Page 439 - Introduction to Electronic Commerce and Social Commerce
P. 439
428 Index
E-commerce (cont.) security terminology, 299, 300
defending information systems, 314, 315 threats, attacks, and attackers, 300, 301
access control, encryption, and PKI, 314–316 strategy and framework, 312, 313
business continuity and disaster recovery, 318, 319 Economic and finance game, 246
controls, spam, pop ups, and social engineering E-distributor, 44
controls, 317, 318 Editorial-style videos, 278
securing networks, 316, 317 Educational social games, 246
disintermediation and reintermediation, 40 EFactor, 239
electronic market, 39 EFulfillment Service, 366
e-marketplaces, 39–40 EGift Card Program, 4
ethical and legal issues, 396 E-government, 9, 10, 13, 26, 28
factors that determine success, 393 activities, 159
failures, 393 transformation to, 142
fulfillment process, 359 E-government 2.0
future and social networking, 142–143
integrating the marketplace, 404 potential of, 143
key factors, 404 E-health, 156–157, 160
limitation, 405 Elavon, 390
m-commerce, 405 E-learning
social commerce, 405 benefits, 145–146
speed, 405 definitions and concepts, 144–145
guidelines for success, 394 drawbacks and challenges, 146
information security, 324 innovations, 147
intellectual property in, 396–398 management systems, 149
legal concerns, 36 via Robots, 147
medical devices, 157 social networks, 148
merchant server software, 44 and training, 159
merchant, 340 E-learning 2.0, 148, 160
micropayments, 373 Electronic (online) banking (e-banking), 80
networks, defending, 313 Electronic auctions, 47
old economy and, 394 Electronic benefits transfer (EBT), 141
online purchasing process, 38–39 Electronic book (e-book), 149–151
payment method, 336, 337 advantages and limitations, 150
pinned images, 36 devices for reading, 150
privacy in, 399 e-readers and tablets, 150
robotics in, 156 Electronic catalog, 42, 44, 109
search activities, 44 Electronic commerce (EC), 4–15, 17–31
security battleground, 300 Electronic commerce payment Systems
security issues, 324 Alibaba’s payment platform, 333
security management concerns, 295 ATM business, 335
security strategy, 303 Billpoint, 348
strategies for success, 393–394 credit-based transportation card, 346
successes, 393–394 cross-border customers, 332
traditional sites, 210 cross-border transactions, 332
types of transactions, 37 Korean cities, 346
E-Commerce Investments MRT cards and bus cards, 346
categories and benefits, 385 noncash payments, 335
cost–benefit analysis, 386 PayPal, 348
increased pressure for financial justification, 385–387 warehouses, 333
justified, 385–386 Electronic data interchange (EDI), 10, 18, 27, 63, 110
using metrics in justification, 386–387 Electronic funds transfer (EFT), 10
reasons for justification, 385 Electronic malls, 42
web analytics, 387 Electronic market (e-marketplace), 7, 39
E-Commerce security, 299–303, 322–324 Electronic Medical Record Systems (EMR), 156
enterprisewide, 322 Electronic retailing (e-tailing), 69–70
drivers of EC security management, 322 advantages, 71
Internet crime, 323 business models, 71–74
mobile devices, networks, and applications, 323, 324 characteristics, 70–71
policies and training, 322 click-and-mortar retailers, 73
risk analysis and ethical issues, 322, 323 direct marketing, 73
senior management commitment and support, 322 direct sales, 73
issues and landscape, 299 model classification by distribution channel, 72–73
attacks in vulnerable areas, 301, 302 virtual (Pure-Play), 73
battleground, 300 Electronic shopping cart, 45
defenders, strategy, and methods, 303 Electronic signature, 321
requirements, 302, 303 Electronic voting, 140

