The Wayback Machine - https://web.archive.org/all/20050307191202/http://ecommerce.etsu.edu:80/Glossary.htm

Glossary

Home
About this Site
General Information
Glossary
News Sites
Ecommerce How To's
Research Sites
Security & Policy
Tax Issues
Site Promotion/Tools
Web SIte Seals

Below is a glossary of  web terms. Sources for these definitions include:

bullet

Electronic Commerce: A Managerial Perspective
by Efraim Turban, Jae Lee, David King, and H. Michael Chung

bullet

BetterWeb Program from PricewaterhouseCoopers

bullet

Ecommerce Webopedia by E-Commerce Guide's

Click on the first letter of the word you want defined.  For terms not included in this glossary, or for more detailed definitions, go to the  Webopedia or TechWeb sites.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Access log file 
A text file consisting of entries recording each time a Web server is accessed. The contents of an access log,, adhere to the common log file format standards.

Access Provider
An access provider is a company that provides you with access to the Internet. You connect your personal computer to the provider's remote computer to make the connection. Some access providers are large commercial services that also offer proprietary content. Others are small local or regional companies that offer just Internet access. If you connect to the Internet directly from your computer at work, then your company is your access provider.
(See also Internet Service Provider.)

Acquirer 
A financial institution that establishes air account for merchants and acquires the vouchers of authorized sales slips.

Address
When used within the context of the Internet, an address refers to one of these pieces of information: Internet email addresses or a Web site address, called a Uniform Resource Locator

Ad views (also page views or impressions) 
The number of times an ad is seen by users.  Exposure to an ad.

Advertisement 
Dissemination of information in order to influence buyers to buy

Agent 
A software program that runs autonomously, or semi-autonomously, and carries out user directives continuously

Agent based services 
Services that are provided by agents such as real estate agents, stock or insurance brokers. or job-finding agents.

Associated ad display strategy 
The appearance of an ad as a result of a request made for related information

Authentication
The process of making sure you are the person you say you are. The most common form of authentication is the user name and password system, such as the one you use to login to your computer system or the PIN number you use at an automated teller machine.

Authenticity 
One of the cornerstones of secure Internet communications, referring to the fact that he sender (either client or server) of a message is who they claim to be.

Authorization
The process of granting individuals rights of access to data and programs based on identity.  Most computer  security systems are based on a two-step process. The first stage is  authentication, which ensures that a user is who he or she claims to be. The second stage is authorization, which allows the user access to various resources based on the user's identity.  Once identity has been authenticated, individuals can see information and use programs that they have the authorization to use.

Bandwidth
The speed with which content can he delivered across a network.

Banner 
A graphic display on a web page used for advertisement. A banner ad is linked to an advertiser’s Web page

Banner exchange 
A market where companies can trade or exchange placement of banner ads on each other's Web sites.

Bastion gateway 
In a dual-homed gateway firewall, this special server connects a private internal network to the outside Internet.

Biometric controls 
Security controls that involve unique physical or behavioral characteristics of an individual (e.g., fingerprints).

Browser
A browser is a software program that allows you to view and interact with any resources available on the Web. 

Business to business EC (B2B) 
Electronic trading where both the buyers and the sellers are organizations.

Business to consumer EC 
A situation where a business is selling online to an individual consumer.

Call center 
A help desk where customers can communicate by telephone, fax, and e-mail.

Certificate
A certificate verifies the identity of the sender of a message and provides the receiver with the means to encode a reply.  The certificate is issued by a trusted third party, certificate authority, to identify the holder.

Certifying authorities 
Trusted third-party Companies that issue digital certificates. Individuals use these certificates to verify their identify and to distribute their public keys

Chat group 
A real-time online forum for discussing issues of public and personal interest.

Clicks (or ad clicks) 
Every time a visitor clicks on an advertising banner to access the advertiser's Web site, it is counted as a "click" or "click-through."

Clickwrap contracts 
A contract to use software in exchange for payment derived entirely over the Internet.

Code of ethics 
A set of ethical behavioral rules developed by an organization or a professional society.

Competitive intelligence 
Information that is useful for analyzing a company's strategic position in the industry. Information about the competitors and their actions.

Competitive strategy 
A strategy of a company aimed at increasing its competitiveness. It can be offensive or defensive,

Consumer behavior 
The process by which consumers make decisions to purchase goods and services.

Cookie
A cookie is a line in a text file that records your activities on a Web site. Cookies may reside in your computer's memory until you close your browser, or they may be saved on your hard drive. Most cookies have an expiration date and cannot read information stored in your computer.

Cookies commonly record consumer preferences, such as the items you place in a virtual shopping cart when shopping online. When your browser next communicates with that site's server, the browser sends the information in the cookie to the server. The site may use the information to recommend similar items to you or choose ad banners to show you. Cookies may also store other kinds of personal information, such as your password so that you do not have to re-enter it each time you visit the site.

Cooperative strategy 
Strategic alliance or joint venture strategy with a competitor(s) in an industry.

CPM
Cost-per-thousand impressions. The cost of delivering an impression to 1,000 people (or homes).

Critical success factors (CSF) 
The indispensable business, technology, and human factors that would help achieve the desired level of an organization's goal.

Cryptography
Cryptography is the encoding and decoding of messages using mathematical functions.   There are four components involved in the process: (1) plaintext; the message to be encrypted (2) ciphertext;  the encrypted message: (3) encryption algorithm or formula used to encrypt the message; (4) key; secret key used to encrypt and decrypt the ciphertext.

Customer loyalty 
The degree of a customer staying with a specific vendor or brand.

Customer service 
A series of activities designed to enhance the level Of Customer satisfaction before. during, and after a purchase.

Customer value 
The difference between the benefits that a customer is receiving from the acquired products and services and the effort and cost that the customer has to invest to get the product.

Customer oriented marketplace 
Electronic marketplace, which customers like big companies open to invite bidding.

Cyberbanking (electronic banking) 
Conducting banking from home. It includes many activities ranging from paving bills to securing a loan

Cycle time 
The processing time of a business process from beginning to end. Also known as time-to-market.

Data Integrity
Integrity is a characteristic of data that means that the data was not tampered with, destroyed, or changed in any way while in transit. The Secure Sockets Layer protocol ensures data confidentiality and data integrity in communications between clients and servers on the Web.

Data mining
Class of database applications that look for hidden patterns in a group of data. For example, data mining software can help retail companies find customers with common interests. 

Debit card 
A Card that is used instead of cash in shopping. The buyer's account is instantly debited. It is necessary to get authorization for each transaction.

 Defensive strategy 
Strategy that either raises the structural barriers or lowers the inducement for attack.

Deterrence-base trust 
Trust that is related to the threat of punishment.

Digital certificate 
A digital file issued to an individual or company by a certifying authority that contains the individual's or company's public encryption key and verifies the individual's or company’s identity.

Digital envelope 
The secret key encrypted by the receiver's public key, which is necessary to open prior to decrypting messages encrypted by a secret key. 

Digital products 
Digital products that are transformed to information that can be expressed digitally. Music, software, movies, and magazines can be digitized and delivered electronically to buyers. 

Digital signature 
A phrase (like John J. Jones) that is encrypted with a sender's private key and attached like a signature to an encrypted message to ensure that the sender is who he (or she) claims to be. The recipient uses the sender's public key to decrypt the signature. 

Direct marketing 
Marketing without intermediaries between the sellers and the buyers.

Disintermediation: 
removing the layers of intermediaries between sellers and buyers.

Distance learning 
Learning off-campusfrom home or other places.

Domain Name
A name used in a URL to identify a group of Web pages. For example, in the URL http://www.pwcglobal.com, the domain name is pwcglobal.com. The last three letters tell you which kind of top-level domain the site represents: in the United States we use .edu for an educational institution; .com for a commercial site; .gov for a government site; .net for a commercial network; and .org for a non-profit organization. 

Dual-homed gateway 
A basic type of firewall in which a bastion gateway server is used to connect a private internal network to the outside. The gateway has two network cards so that communications reaching one card are not directly relayed to the other. The communications between the networks are controlled by special software programs called proxies.

  Economics of electronic commerce see Webonomics.

Edutainment 
Combining education and entertainment online.

Electronic auctions 
Auctions conducted online.  Initially on private networks, now on the internet.

Electronic Broker
An external service provider that aggregates eMarketplaces and partners through a single point of integration and is not responsible for the order fulfillment and guarantee (versus electronic distributor).

E-business 
The use if information technology among buyers, sellers and other trading partners for the purpose of improving customer service, reducing costs, and opening new markets and channels to increase shareholder value

Electronic cash (e-cash) 
Cash in an electronic form’ usually stored on a smart card and/or in a software called digital wallet.  

Electronic catalogs 
Presentation of information about products (services) that traditionally were in paper catalogs. However, electronic catalogs can include multimedia, such as voice and video clips. 

Electronic chat 
An arrangement where participants exchange messages in real time.

Electronic check (e-check) 
A check in an electronic form, deliverable through the network.

Electronic Commerce or e-commerce
E-commerce means doing business on the Web.  This includes, for example, marketing, buying, and selling of products/services using internet technology. 

Electronic communities 
Internet communities of people who share the same interest and gather to share information, chat, and collaborate online.

 Electronic credit card 
A credit card used on the network.

Electronic Data Interchange (EDI)
The transfer of structured data by agreed message standards from computer to computer by electronic means.   The transfer of data between different companies is accomplished using networks, such as the Internet.  

Electronic distributor 
Electronic intermediary who fulfills the order and arranges for a guarantee. The electronic storefront and malls belong to this category (versus electronic broker). 

Electronic fund transfer (EFT) 
Transferring money from one account to others.

Electronic markets 
A place where buyers and sellers negotiate, submit bids, agree on orders, and if appropriate finish the transactions electronically.

Electronic shopping cart 
A virtual shopping cart that enables consumers to collect items as they browse an online sales site until they are ready to purchase the items. 

Electronic shopping mail (e-mall) 
A set of independent electronic stores who Share an electronic marketing environment such or, servers, software, and payment systems. 

Electronic store (e-store) 
A unit of electronic distribution under one management 

Electronic surveillance 
Tracking peoples activities online (e.g., monitoring e-mail or web visits) 

Electronic (or digital) wallet 
Software that can store (or retrieve) electronic cash and certificates.

Encryption
Encryption is a security measure that scrambles a message or file so it is unintelligible to anyone not authorized to read it. Pretty Good Privacy is a commonly used encryption technique. Encryption is used typically with data that is of a sensitive nature, such as personal or financial information. Enterprise resource planning (ERP) 
An integrated software package for the business.

Ethics 
A branch of philosophy that deals with what is considered to be right or wrong.

extranet
Refers to an intranet that is partially accessible to authorized outsiders. Whereas an intranet resides behind a firewall and is accessible only to people who are members of the same company or organization, an extranet provides various levels of accessibility to outsiders. You can access an extranet only if you have a valid username and password, and your identity determines which parts of the extranet you can view.


FAQ
FAQ is an acronym for Frequently Asked Questions. It is a popular method used by Web sites to answer common questions about a topic and help people get started in doing business on the site.

Fare tracker 
The act of an intelligent that monitors fares on certain airline routes and notifies the user periodically on special fares.

File Transfer Protocol (FTP)
FTP is a set of conventions that lets you to transfer files between computers on a network.

Firewall
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.  There are two basic types of firewalls: dual-homed gateways and screen host gateways.

Full cybermarketing 
Synonym for pure cybernarketing 

  Generalized electronic store 
A store/broker who handles a wide variety of categories of items (versus specialized electronic store).

Global electronic commerce 
Electronic commerce where the buyer(s) is in a different country from the seller. The buyer imports the product (service) from another country

Hacker
Hacker is slang for a technically sophisticated computer user who enjoys exploring computer systems and programs, sometimes for the purpose of outwitting security measures and causing mischief. 

Hit
Web speak for any request for data from a Web Page or file

HTML
An acronym for HyperText Markup Language, HTML is the original authoring language for creating documents on the Web.

HTTP
An acronym for HyperText Transfer Protocol, HTTP is the most common protocol used to transfer documents on the Web.

Impressions see ad views

Indirect marketing 
The products and services are sold through third part distributors (versus direct marketing)

Industry and competitive analysis 
Monitoring, evaluating, and disseminating information from the external and internal environments

Information privacy 
Privacy issues related to the use of IT, such as invasion of privacy

Integrity 
One of the cornerstones of secure Internet communications, referring to the fact that the contents of a message have not been modified (intentionally or accidentally) during transmission

Intellectual property 
The right of individual (organization) to receive royalties for copyrighted or patented original work.

Intelligent Agents 
as robots or software programs that have the above properties, namely, the ability to act autonomously on their user’s behalf, learn from experience, and collaborate with other agents to achieve a common goal.

Interactive advertisement 
Any advertisement that requires or allows the viewer/consumer to take some action

 Interactive marketing 
The Consumer interacts with the online sellers, e.g., requiring more information, by sending an e-mail or clicking a link and answering a questionnaire.

Intermediary 
The third party between sellers and buyers, such as retailing or distributors

Internet
The Internet is a global (self regulated) network that connects millions of computers and smaller networks.

Internet community 
A group of people with similar interests who are organized on a Web site where they can chat and collaborate

Internet mail 
Like a real-world mall, this electronic counterpart consists of a single entry to a collection of electronic storefronts. In contrast to earlier efforts, today’s Internet malls have a common look and feel.  See electronic shopping mall

Internet Protocol (IP) See TCP/IP.

Internet Service Provider (ISP)
An ISP provides access to the Internet plus other value-added services, such as Web site hosting, to individuals and business entities. (See also access provider.)

Internet II see next generation Internet

Internet based EDI 
The EDI that runs oil the Internet usually using the Web environment

Intrabusiness EC 
Application of EC methods inside one organization, usually on its intranet, creating a paperless environment. Activities range from internal customer service to selling products to employees

Intranet
A network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization. An intranet's Web sites look and act just like any other Web sites, but the firewall surrounding an intranet fends off unauthorized access.

IP Security Protocol 
A popular tunneling protocol developed by the Internet Engineering Task Force

Java
Java is a programming language that makes it easy to create small applications called applets, which make Web pages interactive. Java-enabled browsers download Java applets and run them on your computer.

Just in time delivery 
Delivering the ordered items at a designated time.  This is seriously needed by business buyers who have to run just-in-time manufacturing

Keyword banners
Banners that appear when a predetermined word is queried from a search engine.

Knowledge based trust 
Trust that is grounded in the knowledge of the other trading partner

Links
Links connect ideas or references in one document to another to form the web of interconnections we use to communicate on the global network.

Local Area Network (LAN)
A LAN is a network that links computers and other devices, such as printers, in a small area, such as an office. Connecting several local area networks forms a wide area network. Localization 
The process of adapting media products to a local situation, for example, translating to another Language. It considers local culture, language, and other factors.

Market research 
Effort to find useful information that describe, the relationship between consumer, products, marketing methods, and marketers through experiments , information search, and processing

Market segmentation 
The process of dividing a consumer market into a logical groups for marketing research decision-making, advertisement, and sales activities

Marketspace 
An electronic marketplace (see Electronic markets).

Mass custornization 
Producing large numbers (mass) of customized items.

Merchant server 
Packaged software systems designed to help companies establish and run an electronic storefront on a single server (computer). The software usually provides templates for creating an electronic product catalog, setting up electronic shopping, carts, handling secure payments,. and processing customer orders

Metatag 
A metatag gives a spider (search engine) specific information, such as keywords or site summaries

Micropayment 
Payment of a very small amount.

Microproducts 
Products or services whose price is small and so is the profit margin. These require electronic micropayments to be traded economically.

Multipurpose Internet Mail Extension (MIME) 
A header found at the top of all documents returned by a Web server that describes the contents of the document (e.g., a Web page, a multimedia object, or a document produced by an external program).

Network
A network consists of two or more computers connected to each other by a communications protocol, such as TCP/IP, that allows the exchange of information and the sharing of resources.

Network access point (NAP)
intermediate network exchange points connecting Internet service providers (ISPs) to the Internet backbone

Network service provider (NSP) 
one of the private companies maintaining and servicing the Internets high-speed backbones. Included among the companies are MCI, Sprint, UUNET/MIS, PSINet. and BBN Planet.

Next generation Internet 
a U.S. government initiative supporting the creation of a high-speed network, interconnecting Various research facilities across the country.

Nonrepudiation 
one of the cornerstones of secures Internet communications. referring to the fact that the sender of a message cannot deny; that they actually sent the message

Offensive strategy 
Various direct attack strategies on competitors such as frontal assault or f1anking maneuver strategy

One to one marketing 
Relationship marketing that treats each customer in a unique "as to fit the costumer’s need and other characteristic,.

Online banking see cyberbanking.

Online catalogs see electronic catalogs.

Online market research 
Market research that utilizes the Internet to get more efficient responses.

Online publishing 
Dissemination of newspapers. magazines, and other publishable maternal on the Internet (intranets). Also, dissemination of material specially, prepared for the Web.

Online stock trading 
Buying and selling stocks by giving the order on a PC, usually on a broker's form. Confirmation is done by mail or e-mail.

Opt in/Opt out
An opt-in or opt-out box on a Web form gives you control over how a site shares your personal and financial information. Sites frequently present forms already set to allow them to collect and disseminate information, so read all questions carefully and choose to opt out if you do not want a site to share your personal information or use it for other purposes.

Organizational buyer 
Buyers who purchase products and services for organizations.

Organizational mission 
The purpose for the organization’s existence.

Packet 
In order for one computer to communicate another over thee Internet, the communications or message must be broken down into smaller units called packets Each packet contains both data and a header specifying the addresses of the sending and receiving computers.

Packet filter 
Rules used by a firewall to accept or reject incoming (network communication) packets based on source and destination IP addresses, source and destination port numbers, and packet type. These rules can also be used to reject any packet from the outside that claims to come from air address inside the network.

Partial cybermarketing 
A strategy of selling products and services both by traditional distribution channels and the Internet.

Passive pull strategy 
Sending targeted information to customers either on request or as a result of knowing something about the customers.

Pointcasting 
The delivery of customized information using push technology (in contrast to information broadcast to everyone).

Price discovery 
Ability to get discounts through auctions, bids, and other Internet-based searches.

Price discrimination 
charging different prices front different buyers for the same product (service).

Privacy
the right to be left alone and the right to be free of unreasonable personal intrusions.

Privacy policies (codes) 
organizational policies and rules designed to protect the privacy of employees and customers.

Pretty Good Privacy (PGP)
PGP is a program that uses cryptography to protect files and electronic mail from hostile parties.

Private key encryption 
Also called a symmetrical key encryption. With this type of encryption, the same encryption key is used to both encrypt and decrypt a message, and the key is agreed upon and shared by both the sender and receiver

Proactive strategic posture toward cybermarketing 
A strategy that the company 's main distribution channel is the Internet and internal management is focused to effectuate the benefit of cybermarketing (in contrast with reactive strategic posture).

Protocol 
A set of rules that determines how two computers communicate with one another over a network.

Protocol tunneling 
Technique allowing secure communications across the Internet to an enterprise's internal LAN. With tunneling, the data packets are first encrypted and then encapsulated into IP packets that can be transmitted across the Internet. The IP packets are decrypted by a special host or router at the destination address.

Public key 
The key that is open to all authorized senders for secure encryption of messages to be sent to the receiver who holds the counterpart private key.

Public Key Cryptography
Also known as an asymmetrical key encryption. A public key cryptographic system uses two different keys for encoding and decoding of messages. The public key is known to everyone while the private key is known only to its owner. When encrypting a message, the sender uses the recipient's public key. Thus, only the recipient can decrypt the message using the matching private key.

Purchasing channel 
Different ways products and services are delivered to consumers.

Purchasing decision making model 
A process composed of need identifications stage, information search stage, alternative evaluation stage, purchase and delivery stage, and after-purchase evaluation stage.

Purchasing types 
Purchasing behavior that classifies buyers as impulsive. patient, and analytical

Pure cybermarketing 
A strategy of selling products and services only through the Internet (versus partial marketing).

Push technology 
Automatically delivered information to a viewer who specifies some requirements; Push technology Compiles information from several sources. It is contrasted with pull technology where the user actively, searches for information (e.g., by using a search engine).

Random banners 
Banners that appear at random, not as a result of the viewer’s action.

Reach
The number of people or households that are exposed to an advertisement at least once over a specified period of time.

Reactive strategic posture toward cybermarketing 
A strategy that leaves the traditional distribution methods as the company's main distribution channels resulting in no management style unchanged even though the company has, opened on-line distribution channels.

Reintermediation: 
1) Redefining the role of traditional intermediaries. They provide value-added services that cannot be provided online; 2) Establishing new electronic intermediaries in place of disintermediated traditional intermediaries.

Relationship marketing 
The overt attempt of exchange partners to build a long-term relationship and association in marketing.

Return on investment (ROI) 
A ratio of resources required versus benefits generated. It measures the success of an investment.

Router 
Special computers whose primary task is to guide the transmission of data packets across the Internet. Routers have updateable maps of the networks on the Internet that enables the routers to determine the paths for the data packets.

Search Engine
A search engine is software that indexes the content of Web sites so that you can find particular information on the Web. Search engines use different indexing schemes, so it is best to use several search engines to do a thorough search for particular information.

Screened host gateway 
Special firewall architecture with a network router that controls access to a bastion gateway server and ensures that all inbound Internet traffic must pass through the bastion gateway

Secret key 
The key that should he kept Secret by its owner for encryption and decryption.

Secure Socket Layer (SSL)
SSL is a protocol developed by Netscape Communications Corporation for securing data transmitted in commercial transactions on the Internet. Using public key cryptography, SSL provides server authentication, data encryption, and data integrity for client/server communications.  This protocol makes Secure Web transmissions transparent to end users

Secure Electronic Transaction (SET)

SET is a new standard for secure credit card transactions on the Web. It uses digital signatures for authentication of buyers and provides a scheme for credit card numbers to go directly to the card issuer for billing purposes without the merchant seeing the number.  The cryptographic protocols were jointly developed by Visa, MasterCard, Netscape, and Microsoft and designed to provide Secure Web, credit card transactions for both consumers and merchants.

Security
Refers to techniques for ensuring that data stored in a computer cannot be read or compromised. Most security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that gives a user access to a particular program or system.

Software piracy 
Copying Software without paying for it or without getting permission from the owner.

Spam
Spam is the electronic equivalent of junk mail.

Sparnming 
Sending an unwanted advertisement to users. Analogous to "junk mail."

Specialized electronic store 
A store/broker who handles a focused category of items (versus generalized electronic store).

Splash screen 
A multimedia effect designed to capture the user's attention for a short time.

Stateless 
a property of the Web's Hypertext 'transport Protocol (HTTP) referring to the fact that every request made by a Web browser for a particular Web document opens a new connection on a Web server that is immediately closed after the document is returned. This means that the server cannot maintain state information about successive requests from the same browser.

Stored value card 
A card that stores money value in numbers, like transportation and phone cards

Strategic alliance 
Partnership of multiple corporations to achieve strategically significant Objectives thatare mutually beneficial.

Strategic planning 
Planning for a set of managerial decisions and actions that determine the long-term performance of an organization

Strategy formulation 
Developing long-range plans to effectively manage environmental opportunities and threats in light of corporate strengths and weaknesses.

Strategy reassessment 
Review and monitoring of a strategy after its implementation to evaluate its effectiveness and to decide whether any changes are needed for the future.

Supplier oriented marketplace 
Electronic marketplace where the supplying companies are passively waiting for customers.

Supply chain management 
Management of all the activities along the supply chain from suppliers to internal logistics within a company and to distribution to customers. This includes ordering, monitoring, billing, and so on

SWOT 
Strengths, weaknesses, opportunities, and threats.

Surfing
Surfing means exploring the Web by following links to move from one page to another.

Teleweb 
A call center that adds Web channels and portallike self_service.

Time stamp
A cryptographically unforgeable digital attestation that a document was in existence at a particular time

Transmission Control Protocol/Internet Protocol (TCP/IP)
TCP/IP is a collection of networking protocols that defines how communication happens on the Internet.

Transmission Control Protocol (TCP) 
Part of the combined TCP/IP protocol. TCP ensures that two Computers can communicate with one another in a reliable fashion. Each TCP communication must be acknowledged as received. If the communication is not acknowledged in a reasonable time, then the sending computer must retransmit the data.

Trust
The psychological status of involved partners, who are willing to pursue further interactions to achieve a planned goal.

Tunneling protocol 
A protocol for secured data transmission across the Internet by authenticating and encrypting all IP packets. See protocol tunneling.

Uniform Resource Locator (URL)
A URL is the address of a page on the Web.   The complete syntax for a Web address is "accessrnethod://server-name[:port]/'directory/file”.  An example of a complete address is 'http://www.mycompany.com.80/"default.htm.”

User Name
Your user name is the name you use to identify yourself when you log in to a system or account.

Value chain 
A series of activities a company performs to achieve its goal by adding additional values when each activity proceeds from one stage to the next one.

Value added networks (VANs) 
Networks that add communication services to existing common carriers.

Value chain partnership 
A strong and close alliance in which a company forms a long-term arrangement with a key supplier or distributor for a mutual advantage.

Virtual
We apply the adjective "virtual" to many entities to indicate a logical or computerized representation of the entity, such as virtual shopping cart.

Virtual community see Internet community.

Virtual corporation 
A partnership of two r more companies who create a new organization whose partners are in different locations. The corporation can be temporary or permanent.

Virtual private network (VPN) 
special combination of encryption, authentication, and protocol tunneling technologies that provide secure transport of private communications over the public Internet. Most enterprises rely, on third-party companies to host their VPNs.

Visit
A visit is a sequence of requests made by one user to enter a site. Once a visitor stops making requests from a site for a given period of time, called a timeout, the next hit by this visitor is considered a new visit.

Virus
A virus is a program created for the purpose of wreaking havoc on computers and networks. The mischief may be very minor, such as causing an image or message to appear on your screen, or it can do serious damage by changing or destroying files.

Watermarks 
Invisible unobtrusive marks embedded in source data that can be traced to discover illegal copying of digital material

Web content design 
Planning and deciding what to put in the web applications.

Web hosting 
The placement of the Web site on a certain server and providing the necessary infrastructure for its operation.

Webcasting 
Internet-based broadcasting of audio and video content. It is distinguished from standard Web content deliver because it provides a constant stream of information, can he presented live in addition to allowing on-demand listening and communication between, the broadcaster and the listener or viewer.

Webmaster
The webmaster is the person who manages and maintains a Web site.

Webonomics 
Web economy.   The economic environment and rules of EC

Wide Area Network (WAN)
A wide area network connects computers and local area networks. It usually extends over a wide geographical area, and it may span the globe.

 

  ETSU  College of Business ETSU Home page
© 2000 Gary G. Berg