MIS 276 Exam 2 (All Quizes & Chapters 5-8)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Anti cybersquatting consumer protection act (ACPA)

Create civil liabilities for anyone who attempts in bad faith to profit from an existing famous or distinctive trademark by red that is identical or confusingly similar to that trademark period passed in 1999.

Influencers of consumer Behavior

Culture, social norms, psychological factors, background demographic factors, Durand, marketing Communications of stimuli, firm capabilities, website a mobile platform features, consumer skills, product characteristics, purchasing attitudes, perceived behavioral control, and social networks.

Panda

A Google patch introduced in 2011 in an effort to weed out low-quality sites from search result.

Trademarks

A Mark used to identify and distinguish goods and indicate their source.

Virus

A computer program that has the ability to replicate or make copies of itself and spread to other files.

Phishing

A deceptive, online attempt by a third party to obtain confidential information for a financial gain.

Backdoor

A feature of viruses, worms, and Trojans that allow an attacker to remotely access a compromised computer.

Browser parasite

A program that can monitor and change the settings of a user's browser, such as changing the home page or sending information about the sites visited to a remote computer.

sniffer

A type of eavesdropping program that monitors information traveling over a network

Bots

A type of malicious code that can be covertly installed on your computer when attached to the Internet.

Ransomware (scareware)

A type of malware (often a worm) that locks into your computer or files to stop you from accessing them. Ransomware often demands the user pays to regain access to their data.

zero-day vulnerability

A vulnerability that has been previously unreported and for which no patch yet exists.

Which of the following is an example of an integrity violation of e-commerce security? A. An unauthorized person intercepts an online communication and changes its contents. B. A Web site is not actually operated by the entity the customer believes it to be. C. A merchant uses customer information in a manner not intended by the customer. D. A customer denies that he or she is the person who placed the order.

A. An unauthorized person intercepts an online communication and changes its contents.

All of the following marketing tools on Facebook require payment except: A. Mobile Ads. B. Right-Hand Sidebar Ads. C. News Feed Page Post Ads. D. Brand Pages.

D. Brand Pages.

Google uses which of the following to build a global database of wireless access points and their geographic locations? A. E9-1-1 B. BLE C. iBeacons D. Street View cars

D. Street View cars

Malicious code (malware)

Includes a variety of threats such as viruses, worms, Trojan horses, ransomware, and bots.

Identity Fraud

Involves the unauthorized use of another person's personal data such as Social Security, driver's licenses, and/or credit card numbers, as well as usernames and passwords for illegal financial benefit.

drive-by-download

Malware that comes with a downloaded file that a user intentionally or unintentionally requests.

Worm

Malware that is designed to spread from computer to computer.

Keyword advertising

Merchants purchase keywords through a bidding process as search sites and when every consumer searches for that word their advertisement shows up somewhere on the page, usually is a small text-based advertisement on the right, but also as a listing on the very top of the page.

________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?

Notice/Awareness

Ads that appear in a Facebook user's News Feed are called:

Page Post Ads.

What is the first step in developing an e-commerce security plan?

Perform a risk assessment

Hacktivism

Political twists on hacking. Typically attack governments organizations and even individuals for political purposes.

SQL injection attacks

Take advantage of vulnerabilities in poorly coded web application software that fails to properly validate or filter data entered by a user on a web page to introduce malicious program code into a company's systems and networks.

This is study set was recorded with my voice and not entered via keyboard. Please excuse any typos.

This is study set was recorded with my voice and not entered via keyboard. Please excuse any typos.

Penguin

a Google patch introduced in 2012 in an effort to punish websites and their SEO marketing firms who were manipulating links to their sites in order to improve their rankings.

Consumer Behavior

a social science disciplines that attempts to model and understand the behavior of humans and a Marketplace.

Interestial ad

a way of placing a full-page message between the current and destination pages of a user (AdFly)

social search

an attempt to use your social context to provide search results

Rich media ads

as the employer animation, sound, and interactivity, using flash, HTML5, Joppa, and JavaScript.

Content Farms

companies that generate large volumes of textual content from multiple websites designed to attract viewers and search engines.

Registering a domain name similar or identical to trademarks of others to divert Web traffic to their own sites is an example of:

cyberpiracy (Cybersquatting is slightly different in that it involves registering a domain similar/identical to another entity in hopes of selling it off to them later.)

Dilution

defined as any behavior that would weaken the connection between the trademark and the product.

Proxy servers are also known as:

dual home systems (To internal computers, a proxy server is known as the gateway, while external computers know it as a mail server.)

Paid inclusion

for a fee, guarantee a website's inclusion in a list of search results, more frequent visits by its web crawler, and suggestions for improving the result of organic searching.

Which alternative, non-neutral, pricing plan would charge fees to e-commerce firms based on the amount of traffic they generate?

highway pricing

Macy's deployed which technology in all its retail stores in 2014?

iBeacon

Deep linking

involves bypassing the target site's homepage and going directly to a Content page.

Framing

involves displaying the contents of another website inside your own site within a frame or window.

Online bill payment now accounts for ________ of all bill payments, while paper checks account for ________.

more than 50%, less than 25%

Click fraud

occurs when a competitor clicks on search engine results and ads, forcing The Advertiser to pay for the quick even though the quick is not legitimate.

Linking

refers to building hypertext links from one site to another site.

Clickstream Behavior

refers to the transaction log that consumers establish as they move around the web, from search engine to a variety of sites, then to a single site, then to a single page, and then, finally, to decision to purchase.

Search engine marketing (SEM)

refers to the use of search engines to build and sustain brands

search engine advertising

refers to the use of search engines to support direct sales to online consumers.

Organic search

search engine sites originally performed unbiased searches of the web's huge collection of web pages.

Banner ad

similar to a traditional ad and a printed publication but has some added advantages. When clicked, it brings potential customers directly to the advertisers website, and that site where the ad appears can observe the user's behaviour on the site.

Proximity marketing

techniques that identify a perimeter around a physical location, and then Target ads to users within the perimeter, recommending actions possible within the "fenced-in" area.

Geo-aware

techniques that identify the location of a user's device and then Target marketing to the device, recommending actions Within Reach such as going to nearby stores.

Privacy refers to...

the ability to control the use of information a customer provides about himself or herself to an e-commerce merchant.

Availability refers to...

the ability to ensure that an e-commerce site continues to function as intended.

Nonrepudiation refers to...

the ability to ensure that e-commerce participants do not deny (i.e., repudiate) their online actions.

Integrity refers to...

the ability to ensure that information being displayed on a Website, or being transmitted or received over the Internet, has not been altered in any way by an unauthorized party.

Confidentiality refers to...

the ability to ensure that messages and data are available only those who are authorized to view them.

Authenticity refers to...

the ability to identify the identity of a person or entity with whom you are dealing with on the Internet.

Profiling

the creation of digital images that characterize online individual and group Behavior.

Search engine optimization

the process of improving the ranking of web pages with search engines by altering that the content and design of the web pages and sites.

Adware is...

typically used to call for pop-up ads to display when the user visits certain sites.

Creating multiple variations of information goods and selling these to different market segments at different prices is called:

versioning

Which of the following is not an example of a PUP? A. spyware B. drive-by download C. adware D. browser parasite

B. drive-by download (PUP: Potentially Unwanted Programs)

All of the following are online communications that are used to support the evaluation of alternatives stage of the consumer decision process except: A. online catalogs. B. targeted banner ads. C. social networks. D. search engines.

B. targeted banner ads. (Targeted banner ads are focused on building awareness in consumers allowing them to recognize a purchasing need.)

Which of the following is not a practice that degrades the results and usefulness of search engines? A. social search B. click fraud C. content farms D. link farms

A. social search

Exploit Kits

Collections of exploits bundled together and rented or sold as a commercial product, often with slick user interfaces and in-depth analytic functionality.

Trojan Horse

Appears to be benign, but then does something other than expected. The Trojan horse itself is not a virus as it cannot replicate, but often opens a hole for viruses/worms to enter.

All of the following are examples of dark social except: A. e-mail B. tweets C. Snapchat D. SMS texts

B. tweets

Which of the following is not a primary source of ad fraud? A. browser extensions that insert ads into a premium publisher's Web site and then list the ads as available on a programmatic ad exchange B. botnets hired by publishers to click on Web pages to create phony traffic C. ad targeting firms that create bots that imitate the behavior of real shoppers and then charge advertisers D. native advertising that is displayed on a social media site

D. native advertising that is displayed on a social media site

White Hats

Good hackers whose role in helping organizations locate and fix security flaws

A recent Google survey found that ________ % of smartphone users visit a store within a day of conducting a local search.

50

Which of the following breaks a big data problem down into sub-problems by distributing the data across thousands of inexpensive computer processing nodes for recombination into smaller, easier to analyze, data sets. A. Hadoop B. profiling C. data warehouse D. SQL

A. Hadoop (Hadoop is a very popular open source software framework that enables this type of distributed parallel processing. Facebook stores much of its data on a massive Hadoop cluster, which holds an estimated 300 petabytes, about 30,000 times more information than the Library of Congress.)

Hacker

An individual who intends to gain unauthorized access to a computer system

Deep packet inspection

Another technology for recording every keystroke at the ISP level of every internet user no matter where the old man and go on the web and then using that information to make suggestions and target ads.

Pharming

Automatically redirecting a web link to an address different from the intended one, with the site masquerading as the intended destination

A Web beacon is:

a tiny graphics file embedded in an e-mail or Web page. (Web beacons are web tracking files that are not site specific. Web beacons are used to automatically transmit information about the user and the page being viewed to a monitoring server in order to collect personal browsing information and other personal information.)

What is the second leading cause of data breaches?

accidental disclosures

Recency refers to the:

average number of days elapsed between customer visits

link Farms

groups of websites that link to one another thereby boosting their ranking in search engines that use a page rank algorithm to judge the usefulness of a state. poses a problem for search engines.

Network key word advertising (contact advertising)

introduced by Google as its AdSense program in 2002, different from the ordinary key word advertising described previously.

Knowledge Graph

introduced by Google in 2012 as an effort to anticipate what you might want to know more about as you search for a topic or answer questions you might not thought of asking.

Location based services

involves providing services to users based on their location.

In modeling online consumer behavior, the concept of "consumer skills" refers to the:

knowledge consumers have about how to conduct online transactions.

A social consequence of the richness of Internet information is:

very persuasive messages might reduce the need for multiple independent sources of information.

Which of the following is not one of the issues complicating the taxation of e-commerce sales? A. Retailers legally only have to charge sales tax if they have operations located in the same state as a consumer. B. Ecommerce technology allows small online businesses to manage sales taxes to thousands of different jurisdictions. C. Sales taxes and policies vary by state and country. D. State and local governments which could rely on a steady stream of sales tax revenues from local businesses are having a difficult time budgeting because it is more difficult to predict sales tax revenue from year to year.

B. Ecommerce technology allows small online businesses to manage sales taxes to thousands of different jurisdictions.

All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except: A. the DMCA makes it illegal to circumvent technological measures to protect works. B. the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement. C. the DMCA requires search engines to block access to infringing sites. D. the DMCA allows libraries to make digital copies of works for internal use only.

B. the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement.

Which of the following is an online service specifically aimed at measuring the impact of Pinterest and other visual social media? A. Amplify B. TweetDeck C. Curalate D. Webtrends

C. Curalate

Which of the following statements about Pinterest is not true? A. Pinterest users are overwhelmingly female. B. Pinterest enables users to integrate their pins into their Facebook News Feeds and Twitter streams. C. Pinterest is the only one of the major social networks that does not accept paid advertising. D. Pinned photos and photo boards are available to all Pinterest users.

C. Pinterest is the only one of the major social networks that does not accept paid advertising.

Which of the following technologies allows you to send e-mail without a trace? A. P3P B. public key encryption C. anonymous remailers D. anonymous surfing

C. anonymous remailers

All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the: A. market effect of the use - will it harm the product in the marketplace? B. amount of the work used - is it a stanza from a poem or the entire poem? C. content of use - is it factual or creative? D. nature of the work used - why kind of work is it?

C. content of use - is it factual or creative? (The fact that a work is factual or creative is inherent in the nature of the work.)

All of the following statements about patents are true except: A. in order to be patented, an invention must be nonobvious. B. the four types of inventions protected by patent law are machines, manmade products, compositions of matter, and processing methods. C. patents protect the expression of ideas and not the ideas themselves. D. computer programs can be patented.

C. patents protect the expression of ideas and not the ideas themselves.

A ________ is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.

CRM system

Spyware

Can be used to obtain information such as a user's keystrokes (keylogger), copies of e-mails and instant messages, and even take screenshots.

According to data from Pew Research Center, which of the following is the action which the highest percentage of Internet users has taken to preserve their privacy online?

Cleared Web browser history and cookies.

Botnets

Collections of captured computers used for malicious activities such as DDoS attacks.

Which of the following provides marketers with a real-time digital dashboard so they can see tweet activity about a TV show, commercial, or brand? A. Lead Generation Cards B. Enhanced Profile Pages C. Promoted Accounts D. Amplify

D. Amplify

Which of the following is not one of the four main methods online advertisers use to behaviorally target ads? A. search engine queries B. clickstream data C. data collected from social networks D. amplification

D. amplification

Which of the following is not an example of an access control? A. login passwords B. firewalls C. proxy servers D. digital signatures

D. digital signatures

Which of the following is not a key point of vulnerability when dealing with e-commerce? A. the client computer B. the database server C. the communications pipeline Incorrect D. the customer credit card bank E. None of the above

E. None of the above (Vulnerabilities both technical and human exist throughout the system and the process.)

All of the following are methods of securing channels of communication except: A. FTP. B. certificates. C. VPN. D. SSL/TLS.

FTP

Hummingbird

Google's new search algorithm released in September 2013. Rather than evaluate each word separately in a search, Google's semantically informed hummingbird will try to evaluate an entire sentence. Semantic search more closely follows conversational search, or search as you would ordinarily speak it to another human being.

Denial of Service (DoS) attack

Hackers flood a website with useless pings or page request that inundate and overwhelm the site's servers.

Grey Hats

Hackers who believe they are pursuing some greater good by breaking in and revealing system flaws

Black Hats

Hackers who engage in the same kind of activities but without pay or buy-in from the target organization, and with intention of causing harm.

Anonymous profiles

Identify people as belonging to highly specific and targeted groups, for example, 20 to 30 year old males with college degrees with an income greater than 30,000 a year interested in high fashion clothing, based on recent search engine use.

Spoofing

Involves attempting to hide a true identity by using someone else's email or IP address

Main reasons to purchase online

Lower prices, shop from home, shops 24/7, wider variety of products available, easier to compare and research products and offers, products only available online, online customer reviews, better product information available, promotion via email or text, and social media influence

Cybervandalism

Malicious intentions to disrupt deface or destroy sites

Data Breach

Occurs whenever organizations lose control over corporate information to outsiders

How can a smartphone's gyroscope and accelerometer be used in product marketing?

Potential customers can tilt and turn their smartphones to see 360 degree views of products.

Twitter marketing tools

Promoted tweets, promoted Trends, promoted accounts, and have profile Pages, amplify, television ad retargeting, lead generation cards, and mobile ads.

Social engineering

Relies on human curiosity, greed, and gullibility in order to trick people into taking action that will result in the downloading of malware.

Spam (junk) Web sites

Sites that promise to offer some product or service but in fact are just a collection of advertisements for other sites, some of which contain malicious code.

Location based marketing

Target's marketing messages to users based on their location.

Cracker

Typical used to denote a hacker with Criminal Intent although in the public press the term hacker and cracker tend to be used interchangeably.

Distributed Denial of Service (DDoS)

Uses hundreds or even thousands of computers to attack the target network from numerous launch points.


संबंधित स्टडी सेट्स

CS Exam 1 (Practice It! & Quizzes)

View Set

Math Praxis (practice test and answers)

View Set

Forensic Evidence- unit 2-book notes

View Set

MAN. 3600 International Business Exam 2

View Set