Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Introduction to E-commerce (eBook)

Zheng Qin (Herausgeber)

eBook Download: PDF
2010 | 2009
180 Seiten
Springer Berlin (Verlag)
978-3-540-49645-8 (ISBN)

Lese- und Medienproben

Introduction to E-commerce -
Systemvoraussetzungen
128,39 inkl. MwSt
(CHF 125,40)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Introduction to E-commerce discusses the foundations and key aspects of E-commerce while focusing on the latest developments in the E-commerce industry. Practical case studies offer a useful reference for dealing with various issues in E-commerce such as latest applications, management techniques, or psychological methods. Dr. Zheng Qin is currently Director of the E-Commerce Institute of Xi'an Jiaotong University.

Preface 5
Table of Contents 9
Part 1 Fundamentals 16
1 Fundamentals of E-commerce 17
1.1 The Origin and Development of E-commerce 18
1.1.1 The Origin and Development of E-commerce 18
1.1.2 The Definitions of E-commerce 21
1.1.3 E-commerce in China 23
1. E-commerce based on EDI (1990 1993) 24
2. “Three Golden Projects” carried out by governments in 1993 1997 establish, the foundation of e-commerce 24
3. E-commerce based on Internet since 1998 25
4. The pragmatic development phase in 2000 25
1.2 Influence of Related Basic Sciences on E-commerce 28
1.2.1 Influence of Mathematics on E-commerce 29
1. Probability model 29
2. Queuing theory model 30
3. Nonlinear dynamic model 31
4. Graph theory model 32
1.2.2 The Impact of Computer Science Upon the E-commerce 34
1.2.3 Impact of Communications Science upon the E-commerce 35
1.2.4 The Impact of Management Science upon E-commerce 37
1.3 Categories of the E-commerce 38
1.3.1 B2B 39
1. Volume of business transaction of B2B takes up the majority of the total trading volume in e-commerce 39
2. The B2B e-commerce companies hold an advantage in lowering operation cost 40
3. B2B e-commerce companies are more suitable for modern logistics management 40
4. B2B e-commerce companies are competitive in guaranteeing credit and capital security during operation course 40
5. E-commerce of B2B is more mature in both theory and practice 40
1.3.2 B2C 41
1. Online subscription categories 42
2. Advertisements-supported categories 43
3. Online donation categories 43
1.3.3 B2G 44
1.3.4 G2G 46
1. Government procurement 49
2. The electronic taxation 49
1.3.5 C2C 50
1.4 The Constitution of the E-commerce 53
1.4.1 Portal of the Network 53
1.4.2 Customer Relationship Management 56
Client Intelligence (CI) 57
1.4.3 Supply Chain Management 59
1. SCM Pattern 60
2. Functions of SCM 61
3. Components of SCM 61
1.4.4 Logistic Management 62
1.4.5 Decision Support 65
1.5 Supporting Environments for E-commerce 69
1.5.1 Technical Environment 69
1. Internet infrastructure 70
2. Multimedia and online publication 70
3. Newspapers and information communication infrastructure 70
4. Commercial service infrastructure 70
5. Public policies, laws and privacy 70
6. Technology standard 71
1.5.2 Legal Environment 71
1. Legal problems in e-commerce contracts 72
2. Legal protection on e-commerce transaction 72
3. Problems in the electronicization of banks 72
1.5.3 Credit Environment 73
1. Pattern of market operation and legislation guide 73
2. Pattern of government-driven and direct supervision 74
1.5.4 Financial Environment 76
1. Financial service in e-commerce era 77
2. Online financial services 78
1.6 M-commerce 79
1.6.1 The Origin of M-commerce 79
1.6.2 M-commerce Components 81
1.6.3 The Development of M-commerce 83
1.6.4 The Application of M-commerce 85
1.7 Summary 87
References 88
Part 2 Technology 91
2 E-commerce Supporting Technologies 92
2.1 E-commerce Fundamental Technology 93
2.1.1 Web Technology 93
2.1.2 HTML 94
2.1.3 XML 94
2.1.4 Java 96
1. Platform-independent 96
2. Security 97
3. Object-oriented 97
4. Distributed 97
5. Robust 97
2.2 Computer Communication Technology 98
2.2.1 TCP/IP Protocols 98
2.2.2 HTTP Communication Protocol 99
2.2.3 EDI Communication Protocol 101
2.2.4 WAP Communication Protocol 104
2.2.5 WLAN Protocol 107
1. IEEE 802.11X 108
2. HIPERLAN 110
3. HomeRF 110
4. WLAN standards in China 111
2.2.6 Bluetooth Protocol 111
2.3 Information Processing Technologies in E-commerce 115
2.3.1 Global Positioning System (GPS) 115
1. Pseudo-range difference 118
2. Carrier phase difference 118
2.3.2 Geographical Information System (GIS) 118
1. GIS vs. general database 119
2. GIS vs. digital map 119
2.3.3 Decision Supporting System (DSS) 119
2.3.4 Group Decision Supporting System (GDSS) 122
2.3.5 Intelligent Decision Supporting System (IDSS) 124
2.4 Summary 125
References 126
3 Payment Technologies for E-commerce 128
3.1 Online Bank 129
3.1.1 The Development of Online Banks 129
3.1.2 The Function of Online Bank 132
1. Commercial banking business 132
2. Online payment 133
3. New business domain 133
3.1.3 Online Banking Technologies 133
3.2 E-payment Tools 136
3.2.1 E-payment System 136
3.2.2 Intelligent Card 137
3.2.3 E-check 139
3.2.4 E-wallet 140
3.2.5 E-cash 143
3.3 Summary 145
References 145
4 Security Technologies in E-commerce 148
4.1 Introduction to Security Problems in E-commerce 148
4.2 Reliability of E-commerce System 150
4.3 Data Encryption Technology 152
4.3.1 Symmetric Encryption System 153
4.3.2 Public Key Encryption Algorithm 155
4.3.3 Mixed Encryption Technology 156
4.4 Digital Signature 157
4.4.1 Sign the Document with Public Key Algorithm 157
4.4.2 Signature with One-way Hash Function and Public Key System 158
4.5 Authentication Technology 159
4.5.1 Digital Authentication Technology 159
4.5.2 Biological Verification Technology 160
1. Fingerprint Authentication 160
2. Iris Authentication 160
3. Face Authentication 161
4. Hand Shape Authentication 161
5. Palmprint Authentication 161
6. Gait Authentication 162
7. Manual Signature Authentication 162
8. Voice Authentication 163
9. Comparison of biological Authentication technology 163
4.6 Firewall Technology 163
4.6.1 Introduction to Firewall 163
4.6.2 Functions of the Firewall 164
1. Defending function 164
2. Security characteristic 165
3. Management function 165
4. Record and report 166
4.6.3 Categories of Firewall 166
1. Packet filtering firewall 166
2. Application proxy firewall 167
3. Hybrid firewall 167
4.7 Intrusion Detection Technology 168
4.7.1 Introduction to Intrusion Detection 168
4.7.2 Intrusion Detection Method 170
1. Technical classification 170
2. Commonly used detection methods 171
4.8 Secure Payment Technology 172
4.8.1 SSL Protocol 172
4.8.2 SET Protocol 176
4.9 Summary 179
References 179
Part 3 Management 182
5 E-commerce and the Law 183
5.1 Legal Problems in E-contract 184
1. True intentions 184
2. The offer and acceptance in e-contracts 184
3. The entry-in-force of the acceptance in e-contracts 185
4. The signature 185
5. Paperwork problem 186
6. The evidence effect of e-commerce documents 186
7. Proof of computer records 187
8. The admissibility of evidence in e-commerce 187
9. The submission of originals 187
5.2 Legal Problems in E-banks 188
1. Elements of electronic fund transfer 188
2. Procedures in electronic fund transfer 189
3. Problems of safety brought by computer crimes 190
4. The issuance and management of e-currency 190
5. The unity of Certification Authority (CA) and payment gateway 190
5.3 The legal Problems in the Electronic Fund Transfer 191
The definition of the subjects in the electronic fund transfer 191
5.4 The Intellectual Property Protection in the E-commerce 192
5.4.1 Legal Problems Brought forth by Domain Names 192
1. The legal conflict between domain names and name rights 193
2. The legal conflict between domain names and enterprise name rights 193
3. The legal conflict between domain names and trademark rights 194
4. The conflict between domain names and other domain name rights 195
5.4.2 The Coordination of the Conflicts Between Domain Names and Intellectual Property 195
1. Define the legal status of domain names 195
2. Establish the communication and coordination channel between the domain name registration mechanism and the legal system of intellectual property protection 195
3. Proposals concerning domain names by the international community 196
5.4.3 WIPO's Coordination About the Conflicts Between Domain Names and Intellectual Property 197
1. Measures to avoid domain name conflicting in the registration phase 197
2. Measure taken towards inaccurate and insecure information 197
3. Measures concerning uniqueness 197
4. A globally unified mechanism to solve domain name conflicts 198
5. Protection of famous and well-known trademarks 198
5.4.4 Copyright Issues in E-commerce 198
1. Conflicts between services in e-commerce and traditional copyright 199
2. Online bookstores and copyright 199
3. Copyright protection of databases 199
4. Current status of database protection in the US 200
5.5 Legal Problems of E-commerce Security 200
5.5.1 Security Problems in E-commerce 200
1. Security elements in e-commerce 200
2. General situation of e-commerce security legislation 201
3. Current status of e-commerce security legislation in China 201
5.5.2 Legal Systems Concerning the E-commerce Security 201
5.5.3 Legal Responsibilities for the Violation of E-commerce Security Laws 203
1. Administrative penalty 203
2. Administrative responsibilities for the violation of e-commerce security systems 203
5.6 Consumer Rights Protection in E-commerce 203
5.6.1 Impacts of E-commerce on Consumers 203
1. The change of roles of consumers promoted by network 204
2. New legal problems of consumer protection initiated by e-commerce 204
3. Problems about e-commerce websites 204
4. Responsibility cognizance 204
5. Responsibility investigation 205
6. Jurisdiction problem 205
5.6.2 E-commerce and Consumer Privacy Protection 205
1. Main contents of consumer privacy protection 206
2. Legal strategies to protect consumer privacy by all countries and international organizations 206
3. Problems to be discussed: the balance between privacy protection and the benefits of e-commerce operators 207
4. Strategies to protect online consumers rights by all countries and international organizations 207
5.7 Legal Liability in E-commerce 207
5.7.1 Civil Liability in E-commerce 207
1. Concept of civil liability in e-commerce 207
2. Contract liability in e-commerce 209
3. Tort liability principle in e-commerce 209
4. Torts of violation of e-commerce laws 209
5. Several major torts in violation of personal privacy 210
6. Tort liability forms in e-commerce 211
5.7.2 Administrative Liability in E-commerce 211
1. Administrative liability in e-commerce 211
2. Administrative liability about intellectual property involved in e-commerce 212
3. Administrative liability about copyright involved in e-commerce 212
4. Administrative liability about customer rights protection in e-commerce 212
5.7.3 Criminal Responsibility in E-commerce 213
1. Phenomena and features of crimes in e-commerce 213
2. Crimes and criminal responsibilities in e-commerce 213
3. Problems and challenges in the application of criminal laws 214
4. Blind area of current criminal law 214
5.8 Brief Introduction to the "Electronic Signature Law of the PRC" 215
5.9 Summary 217
References 217
6 E-commerce and Tax 219
6.1 An Outline of Tax in E-commerce 220
1. The categorization of traditional tax revenue 220
2. The concept of tax jurisdiction 220
6.2 Features of E-commerce Tax 222
6.3 Problems in E-commerce Tax 223
1. Problems concerning international tax distribution and domestic tax revenue 223
2. Restatement about the taxation 224
3. Taxation Jurisdiction 226
4. Common matters in domestic e-commerce 227
6.4 E-commerce and Tax Administration 230
6.5 Strategies in E-commerce Taxation 232
1. The scholars’ perspective: open new taxes. New taxes proposed include bit tax and Tobin tax 232
2. The US perspective 232
3. Solution to e-commerce taxation by OECD 234
4. Canada 234
5. Method of EU to solve the problem of e-commerce taxation 237
6. Strategies of ECTSG 237
7. Strategies of developing countries 237
8. The strategy of e-commerce taxation in our country 237
6.6 Summary 239
References 239
7 Network Enterprise Management 240
7.1 Overview of Network Enterprises 241
7.1.1 Background and Basic Characteristics of Network Enterprises 241
7.1.2 Knowledge Management 242
7.1.3 Virtual Enterprise 249
7.2 Supply Chain Management of Network Enterprises 252
7.2.1 Overview of Supply Chain Management 252
7.2.2 Construction of Supply Chain Management 253
7.2.3 Cooperation Management of Supply Chain 255
7.3 Logistics Management of Network Enterprise 257
7.3.1 Logistics Management Overview 257
7.3.2 Environmental Logistics 262
7.3.3 The Third Party Logistics 267
7.4 Human Resources Management of Network Enterprise 272
7.4.1 Overview of Human Resources Management 272
7.4.2 Realization of Human Resources Management 275
1. Integrality and integration 276
2. Easy to use 276
3. Network function and self-service 276
4. Open 277
5. Flexibility 277
6. Intelligentization 277
7. Powerful report forms/graph output function 277
8. System security 277
7.5 Summary 279
References 279
Part 4 Practice 281
8 E-commerce Architecture and System Design 282
8.1 E-commerce Architecture 283
8.1.1 Infrastructure 283
8.1.2 Data Flow of Infrastructure 284
8.1.3 Process Control of Infrastructure 286
1. A sends a business request to C 286
2. C accepts A’s Request, and prepares to start agent to search the appropriate entity B 287
3. C sends a response to A, and starts an agent to search the appropriate entity B at the same time 288
4. Start payment process 289
8.1.4 Optimizing Method of Infrastructure 290
1. Reachability 290
2. Boundedness 291
3. Conservativeness 291
4. Activity 292
5. Resumption 292
6. Common optimizing models 292
8.1.5 Event Process Control of Infrastructure 293
1. Sequential relation 293
2. Conflict relation 293
3. Collision relation 293
4. Concurrent relation 294
8.2 E-commerce Security System 295
1. OSI security architecture 295
2. E-commerce security factor 296
8.3 E-commerce Payment System 299
8.3.1 E-commerce and Online Payment 299
8.3.2 Data Flow and Process Control of Payment System 300
1. Cardholder register and apply 300
2. Purchase request 301
3. Handling of the request information by the seller 303
4. Receiving the purchase response by the cardholder 303
5. Getting Payment 304
8.4 Architecture and Design Method of E-commerce Application System Software 305
8.4.1 Architecture of E-commerce Application System Software 305
1. Basic system model 306
2. Software architecture 307
8.4.2 Design Method of Application E-commerce System 309
1. Client 310
2. Web application server 311
3. Infrastructure service 312
8.5 Summary 312
References 312
9 Portal Site Design of Virtual Enterprise 315
9.1 E-commerce and Portal Site 316
9.1.1 Concept of Portal Site 316
9.1.2 Meaning of Portal Site 316
1. Upgrade enterprises’ image 316
2. Make enterprises acquire network-communicating capability 316
3. Can introduce corporation and its products in detail 316
4. Can tie up with customers 316
5. Can build business relation with potential customers 317
6. Can reduce communication cost 317
7. Can receive customers feedback in time 317
8. Can make corporation serve customers better 317
9.2 Online Virtual Shop 317
9.2.1 Virtual Shop Mode 317
9.2.2 Virtual Shop Design 318
9.2.3 Implementation of Virtual Shop 319
9.3 Design Method of Product Catalog 320
9.3.1 Product Information Storage 320
1. Organization of information 320
2. Information grouping 320
3. Structure of product information database 321
4. Relation among tables 321
9.3.2 Product Information Inquiry Function 322
1. Design principle 322
2. Inquiry Example 322
9.4 Design of Online Shopping Cart 323
9.4.1 Online Shopping Cart and Implementation Technology 323
1. Definitions and analysis of online shopping cart 323
2. Implementation technology of online shopping cart 323
9.4.2 Database of Online Shopping Cart and Actual Implementation Policy 324
1. Design ideology of online shopping cart based on database technology 324
2. Implementation of online shopping cart based on database technology 325
9.5 Processing of Electronic Order 327
9.5.1 Processing Flow of Order 327
1. Order data input 328
2. Checking out and confirmation of order data 328
3. Storage distribution 328
4. Order form data processing output 330
9.5.2 Gathering the Payment Online 330
1. Payment gateway technology 330
2. Validation of credit card 332
9.6 Search and Inquiry of Website 332
9.6.1 Application of Advanced SQL 332
1. Grouping result function 332
2. Embedded inquiry 334
3. Defined variables in SQL*Plus 334
9.6.2 Optimizing Database Inquiry 335
1. Classification of optimization 335
2. Optimization skill 336
9.7 Customer Service in E-commerce Time 337
9.7.1 Component Technology and Build Method of Call Center 337
1. Key technology of call center 337
2. Construction solution to call center 338
9.7.2 Application of Electronic Mail List 339
1. Effect of electronic mail list on enterprise 339
2. Website 340
3. Stock information 340
4. News release 340
5. Organizations and club 340
6. Mail order service 340
9.8 Release Technology of Web Database 341
9.9 Summary 344
References 344
10 Computer System Integration and E-commerce 347
10.1 Overview of System Integration 348
10.1.1 Production and Development of System Integration 348
10.1.2 Principle of System Integration 350
10.2 Hardware System Integration of E-commerce 351
10.2.1 Integration of Server 351
1. Method of server integration 351
2. Integration of server 353
3. Integration of high performance server 355
10.2.2 Integration of Communication Network 357
1. Integration of LAN 357
2. WAN integration 359
3. Integration of high speed network 360
10.3 Integration of E-commerce Application System Software 363
10.3.1 Integration Mode of E-commerce Application System Software 363
1. Synchronous replication 363
2. Asynchronous replication 364
3. Brokering Application 366
4. Application-to-application B2B 367
10.3.2 Integration of Protocols 371
1. Security protocol of Internet 371
2. Main secure protocol of Internet—SSL security protocol 372
3. The second main security protocol of Internet—SET security protocol 373
4. Secure Hyper Text Transmission Protocol (SHTTP) 373
5. Secure Transaction Technology (STT) 374
6. UN/EDIFACT standard 374
10.3.3 Application System Software Environment Integration 375
1. Integration based on C/S 375
2. Integration based on B/S 376
3. Integration based on distributed three-layer model 379
10.4 Summary 381
References 381
Part 5 E-commerce Application 384
11 E-commerce and International Trade 385
11.1 E-commerce and International Trade 386
11.1.1 The International Trade Calls for the Emergence of E-commerce 386
11.1.2 E-commerce Promotes the Development of the International Trade 390
11.1.3 E-commerce Brings about Changes to the International Trade 392
11.2 Applying E-commerce to International Trade 393
11.2.1 Using E-commerce Technology to Obtain Commercial Information 394
11.2.2 Using E-commerce in the Business Negotiation 395
1. Applications in preparing goods 395
2. Applications in inspection 395
3. Applications in the delivery 396
4. Applications in the covering insurance and customs declaration 396
5. Applications in obtaining export licenses 396
6. Applications in export rebates 396
7. Applications in export paperwork 396
11.2.3 Application in the Technology and Service Trade 397
1. Applications in the international technology trade 397
2. Application in the international service trade 397
3. Applications in international financial trade 398
4. Applications in international tourism 399
11.3 E-commerce and International Trade Network Marketing 399
11.3.1 The Foundation of Internet Marketing 400
11.3.2 Network Marketing Tool 401
1. E-mail 401
2. Search engine 402
3. Log File 403
4. Mail List 404
11.3.3 Network Marketing Technology 406
1. The stage of understanding Internet 406
2. Network marketing stage 407
11.4 Designing an International Trade E-commerce System 409
11.4.1 The International Trade Business Analysis 409
11.4.2 Frame of international Trade E-commerce System 412
11.4.3 International Trade E-commerce System Design 414
11.4.4 EDI-based International Trade E-commerce System 415
11.5 Summary 417
References 418
12 Network Application Psychology 419
12.1 Introduction to Network Application Psychology 420
1. Comment of philosophy on psychology 420
2. Localization of application psychology 421
12.1.1 Appearance of Network Application Psychology 423
12.1.2 Research Content of Network Application psychology 424
1. Network society and psychology 424
2. Network and psychology 425
3. Construction of network application psychology 426
12.1.3 Significance of Network Application psychology 426
1. Attention should be paid to the importance of network application psychology 426
2. Significance of network application psychology research 427
12.2 Network Interaction Psychology 430
12.2.1 Network Interaction 430
1. Content of network interaction 430
2. Form of network interaction 430
3. Characteristics of network interaction 432
4. Form of network interaction in realistic society 433
12.2.2 The Appearance and Analysis of Network Interaction Psychology 437
1. The need of acquiring information, help and study 437
2. The need of Emotional Interaction and mental communication 440
12.2.3 The Effect of Network Interaction Psychology 442
1. The network interaction speeds up the development of the network 442
2. Fun with the network interaction 443
3. Network interaction—coexistence of happiness and unhappiness 444
4. New campus fashion: online moral education 445
12.3 Network Application Psychology 447
12.3.1 Psychology Characteristic of Network Application 447
1. Psychology problem in network 447
12.3.2 Analysis on Psychology Characteristic of Network Application 450
1. Concepts of Internet addiction 451
2. Measurement tools of Internet addiction 452
3. The advantages and disadvantages of investigative methods of Internet addiction 453
4. Academic model of Internet addiction 454
12.4 Network Management Psychology 456
12.4.1 General Psychology of Network Management 456
1. General psychology of online game management 456
2. Trend of human-computer interaction 456
3. The psychological momentum of the human-human interaction pattern 457
4. The demand psychology of network information service user 459
5. The defense psychology of the network information services users 461
12.4.2 Behavior Psychology of Network Management 461
1. Online discussion 461
2. Synchronous space psychology 463
12.5 Summary 463
References 464
13 E-commerce Case Analysis 468
13.1 Methods of E-commerce Analysis 469
13.1.1 Methods of the Evaluation and Analysis of E-commerce Websites 469
13.1.2 Method of E-commerce Case analysis 477
1. PEST analysis (general environment analysis) 477
2. Competition factor analysis 477
3. BCG Matrix and Value Chain Analysis 478
4. SWOT Analysis 478
5. Three ways to analyze competitiveness 479
6. Model analysis of five forces 480
13.2 Case Study 481
13.2.1 Case Study of China's Agricultural Products E-commerce 481
13.2.2 Case Analysis of E-commerce Supply Chain Management 485
Present situation of supply chain management in Shanghai bell corporation 487
13.2.3 Case Analysis of E-commerce in Commodities Circulation Areas 491
1. Individual (consumers) 491
2. Enterprise (Group) 492
3. Case of online shopping 501
13.2.4 Case Study of E-commerce in the Financial Industry 503
13.2.5 Case Analysis of E-commerce in Petrochemical Industry 519
13.3 Summary 525
References 525

Erscheint lt. Verlag 30.6.2010
Zusatzinfo 180 p. 40 illus.
Verlagsort Berlin
Sprache englisch
Themenwelt Mathematik / Informatik Informatik
Wirtschaft Allgemeines / Lexika
Wirtschaft Betriebswirtschaft / Management Logistik / Produktion
Wirtschaft Betriebswirtschaft / Management Wirtschaftsinformatik
Schlagworte E-Commerce • Information Technology • Information Technology (IT) • Internet • IT • TUP • virtual enterprise • Web
ISBN-10 3-540-49645-9 / 3540496459
ISBN-13 978-3-540-49645-8 / 9783540496458
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 5,4 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Grundlagen – Use-Cases – unternehmenseigene KI-Journey

von Ralf T. Kreutzer

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
CHF 41,95