E-commerce Implementation Flashcards
What are the pros and cons of being the first to the digital marketplace?
Pros
o It’s something new and gets a lot of sales up front
Cons
o The high upfront costs associated with trial and error
o The second to digital market usually makes out better
Gaining traction in a digital marketplace may involve a combination below. Define below
disintermediation
reintermediation
Disintermediation – the removal of a traditional service broker from a transaction chain
Reintermediation – the insertion of the online form into the chain – middle man out and in
What is channel conflict?
Online and also in store
o Compensate B and M
o Close down one or each do different
Michael Porter argues that successful organizations in mature industries must compete on exactly one of 3 bases
Cost
Uniqueness of product
Quality of service to a particular market segment
One concern that a top-down IA should address that bottom-up IA does not
I know what I’m searching for – how do I search for it? Resolved with a search box
3 best practices for crafting web page prose
Create scannable content
Keep choices simple
Omit needless words
Search zone
- A group of contexts whose searches yield the same results
- Can make searching more precise at the cost of extra effort
- Can be configured by physically segmenting documents or tagging content
High recall ratio vs high precision ratio
- Getting more results with less precision versus getting fewer results with more precision
- Depends on why a user is seeking a result
TEMPEST
Telecommunications Electronic Materials Protected from Emanating Spurious Transmissions
A government term that refers to the “unintended emissions from electronic equipment”
- EMR scavenging – obtaining information from incidental EMR
- Monitors radiation emitted by telephone wires, CPUs, modems, network cables, and ATMs
Injection attack
A broad class of attack vectors that allow an attacker to supply untrusted input to a program, which gets processed by an interpreter as part of a command or query which alters the course of execution of that program
- Target the codes that create logic by combing a preexisting partial command with raw (unsanitized) user input
- It responds to a request for input with context that causes an application to execute a command on the attackers behalf
KRACK
Key Reinstallation Attack
The attacker sets up a Wi-Fi network with the same name (SSID) as that of an existing network and target a specific user. When the attacker detects that the user is about to connect to the original network, they can send special packets that make the device switch to another channel and connect to the fake network with the same name.
• Wifi hacking that permits a hostile user to use “ordinary” URLs to gain “unauthorized” access to directories in a web server’s file system that are outside of the URL’s associated subdirectory
Trojan horse
disguised as something safe and then attacks once activated
Computer virus
activated by a user’s action
attacks specific files until activated to attack other files
Worm
spreads and replicates itself throughout everything it has contact with, rendering a computer useless
attacks up front
Backdoor
installed to provide access to the victim’s machine
Shih’s 4-part framework for effective sales professionals
Be findable
Grow your network
Research, listen, and act on important signals
Exercise and engage
Rosenfeld et al
Guidelines for devising labels
Develop consistent labeling systems, not labels
o Consistency in style (punctuation), presentation (font, color), syntax, granularity
o For more representational and less ambiguous
Rosenfeld et al
3 Categories of Navigation
Major navigation
o Includes global, local and contextual
o The “main” IA that appears on every page except forms
Supplemental
o Includes sitemaps, indexes, and guides
o Compensate for the failure of an IA’s organization
Advanced
- include personalization and customization, visualization, and social navigation.
Rosenfeld et al
Heuristic evaluation
An evaluation of an organization’s current IA
This is typically at the start of redevelopment
Asses the current IA’s quality, if it uses appropriate language and supports mutually reinforcing mechanism for searching and browsing
Best practices to follow when creating wireframes (2 of 5)
Maintain consistent graphical language and terminology
Use callouts to provide details about page element operation
What is Top-down architecture?
4 questions?
An IA’s entry point—e.g., a site’s home page—should address a typical user’s overarching questions about the IE it presents
- Where am I? (logo)
- I know what I’m looking for; how do I search for it? (search box)
- How do I get around this site? (top-level navigation bar)
- What’s important and unique about this organization? (“Where Gustavus can take you” tile)
What is Bottom-up architecture?
3 questions?
Being directed by search engines to to arbitrary places in IAs.
- has a clear strong structure, as reflected by the contents’ sequential placement: i.e., title, list of ingredients, directions, with content displayed in chunks
- uses terms that could support further searching
use content to support answering questions like
“Where am I?”, “What’s here?”, and “Where do I go from here?”
Invisible architecture
prearranged responses to likely searches (best bets), possibly identified from analyses of a site’s search logs
controlled vocabularies and thesauri, which support broadened searches using synonyms for user-specified terms
retrieval algorithms, which rank items by relevance
What is the foundation of many good IAs?
Top-down, hierarchical schemes
Their advantages include their simplicity and familiarity
What’s an issue with Hybrid schemes?
Exception?
Rarely scale well, should be avoided, with one exception.
An IE’s home page should have relatively few items, hence be easily maintainable: “[S]hallow hybrid schemes are fine, but deep hybrid schemes are not.”
Krug
“Happy Talk”
Needless words that increase the noise level and are self-promoting
Serve no purpose and simply adds clutter without providing any information
Covert
Purpose of Diagrams?
Types?
Used to explore strategies for structuring information and communicating
- hierarchical (block) diagrams - show how objects and their attributes interrelate to create a concept
- flow diagrams - classic flow charts that show the starting points, steps, choices, and end points of workflows
- Gantt charts - relate processes to one another over time
- quadrant diagrams - position similar entities with regard to two specified ordinal attributes: e.g., cost vs. quality
- Venn diagrams - highlight areas of similarity and differences among a group of objects
- activity diagrams (a.k.a. swim lane diagrams, Petri nets) - show the potential sequencing of and dependencies among steps in concurrent activities
- mind maps - show relations between concepts, objects, ideas, channels, people, and places in a particular context
- schematics (a.k.a. wireframe diagrams, blueprints, sketches) - simplified depictions of objects and interfaces
- exploded schematics - schematics with a vertical dimension to indicate order of assembly
- sequence diagrams (a.k.a. journey maps) - show the steps involved in a process, relative to the process’s entities
Examples of security/legal issues related to e-Commerce
Strategies
Examples
• Negative comments or posts that defame company name
• Leaking information about “secret” market trends
• Leaking sensitive information data onto their sites
• Leaking sensitive data from their site
Strategies
• Remove negative comments immediately
• Include all applicable disclaimers and legal documentation
• Make clients themselves aware of risk areas so they can limit their own risky behavior
GDPR
Global data privacy regulations
- Regulation on data protection and privacy in the UE and EEA areas
- Also address the transfer of personal data outside the EU and EEA areas
COPPA
Children’s online privacy protection act
• Protects the privacy of children under the age of 13 by requesting parental consent for the collection or use of any personal information of the users
CIPA
Children’s internet protection act
• Addresses concerns about children’s access to obscene or harmful content over the internet
• Imposes certain requirements on schools or libraries that receive discounts for internet access – filter adult content
Mobile-first mindset
3 methods
Making the website geared toward mobile phone o Larger buttons o Easy to navigate o Responsive display o Quick to load pages o Quick to find contact - allow zooming - make apps learnable, effective, and efficient
Send text messages of promotions / features / new blog posts
Blog posts should be kept short
Exactitude
A term that seems to refer to the number of items in a taxonomy’s leaf nodes (precision) as well as the certainty with which an item can be assigned to exactly one leaf node (ambiguity).
Determine an appropriate level of exactitude
Strike a balance between ambiguity and exactitude
- Greater ambiguity in a taxonomy provides more flexibility at the potential cost of cognitive overhead: e.g., do I classify a tomato as a fruit (which it technically is), a vegetable (which most people deem it to be), or both?
- Greater exactitude increases precision at a potential cost of a different sort of cognitive overhead: e.g., do I search for serrano papers under peppers > hot > serrano, peppers > serrano, peppers, serrano, or serrano peppers?
Covert
4 structures
SEQUENCES - Ordered lists
HIERARCHIES- Tree-like structures where the siblings of every parent item are of uniform type. Hierarchies tend to be either broad and shallow or narrow and deep
HETERARCHIES - Flat, interlinked structures
GRAPHS, a.k.a. HYPERTEXTS - Bodies of content connected by one-way and two-way links