Page 426 - Introduction to Electronic Commerce and Social Commerce
P. 426

GLOSSARY













           Access control  A defense mechanism that determines who  Banking Trojan  Malicious software programmed to cre-
              (person, program, or machine) can legitimately use the   ate damage when users visit certain online banking or
              organization’s computing resources (which resources,   e-commerce sites.
              when, and how).                                 Banner  A display that is used for advertising on a Web
           Ad views  The number of times users call up a page that has   page (words, logos, etc. embedded in the page).
              a banner on it during a specific period; known as impres-  Banner exchanges  Marketplaces that allow multiple web-
              sions or page views.                              sites to barter space for banners.
           Address Verification System (AVS)  System that detects  Banner swapping  Company A agrees to display a banner
              fraud by comparing the address provided by the buyer at   of company B in exchange for company B’s displaying
              checkout with the address on file.                company A’s banner.
           Affiliate network  A network created as a marketplace where  Bartering  The exchange of goods and services.
              publishers (affiliates) and merchant affiliate programs can  Bartering exchange  A company submits its surplus to the
              collaborate.                                      exchange and receives points of credit, which the com-
           Affiliated marketing  A type of “performance-based mar-  pany can then use to buy items that it needs. A market-
              keting” used mainly as a revenue source for the referring   place where an intermediary arranges barter transactions.
              organization and as a marketing tool for the sellers.  Behavioral targeting  Targeting that uses consumer brows-
           Application controls  Controls that guard applications.  ing behavior information to design personalized ads that
           Augmented reality  “A live, copy, view of a physical, real-   may influence consumers better than mass advertising does.
              world environment whose elements are  augmented (or  Biometric  One of an individual’s unique physical or behav-
              supplemented) by computer-generated sensory input such   ioral trait that can be used to authenticate an individual pre-
              as sound, video, graphics, or GPS data” (see en.wikipedia.  cisely (e.g., fingerprints).
              org/wiki/Augmented_reality).                    Biometric authentication  A technology that measures
           Authentication  A process to verify (assure) the real iden-  and analyzes the identity of people based on measurable
              tity of an EC entity, which could be an individual, soft-  biological or behavioral characteristics or physiological
              ware agent, computer program, or EC website.      signals.
           Authorization  The provision of permission to an authenti-  Biometric systems  A system that can identify a previously
              cated person to access systems and perform certain oper ations   registered person by searching through a database for a
              in those specific systems; or the first phase of processing a   possible match based on the person’s observed physical,
              credit card transaction that determines whether a buyer’s card   biological, or behavioral traits, or the system can verify a
              is valid (e.g., not expired) and whether the customer has   person’s identity by matching an individual’s measured
              sufficient credit or funds in his or her account.  biometric traits against a previously stored version.
           Automated question–answer (Q&A)  System used to find  Bitcoin address  An alphanumeric string that identifies the
              answers that match questions asked in a natural language   recipient of a Bitcoin transaction.
              (e.g., English, Chinese).                       Bitcoin private key  Key that is a randomly generated num-
                                                                               256
           Availability  The assurance that access to any relevant data,   ber between 1 and 2  (i.e., 2 raised to the 256th power) that
              information websites, or other EC services and their use   is used by the key’s owner to initiate and digitally sign trans-
              is available in real time, whenever and wherever needed.  actions and used by the network to verify those transactions.
           Back end  Where activities that are related to order aggre-  Blockchain  The Bitcoin public ledger containing a complete
              gation and fulfillment, inventory management, purchas-  list of all transactions since the first bitcoin was issued.
              ing  from  suppliers,  accounting  and  finance,  insurance,  Botnet  Malicious software that criminals distribute, usu-
              payment processing, packaging, and delivery.      ally to infect a large number of computers.


           © Springer International Publishing AG 2017                                                     415
           E. Turban et al., Introduction to Electronic Commerce and Social Commerce,
           Springer Texts in Business and Economics, DOI 10.1007/978-3-319-50091-1
   421   422   423   424   425   426   427   428   429   430   431