INSY3330 Midterm Review
INSY3330 Midterm Review INSY3330
Popular in Introduction to E-Commerce
Popular in Information technology
This 4 page Study Guide was uploaded by Laxman Bista on Sunday March 20, 2016. The Study Guide belongs to INSY3330 at University of Texas at Arlington taught by Karen Sarratt Scott in Spring 2016. Since its upload, it has received 113 views. For similar materials see Introduction to E-Commerce in Information technology at University of Texas at Arlington.
Reviews for INSY3330 Midterm Review
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 03/20/16
Chapter 5: E-Commerce Security and Payment Systems 1. Worm Worms are the malware that is designed to spread from computer to computer. It does not necessarily need to be activated by a user or program to replicate itself. Slammer worm is known as the most notorious worm. 2. Trojan Horse Seems friendly at first, but then does something unexpected by letting viruses and malicious code to be introduced into a computer system. 3. Phishing Attack Stealing confidential information for financial gain by luring users into a deceptive webpages server. 4. Spoofing Spoofing is like wearing a mask. It involves an attempt to hide a true identity by using someone else e- mail or IP addresses. 5. Transport Layer Service (TLS) TLS and SSL (Secure Socket Layer) are the most common form of securing channel. When you browse an internet, you see your URL changes from HTTP to HTTPS, that is because SSL and TLS establish a secure connection by negotiating a session. 6. Digital Cash Online alternative payment system in which unique authenticated token represent cash value. 7. Cybercrime Any online activities that intend to destroy sites, steal information of an individuals. 8. E-Commerce Security 1. Integrity Ensure information being displayed on the website or transmitted or received over the internet has not been altered in anyway by unauthorized party 2. Non-repudiation Ensure that e-commerce participant do not deny their online action. 3. Authenticity Identify the identity of a person or entity with whom you are dealing on the internet. 4. Confidentiality Ensures that messages and data are available to those who are authorized to view. 5. Privacy Controls the use of information about oneself. 6. Availability Ensures that an e-commerce site continues to function as intended. 9. E-commerce Vulnerability A. Internet Communications B. Servers C. Clients 10. Botnet Collection of captured bot computers. 11.Spyware A program used to obtain information such as user’s keystrokes, e- mail, instant messages, etc. 12.Symmetric Key Encryption When both sender and receiver uses the same key to encrypt and decrypt message. 13.Public Key Encryption Also referred as asymmetric Key Encryption. Private key is kept by owner and public key is widely disseminated. It requires both key to encrypt a message, but once key is used to decrypt a message, it cannot be used again to decrypt message. 14.Firewall Hardware/software that filters communication packets and prevents some packets from entering the network based on a security policy. 15.Proxy Server Software that act as a spokesperson, or a bodyguard for the organization. Handles all communication originating from or being sent to the internet. 16.Intrusion Detection (IDS) Examines network traffics, watching to see if it matches certain patterns or preconfigured rules indicative of an attack. 17.Access Control Determines who can gain legitimate access to a network. Chapter 6: E-commerce Marketing and Advertising Concepts 18.Transaction Log Records user activity at a website. 19.Cookie Small piece of computer program that is sent from website to user web browser while user is browsing and every time the user loads the website, browser sent the cookie to user to notify of recent activities. 20.Digital Divide Inequality of internet access and usage among different gender, age and races 21.Hadoop A software framework for working with various big data sets. 22.Bundling Offers consumers two or more goods for a reduced price. 23.Versioning Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices. 24.4 Main Method of Online Advertising A. Web Transaction Log Records that document user activity at a website. B. Tracking Files Various files, like cookies, web beacons, flash cookies, and app that follows users and track their behavior as they visit site across the entire web. C. Database, Data warehouse, Data Mining and Profiling D. CRM System Customer information that records all of the contacts of customer has with a form and generates a customer profile available to everyone in the firm who has a need to know the customer. 25.CAN-SPAM (Controlling the Assault of Non-Solicited Pornography and Marketing) An act passed by congress for national Anti-Spam Law. The FTC is authorized to established “DO NOT E-MAIL” registry. 26.Comprehensive Multi-Channel Marketing – Combining online and offline marketing effort. 27.Impressions The number of times an ad is served. 28.Click-Through Rate (CTR) The percentage of people exposed to an online advertisement who actually click on the banner. 29.View-Through Rate (VTR) Measures the 30-day response rate to an ad. 30.Hits Number of http requests received by a firm server. 31.Stickiness (Duration) Average length of a time visitors remain at a site. 32.Web Beacon An object embedded in a web page or email. Which is usually invisible that allows checking that a user has access the content. Alternatives name: Web bug, tracking bug, tag, or page tag. 33.SQL (Structured Query Language) Industry-standard database query language used in relational databases. 34.CRM (Customer relationship Management) System Customer information that records all of the contacts of customer has with a form and generates a customer profile available to everyone in the firm who has a need to know the customer. 35.Marginal Cost Change in the total cost that arises when the quantity produced is incremented by one unit, that is cost of producing one more unit of a good. Chapter 7: Social, Mobile, and Local Marketing 36.Mobile Commerce Use of wireless portable devices such as cellular phone and laptops to conduct commercial transactions online. 37. Graph Search Indexes everyone’s public post, including likes, photos, etc. 38.Fan Acquisition Attracting people to your marketing messages. 39.Amplification Encouraging visitors to share their likes and comments with their friends. 40.Social Density Refers to number of interaction among members of a group and reflects the “Connected-ness” of a group even if these connections are forced on users. 41.Location based Mobile Marketing Targets marketing messages to users based on their location. 42.Geo-Fencing Software program that uses GPS or Radio frequency identification (RFID) to define geographical boundaries. It is a Virtual Barrier.
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'