Page 430 - Introduction to Electronic Commerce and Social Commerce
P. 430

Glossary                                                                                        419

              can be done via the Internet or via a private network such  Government 2.0  The employment of social media tools,
              as EDI.                                           new business models, and embracing social networks
           E-tailers  Sellers who conduct retail business online.  and user participation, government agencies can raise the
           E-tailing  Online retailing, usually B2C.            effectiveness of their online activities to meet users’ needs
           Ethics  A set of moral principles or rules of how people   at a reasonable cost.
              are expected to conduct themselves. It specifies what is  Government-to-employees (G2E)  E-government cate-
              considered by society to be right or wrong.       gory that includes activities between the government and
           Event shopping  The B2C model in which sales are designed   their employees.
              to meet the needs of special events (e.g., a wedding, Black  Government-to-government (G2G)  E-government cat-
              Friday). This model may be combined with group purchas-  egory that includes EC activities between different units
              ing (to lower the customers’ cost).               of governments, including those within one governmental
           Exchanges (trading communities or trading exchanges)     body. Many of these are aimed at improving the effective-
              Many-to-many e-marketplaces where many buyers and   ness and the efficiency of the government operation.
              many sellers meet electronically to trade with one another.  Government-to-business (G2B)  E-government category
           Expert/expertise location systems (ELS)  Interactive com-  that works both ways: government-to-business and busi-
              puterized systems that help employees locate experts within   ness-to-government. Thus, G2B refers to activities where
              their organization in order to get help in solving specific,   the government sells products to businesses or provides
              critical business or technical problems in a short time.  businesses with services and vice versa.
           Exposure  The  estimated  cost,  loss,  or damage  that  can  Government-to-citizens (G2C)  E-government category
              result if a threat exploits a vulnerability.      that includes all the interactions between a government
           Extranet  A network that uses Internet technology to link   and its citizens that take place electronically.
              intranets of several organizations in a secure manner.  Group purchasing  Orders from several buyers are aggre-
           Fair use  The limited use of copyrighted material, without   gated so that better prices due to larger quantities pur-
              paying a fee or royalty, for certain purposes (e.g., reviews,   chased can be negotiated.
              commentaries, teaching).                        Hacker  Someone who gains unauthorized access to a
           F-commerce  Rapidly increasing commercial activities   computer system.
              conducted on or facilitated by Facebook.        Hit  A request for data from a Web page or file.
           Fiat currency  The coin and paper money of a country that  Horizontal marketplaces  Markets in which trading is in a
              is designated as legal tender.                    service or a product that is used in many types of indus-
           Firewalls  Barriers between an internal trusted network (or   tries. Examples are office supplies, PCs, or travel services.
              a PC) and the untrustworthy Internet. Technically, it is  Identity theft  Wrongfully obtaining and using the iden-
              composed of hardware and a software package that sepa-  tity of another person in some way to commit crimes that
              rates a private computer network (e.g., your LAN) from a   involve fraud or deception (e.g., for economic gain).
              public network (the Internet).                  Indirect materials  Items, such as office supplies or light
           Forward auction  An auction where a seller entertains bids   bulbs, which support operation and production.
              from multiple buyers.                           Information assurance (IA)  The performance of activi-
           Fraud  Any business activity that uses deceitful practices   ties (steps) to protect information systems and their pro-
              or devices to deprive another of property or other rights.  cesses against all risks. The assurance includes all tools
           Front end  The place where customers interact with a   and defense methods.
              marketspace. The major components of the front end can  Information security  Measures taken to protect informa-
              include the seller’s portal, electronic catalogs, a shopping   tion systems and their processes against all risks.
              cart, a search engine, an auction engine, a payment gate-  Integrity  The assurance that data are accurate and that
              way, and all other activities related to placing orders.  they cannot be altered.
           Gamification  Virtual games designed to support B2B  Intellectual property (IP)  Property that derives from the cre-
              training and decision-making; or the introduction of gam-  ative work of an individual, such as literary or artistic work.
              ing into social networking. Gamification can also be  Intellectual property law  Area of the law concerned with
              viewed as the introduction of social networking activities   the regulation of thinking-related products, including
              into online games.                                creativity that are protected by patents, copyrights, trade-
           General controls  Controls designed to protect all system   marks, and trade secret law.
              applications.                                   Intelligent personal assistants  An application that uses
           Geosocial networking  Social networking with location   AI to understand spoken natural languages.
              awareness capabilities. This enables social networks to  Interactive marketing  A marketing concept that enables
              connect users with local businesses, people, or events.  marketers and advertisers to interact directly with customers.
   425   426   427   428   429   430   431   432   433   434   435