Macroenvironment Flashcards
Technological
Legal
Social
Economic
Political
Macro-environment Forces
protocol at the foundation of the web, used for encoding information transferred between web browser and server. Secure version
http
The ____ ____ is the part of a network address that identifies it
as belonging to a particular domain( e.g., marketingweek.com)
domain name
The ___ ___ is everything that follows the final dot of a
domain name (e.g., .com, .org).
top-level domain
The ___ ___ is a hierarchical system to organize files.
folder structure
The ___ ___ ___ “?” is often used for tracking the source
of visits so they can be assessed more accurately in web analytics.
query string following
- Plan for organizing a website’s URLs
- It aims to create user-friendly and search engine-optimized URLs
URL Strategy
- Content: information, graphics, and interactive elements that make up the web pages of a site
- Different standards exist for text, graphics, and multimedia.
Web Standards
pieces of information that describe
and provide context about a digital asset, such as a webpage, image, or video, in a standardized way.
Metadata
refers to the tools and technologies used to manage and optimize marketing strategies, campaigns, and customer experiences.
Martech
- Confidential details or passwords accessed on the user’s computer
- Transaction or credit card details stolen in transit (e.g., “packet sniffing” software)
- Customer’s credit card details stolen from merchant’s server (e.g., through hacking)
- Customer’s details accessed by company staff
Security Risks in an E-commerce Transaction
a distributed ledger comprising batches of encrypted transaction
records called blocks, which can be secured over a peer-to-peer network such as the internet. Transaction history can’t be modified to provide an audit trail.
Blockchain technology
digital or virtual currency that
is secured by cryptography.
Cryptocurrency
Early adopters
Fast followers
Majority
Laggards
Assessing the Marketing Value of
Technological Innovation
The US currently does not have a
comprehensive federal privacy law. Federal and state laws cover diverse data privacy aspects.
Privacy Law