Page 427 - Introduction to Electronic Commerce and Social Commerce
P. 427

416                                                                                          Glossary

           Brick-and-mortar (old economy) organizations  Purely  Channel conflict  Refers to the case in which online sales
              physical organizations (corporations) doing business off-line.  damage the well-being of existing channel partner.
           Brick-and-mortar retailer  A retailer that conducts busi-  CIA security triad (CIA triad)  A point of reference used
              ness exclusively in the physical world.           to identify problem areas  and evaluate the  information
           Business continuity plan  A plan that keeps the business   security of an organization that includes confidentiality,
              running after a disaster occurs. Each function in the busi-  integrity, and availability.
              ness should have a valid recovery capability plan.  Ciphertext  An encrypted plaintext.
           Business ethics (corporate or enterprise ethics)  A code  Click (ad click)  A count made each time a visitor clicks on
              of values, behaviors, and rules, written or unwritten, for   an advertising banner to access the advertiser’s website.
              conducting business. These ethics dictate the operations  Click-and-mortar (click-and-brick) organizations  Orga-
              of organizations.                                 nizations that conduct some e-commerce activities, usu-
           Business impact analysis (BIA)  An analysis of the impact   ally as an additional marketing channel.
              of losing the functionality of an EC activity (e.g., e-pro-  Click-and-mortar retailer  A combination of both the tra-
              curement, e-ordering) to an organization.         ditional retailer and an online store.
           Business model  A description of how an organization intends  Clickstream behavior  A pattern of customer movements
              to generate revenue through its business operations.  on the Internet, which can be seen in their transaction logs.
           Business social network  A network that is built on social  Clickstream data  Data that describe which websites users
              relationships, and can exist off-line or online. Business   visit, in what order, and the time spent on each. This is
              social networking can take place in traditional corporate   done by tracking the succession of “clicks” each visitor
              physical environments.                            makes.
           Business-oriented social network  A social network whose  Click-through rate/ratio (CTR)  The percentage of visi-
              primary objective is to facilitate business.      tors who are exposed to a banner ad and click on it.
           Business-to-business (B2B)  All transactions take place  Collaboration hub (c-hub)  The central point of interac-
              between and among organizations.                  tion and  of a  company’s supply  chain. A  single e-hub
           Business-to-business e-commerce (B2B EC)  Transactions   can host multiple  collaboration spaces in which trad-
              between businesses conducted  electronically over the   ing partners trade, collaborate, communicate, and share
              Internet, extranets, intranets, or private networks.  information.
           Business-to-business-to-consumer (B2B2C)  A business  Collaborative commerce (c-commerce)  Refers to online
              (B1)  sells  a  product  to  another  business  (B2).  B2  then   activities and communications done by parties working to
              sells or gives away the product to individuals who may be   attain the same goal; or electronic support for business collab-
              B2’s own customers or employees.                  oration. It enables companies to collaboratively plan, design,
           Business-to-consumer (B2C)  Retail transactions of prod-  develop, manage, and research products, services, and inno-
              ucts or services from businesses to individual shoppers.  vative business processes, including EC applications.
           Business-to-employees (B2E)  The delivery of services, infor-  Collaborative filtering  A method that attempts to predict
              mation, or products from organizations to their employees.  what products or services are of interest to new customers
           Button  A small banner that is linked to a website; may   without asking or viewing their previous records.
              contain downloadable software.                  Communal shopping (collaborative shopping)  A method
           Buy-side e-marketplace  An e-marketplace owned by large   of shopping where shoppers enlist friends and other peo-
              buyers that invites sellers to browse and offers to fulfill   ple they trust to advise them on what products to shop for.
              orders. Where a company purchases from many poten-  Company-centric EC  One-to-many and many-to-one mar-
              tial suppliers; this type of purchasing is considered to be   kets where one company does either all the selling (sell-
              many-to-one, and it is a B2B activity.            side market) or all the buying (buy-side market).
           Card verification number (CVN)  Method for detecting  Computer Fraud and Abuse Act (CFAA)  Act passed in
              fraud by matching the 3-digit verification number printed   1984 and amended several times, is an important milestone
              on the signature strip on the back of the credit card (or the   in EC legislation. Initially, the scope and intent of CFAA
              4-digit number on the front of the card, such as American   was to protect government computers and financial indus-
              Express cards) with the number stored by the cardholder’s   try computers from criminal theft by outsiders. In 1986, the
              issuing bank.                                     CFAA was amended to include stiffer penalties for viola-
           Certificate authorities (CAs)  Independent agencies that   tions, but it still only protected computers used by the fed-
              issue digital certificates or SSL certificates, which are   eral government or financial institutions.
              electronic files that uniquely identify individuals and  Confidentiality  The assurance of data secrecy and privacy.
              websites and enable encrypted communication.      Namely, the data is disclosed only to authorized people.
   422   423   424   425   426   427   428   429   430   431   432