Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
122 Cards in this Set
- Front
- Back
e-commerce
|
The use of the internet and the web to transact business
|
|
e-business
|
the digital enabling of transactions and processes within a firm, involving IS under the control of the firm
|
|
information asymmetry
|
any disparity in relevant market information among parties in a transaction
|
|
marketspace
|
marketplace extended beyond traditional boundaries and removed from a temporal and geographic location
|
|
ubiquity
|
available just about everywhere, at all times
|
|
marketplace
|
physical space you visit in order to transact
|
|
reach
|
the total number of users or customers an e-commerce business can obtain
|
|
richness
|
the complexity and content of a message
|
|
interactivity
|
technology that allows for two-way communication between merchant and consumer
|
|
information density
|
the total amount and quality of information available to all market participants
|
|
Web 2.0
|
a set of applications and technologies that allows users to create, edit, and distribute content; and do a shitload of other interconnected things
|
|
disintermediation
|
displacement of market middlemen who traditionally are intermediaries between producers and consumers by a new direct relationship between manufacturers and content originators with their customers
|
|
friction-free commerce
|
a vision of commerce in which information is equally distributed, transaction costs are low, prices can be dynamically adjusted to reflect actual demand, intermediaries decline, and unfair competitive advantages are eliminated
|
|
first mover
|
a firm that is first to market in a particular area and that moves quickly to gather market share
|
|
network effect
|
occurs where users receive value from the fact that everyone else uses the same tool or product
|
|
value proposition
|
defines how a company's product or service fulfills the needs of customers
|
|
revenue model
|
describes how the firm will earn revenue, product profits, and produce a superior return on invested capital
|
|
Types of revenue models
|
advertising revenue mode, subscription revenue model, transaction revenue model, sales revenue model, affiliate revenue model
|
|
asymmetry
|
exists whenever one participant in a market has more resources than other participants
|
|
first-mover advantage
|
a competitive market advantage for a firm that results from being the first into a marketplace with a serviceable product or service
|
|
complementary resources
|
resources and assets not directly involved in the production of the product but required for success, such as marketing, management, financial assets, and reputation
|
|
perfect market
|
a market in which there are no competitive advantages or asymmetries because all firms have equal access to all the factors of production
|
|
market strategy
|
the plan you put together that details exactly how you intend to enter a new market and attract new customers
|
|
organizational development
|
plan describes how the company will organize the work that needs to be accomplished
|
|
portal
|
offers users powerful web search tools as well as an integrated package of content and services all in one place
|
|
intellectual property
|
refers to all forms of human expression that can be put into a tangible medium such as text, CDs or on the Web
|
|
transaction broker
|
site that processes transactions for consumers that are normally handled in person, by phone, or by mail
|
|
application service provider (ASP)
|
a company that sells access to internet-based software applications to other companies
|
|
scale economies
|
efficiencies that arise from increasing the size of a business
|
|
industry consortia
|
industry-owned vertical marketplaces that serve specific industries
|
|
private industrial networks
|
digital network designed to coordinate the flow of communications among firms engaged in business together
|
|
industry structure
|
refers to the nature of the players in an industry and their relative bargaining power
|
|
industry structural analysis
|
an effort to understand and describe the nature of competition in an industry, the nature of substitute products, the barriers to entry, and the relative strength of consumers and suppliers
|
|
value chain
|
the set of activities performed in an industry or in a firm that transforms raw inputs into final products and services
|
|
firm value chain
|
the set of activities a firm engages in to create final products from raw inputs
|
|
value web
|
networked trans-business system that coordinates the value chains of several firms
|
|
profit
|
the difference between the price a firm is able to charge for its products and the cost of producing and distributing goods
|
|
commoditization
|
a situation where there are no differences among products or services, and the only basis of choosing products is price
|
|
packet switching
|
a method of slicing pakcets, sending the packets along different communicatino paths as they become available, and then reassembling the packets once they arrive at their destination
|
|
packet
|
the discrete units into which digital messages are sliced for transmission over the internet
|
|
routing algorithm
|
computer program that ensures that packets take the best available path toward their destination
|
|
protocol
|
a set of rules and standards for data transfer
|
|
transmission control protocol/internet protocol (TCP/IP)
|
the core communications protocol for the internet
|
|
TCP
|
protocol that establishes the connections among sending and receiving web computers and handles the assembly of packets at the point of transmission, and their re-assembly at the receiving end
|
|
IP
|
protocol that provides the internet's addressing scheme and is responsible for the actual delivery of the packets
|
|
domain name
|
IP address expressed in natural language
|
|
domain name system (DNS)
|
system for expressing numeric IP addresses in natural language
|
|
Uniform Resource Locator (URL)
|
the address used by a Web browser to identify the location of content on the web
|
|
HyperText Transfer Protocol (HTTP)
|
the internet protocol used for transferring web pages
|
|
Secure Sockets Layer (SSL)
|
a protocol that secures communications between the client and the server
|
|
Network Service Provider (NSP)
|
owns and controls one of the major networks comprising the Internet's bacbone
|
|
backbone
|
high-bandwidth fiber-optic cable that transports data across the internet
|
|
bandwidth
|
measures how much data can be transferred over a communications medium within a fixed period of time
|
|
redundancy
|
multiple duplicate services and paths in a network
|
|
Internet Exchange Point (IXP)
|
hub where the backbone intersects with local and regional networks and where backbone owners connect with one another
|
|
narrowband
|
the traditional telephone modem connection
|
|
broadband
|
refers to any communication technology that permits clients to play streaming audio and video files at acceptable speeds--generally anything above 100Kbps
|
|
latency
|
delays in messages caused by uneven flow of information packets through the network
|
|
Internet2
|
a consortium of more than 200 universities, government agencies, and private businesses that are collaboration to find ways to make the internet more efficient
|
|
fiber-optic cable
|
consists of up to hundreds of strands of glass or plastic that use light to transmit data
|
|
Hypertext
|
a way of formatting pages with embedded links that connect documents to one another, and that also link pages to other objects such as sound, video, or animation files
|
|
eXtensible Markup Language (XML)
|
a markup language specification developed by the World Wide Web Consortium (w3C) that is designed to describe data and information
|
|
intelligent agent
|
software program that gathers and/or filters information on a specific topic and then provides a list of results for the user
|
|
cookie
|
a tool used by Web sites to store information about a user. When a visitor enters a Web site, the site sends a small text file (the cookie) to the user's computer so that information from the site can be loaded more quickly on future visits. The cookie can contain any information desired by the site designers.
|
|
Really Simple Syndication (RSS)
|
program that allows users to have digital content including text, articles, blogs, and podcast audio files, automatically sent to their computers over the internet
|
|
integrity
|
the ability to ensure that information being displayed on a web site or transmitted or received over the Internet has not been altered in any way by an unauthorized party
|
|
non-repudiation
|
the ability to ensure that e-commerce participants do not deny (i.e. repudiate) their online actions
|
|
malicious code (malware)
|
includes a variety of threats such as viruses, worms, trojan horses, and bots
|
|
virus
|
a computer program that has the ability to replicate or make copies of itself, and spread to other files
|
|
worm
|
malware that is designed to spread from computer to computer
|
|
trojan horse
|
appears to be benign, but then does something other than expected. Often a way for viruses or other malicious code to be introduced into a computer system
|
|
bot
|
type of malicious code that can be covertly installed on a computer when attached to the internet. Once installed, the bot responds to external commands sent by the attacker.
|
|
botnet
|
collection of captured bot computers
|
|
spyware
|
a program used to obtain information such as a user's keystrokes, e-mail, instant messages, and so on
|
|
phishing
|
any deceptive, online attempt by a third party to obtain confidential information for financial gain
|
|
white hats
|
"good" hackers who help organizations locate and fix security flaws
|
|
black hats
|
hackers who act with the intention of causing harm
|
|
grey hats
|
hackers who believe they are pursuing some greater good by breaking in and revealing system flaws
|
|
spoof
|
to misrepresent oneself by using fake e-mail addresses or masquerading as someone else
|
|
Denial of Service (DoS) attack
|
flooding a web site with useless traffic to inundate and overwhelm the network
|
|
Distributed Denial of Service (DDoS) attack
|
using numerous computers to attack the target network from launch points
|
|
sniffer
|
a type of eavesdropping program that monitors information traveling over a network
|
|
cipher text
|
text that has been encrypted and thus cannot be read by anyone other than the sender and the receiver
|
|
key (cipher)
|
any method for transforming plain text to cipher text
|
|
digital signature (e-signature)
|
"signed" cipher text that can be sent over the internet
|
|
digital envelope
|
a technique that uses symmetric encryption for large documents, but public key encryption to encrypt and send the symmetric key
|
|
digital certificate
|
a digital document issued by a certification authority that contains the name of the subject or company, the subject's public key, a digital certificate serial number, an expiration date, an issuance date, the digital signature of the certification authority, and other identifying information
|
|
certification authority (CA)
|
a trusted third party that issues digital certificates
|
|
public key infrastructure (PKI)
|
CAs and digital certificate procedures
|
|
session key
|
a unique symmetric encryption key chosen for a single secure session
|
|
virtual private network (VPN)
|
allows remote users to securely access internal networks via the internet, using the Point-to-Point Tunneling Protocol (PPTP)
|
|
firewall
|
refers to either hardware or software that filters communication packets and prevents some packets from entering the network based on security policy
|
|
proxy server (proxy)
|
software server that handles all communications originating from or being sent to the internet, acting as a spokesperson or bodyguard for the organization
|
|
risk assessment
|
an assessment of the risks and points of vulnerability
|
|
processing center (clearinghouse)
|
institution that handles verification of accounts and balances
|
|
stored value payment system
|
account created by depositing funds into an account and which funds are paid out or withdrawn as needed
|
|
merchant account
|
a bank account that allows companies to process credit card payments and receive funds from those transactions
|
|
smart card
|
a credit-card sized plastic cards with an embedded chip that stores personal information; can be used to support mobie wireless e-commerce payments
|
|
radio frequency identification (RFID)
|
a method of automatic identification that uses short range radio signals to identify objects and users
|
|
consumer behavior
|
a social science discipline that attempts to model and understand the behavior of humans in a marketplace
|
|
direct reference groups
|
one's family, profession or occupation, religion, neighborhood, and schools
|
|
indirect reference groups
|
one's life-cycle stage, social class, and lifestyle group
|
|
psychographic research
|
divides a market into different groups based on social class, lifestyle, and/or personality characteristics
|
|
clickstream behavior
|
the transaction log that consumers establish as they move about the web
|
|
core product
|
the core benefit the customer receives from the product
|
|
actual product
|
the set of characteristics designed to deliver the product's core benefits
|
|
augmented product
|
a product with additional benefits to customers beyond the core benefits embodied in the actual product
|
|
brand
|
a set of expectations that consumers have when consuming, or thinking about consuming, a product or service from a specific company
|
|
closed loop marketing
|
when marketers are able to directly influence the design of the core product based on market research and feedback from the market
|
|
brand strategy
|
a set of plans for differentiating a product from its competitors, and communicating these differences effectively to the marketplace
|
|
brand equity
|
the estimated value of the premium customers are willing to pay for using a branded product when compared to unbranded competitors
|
|
Law of One Price
|
with complete price transparency in a perfect information marketplace, there will be one world price for every product
|
|
price dispersion
|
the difference between the highest and lowest prices in a market
|
|
library effect
|
an attempt to appeal to consumers on the basis of the total number of products offered
|
|
data warehouse
|
a database that collects a firm's transactional and customer data in a single location for offline analysis
|
|
data mining
|
a set of analytical techniques that look for patterns in the data of a database or data warehouse, or seek to model the behavior of customers
|
|
Customer relationship management (CRM) system
|
a repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to "know the customer"
|
|
advertising networks
|
present users with banner advertisements based on a database of user behavioral data
|
|
permission marketing
|
marketing strategy in which companies obtain permission from consumers before sending them information or promotional messages
|
|
affiliate marketing
|
one web site agrees to pay another web site a commission for new business opportunities it refers to the site
|
|
viral marketing
|
the process of getting customers to pass along a company's marketing message to friends, family, and colleagues
|
|
one-to-one marketing
|
segmenting the market based on a precise and timely understanding of an individual's needs, targeting specific marketing messages to these individuals, and the positioning the product vis-a-vis competitors to be truly unique
|