Table of Contents
Foreword xxi
Introduction xxiii
Part I
1 Introduction to Internet Business 3
1.1 Being Online 3
1.1.1 The Basics 3
1.1.2 Distant Learning 4
1.1.3 Space and Time on the Internet 5
1.1.4 The Web is not the Internet 6
1.2 Defining E-Business 7
1.2.1 Overview 7
1.2.2 Communication Gateways 8
1.2.3 E-Business Statistics 10
1.2.4 Strategies for Digital Business 11
1.2.5 Strengths and Advantages of E-Business 13
1.3 Reasons for going Online 15
1.3.1 Expanding Market Reach 15
1.3.2 Generating Visibility 16
1.3.3 Strengthening Business Relationships 17
1.3.4 Responsiveness 18
1.3.5 Offering New Services 18
1.3.6 Cost Reduction 19
1.3.7 Just in Time Inventory 20
1.3.8 Preventing Financial Loss 21
1.3.9 Relevance to IT 22
1.3.10 Concerns for going Online 22
1.4 Differentiating between E-Business Categories 24
1.4.1 Overview 24
1.4.2 Categories 24
1.5 Using the new Paradigm of E-Business 31
1.5.1 The Interoperable Network 31
1.5.2 The New Economy 32
2 Preparing the Online Business 34
2.1 Competitor Analysis on the Internet 34
2.1.1 Locate your Competition 34
2.1.2 Collecting Competitive Information 35
2.2 The Fourth Channel 36
2.2.1 Understanding the Fourth Channel 36
2.2.2 Preventing Channel Conflicts 37
2.2.3 High Emotions 38
2.2.4 Reconstructing the Value Chain 40
2.2.5 New Intermediaries 41
2.3 Paradigms in the New Economy 42
2.3.1 The One-to-One Enterprise 42
2.3.2 Dynamic Trade 43
2.4 Driving Business Process Reengineering 45
2.4.1 Changing Business Processes 45
2.4.2 Introduction to Business Process Reengineering 46
2.4.3 Methods of Reorganization 47
2.4.4 Planning Systems 48
2.4.5 Just In Time 48
2.5 Designing, Developing and Deploying the System 49
2.5.1 Identifying the Online Business 49
2.5.2 Developing a Business Plan 52
2.5.3 Preparing for the Electronic Revolution 54
2.5.4 Design and Development 55
2.5.5 Building a Pilot 57
2.5.6 Going into Production 59
2.5.7 Connecting the Intranet 59
2.5.8 Verifying the Results 60
3 Selecting the Technology 62
3.1 Internet Networking 62
3.1.1 The Internet Infrastructure 62
3.1.2 The Internet Architecture 63
3.1.3 The Internet Protocol Suite 65
3.1.4 The Domain Name System 67
3.1.5 IPv6 69
3.1.6 ATM Networks 71
3.2 Exploring the IT Infrastructure 72
3.2.1 The Platform 72
3.2.2 Basic Platform 75
3.3 Deciding on the Enterprise Middleware 77
3.3.1 Mail and Collaboration 77
3.3.2 Network and System Management 78
3.3.3 Security Software 80
3.3.4 Payment Solutions 83
3.3.5 Database Management Systems 84
3.4 Choosing the Right Enterprise Applications 89
3.4.1 Imaging Technologies 89
3.4.2 Content Preparation 90
3.4.3 Data Warehousing 96
3.4.4 Enterprise Resource Planning 99
3.4.5 Call Center Solutions 103
3.5 Building the E-Business Aplications 105
4 Avoiding Legal Issues 112
4.1 Global Contracts 112
4.1.1 Legal Preface 112
4.1.2 Doing Business over the Internet 112
4.1.3 Jurisdiction on the Internet 114
4.2 The Web Site 115
4.2.1 The Domain Name Battle 115
4.2.2 Linking and Framing Issues 117
4.2.3 Online Disclaimers 119
4.2.4 Content Liability 119
4.2.5 Intellectual Property on the Web 120
4.3 Encryption Algorithms 122
4.3.1 Key Escrow 122
4.3.2 Legal Issues on Export 122
4.3.3 National Encryption Laws 125
4.3.4 Digital Signatures 127
4.4 Developing a Dark Site 128
4.4.1 Reasons for Crisis Management 128
4.4.2 Disaster Recovery 128
4.4.3 Negative Campaigning 131
4.4.4 Online Experience 132
4.4.5 Digital Complaint Services 134
4.4.6 Strategic Planning 134
5 Marketing Strategies on the Web 136
5.1 Internet Marketing Strategies 136
5.2 Web Design 138
5.2.1 The Power of the Internet 138
5.2.2 Content Is King 139
5.2.3 Feedback and Online Surveys 141
5.2.4 Frequently Asked Questions 142
5.2.5 Corporate Design Rules 143
5.2.6 Navigational Aids 143
5.2.7 Color Schema 144
5.2.8 File Size 144
5.2.9 Delivering Content to Network Appliances 145
5.3 Attracting Visitors to your Site 147
5.3.1 Gaining Market Share through Content 147
5.3.2 Offering Free Information 147
5.3.3 Personalization 148
5.3.4 Support Online and Offline Reading 148
5.3.5 Cross-Marketing and Cross-Selling 149
5.3.6 Be Faster than Your Customers 149
5.3.7 Event Marketing 150
5.4 Virtual Societies 151
5.4.1 Affiliate Networks 151
5.4.2 Internet Communities 151
5.4.3 Interactive User Groups 152
5.5 Localization 153
5.5.1 Act Global, Think Local 153
5.5.2 Cultural Differences 154
5.5.3 Translation Requirements 157
5.6 Promoting Your E-business 158
5.6.1 Choosing the Right Domain Name 158
5.6.2 Announcing the Web Site 161
5.6.3 Managing Your Image 162
5.7 Banner Ad Campaigning 163
5.7.1 Basic Strategies 163
5.7.2 Banner Exchange 165
5.8 Online Measurement 167
5.8.1 User Tracking 167
5.8.2 Avoiding Problems 167
5.8.3 Log File Analyzer 168
5.8.4 Online Rating Agencies 169
5.8.5 Third Party Auditing 171
5.9 One-to-One Marketing 171
5.9.1 Information Technology 171
5.9.2 Developing Customer Relationships 172
5.9.3 Customer-Centric Marketing 174
5.9.4 Advanced Personalization Technologies 176
5.9.5 Beyond the Internet 178
5.10 Direct Marketing 179
5.10.1 Spam 179
5.10.2 Mailing Lists and Newsletters 182
5.10.3 The Power of E-Mail 184
5.10.4 Opt-in Mailing Lists 185
5.10.5 Building an E-Mail Address Database 186
5.11 Choosing the Right ISP 187
5.11.1 Direct Access to Your Company 187
5.11.2 Dial-up Connections 188
5.11.3 Leased Lines 189
5.11.4 Performance Issues 190
5.11.5 Keeping Internet Costs Low 191
6 Search Engines and Portals 194
6.1 Searching the Internet
6.1.1 Finding Something on the Net
6.1.2 Different Types of Search Engines
6.1.3 Net Robots
6.1.4 Using a Search Engine
6.1.5 Adding Information to Search Engines
6.1.6 Adding Value through Meta-Data
6.1.7 Specialized Searches
6.1.8 People Search Engines
6.1.9 Tracking Search Result Positions
6.2 The Future of Searching
6.2.1 Issues with Search Engines
6.2.2 EuroSearch
6.2.3 Natural Language Searches
6.2.4 Image Search Engines
6.3 Intelligent Network Agents
6.3.1 Little Helpers on the Web
6.3.1 E-Mail Agents
6.3.2 News Agents
6.3.3 Personal Shopping Agents
6.4 Portal Sites, the New All-in-One Mega Web Sites
6.4.1 Growing Together
6.4.2 Digital Neighbourhoods
6.4.3 Becoming a Portal Player
6.4.4 Portal Owners and Service Providers
6.4.5 Personalizing the Online Experience
6.4.6 Must-have Features for a Portal
7 Shopping and ORM Solutions 224
7.1 Online Shopping 224
7.1.1 Reasons for Online Shops 224
7.1.2 Setting up the Shop 225
7.1.3 Processing the Order 228
7.1.4 Administration of the Shop 229
7.1.5 Quality of Service 231
7.2 Shopping Solutions 233
7.2.1 Business Requirements 233
7.2.2 Taxation of Internet Products 233
7.2.3 Shopping Products 236
7.2.4 Comparison of Online Shopping Solutions 242
7.3 Implications of the New Economy 244
7.3.1 Generating Revenues 244
7.3.2 Pricing on the Internet 244
7.3.3 Implications on the Price 247
7.3.4 Implications on the Cost 247
7.4 Electronic Software Distribution 248
7.4.1 Benefits of ESD 248
7.4.2 Problems with ESD 249
7.4.3 Making ESD Profitable 250
7.4.4 New Licensing Models 251
7.4.5 ESD Products 252
7.5 Configurator Tools 254
7.5.1 Reasons for Configurators 254
7.5.2 Configurator Products 255
7.6 Operational Resources Management 258
7.6.1 Reasons for ORM 258
7.6.2 Business Requirements 260
7.6.3 Succeeding in the ORM Market 262
7.6.4 ORM Solutions 263
7.6.5 Comparison of the Procurement Solutions 266
7.7 Joining the Shopping and the ORM Solution 267
8 Interactive Communication Experiences 268
8.1 The Basics 268
8.1.1 Communication Experience 268
8.1.2 Talking to your Customers 268
8.1.3 Interacting with Partners 269
8.2 Moderating Online Meetings 270
8.2.1 Problems with Real-Time Applications 271
8.2.2 Internet Telephony 272
8.2.3 Internet Telephony Gateways 276
8.2.4 Internet Fax Gateways 278
8.2.5 Video Conferences 279
8.3 Internet Chat Solutions 280
8.3.1 Internet Relay Chat 280
8.3.2 Java Chat Rooms 283
8.3.3 Virtual Worlds 283
8.3.4 Internet Newsgroups 285
8.3.5 Digital Communities 286
8.4 Internet-based Trainings 287
8.4.1 Reasons for Internet-based Trainings 287
8.4.2 The New Paradigm 288
8.4.3 Just-enough Training 289
8.4.4 Training Management Software 290
9 Comparing Web Technologies 295
9.1 Finding the Right Browser 295
9.1.1 The Browser Market 295
9.1.2 Sticking to the Web Standards 296
9.1.3 Global Browser Player 297
9.1.4 Comparing Browser Technologies 301
9.1.5 Other Browsers 302
9.1.6 Offline Browsers 306
9.1.7 The Impact on Business 306
9.1.8 Browsing into the Future 307
9.2 The Hypertext Markup Language 310
9.2.1 The Building Block 310
9.2.2 Web Page Layout 311
9.2.3 HTML 4.0 313
9.2.4 Relevance to Online Businesses 315
9.3 The Dynamic Web 316
9.3.1 Moving from Static to Dynamic Web Sites 316
9.3.2 Cascading Style Sheets 317
9.3.3 The Document Object Model 317
9.3.4 Dynamic HTML 318
9.4 Dynamic Server Concepts 319
9.4.1 The Common Gateway Interface 320
9.4.2 Server Side Includes 322
9.4.3 Net.Data 322
9.4.4 JavaServer Pages 323
9.5 Web Application Servers 323
9.5.1 Reasons for Web Application Servers 323
9.5.2 Web Application Products 324
9.6 The Extensible Markup Language 330
9.6.1 Common Problems of the Web 330
9.6.2 Moving to XML 332
9.6.3 Business Requirements 334
9.6.4 Reformulating HTML in XML 336
9.6.5 Location of XML Documents 338
9.6.6 XML Applications 339
9.6.7 Other Applications 341
9.6.8 Business via XML 342
9.6.9 Standard XML Schemas 344
9.7 Plug-ins 344
9.7.1 Advantages of Plug-ins 344
9.7.2 Adobe Acrobat Reader 345
9.7.3 Apple Quicktime 346
9.7.4 Platinum Cosmoplayer 346
9.7.5 Macromedia Shockwave 347
9.8 JavaScript 347
9.8.1 Introduction to JavaScript 347
9.8.2 Understanding the Value of JavaScript 349
9.8.3 VisualBasic Script 350
9.8.4 JavaScript versus JScript 350
9.8.5 JavaScript Problems in Browsers 351
9.8.6 Introduction to ECMAScript 351
9.8.7 The Future of JavaScript 353
10 Security on the Internet 354
10.1Creating a Security Strategy 354
10.1.1 Information Security 354
10.1.2 Information Policy 355
10.1.3 Threats and Challenges on the Internet 356
10.1.4 Social Engineering 359
10.1.5 Security through Obscurity 361
10.1.6 Resolving the Security Issues 362
10.1.7 Authorization 363
10.2 Cryptographic Tools 364
10.2.1 Defining Cryptography 364
10.2.2 Reasons for Encryption 365
10.2.3 Secret Key Cryptography 366
10.2.4 Public Key Cryptography 367
10.2.5 Comparison of Secret and Public Key Cryptography 368
10.2.6 Steganography 369
10.3 Applications of Cryptology 370
10.3.1 Enforcing Privacy 370
10.3.2 Encrypting E-Mail 370
10.3.3 Applying Encryption Technologies 372
10.3.4 Digital Signatures 373
10.4 Privacy on the Internet 374
10.4.1 Footprints on the Net 374
10.4.2 TRUSTe 376
10.4.3 The Platform for Privacy Preferences 377
10.4.4 Enforcing Anonymity on the Internet 378
10.5 Fighting Virus and Hoax Virus Warnings 379
10.5.1 The False Authority Syndrome 379
10.5.2 Understanding Viruses 381
10.5.3 Deploying Anti-virus Solutions 384
10.5.4 Required Software 385
10.5.5 Ignoring Hoax Viruses and Chain Letters 387
10.6 Conflicts in the Information Age 389
10.6.1 Information Attack 389
10.6.2 Information Warfare 390
10.6.3 Cyber-terrorism 392
10.6.4 The Eternity Service 395
10.7 Client-based Security 396
10.7.1 Digital Certificates 396
10.7.2 Smart Cards 397
10.7.3 Biometric Identification 401
10.8 Server-based Security 403
10.8.1 The Need for a Firewall 403
10.8.2 Server Protection 405
10.8.3 Attacks from the Inside 406
10.8.4 Protecting Digital Businesses 408
10.8.5 Trusted Operating Systems 409
10.8.6 Trusted Solutions 412
10.8.7 Certification Authority 415
11 Dealing with Java 417
11.1 Introducing Java 417
11.1.1 Definition of Java 417
11.1.2 Validating the Business Case 418
11.1.3 Embedded Devices 420
11.1.4 Java versus JavaScript 421
11.1.5 Example Business Cases 423
11.2 Java Foundation Classes 424
11.2.1 Technical Overview 424
11.2.2 Checking the Business Cases 426
11.2.3 Online Experience 427
11.2.4 Required Software 428
11.3 JINI 424
11.3.1 Technical Overview 424
11.3.2 Checking the Business Cases 426
11.3.3 Online Experience 427
11.3.4 Required Software 428
11.3 JINI 428
11.3.1 Technical Overview 428
11.3.2 Checking the Business Cases 429
11.3.3 Online Experience 430
11.3.4 Required Software 431
11.4 JavaBeans 431
11.4.1 Technical Overview 431
11.4.2 Checking the Business Cases 433
11.4.3 Online Experience 434
11.4.4 Required Software 434
11.5 InfoBus 435
11.5.1 Technical Overview 435
11.5.2 Checking the Business Cases 435
11.5.3 Online Experience 437
11.5.4 Required Software 437
11.6 Resolving Possible Java Issues 438
11.6.1 Speeding up Java 438
11.6.2 The 100 Percent Pure Java Initiative 440
11.6.3 Java Applet Security 441
11.6.4 Java versus Active X 442
11.6.5 Moving from C++ to Java 444
11.7 Avoiding the Java Wars 445
11.7.1 Hewlett-Packard 445
11.7.2 Microsoft 447
11.8 The Future of Java Computing 449
11.8.1 New Java Technologies 449
11.8.2 Outlook into the Future 449
12 Imaging on the Internet 451
12.1 Image Business 451
12.1.1 Reasons for Better Quality Images 451
12.1.2 Business Requirements 452
12.1.3 Example Business Cases 453
12.1.4 Java versus JavaScript 453
12.1.5 Example Business Cases 454
12.2 Image Concepts 454
12.2.1 Static Image Formats 454
12.2.2 Dynamic Image Formats 457
12.3 The FlashPix Format 458
12.3.1 Technical Overview 458
12.3.2 Checking the Business Cases 459
12.3.3 Online Experience 461
12.3.4 Required Software 462
12.4 QuickTime VR 463
12.4.1 Technical Overview 463
12.4.2 Checking the Business Cases 464
12.4.3 Online Experience 465
12.4.4 Required Software 467
12.5 VRML 468
12.5.1 Technical Overview 468
12.5.2 Checking the Business Cases 469
12.5.3 Online Experience 471
12.5.4 Required Software 473
12.6 Comparing Imaging Technologies 473
12.7 The Future of Imaging 474
12.7.1 Fractal Compression 474
12.7.2 DjVu 475
12.7.3 JPEG 2000 475
12.7.4 X3D 477
13 Paying via the Net 478
13.1 The Payment Business 478
13.1.1 Business Requirements 478
13.1.2 Psychology of Micro-Payments 483
13.1.3 Minimizing the Risk 483
13.1.4 Fraud Detection 485
13.1.5 Example Business Cases 486
13.1.6 Internet Payment Methods 487
13.1.7 Political Impact of Digital Currencies 488
13.2 Post-paid Payment Systems 489
13.2.1 Credit Card Solutions 489
13.2.2 Invoice 494
13.2.3 Internet Cheques 495
13.2.4 Cash on Delivery 497
13.2.5 Checking the Business Cases 497
13.2.6 Online Experience 498
13.2.7 Required Software 501
13.3 Instant-paid Payment Systems 502
13.3.1 Credit Card Solutions 502
13.3.2 Debit Cards 502
13.3.3 Checking the Business Cases 503
13.3.4 Online Experience 504
13.3.5 Required Software 505
13.4 Pre-paid Payment Systems 505
13.4.1 Electronic Cash 505
13.4.2 Smart Cards 509
13.4.3 Checking the Business Cases 511
13.4.4 Online Experience 512
13.4.5 Required Software 513
13.5 Comparing Payment Technologies 513
13.6 The Future of Payment 514
13.6.1 SEMPER 514
13.6.2 The Open Trading Protocol 515
13.6.3 Open Buying on the Internet 516
13.6.4 Global Trust Enterprise 517
14 The Open Source Community 522
14.1 Information Wants to Be Free 522
14.1.1 Free Software 522
14.1.2 The Impact of the Internet 524
14.1.3 The Cathedral and the Bazaar 525
14.1.4 Building a Successful Open Source Project 525
14.1.5 Open Source Definition 526
14.2 Free Software Projects 527
14.2.1 The Gutenberg Online Library 527
14.2.2 The Linux Operating System 528
14.2.3 The Open Directory 529
14.2.4 The TeX Typesetting System 530
14.3 Open Source Projects 531
14.3.1 The Jabber Instant Messaging System 531
14.3.2 The Jikes Compiler 532
14.3.3 The KDE Graphical Desktop Environment 533
14.3.4 The Mozilla Browser 534
14.3.5 The Open Firmware ROM Code 536
14.3.6 The OpenPGP Cryptography Framework 536
14.3.7 The OpenSSL Toolkit 536
14.3.8 The Zope Web Application Platform 537
14.4 Moving Your Company from Products to Services 538
14.4.1 Supporting the Software 538
14.4.2 Improving the Software 539
14.4.3 Integrating the Software 540
14.4.4 Problems with Open Source 540
14.4.5 Releasing New Open Source 541
14.5 Introduction to Open Hardware 541
14.5.1 Differences to Software 541
14.5.2 Open Hardware Projects 542
14.5.3 The Common Hardware Reference Platform 542
14.5.4 The Freedom CPU 543
14.5.5 Open Design Circuits 544
14.5.6 The Open Hardware Certification Program 546
14.5.7 The Open Hardware Specification Project 546
15 Pervasive Computing 549
15.1 Internet Services 549
15.1.1 Enabling Technologies 549
15.1.2 Business Opportunities 551
15.1.3 Internet Services Standards 551
15.1.4 Moving Applications to the Web 552
15.1.5 Open Internet Services 553
15.2 Device-to-device Communication 554
15.2.1 Introduction 554
15.2.2 ChaiServer 554
15.2.3 Inferno 556
15.2.4 Universal Plug and Play 557
15.2.5 Jini 558
15.3 Information Exchange 560
15.3.1 Introduction 560
15.3.2 JetSend 560
15.3.3 T Spaces 561
15.3.4 InfernoSpaces 562
15.3.5 Millennium 563
15.3.6 InfoBus 564
15.4 Service Broadcasting 565
15.4.1 Introduction 565
15.4.2 E-Speak 565
15.5 The Vision 568
15.5.1 Introduction 568
15.5.2 E-Services 568
15.6 Comparison of Pervasive Computing Technologies 570
15.7 The Future of Pervasive Computing 571
16 Beyond Pervasive Computing 571
16.1 Technical Outlook on the Future 574
16.1.1 Opening Internet Access 574
16.1.2 Consumer Device Integration 575
16.1.3 Privacy and Security in the Future 578
16.1.4 Next Generation Internet 578
16.2 Looking into the Future of Business 580
16.2.1 Content Brokers 580
16.2.2 Product Brokers 581
16.2.3 Service Brokers 582
16.2.4 Broker Software 584
16.2.5 Total Automation of Business 580
16.3 The Societal Impact 586
16.3.1 The Transition Phase 586
16.3.2 Responsibility for the Society 587
16.3.3 Next Generation Work Life 588
16.3.4 Politics in the 21st Century 588