New User Special Price Expires in

Let's log you in.

Sign in with Facebook


Don't have a StudySoup account? Create one here!


Create a StudySoup account

Be part of our community, it's free to join!

Sign up with Facebook


Create your account
By creating an account you agree to StudySoup's terms and conditions and privacy policy

Already have a StudySoup account? Login here

INSY3330 Midterm Review

by: Laxman Bista

INSY3330 Midterm Review INSY3330

Laxman Bista

Preview These Notes for FREE

Get a free preview of these Notes, just enter your email below.

Unlock Preview
Unlock Preview

Preview these materials now for free

Why put in your email? Get access to more of this material and other relevant free materials for your school

View Preview

About this Document

Exam 2 review
Introduction to E-Commerce
Karen Sarratt Scott
Study Guide
INSY3330, Karen D Scott, midterm, UTA, Ecommerce
50 ?




Popular in Introduction to E-Commerce

Popular in Information technology

This 4 page Study Guide was uploaded by Laxman Bista on Sunday March 20, 2016. The Study Guide belongs to INSY3330 at University of Texas at Arlington taught by Karen Sarratt Scott in Spring 2016. Since its upload, it has received 113 views. For similar materials see Introduction to E-Commerce in Information technology at University of Texas at Arlington.

Similar to INSY3330 at UTA

Popular in Information technology


Reviews for INSY3330 Midterm Review


Report this Material


What is Karma?


Karma is the currency of StudySoup.

You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!

Date Created: 03/20/16
Chapter 5: E-Commerce Security and Payment Systems 1. Worm Worms are the malware that is designed to spread from computer to computer. It does not necessarily need to be activated by a user or program to replicate itself. Slammer worm is known as the most notorious worm. 2. Trojan Horse Seems friendly at first, but then does something unexpected by letting viruses and malicious code to be introduced into a computer system. 3. Phishing Attack Stealing confidential information for financial gain by luring users into a deceptive webpages server. 4. Spoofing Spoofing is like wearing a mask. It involves an attempt to hide a true identity by using someone else e- mail or IP addresses. 5. Transport Layer Service (TLS) TLS and SSL (Secure Socket Layer) are the most common form of securing channel. When you browse an internet, you see your URL changes from HTTP to HTTPS, that is because SSL and TLS establish a secure connection by negotiating a session. 6. Digital Cash Online alternative payment system in which unique authenticated token represent cash value. 7. Cybercrime Any online activities that intend to destroy sites, steal information of an individuals. 8. E-Commerce Security 1. Integrity Ensure information being displayed on the website or transmitted or received over the internet has not been altered in anyway by unauthorized party 2. Non-repudiation Ensure that e-commerce participant do not deny their online action. 3. Authenticity Identify the identity of a person or entity with whom you are dealing on the internet. 4. Confidentiality Ensures that messages and data are available to those who are authorized to view. 5. Privacy Controls the use of information about oneself. 6. Availability Ensures that an e-commerce site continues to function as intended. 9. E-commerce Vulnerability A. Internet Communications B. Servers C. Clients 10. Botnet Collection of captured bot computers. 11.Spyware A program used to obtain information such as user’s keystrokes, e- mail, instant messages, etc. 12.Symmetric Key Encryption When both sender and receiver uses the same key to encrypt and decrypt message. 13.Public Key Encryption Also referred as asymmetric Key Encryption. Private key is kept by owner and public key is widely disseminated. It requires both key to encrypt a message, but once key is used to decrypt a message, it cannot be used again to decrypt message. 14.Firewall Hardware/software that filters communication packets and prevents some packets from entering the network based on a security policy. 15.Proxy Server Software that act as a spokesperson, or a bodyguard for the organization. Handles all communication originating from or being sent to the internet. 16.Intrusion Detection (IDS) Examines network traffics, watching to see if it matches certain patterns or preconfigured rules indicative of an attack. 17.Access Control Determines who can gain legitimate access to a network. Chapter 6: E-commerce Marketing and Advertising Concepts 18.Transaction Log Records user activity at a website. 19.Cookie Small piece of computer program that is sent from website to user web browser while user is browsing and every time the user loads the website, browser sent the cookie to user to notify of recent activities. 20.Digital Divide Inequality of internet access and usage among different gender, age and races 21.Hadoop A software framework for working with various big data sets. 22.Bundling Offers consumers two or more goods for a reduced price. 23.Versioning Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices. 24.4 Main Method of Online Advertising A. Web Transaction Log Records that document user activity at a website. B. Tracking Files Various files, like cookies, web beacons, flash cookies, and app that follows users and track their behavior as they visit site across the entire web. C. Database, Data warehouse, Data Mining and Profiling D. CRM System Customer information that records all of the contacts of customer has with a form and generates a customer profile available to everyone in the firm who has a need to know the customer. 25.CAN-SPAM (Controlling the Assault of Non-Solicited Pornography and Marketing) An act passed by congress for national Anti-Spam Law. The FTC is authorized to established “DO NOT E-MAIL” registry. 26.Comprehensive Multi-Channel Marketing – Combining online and offline marketing effort. 27.Impressions The number of times an ad is served. 28.Click-Through Rate (CTR) The percentage of people exposed to an online advertisement who actually click on the banner. 29.View-Through Rate (VTR) Measures the 30-day response rate to an ad. 30.Hits Number of http requests received by a firm server. 31.Stickiness (Duration) Average length of a time visitors remain at a site. 32.Web Beacon An object embedded in a web page or email. Which is usually invisible that allows checking that a user has access the content. Alternatives name: Web bug, tracking bug, tag, or page tag. 33.SQL (Structured Query Language) Industry-standard database query language used in relational databases. 34.CRM (Customer relationship Management) System Customer information that records all of the contacts of customer has with a form and generates a customer profile available to everyone in the firm who has a need to know the customer. 35.Marginal Cost Change in the total cost that arises when the quantity produced is incremented by one unit, that is cost of producing one more unit of a good. Chapter 7: Social, Mobile, and Local Marketing 36.Mobile Commerce Use of wireless portable devices such as cellular phone and laptops to conduct commercial transactions online. 37. Graph Search Indexes everyone’s public post, including likes, photos, etc. 38.Fan Acquisition Attracting people to your marketing messages. 39.Amplification Encouraging visitors to share their likes and comments with their friends. 40.Social Density Refers to number of interaction among members of a group and reflects the “Connected-ness” of a group even if these connections are forced on users. 41.Location based Mobile Marketing Targets marketing messages to users based on their location. 42.Geo-Fencing Software program that uses GPS or Radio frequency identification (RFID) to define geographical boundaries. It is a Virtual Barrier.


Buy Material

Are you sure you want to buy this material for

50 Karma

Buy Material

BOOM! Enjoy Your Free Notes!

We've added these Notes to your profile, click here to view them now.


You're already Subscribed!

Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'

Why people love StudySoup

Bentley McCaw University of Florida

"I was shooting for a perfect 4.0 GPA this semester. Having StudySoup as a study aid was critical to helping me achieve my goal...and I nailed it!"

Jennifer McGill UCSF Med School

"Selling my MCAT study guides and notes has been a great source of side revenue while I'm in school. Some months I'm making over $500! Plus, it makes me happy knowing that I'm helping future med students with their MCAT."

Steve Martinelli UC Los Angeles

"There's no way I would have passed my Organic Chemistry class this semester without the notes and study guides I got from StudySoup."


"Their 'Elite Notetakers' are making over $1,200/month in sales by creating high quality content that helps their classmates in a time of need."

Become an Elite Notetaker and start selling your notes online!

Refund Policy


All subscriptions to StudySoup are paid in full at the time of subscribing. To change your credit card information or to cancel your subscription, go to "Edit Settings". All credit card information will be available there. If you should decide to cancel your subscription, it will continue to be valid until the next payment period, as all payments for the current period were made in advance. For special circumstances, please email


StudySoup has more than 1 million course-specific study resources to help students study smarter. If you’re having trouble finding what you’re looking for, our customer support team can help you find what you need! Feel free to contact them here:

Recurring Subscriptions: If you have canceled your recurring subscription on the day of renewal and have not downloaded any documents, you may request a refund by submitting an email to

Satisfaction Guarantee: If you’re not satisfied with your subscription, you can contact us for further help. Contact must be made within 3 business days of your subscription purchase and your refund request will be subject for review.

Please Note: Refunds can never be provided more than 30 days after the initial purchase date regardless of your activity on the site.