Module Name | Download |
---|---|
noc19_mg54_assignment_Week_1 | noc19_mg54_assignment_Week_1 |
noc19_mg54_assignment_Week_10 | noc19_mg54_assignment_Week_10 |
noc19_mg54_assignment_Week_11 | noc19_mg54_assignment_Week_11 |
noc19_mg54_assignment_Week_12 | noc19_mg54_assignment_Week_12 |
noc19_mg54_assignment_Week_2 | noc19_mg54_assignment_Week_2 |
noc19_mg54_assignment_Week_3 | noc19_mg54_assignment_Week_3 |
noc19_mg54_assignment_Week_4 | noc19_mg54_assignment_Week_4 |
noc19_mg54_assignment_Week_5 | noc19_mg54_assignment_Week_5 |
noc19_mg54_assignment_Week_6 | noc19_mg54_assignment_Week_6 |
noc19_mg54_assignment_Week_7 | noc19_mg54_assignment_Week_7 |
noc19_mg54_assignment_Week_8 | noc19_mg54_assignment_Week_8 |
noc19_mg54_assignment_Week_9 | noc19_mg54_assignment_Week_9 |
Sl.No | Chapter Name | MP4 Download |
---|---|---|
1 | Lecture 1 : Introduction | Download |
2 | Lecture 2 : Types of e-business transactions | Download |
3 | Lecture 3 : Business Models on the web | Download |
4 | Lecture 4 : Business Models on the web (cont.) | Download |
5 | Lecture 5 : Innovative E-Business models for Bricks and Mortar firms | Download |
6 | Lecture 6 : Inter and Intra Organizational Business Processes | Download |
7 | Lecture 7 : Information system foundations | Download |
8 | Lecture 8 : Types of business information system | Download |
9 | Lecture 9 : Decision support for the management | Download |
10 | Lecture 10 : Enterprise Resource planning | Download |
11 | Lecture 11 : Connecting with stakeholders | Download |
12 | Lecture 12 : E-procurement -Reengineering the traditional procurement process | Download |
13 | Lecture 13 : E-procurement -New paradigms in the procurement process | Download |
14 | Lecture 14 : E-procurement –e-procurement Implementation issues and risks | Download |
15 | Lecture 15 : Customer relationship management | Download |
16 | Lecture 16 : E-Marketing | Download |
17 | Lecture 17 : E-Marketing (Cont.) | Download |
18 | Lecture 18 : Supply Chain Management – I -The Information flow | Download |
19 | Lecture 19 : Supply Chain Management – II -integration | Download |
20 | Lecture 20 : Supply Chain Management – III - interoperability | Download |
21 | Lecture 21 : Supply Chain Management – IV -logistics and distribution | Download |
22 | Lecture 22 : Supply Chain Management – V -E-Commerce supply chain | Download |
23 | Lecture 23: Components of E-Business Infrastructure | Download |
24 | Lecture 24: Internet and the Web | Download |
25 | Lecture 25: Networking resources | Download |
26 | Lecture 26: Hardware and software resources | Download |
27 | Lecture 27: Data resources | Download |
28 | Lecture 28 : Security categories | Download |
29 | Lecture 29 : Security terminologies | Download |
30 | Lecture 30 : Digital signature | Download |
31 | Lecture 31 : Protocols for security: TLS | Download |
32 | Lecture 32 : Impact of security protocol on server performance | Download |
33 | Lecture 33 : Digital Payment systems | Download |
34 | Lecture 34 : Interoperability of information system | Download |
35 | Lecture 35 : Electronic data interchange (EDI) | Download |
36 | Lecture 36 : Fundamentals of web services | Download |
37 | Lecture 37 : Fundamentals of cloud based systems | Download |
38 | Lecture 38 : Automatic data capture using RFID | Download |
39 | Lecture 39 : Automatic data capture using RFID and its applications | Download |
40 | Lecture 40 : Automatic data capture using RFID and its applications (Cont.) | Download |
41 | Lecture 41 : GPS and GIS in supply chain | Download |
42 | Lecture 42 : "Sensors and IOT: Traceability Across the supply chain " | Download |
43 | Lecture 43 : Business Analytics and Big data | Download |
44 | Lecture 44: Decision support Concepts | Download |
45 | Lecture 45: Understanding the web log | Download |
46 | Lecture 46: Understanding the web log-II | Download |
47 | Lecture 47: Using the Web log: Web usage mining | Download |
48 | Lecture 48: User behaviour modelling from web log | Download |
49 | Lecture 49: User behaviour modelling from web log (Cont.) | Download |
50 | Lecture 50: E-Business Capacity Planning | Download |
51 | Lecture 51: E-Business Capacity Planning (Cont.) | Download |
52 | Lecture 52: Introduction to Recommender System | Download |
53 | Lecture 53: Content Based Recommender System | Download |
54 | Lecture 54: Collaborative Filtering Based Recommender System | Download |
55 | Lecture 55: Association and Demographics Based Recommended System | Download |
56 | Lecture 56: Dynamic Pricing | Download |
57 | Lecture 57: Introduction to Auction | Download |
58 | Lecture 58 : Economic Considerations in Auction | Download |
59 | Lecture 59 : Winner Determination Problem | Download |
60 | Lecture 60 : Online auction issues | Download |
Sl.No | Chapter Name | English |
---|---|---|
1 | Lecture 1 : Introduction | Download To be verified |
2 | Lecture 2 : Types of e-business transactions | Download To be verified |
3 | Lecture 3 : Business Models on the web | Download To be verified |
4 | Lecture 4 : Business Models on the web (cont.) | Download To be verified |
5 | Lecture 5 : Innovative E-Business models for Bricks and Mortar firms | Download To be verified |
6 | Lecture 6 : Inter and Intra Organizational Business Processes | Download To be verified |
7 | Lecture 7 : Information system foundations | Download To be verified |
8 | Lecture 8 : Types of business information system | Download To be verified |
9 | Lecture 9 : Decision support for the management | Download To be verified |
10 | Lecture 10 : Enterprise Resource planning | Download To be verified |
11 | Lecture 11 : Connecting with stakeholders | Download To be verified |
12 | Lecture 12 : E-procurement -Reengineering the traditional procurement process | Download To be verified |
13 | Lecture 13 : E-procurement -New paradigms in the procurement process | Download To be verified |
14 | Lecture 14 : E-procurement –e-procurement Implementation issues and risks | Download To be verified |
15 | Lecture 15 : Customer relationship management | Download To be verified |
16 | Lecture 16 : E-Marketing | Download To be verified |
17 | Lecture 17 : E-Marketing (Cont.) | Download To be verified |
18 | Lecture 18 : Supply Chain Management – I -The Information flow | Download To be verified |
19 | Lecture 19 : Supply Chain Management – II -integration | Download To be verified |
20 | Lecture 20 : Supply Chain Management – III - interoperability | Download To be verified |
21 | Lecture 21 : Supply Chain Management – IV -logistics and distribution | Download To be verified |
22 | Lecture 22 : Supply Chain Management – V -E-Commerce supply chain | Download To be verified |
23 | Lecture 23: Components of E-Business Infrastructure | Download To be verified |
24 | Lecture 24: Internet and the Web | Download To be verified |
25 | Lecture 25: Networking resources | Download To be verified |
26 | Lecture 26: Hardware and software resources | Download To be verified |
27 | Lecture 27: Data resources | Download To be verified |
28 | Lecture 28 : Security categories | Download To be verified |
29 | Lecture 29 : Security terminologies | Download To be verified |
30 | Lecture 30 : Digital signature | Download To be verified |
31 | Lecture 31 : Protocols for security: TLS | Download To be verified |
32 | Lecture 32 : Impact of security protocol on server performance | Download To be verified |
33 | Lecture 33 : Digital Payment systems | Download To be verified |
34 | Lecture 34 : Interoperability of information system | Download To be verified |
35 | Lecture 35 : Electronic data interchange (EDI) | Download To be verified |
36 | Lecture 36 : Fundamentals of web services | Download To be verified |
37 | Lecture 37 : Fundamentals of cloud based systems | Download To be verified |
38 | Lecture 38 : Automatic data capture using RFID | Download To be verified |
39 | Lecture 39 : Automatic data capture using RFID and its applications | Download To be verified |
40 | Lecture 40 : Automatic data capture using RFID and its applications (Cont.) | Download To be verified |
41 | Lecture 41 : GPS and GIS in supply chain | Download To be verified |
42 | Lecture 42 : "Sensors and IOT: Traceability Across the supply chain " | Download To be verified |
43 | Lecture 43 : Business Analytics and Big data | Download To be verified |
44 | Lecture 44: Decision support Concepts | Download To be verified |
45 | Lecture 45: Understanding the web log | Download To be verified |
46 | Lecture 46: Understanding the web log-II | Download To be verified |
47 | Lecture 47: Using the Web log: Web usage mining | Download To be verified |
48 | Lecture 48: User behaviour modelling from web log | Download To be verified |
49 | Lecture 49: User behaviour modelling from web log (Cont.) | Download To be verified |
50 | Lecture 50: E-Business Capacity Planning | Download To be verified |
51 | Lecture 51: E-Business Capacity Planning (Cont.) | Download To be verified |
52 | Lecture 52: Introduction to Recommender System | Download To be verified |
53 | Lecture 53: Content Based Recommender System | Download To be verified |
54 | Lecture 54: Collaborative Filtering Based Recommender System | Download To be verified |
55 | Lecture 55: Association and Demographics Based Recommended System | Download To be verified |
56 | Lecture 56: Dynamic Pricing | Download To be verified |
57 | Lecture 57: Introduction to Auction | Download To be verified |
58 | Lecture 58 : Economic Considerations in Auction | Download To be verified |
59 | Lecture 59 : Winner Determination Problem | Download To be verified |
60 | Lecture 60 : Online auction issues | Download To be verified |
Sl.No | Language | Book link |
---|---|---|
1 | English | Not Available |
2 | Bengali | Not Available |
3 | Gujarati | Not Available |
4 | Hindi | Not Available |
5 | Kannada | Not Available |
6 | Malayalam | Not Available |
7 | Marathi | Not Available |
8 | Tamil | Not Available |
9 | Telugu | Not Available |