Daniel Amor
  • Book Cover
  • E-Business (R)Evolution, 1st Ed
  • Summary
  • Title: E-Business (R)Evolution, 1st Ed
    Author: Daniel Amor
    Publisher: Prentice Hall, New York, 1999
    ISBN: 013085123X
    Pages: 650
  • News
  • Daniel Amor spoke at the Search Engine Optimisation conference of the Ark Group about "Delivering targeted content to multilingual users".
  • » More News...
  • Web Standards
  • The following Web Standards are supported on this Web Site:
  • valid CSS logo
  • valid XHTML logo
  • Level Triple-A conformance icon, W3C-WAI Web Content Accessibility Guidelines 1.0

Table of Contents

Foreword xxi

Introduction xxiii

Part I

1 Introduction to Internet Business 3

1.1 Being Online 3

1.1.1 The Basics 3

1.1.2 Distant Learning 4

1.1.3 Space and Time on the Internet 5

1.1.4 The Web is not the Internet 6

1.2 Defining E-Business 7

1.2.1 Overview 7

1.2.2 Communication Gateways 8

1.2.3 E-Business Statistics 10

1.2.4 Strategies for Digital Business 11

1.2.5 Strengths and Advantages of E-Business 13

1.3 Reasons for going Online 15

1.3.1 Expanding Market Reach 15

1.3.2 Generating Visibility 16

1.3.3 Strengthening Business Relationships 17

1.3.4 Responsiveness 18

1.3.5 Offering New Services 18

1.3.6 Cost Reduction 19

1.3.7 Just in Time Inventory 20

1.3.8 Preventing Financial Loss 21

1.3.9 Relevance to IT 22

1.3.10 Concerns for going Online 22

1.4 Differentiating between E-Business Categories 24

1.4.1 Overview 24

1.4.2 Categories 24

1.5 Using the new Paradigm of E-Business 31

1.5.1 The Interoperable Network 31

1.5.2 The New Economy 32

2 Preparing the Online Business 34

2.1 Competitor Analysis on the Internet 34

2.1.1 Locate your Competition 34

2.1.2 Collecting Competitive Information 35

2.2 The Fourth Channel 36

2.2.1 Understanding the Fourth Channel 36

2.2.2 Preventing Channel Conflicts 37

2.2.3 High Emotions 38

2.2.4 Reconstructing the Value Chain 40

2.2.5 New Intermediaries 41

2.3 Paradigms in the New Economy 42

2.3.1 The One-to-One Enterprise 42

2.3.2 Dynamic Trade 43

2.4 Driving Business Process Reengineering 45

2.4.1 Changing Business Processes 45

2.4.2 Introduction to Business Process Reengineering 46

2.4.3 Methods of Reorganization 47

2.4.4 Planning Systems 48

2.4.5 Just In Time 48

2.5 Designing, Developing and Deploying the System 49

2.5.1 Identifying the Online Business 49

2.5.2 Developing a Business Plan 52

2.5.3 Preparing for the Electronic Revolution 54

2.5.4 Design and Development 55

2.5.5 Building a Pilot 57

2.5.6 Going into Production 59

2.5.7 Connecting the Intranet 59

2.5.8 Verifying the Results 60

3 Selecting the Technology 62

3.1 Internet Networking 62

3.1.1 The Internet Infrastructure 62

3.1.2 The Internet Architecture 63

3.1.3 The Internet Protocol Suite 65

3.1.4 The Domain Name System 67

3.1.5 IPv6 69

3.1.6 ATM Networks 71

3.2 Exploring the IT Infrastructure 72

3.2.1 The Platform 72

3.2.2 Basic Platform 75

3.3 Deciding on the Enterprise Middleware 77

3.3.1 Mail and Collaboration 77

3.3.2 Network and System Management 78

3.3.3 Security Software 80

3.3.4 Payment Solutions 83

3.3.5 Database Management Systems 84

3.4 Choosing the Right Enterprise Applications 89

3.4.1 Imaging Technologies 89

3.4.2 Content Preparation 90

3.4.3 Data Warehousing 96

3.4.4 Enterprise Resource Planning 99

3.4.5 Call Center Solutions 103

3.5 Building the E-Business Aplications 105

4 Avoiding Legal Issues 112

4.1 Global Contracts 112

4.1.1 Legal Preface 112

4.1.2 Doing Business over the Internet 112

4.1.3 Jurisdiction on the Internet 114

4.2 The Web Site 115

4.2.1 The Domain Name Battle 115

4.2.2 Linking and Framing Issues 117

4.2.3 Online Disclaimers 119

4.2.4 Content Liability 119

4.2.5 Intellectual Property on the Web 120

4.3 Encryption Algorithms 122

4.3.1 Key Escrow 122

4.3.2 Legal Issues on Export 122

4.3.3 National Encryption Laws 125

4.3.4 Digital Signatures 127

4.4 Developing a Dark Site 128

4.4.1 Reasons for Crisis Management 128

4.4.2 Disaster Recovery 128

4.4.3 Negative Campaigning 131

4.4.4 Online Experience 132

4.4.5 Digital Complaint Services 134

4.4.6 Strategic Planning 134

5 Marketing Strategies on the Web 136

5.1 Internet Marketing Strategies 136

5.2 Web Design 138

5.2.1 The Power of the Internet 138

5.2.2 Content Is King 139

5.2.3 Feedback and Online Surveys 141

5.2.4 Frequently Asked Questions 142

5.2.5 Corporate Design Rules 143

5.2.6 Navigational Aids 143

5.2.7 Color Schema 144

5.2.8 File Size 144

5.2.9 Delivering Content to Network Appliances 145

5.3 Attracting Visitors to your Site 147

5.3.1 Gaining Market Share through Content 147

5.3.2 Offering Free Information 147

5.3.3 Personalization 148

5.3.4 Support Online and Offline Reading 148

5.3.5 Cross-Marketing and Cross-Selling 149

5.3.6 Be Faster than Your Customers 149

5.3.7 Event Marketing 150

5.4 Virtual Societies 151

5.4.1 Affiliate Networks 151

5.4.2 Internet Communities 151

5.4.3 Interactive User Groups 152

5.5 Localization 153

5.5.1 Act Global, Think Local 153

5.5.2 Cultural Differences 154

5.5.3 Translation Requirements 157

5.6 Promoting Your E-business 158

5.6.1 Choosing the Right Domain Name 158

5.6.2 Announcing the Web Site 161

5.6.3 Managing Your Image 162

5.7 Banner Ad Campaigning 163

5.7.1 Basic Strategies 163

5.7.2 Banner Exchange 165

5.8 Online Measurement 167

5.8.1 User Tracking 167

5.8.2 Avoiding Problems 167

5.8.3 Log File Analyzer 168

5.8.4 Online Rating Agencies 169

5.8.5 Third Party Auditing 171

5.9 One-to-One Marketing 171

5.9.1 Information Technology 171

5.9.2 Developing Customer Relationships 172

5.9.3 Customer-Centric Marketing 174

5.9.4 Advanced Personalization Technologies 176

5.9.5 Beyond the Internet 178

5.10 Direct Marketing 179

5.10.1 Spam 179

5.10.2 Mailing Lists and Newsletters 182

5.10.3 The Power of E-Mail 184

5.10.4 Opt-in Mailing Lists 185

5.10.5 Building an E-Mail Address Database 186

5.11 Choosing the Right ISP 187

5.11.1 Direct Access to Your Company 187

5.11.2 Dial-up Connections 188

5.11.3 Leased Lines 189

5.11.4 Performance Issues 190

5.11.5 Keeping Internet Costs Low 191

6 Search Engines and Portals 194

6.1 Searching the Internet

6.1.1 Finding Something on the Net

6.1.2 Different Types of Search Engines

6.1.3 Net Robots

6.1.4 Using a Search Engine

6.1.5 Adding Information to Search Engines

6.1.6 Adding Value through Meta-Data

6.1.7 Specialized Searches

6.1.8 People Search Engines

6.1.9 Tracking Search Result Positions

6.2 The Future of Searching

6.2.1 Issues with Search Engines

6.2.2 EuroSearch

6.2.3 Natural Language Searches

6.2.4 Image Search Engines

6.3 Intelligent Network Agents

6.3.1 Little Helpers on the Web

6.3.1 E-Mail Agents

6.3.2 News Agents

6.3.3 Personal Shopping Agents

6.4 Portal Sites, the New All-in-One Mega Web Sites

6.4.1 Growing Together

6.4.2 Digital Neighbourhoods

6.4.3 Becoming a Portal Player

6.4.4 Portal Owners and Service Providers

6.4.5 Personalizing the Online Experience

6.4.6 Must-have Features for a Portal

7 Shopping and ORM Solutions 224

7.1 Online Shopping 224

7.1.1 Reasons for Online Shops 224

7.1.2 Setting up the Shop 225

7.1.3 Processing the Order 228

7.1.4 Administration of the Shop 229

7.1.5 Quality of Service 231

7.2 Shopping Solutions 233

7.2.1 Business Requirements 233

7.2.2 Taxation of Internet Products 233

7.2.3 Shopping Products 236

7.2.4 Comparison of Online Shopping Solutions 242

7.3 Implications of the New Economy 244

7.3.1 Generating Revenues 244

7.3.2 Pricing on the Internet 244

7.3.3 Implications on the Price 247

7.3.4 Implications on the Cost 247

7.4 Electronic Software Distribution 248

7.4.1 Benefits of ESD 248

7.4.2 Problems with ESD 249

7.4.3 Making ESD Profitable 250

7.4.4 New Licensing Models 251

7.4.5 ESD Products 252

7.5 Configurator Tools 254

7.5.1 Reasons for Configurators 254

7.5.2 Configurator Products 255

7.6 Operational Resources Management 258

7.6.1 Reasons for ORM 258

7.6.2 Business Requirements 260

7.6.3 Succeeding in the ORM Market 262

7.6.4 ORM Solutions 263

7.6.5 Comparison of the Procurement Solutions 266

7.7 Joining the Shopping and the ORM Solution 267

8 Interactive Communication Experiences 268

8.1 The Basics 268

8.1.1 Communication Experience 268

8.1.2 Talking to your Customers 268

8.1.3 Interacting with Partners 269

8.2 Moderating Online Meetings 270

8.2.1 Problems with Real-Time Applications 271

8.2.2 Internet Telephony 272

8.2.3 Internet Telephony Gateways 276

8.2.4 Internet Fax Gateways 278

8.2.5 Video Conferences 279

8.3 Internet Chat Solutions 280

8.3.1 Internet Relay Chat 280

8.3.2 Java Chat Rooms 283

8.3.3 Virtual Worlds 283

8.3.4 Internet Newsgroups 285

8.3.5 Digital Communities 286

8.4 Internet-based Trainings 287

8.4.1 Reasons for Internet-based Trainings 287

8.4.2 The New Paradigm 288

8.4.3 Just-enough Training 289

8.4.4 Training Management Software 290

9 Comparing Web Technologies 295

9.1 Finding the Right Browser 295

9.1.1 The Browser Market 295

9.1.2 Sticking to the Web Standards 296

9.1.3 Global Browser Player 297

9.1.4 Comparing Browser Technologies 301

9.1.5 Other Browsers 302

9.1.6 Offline Browsers 306

9.1.7 The Impact on Business 306

9.1.8 Browsing into the Future 307

9.2 The Hypertext Markup Language 310

9.2.1 The Building Block 310

9.2.2 Web Page Layout 311

9.2.3 HTML 4.0 313

9.2.4 Relevance to Online Businesses 315

9.3 The Dynamic Web 316

9.3.1 Moving from Static to Dynamic Web Sites 316

9.3.2 Cascading Style Sheets 317

9.3.3 The Document Object Model 317

9.3.4 Dynamic HTML 318

9.4 Dynamic Server Concepts 319

9.4.1 The Common Gateway Interface 320

9.4.2 Server Side Includes 322

9.4.3 Net.Data 322

9.4.4 JavaServer Pages 323

9.5 Web Application Servers 323

9.5.1 Reasons for Web Application Servers 323

9.5.2 Web Application Products 324

9.6 The Extensible Markup Language 330

9.6.1 Common Problems of the Web 330

9.6.2 Moving to XML 332

9.6.3 Business Requirements 334

9.6.4 Reformulating HTML in XML 336

9.6.5 Location of XML Documents 338

9.6.6 XML Applications 339

9.6.7 Other Applications 341

9.6.8 Business via XML 342

9.6.9 Standard XML Schemas 344

9.7 Plug-ins 344

9.7.1 Advantages of Plug-ins 344

9.7.2 Adobe Acrobat Reader 345

9.7.3 Apple Quicktime 346

9.7.4 Platinum Cosmoplayer 346

9.7.5 Macromedia Shockwave 347

9.8 JavaScript 347

9.8.1 Introduction to JavaScript 347

9.8.2 Understanding the Value of JavaScript 349

9.8.3 VisualBasic Script 350

9.8.4 JavaScript versus JScript 350

9.8.5 JavaScript Problems in Browsers 351

9.8.6 Introduction to ECMAScript 351

9.8.7 The Future of JavaScript 353

10 Security on the Internet 354

10.1Creating a Security Strategy 354

10.1.1 Information Security 354

10.1.2 Information Policy 355

10.1.3 Threats and Challenges on the Internet 356

10.1.4 Social Engineering 359

10.1.5 Security through Obscurity 361

10.1.6 Resolving the Security Issues 362

10.1.7 Authorization 363

10.2 Cryptographic Tools 364

10.2.1 Defining Cryptography 364

10.2.2 Reasons for Encryption 365

10.2.3 Secret Key Cryptography 366

10.2.4 Public Key Cryptography 367

10.2.5 Comparison of Secret and Public Key Cryptography 368

10.2.6 Steganography 369

10.3 Applications of Cryptology 370

10.3.1 Enforcing Privacy 370

10.3.2 Encrypting E-Mail 370

10.3.3 Applying Encryption Technologies 372

10.3.4 Digital Signatures 373

10.4 Privacy on the Internet 374

10.4.1 Footprints on the Net 374

10.4.2 TRUSTe 376

10.4.3 The Platform for Privacy Preferences 377

10.4.4 Enforcing Anonymity on the Internet 378

10.5 Fighting Virus and Hoax Virus Warnings 379

10.5.1 The False Authority Syndrome 379

10.5.2 Understanding Viruses 381

10.5.3 Deploying Anti-virus Solutions 384

10.5.4 Required Software 385

10.5.5 Ignoring Hoax Viruses and Chain Letters 387

10.6 Conflicts in the Information Age 389

10.6.1 Information Attack 389

10.6.2 Information Warfare 390

10.6.3 Cyber-terrorism 392

10.6.4 The Eternity Service 395

10.7 Client-based Security 396

10.7.1 Digital Certificates 396

10.7.2 Smart Cards 397

10.7.3 Biometric Identification 401

10.8 Server-based Security 403

10.8.1 The Need for a Firewall 403

10.8.2 Server Protection 405

10.8.3 Attacks from the Inside 406

10.8.4 Protecting Digital Businesses 408

10.8.5 Trusted Operating Systems 409

10.8.6 Trusted Solutions 412

10.8.7 Certification Authority 415

11 Dealing with Java 417

11.1 Introducing Java 417

11.1.1 Definition of Java 417

11.1.2 Validating the Business Case 418

11.1.3 Embedded Devices 420

11.1.4 Java versus JavaScript 421

11.1.5 Example Business Cases 423

11.2 Java Foundation Classes 424

11.2.1 Technical Overview 424

11.2.2 Checking the Business Cases 426

11.2.3 Online Experience 427

11.2.4 Required Software 428

11.3 JINI 424

11.3.1 Technical Overview 424

11.3.2 Checking the Business Cases 426

11.3.3 Online Experience 427

11.3.4 Required Software 428

11.3 JINI 428

11.3.1 Technical Overview 428

11.3.2 Checking the Business Cases 429

11.3.3 Online Experience 430

11.3.4 Required Software 431

11.4 JavaBeans 431

11.4.1 Technical Overview 431

11.4.2 Checking the Business Cases 433

11.4.3 Online Experience 434

11.4.4 Required Software 434

11.5 InfoBus 435

11.5.1 Technical Overview 435

11.5.2 Checking the Business Cases 435

11.5.3 Online Experience 437

11.5.4 Required Software 437

11.6 Resolving Possible Java Issues 438

11.6.1 Speeding up Java 438

11.6.2 The 100 Percent Pure Java Initiative 440

11.6.3 Java Applet Security 441

11.6.4 Java versus Active X 442

11.6.5 Moving from C++ to Java 444

11.7 Avoiding the Java Wars 445

11.7.1 Hewlett-Packard 445

11.7.2 Microsoft 447

11.8 The Future of Java Computing 449

11.8.1 New Java Technologies 449

11.8.2 Outlook into the Future 449

12 Imaging on the Internet 451

12.1 Image Business 451

12.1.1 Reasons for Better Quality Images 451

12.1.2 Business Requirements 452

12.1.3 Example Business Cases 453

12.1.4 Java versus JavaScript 453

12.1.5 Example Business Cases 454

12.2 Image Concepts 454

12.2.1 Static Image Formats 454

12.2.2 Dynamic Image Formats 457

12.3 The FlashPix Format 458

12.3.1 Technical Overview 458

12.3.2 Checking the Business Cases 459

12.3.3 Online Experience 461

12.3.4 Required Software 462

12.4 QuickTime VR 463

12.4.1 Technical Overview 463

12.4.2 Checking the Business Cases 464

12.4.3 Online Experience 465

12.4.4 Required Software 467

12.5 VRML 468

12.5.1 Technical Overview 468

12.5.2 Checking the Business Cases 469

12.5.3 Online Experience 471

12.5.4 Required Software 473

12.6 Comparing Imaging Technologies 473

12.7 The Future of Imaging 474

12.7.1 Fractal Compression 474

12.7.2 DjVu 475

12.7.3 JPEG 2000 475

12.7.4 X3D 477

13 Paying via the Net 478

13.1 The Payment Business 478

13.1.1 Business Requirements 478

13.1.2 Psychology of Micro-Payments 483

13.1.3 Minimizing the Risk 483

13.1.4 Fraud Detection 485

13.1.5 Example Business Cases 486

13.1.6 Internet Payment Methods 487

13.1.7 Political Impact of Digital Currencies 488

13.2 Post-paid Payment Systems 489

13.2.1 Credit Card Solutions 489

13.2.2 Invoice 494

13.2.3 Internet Cheques 495

13.2.4 Cash on Delivery 497

13.2.5 Checking the Business Cases 497

13.2.6 Online Experience 498

13.2.7 Required Software 501

13.3 Instant-paid Payment Systems 502

13.3.1 Credit Card Solutions 502

13.3.2 Debit Cards 502

13.3.3 Checking the Business Cases 503

13.3.4 Online Experience 504

13.3.5 Required Software 505

13.4 Pre-paid Payment Systems 505

13.4.1 Electronic Cash 505

13.4.2 Smart Cards 509

13.4.3 Checking the Business Cases 511

13.4.4 Online Experience 512

13.4.5 Required Software 513

13.5 Comparing Payment Technologies 513

13.6 The Future of Payment 514

13.6.1 SEMPER 514

13.6.2 The Open Trading Protocol 515

13.6.3 Open Buying on the Internet 516

13.6.4 Global Trust Enterprise 517

14 The Open Source Community 522

14.1 Information Wants to Be Free 522

14.1.1 Free Software 522

14.1.2 The Impact of the Internet 524

14.1.3 The Cathedral and the Bazaar 525

14.1.4 Building a Successful Open Source Project 525

14.1.5 Open Source Definition 526

14.2 Free Software Projects 527

14.2.1 The Gutenberg Online Library 527

14.2.2 The Linux Operating System 528

14.2.3 The Open Directory 529

14.2.4 The TeX Typesetting System 530

14.3 Open Source Projects 531

14.3.1 The Jabber Instant Messaging System 531

14.3.2 The Jikes Compiler 532

14.3.3 The KDE Graphical Desktop Environment 533

14.3.4 The Mozilla Browser 534

14.3.5 The Open Firmware ROM Code 536

14.3.6 The OpenPGP Cryptography Framework 536

14.3.7 The OpenSSL Toolkit 536

14.3.8 The Zope Web Application Platform 537

14.4 Moving Your Company from Products to Services 538

14.4.1 Supporting the Software 538

14.4.2 Improving the Software 539

14.4.3 Integrating the Software 540

14.4.4 Problems with Open Source 540

14.4.5 Releasing New Open Source 541

14.5 Introduction to Open Hardware 541

14.5.1 Differences to Software 541

14.5.2 Open Hardware Projects 542

14.5.3 The Common Hardware Reference Platform 542

14.5.4 The Freedom CPU 543

14.5.5 Open Design Circuits 544

14.5.6 The Open Hardware Certification Program 546

14.5.7 The Open Hardware Specification Project 546

15 Pervasive Computing 549

15.1 Internet Services 549

15.1.1 Enabling Technologies 549

15.1.2 Business Opportunities 551

15.1.3 Internet Services Standards 551

15.1.4 Moving Applications to the Web 552

15.1.5 Open Internet Services 553

15.2 Device-to-device Communication 554

15.2.1 Introduction 554

15.2.2 ChaiServer 554

15.2.3 Inferno 556

15.2.4 Universal Plug and Play 557

15.2.5 Jini 558

15.3 Information Exchange 560

15.3.1 Introduction 560

15.3.2 JetSend 560

15.3.3 T Spaces 561

15.3.4 InfernoSpaces 562

15.3.5 Millennium 563

15.3.6 InfoBus 564

15.4 Service Broadcasting 565

15.4.1 Introduction 565

15.4.2 E-Speak 565

15.5 The Vision 568

15.5.1 Introduction 568

15.5.2 E-Services 568

15.6 Comparison of Pervasive Computing Technologies 570

15.7 The Future of Pervasive Computing 571

16 Beyond Pervasive Computing 571

16.1 Technical Outlook on the Future 574

16.1.1 Opening Internet Access 574

16.1.2 Consumer Device Integration 575

16.1.3 Privacy and Security in the Future 578

16.1.4 Next Generation Internet 578

16.2 Looking into the Future of Business 580

16.2.1 Content Brokers 580

16.2.2 Product Brokers 581

16.2.3 Service Brokers 582

16.2.4 Broker Software 584

16.2.5 Total Automation of Business 580

16.3 The Societal Impact 586

16.3.1 The Transition Phase 586

16.3.2 Responsibility for the Society 587

16.3.3 Next Generation Work Life 588

16.3.4 Politics in the 21st Century 588

A Glossary of E-Business Terms 590

B Example Internet Business Architecture 611

B.1 The Business Idea 611

B.2 Marketing on the Web 613

B.3 Implementation of the Service 615

B.4 Outlook into the Future 617

C Useful Web Addresses 619

C.1 Business 619

C.2 Comics 619

C.3 Computers 620

C.4 Fun 620

C.5 Hacking Related Sites 620

C.6 Internet Organizations 621

C.7 Mailing Lists 621

C.8 News 622

C.9 Search Engines 622

C.10 Software Development 622

Subject Index 611