The Technology Behind E-Commerce

The Technology Behind E-Commerce

David Reavis (Texas A&M University – Texarkana, USA)
Release Date: August, 2015|Copyright: © 2016 |Runtime: 2 hrs 30 mins
EISBN13: 9781466695160|DOI: 10.4018/978-1-4666-9516-0
Institution (Multi User Access) Video Prices
Streaming Access:
$360.00
DVD:
$370.00
Individual (Single User Access) Video Prices
Streaming Access:
$180.00
DVD:
$190.00

Description

Over the last decade, business has moved beyond physical brick and mortar stores and offices and into the digital sphere. Conducting business, and especially commerce, online presents a number of opportunities to reach a wider customer base, save on operations costs, as well as better serve the needs of the modern consumer.

The Technology Behind E-Commerce is a video lecture presenting research on the latest technological advances associated with Electronic Commerce (E-Commerce). While the broader study of E-Commerce often includes issues such as marketing, B2B activities, and social media, this educational video focuses specifically on the hardware and software technologies being used for E-Commerce development and activities. This more refined focus presents an opportunity for students, researchers, and business professionals to gain a clear understanding of the technologies that support E-Commerce business processes.

Topics Covered

  • Data Centers
  • Enterprise resource planning
  • Hardware
  • Internet of Things
  • Mobile Commerce
  • Programming Tools
  • Security Issues
  • Servers for E-Commerce
  • Software

Table of Contents

Introduction and Biography
1:59 mins
Section 1:Nuts and Bolts (Hardware)
 
Lesson 1:Internet Connectivity
11:40 mins
 
Lesson 2:Data Center Basics
11:43 mins
 
Lesson 3:Servers for E-Commerce
14:22 mins
 
Lesson 4:The Internet of Things
11:48 mins
 
Section 2:Software for Selling on the Internet
 
Lesson 5:Programming Tools for Creating Commercial Websites
11:16 mins
 
Lesson 6:Selecting Software Services
11:01 mins
 
Lesson 7:ERP and E-Commerce Integration
12:26 mins
 
Section 3:Technology for Security
 
Lesson 8:Identifying Threats to the System
14:50 mins
 
Lesson 9:Hardware for Protecting Data and Processes
12:04 mins
 
Lesson 10:Software for Protecting Data and Processes
11:20 mins
 
Section 4:Issues in Mobile E-Commerce
 
Lesson 11:Devices
13:15 mins
 
Lesson 12:Apps vs. Mobile Websites
12:46 mins