Page 431 - Introduction to Electronic Commerce and Social Commerce
P. 431

420                                                                                          Glossary

           Interactive video  A technique used to mix user interaction  Live  banners  Ads  where  the  content  can  be  created  or
              with videos.                                      modified at the time the ads pop up instead of being pre-
           Interactive voice response (IVR)  A voice support appli-  programmed like banner ads.
              cation system that enables users to interact by telephone  Localization  The transformation and adaptation of  Web
              (of any kind) with a computerized system to request and   content media products and advertising materials to fit the
              receive information.                              Web environment of a certain region or country.
           Interchange rate  The fees charged by the issuing bank for  Location-based commerce (l-commerce)  A wireless-
              handling authorization and settlement requests.   based technology used by vendors to send advertisements
           Intermediary  A third party that operates between sellers   relevant to the location where customers are at a given
              and buyers.                                       time by using GPS.
           Internet of Things (IoT)  A situation where many objects  Macro virus (macro worm)  A malware code that is
              (people, animals, items) with embedded microprocessors   attached to a data file rather than to an executable pro-
              are connected mostly wirelessely to the Internet.  gram (e.g., a Word file).
           Internet  Radio  Audio content transmitted  live via the  Maintenance, repair, and operation (MRO)  Indirect
              Internet.                                         materials used in activities that support production.
           Internet TV  The delivery of TV content via the Internet  Malware (malicious software)  A generic term for mali-
              by video streaming technologies.                  cious software.
           Internet underground economy  E-markets for stolen  Maverick buying  A buying situation that occurs when
              information made up of thousands of websites that sell   a buyer makes unplanned purchases of items needed
              credit card numbers, social security numbers, e-mail   quickly,  resulting  in  buying  at  non-pre-negotiated,  and
              addresses, bank account numbers, social network IDs,   usually higher, prices.
              passwords, and much more.                       Merge-in-transit  Logistics model in which components
           Intrabusiness EC  E-commerce category that refers to EC   for a product may come from two (or more) different
              transactions among various organizational departments   physical locations and are shipped directly to the custom-
              and individuals.                                  er’s location.
           Intranet  An internal corporate or government network that  Micropayments (e-micropayments)  Small online pay-
              uses Internet tools, such as Web browsers, and Internet   ments, usually under $10.
              protocols.                                      M-learning (mobile learning)  Refers to e-learning or
           Intrusion detection system (IDS)  A device composed of   other forms of education using mobile devices.
              software and/or hardware designed to monitor the activi-  Mobile (digital) wallet  Proximity payments that are deb-
              ties of computer networks and computer systems in order   ited to a mobile phone account as a monthly fee or to a
              to detect and define unauthorized and  malicious attempts   debit card account. The technology enables payments as
              to access, manipulate, and/or disable these networks and   well as processing loyalty programs and performing tar-
              systems.                                          get promotions all in one mobile device.
           Key (key value)  The secret piece used with the algorithm  Mobile advertising (m-advertising)  “Advertising tailored
              to encrypt (or decrypt) the message.              to and delivered through wireless mobile devices such as
           Key performance indicator (KPI)  A quantifiable measure-  smartphones (e.g., Blackberry, iPhone,  Android, etc.),
              ment that is considered a critical success factor of a com-  feature phones (e.g., lower-end mobile phones capable of
              pany, department, or project.                     accessing mobile content), and media tablets (e.g., iPad,
           Keystroke logging (keylogging)  The process of using a   Samsung Galaxy Tablet, etc.)” (IAB 2014).
              device or software program that tracks and records the  Mobile app  A software application developed specifi-
              activity of a user in real time (without the user’s knowl-  cally for use on small, wireless computing devices, such
              edge or consent) by the keyboard keys they press.  as smartphones and tablets, rather than desktop or laptop
           Knowledge management (KM)  The process of capturing   computers.
              or creating knowledge, storing it, updating it constantly,  Mobile banking (m-banking)  A term used to describe
              disseminating it, and using it whenever necessary.  the conducting of banking activities via a mobile device
           Landing page  The page a viewer is directed to after hav-  (mostly by texting, or via mobile website).
              ing clicked on a link. In online marketing, this page is  Mobile commerce (m-commerce; m- business)  Conducting
              used to convert the person from a viewer to a buyer.  e-commerce by using mobile devices and wireless net-
           Learning management system (LMS)  Software applica-  works.
              tions for managing e-training and e-learning programs  Mobile enterprise  Mobile applications conducted by enter-
              including content, scheduling, delivery tips, and so forth.  prises to improve the operations of the employees, facilities,
   426   427   428   429   430   431   432   433   434   435   436