Index_E


E

EAI (Enterprise Application Integration), 243

see also Enterprise Application Security Integration (EASI)

EASI. See Enterprise Application Security Integration (EASI)

Eavesdropping, 105

EB2B.com, 426

EBay, 349

EBay Payments, 345

E-BI (e-business intelligence), 197–202

E-bullion, digital currency, 325

E-businesses

business objectives of, 162–163, 177

core businesses and, 175

costs of, 177–178

defined, 74–75, 175

developing new business competencies, 175–176

IT architecture for, 178

360-degree e-business, 176

value of, 178

see also e-business models; e-commerce

E-business intelligence (e-BI), 197–202

E-business models

first-to-market strategies, 73–74

integrated value chains, 75

knowledge management, 77

niche markets, 74

process domains, integration of, 77–78

strategy and execution, 76–77

ECash micropayment systems, 348, 350

ECharge, 350

ECISPs. See e-commerce Internet service providers (ECISPs)

E-commerce

cost saving aspects of, 17

costs of, 11

described and defined, 3–4

direct marketing, sales, and services, 4

financial and information services, 5

growth in sector, 30

interoperability of systems, 12

leveraging existing systems for, 12

market advantages of, 23–30

security of, 12

shifting traditional business to e-commerce model, 16–17

technological infrasturcture for, 38

trends, 71–72, 381–38

trust and customer loyalty, 18–19

value of, 11

workflow technology, 12–13

see also business-to-consumer (B2C) e-commerce

E-commerce Internet service providers (ECISPs), 85–86, 90–94

advantages of, 92–93

advisory service, 90

business intelligence service (BIS), 90

hosted technology infrastructure, 91–92

integration of business services and applications, 90

ROI, 92

service provided by, 90

Economic trends, global economy, 37

E-Credit, e-commerce software vendor, 87

EDE (Electronic Data Exchange), 11

E-gold, digital currency, 325

EHost.com, 426

802.11a specification for wireless communication, 147

802.11b specification for wireless communication, 146–147

802.11g specification for wireless communication, 147

Electronic bill presentment and payment (EBPP)

Bill and Invoice Presentment and Settlement (BIPS), 317–318

EBPP (See electronic bill presentment and payment (EBPP))

market trends, 316–318

service providers, 315, 320, 346

The Electronic Commerce Technical Assistance Group, 431

Electronic Data Exchange (EDE), 11

Electronic information systems

architecture for, 360–365

backend management-oriented systems, 362

backend operational systems, 361–362

call center users, 364–365

clickstream / callstream data storage, 366, 369–377

customer relationship managers, 364–365

executive management and, 363–364, 365

external user acquisition systems, 361

IT responsibilities and enterprise employees, 366

operational personnel, 363, 365

problems frequently encountered, 365–366

scalability of, 366, 367–369

stakeholders in architecture for, 362–365

user activity-driven frontend systems, 361

user community and, 362–363, 365

Electronic money. See digital currencies

Electronic payment cards. See smart cards

E-mail

accounts linked to Web sites, 104

auto suggest answers and, 398

e-mail IDs, 109

mobile technologies and, 143

security and, 211

Embedded SQL, 188

Emergent technologies, 33

Emotional indicators and crisis customers, 399

Encryption, 43–44

digital certificates, 228–233

digital currency and, 334

digital signatures and, 227–228

EASI and, 259

hashing algorithms for, 227, 427

IE and SSL protection, 236

key management, 226–227

Netscape and SSL protection, 236

payment processing and, 285–286

public key cryptography, 225–226

SGC (Server Gated Cryptography), 237

single key vs. public key cryptography, 279

SSL certificates and, 106–108, 287

SSL encryption, 104, 233–235

symmetric cryptography, 225

End-to-end systems, 253–255, 264, 386

Enrollment workflows, 224

Enterprise Application Integration (EAI), 243

see also Enterprise Application Security Integration (EASI)

Enterprise Application Security Integration (EASI)

authentication and, 262

benefits of, 257–261

core security services, 259–260

custom security API, 258

end-to-end EASI, 253–255, 264

framework for, 257–261

principles of, 261–264

requirements for, 255–256

security aware applications, 258

security products, 260–261

security unaware applications, 258

standard security API, 258

vendor security API, 259

Enterprise Integration Technologies, 427

Enterprise-ready technology, 386

Enterprise resource planning (ERP), 8

Entrepreneur.com, 346

E-procurement systems, 50–51

ERP (enterprise resource planning), 8

E-service

cost savings of, 391

cross-department collaboration and, 394–395

customer needs and, 396–397

customer satisfaction and, 393

customer support, 395–396

improvement of, 395

ownership or commitment to, 394

scalability, 393–394

software issues, 398–399

Web site accessibility of, 396, 398

E-tailers, core processes, 81

Evocash, digital currency, 325

Existing systems, leveraging for e-commerce, 12




Electronic Commerce (Networking Serie 2003)
Electronic Commerce (Charles River Media Networking/Security)
ISBN: 1584500646
EAN: 2147483647
Year: 2004
Pages: 260
Authors: Pete Loshin

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net