Page 441 - Introduction to Electronic Commerce and Social Commerce
P. 441

430                                                                                            Index

           Hertz’s mobile services, 168                       Internal collaboration, 127
           Hidden digital payments, 337                       Internal Efficiency and Effectiveness (IEE), 142
           HighJump software, 369                             Internet abuse
           Home appliance botnets, 306                          managing, 395
           HomeScan, 177                                        in workplace, 395
           Horizontal information, 103                        Internet Advertising Bureau (IAB), 278
           Horizontal marketplaces, 107                       Internet advertising revenue, 270
           Hulu, 245                                          Internet communities, 50
           Human errors, 300                                  Internet crime, 323
           Hybrid cards, 343                                  Internet for person-to-person money lending, 158
           Hygiene factors, 264                               Internet fraud, 325
                                                              Internet gambling, 85
                                                              Internet gaming, 85
           I                                                  Internet Job Market, 77
           IBM Connections, 251                               Internet malls, 41
           IBM Jam Events, 153                                Internet marketing, 69–71
           IBM PureSystems, 154                               Internet of Things (IoT), 185, 194, 306
           IBM’S Business and Professional Community, 240       applications, 186
           Identity fraud, 310                                  audio and video equipment, 187
           Identity theft, 310                                  benefits, 185
           Inadequate logistical infrastructure, 363            characteristics, 185
           Incentivized video ads, 274                          consumer applications, 187
           Inefficient financial flows, 364                     definitions, 185
           Information assurance (IA) model, 303, 312, 325      drivers, 186
              authentication, authorization, and nonrepudiation, 312  process, 186
              confidentiality, integrity, and availability, 312  structure, 185
              defense side EC systems, 313, 314               Internet radio station, 244
              EC security, 312                                Internet Silk Road, 298, 299
           Information security, 294–299                      Internet TV and Radio, 84
              cost of cybercrime, 299                         Internet underground economy, 298
              cyberwars and cyberespionage, 296               Internet/Web search, 44
                attacking information systems, 297            Internet-enabled cell phones, 190
                attacks, 297                                  Intrabusiness EC, 8
                cyberwarfare, 296                             Intranets, 6, 7, 17, 18
              darknet and the underground economy, 298        Intrusion Detection Systems (IDS), 317
                Internet, 298                                 Iranian nuclear program, 297
                keystroke logging, 299                        IRobot, 223, 224
                social networking, 299                        ITunes, 84
              EC security, 294
                drivers, 297, 298
                dynamic nature, 299                           J
                national security, 295                        Jam events, 153
                personal security, 295                        Job market, online, 77–78
                security risks, 296                             benefits and limitations, 78
                in the United States, 295                       internet job market, 77–78
              mobile devices, 296                               portals for job placement, 78
              sophistication of attacks, 299                    on social networks, 77–78
           Innovation Jam, 153                                Job referral social networking sites, 78
           Innovative e-fulfillment strategies, 370           Junk e-mail, 310
           INRIX (inrix.com), 183
           Instagram, 219
           Insurance online, 79                               K
           Integrated Global Logistics Program, 368           Key (key value), 315
           Integrity, 312                                     Key performance indicators (KPIs), 387
           Intelink, 142                                      Keystroke logging (keylogging), 299
           Intellectual property law, 396                     Keyword advertising, 275
           Intelligent personal assistants, 175               Kiva robots, 367
           Intentional attacks, 301                           Knowledge management (KM), 151
           Intentional crimes, 301                              and E-Commerce, 152, 153
           Interactive ads, 273                                 expert location systems, 153–154
           Interactive marketing, 271                           knowledge sharing, 152
           Interactive mobile advertising, 281                  live chat with experts, 154
           Interactive video, 279                               Q&A on social networks, 153–154
           Interactive voice response (IVR) systems, 175        types and activities, 151–152
           InterActiveCorp (IAC), 46                          Knowledge portals, 43
           Interchange rate, 340                              Knowledge sharing, 152
           Intermediaries, 40                                 Knowledge-based systems, 155
   436   437   438   439   440   441   442   443   444   445   446