Page 435 - Introduction to Electronic Commerce and Social Commerce
P. 435

424                                                                                          Glossary

           Virtual economy  An emerging economy existing in several  Web 2.0  The second generation of Internet-based tools
              virtual worlds, where people exchange virtual goods fre-  and services that enables users to easily generate content,
              quently related to an Internet game or to a virtual business.  share media, and communicate and collaborate, in inno-
           Virtual goods  Computer images of real or imaginary goods.  vative ways.
           Virtual private network (VPN)  A network that uses the  Web 3.0  A term used to describe the future of the World
              Internet to transfer information in a secure manner.  Wide Web. It is projected to deliver a new generation of
           Virtual reality  A computer-generated simulation of a real-  business applications that will see business and social
              life environment in which users can be immersed.  computing converge.
           Virtual trade show  Temporary or permanent showplaces  Web 4.0  The Web generation after Web 3.0. It is still an
              where exhibitors present their new products to potential   unknown entity. However, it is envisioned as being based
              customers.                                        on islands of intelligence and as being ubiquitous.
           Virtual university  Online universities where students take  Web analytics  “The measurement, collection, analysis,
              classes from home via the Internet.               and reporting of Internet data for the purposes of under-
           Virtual world  A 3-D computer-based simulated environ-  standing and optimizing Web usage.” (per Web Analytics
              ment built and owned by its residents. In addition to cre-  Association)
              ating buildings, people can create and share cars, clothes,  Web bugs  Tiny (usually invisible) objects concealed in
              and many other items. Community members inhabit vir-  a Web  page  or  in  e-mail  messages. Web  bugs  transmit
              tual spaces and interact and socialize via avatars.  information about the user and his or her movements to
           Virus  Programmed software inserted by criminals into a   a monitoring site (e.g., to find out if the user has viewed
              computer to damage the system; running the infected host   certain content on the web page).
              program activates the virus.                    Web mining  The use of data mining techniques for both
           Voice portal  A portal with audio interfaces that can be   Web content and usage in Web documents in order to dis-
              accessed by telephone or cell phone.              cover patterns and hidden relationships.
           Vulnerability  Weakness in software or other mechanism  Webstore (storefront)  A single company’s (or individual
              that threatens the confidentiality, integrity, or availability   seller’s) website where products or services are sold.
              of an asset (recall the CIA model). It can be directly used  Wireless mobile computing (mobile computing)  A com-
              by a hacker to gain access to a system or network.  puting solution where computing is done using mobile
           Vulnerability assessment  A process of identifying and   devices at any place connected to a wireless network.
              evaluating problem areas that are vulnerable to attack on  Worm  A software code that can replicate itself automati-
              a computerized system.                            cally (as a “standalone”—without any human interven-
           Warehouse management system (WMS)  A software sys-   tion).  Worms use networks to propagate and infect a
              tem that helps in managing warehouses.            computer or handheld device and can even spread via
           Web (information) portal  A single point of access,   instant messages.
              through a Web browser, to critical business information  Zombies  Computers infected with malware that are under
              located inside and outside organizations.         the control of a spammer, hacker, or other criminal.
   430   431   432   433   434   435   436   437   438   439   440