E-commerce Implementation Flashcards
What are the pros and cons of being the first to the digital marketplace?
Pros
o It’s something new and gets a lot of sales up front
Cons
o The high upfront costs associated with trial and error
o The second to digital market usually makes out better
Gaining traction in a digital marketplace may involve a combination below. Define below
disintermediation
reintermediation
Disintermediation – the removal of a traditional service broker from a transaction chain
Reintermediation – the insertion of the online form into the chain – middle man out and in
What is channel conflict?
Online and also in store
o Compensate B and M
o Close down one or each do different
Michael Porter argues that successful organizations in mature industries must compete on exactly one of 3 bases
Cost
Uniqueness of product
Quality of service to a particular market segment
One concern that a top-down IA should address that bottom-up IA does not
I know what I’m searching for – how do I search for it? Resolved with a search box
3 best practices for crafting web page prose
Create scannable content
Keep choices simple
Omit needless words
Search zone
- A group of contexts whose searches yield the same results
- Can make searching more precise at the cost of extra effort
- Can be configured by physically segmenting documents or tagging content
High recall ratio vs high precision ratio
- Getting more results with less precision versus getting fewer results with more precision
- Depends on why a user is seeking a result
TEMPEST
Telecommunications Electronic Materials Protected from Emanating Spurious Transmissions
A government term that refers to the “unintended emissions from electronic equipment”
- EMR scavenging – obtaining information from incidental EMR
- Monitors radiation emitted by telephone wires, CPUs, modems, network cables, and ATMs
Injection attack
A broad class of attack vectors that allow an attacker to supply untrusted input to a program, which gets processed by an interpreter as part of a command or query which alters the course of execution of that program
- Target the codes that create logic by combing a preexisting partial command with raw (unsanitized) user input
- It responds to a request for input with context that causes an application to execute a command on the attackers behalf
KRACK
Key Reinstallation Attack
The attacker sets up a Wi-Fi network with the same name (SSID) as that of an existing network and target a specific user. When the attacker detects that the user is about to connect to the original network, they can send special packets that make the device switch to another channel and connect to the fake network with the same name.
• Wifi hacking that permits a hostile user to use “ordinary” URLs to gain “unauthorized” access to directories in a web server’s file system that are outside of the URL’s associated subdirectory
Trojan horse
disguised as something safe and then attacks once activated
Computer virus
activated by a user’s action
attacks specific files until activated to attack other files
Worm
spreads and replicates itself throughout everything it has contact with, rendering a computer useless
attacks up front
Backdoor
installed to provide access to the victim’s machine
Shih’s 4-part framework for effective sales professionals
Be findable
Grow your network
Research, listen, and act on important signals
Exercise and engage
Rosenfeld et al
Guidelines for devising labels
Develop consistent labeling systems, not labels
o Consistency in style (punctuation), presentation (font, color), syntax, granularity
o For more representational and less ambiguous
Rosenfeld et al
3 Categories of Navigation
Major navigation
o Includes global, local and contextual
o The “main” IA that appears on every page except forms
Supplemental
o Includes sitemaps, indexes, and guides
o Compensate for the failure of an IA’s organization
Advanced
- include personalization and customization, visualization, and social navigation.
Rosenfeld et al
Heuristic evaluation
An evaluation of an organization’s current IA
This is typically at the start of redevelopment
Asses the current IA’s quality, if it uses appropriate language and supports mutually reinforcing mechanism for searching and browsing
Best practices to follow when creating wireframes (2 of 5)
Maintain consistent graphical language and terminology
Use callouts to provide details about page element operation
What is Top-down architecture?
4 questions?
An IA’s entry point—e.g., a site’s home page—should address a typical user’s overarching questions about the IE it presents
- Where am I? (logo)
- I know what I’m looking for; how do I search for it? (search box)
- How do I get around this site? (top-level navigation bar)
- What’s important and unique about this organization? (“Where Gustavus can take you” tile)
What is Bottom-up architecture?
3 questions?
Being directed by search engines to to arbitrary places in IAs.
- has a clear strong structure, as reflected by the contents’ sequential placement: i.e., title, list of ingredients, directions, with content displayed in chunks
- uses terms that could support further searching
use content to support answering questions like
“Where am I?”, “What’s here?”, and “Where do I go from here?”
Invisible architecture
prearranged responses to likely searches (best bets), possibly identified from analyses of a site’s search logs
controlled vocabularies and thesauri, which support broadened searches using synonyms for user-specified terms
retrieval algorithms, which rank items by relevance
What is the foundation of many good IAs?
Top-down, hierarchical schemes
Their advantages include their simplicity and familiarity