Combo with "Combo E-Commerce Exam 2" and 27 others
lean production
a set of production methods and tools that focuses on the elimination of waste throughout the customer value chain
Press release
a short news article sent to various media channels
(types of e-books) dedicated e-book reader
a single purpose device with a proprietary operating system that can download from the web and read proprietary formatted files created for that device
blog
a personal website with posting that are time-stamped and arranged with the newest item first.
Shopping Cart
an electronic tool used by online consumers to purchase goods or services
Listserv
an emailing list that receives newsletters and updates
dilution
any behavior that weekends connection btw trademark and product
dilution
any behavior that would weaken the connection between the trademark and the product p.284
personal identifiable info )pii)
any data that can be used to identify, locate, or contact an individual
Personally identifiable information (PII)
any data that can be used to identify, locate, or contact an individual p.267
Digital Certificates
certificates that verify that the sender of a message is who he or she claims to be and provides the person who receives the message with the public key required to encrypt a reply
Digital Certificates
certificates that verify that the sender of a message is who he or she claims to be and provides the person who receives the message with the public key required to encrypt a reply p.186
ch 10 start
ch 10 start
chapter 11 start
chapter 11 start
Demographics
characteristics such as age, sex, income, location, education, and religion
pay-per-view/download
charge for each viewing of premium content
speed tiers
charging more for higher speed internet service p293
congestion pricing
charging more for peak hour internet service p.293
usage-based billing
charging on the basis of metered units of internet service p.293
highway (toll) pricing
charging service providers like Netflix for their use of internet based on their bandwidth use p293
Zombie networks
clickbots/botnets -hordes of surreptitiously infiltrated computers, linked and controlled remotely -used to perpetrate click fraud, as well as a variety of other computer security crimes
Depleting click fraud
clicking rival's ads to exhaust their PPC budget
(t8.3) digital wallets (single sign-on services)
client side wallets and software that reveal personal information to web sites verifying the identity of the consumer
Which of the following is the central point of control for an e-market?
collaboration hub
botnet
collection of captured bot computers p.171
Each of the following is a benefit of e-learning except
college professors are anxious to develop new online courses.
Multi-Channel Integration
combine traditional store with online, provide integrated shopping experience, leverage value of physical store
2 purposes of trademarks
ensure consumer gets what is paid for and protects owner against piracy
Portal
entry into a website
(table 8.8, p 522) Privacy Advocacy Groups
epic.org, privacyinternational.org, cdt.org, privacy.org, privacyrights.org, privacyalliance.org
The Service Sector: Offline and Online
- accounts for 75% of all of economic activity -"concerned with performing tasks" in and around households, business firms and institutions -domestic establishments providing services to consumers, businesses, governments and other organizations.
direct goods
goods directly involved in the production process
durable goods
goods that are consumed over a longer period of time (generally more than a year)
durable goods
goods that are consumed over a longer period of time (more than a year)
nondurable goods
goods that are consumed quickly and have shorter life spans
Patent
grants the owner an exclusive monopoly on the ideas behind an invention for 20 years p.283
gross margin
gross profit divided by net sales
gross margin
gross profit/net sales
socio-economic
group status based on social groupings and economic status, in terms of e-commerce, these groups may or may not be limited by financial security
link farms
groups of Web sites that link to one another, thereby boosting their ranking in search engines pg. 225
(t8.3) trusted computing environments
hardware and software that controls the viewing of copyrighted content and requires users identification
enterprise portals
helps employees find important organizational content like human resource and corporate content
procurement process
how firms purchase goods they need to produce goods for consumers.
Return Policy
how the company deals with a customer who wants to return a purchase
protocol
http
anonymous profiles
identify people as belonging to highly specific and targeted groups p.270
Server farm
massive network of computer servers running software to coordinate their collective use -provide the infrastructure backbone to SaaS and hardware cloud efforts, & many large-scale Internet services
Cost-per-click (CPC)
maximum amount of money an advertiser is willing to pay for each click on their ad
view through rate
measures the 30 day response rate to an ad
trends in online content:
media consumption, technology, content gets social, content goes local, the titans compete, eyeballs, revenue, user-generated content, business models, paid content and free content coexist, convergence in media forms
Industry Convergence
merger of media enterprises into synergistic combinations that create and cross-market content on different platforms
industry convergence
merger of media enterprises into synergistic combinations that create and cross-market content on different platforms.
Cost-per-action
method of charging for advertising whenever a user performs a specified action such as signing up for a service, requesting material, or making a purchase
tight coupling
method of insuring that suppliers precisely deliver the ordered parts, at a specific time and particular location, to ensure the production process is not interrupted for lack of parts
business process reengineering (BPR)
methodology for conducting a comprehensive redesign of an enterprise's processes
permanent establishment
physical location of an organization
service providers
organizations with computers connected to the internet that provide access to software, data, and storage.
Mash-ups
output from two or more web sites combined into one experience
liabilities
outstanding obligations of the firm
framing
placing content of other sites in a frame on the infringer's site p.289
keyboarding
placing trademarked keywords on web pages
keywording
playing trademarked keywords on web pages, either visible or invisible p.288
Telecommunications Act
preserves the vibrant and competitive free market that presently exists for the internet and other interactive computer services
(table 8.9, p 525) Privacy Enhancing Technologies: pop up clockers
prevents calls to ad servers that push pop up, pop under, and leave behind ads; restricts downloading of images at user requrest
(table 8.9, p 525) Privacy Enhancing Technologies: cookie managers
prevents client computer from accepting cookies
3 ways to classify net marketplaces
pricing mechinism, nature of market served, ownership
largest form of b2b commerce
private industrial networks
User authentication
procedure of verifying the identity of a remote user
Valediction Methods
procedures to test website accuracy and availability
Encryption
process of encoding information using a secret key to produce a string of unintelligible characters
Encryption
process of encoding information using a secret key to produce a string of unintelligible characters p.180
Search engine optimization (SEO)
process of improving a page's organic search results pg. 224
dis-intermediation
process of loosing distribution channels when they are no longer needed
currency conversion
process of using a financial formula incorporating current exchange rate
trans-organizational business process
process that requires at least two independent firms to perform
Transaction and payment processing
processes the shopper's request as they proceed to the virtual checkout counter
Lean production
production methods and tools that focuses on the elimination of waste throughout the customer value chain
supply-push model
products are made prior to orders received based on estimated demand
demand pull model
products are not built until an order is received
demand-pull model
products are not built until an order is received
MRO goods
products for maintance, repair, and operations
MRO Goods
products for maintenance, repair and operations.
just in time inventory
products manufactured as needed
social network features and technologies (table 11.2)
profiles: friends network: network discovery: favorites: games, widgets, and apps: e-mail: storage: instand messaging: Message boards: online polling: chat: discussion groups: experts online: membership management tools:
(table 8.9, p 525) Privacy Enhancing Technologies: public key encryption
program that encrypts your mail and documents
potentially unwanted program (PUP)
program that installs itself on a computer, typically without the user's informed consent p.172
Auto responders
programs that analyze incoming email and replies with a canned response
Order fulfillment
in the relationship between buyer and seller, there are many activities that transpire between the buyer's selection of the product and the shipment of the selected product to the buyer selecting merchandise, responding to the order
value chain management services
include automation of a firm's entire procurement process on teh buyer side and automation of the selling business processes on teh seller side
value chain management services
include automation of a firm's entire procurement process on the buyer side and automation of the selling biz processes on the seller side
transaction taxes
include sales taxes, use taxes, etc
malicious code (malware)
includes a variety of threats such as viruses, worms, trojan horses, and bots p.170
information privacy
includes both the claim that certain information should not be collected at all by governments or business firms, and the claim of individuals to control the use of whatever information that is collected about them p.265
organic search
inclusion and ranking of sites depends on a more or less unbiased application of a set of rules imposed by the search engine. pg. 222
(T 8.7: FTC new privacy framework principle) Great transparency
increase transparence of data practices by: -making privacy notices clearer, shorter, and more standardized to enable better comprehension and comparison -providing consumers with reasonable access to data about themselves - providing prominent disclosures and obtaining express affirmative consent before using consumer data in a materially different manner than claimed when data was collected -educating consumers about commercial data privacy practices
e-procurement Net marketplace
independently owned intermediary that connects hundreds of online suppliers offering millions of maintenance and repair parts to business firms who pay fees to join the market. typically used for long term contractual purchases.
E-procurement
independently owned intermediary that connects hundreds of online suppliers offering millions of maintenance and repaire parts to business firms who pay fees to join the market
e-procurement networks
independently owned intermediary that connects hundreds of online suppliers offering millions of maintenence and repair parts to biz firms who pay fees to join the market, typically for longterm contractual purchasing of indirect goods
exchanges
independently owned online marketplace that connects hundreds to thousands of suppliers and buyers in a dynamic, real life environment- usually vertical markets and buyer-biased
Exchanges
independently owned online mrktplace that connects hundreds to potentially thousands of suppliers & buyers in a dynamic, real-time environment.
accountability
individuals, organizations and societies should be held accountable to others for the consequences of their actions p.264
Industry Consortium
industry owned vertical market that enables buyers to purchase direct inputs (both goods and services) from a limited set of invited participants
industry consortium
industry owned vertical market that enables buyers to purchase direct inputs (both goods and services) from a limited set of invited participants.
industry consortia
industry-owned vertical market that enables buyers to purchase direct imputs (both goods and services) from a limited set of invited participants- emphasizes longterm contractual purchasing- ultimate objective is unification of supply chains w/i entire industries through common network and computing platform
How does this shift explain the growth and appeal of online advertising?
instant trackability: calculate return on investment, test creativity, adjust ads quickly
Services
intangible products, they give a benefit or satisfaction
Online travel industry dynamic
intense competition among providers, price competition, industry consolidation, commoditize online travel
cybervandalism
intentionally disrupting, defacing, or even destroying a site p. 174
Low latency
low delay
Opt-in
mailing list that people have voluntarily given their email address in order to receive the email from that company
Keyword stuffing
packing site w/ unrelated words to lure users & attract higher-value contextual ads
information rights property rights governance public safety and welfare
page 263
Ethical principles: the golden rule universalism slippery slope collective utilitarian principle risk aversion no free lunch the new york times test (perfect information rule) the social contract rule
page 264-265
taxation of ecommerce sales
page 292
protecting children
page 296
internet drug bazaar
page 299
google books settlement
page 301
online travel services
page 333
ideal web business
page 336
online mortgage and lending services online insurance services online retail services
pages 330-331
Matchmaking
pairing internet surfers w/ advertiser & taking a cut along the way -Google's ONE trick
Drawing page
part of the trademark application process where a black and white drawing of the mark is included
Specimen page
part of the trademark application process where a real example of how the mark is used in commerce is included
3 e-book models
pay per download, licesing entire e-libraries of content, advertising supported
click through rate
percentage of email recipiants who clicked through to the offer
delivery rate
percentage of email recipiants who receive an email
retention rate
percentage of existing customers who continue to buy on a regular basis
click through rates
percentage of people exposed to an onliine ad who actually click on the banner
lyalty
percentage of purchasers who return ina year
reach
percentage of the total number of consumers in a market who will visit a site
reach
percentage of the total number of consumers in a market who will visit a site. pg. 245
conversion rate
percentage who buy something
attrition rate
percentage who purchase once and don't return within a year
loyalty
percentages of purchases who return in a year. pg. 245
when a consumer willingly provides personal info in order have their name offered in a sweepstake it's called
permission marketing
watch costs
permit the consumer to monitor specific auctions of interest
online stored value payment system
permits consumers to make instant, online payments to merchants and other individuals based on value stored in an online account p.194
(t 8.11) DMCA Title 1: wipo copyright and performances and phonograms treaties implementation
makes it illegal to circumvent technological measure to protect works for either access or copying or to circumvent any electronic rights management information
drive-by download
malware that come with a downloaded file that a user requests p.171
worm
malware that is designed to spread from computer to computer p.171
continuous inventory controls
managed with electric database updated instantaneously best for online selling
Continuous inventory controls
managed with electronic database, updated instantaneously, best for online selling
what is the test for infringement
market confusion and bad faith
Auctions
markets in which prices are variable and based on the competition among participants who are buying or selling products and services
horizontal markets
markets that serve many different industries
(t 8.11) DMCA Title 3: computer maintenance competition assurance
permits users to make a copy of computer program for maintenance or repair of the computer
project champion
person who ensures the EC project gets the time, attention, and resources required and defends the project from detractors at all times
difference between personal and anonymous profiles
personal- add a personal email, postal address, and/or phone number to behavioral info. anonymous- identify people as belonging to highly specific and target groups
Pharming
setting up fraudulent web site that contains copies of pages from a legitimate web site
retargeting ads
showing the same as to individuals across multiple Web sites pg. 240
Encryption software
software that scrambles data into a secret code that can only be broken by complicated mathematical algorithms
Discussion group software
software that supports discussion threads
Firewall software
software that surrounds an intranet to prevent unauthorized access by examining each message or request that enters and exits the intranet
Firewall software
software that surrounds an intranet to prevent unauthorized access by examining each message or request that enters and exits the intranet p.190
blogs
some businesses and newspapers use _____ as a quick publishing method.
fair market value
the average of prices for a product or service in a variety of dynamic and fixed-price markets around the world
multi-tier supply chain
the chain of primary, secondary, and tertiary suppliers
digital rights management (drm)
the combination of technical and legal means for protecting digital content from unlimited reproduction without permission
culture
the combination or language and atoms
internet infrastructure
the computers and software connected to the internet
ecommerce
the conduct of selling, buying, logistics, or other organization management activities via the web
internet
the connection between the clients and the providers.
profiling
the creation of digital images that characterize online individual and group behavior p.270
opt-out
the default is to collect information unless the consumer takes an affirmative action to prevent the collection of data p.272
HR
the division of a company which hires employees and takes care of all employee-related matters
C2C
the exchange of products like on ebay
B2C
the exchange of products over the internet
C2B
the exchange of products, services, or info between consumers like on priceline.com
digital milennium copyright act (DMCA)
the first major effort to adjust the copyright laws to the internet age p.281
net margin
the percentage of its gross sales revenue the firm is able to retain after all expenses are deducted; calculated by dividing net income or loss by net sales revenue
business to consumer
this type of e-commerce allows a bushiness to sell a product or service to the general public or end users.
consumer to consumer
this type of e-commerce is an electronic version of the classified ads or an auction.
business to business
this type of e-commerceis a manufacturer-supplier relationship.
globilization
to go worldwide in slope and approximation; a consumer can access the internet form anywhere at anytime
Knowledge management uses knowledge
to improve the functioning of an organization.
Shallow Hierarchy
too many sections
stock on hand
too small decreases response time, too large increases cost
Stock on hand
too small/ decreases response time, too large increases cost
edu
top level domain
if you're a ford dealer and you put "honda" in your metatags, you'll violate what law
trademark
what's the name of the gov protection of certain words, symbols or devises or a combo
trademark law
2 service industries categories
transaction brokers and hands on service providers
clickstream behavior
transaction log that consumers establish as they move about the web pg. 216
FTP (File Transfer Protocol)
transferring of information from one computer to another
true or false: in general online targeted ads are 4-10 times more effective than nontargeted ads
true
true or false: many of the rev models for online entertainment industry are the same rev models used in the online content provider models
true
true or false: under the library project contreversy with google books stems from scanning university texts and providing snipppets to customers for free and scanning public texts whose copywrite protections have expired
true
true
true of false: prior to the introduction for eh world wide web in 1991, the internet was all text- no graphics, animations, sound or video.
public key cryptography
two mathematically related digital keys are used: a public key and a private key. The private key is kept secret by the owner and the public key is widely disseminated. Both keys can be used to encrypt and decrypt a message.However, once the keys are used to encrypt a message, that same key cannot be used to encrypt the message. p.182
bot
type of malicious code that can be covertly installed on a computer when attached to the internet. Once installed, the bot responds to external commands sent by the attacker. p171
exchange
type of net marketplace. independently owned online marketplace that connects hundreds to potentially thousands of suppliers and buyers in a dynamic, real-time environment. Makes money by commision on each trade.
virtual currency
typically circulates within an internal virtual world community or is issued by a specific corporate entity, and used to purchase virtual goods p.196
liquidity
typically measured by the number of buyers and sellers in a market, the volume of transactions, and the size of transactions
liquidity
typically measured by the number of buyers and sellers in a market, the volume of transactions, and the size of transactions.
Hacking
unauthorized access to computer systems for the purpose of stealing and compiling data
doctrine of fair use
under certain circumstances, permits use of copyrighted material without permission p.280
PNG
another file format for pictures
applause ratio
number of Likes or Shares per post pg. 246
conversion ratio
number of comments produced per post pg. 245
unique visitors
number of distinct, unique visitors to a site
hits
number of http requests pg. 243
amplification
number of re-tweets or re-shares per post pg 246
impressions
number of times an ad is served pg. 243
service occupations
occupations concerned with performin gtasks in and around households, business firms, and institutions
data breach
occurs when an organization loses control over its information to outsiders p.174
communicating
of all the activities on the internet, ____ is the most popular.
linear video ad
Pre-roll; takeover; ad takes over video for a certain period of time.
B2B (Business to Business)
Sales, buy, and trade between businesses
**Table 8.7, p 519) The FTC's New Privacy Framework
Scope Privacy by Design Simplified Choice Great Transparency
What are the main points of the Open Data: Why the Crowd Can Be Your Best Analytics Tool article?
Sean Gorman=president and founder of FortiusOne (:brings data and mapping solutions to the mass market through location analysis software) -FortiusOne's GeoIQ platform: geo-enabled data easily shared, visualized & analyzed for more collaborative and better-informed decisions -"data science" and a plethora of new tools to deal with the size and speed of information: Ex:Hadoop, Hbase, Cassandra, MongoDB, NodeJS, Hive, R, and Pig -data mining: social media, financial, CPG, marketers, & gov'ts -challenges: keep track of the many permutations that it creates, know what bits are meaningful and validated; moviing beyond just counting and binning the data, and answer more meaningful questions for businesses -projects like OpenStreetMap replacing NAVTEQs of world -future value will be meaningful questions we can answer with data
Organic or natural search
Search engine results returned and ranked according to relevance
one-to-one marketing
Segmenting the market based on a precise and timely understanding of an individual's needs, targeting specific marketing messages to these individuals, and then positioning the product vis-a-vis competitors to be truly unique. pg. 239
Wholesalers
Sell to distributors or retailers and not usually to the consumer.
One-to-Many
Sell-side, One major supplier to a others
price matching
Sellers agree informally or formally to set floor prices on auction items below which they will not sell.
price discrimination
Selling products to different people and groups based on their willingness to pay.
Versioning
Selling the same good, but with different selection and delivery characteristics
automated response system
Sends e-mail order confirmations and acknowledgments of e-mailed inquiries.
psychological profile
Set of needs, drives, motivations, perceptions, and learned behaviors.
URL (Uniform Resource Locator)
The technical term for a web address:
Inline Graphic
a graphic that appears within a line of text
Hierarchy
a graphical structure that flows from the most important or most general to the most specific
Balanced Hierarchy
a hierarchical tree that facilitates quick access to information and helps users understand how you have organized content
Linear Hierarchy
a hierarchy that is viewed sequentially in a line one right after the other
javascript
a language called _____ is often used to trigger simple interactive features on web pages.
Catalog
a listing of goods or services that may include photographs or descriptions
Trademark
a mark used to identify and distinguish goods and indicate their source p.284
ISP services
provide web access and email for a monthly fee
inventory management
relies on how well a seller manages the product inventory
digital signature (e-signature)
"signed" cipher text that can be sent over the internet p.183
Third-party cookies
"tracking cookies" -served by ad networks or other customer profiling firms -used to identify users and record behavior across multiple Web sites
strategy initiation
#1 company analysis, value proposition, competition, mission, objectives, opportunities
strategy formulation
#2 planning, cost-benefit, budget, risk analysis, business plan
strategy implementation
#3 project plan, resource allocation, scheduling teams (what, who, when, where)
strategy assessment
#4 monitor performance, compare, assess, improve, or adjust
Online Retail Sector
$10.7 trillion out of our $15 trillion economy is online retail
net margin
% of its gross sales revenue the firm is able to retain after all expenses are deducted: calculted by net income or loss/net sales revenu
Top 10 Social Network sites
(in order from 1-10) -Facebook -LinkedIn -Twitter -Myspace -iVillage -MyLife -Tumblr -Classmates.com -Tagges -hi5
Private Industrial networks
**largest part of B2B E-Comm -the foundation of the "extended enterprise", allowing firms to extend their boundaries and their businesses processes to include supply chain and logisitics partners -DEF: web enabled network for the coordination of trans-organizational business processes
With respect to eCommerce taxation, be able to compare and contrast the following: Internet Tax Freedom Act (1998), Streamlines Sales Tax Project (SSTP) (2002), Internet Tax Nondiscrimination Act (2004)
- Internet Tax Freedom Act (1998) Placed a moratorium (delay) on 'multiple or discriminatory taxes on electronic commerce' and on taxes on internet access. - Streamlined Sales Tax Project (SSTP) (2002) Streamlining and simplifying rules on ecommerce sales tax. Consistent for every state. - Internet Tax Nondiscrimination Act (2004) Prevents taxes on internet useage
Electronic Data Interchange EDI
- communications protocol for exchanging does among computers using technical standards developed by the American National Standards Insititute and international bodies such as the UN -developed to reduce costs, delays and errors inherent in the manual exchanges of documents such as purchase orders, shipping documents, price lists, payments and consumer data
Advantages of Online Retail
- lower supply chain costs - lower costs of distribution -ability to reach and serve a much larger geographic group -react quickly to consumers tastes and demands -change prices nearly instantly -rapidly change visual presentation of goods -avoidance of direct marketing costs of catalogs and physical mail -increase opportunities for personalization -improve info and knowledge delivered to consumer -lower consumers' overall market transaction costs
Amazon's Financial Services
-free shipping on orders over $25, able to do this by focusing on operating expenses and eliminating marketing in offline magazine and TV -relies heavily on affiliates and third party merchs
Online Travel Services
-$400 billion to GDP -more travel is booked online than off
What are the main points of the A Different Game article?
-1879: James Ritty: "incorruptible cashier"=National Cash Register (NCR):reduced pilferage & provided instant overview of business -Sales Data= one of most important assets: BI: only for biggest companies--> mainstream: able to talk to each other, get complete picture of operations, pick out trends, and improve forecasting (all increasingly in real-time!) -IT industry piling into BI of 20th century: Accounting then computing firms (Tech firms are happy :D) -must improve accuracy of info to avoid double-counting Ex: inventory-management system=Retail Link (:leaves stock management in hands of suppliers & doesn't take ownership of goods til moment sold--> shed inventory risk and reduce its costs); Li & Fung (:one of world's biggest supply-chain operators) w/ new web services platform that speeds everything up!, agents audit factories in real-time, & clients monitor details of every stage of order -one of most important tech=videoconferencing (:real-time images) -new awesomeness=cloud computing and open-source software -R=free programing language for big data sets; Hadoop allows ordinary PCs to analyze huge quantities of data previously required by supercomputer
What are the main points of the Clicking for Gold article?
-Amazon: Data mining! Invasion of privacy!: tracks purchases and browsing history to recommendation other books to consumer Ex: FB, eBay, and Google! -fears about consumer unease & unwelcome attention from regulations -data from: purchases, surveys, happenings on site, etc. test new features b4 implementation! -Google:1) vote w/ mouse: PageRank, open to link spam abuse, 2) Wizard spelling: spell-check in almost every language, translation (:over 50 languages) & voice recognition (AI), 3) feedback loop=critical; recycling data exhaust=common; Data Liberation Front: reduce consumer's barriers to exit
What are the main points of the Triangulate case?
-B2B--> B2C--> Wings (got rid of wingmen) -industry: 40 million users total, only 4 million paying customers -mission: one-click dating service: auto-add info based on computer use, 1) ensure it's loved!, 2) valid business model -market: California!: features from other dating sites, dummy photo, survey top 200, customer feedback button,, and usertesting.com -porter's 5 forces: new entrants, power of suppliers (:FB, Netflix, Linked-In), power of buyers (:consumers), substitutibility (:real-life dating, spreed dating), competitive rivalry (:eHarmony-$60/month, match.com-$30/month, Zoosk-$25/month & a la carte) -Team: 2 yrs. & if last, get share of company; 10,000 options that VEST over 5 yrs. (CEO: Sunil Nagaraj) -Measurement: coin usage (:conversion ratio), user base (:customer lifetime value (CLV)), user acquisition (:cost per acquisition (CPA)), virality (:# of invitations, virality coefficient), user engagement, & user quality -Burn rate: $50k/month how fast blow money
Trends in Online Placement Services
-Consolidation -Diversification -Localization -Job search engines/aggreggators -Social Network -Mobile
What can you do with a social network?
-Email, chat, message board, instant messaging -interact with people with common interests or ties -removes geographic and time limitations of offline social networks
Online Banking and Brokerage
-Established brand-name national banks have taken substantial lead in market share -Over 100 million people use online banking; expected to rise to 192 million by 2013 -Early innovators in online brokerage (E*Trade) have also been displaced by established brokerages (Fidelity, Schwab)
How do you create an if statement in Excel?
-If a student has a Facebook account AND a Twitter account, his SN activity is "HIGH" -If a student has a Facebook account OR a Twitter account, her SN activity is "MEDIUM" -If neither of the above statements is true, the student's SN activity is "LOW": =IF(AND(A5="Yes",B5="Yes"),"HIGH",IF(OR(A5="Yes",B5="Yes"),"MEDIUM","LOW")) ... =COUNTA(Range) vs. =COUNT(Range)
What are the main points of the How Obama's Data-Crunching Prowess May Get Him Re-Elected article?
-In the mechanics of identifying voters, President Obama's team is ahead of GOP rivals -Obama's re-election campaign is the only one doing cutting-edge work with data President's operation uses a powerful social-networking tool called NationalField: enables everyone to share what they're working on, connects all levels of staff & users can share qualitative information, Higher-level staff get broader view of state and local work below them -GOP presidential campaigns don't fully understand power of data crunching -Facebook page; Obama 2012 - Are You In? FB app: geo-targeting of ads down to ZIP code -devising new kind of social intelligence that will help drive campaign resources where they're most needed -'Data harmonization'=holy grail of data -Power of personal connections: users on my.BarackObama.com: the campaign's social networking platform where users create own personalized fundraising campaigns -Since 2008: base on Facebook has soared
Pieces of Collaborative Puzzle
-Industry wide collab resource planning -forecasting and replinshment -product design -marketing coordination -demand chain visibility -supply chain visibility
Strategic Analysis Factors
-Key industry strategic factors Barriers to entry Power of suppliers Power of customers Existence of substitute products Industry value chain Nature of intra-industry competition -Firm-specific factors Firm value chain Core competencies Synergies Technology Social and legal challenges
Benefits of Electronic Auctions
-Liquidity: sellers can find willing buyers and vice versa -Price Discovery: Buyers and Sellers can quickly and efficiently develop prices for items that are difficult to assess, depends on supply and demand - Price transparency: allow everyone in the world to see the asking and bidding prices for items -Market efficiency -Lower transaction costs -Consumer aggregation -Network effects
B2C success factors
-Location and time aren't a factor -Selection & Value -Performance and service -Look and feel -security and reliability
B2B marketplaces
-One-to-many -Many to One Some-to-Many Many-to-Some Many-to- Many
Forms of media and how they're delivered to people
-Online traditional entertainment= produced by professional entertainers and producers -User Generated: voluntarily made my individuals and submitted online to their personal social networks or websites such as YouTube
two categories of service industries
1. transaction brokers 2. hands-on service provides features: knowledge and information intense, amount of personalization and customization
Critically evaluate the risks and challenges of businesses that Google, Microsoft, and other firms are entering.
-Some privacy advocates have voiced concern over how much info Google handles: what if security breach/error -Google's software is based on open standards; competitors have a choice in ad networks, search engines, and other services; switching costs are relatively low; users and advertisers aren't locked into exclusive contracts for the firm's key products and services; and there is little evidence of deliberate, predatory pricing or other "red-flag" activity that usually brings government regulation
Amazon's Strategic Analysis-Technology
-Spent over $1.7 billion on technology in 2010 -transaction processing systems -site management, search, customer interactions, and recommendations -Kindle and Kindle Fire
What are the main points of the Open Society article?
-State=biggest generator, collector, & user of data: Until recently=locked tight -Public.resource.org puts gov't data online -Obama issued memorandum ordering heads of fed. agencies to release as much data as possible to public--> all on data.gov--> accountability -anyone can "play": greater openness Ex: Crown copyright prevents most gov't data in Britain & Commonwealth countries=state's property only! vs. U.S.: access to gov't info restricted by financial barriers--> Administrative Office of US Courts (AOUSC) charges all (even themselves) 8 cents/legal doc. --> paying to get docs. online; Google provides some legal docs. online -Change Agent: new transparency requirements used by gov't & public to hold private sector accountable -debate over whether gov'ts should merely supply raw data/get involved in processing & displaying them too
Financial Analysis Factors
-Statements of Operations Revenues Cost of sales Gross margin Operating expenses Operating margin Net margin Pro forma earnings -Balance sheet Assets, current assets Liabilities, current liabilities and long-term debt Working capital
Players in the entertainment industry
-TV -Motion pictures -Video games -Radio -Music
Online Placement Services (Recruitment Sites)
-automatic flow of information, reducing search time, and costs for all parties -save time and money -expand reach -establish market prices and terms and trends in labor market
Challenges of Online Retail
-consumer concerns about the security of transactions -privacy of personal info given to the Web sites -delays in delivery -inconvenience of returning damaged goods -lack of consumer confidence -added expenses for online photography, video and animated presentations -online marketing costs for search, email and displays -added complexity -greater customer info can translate into price competition and lower profits
Risks of Online Auctions
-delayed consumption costs -Monitoring costs -Equipment costs -Trust risks -Fulfillment costs
Characteristics of Private Industrial Networks
-developing efficient purchasing and selling business processes industry-wide -developing industry-wide resource planning
Advantages of Virtual Merchants
-don't have to bear the costs of building and maintaining physical stores -low gross margins -adopt low costs and convenience strategies -extremely effective and efficient -fulfillment processes to ensure fast delivery
7 Segments of Retail Industry
-durable goods=goods consumed over time -general merchandise -food and beverage -specialty stores -gasoline and fuel - mail order/telephone order ( MOTO) -online retail firms *largest segment is consumer durables followed by general merchandise
Amazon's Strategic Analysis- Competition
-eBay, multichannel retailers (Walmart, Sears and JCP), catalog merchs (LL Bean), also other book stores.
4 Factors required to charge for online content
-focused market -specialized content -sole-source monopoly -highly perceived net value
Amazon's Strategic Analysis- Social and Legal Challenges
-lawsuits for patent infringement etc
What are the main points of the Data, Data Everywhere article?
-lots of DATA!: Big Data=industrial revolution of data -possible to: spot business trends, prevent diseases, combat crime, astronomical discoveries, etc. -problems: info exceeds available storage space, & data security & protecting privacy issues -Moore's Law: processing power & storage capacity of computer chips double/ their prices double about every 18 months; capabilities of digital devices soar & prices fall -more ppl interact w/ info: recent financial crisis sparked by big data! :O -raw materials of business -data exhaust: trail of clicks left by users that's value is extracted Ex: Google's search engine extracts this
Content Revenue Models
-marketing -advertising -pay-per-view/download -subscription -and a mix of all of the above
Challenges of Virtual Merchants
-must build a business from scratch, quickly in an entire new channel and confront many virtual merch competitors -learning curve is steep -customer acquistion costs are high -must achieve highly efficient operations in order to preserve a profit
Amazon's Vision
-offer 3 things: lowest prices, best selection and convenience -shopping portal and product search portal -become of the Web's largest suppliers of merch and search services
Describe the infrastructure that powers Google and how its scale and complexity offer key competitive advantages.
-operates from a massive network of server farms containing hundreds of thousands of servers built from standard, off-the-shelf items -cost of the operation is a significant barrier to entry for competitors -reasons driving online ad growth trends: (1) increasing user time online, (2) improved measurement and accountability, and (3) targeting -Pull (instead of push) Advertising, Pricing Method (CPC instead of of CPM), Selling Strategy (auction instead of Prices), & Ad Networks (AdSense)
How do ad networks provide advertiser reach and support niche content providers?
-reaches more potential advertisers as possible customers across more web sites--> attracts more advertisers -increases: prices of advertising, # of ads served, accuracy of user targeting, network effects, & revenue
Online Career Services
-recruitment sites -CareerBuilder and Monster
What are the the mechanics of search, including how Google indexes the Web and ranks its organic search results?
-searches databases, not the actual web -sends "spiders" to crawl the web -use PageRank algorithms to determine the order of organic search results -sites with more pages linking to them are ranked higher
What is demand shaping and supply chain profitability?
-shaping demand according to in-house supply w/ promotions, etc. - P=R-C: Profit=Revenue-Costs
Link fraud
-spamdexing/link farming -process of creating a series of bogus Web sites, all linking back to the pages one is trying to increase pg. results in organic search
Online Financial Services
-storage of and access to funds -Protection of assets -growth -movement of funds (payment)
Accounting/Finance
This function plans and manages financial resources and maintains the records and information related to the business
What are Google's mission statement and unofficial motto?
-to organize the world's info & make it universally accessible & useful -Don't be evil!
auctions
...
content convergence
...
dynamic pricing
...
industry convergence
...
online content revenue models--Marketing: tide.com
...
online content revenue models--Mixed: MSN
...
online content revenue models--Subscription: bandora, spotify, rhapsody
...
online content revenue models--advertising: yahoo
...
online content revenue models--pay-per-view/pay-for-download: apple itunes store
...
technological convergence
...
5 types of e-books
1. web accessed (can only be read on publisher's website with a subscription fee) 2. web downloadable 3. dedicated (kindle) 4. general purpose (like a smartphone) 5. print on demand (custom published- can print and bind)
What are the Porters Models?
1) Industry Structure: Potential new Entrants, power of buyers, power of suppliers, threat of substitutes, and rivalry 2) Competitive Strategy: Cost/Differentiation vs. Industry-wide scope/Focused scope--> lowest cost/better g/s vs. across industry/within industry segment 3) Value Chains: [Secondary:] infrastructure: general management, planning, finance, IS; HRM: recruiting, hiring, training, & development; Technology: R&D; Procurement; [Primary:] Inbound Logistics--> Operations--> Outbound Logistics--> Marketing & Sales--> Service/Support 4) Business Processes: how company operates business/ does activity 5) Information Systems: [Computer Side:] Hardware--> Software--> Data (:Bridge)--> [Human Side:] Process--> People Actors: Hardware & People Instructions: Software & Process <--: Automation -->: difficulty of change
3 challenges to making a profit in online retail
1.central/accessible location 2.high prices to cover costs 3.highly efficient inventory system
what percentage of online sales are attributed to online research, blogs, banner ads, and other internet exposure?
1/3
4 stages of electronic data interchange (EDI)
1. 1970s-80s document automation 2. early 1990s document elimination 3. mid 1990s move toward continuous replenishment/access model 4. edi provides for exchange of critical biz info between computer applications supporting wide variety of business processes
Ethernet Speed
10 Mybtes per second, the speed at which the data is transported
What are two internet risks to businesses?
1. IP Spoofing 2. DoS attacks
keywording
Using trademarks as keywords on search engines in a misleading or confusing manner.
Five Step Process of Analyzing Ethical Dilemmas
1. Identify and clearly describe the facts 2. Define the conflict or dilemma and identify the higher-order values involved 3. identify the stakeholders 4. Identify the options that you can reasonably take 5. Identify the potential consequences of your options
5 online content revenue models
1. marketing (free content drives offline revenues- tide.com) 2. advertising (fee content paid for by advertising- yahoo.com) 3. ppv (charge for premium content- itunes) 4. subscription (monthly charges- rhapsody) 5. mixed (msn)
Etail Sectors
1. Amazon 2. Financial Services-Banking, Mortgages, Insurance, Real Estate 3. Travel 4. Recruitment/employment
What are some controls to mitigate these risks?
1. multi-factor authentication 2. strong passwords 3. anti-virus software 4. intrusion detection system
Ecommerce Retail assumptions
1. reduced search and transaction costs, consumers find lowest prices, 2. lowered market entry costs, lower operating costs, higher efficiency 3. traditional physical store merchants forced out of business 4. some industries disintermediated --> assumptions not all true
Double Spending
_____ is spending a particular piece of electronic cash twice by submitting the same electronic currency to two different vendors.
Trends in Online Retail
1. Growth in social shopping 2. Online retail remained profitable during recession 3. Online retail still fastest growing retail channel 4. Buying online a normal, mainstream experience 5. Selection of goods increases, includes luxury goods 6. Informational shopping for big-ticket items expands 7. Specialty retail sites show most rapid growth
two major segments of online travel
1. Leisure/unmanaged business travel 2. Managed business travel - expected to offer greater growth opportunities
Top online growth scenarios
1. Most significant online growth: Offline general merchandiser giants extending brand to online channel 2. Second area of rapid growth: Specialty merchants with high-end goods, e.g. Blue Nile
What are two types of firewalls?
1. Network level firewalls 2. Application level firewalls
Types of Integration
1. Online order, in-store pickup 2. In-store kiosk or clerk Web order, home delivery 3. Web promotions to drive customers to stores 4. Gift cards usable in any channel
What are three common types of DoS attacks?
1. SYN flood attack 2. Smurf attack 3. DDos attack
What are the 3 primary services of cloud computing?
1. SaaS- host applications over a network 2. IaaS- provision of computing power and disk space to firms who access it from desktop PC's 3. PaaS- enables firms to develop and deploy onto the cloud infrastructure their consumer-generated applications using vendor-provided facilities
What are 5 Internet Protocols and what do they govern?
1. TCP/IP- basic communication of the internet 2. HTTP- web browsers 3. FTP - used to transfer files across the internet 4. Simple Mail Transfer Protocol- email 5. Secure electronic transmission- encryption schemes for credit card transactions
Candidate Ethical Principles
1. The Golden Rule: due unto others as you would have them do until you. putting yourself into the place of others and thinking of your self as the object of the decision can help you think of fairness in decision making 2. Universalism: if action is not right for all situations, it is not right for any specific situation. if we adopted this rule in every case, could the organization or society survive? 3. Slippery Slope: if an action cannot be taken repeatedly, then it is not right to take it at all *descartes rule of change), once started down a slippery path you might not be able to change 4. Collective Utilitarian Principle: take the action that achieves the greater value for all of society. this rule assumes you can prioritize values in a rank order and understand the consequences of vaious courses of action 5. Risk Aversion: take the action that produces the least hard, or lease potential costs; some actions have high failure costs or high failure cost actions 6. No Free Lunch: assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise. if something someone else has created is useful, you should assume the creator wants compensation 7. The New York Times Test (Perfect Information Rule): assume whatever you do will be on the front page; assume perfect information markets 8. The Social Contract Rule: would you like to live in a society where the principle you are supporting would become an organizing priciple of the entire society?
4 E-tail Business Models
1. Virtual merchant --Amazon 2. Bricks-and-clicks --Wal-Mart, J.C. Penney, Sears 3. Catalog merchant --Lands' End, L.L. Bean, Victoria's Secret 4. Manufacturer-direct --Dell
What are the advantages of EDI? (5)
1. reduction/elimination of data entry 2. reduction of data keying errors, human interpretation, and classification errors 3. reduction of paper 4. reduction of paper processing and postage 5. reduction of inventories
What are 4 areas of concern to internet consumers?
1. theft of credit card numbers 2. theft of passwords 3. consumer privacy 4. identity theft
Benefits of E-commerce? (5) KNOW THIS
1. access to worldwide customer/supplier base 2. reductions in inventory investment/ carrying costs 3. rapid creations of business partnerships 4. reductions in retail prices through lower marketing costs and procurement costs 5. better customer service
Cloud computing issues?
1. already large investment in infrastructure 2. mission critical functions running on legacy systems 3. no interest in a one-size-fits-all mentality 4. internal control and security issues
2 important global trends in financial service industry
1. consolidation 2. movement toward integrated financial services
What are 4 areas of e-commerce risk?
1. data security 2. business policies 3. privacy 4. business process integrity
What is e-commerce? (6)
1. electronic buying and selling of goods and services 2. on line delivery of digital products 3. direct consumer marketing 4. EFT 5. electronic trading of stocks 6. electronic data interchange
What functions do protocols perform? (5)
1. facilitate PHYSICAL CONNECTION 2. synchronize TRANSFER OF DATA 3. provide a basis for ERROR CHECKING and measuring network PERFORMANCE 4. promote COMPATIBILITY 5. Promote network DESIGNS that are flexible, expandable, and cost-effective
What are 4 key features of cloud computing?
1. firms can acquire IT resources on demand and as needed 2. resources are provided over a network and accessed through network terminals at the client location 3. acquisition of resources is rapid and infinitely scalable 4. computing resources are pooled to meet the needs of multiple client firms
4 factors required to charge for online content
1. focused market 2. specialized content 3. sole source monopoly 4. high perceived net value
5 types of social networks
1. general (general audiences organized into general topics- FB) 2. practice (focused discussion groups, help, info- home schooling) 3. interest (focused discussion groups based on a shared interest in a specific topic- harley) 4. affinity (focused discussions and interaction with other people who share the same self or group identification- Blackplanet) 5. sponsored (created for pursuing organizational (and often commercial) goals- Nike
How does a company build a perception of integrity? (2 part approach)
1. implement the technology infrastructure and controls to provide adequate security 2. Adequate safeguards are in place and monitored- data encryption, digital authentication, and firewalls
4 major categories of issues
1. info rights (what rights to their own personal info do people have in a public marketplace) 2. property rights (how can intel property rights be enforced) 3. governance (should internet be subject to public laws) 4. public safety and welfare (what efforts should be taken for equal access to internet)
What are the three business models and what do they mean?
1. information- info about the company 2. transaction- can place orders with customers/suppliers 3. distribution- can deliver digital products to customers over the internet
What are 4 Intranet risks?
1. intercepting network messages; sniffing 2. access to corporate databases 3. privileged employees- may allow unauthorized access to mission critical data 4. reluctance to prosecute
Amazon's Business Model
2 segments= North American and International -serves not only retail customers BUT also merchants and developers ALSO, third party merchant segment= enables third parties to integrate their products into their website and use their cutsomer technologies -Amazon Web Services
_to_% consumers substitute online entertainment for traditional
20-30
Cybervandalism
_____ is the electronic defacing of an existing Web site's page.
Retail industry segments
8
Animated GIF
A GIF based graphic file that moves
Know-how
A Know-how is a term for practical knowledge on how to accomplish something, as opposed to "know-what" (facts), "know-why" (science), or "know-who" (communication). Know-how is often tacit knowledge, which means that it is difficult to transfer to another person by means of writing it down or verbalising it
Cybervandalism
_____ is the electronic defacing of an existing Web site's page. p.174
Authenticity
A Web server can compromise _____ when it allows automatic directory listings.
Authenticity
A Web server can compromise _____ when it allows automatic directory listings. p.168
Postimplementation Audit
A _____ is a formal review of a project after it is up and running.
Catalog
A _____ is a listing of goods and services.
Smart Card
A _____ is a stored-value card that is a plastic card with an embedded microchip that can store information.
Charge Card
A _____, offered by companies such as American Express, carries no spending limit, and the entire amount charged to the card is due at the end of the billing period.
e-commerce
_____ is the general term to describe the buying and selling of goods on the internet.
over 84 million
How many Americans will have internet access in 2009?
business case
A business plan for a new initiative or large, new project inside an existing organization
Smart card
A card with a microchip embedded containing data that can be programmed for various applications
consumer behavior models
Predict wide range of consumer decisions; based on background demographic factors and other intervening, more immediate variables.
real-time customer service chat systems
A company's customer service representatives interactively exchange text-based messages with one or more customers on a real-time basis.
advertising networks
Presents users with banner advertisements based on a database of user behavioral data.
data warehouse
A database that collects a firm's transactional and customer data in a single location for offline analysis.
view-through rate
Measure the 30-day response rate to an ad. pg. 243
customer profile
A description of the typical behavior of a customer at a Web site.
Client-Side
A disadvantage of _____ wallets is that they are not portable.
liability
A feature of political systems in which a body of law is in place that permits individuals to recovers the damages done to them by other actors, systems, or organizations.
online marketing communications
Methods used by online firms to communicate to the consumer and create strong brand expectations.
Computer Security
_____ is the protection of computer assets from unauthorized accessed, use, alteration, or destruction.
commodity
A good or service for which there are many dealers supplying the same product, and all products in the segment are essentially identical.
Privacy
_____ is the protection of individual rights to nondisclosure.
WSDL
_____ is used to describe the characteristics of the logic units that make up specific Web services.
Deep Hierarchy
A hierarchy with too many menu-selections, becomes a navigational nightmare for the user
E-cash
A legal form of computer based currency that allows for the purchase of items by credit card, check or money order
Cookie
A line of identifying text, assigned and retrieved by a given Web server and stored by your browser
Scrip
_____ is/are digital cash mired by a company instead of by a government.
balanced scorecard
A management tool that assesses organizational progress toward strategic goals by measuring performance in a number of different areas
Collective Mark
A mark used in commerce by the members of an association
trademark
A mark used to identify and distinguish goods and indicate their source.
platform for privacy preferences
A standard designed to communicate to Internet users a Web site's privacy policy, and to compare that policy to the user's own preferences, or to other standards such as the FTC's FIP guildelines or the EU Data Protection Directive.
Search Engine Marketing (SEM)
A marketing tactic that, when combined with SEO, helps a business or organization attract customers, generate brand awareness, and build trust by increasing its website's visibility
Resolution
Describes how many pixels are displayed on your screen
Fair use Rule
Describes when and how much of a copyrighted work may be copied or used in another report
technological convergence
Development of hybrid devices that can combine the functionality of two or more existing media platforms into a single device.
enterprise resource planning system
A more sophisticated MRP system that includes human resource and financial components.
Internet & Business
Direct communications round the clock service reduce trans cost extended distribution channels
Trademarks
A name, symbol or other device identifying a product, officially registered and legally restricted to the use of the owner or manufacturer.
online advertising
A paid message on a Web site, online service, or other interactive medium. pg.220
Health club
A place of business with equipment and facilities for exercising and improving physical fitness; example of a service retailer
Home Page
A point of entry into a website
due process
A process in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws have been applied correctly.
Trojan Horse
A(n) _____ is a program hidden inside another program or Web page that masks its true purpose. p.171
safe harbor
A private self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement.
Safe Harbor
A private self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulations or enforcement
augmented product
A product with additional benefits to customers beyond the core benefits embodied in the actual product.
App
A program or add-on that increases user interaction
Applet
A(n) _____ is a small application program.
Active X Control
A(n) _____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.
Virus
A(n) _____ is software that attaches itself to another program and can cause damage when the host program is activated.
Virus
A(n) _____ is software that attaches itself to another program and can cause damage when the host program is activated. p.171
Transaction Processing
_____ occurs when the shopper proceeds to the virtual checkout counter by clicking a checkout button.
customer relationship management system
A repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to "know the customer."
superstitial
A rich media ad that is pre-loaded into a browser's cache and does not play until fully loaded and the user clicks to another page.
Account Manager
A(n) _____ keeps track of multiple Web sites in use by a project or keeps track of the projects that will combine to create a larger Web site.
data mining
A set of analytical techniques that look for patterns in the data of a database or data warehouse, or seek to model the behavior of customers.
brand
A set of expectations that consumers have when consuming, or thinking about consuming, a product or service from a specific company.
brand strategy
A set of plans for differentiating a product from its competitors, and communicating these differences effectively to the marketplace.
dedicated e-book reader
A single-purpose device with a proprietary operating system that can download from the Web and read proprietary formatted files created for that device.
Commerce Service Providers
_____ often offer Web server management and rent application software to businesses.
One the most successful b2c ecommerce segments
TRAVEL with almost 25% in 4 yrs, more convenience than traditional travel agents for consumers, for suppliers is a singular, focused customer pool that can be efficiently reached thru onsite advertising
video ads
TV-like advertisement that appears as an in-page video commercial or before, during, or after content pg. 226
database
A software application that stores records and attributes.
database management system
A software application used by organizations to create, maintain, and access databases.
Search engine
A software program you can use to find Web sites, Web pages, and Internet files
metric
A specific, measurable standard against which actual performance is compared
closed loop marketing
When marketers are able to directly influence the design of the core product based on market research and feedback from the market.
scenario planning
A strategic planning methodology that generates plausible alternative futures to help decision makers identify actions that can be taken today to ensure success in the future
competitor analysis grid
A strategic planning tool that highlights points of differentiation between competitors and the target firm
Automated Clearing House
ACH is short for _____.
Dynamic online catalog
employs sophisticated database software that quickly retrieves and updates data such as inventory ability.
Materials requirement planning system (MRP)
enables companies to predict, track, and manage all the constituent parts of complex manufactured goods
Anti-Aliasing
A technique for diminishing edges of a pixelated graphic
deep packet inspection
A technology for recording every key stroke at the ISP level.
Cost-plus
Adding up all the costs involved, such as material, labor, rent, overhead, etc., and adding a percentage mark-up as profit
frequently asked questions
A text-based listing of common questions and answers.
strategy map
A tool that delineates the relationships among the key organizational objectives for all four BSC perspectives
Trade Secrets
A trade secret is a formula, practice, process, design, instrument, pattern, or compilation of information which is not generally known or reasonably ascertainable, by which a business can obtain an economic advantage over competitors or customers
Midrange
_____ packages allow the merchant to have explicit control over merchandising choices, site layout, internal architecture, and remote and local management options.
full-page spread
Display in which large photos are used to show one or two products.
grid display
Display in which multiple products are shown in very small postage-stamp photos.
banner ad
Displays a promotional message in a rectangular box at the top or bottom of a computer screen. pg 225
psychographic research
Divides a market into different groups based on social class, lifestyle, and/or personality characteristics.
Webinar
A web-based seminar, where the presentation, lecture, or workshop is transmitted over the Internet instead of in person
IP address
A value used to identify a device that is connected to the Internet -usually expressed as four numbers (from 0 to 255), separated by periods
YouTube
A video sharing site where users can freely upload their own video content to the site
Culture
A way of life that includes behaviors, beliefs, and values for a group of people.
interstitial ad
A way of placing a full-page message between the current and destination pages of a user.
Blog
A website or part of a website with posted regular entries of opinion pieces, news, case studies, etc.
Certification Mark
A word or symbol that is used in commerce to certify geographic origin
business plan
A written document that identifies a company's goals and outlines how the company intends to achieve the goals and at what cost
Backdoor
A(n) _____ allows anyone with knowledge of its existence to cause damage by observing transactions, deleting, data, or stealing data.
Backdoor
A(n) _____ allows anyone with knowledge of its existence to cause damage by observing transactions, deleting, data, or stealing data. p.171
Merchant
A(n) _____ bank is a bank that does business with sellers that want to accept payment cards.
Client-Side
A(n) _____ electronic wallet stores a consumer's information on his/her own computer.
Incubator
A(n) _____ is a company that offers start-up companies a physical location with offices, accounting and legal assistance, computers, and Internet connections at a very low monthly cost.
Eavesdropper
A(n) _____ is a person or device that is able to listen in on and copy Internet transmissions.
Project Manager
A(n) _____ is a person with specific training or skills in tracking costs and the accomplishment of specific objectives in a project.
Trojan Horse
A(n) _____ is a program hidden inside another program or Web page that masks its true purpose.
transaction brokering
Acting as an intermediary to facilitate a transaction.
Windows
Active X controls run only on computers with _____ operating systems.
rich media/video ad
Ad employing Flash, DHTML, and Java, and streaming audio and/or video.
personal profiles
Add a personal e-mail address, postal address, and/or phone number to behavioral data.
Promotions
Ads intended to inform potential customers about products or services
social network advertising
Ads on MySpace, Facebook, Youtube, etc.
Interstitials
Ads that run before a user arrives at a Web site's contents
Keyword advertising
Advertisements that are targeted based on a user's query pg. 223
cost per thousand
Advertiser pays for impressions in 1000-unit lots.
cost per action
Advertiser pays only for those users who perform a specific action.
cost per click
Advertiser pays prenegotiated fee for each click an ad receives.
Why Web 2.0 for Business?
Advertising specific to user interests. Ad words and Ad sense
PageRank
Algorithm developed by Google co-founder Larry Page to rank Web sites
Net Neutrality
All internet activities are charged at the same rate regardless of the amount of bandwidth used.
Mobile government is
All of these. (-a value-added service, enabling government to reach a larger number of citizens. -more cost-effective than other IT applications. -convenient to users.)
indirect goods
All other goods not directly involved in the production process.
b2b commerce
All types of computer enabled inter-firm trade.
proxy bidding
Allows the consumer to enter a maximum price, and the auction software automatically bids for the goods up to that maximum price in small increments.
Container Store
Always among the top five on the list of "100 Best Places To Work"
(table 8.12, p 539) E-commerce Patents
Amazon Eolas Technologies Priceline Sightsound Akamai DoubleClick Overture Acacia Technologies Soverain Software MercExchange Google Google Apple
gaming advertising
Downloadable "advergames;" placing brand-name products within games.
catalog merchants
Established companies that have a national offline catalog operation that is their largest retail channel, but who have recently developed online capabilities.
Operational Partners
_____ provide the venture sponsor with knowledge of industry best practices.
Integrity
_____ refers to preventing unauthorized data modification.
online social network
An area online, where people who share common ties can interact with one another.
banner swapping
An arrangement among firms that allows each firm to have its banners displayed on other affiliate sites for no cost.
service industries
Establishments providing services to consumers, businesses, governments, and other organizations.
library effect
An attempt to appeal to consumers on the basis of the total number of products offered.
web-accessed e-book
An e-book stored on a publisher's server that consumers access and read on the Web.
web-downloadable e-book
An e-book that can be downloaded from the Web, stored as a file on the client PC, and perhaps even printed.
Retailers
Establishments that sell goods and services to the general public.
rule-based data mining
Examines demographic and transactional data of groups and individuals at a Web site and attempts to derive general rules of behavior for visitors.
Wal-Mart
Example of discount stores
Banks
Example of service retailers, businesses that help people borrow and save money
Value Added Network
An independent firm that offers connections and EDI transaction services
structured query language
An industry-standard database query and manipulation language used in relational databases.
Network
An inner connected system of things or people; can refer to a social group like Facebook, Twitter, or LinkedIn
lifestyle group
An integrated pattern of activities, interests, and opinions.
Product
An item that is offered or distributed for the consumer to purchase Example: shoes, pencil, television
Avatar
An online picture that's associated with one's social media accounts
6 typical portal revenue sources
ISP services, general advertising, tenancy deals (fixed charge for number of impressions, exclusive partnerships, "sole providers", commissions on sales, subscription fees (charging for premium content), applications and games
internet service provider
ISP stand for _____
anonymous profiles
Identify people as belonging to highly specific and targeted groups.
Active Content
_____ refers to programs that are embedded transparently in Web pages and that cause action to occur.
Geotargeting
Identifying a user's physical location (sometimes called geolocation) for the purpose of delivering tailored ads or other content
Secrecy
_____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.
Knowledge Management
_____ software is designed to help businesses mange the information in documents, rather than the documents themselves.
Component-Based
Application servers are usually grouped into two types: page-based and _____ systems.
advertising exchanges
Arrange for banner swapping among firm.
Dr. Pepper machine
As a vending machine, it is an example of a non-store retailer
current assets
Assets such as cash, securities, accounts, receivable, inventory, or other investments that are likely to be able to be converted to cash within one year.
bid rigging
Bidders communicate prior to submitting their bids, and rig their bids to ensure that the lowest price is higher that it might otherwise be.
clients
end users who want access to data, programs and storage.
public key infrastructure (PKI)
CAs and digital certificate procedures that are accepted by all parties p.186
operating margin
Calculated by dividing operating income or loss by net sales revenue.
Threat
Any act or object that poses a danger to computer assets is known as a _____.
dilution
Any behavior that would weaken the connection between the trademark and the product.
supply chain
Firms that purchase goods, their suppliers, and their suppliers' suppliers.
Personally Identifiable Information (PII)
Any data that can be used to identify, locate, or contact an individual
personally identifiable information
Any data that can be used to identify, locate, or contact an individual.
Macy's
At one time, the largest department store in the world, this company sponsors an internationally famous Thanksgiving Day parade every year
Certificate
Attachment to an electronic message saying who they are
general purpose portals
Attempt to attract a very large general audience and then retain the audience on-site by providing in-depth vertical content.
vertical market portals
Attempt to attract highly focused, loyal audiences with a deep interest in either community or specialized content.
Podcast
Audio programs or recordings that are syndicated online and can be streamed or downloaded.
stickiness
Average length of a time visitors remain at a site. pg. 243
recency
Average number of days elapsed between visits. pg. 245
Auctions: Business-to-Consumer & Consumer-to-Consumer
B2C- auction house sells goods it owns, or controls, using various dynamic pricing models. C2C- auction house is simply an intermediary markt maker, providing a forum where consumers-- buyers & sellers-- can discover prices & trade.
pop-up ad
Banners and buttons that appear on the screen without the user calling for them.
direct marketing
Based on direct mail or phone messages and aimed at segments of the market likely to purchase and which has little variation in price; is most often used for products that can be stratified into different categories.
mass marketing
Based on national media messages aimed at a single national audience and with a single national price; is appropriate for products that are relatively simple and attractive to all consumers in a single form.
browser
HTML formatting instructions are interpreted by the _____.
Different Types of Electronic Merchants
Bricks-and-clicks Catalog merchants Manufacturer-Direct
net marketplaces
Bring together potentially thousands of sellers and buyers in single digital marketplace operated over internet.
private industrial networks
Bring together small number of strategic business partner firms that collaborate to develop highly efficient supply chains.
User Tier
Browsers that request and process web pages
Social Media Marketing
Building network fans, followers, and connections by sharing relevant and interesting content, engaging more people and driving more business
Multi-channel retailers
Businesses that use a variety of methods to sell goods
What makes e-commerce work?
Buyers, Sellers, Market Place, Transaction and Technology
E-commerce
Buying and selling of goods and services over private networks
E-tailing
Buying and selling of retail goods on the Internet.
free products/services
Can be used to build market awareness.
Fault-tolerant
Capable of continuing operation even if a component fails
shopping cart database
Captures all the item selection, purchase, and payment data.
Online Career Services Top Sites
CareerBuilder, Monster - generate over $1bil annually, use traditional and online recruitement
customization
Changing the product, not just the marketing message, according to user preferences. pg. 240
Fair User Considerations to copyright protections
Character of use - nonprofit or education use versus for profit use nature of the work - creative works such as plays or novels receive greater protection than factual accounts ex newspaper accounts amount of work used - a stanza from a poem or a single page from a book would be allowed, but not the entire poem or a book chapter market effect of use - will the use harm the marketability of the original product context of use - a last minute, unplanned use in a classroom versus a planned infringement
Demographics
Characteristics such as age, sex, income, location, etc.
weblining
Charging some customers more money for products and services based on their profiles.
governance
Has to do with social control: Who will control e-commerce, what elements will be controlled, and how the controls will be implemented. p.289
Specialty stores
Have a limited number of merchandise categories; target a specific group of customers
Outsourcing
Hiring another company to provide the outside support for all or part of a project is called _____.
supply chain management systems
Continuously link the activities of buying, making, and moving products from suppliers to purchasing firms, as well as integrating the demand side of the business equation by including the order entry system in the process.
content convergence
Convergence in the design, production, and distribution of content.
Intranet
Corporate LAN or Wan that functions with Internet tech behing company firewall
customer retention costs
Costs incurred in convincing an existing customer to purchase again.
Microsoft
Commerce Server is produced by _____.
Managed
Commerce service providers are also called _____ service providers.
patent trolls
Companies that collect patents and seek to enforce them.
bricks-and-clicks
Companies that have a network of physical stores as their primary retail channel, but also have introduced online offerings.
Home Shopping Network
Company that sells merchandise to audiences who watch the broadcasts and purchase items by phone or internet; Example of a non-store retailer
Transaction Processing
Completing a transaction online
Web Server
Computer that delivers Web pages
seller's lament
Concern that one will never know how much the ultimate winner might have paid, of the true value to the final winner.
federal trade commission
Conducts research and recommends legislation to congress.
Cross-sell hyperlink
Connects customers to a web site that features similar items to the ones currently being viewed
Upsell hyperlink
Connects customers to a website that features similar but more upscale or expensive items.
Hyperlink
Connects you to another location on the same web site or a related web site.
Informed consent,
Consent given with knowledge of all material facts needed to make a rational decision.
informed content
Consent given with knowledge of all material facts needed to make a rational decision.
Web Globalists
Consultants who advise companies on how to design their Web sites for international audiences
versioning
Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices.
Serial Numbers
Creating truly anonymous electronic cash requires a bank to issue electronic cash with embedded _____ such that the bank can digitally sign the electronic cash while removing any association of the cash with a particular customer.
Walgreens
Current tagline is "At The Corner Of Happy And Healthy"
Why does taxation of e-commerce raise governance and jurisdiction issues?
Currently sales tax is only charged on items sold by vendors that have a physical presence in the state of the buyer. The question is whether or not it is fair to tax only those that are unfortunate enough to live in a state that is also houses major vendors.
print-on-demand book
Custom-published book.
query-driven data mining
Data mining based on specific queries.
current liabilities
Debts of the firm that will be due within one year.
anonymous information
Demographic and behavioral information, such as age, occupation, income, zip code, ethnicity, and other data that characterizes your life without identifying who you are.
indirect goods
all other goods not directly involved in the production process
direct e-mail marketing
E-mail marketing messages sent directly to interested users.
Enterprise Resource Planning
ERP is the acronym for _____.
Impression
Each time an ad is served to a user for viewing
Technology used for B2B
Electronic catalog -trading -data interchange -funds transfer
E-checks
Electronic checks that provide a handy way to get payment from customers who do not own or use credit cards
Electronic Payment Process
Electronic funds transfer. Atm's, pay by phone, Paypal
intellectual property
Encompasses all the tangible and intangible products of the human mind.
Technologies and business practices that free the workforce from the constraints of legacy communication and productivity tools such as e-mail describes
Enterprise 2.0.
Federal Trademark Dilution Act
Extends protection to owners of famous trademarks against dilution.
T/F: Disintermediation has occurred bc of Online Retailing
FALSE
What are the main points of the Games and Psychology - Jesse Schell Video (DICE)?
FB=big, strange, & unexpected -lead generation (LG) [ex: sign-up for credits/coins, etc.]>direct payment (DP) -everything about reality: authenticity [greater: raise in value] Ex: Wii, Farmville, Guitar Hero, XBox Achievement, Club Penguin, Mafia Wars, Virtual pets w/ stuffed animal -tech diverges! (exception=iPhone & things that fit in pocket) -games ubiquitous, points, sensors!: tricks to pay attention to ads, yet may inspire us to be better ppl
Chapter 5 Figures and Tables
Figure 5.1 The E-commerce security environment p.168 Figure 5.2 Vulnerable points in an E-commerce transaction p.170 Figure 5.3 An Example of a Nigerian Email Scam p. 173 Figure 5.4 Tools Available to achieve site security p. 181 Figure 5.5 Public Key Cryptography - A Simple Case p. 184 Figure 5.6 Public Key Cryptography with Digital Signatures p.185 Figure 5.7 Digital Certificates and Certification Authorities p.187 Figure 5.8 Secure Negotiated Using SSL/TLS p.189 Figure 5.9 Online Payment methods in the United States p.192 Figure 5.10 How an online credit card transaction works p.193 Table 5.1 Customer and merchant perspectives on different dimensions of e-commerce security p.169
E-Procurement
all purchasing activities plus all the monitoring of elements
B2B commerce
all types of inter-firm trade
Chapter 8 Figures and Tables
Figure 8.1 Composition of the US Retail Industry p.314 Figure 8.2 Online retail and B2C E-commerce are alive and well p.316 Figure 8.3 The growth of online banking p.328 Figure 8.4 Online Travel Services Revenues p.332 Table 8.1 Online Retail: advantages and disadvantages p.317 Table 8.2 retail e-commerce: multi-channel integration methods p.318 Table 8.3 Top online banks: October 2012 p.328 Table 8.4 Major Online Travel Sites p.334 Table 8.5 popular online recruitment sites p.337
Major Service Industry Groups
Finance Insurance Real estate Travel Professional services - legal, accounting Business services - consulting, advertising, marketing, etc. Health services Educational services
Knowledge Management
_____ software often includes powerful search tools that use proprietary semantic and statistical algorithms to help users find the content, human experts, and other resources that can aid them in their research and decision-maing tasks.
ERP
_____ software packages are business systems that integrate all facets of a business, including accounting, logistics, manufacturing, planning, project management, and treasury functions.
branding communications
Focus on extolling the differentiable benefits of consuming the product or service.
paid inclusion
For a fee, guarantees a Web site's inclusion in its list of sites, more frequent visits by its Web crawler, and suggestions for improving the results of organic searching. pg. 223
Imports
Foreign goods that are manufactured in one country and then brought into another country
Input Controls
Form fields that are used to collect data entered by the user
e-checks
allow consumers to write paperless checks
Tabs
Found along the top of a Facebook profile or page, these separate areas of content.
Amazon
Founder= Jeff Bezos -"offer the Earth's biggest selection and to be Earth's most customer-centric company where customers can find and discover anything they may want to buy
4 sectors of online travel
Four major sectors: no less than 40% growth except cruise/tours -Airline tickets -Hotel reservations -Car rentals -Cruises/tours
Other Functionalities of Social Networks
Friends, profiles, storage, membership management *didn't think it was necessary to define these separately
Why does the sale of gambling, cigarettes and drugs over the Internet present such a dilemma when it comes to legal jurisdiction?
Gambling, cigarettes and drugs are typically subject to an excise tax in the United States. If companies off shores sell these products to the US, they can avoid sales and excise taxes.
What are the main points of the Gamers Can Make a Better World - Jane McGonigal Video (TED)?
Games can help solve world's problems w/ epic win in reality -Ex: WOW: lvl-ing up, collaborators, always has something to do -should up hrs. of game-play up;10,000 hrs b4 21 yrs. old & 10,080 hrs. through school up until high school graduation: virtuosos: 1) urgent optimism: attach obstacle w/ positive outlook 2) social fabric: playing together builds relationships more efficiently 3) blissful productivity: happier working hard than hanging out 4) epic meaning: attached to awe inspiring stories -super-empowered indivs., but only believe can change virtual world: not optimal situation -story: Dice games of kingdom of Lydia: alternate day of eating & day of play to get over famine--> 1/2 civilization left in search for diff. world--> saved culture through games Ex: World w/o Oil; Super Strucnt; & Evoke
registration forms
Gather personal data on name, address, phone, ZIP code, e-mail address, and other optional self-confessed information on interests and tastes.
legacy computer systems
Generally are older mainframe and minicomputer systems used to manage key business processes within a firm in a variety of functional areas.
GPS
Global Positioning System
Internet
Global network using protocol, TCP/IP
direct goods
Goods directly involved in the production process.
durable goods
Goods that are consumed over a longer period of time.
nondurable goods
Goods that are consumed quickly and have shorter life spans.
ad nonsense
Google AdSense ads that are inappropriate for content.
Patents
Grant the owner a 20 year monopoly on ideas behind an invention (machines, man-made products, compositions of matter, processing methods). The invention needs to be new, non-obvious and novel.
patent
Grants the owner an exclusive monopoly on ideas behind an invention for 20 years.
Image/display ads
Graphical advertising (as opposed to text ads)
gross margin
Gross profit divided by net sales.
WAI (Web Accessibility Initiative)
Guidelines developed and continually revised since 1999 to ensure that persons with disabilities can access the web
Fast Venturing
In _____, an existing company that wants to launch an electronic commerce initiative joins external equity partners and operational partners that can offer the experience and skills needed to develop and scale up the project very rapidly.
Partial Outsourcing
In _____, the company identifies specific portions of the project that can be completely designed, developed, implemented, and operated by another firm that specializes in a particular function.
Billing
In a shopping cart, clicking the Checkout button usually displays a screen that asks for _____ and shipping information.
Closed Loop
In a(n) _____ system, the card issuer pays the merchants that accept the card directly and does not use an intermediary, such as a bank or clearinghouse system.
Early Outsourcing
In many electronic commerce projects, the company outsources the initial site design and development to launch the project quickly. This approach is called _____.
Enterprise-Class
_____ software typically provides tools for linking to an supporting supply and purchasing activities.
e-procurement net marketplace
Independently owned intermediary that connects hundreds of online suppliers offering millions of maintenance and repair parts to business firms who pay fees to join the marker.
exchange
Independently owned online marketplace that connects hundreds to potentially thousands of suppliers and buyers in a dynamic, real-time environment.
Downstream
_____ strategies can be used to improve the value that the business provides to its customers.
Upstream
_____ strategies focus on reducing costs or generating value by working with suppliers or inbound shipping and freight service providers.
customer co-production
In the Web environment, takes customization one step further by allowing the customer to interactively create the product. pg. 240
Filling Out Online Forms
In the early days of electronic commerce, shoppers deleted items they wanted to purchase by _____.
Merchandising activities
Includes acquiring products to sell, setting prices, displaying products, and making them available for purchase
information privacy
Includes both the claim that certain information should not be collected at all by governments or business firms, and the claim of individuals to control the use of whatever information that is collected about them.
Financial Service Global Trends
Industry Consolidation (banks, brokerage, insurance) and Movement toward integrated financial services
industry consortium
Industry-owned vertical market that enables buyers to purchase direct inputs from a limited set of invited participants.
opinion leaders
Influence the behavior of others through their personality, skills, or other factors.
What are the FOUR moral dimensions of an Internet society?
Information Rights, Property Rights, Public Safety and Welfare, and Governance
e-commerce (seller)
Information about price elasticity
(figure 8.1, p 500) The moral dimensions of an internet society
Information rights: What rights to their own personal info do individuals have? Property rights: how can traditional intellectual property rights be enforced? Governance: should the internet and ecom be subject to public laws and whose jurisdiction? Public safety and welfare: equitable access what efforts should be taken? Mobile commerce form a moving vhicle?? Etc
Opt-out Model (U.S. model)
Informed consent permitting collection of personal information
cyberpiracy
Intent to divert traffic from the legitimate site to an infringing site.
_____ was initially launched by a student at Harvard University for college students in 2004.
private industrial networks (private trading exchange)
Internet based communication environments that extend far beyond procurement to encompass truly collaborative commerce
Micropayments
Internet payments for items costing from a few cents to approximately a dollar are called _____.
social network
Involves a group of people, shared social interaction, common ties among members, and people who share an area for some period of time.
Deep Linking
Involves bypassing the target site's home page and going directly to a context page
deep linking
Involves bypassing the target site's home page, and going directly to a content page.
framing
Involves displaying the content of another Web site inside your own Web site within a frame or window.
Framing
Involves displaying the content of another website inside your own website within a frame or window
contract purchasing
Involves long-term written agreements to purchase specified products, under agreed-upon terms and quality, for an extended period of time.
spot purchasing
Involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers.
Cybersquatting
Involves the registration of an infringing domain name, or other internet use of an existing trademark, for the purpose of extorting payments from the legitimate owners.
cybersquatting
Involves the registration of an infringing domain name, or other internet use of an existing trademark, for the purpose of extorting payments from the legitimate owners.
Cyberpiracy
Involves the same behavior as cybersquatting, but with the intent of diverting traffic from the legitimate site to an infringing site.
model-driven data mining
Involves the use of a model that analyzes the key variables of interest to decision makers.
Digital certificates
Issued by a trusted third party; verifies to customers that a company is what it claims to be
Fulfillment company
It warehouses a merchants goods and processes orders for the merchant
Sun Microsystems
Java is a programming language developed by _____.
Distributed
Large information systems that store the same data in many different physical locations are called _____.
Category killers
Large stores that specialize in a particular type of product; might offer lowest prices available
Component-Based
Larger businesses often prefer to use a _____ application system that separates the presentation logic from the business logic.
materials requirements planning system
Legacy system that enables companies to predict, track, and mange all the constituent parts of complex manufactured goods.
Copyright
Legal protection that gives the author of a work control over how that work is used
Copyright
Legal protection that gives the author of a work control over how the work is used
long-term debt
Liabilities that are not due until the passage of a year or more.
Structured Menus
Links are easy to follow and in logical order
Extranet
Links intranets of business partners using virtual private networks
Web 2.0
Loose cloud of capabilities, tech, bus models, sets e commerce apart -Google example, advertisers pay for ad words
Enterprise resource planning system (ERP)
MRP system that includes HR and financial components
MOTO
Mail Order, Telephone Order Closest to online retail sector
Snail Mail
Mail sent and received via postal service
utility, ease of use
Main factors in effectiveness of software interface.
Computing
Manipulation of information
Many to Many
Many buyers and sellers...auctions
Which revenue model would help a Hollywood company make money for a movie in the long run?
Marketing and Advertising, DVD sales, and making a deal with companies like Netflix
permission marketing
Marketing strategy in which companies obtain permission from consumers before sending them information or promotional messages.
auctions
Markets in which prices are variable and based on the competition among participants who are buying or selling products and services.
Quotas
Maximum amounts of imports allowed into a country
acquisition rate
Measures the percentage of visitors who register or visit product pages. pg. 245
keyword advertising
Merchants purchase keywords through a bidding process at search sites, and whenever a consumer searches for that word, their advertisement shows up somewhere on the page. pg. 223
business process management (BPM)
Method for business restructuring that combines workflow systems and redesign methods; covers three process categories—people-to-people, systems-to-systems, and systems-to-people interactions
english auction
Most common form of auction; the highest bidder wins.
Not-For-Profit Fundraising
Most current scrip offerings, such as eScrip, focus on the _____ market.
Database Administration
Most electronic commerce sites requires a(n) _____ function to support activities such as transaction processing, order entry, inquiry management, or shipment logistics.
Application Specialist
Most large businesses have _____ who maintain accounting, human resources, and logistics software.
Discount stores
Mostly self-service, but many have knowledgeable sales associates
NFC
Near field communication -a short-range, wireless communication standard -used to support contactless payment and transactions over equipped mobile devices p.195
Each of the following is a trend that may slow EC and Web 3.0 except
Net neutrality.... (not= security concerns.- copyright complaints.- choppy connectivity.)
network keyword advertising
Network of publishers accepts ads placed by Google on their Web sites, and receive a fee for any click-throughs from those ads. pg. 223
Service retailers
Non-traditional retailers; intangible performances, actions or services
fixed pricing
One national price, everywhere, for everyone.
(Table 8.5, p 517) Federal Trade Commission's Fair Information Practice Principles
Notice/Awareness (core principle) Choice/Consent (core principle) Access/Participation Security Enforcement
What are the TWO FTC Fair Information Practice Principles that are considered 'core'?
Notice/Awareness - Sites must disclose how they collect information on consumers, who is collecting it, how it will be used, consequences of refusal, and how the information will be protected. Choice/Consent - Consumers must have a choice in how their information will be used other than supporting the transaction
(Table 8.6, p 518) FTC Recommendations Regarding Online Profiling
Notice: complete transparency to user by providing disclosure and choice options on the host web site. robust notice for PII, clear and conspicuous notice for non pii Choice: opt in for PII, opt out for non pii. no conversion of non pii to pii without consent. out out from any or all network advetisers from a signle page provided by the host web site Access: reasonable provisions to allow inspection and correction Security: reasonable efforts to secure information from loss, misuse, or improper access Enforcement: done by independent third parties, such as seal programs and accounting firms Restricted collection: advertising networks will not collect information about sensitive financial or medical topics, secual behavior or sexual orientation, or use social security numbers for profiling
hits
Number of http requests received by a firm's server
page views
Number of pages requested by visitors. pg. 243
impressions
Number of times an ad is served.
service occupations
Occupations concerned with performing tasks in and around households, business firms, and institutions.
click fraud
Occurs when a competitor hires third parties (typically from low-wage countries) to fraudulently click on competitors ads. pg. 225
channel conflict
Occurs when a new venue for selling products or services threatens to destroy existing venues for selling goods.
Department stores
Offer a broad variety of products, with less depth in assortment
interest-based social networks
Offer members focused discussion groups based on a shared interest in some specific topic.
affinity communities
Offer members focused discussions and interaction with other people who share the same affinity.
general communities
Offer members opportunities to interact with a general audience organized into general topics.
bundling
Offers consumers two or more goods for one price.
practice networks
Offers members focused discussion groups, help, information, and knowledge relating to an area of shared practice.
Often described as the more professional of the big three social media networks; profiles are similar to online resumes
affiliate marketing
One Web site agrees to pay another Web site a commission for new business opportunities it refers to the site. pg. 229
indirect reference groups
One's life-cycle stage, social class, and lifestyle group.
blog advertising
Online ads related to content of blogs.
Rich media ad
Online ads that include animation, audio, or video pg. 225
MySpace
One of the first big social media networks, it's now mainly used by music acts and other entertainers.
sponsored communities
Online communities created for the purpose of pursuing organizational goals.
Serial Number
One way to be able to trace electronic cash is to attach a _____ to each electronic cash transaction.
Cookies
One way to uniquely identify users and store information about their choices is to create and store _____.
direct reference groups
One's family, profession or occupation, religion, neighborhood, and schools.
What are the main points of the Online Gamers Crack Enzyme Puzzle article?
Online gamersdeciphered the structure of an enzyme of an AIDS-like virus that had thwarted scientists for a decade -monomeric protease enzyme: a cutting agent in the complex molecular tailoring of retroviruses, a family that includes HIV -need a 3-D picture that "unfolds" the molecule and rotates it in order to reveal potential targets for drugs--> Foldit--> -gamers produced an accurate model of the enzyme in just three weeks -first time gamers have resolved a long-standing scientific problem
pop-under ad
Opens underneath a user's active browser window and does not appear until the user closes the active window.
When it comes to informed consent, what is the difference between Opt-in versus Opt-out?
Opt-in - Requires an affirmative action by the consumer to allow collection and use of consumer information Opt-out - The default is to collect information unless the consumer takes an affirmative action to prevent the collection of data.
Hacker
Originally, the term _____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.
Hacker
Originally, the term _____ was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology. p.174
Discussion: Consider the expanded list of ethical principles (e.g., Golden Rule). Which of these do you agree with? Disagree with?
Other ethical principles: Golden Rule Universalism - What applies in one case applies in all similar cases Slippery Slope - If repeating an action multiple times leads to a negative outcome, the action should not be taken even once. Collective Utilitarian Principle - Take the action that achieves the greatest value for all of society. Risk Aversion - Take the action that produces the least harm or the least potential cost. No Free Lunch - Assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise. The New York Times Test - Assume your action will be headlining in the New York Times - how will others react? The Social Contract Rule - Would you want to live in a society where the principle you are supporting would become an organizing principle of the entire society?
liabilities
Outstanding obligations of the firm.
non-linear video ad
Overlay; Web bugs; ad runs at same time as video content and does not take over full screen.
Float
PayPal earns a profit on the _____, which is money that is deposited in Paypal accounts and not used immediately.
Opt-in Model (European Model)
People have to approve info collection. Informed consent prohibiting organization from collecting any personal info
open rate
Percentage of customers who open the e-mail and are exposed to the message. pg 246
attrition rate
Percentage of customers who purchase once, but do not return within a year. pg. 245
click-through rate (e-mail)
Percentage of e-mail recipients who clicked through to the offer. pg. 246
delivery rate
Percentage of e-mail recipients who received the e-mail. pg 246
bounce-back rate
Percentage of e-mails that could not be delivered. pg. 246
retention rate
Percentage of existing customers who continue to buy on a regular basis. pg. 245
abandonment rate
Percentage of shoppers who begin a shopping cart form, but then fail to complete the form. pg. 245
conversion rate
Percentage of visitors who purchase something pg. 245
watch lists
Permit the consumer to monitor specific auctions of interest.
Brick-and-mortar businesses
Physical stores
When it comes to privacy protection, how does Europe differ from the United States?
Privacy protection is much stronger in Europe. Europe does not allow companies to collect PIIs from consumers for secondary uses (uses other than the transaction) and have agencies in place to pursue complaints made by consumers unlike the US.
What are the main points of the New Rules for Big Data article?
Privacy, security, retention, processing, ownership, and integrity of info: -privacy=one of biggest worries: rules fall short b/c of technical difficulties; exploiting info can be resolved by giving ppl more control -security: benefits=threats averted-->neglected often--> solution=disclose more info, annual info-security audit -retention: data should never be stored for longer than needed--> might be misused/ inadvertently released; regulation pushing in opposite direction: knowledge=power -processing: new regulation might be that data can't discriminate against on hypothetical possibilities -ownership: regulation leaning towards treating personal info as property right Ex: Google's "data liberation" integrity: right of assembly vs. maintenance of network neutrality
Search Engine Optimization (SEO)
Process for improving the chance that a webpage will rank high in the results for a specific search query
branding
Process of brand creation.
Exports
Products sold in a country other than the one in which they were produced
Browser
Program that processes HTTP protocol,receives, displays, and processes HTML documents
Applets
Programs written in javascript and added to the website
copyright law
Protects original forms of expression such as writings, art, drawings, photographs, music, motion pictures, performances, and computer programs from being copied by others for a minimum of 70 years.
balance sheet
Provides a financial snapshot of a company on a given date and shows its financial assets and liabilities.
e-distributor
Provides electronic catalog that represents the products of thousands of direct manufacturers.
Electronic Funds Transfer
Provides payments and collections for online sales
dutch internet auction
Public ascending price, multiple unit auction. Final price is lowest successful bid, which sets price for all higher bidders.
Procurement
Purchase of goods for resale
pricing
Putting a value on goods and services.
Unregistered copyright
an author does not have to do anything to copyright a work. Pieces after 1989 do not have to contain the c symbol
view-to-cart ratio
Ratio of "Add to cart" clicks to product view. pg. 245
checkout conversion ratio
Ratio of actual orders to checkouts started. pg. 245
browse-to-buy ratio
Ratio of items purchased to product view. pg. 245
Database
Receives and processes SQL requests retrieve and store data
transaction log
Records user activity at a Web site.
Click farms
Recruiting a network of users to engage in click fraud with the goal of spreading IP addresses across several systems and make a fraud effort more difficult to detect
supply chain management
Refers to a wide variety of activities that firms and industries use to coordinate the key players in their procurement process.
channel
Refers to different methods by which goods can be distributed and sold.
assets
Refers to stored value.
Intermediaries
Refers to the "Middleman" that exists in the value chain between the manufacturing of the product and its delivery to the buyer
economic viability
Refers to the ability of firms to survive as profitable business firms during a specified period.
digital rights management
Refers to the combination of technical and legal means for protecting digital content from unlimited reproduction without permission.
Disintermediation
Removal of organization or business layers responsible for certain steps in value chain
Traffic logs
Reports produced from software on your web server or provided by the company hosting your web site that tell you the domain of your visitors and their referring pages.
relational databases
Represent data as two-dimensional tables with records organized in rows and attributes in columns; data within different tables can be flexibly related as long as the tables share a common data element.
Current Challenges with B2C &B2B
Requires new mindset logistic expense and price conflict Security and hackers
What are the three basic ethical principles discussed in the text?
Responsibility - Individuals, organizations and societies are responsible for the actions they take. Accountability - Individuals, organizations and societies should be held accountable to others for the consequences of their actions. Liability - A body of law permits individuals to recover damages done to them by other individuals, organizations and societies
transactive content
Results from the combination of traditional content, such as articles and product descriptions, with dynamic information culled from product databases, tailored to each user's profile.
Pure-play retailers
Retailers who sell on the internet only
in-text video ad
Rich media; ad is delivered when user mouses over relevant text.
in-banner video ad
Rich media; ad is triggered within banner, may expand outside banner.
B2C (Business to Consumer)
Sales between suppliers and consumers. Web Storefront
social shopping
Sharing product choices with friends online.
Reintermediation
Shifting of the intermediary role in value chain into new source...Paypal
Chunk
Short uniformly organized pieces of information that particularly lend themselves to help presentations
manufacturer-direct
Single or multi-channel manufacturers who sell directly online to consumers without the intervention of retailers.
virtual merchant
Single-channel Web firms that generate almost all of their revenue from online sales.
Big-box retailers
Single-story structures, at least 10,000 square feet building, parking lots could accommodate hundreds of cars
collaborative filtering
Site visitors classify themselves into affinity groups characterized by common interests; products are then recommended based on what other people in the group have recently purchased.
With respect to information rights, be able to provide an example of how Anonymous Information and profiles are used in the Internet age.
Sites can gather useful anonymous information (demographics and behavioral information) on consumers without having to collect any personally identifiable information (PIIs)
financial portals
Sites that provide consumers with comparison shipping services, independent financial advice, and financial planning.
Semantic web
Sites that wrap data in invisible tags that can be recognized by search engines, analysis tools, and other services to make it easier for computer programs to accurately categorize, compare, and present this information
cookies
Small text file Web sites place on the hard disk of visitors' client computers every time they visit, and during the visit, as specific pages are visited.
Social media network based on 140-character micro-blog posts.
study of consumer behavior
Social science that attempts to predict/explain what consumers purchase and where, when, how much, and why they buy.
eWallet
Software application that stores customers' data for easy retrieval during online purchases
Sniffer Programs
Software applications called _____ provide the means to record information that passes through a computer or router that is handling Internet traffic.
Sniffer Programs
Software applications called _____ provide the means to record information that passes through a computer or router that is handling Internet traffic. A type of eavesdropping program that monitors information traveling over a network p.176
Web 2.0 Processing
Software as service, Google, Amazon, virtual marketing
Be familiar with Platform for Privacy Preferences (P3P) and, generally speaking, how it works.
Software for automating the communication of privacy policies to users. The software translates a sites privacy practices into a simpler standard format for the user.
Machine translation
Software program that changes languages
Spiders, Web crawlers, software robots
Software that traverses available Web links in an attempt to perform a given task -used by search engines to discover documents for indexing and retrieval
Mobile
Some companies have begun to offer small payment and micropayment services through _____ telephone carriers.
(table 8.9, p 525) Privacy Enhancing Technologies
Spyware blockers Pop-up blockers Secure e-mail Anonymous remailers Anonymous surfing Cookie managers Disk/File erasing programs Policy generators Privacy policy reader Public key encryption
HEB
Started in San Antonio in 1950, this is the 25th largest grocery retailer in the nation
2 types of business analysis
Strategic Analysis (industry and firm) Financial Analysis (how firm is performing)
ethics
Study of principles used to determine right and wrong courses of action.
promotional sales communications
Suggest the consumer "buy now" and make offers to encourage immediate purchase.
demand aggregators
Suppliers or market makers who group unrelated buyers into a single purchase in return for offering a lower purchase price. Prices on multiple units fall as the number of buyers increase.
Many-to-One
Suppliers to one major bidder
(types of e-books) Web-accessed e-book
an e-book stored on a publisher's server that consumer access and read on the web
Chapter 6 Figures and Tables
Table 6.1 why consumers choose the online channel p.213 Table 6.2 factors that influence online purchase decision p.214 Figure 6.1 the consumer decision process and supporting communications p.214 figure 6.2 a model of online consumer behavior p.215 Figure 6.3 Online shoppers and buyers p. 216 Table 6.3 why internet users do not buy online p.218 Figure 6.4 online advertising from 2004-2016 p.220 Table 6.4 online advertising spending for selected formats p.221 figure 6.5 search engine advertising 2004-2016 p.222 Figure 6.6 how an advertising network such as doubleclick works p.227 table 6.5 U.S. mobile ad spending by format and growth (2012) p.235 Table 6.6 Mobile marketing campaigns of selected firms 2012 p.235 Figure 6.7 Average time spent per day with major media p.238 Table 6.7 marketing metrics lexicon p.244 Figure 6.8 An online consumer purchasing model p. 247 Table 6.8 online marketing communications: typical click-through rates p.248 Figure 6.9 Comparative returns on investment p.249 Table 6.9 different pricing models for online advertisements p.250 Table 6.10 Average cost per customer acquisition for select media in the united states 2012 p.251
Chapter 7 Figures and Tables
Table 7.1 Unique features of e-commerce technology and other potential, ethical, social, and/or political implications. p.262 Table 7.2 Personal information collected by e-commerce sites p.267 Table 7.3 The internet's major information-gathering tools and their impact on privacy p.268 Table 7.4 Federal Privacy Laws p.273 Table 7.5 Federal Trade Commission's Fair information practice principles p.274 Table 7.6 The FTC's new privacy framework p.275 Table 7.7 Fair use considerations to copyright protections p.280 Table 7.8 The digital millennium act p.281 Table 7.9 Selected e-commerce patents p.285 Table 7.10 internet trademark law issues p.287 Table 7.11 the evolution of governance of the internet p.290 NET NEUTRALITY page 293 Figure 7.1 The moral dimensions of an internet society p.263
Tariffs
Taxes that governments place on selected imported products
Foreground
Text color
b2b e-commerce
That portion of B2B commerce that is enabled by the internet.
(types of e-books) web-downloadable e-book
an e-book that can be downloaded from the web, stored as a file on the client pc, and perhaps even printed
Web Services
The W3C defines _____ as software systems that support interoperable machine-to-machine interaction over a network.
Stateless
The Web is a _____ system, unable to remember anything from one transmission or session to another.
Venture Sponsor
The _____ is the existing company that wants to launch an electronic commerce initiative.
TCO
The _____ of an electronic commerce implementation includes the costs of hardware, software, design work outsourced, salaries and benefits for employees involved in the project, and the cost of maintaining the site once it is operational.
Business Manager
The _____ should be a member of the internal team that sets the objectives for the project.
Network Operations
The _____ staff functions include load estimation and load monitoring, and designing and implementing fault-resistant technologies.
Cyber Separating
The act of registering, selling, or using a domain name of someone else's for profit
Background
The basic overall color or design of your website
feature set
The bundle of capabilities and services offered by the product or service.
core product
The core benefit the customer receives from the product.
profiling
The creation of digital images that characterize online individual and group behavior.
opt-out
The default is to collect information unless the consumer takes an affirmative action to prevent the collection of data.
price dispersion
The difference between the highest and lowest prices in a market.
brand equity
The estimated value of the premium customers are willing to pay for using branded product when compared to unbranded competitors.
loser's lament
The feeling of having been too cheap in bidding and failing to win.
Digital Millennium Copyright Act
The first major effort to adjust the copyright laws to the Internet age.
What is the Digital Millennium Copyright Act of 1998 (DMCA)?
The first major effort to adjust the copyright laws to the internet age. Basically an extension of copyright laws to electronic and intangible assets.
Denial of Service
a condition in which a system can no longer respond to normal requests
Peer-To-Peer
The free payment clearing service that PayPal provides to individuals is called a _____ payment system.
Target Audience
The group of people a website from a home page
Copyright
The legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or distribution of an original work such as a literary, musical, dramatic, or artistic work. Typically, the duration of copyright is the whole life of the creator plus fifty to a hundred years from the creator's death.
HTTP
The language of the world wide web
service sector
The largest and most rapidly expanding part of the economies in advanced industrial nations.
Paper Checks
The largest dollar volume of payments today are made using _____.
The largest of the social networks; a favorite destination for people, businesses, and organizations to connect and share information
Referring page
The last page visited before the current web page
privacy
The moral right of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state. p.168
dynamic pricing
The price of the product varies, depending directly on the demand characteristics of the customer and the supply situation of the seller.
unique visitors
The number of distinct, unique visitors to a site. pg. 245
customer acquisition costs
The overall costs of converting a prospect into a consumer.
net margin
The percentage of its gross sales revenue the firm able to retain after all expenses are deducted; calculated by dividing net income or loss by net sales revenue.
click-through rate
The percentage of people exposed to an online advertisement who actually click on the banner. pg. 243
Search engine marketing (SEM)
The practice of designing, running and optimizing search engine ad campaigns pg. 221
disintermediation
The process by which the consumer bypasses the services of an intermediary or intermediaries in the chain of distribution to purchase products directly from those who supply or produce them
Globalization
The process of adapting a business web site to meet the meets of users in various countries
EFT (Electric Funds Transfer)
The process of exchanging account information electronically over private communications networks
viral marketing
The process of getting customers to pass along a company's marketing message to friends, family, and colleagues. pg. 233
Distribution
The process of moving products from the merchant to the customer
account aggregation
The process of pulling together all of a customer's financial (and even nonfinancial) data at a single personalized Web site.
Logical
The protection of assets using nonphysical means is called _____ security.
Web Bug
The purpose of a(n) _____ is to provide a way for a third-party Web site to place cookies from that third-party site on a visitor's computer.
actual product
The set of characteristics designed to deliver the product's core benefits.
Social Media Network
The social media sites where people connect and interact with friends, colleagues, businesses, and organizations.
marketing
The strategies and actions firms take to establish a relationship with a consumer and encourage purchases of its products or services.
herd behavior
The tendency to gravitate toward, and bid for, auction listings with one or more existing bids.
Steganography
The term _____ describes the process of hiding information within another piece of information.
Small Payment
The term _____ refers to all payments of less than $10.
total inter-firm trade
The total flow of value among firms.
clickstream behavior
The transaction log that consumers establish as they move about the Web.
collaborative commerce
The use of digital technologies to permit organizations to collaboratively design, develop, build, and manage products through their life cycles.
Market capitalization (market cap)
The value of a firm calculated by multiplying its share price by the number of shares -firm value= (share price) X (# of shares)
Price
The value of a product/service determined by manufacturer and consumer
procurement process
The way firms purchase the goods they need to produce goods for consumers.
winner's regret
The winner's feeling after an auction that he or she paid too much for an item.
uniform pricing rule
There are multiple winners and they all pay the same price.
Management/ Administration
This function is responsible for developing, implementing, and evaluating the plans and activities of a business
Marketing
This function is responsible for the process of planning and executing the conception, promotion, and distribution of goods and services to create exchanges that satisfy individual and organizational objectives
Protectionists
Those who favor government protection for domestic producers
web bugs
Tiny (1 pixel) graphic files embedded in e-mail messages and on Web sites.
(table 8.11, page 533) The digital millennium copyright act
Title 1 - WIPO copyright and performances and phonograms treaties implementation Title 2 - online copyright infringement liability limitation Title 3 - computer maintenance competition assurance Title 4 - Miscellaneous provisions
Phishing
_____ is a technique for committing fraud against the customers of online businesses. p.172
Application Integration
_____ is accomplished by programs that transfer information from one application to another.
A Buffer
_____ is an area of memory set aside to hold data read from a file or database.
Share
To post or re-post content on a social media site
Hocking
To write program source code
Social Media
Tools that allow the sharing of information and creation of communities through online networks of people
design look, information design, information focus
Top factors in credibility of Web sites.
Free trade
Trade among countries without tariffs or quotas
EDI ( Electric Data Interchange)
Transaction that occurs when one business transmits computer-readable data in an open format.
Coordination
Transfer or exchange of information
WIPO
Treaty which declares it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials, and attaches stiff fines and prison sentences for violations.
Tiffany's
Turquoise and White signature colors
Net Present Value
_____ is an example of a return on investment technique.
hybrid
Two or more models used together.
auctions, yield management
Two types of dynamic pricing.
uniform resource locator
URL stands for ______.
(table 8.1, p 499) Unique features of e-commerce technology and their implications for ethical, social or political concerns
Ubiquity - internet available everywhere Global reach - reach around earch Universal standards - one set of tech standards Richness - video, audio, and text: Screen tech that reduces use of text and potentially ability to read Interactivity - tech works by interacting w user> interactivity can be shallow and meaningless Information density - technology reduces info costs, raises quality: false info increase, trust can be degraded Personalization/Customization - allows personalization: opens privacy concerns Social technology - enables user generated content : opportunities for cyber bullying
Doctrine of fair use
Under certain circumstances, permits of use of copyrighted material without permission
doctrine of fair use
Under certain circumstances, permits use of copyrighted material without permission.
Scalability
_____ is measured by the ease of expansion of bandwidth, disk space, and additional software (database, traffic analysis, and so on) that can be added to an account as it grows.
Many to Some
Unite major supplies to attract more suppliers
Some to Many
Unite major supplies to target many buyers
spam
Unsolicited commercial e-mail.
auction aggregators
Use computer programs to search thousands of Web auction sites, and aggregate information on products, bids, auction duration, and bid increments.
Non-store retailers
Use methods such as infomercials, door-to-door solicitation, in-home demonstrations and vending machine distribution
E-Business
Use of electronic communication technology Coordination, content literacy, computing , and commence
infringement
Use of trademark that creates confusion with existing trademarks and causes consumers to make market mistakes, or misrepresents the origins of goods.
Tables
Used to hold text and/ or graphics so that they do not change sizes on other pages
3 tier architecture
User, Server, and Database tier
blog marketing
Using blogs to market good through commentary and advertising.
Combination Menu
Using both graphics/images and text for websites
metatagging
Using others' trademarks as metatags in misleading or confusing manner.
internet marketing
Using the Web to develop a positive, long term relationship, with customers, thereby creating a competitive advantage for the firm by allowing it to charge a higher price for products or services than its competitors can charge.
brand leveraging
Using the power of an existing brand to acquire new customers for new product or service.
Metatagging,
Using trademarked words in a site's metatags
Secure Electronic transaction standard
Visa and MasterCard
ViaVoice
Voice activated software
IBM
WeSphere Commerce Suite is produced by _____.
Landing page
Web page displayed when a user clicks on an advertisement
Server tier
Web servers, upon request from browser
trust and utility
What are the two most important factors shaping the decision to purchase online?
Credit and Debit Cards
What payment method dominates online transactions today?
Chargeback
When a cardholder successfully contests a charge, the merchant bank must retrieve the money it placed in the merchant account in a process called a(n) _____.
Spoofing
_____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.
Viral
When content on the internet is shared multiple times without encouragement from the creator(s)
Open Loop
Whenever a third party processes a transaction, the system is called a(n) _____ system.
Place
Where the product/service is distributed for the consumer to purchase (stores, vending machine, mall)
ROI
Which of the following techniques measures the amount of income that will be provided by a specific current expenditure?
Spoofing
_____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake. p.175
What are the main points of the Great Tech War of 2012 article?
Why compete?: 1st to breach TV industry (Google TV & Apple TV)! Patents & Intellectual Property (IP) -Google vs. Amazon: deals, payments/checkout, streaming, kindle vs. android, amazon cloud vs. google, shopper, customer reviews, online stores, data mining -Google vs. Apple: iOS vs. Android, iPhone vs. Motorola Mobile, TV, Mac vs. Chromebook, iCloud vs. Google, browse, tablet, Facetime vs. Hangouts, music -Google vs. FB: social media [fb+skype vs. google+], email, search vs. dark web, fb+bing vs. google, deals, payments -FB vs. Amazon: deals, payments -FB vs. Apple: iOS +Twitter, FB phone? vs. iPhone, payments -Apple vs. Amazon: kindle vs. ipad, payments, amazon cloud vs. icloud, itunes vs. amazon -Industry Barriers: 1) Telecommunication service providers 2) video phone 3) CC's -Market Share: Android=40% [70% growth w/o affecting competition], iPhone=28% [50% of all mobile profits to Apple; $368 margin (:highest) on iPhone] Apple: competes on luxury, now on SCM & cash for long-term contracts Revenue: -FB: $1.6 B in 6 months -Apple: $1.6B in 9 days -Amazon: $34B (2010; doubled from 2008)--> $100B (2015), fastest ever! -Google: $30B; doubled since 2007
discriminatory pricing
Winners pay different amounts depending on what they bid.
law of one price
With complete price transparency in a perfect information marketplace, there will be one world price for every product.
Unstructured Menus
Words are hot linked from a home page or other website pages
Hashtag
Words preceded by a # sign that can be used to tie various tweets together and relate them to a topic
Purchase order
Written document that serves as an offer to buy items from a supplier at a specified price.
browsers
____ are programs that provide an uncomplicated interface to the internet and web documents.
social networking
____ sites focus on connecting people that share a common interest or activity
Mall-Style
_____ CSPs provide small business with an Internet connection, Web site creation tools, and little or no banner advertising clutter.
Necessity
_____ Refers to preventing data delays or denials.
instant messaging
_____ allows people to contact each other via direct, live communication.
Operational Partners
_____ are firms, such as system integrators and consultants, that have experience in moving projects along and scaling up prototypes.
Equity Partners
_____ are usually banks or venture capitalists that sometimes offer money, but are more likely to offer experience gained from guiding other start-ups that they have funded.
Data Mining
_____ can help businesses find customers with common interest and discover previously unknown relationships among the data.
Web Programmers
_____ design and write the database-driven Web pages.
podcasts
_____ do not use streaming technology
Anonymous
_____ electronic cash is electronic cash that cannot be traced back to the person who spent it.
Symmetric
_____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.
cloud computing
_____ frees users from owning, maintaing, and storing software and data.
Customer Service Personnel
_____ help design and implement customer relationship management activities in the electronic commerce operation.
blogger
_____ is a blogging tool.
Project Management
_____ is a collection of formal techniques for planning and controlling the activities undertaken to achieve a specific goal.
Identify Theft
_____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.
Spam
_____ is a key element in a phishing attack.
Spam
_____ is a key element in a phishing attack. pg 228
SOAP
_____ is a message passing protocol that defines how to send marked-up data from one software application to another across a network.
Phishing
_____ is a technique for committing fraud against the customers of online businesses.
adware
a PUP that serves pop-up ads to your computer p.172
microblog
a ____ publishes short sentences that only take a few seconds to write, rather than long stories.
mobile
a _____ browser is designed to fit on the small screen of a portable device.
blog
a _____ publishes long stories rather than short sentences that only take a few seconds to write.
merchant account
a bank account that allows companies to process credit card payments and receive funds from those transactions p.193
Channel Rotation
a banner advertisement is placed within a particular category of a web site. This is more focused on the company's target market
General rotation
a banner advertisement is randomly displayed on a web site
Placeholder
a box that is drawn on your storyboard to represent where a graphic would be
Denial of service attack
a bug or virus that will not allow a user to log on to a website
Denial of service attack
a bug or virus that will not allow a user to log on to a website p.175
ISP
a business that provides access to the internet via modem
Target market
a clearly identified segment of the market to which the company wants to appeal
secure negotiated session
a client-server session in which the URL of the requested document, along with the contents, contents of forms, and the cookies exchanged are encrypted p.187
Database Software
a collection of data records with fields such as names, addresses, etc
long tail
a colloquial name given to various statistical distributions characterized by a small number of events of high amplitude and a very large number of events with low amplitude pg. 241
electronic data interchange (EDI)
a communications standard for sharing biz documents and settlement info among a small number of firms
electronic data interchange (EDI)
a communications standard for sharing business documents and settlement information among a small number of firms.
wiki
a community of interested people that build knowledge over time write collaboratively in a _____.
Registered trademark
a company can register a trademark with the U.S. patent and trademark office. Only registered trademarks use the R symbol
Unregistered trademark
a company does not have to do anything to have trademark protection. To designate an unregistered trademark a company would use "tm"
Page Layout
a detailed sketch of each page
Site Map
a detailed structural outline of a website
Trademark
a distinctive word, phrase, logo, graphic symbol, slogan, or anything used to identify goods or services and distinguishes them in the marketplace
liability
a feature of political systems in which a body of law is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations p.264
Shopping cart
a feature that allows user to add, delete, view, and update items for purchase
JPEG
a file format for images used with lots of color
Veri-sign
a for profit organization that provides products that allow the web sites to transmit encrypted data to authenticate the web site through the use of digital certificates.
tight coupling
a method for ensuring that suppliers precisely deliver the ordered parts, at a specific time and particular location, to ensure the production process is not interrupted for lack of parts
Just-in-time production
a method of inventory cost management which seeks to eliminate excess inventory to a bare minimum
just in time production
a method of inventory cost management which seeks to eliminate excess inventory to a bare minimum
commerce
a negotiated exchange of valuable objects or services between two or more parties (a buyer and a seller); includes all activities that each of the parties undertake to complete the transaction
Asymmetric digital subscriber line
a network that allows your computer to communicate at approximately one mbps
Storage Area Network
a network that exists exclusively to provide storage for the massive amount of data entailed in an e-commerce business
sponsorship
a paid effort to tie an advertiser's name to information, an event, or a venue in a way that reinforces its brand in a positive yet not overtly commercial manner pg. 230
Bug
a persistent error in software or hardware. If the bug is in software, it can be corrected by changing the program
Black hat hacker
a person who breaks into a computer system with the purpose of inflicting damage or stealing data
Cracker
a person who breaks into a computer system without authorization, whose purpose is to do damage
Cracker
a person who breaks into a computer system without authorization, whose purpose is to do damage p.174
Safe harbor
a private self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement p.277
due process
a process in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws have been applied correctly p.264
browser parasite
a program that can monitor and change the settings of a user's browser p.172
Flow Chart
a quick sketch of the site's navigational structure
Affiliate programs
a site agrees to place a merchants ad without charge. The affiliate only gets paid when a visitor clicks on the link and buys something
Web Auction
a site which provides a forum for buyers and sellers to trade items
dilemma
a situation in which there are at least two diametrically opposed actions, each of which supports a desirable outcome
Content adjacency problems
a situation where ads appear alongside text the advertiser would like to avoid
cookies
a small piece of information sent from a web server to an individual's web browser so it can later be read back from that browser
Form handler
a software program running on a web server that interprets the data sent by a web page
email client
a special program called an ______ must be installed on your computer to use a client based email account.
deep packet inspection
a technology for recording every key stroke at the isp level
Collective Mark
a trademark or service mark used or intended to be used in commerce, by the members of a cooperative or association, or other group
online auctions
a trend in C2C e-commerce is the popularity of _____.
certification authority (CA)
a trusted third party that issues digital certificates p.186
session key
a unique symmetric encryption key chosen for a single secure session P.189
domain name
a web address used in URLS
Webbed Hierarchy
a web like structure with non traditional linking page
Intranet
a web-based private network that hosts internet applications on a local area network
Supply Chain Management
a wide variety of activities that firms and industries use to coordinate the key players in their procurement process
ISP
a(n) ____ provides a path or connection for individuals to access the internet.
Web analytics
analysis of clickstream data to understand visitor behavior on a website
accessibility
ability for all persons even with disabilities
Economic Viability of (online) Firms
ability of firms to survive as profitable business firms during specified period (1-3 years)
Ideal web business function of online recruitment
ability to establish market prices and terms (online national marketplace)
Convergence
ability to get any content, when you want it, on whatever platform you want it
transaction brokering
acting as an intermediary to facilitate a transaction
transaction brokers
acting as an intermediary to facilitate a transaction
transaction brokering
acting as an intermediary to facilitate a transaction p.326
Fair Trade Act
acts that deal with fraudulent sales, protects against misinterpretation
personal profiles
add a personal e-mail address, postal address, and/or phone number to behavioral data p.270
Re-intermediation
adding a level of the distribution system
4 things online content provider has to be in order to charge money for content
addresses a focused market, has specialized content, sole source of some of this info, has perceived value
trigger pricing
adjust prices based on the location of the consumer
Personalization Pricing
adjust prices based on the merchant's estimate of how much the customer truly values the product
Trigger pricing
adjusts prices based on the location of the consumer
personalization pricing
adjusts prices based on the merchant's estimate of how much the customer truly values the product
Utilization Pricing
adjusts prices based on utilization of the product
utilization pricing
adjusts prices based on utilization of the product
corporate performance management
advanced performance measuring and analysis approach that embraces planning and strategy, balanced Scorecards
cost per thousand (cpm)
advertiser pays for impressions in 1,000-unit lots pg. 249
cost per action
advertiser pays only for those users who perform a specific actiomn pg 249
cost per click
advertiser pays prenegotiated fee for each click an ad receives pg. 249
Pay-per-click (PPC)
advertisers don't pay unless someone clicks on their ad
Contextual advertising
advertising based on a Web site's content- has limitations
(Table 8.3, p 507) The internet's major information-gathering tools and their impact on privacy
advertising networks social networks cookies third-party cookies spyware search engine behavioral targeting deep packet inspection shopping carts forms site transaction logs search engines digital wallets (single sign-on services) digital rights management (DRM) trusted computing environments
name 4 major demographic categories
age, income, race, gender
4 major sectors of online travel market
airline tickets, hotel rez, car rentals, cruises/tours
1998 state street bank and trust vs signature finacial group
allows managers to minitor and record financial transaction info flow and business method patents were now allowed
virtual private network (VPN)
allows remote users to securely access internal networks via the internet, using the Point-to-Point Tunneling Protocol (PPTP) p.190
proxy bidding
allows the consumer to enter a maximum price and the auction software automatically bids for the goods up to that maximum price in small incrememnts
Voice Activated Software
allows use of computer by voice commands
Site personalization
allows users to determine what features of a site they want to appear when they come to the site
Productivity
amount of output to make a profit after expenses are deducted
hash function
an algorithm that produces a fixed-length number called as hash or message digest p.183
digital cash
an alternative payment system in which unique, authenticated tokens represent cash value p.195
online social network
an area online where people who share common ties can interact
online social network
an area online where people who share common ties can interact with one another
Filtering software
an internet filter is a piece of software controlled by authority that filters by keyword
ad exchanges
an online, real time auction where data aggregators sell personal tracking info to advertisers pg. 227
international business
an organization or business which conducts electronic commerce around the globe
key (cipher)
any method for transforming plain text to cipher text p.181
Service mark
any word, name, symbol, device, or any combination used or intended to be used in commerce
Certification Mark
any word, name, symbol, device, or any combination, used a intended to be used in commerce with the owner's permission by someone other than its owner
(T 8.7: FTC new privacy framework principle) scope
applies to all commercial entities tat collect or user consumer data; not limited to those that just collect pii
Non-merchant e-commerce
arranges for the purchase or sell of goods and services. AUCTIONS, CLEARHOUSING, EXCHANGES
responsibility
as free moral agents, individuals, organizations, and societies are responsible for the actions they take p.264
balance sheet
assets and liabilities at a specific point of time
current assets
assets such as cash, securities, accounts reveivable, inventory, or other investments that are likely to be able to be converted to cash within one year
working capital
assets-liabilities
general purpose portals
attempt to attract a very large general audience and retain it by providing indepth vertical content (yahoo, msn)
vertical market portals
attempt to attract highly focused, loyal audience with a specific interest in a. community (affinity group-ivillage) or b. specialized content (espn)
consumer-to-consumer (c2c) auctions
auction house acts as an intermediary market maker, providing a forum where consumers can discover prices and trade
business-to-consumer (b2c) auctions
auction house sells goods it owns or controls using various dynamic pricing models
(table 8.9, p 525) Privacy Enhancing Technologies: policy generators
automates the development of an oecd privacy compliance policy
stickiness
ave length of time on the site
recency
ave number of days between visits
Wallpaper
background of your webpage
what are 8/9 of forms of online
banner ads, superstitial ads, interstitial ads, pop up, video, email, pay per click
Why was the movie the Olympus Has Fallen movie filmed in Shreveport, Louisiana?
because everything there is cheap, versus D.C. where the film is actually set.
downloaded
before a podcast can be run, the media files must be ______.
cigarettes, gambling, and drugs
borderless? page 297
symmetric key encryption (secret key encryption)
both the sender and the receiver use the same key to encrypt and decrypt the message p.182
what is more important to customers who shop online: price or brand
brand
Net Marketplaces
bring together potentially 1000s of sellers and buyers into a single digital marketplace operated over the internet
net marketplaces
bring together potentially thousands of buyers and sellers in a single digital marketplace, it's transacton based, and supports many-to-many as well as one-to-many relationships
private industrial networks
bring together small # of strategic business partner firms that collaborate to develop highly efficient supply chains, it's relationship based, supports many-to-one and many-to-few relationships
Net marketplace
brings hundreds to thousands of suppliers and buyers into a single internet based environment to conduct trade.
Alternate Browsers
browsers that validate websites for use by individuals with disabilities
BOGO, Twofers, and get a pair of socks with shoes for .10 are examples of what
bundling
A(n) ________ is defined as a group of people that have some kind of commercial or business relationship such as the relationships between sellers and buyers, buyers among themselves, buyers and suppliers, and colleagues and other colleagues.
business network
B2B
business online between two businesses
buyer-side solutions
buyer-biased markets that are owned by buyers and aim to reduce the procurement costs of suppliers for buyers
buyer-side solutions
buyer-biased markets that are owned by buyers and that aim to reduce the procurement costs of supplies for buyers.
operating margin
calculated by dividing operating income or loss by net sales revenue
(t8.3) site transaction logs
can be used to collect and alayyze detailing information on page content viewed by users
(t8.3) shopping carts
can be used to collect detailed payment and purchase information
(t8.3) spyware
can be used to record all the keyboard activitiy of a user, including web sites vidited and security codes used; also used to display advertisements to users based on their searches or other behavior p.172
(t8.3) search engines
can be used to trace user statements and views on newsgroups, chat groups, and other public forums on the web, an provile users social and political views. google returns name, address, and links to a map with directions to the address when a phone number is entered
(T 8.7: FTC new privacy framework principle) privacy by design
companies should prmote consumer privacy throughout the organization and at every stage of development of products and services: data security, reasonable collection limits, reasonable and appropriate data retention policies, data accuracy, comprehensive data management procedures
**(T 8.7: FTC new privacy framework principle) simplified choice
companies should simplify consumer choice. need not provide choice before collecting and using data for commonly accepted practices: product fulfillment, internal operations, fraud prevention, legal compliance, and first party marketing. for all other commercial data collection, choice is required and should be clearly and conspicuously offered at a time and incontext in which ocnsumer is providing data. special choice mechanism for online behavioral advertising: Do Not Track
content fraud
companies that generate large volumes of textual content for multiple Web sites designed to attract viewers and search engines. pg. 225
catelog merchants
companies that have a national offline catalog operation that is their largest retail channel, but recently developed online capabilities
bricks and clicks
companies that have a network of physical stores as their primary retail but also have online offerings
bricks-and-clicks
companies that have a network of physical stores as their primary retail channel, but also have introduce online offerings p.320
bricks and clicks
companies that have a network of physical stores as their primary retail channel, but also have introduced online offerings
bricks and clicks etail biz model
companies that have a network of physical stores as their primary retail channel, but also have online offerings (Walmart)
bricks-and-clicks
companies that have a network of physical stores as their primary retail channel, but have also introduced online offerings
Brick-and-clicks
companies that have a network of physical stores as their primary retail channel, but have also introduced online offerings Ex: Walmart, Macys, Target, Costco
direct distribution channels
company produces goods/services and delivers them
(table 8.9, p 525) Privacy Enhancing Technologies: disk file erasing programs
completely erases hard drive and floppy files
multi-tier supply chain
complex series of transactions between firm and thousands of suppliers
Segment
components of a movement in which people have one or more similar characteristics.
Firewall
computer system or software that prevents unauthorized access to provide data to outside users
Firewall
computer system or software that prevents unauthorized access to provide data to outside users p.190
ISP
connects a computer to the internet a basic account with an isp provides customers with an email address limited or full access to the internet
informed consent
consent given with knowledge of all material facts needed to make a rational decision p.272
online recruitment industry trends:
consolidations, diversification, localization, job search engines/aggregators, social networking, mobile
durable goods
consumed over a long period of time (more than a year)
Logistics
consumer browsing for information from multiple sites
lergest segment of U.S. retail market
consumer durables
(t8.5) access/participation
consumers should be able to review and contest the accuracy and completeness of data colelcted about them in a timely, inexpensive process: ftc fair information practice principle
Describe the Supply chain order.
consumers--> retailers--> distributors--> manufactures--> suppliers -if disintermediation, omit middlemen: skips retailers & distributors
Amazon's Strategic Analysis- Business
continuation of free shipping; drive the e-book sales by offering continuing enhancements of its Kindle e-reader, invest heavily in supply chain management *KINDLE bring in a LOT of revenue
supply chain management systems
continuously link the activities of buying, making, and moving products from suppliers to purchasing firms, as well as integrating the demand side of the business equation by including the order entry system in the process.
(t8.3) third party cookies
cookies placed by third party advertising networks. used to monitor and track online behavior, searches, and sites visited across thousands of sites that belog to the advertising network for the purpose of displaying relevant advertising
enterprise systems
corporate wide systems that relate to all aspects of production, including finance, human resources, and procurement.
cloud computing
corporations and end users who want to access data, programs and storage from anywhere that there is an internet connection should use _____.
CPM
cost per 1000 impressions
Affiliate program
cost-per-action program, where program sponsors (e.g., Amazon.com, iTunes) pay referring Web sites a percentage of revenue earned from the referral
Manual inventory controls
counting and collecting info manually by hand, if done periodically due to expertise
anticybersquatting consumer protection act (ACPA)
creates civil liabilities for anyone who attempts in bad faith to profit from an existing famous or distincitve trademark by registering an internet domain name that is identical or confusingly similiar to, or dilutive of that trademark p.286
(types of e-books) print-on-demand book
custom-published book
culture
customary beliefs of a social group
hacktivism
cybervandalism and data theft for political purposes p.174
current liabilities
debts of the firm that will be due within one year
Characteristics of the next generation Internet, Web 3.0, are expected to be each of the following except
decreased use of the semantic Web....(not= more uses of 3D tools. - faster, and more far-flung connectivity. - more clout for ordinary people.)
How are media consumption habits shifting?
decreasing time spent through traditional media consumption channels (e.g., radio, TV, newspapers), potentially lowering the audience reach of these old channels and making them less attractive for advertisers-->
disadvantages (risks and costs) of auctions:
delayed consumption costs, monitoring costs, equipment costs, trust risks, fulfillment costs
what model best describes the type of model dell uses for the bulk of their online sales
demand-pull model
anonymous information
demographic and behavioral information that does not include any personal identifiers p.267
E-privacy act
designed to protect individual privacy
(table 8.9, p 525) Privacy Enhancing Technologies: Spyware blockers
detects and removes spyware, adware, keyloggers, and other malware
tracking inventory
determines the ability to respond to inventory
Just in time inventory
determines the amount of ability to respond to customer inquiry, determines ability to anticipate and respond to inventory
Technological Convergence
development of hybrid devices that can combine the functionality of 2 or more existing media platforms into a single device
What are the challenges of maintaining growth as a business and industry mature?
difficult for Google to find new growth markets that make as much as a difference -Emerging advertising outlets such as social networks and mobile have lower click-through rates than conventional advertising: -Google will have to work harder for less money *sad face*
Cable modem
direct connection with the capacity to deliver approximately 5 mbps
some forms of online ads
dispay ads, rich media, video ads, search engine ads, social network, blog, game, sponsorships, referrals, email marketing, online catalogs
Frames
displaying two or more web pages at the same time in the same browser window
Expertise location systems are designed to
do all of these.
e-cash
drawn from online customers banking account
Job Displacement
due to changes in the market place, the demand for certain job types is decreased and in some instances become obsolete
Commerce
e-commerce
most common type of net marketplace
e-distributors
4 main types of net marketplaces
e-distributors, e-procurement networks, exchanges, industry consortia
A government agency uses an online reverse auction to satisfy the tendering system requirements specified by law. This is an example of
e-procurement.
8 segments of the retail industry
eating and drinking, food and beverage, moto, consumer durables, online retain, general merchandising, gas and feul, specialty stores
Secure electronic Payments
ecryptying data between customer, merchant, financial institution SSL (Secure Socket Layer)
social search
effort to provide fewer, more relevant, and trustworthy results based on the social graph. pg. 224
Newsgroup
electronic billboards where people post questions and comments, they are broken into interest groups
domain
email addresses have two basic parts, the user's name and the ____ name, which includes the top-level domain.
(table 8.9, p 525) Privacy Enhancing Technologies: secure email
email and document encryption
catalog merchants etail biz model
established companies that have a national offline catalog operation that is their largest retail channel, but have rcently develiped online capabilities (ll bean)
catalog merchants
established companies that have a national offline catalog operation that is their largest retail channel, but who have recently developed online capabilities
catalog merchants
established companies that have a national offline catalog operation that is their largest retail channel, but who have recently developed online capabilities p.321
Catalog merchants
established companies that have a national offline catalog operation that is their largets retail channel, but who have recently developed online capabilities Ex: LL Bean, Lands End, Victoria's Secret
Primary beneficiaries of online retail
established offline retailers with online presence, first mover dot-com companies
TCP/IP
establishes where the data travels
Authentication
establishing the validity of ones claimed identity
service industries
establishments providing services to consumers, businesses, governments, and other organizations
service industries
establishments providing services to consumers, businesses, govs, and other organizations
Site Assessment
evaluating the form and function of your website design
substitution cipher
every occurrence of a given letter is replaced systematically by another letter p.181
G2C performance objectives include
expanding access to information for people with disabilities.
social engineering
exploitation of human fallibility and gullibility to distribute malware p.172
organic search search engine marketing can't get a #1 search rank- a company HAS to pay for the #1 ranking- t or f
false- don't have to pay
MOTO(mail oreder and telephone order)
fastest growing retail segment 70s. physical catelogs and telephone call centers
working capital
firm's current assets minus current liabilities
tenancy deals
fixed charge for guaranteed # of impressions, exclusive partnerships, "sole providers"
URL
for a browser to connect to a web page, the address, also called the ___, must be specified.
electronic billing presentment and payment (EBPP) system
form of online payment systems for monthly bills p.196
responsibilities
free moral agents, individuals, organizations, and societies are responble for the actions they take
(Table 8.4, p 515) Federal and state privacy laws
freedom of information act of 1966 privacy act of 1974 electronic communications privacy act of 1986 computer matching and privacy protection act 1988 computer security act 1987 driver's privacy protection act 1994 e government act 2002 fair credit reporting act 1970 family educational rights and pricacy act 1974 right to financial privacy act 1978 privacy protection act 1980 cable communications policy act 1984 video privacy protection act 1988 children's online privacy protection act 1998 ifnancial modernization act 1999 health insurance protability and accountability act 1996 (HIPPAA) online privacy policies spyware legislation disclosure of security breaches privacy of personal information data encryption
The following are representative characteristics of Web 2.0 except
frequent or short software-upgrade cycles. (not= The ability to tap into the collective intelligence of users. - Making data available in new or never-intended ways. - The presence of lightweight programming techniques and tools that lets nearly anyone act as a developer.)
(t8.5) security
ftc fair information practice principle; data collectors must take reasonable steps to assue that customer information is accurate and secure from unauthorized use
(t8.5) enforcement
ftc fair information practice principle; there must be a mechanism to enforce FIP principles in place. this can involve self regulation, legislation giving consumers legal remedies for violations, or federal statutes and regulation
(t 8.5) notice/awareness
ftc trade commisions fair information practice principle; sites must diclose their informaiton practices before collecting data, includes identification of collector, uses of data, other recipients of data, natiure of collection, voluntary or required, consequesnses of refusal, and steps taken to prodect confidentiality, integrity, and quality of the data
Storefront software packages
fully integrated software packages that provide users with all of the tools necessary to create an e-commerce site
Depleting impression fraud
generating bogus impressions to exhaust rival's CPM budget
when do most european patent laws recognize business methods
if it's based on technology
spam blocker
if you are receiving too much junk email your ____ is not working well.
web based
if you are using email without installing an email client on your computer then you are using ____ email.
tariffs
imposed on imported goods
top level domain
in a URL, the ____ identifies the type of organization.
web auction
in a _____, sellers post descriptions of products at a website and buyers submit bids electronically
internet service provider
in order to connect to the internet via the web, you will need communications hardware, browser software, and an _______.
Content Convergence
in the design, production, and distribution of content
private industrial networks
internet-based communication environments that extend far beyond procurement to encompass truly collaberative commerce
automated order entry systems
involve the use of telephone modems to send digital orders
social network
involves a group of people, shared social interaction, common ties among members, and people who share an area for some period of time
social network
involves a group of people, shared social interaction, common ties amoung members, and people who share an area for some period of time
contract purchasing
involves long term written agreements to purchase specified products, under agreed upon terms and quality for an extended period of time.
contract purchasing
involves longterm written agreements to purchase specified products, under agreed upon terms and quality, for an extended period of time
B2G
involves the concept that businesses and government agencies can use central web sites to exchange info
spot purchasing
involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers
cybersquatting
involves the registration of an infringing domain name or other internet use of an existing trademark, for the purpose of extorting payments from the legitimate owners p.286
cyber piracy
involves the same behavior as cyber squatting, but with the intent of diverting traffic from the legitimate site to an infringing site p.286
search engine adverising
involves the use of search engines to support direct sales online. pg. 221
collaborative resource planning, forecasting, and replenishment
involves working with network members to forecast demand, develop production plans, and coordinate shipping, warehousing and stocking activites to ensure that retail and wholesale shelf space is replenished with just the right amount of goods.
Viadeo
is a network of over 3 million professionals, mostly in Europe and China, and its primary use is for connecting business contacts.
what is eCap
it enables suppliers to track volkswagons continually updated production plans and meterial requests
Phishing
it is a scam to steal valuable information such as credit card and social security numbers
why didn't volkswagen join an industry consortium?
it wanted a private platform so it could integrate its suppliers better and have better control
why didn't volkswagen want to use a more open or public exchange for its parts supply?
it would have to use a framework that other companies could use, and would hope they could compete better
due process
laws are known and understood and there's an ability to appeal to higher authorities to ensure that the laws have been applied correctly
Content Literacy
learning and knowledge management
long-term debt
liabilities that are not due until the passage of a yr or more
Psychographics
lifestyle characteristics which include activities, attitudes, customs, and traditions
linking
linkto to content pages on other sites, bypassing the home page p.288 Also see deep linking
benefits of auctions:
liquidity, price discovery, price transparency, market efficiency, lower transaction costs, consumer aggregation, network effects
Domain name service (DNS) listings
list of all public, named servers on network -every online firm provides it
inter-mediation
middle man
name the 5 online content revenue models
mixed, advertising, ppv, marketing, subscription
Subscription
monthly/annually fee for bulk access
Government-to-employee applications lead to significant efficiency improvements for each of the following reasons except
most government employees use handheld digital devices.
Personal information collected by e-commerce sites
name, address, phone number, e-mail address, social security number, band accounts, credit card accounts, gender, age, occupation, education, preference data, transaction data, clickstream data, browser type
Secure socket layer
needed to provide credit card security for browser
Global positioning system (GPS)
network of satellites and supporting technologies used to identify a device's physical location
aquisition rate
new customers
asynchronous
no timing requirement for communication
W3C (WWW Consortium)
non-profit organization that oversees and assists in monitoring the web
Internet Advertising Bureau (IAB)
nonprofit industry trade group for the interactive advertising industry -evaluates and recommends interactive advertising standards and practices -conducts research, education, and legislative lobbying
types of social network/online community: interest based social networks
offer members focused discussion groups based on a shared interest in some specific topic
Internet-based social networks
offer members focused discussion groups based on shared interests in some specific topic Ex. Social Picks (stock market)
Practice Networks
offer members focused discussion groups, help, info and knowledge relating to an area of shared practice Ex. LinkedIn
types of social network/online community: practice networks
offer members focused discussion groups, help, information and knowldge relating to an area of shared practice
types of social network/online community: affinity communities
offer members focused discussions and interaction with other people who share the same affinity
Affinity Communities
offer members focused discussions and interaction with other people who share the same affinity Ex. BlackPlanet and iVillage
types of social network/online community: general communities
offer members opportunities to interact with a general audience organized into general topics
Fulfillment Company
offers services to other companies like transaction processing
legacy computer systems
older mainframe systems used to manage key business processes within a firm in a variety of functional areas
fixed pricing
one national price everywhere for everyone
Fixed Pricing
one national price, everywhere, for everyone
vertical market
one that provides expertise and products for a specific industry
Examples of IEE services include
one-stop recruitment.
Banner advertising
online advertising technique where small hyper lined advertisements are placed on frequently visited pages of a website
real-time bidding process
online auctions where advertisers bid for audience slots
B2B electronic storefronts
online catalogs of products made available to the public marketplace by a single supplier
types of social network/online community: sponsored communities
online communities created for the purpose of pursuing organizational (and often commercial) goals
Sponsored Communities
online communities created for the purpose of pursuing organizational goals Ex.Nike, IBM, Cisco and political candidates
Multi channel vs Pure Online Financial Services
online consumers prefer multichannel firms with physical presence, mutli channel is growing faster, pure firms rely on web site and advertising to get customers
(t8.3) forms
online forms that users voluntarily fill out in return for a promised benefit or reward that are linked with clickstream or other bejavioral data to create a personal profile
Ezine
online magazines or email newsletters
Advergames
online mini games created for longer term, immersive brands engagement
Online Retail Sector today
online segment (6%) is the smallest segment of retail industry, growing faster than offline segments, revenues expected to resume growth 10-15%
hotels.com, careerbuilder.com, and etrade are all examples of what business online model
online service provider
B2C
online stock trading, online shopping, and online banking are all the common _____ applications.
Internal hosting
operating and maintaining your own server
operating margin
operating income or loss/net sales revenu
accessibility wizards
option on most computers that allow a user's computer to be configured for visual, hearing,and physical needs
Interstate Tax Freedom act
proposed legislation that suggests the federal government mandate a 5% internet tax on internet commerce
copyright law
protexts original forms of expression such as writings, art, drawings, photographs, music, motion pictures, performances, and computer programs from being copied by others for a minimum of 70 years p.279
(COBS) corporate online-booking solutions
provide integrated airline, hotel, conference center, and auto rental services at a single site
corporate online booking solutions (cobs)
provide integrated airline, hotel, conference center, and auto rental services at a single site
balance sheet
provides a financial snapshot of a company on a givn date and shows its financial assets and liabilities
VAN ( Value Added Network)
provides connections and ensures security for data
e-distributor
provides electronic catalog that represents products of thousands of direct manufacturers, typically owned by intermediaries, typically horizontal, usually have a fixed price but discounts for large customers
E- Distributor
provides electronic catalog that represents the products of 1000s of direct manufacturers
e-distributor
provides electronic catalog that represents the products of thousands of direct manufacturers. operate in horizontal markets with different products and from many different suppliers
Which of the following types of virtual communities just facilitates the exchange of information on a topic of mutual interest and does not support trading?
purpose or interest
cap pricing
putting caps on bandwidth usage, charging more for additional usage in tiers of prices p.293
3 legged stool
quality, service, price
key performance indicator (KPI)
quantifiable measurement, agreed to beforehand, that reflects the critical success factors of a company, department or project
view to cart ratio
radio of add to art clicks to product view
cart conversion rate
ratio of actual orders to add to cart clicks
browse to buy radio
ratio of items bought to product views
sentiment ration
ratio of positive comments to total comments pg. 246
Web server
rats web user requests to e-commerce servers
Read Aloud Software
reads text aloud
Inventory management
relies on how well a seller manages the product inventory---consider cost of shortage, stock on hand, just in time tracking
proxy server
software server that handles all communications originating from or being sent to the Internet, acting as a spokesperson or bodyguard for the organization p. 191
supply chain management (SCM)
refers to a wide variety of activities that firms and industries use to coordinate the key players in their procurement process
indirect distribution channels
refers to all of the steps in the movement of products
product distribution channels
refers to all of the steps in the movement of products or services to the customer
assets
refers to stored value
economic viability
refers to the ability of firms to survive as profitable business firms during a specified period
response time
refers to the amount of time it takes a seller to respond to an inquiry for purchase or service
Response Time
refers to the amount of time it takes a seller to responded to an inquiry for purchase/service.
Digital Rights Management (DRM)
refers to the combination of technical and legal means for protecting digital content from unlimited reproduction without permission
Cybersquatting
registering an internet name for the purpose of reselling it for a profit
cybersquatting
registration of an infringing domain name for the purpose of extorting payments from legit owners
Interstate commerce Act
regulates shipment of products via surface transportation
Internet community type classifications include
relations or practices.
Rank-based impression fraud
repeatedly search keywords linked to rival ads or access pgs. where they appear to generate impression w/o clicks & lower performance rank of rival's ad -possibly lowers rival's ads from rank results so fraudsters ( :P ) can bid less for ad slots
opt-in
requires an affirmative action by the consumer to allow collection and use of consumer information p. 272
opt-in
requires an affirmative action by the consumer to allow collection and use of consumer information.
(t 8.11) DMCA Title 4: misc provisions
requires copyright office to report to congress on the use of copyright materials for disance eduaction, allows libraries to make digital copies for works for internal use only; extends musical copyrights to include webcasting.
(t 8.11) DMCA Title 2: online copyright infringement liability limitation
requires isps to take down sites they host if they are infringing copyrights and requires search engines to block access to infringing sites. limits liability of isps and search engines
linkedln
researching individual businesses, searching for job opportunities, developing extended business networks, and maintaining business contacts are all of the actions that best describe the primary uses of ______.
B2C
retail stores use ____ e-commerce to create a presence on the web as another way to reach customers.
profit
revenue minus all expenses
Security
risk introduced to a company when someone accesses a company's website using a browser
(table 8.9, p 525) Privacy Enhancing Technologies: anonymous remailers
send email without a trace
Companies can interface with social networking in each of the following ways except
sending flyers to customer mailboxes.
protocol
rules for exchanging data between computers.
B2G (Business to Government)
sales between companies and government organizations
5 rev models for an e-comm site
sales, ad, affiliate, subscription, transaction
cyberpiracy
same behavior as cybersquatting but with the intent of diverting traffic from the legit site to an infringing site
what is the overwhelming reason consumers shop online
save timw
yahoo and ask jeeves are examples of
search engines/portals
the procurement process 7 steps
search, qualify, negotiate, purchase order, invoicing, shipping, remittance payment
How does the entertainment industry make money electronically?
sell episodes on pay per view bases, on iTunes, entire series online on their own corporate sites -Netflix, CinemaNow -Hulu.com is the most successful
5 things a website can do
sell, connect people, offer info, entertain, motivate
seller-side solutions
seller biased markets that are owned by and show only goods from a single seller.
seller-side solutions
seller-biased markets that are owned by, and show only goods from, a single seller
How does Media generate revenue?
similar to online content revenue models
virtual merchant
single channel web firms that generate almost all of their revenue from online sales
Manufacturer-direct
single or multi channel manufacturers who sell directly online to consumers without the intervention of retailers
manufacturer direct
single or multi channel manufacturers who sell directly online to consumers without the intervention of retailers p.322
manufacturer direct etail biz model
single or multi channel manufacturs who sell directly online to consuemrs without intervention of retailers (dell)
manufacturer-direct
single- or multi-channel manufacturers who ssell directly online to consumers without the intervention of retailers
virtual merchant
single-channel web firms that generate almost all of their revenue from online sales
virtual merchants
single-channel web firms that generate almost all of their revenue from online sales p.320
virtual merchants etail biz model
single-channel web firms that generate almost all of their revenue online (amazon)
Manufacturer-Direct
single-or-multi-channel manufacturers who sell directly online to the to consumers without the intervention of retailers Ex. Computer: Hardware: Dell and Apple; Apparel: Ralph Lauren and Nike *simplifies the companies operations, eliminating the need for support a wholesale and retail sales network and cutting out associated mark up
Enriching click fraud
site operators generate bogus ad clicks to earn PPC income
Enriching impression fraud
site operators generate false pg. views to boost CPM earnings
financial portals
sites that provide consumers with comparison shopping service, independent financial advice, and financial planning p.329
financial portals
sites that provide consumers with comparison shopping services, independent financial advice, and financial planning
Plug-in
small computer program that extends the feature set or capabilities of another application
Thumbnails
small graphics used to keep loading time down
Cookie
small piece of information collected and saved in the browser from a site and retrieved when the user returns to that site
What is the Bullwhip Effect?
small raise in demand--> fall in profitability, exaggerated everything when reaches suppliers (forced to keep most inventory [death]), makes goods very expensive up the chain -eliminated w/ equal info for all!
Which of the following refers to the mapping and measuring of relationships and flows between people, groups, organizations, animals, computers or other information- or knowledge-processing entities?
social network analysis
**(t8.3) digital rights management (DRM)
software *windows media player) that requires users of online media to identify themselves before viewing copyrighted content
(table 8.9, p 525) Privacy Enhancing Technologies: privacy policy reader
software for automating the communication of privacy policies to users
Security software
software that provides protection for both merchant and customer data
From handling software
specialized software that allows users to provide responses and submit the data to the servers
marketing communications has a dual purpose to support _ and _
spread brand awareness and sales
start ch 9
start ch 9
Millennium Digital commerce act
states that electronic commerce contracts are valid when signed electronically
How do media distribution companies make money?
strike alliances with traditional media companies, get a share of the revenues
SQL
structured query language is the standardized language used to request information from a database
Registered copyright
the author has registered the piece with the us copyright office. Doing this makes it easier to prove copyright infringement
domain extension
suffix that indicates which top level domain it belongs to
hub and spoke system
suppliers connected to a central hub of buyers via private dedicated networks
hub and spoke system
suppliers connected to a central hub of buyers via private dedicated networks.
(table 8.9, p 525) Privacy Enhancing Technologies: anonymous surfing
surf without a trace
Merchant e-commerce
takes title to the goods and services they sell
Goods
tangible products, they have a touch and feel
income taxes
taxes that are levied by national, state, and local governments
cache
temporary storage space used to speed computing tasks
Classified Ad
text ad just like a classified ad in print except it is listed on a website
B2B e-commerce
that portion of B2B commerce that is enabled by the Internet
net value
that portion of perceived customer value that can be attributed to the fact that content is available on the internet
web
the ____ provides an easy-to-use, intuitive, multimedia interface to the sources available on the internet.
signature
the _____ of an email message may include the sender's name, address, and telephone number.
jurisdiction
the ability of the government to exert control over a person or corporation
availability
the ability to ensure that an e-commerce site continues to function as intended p.169
nonrepudiation
the ability to ensure that e-commerce participants do not deny (i.e., repudiate) their online actions p.168
integrity
the ability to ensure that information being displayed on a web site of transmitted or received over the internet has not been altered in any way by an unauthorized party
confidentiality
the ability to ensure that messages and data are available only to those who are authorized to view them p.168
Profitability
the ability to make a profit after expenses are deducted from success
globalization
the act of becoming worldwide in scope or application
Cyber Squatting
the act of registering, selling, or using an internet domain name with bad-faith
Form
the actual layout of the website
Supply Chain
the links that connect business firms with one another to coordinate production
privacy
the moral right of individuals to be left alone, free from surveillance or interference from other individuals from other organizations, including the state p. 265
Privacy
the moral right of individuals to be left alone, free from survelliance or interference from other individuals or organizations, including the state
What do all private key techniques have in common?
the more individuals who need to know the key, the greater the probability of it falling into the wrong hands
Function
the navigation features of the website
Number of impressions
the number of times a banner is displayed to individual viewers
Number of click throughs
the number of times viewers click on the banner
Click-through rate (CTR)
the number of users who clicked an ad divided by the number of time the ad was delivered (impression) -measures the percentage of people who clicked on an ad to arrive at a destination-site
transposition cipher
the ordering of the letters in each word is changed in some systematic way p.181
Dynamic Pricing
the price of the product varies depending directly on the demand characteristics of the customer and the supply situation of the seller
storyboard
the process of developing and diagramming a site's structure that best matches your user's needs
account aggregation
the process of pulling together all of a customers financial (and even non-financial) data at a single personalized web site p.329
account aggregation
the process of pulling together all of a customers financial and even non financial data at a single personalized web site
exchange rate
the ratio at which the principal of two currencies may be traded
Intellectual property
the right an individual or group of individuals has in an idea
domain name
the specific address where the resource is located
ethics
the study of principles that individuals and organizations can use to determine right and wrong courses of action p.264
8 elements of a biz plan
value proposition, rev model, market opportunity, comp strategy, comp enviromment, market strategy, organizational development, management trm
streaming
the technology that continuously downloads audio and video files to your computer while you are listening to and/or viewing the content.
total inter-firm trade
the total flow of value among firms
customer experience
the totality of experiences that a customer has with a firm, including the search, informing, purchase, consumption, and after-sales support for its products, services, and various retail channels. pg. 219
top level domain
the type of organization
collaborative commerce
the use of digital technologies to permit organizations to collaboratively design, develop, and manage products through their life cycles
social marketing/advertising
the use of online social networks and communities to build brands and drive sales pg. 230
URL
the website's web address
uniform pricing rule
there are multiple winners and they all pay the same price
web
there are two basic types of email accounts: client based and ____-based.
(t8.5) choice/consent
there must be a choice regime in place allowing consumers to choose how their information will be used for secondary purposes other than supporting the transaction, including internal use and transfer to third parties. opt in/opt out must be available.
Proxy servers
third-party computer that passes traffic to and from a specific address without revealing the address of the connected user
Production
this function creates or obtains products or services for sale
ASP
this is a company that offers individuals or enterprises access over the internet to application programs and related services that would otherwise have to be located in their own personal or enterprise computers.
small mom and pop retailers
use ebay, amazon, and yahoo stores sales platforms and other merchants whose primary revenue is from sending traffic to their mother site
Encrypted service/ browser
use in order to protect against unlawful access to a user's credit card number
what are 4 things you can do to increase your search engine optimization
use keywords on your site, appear on other websites, use metatags, pay a search engine and register
Collaborative Commerce
use of digital technologies to permit organizations to collaboratively design, develop, build, and manage products through their life cycles
HTTP
used to exchange Web pages over the Internet
(t8.3) social networks
used to gather information on user-provided content such as books, music, and other interests, preferences, and lifestyles
trademark
used to identify and distinguish goods and indicate their source
(t8.3) Advertising networks
used to track individuals as they more amoung thousands of web sites pg.226
(t8.3) cookies
used to track individuals at a single site
freemium
users offered basic service for free but have to pay more for premium
lead generation marketing
uses multiple e-commerce presences to generate leads for businesses who later can be contacted and converted into customers pg. 230
(t8.3) search engine behavioral targeting (google and other search engines)
uses prior search history, demographic, expressed interests, geographic, or other user-entered data to target advertising
(t8.3) deep packet inspection
uses software installed at the isp level to track all user clickstream behavior, sells this information to advertisers, and then attempts to show users relevant ads
External hosting
using an outside company to serve your website
Text Menu
using any keyed text for links from a home page or other website pages
Graphics Menu
using images as links from a home page or other web page
Distributed Denial of Service (DDoS) attack
using numerous computers to attack the target network from numerous launch points. They can shut down a systems operations indefinitely. p.176
interest-based advertising (behavioral targeting)
using search queries and clicks on results to behaviorally target customers pg. 240
metatagging
using trademarket works in a sites metatags p.287
Site certificate
verifies the host's identity to computers that access it
ISPs
verizon, sprint, and AT&T are examples of _____.
durables and general merchandise
very large firms with developed automated real time inventory contro systems with large notional customer bases.
what type of ads make up the fastest growing online ad channel
video
dragon naturally speaking
voice activated software
The exclusive online publication of Stephen King's e-book Riding the Bullet
was disrupted by hackers who breached security, then distributed free copies of the book.
order fulfillment
when the selected object is shipped to the buyer
business functionalities net marketplaces have
what businesses buy (direct vs indirect goods), how businesses by (spot purchasing vs long term sourcing)
Outsourcing
when a company hires another company to handle some of the tasks related to the creation and maintenance of a web site.
Dis-Inter-mediation
when a segment of the value chain becomes unnecessary or is replaced by another intermediary
hyperlink
when creating a web page, if you would like to be able to click and display another webpage, you should use a _____.
EDI
when one business transfers computer readable data into an agreed upon format
JAWS
windows program with powerful accessibility solution that reads information found on the computer and speaks it
discriminatory pricing
winners pay different amounts depending on what they bid
Wi-Fi
wireless local-area networking devices -typically connect to an antenna-equipped base station or hotspot, which is then connected to the Internet -use standards known as IEEE 802.11 -various version of this standard (e.g., b, g, n) may operate in different frequency bands and have access ranges
domain name
www.abc.edu
domain name
www.mtv.com is what part of the URL?