The Internet Encyclopedia (Volume 3)

(coco) #1

P1: IML


WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0


904 INDEX

CSS1 selectors,V1: 157
CSS2 selectors,V1:157–158
CSS3 development,V1:162–163
CSS box model,V1:154 –155.See also
Cascading Style Sheets (CSS)
CSS declarations,V1: 156
CSS Level 2 standard,V1: 450
CSS properties,V1:156, 159, 163
CSS selectors,V1:156 –158, 163
CSS standards,V1: 153
CSS values,V1:156, 163
types of,V1: 159
CTCNet program,V1:473– 474
Cue effects,V2: 652
Culture(s):
adapting to,V1:811–812
global electronic commerce and,
V2: 61
Internet adoption and,V2:15–16
Currency issues,V2: 60
Cursors:
as recordset objects,V1:29–30
types of,V1:29–30, 34
Customer attraction analysis,V1: 408
Customer behavior planning,V1: 141
Customer care innovation,V2:837–838
Customer-centric e-business value chain,
V2:166 –167
Customer communities, online,
V2:737–738
Customer culture,V1:811–812
Customer databases,V1: 324
analyzing,V1:318–319
creating,V1:317–318
Customer departure analysis,V1: 409
Customer Experience Management
(CEM),V1: 324
Customer incentive programs,V1: 605
Customer Information Control System
(CICS),V1: 197
Customer interaction framework,
V1: 318
Customer loyalty,V1:102;V3:854 –855
building,V1: 101
Web site design and,V1: 280
Customer-product matrix,V1: 408
Customer pyramid,V1:319, 324
Customer relationship,V3: 855
Customer Relationship Management
(CRM),V1:125, 204, 315–325, 717,
816;V2:835;V3:371–372.See also
CRM entries
collaborative,V2:70 –71
future of,V1:323–324
global,V1: 812
metrics and,V1: 323
over mobile networks,V3: 551
personalization and,V3:60 –61
poor data quality in,V1: 419
privacy and,V1:322–323
relationship programs in,V1:321–322
travel and tourism industry,V3: 464
Customers.See alsoConsumer entries
disappearance of,V2:571–572
inquiries by,V1: 814
profiling of,V1:407, 410
profitability of,V1:319, 320
providing OLAP capabilities to,V2: 697
retaining,V1:408– 409
targeting,V1:320 –321

Customer satisfaction,V1: 324
fulfillment and,V1: 813
policies,V2: 168
Customer service,V1: 321
online self-serve,V2: 724
online,V1: 278
Customer support, travel and tourism,
V3:466 – 467
Customer value needs,V3:400 – 401
Customization,V1:322.See alsoMass
customization
defined,V3: 51
in e-manufacturing,V1: 723
JavaBean,V2: 394
marketing strategy for,V1: 604
product,V1: 728
of supply network relationships,
V3:406 – 410
Customization technologies.See
Personalization and customization
technologies
Customs brokers,V2: 236
Customs Modernization Act (Mod Act),
V2: 240
Cut, copy, and paste operations,
V2:648–649
Cyberattacks,V1: 329
Cybercourt,V1:350.See alsoCourts
Cybercrime,V1:115–116, 326 –336, 349.
See alsoCrime entries
as cyberterrorism,V1:355–356
in developing countries,V1:436 – 437
statistics concerning,V1: 327
types of,V1:327–333
Cyberfraud,V1:331–333, 334, 342–343
Cybergold,V1: 133
Cyberlaw,V1:337–352.See also
Cybercrime; Law(s); Legislation
censorship,V1:341–342
conflicts related to,V1:346 –347
copyright law,V1:337–338
cyberfraud,V1:342–343
defamation,V1:340 –341
dispute resolution,V1:347–348
domain names and trademark law,
V1:338–340
e-commerce law,V1:343–344
e-commerce “terms of use” provisions,
V1:344 –345
global e-commerce and,V1: 344
international,V2:216 –232
law of linking,V1: 348
patents,V1: 340
privacy,V1: 341
Cybermediators,V1: 347
Cyberpirates,V1: 350
Cyberprotests,V1:358, 368
Cybersabotage,V1:328–331
Cyberscanning,V2: 769
Cybersecurity, against cyberterrorism,
V1:364 –367.See alsoSecurity
Cybersettle.com,V1: 348
“Cyber sovereignty,”V2: 217
Cyberspace,V1:368, 490;V3: 600
disputes over,V2:747–748
Cybersquatting,V1:338, 339;V2:219,
468– 469, 779;V3:453– 454, 455.See
alsoAnticybersquatting Consumer
Protection Act of 1999 (ACPA)
Cyberstalking,V2:451, 813

Cyberterrorism,V1:353–371.See also
Cyberterrorists
acts of,V1:356 –358
asymmetric response and,V1:358–359
creation of,V1:355–359
defined,V1:353–354
in developing nations,V1: 437
effects of,V1:363–364
eliminating or minimizing,V1:364 –368
law enforcement and,V1:367–368
legal and privacy concerns related to,
V1: 367
physical/virtual convergence and,
V1:360 –364
reasons for,V1:358–359
sponsors of,V1: 359
versus other terrorism,V1:354 –355
vulnerabilities to,V1:359–360
Cyberterrorists,V1: 356
location of,V1:362–363
tools of,V1:361–362
Cybervandalism,V1:355–356
Cyclic Redundancy Check (CRC),V1: 257

Daemons,V1:256, 334
D-AMPS+ wireless,V3: 822
Danvers Doctrine,V2: 326
Dash-dot name,V1: 350
Data,V2:441.See alsoBusiness data
best classification practices for,V2: 79
granularity of,V1: 416
information versus,V2: 432
knowledge versus,V2: 432
representation of,V1:237–238
versus information,V1:234 –235
Data access.See alsoDatabase access
universal,V1: 26
in Visual Basic,V3:616 –617
Data Access Objects (DAO),V1:26, 27, 34
Data Access Pages,V1: 378
Data analysis:
tools for,V1: 401
usability testing and,V3: 520
Database access.See alsoData access
dynamic,V1: 378
static,V1:377–378
Database connectivity, Web software and,
V3: 292
Database interface strategy,
V3:394 –395
Database representatives, constructing,
V3: 748
Databases:
copyright protection for,V1:306 –307
customer,V1:317–318
e-commerce,V1: 374
evolution of,V1:374 –375
identifying,V1:378–379
integration of,V1:111–112
international cyberlaw protection of,
V2: 229
keys and relationships in,V1:375–376
m-commerce marketing of,V3: 853
multiple,V1: 112
normal forms in,V1:376 –377
Perl and,V3: 47
publishing,V2: 795
referential integrity of,V1: 376
selection techniques for,V3:746 –749
server systems for,V1: 34
Free download pdf