Marketing Security Privacy and Legal Issues

Consumer adoption of online purchasing is in the maturity stage.

True
False
False
According to the Gartner Group, SMEs are the most protected against attacks on their computer systems via the Internet.

True
False
False
A company's internal computer network can be protected by a firewall.

True
False
True
Encryption refers to the scrambling or disguising of data at the sender's end and descrambling of the data at the receiver's end.

True
False
True
It is impossible to verify the identity of the person sending a message or placing an order online.

True
False
False
If a firm has a detailed knowledge of its customer it can use it to gain competitive advantage.

True
False
True
A wide spread disparity of laws in different countries could deter the growth of worldwide e-commerce.

True
False
True
Cyber-squatting refers to staying on a company's web site for an extended period of time without making a purchase or query.

True
False
False
Companies can prevent potential exploitation of their brand names by registering misspellings of their company name and other names that opponents of the company may use.

True
False
True
Customer service has been the primary focus for most e-tailers.

True
False
False
Click-wrap license:
The license agreement that takes effect once the consumer clicks on a button and downloads software from the Internet.

Consumer protection:
The ensuring of the integrity, authenticity, privacy, and confidentiality of the consumer's data.

Cyber-squatting:
The registering of an Internet domain name that legally belongs to someone else.

Cyber-stalking:
Any unwanted, obsessive pursuit of an individual by another through electronic means, including e-mail.

Digital certificate:
A small file containing the name and identification information of the certificate holder, the name of the certificate authority, and the period of validity of the certificate.

Digital signature:
Similar to a written signature, verifies the identity of the person sending a message or placing an order online, created by applying a hashing algorithm to the message.

Encryption:
A method of keeping networks, databases, and files private and secure by scrambling the data at the sender's end and descrambling the same data at the receiver's end.

Firewall:
The software and/or hardware that stands between a company's internal computer network and the external network that keeps unauthorized users or intruders outside the network.

Mail order/telephone order (MOTO):
The "card not present" category of credit card transactions that does not allow for identity verification.

Peer-to-peer (P2P):
The downloading and sharing of files with other consumers, e.g. Napster

Public-key encryption:
A complex mathematical method to secure digital communications using a public key to encode the data and a private key to decode it.

Safe harbor:
A voluntary US program that requires participating companies to fully disclose their consumer data collection procedure and give control to the consumer to modify or delete their personal information maintained by Web sites.

Secure electronic transaction (SET):
A protocol used to secure online transactions by authenticating the identity of the parties.

Secure sockets layer (SSL):
Most commonly used method of implementing encryption by establishing a secure connection between a browser (the consumer end) and the server (the merchant end).

Shrink-wrap licence:
The licence agreement that takes effect once the consumer breaks the shrink-wrap packaging of a software product.

Spam:
Unsolicited electronic garbage and junk postings.
Symmetric-key encryption:
A complex mathematical method to secure digital communications using the same key to encode (sender) and decode (receiver) the data.