The Internet Encyclopedia (Volume 3)

(coco) #1

P1: IML


WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0


902 INDEX

Communication technology initiatives, in
developing nations,V1:439– 441
Communities:
customer,V1:322, 324
online,V1: 490
religious,V2:799–800
securities trading,V3: 276
Community building, public relations and,
V2:570 –571
Community bulletin board site model,
V2: 766
Community computer centers,V1: 474
Community hubs, religious,V2:802–803
Community models,V1: 604
Community portals,V2: 307
Community services,V1: 498
Community Technology Center (CTC)
initiative,V1: 598
Community Web sites,V3: 772
Compact Discs (CDS),V1:294, 297–298.
See alsoCD-ROM entries
Compact HTML (C-HTML),V3: 825
Companies.See alsoBrick-and-mortar
firms; Corporations; Firms
benchmarking of,V1: 59
competitive mission of,V1: 99
cybersecurity for,V1: 365
effects of cyberterrorism on,V1: 363
expanding missions of,V3:345–346
identifying goals of,V2: 576
Company-centric B2B e-commerce,
V1: 128
Company-centric model,V1: 121
Company/product information Web sites,
V3: 772
Compaq mobile devices,V2: 630
Competition:
data warehousing and,V1: 415
e-marketplace,V1: 683
in online auctions,V2:703–704
organizational,V2:836 –837
versus “coopetition,”V2:828–829
webcasting-related,V3: 684
Competitive advantage:
Internet and,V1:135–136
sustainable,V1: 718
Competitive Local Exchange Companies
(CLECs),V3: 169
Competitive mission,V1: 99
Competitors, knowledge of,V2:578–579.
See alsoCompetition
Compiled languages,V1: 6
advantages of,V1:225–226
Compilers,V1:164, 165–166, 174
game,V2: 8
Compliance:
monitoring,V3:243–244
testing,V3: 249
Component environment,V1: 202
Component model,V1: 202
Component Object Model (COM),V1:11,
23, 112, 198;V2:609.
See alsoCOM entries
Component Object Model OLE (COM
OLE),V3: 644
Components,V1:23, 202
ASP-managed,V1: 41
Component software,V1:198–199
Component technologies,V1: 15
Compositing tools,V2: 655

Compression.SeeData compression; File
compression; Speech/audio
compression; Video compression
Compression ratio,V1: 398
CompuServe,V1: 664
Computational Intelligence (CI),V1: 849
Computer architectures, for virtual
enterprises,V3:571–575
Computer attacks,V1:115–116
Computer-Based Training (CBT),
V1:551–552, 576;V3:662–663
Computer cables, replacing,V1:88.
See alsoCable
Computer crimes,V1:115–116.See also
Cybercrime
Computer Emergency Response Team
Coordination Center (CERT/CC),
V1:242, 356, 357, 360, 366, 424
Computer Emergency Response Teams
(CERTs),V1:242, 246
Computer Fraud and Abuse Act of 1984
(CFAA),V1:326 –327, 330, 349
Computer game industry, impact of,
V2:1–2
Computer games,V1: 490
designing,V2:6–7
elements of,V2:2– 4
Computer immunological approach,
V2:358–359
Computer infrastructure,V1: 472
Computer languages,V1:230 –231.
See alsoProgramming languages
Computer literacy,V1:229–241
in developing nations,V1: 436
Computer platforms, OLAP and,
V2:689–690
Computer programs,V1:230.See also
Programming
Computer resource requirements,V1: 147
Computer revolution,V1:295–296
Computers.See alsoComputer systems;
Computing entries
applications of,V1: 230
categories of,V1: 232
as cybercrime targets,V1: 327
defined,V1:230 –232
generations of,V1:236 –237, 241
home access to,V1: 468
networking,V2:515–516
operations performed by,V1: 236
physical damage to,V3:67–68
power of,V1:235–236
as tools of cybercrime,V1: 327
wearable,V3: 829
Computer Security Incident Response
Teams (CSIRTs),V1:242–247
organizing,V1: 243
Computer Security Institute (CSI),V1: 363
Computers for Youth program,V1: 474
Computer skills, development of,V1: 471
Computer systems.See alsoOperating
systems; System entries
for digital libraries,V1:520 –521
recovery of,V1: 245
Computer viruses/worms,V1:248–260
Computer vision syndrome,V2: 109
Computing.See alsoComputer entries
client/server,V1:194 –203
infrastructure problems and,V3: 67
low-cost,V3: 87

Computing resources, threats to,
V3:64 –69
Computing security, humans and,
V3:68–69.See alsoSecurity
Concern communities, online,V2: 739
Concurrency, in multiuser systems,
V3: 361
Conditional preferences,V3: 58
“Condor, the”V1: 353
Conducted communications media,
V1:261–271
coaxial cable and,V1:263–267
fiber optic cable and,V1:269–270
network transmission,V1:261–263
twisted-pair cable and,V1:267–269
Conferences:
cybersecurity for,V1: 366
online,V3: 206
software for,V2: 437
Confessions, religious,V2: 806
Confidentiality.See alsoPrivacy
CPA privilege of,V3:152–153
monitoring and regulating,V1: 115
Configuration lists,V2: 524
Conflict management.SeeDispute
resolution
Congestion control,V2:249–250;V3: 431
Conjoint analysis,V1: 406
Connection hijacking,V3: 433
Connection-oriented protocol,V1: 181
Connections:
TCP,V3: 429
unauthorized,V3:69–70
Connectivity,V1:474.See alsoDigital
divide
advantages of,V1:472– 473
failures in,V1:536, 537
in infrastructure,V2: 53
providing,V1:471– 472
Web site design and,V3: 773
Consciousness expansion, Internet and,
V2: 105
Consortium for Advanced Manufacturing
International (CAM-I),V1: 209
Consortium,V1: 685
Consortium trading exchange,V1:121,
122
Constant Bit Rate (CBR),V1:178, 180;
V2:205;V3: 173
Constitutional privacy,V3:96 –97
Constructive Cost Model (COCOMO),
V1: 586
Constructors, C/C++,V1:171–172
Consularization,V2: 239
Consulting firms,V1: 585
Consumer banking, future of,V2: 730
Consumer behavior,V1:272–282;
V3: 409
future of online shopping,V1: 281
mind-sets and,V1:273–277
online shopping,V1:272–277, 277–281
segmenting online consumers,
V1:277–277
wireless,V3:854 –856
Consumer buying process,V1:284 –285
Consumer demands,V3:398–399.
See alsoDemand
Consumer Internet privacy,V3:101–104
Consumer-oriented electronic commerce,
V1:284 –293
Free download pdf