Page 438 - Introduction to Electronic Commerce and Social Commerce
P. 438
Index 427
Credit-based transportation card, 350 controls, spam, pop ups, and social engineering controls, 317, 318
Criminals and methods, 301 securing networks, 316, 317
Crowdfunding Defense mechanisms, 325
examples, 249 Delivery
and Kickstarter, 249 of digital products, entertainment, and media, 83, 94
tools for, 249 speed of, 83
Crowdsortium, 247 Dell’s IdeaStorm, 248
Crowdsourcing, 55, 56, 240, 247–248 Denial-of-service (DoS) attack, 306
Amazon mechanical turk, 248 Desktop purchasing, 118
benefits, 57 Desktop search, 44
Dell’s IdeaStorm, 248 Detection measures, 303
E-Commerce, 57 Deterrent methods, 303
elements, 56 Digital Copy (DC), 360
Facebook, 248 Digital coupons, 88
Frito-Lay, 248 Digital currencies, 353, 373
Goldcorp, 248 Digital customers, 20
marketplace, 249 Digital economy, 17–18, 21, 28
models, 247–248 Digital enterprise, 18–19, 21
process, 56, 248 Digital glasses, 190
Procter and Gamble, 248 Digital government, 138–143
shopping advice, 213 definition and scope, 138–139
systems, 248–249 electronic benefits transfer, 141
tools for, 249 electronic voting, 140–141
Wikipedia, 248 E-Procurement, 141
Cryptocurrencies, 354 G2B, 141
Cryptolocker, 306 G2C, 140
CSX Technology, 369 Digital payments systems, 336
Customer acquisition and retention, 262 Digital Rights Management (DRM), 398
Customer data, 36 Digital signature, 312, 316
Customer order history, 341 Direct marketing by mail-order, 73
Customer relationship management (CRM), 222 Direct sales, 73
Customer services, 42 Discount rate, 340
Customer shopping mechanisms Disintermediation, 40, 108
electronic malls, 42 Display ads, 273
microsite, 42 Distance learning/education, 146
webstore, 41 Diversion theft, 307
Customer-facing activities, 359 DMZ architecture, 317
Cyber bank robberies, 310 Dotnet, 310
Cyberattackers, 298 Double-spend problem, 354
Cyberattacks, 297, 310 Drone delivery, 366
Cyberbanking, 94 Drones, 366
CyberCop Portal, 295 Dual Firewall Architecture, 316
Cybercrime, 299, 301 DYC Software Studio, 103
Cybercriminals, 299, 328–329 Dynamic pricing, 38, 46, 122
Cyberespionage, 296, 297
Cybergang, 296
Cyberhooliganism, 296 E
“Cyber Pearl Harbor” attack, 297 E-auctions, 42, 141
CyberSource surveys, 341 benefits, 48, 49
Cyberterrorism, 296 limitation, 48
Cybervandalism, 296 E-banking, 80
Cyberwarfare, 296 E-bartering, 49
Cyberwars, 296, 297, 318 EBay, 157
E-books
readers, 159
D versus traditional books, 151
DaBus, 143 E-business, 6, 7, 19, 25
Darknet, 298 E-collaboration, 126
Data breach, 311 E-commerce, 404, 405
DDOS Attacks on WordPress, 305 access control and communications, 325
Deal purchases, 211 activities, 37
Debit cards, 336 and cultural differences, 394–395
Decentralized virtual currency, 354 and social commerce, 204
Defending information systems, 314, 315 card payments, 372
access control, encryption, and PKI, 314–316 Components and Participants, 39–40
business continuity and disaster recovery, 318, 319 customer data, 36