer: TRUEDiff: 2 Page Ref: 10617) Many insurance companies use a dual strategy, keeping human agents but also selling online. Answer: TRUEDiff: 2 Page Ref: 10818) The major risk of online trading is security.Answer: TRUEDiff: 1 Page Ref: 10819) Customers accessing a bank system from the outside must go through encryption provided by SSL and digital certification verification.Answer: TRUEDiff: 2 Page Ref: 11220) Both online banks and click-and-mortar banks carry some risks and problems, especially in international banking, including hackers and liquidity risk.Answer: TRUEDiff: 2 Page Ref: 11321) The number of checks the U.S. Federal Reserve System processes has remained constant, but commercial automated clearinghouse (ACH) volume has increased significantly.Answer: FALSEDiff: 1 Page Ref: 11322) Direct sales of digital content through digital download allow a producer of digital content to bypass the traditional retail channel, thereby reducing overall costs and capturing greater profits. Answer: TRUEDiff: 1 Page Ref: 11623) A major problem in B2C is the increasing rate of online fraud.Answer: TRUEDiff: 1 Page Ref: 12224) A traditional brick-and-mortar store with a mature Web site that uses a click-and-mortar strategy can leverage multichannels.Answer: TRUEDiff: 1 Page Ref: 12325) Business rating sites can aid consumer purchase decisions.Answer: TRUEDiff: 1 Page Ref: 1253.2 Multiple Choice1) experienced each of the following exceptA) maintaining its position as the number one e-tailer in 2008.B) declaring its first profit in January 2002.C) establishing a grocery delivery service called AmazonConnect.D) attracting at least 615 million visitors in 2009.Answer: CDiff: 3 Page Ref: 86-872) According to Internet Retailer (2009), approximately ________ percent of adult U.S. Internet users shop online and/or research offline sales online.A) 25B) 40C) 60D) 85Answer: CDiff: 2 Page Ref: 883) Each of the following describes retailing except:A) A retailer is a sales intermediary.B) Many manufacturers sell directly to consumers and through wholesalers and retailers.C) E-tailing makes it easier for a manufacturer to sell directly to customers by cutting out the intermediary.D) Companies that produce a larger number of products, such as Proctor & Gamble, do not need retailers for efficient distribution.Answer: DDiff: 3 Page Ref: 884) Retailers who sell over the Internet are calledA) cyber marketers.B) e-tailers.C) B2B commerce marketers.D) brick-and-mortar operations.Answer: BDiff: 1 Page Ref: 885) What is the primary advantage of catalog sales?A) Catalogs eliminate the constraints of space and time.B) Customers prefer catalog shopping to e-tailing.C) Catalogs increase interest in products that are then bought online.D) Products and services can both be sold via catalogs.Answer: ADiff: 2 Page Ref: 886) Conducting e-commerce where the online channel of a business is integrated with the physical retail business as opposed to being a separate channel best definesA) referral economy.B) direct marketing.C) considered commerce.D) click-and-mortar retailers.Answer: CDiff: 2 Page Ref: 917) With all else being equal in the online environment, goods with any of the following product characteristics are expected to facilitate greater online sales except:A) relatively expensive items.B) high brand recognition.C) digitized format.D) frequently purchased items.Answer: ADiff: 2 Page Ref: 92-938) Dell's distribution strategy is best described asA) a brick-and-mortar strategy.B) a shared service mall strategy.C) a click-and-mortar strategy.D) direct marketing from a manufacturer.Answer: DDiff: 3 Page Ref: 949) The Sears marketing strategy is best described asA) a brick-and-mortar strategy.B) a shared service mall strategy.C) a click-and-mortar strategy.D) direct marketing by a manufacturer.Answer: CDiff: 2 Page Ref: 9310) Competitive advantages of a "pull" vehicle distribution process includeA) virtually real-time market feedback.B) large cost savings in finished vehicle inventory carrying costs.C) improved customer satisfaction and pricing.D) all of the above.Answer: DDiff: 2 Page Ref: 9511) A type of online mall that is basically a directory organized by product type best describesA) referring directory.B) mall with shared services.C) brick-and-mortar retailer.D) cyber directory.Answer: ADiff: 2 Page Ref: 9612) An online seller of travel services that generates revenue by charging fees for its services is an example of aA) market maker.B) transaction broker.C) content disseminator.D) viral marketer.Answer: BDiff: 2 Page Ref: 9713) A marketer that uses e-mail to advertise to potential customers is called aA) market maker.B) transaction broker.C) content disseminator.D) viral marketer.Answer: DDiff: 2 Page Ref: 9714) A company that creates and manages many-to-many markets is called aA) market maker.B) transaction broker.C) content disseminator.D) viral marketer.Answer: ADiff: 2 Page Ref: 9715) Each of the following is a revenue model for online independent travel agents exceptA) direct competition revenues.B) direct revenues from commissions.C) subscription or membership fees.D) revenue sharing fees.Answer: ADiff: 3 Page Ref: 9916) Each of the following is a characteristic of WAYN except:A) It is a popular social networking Web site.B) When it introduced fees for its premier travel membership service, it lost most of its new subscriptions.C) It is not aimed at any particular age group.D) It enables its users to create a personal profile and upload and store photos.Answer: BDiff: 3 Page Ref: 10117) Compared to the traditional job market, the online job marketA) has a shorter life cycle.B) is usually specialized and local in scope.C) tends to be less reliable.D) tends to be much less expensive.Answer: DDiff: 2 Page Ref: 10218) Which of the following parties use the Internet job market?A) employers seeking employeesB) classified adsC) job agenciesD) all of the aboveAnswer: DDiff: 1 Page Ref: 10319) Advantages of the electronic job market for employers include each of the following exceptA) charging online processing fees.B) providing greater equal opportunity for job seekers.C) learning how to use their voice effectively in an interview.D) conducting interviews online.Answer: ADiff: 2 Page Ref: 10620) Advantages of the electronic market for job seekers include each of the following exceptA) assessing their market value.B) competing with less qualified applicants.C) marketing themselves directly to potential employers.D) communicating quickly with potential employers.Answer: BDiff: 2 Page Ref: 10621) E-bankingA) saves time and money.B) is more expensive for banks.C) is primarily done using wireless devices.D) is done by less than 40 percent of U.S. adult Internet users.Answer: ADiff: 1 Page Ref: 11022) Which of the following is not an online banking application category?A) informationalB) deliveryC) administrativeD) transactionalAnswer: BDiff: 2 Page Ref: 11023) The portal online banking application providesA) financial education information.B) current bank and local news.C) links to local business.D) bill-pay services.Answer: CDiff: 3 Page Ref: 11124) Implementation issues for online financial transactions includeA) security.B) imaging systems.C) fee issues.D) all of the above.Answer: DDiff: 1 Page Ref: 112-11325) Gateways to storefronts and e-malls areA) shopping portals.B) shopbots.C) shopping browsers.D) intelligent search engines.Answer: ADiff: 1 Page Ref: 11826) Tools that scout the Web on behalf of consumers who specify search criteria areA) shopping portals.B) shopbots.C) shopping browsers.D) intelligent search engines.Answer: BDiff: 1 Page Ref: 11827) The TRUSTe seal is an example ofA) a business rating.B) an intermediary.C) a B2B exchange.D) a trustmark.Answer: DDiff: 1 Page Ref: 11928) The effects upon sales of consumers receiving a referral or recommendation from other consumers best definesA) consumer economy.B) referral economy.C) channel conflict.D) word-of-mouth economy.Answer: BDiff: 2 Page Ref: 11929) The attention-grabbing behavior of agencies that go out to consumer environments and boast about how great a brand or item is in order to spread the word best definesA) referral economy.B) blasting.C) sneezing.D) shouting.Answer: CDiff: 3 Page Ref: 11930) Charles wants to buy a John Lennon lithograph over the Internet, but he is unwilling to pay for it until he inspects it to ascertain authenticity. The auction site thorough which he purchases the painting agrees to hold his money until he tells them to release it to the seller. This is an example ofA) an escrow service.B) a trustmark.C) a warranty.D) a verification.Answer: ADiff: 2 Page Ref: 1203.3 Fill in the Blank1) ________ is retailing conducted online, over the Internet.Answer: Electronic retailingDiff: 1 Page Ref: 882) ________ are retailers who sell over the Internet.Answer: E-tailersDiff: 1 Page Ref: 883) Conducting e-commerce where the online channel of a business is integrated with the physical retail business as opposed to being a separate channel describes ________.Answer: considered commerceDiff: 3 Page Ref: 914) Broadly, marketing that takes place without intermediaries between manufacturers and buyers describes ________.Answer: direct marketingDiff: 2 Page Ref: 945) ________ are firms that sell directly to consumers over the Internet without maintaining a physical sales channel.Answer: Virtual (pure-play) e-tailersDiff: 2 Page Ref: 966) ________ are brick-and-mortar retailers that offer a transactional Web site from which to conduct business.Answer: Click-and-mortar retailersDiff: 2 Page Ref: 967) ________ are retailers who do business in the non-Internet, physical world in traditional brick-and-mortar stores.Answer: Brick-and-mortar retailersDiff: 2 Page Ref: 968) Virtual e-tailers can be categorized as ________ and ________.Answer: general purpose, specializedDiff: 3 Page Ref: 969) A business model where a company sells in multiple marketing channels simultaneously describes ________.Answer: multichannel business modelDiff: 3 Page Ref: 9610) ________ and ________ are two types of online malls.Answer: Referring directories, shared shopping servicesDiff: 3 Page Ref: 9611) A ________ is a type of mall that is basically a directory organized by product type. Answer: referring directoryDiff: 2 Page Ref: 9612) The B2C business model that combines community services with selling or affiliate marketing is ________.Answer: community portal and social networksDiff: 3 Page Ref: 9713) The ________ is the online B2C business model where a manufacturer sells to a business, but delivers to individual customers.Answer: B2B2CDiff: 3 Page Ref: 9714) ________ is the online B2C business model where manufacturers customize their products and services via online orders.Answer: Make (build)-to-orderDiff: 3 Page Ref: 9715) Various banking activities conducted from home or the road using an Internet connection describes ________.Answer: electronic bankingDiff: 1 Page Ref: 10916) ________, ________, ________, ________, and ________ are the five types of online banking applications.Answer: Informational, administrative, transactional, portal, othersDiff: 3 Page Ref: 11117) ________ is the risk of not having sufficient funds to pay obligations as they come due. Answer: Liquidity riskDiff: 3 Page Ref: 11318) A grocer that takes orders online and provides deliveries on a daily or other regular schedule or within a very short period of time defines ________.Answer: e-grocerDiff: 1 Page Ref: 11419) Express delivery made fairly quickly after an online order is received defines ________. Answer: on-demand delivery serviceDiff: 2 Page Ref: 11420) Gateways to e-storefronts and e-malls describes ________.Answer: shopping portalsDiff: 2 Page Ref: 11821) Tools that scout the Web on behalf of consumers who specify search criteria describes________.Answer: shopping robotsDiff: 2 Page Ref: 11822) The effect upon sales of consumers receiving a referral or recommendation from other consumers defines ________.Answer: referral economyDiff: 3 Page Ref: 11923) The removal of organizations or business process layers responsible for certain intermediary steps in a given supply chain defines ________.Answer: disintermediationDiff: 3 Page Ref: 12024) The process whereby intermediaries take on new intermediary roles describes ________. Answer: reintermediationDiff: 3 Page Ref: 12025) ________ is the situation in which an online marketing channel upsets the traditional channels due to real or perceived damage from competition.Answer: Channel conflictDiff: 3 Page Ref: 1213.4 Essay1) List the seven characteristics that enable items to facilitate higher sales volumes in an online environment.Answer: High brand recognition, a guarantee provided by highly reliable or well-known vendors, a digitized format, relatively inexpensive items, frequently purchased items, commodities with standard specifications, and well-known packaged items that cannot be opened even in a traditional store are the seven characteristics identified in the textbook.Diff: 3 Page Ref: 92-932) List five business models by distribution channel.Answer: The five business models are direct marketing by mail-order retailers that go online, direct marketing by manufacturers, pure-play e-tailers, click-and-mortar retailers, and Internet malls.Diff: 1 Page Ref: 93-943) What are virtual (pure-play) e-tailers? Give an example. List one advantage and one disadvantage of this model.Answer: Virtual (pure-play) e-tailers are firms that sell directly to consumers over the Internet without maintaining a physical sales channel. is a prime example of this type ofe-tailer. Virtual e-tailers have the advantage of low overhead costs and streamlined processes. One disadvantage is a lack of established infrastructure or back office to support the online front-office activities.Diff: 2 Page Ref: 964) List five of the online revenue models for online travel services.Answer: The online revenue models include direct revenues, revenue from advertising,lead-generation payments, consultancy fees, subscription or membership fees, andrevenue-sharing fees.Diff: 2 Page Ref: 995) Identify five advantages of the online job market over the traditional job market.Answer: The online job market can be very inexpensive, have a longer life cycle, have a global reach, and provide a fast, simple, and inexpensive context for updating. Additionally, the online job market provides a large space for details and is reliable. The online job market makes it easy to search by applicant, find applicants, match supply and demand, and for employees to compare jobs.Diff: 3 Page Ref: 102。
电子商务导论(双语) imch08
Chapter 8 Electronic Payment SystemsQuestions for Review1.Authentication, encryption, integrity, and nonrepudiation.2.Secret key encryption uses shorter key length (usually 64 bits), so it is efficient to implement.However, delivering the secret key to the receivers is the issue to be resolved.On the other hand, the public key encryption can open a public key to the sender keeping a private key in secret. But it takes longer key length (usually 1024 bits), so it is slow.According to the SET protocol, the secret key is exchanged by the public key encryption scheme for each session, and the secret key is generated to use only for the session.3.Digital signature is a signature used for authentication of a sender, by encrypting the message withthe sender’s private key. Digital envelope is the encryption of a secret key with the receiver’s public key to send the secret key to a receiver securely.4. A CA is a trusted third party who is authorized to issue certificates that usually identify the remoteusers. The certificate includes the public key to share with the other parts.5.Both SSL and SET protocols use the combination of secret key and public key encryption schemes,digital signature, certificate and certificate authority, message digest, and integrity check.However, the SET protocol is tailored to the procedure and message format of credit card processing, and additionally requires a payment gateway. In practice, most current SSL protocols do not implement certificates because customers do not adapt easily to the use of certificates. They are too complex and there is a need for extra software called a digital wallet.6. The key players in the electronic credit card system are cardholder, merchant, card issuer, acquirer,and card brand.The procedure is:1)An issuer (usually a bank) issues a credit card to a cardholder.2)The cardholder shows the card to a merchant whenever he or she needs to pay for a product orservice.3)The merchant asks for approval from the brand company.4)The merchant sells the slip to the acquiring bank.5)The acquiring bank requests the brand to clear the slip.6)The brand requests the issuer to pay for the amount. And the issuer periodically bills theamount to the cardholder or automatically deducts the amount from the cardholder’s account.7. A debit card is an identification card that transfers the payment amount from the customer’s accountto the merchant’s account online. It needs an authorization to do the transfer (availability of sufficient funds). So the debit card is a variation of EFT used at purchasing points.8.The open system allows direct transfer of stored money value between IC cards, while the closedsystem limits the transfer of stored money values only to bank accounts.9.1) Contact-type IC card: traditional IC chip is on a plastic card thatcan be read and written by slipping it into the reader’s slot.2)Contactless-type IC card: remote sensing card without physical contact. There are two typesdepending upon the distance–short range (less than a foot) and longer range (up to 100 feet).3)Hybrid card: one contact-type and one contactless-type chip on a plastic card without sharingmemories.4)Combi-card: Share memory with both contact and contactless uses.10.Micropayment is the payment of small amounts. E-cash is a typical method of micropayment.11. Electronic money and stored-value cards are two typical types of electronic cash. The stored-valuecards get more popular and electronic money types disappears.12. E-check systems are basically an electronic equivalent of the paper check systems. However, sincethe delivery of e-check can be realized at a light speed, the process of e-check becomes similar to that of EFT. If the e-check is cleared at a predetermined date, it becomes basically the same as an electronic credit card system.Questions for Discussion1.Both SSL and SET protocols use the same security schemes as mentioned in review question #5.However, the SET protocol standardizes the procedure and message format tailored to the credit card processing, and additionally requires payment gateways. In practice, most of SSL protocol implementations do not require certificates because customers do not adapt well to the use of certificates even though the SET protocol guarantees higher security. Due to the complexity of using certificates, the SET protocol is propagating more slowly than expected. In the meantime, the SSL is popularly adopted.2.The traditional paper-based payment systems need physical delivery, so they are expensive and slow.Beside, buyers cannot finish the transaction online without an electronic payment scheme.3.The cost of micropayment should be very low to justify the benefit of small amount payment.Micropayment can be realized by reducing online authorization process to remote sites.4.The e-cash is usually delivered in a stored-value card. The value is stored in software called anelectronic purse, which may be stored on a PC or smart card. A debit card is a card for the authorization of accessing and transferring the money in the customer’s account to the merchant’s account.5.Many digitized goods like music, information, and pictures will be sold online, which may cost lessthan one dollar. So we need to develop an economical payment method for such small payments. To pay small amounts, e-cash may be used or an e-credit card that does not require online authorization may be used.6.The credit card is the most popular for B2C transactions, but it is too expensive for B2B EC. Also,there is a limit on the amount one can use. The EFT, debit card, and e-check will be suitable for the B2B EC because the fee is less expensive than that for e-credit cards.7.Different currencies are used in different countries, so the payment scheme needs to supportmultiple currencies for cross-border transactions.8. A public key encryption scheme like RSA algorithm is more secure than the secret key encryptionscheme like DES. To send a message by the public key scheme, senders can ask to give the receiver’s public key to encrypt the message.9.Certificates include the public key to let the sender encrypt the message and digital signature key toauthenticate the sender. Digital envelope is an encryption of a secret key with the receiver’s public key for secure delivery of the secret key that will be necessary for each session.10.Electronic check is basically an electronic equivalence of the paper check. However, since thedelivery of e-check is realized at a light speed, the process of e-check becomes virtually similar to that of EFT.11.CA is a trusted third party that issues certificates to applicants. The CA can assure identification ofowner of the certificates.12.In the SET protocol, the customers and merchants are supposed to use certificates issued by atrustful certificate authority. The SET also adopts the public key cryptography and digital signature.So the SET protocol is most secure in terms of authentication, encryption, integrity, and nonrepudiation. However, a backfire of the secure SET is its complexity.13. A debit card directly transfers the money in the customer’s account to the merchant’s account online,while the stored-value card transfers the money in the customer’s electronic purse to the merchant’s electronic purse or bank account.14.The Internet EFT can be accessed via the open Internet, but it needs encryption for securetransmission. VAN-based EFT can be transferred only to the banks connected to the VAN, and the customer needs to dial up to the network.15.The merchant may designate the multiple acceptable currencies so that the customer can choose afavorable currency. The cross-border payment needs to apply an exchange rate if the currency is not the one designated on the e-store site. There is a limit per single transaction.16.The reader of contact cards is inexpensive (even embedded in keyboard), so it can be installed verywidely. However the card should be slipped into the reader’s slot precisely. So it is not appropriate for quick processing like public transportation fare. In this case, the contactless card is more efficient, but the reader’s cost is too expensive for customer’s individual possession.17.Contact and contactless chips on the hybrid cards need to be recharged separately. So the moneyvalue in the contactless chip cannot be recharged through the inexpensive reader attached to thekeyboard of PC. Combi-card can resolve this problem because the memory of contact and contactless chips are shared.18.In the public/private key system, the public key is open to anybody while keeping the private key insecret. So the sender needs to ask for the receiver’s public key so that the receiver can decode the encrypted messages with his private key. On the other hand, in the single key system, the key should be transferred in advance in a secure manner. The public key system is usually used for the exchange of a secret key of the single key system.Internet Exercises1. Confirm whether the credit card is acceptable online and the SET protocol is supported. Check whatother payment methods are acceptable. Try to find the terms of security guarantee.2.Check whether they support e-check, EFT, credit card, and e-cash.3.Mondex card mainly supports the open system, while the VisaCash supports the closed system.4. a. Adam asks for the public key of Barbara, encrypts the messagewith it, and transmits it. Then Barbara opens the message with herprivate key.b. Barbara asks for Connie’s public key of digital signature, and asks Connie to send the messagealong with Connie’s digital signature that is encrypted by his private key.c. The message for the transmission of e-cash needs to be encrypted as in step a.d. The check should include the digital signature of the bank encrypted with the bank’s private key.The vendor will use the bank’s public key to decrypt. Also, the buyer can encrypt the check itself with the vendor’s public key.5.The site address is now Read the site.Team Exercises1.Make sure that a business plan with the stored-value cards has a strong motivation for the cardholdersto own and use. Open system is efficient to use, but is hard to trace potential crimes. Banks are notquite motivated to adopt the open system because of difficulty in receiving payments. The advantages in an open system are the disadvantages in a closed system, and vice versa.2.Card brand may expand their payment business domain beyond the credit card. However, card brandsare less competitive in EFT and debit card service because banks, such as the Bank of America, already have a wide customer base of cashable accounts. For the stored-value cards business the card brand is advantageous because the card can be accepted worldwide. However, for a particular application, such as the transportation card in a certain region, bank card can be more convenient.Real World Case: Transportation Cards in the Big Cities1. Hybrid cards have two separate chips (one contact and one contactless) in a card, so the stored-values in each chip cannot be shared. On the other hand, the two chips (one contact and one contactless) in a combi-card share the memory that stores the money value.2. Combi-card can be recharged by an inexpensive contact-type reader/writer attached to the Internet PC and can be used by both contact and contactless readers. Since most transportation cards need to be the contactless-type, the combi-card is essential for expensive recharge and efficient use.3. The reason is more political than technical. The bus and/or subway card operating companies prefer to keep the pre-paid cash under their control to earn its interest. Since these companies can control the demand market, they do not want to lose their business opportunity to Mondex. Another reason from Mondex’ side is that Mondex was not adaptive to the standard of transportation cards and did not offer incentive to the transportation companies.。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
题型:1.单选题(2分x20=40分2多选题(3分x5=15分)3短语翻译(1分x15=15分)问答题(4分x5=20 分)分析题(10分x1=10分)Chapter 11.电子商务的定义和类别广义—指交易当事人或参与人利用以现代信息技术为基础的互联网所进行的各类商业活动;狭义—指交易当事人通过以因特网为主的计算机网络所实施的各种交易活动。
按交易类型:B2C、B2B、G2B;按商务活动内容:贸易型和服务性;根据使用网络类型不同:EDI商务、因特网商务、内联网商务、移动商务。
2.Describe the benefits of EC to ORGANIZATIONS, CONSUMERS AND SOCIETY3.EFT(Electronic Funds Transfer) used by banks电子资金转账”。
EFT是计算机在银行业务中得到应用后,银行利用计算机、终端机、电子信息网络等电子通讯设备建立的高速划拨资金的电子支付系统。
4.Which commerce is more well-suited to Business Process?⏹E-commerce电子商务⏹E-commerce + Traditional电子商务+传统⏹Traditional传统5.Advantages of E-Commerce.⏹Increases sales, decreases cost增加销售,减少成本⏹Provides purchasing opportunities for buyers 为买家提供采购机会(企业可以确定新的供应商和合作伙伴)⏹Increase speed and accuracy for exchanged information, thus reducing cost增加信息交换的速度和准确性,从而降低成本⏹Business can be transacted 24hrs a day可以一天24小时交易业务⏹The level of detail of purchase information is selected by user详细级别的购买信息由用户选定⏹Digital products can be delivered instantly数码产品可以立即交付⏹Tax refunds, public retirement and welfare support costs less when distributed over theInternet退税,公共退休和福利支持成本分布在互联网时少⏹Allows products and services to be available in remote areas, e.g. remote learning使产品和服务可在偏远地区,如远程学习6.电子商务国际化当中遇到的问题(文化为主)Culture – the combination of111language and customs文化,语言和风俗222Culture varies across national boundaries and in many cases regions within nations文化跨越国界不同,在许多情况下,区域内的国家333Choice of icons on Web pages becomes problematic on international Web sites:选择的图标在网页上就会有问题,在国际网站上:(In the US a shopping cart is useful, in the UK a shopping basket is more appropriate, Australians call shopping carts, shopping trolleysIn many places other than Brazil the thumbs up gesture means okay, in Brazil it is an obscene gesture在美国一个购物车是有用的,在英国购物篮子是更合适的,澳大利亚人叫购物车,购物手推车,在其他很多地方比巴西大拇指手势意味着好,在巴西是一个淫秽的姿势)7.交易成本transaction costTransaction costs are the total costs that a buyer and seller incur as they gather information and negotiate a purchase/sale transaction交易成本是总成本,买方和卖方承担收集信息和谈判购买/销售事务Transaction costs are the main reason for vertical integration (Ronald Coase)交易成本是垂直整合的主要原因(罗纳德•科斯)Businesses can use e-commerce to reduce transaction costs (e.g. telecommuting rather than physical commuting to allow global employment opportunities)企业可以利用电子商务来减少交易成本(如远程办公而不是物理通勤允许全球就业机会)CHAPTER 2WWW(World Wide Web)----> 定义及作用The world wide web (WWW) is a subset of the computers on the Internet that connect in a certain way, making their content accessible to each other万维网(WWW)是计算机在互联网上的一个子集,以某种方式连接,使其内容可访问The WWW includes an easy to use standard interface facilitating ease of useWWW包括一个易于使用的标准接口方便易用性电子邮件何时出现(in 1972)ISP (Information Service Provider)信息服务提供商Product-Switched Network(LAN/WAN)产品转换网络Four key rules used by ARPANETndependent networks (e.g. A LAN or WAN) should not require internal changes in order to be connected to the network独立的网络(如LAN或WAN)应该不需要内部的变化才能连接到网络Packets that do not arrive at their destination must be resent from their source network包,不到达目的地必须对源网络Router computers act only as receiving and forwarding devices; They do not retain information about the packets they handle路由器电脑才接收和转发设备;他们不保留他们的信息数据包处理No global control of the network exist没有全球控制网络的存在Differences between Internet & Extranet有一个Intranet和Internet之间的一个主要区别:互联网是一个开放的,公共空间,而内部网的设计是一个私人空间。
内部网可以从Internet访问,但作为一项规则它是由一个密码和访问只能给员工或其他授权用户的保护。
Low cost distribution of internal corporate information低成本企业内部信息的分布Based on client server model基于客户服务器模式Intranets use Web browsers, internet-based protocols including TCP/IP, FTP, Telnet, HTML and HTTP 内部网使用Web浏览器,网络协议包括TCP / IP、FTP、Telnet、HTML和HTTP Distributing paper is often more expensive分发纸通常更昂贵Intranets can also be used to provide software updates and patches, which update users computers automatically – using scripts内部网还可以用来提供软件更新和补丁,更新用户电脑自动——使用脚本+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Networks that connect companies with suppliers, business partners and authorised users网络连接公司与供应商、商业伙伴和授权用户Each user has access to the databases, files and other information stored on computers connected to the extranet每个用户访问数据库,文件和其他信息存储在计算机连接到外联网Fedex changed from an Intranet to Extranet for package tracking on their Web site联邦快递从内部网、外部网改变包跟踪网站CHAPTER 3Revenue model(B2C & B2B)收入模式:Web catalog revenue model网上目录盈利模式Digital content revenue model数字内容盈利模式Advertising-supported revenue model广告支持的收入模式Advertising-subscription mixed revenue model广告订购混合收入模式Fee-based revenue models收费收入模式Web advertising problems (CPM/CPA)网络广告问题(CPM / CPA)1) Identifying ways to measure and charge for site visitors1)识别方法来衡量和收费站点访问者2) Few Web sites have sufficient visitors to attract large advertisers2)一些网站有足够的游客吸引广告商Web presence goals网络存在的目标实现网络的存在目标1)Attracting visitors to the Web site1)网站吸引访客2)Making the site interesting enough that visitors stay and explore2)使网站足够有趣,游客停留和探索3)Convincing visitors to follow the site’s links to obtain information3)说服游客遵守网站的链接获取信息4)Creating an impression consistent with the organizaiton’s desired image4)创建一个印象符合organizaiton所需的图像5)Building a trusting relationship with visitors5)建立信任与游客的关系6) Reinforcing positive images that the visitor might already have about the organization6)加强正面形象,游客可能已经组织7)Encouraging visitors to return to the site7)鼓励游客回到现场Web site Usability网站可用性CHAPTER 41.4P指的是PRICE/PRODUCT/ PROMOTION/ PLACE2.市场细分的种类(Geographic/demographic/psychographic /segmentation)地理/人口/ 心理/细分3.STRATEGYPRODUCT-BASED STRATEGY基于产品的营销策略CUSTOMER-BASED STRATEGY客户营销策略4.消费者忠诚度的五个阶段Awareness意识Exploration探索Familiarity熟悉Commitment承诺Separation分离漏斗模型This funnel model allows companies to determine which advertising and promotion strategies actually work这个漏斗模型允许公司确定哪些广告和促销策略的实际工作It is divided into three parts:它分为三个部分:Customer acquisition获取客户Customer conversion客户转换Customer retention客户保留广告成本的计量(trial visit repeat visit click through)??????????CHAPTER 5B2B key business drivers B2B关键业务驱动因素The availability of a secure broadband Internet platform and private and public B2B e-marketplaces; 一个安全的宽带互联网平台的可用性和私人和公共B2B电子市场;The need for collaborations between suppliers and buyers;需要供应商和买家之间的协作;The ability to save money, reduce delays, and improve collaboration; and省钱的能力,减少航班延误,提高协作;和The emergence of effective technologies for intra- and interorganizational integration.有效的技术的出现为内部和企业间的集成。