3330 Ecommerce Final Exam
Venture Capital Investors
Invest funds they manage for other investors such as investment banks, pension funds, insurance companies, or other businesses and usually want to obtain a larger stake in the business and exercise more control over the operation of the business. Also typically want a well-defined exit strategy such as a plan for an initial public offering or acquisition of the company by a more establish business within a relatively short period of time.
Spoofing
Involves attempting to hide in a true identity by using someone else's email or IP address. IE. a spoofed email will have a forged sender email address designed to mislead the receiver about who sent the email.
Java Server Pages (JSP)
Like CGI and ASP, a web page coding standard that allows developers to dynamically generate web pages in response to user requests
Client/Server Computing
Model of computing in which client computers are connected in a network together with one or more servers which are computers that are dedicated to performing functions that the client computers on the network need, such as file storage, software applications, printing and internet access.
the web
One of the most popular services that runs on the Internet infrastructure. The original killer app that made the internet commercially interesting and extraordinarily popular. Developed in the early 90s and hence much more recent vintage than the internet. Provides access to billions of web pages.
Mobile platform
Provides the ability to access the internet from a variety of highly mobile devices such as smart phones, tablets and other ultra-lightweight laptop computers.
Firewall
Refers to either hardware or software that filters communication packets and prevents some packets from entering the network based on a security policy.
4 Layers of the Internet
Network technology substrate layer, transport services and representation standards layer, applications layer,
What is the most frequent cause of stolen credit cards and card information today?
Phishing attack
Spyware
Program used to obtain information such as a user's keystrokes, email, instant messaging, and son on. Can even take screen shots and capture passwords or other confidential information
System Architecture
Refers to the arrangement of software, machinery and tasks in an information system needed to achieve a specific functionality much like a homes architecture refers to the arrangement of building materials to achieve a particular functionality.
6. Local e
commerce- Focused on engaging the consumer based on his or her current geographic location. Groupon offers subscribers daily deals from local businesses in the form of Groupons, discount coupons that take effect once enough subscribers have agreed to purchase
applications layer
contains client apps such as WWWeb , email, and audio or video playback.
Which of the following is not a primary activity in a firm value chain,
finance/accounting
transport services and representation standards layer
houses the tcp/ip protocol
All of the following are key elements of a business model except
information technology strategy.
Internet layer
responsible for addressing, packaging and routing messages on the internet.
Active X
A programming language created by Microsoft to compete with JAVA
Web2.0
A set of apps and technologies that enable use-generated content, such as online social networks, blogs, video and photo sharing sites, and wikis, widespread adoption of consumer mobile devices such as smartphones and tablet computers the expansion of e-commerce to include local goods and services.
Business model
A set of planned activities (sometimes referred to as business processes) designed to result in a profit in a marketplace. Not always the same as a business strategy, although in some cases they are very close insofar as the business model explicitly takes into account the competitive environment. It is at the center of the business plan.A business document that specifically details how you plan on selling your product and find new customers is called a: market strategy.
Common Gateway Interface (CGI)
A set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server
Hadoop
A software framework for working with various big data sets. Open source software, managed by Apache software foundation. Enables distributed parallel processing of huge amounts of data across inexpensive computers.
Intranet
A tcp/ip network located within a single organization for purposes of communications and information processing.
Cookie
A tool used by Web sites to store information about a user. When a visitor enters a web site, the site sends a small text file, the cookie to the user's computer so that information from the site can be loaded more quickly on future visits. The cookie can contain any information desired by the site designers.
Internet2
Advanced networking consortium of more than 350 member institutions working in partnership to facilitate the development, deployment, and use of revolutionary internet technologies.
Cold Fusion
An integrated server-side environment for developing interactive web applications.
Phishing attack
Any deceptive, online attempt by a third party to obtain confidential information for financial gain. Typically, do not involve malicious code but instead rely on straightforward misrepresentation and fraud. So called social engineering techniques email scam.
An Internetenabled media player would run in which layer of Internet architecture
Application layer
4 layers of tcp/ip
Application, host to host transport layer, internet layer, network interface layer
Scale Economies
Are efficiencies that result from increasing the size of a business, for instance when large, fixed-cost production systems (such as factories or software systems) can be operated at full capacity with no idle time. Scale economies are efficiencies that result from flattening the hierarchy of an organization-FALSE
The 6 types of ecommerce
B2B, B2C, C2C, Mobile, Social, Local
Botnet
Collection of captured bot computers used for malicious activates such as sending spam, participating in a DDoS attack, stealing information from computers, and storing network traffic for later analysis.
3. Consumer to Consumer
Consumers selling to other consumers Example: Auction sites such as eBay, and listing sites such as Craigslist, enable consumers to auction or sell goods directly to other consumers. Airbnb and Uber provide similar platforms for services such as room rental and transportation.
Symmetric Key Encryption
Both the sender and the receiver use the same key to encrypt and decrypt the message.
E
Business-The digital enabling of transactions and processes within a firm, involving information systems under the control of the firm.
Which of the following left the WikiLeaks Web site effectively inoperable in August 2012
DDoS attacks
Content Management System (CMS)
Database software program specifically designed to manage structured and unstructured data and objects in a web site environment. A cms provides web managers and designers with a centralized control structure to manage we site content.
Privacy
Deals with the use of information shared during an online transaction consumers want to limit the extent to which their personal information can be divulged to other organizations, while, merchants want to protect such information from falling into the wrong hand.
Value Proposition
Defines how a company's product or service fulfills the needs of customers. To develop and or analyze a firm's value proposition, you need to understand why customers will choose to do business with the firm instead of another company and what the firm provides that other firms do not and cannot. Value proposition and revenue are typically the most easily identifiable aspects of a company's business model.
Revenue Model
Describes how the firm will earn revenue, generate profits and produce a superior return on invested capital. We use the terms revenue model and financial model interchangeably. Generate profits and to produce returns on invested capital that exceed alternative investments. Profits alone are not sufficient to make a company "successful". in order to be successful a firm must produce returns greater than alternative investments.
Availability
Determines whether a Web site is accessible and operational at any given moment. Availability refers to the ability to ensure that an e-commerce site continues to function as intended.
Confidentiality
Determines whether information shared online, such as through email communication or an order process, can be viewed by anyone other than the intended recipient.
middleware services layer
glue that ties the applications to the communications
Which dimension(s) of security is spoofing a threat to?
integrity and authenticity
ecommerce security (6 Dimensions)
integrity, nonrepudiation, authenticity, confidentiality, privacy, availability
All of the following are used for authentication except
packet filters. all of these are used for authentication; biometric devices, digital signatures, certificates of authority.
TCP
protocol that establishes the connections among sending and receiving web computers and handles the assembling of packets at the point of transmission and their reassembly at the receiving end
IP
protocol that provides the internets addressing scheme and is responsible for the actual deliver of the packets
Application layer
provides a wide variety of applications with the ability to access the services of the lower layers. Some of the best known applications are HTTP, FTP and SMTP
The Transport Layer of TCP/IP is responsible for which of the following?
providing communication with the application by acknowledging and sequencing the packets to and from the application
4. Mobile Comerce
refers to the use of mobile devices to enable online transactions. Involves the use of cellular and wireless networks to connect laptops, smartphones such as iPhone or Android and tablets to the internet. Example: Mobile devices can be used to conduct commercial transactions
Network interface layer
responsible for placing packets on and receiving them from the network medium which could be a LAN (Ethernet) or a Token Ring network, or other network technology. TCP/IP is independent from any local network technology and can adapt to changes at the local level.
Host to host transport layer
responsible for providing communication with the application by acknowledging and sequencing the packets to and from the application.
Which of the following can be used to record all keyboard activity of a user
spyware
Affiliate revenue model
steer business to an affiliate receive a referral fee or percentage of the revenue from any resulting sales. For example, my points make money by connecting companies with potential customers by offering special deals to its members.
Online advertising (4 main methods)
web site, social marketing, mobile marketing, offline marketing
Packet switching
Sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destination. Packet switching requires a dedicated circuit.
Widget
Small, prebuilt chunk of code that executes automatically in your HTML web page; capable of performing a wide variety of tasks
Value Chain
The set of activities performed in an industry or in a firm that transforms raw inputs into final products and services. Each of these activities add economic value into the final product hence the term value chain as an interconnected set of value adding activities.
Ecommerce,
The use of internet the web and mobile apps and browsers running on mobile devices to transact business, more formally, digitally enabled commercial transactions between and among organizations and individuals.
A worm does not need to be activated by a user in order for it to replicate itself
True
Cookies when combined with Web beacons, can be used to create cross site profiles
True
Every device connecting to the Internet must have a unique address
True
FTP is a protocol used to transfer files to and from a server
True
Internet access providers typically provide faster download speeds than upload speeds to consumers.
True
Proxy servers are also known as: dual home systems.
True
Public Key Encryption
Two mathematically related digital keys are used: a public key and a private key. The private key is kept secret by the owner and the public key is widely disseminated. Both keys can be used to encrypt and decrypt a message. However, once the keys are used to encrypt a message, that same key cannot be used to unencrypt the message.
Authenticity
Verifies an individual's or business's identity.
Transaction fee revenue model
a company receives a fee for enabling or executing a transaction. For example, eBay provides an auction marketplace and provides a small transition fee from a seller if the seller is successful.
Subscription revenue model
a company that offers content or services charges a subscription fee for access to some or all of its offerings. For instance, the digital version of consumer reports provides online and mobile access to premium content, such as detailed ratings, reviews and recommendations, only to subscribers, who have a choice of paying a 6.95 monthly subscription fee or a 30 annual fee.
Advertising revenue model
a company that offers content, services, and or products also provides a forum for advertisements and receives fees from advertisers.
Business plan
a document that describes a firm's business model. A business plan always takes into account the competitive environment.
Active Server Pages (ASP)
a proprietary software development tool that enables programmers using Microsoft IIS package to build dynamic pages
Revenue model Types
advertising revenue model, subscription revenue model, transaction revenue model, sales revenue model, affiliate revenue model
domain name server (DNS)
allows expressions such as Cnet.com to stand for a numeric IP address.
DNS Server
are database that keep track of IP addresses and domain names on the internet.
Combines an intuitive tag based scripting language and a tag
based server scripting language that lowers the cost of creating interactive features.
1. Business to Consumer
business selling to other consumers Example: Amazon general merchandiser that sells consumer products to retail consumers
Which of the following dimensions of e
commerce security is not provided for by encryption-availability
Which of the following is not a key point of vulnerability when dealing with e
commerce- the credit card companies
5. Social e
commerce-enabled by social networks and online social relationships Facebook is both the leading social network and social e-commerce site. Social e-commerce is the largest type of e-commerce. False
Sales revenue model
companies derive revenue by selling goods, content, or services to customers. Companies such as amazon which sells books, music and other products.
the network technology Substrate layer
composed of telecom networks and protocols
Internet Backbone
High bandwidth fiber optic cable that transports data across the internet. In milliseconds.
HTML 5
The new markup language that will enable more dynamic web content and allow for browser-accessible web apps that are as appealing as device-specific apps. Bringing the best of the app experience to the web and with apps developing new web-like capabilities.
Proxy Server
Software server that handles all communications originating from or being sent to the internet, acting as a spokes person or bodyguard for the organization.
Marketspace
A marketplace extended beyond traditional boundaries and removed from a temporal and geographic location. From a consumer point of view, ubiquity reduces transaction costs or the costs of participating in a market. No longer necessary that you spend time and money traveling to a market.
Worm
A malware that is designed to spread from computer to computer.
Nonrepudiation
Ensure that ecommerce participants do not deny (repudiate) their online actions.
Integrity
Ensures that information displayed on a Web site or sent or received via the Internet has not been altered in any way by an unauthorized party.
XML
Extensive markup language a markup language specification developed by the World wide web consortium that is designed to describe data and information.
All of the following are methods of securing channels of communication except
FTP
Phishing attacks rely on browser parasites.
False
Open Source Software
Software that is developed by a community of programmers and designers and is free to use and modify. The advantage of using open source web building tools is that you get exactly what you want, a truly customizable unique web site. The disadvantage is that it will take several months for a single programmer to develop the site and get all of the tools to work together seamlessly.
Uniform Resource Locator (URL)
The addresses used by browsers to identify the location of content on the Web are called-URL Which is the address used by a web browser to identify the location of content on the web, also uses a domain name as part of the URL. Contains protocol to be used when accessing the address followed by the location.
TCP/IP
The core communications protocol of the internet
Packet
The discrete units into which digital message are sliced for transmission over the internet.
HTTP
The internet protocol used to transfer web pages. Developed by the world wide web consortium and the internet engineering task force.
Digital divide
lack of diversity on the Internet. Inequality in access and usage. the gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access.
2. Business to Business
online businesses selling to other businesses. Example: Go2Paper is an independent third party marketplace that serves the paper industry