Ethical Practices and Contract Essentials

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is one major drawback of using email for communication?

  • Slow message delivery
  • Limited character formatting options
  • Spam issues (correct)
  • High cost of sending messages

Which of the following is an example of a logical security measure?

  • Firewall maintenance
  • Employee training programs
  • Multi-factor authentication (correct)
  • Physical surveillance systems

What is the purpose of a homepage in an e-commerce website?

  • To display detailed product descriptions
  • To manage the shopping cart
  • To serve as the main entry point for visitors (correct)
  • To showcase customer reviews

What feature does a shopping cart provide to online customers?

<p>Tracking of selected items (B)</p> Signup and view all the answers

Which of the following describes how emails can be formatted?

<p>Like word-processing programs (C)</p> Signup and view all the answers

What is the primary concern addressed by deploying firewalls?

<p>Unauthorized access and cyber threats (D)</p> Signup and view all the answers

Why is regular data backup important for e-commerce businesses?

<p>To recover from data loss events (A)</p> Signup and view all the answers

What information is typically found on product pages of an e-commerce site?

<p>Detailed product information (A)</p> Signup and view all the answers

What is one key principle of ethical business practices?

<p>Transparency in operations (A)</p> Signup and view all the answers

Which of the following is considered consideration in a contract?

<p>Payment for goods delivered (A)</p> Signup and view all the answers

What does Customer Relationship Management (CRM) primarily aim to improve?

<p>Customer service (B)</p> Signup and view all the answers

Which element is NOT one of the three essential components of a contract?

<p>Negotiation (B)</p> Signup and view all the answers

Which practice is associated with social responsibility in business?

<p>Engaging in positive community practices (A)</p> Signup and view all the answers

What is NOT a function of Supply Chain Management (SCM) software?

<p>Customer analysis (D)</p> Signup and view all the answers

What is a primary benefit of using emails in business?

<p>Gathering information efficiently (B)</p> Signup and view all the answers

Which of the following best describes knowledge management software?

<p>A method for capturing and using organizational knowledge (D)</p> Signup and view all the answers

What is the primary purpose of a security policy?

<p>To describe which assets to protect and why (B)</p> Signup and view all the answers

Which of the following is NOT a step in creating a security policy?

<p>Create a promotional marketing plan (B)</p> Signup and view all the answers

What type of attack involves deceiving users to gain sensitive information?

<p>Phishing (A)</p> Signup and view all the answers

Which of the following methods is commonly used for electronic fund transfers (EFT) in B2B transactions?

<p>Checks (A)</p> Signup and view all the answers

What can SQL Injection lead to regarding sensitive data?

<p>Unauthorized access to customer information (C)</p> Signup and view all the answers

Which option describes an acceptable behavior according to a security policy?

<p>Following protocols for data protection (C)</p> Signup and view all the answers

Malware can enter a system through which of the following channels?

<p>Malicious downloads (C)</p> Signup and view all the answers

Which form of payment is NOT typically considered an online payment method?

<p>Cash (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Ethical Practices in E-commerce

  • Businesses should conduct their operations responsibly with transparency, respect for consumers, employees and the environment.
  • Transparency requires businesses provide accurate information about products and services, including potential risks.
  • Social responsibility means engaging in practices that contribute positively to the community and society.
  • Sustainability focuses on minimizing the environmental impact of business operations.
  • Inclusivity and accessibility aim to design websites and services that are accessible to all users, including those with disabilities.

Contract Essentials

  • Contracts are promises between legal entities for an exchange of value.
  • Essential elements of a contract include Offer, Acceptance and Consideration.
  • An offer is a commitment with specified terms made to another party.
  • Acceptance is the willingness to accept an offer with all its stated terms.
  • Consideration is the agreed upon exchange of something valuable.

CRM, KM & SCM

  • Customer Relationship Management (CRM) focuses on managing and analyzing customer interactions and data to improve customer service, satisfaction, and sales.
  • Knowledge Management (KM) involves capturing, distributing, and using knowledge within an organization to enhance performance and decision-making.
  • Supply Chain Management (SCM) helps companies coordinate planning and operations with their partners in industry supply chains.

Email Benefits and Drawbacks

  • Email is a popular form of business communication.
  • It is used for gathering information, executing transactions, and performing e-commerce tasks.
  • Email messages can convey messages quickly and include various file formats.
  • Drawbacks include time-consuming replies, potential for virus transmission, and spam.

Logical Security Measures

  • Logical security measures protect digital information and systems from unauthorized access, attacks, and breaches.
  • Access control ensures only authorized personnel can access sensitive systems and data.
  • Firewalls protect the network from unauthorized access and cyber threats.
  • Strong authentication mechanisms, such as multi-factor authentication, verify user identity.
  • Data backup procedures ensure critical information can be restored in case of data loss.

Web Pages in E-Commerce

  • Web pages act as digital storefronts for businesses to present products and services.
  • The homepage is the main entry point, featuring branding, promotions, and links to product categories.
  • Product pages provide detailed information about specific products.
  • Category pages offer a selection of products within a specific category with filtering options.
  • Shopping carts allow customers to view, add, or remove items from their purchases.

Security Policy

  • A security policy outlines assets to be protected, reasons for protection, responsible individuals, and acceptable and unacceptable behaviors.
  • The process for creating a security policy involves determining assets needing protection, identifying access needs, evaluating available resources, and developing a written policy.

Security Threats

  • Phishing attacks involve deceptive emails or websites to trick users into providing sensitive information.
  • Malware, like viruses, Trojans, and ransomware, can infect websites and lead to data breaches and financial losses.
  • SQL Injection involves injecting malicious code into a website's database to access sensitive data.

Online Payment Methods

  • Electronic Funds Transfers (EFTs) are commonly used in B2B transactions.
  • Cash, checks, credit cards, and debit cards are common payment methods for consumers.
  • Online payment methods include PayPal, prepaid cards, debit cards, credit cards, and store-branded cards.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

E-Commerce 512 Scope PDF

More Like This

Use Quizgecko on...
Browser
Browser