Page 441 - Introduction to Electronic Commerce and Social Commerce
P. 441
430 Index
Hertz’s mobile services, 168 Internal collaboration, 127
Hidden digital payments, 337 Internal Efficiency and Effectiveness (IEE), 142
HighJump software, 369 Internet abuse
Home appliance botnets, 306 managing, 395
HomeScan, 177 in workplace, 395
Horizontal information, 103 Internet Advertising Bureau (IAB), 278
Horizontal marketplaces, 107 Internet advertising revenue, 270
Hulu, 245 Internet communities, 50
Human errors, 300 Internet crime, 323
Hybrid cards, 343 Internet for person-to-person money lending, 158
Hygiene factors, 264 Internet fraud, 325
Internet gambling, 85
Internet gaming, 85
I Internet Job Market, 77
IBM Connections, 251 Internet malls, 41
IBM Jam Events, 153 Internet marketing, 69–71
IBM PureSystems, 154 Internet of Things (IoT), 185, 194, 306
IBM’S Business and Professional Community, 240 applications, 186
Identity fraud, 310 audio and video equipment, 187
Identity theft, 310 benefits, 185
Inadequate logistical infrastructure, 363 characteristics, 185
Incentivized video ads, 274 consumer applications, 187
Inefficient financial flows, 364 definitions, 185
Information assurance (IA) model, 303, 312, 325 drivers, 186
authentication, authorization, and nonrepudiation, 312 process, 186
confidentiality, integrity, and availability, 312 structure, 185
defense side EC systems, 313, 314 Internet radio station, 244
EC security, 312 Internet Silk Road, 298, 299
Information security, 294–299 Internet TV and Radio, 84
cost of cybercrime, 299 Internet underground economy, 298
cyberwars and cyberespionage, 296 Internet/Web search, 44
attacking information systems, 297 Internet-enabled cell phones, 190
attacks, 297 Intrabusiness EC, 8
cyberwarfare, 296 Intranets, 6, 7, 17, 18
darknet and the underground economy, 298 Intrusion Detection Systems (IDS), 317
Internet, 298 Iranian nuclear program, 297
keystroke logging, 299 IRobot, 223, 224
social networking, 299 ITunes, 84
EC security, 294
drivers, 297, 298
dynamic nature, 299 J
national security, 295 Jam events, 153
personal security, 295 Job market, online, 77–78
security risks, 296 benefits and limitations, 78
in the United States, 295 internet job market, 77–78
mobile devices, 296 portals for job placement, 78
sophistication of attacks, 299 on social networks, 77–78
Innovation Jam, 153 Job referral social networking sites, 78
Innovative e-fulfillment strategies, 370 Junk e-mail, 310
INRIX (inrix.com), 183
Instagram, 219
Insurance online, 79 K
Integrated Global Logistics Program, 368 Key (key value), 315
Integrity, 312 Key performance indicators (KPIs), 387
Intelink, 142 Keystroke logging (keylogging), 299
Intellectual property law, 396 Keyword advertising, 275
Intelligent personal assistants, 175 Kiva robots, 367
Intentional attacks, 301 Knowledge management (KM), 151
Intentional crimes, 301 and E-Commerce, 152, 153
Interactive ads, 273 expert location systems, 153–154
Interactive marketing, 271 knowledge sharing, 152
Interactive mobile advertising, 281 live chat with experts, 154
Interactive video, 279 Q&A on social networks, 153–154
Interactive voice response (IVR) systems, 175 types and activities, 151–152
InterActiveCorp (IAC), 46 Knowledge portals, 43
Interchange rate, 340 Knowledge sharing, 152
Intermediaries, 40 Knowledge-based systems, 155