Below is a glossary of web terms. Sources
for these definitions include:
|
Electronic Commerce: A Managerial Perspective
by Efraim Turban, Jae Lee, David King, and H. Michael Chung |
|
BetterWeb
Program from PricewaterhouseCoopers |
|
Ecommerce Webopedia
by E-Commerce Guide's |
Click on the first letter of the word you want defined.
For terms not included in this glossary, or for more detailed definitions, go to
the Webopedia or TechWeb
sites.
A B C D
E F G H I J
K L M N O P
Q R S T U V W
X Y Z
Access log file
A text file consisting of entries recording each time a Web server is accessed.
The contents of an access log,, adhere to the common log file format standards.
Access Provider
An access provider is a company that provides you with access to the Internet.
You connect your personal computer to the provider's remote computer to make the
connection. Some access providers are large commercial services that also offer
proprietary content. Others are small local or regional companies that offer
just Internet access. If you connect to the Internet directly from your computer
at work, then your company is your access provider.
(See also Internet Service Provider.)
Acquirer
A financial institution that establishes air account for merchants and acquires
the vouchers of authorized sales slips.
Address
When used within the context of the Internet, an address refers to one of these
pieces of information: Internet email addresses or a Web site address, called a Uniform
Resource Locator.
Ad views (also page views or impressions)
The
number of times an ad is seen by users. Exposure to an ad.
Advertisement
Dissemination of information in order to influence buyers to buy
Agent
A software program that runs autonomously, or semi-autonomously, and carries
out user directives continuously Agent based services
Services that are provided by agents such as real estate agents, stock or insurance
brokers. or job-finding agents.
Associated ad display strategy
The appearance of an ad as a result of a request made for related information
Authentication
The process of making sure you are the person you say you are. The most common
form of authentication is the user name and password
system, such as the one you use to login to your computer system or the PIN
number you use at an automated teller machine. Authenticity
One of the cornerstones of secure Internet communications, referring to the fact
that he sender (either client or server) of a message is who they claim to be.
Authorization
The process of granting individuals rights of access to data and programs based
on identity. Most computer
security
systems are based on a two-step process. The first stage is authentication,
which ensures that a user is who he or she claims to be. The second stage is
authorization, which allows the user access to various resources based on the
user's identity. Once identity has been authenticated,
individuals can see information and use programs that they have the
authorization to use.
Bandwidth
The speed with which content can he delivered across a network.
Banner
A graphic display on a web page used for advertisement. A banner ad is linked to
an advertiser’s Web page
Banner
exchange
A market where companies can trade or exchange placement of banner ads on each
other's Web sites.
Bastion
gateway
In a dual-homed gateway firewall, this special server connects a private
internal network to the outside Internet.
Biometric
controls
Security controls that involve unique physical or behavioral characteristics of
an individual (e.g., fingerprints).
Browser
A browser is a software program that allows you to view and interact with any
resources available on the Web.
Business to business EC (B2B)
Electronic trading where both the buyers and the sellers are organizations.
Business to consumer EC
A situation where a business is selling online to an individual consumer.
Call center
A
help desk where customers can communicate by telephone, fax, and e-mail.
Certificate
A certificate verifies the identity of the sender of a message and provides the
receiver with the means to encode a reply. The
certificate is issued by a trusted third party, certificate authority, to
identify the holder.
Certifying
authorities
Trusted
third-party Companies that issue digital certificates. Individuals use these
certificates to verify their identify and to distribute their public keys
Chat
group
A real-time online forum for discussing issues of public and personal interest.
Clicks (or
ad clicks)
Every time a visitor clicks on an advertising banner to access the advertiser's
Web site, it is counted as a "click" or "click-through."
Clickwrap
contracts
A contract to use
software in exchange for payment derived entirely over the Internet.
Code of
ethics
A set of ethical
behavioral rules developed by an organization or a professional society.
Competitive
intelligence
Information that is useful for analyzing a company's strategic position in the
industry. Information about the competitors and their actions.
Competitive
strategy
A strategy of a
company aimed at increasing its competitiveness. It can be offensive or
defensive,
Consumer
behavior
The process by which consumers make decisions to purchase goods and services.
Cookie
A cookie is a line in a text file that records your activities on a Web site.
Cookies may reside in your computer's memory until you close your browser,
or they may be saved on your hard drive. Most cookies have an expiration date
and cannot read information stored in your computer.
Cookies commonly record consumer preferences, such as the items you place in a
virtual shopping cart when shopping online. When your browser next communicates
with that site's server, the browser sends the information in the cookie to the
server. The site may use the information to recommend similar items to you or
choose ad banners to show you. Cookies may also store other kinds of personal
information, such as your password so that you do not have to re-enter it each
time you visit the site.
Cooperative
strategy
Strategic alliance or joint venture strategy with a competitor(s) in an
industry.
CPM
Cost-per-thousand
impressions. The cost of delivering an impression to 1,000 people (or homes).
Critical
success factors (CSF)
The indispensable business, technology, and human factors that would help
achieve the desired level of an organization's goal.
Cryptography
Cryptography is the encoding and decoding of messages using mathematical
functions. There
are four components involved in the process: (1) plaintext; the message to be
encrypted (2) ciphertext; the encrypted message: (3) encryption algorithm
or formula used to encrypt the message; (4) key; secret key used to encrypt and
decrypt the ciphertext.
Customer
loyalty
The
degree of a customer staying with a specific vendor or brand.
Customer
service
A series of activities designed to enhance the level Of Customer satisfaction
before. during, and after a purchase.
Customer
value
The
difference between the benefits that a customer is receiving from the acquired
products and services and the effort and cost that the customer has to invest to
get the product.
Customer oriented marketplace
Electronic marketplace, which customers like big companies open to invite
bidding.
Cyberbanking
(electronic banking)
Conducting
banking from home. It includes many activities ranging from paving bills to
securing a loan
Cycle
time
The
processing time of a business process from beginning to end. Also known as time-to-market.
Data Integrity
Integrity is a characteristic of data that means that the data was not tampered
with, destroyed, or changed in any way while in transit. The Secure
Sockets Layer protocol ensures data confidentiality and data integrity in
communications between clients and servers on the Web.
Data mining
Class of database applications
that look for hidden patterns in a group of data.
For example, data mining software can help retail companies find customers with
common interests.
Debit
card
A Card that is used instead of cash in shopping. The buyer's account is
instantly debited. It is necessary to get authorization for each transaction.
Defensive
strategy
Strategy that either raises the structural barriers or lowers the inducement for
attack.
Deterrence-base trust
Trust that is related to the threat of punishment.
Digital
certificate
A digital file issued to an individual or company by a certifying authority that
contains the individual's or company's public encryption key and verifies the
individual's or company’s identity.
Digital
envelope
The secret key encrypted by
the receiver's public key, which is necessary to open prior to decrypting
messages encrypted by a secret key.
Digital
products
Digital products that are transformed to information that can be expressed
digitally. Music, software, movies, and magazines can be digitized and delivered
electronically to buyers.
Digital
signature
A phrase (like John J. Jones) that is encrypted with a sender's private key and
attached like a signature to an encrypted message to ensure that the sender is
who he (or she) claims to be. The recipient uses the sender's public key to
decrypt the signature.
Direct
marketing
Marketing without intermediaries between the sellers and the buyers.
Disintermediation:
removing the layers of intermediaries between sellers and buyers.
Distance
learning
Learning off-campusfrom home or
other places.
Domain Name
A name used in a URL to identify a group of Web pages. For
example, in the URL http://www.pwcglobal.com, the domain name is
pwcglobal.com. The last three letters tell you which kind of top-level domain
the site represents: in the United States we use .edu for an educational
institution; .com for a commercial site; .gov for a government site; .net for a
commercial network; and .org for a non-profit organization.
Dual-homed gateway
A
basic type of firewall in which a bastion gateway server is used to connect a
private internal network to the outside. The gateway has two network cards so
that communications reaching one card are not directly relayed to the other. The
communications between the networks are controlled by special software programs
called proxies.
Economics of
electronic commerce see
Webonomics.
Edutainment
Combining education
and entertainment online.
Electronic
auctions
Auctions conducted online. Initially
on private networks, now on the internet.
Electronic Broker
An external service provider that aggregates eMarketplaces and partners through
a single point of integration and
is not responsible for the order fulfillment and guarantee (versus electronic
distributor). E-business
The use if information technology among buyers, sellers and other trading
partners for the purpose of improving customer service, reducing costs, and opening
new markets and channels to increase shareholder value Electronic
cash (e-cash)
Cash in an electronic form’ usually stored on a smart card and/or in a
software called digital wallet. Electronic catalogs
Presentation
of information about products
(services) that traditionally were in paper catalogs. However, electronic catalogs can include multimedia, such as voice and video clips.
Electronic
chat
An arrangement where participants exchange messages in real time.
Electronic
check (e-check)
A check in an electronic form, deliverable through the network.
Electronic Commerce or e-commerce
E-commerce means doing business on the Web. This includes, for
example, marketing, buying, and selling of products/services using internet
technology.
Electronic communities
Internet communities of people who share the same interest and gather to
share information, chat, and collaborate online.
Electronic
credit card
A credit card used
on the network.
Electronic Data Interchange (EDI)
The transfer of structured data by agreed message standards from computer to
computer by electronic means.
The transfer of data between different companies is accomplished using networks,
such as the Internet.
Electronic
distributor
Electronic intermediary who fulfills the order and arranges for a guarantee. The
electronic storefront and malls belong to this category (versus electronic
broker).
Electronic
fund transfer (EFT)
Transferring
money from one account to others.
Electronic
markets
A place where buyers and sellers negotiate, submit bids, agree on orders, and if
appropriate finish the transactions electronically.
Electronic
shopping cart
A virtual shopping cart that enables consumers to collect items as they browse
an online sales site until they are ready to purchase the items.
Electronic
shopping mail (e-mall)
A set of
independent electronic stores who Share an electronic marketing environment such
or, servers, software, and payment systems.
Electronic
store (e-store)
A unit of electronic distribution under one management
Electronic
surveillance
Tracking
peoples activities online (e.g., monitoring e-mail or web visits)
Electronic
(or digital) wallet Software that can store (or retrieve) electronic cash and certificates.
Encryption
Encryption is a security measure that scrambles a message or file so it is
unintelligible to anyone not authorized to read it. Pretty
Good Privacy is a commonly used encryption technique. Encryption is used
typically with data that is of a sensitive nature, such as personal or financial
information.
Enterprise
resource planning (ERP)
An integrated software package for the business.
Ethics
A branch of philosophy that deals with what is considered to be right or wrong.
extranet
Refers to an intranet
that is partially accessible to authorized outsiders. Whereas an intranet
resides behind a firewall
and is accessible only to people who are members of the same company or
organization, an extranet provides various levels of accessibility to outsiders.
You can access an extranet only if you have a valid username
and password, and
your identity determines which parts of the extranet you can view.
FAQ
FAQ is an acronym for Frequently Asked Questions. It is a popular method used by
Web sites to answer common questions about a topic and help people get started
in doing business on the site. Fare tracker
The act of an intelligent that monitors fares on certain airline routes and
notifies the user periodically on special fares. File Transfer Protocol (FTP)
FTP is a set of conventions that lets you to transfer files between computers on
a network.
Firewall
A system designed to prevent unauthorized access
to or from a private network.
Firewalls can be implemented in both hardware
and software, or
a combination of both. Firewalls are frequently used to prevent unauthorized Internet
users from accessing private networks connected to the Internet, especially intranets.
All messages entering or leaving the intranet pass through the firewall, which
examines each message and blocks those that do not meet the specified security
criteria. There
are two basic types of firewalls: dual-homed gateways and screen host gateways. Full
cybermarketing
Synonym for pure cybernarketing
Generalized
electronic store
A store/broker
who handles a wide variety of categories of items (versus specialized electronic
store).
Global
electronic commerce
Electronic
commerce where the buyer(s) is in a different country from the seller. The buyer imports the product (service) from another country
Hacker
Hacker is slang for a technically sophisticated computer user who enjoys
exploring computer systems and programs, sometimes for the purpose of outwitting
security measures and causing mischief.
Hit
Web speak for any request for data from a Web Page or file
HTML
An acronym for HyperText Markup Language, HTML is the original authoring
language for creating documents on the Web.
HTTP
An acronym for HyperText Transfer Protocol, HTTP is the most common protocol
used to transfer documents on the Web.
Impressions see
ad views
Indirect
marketing
The products and services are sold through third part distributors (versus
direct marketing)
Industry
and competitive analysis
Monitoring,
evaluating, and disseminating information from the external and internal
environments
Information
privacy
Privacy issues related to the use of IT, such as invasion of privacy Integrity
One of the cornerstones of secure Internet communications, referring to the fact
that the contents of a message have not been modified (intentionally or
accidentally) during transmission Intellectual
property
The
right of individual (organization) to receive royalties for copyrighted or
patented original work.
Intelligent Agents
as robots or software programs that have the above properties, namely, the
ability to act autonomously on their user’s behalf, learn from experience, and
collaborate with other agents to achieve a common goal.
Interactive
advertisement
Any advertisement that requires or allows the viewer/consumer to take some
action
Interactive
marketing
The Consumer interacts with the online sellers, e.g., requiring more
information, by sending an e-mail or clicking a link and answering a
questionnaire.
Intermediary
The third party between sellers and buyers, such as retailing or distributors
Internet
The Internet is a global (self regulated) network that connects millions of computers and smaller
networks. Internet
community
A group of people with similar interests who are organized on a Web site where
they can chat and collaborate Internet
mail
Like a real-world mall, this electronic counterpart consists of a single entry
to a collection of electronic storefronts. In contrast to earlier efforts,
today’s Internet malls have a common look and feel. See
electronic shopping mall
Internet
Protocol (IP)
See TCP/IP.
Internet Service Provider (ISP)
An ISP provides access to the Internet plus other value-added services, such as
Web site hosting, to individuals and business entities. (See also access
provider.)
Internet
II see
next generation Internet
Internet based
EDI
The EDI that runs oil the Internet usually using the Web environment Intrabusiness
EC
Application of EC methods inside one organization, usually on its intranet,
creating a paperless environment. Activities range from internal customer service to selling
products to employees
Intranet
A network based on TCP/IP
protocols (an internet) belonging to an organization, usually a corporation,
accessible only by the organization's members, employees, or others with authorization.
An intranet's Web sites look and act just like any other Web sites, but the firewall
surrounding an intranet fends off unauthorized access.
IP
Security Protocol
A
popular tunneling protocol developed by the Internet Engineering Task Force
Java
Java is a programming language that makes it easy to create small applications
called applets, which make Web pages interactive. Java-enabled browsers
download Java applets and run them on your computer.
Just in time
delivery
Delivering the ordered items at a designated time.
This is seriously needed by business buyers who have to run just-in-time
manufacturing
Keyword banners
Banners that appear when a predetermined word is queried from a search engine.
Knowledge based trust
Trust that is grounded in the knowledge of the other trading partner
Links
Links connect ideas or references in one document to another to form the web of
interconnections we use to communicate on the global network.
Local Area Network (LAN)
A LAN is a network that links computers and other devices, such as printers, in
a small area, such as an office. Connecting several local area networks forms a wide
area network.
Localization
The
process of adapting media products to a local situation, for example,
translating to another Language. It
considers local culture, language, and other factors.
Market research
Effort to find useful information that describe, the relationship between
consumer, products, marketing methods, and marketers through experiments ,
information search, and processing
Market segmentation
The process of dividing a consumer market into a logical groups for marketing
research decision-making, advertisement, and sales activities
Marketspace
An electronic marketplace (see Electronic markets).
Mass custornization
Producing large numbers (mass) of customized items.
Merchant
server
Packaged
software systems designed to help companies establish and run an electronic
storefront on a single server (computer). The software usually provides
templates for creating an electronic product catalog, setting up electronic
shopping, carts, handling secure payments,. and processing customer orders
Metatag
A metatag gives a spider (search engine) specific information, such as keywords
or site summaries
Micropayment
Payment of a very small amount.
Microproducts
Products or services whose price is small and so is the profit margin. These require electronic micropayments to be traded economically.
Multipurpose Internet Mail
Extension (MIME)
A header found at the top of all documents returned by a Web server that
describes the contents of the document (e.g., a Web page, a multimedia object,
or a document produced by an external program).
Network
A network consists of two or more computers connected to each other by a
communications protocol, such as TCP/IP, that allows
the exchange of information and the sharing of resources.
Network access point (NAP)
intermediate
network exchange points connecting Internet service providers
(ISPs) to the Internet backbone
Network service provider (NSP)
one
of the private companies maintaining and servicing the Internets high-speed
backbones. Included among the companies are MCI, Sprint, UUNET/MIS, PSINet. and
BBN Planet.
Next generation Internet
a
U.S. government initiative supporting the creation of a high-speed
network, interconnecting Various research facilities across the country.
Nonrepudiation
one
of the cornerstones of secures Internet communications. referring to the fact
that the sender of a message cannot deny; that they actually sent the message
Offensive
strategy
Various direct
attack strategies on competitors such as frontal assault or f1anking maneuver
strategy
One to one marketing
Relationship marketing that treats each customer in a unique "as to fit the
costumer’s need and other characteristic,.
Online
banking see
cyberbanking.
Online
catalogs see
electronic catalogs.
Online
market research
Market research that utilizes the Internet to get more efficient responses.
Online
publishing
Dissemination of newspapers. magazines, and other publishable maternal on the
Internet (intranets). Also, dissemination of material specially, prepared for
the Web.
Online stock
trading
Buying
and selling stocks by giving the order on a PC, usually on a broker's form.
Confirmation is done by mail or e-mail.
Opt in/Opt out
An opt-in or opt-out box on a Web form gives you control over how a site shares
your personal and financial information. Sites frequently present forms already
set to allow them to collect and disseminate information, so read all questions
carefully and choose to opt out if you do not want a site to share your personal
information or use it for other purposes.
Organizational
buyer
Buyers who purchase
products and services for organizations.
Organizational
mission
The
purpose for the organization’s existence.
Packet
In order for one computer to communicate another over thee Internet, the
communications or message must be broken down into smaller units called packets
Each packet contains both data and a header specifying the addresses of the
sending and receiving computers.
Packet
filter
Rules
used by a firewall to accept or reject incoming (network communication) packets
based on source and destination IP addresses, source and destination port
numbers, and packet type. These rules can also be used to reject any packet from
the outside that claims to come from air address inside the network.
Partial
cybermarketing
A strategy of selling products and services both by traditional distribution
channels and the Internet.
Passive pull
strategy
Sending targeted information to customers either on request or as a result of
knowing something about the customers.
Pointcasting
The delivery of customized information using push technology (in contrast to
information broadcast to everyone).
Price
discovery
Ability to get discounts through auctions, bids, and other Internet-based
searches.
Price
discrimination
charging
different prices front different buyers for the same product (service).
Privacy
the
right to be left alone and the right to be free of unreasonable personal
intrusions.
Privacy
policies (codes)
organizational
policies and rules designed to protect the privacy of employees and customers.
Pretty Good Privacy (PGP)
PGP is a program that uses cryptography to protect files
and electronic mail from hostile parties.
Private
key encryption
Also
called a symmetrical key encryption. With
this type of encryption, the same encryption key is used to both encrypt and
decrypt a message, and the key is agreed upon and shared by both the sender and
receiver
Proactive
strategic posture toward cybermarketing
A strategy that the company 's main distribution channel is the Internet and
internal management is focused to effectuate the benefit of cybermarketing (in
contrast with reactive strategic posture). Protocol
A set of rules that determines how two computers communicate with one
another over a network. Protocol
tunneling
Technique allowing secure communications across the Internet to an enterprise's
internal LAN. With tunneling, the data packets are first encrypted and then
encapsulated into IP packets that can be transmitted across the Internet. The IP
packets are decrypted by a special host or router at the destination address.
Public
key
The key that is open to all authorized senders for secure encryption of messages
to be sent to the receiver who holds the counterpart private key.
Public Key Cryptography
Also
known as an asymmetrical key encryption. A public key cryptographic system uses two different keys for encoding and
decoding of messages. The public key is known to everyone while the private key
is known only to its owner. When encrypting a message, the sender uses the
recipient's public key. Thus, only the recipient can decrypt the message using
the matching private key. Purchasing
channel
Different ways products and services are delivered to consumers.
Purchasing
decision making model
A process composed of need identifications stage, information search stage,
alternative evaluation stage, purchase and delivery stage, and after-purchase
evaluation stage.
Purchasing
types
Purchasing
behavior that classifies buyers as impulsive. patient, and analytical
Pure
cybermarketing
A strategy of
selling products and services only through the Internet (versus partial
marketing).
Push
technology
Automatically
delivered information to a viewer who specifies some requirements; Push
technology Compiles information from several sources. It is contrasted with pull
technology where the user actively, searches for information (e.g., by using a
search engine).
Random
banners
Banners that appear at random, not as a result of the viewer’s action.
Reach
The number of people or households that are exposed to an advertisement at least
once over a specified period of time.
Reactive
strategic posture toward cybermarketing
A strategy that leaves the traditional distribution methods as the company's
main distribution channels resulting in no management style unchanged even
though the company has, opened on-line distribution channels.
Reintermediation:
1) Redefining the role of traditional intermediaries. They provide value-added
services that cannot be provided online; 2) Establishing new electronic
intermediaries in place of disintermediated traditional intermediaries.
Relationship
marketing
The overt
attempt of exchange partners to build a long-term relationship and association
in marketing.
Return on
investment (ROI)
A ratio of resources required versus benefits generated. It measures the success
of an investment.
Router
Special computers whose primary task is to guide the transmission of data
packets across the Internet. Routers have updateable maps of the networks on the
Internet that enables the routers to determine the paths for the data packets.
Search Engine
A search engine is software that indexes the content of Web sites so that you
can find particular information on the Web. Search engines use different
indexing schemes, so it is best to use several search engines to do a thorough
search for particular information.
Screened host gateway
Special
firewall architecture with a network router that controls access to a bastion
gateway server and ensures that all inbound Internet traffic must pass through
the bastion gateway
Secret
key
The key that should he kept Secret by its owner for encryption and decryption.
Secure Socket Layer (SSL)
SSL is a protocol developed by Netscape
Communications Corporation for securing data transmitted in commercial
transactions on the Internet. Using public key
cryptography, SSL provides server authentication,
data encryption, and data integrity
for client/server communications. This
protocol makes Secure Web transmissions transparent to end users
Secure Electronic Transaction (SET)
SET is a new standard for secure credit card transactions on the Web. It uses
digital signatures for authentication of
buyers and provides a scheme for credit card numbers to go directly to the card
issuer for billing purposes without the merchant seeing the number. The cryptographic
protocols were jointly developed by Visa, MasterCard, Netscape, and Microsoft
and designed to provide Secure Web, credit card transactions for both consumers
and merchants.
Security
Refers to techniques for ensuring that data stored in a computer cannot be read
or compromised. Most security measures involve data
encryption and passwords. Data encryption is the translation of data into a
form that is unintelligible without a deciphering mechanism. A password
is a secret word or phrase that gives a user access to a particular program or
system.
Software
piracy
Copying Software without paying for it or without getting permission from the
owner.
Spam
Spam is the electronic equivalent of junk mail. Sparnming
Sending an unwanted advertisement to users. Analogous to "junk mail."
Specialized
electronic store
A store/broker who handles a focused category of items (versus generalized
electronic store).
Splash screen
A multimedia effect designed to capture the user's attention for a short time.
Stateless
a property of the Web's Hypertext 'transport Protocol (HTTP) referring to the
fact that every request made by a Web browser for a particular Web document
opens a new connection on a Web server that is immediately closed after the
document is returned. This means that the server cannot maintain state
information about successive requests from the same browser.
Stored value
card
A card that stores money value in numbers, like transportation and phone cards
Strategic
alliance
Partnership of multiple corporations to achieve strategically significant
Objectives thatare mutually beneficial.
Strategic
planning
Planning for a set of managerial decisions and actions that determine the
long-term performance of an organization
Strategy formulation
Developing long-range plans to effectively manage environmental
opportunities and threats in light of corporate strengths and weaknesses.
Strategy
reassessment
Review and monitoring of a strategy after its implementation to evaluate its
effectiveness and to decide whether any changes are needed for the future.
Supplier oriented marketplace
Electronic marketplace where the supplying companies are passively waiting for
customers.
Supply chain management
Management of all the activities along the supply chain from suppliers to
internal logistics within a company and to distribution to customers. This
includes ordering, monitoring, billing, and so on
SWOT
Strengths, weaknesses, opportunities, and threats.
Surfing
Surfing means exploring the Web by following links to
move from one page to another.
Teleweb
A call center that adds Web channels and portallike self_service.
Time stamp
A cryptographically unforgeable digital attestation that a document was in
existence at a particular time
Transmission Control Protocol/Internet Protocol (TCP/IP)
TCP/IP is a collection of networking protocols that defines how communication
happens on the Internet.
Transmission
Control Protocol (TCP)
Part of the combined TCP/IP protocol.
TCP ensures that two Computers can communicate with one another in a reliable
fashion. Each
TCP communication must be acknowledged as received. If the communication is not
acknowledged in a reasonable time, then the sending computer must retransmit the
data.
Trust
The psychological status of involved partners, who are willing to pursue further
interactions to achieve a planned goal.
Tunneling protocol
A protocol for secured data
transmission across the Internet by authenticating and encrypting all IP
packets. See protocol tunneling.
Uniform Resource Locator (URL)
A URL is the address of a page on the Web.
The complete syntax for a Web address is "accessrnethod://server-name[:port]/'directory/file”.
An example of a complete address is 'http://www.mycompany.com.80/"default.htm.”
User Name
Your user name is the name you use to identify yourself when you log in to a
system or account.
Value chain
A series of activities a company performs to achieve its goal by adding
additional values when each activity proceeds from one stage to the next one.
Value added networks (VANs)
Networks that add communication services to existing common carriers.
Value chain partnership
A strong and close alliance in which a company forms a long-term arrangement
with a key supplier or distributor for a mutual advantage.
Virtual
We apply the adjective "virtual" to many entities to indicate a
logical or computerized representation of the entity, such as virtual shopping
cart.
Virtual community see
Internet community.
Virtual corporation
A partnership of two r more companies who create a new organization whose
partners are in different locations. The corporation can be temporary or
permanent.
Virtual private network (VPN)
special combination of
encryption, authentication, and protocol tunneling technologies that provide
secure transport of private communications over the public Internet. Most
enterprises rely, on third-party companies to host their VPNs.
Visit
A visit is a sequence of requests made by one user to enter a site. Once a
visitor stops making requests from a site for a given period of time, called a
timeout, the next hit by this visitor is considered a new visit.
Virus
A virus is a program created for the purpose of wreaking havoc on computers and
networks. The mischief may be very minor, such as causing an image or message to
appear on your screen, or it can do serious damage by changing or destroying
files.
Watermarks
Invisible unobtrusive marks embedded in source data that can be traced to
discover illegal copying of digital material
Web content design
Planning and deciding what to put in the web applications.
Web hosting
The placement of the Web site on a certain server and providing the necessary
infrastructure for its operation.
Webcasting
Internet-based broadcasting of audio and video content. It is distinguished from
standard Web content deliver because it provides a constant stream of
information, can he presented live in addition to allowing on-demand listening
and communication between, the broadcaster and the listener or viewer.
Webmaster
The webmaster is the person who manages and maintains a Web site.
Webonomics
Web economy.
The economic environment and rules of EC
Wide Area Network (WAN)
A wide area network connects computers and local area networks.
It usually extends over a wide geographical area, and it may span the globe. |