Page 428 - Introduction to Electronic Commerce and Social Commerce
P. 428

Glossary                                                                                        417

           Consortium trading exchange (CTE)  An exchange formed  Cybercrime  Intentional crimes carried out on the Internet.
              and operated by a group of major companies in one indus-  Cybercriminal  A person who intentionally carries out
              try. They can be suppliers, buyers, or both.      crimes over the Internet.
           Consumer-to-business (C2B)  People use the Internet to  Darknet  A separate Internet that can be accessed via the reg-
              sell products or services to individuals and organizations.   ular Internet and a connection to the TOR network (TOR is
              Alternatively, individuals use C2B to bid on products or   a network of VPNs that allows privacy and security on the
              services.                                         Internet). The darknet has restricted access to trusted peo-
           Consumer-to-consumer (C2C)  E-commerce category in    ple (friends) by using non-standard protocols (IP addresses
              which individual consumers sell to or buy from other con-  are not listed). Darknet allows anonymous surfing.
              sumers; or electronic transactions completed between and  Data breach  A security incident in which data are obtained
              among individuals.                                illegally and then published or processed.
           Contact  card  A  smart  card  that  is  activated  when  it  is  Denial-of-service (DoS) attack  “A malicious attempt to
              inserted into a smart card reader.                make a server or network resource unavailable to users,
           Contactless (proximity) card  A smart card that only has   usually by temporarily interrupting or suspending the ser-
              to be within a certain proximity of a smart card reader to   vices of a host connected to the Internet.” (Incapsula, Inc.)
              process a transaction.                          Desktop purchasing  Purchasing done by employees with-
           Context-aware computing  A technology that is capable in   out the approval of supervisors and without the involve-
              predicting people’s needs and providing fulfillment options   ment of a procurement department.
              (sometimes even before a request by the end user is made).  Desktop search  The search of a user’s own computer files.
           Conversion rate  The percentage of clickers who actually   The search is done by looking through all the information
              make a purchase.                                  that is available on the user’s PC.
           Convertible virtual currency  A virtual currency that has  Detection measures  Methods that help find security breaches
              an equivalent value in real currency, or acts as a substitute   in computer systems. Usually this means to find out whether
              for real currency.                                intruders are attempting (or have attempted) to break into
           Cookie  A data file that, without the knowledge of users, is   the EC system, whether they were successful, whether they
              placed on their computer hard drives.             are still damaging the system, and what damage they may
           Copyright  An exclusive legal right of an author or creator   have done.
              of intellectual property to publish, sell, license, distribute,  Deterrent methods  Countermeasures that make criminals
              or use such work in any desired way.              abandon their idea of attacking a specific system (e.g.,
           Copyright infringement  The use of a work without per-  a possible deterrent is a realistic expectation of being
              mission or contracting for payment of a royalty.  caught and punished).
           Corporate portal  A gateway for customers, employees,  Digital currency  A generic term that refers to the digital
              and partners to reach corporate information and to com-  representation of either e-money or virtual currency.
              municate with the company.                      Digital economy  An economy that is based on online transac-
           Cost–benefit analysis  A comparison of the costs of each   tions, mostly e-commerce. Also called the Internet econ-
              project against its benefits.                     omy.
           CPM (cost per mille, i.e., thousand impressions)  The fee  Digital enterprise  A new business model that uses IT to gain
              an advertiser pays for each 1000 times a page with a ban-  competitive advantage by increasing employee productiv-
              ner ad is shown.                                  ity, by improving efficiency and effectiveness of business
           Cracker  A malicious hacker who may be more damaging   processes, and by better interactivity between vendors and
              than a hacker.                                    customers.
           Cross-border e-commerce  Online purchases involving buy-  Digital products  Goods that can be transformed to digital
              ers and merchants or sellers who are in different countries.  format.
           Crowdsourcing  Utilizing crowds to collectively execute  Digital rights management (DRM)  A system of protect-
              tasks such as solving problems, innovating, or getting   ing the copyrights of data circulated over the Internet or
              large  projects  done  by dividing  the  work  among  many   digital media. These arrangements are technology- based
              people.                                           protection measures (via encryption or using watermarks).
           Customer relationship management (CRM)  A customer  Digital  signatures  The  electronic  equivalent  of  personal
              service approach that focuses on building long- term and   signatures on paper. They are difficult to forge since they
              sustainable customer relationships that adds value for   authenticate the identity of the sender that uses the public
              both the customers and the merchants.             key.
   423   424   425   426   427   428   429   430   431   432   433