E-business = 电子商务 : 英文精编版, 第9版 🔍
(美)施内德著 北京:机械工业出版社, Jing dian yuan ban shu ku, Jing dian yuan ban shu ku, Di 1 ban, China, 2011
中文 [zh] · PDF · 118.2MB · 2011 · 📗 未知类型的图书 · 🚀/duxiu · Save
描述
本书分为四篇, 包括概述篇, 业务战略篇, 技术篇和整合篇. 介绍电子商务领域中的最新变化以及企业和社会怎样响应这些变化. 新增内容包括:多销售渠道, 专业信息网站的收益模型, 电子书和新闻网站的未来, 电视节目和电影的在线交付等内容
备选标题
E-business: Dian zi shang wu: ying wen jing bian ban, di 9 ban
备选作者
(Mei)Gary P. Schneider zhu
备选作者
(美)Gary P. Schneider著; 施奈德
备用出版商
China Machine Press
备用版本
Jing dian yuan ban shu ku : ying wen ban, Ying yin ben, Beijing, 2011
备用版本
Jing dian yuan ban shu ku, Di 1 ban, Beijing, 2011
备用版本
Jing dian yuan ban shu ku, Bei jing, 2011
备用版本
China, People's Republic, China
元数据中的注释
Bookmarks: p1 (p2): Part 1:Introduction
p1-1 (p2): Chapter 1 The Second Wave of Global E-Business
p1-1-1 (p4): Electronic Commerce:The Second Wave
p1-1-1-1 (p4): Electronic Commerce and Electronic Business
p1-1-1-2 (p4): Categories of Electronic Commerce
p1-1-1-3 (p8): The Development and Growth of Electronic Commerce
p1-1-1-4 (p9): The Dot-Com Boom,Bust,and Rebirth
p1-1-1-5 (p10): The Second Wave of Electronic Commerce
p1-1-2 (p14): Business Models,Revenue Models,and Business Processes
p1-1-2-1 (p14): Focus on Specific Business Processes
p1-1-2-2 (p15): Role of Merchandising
p1-1-2-3 (p15): Product/Process Suitability to Electronic Commerce
p1-1-3 (p17): Advantages and Disadvantages of Electronic Commerce
p1-1-3-1 (p17): Advantages of Electronic Commerce
p1-1-3-2 (p19): Disadvantages of Electronic Commerce
p1-1-4 (p21): Economic Forces and Electronic Commerce
p1-1-4-1 (p22): Transaction Costs
p1-1-4-2 (p24): Markets and Hierarehies
p1-1-4-3 (p25): Using Electronic Commerce to Reduce Transaction Costs
p1-1-4-4 (p26): Network Economic Structures
p1-1-4-5 (p27): Network Effects
p1-1-4-6 (p28): Using Electronic Commerce to Create Network Effects
p1-1-5 (p28): Identifying Electronic Commerce Opportunities
p1-1-5-1 (p28): Strategic Business Unit Value Chains
p1-1-5-2 (p30): Industry Value Chains
p1-1-5-3 (p32): SWOT Analysis:Evaluating Business Unit Opportunities
p1-1-6 (p34): International Nature of Electronic Commerce
p1-1-6-1 (p34): Trust Issues on the Web
p1-1-6-2 (p35): Language Issues
p1-1-6-3 (p36): Cultural Issues
p1-1-6-4 (p38): Culture and Government
p1-1-6-5 (p40): Infrastructure Issues
p1-1-7 (p43): Summary
p1-1-8 (p43): Key Terms
p1-1-9 (p44): Review Questions
p1-1-10 (p44): Exercises
p1-1-11 (p45): Cases
p1-2 (p50): Chapter 2 E-Business Technology Basics
p1-2-1 (p52): The Internet and the World Wide Web
p1-2-1-1 (p53): Origins of the Internet
p1-2-1-2 (p53): New Uses for the Internet
p1-2-1-3 (p54): Commercial Use of the Internet
p1-2-1-4 (p55): Growth of the Internet
p1-2-1-5 (p56): Emergence of the World Wide Web
p1-2-2 (p59): Packet-Switched Networks
p1-2-2-1 (p59): Routing Packets
p1-2-3 (p61): Internet Protocols
p1-2-3-1 (p61): TCP/IP
p1-2-3-2 (p62): IP Addressing
p1-2-3-3 (p63): Domain Names
p1-2-3-4 (p65): Web Page Request and Delivery Protocols
p1-2-3-5 (p66): Electronic Mail Protocols
p1-2-3-6 (p67): Unsolicited Commercial E-Mail(UCE,Spam)
p1-2-4 (p68): Markup Languages and the Web
p1-2-4-1 (p69): Markup Languages
p1-2-4-2 (p69): Hypertext Markup Language
p1-2-4-3 (p76): Extensible Markup Language(XML)
p1-2-4-4 (p81): HTML and XML Editors
p1-2-5 (p82): Intranets and Extranets
p1-2-5-1 (p82): Public and Private Networks
p1-2-5-2 (p83): Virtual Private Network(VPN)
p1-2-6 (p83): Internet Connection Options
p1-2-6-1 (p84): Connectivity Overview
p1-2-6-2 (p84): Voice-Grade Telephone Connections
p1-2-6-3 (p85): Broadband Connections
p1-2-6-4 (p86): Leased-Line Connections
p1-2-6-5 (p87): Wireless Connections
p1-2-7 (p91): Internet2 and the Semantic Web
p1-2-8 (p93): Summary
p1-2-9 (p94): Key Terms
p1-2-10 (p96): Review Questions
p1-2-11 (p96): Exercises
p1-2-12 (p98): Cases
p2 (p102): Part 2:Business Strategies for Electronic Commerce
p2-1 (p102): Chapter 3 E-Business Revenue Models
p2-1-1 (p103): Revenue ModeIs
p2-1-1-1 (p104): Web Catalog Revenue Models
p2-1-1-2 (p111): Digital Content Subscription Revenue Models
p2-1-1-3 (p112): Advertising-Supported Revenue Models
p2-1-1-4 (p117): Advertising-Subscription Mixed Revenue Models
p2-1-1-5 (p119): Fee-for-Transaction Revenue Models
p2-1-1-6 (p127): Fee-for-Service Revenue Models
p2-1-1-7 (p128): Free for Many,Fee for a Few
p2-1-2 (p129): Revenue Models in Transition
p2-1-2-1 (p129): Subscription to Advertising-Supported Model
p2-1-2-2 (p129): Advertising-Supported to Advertising-Subscription Mixed Model
p2-1-2-3 (p130): Advertising-Supported to Fee-for-Services Model
p2-1-2-4 (p130): Advertising-Supported to Subscription Model
p2-1-2-5 (p131): Multiple Transitions
p2-1-3 (p132): Revenue Strategy Issues
p2-1-3-1 (p132): Channel Conflict and Cannibalization
p2-1-3-2 (p133): Strategic Alliances
p2-1-4 (p133): Creating an Effective Web Presence
p2-1-4-1 (p134): Identifying Web Presence Goals
p2-1-5 (p138): Web Site Usability
p2-1-5-1 (p138): How the Web Is Different
p2-1-5-2 (p139): Meeting the Needs of Web Site Visitors
p2-1-5-3 (p141): Trust and Loyalty
p2-1-5-4 (p142): Rating Electronic Commerce Web Sites
p2-1-5-5 (p142): Usability Testing
p2-1-5-6 (p143): Customer-Centric Web Site Design
p2-1-6 (p144): Connecting with Customers
p2-1-6-1 (p144): The Nature of Communication on the Web
p2-1-7 (p148): Summary
p2-1-8 (p148): Key Terms
p2-1-9 (p149): Review Questions
p2-1-10 (p149): Exercises
p2-1-11 (p150): Cases
p2-2 (p154): Chapter 4 Selling to Consumers Online
p2-2-1 (p156): Web Marketing Strategies
p2-2-1-1 (p157): Product-Based Marketing Strategies
p2-2-1-2 (p158): Customer-Based Marketing Strategies
p2-2-2 (p159): Communicating with Different Market Segments
p2-2-2-1 (p160): Trust,Complexity,and Media Choice
p2-2-2-2 (p162): Market Segmentation
p2-2-2-3 (p164): Market Segmentation on the Web
p2-2-2-4 (p164): Offering Customers a Choice on the Web
p2-2-3 (p165): Beyond Market Segmentation:Customer Behavior and Relationship Intensity
p2-2-3-1 (p165): Segmentation Using Customer Behavior
p2-2-3-2 (p168): Customer Relationship Intensity and Life-Cycle Segmentation
p2-2-3-3 (p170): Acquisition,Conversion,and Retention of Customers
p2-2-3-4 (p171): Customer Acquisition,Conversion,and Retention:The Funnel Model
p2-2-4 (p172): Advertising on the Web
p2-2-4-1 (p173): Banner Ads
p2-2-4-2 (p175): Text Ads
p2-2-4-3 (p176): Other Web Ad Formats
p2-2-4-4 (p177): Site Sponsorships
p2-2-4-5 (p178): Online Advertising Cost and Effectiveness
p2-2-4-6 (p180): Effectiveness of Online Advertising
p2-2-5 (p180): E-Mail Marketing
p2-2-5-1 (p181): Permission Marketing
p2-2-5-2 (p181): Combining Content and Advertising
p2-2-5-3 (p182): Outsourcing E-Mail Processing
p2-2-6 (p182): Technology-Enabled Customer Relationship Management
p2-2-6-1 (p183): CRM as a Source of Value in the Marketspace
p2-2-7 (p185): Creating and Maintaining Brands on the Web
p2-2-7-1 (p186): Elements of Branding
p2-2-7-2 (p187): Emotional Branding vs.Rational Branding
p2-2-7-3 (p187): Brand Leveraging Strategies
p2-2-7-4 (p187): Brand Consolidation Strategies
p2-2-7-5 (p188): Costs of Branding
p2-2-7-6 (p188): Affiliate Marketing Strategies
p2-2-7-7 (p189): Viral Marketing Strategies
p2-2-8 (p190): Search Engine Positioning and Domain Names
p2-2-8-1 (p190): Search Engines and Web Directories
p2-2-8-2 (p191): Paid Search Engine Inclusion and Placement
p2-2-8-3 (p195): Web Site Naming Issues
p2-2-9 (p198): Summary
p2-2-10 (p198): Key Terms
p2-2-11 (p200): Review Questions
p2-2-12 (p200): Exercises
p2-2-13 (p201): Cases
p2-3 (p205): Chapter 5 Selling to Businesses Online
p2-3-1 (p207): Purchasing,Logistics,and Support Activities
p2-3-1-1 (p208): Purchasing Activities
p2-3-1-2 (p210): Direct vs.Indirect Materials Purchasing
p2-3-1-3 (p212): Logistics Activities
p2-3-1-4 (p213): Support Activities
p2-3-1-5 (p214): E-Government
p2-3-1-6 (p216): Network Model of Economic Organization in Purchasing
p2-3-2 (p217): Electronic Data Interchange
p2-3-2-1 (p217): Early Business Information Interchange Efforts
p2-3-2-2 (p218): Emergence of Broader EDI Standards
p2-3-2-3 (p220): How EDI Works
p2-3-2-4 (p224): Value-Added Networks
p2-3-2-5 (p227): EDI Payments
p2-3-2-6 (p227): EDI on the Internet
p2-3-3 (p228): Supply Chain Management Using Internet Technologies
p2-3-3-1 (p228): Value Creation in the Supply Chain
p2-3-3-2 (p230): Increasing Supply Chain Efficiencies
p2-3-3-3 (p231): Using Materials-Tracking Technologies with EDI and Electronic Commerce
p2-3-3-4 (p234): Creating an Ultimate Consumer Orientation in the Supply Chain
p2-3-3-5 (p234): Building and Maintaining Trust in the Supply Chain
p2-3-4 (p235): Electronic Marketplaces and Portals
p2-3-4-1 (p235): Independent Industry Marketplaces
p2-3-4-2 (p237): Private Stores and Customer Portals
p2-3-4-3 (p237): Private Company Marketplaces
p2-3-4-4 (p238): Industry Consortia-Sponsored Marketplaces
p2-3-5 (p240): Summary
p2-3-6 (p240): Key Terms
p2-3-7 (p241): Review Questions
p2-3-8 (p241): Exercises
p2-3-9 (p242): Cases
p2-4 (p246): Chapter 6 Virtual Communities
p2-4-1 (p247): From Virtual Communities to Social Networks
p2-4-1-1 (p248): Virtual Communities
p2-4-1-2 (p248): Early Web Communities
p2-4-1-3 (p249): Social Networking in the Second Wave of Online Communities
p2-4-1-4 (p253): Revenue Models for Social Networking Sites
p2-4-2 (p256): Mobile Commerce
p2-4-2-1 (p256): Mobile Operating Systems and Applications
p2-4-2-2 (p258): The Future of Mobile Commerce
p2-4-3 (p259): Online Auctions
p2-4-3-1 (p259): Auction Basics
p2-4-3-2 (p263): Online Auctions and Related Businesses
p2-4-3-3 (p271): Auction-Related Services
p2-4-4 (p275): Summary
p2-4-5 (p275): Key Terms
p2-4-6 (p276): Review Questions
p2-4-7 (p277): Exercises
p2-4-8 (p277): Cases
p3 (p282): Part 3:Technologies for Electronic Commerce
p3-1 (p282): Chapter 7 Web Hosting and E-Business Software
p3-1-1 (p284): Web Hosting Alternatives
p3-1-2 (p286): Basic Functions of Electronic Commerce Software
p3-1-2-1 (p287): Catalog Display
p3-1-2-2 (p289): Shopping Cart
p3-1-2-3 (p294): Transaction Processing
p3-1-3 (p295): Advanced Functions of Electronic Commerce Software
p3-1-3-1 (p295): Databases
p3-1-3-2 (p296): Middleware
p3-1-3-3 (p296): Enterprise Application Integration
p3-1-3-4 (p297): Integration with ERP Systems
p3-1-3-5 (p298): Web Services
p3-1-4 (p302): Electronic Commerce Software for Small and Midsize Companies
p3-1-4-1 (p302): Basic Commerce Service Providers
p3-1-4-2 (p303): Mall-Style Commerce Service Providers
p3-1-4-3 (p304): Estimating Operating Expenses for a Small Web Business
p3-1-5 (p305): Electronic Commerce Software for Midsize to Large Businesses
p3-1-5-1 (p306): Web Site Development Tools
p3-1-6 (p308): Electronic Commerce Software for Large Businesses
p3-1-6-1 (p308): Enterprise-Class Electronic Commerce Software
p3-1-6-2 (p310): Customer Relationship Management Software
p3-1-6-3 (p312): Supply Chain Management Software
p3-1-6-4 (p313): Content Management Software
p3-1-6-5 (p313): Knowledge Management Software
p3-1-7 (p315): Summary
p3-1-8 (p315): Key Terms
p3-1-9 (p316): Review Questions
p3-1-10 (p316): Exercises
p3-1-11 (p318): Cases
p3-2 (p321): Chapter 8 Online Security
p3-2-1 (p323): Online Security Issues Overview
p3-2-1-1 (p323): Computers and Security:A Brief History
p3-2-1-2 (p324): Computer Security and Risk Management
p3-2-1-3 (p325): Elements of Computer Security
p3-2-1-4 (p326): Security Policy and Integrated Security
p3-2-2 (p328): Security for Client Computers
p3-2-2-1 (p328): Cookies
p3-2-2-2 (p330): Web Bugs
p3-2-2-3 (p330): Active Content
p3-2-2-4 (p331): Java Applets
p3-2-2-5 (p332): JavaScript
p3-2-2-6 (p333): AetiveX Controls
p3-2-2-7 (p333): Graphics and Plug-Ins
p3-2-2-8 (p334): Viruses,Worms,and Antivirus Software
p3-2-2-9 (p339): Digital Certificates
p3-2-2-10 (p342): Steganography
p3-2-2-11 (p343): Physical Security for Clients
p3-2-3 (p343): Communication Channel Security
p3-2-3-1 (p344): Secrecy Threats
p3-2-3-2 (p346): Integrity Threats
p3-2-3-3 (p347): Necessity Threats
p3-2-3-4 (p347): Threats to the Physical Security of Internet Communications Channels
p3-2-3-5 (p348): Threats to Wireless Networks
p3-2-3-6 (p349): Encryption Solutions
p3-2-3-7 (p356): Ensuring Transaction Integrity with Hash Functions
p3-2-3-8 (p357): Ensuring Transaction Integrity with Digital Signatures
p3-2-4 (p358): Security for Server Computers
p3-2-4-1 (p358): Web Server Threats
p3-2-4-2 (p359): Database Threats
p3-2-4-3 (p359): Other Programming Threats
p3-2-4-4 (p360): Threats to the Physical Security of Web Servers
p3-2-4-5 (p362): Access Control and Authentication
p3-2-4-6 (p363): Firewalls
p3-2-5 (p365): Organizations that Promote Computer Security
p3-2-5-1 (p365): CERT
p3-2-5-2 (p366): Other Organizations
p3-2-5-3 (p366): Computer Forensics and Ethical Hacking
p3-2-6 (p367): Summary
p3-2-7 (p368): Key Terms
p3-2-8 (p369): Review Questions
p3-2-9 (p370): Exercises
p3-2-10 (p370): Cases
p3-3 (p373): Chapter 9 Online Payment Systems
p3-3-1 (p375): Online Payment Basics
p3-3-2 (p377): Payment Cards
p3-3-2-1 (p378): Advantages and Disadvantages of Payment Cards
p3-3-2-2 (p379): Payment Acceptance and Processing
p3-3-3 (p382): Electronic Cash
p3-3-3-1 (p383): Micropayments and Small Payments
p3-3-3-2 (p384): Privacy and Security of Electronic Cash
p3-3-3-3 (p384): Holding Electronic Cash:Online and Offline Cash
p3-3-3-4 (p385): Advantages and Disadvantages of Electronic Cash
p3-3-3-5 (p386): Electronic Cash Systems
p3-3-4 (p389): Electronic Wallets
p3-3-4-1 (p390): Microsoft Windows Live ID
p3-3-4-2 (p390): Yahoo!Wallet
p3-3-5 (p391): Stored-Value Cards
p3-3-5-1 (p391): Magnetic Strip Cards
p3-3-5-2 (p391): Smart Cards
p3-3-6 (p393): Internet Technologies and the Banking Industry
p3-3-6-1 (p393): Check Processing
p3-3-6-2 (p395): Mobile Banking
p3-3-7 (p395): Criminal Activity and Payment Systems:Phishing and Identity Theft
p3-3-7-1 (p395): Phishing Attacks
p3-3-7-2 (p398): Using Phishing Attacks for Identity Theft
p3-3-7-3 (p400): Phishing Attack Countermeasures
p3-3-8 (p401): Summary
p3-3-9 (p401): Key Terms
p3-3-10 (p402): Review Questions
p3-3-11 (p402): Exercises
p3-3-12 (p403): Cases
p4 (p408): Part 4:Integration
p4-1 (p408): Chapter 10 Implementing E-Business Initiatives
p4-1-1 (p410): Identifying Benefits and Estimating Costs of Electronic Commerce Initiatives
p4-1-1-1 (p410): Identifying Objectives
p4-1-1-2 (p410): Linking Objectives to Business Strategies
p4-1-1-3 (p411): Identifying and Measuring Benefits
p4-1-1-4 (p413): Identifying and Estimating Costs
p4-1-1-5 (p416): Funding Online Business Startups
p4-1-1-6 (p417): Comparing Benefits to Costs
p4-1-1-7 (p417): Return on Investment(ROI)
p4-1-2 (p419): Strategies for Developing Electronic Commerce Web Sites
p4-1-2-1 (p420): Internal Development vs.Outsourcing
p4-1-2-2 (p423): New Methods for Implementing Partial Outsourcing
p4-1-3 (p425): Managing Electronic Commerce Implementations
p4-1-3-1 (p425): Project Management
p4-1-3-2 (p426): Project Portfolio Management
p4-1-3-3 (p426): Staffing for Electronic Commerce
p4-1-3-4 (p429): Postimplementation Audits
p4-1-3-5 (p430): Change Management
p4-1-4 (p431): Summary
p4-1-5 (p431): Key Terms
p4-1-6 (p432): Review Questions
p4-1-7 (p432): Exercises
p4-1-8 (p433): Cases
p5 (p437): For Further Study and Research
元数据中的注释
related_files:
filepath:电子商务 英文精编版_(美)施内德著_2011_12760389.rar — md5:f50b226c9c60c756cc2320997d82bfa9 — filesize:123512276
filepath:/读秀/DX/2.0/2.0等多个文件/23b/其余书库等多个文件/23b/书19/1~24000(杭师)/16001~21000/《电子商务 英文精编版》_12760389.zip
filepath:/读秀/DX/2.0/2.0等多个文件/24b/24b/书22/1-30000/10001~20000/16001~21000/《电子商务 英文精编版》_12760389.zip
filepath:《电子商务 英文精编版》_12760389.uvz — md5:40a6a1996de7530d1caef58b5f9517f3 — filesize:126537940
filepath:《电子商务 英文精编版》_12760389.zip — md5:38b5280c2cefe37260e65fa2fa431298 — filesize:126160376
filepath:《电子商务 英文精编版》_12760389.uvz — md5:2d6c9efed246566b38836f25ed883202 — filesize:126537940
filepath:《电子商务 英文精编版》_12760389.zip — md5:bd9dff658e7437a6ddb8d8814aeafec4 — filesize:126160376
filepath:12760389_电子商务 英文精编版.zip — md5:35828aa2da228b651954141670714689 — filesize:67749953
filepath:12760389_电子商务 英文精编版.zip — md5:9e14a0e868c2e0479b57718baff92725 — filesize:67749953
filepath:12760389.zip — md5:2dcca615bh1ee5e3fb6057ffe94d924d — filesize:126160376
filepath:第二部分/200716/自建库1/杭州师范大学a-1/1~6万/10001~20000/16001~21000/12760389.zip
filepath:第三部分/自搬库-1/杭州师范大学a-1/1~6万/10001~20000/16001~21000/12760389.zip
filepath:843_28_4a/008库存1(1026.44GB)/宁波园区27/12760389_电子商务 英文精编版.zip
filepath:27b/转广东/01/《电子商务 英文精编版》_12760389.uvz
元数据中的注释
Book's original name : E-business, China student edition, ninth edition.
Includes bibliographical references.
开源日期
2024-06-13
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。