Page 427 - Introduction to Electronic Commerce and Social Commerce
P. 427
416 Glossary
Brick-and-mortar (old economy) organizations Purely Channel conflict Refers to the case in which online sales
physical organizations (corporations) doing business off-line. damage the well-being of existing channel partner.
Brick-and-mortar retailer A retailer that conducts busi- CIA security triad (CIA triad) A point of reference used
ness exclusively in the physical world. to identify problem areas and evaluate the information
Business continuity plan A plan that keeps the business security of an organization that includes confidentiality,
running after a disaster occurs. Each function in the busi- integrity, and availability.
ness should have a valid recovery capability plan. Ciphertext An encrypted plaintext.
Business ethics (corporate or enterprise ethics) A code Click (ad click) A count made each time a visitor clicks on
of values, behaviors, and rules, written or unwritten, for an advertising banner to access the advertiser’s website.
conducting business. These ethics dictate the operations Click-and-mortar (click-and-brick) organizations Orga-
of organizations. nizations that conduct some e-commerce activities, usu-
Business impact analysis (BIA) An analysis of the impact ally as an additional marketing channel.
of losing the functionality of an EC activity (e.g., e-pro- Click-and-mortar retailer A combination of both the tra-
curement, e-ordering) to an organization. ditional retailer and an online store.
Business model A description of how an organization intends Clickstream behavior A pattern of customer movements
to generate revenue through its business operations. on the Internet, which can be seen in their transaction logs.
Business social network A network that is built on social Clickstream data Data that describe which websites users
relationships, and can exist off-line or online. Business visit, in what order, and the time spent on each. This is
social networking can take place in traditional corporate done by tracking the succession of “clicks” each visitor
physical environments. makes.
Business-oriented social network A social network whose Click-through rate/ratio (CTR) The percentage of visi-
primary objective is to facilitate business. tors who are exposed to a banner ad and click on it.
Business-to-business (B2B) All transactions take place Collaboration hub (c-hub) The central point of interac-
between and among organizations. tion and of a company’s supply chain. A single e-hub
Business-to-business e-commerce (B2B EC) Transactions can host multiple collaboration spaces in which trad-
between businesses conducted electronically over the ing partners trade, collaborate, communicate, and share
Internet, extranets, intranets, or private networks. information.
Business-to-business-to-consumer (B2B2C) A business Collaborative commerce (c-commerce) Refers to online
(B1) sells a product to another business (B2). B2 then activities and communications done by parties working to
sells or gives away the product to individuals who may be attain the same goal; or electronic support for business collab-
B2’s own customers or employees. oration. It enables companies to collaboratively plan, design,
Business-to-consumer (B2C) Retail transactions of prod- develop, manage, and research products, services, and inno-
ucts or services from businesses to individual shoppers. vative business processes, including EC applications.
Business-to-employees (B2E) The delivery of services, infor- Collaborative filtering A method that attempts to predict
mation, or products from organizations to their employees. what products or services are of interest to new customers
Button A small banner that is linked to a website; may without asking or viewing their previous records.
contain downloadable software. Communal shopping (collaborative shopping) A method
Buy-side e-marketplace An e-marketplace owned by large of shopping where shoppers enlist friends and other peo-
buyers that invites sellers to browse and offers to fulfill ple they trust to advise them on what products to shop for.
orders. Where a company purchases from many poten- Company-centric EC One-to-many and many-to-one mar-
tial suppliers; this type of purchasing is considered to be kets where one company does either all the selling (sell-
many-to-one, and it is a B2B activity. side market) or all the buying (buy-side market).
Card verification number (CVN) Method for detecting Computer Fraud and Abuse Act (CFAA) Act passed in
fraud by matching the 3-digit verification number printed 1984 and amended several times, is an important milestone
on the signature strip on the back of the credit card (or the in EC legislation. Initially, the scope and intent of CFAA
4-digit number on the front of the card, such as American was to protect government computers and financial indus-
Express cards) with the number stored by the cardholder’s try computers from criminal theft by outsiders. In 1986, the
issuing bank. CFAA was amended to include stiffer penalties for viola-
Certificate authorities (CAs) Independent agencies that tions, but it still only protected computers used by the fed-
issue digital certificates or SSL certificates, which are eral government or financial institutions.
electronic files that uniquely identify individuals and Confidentiality The assurance of data secrecy and privacy.
websites and enable encrypted communication. Namely, the data is disclosed only to authorized people.