- Intrusion Detection Systems (IDS) are designed to monitor network traffic and identify threats that may have breached the networks initial defenses. These include all of the following except:
Employees who use computing or network resources inefficiently.
- Google is a very prosperous, global e-business. Most of its revenue is generated from _____________.
Advertising
- The Internet introduced the concept of ________________, which enabled marketers and advertisers to communicate more effectively with consumers. For instance, consumers can click on an ad to obtain more information or send an email to ask a question.
Interactive marketing
- A popular method of paying bills online is called ____________________, where money is transferred electronically from a payer's account to the recipient's.
Electronic funds transfer (EFT)
- Micropayments are often made using a _______________________.
Cell phone
- As a result of e-commerce, some industries have experienced ___________________. This occurs when new jobs are produced as a result of opportunities created by the growth of e-commerce.
Reintermediation
- Customers can pay for products at Macy's using Google Wallet, a mobile payment app. At the register, customers simply tap their phones on a(n) _______________________ device in order to transfer funds to Macy's.
Near field communications (NFC)
- As of 2012, which of the following is the most popular mobile operating system globally with approximately 46% market share?
Android OS
- Starbucks allows customers to pay with their mobile devices. Customers create an account with Starbucks as part of the retailer's loyalty program, and transfer money to a pre-paid account. Upon check out, users activate the Starbucks app, which creates a _____________ that can be scanned at check out.
Bar code or QR code
- Your textbook identified a number of mobile banking security risks. Using a fraudulent communication, such as an e-mail, to trick the receiver into divulging critical information such as account numbers, passwords, or other identifying information is called ________________.
Phishing