2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 32 - e-Business & e-Commerce Outline 32.1 Introduction 32.2 E-Business Models Storefront Model Shopping-Cart Technology Auction Model Portal Model Name-Your-Price Model Comparison-Pricing Model Demand-Sensitive Pricing Model Bartering Model 32.3 Building an e-Business 32.4 e-Marketing Branding Marketing Research Marketing Promotions Consumer Tracking Electronic Advertising
2001 Prentice Hall, Inc. All rights reserved. 2 Chapter 32 - e-Business & e-Commerce Affiliate Programs Promotions Public Relations Customer Relationship Management (CRM) 32.5 Online Payments Credit-Card Payment Digital Cash and e-Wallets Micropayments Smart Cards 32.6 Security Public-Key Cryptography Secure Sockets Layer (SSL) WTLS IPSec and Virtual Private Networks (VPN) Security Attacks Network Security
2001 Prentice Hall, Inc. All rights reserved. 3 Chapter 32 - e-Business & e-Commerce 32.7 Legal Issues Privacy Defamation Sexually Explicit Speech Copyright and Patents 32.8 XML and e-Commerce 32.9 Internet and World Wide Web Resources
2001 Prentice Hall, Inc. All rights reserved Auction Model Fig. 32.1eBay home page. (These materials have been reproduced by Prentice Hall with the permission of eBay, Inc. COPYRIGHT EBAY, INC. ALL RIGHTS RESERVED.)
2001 Prentice Hall, Inc. All rights reserved Auction Model Fig. 32.2Placing a bid on eBay. (These materials have been reproduced by Prentice Hall with the permission of eBay, Inc. COPYRIGHT EBAY, INC. ALL RIGHTS RESERVED.)
2001 Prentice Hall, Inc. All rights reserved Public-Key Cryptography Fig. 32.3Encrypting and decrypting a message using public-key cryptography.