Home E-Business : MBA 114

E-Business : MBA 114

Lecture No.DescriptionLecture By
Lecture 1 Introduction to E-Business: Election Business, Electronic Commerce, Type of Electronic CommerceLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 2 Electronic Commerce ModelsLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 3 Types of Electronic CommerceLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 4 Practical Implementation of Electronic CommerceLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 5 Benefits, Limitations & Barriers of E-CommerceLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 6 Web Based Tools for Electronic CommerceLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 7 Value Chains in Electronic CommerceLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 8 Practical Case study of Value ChainLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 9 E-commerce in IndiaLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 10 Internet ArchitecturesLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 11 Internet ApplicationLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 12 Concept of Intranet, Composition of IntranetLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 13 Basic Application on IntranetLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 14 Extranet ,Electronic Data InterchangeLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 15 Component of Electronic Data InterchangeLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 16 Electronic Data Interchange Communication ProcessLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 17 Security Issues in E-business: Security OverviewLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 18 Electronic Commerce ThreatsLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 19 Encryption, CryptographyLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 20 Public Key Cryptography-1Lecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 21 Public Key Cryptography-2Lecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 22 Digital SignaturesLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 23 Digital CertificatesLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 24 Securing E-Commerce NetworksLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 25 Security Protocols Such as HTTPLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 26 SSLLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 27 Security Protocol Such as Firewalls, Personal FirewallsLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 28 IDS, VPNs, Public Key Infrastructure(PKI for Security)Lecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 29 Concept of e-MoneyLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 30 Electronic payment System, Types of Electronic Payment SystemsLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 31 Credit & Debit Cards, Charge cards, Smart Cards, Rupay Cards, E-walletsLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 32 Infrastructure Issues in EPSLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 33 Electronic Fund TransferLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 34 Applications & Strategies Business ModelsLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 35 Revenue Models Over IntranetLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 36 Emerging Trends in e-BusinessLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 37 Digital CommerceLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 38 Mobile Commerce: ConceptsLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 39 Mobile Commerce: Benefits & ModelsLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 40 Emerging Trends in Mobile AppsLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 41 How New Business can take advantage of e-BusinessLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 42 Strategies for E-commerceLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 43 Internet Based Business ModelsLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 44 Legal Issues of E-commerceLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
Lecture 45 Ethical Issues of E-commerceLecture by A,    Lecture by B,    Lecture by C,    Lecture by D
[whatsapp]