Lesson 8: Electronic Payment Systems
Address verification system (AVS): Detects fraud by comparing the address information on file with the cardholder’s issuing bank. Automatic vehicle location (AVL): A means for automatically determining the geographic location of a vehicle and transmitting the information to a request. Card verification number: Detects fraud by comparing the verification number printed on the signature strip on the back of the card with the information on file with the cardholder-issuing bank. Contact card: A smart card containing a small gold plate on the face that when inserted in a smart card reader makes contact and passes data to and from the embedded microchip. Contactless (proximity) card: A smart card with an embedded antenna, by means of which data and applications are passed to and from a card reader unit or other device without contact between the card and the card reader. e-billing: electronic bill e-cheque: a legally valid electronic version or representation of a paper check. e-micropayments: small online payments typically under $10 Enterprise invoice presentment and payment (EIPP): Presenting and paying B2B invoices online. Letter of credit: A written agreement by a bank to pay the seller, on account of the buyer, a sum of money upon presentation of certain documents. Payment card: Electronic card that contains information that can be used for payment purposes. Payment service Provider PSP: A third-party service connecting a merchants EC system to the appropriate acquiring bank or financial institution. PSP must be registered with the various card associations they support. Public key encryption: is a class of cryptographic algorithms, which requires two separate keys, one of which is secret (or private) and one of which is public. Purchasing card: Special-purpose payment cards issued to a company<s employees to be used solely for purchasing nonstrategic materials and services up to a preset dollar limit. Smart Card: An electronic card containing an embedded microchip that enables predefined operations or the audition, deletion, or manipulation or information on the card. Smart Card operating system: Special system that handles file management, security, input/output, and command execution and provides an application programming interface for a smart card. Settlement: Transferring money from the buyers to the merchants account. secure socket layer (SSL): fdsfd Smart card: is a device that includes an embedded integrated circuit that can be either a secure microcontroller or equivalent intelligence with internal memory or a memory chip alone. The card connects to a reader with direct physical contact or with a remote contactless radio frequency interface. Stored-value card: A card that has monetary value added onto it and that is usually rechargeable. Virtual credit card: a technology that allows a user to set up a new credit account with a bank on the Internet and then use this account number to purchase goods, also on the Internet
Lesson 9: Mobile Computing an Commerce and Pervasive Computing Bluetooth: A set of telecommunications standards that enables wireless devices to communicate with each other over short distance. Context-aware computing: Application’s ability to detect and react to a set of environmental variables that is described as context. Geolocation: This process of automatically identifying a Web user’s physical location without that user having to provide any information. Geographical information system (GIS): A computer system capable of integrating, storing editing, analyzing, sharing and displaying geographically referenced spatial information. Global positioning system (GPS): A world wide satellite based tracking system that enables users to determine their position anywhere on the earth. Interactive voice response (IVR): A voice system that enables users to request and receive information and to enter and change data through a telephone to a computerized system. Location-based m-commerce: Delivery of m-commerce transactions to individuals in a specific location at a specific time. Location-based service (LBS): An information service accessible from and to mobile devices through a mobile network utilizing the ability to make use of the geographical position of the mobile device to deliver a service to the user. Mobile browser (microbrowser): Web browser designed for use on a mobile device optimized to display web content most effectively for small screens on portable devices. Mobile banking: Performing banking activities such as balance check, account transactions, payments, credit applications etc. via mobile device. Mobile commerce (m-commerce): Any business activity conducted over a wireless telecommunications network or from mobile devices. Mobile computing or Wireless mobile computing: Computing that connects a mobile device to a network or another computing device, anytime, anywhere. Mobile portal: A gateway to the Internet optimized for mobility that aggregates and provides content and services for mobile users. Mobile enterprise: Application of mobile computing inside the enterprise. Multimedia messaging service (MMS): The emerging generation of wireless messaging; MMS is able to deliver rich media. Mobile entertainment: Any type of leisure activity that utilizes wireless telecommunication network, interacts with service providers, and incurs a cost upon usage. Mobile worker: any employee who away from this of her primary workspace at least 10 hours a week or 25 percent of the time. Network-based positioning: Relies on base stations to find the location of a mobile device sending a signal or sensed by the network. Personal area network (PAN): A wireless telecommunications network for device-to-device connection within a very short range. Personal digital assistant (PDA): A stand-alone handheld computer principally used for personal information management. Pervasive computing: Computing capabilities embedded in the environment but typically not mobile. Radio frequency identification (RFID): A short-range frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers. Real-time location systems (RTLS): Systems used to track and identify the location of objects in real time. Sensor network: A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes. Social location-based marketing: Marketing activities that are related to social behavior and are related to social networking activities. Smartphone: A mobile phone with PC-like capabilities. Smart grid: An electricity network managed by utilizing digital technology. Ubiquitous computing: Computing capabilities that are being embedded into the objects around us, which may be mobile or stationary. Short message service (SMS): A service that supports the sending and receiving of short text message on mobile phones. Terminal-based positioning: Calculating the location of a mobile device from signals sent by the device to base stations. Voice portal: A website with an audio interface that can be accessed through a telephone call. Wireless application protocol (WAP): is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol. Wireless local area network (WLAN): A telecommunications network that enables users to make short-range wireless connections to the Internet or another network. Wi-fi (wireless fidelity): The common name used to describe the IEEE 802.11 standard used on most WLANs. WiMAX: A wireless stand for making broadband network connections over medium-size area such as a city. Wireless wide area network (WWAN): a telecommunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network.
Lesson 10: Legal and Ethical Issues in E-commerce Business ethics: A form of applied ethics that examines ethical principles and moral or ethical problems that arise in a business environment. Personal Information Protection and Electronic Documents Act (PIPEDA) was implemented in January 2001. Part 1, Protection of Personal Information in the Private Sector, helps businesses and consumers understand and meet their new obligations. It provides guidelines on how to protect privacy on the Internet and how to protect personal information. Canadian Internet Registration Authority (CIRA) is a not-for-profit Canadian corporation. CIRA operates the dot-ca Internet country code Top Level Domain. Computer crimes: law deals with the broad range of criminal offenses committed using a computer or similar electronic device. Nearly all of these crimes are perpetrated online. The Internet provides a degree of anonymity to offenders, as well as potential access to personal, business, and government data. Compliance data: Data pertaining to the enterprise included in the law that can be used for the purpose of implementing or validating compliance. Computer Fraud and Abuse Act (CFAA): Major computer crime law to protect government computers and other Internet-connected computers. Cookie: also known as an HTTP cookie, web cookie, Internet cookie, or browser cookie, is a small piece of data sent from a website and stored in a user's web browser while the user is browsing that website. Every time the user loads the website, the browser sends the cookie back to the server to notify the website of the user's previous activity. Cookies were designed to be a reliable mechanism for websites to remember stateful information (such as items in a shopping cart) or to record the user's browsing activity (including clicking particular buttons, logging in, or recording which pages were visited by the user as far back as months or years ago). Copyright: An exclusive right of the author or creator of a book movie musical composition, or other artistic property to print copy sell license distribute transform to another medium translate record perform or otherwise use. Cyberbullying: The use of information and communication technologies to support deliberate, repeated and hostile behavior by an individual or group that is intended to harm others. Cyberbashing: Domain name that criticizes an organization or person. Digital divide: is a term that refers to the gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access. This technology can include the telephone, television, personal computers and the Internet. Digital rights management (DRM): An umbrella term for any several arrangements that allow a vendor of content in electronic form to control the material and restrict its usage. Digital divide: The gap that has emerged between those who have and those who do not have the ability to use the technology. Domain name: is an identification string that defines a realm of administrative autonomy, authority or control within the Internet. Domain names are formed by the rules and procedures of the Domain Name System (DNS). Any name registered in the DNS is a domain name. Electronic discovery: (or e-discovery or ediscovery) refers to discovery in civil litigation or government investigations which deals with the exchange of information in electronic format (often referred to as electronically stored information or ESI). Ethics: The branch of philosophy that deals with what is considered to be right and wrong. Electronic Product Environmental Assessment Tool (EPEAT) A searchable database of computer hardware that meets a strict set of environmental criteria. Fair use: the legal use of copy righted material for noncommercial purposes without paying royalties or getting permission. Green computing: The study and practice of eco-friendly computing resources is now a key concern of businesses in all industries not just environmental organizations. Green IT: Begins with manufacturers producing environmentally friendly products and encouraging IT departments to consider more friendly options like virtualization, power management, and proper recycling habits. Infringement: Use of the work without permission or contracting for payment of a royalty. Intellectual property: Creations of the mind such as inventions, literacy and artistic works, and symbols names images and designs used in commerce. Intellectual property law: Area of the law that includes patent law copy right law trademark la trade secret law and other branches of the law such as licensing and unfair competition. Internet censorship: The control or suppression of the publishing or accessing of information on the Internet. Legal precedent: A judicial decision that may be used as a standard in subsequent similar cases. Opt-out: Business practice that gives consumers the opportunity to refuse sharing information about themselves. Opt-in: Agreement that requires computer users to take specific steps to allow the collection of personal information. Patent: A document that grants the holder exclusive rights to an invention for fixed number of years. Platform for Privacy Preferences Project (P3P): A protocol allowing websites to declare their intended use of information they collect about browsing users. Privacy: The right to be left alone and free of unreasonable personal intrusions. Regulatory compliance: Systems or departments in an organization whose job is to ensure that personnel are aware of and take steps to comply with relevant laws, standards, policies, and regulations. Spamming: is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site. Spyware: all unwanted software programs designed to steal proprietary information or that target data stores containing confidential information. Telecommuting: Working at home using a PC and the Internet. Trademark: A symbol used by business to identify their goods and services; government registration of the trademark confers exclusive legal right to its use. Trademark dilution: The use of famous trademarks in public that diminishes the capacity of the mark to distinguish goods or services, or tarnishes the mark in the eyes of the consumer. Taxation: The process whereby charges are imposed on individuals or property by the legislative branch of the federal government and by many state governments to raise funds for public purposes.
Lesson 11: Social Commerce and Other Issues in E-Commerce Business social network: A social network whose primary objective is to facilitate business connections and activities. Crowdsourcing: The act of outsourcing tasks traditionally performed by an employee or contractor, o an undefined, large group of people or community through an open call. Collective intelligence: The capacity of human communities to evolve toward higher order complexity and harmony, through such innovation mechanisms as variation feedback-selection differentiation integration transformation and competition cooperation coopetition Communal shopping: A method of shopping where the shoppers enlist others to participate in the purchase decision. Customer relationship management (CRM): A customer service approach that focuses on building long-term and sustainable customer relationships that add value both to the customer and the merchants. Geosocial networking: A type of social networking in which geographic services and capabilities such as geocoding and geotagging are used to enable additional social dynamics. Geolocation: The identification of the real-world geographic location of an Internet-connected computer, mobile device, website, visitor or other. Mobile social networking: Members converse and connect with one another using cell phones or other mobile devices. Social capital: A sociological concept that refers to connections within and between social networks. The core idea is that social networks have value. Just as physical capital or human capital, so do social contacts affect the productivity of individuals and groups. Social commerce: the delivery of e-commerce activities and transactions through social network and/or via Web 2.0 software. Social CRM: A customer engagement strategy in support of companies’ defined goals and objectives toward optimizing the customer experience. Success required focus on people, processes, and technology associated with customer touchpoints and interactions. Social customers: Members of social networks who do social shopping and understand their rights and how to use the wisdom and power of crowdsourcing and communities to their benefits. Social marketplace: An online community that harnesses the power of one’s social networks for the introduction, buying and selling of products, services, and resources, including one’s own creations. Also may refer to a structure that resembles a social network but is focused on individual members. Social marketing: A combination of social policy and marketing practices to achieve a set of social behavioral goals within a target audience. Social media: The online platform and tools that people use to share opinions, experiences, insights, perceptions, and various media, including photo, videos, and music with each other. Social media marketing: A term that describes use of social media platforms such as networks, online communities, blogs wikis, ro any other online collaborative media for marketing, market research, sales, CRM and costumer service. It may incorporate ideas and concepts from social capital, Web 2.0, social media and social marketing. Social Graph: A term coined by Mark Zuckerberg of Facebook which originally referred to the social network of relationships between users of the social networking service provided by Facebook. The idea was for Facebook to benefit from the social graph by taking advantage of the relationships between individuals that facebook provide, to offer a richer online exprience. This definition was expanded to refer to a social graph of all Internet users. Social shopping: A method of e-commerce where shoppers’ friends become involved in the shopping experience. Social shopping attempts to use technology to mimic the social interactions found in physical malls and stores. User-generated content (UGC): Various kind of media content that is produced by end users and are publicly available. Viral marketing: Word-of-mouth (WOM) method by which customers promote a product by telling others about it. Viral blogging: Viral marketing done by bloggers.
You May Also Find These Documents Helpful
-
Monopolistic competition has the attribute that there are many firms competing for the same group of customers.…
- 6135 Words
- 72 Pages
Satisfactory Essays -
Use the information from the completed table and the graphs to identify the three stages of production and explain why the firm’s short run production has only one ‘rational’ stage of production.…
- 309 Words
- 2 Pages
Satisfactory Essays -
Answer only TWO (2) questions from Part B. ANSWER EACH PART B QUESTION IN A SEPARATE EXAMINATION BOOKLET…
- 472 Words
- 2 Pages
Satisfactory Essays -
Instructor: D.G. McFetridge Fall Term 2011 Office: A806 Loeb Building Phone: 613-520-2600 ext. 3748 E-mail: donald_mcfetridge@carleton.ca Office Hours: Mondays, 2:30 p.m. – 3:30 p.m. and Thursdays, 11:30 a.m. – 12:30, or by appointment COURSE WEB SITE: www.carleton.ca/~dmcfet/courses PREREQUISITE: ECON 2030 with a grade of C- or higher or ECON 2003 (no longer offered) with a grade of C- or higher. COURSE FORMAT: Lectures: Thursdays, 8:35 a.m. - 11:25 a.m. Room: St. Patrick’s 400 EXAMINATIONS: There will be one midterm examination. It will be held in class from 9:00 a.m. - 11:00 a.m. on Thursday October 27, 2011. There will also be a 3-hour final examination…
- 1261 Words
- 6 Pages
Best Essays -
Midterm #1 Exam Answer Key ECN 151A Summer 2013 Eschker (3pts each) Version A 1. Ans: E 2. Question deleted; Everyone gets 3 points 3. Ans: D 4. Ans: A 5. Ans: D 6. Ans: B 7. Ans: C 8. Ans: C 9. Ans: B 10. Ans: E Version B 1. Ans: C 2. Ans: A 3. Ans: B 4. Ans: D 5. Ans: E 6. Ans: C 7. Ans: B 8. Ans: E 9. Question deleted; Everyone gets 3 points 10. Ans: D…
- 1368 Words
- 6 Pages
Better Essays -
A. the market value of intermediate goods and services produced in an economy, including exports…
- 708 Words
- 5 Pages
Satisfactory Essays -
These notes are copyrighted by the University of California and are for your personal use only.…
- 1231 Words
- 5 Pages
Good Essays -
the inputs into the production of goods and services that are provided by nature, such as land, rivers, and mineral deposits…
- 3460 Words
- 14 Pages
Satisfactory Essays -
1. Graphically and verbally explain why an increase in retail sales during Christmas 2011 will boost GDP growth in Q1 2012.…
- 369 Words
- 2 Pages
Satisfactory Essays -
w w w. j. b rad fo rd-de l o n g . n e t/…
- 4970 Words
- 20 Pages
Powerful Essays -
4. In 2003, Microsoft lowered the price of its Xbox from $199 to $179 in the US. Does this price change indicate that the Xbox was becoming more or less scarce at the existing price level? What does this price change imply about the level of competition from companies like Sony and Nintendo?…
- 422 Words
- 2 Pages
Satisfactory Essays -
You will always be able to see the time remaining in the Final Exam at the top right of the page.…
- 2031 Words
- 8 Pages
Powerful Essays -
read this instruction. Do NOT look at other pages, however, until you are told to start to…
- 2264 Words
- 10 Pages
Satisfactory Essays -
| When the money market is drawn with the value of money on the vertical axis, the price level increases if…
- 1119 Words
- 5 Pages
Good Essays -
Question: Categorize each seller below on the basis of the type of market it operates in. Explain each of your answers:…
- 6693 Words
- 27 Pages
Good Essays