E-Commerce Exam Notes

Ace your homework & exams now with Quizwiz!

White Hats

"Good" hackers who help organizations locate and fix security flaws

wireless access point

"hot spot" connects to the Internet directly via a broadband connection and then transmits a radio signal to a transmitter/receiver installed in a laptop computer or PDA, either as a PC card or built-in at manufacture

Digital Signature (e-signature)

"signed" cipher text that can be sent over the Internet

B2B population

$6.7 trillion

B2C population

$600 billion

C2C population

$82 billion

Benefits of Auctions

- Liquidity: sellers can find willing buyers, & buyers can find sellers -Price Discovery: buyers & sellers can quickly & efficiently develop prices for items that are difficult to assess, where the price depends on demand and supply and where the product is rare -Price Transparency: public internet auctions allow everyone in the world to see the asking and bidding prices for items -Market efficiency: auctions can & often do lead to reduced prices & hence reduced profits for merchants, leading to increase in consumer welfare-one measure of market efficiency -Lower Transaction Costs: online auctions can lower the cost of selling & purchasing products, benefiting both merchants & consumers. Like other internet markets such as retail markets, internet auctions have a very low (not zero) transaction costs -Consumer Aggregation: sellers benefit from large auction sites ability to aggregate a large number of consumers who are motivated to purchase something in one marketspace -Network Effects: larger an auction sites becomes in terms of visitors & products for sale, the more valuable it becomes as a marketplace for everyone by providing liquidity and several other benefits listed previously, such as lower transaction costs, higher efficiency & better price transparency pg 393

when auction markets fail

-Bid Rigging: agreeing offline to limit bids or using shills to submit false bids -Price Matching: agreeing informally or formally to set floor prices on auction items below. sellers wont sell to open markets -Shill Feedback, Defensive: using secondary IDs or other members to inflate seller ratings - Shill Feedback, Offensive: using secondary IDs or other members to to deflate ratings -Feedback Extortion: threatening negative feedback in return for benefit. -Transaction Interference: emailing buyers to warn them away from seller -Bid Manipulation: retracting bid -Non-Payment After Winning: bidding high then not paying -Shall Bidding: using secondary ID or other members to raise price of an item -Transaction non-performance: accepting payment and failing to deliver -Non-Selling Seller: refusing payment or failing to deliver after successful auction -Bid Siphoning: emailing another sellers bidders and offering same product for less pg 399

What are the two marketing implications of a multi-screen environment?

-Consistent branding -Cross-platform design Responsive design

Steps in Pinterest Marketing Campaign

-Create Pinterest brand page and multiple lifestyle-themed boards Improve quality of photos Use URL links and keywords -Utilize Pinterest product pins, Pin It buttons -Integrate with Facebook and Twitter -Measuring Pinterest Marketing Results Same dimensions as Facebook, Twitter

Web site systems development best practices

1. Continuous availability 99%+ 2. Design for scalability 3. Build in mgt for end-to-end delivery 4. Plan for growth 5. Design pages for high-speed performance 6. Understand and optimize workload on system

how do you determine the target audience?

1. Demographics Age, gender, income, location 2. Behavior patterns (lifestyle) 3. Consumption patterns (purchasing habits) 4. Digital usage patterns 5. Content creation patterns (blogs, FB) 6. Buyer personas

What are the 9 basic business objectives?

1. Display goods 2. Provide product info (content) 3. Personalize/customize product 4. Engage customers in conversations 5. Execute a transaxn 6. Accumulate customer info 7. Provide after-sale customer support 8. Coordinate marketing/advertising 9. Understand marketing effectiveness 10. Provide prodxn + supplier links

Internet and Web features on which the foundations of e-commerce are built include:

1. E-mail 2. Instant messaging 3. Search engines 4. Online forums and chat 5. Streaming media 6. Cookies

5 Steps in social marketing

1. Fan Acquisition 2. Engagement 3. Amplification 4. Community 5. Brand Strength (sales)

areas where you need to make decisions in building a site

1. HR & org capabilities - creating a team that has the skill set to build and manage a successful site 2. hardware 3. software 4. telecomm 5. site design

Most unique features that must be taken into account when designing a mobile web presence

1. Hardware *smaller, more resource constraints in data storage +processing power 2. Connectivity *constrained by slower connection speeds 3. Displays *smaller + req simplicification (some are not good in sunlight either) 4. Interface *touch screen technology introduces new interaxn routines diff from tradl mouse and keyboard (not good data entry tool but can be a good navigational tool)

How can you imagine your e-commerce presence?

1. Know yourself - SWOT Analysis 2. Develop an EC presence map 3. Develop a timeline: milestones

IPA features

1. Natural language; conversational interface 2. Situational awareness 3. Interpret voice commands to interact with various Web services

4 TCP/IP Layers

1. Network Interface Layer 2. Internet Layer 3. Transport Layer 4. Application Layer

Basic Fxnality Provided by Web Servers

1. Processesing of HTTP requests 2. Security services (secure sockets layer) 3. File transfer protocol 4. Search engine 5. Data capture 6. E-mail 7. Site mgt tools

institutionalization phase

1975-95 large institutions provide funding and legitimization

commercialization phase

1995-now Private corps take over, expand Internet backbone and local service

Elevator pitch

2-3 minute pitch about what they want to make and why

Total Online marketing for 2013-2015

2013: $41.2 billion 2014: $61.4 billion 2015: $80.9 billion

Mobile online marketing 2013-2015

2013: $7.3 billion 2014: $18 billion 2015: $28.7 billion

U.S. online population

267 million

Microsoft's Internet Info Server (IIS)

2nd major web server software (25% of mkt) Windows based

Internet (IP) Addresses: IPv4

32 bit number expressed as series of 4 separate numbers marked off by periods ex: 201.61.186.227 class C address: network identified by first three sets,

IPv4 Internet adress

32-bit number with four sets of numbers marked off by periods: 201.61.186.227. each of the four numbers can range rom 0-255

What percent of all online marketing is mobile (your 2015 book statistic)?

35%

___% users say they would not revisit a web site that they found annoying to use

75

How much app time is spent on user's top 4 apps?

75%

What percent of US smartphone users use phones to search for local products/services?

80%

CRM System

A CRM is a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to know the customer.

Adware

A PUP that serves pop-up ads to your computer

Intranet

A TCP/IP network located within a single organization for purposes of communications and information processing

Online Forum

A Web application that allows Internet users to communicate with each other, although not in real time

Merchant Account

A bank account that allows companies to process credit card payments and receive funds from those transactions

Secure Negotiated Session

A client-server session in which the URL of the requested document, along with the contents, contents of forms, and the cookies exchanged, are encrypted

Virus

A computer program that has the ability to replicate or make copies of itself, and spread to other files

Digital Certificate

A digital document issued by a certification authority that contains a variety of identifying information

Attachment

A file inserted within an e-mail message

Fiber-optic Service (FIOS)

A form of DSL that provides speeds of up to 500 Mbps

IP Telephony

A general term for the technologies that use VoIP and the Internet's packet-switched network to transmit voice and other forms of audio communication over the Internet

Worm

A malware that is designed to spread from computer to computer.

Marketspace

A marketplace extended beyond traditional boundaries and removed from a temporal and geographic location. From a consumer point of view, ubiquity reduces transaction costs or the costs of participating in a market. No longer necessary that you spend time and money traveling to a market.

Extensible Markup Language (XML)

A markup language specification developed by the World Wide Web Consortium (W3C) that is designed to describe data and information

Packet Switching

A method of slicing digital messages into packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destination

Client/Server Computing

A model of computing in which client computers are connected in a network together with one or more servers

Internet Message Access Protocol (IMAP)

A more current e-mail protocol that allows users to search, organize, and filter their mail prior to downloading it from the server

Telnet

A network protocol and terminal emulation program that runs in TCP/IP. Allows remote login on another computer

Differentiated Quality of Service (diffserv)

A new technology that assigns levels of priority to packets based on the type of data being transmitted

Client

A powerful desktop computer that is part of a network

Browser Parasite

A program that can monitor and change the settings of a user's browser

Spyware

A program used to obtain information such as a user's keystrokes, e-mail, instant messages, and so on

Active X

A programming language created by Microsoft to compete with JAVA

Post Office Protocol 3 (POP3)

A protocol used by the client to retrieve mail from an Internet server

Web2.0

A set of apps and technologies that enable use-generated content, such as online social networks, blogs, video and photo sharing sites, and wikis, widespread adoption of consumer mobile devices such as smartphones and tablet computers the expansion of e-commerce to include local goods and services.

Business model

A set of planned activities (sometimes referred to as business processes) designed to result in a profit in a marketplace. Not always the same as a business strategy, although in some cases they are very close insofar as the business model explicitly takes into account the competitive environment. It is at the center of the business plan.A business document that specifically details how you plan on selling your product and find new customers is called a: market strategy.

Near Field Communication (NFC)

A set of short-range wireless technologies used to share information among devices

Common Gateway Interface (CGI)

A set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server

Security Policy

A set of statements prioritizing the information risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets

Hadoop

A software framework for working with various big data sets. Open source software, managed by Apache software foundation. Enables distributed parallel processing of huge amounts of data across inexpensive computers.

Intranet

A tcp/ip network located within a single organization for purposes of communications and information processing.

Digital Envelope

A technique that uses symmetric encryption for large documents, but public key cryptography to encrypt and send the symmetric key

Cookie

A tool used by Web sites to store information about a user. When a visitor enters a Web site, the site sends a small text file (the cookie) to the user's computer so that information from the site can be loaded more quickly on future visits. The cookie can contain any information desired by the site designers

Cookie

A tool used by Web sites to store information about a user. When a visitor enters a web site, the site sends a small text file, the cookie to the user's computer so that information from the site can be loaded more quickly on future visits. The cookie can contain any information desired by the site designers.

Certification Authority (CA)

A trusted third party that issues digital certificates

Sniffer

A type of eavesdropping program that monitors information traveling over a network

Session Key

A unique symmetric encryption key chosen for a single secure session

Ping

A utility program that allows you to check the connection between your client and the server

Hypertext

A way of formatting pages with embedded links that connect documents to one another, and that also link pages to other objects such as sound, video, or animation files

Pretty Good Privacy (PGP)

A widely used e-mail public key encryption software program

IM different proprietary systems include:

AOL, MSN, Yahoo, and Google

Guaranteed service levels and lower error rates

Ability to purchase the right to move data through network at guaranteed speed in return for higher fee

Uniform resource locator (URL)

Address used by Web browser to identify location of content on the Web -For example: http://www.azimuth-interactive.com/flash_test

Internet2

Advanced networking consortium of more than 350 member institutions working in partnership to facilitate the development, deployment, and use of revolutionary Internet technologies

Internet2

Advanced networking consortium of more than 350 member institutions working in partnership to facilitate the development, deployment, and use of revolutionary internet technologies.

revenue models

Advertising, subscriptions, transaction fees, sales, and affiliate revenue.

On-demand services

Airbnb, Uber, Postmates

Virtual Private Network (VPN)

Allows remote users to securely access internal networks via the Internet, using the Point-to-Point Tunneling Protocol (PPTP)

wiki

Allows user to easily add and edit content on Web page

Spam (junk) Web Sites

Also referred to as link farms; promise to offer products or services, but in fact are just collections of advertisements

Hash Function

An algorithm that produces a fixed-length number called a hash or message digest

Digital Cash

An alternative payment system in which unique, authenticated tokens represent cash value

Risk Assessment

An assessment of the risks and points of vulnerability

Podcast

An audio presentation--such as a radio show, audio from a movie, or simply a personal audio presentation--stored as an audio file and posted to the Web

Hacker

An individual who intends to gain unauthorized access to a computer system

Cold Fusion

An integrated server-side environment for developing interactive web applications.

Internet

An interconnected network of thousands of networks and millions of computers linking businesses, educational institutions, government agencies, and individuals

T1

An international telephone standard for digital communication that offers guaranteed delivery at 1.54 Mbps

T3

An international telephone standard for digital communication that offers guaranteed delivery at 45 Mbps

Web client

Any computing device attached to the Internet that is capable of making HTTP requests and displaying HTML pages, most commonly a Windows PC or Machintosh

Web Client

Any computing device attached to the Internet that is capable of making HTTP requests and displaying HTML pages, most commonly a Windows PC or Macintosh

Phishing

Any deceptive, online attempt by a third party to obtain confidential information for financial gain

Phishing attack

Any deceptive, online attempt by a third party to obtain confidential information for financial gain. Typically, do not involve malicious code but instead rely on straightforward misrepresentation and fraud. So called social engineering techniques email scam.

Trojan Horse

Appears o be benign, but then does something other than expected. Often a way for viruses or other malicious code to be introduced into a computer system

An Internetenabled media player would run in which layer of Internet architecture

Application layer

4 layers of tcp/ip

Application, host to host transport layer, internet layer, network interface layer

Scale Economies

Are efficiencies that result from increasing the size of a business, for instance when large, fixed-cost production systems (such as factories or software systems) can be operated at full capacity with no idle time. Scale economies are efficiencies that result from flattening the hierarchy of an organization-FALSE

system architecture

Arrangement of software, machinery, and tasks in an information system needed to achieve a specific functionality

Man-in-the-middle Attack (MitM)

Attack in which the attacker is able to intercept communications between two parties who believe they are directly communication with one another, when in fact the attacker is controlling the communications

podcasting

Audio presentation stored as an audio file and available for download from Web

Pharming

Automatically redirecting a Web link to an address different from the intended one, with the site masquerading as the intended destination

The 6 types of ecommerce

B2B, B2C, C2C, Mobile, Social, Local

"First mile"

Backbone Internet services that carry bulk traffic over long distances

potential benefits and challenges of B2B e-commerce

Benefits: --Lower administrative costs --Lower search costs for buyers --Reduce inventory cost by increasing competition among suppliers (increasing price transparency) and reducing inventory to the bare minimum --Lower transaction costs by eliminating paperwork and automating parts of the procurement process --Increase production flexibility by ensuring delivery of parts "just in time" --Improve quality of products by increasing cooperation among buyers and sellers and reducing quality issues --Decrease product cycle time by sharing designs and production schedules with suppliers --Increase opportunities for collaborating with suppliers and distributors --Create greater price transparency - the ability to see the actual buy and sell prices in a mkt --Increase the visibility and real-time info sharing among all participants in the supply chain network Challenges: pg 419

Symmetric Key Encryption

Both the sender and the receiver use the same key to encrypt and decrypt the message.

Build own vs outsourcing

Build your own requires team with diverse skill set; choice of software tools; both risks and possible benefits

E

Business-The digital enabling of transactions and processes within a firm, involving information systems under the control of the firm.

Which of the following is not true about mobile marketing

By 2015, it is estimated that spending on social marketing will exceed the amount spent on mobile marketing

Public Key Infrastructure (PKI)

CAs and digital certificate procedures hat are accepted by all parties

Common dynamic page gen tools:

CGI = Common Gateway Interface ASP = Active Server Pages JSP = Java Server Pages

COPPA

Children's Online Privacy Protection Act to minimize the collection of personal information from children and create a safer, more secure online experience for them, even as online technologies, and the children's uses of such technologies, evolve. The Children's Online Privacy Protection Act (COPPA) prohibits Web sites from collecting information on children under the age of 13.

Botnet

Collection of captured bot computers

Botnet

Collection of captured bot computers used for malicious activates such as sending spam, participating in a DDoS attack, stealing information from computers, and storing network traffic for later analysis.

Exploit Kit

Collection of exploits bundled together and rented or sold as a commercial product

benchmarking

Comparing site to competitors in terms of response speed, quality of layout, and design

Routing Algorithm

Computer program that ensures that packets take the best available path toward their destination

Fiber-optic Cable

Consists of up to hundreds of strands of glass or plastic that use light to transmit data

3. Consumer to Consumer

Consumers selling to other consumers Example: Auction sites such as eBay, and listing sites such as Craigslist, enable consumers to auction or sell goods directly to other consumers. Airbnb and Uber provide similar platforms for services such as room rental and transportation.

Dynamic page generation

Contents of Web page stored as objects in db, rather than being hard-coded in HTML. When the user requests a Web page, the contents for that page are then fetched from the db

Wired Internet

Copper and expensive fiber-optic cables

Hacktivism

Cybervandalism and data theft for political purposes

Which of the following left the WikiLeaks Web site effectively inoperable in August 2012

DDoS attacks

logical design

Data flow diagrams processing fxns databases

PDI-DSS (Payment Card Industry-Data Security Standards)

Data security standards instituted by the five major credit card companies

Content Management System (CMS)

Database software program specifically designed to manage structured and unstructured data and objects in a web site environment. A cms provides web managers and designers with a centralized control structure to manage we site content.

Privacy

Deals with the use of information shared during an online transaction consumers want to limit the extent to which their personal information can be divulged to other organizations, while, merchants want to protect such information from falling into the wrong hand.

Value Proposition

Defines how a company's product or service fulfills the needs of customers. To develop and or analyze a firm's value proposition, you need to understand why customers will choose to do business with the firm instead of another company and what the firm provides that other firms do not and cannot. Value proposition and revenue are typically the most easily identifiable aspects of a company's business model.

Latency

Delays in messages caused by the uneven flow of information packets through the network

Digital Subscriber Line (DSL)

Delivers high-speed access through ordinary telephone lines found in homes or businesses

Revenue Model

Describes how the firm will earn revenue, generate profits and produce a superior return on invested capital. We use the terms revenue model and financial model interchangeably. Generate profits and to produce returns on invested capital that exceed alternative investments. Profits alone are not sufficient to make a company "successful". in order to be successful a firm must produce returns greater than alternative investments.

system design specification

Description of main components of a system and their relationship to one another

Authorization Policies

Determine differing levels of access to information assets for differing levels of users

Access Controls

Determine who can gain legitimate access to a network

Availability

Determines whether a Web site is accessible and operational at any given moment. Availability refers to the ability to ensure that an e-commerce site continues to function as intended.

Confidentiality

Determines whether information shared online, such as through email communication or an order process, can be viewed by anyone other than the intended recipient.

Data Encryption Standard (DES)

Developed by the National Security Agency (NSA) and IBM. Uses a 56-bit encryption key

Broadband services

Digital Subscriber Line (DSL) Cable Internet T1 and T3 Satellite Internet

Instant Messaging (IM)

Displays words typed on a computer almost instantaneously. Recipients can then respond immediately to the sender the same way, making the communication more like a live conversation than is possible through e-mail

US-CERT

Division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors

Fxns of app servers

Do I Need to know this???

Features on which the foundations of e-commerce are built

E-mail, Instant messaging, Search engines, Online forums, Streaming media, Cookies

Security Organization

Educates and trains users, keeps management aware of security threats and breakdowns, and maintains the tools chosen to implement security

Social Marketing

Email (Major retailers), affiliates (amazon), social networks (Facebook), mircrobloggers (twitter), blogs/forums (Tumblr), visual marketing (Pinterest), video marketing (YouTube), game marketing (chipotle scarecrow game)

Streaming Media

Enables music, video, and other large files to be sent to users in chunks so that when received and played, the file comes through uninterrupted

Nonrepudiation

Ensure that ecommerce participants do not deny (repudiate) their online actions.

Integrity

Ensures that information displayed on a Web site or sent or received via the Internet has not been altered in any way by an unauthorized party.

What was the biggest use for mobile devices in 2012?

Entertainment

Transmission Control Protocol (TCP)

Establishes connections among sending and receiving Web computers and handles assembly of packets at point of transmission, and reassembly at receiving end

Authorization Management System

Establishes where and when a user is permitted to access certain parts of a Web site

Intrusion Detection System (IDS)

Examines network traffic, watching to see if it matches certain patterns or preconfigured rules indicative of an attack

Network effects

Exchange Staying Power Complementary Benefits When the value of a product or service increases as its number of users expands. influences the choice of one product or service over another. More users = more value a common user base, utilized to communicate and share with one another. When network effects are strong, the best (e.g. the highest quality or most superior product) does not necessarily win. Which of the following statements illustrates the network effects that portals are subject to-The value of the portal to advertisers and consumers increases geometrically as reach increases.

Social Engineering

Exploitation of human fallibility and gullibility to distribute malware

XML

Extensive markup language a markup language specification developed by the World wide web consortium that is designed to describe data and information.

social media: platform

FB Twitter Blogs

All of the following are methods of securing channels of communication except

FTP

The top 7 sites account for __% of all social network visits

Facebook, Google, Twitter, Linkedin, Pinterest, Instagram, Tumblr. 90%

examples of social e-commerce

Facebook, Pinterest, Instagram

Auction fraud accounts for the highest percentage of total Internet fraud reported to the Internet Crime Complaint Center

False

Phishing attacks rely on browser parasites.

False

The number of people exposed to pins is a measure of which of the following

Fan acquisition

Backdoor

Feature of viruses, worms, and Trojans that allows attacker to remotely access a compromised computer

host own vs outsourcing: co-location

Firm purchases or leases Web server (with total control over its operation), but server is located at vendor's facility

Internet Service Provider (ISP)

Firm that provides the lowest level of service in the multi-tiered Internet architecture by leasing Internet access to home owners, small businesses, and some large institutions

Heartbleed Bug

Flaw in OpenSSL encryption system that allowed hackers to decrypt an SSL session and discover user names, passwords, and other user data

Denial of Service Attack (DoS)

Flooding a Web site with useless traffic to inundate and overwhelm the network

Electronic Billing Presentment and Payment System (EBPP)

Form of online payment system for monthly bills

extranet

Formed when firms permit outsiders to access their internal TCP/IP networks

"Last mile"

From Internet backbone to user's computer, smartphone, and so on

portal business models

GENERAL PURPOSE PORTALS: -yahoo -MSN -AOL -Ask.com VERTICAL MARKET PORTALS: Affinity Group Focused Content -FB -ESP.com -iVillage -Bloomberg.com -Sify.com -NFL.com -Law.com -WebMD.com - Ceoexpress.com -Gamers.com -Away.com -Econline.com -Sailnet.com pg 403

Hypertext Markup Language (HTML)

GML that is relatively easy to use in Web page design. HTML provides Web page designers with a fixed set of markup "tags" that are used to format a Web page

Hypertext Markup Language (HTML)

GML that is relatively easy to use in Web page design. HTML provides Web page designers with a fixed set of markup "tags"that are used to format a Web page

hypertext markup language (HTML)

GML that is relatively easy to use in web page design, HTML provides web page designers with a fixed set of of markup "tags" that are used to format a web page

portal revenue sources

General advertising- charging for impressions delivered Tenancy deals-fixed charge for guaranteed number of impressions, exclusive partnerships, "sole providers" Commissions on sales- revenue based on sales at the site by independent providers Subscription fees- charging premium content Applications and games- games and apps are sold to users; advertising is placed within apps *FB are direct competitors of yahoo and google pg 404

Campus Area Network (CAN)

Generally, a local area network operating within a single organization that leases access to the Web directly from regional and national carriers

app marketplaces

Google Play, Apple's App Store, RIM's App World, Windows Phone Marketplace

Who are the top two mobile marketing firms from the 2016 book and what are their relative sizes?

Google and facebook 10+ and 6+ billion

Black Hats

Hackers who act with the intention of causing harm

Grey Hats

Hackers who believe they are pursuing some greater good by breaking in and revealing system flaws

Intrusion Prevention System (IPS)

Has all the functionality of an IDS, with the additional ability to take steps to prevent and block suspicious activities

Internet Backbone

High bandwidth fiber optic cable that transports data across the internet. In milliseconds.

Backbone

High-bandwidth fiber-optic cable that transports data across the Internet

Satellite Internet

High-speed broadband Internet access provided via satellite

WiMax

High-speed, medium range broadband wireless metropolitan area network

outsourcing

Hiring vendors to provide services involved in building site

Host own vs outsourcing: hosting

Hosting company responsible for ensuring site is accessible 24/7, for monthly fee

Internet Exchange Point (IXP)

Hub where the backbone intersects with local and regional networks and where backbone owners connect with one another

Domain Name

IP address expressed in natural language

Domain name

IP address expressed in natural language

domain name

IP address expressed in natural language

Network architecture limitations

Identical requests are processed individually

Search Engine

Identifies Web pages that appear to match keywords, also called queries, entered by the user and then provides a list of the best matches

search engines

Identify Web pages that appear to match keywords (queries) entered by a user, and provide list of best matches based on one or more techniques Outside of e-mail, most commonly used Internet activity

Authentication Procedures

Include the use of digital signatures, certificates of authority, and public key infrastructure

Malicious Code (Malware)

Includes a variety of threats such as viruses, worms, Trojan horses, and bots

information requirements

Info elements that system must produce to achieve bus objectives

Cybervandalism

Intentionally disrupting, defacing, or even destroying a site

Internet

Interconnected network of thousands of networks and millions of computers linking businesses, educational institutions, government agencies, and individuals

IPv6 Internet Address

Internet address expressed and a 128-bit number

IPv4 Internet Address

Internet address expressed as a 32-bit number that appears as a series of four separate numbers marked off by periods, such as 64.49.254.91

Venture Capital Investors

Invest funds they manage for other investors such as investment banks, pension funds, insurance companies, or other businesses and usually want to obtain a larger stake in the business and exercise more control over the operation of the business. Also typically want a well-defined exit strategy such as a plan for an initial public offering or acquisition of the company by a more establish business within a relatively short period of time.

Spoofing

Involves attempting to hide a true identity by using someone else's e-mail or IP address

Spoofing

Involves attempting to hide in a true identity by using someone else's email or IP address. IE. a spoofed email will have a forged sender email address designed to mislead the receiver about who sent the email.

Security Audit

Involves the routine review of access logs (identifying how outsiders are using the site as well as how insiders are accessing the site's assets)

Identity Fraud

Involves the unauthorized use of another person's personal data for illegal financial benefit

What is expected to happen to location-based mobile marketing over the next 5 years?

It's expected to triple in the next 5 years

Quality of service limitations

Latency; in case of e-mail its not notice

Applications Layer

Layer of Internet architecture that contains client applications

Transport Services and Representation Standards Layer

Layer of Internet architecture that houses the TCP/IP protocol

Network Technology Substrate Layer

Layer of Internet technology that is composed of telecommunications networks and protocols

Gramm

Leach-Billey Act-ensure that financial institutions, including mortgage brokers and lenders, protect nonpublic personal information of consumers.A Federal law to protect the personal information of consumers. In an effort to balance the needs that consumers have for privacy protection and the interests of the marketplace in sharing information, the GLB Act does not absolutely prohibit the sharing of personal financial information but provides limitations and restrictions on the types of information that can be exchanged and the parties that can receive it.

Java Server Pages (JSP)

Like CGI and ASP, a web page coding standard that allows developers to dynamically generate web pages in response to user requests

system fxnalities

List of IS capabilities needed to achieve business objectives

Main problem of social markeing as compared to TV ads?

Loss of control, TV ads maintain near complete control.

Drive-by-download

Malware that comes with a downloaded file that a user requests

Worm

Malware that is designed to spread from computer to computer

Ransomware (scareware)

Malware that prevents you from accessing your computer or files and demands that you pay a fine

Web server

May refer to either Web server software or physical server -Specialized servers: Database servers, ad servers, mail server, video server

Bandwidth

Measures how much data can be transferred over a communications medium within a fixed period of time; is usually expressed in bits per second (bps), kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps)

Internet Explorer

Microsoft's Web browser

Internet Explorer

Microsoft's web browser

Client/Server Computing

Model of computing in which client computers are connected in a network together with one or more servers which are computers that are dedicated to performing functions that the client computers on the network need, such as file storage, software applications, printing and internet access.

Cloud Computing

Model of computing in which computer processing, storage, software, and other services are provided as a shared pool of virtualized resources over the Internet

CERT Coordination Center

Monitors and tracks online criminal activity reported to it by private corporations and government agencies that seek out its help

Mobile stats

More than 258 million americans use mobile devices. 190 million use smartphones 159 million use tablets

E-mail

Most used application of the Internet Uses a series of protocols to enable messages containing text, images, sound, video clips, etc., to be transferred from one Internet user to another Also allows attachments Can be an effective marketing tool

Redundancy

Multiple duplicate devices and paths in a network

example of subscription revenue model

Netflix

The Four Layers of the Hourglass Model of the Internet

Network Technology Substrate Transport Services and Representation Standards Middleware Services Applications

4 Layers of the Internet

Network technology substrate layer, transport services and representation standards layer, applications layer,

Server

Networked computer dedicated to common functions that the client computers on the network need

Which ethical principle asks you to assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise

No free lunch

Data Breach

Occurs when an organization loses control over its information to outsiders

Hybrid Cloud

Offers customers both a public and a private cloud

Instant messaging

One of fastest growing forms of online human cx Displays words typed on a comp almost instantly, and recipients can then respond immediately in the same way

Tracert

One of several route-tracing utilities that allow you to follow the path of a message you send from your client to a remote computer on the Internet

World Wide Web (Web)

One of the Internet's most popular services providing access to billions, possibly trillions, of Web pages

Web

One of the Internet's most popular services, providing access to billions, and perhaps trillions, of Web pages

the web

One of the most popular services that runs on the Internet infrastructure. The original killer app that made the internet commercially interesting and extraordinarily popular. Developed in the early 90s and hence much more recent vintage than the internet. Provides access to billions of web pages.

File Transfer Protocol (FTP)

One of the original Internet services. Part of the TCP/IP protocol that permits users to transfer files from the server to their client computer, and vice versa

Maladvertising

Online advertising that contains malicious code

music and video services

Online video viewing Digital video on demand

Tier 1 Internet Service Providers (ISPs)

Own and control the major long-haul fiber-optic cable networks comprising the Internet's backbone

Online Stored Value Payment System

Permits consumers to make instant, online payments to merchants and other individuals based on value stored in an online account

Blog

Personal Web page that is created by an individual or corporation to communicate with readers

blogs

Personal Web page that typically contains a series of chronological entries by its author, and links to related Web pages

Bluetooth

Personal connectivity between devices and to Internet

PII

Personally Identifiable Information-any data that can be used to identify, locate, or contact an individual

What is the most frequent cause of stolen credit cards and card information today?

Phishing attack

Security Token

Physical device or software that generates an identifier that can be used in addition to or in place of a password

Cable Internet

Piggybacks digital access to the Internet on top of the analog video cable providing television signals to a home

business models

Portal, e-tailer, content provider, transaction broker, market creator, service provider, community provider

RSS really simple syndication

Program that allows users to have digital content automatically sent to them; typically used for news

Really Simple Syndication (RSS)

Program that allows users to have digital content including text, articles, blogs, and podcast audio files, automatically sent to their computers over the Internet

Potentially Unwanted Program (PUP)

Program that installs itself on a computer, typically without the user's informed consent

Spyware

Program used to obtain information such as a user's keystrokes, email, instant messaging, and son on. Can even take screen shots and capture passwords or other confidential information

Voice Over Internet Protocol (VoIP)

Protocol that allows for transmission of voice and other forms of audio communication over the Internet

TCP

Protocol that establishes the connections among sending and receiving Web computers and handles the assembly of packets at the point of transmission, and their reassembly at the receiving end

IP

Protocol that provides the Internet's addressing scheme and is responsible for the actual delivery of the packets

Secure Sockets Layer/Transport Layer Security (SSL/TLS)

Protocols the secure communications between the client and the server

Application Layer

Provides a wide variety of applications with the ability to access the services of the lower layers (HTTP, Telnet, FTP, SMTP)

Private Cloud

Provides similar options as public cloud but only to a single tenant

internet protocol (IP)

Provides the Internet's addressing scheme

Internet Protocol (IP)

Provides the Internet's addressing scheme & its responsible for the actual delivery of the packets

Mobile platform

Provides the ability to access the internet from a variety of highly mobile devices such as smart phones, tablets and other ultra-lightweight laptop computers.

Mashups

Pull fxnality/data from one program and include it in another

Broadband

Refers to any communication technology that permits clients to play streaming audio and video files at acceptable speeds

Firewall

Refers to either hardware or software that filters communication packets and prevents some packets from entering the network based on a security policy

Firewall

Refers to either hardware or software that filters communication packets and prevents some packets from entering the network based on a security policy.

System Architecture

Refers to the arrangement of software, machinery and tasks in an information system needed to achieve a specific functionality much like a homes architecture refers to the arrangement of building materials to achieve a particular functionality.

Desktop marketing

Remains the largest part of all online marketing.

What is the FTC recommendation regarding choice as it relates to personally identifiable information (PII)

Require firms to have consumers affirmatively opt-in before PII is collected.

Internet Layer

Responsible for addressing, packaging, and routing messages on the Internet (IP)

Network Interface Layer

Responsible for placing packets on and receiving them from the network medium (Ethernet, Token Ring, Frame Relay, ATM)

Transport Layer

Responsible for providing communication with the application by acknowledging and sequencing the packets to and from the application (TCP)

Web sERVERS Basic capabilities

Security services, FTP, search engine, data capture

Market Biases

Sellerbiased, Buyerbiased, Neutral

Packet switching

Sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destination. Packet switching requires a dedicated circuit.

Database Server

Server designed to access specific information within a database

Ad Server

Server designed to deliver targeted banner ads

Mail Server

Server that provides e-mail messages

Video Server

Server that serves video clips

online social networks

Services that support communication among networks of friends, peers

Protocol

Set of rules and standards for data transfer

JSP (Java Server Pages)

Similar to CGI and ASP; allows developers to use HTML, JSP scripts, and Java to dynamically generate web pages

Packet Switching

Slices digital messages into packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destination

Bandwidth limitations

Slow peak-hour service & limited ability to handle high volumes of video and voice traffic

Widget

Small, prebuilt chunk of code that executes automatically in your HTML web page; capable of performing a wide variety of tasks

online software and web services: Web apps, widgets and gadgets

Smaller chunks of code called "widgets" and "gadgets".

Web Browser

Software program whose primary purpose is to display Web pages

Proxy Server (proxy)

Software server that handles all communications originating from or being sent to the Internet, acting as a spokesperson or bodyguard for the organization

Proxy Server

Software server that handles all communications originating from or being sent to the internet, acting as a spokes person or bodyguard for the organization.

Web Server Software

Software that enables a computer to deliver Web pages written in HTML to client computers on a network that request this service by sending an HTTP request

intelligence personal assistants

Software that interacts with the user through voice commands ex: Siri, Google Now

Open Source Software

Software that is developed by a community of programmers and designers and is free to use and modify. The advantage of using open source web building tools is that you get exactly what you want, a truly customizable unique web site. The disadvantage is that it will take several months for a single programmer to develop the site and get all of the tools to work together seamlessly.

Zero-Day Vulnerability

Software vulnerability that has been previously unreported and for which no patch yet exists

Router

Special purpose computers that interconnect the computer networks that make up the Internet and route packets along to their ultimate destination as they travel The Internet

Router

Special-purpose computer that interconnects the computer networks that make up the Internet and routes packets to their ultimate destination as they travel the Internet

SWOT

Strengths Weaknesses Opps Threats

Domain Name System (DNS)

System for expressing numeric IP addresses in natural language

intranet

TCP/IP network located w/i a single org for cxs and processing

all EC sites require basic web server software to answer HTTP requests from customers

TRUE

video ad

TV-like advertisement that appears as an in-page video commercial or before during, or after content

SQL Injection Attack

Takes advantage of poorly coded Web application software that fails to properly validate or filter data entered by a user on a Web page

Bluetooth

Technology standard for short-range wireless communication under 30 feet

Cipher Text

Text that has been encrypted and thus cannot be read by anyone other than the sender and the receiver

Middleware Services Layer

The "glue" that ties the applications to the communications networks and includes such services as security, authentication, addresses, and storage repositories

Hypertext Transfer Protocol (HTTP)

The Internet protocol used for transferring web pages

Simple Mail Transfer Protocol (SMTP)

The Internet protocol used to send mail to a server

Privacy

The ability to control the use of information about oneself

Availability

The ability to ensure that an e-commerce site continues to function as intended

Nonrepudiation

The ability to ensure that e-commerce participants do not deny (i.e., repudiate) their online actions

Integrity

The ability to ensure that information being displayed on a Web site or transmitted or received over the Internet has not been altered in any way by an unauthorized party

Confidentiality

The ability to ensure that messages and data are available only to those who are authorized to view them

Authenticity

The ability to identify the identify of a person or entity with whom you are dealing on the Internet

Implementation Plan

The action steps you will take to achieve the security plan goals

Uniform Resource Locator (URL)

The address used by a Web browser to identify the location of content on the Web

Uniform Resource Locator (URL)

The addresses used by browsers to identify the location of content on the Web are called-URL Which is the address used by a web browser to identify the location of content on the web, also uses a domain name as part of the URL. Contains protocol to be used when accessing the address followed by the location.

Transmission Control Protocol/Internet Protocol (TCP/IP)

The core communications protocol for the Internet .

TCP/IP

The core communications protocol of the internet

Packet

The discrete units into which digital message are sliced for transmission over the internet.

Packets

The discrete units into which digital messages are sliced for transmission over the Internet

Netscape Navigator

The first commercial Web browser

HTTP

The internet protocol used to transfer web pages. Developed by the world wide web consortium and the internet engineering task force.

Advanced Encryption Standard (AES)

The most widely used symmetric key algorithm offering 128-, 192-, and 256-bit keys

Electronic Mail (e-mail)

The most-used application of the Internet. Uses a series of protocols to enable messages containing text, images, sound, and video clips to be transferred from one Internet user to another

HTML 5

The new markup language that will enable more dynamic web content and allow for browser-accessible web apps that are as appealing as device-specific apps. Bringing the best of the app experience to the web and with apps developing new web-like capabilities.

Encryption

The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the receiver. The purpose of encryption is (a) to secure stored information and (b) to secure information transmission

private industrial networks (private trading exchange, PTX)

internet-based communication environments that extend far beyond procurement to encompass truly collaborative commerce. largest part of b2b e-commerce. pg 417 foundation of the 'extended enterprise' direct descendants of existing EDI networks & tied to ERP systems used by large firms web-enabled network for the coordination of trans-organizational business process aka collaborative commerce pg 438 efficient customer response system: demand-pull production model pg 439

activeX

invented by microsoft to compete with Java

VBScript

invented by microsoft to compete with Javascript

automated order entry systems

involve the use of telephone modems to send digital orders pg 416

Public Key Encryption

Two mathematically related digital keys are used: a public key and a private key. The private key is kept secret by the owner and the public key is widely disseminated. Both keys can be used to encrypt and decrypt a message. However, once the keys are used to encrypt a message, that same key cannot be used to unencrypt the message.

social networks

involves a group of people, shared social interaction, common ties among members, and people who share an area for some period of time pg 386

virtual reality

involves fully immersing users within a virtual world, typically through the use of a head mounted display connected to headphones and other devices

virtual reality

involves fully immersing users within a virtual world, typically through the use of a head-mounted display connected to headphones and other devices

contract purchasing

involves long-term written agreements to purchase specified products with agreed upon terms and quality

contract purchasing

involves long-term written agreements to purchase specified products, under agreed-upon termd and quality, for an extended period of time pg 421

augmented reality

involves overlaying virtual objects over the real world via smart phones, tablets, or HMDs (Pokemon GO)

spot purchasing

involves purchase of goods based on immediate needs in larger marketplaces that involve many suppliers

System testing

involves testing the site as a while, in a way the typical user will use the site

system testing

involves testing the site as a whole, in a way the typical user will use the site

Unit testing

involves testing the site's program modules one at a time

unit testing

involves testing the site's program modules one at a time

crowdfunding

involves the internet to enable individuals to collectively contribute money to support a project

spot purchasing

involves the purchase of goods based on immediate needs in larger marketplaces that involve many suppliers pg 421

Cyber Squatting

involves the registration of an infringing domain name or other internet use of an existing trademark, for the purpose of extorting payments from the legitimate owners

model-driven data mining

involves the use of a model that analyze the ket variables of interest to decision makers

search engine marketing (SEM)

involves the use of search engines to build and sustain brands

search engine advertising

involves the use of search engines to support direct sales online

behavioral targeting

involves using online and offline behavior of consumers to adjust the advertising messages delivered to them online

Geofencing

is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries. A geofence is a virtual barrier.

application servers are...

kind of middleware software that provides the glue connecting trad'l corporate systems to the customer as well as all the fxnality needed to conduct EC

Digital divide

lack of diversity on the Internet. Inequality in access and usage. the gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access.

World Wide Web Consortium (W3C)

largely academic group that sets HTML and other programming standards for the Web

applications layer

layer if internet architecture that contains client applications

Applications layer

layer of Internet architecture that contains client applications

Transport Services and Representation Standards layer

layer of Internet architecture that houses the TCP/IP protocol

Network Technology Substrate layer

layer of Internet technology that is composed of telecommunications networks and protocols

Transport Services and Representation Standards

layer of internet architecture that houses the TCP/IP protocol

Network Technology Substrate Layer

layer of internet technology that is compared of telecommunications networks and protocols

Apache

leading web server software (54% of mkt) Works only with UNIX, LINUX OSs

Java Server Page (JSP)

like CGI and ASP, a Web page coding standard that allows developers to dynamically generate Web pages in response to user requests

Benefits of auction

liquidity (convert to cash), price discovery and market efficiency, price transparency (monitor auctions as they occur), lower transaction costs, consumer aggregation and network effects

business objectives

list of capabilities you want your site to have

Online catalog

list of products available on a Web site

2 components of sys design

logical and physical

CRM (consumer relationship management)

manage relationship with customers once a purchase is made

Public Key Cryptography

Two mathematically related digital keys are used: a public key and a private key. The private key is kept secret by the owner, and the public key is widely disseminated. Both keys can be used to encrypt and decrypt a message. However, once the keys are used to encrypt a message, that same key cannot by used to unencrypt the message

Bot

Type of malicious code that can be covertly installed on a computer when connected to the Internet. Once installed, the bot responds to external commands sent by the attacker

Virtual Currency

Typically circulates within an internal virtual world community or is issued by a specific corporate entity, and used to purchase virtual goods

examples of disruptors

Uber, Snapchat, Wayz

mobile apps

Use of mobile apps continues to explode in 2012 70% of mobile phone owners research products and services, 35% have made purchase Increased use/purchasing from tablets

Internet of Things (IoT)

Use of the Internet to connect a wide variety of devices, machines, and sensors

ASP (Active server pages)

Used to build dynamic pages with Microsoft's IIS

Java

Used to create interactivity and active content on client computer

Internet Defined by Federal Networking Council (FNC)

Uses IP addressing, Supports TCP/IP, Provides services to users in manner similar to telephone system

Distributed Denial of Service Attack (DDoS)

Using numerous computers to attack the target network from numerous launch points

Authenticity

Verifies an individual's or business's identity.

How do you characterize the marketplace?

Via: 1. demographics 2. size, growth, changes 3. structure: competitors, suppliers, substitutes 4. where the content is coming from (static vs dynamic)

multi-tier architecture

Web application servers Backend, legacy databases

Wiki

Web application that allows a user to easily add and edit content on a Web page

Mosaic

Web browser with a graphical user interface (GUI) that made it possible to view documents on the Web graphically

2-Tier architecture

Web server and database server

Fair Information Practices Principles

Which of the FTC's Fair Information Practices (FIP) principles requires identification of the collector of data? Notice/Awarenes(Notice/Awareness (core principle),Choice/Consent (core principle),Access/Participation,Security,Enforcement

marketspace

marketplace extended beyond traditional boundaries and removed from a temporal and geographic location

auctions

markets in which prices are variable and based on the competition among participants who are buying or selling products and services. dynamic pricing. pg 392

Internet Auctions

markets in which prices are variable, based on competition among participants

bandwidth

measure how much data can be transferred over a communications medium within a fixed period of time; is usually expressed in bits per second (bps), kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps)

bandwidth

measures how much data can be transferred over a communications medium within a fixed period of time

effective cost-per-thousand (eCPM)

measures return on investment from an ad by dividing the total earnings from the ad by the total number of impressions in thousands

view-through rate (VTR)

measures the 30-day response rate to an ad

engagement

measures the amount and intensity of user involvement

Affinity Community

members who self-identify with demographic or geographic category, such as women, race

industry convergence

merger of media enterprises into firms that create and cross-market content on different platforms

systems development life cycle

methodology for understanding bus objectives of a sys and designing an approp soln

m-commerce

mobile commerce

Mobile Marketing

mobile site (m.ford.com), apps (2015 ford mustang customizer, my ford)

cloud computing

model of computing firms and invids obtain computing power and software over internet, rather than purchasing and installing locally ex: Google apps FASTEST GROWING FORM OF COMPUTING!

client/server computing

model of computing powerful personal computers (clients) connected in one network with one or more servers Servers perform common functions for the clients Storing files, software applications, etc.

cloud computing

model of computing in which computer processing, storage, software, and other services are provided as a shared pool of virtualized resources over the internet

Cloud Computing

model of computing in which firms and individuals obtain computing power and software over Internet -Public, private, and hybrid clouds

3rd party software and services for advanced site mgt

monitor customer purchases, mkting campaign effectiveness ex: WebTrends Analytics 10, Google Analytics

Data capture

monitoring site traffic, capturing information on who has visited a site, how long the user stayed there, the date and time of each visit, and which specific pages on the server were accessed

english auction

most common form of auction; highest bidder wins. considered seller-biased pg 395

media utilization

most popular in order: -TV -Internet -Radio together media account for more than 77% pg 350

MOTO (mail order telephone order)

most similar to online retail, grew in 70s and 80s due to improvements of national toll free (800) system

Internet Governance Forum (IGF)

multi-stakeholder open forum for debate on issues related to Internet governance

Redundacy

multiple duplicate devices and paths in a network

redundancy

multiple duplicate devices and paths in a network

WPA2

Wireless security standard that uses the AES algorithm for encryption and CCMP, a more advanced authentication code protocol

Wi-Fi

Wireless standard for Ethernet networks with greater speed and range than Bluetooth

Cracker

Within the hacking community, a term typically used to denote a hacker with criminal intent

basic business considerations for web site design

need design guidelines and software tools that can cost-effectively achieve req'd bus fxnality *enabling customers to find what they need, make purchase + leave

value web

networked business ecosystem that coordinates the value chains of several firms

server

networked computer dedicated to common functions that the client computers on the network need

OTT (over the top)

new internet broadcasting system in total to challenge a monopolistic industry of cable TV

e-mail: activity

newsletters updates sales

hits

number of http requests received by a firm's server

page views

number of pages requested by visitors

impressions

number of times an ad is served

Internet of Things

objects connected via sensors

click fraud

occurs when a competitor clicks on search engine results and ads, forcing the advertisers to pay for the click even though the click is not legitimate

unfair competitive advantage

occurs when one firm develops an advantage based on a factor that other firms cannot purchase

bricks and clicks

oder online and then pick up in the store

freemium model

offer basic free then pay for premium to remove ads or access additional content

flash marketing

offering huge price cuts for a limited period of time

strategy of cost competition

offering products and services at a lower cost than competitors

Merchant server software package (e-commerce server suite)

offers an integrated environment that provides most or all the functionality and capabilities needed to develop a sophisticated, customer-centric site

Hybrid Cloud

offers customers both a public cloud and a private cloud

hybrid cloud

offers customers both a public cloud and a private cloud

bundling

offers customers two or more goods for a reduced price

service provider

offers services online

portal

offers users powerful search tools as well as an integrated package of content and services all in one place

fixed pricing

one national price, everywhere for everyone pg 392

world wide web (web)

one of internet's most popular services (much bigger than internet) provides access to billions (maybe trillions) of web pages

tracert

one of several route-tracing utilities that allow you to follow the path of a message you send from your client to a remote computer on the internet

web

one of the internet's most popular services, providing access to billions, and perhaps trillions of web pages

File Transfer Protocol (FTP)

one of the original Internet services. Part of the TCP/IP protocol that permits users to transfer files from the server to their client computer, and vice versa

File Transfer Protocol (FTP)

one of the original internet services; part of the TCP/IP protocol that permits users to transfer files from the server to their client computer and vice versa

Tracert

one of the several utilities that allow you to follow the path of a message you send from your client to a remote computer on the Internet

Risks

online auctions are single largest source of Internet fraud. Using auctions increase risk of experiencing a loss, Trust risks- Risk of fraud, loss

2. Business to Business

online businesses selling to other businesses. Example: Go2Paper is an independent third party marketplace that serves the paper industry

b2b electronic storefronts

online catalogs of products made available to the public marketplace by a single supplier pg 416

e-tailer

online retail store

e-tail

online version of traditional retailers

Internet Engineering Task Force (IETF)

open international community of network operators, vendors, and researchers concerned with the evolution of the Internet architecture of the Internet

WordPress

open source content management and blog website design tool

page content

optimize html & images site architecture efficient page style

Content management system (CMS)

organizes, stores, and processes Web site content.

Tier 1 Internet services providers

own and control the major long-haul fiber-optic cable networks comprising the internet's backbone

Network Service Provider (NSP)

owns and controls one of the major networks comprising the Internet's backbone

All of the following are used for authentication except

packet filters. all of these are used for authentication; biometric devices, digital signatures, certificates of authority.

abandonment rate

percent of shoppers who begin a shopping cart, but then fail to complete it

viewability rate

percentage of ads that are actually seen by people online

open rate

percentage of customers who open email

attrition rate

percentage of customers who purchase once, but do not return within a year

click-through rate (email)

percentage of email recipients who clicked through the offer

delivery rate

percentage of email recipients who received email

bounce-back rate

percentage of emails that could not be delivered

retention rate

percentage of existing customers who continue to buy

loyalty

percentage of purchasers who return in a year

reach

percentage of the total number of customers in a market who will visit a site

conversion rate

percentage of visitors who purchase something

acquisition rate

percentage of visitors who register or visit product pages

Servers

perform common functions for the client computers on the network need such as: Storing files, Software applications, Access to printers, and so on

blog

personal "web log" of chronological entries

blog

personal web page that is created by an individual or corporation to communicate with readers

marketplace

physical place that you visit to transact

Cable Internet

piggybacks digital access to the Internet on top of the analog video cable providing television signals to a home

cable internet

piggybacks digital access to the internet on the top of the analog video cable providing television signals to a home

organizational development

plan that describes how the company will organize the work that needs to be accomplished

design considerations

platform constraints: smartphone/tablet

pay-per-click (PPC) search ad

primary type of search engine advertising

offline media: platform

print TV & radio

trans-organizational business process

process that requires at least two independent firms to perform pg 438

transaction broker

processes transactions for consumers that are normally handled in person, by phone, or by mail

MRO goods (maintenance, repair, operations)

products for maintenance, repair and operations pg 421

really simple syndication (RSS)

program that allows users to have digital content, including text, articles, blogs, and podcast audio files, automatically sent to their computers over the Internet

really simple syndication (RSS)

program that allows users to have digital content, including text, articles, blogs, and podcast audio files, automatically sent to their computers over the internet

Copyright

protects original forms of expression such as writings, art, drawings, photographs, music, motion pictures, performances, and computer programs from being copied by others for a minimum of 70 years

Voice over Internet Protocol (VoIP)

protocol that allows for transmission of voice and other forms of audio communication over the Internet

Voice over Internet Protocol

protocol that allows for transmission of voice and other forms of audio communication over the internet

TCP

protocol that establishes the connections among sending and receiving web computers and handles the assembling of packets at the point of transmission and their reassembly at the receiving end

IP

protocol that provides the internets addressing scheme and is responsible for the actual deliver of the packets

Secure Sockets Layer (SSL)/ Transport Layer Security (TLS)

protocols that secure communications between the client and the server

Intranet

a TCP/IP network located within a single organization for purposes of communications and information processing

intranet

a TCP/IP network located within a single organization for purposes of communications and information processing

digital disruption

a business model disruption that is driven by changes in information technology

e-commerce business model

a business model that aims to use and leverage...

long tail effect

a colloquial name given to various statistical distributions characterized by a small number of events of high amplitude and a very large number of events with low amplitude

electronic data interchange (EDI)

a communications standard for sharing business documents and settlement information among a small number of firms pg 416

sales revenue model

a company derives revenue by selling goods, information, or services

subscription revenue model

a company offers its users content or services and charges a subscription fee for access to some or all of its offerings

advertising revenue model

a company provides a forum for advertisements and receives fees from advertisers

transaction fee revenue model

a company receives a fee for enabling or executing a transaction

Transaction fee revenue model

a company receives a fee for enabling or executing a transaction. For example, eBay provides an auction marketplace and provides a small transition fee from a seller if the seller is successful.

affiliate revenue model

a company steers business to an affiliate and receives a referral fee or percentage of the revenue from any resulting sales

Subscription revenue model

a company that offers content or services charges a subscription fee for access to some or all of its offerings. For instance, the digital version of consumer reports provides online and mobile access to premium content, such as detailed ratings, reviews and recommendations, only to subscribers, who have a choice of paying a 6.95 monthly subscription fee or a 30 annual fee.

Advertising revenue model

a company that offers content, services, and or products also provides a forum for advertisements and receives fees from advertisers.

e-distributer

a company that supplies products and services directly to individual businesses

real-time customer service chat systems

a company's customer service representatives interactively exchange text-based messages with one or more customers on a real-time basis

first-mover advantage

a competitive market advantage for a firm that results from being the first into a market place with a serviceable product or service

data warehouse

a database that collects a firm's transactional and customer data in single location for offline analysis

customer profile

a description of the typical behavior of a customer or a group of customers at a website

business plan

a document that describes a firm's business model

Business plan

a document that describes a firm's business model. A business plan always takes into account the competitive environment.

Liability

a feature of political systems in which a body of law is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations

Attachment

a file inserted within an e-mail message

attachment

a file inserted within an email message

first mover

a firm that is first to a market in a particular area and that moves quickly to gather market share

FiOS (fiber-optic service)

a form of DSL that provides speeds of up to 500 Mbps

FiOs (fiber optic service)

a form of DSL that provides speeds up to 500 Mbps

IP telephony

a general term for the technologies that use VoIP and internet's packet-switched network to transmit voice and other forms of audio communication over the internet

IP telephony

a general term for the technologies that use VoIP and the Internet;s packet-switched network to transmit voice and other forms of audio communication over the Internet

Trademark

a mark used to identify and distinguish goods and indicate their source

perfect market

a market in which there are no competitive advantages or asymmetries because all firms have equal access to all the factors of production

eXtensible Markup Language (XML)

a markup language specification developed by the World Wide Web Consortium (W3C) that is designed to describe data and information

extensible markup language (XML)

a markup language specification developed by the world wide web consortium (W3C) that is designed to describe data and information

tight coupling

a method for ensuring that suppliers precisely deliver the ordered parts at a specific time and particular location to ensure the production process is mot interrupted for lack of parts pg 423

just-in-time production

a method of inventory cost management that seeks to eliminate excess inventory to a bare minimum pg 423

packet switching

a method of slicing digital messages into packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destination

packet switching

a method of slicing digital messages into packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they've arrived at their destination

System development (SDLC)

a methodology for under standing the business objectives of any system and designing an appropriate solution

systems development life cycle

a methodology for understanding the business objective of any system and designing an appropriate solution

client/server computing

a model of computing in which client computers are connected to a network together with one or more servers

Client/Server Computing

a model of computing with a powerful personal computers are connected in network together with one or more servers

Internet Message Access Protocol (IMAP)

a more current e-mail protocol that allows users to search, organize, and filter their mail prior to downloading it from the server

Internet Message Access Protocol (IMAP)

a more current email protocol that allows users to search, organize, and filter their main prior to downloading it from the server

differentiated quality of service

a new technology that assigns levels of priority to packets based on the type of data being transmitted

Differentiated Quality of Service (diffserv)

a new technology that assigns levels of priority to packets based on the type pf data being transmitted

sponsorship

a paid effort to tie an advertiser's name to information, an event, or a venue in a way that reinforces its brand in a positive yet not overtly commercial manner

online advertising

a paid message on a website, online services or other interactive medium

client

a powerful desktop computer that is part of a network

Clients

a powerful personal computer that is part of a network

ping

a program that allows you to check the connection between the client and the server

Ping

a program that allows you to check the connection between your client and the server

JaveScript

a programming language invented by Netscape that is used to control the objects on an HTML page and handle interactions with the browser

Java

a programming language that allows programmers to create interactivity and active content on the client computer, thereby saving considerable load on the server

Active Server Pages (ASP)

a proprietary software development tool that enables programmers using Microsoft IIS package to build dynamic pages

Active Server Pages (ASP)

a proprietary software development tool that enables programmers using Microsoft's IIS package to build dynamic pages

Post Office Protocol 3 ( POP3)

a protocol used by the client to retrieve mail from an Internet server

Post Office Protocol 3 (POP3)

a protocol used by the client to retrieve mail from an internet server

customer relationship management (CRM) system

a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to "know the customer"

Postal System

a series of post offices and a set of addresses

data mining

a set of analysis techniques that look for patterns in the data of database or data warehouse, or seek to model the behavior of customers

business model

a set of planned activities designed to result in a profit in a marketplace

business strategy

a set of plans for achieving superior long-term returns on the capital invested in a business firm

Protocol

a set of rules and standards for data transfer

Common gateway interface (CGI)

a set of standards for communication between a browser and a program running on a server that allows for interaction between the user and the server

english auction

a single item is for sale by a single seller, the highest bid wins

commoditization

a situation where there are no differences among products or services, and the only basis of choosing is price

Widget

a small, pre-built chunk of code that executes automatically in you HTML Web page; capable of performing a wide variety of tasks

consumer behavior

a social science discipline that attempts to model and understand the behavior of humans in a marketplace

database

a software application that stores records and attributes

DBMS (database management systems)

a software application used by organizations to create, maintain, and access databases

database management system (DBMS)

a software application used by organizations to create, maintain, and access databases

Hadoop

a software framework for working with various big data sets

Telnet

a terminal emulation program that runs in TCP/IP

telnet

a terminal emulation program that runs in TCP/IP

frequently used questions (FAQs)

a text-based listing of common questions and answers

A Web beacon is

a tiny graphics file embedded in an e-mail or Web page.

Cookies

a tool used by Web sites to store information about a user. When a visitor enters a Web site, the site sends a small text file (the cookie) to the user's computer so that information from the site can be loaded more quickly on future visits. The cookie can contain any information desired by the site designers

Hypertext

a way of formatting pages with embedded links that connect documents to one another, and that also link pages to other objects such as sound, video, or animation files

hypertext

a way of formatting pages with embedded links that connect documents to one another, and that also links pages to other objects such as sound, video, or animation file

interstitial ad

a way of placing a full-page message between the current and destination pages of a user

Online forums

a web application that allows Internet users to communicate with each other, although not in real time

online messaging board

a web application that allows internet users to communicate with each other, although not in real time

magazine aggregater

a website or app that provides subscriptions and sales of many digital magazines pg 364

customization

ability to change the product to better fit then eeds of the customer

personalization

ability to treat ppl based on their personal qualities and prior history with your site

competitive advantage

achieved by a firm when it can produce a superior product and/or bring the product to a market at a lower price than most

competitive advantage

achieved by a firm when it can produce a superior product and/or bring the product to market at a lower price than most, or all, or its competitors

transaction brokering

acting as an intermediary to facilitate a transaction

rich media ad

ad employing animation, sound, and interactivity, using Flash, HTML5, Java, and Javascript

uniform resource locator (URL)

address used by web browser to ID location of content on the web E.g. http://www.azimuth-interactive.com/flash_test

Personalization pricing

adjusts based on merchant's estimate of how much customer values product

Utilization

adjusts based on utilization of product,Adjusting the annual cost of automobile insurance based on mileage driven is an example of ________ pricing. utilization

Internet2

advanced networking consortium of more than 250 member institutions working in partnership to facilitate the development, and use of revolutionary Internet technologies

Internet 2

advanced networking consortium of more than 450 members institutions working in partnership to facilitate the development, deployment, and use of revolutionary internet technologies

cost per action (CPA)

advertiser pays only for those users who perform a specific action

cost per click (CPC)

advertiser pays renegotiated fee for each click an ad receives

cost per thousand (CPM)

advertisers pays for impressions in 1,000-unit lots

local marketing

advertising is based on the location of the consumer and the stores and products around that area

Revenue model Types

advertising revenue model, subscription revenue model, transaction revenue model, sales revenue model, affiliate revenue model

native advertising

advertising that looks similar to editorial content

indirect goods

all other goods not directly involved in the production process pg 419

b2b commerce

all types of inter-firm trade B2B makes up the larger volume of online commerce in terms of money transacted. It is linked to supply chain management, as it primarily addresses how businesses use electronic commerce to more effectively and efficiently manage its interaction with various parties in the supply chain such as suppliers, buyers, etc. pg 416

domain name server (DNS)

allows expressions such as Cnet.com to stand for a numeric IP address.

domain name system (DNS)

allows numeric IP addresses to be e pressed in natural language

Shopping cart

allows shoppers to set aside desired purchases in preparation for checkout, review what they have selected, edit their selections as necessary, and then actually make the purchase by clicking a button

FTP

allows users to transfer files to and from the server

online social network

an area online, where people who share common ties can interact with one another pg 386

podcast

an audio presentation stored online as a digital media file

podcast

an audio presentation- such as radio show, audio from a movie, or simply a personal audio presentation- stored as an audio file and posted to the Web

industry structural analysis

an effort to understand and describe the nature of substitute products, the barriers to entry, and the relative strength of consumers and suppliers

exchange

an independent digital marketplace where suppliers and commercial purchasers can conduct transactions

internet

an interconnected network of thousands and millions of computers linking businesses, educational institutions, government agencies, and individuals

T1

an international telephone standard for digital communication that offers guaranteed delivery at 1.45 Mbps

T1

an international telephone standard for digital communication that offers guaranteed delivery at 1.54 Mbps

T3

an international telephone standard for digital communication that offers guaranteed delivery at 45 Mbps

Web beacon

an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content. Common uses are email tracking and page tagging for web analytics. Alternative names are web bug, tracking bug, tag, or page tag.

interest-based advertising (IBA)

another name for behavioral targeting

Secure Sockets Layer (SSL)/Transport Layer Security (TLS)

protocols that secure communications between the client and the server

Internet drone access

provide Internet access remote parts of the world

social networks

provide intimate connections among customers, suppliers, logistics partners that are needed to keep the supply chain functioning and to make decisions based on current conditions pg 430

incubator

provide services and some funding for a new e-commerce business (usually the first to help)

Application layer

provides a wide variety of applications with the ability to access the services of the lower layers

Application layer

provides a wide variety of applications with the ability to access the services of the lower layers. Some of the best known applications are HTTP, FTP and SMTP

EC merchant server software provides...

provides basic fxnality for online sales: -online catalog -shopping cart -credit card processing

e-distributer

provides electronic catalog that represents the products of thousands of direct manufactures pg 432

private cloud

provides similar options as a public cloud but only to a single tenant

Private Cloud

provides similar options as public cloud but only to a single tenant

mobile platform

provides the ability to access the internet from a variety of mobile devices

Telnet program

provides the client part of the protocol and enables the client to emulate a mainframe computer terminal

IP

provides the internet's addressing scheme and is responsible for delivery of packets

The Transport Layer of TCP/IP is responsible for which of the following?

providing communication with the application by acknowledging and sequencing the packets to and from the application

dutch internet auction

public ascending price, multiple unit auction. final price is lowest successful bid, which sets price for higher bidders. start listing by minimum price. bidders specify bid price & qty. price per item. pg 396

network keyboard advertising (context advertising)

publishers accept ads placed by google on their websites, and receive a fee for any click-throughs from those ads

widgets

pull content and functionality from one place on the Web to a place where you want it, such as on your Web page, blog, or Facebook page (e.g., free photo-editing application on Picnik.com

pricing

putting a value on goods and services

view-to-cart ratio

ratio of "Add to cart" clicks to product views

cart conversion rate

ratio of actual orders to "add to cart" click

checkout conversion rate

ratio of actual orders to checkouts started

browse-to-buy ratio

ratio of items purchased to product views

advertising revenue model

receives fees from advertisers

transaction log

records user activity at a website

disintermediation

reduction in the use of intermediaries between producers and consumers

web client

any computing device attached to the internet that is capable of making HTTP requests and displaying HTML pages, most commonly a Windows PC or Mac

Subscription revenue model

anything that you have to pay to be a part of and to access its content

Mobile Web app

application built to run on the mobile Web browser built into a smartphone or tablet computer

Native app

application designed specifically to operate using the mobile devices hardware and operating system

DNS Server

are database that keep track of IP addresses and domain names on the internet.

Principle of responsibility

as free moral agents, individuals, organizations, and societies are responsible for the actions they take

No free lunch

assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise. if something someone else has created is useful, you should assume the creator wants compensation

magazines and tablets

at first "glossies" not impacted magazine sales dropped due to screens improvement in resolution since video on web became more common -digital magazines sales be extraordinary. largest drivers: Pinterest, FB, Yahoo & Twitter pg 363

Broadband

refers ti any communication technology that permits clients to play streaming audio and video speeds-generally anything above 100 Kbps

supply chain management (SCM)

refers to a wide variety of activities that firms and industries use to coordinate the key players in their procurement process Trends: phones, email, fax, face to face conversations, instinct, rely on trusted long term suppliers Developments: just in time production, lean, supply chain simplification, adaptive supply chains, sustainable supply chains, electronic data interchange, supply chain mgmt systems, collaborative commerce pg 422

scalability

refers to ability of site to increase in size as demand warrants

Hardware platform

refers to all the underlying computing equipment that the system uses to achieve its e-commerce functionality

differentiation

refers to all the ways producers can make their products or services unique and different to distinguish them from those of competitors

Hardware platform (for EC site)

refers to all underlying computer equipment that system uses to achieve EC fxnality

broadband

refers to any communication technology that permits clients to play streaming audio and video files at acceptable speeds

digital rights management (DRM)

refers to the combination of technical and legal means for protecting digital content from unlimited reproduction without permission (hardware and software). "walled garden"- restrict widespread sharing of content

market opportunity

refers to the company's intended market space and the overall potential financial opportunities available to the firm in that market space

industry structure

refers to the nature of players in an industry and their relative bargaining power

Social density

refers to the number of interactions among members of a group and reflects the "connected-ness" of a group, even if these connections are forced on users

competitive environment

refers to the other companies operating in the same marketspace selling similar products

4. Mobile Comerce

refers to the use of mobile devices to enable online transactions. Involves the use of cellular and wireless networks to connect laptops, smartphones such as iPhone or Android and tablets to the internet. Example: Mobile devices can be used to conduct commercial transactions

deterministic cross-device tracking

relies on personally identifiable information such s email address used to log into an app and website on different devices

relational databases

represent data as two-dimensionsl tables with records organized in rows and attributes in columns; data within different tables can be flexibility related as long as the tables share a common data element

complementary resources

resources and assets not directly involved in the production of the product, but required for success, such as marketing, management, financial assets, and reputation

Internet layer

responsible for addressing, packaging and routing messages on the internet.

Internet layer

responsible for addressing, packaging, and routing messages on the internet

Internet layer

responsible for addressing, packing, and routing messages on the Internet

Netwrok Interface Layer

responsible for placing packets on and receiving them from the network medium

Network interface layer

responsible for placing packets on and receiving them from the network medium which could be a LAN (Ethernet) or a Token Ring network, or other network technology. TCP/IP is independent from any local network technology and can adapt to changes at the local level.

Network interface layer

responsible for placing packets on and receiving them from the network: (LAN) Ethernet, token ring network/other

Transport layer

responsible for providing communication with other protocols within TCP/IP suite

Transport layer

responsible for providing communication with the application by acknowledging and sequencing the packets to and from the application

Host to host transport layer

responsible for providing communication with the application by acknowledging and sequencing the packets to and from the application.

Internet Engineering Steering Group (IESG)

responsible for technical management of IETF activities and the Internet standards process

omni-channel

retails through a variety of channels and integrating physical stores with websites

professional service auctions

seal-bid, dynamic-priced market for freelance professional services from legal and marketing services to graphics design and programming pg 396

web sites: activity

search display affiliates sponsorships

Search engine

search engine models within the basic Web server software package enable indexing of the site's Web pages and content and permit easy keyword searching of the site's context

one-to-one marketing (personalization)

segmenting the market based on a precise and timely understanding of an individual's needs targeting specific marketing messages to these individuals and then positioning the product vis-a-vis competitors to be truly unique

sales revenue model

sell products/services and generate revenue

price discrimination

selling products to different people and groups based on their willingness to pay

B2B service provider

sells business services to other firms

hummingbird

semantic search component of google's search algorithm

affiliate revenue model

send customers to an affiliate and get a referral fee

automated response system

sends e-mail order confirmations and acknowledgments of emailed inquiries

Database servers

server designed to access specific information within a database

database server

server designed to access specific information within a database

Ad servers

server designed to deliver targeted banner ads

ad server

server designed to deliver targeted banner ads

page generation

server response time device based accelerators efficient resource allocation resource utilization thresholds monitoring site performance

Mail server

server that provides e-mail messages

mail server

server that provides email messages

Video server

server that serves video clips

video server

server that serves video clips

social networks

services that support communication within a network of friends, colleagues, and entire professions

Web 2.0

set of applications and technologies that enables user-generated content

accessibility rules

set of design objectives that ensure disabled users can affectively access site

lean production

set of production methods and tools that focuses on the elimination of waste throughout the customer value chain pg 423

general-purpose portals (type 1)

attempt to attract a very large general audience and then retain the audience on-site by providing in-depth vertical content. EX: info on news, finance, autos, movies, weather typically offer web search engines, free email, personal home pages, chat rooms, community-building software, bulletin boards consumers can be exposed to highly targeted advertising pg 401

vertical market portals (type 2)

attempt to attract highly focused, loyal audiences with deep interest in either community or specialized content. began adding many general-purpose portals features vertical content pitched to a targeted audience produces the highest revenues per customer AKA destination sites or vortals pg 401

Fan acquisition

attracting people to your marketing messages

ad exchanges

auction based digital marketplace where ad networks sell ad space to marketers

business-to-consumer (B2C) auctions

auction house sells goods it owns or controls using various dynamic pricing models pg 393

name your own price auction

auction where users specify what they are willing to pay for goods or services. pioneered by priceline. 2nd most popular on web. providers bid for their business. prices are fixed pg 396

Which of the following is not one of the three defining characteristics of a portal

auctions

consumer-to-consumer (C2C) auctions

auctions house acts as an intermediary market maker, providing a forum where consumers can discover prices and trade pg 393

Security services

authentication services that verify that the person trying to access the site is authorized to do so (SSL & TLS)

programmatic advertising

automated, auction based method for matching demand and supply for online display ads

ubiquity

available everywhere at all times

acquisition rate

average length of time visitors remain at a site

stickiness

average length of time visitors remain at a site

stickiness (duration)

average length of time visitors remain at a site

recency

average number of days elapsed between visits

Locationbased mobile marketing -targets marketing messages to users based on their location (The newest and fastest growing segment of the digital marketing universe) Google provides the leading location

based marketing platform.

Combines an intuitive tag based scripting language and a tag

based server scripting language that lowers the cost of creating interactive features.

reduce auction markets fail risk

because of auto-auction -Rating System: previous customers rate sellers based on their experience -Watch lists: these allow buyers to monitor specific auctions. pay close attention to last minute bidding -Proxy Bidding: buyers can enter a max price they're willing to pay and the auction software will automatically place incremental bids as their original bid is surpassed pg 399

Penny auction

bid purchases are made ahead of time and you put them towards a selling item; once you spend your bid, you have spent the money

Which of the following is a common problem in sealed bid markets

bid rigging

content convergence

bringing together design, production, and distribution

net marketplace

brings hundreds to thousands of suppliers and buyers into a single internet-based environment to conduct trade pg 417 "frictionless" commerce: hope that suppliers would compete with each other on price which would be automated and low then price of industrial supplies would fall. by riding fees from buyers/sellers, third-party intermediary market makers could earn significant revenues pg 431

InterestBased Social Network

build around common interest, such as games, sports, music, politics (e-democracy.org)

market creator

builds a digital environment where buyers and sellers can meet, display products, search from products, and establish price for a product

1. Business to Consumer

business selling to other consumers Example: Amazon general merchandiser that sells consumer products to retail consumers

B2B e-commerce

business to business

B2C e-commerce

business to consumer

Business objectives

capabilities you want your site to have

shopping cart database

captures all the item selection, purchase, and payment data

Panda

change in the google algorithm to eliminate low-quality sites from search results

penguin

change in the google algorithm to eliminate sites with low-quality back links

customization

changing the product, not just the marketing message, according to user preferences

Comprehensive multi

channel marketing)-take advantage of the strengths of various media, and reinforce branding message across media

gadgets

closely related to widgets, which are small chunks of code that usually supply a single limited function such as a clock, calendar, or diary.

privacy policy

set of public statements declaring how site will treat customers' personal info that is gathered by the site

protocol

set of rules and standards for data transfer

Dark Social

sharing outside of major social networks, using e-mail, IM, texts, etc.

cord shavers

shave down their cable services to more basic channels

elevator pitch

short two-to-three minute presentation aimed at convincing investors to invest

retargeting

showing the same ad to individuals across multiple websites

How much does EC cost?

simple web site: up to $5K small web start-up: $25-50K large corporate site: $100K - millions

virtual merchants

single-channel e-commerce firms that generate almost all of their revenue from online sales

manufacturing direct

single-or multi-channel manufacturers who sell directly online to consumers without intervention of retailers

widgets

small pre-built chunk of code that executes automatically in an HTML web page

cookies

small text file placed on the user's client computer that can contain any kind of info about the customer (customer ID, purchases at the site) *PRIMARY METHOD FOR ACHIEVING PERSONALIZATION + CUSTOMIZATION)

cookie

small text file that websites place on the hard disk of visitors' client computers that allows the website to store data about the visitor on the computer and later retrieve it

Web Browsers

software program whose primary purpose is to display Web pages

web browser

software program whose primary purpose is to display webpages

Web application server

software programs that provide specific business functionality required of a Web site.

Web server software

software that enables a computer to deliver Web page written in HTML to client computers on a network that request this service by sending an HTTP request -Apache, Microsoft IIS: leading brands of Web server software

web server software

software that enables a computer to deliver web pages written in HTML to client computers on a network that requests and displaying HTML pages, most commonly w windows PC or mac

web server software

software that enables a computer to deliver webpages written in HTML to client computers on a network that requests and displays HTML pages, most commonly Windows PC or Mac

Open source software

software that is developed by a community of programmers ad designers, and is free to use and modify

open source

software that is developed by a community of programmers and designers, and is free to use and modify

closed source

software that must be paid for and cannot be modified

E-commerce merchant server software

software that provides the basic functionality needed for online sales, including an online catalog, order taking via an online shopping cart, and online credit card processing

marketing automation systems

software tools that marketers use to track all the steps in the lead generation part of the marketing process

marekting analytics software

collects, stores, analyzes, and graphically presents data on each of the stages in the conversion of shoppers to customers process on e-commerce sites

Which of the following dimensions of e

commerce security is not provided for by encryption-availability

6. Local e

commerce- Focused on engaging the consumer based on his or her current geographic location. Groupon offers subscribers daily deals from local businesses in the form of Groupons, discount coupons that take effect once enough subscribers have agreed to purchase

Which of the following is not a key point of vulnerability when dealing with e

commerce- the credit card companies

5. Social e

commerce-enabled by social networks and online social relationships Facebook is both the leading social network and social e-commerce site. Social e-commerce is the largest type of e-commerce. False

affiliate marketing

commissions paid by advertisers to affiliate websites for referring potential customers to their website

Electronic Data Interchange

communications protocol for exchanging documents among computers

Sales revenue model

companies derive revenue by selling goods, content, or services to customers. Companies such as amazon which sells books, music and other products.

freemium strategy

companies give away a certain level of product or services for free, but then charge a subscription fee for premium levels of the product or service

content farms

companies that generate large volumes of textual content for multiple websites designed to attract viewers and search engines

bricks and clicks

companies that have a network of physical stores as their primary retail channel, but also have introduced online offerings

benchmark

comparing against standards

scope strategy

competing in all markets around the globe, rather than just local, regional, or national markets

focus/market niche strategy

competing within a narrow market of product segment

the network technology Substrate layer

composed of telecom networks and protocols

Routing Algorithms

computer program that ensures that packets take the best available path toward their destination

routing algorithm

computer program that ensures that packets take the best available path toward their destination

long tail marketing

concentrates on the less popular products

internet scale

concept that is at the root of most venture investing: because software has zero marginal cost - one copy costs just as much as 100, or one million - there are massive profits to be gained from reaching huge numbers of customers on a uniform product or service.

advertising networks

connect online marketers with publishers by displaying ads to consumers based on detailed consumer information

Telephone-based wireless Internet access

connects the user to a global telephone system (land, satellite, and microwave) that has a long history of dealing with thousands of users simultaneously and already has in place a large-scale transaction billing system and related infrastucture

fiber optic cable

consists of up to hundreds of strands of glass or plastic that use light to transmit data

fiber optics

consists of up to hundreds of strands of glass or plastic that use light to transmit data

Internet Society (ISOC)

consortium of corporations, government agencies, and nonprofit organizations that monitors Internet policies and practices

C2C e-commerce

consumer to consumer

value proposition

defines how a company's product or service fulfills the needs of customers

value proposition

defines how a product fills a need (what is it worth?)

Costs of auction

delayed consumption, monitoring, equipment, trust, fulfillment

Latency

delays in messages caused by the uneven flow of information packets through the network

latency

delays in messages caused by the uneven flow of information packets through the network

digital subscriber line (DSL)

delivers high speed access through ordinary telephone lines found in homes or businesses

Digital Subscriber Line (DSL)

delivers high-speed access through ordinary telephone lines found in homes or businesses

Wireless local area network (WLAN)-based Internet access

derives from a completely different background from telephone-based wireless Internet access

SWOT analysis

describes a firm's strengths, weaknesses, opportunities, and threats

revenue model

describes how the firm will earn revenue, produce profits, and produce a superior return on investment capital

logical design

describes the flow of information at your e-commerce site, the processing functions that must be performed, the database that will be used, the security and emergency backup procedures that will be instituted, and the controls that will be used in the system

Logical design

describes the flow of information at your e-commerce site, the processing functions that must be performed, the databases that will be used, the security and emergency backup procedures that will be instituted, and the controls that will be used in the system

System design specification

description of the main components in a system and their relationship to one another

Costs of maintenance parallel to

development costs

private industrial network

digital network designed to coordinate the flow of communications among firms engaged in business together

e-commerce

digitally enabled commercial transactions between and among organizations and individuals

e-business

digitally enabling of transactions and processes within a firm, involving information systems under the firm's control

banner ad

displays a promotional message in a rectangular box at the top pf a computer screen

instant messaging

displays texts entered almost instantaneously

Instant messaging

displays words typed on a computer almost instantaneously. Recipients can then respond immediately to the sender the same way, making the communication more like a live conversation than is possible through email. -Advanced IM systems include voice/video chat

content provider

distributes information content, such as digital news, music, photos, video, and artwork

cord cutters

do not use cable tv at all

The golden rule

due unto others as you would have them do unto you. putting yourself into the place of others and thinking of your self as the object of the decision can help you think of fairness in decision making

two-tier architecture

e-commerce system architecture in which a Web server responds to requests for Web pages and database server provides backend data storage

multi-tier architecture

e-commerce system architecture in which the Web server is linked to a middle tier layer that typically includes a series of application servers that perform specific tasks as well as to a backend layer of existing corporate systems.

direct e-mail marketing

e-mail marketing messages sent directly yo interested users

example of transaction fee revenue model

eBay

offline media: activity

education exposure branding

scale economies

efficiencies that arise from increasing the size of a business

social search

effort to provide fewer, more relevant, and trustworthy results based on the social graph

bid syphoning

emailing another seller's bidders and offering them the same product

management team

employees of the company responsible for making the business model work

Horizontal scaling

employing multiple computers to share the workload

wiki

enables documents to be written collectively and collaboratively

Border Gateway Protocol

enables exchange of routing information among systems on the internet

Streaming media

enables music, video, and other large files to be sent to users in chunks so when received and played, the file come through uninterrupted

streaming media

enables video, music, and other large-bandwidth files to be sent to a user in a variety of ways that enable the user to play the files as they are being delivered

transaction fee revenue model

enabling transactions results in obtaining fees

Amplification

encouraging visitors to share their Likes and comments with their friends

amplification

encouraging visitors to share their likes and comments with their friends

disruptors

entrepreneurs and their business firms that lead to a business model disruption

TCP

established connections among sending and receiving computers and handles assembly and reassembly of packets

TCP

establishes connections among sending and receiving computers-- handles assembly of packets at the point of transmission

Open source web building tools

ex: Apache web server, MySQL, PHP, PERL

EC merchant services

ex: Yahoo's Small Business Merchant Solns

asymmetry

exists whenever one participant in a market has more resources than other participants

ad fraud

falsifying web or mobile traffic in order to change advertisers for impressions, clicks, or other actions that never actually occur

The ratio of impressions to fans is a measure of

fan acquisition

Which of the following is not a primary activity in a firm value chain,

finance/accounting

Internet Service Provider (ISP)

firm that provides the lowest level of service in the multi-tiered Internet architecture by leasing Internet access to home owners, small businesses, and some large institutions

Tier 3 Internet Service Provider

firm that provides the lowest level of services in the multi-tiered internet architecture while leasing internet access to home owners, small businesses, and some large institutions

customer intimacy

focuses on developing strong ties with customers in order to increase switching costs

Internet Research Task Force (IRTF)

focuses on the evolution of the Internet

paid inclusion

for a fee, guarantees a website's inclusion in its list of sites, more frequent visits by its web crawler, and suggestions for improving the results of organic searching

Commercialization phase

fro 1995-present, government agencies encouraged private corporations to take over and expand both the Internet backbone and local service to ordinary citizens

Innovation phase

from 1961-1974, the fundamental building blocks of the internet were conceptualized and then realized on actual hardware and software

Institutionalization phase

from 1975-1995, large institutions such as Department of Defense (DoD) and the National Science Foundation (NSF) provided funding and legitimization for the fledging invention called the Internet

knowledge graph

function in google's search engine that displays a selection of facts related to your search term that you maybe interested in knowing more about

registration forms

gather personal data on name, address, phone, zip code, e-mail address, and other optional self-confessed information on interests and tastes

revenue sources for portals

general advertising, tenancy deals, commissions, on sales subscription fees ,(premium content), applications and games

Portal characteristics

general purpose portals (yahoo, aol, ask), vertical market portals Home pages, most visited web pages. Were firstly search engines, now complex websites that provide news, entertainment, maps, images, social networks, in-depth info and education

Campus Area Network (CAN)

generally, a local area network operating within a single organization that leases access to the Web directly from regional and national carriers

campus/corporate area network (CAN)

generally, a local area network operating within a single organization that leases access to the web directly from regional and national carriers

middleware services layer

glue that ties the applications to the communications

direct goods

goods directly involved in the production process pg 419

Patent

grants the owner an exclusive monopoly on the ideas behind an invention for 20 years

link farms

groups of websites that link to one another, thereby boosting their ranking in search engines

Objective of choosing the hardware for an EC site:

have enough platform capacity to meet peak demand but not so much that you waste money

Intelligent personal assistant

having a conversation with a computer that can do things for you

Internet Architecture Board (IAB)

helps define the overall architecture of the Internet and oversees the IETF and IRTF

Satellite Internet

high speed broadband internet access provided via satellite

wi-fi

high speed, fixed broadband wireless with limited range of 300 ft

backbone

high-bandwidth fiber optic cable that transports data across the internet

backbone

high-bandwidth fiver-optic cable that transports data across the Internet

Satellite Internet

high-speed broadband Internet access provided via satellite

Outsourcing

hiring an outside vendor to provide the services you cannot perform with in-house personnel

transport services and representation standards layer

houses the tcp/ip protocol

revenue model

how a company will earn money

Internet Network Operators Groups (NOGs)

informal groups that are made up of ISPs, IXPs, and others that discuss and attempt to influence matters related to Internet operations and regulation

All of the following are key elements of a business model except

information technology strategy.

Disputes over federal trademarks involve establishing

infringement

3 phases of internet development

innovation phase institutionalization phase commercialization phase

merchant server software packages (EC suites) offer

integrated environment with most of functionality needed

ColdFUsion

integrated server-side environment for developing interactive web apps

Which dimension(s) of security is spoofing a threat to?

integrity and authenticity

ecommerce security (6 Dimensions)

integrity, nonrepudiation, authenticity, confidentiality, privacy, availability

internet

interconnected network of thousands of networks and millions of computers links bus, educational institutions, gov agencies and indivs

e-mail: platform

internal lists purchased lists

IPv6 address

internet address expressed as a 128-bit number

IPv4 Internet address

internet address expressed as a 32-bit number that appears as a series of four separate numbers marked off by periods

IoT

internet of things

worsening email problem

spam

router

special-purpose computer that interconnects the computer networks that make up the internet and routes packets to their ultimate destinations as they travel the internet

web app servers provide...

specific business fxnality req for a website

Which of the following can be used to record all keyboard activity of a user

spyware

CGI (Common Gateway Interface)

standards for cx b/w browser + program running on a server that allows for interaxn b/w user + server

universal standards

standards shared by all (in terms of internet)

Affiliate revenue model

steer business to an affiliate receive a referral fee or percentage of the revenue from any resulting sales. For example, my points make money by connecting companies with potential customers by offering special deals to its members.

demand aggregators

suppliers or market makers who group unrelated buyers into a single purchase in return for offering a lower purchase price. prices on multiple units fall as the number of buyers increases. two principles: 1.) sellers are more likely to offer discounts to buyers purchasing in volume 2.) buyers increase purchases as prices fall pg 396

Domain name system (DNS)

system for expressing numeric IP addresses in natural language

domain name system

system for expressing numeric IP addresses in natural language

Domain name system (DNS)

system that allows numeric IP addresses to be expressed in natural language

planning + building mobile presence uses...

systems analysis/design to identify unique and specific bus objectives

SDLC

systems developmental life cycle

Collective utilitarian

take the action that achieves the greater value for all of society. this rule assumes you can prioritize values in a rank order and understand the consequences of various courses of action

search engine optimization (SEO)

techniques to improve the ranking of web pages generated by search engine algorithms

sustaining technologies

technologies that enable the incremental improvement of products and services

disruptive technologies

technologies that under pin a business model disruption

disruptive technology

technologies that underpin a business model disruption

Bluetooth

technology standard for short-range wireless communication under 30 ft

bluetooth

technology standard for short-range wireless communication under 30ft

Offline Marketing

television (2015 Ford F-150 this changes everything) Apple (shot on iPhone campaign), magazines (apple watch/vogue magazine

b2b e-commerce (b2b digital commerce)

that portion of b2b commerce that is enabled by the internet. evolved over 35 yrs. mid 70s- automated order entry system Late 70s-electronic data interchange Mid 90s- B2B electronic storefronts pg 416

Middleware Services layer

the "glue" that ties the applications to the communication networks and includes such services as security, authentication, addresses and storage repositories

Middleware Services layer

the "glue" that ties the applications to the communications networks and includes such services as security, authentication, addresses, and storage repositories

Which ethical principle states that, when confronted with an ethical dilemma, individuals should take the action that achieves the greater value for all of society

the Collective Utilitarian principle

Scalability

the ability of a site to increase in size as demand warrants

Global reach

the ability to be available all around the world

URL

the address used by a web browser to identify the location of content on the web

URL (uniform resource locator)

the address used by a web browser to identify the location of content on the web

uniform resource locator

the address used by a web browser to identify the location of content on the web

marketspace

the area of actual or potential commercial value in which a company intends to operate

System architecture

the arrangement of software, machinery, and tasks in an information system need to achieve a specific functionality

dutch auction

the auctioneer begins with a high asking price and lowers it until some participant accepts the price, or it reaches a predetermined reserve price

best practices

the best solutions/methods/techniques that have been used in the past

multi-tier supply chain

the chain of primary secondary, and tertiary suppliers pg 421

Marginal Cost

the change in the total cost that arises when the quantity produced is incremented by one unit, that is, it is the cost of producing one more unit of a good. In general terms, marginal cost at each level of production includes any additional costs required to produce the next unit.

richness

the complexity and content of a message

Internetwork

the connecting together of two or more computer networks

Dynamic page generation

the contents of a Web page are stored as objects in a database, rather than being hard-coded in HTML. When the user requests a Web page, the contents for that page are then fetched from the database

transaction cost

the cost of participating in a market

the most important factor affecting the speed of your site is...

the demand that customers put on the site

profit

the difference between the price a firm is able to charge for its products and the cost of producing and distributing goods

Packets

the discrete units into which digital messages are sliced for transmission over the Internet

packets

the discrete units into which digital messages are sliced for transmission over the internet

disruptors

the entrepreneurs and their business firms that lead a business model disruption

Netscape Navigator

the first commercial Web browser

Netscope Navigator

the first commercial web browser

Which ethical principle emphasizes putting oneself into the place of others and thinking of oneself as the object of the decision

the golden rule

Information requirements

the information elements that the system must produce in order to achieve the business objectives

HyperText Transfer Protocol (HTTP)

the internet protocol used for transferring Web pages

HyperText Transfer Protocol (HTTP)

the internet protocol used for transferring web pages

Simple Mail Transfer Protocol (SMTP)

the internet protocol used to send mail to a server

Simple Mail Transfer Protocol (SMTP)

the internet used to send mail to a server

supply chain

the links that connect business firms with one another to coordinate production pg 416

e-mail

the most used application of the internet; uses a series of protocols to enables messages containing text, images, sound, and video clips to be transferred from one internet user to another

Electronic Mail (E-mail)

the most-used application of the Internet. Uses a series of protocols to enable messages containing text, images, sound, and video clips to be transferred from one Internet user to another

unique visitors

the number of distinct, unique visitors to a site

click-through rate (CTR)

the percentage of people exposed to an online advertisement who actually click on the banner

winner's regret

the person who won the auction feels that they have spent too much on the item

market strategy

the plan you put together that details exactly how you intend to enter a new market and attract new markets

B2B e-commerce

the portion of B2B commerce enabled by the internet

Dynamic

the practice of pricing items at a level determined by a particular customer's perceived ability to pay.

dynamic pricing

the price of the product varies, depending directly on the demand characteristics of the customer and the supply situation of the seller. if in high demand then will cost more. can be conducted globally, continuously & a low cost pg 392

dynamic pricing

the price of the product varies, depending on the demand characteristics of the customer and the supply situation of the seller

viral marketing

the process of getting customers to pass along a company's marketing message to friends, family, and colleagues

demand curve

the quantity of goods that cane sold at various prices

ad targeting

the sending of market messages to specific subgroups in the population

firm value chain

the set of activities a firm engages in to create final products from raw inputs

value chain

the set of activities a firm engages in to create final products from raw inputs into final products and services

universal computing

the sharing of files, information graphics, sound, video, and other objects across all computer platforms in the world, regardless of operating system

Universal computing

the sharing of files, information, graphics, sound, video, and other objects across all computer platforms in the world, regardless of operating system

herd behavior

the tendency to bid higher for items based on the higher bids of others pg 398

herd behavior

the tendency to gravitate towards bids with multiple existing bids

barriers to entry

the total cost of entering a new marketplace

total inter-firm trade

the total flow of value among firms pg 416

customer experience

the totality of experiences that a customer has with a firm including the search, informing, purchase consumption, and after-sales support for its products, services, and various retail channels

narrowband

the traditional telephone modem connection, now operating at 56.6 Kbps

Narrowband (dial-up)

the traditional telephone modern connection, now operating at 56.6 Kbps

clickstream behavior

the transaction log that consumers establish as they move about the web

collaborative commerce

the use of digital technologies to permit organizations to collaboratively design, develop , build and manage products through their life cycles pg 429

procurement process

the way first purchase materials they need to make purchases

customer touch points

the ways in which customers interact with the firm

public cloud

third-party service providers that own

Public Cloud

third-party service providers that own and manage large, scalable data centers that offer computing, data storage, and high speed Internet to multiple customers who pay for only the resources they use

View

through rate-Measure the 30-day response rate to an ad

Click

through rate-the percentage of people exposed to an online advertisement who actually click on the banner

Social marketing

to encourage your potential customers to become fans of your company's products and services, and engage with your business by entering into a conversation with it

Responsive Web design

tools and design principles that automatically adjust the layout of a Web site depending on user screen resolution

information density

total amount and quality of information available to all market participants

web sites: platform

traditional mobile tablet

download

transfers a file from a web server and stores it on a computer for later use

Physical design

translates the logical design into physical components

physical design

translates the logical design into physical components

t/f: maintenance is ongoing

true

logical and physical design are all on paper!!!

true.

Interactivity

two way communication between customer and company

System functionalities

types of information systems capabilities you will need to achieve your business objectives

venture capital investors

typically invest funds that manage for other investors; usually later stage investors

Venture Capital investors

typically invest funds they manage for other investors; usually later stage investors

incubators

typically provide a small amount of funding and also an array of services to start up companies

angel investors

typically wealthy individuals or a group of individuals who invest their own money in exchange for an equity share in the stock of a business

seed capital

typically, an entrepreneur's personal funds derived from savings, credit card advances, home equity loans, or from family and friends

cross-platform attribution

understanding how to assign appropriate credit to different marketing initiatives that may have influenced a consumer on the way to a purchase

URL

uniform resource locator

3 Types of testing

unit testing system testing acceptance testing

spam

unsolicited commercial email

Mobile commerce

use of mobile devices to enable online transactions. expects growth by 30% next few years

The Internet of Things (IoT)

use of the Internet to connect a wide variety of devices, machines, and sensors

Internet of Things (IoT)

use of the internet to connect a wide variety of devices, machines, and sensors

over-the-top (OTT)

use of the internet to deliver entertainment services to the home on cable TV or FiOS networks. New internet broadcasting system pg 376

crowdfunding

use the web to collectively support a company or project a kickstarter

Pricing- Trigger

used in m-commerce, adjusts based on location of consumer

Javascript

used to control objects on a web page and handle interaxns with browser

real-time bidding (RTB) process

used to match advertiser demand for displays ads with publisher supply of web page space

Name your own price auction

users specify what they are willing to pay for goods or services and multiple providers bid for their business

profiling

uses a variety of tools to create a digital image for each customer

probabilistic cross-device tracking

uses algorithms to analyze thousands of anonymous data points to create a possible match

lead generation marketing

uses multiple e-commerce presences to generate leads for businesses who later can be contacted and converted into customers

shill bidding

using secondary IDs to inflate ratings

social e-commerce

using social media to buy and sell items

Acceptance testing

verifies that the business objectives of the system as originally conceived are in fact working

acceptance testing

verifies that the business objectives of the system as originally conceived are in fact working

Site management tools

verify that links on page are still valid and also identify orphan files

Mobile Web site

version of regular desktop Web site that is scaled down in content and navigation

angel investors

wealthy person or people who are really early and help to guide the company and invest usually $1 million or less

wiki

web application that allows a user to easily add and edit content on a Web page

wiki

web application that allows users to easily ass and edit content on a web page

Mosaic

web browser with a graphical user interface (GUI) that made it possible to view documents on the Web graphically

Mosaic

web browser with a graphical user interface (GUI) that made it possible to view documents on the web graphically

Online advertising (4 main methods)

web site, social marketing, mobile marketing, offline marketing

Type of presence:

website e-mail social media offline media

leverage

when a company uses its competitive advantage in surrounding markets

Co-location

when a firm purchases or leases a Web server (and has total control over its operation but locates the server in a vendor's physical facility, communications lines, and the machinery

cannibalization

when sales of new digital products replace sales of traditional products. "where one media form consumes another" music consumption measured in hours/day increased even though CDs declined; movie consumption increased and DVD sales decline pg 351

information asymmetry

when the market or a company has more information than the consumer

Wi-Fi

wireless standard for Ethernet networks with greater speed and range than Bluetooth -High-speed, fixed broadband wireless LAN (WLAN) -Wireless access point ("hot spots") -Limited range but inexpensive -For-profit Wi-Fi networks: Boingo, AT&T Wi-Fi Services

wi-fi

wireless standard for ethernet networks with greater speed and range than bluetooth

law of one price

with complete price transparency in a perfect information marketplace, there will be one world price for every product

example of an advertising revenue model

yahoo

examples of portals

yahoo, google, MSN, AOL

seller's lament

you will never know what the true value of the item that was auctioned is

online forum

§Also known as message board, bulletin board, discussion, board, discussion group, board or forum §Web application that enables Internet users to communicate with each other, although not in real time §Members visit online forum to check for new posts

streaming media

§Enables music, video and other large files to be sent to users in chunks so that when received and played, file comes through uninterrupted §Allows users to begin playing media files before file is fully downloaded

online chat

§Similar to IM, but for multiple users §Typically, users log into chat room

cookies

§Small text files deposited by Web site on user's computer to store information about user, accessed when user next visits Web site §Can help personalize Web site experience §Can pose privacy threat

Risks and Cost of Auctions for Business and Consumers

-Delayed Consumption Cost: internet auctions can go on for days and shipping will take additional time -Monitoring Cost: participation in auctions requires your time to monitor bidding -Equipment Costs: internet auctions require you to purchase a computer system, pay for internet access and learn a complex operarting system -Trust Risk: online auctions are the single largest source of internet fraud. using auctions increases the risk of experiencing a loss -Fulfillment Cost: typically the buyer pays fulfillment costs of packing, shipping and insurance whereas at a physical store these costs are included in the retail price. pg 394

Steps in a typical Facebook Marketing Campaign? 5

-Establish Facebook brand page -Use comment and feedback tools to develop fan comments -Develop a community of users -Encourage brand involvement through video, rich media, contests -Use display ads for other Facebook pages and social search -Display Like button liberally

3 Facebook analytics tools

-Facebook Page Insights (tracks likes, comments, shares) -Social media management systems (HootSuite) (crosses over to other social networks) -Analytics providers (Google Analytics, Webtrends)

Facebook Metrics system

-Fan acquisition metrics (how many exposed to posts) -Engagement metrics (# posts, views, likes, etc.) -Amplification metrics (% liking, sharing, reposting) -Community metrics (total of posts, comments, actions) -Brand strength/sales (% of purchases from FB users)

4 steps of twitter marketing campaign

-Follow others relevant to your content and conversation -Experiment with simple Promoted Tweets -For larger budgets, use Promoted Trends and TV ad retargeting -For retail business local sales, build Lead Generation Card

key factors in selecting a package:

-Fxnality -Support for diff business models -Bus process modeling tools -Visual site mgt + reporting -Performance + scalability -Connectivity to existing bus systems -Compliance with standards -Global + multicultural capability -Local sales tax + shipping rules

Six Features of Location-Based Digital Marketing

-Geo-social-based services marketing (e.g., Foursquare; friend finder) -Location-based services marketing -Mobile-local social network marketing -Proximity marketing (opt in; e.g., Coors at 28 airports alerting Blue Moon nearby) -In-store messaging (respond in real time to shopping behavior) -Location-based app messaging (personalized deals)

What are the six steps in a mobile marketing campaign?

-Mobile Web site -Facebook and Twitter brand pages -Mobile versions of display advertising campaigns -Ad networks (track ads across platforms) -Interactive content aimed at mobile user -Tools for measuring responses (like desktop and social marketing metrics)

Pinterest Marketing Tools

-Pin It and Follow buttons - help users pin your content -Pin as display ad - pin with special ad content -Theme-based (lifestyle boards) - Pinterest doesn't want business boards too sales-focused -Brand pages - companies now can create these -URL link to stores - helping firms gain traffic -Retail brand Pins - see prices, where to buy, or recipes -Integration with other social sites - icon helping pin -Network with users, followers, others

Twitter Marketing Tools

-Promoted Tweets - pay to have tweets appear in search results -Promoted Trends - pay to move hashtags to the top of Trends lists -Promoted Accounts - pay to have suggestions to users -Enhanced Profile Page - pay $15K for banner, tweets on company's timeline -Amplify - Real time digital dashboard connecting TV commercials and tweeting -Television Ad Retargeting - Tweet ads to TV viewers -Lead Generation Cards - message in users' timeline with coupon or offer

What are the four metrics to measure characteristics (results) of a location based marketing campaign?

-Reservations -Click-to-call -Friend -Purchase

three revenue models for digital content delivery

-Subscription: pay, all you can eat -A La Carte: pay for what you use -Advertising Support: uses ads so it can be free or offers higher price option for freemium free can drive people to the paid version. pg 351

Twitter Analytic tools

-Twitter's real-time dashboard -Twitter's Timeline activity dashboard Third-party tools -TweetDeck - track mentions, people, keywords -Twitalyzer - analyze followers, mentions, etc. -BackTweets - search tweet archive for URLs

online newspaper

-was losing since most articles were accessed by yahoo/google which posted them for free -now have created premium subscriptions to prevent that -online readership growing 10% a yr pg 356 The publishing industry is an $82 billion industry with extraordinary potential to move toward new generations of online newspapers, books, and magazines. However, achieving profitability has proved difficult. Online newspapers have mostly relied on the advertising business model but in general, this revenue model has not proved sufficient to achieve stand-alone profitability. In order to move toward a subscription model and increase revenues, newspapers have been developing premium niche content and moving toward mobile news services.

internet telephony (VOIP)

...

Factors involved in overall demand:

1. # of simultaneous users in peak periods 2. nature of customer requests (user profile) 3. type of content (dynamic vs static web pages) 4. req'd security 5. # of items in inventory 6. # of page requests 7. speed of legacy apps

today, search engines also serve as:

1. Shopping tools 2. Advertising vehicles (search engine marketing) 3. Tool within e-commerce sites

web site systems development life cycle

1. Systems Analysis/Planning 2. Systems Design 3. Building the System 4. Testing 5. Implementation System Delivery

5 steps of SDLC

1. Systems analysis/planning 2. systems design 3. Building the system 4. Testing 5. Implementation

cloud computing radically reduces costs of

1. building and operating web sites 2. infrastructure, IT support 3. hardware, software

What are the 3 components of system analysis?

1. business objectives 2. system functionality 3. information requirements

most important mgt challenges in building a successful e-commerce site are:

1. developing a clear understanding of bus objectives Req you to: build a plan for developing your firm's site 2. knowing how to choose the right technology to achieve those objectives Req you to: understand some of the basic elements of EC infrastructure

transmission control protocol (TCP)

1. establishes cxs among sending and receiving Web comps 2. Handles assembly of packets at point of transmission, and reassembly at the receiving end

2 types of app servers

1. isolated business apps (from web servers + DBs) 2. single-fxn apps (which are increasingly being replaced by integrated software tools that combine all fxnality needed for EC site)

advantages of dynamic page gen tools

1. lowers menu costs (costs incurred by merchants for changing prod dx + prices) 2. permits easy online mkt segmentation (ability to sell same product to diff mkts) 3. enables cost-free price discrimination (ability to sell the same product to diff customers @ diff prices) 4. enables web content sys (WCMS)

performance + cost

1. mobile web site (least expensive) 2. mobile app (can use browser API) 3. native app (most expensive, requires more programming)

3 types of m-commerce software

1. mobile web site (responsive web design) 2. Mobile web app 3. native app

web 2.0 features and services

1. online social networks 2. blogs 3. really simple syndication (RSS) 4. Podcasting 5. wiki 6. Music and video services 7. internet telephony (VOIP) 8. Internet television (IPTV) 9. Telepresence and video conferencing 10. Online software and Web services 11.

3 important concepts as basis for internet

1. packet switching 2. tcp/ip protocol 3. client/server computing

factors in web site optimization:

1. page generation 2. page delivery 3. page content Purpose of website is to deliver content to customers and to complete transaxns. The faster + more reliably this is met, the more effective the web site

packet switching

1. slices digital messages into packets 2. sends packets along diff cx paths as they become available 3. Reassembles packets once they arrive at destination 4. uses routers §special purpose computers that interconnect the computer networks that make up the Internet and route packets §Routing algorithms to ensure packets take the best available path toward their destination

Important to understand the different factors that affect 1, 2, 3 of a site

1. speed 2. capacity 3. scalability

the new client: the emerging mobile platform within a few years, primary internet access will be through

1. tablets: supplementing Pcs for mobile situations 2. smartphones: disruptive tech: shift in processors, operating systems 25% of all cell phones

physical design

1. translates logical --> physical components 2. Specifies actual physical, software components, models, etc.

fed networking commission defines internet as network that

1. uses Ip addressing 2. supports tcp/ip 3. provides services to users, in manner similar to telephone system

ways to scale hardware:

1. vertically - increase processing power of indiv components 2. horizontally - employ multiple computers to share workload 3. improve processing architecture of site

main types of internet-based b2b commerce

1.)Net marketplaces- aka exchanges, bring in thousands of sellers/buyers into a single digital marketplace operated over the internet. support many-to-many relationships and one-to-many relationships 2.)Private industry network- bring small number of strategic business partner firms, develop highly efficient supply chain and satisfy customer product demand. support many-to-one and many-to-few relationships. largest form of b2b e-commerce pg 430

pure types of net marketplaces

1.)e-distributor 2.)independent exchanges 3.)e-procurement 4.) industry consortia pg 432

collaborative resource planning, forecasting and replenishment (CPFR)

1.)involves working with network members to forecast demand, develop production plans and coordinate shipping , warehousing and stocking activities to ensure that retail and wholesale shelf space is replenished with just the right amount of goods. 2.) demand chain visibility: prevents excess inventories raise cost and pressures to discount merch 3.) marketing coordination and product design: coordinate internal design and marketing activities pg 441

Internet (IP) Addresses: IPv6

128-bit addresses Able to handle up to 1 quadrillion addresses (IPv4 can only handle 4 billion)

IPv6 Internet adress

128-bit addresses, able to handle up to 1 quadrillion addresses (IPv4 can handle only 4 billion)

innovation phase

1961-74 creation of fundamental building blocks

Value Chain

The set of activities performed in an industry or in a firm that transforms raw inputs into final products and services. Each of these activities add economic value into the final product hence the term value chain as an interconnected set of value adding activities.

Universal Computing

The sharing of files, information, graphics, sound, video, and other objects across all computer platforms in the world regardless of operating system

Biometrics

The study of measurable biological or physical characteristics

Narrowband

The traditional telephone modem connection, now operating at 56.6 Kbps

Ecommerce,

The use of internet the web and mobile apps and browsers running on mobile devices to transact business, more formally, digitally enabled commercial transactions between and among organizations and individuals.

Public Cloud

Third-party service providers that own and manage large, scalable data centers that offer computing, data storage, and high speed Internet to multiple customers who pay for only the resources they use

Web Site (Traditional Online Marketing)

Traditional Web Site(Ford.com), Search engine marketing (Google, Bing, Yahoo), Display Advertising (Google, Yahoo, MSN)

TCP

Transmission control protocol

A worm does not need to be activated by a user in order for it to replicate itself

True

Cookies when combined with Web beacons, can be used to create cross site profiles

True

Every device connecting to the Internet must have a unique address

True

FTP is a protocol used to transfer files to and from a server

True

Internet access providers typically provide faster download speeds than upload speeds to consumers.

True

It is not necessarily illegal to use someone else's trademark in a metatag

True

Proxy servers are also known as: dual home systems.

True

Trigger pricing adjusts prices based on the location of the consumer

True

when to use auctions in business

consumer wants greater value at lowest cost, business use auctions to maximize revenue by finding market value -type of product: online auctions are most commonly used for rare and unique products for which prices are difficult to discover and no market for goods -product life cycle: use auctions for goods at the end of their product life cycle -channel management: established retailers cant allow auctions interfere with their existing profitable channels -type of auction: sellers should choose auctions where there are many buyers -initial behavior: should start with low price -bid increments: safest to keep bid increments low -auction length: the longer then the larger number of bidders, and the higher prices can go -number of items: sellers should break up big bundles to avoid selling at "volume discount' -price allocation rule: everyone pay same price in multi-unit auction -closed vs. open bidding: closed bidding has many advantages for seller pg 397

applications layer

contains client apps such as WWWeb , email, and audio or video playback.

page delivery

content delivery networks edge catching bandwidth

supply chain management (SCM) systems

continuously link the activities of buying, making and moving products from suppliers to purchasing firms, as well as integrating the demand side of the business equation by including the order entry system in the process pg 427

social media: activity

conversation engagement sharing advice

Internet Corporation for Assigned Names and Numbers

coordinates the Internet's systems of unique identifiers

Which of the following protects original forms of expression in a tangible medium

copyright

Transmission Control Protocol/Internet Protocol (TCP/IP)

core communications protocol for the internet

Sponsored Community Sites

created by commercial, government, and nonprofit organizations (nike, IBM)

e-procurement firm

creates and sells access to digital markets

versioning

creating multiple versions of information goods and selling essentially the same product to different market segments at different prices

Registering a domain name similar or identical to trademarks of others to extort profits from legitimate holders is an example of

cyber squatting

query-driven data mining

data mining based on specific queries

procurement process

how firms purchase goods they need to produce goods for consumers. relationship between supply chain and process. types: indirect and direct. pg 419 1.) Search- catalogs, internet, salesppl, brochures, phone, fax. (decision stage) 2.)Qualify- research, credit history, check with competitors, phone, research (decision stage) 3.) Negotiate- price, credit terms, escrow, quality, timing (decision stage) 4.) Purchase order- order product, initiate, purch order, enter info system, mail 5.) Invoicing- receive PO, enter in financial system, enter into production system, send invoice, match with PO, internal review, enter into warehouse system 6.)Shipping- enter into shippers tracking system, ship goods, deliver goods, enter into tracking system 7.) remittance payment- receive goods.. pg 421

view time

how long the video ad actually stays in view while it plays

completion rate

how many viewers watch the complete video ad

Internet Exchange Point (IXP)

hub where the backbone intersects with local and regional networks and where backbone owners connect with one another

big data

huge data sets, often from different sources, in the petabyte and exabyte range

example of freemium model

hulu

Fiber-optic cable

hundreds of glass/plastic strands that use light to transmit data

technical convergence

hybrid device that can combine platforms into one (iPhone)

HTML

hypertext markup language

mobile app platforms

iPhone/iPad, Android, Blackberry

Search engines

identifies Web pages that appear to match keywords, also called queries, entered by the user and then provides a list of the best matches

search engine

identifies web pages that appear to match keywords, also called queries entered by the user and then provides a list of the best matches

Which of the following is a community of members who self

identify with a demographic or geographic category- Affinity community

Universalism

if action is not right for all situations, it is not right for any specific situation. if we adopted this rule in every case, could the organization or society survive

Slippery slope

if an action cannot be taken repeatedly, then it is not right to take it at all *Descartes rule of change), once started down a slippery path you might not be able to change

All of the following statements are true except

in auctions, prices may be variable or fixed-over a third of procurement officers use auctions to procure goods-

customer co-production

in the web environment, takes customization one step further by allowing the customer to interactively create the product

value chain management (VCM) services

include automation of a firms entire procurement process on the buyer side and automation of selling business processes on the seller side pg 434

Basic site mgt tools

included in all web servers verify that links on pages are still valid identify orphan files

application layer

includes protocols used to routing information among systems on the internet

organic search

inclusion and ranking of sites depends on a more or less unbiased application of a set of rules imposed by the search engine

Vertical scaling

increasing the processing power of individual components

e-procurement Net marketplace

independently owned intermediary the connects hundreds of online suppliers offering millions of maintenance and repair parts to business firms who pay fees to join the market pg 433

exchange

independently owned online marketplace that connects hundreds to potentially thousands of suppliers and buyers in a dynamic, real-time environment pg 435

industry consortium

industry-owned vertical market that enables buyers to purchase direct inputs (goods/services) from a limited set of invited participants pg 436

industry consortia

industry-owned vertical marketplaces that serve specific industries

SQL (structured query language)

industry-standard database query and manipulation language used in a relational database

structured query language (SQL)

industry-standard database query language used in relational databases


Related study sets

Chapter 73: Emissions Control Systems

View Set

Diseases Preventable By Vaccines UMT 12

View Set

Anatomical Position and Planes' Terminology

View Set

Annuity Basics and Definitions Chapter Quiz

View Set

Geo Bee Questions: Bodies of Water

View Set

. Which of the following statements are true of the time of flight for a projectile? List all that apply.

View Set

Wk 5 - Practice: Ch. 19 - Advertising, Sales Promotion... [due Day 5]

View Set