INSY 3330: Ch. 5-6
In the United States, the primary form of online payment is:
credit cards
Which of the following online advertising formats attracted the least amount of spending in 2013?
Credit cards are the dominant form of online payment throughout the world.
false
In the United States today, single, white, young college-educated males with high income dominate the Internet in terms of percentage of Internet usage.
false
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
nonrepudiation
Hits are a measure of the:
number of http requests
Purchasing an online ad on a CPA basis means that the advertiser:
pays only for those users who perform a specific action, such as registering, purchasing, etc.
What is the most frequent cause of stolen credit cards and card information today?
the hacking and looting of corporate servers storing credit card information
A typical response rate for an e-mail campaign would be ________ %.
5
For a Web site that has 5 million visitors a month, and where on average, a visitor makes 10 page requests per visit, there will be ________ entries in the transaction log each month.
50 million
________ refers to the ability to ensure that an e-commerce site continues to function as intended.
Availibility
Botnets are typically used for all of the following except:
phishing attacks
The research firm Cybersource estimated that online credit card fraud in the United States amounted to about ________ in 2012.
3.5 billion
View-through rate measures the ________ response rate to an ad.
30-day
The Data Encryption Standard uses a(n) ________-bit key.
56
"Shoppers" constitute approximately ________ % of the online Internet audience.
90
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.
CRM system
Which of the following countries has been found to have engaged in cyberespionage against Google?
China
Which of the following is not a feature that is driving the growth of social marketing and advertising?
affiliate programs
Which of the following dimensions of e-commerce security is not provided for by encryption?
availibility
Which of the following is not one of the main stages of the online purchasing process?
browsing
Which of the following is the most important tool in establishing a relationship with the customer?
company Web site
The six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:
confidentiality
All of the following are limitations of the existing online credit card payment system except:
cost to consumers
The marketing technique known as ________ involves merchants offering products or services for a very low price for a short period of time.
flash marketing
Which of the following is the top concern of Internet users about purchasing online?
lack of trust in the purchase process
The overall rate of online credit card fraud is ________ % of all online card transactions.
less than 1%
Which of the following is not one of the main elements of a comprehensive multi-channel marketing plan?
local marketing
None of the following payment systems offers immediate monetary value except:
stored value/debit card
A digital certificate contains all of the following except the:
subject's private key
All of the following statements about cookies are true except:
the data typically stored in cookies includes a unique ID and e-mail address.
Drive-by downloads are now the most common method of infecting computers.
true
Evidence suggests that real-time customer chat increases sales.
true
In order to accept payments by credit card, online merchants typically must have a merchant account established with a bank or financial institution.
true
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
true
Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?
two-factor authentication
Which of the following features of e-commerce technology has reduced the cost of delivering marketing messages and receiving feedback from users?
universal standards
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
Authenticity
Which of the following would you implement to collect and analyze your company's big data?
Hadoop
An intrusion detection system can perform all of the following functions except:
blocking suspicious activity
Rustock is an example of which of the following?
botnet
The Nike iD program is an example of which of the following marketing techniques?
customer co-production
Research has found that of all the standard formats of display ads, wide skyscraper ads are the most effective at holding a user's attention.
false
Approximately ________ of annual offline retail sales is influenced by online browsing.
one-third
All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except:
targeted banner ads
Creating multiple variations of information goods and selling these to different market segments at different prices is called:
versioning
Search engine advertising and marketing expenditures in 2013 were approximately:
19.5 billion
Most of the world's spam is delivered via which of the following?
Botnets
Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?
NFC