Page 438 - Introduction to Electronic Commerce and Social Commerce
P. 438

Index                                                                                           427

           Credit-based transportation card, 350                controls, spam, pop ups, and social engineering controls, 317, 318
           Criminals and methods, 301                           securing networks, 316, 317
           Crowdfunding                                       Defense mechanisms, 325
              examples, 249                                   Delivery
              and Kickstarter, 249                              of digital products, entertainment, and media, 83, 94
              tools for, 249                                    speed of, 83
           Crowdsortium, 247                                  Dell’s IdeaStorm, 248
           Crowdsourcing, 55, 56, 240, 247–248                Denial-of-service (DoS) attack, 306
              Amazon mechanical turk, 248                     Desktop purchasing, 118
              benefits, 57                                    Desktop search, 44
              Dell’s IdeaStorm, 248                           Detection measures, 303
              E-Commerce, 57                                  Deterrent methods, 303
              elements, 56                                    Digital Copy (DC), 360
              Facebook, 248                                   Digital coupons, 88
              Frito-Lay, 248                                  Digital currencies, 353, 373
              Goldcorp, 248                                   Digital customers, 20
              marketplace, 249                                Digital economy, 17–18, 21, 28
              models, 247–248                                 Digital enterprise, 18–19, 21
              process, 56, 248                                Digital glasses, 190
              Procter and Gamble, 248                         Digital government, 138–143
              shopping advice, 213                              definition and scope, 138–139
              systems, 248–249                                  electronic benefits transfer, 141
              tools for, 249                                    electronic voting, 140–141
              Wikipedia, 248                                    E-Procurement, 141
           Cryptocurrencies, 354                                G2B, 141
           Cryptolocker, 306                                    G2C, 140
           CSX Technology, 369                                Digital payments systems, 336
           Customer acquisition and retention, 262            Digital Rights Management (DRM), 398
           Customer data, 36                                  Digital signature, 312, 316
           Customer order history, 341                        Direct marketing by mail-order, 73
           Customer relationship management (CRM), 222        Direct sales, 73
           Customer services, 42                              Discount rate, 340
           Customer shopping mechanisms                       Disintermediation, 40, 108
              electronic malls, 42                            Display ads, 273
              microsite, 42                                   Distance learning/education, 146
              webstore, 41                                    Diversion theft, 307
           Customer-facing activities, 359                    DMZ architecture, 317
           Cyber bank robberies, 310                          Dotnet, 310
           Cyberattackers, 298                                Double-spend problem, 354
           Cyberattacks, 297, 310                             Drone delivery, 366
           Cyberbanking, 94                                   Drones, 366
           CyberCop Portal, 295                               Dual Firewall Architecture, 316
           Cybercrime, 299, 301                               DYC Software Studio, 103
           Cybercriminals, 299, 328–329                       Dynamic pricing, 38, 46, 122
           Cyberespionage, 296, 297
           Cybergang, 296
           Cyberhooliganism, 296                              E
           “Cyber Pearl Harbor” attack, 297                   E-auctions, 42, 141
           CyberSource surveys, 341                             benefits, 48, 49
           Cyberterrorism, 296                                  limitation, 48
           Cybervandalism, 296                                E-banking, 80
           Cyberwarfare, 296                                  E-bartering, 49
           Cyberwars, 296, 297, 318                           EBay, 157
                                                              E-books
                                                                readers, 159
           D                                                    versus traditional books, 151
           DaBus, 143                                         E-business, 6, 7, 19, 25
           Darknet, 298                                       E-collaboration, 126
           Data breach, 311                                   E-commerce, 404, 405
           DDOS Attacks on WordPress, 305                       access control and communications, 325
           Deal purchases, 211                                  activities, 37
           Debit cards, 336                                     and cultural differences, 394–395
           Decentralized virtual currency, 354                  and social commerce, 204
           Defending information systems, 314, 315              card payments, 372
              access control, encryption, and PKI, 314–316      Components and Participants, 39–40
              business continuity and disaster recovery, 318, 319  customer data, 36
   433   434   435   436   437   438   439   440   441   442   443