• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/122

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

122 Cards in this Set

  • Front
  • Back
e-commerce
The use of the internet and the web to transact business
e-business
the digital enabling of transactions and processes within a firm, involving IS under the control of the firm
information asymmetry
any disparity in relevant market information among parties in a transaction
marketspace
marketplace extended beyond traditional boundaries and removed from a temporal and geographic location
ubiquity
available just about everywhere, at all times
marketplace
physical space you visit in order to transact
reach
the total number of users or customers an e-commerce business can obtain
richness
the complexity and content of a message
interactivity
technology that allows for two-way communication between merchant and consumer
information density
the total amount and quality of information available to all market participants
Web 2.0
a set of applications and technologies that allows users to create, edit, and distribute content; and do a shitload of other interconnected things
disintermediation
displacement of market middlemen who traditionally are intermediaries between producers and consumers by a new direct relationship between manufacturers and content originators with their customers
friction-free commerce
a vision of commerce in which information is equally distributed, transaction costs are low, prices can be dynamically adjusted to reflect actual demand, intermediaries decline, and unfair competitive advantages are eliminated
first mover
a firm that is first to market in a particular area and that moves quickly to gather market share
network effect
occurs where users receive value from the fact that everyone else uses the same tool or product
value proposition
defines how a company's product or service fulfills the needs of customers
revenue model
describes how the firm will earn revenue, product profits, and produce a superior return on invested capital
Types of revenue models
advertising revenue mode, subscription revenue model, transaction revenue model, sales revenue model, affiliate revenue model
asymmetry
exists whenever one participant in a market has more resources than other participants
first-mover advantage
a competitive market advantage for a firm that results from being the first into a marketplace with a serviceable product or service
complementary resources
resources and assets not directly involved in the production of the product but required for success, such as marketing, management, financial assets, and reputation
perfect market
a market in which there are no competitive advantages or asymmetries because all firms have equal access to all the factors of production
market strategy
the plan you put together that details exactly how you intend to enter a new market and attract new customers
organizational development
plan describes how the company will organize the work that needs to be accomplished
portal
offers users powerful web search tools as well as an integrated package of content and services all in one place
intellectual property
refers to all forms of human expression that can be put into a tangible medium such as text, CDs or on the Web
transaction broker
site that processes transactions for consumers that are normally handled in person, by phone, or by mail
application service provider (ASP)
a company that sells access to internet-based software applications to other companies
scale economies
efficiencies that arise from increasing the size of a business
industry consortia
industry-owned vertical marketplaces that serve specific industries
private industrial networks
digital network designed to coordinate the flow of communications among firms engaged in business together
industry structure
refers to the nature of the players in an industry and their relative bargaining power
industry structural analysis
an effort to understand and describe the nature of competition in an industry, the nature of substitute products, the barriers to entry, and the relative strength of consumers and suppliers
value chain
the set of activities performed in an industry or in a firm that transforms raw inputs into final products and services
firm value chain
the set of activities a firm engages in to create final products from raw inputs
value web
networked trans-business system that coordinates the value chains of several firms
profit
the difference between the price a firm is able to charge for its products and the cost of producing and distributing goods
commoditization
a situation where there are no differences among products or services, and the only basis of choosing products is price
packet switching
a method of slicing pakcets, sending the packets along different communicatino paths as they become available, and then reassembling the packets once they arrive at their destination
packet
the discrete units into which digital messages are sliced for transmission over the internet
routing algorithm
computer program that ensures that packets take the best available path toward their destination
protocol
a set of rules and standards for data transfer
transmission control protocol/internet protocol (TCP/IP)
the core communications protocol for the internet
TCP
protocol that establishes the connections among sending and receiving web computers and handles the assembly of packets at the point of transmission, and their re-assembly at the receiving end
IP
protocol that provides the internet's addressing scheme and is responsible for the actual delivery of the packets
domain name
IP address expressed in natural language
domain name system (DNS)
system for expressing numeric IP addresses in natural language
Uniform Resource Locator (URL)
the address used by a Web browser to identify the location of content on the web
HyperText Transfer Protocol (HTTP)
the internet protocol used for transferring web pages
Secure Sockets Layer (SSL)
a protocol that secures communications between the client and the server
Network Service Provider (NSP)
owns and controls one of the major networks comprising the Internet's bacbone
backbone
high-bandwidth fiber-optic cable that transports data across the internet
bandwidth
measures how much data can be transferred over a communications medium within a fixed period of time
redundancy
multiple duplicate services and paths in a network
Internet Exchange Point (IXP)
hub where the backbone intersects with local and regional networks and where backbone owners connect with one another
narrowband
the traditional telephone modem connection
broadband
refers to any communication technology that permits clients to play streaming audio and video files at acceptable speeds--generally anything above 100Kbps
latency
delays in messages caused by uneven flow of information packets through the network
Internet2
a consortium of more than 200 universities, government agencies, and private businesses that are collaboration to find ways to make the internet more efficient
fiber-optic cable
consists of up to hundreds of strands of glass or plastic that use light to transmit data
Hypertext
a way of formatting pages with embedded links that connect documents to one another, and that also link pages to other objects such as sound, video, or animation files
eXtensible Markup Language (XML)
a markup language specification developed by the World Wide Web Consortium (w3C) that is designed to describe data and information
intelligent agent
software program that gathers and/or filters information on a specific topic and then provides a list of results for the user
cookie
a tool used by Web sites to store information about a user. When a visitor enters a Web site, the site sends a small text file (the cookie) to the user's computer so that information from the site can be loaded more quickly on future visits. The cookie can contain any information desired by the site designers.
Really Simple Syndication (RSS)
program that allows users to have digital content including text, articles, blogs, and podcast audio files, automatically sent to their computers over the internet
integrity
the ability to ensure that information being displayed on a web site or transmitted or received over the Internet has not been altered in any way by an unauthorized party
non-repudiation
the ability to ensure that e-commerce participants do not deny (i.e. repudiate) their online actions
malicious code (malware)
includes a variety of threats such as viruses, worms, trojan horses, and bots
virus
a computer program that has the ability to replicate or make copies of itself, and spread to other files
worm
malware that is designed to spread from computer to computer
trojan horse
appears to be benign, but then does something other than expected. Often a way for viruses or other malicious code to be introduced into a computer system
bot
type of malicious code that can be covertly installed on a computer when attached to the internet. Once installed, the bot responds to external commands sent by the attacker.
botnet
collection of captured bot computers
spyware
a program used to obtain information such as a user's keystrokes, e-mail, instant messages, and so on
phishing
any deceptive, online attempt by a third party to obtain confidential information for financial gain
white hats
"good" hackers who help organizations locate and fix security flaws
black hats
hackers who act with the intention of causing harm
grey hats
hackers who believe they are pursuing some greater good by breaking in and revealing system flaws
spoof
to misrepresent oneself by using fake e-mail addresses or masquerading as someone else
Denial of Service (DoS) attack
flooding a web site with useless traffic to inundate and overwhelm the network
Distributed Denial of Service (DDoS) attack
using numerous computers to attack the target network from launch points
sniffer
a type of eavesdropping program that monitors information traveling over a network
cipher text
text that has been encrypted and thus cannot be read by anyone other than the sender and the receiver
key (cipher)
any method for transforming plain text to cipher text
digital signature (e-signature)
"signed" cipher text that can be sent over the internet
digital envelope
a technique that uses symmetric encryption for large documents, but public key encryption to encrypt and send the symmetric key
digital certificate
a digital document issued by a certification authority that contains the name of the subject or company, the subject's public key, a digital certificate serial number, an expiration date, an issuance date, the digital signature of the certification authority, and other identifying information
certification authority (CA)
a trusted third party that issues digital certificates
public key infrastructure (PKI)
CAs and digital certificate procedures
session key
a unique symmetric encryption key chosen for a single secure session
virtual private network (VPN)
allows remote users to securely access internal networks via the internet, using the Point-to-Point Tunneling Protocol (PPTP)
firewall
refers to either hardware or software that filters communication packets and prevents some packets from entering the network based on security policy
proxy server (proxy)
software server that handles all communications originating from or being sent to the internet, acting as a spokesperson or bodyguard for the organization
risk assessment
an assessment of the risks and points of vulnerability
processing center (clearinghouse)
institution that handles verification of accounts and balances
stored value payment system
account created by depositing funds into an account and which funds are paid out or withdrawn as needed
merchant account
a bank account that allows companies to process credit card payments and receive funds from those transactions
smart card
a credit-card sized plastic cards with an embedded chip that stores personal information; can be used to support mobie wireless e-commerce payments
radio frequency identification (RFID)
a method of automatic identification that uses short range radio signals to identify objects and users
consumer behavior
a social science discipline that attempts to model and understand the behavior of humans in a marketplace
direct reference groups
one's family, profession or occupation, religion, neighborhood, and schools
indirect reference groups
one's life-cycle stage, social class, and lifestyle group
psychographic research
divides a market into different groups based on social class, lifestyle, and/or personality characteristics
clickstream behavior
the transaction log that consumers establish as they move about the web
core product
the core benefit the customer receives from the product
actual product
the set of characteristics designed to deliver the product's core benefits
augmented product
a product with additional benefits to customers beyond the core benefits embodied in the actual product
brand
a set of expectations that consumers have when consuming, or thinking about consuming, a product or service from a specific company
closed loop marketing
when marketers are able to directly influence the design of the core product based on market research and feedback from the market
brand strategy
a set of plans for differentiating a product from its competitors, and communicating these differences effectively to the marketplace
brand equity
the estimated value of the premium customers are willing to pay for using a branded product when compared to unbranded competitors
Law of One Price
with complete price transparency in a perfect information marketplace, there will be one world price for every product
price dispersion
the difference between the highest and lowest prices in a market
library effect
an attempt to appeal to consumers on the basis of the total number of products offered
data warehouse
a database that collects a firm's transactional and customer data in a single location for offline analysis
data mining
a set of analytical techniques that look for patterns in the data of a database or data warehouse, or seek to model the behavior of customers
Customer relationship management (CRM) system
a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to "know the customer"
advertising networks
present users with banner advertisements based on a database of user behavioral data
permission marketing
marketing strategy in which companies obtain permission from consumers before sending them information or promotional messages
affiliate marketing
one web site agrees to pay another web site a commission for new business opportunities it refers to the site
viral marketing
the process of getting customers to pass along a company's marketing message to friends, family, and colleagues
one-to-one marketing
segmenting the market based on a precise and timely understanding of an individual's needs, targeting specific marketing messages to these individuals, and the positioning the product vis-a-vis competitors to be truly unique