Last updated on August 18th, 2020 at 09:41 pm
Unit 1 E-Business {Book}
|
|
e-Business
|
|
e-Commerce, Advantages & Disadvantages
|
|
History of e-Commerce
|
|
Types of e-Commerce:
|
|
Comparison of traditional commerce and e-Commerce
|
|
e-Commerce business Models:
|
|
Business to Business (B2B) business Model
|
|
Business to Consumer (B2C) business Model
|
|
Consumer to Consumer(C2C) business Model
|
|
Consumer to Business (C2B) business Model
|
|
Peer-to–Peer (P2P) business Model
|
|
Emerging Trends in e-commerce
|
|
Web Auctions
|
|
Virtual Communities
|
|
Portals
|
|
e-Commerce revenue Models
|
|
Unit 2 Security for e-Business {Book}
|
|
Security threat for e-Business
|
|
Implementing e-Business Security
|
|
Encryption
|
|
Decryption
|
|
Protecting client computers
|
|
e-Business communication channels
|
|
Web server’s encryption
|
|
SSL Protocol
|
|
Firewalls
|
|
Cryptography Method
|
|
VPNs
|
|
Protecting Network
|
|
Policies & Procedures of Network Protection
|
|
Unit 3 e-Payments {Book}
|
|
e-Payments Systems
|
|
|
B2C Payments
|
|
B2B Payments
|
|
Types of e-Payment System: Credit card payment, Debit card Payment
|
|
Accumulating balance
|
|
Online stored Value Payment systems
|
|
Digital cash
|
|
Digital wallets
|
|
Agile wallet
|
|
Smart cards
|
|
Digital Cheques
|
|
Secure electronic Transactions (SET) Protocol
|
|
|
|
|
Unit 4 e-Business Marketing Technologies {Book}
|
|
B2B Marketing
|
|
B2C Marketing
|
|
e-commerce branding Strategies
|
|
Web Transaction Logs, Cookies, Shopping card Database
|
|
DBMS
|
|
SQL
|
|
Data Mining
|
|
CRM
|
|
Permission Marketing
|
|
Affiliate Marketing
|
|
Viral Marketing
|
|
Unit 5 Cyber laws {Book}
|
|
Legal Aspects of e-Business
|
|
Internet frauds
|
|
Cyber Laws
|
|
IT Act 2000 Salient features
|
|
Like this:
Like Loading...
Related
[…] VIEW […]