E-Commerce: Doing Business on the Internet CPSC 155b, Spring 2003 T, Th: 1-2:15 pm (The Co-Evolution of Technology.

Slides:



Advertisements
Similar presentations
Lecture 2 - Revenue Models
Advertisements

Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
CS 46101–600/CS Design and Analysis of Algorithms Dr. Angela Guercio Spring 2010.
Learning Goals Be able to identify the major forces shaping the new digital age. Understand how companies have responded to the Internet with e-business.
1 Computational Complexity CPSC 468/568, Fall 2008 Time: Tu & Th, 1:00-2:15 pm Room: AKW 500 Satisfies the QR requirement.
CS 232 Geometric Algorithms: Lecture 1 Shang-Hua Teng Department of Computer Science, Boston University.
E-Commerce: Doing Business on the Internet CPSC 155a, Fall 2001 T, Th: 1-2:15 pm, Room DL 220 (The Co-Evolution of.
CIS 3200 Networking Fundamentals Abdou Illia, Ph.D School of Business Eastern Illinois University (Week 1, Tuesday 1/09/2007)
11 Economics and Computation Econ 425/563 and CPSC 455/555, Fall 2008 Time: Tu & Th, 2:30-3:45 pm Room: BCT 102
Management Information Systems Dr. Eric Breimer. Course Syllabus CSIS-114: Management Information Systems (Spring 2006) Lecture: Wednesday and Friday,
CS155b: E-Commerce Lecture 2: Jan. 11, 2001 Course Overview.
1 Computational Complexity CPSC 468/568, Fall 2007 Time: Tu & Th, 1:00-2:15 pm Room: AKW 200 Dist. Group: IV (not Natural Sci.) Satisfies “QR”
E-commerce Introduction. What is E-commerce? The use of the Internet and WWW to transact business? The use of the Internet and WWW to transact business?
1 Computational Complexity CPSC 468b, Spring 2007 Time: Tu & Th, 1:00-2:15 pm Room: AKW 500 Dist. Group: IV (not Natural Sci.) Satisfies “QR”
ENGS Lecture 1 ENGS 4 Technology of Cyberspace Winter 2004 Thayer School of Engineering Dartmouth College Instructor: George Cybenko, x6-3843
CS155a: E-Commerce Lecture 2: Sept. 11, 2001 Course Overview.
CPSC156: The Internet Co-Evolution of Technology and Society Lecture 7: February 6, 2007 More about browsers (ack.: L. Cranor); Introduction to Digital.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
Tuesday, January 18, Management of Information Systems: Mini-3 Spring 2000.
Chapter 9 e-Commerce Systems.
1 Computational Complexity CPSC 468/568, Fall 2009 Time: Tu & Th, 2:30-3:45 pm Room: AKW 307 Satisfies the QR requirement.
COMPUTER APPLICATIONS TO BUSINESS ||
E-commerce E-commerce is defined "as the process of buying, selling, or exchanging products, services, or information via computer networks, including.
E-Commerce: Doing Business on the Internet CPSC 155b, Spring 2001 T, Th: 1-2:15 pm, Room DL220
COP4020/CGS5426 Programming languages Syllabus. Instructor Xin Yuan Office: 168 LOV Office hours: T, H 10:00am – 11:30am Class website:
CS155b: E-Commerce Lecture 7: Jan. 30, 2001 A Computer Scientist’s View of Copyright Law.
Chapter 5 © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole.
1 The Internet: Co-Evolution of Technology and Society CPSC 156b, Spring 2007 Time: Tu & Th, 2:30-3:45 pm Room: ML 221 Distribution Group: IV Not QR or.
E-Commerce. What is E-Commerce Industry Canada version Commercial activity conducted over networks linking electronic devices (usually computers.) Simple.
Computer Network Fundamentals CNT4007C
EFirm & eCommerce Digital Firm. Contents 1. Introduction 2. The opportunities of technology 3. Electronic Commerce 4. Payment systems 5. Management challenges.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
CS 458 Internet Engineering Instructor: Prof. Jörg Liebeherr University of Virginia.
1 COMS 161 Introduction to Computing Title: Course Introduction Date: August 25, 2004 Lecture Number: 1.
Computer Networks CEN 5501C Spring, 2008 Ye Xia (Pronounced as “Yeh Siah”)
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Marketing Management Online marketing
Laudon & Laudon: Canadian Edition
Introduction to Information Systems and Technology MIS 213, Spring 2015 CIS 2005, CIS 1007.
Copyright © 2007 Pearson Education Canada 13-1 Chapter Thirteen Marketing and the Internet with Duane Weaver.
E-Commerce Course Overview. Telephone Network Connection-based Admission control Intelligence is “in the network” Traffic carried by relatively few, “well-known”,
ICS 6B Boolean Algebra and Logic Winter 2015
CSE 1340 Introduction to Computing Concepts Class 1 ~ Intro.
1 [CMP001 Computer Orientation I] Course Guide Ms. Wesal Abdalfattah office#: 357 Ext#: 8612 Prince Sultan University,
Copyright © 2005 Pearson Education Inc. Marketing in the Digital Age Chapter 3 PowerPoint slides Express version Instructor name Course name School name.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Corporate Financial Management WELCOME TO FINANCE 254.
11/21/20151 Operating Systems Design (CS 423) Elsa L Gunter 2112 SC, UIUC Based on slides by Sam King and Andrew.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
01 Course Introduction Aaron Schiff ECON
Introduction to Information Security J. H. Wang Sep. 18, 2012.
1 Introduction to Data Communication Networks ISQS 3349, Spring 2001 Instructor: Zhangxi Lin Office: BA 708 Phone: Homepage:
The Internet: Co-Evolution of Technology and Society CPSC 156a, Fall 2003 Time: Tues & Thurs, 1-2:15 pm Room: DL 220
CSE 1340 Introduction to Computing Concepts Class 1 ~ Intro.
Computer Networks CNT5106C
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
IST 210: ORGANIZATION OF DATA Introduction IST210 1.
CNT 4704 Computer Communication Networking (not “analysis”)
Introduction to Information Systems and Technology
Data and Applications Security Developments and Directions
E-Commerce: Doing Business on the Internet
CNT 4704 Computer Communication Networking (not “analysis”)
Overview of Electronic Commerce
COMS 161 Introduction to Computing
Internet.
Computer Networks CNT5106C
Data and Applications Security Developments and Directions
Presentation transcript:

E-Commerce: Doing Business on the Internet CPSC 155b, Spring 2003 T, Th: 1-2:15 pm (The Co-Evolution of Technology and Business)

Overview Introduction to electronic commerce Emphasis on Internet business Underlying technological developments Business models Legal, social, and political implications

Partial Outline Internet Basics Digital Copyright Web Searching Privacy, Values-Sensitive Design, and Other Policy Issues B2C, B2B, and C2C Technologies and Companies

Examples of Technological Developments Mass-market computing and networking World Wide Web Digital music, images, text, etc. “Search” and other massive-scale data processing “Strong” cryptography

Examples of Business Developments New ways to conduct old business –New companies –New capabilities for old companies –Death of some old companies –“Empowered consumers” ?? New types of business (Qualitatively more) massive scale Internet boom and bust

Examples of Conflicts Privacy vs. efficiency Anonymity vs. accountability Commerce vs. law enforcement Standardization vs. innovation Global technology vs. local expectations

Schedule Jan. 28:First HW Assignment Due Feb. 18:Second HW Assignment Due Feb. 27:First Exam Mar. 6:Third HW Assignment Due Apr. 1:Fourth HW Assignment Due Apr. 15:Fifth HW Assignment Due Apr. 24:Second Exam

Requirements Reading assignments (approx pages/week) –Material available online will be posted on the course web page, with a limited number of copies available outside the TA’s office. –Material available only in print form will be distributed in class or assigned from the textbook. 5 written HW assignments (10% each) –Available one week before due date 2 in-class hour exams (25% each)

Textbook Trust and Risk in Internet Commerce, L. Jean Camp (MIT Press, 2000). This book is on reserve in the Engineering and Applied Science Library (Becton Center, 15 Prospect Street). Contains readings on: How the Internet works Privacy and protection mechanisms Electronic business transactions

Instructor: Joan Feigenbaum Office: AKW 512 Office Hours:Tues 4-5pm, Thurs 11am-12 noon Phone: Assistant: Judi Paige 203 Note: Do not send to Professor Feigenbaum, who suffers from RSI. Contact her through Ms. Paige or the TA.

TA: Vijay Ramachandran Office: AKW 412 Office Hours: Mondays and Wednesdays 3pm-4pm Phone:

Previous Renditions of CS155 Spring 2001: Fall 2001: Old course material is available from the websites listed above. The class will be slightly different this semester; use the above for background information only.

Rules and Guidelines Deadlines are firm. Dean’s excuses are needed for all make-up exams or late homeworks. Hand them in promptly. You are responsible for all content of lectures and the class webpage. No “collaboration” on homeworks. Pick up your graded homeworks and exams promptly, and tell the TA immediately if one is missing.

Questions?

Telephone Network Connection-based Admission control Intelligence is “in the network” Traffic carried by relatively few, “well-known” communications companies Internet Packet-based Best effort Intelligence is “at the endpoints” Traffic carried by many routers, operated by a changing set of “unknown” parties

Business Business Question: How to price Internet service? Technical and Business Question(s): How to provide different QoS levels and how to charge for them? Technical, Business, and Policy Question: Does “intelligence at the endpoints” make sense for a mass-market public infrastructure?

Shift to Internet Causes Changes in existing businesses (e.g., telepresence) New ways to do old kinds of business (e.g., WWW-based retail) New kinds of businesses (e.g., portal companies)

As an infrastructure for communication, business, and almost all forms of human interaction, the Internet is new, rapidly changing, and inherently less manageable and controllable that older infrastructures. Leads to questions about: Privacy Authenticity Accountability Jurisdiction

Co-Evolution of Technology and Business* “Information Economy” Network Effects Open-Source Movement Internet-Architectural Principle of “Layering” * Robert Glushko, CommerceOne

Changes in the Technology and the Economics of Publishing Computers and Digital Documents WWW-based Publication Internet Distribution

Technical Question: Is copying, modification, and redistribution of copyrighted material now uncontrollable? Business Question: Is it possible to make money distributing copyrighted material (e.g., popular music) over the Internet?

Technical and Business Questions To what extent do encryption, digital signature, and other well understood security technologies make Internet content distribution manageable and profitable? –What other technology is needed? –What is the role of “circumvention” in effective development and deployment of relevant technology?

Technical, Business, and Legal Questions Is current copyright law technically feasible to implement and deploy on the Internet? –“copy-centric” –“fair use is a defense, not a right” –DMCA / CBDTPA To what extent is copyright compliance monitorable? To what extent should it be monitored?

WWW Searching Technical Question: How to do it? (short answer: Linear Algebra) Business Questions: How to make a business out of it? What is the role of advertising? Legal and Ethical Question: What conclusions should be drawn about people (by, e.g., gov’t, employers, insurance companies…) based on what they search for and what they find (a “TIA” question)?

WWW-Based, B2C Retail Business Question: What to sell? Business and Technical Question: How and to what extent to capture and use customer information? –Massive scale –Variable quality –Numerous formats and intermediaries Business and Technical Question: How feasible and effective is online advertising?

Business, Legal, and Ethical Questions: Who owns transaction data? To whom can it legally be sold? What can legally be done with it? Technical and Business Question: Is there an inherent tradeoff between personalization/efficiency and privacy? (a “cookie” question)

WWW-Based, B2B “Exchanges” Economics and CS Challenge: Market Design Technical, Business, and Legal Question: Do “industry-sponsored” electronic market places promote monopoly and monopsony? Technical Challenge: XML and other language-design questions

Company Studies Netscape Napster LimeWire KaZaa Amazon bn.com (Barnes & Noble) VeriSign Covisint eBay Google Yahoo AOL MSN (Microsoft)

Reading Assignment For January 16 Chapter 1 of Information Rules, Shapiro and Varian, Harvard Business School Press, 1999 (Print form only) Executive Summary of The Digital Dilemma, National Research Council, 2000 ( “The Myth of Internet Time,” Andrew Odlyzko, 2001 ( net.time.myth.txt) net.time.myth.txt