Page 430 - Introduction to Electronic Commerce and Social Commerce
P. 430
Glossary 419
can be done via the Internet or via a private network such Government 2.0 The employment of social media tools,
as EDI. new business models, and embracing social networks
E-tailers Sellers who conduct retail business online. and user participation, government agencies can raise the
E-tailing Online retailing, usually B2C. effectiveness of their online activities to meet users’ needs
Ethics A set of moral principles or rules of how people at a reasonable cost.
are expected to conduct themselves. It specifies what is Government-to-employees (G2E) E-government cate-
considered by society to be right or wrong. gory that includes activities between the government and
Event shopping The B2C model in which sales are designed their employees.
to meet the needs of special events (e.g., a wedding, Black Government-to-government (G2G) E-government cat-
Friday). This model may be combined with group purchas- egory that includes EC activities between different units
ing (to lower the customers’ cost). of governments, including those within one governmental
Exchanges (trading communities or trading exchanges) body. Many of these are aimed at improving the effective-
Many-to-many e-marketplaces where many buyers and ness and the efficiency of the government operation.
many sellers meet electronically to trade with one another. Government-to-business (G2B) E-government category
Expert/expertise location systems (ELS) Interactive com- that works both ways: government-to-business and busi-
puterized systems that help employees locate experts within ness-to-government. Thus, G2B refers to activities where
their organization in order to get help in solving specific, the government sells products to businesses or provides
critical business or technical problems in a short time. businesses with services and vice versa.
Exposure The estimated cost, loss, or damage that can Government-to-citizens (G2C) E-government category
result if a threat exploits a vulnerability. that includes all the interactions between a government
Extranet A network that uses Internet technology to link and its citizens that take place electronically.
intranets of several organizations in a secure manner. Group purchasing Orders from several buyers are aggre-
Fair use The limited use of copyrighted material, without gated so that better prices due to larger quantities pur-
paying a fee or royalty, for certain purposes (e.g., reviews, chased can be negotiated.
commentaries, teaching). Hacker Someone who gains unauthorized access to a
F-commerce Rapidly increasing commercial activities computer system.
conducted on or facilitated by Facebook. Hit A request for data from a Web page or file.
Fiat currency The coin and paper money of a country that Horizontal marketplaces Markets in which trading is in a
is designated as legal tender. service or a product that is used in many types of indus-
Firewalls Barriers between an internal trusted network (or tries. Examples are office supplies, PCs, or travel services.
a PC) and the untrustworthy Internet. Technically, it is Identity theft Wrongfully obtaining and using the iden-
composed of hardware and a software package that sepa- tity of another person in some way to commit crimes that
rates a private computer network (e.g., your LAN) from a involve fraud or deception (e.g., for economic gain).
public network (the Internet). Indirect materials Items, such as office supplies or light
Forward auction An auction where a seller entertains bids bulbs, which support operation and production.
from multiple buyers. Information assurance (IA) The performance of activi-
Fraud Any business activity that uses deceitful practices ties (steps) to protect information systems and their pro-
or devices to deprive another of property or other rights. cesses against all risks. The assurance includes all tools
Front end The place where customers interact with a and defense methods.
marketspace. The major components of the front end can Information security Measures taken to protect informa-
include the seller’s portal, electronic catalogs, a shopping tion systems and their processes against all risks.
cart, a search engine, an auction engine, a payment gate- Integrity The assurance that data are accurate and that
way, and all other activities related to placing orders. they cannot be altered.
Gamification Virtual games designed to support B2B Intellectual property (IP) Property that derives from the cre-
training and decision-making; or the introduction of gam- ative work of an individual, such as literary or artistic work.
ing into social networking. Gamification can also be Intellectual property law Area of the law concerned with
viewed as the introduction of social networking activities the regulation of thinking-related products, including
into online games. creativity that are protected by patents, copyrights, trade-
General controls Controls designed to protect all system marks, and trade secret law.
applications. Intelligent personal assistants An application that uses
Geosocial networking Social networking with location AI to understand spoken natural languages.
awareness capabilities. This enables social networks to Interactive marketing A marketing concept that enables
connect users with local businesses, people, or events. marketers and advertisers to interact directly with customers.