Java Games: Flashcards, matching, concentration, and word search.

E-commerce - General vocabulary

CIW Study Guide - E-commerce. Flash cards for general vocabulary.

AB
E-commerceCombination of communications, data management, and security capabilities that allows organizations to exchange information about the sale of goods and services.
B2B E-commerce modelHigh volume / low price margins - expected to reach $137 billion by 2000.
B2C E-commerce modelLow volume / high price margins - expected to reach $10 billion by 2000
Areas of liability in e-commerceCopyright, trademark and patent. Privacy and confidentiality. Jurisdictional issues
On-Line Copyright Infringement Liability LImitation ActExempts online providers from liabiltiy for direct infringement
No Electronic Theft ActFinancial gain to include the receipt of anything of value
Digital Millennium Copyright ActAllows US laws to conform to WIPO treaties for international standards - Anticircumvention, Copyright management information protection, service provider immunity, licensing of webcasting
World Intellectual Property OrganizationPromote technology sharing among member companies. Administers Berne Treaty and the Paris Convention
Cash modelUses real money to buy digital money (placed in a "wallet") then using digital money to purchase.
Advantages of cash modelImmediate funds transfer, (no back-end processing). No transaction cost. Anonymity.
Check modelDigitally encrypted checks presented for payment. Verified by merchant.
Credit card modelAccept credit card numbers. Ver
Symmetric encryptionSecure, encrypted communication where both parties encrypt using a single, secret key. Types include DES, Triple DES, Skipjack, Blowfish, RC2, RC4, and RC5
DES (Data Encryption Standard)Symmetric encryption type - 56 bit key, 19 stages - Cracked by brute force attack
Triple DESSymmetric encryption using two 56 bit keys
SkipjackSymmetric encryption using NSA Algorithm, 80-bit key and a 64-bit 32 round block cipher
IDEA (International Data Encryption Alogrithm)Symmetric encryption using block cipher, 128-bit key operates on 64-bit plaintext blocks in eight iterations
BlowfishSymmetric encryptions using variable length key, maximum of 448-bit. Developed by Bruce Schneier.
RC2Symmetric encryption using 64-bit cipher with variable key length
RC4Symmetric encryption using variable key length, but no division of plaintext into blocks. Code was posted to Internet in 1994
RC5Symmetric encryption using paramertized system. Block size, key length, and number of rounds may all be changed. Basically a block cipher, but can be streamed
Asymmetric EncryptionPublic-Key/Private-Key encryption. Messages encrypted with Public Key can only be decrypted with Private-Key and visa-versa.
RSA (Rivest, Shamir, Adleman)Standard ASymmetric Encryption type. Uses 512 bit keys or better
Advantage of Asymmetric over Symmetric encryptionNo need for secure channel
One-Way EncryptionEasy to encrypt, impossible to decrypt - Passwords and PINs
Message Digests (Hash Encryption)Provides for message authenticity. Alogrithm creates short message from long one for comparison at receiving end
SET (Secure Electronic Transaction)Current standard payment plan for Internet transactions. Specifies the subset of dialogues between customer and merchant, and between the merchant and the payment gateway
SSL (Secure Sockets Layer)Secures the transport layer (TCP). Encrypts information to prevent unauthorized disclosures, authentication provides for proof of both parties, and reliability proves non-alteration of message
Requirements for SSL communicationClient must support https. Server must have certificate.
S/MIMEAdds security to e-mail through the use of digital signatures and encryption. Assumes both sender and receiver have public/private key pairs
OBI (Open Buying on the Internet)Used in B2B for high volume, low price transactions. Id's the purchaser, validates authorized spending limits before purchase completion.
OTP (Open Trading Protocol)B2B or B2C - Uses XML. Defines trading protocol options, which control how the trade occurs and what payment options are available
EDI (Electronic Data Interchange)Designed to be the standard for digital document exchange between organizations. Not widely used due to proprietary implementations and cost.
Examples of Hard GoodsBooks, clothes, digital cameras
Examples of Soft GoodsShareware, e-published documents, Mpegs
Examples of ServicesTickets, Market trades
Planning PhaseFirst phase of story board process. Plots the look, feel and function of the site
Hardware PhaseSecond phase of storyboard process. Decisions involve type and placement of required hardware
E-commerce ArchetypesMake e-commerce feel more like traditional commerce. Examples - Shopping Carts, Advertising, Subscriptions
Maintenance, Security, Performance monitoringFunctions of a webmaster
MMC, Web Based, Command lineSite Server Commerce Edition Administration Methods
Install payment software and provide online merchant account informationMust be provided to Site Server Commerce Edition to complete configuration of online payments.


Jana

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities