Page 426 - Introduction to Electronic Commerce and Social Commerce
P. 426
GLOSSARY
Access control A defense mechanism that determines who Banking Trojan Malicious software programmed to cre-
(person, program, or machine) can legitimately use the ate damage when users visit certain online banking or
organization’s computing resources (which resources, e-commerce sites.
when, and how). Banner A display that is used for advertising on a Web
Ad views The number of times users call up a page that has page (words, logos, etc. embedded in the page).
a banner on it during a specific period; known as impres- Banner exchanges Marketplaces that allow multiple web-
sions or page views. sites to barter space for banners.
Address Verification System (AVS) System that detects Banner swapping Company A agrees to display a banner
fraud by comparing the address provided by the buyer at of company B in exchange for company B’s displaying
checkout with the address on file. company A’s banner.
Affiliate network A network created as a marketplace where Bartering The exchange of goods and services.
publishers (affiliates) and merchant affiliate programs can Bartering exchange A company submits its surplus to the
collaborate. exchange and receives points of credit, which the com-
Affiliated marketing A type of “performance-based mar- pany can then use to buy items that it needs. A market-
keting” used mainly as a revenue source for the referring place where an intermediary arranges barter transactions.
organization and as a marketing tool for the sellers. Behavioral targeting Targeting that uses consumer brows-
Application controls Controls that guard applications. ing behavior information to design personalized ads that
Augmented reality “A live, copy, view of a physical, real- may influence consumers better than mass advertising does.
world environment whose elements are augmented (or Biometric One of an individual’s unique physical or behav-
supplemented) by computer-generated sensory input such ioral trait that can be used to authenticate an individual pre-
as sound, video, graphics, or GPS data” (see en.wikipedia. cisely (e.g., fingerprints).
org/wiki/Augmented_reality). Biometric authentication A technology that measures
Authentication A process to verify (assure) the real iden- and analyzes the identity of people based on measurable
tity of an EC entity, which could be an individual, soft- biological or behavioral characteristics or physiological
ware agent, computer program, or EC website. signals.
Authorization The provision of permission to an authenti- Biometric systems A system that can identify a previously
cated person to access systems and perform certain oper ations registered person by searching through a database for a
in those specific systems; or the first phase of processing a possible match based on the person’s observed physical,
credit card transaction that determines whether a buyer’s card biological, or behavioral traits, or the system can verify a
is valid (e.g., not expired) and whether the customer has person’s identity by matching an individual’s measured
sufficient credit or funds in his or her account. biometric traits against a previously stored version.
Automated question–answer (Q&A) System used to find Bitcoin address An alphanumeric string that identifies the
answers that match questions asked in a natural language recipient of a Bitcoin transaction.
(e.g., English, Chinese). Bitcoin private key Key that is a randomly generated num-
256
Availability The assurance that access to any relevant data, ber between 1 and 2 (i.e., 2 raised to the 256th power) that
information websites, or other EC services and their use is used by the key’s owner to initiate and digitally sign trans-
is available in real time, whenever and wherever needed. actions and used by the network to verify those transactions.
Back end Where activities that are related to order aggre- Blockchain The Bitcoin public ledger containing a complete
gation and fulfillment, inventory management, purchas- list of all transactions since the first bitcoin was issued.
ing from suppliers, accounting and finance, insurance, Botnet Malicious software that criminals distribute, usu-
payment processing, packaging, and delivery. ally to infect a large number of computers.
© Springer International Publishing AG 2017 415
E. Turban et al., Introduction to Electronic Commerce and Social Commerce,
Springer Texts in Business and Economics, DOI 10.1007/978-3-319-50091-1