CIS 3317 Exam 2 (6-10)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

5 Steps for Social/Local/Mobile Marketing

1. Fan acquisition 2. Engagement 3. Amplification 4. Community 5. Brand Strength (sales)

Email subject lines (15 rules)

1. Read the newspaper 2. There is no sure-fire formula 3. Test,test,test 4. Support the "from" line 5. List key into first 6. Open rates don't always measure subject line success 7. Personalize 8. Urgency drives action 9. Watch those spam filters 10. "Free" is not evil 11. Lead, but don't mislead 12. Write and test early and often 13. Review subject line performance over your last several campaigns or newsletters 14. Continue the conversation 15. Can you pass the must-open/must-read test?

Conversion killers (article)

About how people abandon cart when an extra step in required in paying; some would rather use paypal because of this - Don't use 3D secure logos - Bypass 3D secure for loyal and frequent customers - Offer payment choices, and the ability to switch

CRM (Customer Relationship Management Systems)

Act as customer warehouse; 360 view What they buy, how frequent, how much spent, how frequent they come back CRM allows us to maintain and analyze what is bought in order to better market them to cross sell Categorize most valuable customers where everybody is a VIP or MVP

FTC (article)

Before you buy anything based on review Do an internet search Look for credible opinions from trusted sources Compare reviews from a variety of websites Why , people can be benefiting by doing good reviews and you may not even know!

3 main types of protection

Copyright Patent Trademark law File sharing/ P2P

Versioning

Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices

Spoofing (pharming)

DNS servers compromised, end up at a fake site

Common Security Threats

Denial of service (DoS) attack - Hackers flood site with useless traffic to overwhelm the network or website - Causes normal/paying customers to have "issues Distributed denial of service (DDoS) attack - Same as DoS but well organized

Golden Rule

Do unto others as you would have them do unto you

McAfee "meltdown" spring 2010

Employees - laid off sysadmin & backlash (lazy employees) Bank and cruise employee "insider knowledge" (if you know when this rich family is leaving for a vacation you can rob them) Credit card/debt card data compromises

Data Brokers (Lexis Nexis) (article)

Help customers make better, timelier decisions in a world full of hidden risks Insights on protecting people, industry and society

RFM ( Recency, Frequency, and Monetary Value)

How recent did you buy stuff How frequent do you buy it - Big data: the 4 v's and the 5th V

"The Dirty Little Secrets of Search" (SEO) (article)

Keywords and what sites pop up when searchings something Links from one site to another Google search ne algorithm had a negative effect on JC penny( how we trust links) Distinction between information and commercial

Netiquette

Long ago when the concept of browsing/using the internet during an airline flight was a new capability or feature, the airlines (specifically AIrTran in this case) actually produced a series of internet etiquette infomercials and hosted them on their website

IT Security Threats

Malicious Code (Malware) Unwanted programs Phishing/identity theft Hacking Cyber vandalism Credit card fraud/theft Spoofing (pharming)/Spam (junk) websites DoS dDos Insider attacks Poorly designed server and client software (SQL) Injection Spear phishing Hacker Cracker IDS (intusion detection systems)

Most common security threats in the e-commerce environment

Malicious code (malware) - threat at both client an server level - exploits and exploit kits - viruses and worms - ransomware - trojan horses - drive-by downloads - infected websites - backdoors, bots, botnets - threats at both client and server levels

Brand Strength (sales)

More money; follows RFM model ( recency, frequency, monetary

Competing on Analytics (article)

Netflix case reading Reed hastings, dvd then now tv?

Bundling

Offers consumers two or more goods for a reduced price

"Duh's of security"

Piggybacking or tailgating - following an authorized person into a building (id badges) Guard passwords and change them often Use secure networks for sensitive info DELETE suspicious emails Protect electronic media Local drive = not secure;easily accessed// encrypt info to be secure Lock computer when leaving... use a "windows" key plus the "L" key to lock your desktop Printers.. Use near you, requires passcodes, have authorization for others Sensitive convos in secure areas!

Firewall

Refers to either hardware or software that filters communication packets and prevents some packets from entering the network based on security policy

Privacy

The ability to control the use of information about oneself

Nonrepudiation

The ability to ensure that e-commerce participants do not deny their online auctions

Integrity

The ability to ensure that information being displayed on a website or transmitted or received over the internet has not been altered in any way by an unauthorized party

Confidentiality

The ability to ensure that message and data are available only to those who are authorized to view them

Authenticity

The ability to identify the identity of a person or entity with whom you are dealing on the internet

Viral Marketing

The process of getting customers to pass along a company's marketing message to friends, family, and colleagues

UCE

Unsolicited Commercial Email

Who is the most important person in the security space?

You

Digital Millennium Copyright Act (DCMA)

a United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization(WIPO) 1. It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures (commonly known as digital rights management or DRM) that control access to copyrighted works 2. It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself.

Black Hats

act with the intention of causing harm

Potentially Unwanted Programs (PUPs)

aka drive by downloads browser parasites, adware, spyware (keylogers) fake virus scanning software

Intellectual Property

all tangible and intangible products of human mind

Hacker

an individual who intends to gain unauthorized access to a computer system

Mobile wallet

apple pay, currentc, google wallet, paypal, samsung pay

Risk aversion

avoid high risk, cost, danger...

Grey Hats

believe they are pursuing some greater good by breaking in and revealing system flaws (independent hackers - get paid to do this)

Priceline

buyer driven "name your price" sales

Community

consumers love company tools, services, and products

No free lunch

creator wants $ for their talent/work

Hard Email Bounce Rate

domain not exist

Insiders

employees, temps, contractors

Patents

encourages inventors; controls and limits so no one else can do what you do

Biggest data breaches so far

equifax (recently) tjmaxx (largest to date)

IDS (Intrusion Detection Systems)

examines network traffic, watching to see if it matches certain patterns or preconfigured rules indicative of an attack

Alcomai

expedite the flow of information what they refer to as alcomizing website

Engagement

get you involved

Piggybacking/tailgating

getting into a building without having to swipe your access

Fan acquisition

getting peeps on board

Collective utilitarianism principle

greater society value

Ethical hackers

hacker one (get a commission on the reward paid to the hacker)

Script Kiddies

hackers in training

Outsiders

hackers, competitors, visitors

Trademarks

identify and distinguish your goods and indicate the true source; purpose is to protect consumers

Taxation

in Europe and the US, govts Rely on sales taxes based on the type and value of goods sold

SQL (structured query language)

industry-standard database query language used in relational databases

Malware targets "________ _____ ___ ________"

injected with a poison

Cybervandalism

intentionally disrupting, defacing or even destroying a site

Mobile marketing & Local marketing

involves using display ads, search engine , advertising, video ads, and mobile messaging on mobile devices such as smartphones and tablet computers, often using the geographic location of the user

Social marketing & Advertising

involves using the social graph to communicate brand images and directly promote sales of products and services

Shopping cart abandonment (article)

keep in cart as a strategy

Linking

linking to content pages on other sites, bypassing the home page

Biller Direct

macys, kohls, dillards

White Hats

members of "tiger teams" used by corporate security departments to test their own security measures

Universalism

not always right - then don't

Amazon.com

one click purchasing

Framing

placing the content of other sites in a frame on the infringer's site

Keywords

placing trademarked keywords on web pages, either visible or invisible

Cyberpiracy

registering domain similar or identical to trademarks of others to divert web traffic to their sites

Cybersquatting

registering domain similar or identical to trademarks of others to export profits from legitimate holders

Slippery slope

repeatable actions... down a path (if an action cannot be taken repeatedly, then it is not right to take at all)

Soft Email Bounce Rate

server has issues; temporary delay

Pharming

somehow you clicked your favorite site and it doesn't look the same anymore, somebody jacked the DNS server and altered the domain name that you are being directed to defense - IT department regularly monitoring DNS servers; intrusion detection/security certificate

Amplification

spread the word

Cash register of the future

tables with square, paypal triangle

Spear phishing

targets an entire organization or company

Email sharing/forwarding rate

the % of email recipients who clicked on a "Share this" button to post email content to a social networks, and/or who clicked on a"foward to a friend" button

Conversion rate

the % of email recipients who clicked on a link within an email and completed a desired action, such as filling out a lead generation form or purchasing a product

Click-through rate

the % of email recipients who clicked on one or more links contained in a given email

Bounce rate

the % of your total emails sent that could not be successfully delivered to the recipients inbox

Overall ROI

the overall return on investment for your email campaigns (Total Rev/Total spend)

List growth rate

the rate at which your email list is growing

Spam

unsolicited email

Techniques

usb drives, email attachements, screen shots, extortion/threats, lazy habits, backdoor program, logical or time bombs, sql injections, wireless access, steal servers, malware, phishing/pharming

Cracker

used to denote hacker with criminal intent (two terms often used interchangeably)

Flash Marketing

using e-mail or dedicated web site features to notify loyal customers, merchants offer goods and services for a limited time at very low prices

Metatagging

using trademark words in a site's metatags

Social contract rule

what you do - OK for others?

Netzero

won court case about floating windows on websites; kind of created

Phishing

you click a link in an email appears to come from a legitimate enterprise, triggered by the email trojans and keylogger defense - email policy

Consolidator

your bank, credit union

The New York Times Test

(perfect information rule) Headlines the next day for ALL to see including Your Mama!

2 competing EBPP business models

- Biller direct - Consolidator

Email Analytics (6 KPI's)

- Click-through rate - Conversion rate - Bounce rate - List growth rate - Email sharing/forwarding rate - Overall ROI

Internet & trademark abuse

- Cybersquatting - Cyberpiracy - Metatagging - Keywords - Linking - Framing

Ethical principles

- Golden Rule - Universalism - Slippery slope - Collective utilitarianism principle - Risk aversion - No free lunch - The New York Times Test - Social contract rule

IT Security

- Nonrepudiation - Integrity - Privacy - Firewall - Authenticity - Confidentiality

Big Data

- Volume (scale of data) - Variety (differences) - Velocity - Veracity (uncertainty) - Value

Types of Hackers

- White hats - Black hats - Grey hats - Script kiddies


Ensembles d'études connexes

Microsoft Power BI 70-778 Certification Exam

View Set

Public Speaking: Chapter 12 the fun outlining

View Set