P1: IML
WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0
900 INDEXCatalog business model,V1: 129
Catalogs.See alsoMetacatalogs
auction,V2:715–716
electronic,V1:123, 649
Catalog stores,V1: 130
Cathode Ray Tubes (CRTs), for virtual
reality,V3: 591
CAVE©Rsystem,V3:591–592
C/C++ languages,V1:164 –175, 225–226.
See alsoVisual C++
advanced data types in,V1:171–172
in client-server programming,
V1: 174
flow control in,V1:169–170
history of,V1:164 –165
Internet and,V1:172–174
using,V1:166 –169
C-commerce,V2: 441
business models for,V1: 214
gap analysis in,V1: 211
pilot projects for,V1:212–213
CD-ROM books,V2: 789
CD-ROMs, public relations,V2:774 –775.
See alsoCompact Discs (CDs)
CDMA2000 networks,V2:620 –621;
V3:824, 844, 845
CdmaOne wireless,V3: 822
CdmaTwo wireless,V3: 822
CDNOW recommender system,
V3: 59
Cell Broadcast Service (CBS),V3: 824
Cells,V3: 783
sectoring,V3: 188
splitting,V3: 188
transporting,V2:188–189
Cellular communication,V3:187–188
Cellular layouts,V3: 837
Cellular networks,V3:820 –821
use of IP technology in,V3: 832
Cellular phones,V3: 818
advertising via,V2: 583
Cellular systems:
convergence with IP,V3:845–847
current state of,V3:836 –839
third-generation,V3:844 –845
Censorship.See alsoInternet censorship
on auction sites,V2: 716
cyberlaw and,V1:341–342
Center for Interfirm Comparison (CIFC),
V1: 58
Centers for Disease Control (CDC),
V2: 431
Central Processing Unit (CPU),V1:142,
165, 231
Central Reservation Systems (CRSs),
V3:459, 461, 462
Certificate management messages,V3: 162
Certificate Management Messages over
CMS (CMC),V3: 162
Certificate Management Protocol (CMP),
V3:161–162.See alsoInternet Control
Message Protocol (ICMP)
Certificate Revocation Lists (CRLs),
V1:528, 533;V3:157, 160
Certificates,V1:51, 55
PGP,V1: 54
SET,V3: 253
Certificates of origin,V2: 238
Certification Authorities (CAs),V1:51,
500, 528, 533, 639;V2:227;V3:156,157, 266.See alsoBiometric
Certification Authority (BCA)
Certification Practices Statement (CPS),
V3:162–163
Certification services,V1: 500
W2K,V3: 799
Certified Information Technology
Professional (CITP),V3: 151
Certified Public Accounting (CPA) firms,
V3:145.See alsoPublic accounting
firms
information related to,V3: 149
CGI applications,V1:226 –227.See also
Common Gateway Interface (CGI)
CGI environment variables,V1:219,
220
CGI languages,V1:225–226
CGI.pm module,V1:222–223, 225
CGI programming, C/C++ and,
V1:172–174
CGI scripts, Web server,V3:45– 46
Chaining concept,V3: 239
Chain letters,V2: 278
Challenger sites, religious,V2: 803
Change detection software,V1: 259
viral detection via,V1: 257
Change/deviation detection,V1: 402
Channel coding,V1:458, 466
Channel complement,V1: 102
Channel conflict,V1:102, 193
managing,V1:187–188
Channel integration,V1: 185
Channel Operators (Chanops),V2: 314
Channels,V1: 193
covert,V3: 432
interoperability across,V1: 188
intersymbol interference,V1: 463
secure,V3: 262
specialization of,V1: 193
Character Data (CDATA),V1: 736
Charles Schwab,V3:280, 281
Chat groups,V2: 70
Chat netiquette,V2:280 –281
Chat rooms,V1:666;V3: 206
law enforcement,V2: 449
Chatting:
public relations,V2: 774
virtual teams and,V3: 603
Checks, electronic,V1:641–642
Check transactions,V1:635–636
Chemical industry, e-marketplaces for,
V1: 673
Chemical Industry Data Exchange,
V1: 812
Chemical Markup Language (CML),
V1: 733
Chemical terrorism Web sites,V2: 446
CHESS group,V2: 105
Chief Customer Officer (CCO),V1:323,
324
Chief Privacy Officers (CPOs),V3: 104
Childhood, effects of Internet on,V2: 106
Child Online Protection Act of 1998
(COPA),V1:341;V2:222, 267,
465– 466
Child pornography,V2:264, 451
Child Pornography Prevention Act of 1996
(CPPA),V2:266, 267
Children.See alsoMinors
exploitation of,V2: 451Internet relay chat and,V2:316 –317
privacy of,V3: 98
Children’s Internet Protection Act of 2000
(CIPA),V1:342;V2:222, 467
Children’s Online Privacy Protection Act of
1998 (COPPA),V1:341;V3: 105
Child selectors,V1:157, 163
China, cyberterrorism from,V1: 356
Chip-card technology,V1: 641
Choiceboard concept,V1: 322
Churn rate,V1: 324
Cipher-Block-Chaining (CBC) mode,
V1: 689
Cipher suites,V3: 270
Ciphertext,V1:686, 693–694
Circuit-level proxies,V1:833–834, 839
Circuit switching,V1:176 –184
in networks,V1: 200
voice telephone calls and,V1:179–180
Circumvention technology, trafficking in,
V1:309–310
Cisco Systems,V1: 795
supply chain management at,
V3:381–382
Citizens’ Band (CB) radio,V1: 666
Claims settlement,V2: 750
Clamshell PDAs,V3: 829
Class (social), digital divide and,V1: 469
Classes,V1:7, 23, 174
C/C++,V1:168–169, 171
CLASSID attribute,V1:13–14
Classification operations,V1: 235
Classless addressing,V3: 833
Classless interdomain routing,V3: 833
Classroom, instant messaging in,V1: 662
Class selectors,V1: 157
ClassWizard,V3: 637
Clearing houses, automated,V1:624 –625,
627, 633, 636
Click agreements,V1:530, 533
Click-and-brick electronic commerce,
V1:185–193
benefits of,V1:188–189
channel conflict and,V1:187–188
examples of,V1:190 –192
Click-and-mortar firms,V1:130, 137, 281,
608
“Click” contracts,V1: 343
Click e-agreements, validity of,V1: 345
Clickstream data,V1:324, 423
on shopping,V1:273, 276
warehouse for,V1: 422
Clickstreams,V2: 533
analysis of,V1:319, 405– 406, 423;
V2:696;V3:55–56
Click-through,V1: 816
“Clickwrap” contracts,V1: 350
Client admission control, Web quality of
service and,V3: 718
Client authentication, Web quality of
service and,V3: 718
Clients,V1:174.See alsoServer entries;
Server-side entries
Client/server classifications,V1:194 –197
Client/server computing,V1:194 –203
enabling technologies for,V1:197–201
implementations of,V1: 201
model for,V1:139, 145, 151
network operating systems for,V2: 543
programming in,V1: 174