【正文】
icetodevice connections within a very short range;:A set of telemunications standards that enables wireless devices to municate with each other over short distances; local area network (WLAN):A telemunications network that enables users to make shortrange wireless connections to the Internet or another network; (wireless fidelity):The mon name used to describe the IEEE standard used on most WLANs;:A wireless standard (IEEE ) for making broadband network connections over a mediumsize area such as a city; wide area network (WWAN):A telemunications network that offers wireless coverage over a large geographical area, typically over a cellular phone network; mmerce (lmerce): Delivery of mmerce transactions to individuals in a specific location, at a specific time; positioning:Relies on base stations to find the location of a mobile device sending a signal or sensed by the network; positioning:Calculating the location of a mobile device from signals sent by the device to base stations; positioning system (GPS):A worldwide satellitebased tracking system that enables users to determine their position anywhere on the earth; information system (GIS):A puter system capable of integrating, storing, editing, analyzing, sharing, and displaying geographicallyreferenced (spatial) information; puting:Invisible, everywhere puting。 for example, sellers and buyers, buyers among themselves, buyers and suppliers, and colleagues and other colleagues; social network:A social network whose primary objective is to facilitate business connections and activities; Web:An evolving extension of the Web in which Web content can be expressed not only in natural language, but also in a form that can be understood, interpreted, and used by intelligent puter software agents, permitting them to find, share, and integrate information more easily; continuity plan:A plan that keeps the business running after a disaster occurs. Each function in the business should have a valid recovery capability plan;:Intentional crimes carried out on the Internet;:The estimated cost, loss, or damage that can result if a threat exploits a vulnerability;:Any business activity that uses deceitful practices or devices to deprive another of property or other rights;:A generic term for malicious software;:A crimeware technique to steal the identity of a target pany to get the identities of its customers; engineering:A type of nontechnical attack that uses some ruse to trick users into revealing information or performing an action that promises a puter or network; fraud:Type of fraud that occurs in payperclick advertising when a person, automated system, or puter program simulates individual clicks on banner or other online advertising methods; theft:Fraud that involves stealing an identity of a person and then the use of that identity by someone pretending to be someone else in order to steal money or get other benefits;:Software that gathers user information over an Internet connection without the user’s knowledge;:The electronic equivalent of junk mail; card:An electronic card containing an embedded microchip that enables predefined operations or the addition, deletion, or manipulation of information on the card; cards (pcards):Specialpurpose payment cards issued to a pany’s employees to be used solely for purchasing nonstrategic materials and services up to a preset dollar limit; verification number :Detects fraud by paring the verification number printed on the signature strip on the back of the card with the information on file with the cardholder’s issuing bank; Verification System (AVS):Detects fraud by paring the address entered on a Web page with the address information on file with the cardholder’s issuing bank; Clearing House (ACH) Network:A nationwide batchoriented electronic funds transfer system that provides for the interbank clearing of electronic payments for participating financial institutions; fulfillment:All the activities needed to provide customers with their ordered goods and services, including related customer services; operations:The activities that support fulfillment of orders, such as packing, delivery, accounting, and logistics; operations:The business processes, such as sales and advertising, which are visible to customers;:The logistics of EC systems, typically involving small parcels sent to many customers’ homes ;:Logistics model in which ponents for a product may e from two (or more) different physical locations and are shipped directly to the customer’s location; warehouse:Logistics method in which products on the delivery truck are not preassigned to a destination, but the decision about the quantity to unload at each destination is made at the time of unloading; resource planning (ERP):An enterprisewide information system designed to coordinate all the resources, information, and activities needed to plete business processes such as order fulfillment or billing; auction:Auction in which each bidder bids only once。a silent auction,in which bidders do not know who is placing bids or what the bid prices areVickrey auction:auction in which the highest bidder wins but pays only the second highest bidBundle trading:the selling of several related products and/or services together9 / 9