Page 432 - Introduction to Electronic Commerce and Social Commerce
P. 432
Glossary 421
and relevant supply chains, within the enterprise and with by them to accept the rights over the invention. The holder
its business partners. of the patent has sole rights over the invention for a speci-
Mobile entertainment Any entertainment delivered on fied period of time.” (per Fedcirc.us)
mobile devices over wireless networks or that interacts Pay per click (PPC) A popular Internet advertising pay-
with mobile service providers. ment formula where advertisers pay sites only when
Mobile government (m-government) The implementation someone clicks on their ad.
of e-government applications using wireless platforms. Payment cards Electronic cards that contain payment-
Mobile marketing The use of mobile devices and wireless related data. They include credit cards, charge cards, and
infrastructure as a means of marketing and advertising. debit cards.
Mobile payment Payment transactions initiated or con- Penetration test (pen test) A method of assessing the vul-
firmed using a person’s mobile device, usually a smartphone. nerability of a computer system, which is done by allow-
Mobile portal A portal accessible via a mobile device. ing experts to act as malicious attackers.
Mobile social networking Social networking where mem- Penny auction A new type of forward auction in which
bers converse and connect with one another using any participants must pay a small nonrefundable fee each time
mobile device. they place a bid (usually in small increments above the
Mobile worker Any employee who is away from his or previous bid). When time expires, the last participant to
her primary work space at least 10 h a week (or 25% of have placed a bid wins the item and also pays the final bid
the time). price.
Multichannel business model The model or strategy of Permission advertising Advertising (marketing) strategy
selling both online and off-line. in which customers agree to accept advertising and mar-
Multimedia messaging service (MMS) The new type of keting materials (known as opt-in).
wireless messaging, delivering rich media content, such Personalization The matching of advertising content and
as video, images, and audio to mobile devices. MMS is vendors’ services with customers based on their prefer-
an extension of SMS (no extra charge with an SMS “bun- ences and individual needs.
dle”). It allows for longer messages than with SMS. Personalized banners Banners that are tailored to meet
Name-your-own-price model Auction model in which a the need of target customers.
would-be buyer specifies the price (and other terms) he or Pervasive computing Computing capabilities that are
she is willing to pay to any willing and able seller. It is a embedded in the environment but typically are not mobile.
C2B model that was pioneered by Priceline.com. Phishing A fraudulent process of attempting to acquire sen-
Non-convertible virtual currency A virtual currency used sitive information by masquerading as a trustworthy entity.
in a specific virtual world or domain that cannot (theoreti- Plaintext A human-readable text or message.
cally) be exchanged for fiat currency. Platform for Privacy Preferences Project (P3P) A pro-
Nonrepudiation The assurance that online customers or tocol for privacy protection on the Web developed by the
trading partners cannot falsely deny (repudiate) their pur- W3 Organization (W3C).
chase, transaction, sale, or other obligation. Pop-up ad An ad that appears due to the automatic launch-
On-demand delivery service An express delivery option. ing of a new browser window when a visitor accesses or
Online intermediary A third-party entity that brokers the leaves a website, when a delay occurs; also known as ad
transactions between the buyer and seller and can be either spawning.
a virtual or a click-and-mortar intermediary. Pop-up banner Banners that appear in a separate window
Opt-in The principle that consumers must approve, in when its affiliated Web page is activated.
advance, what they are willing to see. That is, information Prevention measures Ways to help stop unauthorized peo-
sharing should not occur unless customers affirmatively ple from accessing the EC system (e.g., by using authentica-
allow or request it. tion devices and firewalls or by using intrusion prevention
Opt-out A method that gives consumers the choice to which is, according to TechTarget, “a preemptive approach
refuse to share information about themselves, or to avoid to network security used to identify potential threats and
receiving unsolicited information. respond to them swiftly”).
Order fulfillment All the operations a company under- Private key A key that only its owner knows.
takes from the time it receives an order to the time the Private shopping club Enables members to shop at dis-
items are delivered to the customers, including all related count, frequently for short periods of time (just few days).
customer services. Procurement management The process of planning, orga-
Patent “An exclusive right to a particular invention. nizing, and coordinating of all the activities pertaining to
Patents are granted by states or governments to the creator the purchasing of the goods and services needed by an
of an invention, or to someone who has been designated organization.