E Commerce Test 3
Which of the following is a core Fair Information Practices (FIP) principle?
Choice/Consent
Accessing data without authorization on Dropbox is an example of ______ security issue.
Cloud
________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
Confidentiality
Which of the following is not an example of an access control?
Digital signatures
Proxy servers are also known as:
Dual home systems
An ________ serves businesses that primarily buy direct goods on a contract purchasing basis.
industry consortium
The Seam is an example of an ________.
industry consortium
The overall rate of online credit card fraud is ________ of all online card transactions.
less than 1%
Companies use _____ to track user statements and views on newsgroups, chat groups, and other public forums?
Search engines
What are the uses of social networks in B2B e-commerce?
Social networks can provide personal connections that can help decision making in supply chain
All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:
free availability of the work on the Web.
Which of the following is the leading cause of data breaches?
hackers
Identify the social consequence of the richness of Internet information.
A "screen technology" that reduces use of text and potentially the ability to read by focusing instead on video and audio messages. Potentially very persuasive messages that may reduce reliance on multiple independent sources of information.
Which of the following situations would not qualify for the fair use exception to U.S. copyright law
A student copies a photograph of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site.
All of the following are potential benefits of B2B e-commerce except:
lower price transparency
Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?
patent law
Which of the following tools can companies use to track user statements and views on newsgroups, chat groups, and other public forums?
search engines
All the following statements about symmetric key cryptography are true except:
symmetric key cryptography is computationally slower
All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:
the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement.
Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?
the Golden Rule
Which ethical principle tells you that it is wise to assume perfect information markets?
the New York Times test
Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?
the Slippery Slope
Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?
the Social Contract rule
Next generation firewalls provide all of the following except:
the ability to automatically update applications with security patches
PCI-DSS is a standard established by which of the following?
the credit card industry
Registering the domain name Faceboik.com with the intent to divert Web traffic from people misspelling Facebook.com is an example of:
typosquatting
Which of the following features of e-commerce technology can result in work and shopping invading family life?
ubiquity
_______commerce includes the following business processes: customer relationship management, demand management, order fulfillment, manufacturing management, procurement, product development, returns, logistics/transportation, and inventory management
B2B
All of the following are weaknesses of EDI except:
EDI lacks universal standards
Which of the following is not true about the evolution of Facebook's privacy policies over the ten-year period from 2005 to 2015?
Facebook's privacy policy became easier to understand.
A private industrial network is an independently owned online marketplace that connects many suppliers and buyers.
False
Copyright protection protects against others copying the underlying ideas in a work.
False
Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.
False
Most adult social network participants do not have any expectation of personal privacy when using a social network.
False
Vishing attacks exploit SMS messages.
False
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
Firewall
What are the steps in analyzing an ethical dilemma?
Identify and clearly describe the facts Define the conflict or dilemma and identify the higher-order values involved Identify the stakeholders Identify the options that you can reasonably take Identify the potential consequences of your options
What is the first step in analyzing an ethical dilemma?
Identify and describe the facts.
Universalism
If an action is not right for all situations, then it is not right for any specific situation.
What are the potential benefits of B2B e-commerce?
Lower administrative costs Lower search costs for buyers Reduced inventory costs Lower transaction costs Increased production flexibility by ensuring just-in-time parts delivery Improved quality of products by increasing cooperation among buyers and sellers Decreased product cycle time Increased opportunities for collaboration Greater price transparency Increased visibility, real-time information sharing However, some risk is posed by increased globalization and consolidation
All of the following are current major trends in B2B e-commerce, except;
Move to implement highly centralized supply chains to reduce risk
Which of the following statements about cloud-based B2B systems is not true?
Much of the expense of the system is shifted from the B2B network provider to the firm
Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?
NFC
The essential characteristic of ________ is that they bring hundreds to thousands of suppliers into a single Internet-based environment to conduct trade.
Net marketplaces
Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?
No Free Lunch
________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
Nonrepudiation
Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?
Notice/Awareness
All of the following statements about PKI are true except:
PKI guarantees that the verifying computer of the merchant is secure
What is the first step in developing an e-commerce security plan?
Perform a risk assessment
What are the various steps in developing an e-commerce security plan?
Perform a risk assessment Develop a security policy Develop an implementation plan Create a security organization Perform a security audit
Automatically redirecting a Web link to a different address is an example of which of the following:
Pharming
________ are Internet-based communication environments that extend far beyond procurement to encompass truly collaborative commerce.
Private industrial networks
All of the following are forms of collaboration among businesses except:
RFQs
What is a cultural consequence of the global reach of the Internet?
Reduces cultural diversity in products; weakens local small firms while strengthening large global firms; moves manufacturing production to low-wage ares of the world; weakens the ability of all nations - large and small - to control their information density.
Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?
Risk Aversion
Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?
the Collective Utilitarian principle
The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.
True
The expansion of generic top-level domains recently authorized by ICANN is likely to be very disruptive in terms of trademark protection.
True
There is a finite number of Bitcoins that can be created.
True
Walmart is the largest purchaser of consumer goods in the world.
True
Which of the following was the first step in the development of B2B e-commerce?
automated order entry systems
Which of the following can be used to record all keyboard activity of a user?
spyware
Analysts predict that B2B e-commerce in the United States will grow by 2019 to approximately:
$8.6 trillion
Describe the five-step process that can be used to analyze an ethical dilemma. What other guidelines are there to help in understanding a complicated ethical or moral situation?
1. Identify and describe the facts. Find out who did what to whom, and where, when, and how. It helps to get the opposing parties involved in an ethical dilemma to agree on the facts. 2. Define the conflict or dilemma and identify the higher-order values involved. Ethical, social, and political issues always reference higher values. Otherwise, there would be no debate. The parties to a dispute all claim to be pursuing higher values (e.g., freedom, privacy, protection of property, and the free enterprise system). 3. Identify the stakeholders. Every ethical, social, and political issue has stakeholders: players in the game who have an interest in the outcome, who have invested in the situation, and usually who have vocal opinions. Find out the identity of these groups and what they want. This will be useful later when designing a solution. 4. Identify the options that you can reasonably take. You may find that none of the options satisfies all the interests involved, but that some options do a better job than others. Sometimes, arriving at a "good" or ethical solution may not always be a balancing of consequences to stakeholders. 5. Identify the potential consequences of your options. Some options may be ethically correct, but disastrous from other points of view. Other options may work in this one instance, but not in other similar instances. Always ask yourself, "What if I choose this option consistently over time?"
How long is a patent and what are its limits?
20 years Invention must be new, non-obvious, and novel
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
All of the following statements about Apple Pay are true except which of the following?
Apple Pay is available for both iPhone 5s and iPhone 6s
________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
Authenticity
Which of the following dimensions of e-commerce security is not provided for by encryption?
Availability
________ refers to the ability to ensure that an e-commerce site continues to function as intended.
Availability
A fingerprint scan is an example of which of the following
Biometrics
Rustock is an example of which of the following
Botnet
Define and explain how EBPP systems work. Describe each of the main EBPP business models.
EBPP refers to electronic billing presentment and payment systems, which are forms of online payment systems for monthly bills. Analysts expect electronic bill presentment and payment to become one of the fastest growing e-commerce businesses in the United States over the next several years because everyone involved stands to benefit from the process. Billers will cut costs by eliminating printing, paper, envelopes, postage, and the processing of paper checks and payments. Furthermore, EBPP will offer billers an opportunity to enhance customer service and target market. Customers will save time and eliminate checks and postage. Companies can use EBPP to present bills to individual customers electronically or they can contract with a service to handle all billing and payment collection for them. There are two main types of EBPP business models: biller-direct and consolidator. In biller-direct systems, a biller delivers the bill to customers via its own Web site or via a third-party's site. A service bureau is often used to provide the necessary infrastructure. The second major type of EBPP business model is the consolidator model. In this model, a third party, such as a financial institution or portal, aggregates all bills for consumers and ideally permits one-stop bill payment (pay anyone).
Online gambling is now legal throughout the United States.
False
Office supplies are an example of:
Indirect goods
"Do Not Track" falls under which of the following principles in the FTC's new privacy framework?
Industry best practices
What are the four major categories of issues?
Information rights Property rights Governance Public safety and welfare
Spot buying
Involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers.
Which of the following is not a typical barrier to the implementation of a private industrial network?
It requires the large network owners to give up some of its independence
________ refers to differentiating a firm's products or prices on the basis of superior supply chain management
Supply change competition
Explain the "Right to Be Forgotten" EU policy? Next, describes the pro's and con's of this policy.
The claim of individuals to be able to edit and delete personal information.
List the different methods that are being used to protect online privacy. Which of these methods (ONLY ONE) do you think is or could be the most effective, and why?
The different methods being used to protect online privacy include legal protections, industry self-regulation, privacy advocacy groups, privacy protection products, and technology solutions
The majority of inter-firm trade involves:
contract purchasing of direct goods
All of the following are examples of direct goods in the auto industry except:
desktop computers.
Malware that comes with a downloaded file that a user requests is called a:
drive-by download
Which of the following basic ethical concepts plays an important role in defining privacy?
due process
An ________ provides electronic catalogs that represent the products of thousands of direct manufacturers.
e-distributor
An ________ primarily serves businesses that primarily buy indirect goods on a contract purchasing basis
e-procurement Net marketplace
Amazon has a patent on:
one-click purchasing
PayPal is an example of what type of payment system?
online stored value payment system
Define the procurement process. What are the seven basic steps in the procurement process (describe)?
Search (catalogs, internet, salespersons, brochures, telephone fax) Qualify (research, credit history, check with competitors, telephone research) Negotiate (price, credit terms, escrow, quality, timing) Purchase order (order product, initiate purchase order, enter into system of mail purchase order) Invoicing (receive purchase order, enter into financial system, enter into production system, send invoice, match with purchase order, internal review, enter into warehouse system) Shipping (enter into shipper's tracking system, ship goods, deliver goods, enter into tracking system) Remittance payment (receive goods, enter shipping documents into warehouse system, verify and correct invoice, resend invoice, cut check, add corrected invoice to back office systems)
FREAK is an example of which of the following:
Software vulnerability
________ purchasing involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers
Spot
Which of the following was designed to cripple Iranian nuclear centrifuges:
Stuxnet
Which of the following statements about EDI systems is true?
They typically serve vertical markets
Zeus is an example of which of the following:
Trojan horse
Apple Pay uses near field communication (NFC) chips.
True
Exploit kits are often rented or sold as a commercial product.
True
Google defended its Library Project on the grounds of fair use.
True
In the United States, Google is not required to remove results from its search engine if requested.
True
MRO goods are also known as indirect goods.
True
PayPal is the most popular alternative payment method in the United States.
True
Purchasing managers are the key players in the procurement process.
True
SLS/TLS cannot provide irrefutability.
True
ShellShock is an example of a software vulnerability.
True