Term
|
Definition
| Giving consumers a part of thier service for free and then having another part that is better but is a paid version |
|
|
Term
| What customer value does Pandora Offer? |
|
Definition
| Giving customers a free service while also giving them advertisments to make money themselves |
|
|
Term
|
Definition
|
|
Term
| A Business Model as which compenants? |
|
Definition
| Market Strategy, Market Opportunity, Competitive Advantage, Revenue Model |
|
|
Term
|
Definition
| involves using the internet to enable individuals to collectively contribute money to support a project |
|
|
Term
|
Definition
| Is an example of of crowdfunding |
|
|
Term
|
Definition
| a program that allows you to check the connection between your client and server |
|
|
Term
|
Definition
|
|
Term
| Do you think internet users should be charged based on the amount of bandwidth they use according to Akamai? |
|
Definition
|
|
Term
|
Definition
| open source content management and web site design tool |
|
|
Term
| Orbitz has dominated the market in what ways? |
|
Definition
|
|
Term
|
Definition
| copies itself and then spread to others |
|
|
Term
|
Definition
| type of malicious code that can be covertly installed on a computer when connected to the internet |
|
|
Term
|
Definition
| good hackers who help organizations locate problems |
|
|
Term
|
Definition
| hackers who believe they are doing good but are breaking in to revelal system flaws |
|
|
Term
|
Definition
| hackers who act with the intention of causing harm |
|
|
Term
|
Definition
| a type of eavesdropping program that monitors information |
|
|
Term
|
Definition
| the process of transforming plain text of data into cipher text |
|
|
Term
|
Definition
| avaliable just about everywhere |
|
|
Term
|
Definition
| a set of application and technologies that allows users to create edit and distribute content, like bookmarks |
|
|
Term
| Will the apps make the internet irrelevant? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| What year was E-Commerce invented? |
|
Definition
|
|
Term
|
Definition
| includes a variety of threats such as viruses, worms, trojan horses and bots |
|
|
Term
|
Definition
| malware that is designed to spread from computer to computer |
|
|
Term
|
Definition
| appears to be benugn, but then does something other than expected |
|
|
Term
|
Definition
| an individual who intends to gain unauthorized information |
|
|
Term
|
Definition
| any deceptive online attempt by a third party to obtain confidential infromation for financial gain |
|
|
Term
|
Definition
|
|
Term
| Say one fact about anything from the case about the Latin America case |
|
Definition
|
|