E Commerce Test 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is a core Fair Information Practices (FIP) principle?

Choice/Consent

Accessing data without authorization on Dropbox is an example of ______ security issue.

Cloud

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

Confidentiality

Which of the following is not an example of an access control?

Digital signatures

Proxy servers are also known as:

Dual home systems

An ________ serves businesses that primarily buy direct goods on a contract purchasing basis.

industry consortium

The Seam is an example of an ________.

industry consortium

The overall rate of online credit card fraud is ________ of all online card transactions.

less than 1%

Companies use _____ to track user statements and views on newsgroups, chat groups, and other public forums?

Search engines

What are the uses of social networks in B2B e-commerce?

Social networks can provide personal connections that can help decision making in supply chain

All of the following are factors that will be considered in determining whether use of copyrighted material is "fair use" except the:

free availability of the work on the Web.

Which of the following is the leading cause of data breaches?

hackers

Identify the social consequence of the richness of Internet information.

A "screen technology" that reduces use of text and potentially the ability to read by focusing instead on video and audio messages. Potentially very persuasive messages that may reduce reliance on multiple independent sources of information.

Which of the following situations would not qualify for the fair use exception to U.S. copyright law

A student copies a photograph of his favorite band from a Web site created by the band's record label and places it on the student's personal Web site.

All of the following are potential benefits of B2B e-commerce except:

lower price transparency

Which of the following allows someone to obtain an exclusive monopoly on the ideas behind an invention for 20 years?

patent law

Which of the following tools can companies use to track user statements and views on newsgroups, chat groups, and other public forums?

search engines

All the following statements about symmetric key cryptography are true except:

symmetric key cryptography is computationally slower

All of the following statements about the Digital Millennium Copyright Act (DMCA) are true except:

the DMCA makes Internet Service Providers (ISPs) responsible and accountable for hosting Web sites or providing services to infringers regardless of whether the ISP is aware of infringement.

Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision?

the Golden Rule

Which ethical principle tells you that it is wise to assume perfect information markets?

the New York Times test

Which ethical principle states that if an action cannot be taken repeatedly, then it is not right to take at all?

the Slippery Slope

Which ethical principle asks you to consider the impact of your decision if the principles underlying your decision became an organizing principle of the entire society?

the Social Contract rule

Next generation firewalls provide all of the following except:

the ability to automatically update applications with security patches

PCI-DSS is a standard established by which of the following?

the credit card industry

Registering the domain name Faceboik.com with the intent to divert Web traffic from people misspelling Facebook.com is an example of:

typosquatting

Which of the following features of e-commerce technology can result in work and shopping invading family life?

ubiquity

_______commerce includes the following business processes: customer relationship management, demand management, order fulfillment, manufacturing management, procurement, product development, returns, logistics/transportation, and inventory management

B2B

All of the following are weaknesses of EDI except:

EDI lacks universal standards

Which of the following is not true about the evolution of Facebook's privacy policies over the ten-year period from 2005 to 2015?

Facebook's privacy policy became easier to understand.

A private industrial network is an independently owned online marketplace that connects many suppliers and buyers.

False

Copyright protection protects against others copying the underlying ideas in a work.

False

Digital cash is legal tender that is instantly convertible into other forms of value without the intermediation of any third parties.

False

Most adult social network participants do not have any expectation of personal privacy when using a social network.

False

Vishing attacks exploit SMS messages.

False

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

Firewall

What are the steps in analyzing an ethical dilemma?

Identify and clearly describe the facts Define the conflict or dilemma and identify the higher-order values involved Identify the stakeholders Identify the options that you can reasonably take Identify the potential consequences of your options

What is the first step in analyzing an ethical dilemma?

Identify and describe the facts.

Universalism

If an action is not right for all situations, then it is not right for any specific situation.

What are the potential benefits of B2B e-commerce?

Lower administrative costs Lower search costs for buyers Reduced inventory costs Lower transaction costs Increased production flexibility by ensuring just-in-time parts delivery Improved quality of products by increasing cooperation among buyers and sellers Decreased product cycle time Increased opportunities for collaboration Greater price transparency Increased visibility, real-time information sharing However, some risk is posed by increased globalization and consolidation

All of the following are current major trends in B2B e-commerce, except;

Move to implement highly centralized supply chains to reduce risk

Which of the following statements about cloud-based B2B systems is not true?

Much of the expense of the system is shifted from the B2B network provider to the firm

Which of the following is a set of short-range wireless technologies used to share information among devices within about two inches of each other?

NFC

The essential characteristic of ________ is that they bring hundreds to thousands of suppliers into a single Internet-based environment to conduct trade.

Net marketplaces

Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise?

No Free Lunch

________ refers to the ability to ensure that e-commerce participants do not deny their online actions.

Nonrepudiation

Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data?

Notice/Awareness

All of the following statements about PKI are true except:

PKI guarantees that the verifying computer of the merchant is secure

What is the first step in developing an e-commerce security plan?

Perform a risk assessment

What are the various steps in developing an e-commerce security plan?

Perform a risk assessment Develop a security policy Develop an implementation plan Create a security organization Perform a security audit

Automatically redirecting a Web link to a different address is an example of which of the following:

Pharming

________ are Internet-based communication environments that extend far beyond procurement to encompass truly collaborative commerce.

Private industrial networks

All of the following are forms of collaboration among businesses except:

RFQs

What is a cultural consequence of the global reach of the Internet?

Reduces cultural diversity in products; weakens local small firms while strengthening large global firms; moves manufacturing production to low-wage ares of the world; weakens the ability of all nations - large and small - to control their information density.

Which ethical principle states that when confronted with an ethical dilemma, an individual should take the action that produces the least harm, or the least potential cost?

Risk Aversion

Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society?

the Collective Utilitarian principle

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

True

The expansion of generic top-level domains recently authorized by ICANN is likely to be very disruptive in terms of trademark protection.

True

There is a finite number of Bitcoins that can be created.

True

Walmart is the largest purchaser of consumer goods in the world.

True

Which of the following was the first step in the development of B2B e-commerce?

automated order entry systems

Which of the following can be used to record all keyboard activity of a user?

spyware

Analysts predict that B2B e-commerce in the United States will grow by 2019 to approximately:

$8.6 trillion

Describe the five-step process that can be used to analyze an ethical dilemma. What other guidelines are there to help in understanding a complicated ethical or moral situation?

1. Identify and describe the facts. Find out who did what to whom, and where, when, and how. It helps to get the opposing parties involved in an ethical dilemma to agree on the facts. 2. Define the conflict or dilemma and identify the higher-order values involved. Ethical, social, and political issues always reference higher values. Otherwise, there would be no debate. The parties to a dispute all claim to be pursuing higher values (e.g., freedom, privacy, protection of property, and the free enterprise system). 3. Identify the stakeholders. Every ethical, social, and political issue has stakeholders: players in the game who have an interest in the outcome, who have invested in the situation, and usually who have vocal opinions. Find out the identity of these groups and what they want. This will be useful later when designing a solution. 4. Identify the options that you can reasonably take. You may find that none of the options satisfies all the interests involved, but that some options do a better job than others. Sometimes, arriving at a "good" or ethical solution may not always be a balancing of consequences to stakeholders. 5. Identify the potential consequences of your options. Some options may be ethically correct, but disastrous from other points of view. Other options may work in this one instance, but not in other similar instances. Always ask yourself, "What if I choose this option consistently over time?"

How long is a patent and what are its limits?

20 years Invention must be new, non-obvious, and novel

Which of the following is an example of an integrity violation of e-commerce security?

An unauthorized person intercepts an online communication and changes its contents.

All of the following statements about Apple Pay are true except which of the following?

Apple Pay is available for both iPhone 5s and iPhone 6s

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.

Authenticity

Which of the following dimensions of e-commerce security is not provided for by encryption?

Availability

________ refers to the ability to ensure that an e-commerce site continues to function as intended.

Availability

A fingerprint scan is an example of which of the following

Biometrics

Rustock is an example of which of the following

Botnet

Define and explain how EBPP systems work. Describe each of the main EBPP business models.

EBPP refers to electronic billing presentment and payment systems, which are forms of online payment systems for monthly bills. Analysts expect electronic bill presentment and payment to become one of the fastest growing e-commerce businesses in the United States over the next several years because everyone involved stands to benefit from the process. Billers will cut costs by eliminating printing, paper, envelopes, postage, and the processing of paper checks and payments. Furthermore, EBPP will offer billers an opportunity to enhance customer service and target market. Customers will save time and eliminate checks and postage. Companies can use EBPP to present bills to individual customers electronically or they can contract with a service to handle all billing and payment collection for them. There are two main types of EBPP business models: biller-direct and consolidator. In biller-direct systems, a biller delivers the bill to customers via its own Web site or via a third-party's site. A service bureau is often used to provide the necessary infrastructure. The second major type of EBPP business model is the consolidator model. In this model, a third party, such as a financial institution or portal, aggregates all bills for consumers and ideally permits one-stop bill payment (pay anyone).

Online gambling is now legal throughout the United States.

False

Office supplies are an example of:

Indirect goods

"Do Not Track" falls under which of the following principles in the FTC's new privacy framework?

Industry best practices

What are the four major categories of issues?

Information rights Property rights Governance Public safety and welfare

Spot buying

Involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers.

Which of the following is not a typical barrier to the implementation of a private industrial network?

It requires the large network owners to give up some of its independence

________ refers to differentiating a firm's products or prices on the basis of superior supply chain management

Supply change competition

Explain the "Right to Be Forgotten" EU policy? Next, describes the pro's and con's of this policy.

The claim of individuals to be able to edit and delete personal information.

List the different methods that are being used to protect online privacy. Which of these methods (ONLY ONE) do you think is or could be the most effective, and why?

The different methods being used to protect online privacy include legal protections, industry self-regulation, privacy advocacy groups, privacy protection products, and technology solutions

The majority of inter-firm trade involves:

contract purchasing of direct goods

All of the following are examples of direct goods in the auto industry except:

desktop computers.

Malware that comes with a downloaded file that a user requests is called a:

drive-by download

Which of the following basic ethical concepts plays an important role in defining privacy?

due process

An ________ provides electronic catalogs that represent the products of thousands of direct manufacturers.

e-distributor

An ________ primarily serves businesses that primarily buy indirect goods on a contract purchasing basis

e-procurement Net marketplace

Amazon has a patent on:

one-click purchasing

PayPal is an example of what type of payment system?

online stored value payment system

Define the procurement process. What are the seven basic steps in the procurement process (describe)?

Search (catalogs, internet, salespersons, brochures, telephone fax) Qualify (research, credit history, check with competitors, telephone research) Negotiate (price, credit terms, escrow, quality, timing) Purchase order (order product, initiate purchase order, enter into system of mail purchase order) Invoicing (receive purchase order, enter into financial system, enter into production system, send invoice, match with purchase order, internal review, enter into warehouse system) Shipping (enter into shipper's tracking system, ship goods, deliver goods, enter into tracking system) Remittance payment (receive goods, enter shipping documents into warehouse system, verify and correct invoice, resend invoice, cut check, add corrected invoice to back office systems)

FREAK is an example of which of the following:

Software vulnerability

________ purchasing involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers

Spot

Which of the following was designed to cripple Iranian nuclear centrifuges:

Stuxnet

Which of the following statements about EDI systems is true?

They typically serve vertical markets

Zeus is an example of which of the following:

Trojan horse

Apple Pay uses near field communication (NFC) chips.

True

Exploit kits are often rented or sold as a commercial product.

True

Google defended its Library Project on the grounds of fair use.

True

In the United States, Google is not required to remove results from its search engine if requested.

True

MRO goods are also known as indirect goods.

True

PayPal is the most popular alternative payment method in the United States.

True

Purchasing managers are the key players in the procurement process.

True

SLS/TLS cannot provide irrefutability.

True

ShellShock is an example of a software vulnerability.

True


Set pelajaran terkait

Coursera - A Life of Happiness and Fulfillment

View Set

Series 66 -- Investment Advisers Act of 1940

View Set

NSG 333 Ch 4- Common Reproductive Issues

View Set

AP Psychology: Unit 14 Test Review

View Set

Module 10 Computer Concepts Exam

View Set