E-commerce, Security, and Ethics

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/160

flashcard set

Earn XP

Description and Tags

Flashcards of vocabulary terms related to e-commerce, security, and ethics.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

161 Terms

1
New cards

Ubiquity

Always accessible.

2
New cards

Global reach

Accessible globally with an internet connection.

3
New cards

Standards

Universal standards.

4
New cards

Richness

Complex information, like videos.

5
New cards

Interactivity

Back and forth conversations.

6
New cards

Info density

Volume of information.

7
New cards

Personalization

A different experience styled to each user.

8
New cards

Social tech

Social media and user-generated content.

9
New cards

Reduce info asymmetry (Digital markets)

Reduces asymmetry between buyer and seller.

10
New cards

Reduce menu, search, & transaction costs

Lowers costs by printing new menus and reduces the need for a person.

11
New cards

Enable price discrimination, dynamic pricing, and disintermediation

Base prices off income of area, prices change any second.

12
New cards

Delayed gratification

Waiting for product for convenience.

13
New cards

Digital goods

Delivered electronically over the internet.

14
New cards

Costs lower

All costs are in the first unit, so everything else is inexpensive.

15
New cards

B2C

Business to consumer.

16
New cards

B2B

Business to business, sells goods and services to each other (biggest one).

17
New cards

C2C

Consumer to consumer.

18
New cards

Business models

How you create wealth; how are you creating value for the customer.

19
New cards

E-tailer

Selling a physical good to a customer online.

20
New cards

Content provider

Selling info like movies, articles, magazines, etc.

21
New cards

Transaction broker

Find you options for products (like houses or cars) and present those options.

22
New cards

Market creator

Provide the space to bring buyers and sellers together, like Etsy.

23
New cards

Online service provider

Provides a service like taxes (TurboTax).

24
New cards

Community provider

Online meet-up spaces like Facebook.

25
New cards

Portal

Jumping off point onto the internet.

26
New cards

Revenue modules

How are we generating revenue and creates profit.

27
New cards

Unit sales

Get it directly from distributors.

28
New cards

Subscription model

Recurring expense and continuing access to it (Spotify).

29
New cards

Advertising

Stickiness (what sticks); the most widely used revenue for e-commerce.

30
New cards

Fees / commissions

Flat rate paid for a service or access to it.

31
New cards

Affiliate pricing

People get paid for linking a product.

32
New cards

Freemium

Basic version is free, but you have to pay for the better stuff.

33
New cards

New ads formats

Search, banner, and pop-up ads.

34
New cards

Long tail marketing

Market goods profitability to very small online audiences.

35
New cards

Leverage of influence

Ex. Posting about a new car so people buy it.

36
New cards

Target shared interests

Ex. Groups.

37
New cards

Influence

Timelines, newsfeed, collaborative.

38
New cards

Social e-commerce

Use of social networks to share knowledge about items.

39
New cards

Wisdom of crowds

Belief that large numbers of people can make better decisions.

40
New cards

Crowd sourcing

Uses large internet audiences for advice, market feedback, new ideas.

41
New cards

Behavioral targeting

Tracking online behavior of individuals.

42
New cards

Cookies

Small text files allowing for personalized content.

43
New cards

Electronic Data Interchange (EDI)

Computer-to-computer exchange of standard transactions.

44
New cards

Private networks

A large firm using a secure website to link to its suppliers.

45
New cards

B2B market places

Digital marketplace for many buyers and sellers.

46
New cards

Exchanges

Independently owned third-party B2B e-commerce marketplace.

47
New cards

M-commerce

Sales of goods and services via mobile devices.

48
New cards

Location-based services (geo social)

Geo-social, geo-advertising, and geo-info services.

49
New cards

Geosocial Services

Can tell you where friends are meeting

50
New cards

Mobile app payment systems

Using mobile apps to replace credit cards and banking services

51
New cards

Near-field communication (NFC)

Contactless payments via smartphones.

52
New cards

QR Code payment systems

Contactless payments initiated by scanning a QR code.

53
New cards

Trojan

Malicious programs disguised as helpful but harms computers (drive by download).

54
New cards

Peer to peer (P2P) payment systems

Transferring money among individuals with proprietary apps (Venmo or Zelle).

55
New cards

Security

Policies and measures preventing unauthorized access.

56
New cards

Controls

Policies securing or ensuring the safety of assets

57
New cards

Hardware & software (vulnerability)

Difficult to make secure while being cost-effective.

58
New cards

Disasters (vulnerability)

Natural disasters harming systems.

59
New cards

Mobile (vulnerability)

More accessibility, higher chance of theft or loss.

60
New cards

Internet/networks (vulnerability)

Anyone can access the system due to network connectivity.

61
New cards

Wireless (vulnerability)

Easier to hack the wireless network.

62
New cards

Malware

Software written to do harm.

63
New cards

Virus

Attaches to a specific file; typically destroys files.

64
New cards

Worm

Spreads automatically and replicates

65
New cards

Spyware

Loaded onto system that watches what you do.

66
New cards

Key logger

Keeps track of what you do.

67
New cards

Ransomeware

Unauthorized access, hold info. hostage until pay.

68
New cards

Hacker

Unidentified person who gets unauthorized access

69
New cards

Cyber Vandalism

To create a scene or statement

70
New cards

Botnet

Infected devices doing an action together.

71
New cards

Distributed denial-of-service attack (DDoS)

Attack of numerous computers to overwhelm a network.

72
New cards

Cyber Crime

Trying to make money off hacking efforts.

73
New cards

Ransomware

Unauthorized access and hold information hostage until you pay.

74
New cards

Identity Theft

Getting personal info. to pretend to be you and spend money.

75
New cards

Spoofing

Pretend to be someone else.

76
New cards

Phishing

Sending an email trying to get personal info.

77
New cards

Pharming

Get you to a similar website to get personal information.

78
New cards

Sniffing

Tap into wireless and intercept signals to extract information.

79
New cards

Evil Twin

Looks like legitimate wireless network but it is not.

80
New cards

Internal threats

Own employees.

81
New cards

Social Engineering

Let people in because it looks OK.

82
New cards

Software Bugs

Issues with security.

83
New cards

Electronic Evidence

Information stored in digital format used as proof in legal proceedings.

84
New cards

Computer Forensics

Scientific collection of electronically stored information

85
New cards

Information Systems Controls

Manual and automated controls consisting of general and application controls.

86
New cards

General Controls

Control environment governing the security of data files

87
New cards

Software controls

Monitor use of system software.

88
New cards

Hardware Controls

Ensure computer hardware is physically secure

89
New cards

Computer Operations Controls

Oversee the work of the computer department

90
New cards

Data Security Controls

Ensure that files are not subject to unauthorized access

91
New cards

Implementation Controls

Audit the systems development process

92
New cards

Administrative Controls

Formalized standards to ensure controls are properly executed and enforced.

93
New cards

Application Controls

Specific controls unique to each application; authorized data.

94
New cards

Input Controls

Check data for accuracy and completeness when data enters the system

95
New cards

Processing Controls

Establish that data are accurately processed during updating

96
New cards

Output Controls

Ensure that the results of computer processing are accurate

97
New cards

Risk Assessment

Determine the level of risk to a firm if activities are not controlled

98
New cards

Security Policy

ranking info risks identifying accetable security goals

99
New cards

Acceptable Use Policy (AUP)

Acceptable uses of the firm’s information resources

100
New cards

Disaster recovery planning

Plans for the restoration of disrupted computing