Term
|
Definition
A type of auction in which bidder publicly announce their successively higher bids until no higher bid is forthcoming, also called an English auction. |
|
|
Term
|
Definition
Synonymous with Dutch auction, which is an open auction in which bidding starts at a high price and drops until a bidder accepts the price. |
|
|
Term
|
Definition
A type of auction in which buyers and sellers each submit combined price-quantity bids to an auctioneer. The auctioneer matches the seller's offers (starting with the lowest price, then going up) to the buyer's offers (starting with the highest price, then going down) until all of the quantities are sold. |
|
|
Term
First price sealed-bid auction |
|
Definition
A type of auction in which bidders submit their bids independently and privately, with the highest bidder winning the auction. |
|
|
Term
Intelligent software agent (software robot or bot) |
|
Definition
A program that performs information gathering, information filtering, and/or mediation on behalf of a person or entity. |
|
|
Term
open-outcry auction (open auction) |
|
Definition
An auction in which bids are publicly announced (such as an English auction) |
|
|
Term
Open-outcry double auction |
|
Definition
A double auction in which buy and sell offers are announced publicly. Typically conducted in exchange floor or trading pit environments for items of known quality, such as securities or graded agricultural products, that are regularly traded in large quantities. |
|
|
Term
|
Definition
The inherent greater value to customers of existing companies than new sites. |
|
|
Term
|
Definition
In an electronic auction, a predetermined maximum bid submitted by a bidder. |
|
|
Term
|
Definition
The minimum price a seller will accept for an item sold at auction. |
|
|
Term
|
Definition
The process in which an auction customer seeks products by describing an item or service in which he or she is interested, and then entertains responses from merchants who offer to supply the item at a particular price. |
|
|
Term
Reverse auction (seller-bid auction) |
|
Definition
A type of auction in which sellers bid prices for which they are willing to sell items or services. |
|
|
Term
Third party logistics (3PL) provider |
|
Definition
A transprotation or freight company that operates all or most of a customer's material movement activities. |
|
|
Term
|
Definition
Synonymous with second-price sealed -bid auction. Named for William Vickrey, who won the 1996 Nobel Prize in Economics for his studies of the properties of this auction type. |
|
|
Term
|
Definition
An electronic gathering place for people with common interests. |
|
|
Term
Wireless application protocol (WAP) |
|
Definition
A protocol that allows Web pages formatted in HTML to be displayed on devices with small screens, such as PDAs and mobile phones. |
|
|
Term
|
Definition
The failure of one party to comply with the terms of a contract. |
|
|
Term
|
Definition
A patent that protects a specific set of procedures for conducting a particular business activity. |
|
|
Term
|
Definition
The part of English and U.S. law that is established by the history of law. |
|
|
Term
|
Definition
An agreement between two or more legal entities that provides for an exchange of value between or among them. |
|
|
Term
|
Definition
Bits of information about web site visitors created by web sites and stored on client computers. |
|
|
Term
|
Definition
A legal protection of intellectual property. |
|
|
Term
|
Definition
The practice of registering a domain name that is the trademark of another person or company with the hope that the trademark owner will pay huge amounts of money for the domain rights. |
|
|
Term
|
Definition
A statement that is false and injures the reputation of a person or company. |
|
|
Term
|
Definition
A digital code or stream embedded undetectably in a digital image or audio file |
|
|
Term
Domain name ownership change |
|
Definition
The changing of owner information maintained by a public domain registrar in the registrar's database to reflect the new owner's name and business address. |
|
|
Term
|
Definition
The approved limited use of copyright material when certain conditions are met. |
|
|
Term
|
Definition
A general term that includes all products of the human mind, including tangible and intangible products. |
|
|
Term
|
Definition
An accommodation by a court in one country in which it voluntarily enforces another country's laws or court judgements when no strict requirement to do so exists. |
|
|
Term
|
Definition
The idea that those subject to laws should have some role in formulating them. |
|
|
Term
|
Definition
A state law that creates personal jurisdiction for courts. |
|
|
Term
|
Definition
The association between a tax-paying entity and a governmental taxing authority. |
|
|
Term
|
Definition
The expression of a change in rules (usually, legal or cultural rules) typically represented by a physical boundary. |
|
|
Term
|
Definition
A personal information collection policy in which the company collecting the information does not use the information for any other purpose (or sell or rent the information) unless the customer specifically chooses to allow that use. |
|
|
Term
|
Definition
A personal information collection policy in which the company collecting the information assumes that the customer does not object to the company's use of the information unless the customer specifically choose to deny permission. |
|
|
Term
|
Definition
An exclusive right to make, use, and sell an invention granted by a government to the inventor. |
|
|
Term
|
Definition
A legal cause of action in which a court deems some tpyes of statements to be so negative that injury is assumed. |
|
|
Term
|
Definition
A court's authority to hear a case based on the residency of the defendant; a court has personal jurisdiction over a case if the defendant is a resident of the state in which the court is located. |
|
|
Term
|
Definition
A statement that is false and injures the reputation of a product or service. |
|
|
Term
|
Definition
Taxes levied by states and local governments on the personal property and real estate used in a business. |
|
|
Term
|
Definition
A distinctive mark, device, motto, or implement used to identify services provided by a company. |
|
|
Term
|
Definition
State laws that specify that contracts for the sale of goods worth more than $ 500 and contracts that require actions that cannot be completed within one year must be created by a signed writing. |
|
|
Term
|
Definition
An action taken by a legal entity that causes harm to another legal entity. |
|
|
Term
|
Definition
The name (or a part of that name ) that a business uses to identify itself. |
|
|
Term
|
Definition
Sales taxes, use taxes, excise taxes, and customs duties that are levied on the products or services that a company sells or uses. |
|
|
Term
|
Definition
A tax levied by a state on property used in that state that was not purchased in that state. |
|
|
Term
Active Server Pages (ASP) |
|
Definition
Applications that generate dynamic content within web pages using either Jscript code or Visual Basic. |
|
|
Term
|
Definition
Software that looks for from addresses in incoming messages that are known to be spammers. The software can delete the message or put it into a separate mailbox for review. |
|
|
Term
Challenge-response email filtering |
|
Definition
A content-filtering security technique that requires an unknown sender to reply to a challenges are designed so that a human can respond easily, but a computer would have difficulty formulating the response. |
|
|
Term
|
Definition
Nonstatic information constructed in response to a Web client's request. |
|
|
Term
|
Definition
A web page whose content is shaped by a program in response to a user request. |
|
|
Term
|
Definition
A server-side scripting program developed by Sun Microsystems. |
|
|
Term
|
Definition
An application that runs on a Web server and generates dynamic content. |
|
|
Term
|
Definition
A peice of network hardware that monitors the workloads of servers attached to it and assigns incoming web traffic to the server that has the most available capacity at that instant in time. |
|
|
Term
|
Definition
Higher-order client-server architectures that have morethan three tiers. |
|
|
Term
|
Definition
Software that is developed by a community of programmers who make the software available for download and use at no cost. |
|
|
Term
Hypertext Preprocessor (PHP) |
|
Definition
A web proramming language that can be used to write server-side scripts that generate dynamic web pages. |
|
|
Term
|
Definition
A powerful computer dedicated to managing disk drives, printers, or network traffic. |
|
|
Term
Server side scripting (server-side includes or server-side technologies) |
|
Definition
A web page response approach in which programs running on the web server create web pages before sending them back to the requesting web clients as parts of response messages. |
|
|
Term
|
Definition
The coordination of all of a company's existing systems to each other and to the company's web site. |
|
|
Term
Application program (applicaton, application software) |
|
Definition
A program that performs a specific function, such as creating invoices, calculating payrolls, or processing payments received from customers. |
|
|
Term
|
Definition
A middle-tier software and hardware combination that lies between the Internet and a corporate back-end server. |
|
|
Term
Application service providers |
|
Definition
A web based site that provides mangement of applications such as spreadsheets, human resources management, or e-email to companies for a fee. |
|
|
Term
|
Definition
Rules of a particular business |
|
|
Term
Co-location (collocation, colocation) |
|
Definition
An internet service arrangement in which the service provider rents a physical space to the client to install its own server hardware. |
|
|
Term
Commerce service providers (CSP) |
|
Definition
A web host service that also provides commerce hosting services on its computer. |
|
|
Term
Content management software |
|
Definition
Software used by companies to control the large amounts of text, graphics, and media files used in business. |
|
|
Term
Customer relationship management (CRM) software |
|
Definition
Software that collects data on customer activities, this data is then used by managers to conduct analytical activities. |
|
|
Term
|
Definition
A technique that examines stored information and looks for patterns in the data that are not yet known or suspected, also called analytical processing. |
|
|
Term
|
Definition
A web hosting option in which the hosting company provides exclusive use of a specific server computer that is owned and administered by the hosting company. |
|
|
Term
Distributed database systems |
|
Definition
A database within a large information system that stores the same data in many different physical locations. |
|
|
Term
|
Definition
An area of a web site that stores information about products in a database. |
|
|
Term
Enterprise application integration |
|
Definition
The coordination of all of a company's existing systems to each other and to the company's web site. |
|
|
Term
Enterprise resource planning (ERP) |
|
Definition
Business software that integrates all facets of a business, including planning, manufacturing, sales, and marketing. |
|
|
Term
|
Definition
The coordination of a company's information systems so that they all work together |
|
|
Term
|
Definition
Software that handles connections between electronic commerce software and accounting systems. |
|
|
Term
Supply chain management (SCM) software |
|
Definition
Software used by companies to coordinate planning and operations with their partners in the industry supply chains of which they are members. |
|
|
Term
|
Definition
A combination of software tools that let application software in one organization communicate with other applications over a network using the SOAP, UDDI, and WSDL protocols. |
|
|
Term
Access control list (ACL) |
|
Definition
A list of resources and the usernames of people who are permitted access to those resources within a computer system |
|
|
Term
|
Definition
Programs that are embedded transparently in web pages that cause action to occur. |
|
|
Term
|
Definition
An object, or control, that contains programs and properties that are put in web pages to perform particular tasks. |
|
|
Term
Advanced Encryption Standard (AES) |
|
Definition
The new encryption standard designed to keep government information secure using the Rijndael algorithm. Introduced in February 2001 by the National Institute of Standards and Technology (NIST) |
|
|
Term
|
Definition
Synonymous with public-key encryption, which is the encoding of messages using two mathematically related but distinct numeric keys |
|
|
Term
|
Definition
An electronic hole in electronic commerce software left open by accident or intentionally. |
|
|
Term
Biometric security device |
|
Definition
A security device that uses an element of a person's biological makeup to confirm identification. These devices include writing pads that detect the form and pressure of a person writing a signature, eye scanners that read the pattern of blood vessels in a person's retina, and palm scanners that read the palm of a person's hand (rather than just one fingerprint). |
|
|
Term
Buffer overflow ( buffer overrun) |
|
Definition
An error that occurs when programs filling buffers malfunction and overfill the buffer, spilling the excess data outside the designated buffer memory area. |
|
|
Term
Certificate authority (CA) |
|
Definition
A company that issues digital certificates to organizations or individuals. |
|
|
Term
|
Definition
The field responsible for the collection, preservation, and analysis of computer-related evidence. |
|
|
Term
|
Definition
The science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them. |
|
|
Term
Data Encryption Standard (DES) |
|
Definition
An encryption standard adopted by the U.S. government for encrypting sensitive informaiton. |
|
|
Term
Dictionary attack program |
|
Definition
A program that cycles through an electronic dictionary, trying every word in the book as a password. |
|
|
Term
Digital certificate (digital ID) |
|
Definition
An attachment to an e-mail message or data embedded in a web page that verifies the identity of a sender or web site. |
|
|
Term
|
Definition
An encryption message digest |
|
|
Term
|
Definition
A computer on the internet that maintains directories that link domain names to IP addresses. |
|
|
Term
|
Definition
A computer that provides a defense between one network (inside the firewall ) and another network (outside the firewall, such as the Internet) that could pose a threat to the inside network. All traffic to and from the network must pass through the firewall. Only authorized traffic, as defined by the local security policy, is allowed to pass through the fire wall. Also used to describe the software that performs these functions on the firewall computer. |
|
|
Term
|
Definition
A security utility that mathematically combines every character in a message to create a fixed-length number (usually 128 bits in length) that is a condensation, or fingerprint, of the original message. |
|
|
Term
|
Definition
A virus that is transmitted or contained inside a downloaded file attachment; it can cause damage to a computer and reveal otherwise confidential informaiton. |
|
|
Term
Man -in- the- middle- exploit |
|
Definition
A message integrity violation in which the contents of the e-mail are changed in a way that negates the message's original meaning. |
|
|
Term
|
Definition
A firewall that examines all data flowing back and forth between a trusted network and the Internet. |
|
|
Term
Pretty Good Privacy (PGP) |
|
Definition
A popular technology used to implement public-key encryption to protect the privacy of e-mail messages. |
|
|
Term
|
Definition
A single key that is used to encrypt and decrypt messages. Synonymous with symmetric key. |
|
|
Term
|
Definition
The encoding of a message using a single numeric key to encode and decode data, it requires both the sender and receiver of the message to know the key, which must be guarded from public disclosure. |
|
|
Term
|
Definition
A security utility that encapsulates a message and provides secrecy, integrity, and client/server authentication. |
|
|
Term
Secure sockets layer (SSL) |
|
Definition
A protocol for transmitting private informaiton securely over the internet. |
|
|
Term
|
Definition
A program that taps into the Internet and records information that passes through a router from the data's source to its destination. |
|
|
Term
|
Definition
The hiding of information (such as commands) within another piece of information. |
|
|
Term
|
Definition
The encryption of a message using a single numberic key to encode and decode data. Synonymous with private-key encryption. |
|
|
Term
|
Definition
Network attackers who drive around in cars using their wireless-equipped laptop computers to search for unprotected wireless network access points. |
|
|
Term
|
Definition
Synonymous with merchant bank, which is a bank that does business with merchants who want to accept credit cards |
|
|
Term
Automated Cleaning House (ACH) |
|
Definition
One of several systems set up by banks or government agencies, such as the U.S Federal Reserve Board, that process high volumes of low dollar amount electronic fund transfers. |
|
|
Term
|
Definition
Background research procedures. |
|
|
Term
E-wallet (Electronic wallet) |
|
Definition
Messages that are sent from one user to another (or multiple recipients) using particular mail programs and protocols. |
|
|
Term
|
Definition
A single standard for the handling of payment card transactions developed cooperatively by Visa, MasterCard, and MasterCard Europe. |
|
|
Term
|
Definition
Money deposited in a customer's account that earns interest for the merchant. |
|
|
Term
|
Definition
A criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit in the victim's name. After establishing credit accounts, the perpetrator runs up charges on the accounts and then disappears. |
|
|
Term
|
Definition
Software that runs transparently on a variety of hardware and software configurations. |
|
|
Term
|
Definition
An account that a merchant must hold with a bank that allows the merchant to process payment card transactions. |
|
|
Term
|
Definition
A bank that does business with merchants who want to accept credit cards. |
|
|
Term
|
Definition
A payment card arrangement involving a consumer and his or her bank, a merchant and its bank, and a third party (such as Visa or MasterCard) that processes transactions between the consumer and merchant. |
|
|
Term
|
Definition
Payment cards that give individual managers the ability to make multiple small purchases at their discretion while providing cost tracking information to the procurement office. |
|
|
Term
|
Definition
A limited-use digital or paper value store issued by a private company rather than a government. It generally must be exchanged for goods or services with the company that issued it and usually cannot be exchanged for cash. |
|
|
Term
|
Definition
Either an elaborate smart card or a simple palstic card with a magnetic strip that records currency balance, such as a prepaid phone, copy, subway, or bus card. |
|
|