Page 435 - Introduction to Electronic Commerce and Social Commerce
P. 435
424 Glossary
Virtual economy An emerging economy existing in several Web 2.0 The second generation of Internet-based tools
virtual worlds, where people exchange virtual goods fre- and services that enables users to easily generate content,
quently related to an Internet game or to a virtual business. share media, and communicate and collaborate, in inno-
Virtual goods Computer images of real or imaginary goods. vative ways.
Virtual private network (VPN) A network that uses the Web 3.0 A term used to describe the future of the World
Internet to transfer information in a secure manner. Wide Web. It is projected to deliver a new generation of
Virtual reality A computer-generated simulation of a real- business applications that will see business and social
life environment in which users can be immersed. computing converge.
Virtual trade show Temporary or permanent showplaces Web 4.0 The Web generation after Web 3.0. It is still an
where exhibitors present their new products to potential unknown entity. However, it is envisioned as being based
customers. on islands of intelligence and as being ubiquitous.
Virtual university Online universities where students take Web analytics “The measurement, collection, analysis,
classes from home via the Internet. and reporting of Internet data for the purposes of under-
Virtual world A 3-D computer-based simulated environ- standing and optimizing Web usage.” (per Web Analytics
ment built and owned by its residents. In addition to cre- Association)
ating buildings, people can create and share cars, clothes, Web bugs Tiny (usually invisible) objects concealed in
and many other items. Community members inhabit vir- a Web page or in e-mail messages. Web bugs transmit
tual spaces and interact and socialize via avatars. information about the user and his or her movements to
Virus Programmed software inserted by criminals into a a monitoring site (e.g., to find out if the user has viewed
computer to damage the system; running the infected host certain content on the web page).
program activates the virus. Web mining The use of data mining techniques for both
Voice portal A portal with audio interfaces that can be Web content and usage in Web documents in order to dis-
accessed by telephone or cell phone. cover patterns and hidden relationships.
Vulnerability Weakness in software or other mechanism Webstore (storefront) A single company’s (or individual
that threatens the confidentiality, integrity, or availability seller’s) website where products or services are sold.
of an asset (recall the CIA model). It can be directly used Wireless mobile computing (mobile computing) A com-
by a hacker to gain access to a system or network. puting solution where computing is done using mobile
Vulnerability assessment A process of identifying and devices at any place connected to a wireless network.
evaluating problem areas that are vulnerable to attack on Worm A software code that can replicate itself automati-
a computerized system. cally (as a “standalone”—without any human interven-
Warehouse management system (WMS) A software sys- tion). Worms use networks to propagate and infect a
tem that helps in managing warehouses. computer or handheld device and can even spread via
Web (information) portal A single point of access, instant messages.
through a Web browser, to critical business information Zombies Computers infected with malware that are under
located inside and outside organizations. the control of a spammer, hacker, or other criminal.