Final Flashcards

1
Q

5 FIP principles

A
Notice/Awareness
Choice/Consent
Access/Participation
Integrity/Security
Enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Digital divide

A

x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intellectual property, copyright and fair use

A

Intellectual property: Intangible property of any kind created by individuals or corporations

Copyright: Statutory grant protecting intellectual property from being copied for the life of the author, plus 70 years

Fair use:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cookies

A

Tiny files downloaded by Web site to visitor’s hard drive to help identify visitor’s browser and track visits to site

Allow Web sites to develop profiles on visitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spam

A

unsolicited e-mail from businesses advertising goods and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Behavioral targeting

A

x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Patent trolls

A

a “non-practicing entity” with no business activities or employees of its own
weaknesses in the patent system without adding value
license patents without producing goods, extract licensing fees from the real innovators
lawsuits associated with patent trolls led to half a trillion dollars of lost wealth to defendants from 1990 through 2010 (Bessen et al. 2011)*
During 2006-2010 the losses were $80 billion a year (Bessen et al.)
In 2010, 2,600 lawsuits were filed by patent trolls
The median defense cost per defendant is $3m for a mid-sized patent case, for large cases is $6m (American Intellectual Property Law Association)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Sarbanes-Oxley Act

A

Imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware (virus, worm, Trojan etc.) what they are and how they affect computer systems

A
Spyware
Trojan
Virus
Worm
Rootkit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phishing

A

They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identity theft

A

occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes

9 million Americans have their identities stolen each year (FTC 2011)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Website security - SET and SSL

A

Secure Electronic Transaction (SET) – a set of security protocols that ensures transactions are legitimate as well as secure

  • Helps verify use of a credit card, for example, by sending the transaction to the credit issuer as well as the seller/supplier
  • Endorsed by AmEx, MasterCard, Visa, Microsoft

Secure Sockets Layer (SSL) - creates a secure connection between a Web client and server, encrypts the information, and sends the information over the Internet

  • Denoted by lock icon on browser or https:// (notice the “s”)
  • Ensures secure transactions but does NOT secure legitimacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Denial of service attacks

A

x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Three lines of defense

A

Authentication and authorization - a method for confirming users’ identities and the process of giving someone permission to do or have something
* Passwords
* Tokens
* Biometrics
Security policy and plan
Technology (antivirus, firewall, encryption, etc.)
* Anti-virus software – detects and removes or quarantines computer viruses
* Anti-spyware and anti-adware software
* Spam protection software – identifies and marks and/or deletes Spam
* Anti-phishing software – lets you know when phishing attempts are being made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Web defacing

A

x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Social engineering

A

Non-technical attack: A social attack that tricks people into revealing sensitive information or performing actions that compromise the security of a network

Social engineering: A type of non-technical attack that uses social pressures to trick computer users into compromising computer networks to which those individuals have access

17
Q

Third party seals (verisign etc.)

A
Verisign 
BBBOnline
TRUSTe
VIPPS
Google Checkout
18
Q

Public/private key encryption

A

Public key encryption (asymmetric encryption) – uses two keys: a public key for everyone and private key for only the recipient of the encrypted information

19
Q

NORA

A

Nonobvious relationship awareness

Combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists

20
Q

Enterprise Systems

A

CRM, SCM, ERP
Sales force automation in CRM systems
RFID tags

21
Q

Metrics (conversion rate etc.)

A

x

22
Q

E-commerce business models

A

Portal (Google, Yahoo, Bing)
E-tailer (both online (Amazon) and click-and-mortar (Target.com)
Content Provider (both creators (wsj) and distributors (iTunes))
Transaction Broker (Travelocity)
Market Creator (eBay)
Service Provider (Google Apps, Dropbox)
Community Provider (Facebook, social sites)

23
Q

E-commerce revenue models

A
Sales Revenue Model
Advertising Revenue Model
Subscription Revenue Model
Freemium Revenue Model
Transaction Fee Model
Affiliate Revenue Model
24
Q

Viral marketing

A

x

25
Q

Sticky websites

A

x

26
Q

Major differences between B2B and B2C

A

B2B - Business sells/buys products to/from other businesses online
B2C - Business sells products to consumers/ or consumers buy from online businesses

27
Q

Vertical and horizontal marketplaces

A

Vertical - in a specific industry

Horizontal - across industries

28
Q

Mass customization

A

Mass production + individual customization
No increase in cost for the manufacturer
Better serves customer needs
Fewer returns

29
Q

M-commerce

A

Geolocation

Mobile payments

30
Q

Price discrimination

A

enabled by digital markets

31
Q

Affiliate programs

A

Referral of consumers to other websites through links

32
Q

Excel and Access (

A

Primary and foreign keys
Types of analysis: goal seek, conditional formatting (only when and why they are used)
ERD diagrams

33
Q

Outsourcing

A

Systems development; what’s cheaper to develop on your own, to purchase or outsource?