IS
cybercrime white collar crime robbery
"According to last year`s statistics, rank the following in terms of dollar value by the type of crime, from highest to lowest"
Order fulfillment
"According to the book, ___________ is one of the most significant issues e-tailers face that can restrict their growth."
"keyloggers, screen scrapping"
"Companies attempt to Stop _____ by requiring users to accurately select characters from a series of boxes or pictures, attackers respond by using _____ software to attempt to read the pictures."
Forward
"In ____________ auctions, sellers solicit bids from many potential buyers."
"whitelisting, blacklisting"
"In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved."
Mitigation
"In risk _____, the organization takes concrete actions against risks."
"smaller, faster, cheaper computers and storage devices"
"USB keys can store terabytes of data. Of the five key factors that contribute to the increasing vulnerability of organizational information resources, this is an issue related to __________."
Wikis
"You just started to work on a project with three other people. You realize that everyone has their own notes, which makes it hard for you to keep track of what has been done and what still needs to be done. Which of the following applications would you suggest the team use?"
e-business
"________ is a broad term that refers to the buying and selling of goods and services over the Internet, as well as servicing customers and collaborating with partners."
pop-under ad
A _____ is automatically launched by some trigger and appears behind the active window.
Worm
A _______ is a segment of computer code that spreads by itself and performs malicious actions without requiring another computer program.
Copyright
A __________ is a statutory grant that provides the creators or owners of IP with ownership of the property for a designated period.
All of the choices are correct
Conversational marketing can take place in which of the following forums?
business-to-consumer
Difficulties in order fulfillment are most closely associated with which type of electronic commerce?
All of these
Whether a company practices pure or partial e-commerce depends on the degree of digitization of their ..
A small minority of individuals contribute the majority of feedback and can provide skewed data
Which of the following is a true statement about the impact of social computing on a business?
Purchasing cards
You decide to start a landscaping business called To-Mow-er. Some of your residential clients would also like to pay their bills online. Which of the following methods will NOT be appropriate for this consumer to business company?
You will get updates in the content without having to visit the site.
You sign up for an RSS feed from CNN.com. Which of the following would you expect to happen?
Disintermediation
______ is when the middleman is removed from a process, such as when customers no longer have to go through a travel agent to purchase a plane ticket:
Lack of agreed upon Security Standards
___________ is a main drawback to e-commerce.
native
____________ advertising is a sales pitch that fits into the flow of the information being shown.
taggings
____________ are/is the basis of folksonomies.
viral
_____________ marketing is also called word-of-mouth advertising.
Data aggregators are companies that collect public data and nonpublic data and integrate them to produce ______________.
digital dossiers