1/57
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
True
Asymmetric key cryptography is also known as:
Public Key Cryptology
There is a finite number of Bitcoins that can be created.
True
Zelle is an example of a P2P mobile payment app.
True
All of the following are limitations of the existing online credit card payment system except:
Cost to consumers
Accessing data without authorization on Dropbox is an example of a:
Cloud Security issue
Which of the following did the Internet Advertising Bureau urge advertisers to abandon?
Adobe Flash
All of the following are methods of securing channels of communication except:
FTP
PCI-DSS is a standard established by which of the following?
The credit card industry
Which of the following is a brute force attack which hackers launch via botnets and automated tools using known username and password combinations?
Credential Stuffing
A Trojan horse appears to be benign, but then does something other than expected.
True
The attack against Dyn servers is an example of a(n):
DDoS attack
Explain the difference between symmetric key cryptography and public key cryptography. Which dimensions of e-commerce security does encryption address?
Symmetric Key Cryptography uses one secret key to both encrypt and decrypt data making it more well suited for larger amounts of data. Public Key differs as it uses two keys that are linked mathematically, a public key to encrypt, and a private key to decrypt. In ecommerce, this makes data unreadable to unauthorized users.
Which of the following companies was the target of what is believed to be the largest breach at a single company in history?
Yahoo
Malware that comes with a downloaded file requested by a user is called a:
Drive-by-download
View-to-cart ratio is a measure of the:
percentage of views that lead to an add-to-cart action.
Define and describe the functionality of customer relationship management (CRM) systems.
A CRM helps a firm manage customer data to better organize marketing, advertising, and segmenting strategies.
Discuss the differences between a first-party cookie and a third-party cookie.
A first party cookie is a cookie set by the website the users is visiting to aid in the sites functionality while a third party cookie is often set by advertisers to track users actions across different sites for their analytics.
Which of the following is the most meaningful metric for video ads?
Completion rate
In modeling online consumer behavior, the concept of "consumer skills" refers to the:
knowledge consumers have about how to conduct online transactions.
Which of the following statements about Internet usage in the United States is not true?
Owners of mobile devices spend about eight and a quarter hours a day using them for non-telephone activities such as viewing videos, visiting social networks, and playing games.
Which of the following statements about CAN-SPAM is not true?
CAN-SPAM prohibits unsolicited e-mail (spam).
What is native advertising and why is it controversial?
Native advertising is an ad that is seamlessly integrated into the surrounding platform content. This is controversial as it deceives many customers into thinking it is authentic instead of paid, which involves a lack of transparency.
Which of the following forms of online advertising is expected to grow the most between 2022 and 2026?
Video
Transaction logs are built into client software and not the web server software.
False
All of the following statements about cookies are true except:
As of 2022, the Safari, Firefox, and Chrome web browsers all block third-party cookies by default.
Recency refers to the:
time elapsed since the last visit made by a customer.
The highest amount of online advertising spending is for online video ads.
False
According to Forrester Research, nearly two-thirds of all U.S. retail sales are now digitally influenced.
True
A web beacon is:
a tiny graphics file embedded in an e-mail or web page.
Instagram's most rapidly growing demographic groups are comprised of people older than 35.
True
Which of the following statements about COPPA is not true?
COPPA is not applicable to Internet of Thing (IoT) devices.
By 2026, it is estimated that advertisers will be spending which of the following amounts on mobile marketing?
$250 Billion
Which of the following involves using a variety of tools to encourage users to interact with content and brand?
Engagement
Which of the following is the first step in the social marketing process?
Fan acquisition
How much time a month does the average U.S. adult spend on TikTok?
About 22 hours
All of the following were popular types of online marketing before 2007 except:
Mobile marketing
Which of the following are features of both Pinterest and Twitter?
Hashtags
Which online marketing platform generates the most advertising revenues?
Mobile
All of the following are proximity marketing technologies except:
Geo-Search
Which of the following statements about Amazon is not true?
Amazon's mobile app reaches almost 50% of all U.S. adult smartphone user.
Why is location-based mobile marketing so attractive to marketers? What are some of the current challenges facing location-based marketing?
Location based mobile marketing is attractive to marketers as it provides more personaixed offerings to buyers who are then more likely to interact and complete a sale. A current challenge with location-based marketing is that users often disable their location services, which removes this layer of marketing.
Name and briefly describe the five basic steps in the social marketing process.
1. Fan Acquisition: attracting visitors
2. Engagement: encouraging users to interact with the content
3. Amplification: Continue to spread the message
4. Community: When the marketing starts to gain a larger more stable audience
5. Sales/Strength increased brand awareness and higher conversion rates
Which of the following is not one of the four basic principles shared by ethical schools of thought in western culture?
Privacy
Which of the following was the first federal statute defining the privacy rights of a citizen vis-à-vis federal government record systems?
Privacy Act
Which of the following Supreme Court cases established that states can compel online retailers to collect and remit sales taxes even if they do not have a physical presence within the state?
South Dakota v. Wayfair
Which of the following statements is not true?
The Internet is technically very difficult to control, monitor, and regulate from a central location.
Which of the following uses software installed at the ISP level to track user clickstream behavior?
deep packet inspection
Registering a domain name similar or identical to a trademark of a legitimate site to divert web traffic to the infringing site is an example of:
Cyberpiracy
Which of the following requires financial institutions to inform consumers of their privacy policies and permits consumers some control over their records?
Gramm-Leach-Bliley Act
Describe in depth one ethical, social, or political issue that is presently in the news surrounding the Internet and e-commerce.
A huge issue in the e-commerce space involves privacy rights. The GDPR is set up to ensure all users have necessary protections regarding their personal data but different sites are better at following these protections than others.
Discuss the digital advertising services tax enacted by the state of Maryland. What issues does it raise?
Maryland enacted the digital advertising services tax which taxes companies based on revenue size for online advertising. The issues raised include that it violates the first amendment by restricting how customers can see prices posed by producers.
Which ethical principle states that if an action cannot be taken repeatedly, then it's not right to take at all?
Slippery Slope
Which of the following statements about copyright protection in the European Union is not true?
The European Union now takes a far less proactive view of copyright protection than does the United States.
The principle of responsibility means that individuals, organizations, and societies should be held accountable to others for the consequences of their actions.
False
The main objective of the European Union's General Data Protection Regulation (GDPR) is to strengthen the rights of citizens to their own personal information and to strengthen oversight of firms to ensure that they implement these individual rights.
True
What is the major reason why the Internet has such potential for destroying traditional conceptions and implementations of intellectual property law?
the ability to make perfect copies of digital works at little cost
Which of the following is a core Fair Information Practices (FIP) principle?
Choice/Consent