Page 428 - Introduction to Electronic Commerce and Social Commerce
P. 428
Glossary 417
Consortium trading exchange (CTE) An exchange formed Cybercrime Intentional crimes carried out on the Internet.
and operated by a group of major companies in one indus- Cybercriminal A person who intentionally carries out
try. They can be suppliers, buyers, or both. crimes over the Internet.
Consumer-to-business (C2B) People use the Internet to Darknet A separate Internet that can be accessed via the reg-
sell products or services to individuals and organizations. ular Internet and a connection to the TOR network (TOR is
Alternatively, individuals use C2B to bid on products or a network of VPNs that allows privacy and security on the
services. Internet). The darknet has restricted access to trusted peo-
Consumer-to-consumer (C2C) E-commerce category in ple (friends) by using non-standard protocols (IP addresses
which individual consumers sell to or buy from other con- are not listed). Darknet allows anonymous surfing.
sumers; or electronic transactions completed between and Data breach A security incident in which data are obtained
among individuals. illegally and then published or processed.
Contact card A smart card that is activated when it is Denial-of-service (DoS) attack “A malicious attempt to
inserted into a smart card reader. make a server or network resource unavailable to users,
Contactless (proximity) card A smart card that only has usually by temporarily interrupting or suspending the ser-
to be within a certain proximity of a smart card reader to vices of a host connected to the Internet.” (Incapsula, Inc.)
process a transaction. Desktop purchasing Purchasing done by employees with-
Context-aware computing A technology that is capable in out the approval of supervisors and without the involve-
predicting people’s needs and providing fulfillment options ment of a procurement department.
(sometimes even before a request by the end user is made). Desktop search The search of a user’s own computer files.
Conversion rate The percentage of clickers who actually The search is done by looking through all the information
make a purchase. that is available on the user’s PC.
Convertible virtual currency A virtual currency that has Detection measures Methods that help find security breaches
an equivalent value in real currency, or acts as a substitute in computer systems. Usually this means to find out whether
for real currency. intruders are attempting (or have attempted) to break into
Cookie A data file that, without the knowledge of users, is the EC system, whether they were successful, whether they
placed on their computer hard drives. are still damaging the system, and what damage they may
Copyright An exclusive legal right of an author or creator have done.
of intellectual property to publish, sell, license, distribute, Deterrent methods Countermeasures that make criminals
or use such work in any desired way. abandon their idea of attacking a specific system (e.g.,
Copyright infringement The use of a work without per- a possible deterrent is a realistic expectation of being
mission or contracting for payment of a royalty. caught and punished).
Corporate portal A gateway for customers, employees, Digital currency A generic term that refers to the digital
and partners to reach corporate information and to com- representation of either e-money or virtual currency.
municate with the company. Digital economy An economy that is based on online transac-
Cost–benefit analysis A comparison of the costs of each tions, mostly e-commerce. Also called the Internet econ-
project against its benefits. omy.
CPM (cost per mille, i.e., thousand impressions) The fee Digital enterprise A new business model that uses IT to gain
an advertiser pays for each 1000 times a page with a ban- competitive advantage by increasing employee productiv-
ner ad is shown. ity, by improving efficiency and effectiveness of business
Cracker A malicious hacker who may be more damaging processes, and by better interactivity between vendors and
than a hacker. customers.
Cross-border e-commerce Online purchases involving buy- Digital products Goods that can be transformed to digital
ers and merchants or sellers who are in different countries. format.
Crowdsourcing Utilizing crowds to collectively execute Digital rights management (DRM) A system of protect-
tasks such as solving problems, innovating, or getting ing the copyrights of data circulated over the Internet or
large projects done by dividing the work among many digital media. These arrangements are technology- based
people. protection measures (via encryption or using watermarks).
Customer relationship management (CRM) A customer Digital signatures The electronic equivalent of personal
service approach that focuses on building long- term and signatures on paper. They are difficult to forge since they
sustainable customer relationships that adds value for authenticate the identity of the sender that uses the public
both the customers and the merchants. key.