P1: IML
WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0
INDEX 903enabling technologies for,V1:289–290
future of,V1:290 –292
models of,V1:285–289
Consumer Packaged Goods (CPG)
companies,V1: 677
Consumer personalization,V1: 286
Consumer promotion sites,V2:772–773
Consumer protection, wireless
technologies and,V3: 856
Consumers.See alsoCustomer entries;
Online consumers
digital identity and,V1:496 – 497
in e-commerce,V1:605–606
online quality and,V1:279–280
Consumer Sentinel site,V1:342–343
Consumer services, supplementary,
V1:288–289
Consumer-to-Business (C2B) e-commerce,
V1: 292
Consumer-to-Buyer (C2B) e-commerce,
V1:287–288
Consumer-to-Consumer (C2C)
e-commerce,V1:288, 292, 481, 804
Consumer trust,V2: 57
Consumption tax, sourcing rules related
to,V3: 420
Containers,V1: 23
Content, design of,V2:794 –795
Content-based filtering,V3: 54
Content-based recommender systems,
V1:408, 410
Content control, in public relations,
V2: 779
Content Delivery Networks (CDNs),
V2:510 –512;V3:168, 564 –565
Content filtering network,V2: 548
Content management:
for extranets,V1:797–798
intranet,V2: 350
Content prototypes,V3:139–140
Contests,V2: 570
Context, Perl,V3: 36
Contextual inquiry technique,V3: 515
Continuous Link Settlement System,
V1:107, 108
Continuous Replenishment Process
(CRP),V1:619–620
Continuous Variable Slope Delta (CVSD)
modulation,V1: 90
Contract clauses, model,V2: 224
Contracts.See alsoElectronic contracts
with application service providers,V1: 43
data sharing,V1:499–500
e-commerce,V1: 487
strategic alliance,V3:349–350
Contracts for the International Sale of
Goods (CISG),V1: 347
Control block, BluetoothTM,V1:89–90
Control flow, Perl,V3:37–39
Controlled vocabularies,V3:692–693
Control licensing,V1: 14
Convention on Cybercrime,V1: 355
Convergence,V2:245–246
guarantees,V3:717–718
protocol,V2: 246
Convergence Sublayer (CS),V1:178, 179
Cookies,V1:7, 50, 51, 253, 290, 292, 306,
310;V2:304.See alsoSession cookie
corporate use of,V2:471– 472
privacy and,V3:102–103user identification and,V3: 55
Web mining and,V1: 405
“Coopetition” approach,V2:828–829
Coordination-based workflow systems,
V2: 69
Copying, illicit,V2: 469
“Copyleft,”V2:493, 494, 824;V3: 499
Copyright.See alsoOpen source
development
duration of,V1: 304
extension of,V1: 338
respecting,V2: 280
software,V3:302–303
subject matter of,V1: 305
webcasting-related issues in,V3:683–684
Copyright Act of 1976,V2: 269
Copyrighted material, digitized,V1: 309
Copyright infringement,V2: 270
burden of proof in,V1: 305
defenses to,V1:308–309
ISP liability for,V2:228–229
remedies for,V1: 309
theories of,V1:307–308, 313
Copyright law(s),V1:303–314, 337–338,
484;V2:467– 468, 785.See also
Copyright infringement
copyright as intellectual property,
V1:303–307
digital libraries and,V1:517–519, 523
Digital Millennium Copyright Act and,
V1:309–312
international,V1:312–313
Copyright notices,V1: 345
Copyright owner:
exclusive rights of,V1: 313
rights of,V1:305–306
Copyright registration,V1: 305
CORBA communications protocol,
V1:752.See alsoCommon Object
Request Broker Architecture (CORBA)
Cordless computers,V1:88.See also
Wireless entries
Cordless telephony,V1: 87
Core competencies:
c-commerce,V1: 206
developing,V3:341–342
supply network,V3: 406
Corporate Internet domain,V2: 547
Corporate media convergence,V2: 757
Corporate portals,V2:307–308
Corporate strategy, e-business investments
and,V3:224 –226
“Corporate universities,”V1: 553
Corporate Web pages,V2: 772
Corporations.See alsoCompanies; Firms
banking products/services for,
V2:726 –727
database building by,V1: 317
online shopping and e-procurement for,
V2:729–730
use of personal information by,
V2:471– 472
Corvid ES development tools,V3:243–244
Cost/benefit calculations/estimates,
V1:583–586
for intranets,V2:352–353
Cost-cutting, e-procurement and,V1: 654
Costs:
of click-and-brick electronic commerce,
V1: 189of EDI implementation,V1: 618
employee training,V2:156 –157
extranet,V1: 797
management of,V3:119–120
Web hosting,V3: 702
Coupons,V2: 569
Courts, virtual,V2:752–753.See also
Cybercourt; Law(s); Legislation
Covert channels,V3: 432
Covisint global marketplace,V1:110, 674,
677–678
CPA2Biz Web site,V3: 149
CPYNET,V2: 118
“Crackers,”V1:328.See alsoPassword
crackers
Cracking,V2: 474
Crashing technique,V3: 119
Crawlers,V1:348;V3:740.See alsoWeb
crawlers
Create Change site,V1: 514
Creative communities, online,V2: 739
Credentials,V1: 49
establishing,V1: 55
Credit card fraud,V1: 130
Credit card numbers, surrogate,V3: 258
Credit card payments,V1:636 –637;
V3: 762
Credit card purchases:
analysis of,V1: 409
online,V1:638–640
Credit card schemes,V3: 250
Credit card theft,V1:332–333, 608
Credit reports, privacy of,V3: 98
Credit validation services,V1: 683
Crime, Internet,V2:450 – 452.See also
Cybercrime
Crime & Punishmentcomputer-based
simulation,V2:343–344
Crime scene Web sites,V2: 446
Crime statistics Web sites,V2:450, 451
Crisis communications, public relations,
V2:777–778
Crisp sets,V1:841, 842
Critical chain scheduling,V3:118–119
Critical path analysis,V3:116 –118
CRM applications,V1:712.See also
Customer Relationship Management
(CRM)
CRM programs, steps in implementing,
V1: 316
Cross-browser support, in Web site design,
V3: 774
Cross-posting,V2: 280
Cross-promotions,V1: 188
Crossroads storage routers,V3: 334
Cross-selling,V1:409, 604 –605
of banking products,V2:727–728
Crosstalk,V1:271, 464;V2: 673
Crosswalks programs,V2: 485
Cryptanalysis,V1:686, 694
differential,V1: 689
Cryptographic Message Syntax (CMS),
V3: 162
Cryptographic password protection,V3: 3
Cryptographic systems,V2:322–323
Cryptography,V1:686, 694;V2:226;V3: 3
public key,V1:628–629
Cryptology,V1: 686
Cryptosystem,V1: 694
CSNET,V2: 119