E-Commerce Security, Analytics, and Digital Marketing Vocabulary

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

flashcard set

Earn XP

Description and Tags

These vocabulary flashcards cover key security threats, encryption methods, network defenses, data-tracking tools, analytics metrics, and digital-marketing strategies essential to understanding modern e-commerce and online marketing environments.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

Worm

A self-replicating malicious program that spreads autonomously across computers and networks.

2
New cards

Trojan Horse

Malicious software disguised as legitimate in order to trick users into installing it.

3
New cards

Phishing Attack

A fraudulent attempt, often via email or fake websites, to obtain sensitive information such as passwords or credit-card numbers.

4
New cards

Spoofing

Faking an identity—such as an email address, IP address, or website URL—to deceive a target.

5
New cards

TLS (Transport Layer Security)

Cryptographic protocol that encrypts data transmitted over a network, securing web, email, and other communications.

6
New cards

Digital Cash

Electronic form of currency used for online transactions.

7
New cards

Cybercrime

Any criminal activity that involves computers, networks, or digital devices.

8
New cards

E-Commerce Security Principles

Key goals of secure online transactions: integrity, non-repudiation, authenticity, confidentiality, privacy, and availability.

9
New cards

Vulnerability

A weakness in hardware, software, or procedures that can be exploited by threats.

10
New cards

Botnet

A network of compromised computers controlled remotely to perform malicious tasks.

11
New cards

Spyware

Software that secretly collects user data and transmits it to a third party.

12
New cards

Symmetric Encryption

Cryptography that uses the same secret key for both encryption and decryption.

13
New cards

Public-Key (Asymmetric) Encryption

Cryptography that uses a public key for encryption and a private key for decryption.

14
New cards

Firewall

Hardware or software system that monitors and controls incoming and outgoing network traffic based on security rules.

15
New cards

Proxy Server

An intermediary server that handles client requests to improve privacy, security, or performance.

16
New cards

Intrusion Detection System (IDS)

Software or hardware that monitors a network or system for signs of malicious activity.

17
New cards

Access Control

Mechanisms that restrict access to resources based on user permissions and roles.

18
New cards

Transaction File (Log)

Digital record of all transactions or activities occurring on a site or system.

19
New cards

Cookie

Small data file stored on a user’s device by a website to remember preferences or track activity.

20
New cards

Digital Divide

The gap between individuals or communities that have access to digital technology and those that do not.

21
New cards

Hadoop

Open-source framework that enables distributed processing and storage of large data sets.

22
New cards

Bundling

Marketing strategy of selling multiple products or services together as a single combined offering.

23
New cards

Versioning

Offering a product in multiple editions or tiers to serve different customer segments.

24
New cards

Interest-Based Advertising (Behavioral Targeting)

Delivering ads to users based on their browsing behavior, searches, purchases, or social-media activity.

25
New cards

CAN-SPAM Act

U.S. law that sets rules for commercial email, including opt-out requirements and penalties for violations.

26
New cards

Omnichannel (Comprehensive) Marketing

Coordinated marketing approach that integrates online and offline platforms for a seamless customer experience.

27
New cards

Impression

One display of an online advertisement to a user.

28
New cards

Click-Through Rate (CTR)

Percentage of ad impressions that result in a user clicking the advertisement.

29
New cards

View-Through Conversion

When a user sees an ad, does not click it, but later visits and converts on the advertiser’s site.

30
New cards

Hits

Individual server requests for files; not a reliable measure of website traffic or engagement.

31
New cards

Stickiness

Metric describing how long visitors stay and how often they return to a website.

32
New cards

Web Beacon (Pixel Tag)

Invisible graphic embedded in a webpage or email to track user behavior.

33
New cards

SQL (Structured Query Language)

Standard language for managing and querying relational databases.

34
New cards

CRM System

Customer Relationship Management software used to manage interactions and data throughout the customer lifecycle.

35
New cards

Marginal Cost

The additional cost incurred by producing one extra unit of a good or service.

36
New cards

Mobile Commerce (m-Commerce)

Buying and selling goods or services through mobile devices such as smartphones and tablets.

37
New cards

Desktop Marketing

Traditional online marketing activities aimed at users on desktop or laptop computers.

38
New cards

Social Marketing

Use of social media platforms to influence user attitudes or behaviors in favor of a brand or cause.

39
New cards

Graph Search

Search technology that queries social-network relationships and content (e.g., friends, likes, check-ins).

40
New cards

Fan Acquisition

Process of gaining followers, subscribers, or fans on social-media platforms.

41
New cards

Amplification

Extent to which users share or repost content, increasing its reach.

42
New cards

Curalate

Platform specializing in visual marketing and social commerce, enabling brands to leverage images for engagement and sales.

43
New cards

Location-Based Marketing

Delivering messages or offers to users based on their real-time geographic location.

44
New cards

Social Density

Level and frequency of interaction and sharing among users on a platform.

45
New cards

Geo-fencing

Creating a virtual perimeter around a geographic area that triggers a digital action when a device enters or leaves it.