Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
158 Cards in this Set
- Front
- Back
Acceptance
|
An expression of willingness to take an offer, including all of its stated terms
|
|
Authority to bind
|
The ability of an individual to commit his or her company to a contract
|
|
Consideration
|
The bargained for exchange of something valuable, such as money, property, or future services
|
|
Contract
|
An agreement between two or more legal entities that provides for an exchange of value between or among them
|
|
Copy control
|
An electronic mechanism for providing a fixed upper limit to the number of copies that one can make of a digital work
|
|
Copyright
|
A legal protection of intellectual property
|
|
Cybersquatting
|
the practice of registering a domain name that is a trademark of another person or company in hopes that the trademark owner will pay large amounts for the domain rights
|
|
Defamation
|
statement that is false and injures the reputation of a person or company
|
|
Disparagement
|
Statement that is false and injures the reputation of a product or service
|
|
Fair use
|
The approved limited use of copyright material when certain conditions are met
|
|
Implied contract
|
An agreement between two or more parties to act as if a contract exists, even if no contract has been written and signed.
|
|
Income tax
|
Taxes that are levied by national, state, and local governments on the net income generated by business activities
|
|
Intellectual property
|
A general term that includes all products of the human mind, including tangible and intangible products
|
|
Jurisdiction
|
A government’s ability to exert control over a person or corporation
|
|
Patent
|
An exlusive right to make, use, and sell aninvention granted by the government to the inventor
|
|
Opt-in/out
|
personal information collection polict in which the company collecting the information does not use the information for any other purpose unless the customer specifically allows
|
|
Service mark
|
A distinctive mark, device, motto, or implement used to identify serices provided by a company
|
|
Terms of service
|
Rules and regulations intended to limit the Web site owner’s liability for what a visitor might do with information obtained from the site
|
|
Transaction tax
|
Sales taxes, use taxes, excise taxes and customs duties that are levied on the products or services that a company sells or uses
|
|
Use tax
|
tax levied by a state on property in that state that was not purchased in that state
|
|
Active Server pages (ASP)
|
Applications that are embedded transparently in web pages that cause action to occur
|
|
Benchmarking
|
Testing that compares hardware and software performances
|
|
Black list spam filter
|
Software that looks for From addresses in incoming messages that are known to be spammers.
|
|
Blade server
|
A server configuration in which small server computers are each installed on a single computer board and then many of those board are installed into a rack-mounted frame
|
|
Centralized architecture
|
A server structure that uses a few very large and fast computers
|
|
Challenge-response
|
A content-filtering security technique that requires a known sender to reply to a challenge presented in an email
|
|
Database server
|
The server computer on which database management software runs
|
|
Dead link
|
web link that when clicked displays an error message instead of a web page
|
|
Decentralized architecture
|
A server structure that uses a large number of less-powerful computers and divides the workload among them
|
|
Distributed architecture
|
Synonymous with decentralized architecture
|
|
Dynamic content
|
No static information constructed in response to a web client’s request
|
|
Java Server Pages
|
A server side scripting program developed by Sun Microsystems
|
|
Link checker
|
A site management tool that examines each page on the site and reports any URLs that are broken
|
|
Load balancing
|
network hardware that monitors the workloads of servers attached to it assigns incoming web traffic to the server that has the most available capacity at that instant in time
|
|
Log file
|
A collection of data that shows information about web site visitors’ access habits
|
|
N-tier architecture
|
Higher-order client-server architectures that have more than three tiers
|
|
Open-source
|
Software that is developed by a community of programmers who make the software available for download and use at no cost
|
|
Orphan file
|
file on a web site that is not linked to any page
|
|
PHP
|
PreProcessing Hypertext Protocol
|
|
Ping
|
a program that tests the connectivity between computers connected to the Internet
|
|
Remote server administration
|
Control of a Web site by an administrator from any internet-connected computer
|
|
Response time
|
the amount of time a server requires to process one request
|
|
Reverse link checker
|
web site management program that checks on sites with which a company has entered a link exchange program to ensure partners are fulfilling the agreement
|
|
Server farm
|
large collection of e-commerce web site servers
|
|
Spam
|
Electronic junk mail
|
|
Static page
|
a web page that displays unchanging information retrieved from a disk
|
|
Telnet
|
A program that allows users to log on to a computer and access its contents from a remote location
|
|
Throughput
|
the number of HTTP requests that a particular hardware and software combination can process in a unit of time
|
|
Tracert
|
route-tracing program that sends data packets to every computer on the path between one computer and another computer and clocks the packets’ roundtrip times, providing an indication of the time it takes a message to travel from one computer to another and back, pinpointing any data traffic congestion, and ensuring that the remote computer is online
|
|
Virtual host
|
Multiple servers that exist on a single computer
|
|
White list spam filter
|
Software that looks for From addresses in incoming messages that are known to be good addresses
|
|
Application integration
|
The coordination of all of a company’s existing systems to each other and to the company’s Web site
|
|
Application Service Providers (ASP)
|
Web-based site that provides management of applications such as spreadsheets, human resources management, or email to companies for a fee
|
|
Business logic
|
Rules of a particular business
|
|
Co-location
|
An internet service arrangement in which the service providers rents a physical space to the client to install its own server hardware
|
|
Commerce Service Providers (CSP)
|
Web host service that also provides commerce hosting services on its computer
|
|
Content management software/system
|
Software used by companies to control the large amounts of text, graphics, and media files used in business
|
|
Customer Relationship Management (CRM)
|
Synonymous with technology-enabled relationship management, it is the obtaining and use of detailed customer information
|
|
Data mining
|
A technique that examines stored information and looks for patterns in the data that are not yet known or suspected. Also called analytical processing.
|
|
Dedicated hosting
|
web hosting option in which the hosting company provides exclusive use of a specified server computer that is owned and administered by the hosting company
|
|
Dynamic catalog
|
A web page whose content is shaped by a program in response to a user
|
|
Enterprise Application Integration (EAI)
|
the coordination of all of a company’s existing systems to each other and to the company’s Web site
|
|
Enterprise Resource Planning (ERP)
|
Business software that integrates all facets of a business, including planning, manufacturing, sales and marketing
|
|
Interoperability
|
The coordination of a company’s information systems so that they all work together
|
|
Knowledge Management
|
The intentional collection, classification, and dissemination of information about a company, its products, and its processes
|
|
Middleware
|
Software that handles connections between electronic commerce software and accounting systems
|
|
Scalable
|
A system’s ability to be adapted to meet changing requirements
|
|
Self-hosting
|
A system of Web hosting in which the online business owns and maintains the server and all its software
|
|
Shared hosting
|
A web hosting arrangement in which the hosting company provides Web space on a server computer that also hosts other Web sites
|
|
Simple Object Access Protocol (SOAP)
|
A standardized protocol used by a mail server to format and administer e-mail
|
|
Static catalog
|
A simple list of products written in HTML and displayed on a Web page or a series of web pages
|
|
Supply Chain Management (SCM) software
|
Software used by companies to coordinate planning and operations and their partners in the industry supply chains of which they are members
|
|
Transaction processing
|
Processes that occur as part of completing a sale; these include the calculation of discounts, taxes, or shipping costs and transmission of payment data
|
|
Web services
|
A combination of software tools that let application software in one organization communicate with other applications over a network using the SOAP, UDDI, and WSDL protocol
|
|
Active content
|
Programs that are embedded transparently in Web pages that causes action to occur
|
|
ActiveX
|
An object, or control, that contains programs and properties that are put in Web pages to perform particular
|
|
Applet
|
A program that executes within another program; it cannot execute directly on a computer
|
|
Certification Authority (CA)
|
A company that issues digital certificates to organizations or individuals
|
|
Computer forensics
|
The field responsible for the collection, preservation, and analysis of computer-related evidence to be used in legal proceedings
|
|
Countermeasure
|
A physical or logical procedure that recognizes, reduces, or eliminates a threat
|
|
Cryptography
|
The science that studies encryption, which is the hiding of messages so that only the sender and receivers can read them
|
|
Cybervandalism
|
The electronic defacing of an existing web page
|
|
Decrypt
|
Information that has been decoded; the opposite of encrypted
|
|
Digital certificate (digital ID)
|
An attachment to an email message or data embedded in a web page that verifies the identity of a sender or a Web site
|
|
Digital Signature
|
An encryption message digest
|
|
Domain Name Server
|
A computer on the Internet that maintains directories that link domain names to IP addresses
|
|
Eavesdropper
|
A person or device who is able to listen in on and copy Internet transmissions
|
|
Encryption
|
The coding of information using a mathematical-based program and secret key; it makes messages illegible to casual observers or those without the decoding key
|
|
Firewall
|
computer that provides defense between one network ant another network that could pose a threat to the inside network, all traffic must go through the firewall, only authorized traffic is allowed to pass. Also describes software
|
|
First-party cookies
|
a cookie that is placed on the client computer by the web server site
|
|
Hash
|
the process used to calculate a number from a message
|
|
Integrity
|
The category of computer security that addresses the validity of data; confirmation that data has not been modified
|
|
Intrusion detection system
|
A part of a firewall that monitors attempts to log in to servers and analyzes those attempts for patterns that might indicate a cracker’s attack is underway
|
|
Java sandbox
|
a web browser security feature that limits the actions that can be performed by a java applet that has been downloaded from the web
|
|
JavaScript
|
scripting language developed by Netscape to enable Web page designers to build active content
|
|
Masquerading (spoofing)
|
Pretending to be someone you are not or representing a web site as an original when it is an imposter
|
|
Persistent cookie
|
A cookie that exists indefinitely
|
|
Phishing
|
masquerading attack that combines spam with spoofing.
|
|
Plug-ins
|
application that helps a browser to display information
|
|
Pretty Good Privacy (PGP)
|
A popular technology used to implement public key encryption to protect the privacy of e-mail messages
|
|
Private key
|
encoding of a message using a single numeric key to encode and decode data, it requires both the sender and receiver of the message to know the key, which must be guarded from public disclosure
|
|
Public key
|
The encoding of messages using two mathematically related but distinct numeric keys
|
|
Scripting language
|
programming language that provides scripts, or commands that are executed
|
|
Secure Sockets Layer (SSL)
|
A protocol for transmitting private information securely over the internet
|
|
Security policy
|
a written statement describing assets to be protected, the reasons for protecting the assets, the parties responsible for protection, and acceptable and unacceptable behaviors
|
|
Session cookie
|
a cookie that exists only until you shut down your browser
|
|
Sniffer program
|
a program that taps into the Internet and records information that passes through a router from the data’s source to its destination
|
|
Stateless connection
|
A connection between a client and server over the internet in which each transmission of information is independent; no continuous connection is maintained
|
|
Third-party cookies
|
a cookie that originates on a web site other than the site being visited
|
|
Trusted/untrusted network
|
network within a firewall/network outside a firewall
|
|
Warchalking
|
Practice of placing a chalk mark on a building that has an easily entered wireless network
|
|
Wardrivers
|
network attackers who drive around in cars using their wireless-equipped laptop computers to search for unprotected wireless network access points
|
|
Zombie
|
Program that secretly takes over another computer for the purpose of launching attacks on other computers. Zombie attacks can be difficult to trace to their perpetrators.
|
|
Automated Clearing House (ACH)
|
One of the several systems set up by banks or government agencies, such as the US Federal Reserve Board, that process high volumes of low dollar amount electronic fund transfers
|
|
Charge card
|
A payment card with no preset spending limit. The entire amount charged to the card must be paid in full each month
|
|
Chargeback
|
The process in which a merchant bank retrieves the money it placed in a merchant account as a result of a cardholder successfully contesting a charge
|
|
Check 21
|
US law that permits banks to replace the physical movement of checks with transmission of scanned images
|
|
Client-side electronic wallet
|
An electronic wallet that stores a consumers’ information on the consumer’s own computer
|
|
Closed loop system
|
payment card arrangement involving a consumer, a merchant, and a payment card company (such as AmEx or Discover) that processes transactions between the consumer and merchant without involving banks
|
|
Credit card & association
|
member-run organizations that issue credit cards to individual consumers, also called customer issuing banks
|
|
Debit card
|
payment card that removes the amount of the charge form the cardholder’s bank account and transfers it to the seller’s bank account
|
|
Double spending
|
The spending of the same unit of electronic cash twice by submitting the same electronic currency to two different vendors
|
|
Electronic cash
|
A form of electronic payment that is anonymous and can only be spent once
|
|
Electronic wallet (e-wallet)
|
A software utility that holds credit card information, owner identification and address information, and provides this data automatically at electronic commerce sites; electronic wallets can also store electronic cash
|
|
Identity theft
|
A criminal act in which the perpetrator gathers personal information about a victim then uses it to obtain credit in the victim’s name
|
|
Merchant account
|
an account that a merchant must hold with a bank that allows the merchant to process payment card transactions
|
|
Micropayments
|
internet payments for items costing very little-usually $1 or less
|
|
Money laundering
|
a technique used by criminals to convert money that they have obtained illegally into cash that they can spend without having it identified as proceeds of an illegal activity
|
|
Open loop system
|
payment card arrangement involving a customer and his or her bank, a merchant and its bank, and a third party (Visa or MC) that processes transactions between the customer and merchant
|
|
Payment card
|
general term for plastic cards used instead of cash to make purchases
|
|
Pharming attack
|
the use of a zombie farm, often by an organized crime association, to launch a massive phishing attack
|
|
Server-side electronic wallet
|
An electronic wallet that stores a customer’s information on a remote server that belongs to a particular merchant or to the wallet’s publisher
|
|
Smart card
|
plastic card with an embedded microchip that contains information about the card-owner
|
|
Stored-value card
|
either an elaborate smart card or a simple plastic card with a magnetic strip that revords currency balance, such as a prepaid phone, copy, subway, or bus card
|
|
24/7
|
The operation of a site or service 24 hours a day 7 days a week
|
|
Applications specialist
|
The member of an electronic commerce team who is responsible for maintenance of software that performs a specific function, such as catalog, payment processing, accounting, human resources, and logistics software
|
|
Call center
|
A company that customer handles telephone calls and emails for other companies
|
|
Capital investment
|
a major outlay of funds by a company to purchase fixed assets such as property, a factory or equipment
|
|
Capital project
|
synonymous with capital investment
|
|
Change management
|
the process of helping employees cope with changes in the workplace
|
|
Component outsourcing
|
synonymous with partial outsourcing; the outsourcing of the design, development, implementation, or operation of specific portions of an electronic commerce system
|
|
Content creator/editor/manager
|
person who writes purchases and adapts material for a Web site
|
|
Database administration
|
the person or team that is responsible for defining the data elements in an organization’s database design and the operation of its database management software
|
|
Downstream strategies
|
Tactics that improve the value that a business provides to its customers
|
|
Early outsourcing
|
The hiring of an external company to do initial ecommerce site design and development. The external team then trains the original company’s information systems professionals in the new technology, eventually handing over complete responsibility of the site to the internal team
|
|
Fast venturing
|
The joining of an existing company that wants to launch an ecommerce initiative with external equity partners and operational partners who provide experience and skills needed to develop and scale up the project very rapidly
|
|
Incubator
|
A company that offers start-up businesses a physical location with offices accounting and legal assistance, computers, and Internet connections at a very low monthly cost
|
|
Late outsourcing
|
the hiring of an external company to maintain an ecommerce site that has been designed and developed by an internal information systems team
|
|
Metrics
|
Measurements that companies use to assess the value of site visitor activity
|
|
Network operations
|
staff whose responsibilities include load estimation and monitoring, resolving network problems as they arise, designing and implementing fault-resistance technologies, and managing any network operations that are outsourced to ISPs, CSPs, or telephone companies
|
|
Opportunity costs
|
lost benefits from an action not taken
|
|
Outsourcing
|
The hiring of another company to perform design, implementation, or operational tasks for an information systems project
|
|
Partial outsourcing
|
the outsourcing of the design, development, implementation, or operation of specific portions of an ecommerce system
|
|
Post-audit review
|
A formal review of a project after it is up and running
|
|
Project management
|
formal techniques for planning and controlling activities undertaken to achieve a specific goal
|
|
Return on Investment (ROI)
|
method for evaluating the potential costs and benefits of a proposed capital investment
|
|
Total Cost of Ownership (TCO)
|
Business activity costs including the costs of hiring training, and paying the personnel who will design the web site, write or customize the software, create the content and operate and maintain the site. TCO also includes hardware and software costs
|
|
Upstream strategies
|
Tactics that focus on reducing costs or generating value by working with suppliers or inbound logistics
|