Uploaded by Skskdmeslslslaem

ebusiness testbanks

advertisement
Electronic Commerce 2010 (Turban / Lee / King / Liang / Turban)
Chapter 1 Overview of Electronic Commerce
1.1 True/False
1) Radio frequency identification (RFID) chips were used to prevent counterfeit tickets and to
ensure the safety of the athletes' food at the 2008 Olympics in Beijing.
Answer: TRUE
Diff: 2
Page Ref: 2
AACSB Standard: Use of Information Technology
2) Electronic commerce (EC) is the process of buying, selling, transferring, or exchanging
products, services, and/or information via the Internet only.
Answer: FALSE
Diff: 2
Page Ref: 4
AACSB Standard: Use of Information Technology
3) EC can be conducted over the public Internet or privately-owned intranets.
Answer: TRUE
Diff: 1
Page Ref: 4
4) In the field, a sales representative writes notes with a mobile handwriting-recognition
computer immediately after a sales call. This can be viewed as an business-to-business EC
activity.
Answer: FALSE
Diff: 2
Page Ref: 5
AACSB Standard: Reflective Thinking
5) From a service perspective, EC allow governments, firms, consumers, and management to
both cut service costs and improve the quality and speed of customer service.
Answer: TRUE
Diff: 2
Page Ref: 5
AACSB Standard: Use of Information Technology
6) An extranet is a network that uses private corporate networks to link together multiple
intranets.
Answer: FALSE
Diff: 2
Page Ref: 7
7) An example of business-to-consumer (B2C) is when Dell provides customer service online by
collaborating electronically with its partners.
Answer: FALSE
Diff: 2
Page Ref: 7
1
Copyright © 2010 Pearson Education, Inc.
8) eMarketer estimated that retail e-commerce sales would decrease approximately 1.6 percent in
2009.
Answer: FALSE
Diff: 2
Page Ref: 7
9) Network infrastructures include cell phones and other electronic devices that are located in
various locations by telecommunications networks, including wireless ones.
Answer: TRUE
Diff: 2
Page Ref: 8
AACSB Standard: Use of Information Technology
10) The final participants in B2B transactions are consumers.
Answer: FALSE
Diff: 1
Page Ref: 9
11) When RetroMedia Inc. purchases Godiva chocolates as gifts for its employees and has
Godiva mail them directly to the recipient, RetroMedia is engaged in B2B2C.
Answer: TRUE
Diff: 2
Page Ref: 9, 10
12) Doing your banking on an iPhone is an example of m-commerce.
Answer: TRUE
Diff: 2
Page Ref: 11
AACSB Standard: Use of Information Technology
13) EC's future is now being shaped largely by the worldwide oil and financial crises.
Answer: FALSE
Diff: 3
Page Ref: 13
AACSB Standard: Reflective Thinking
14) Despite the failures of individual companies, the total volume of EC has been growing by 5
to 7 percent every year.
Answer: FALSE
Diff: 2
Page Ref: 13
15) E-commerce 2.0 is based primarily on blogs and corporate-sponsored collaboration.
Answer: FALSE
Diff: 1
Page Ref: 13
16) In effect, in a social network there are online and offline communities of people with similar
interests.
Answer: FALSE
Diff: 2
Page Ref: 17
2
Copyright © 2010 Pearson Education, Inc.
17) Enterprise-oriented networks are social networks whose primary objective is to facilitate
business.
Answer: TRUE
Diff: 1
Page Ref: 17
18) Economic, legal, societal, and technological factors have created a highly competitive
business environment in which customers are becoming less powerful.
Answer: FALSE
Diff: 2
Page Ref: 27
19) The financial/economic crisis of 2008-2009 has resulted in many companies going out of
business or being acquired by other companies.
Answer: TRUE
Diff: 1
Page Ref: 27
20) Business models are a subset of a business plan or business case and refer to methods of
doing business by which a company can generate revenue.
Answer: TRUE
Diff: 2
Page Ref: 30
21) A business model outlines how the organization or the EC project will generate revenue
through sales, transaction fees, advertising fees, affiliate fees, or other revenue sources.
Answer: FALSE
Diff: 2
Page Ref: 30
22) A value proposition refers to the tangible and intangible benefits that a company can derive
from using EC—making it an important part of the marketing plan.
Answer: TRUE
Diff: 2
Page Ref: 33
23) Affiliate marketing is an EC business model of word-of-mouth marketing in which
customers promote a product or service to friends or other people.
Answer: FALSE
Diff: 2
Page Ref: 34
24) The Web site http://chemconnect.com for the chemical industry is an example of special
interest vertical marketplaces that concentrate on one industry.
Answer: TRUE
Diff: 1
Page Ref: 34
25) The branch of philosophy that deals with what is considered to be right and wrong is known
as corporate governance.
Answer: FALSE
Diff: 1
Page Ref: 34
3
Copyright © 2010 Pearson Education, Inc.
1.2 Multiple Choice
1) The 2008 Olympics in Beijing was the most digital Olympics to date for each of the following
reasons except:
A) Many of the tickets were purchased online by people worldwide, using Beijing Gehue
Ticketmaster, in what is called business-to-business (B2B) e-commerce.
B) The International Olympic Committee launched a YouTube channel to broadcast clips that
were accessible in many developing countries.
C) Millions watched the Olympics through online videos and Internet-enabled cell phones and
other mobile devices.
D) Global Positioning Systems (GPS) were used to track the position of sailing and rowing
boats.
Answer: A
Diff: 3
Page Ref: 2
AACSB Standard: Use of Information Technology
2) RFID technology was used to support each of the following activities at the 2008 Beijing
Olympics except:
A) ensuring safety of athletes' food
B) blogging on social networks
C) preventing the sale of counterfeit tickets
D) tracking marathon runners
Answer: B
Diff: 2
Page Ref: 2,3
AACSB Standard: Use of Information Technology
3) ________ refers to the buying and selling of goods and services; servicing of customers;
collaborating with business partners; and conducting electronic transactions within an
organization.
A) E-commerce
B) E-business
C) Pure e-commerce
D) Partial e-commerce
Answer: B
Diff: 1
Page Ref: 5
4) EC can take several forms depending on the degree of digitization of the following three
dimensions:
A) the product or service sold, the process, and the delivery method.
B) the business process, the collaboration, and the transaction.
C) the payment method, the delivery method, and the production method.
D) the marketing channel, the agent, and the collaboration method.
Answer: A
Diff: 2
Page Ref: 5
4
Copyright © 2010 Pearson Education, Inc.
5) Purely physical companies are referred to as ________ companies, whereas companies that
are engaged only in EC are considered ________ companies.
A) pure play; virtual
B) brick-and-mortar; virtual
C) click-and-mortar; click-and-brick
D) virtual; pure play
Answer: B
Diff: 2
Page Ref: 5
6) What is a corporate or government network that uses Internet tools, such as Web browsers,
and Internet protocols?
A) social network
B) extranet
C) intranet
D) e-market
Answer: C
Diff: 2
Page Ref: 7
7) The ways in which EC is done include:
A) the Internet and extranets.
B) the Internet and private networks.
C) the Internet, extranets, and private networks.
D) the Internet, intranets, extranets, and via cell phones.
Answer: D
Diff: 2
Page Ref: 8
AACSB Standard: Use of Information Technology
8) EC applications are supported by infrastructures and by each of the following support areas
except:
A) people
B) public policy
C) marketing and advertisement
D) mobile devices
Answer: D
Diff: 2
Page Ref: 8
9) A business, such as Apple, doing online transactions with its trading partners is an example of
________.
A) B2B
B) B2C
C) e-CRM
D) EDI
Answer: A
Diff: 1
Page Ref: 9
AACSB Standard: Use of Information Technology
5
Copyright © 2010 Pearson Education, Inc.
10) Intrabusiness EC is usually performed over intranets and/or ________.
A) corporate portals
B) mobile networks
C) exchanges
D) P2P networks
Answer: A
Diff: 2
Page Ref: 9
11) A job opening in the Sales Department is posted on the company's intranet by the Human
Resources Department. This is an example of ________.
A) E2C
B) B2S
C) B2B
D) B2E
Answer: D
Diff: 2
Page Ref: 9
12) Boeing designing a product together with one of its business partners is an example of this
type of interaction.
A) collaborative commerce
B) nonbusiness EC
C) B2B2C
D) B2B2C
Answer: A
Diff: 2
Page Ref: 10
13) ________ are systems where only routine transaction processing and information flow take
place between two or more organizations using a standard protocol, such as electronic data
interchange (EDI).
A) E-CRM
B) Interorganizational information systems
C) Intrabusiness EC
D) B2B
Answer: B
Diff: 3
Page Ref: 11
14) A corporation uses the Internal Revenue Service's Web site to learn how to pay its estimated
quarterly income taxes. This is an example of ________.
A) G2G
B) G2B
C) G2C
D) E2E
Answer: B
Diff: 2
Page Ref: 11
6
Copyright © 2010 Pearson Education, Inc.
15) A technology that is used to electronically transfer routine documents, such as invoices and
purchase orders, and for financial transactions is ________.
A) electronic funds transfer (EFT)
B) exchange-to-exchange
C) electronic data interchange (EDI)
D) peer-to-peer
Answer: C
Diff: 2
Page Ref: 11
16) A large number of EC companies, especially e-tailing and B2B ones, failed from 1999 to
2005 for each of the following reasons except:
A) The companies lacked financial skills.
B) The companies failed to register with search engines, such as Google.
C) The companies failed to ensure they had sufficient inventory and a distribution setup to meet
initial demand.
D) The companies had little marketing experience.
Answer: B
Diff: 2
Page Ref: 12
17) ________ refers to the second-generation of Internet services that let people collaborate and
share information online in new ways, such as social networks and wikis.
A) Virtual Web
B) Media Web
C) Web 2.0
D) Social Web
Answer: C
Diff: 2
Page Ref: 13
18) Which of the following is not a characteristic of the Digital Revolution?
A) many business processes expedited by up to 50 percent
B) intelligent search agents to help manage information overload
C) a high rate of obsolescence
D) fraud and other cybercons carried out via the Internet
Answer: A
Diff: 3
Page Ref: 21
19) Many companies employ a(n) ________, which is a gateway for customers, employees, and
partners to reach corporate information and to communicate with the company.
A) corporate portal
B) intranet
C) extranet
D) social network
Answer: A
Diff: 1
Page Ref: 21
7
Copyright © 2010 Pearson Education, Inc.
20) The digital enterprise shifts the focus from managing individual information resources such
as devices, applications, and data to ________ that define the business and ultimately deliver
value to customers and end users.
A) developing models
B) orchestrating the services and workflows
C) organizing supply chains
D) transforming revenue models
Answer: B
Diff: 3
Page Ref: 21
21) Because the rate of change and the level of uncertainty in the marketplace are expected to
accelerate, organizations are:
A) unable to react quickly enough to threats and opportunities.
B) operating under increasing pressures to produce more products, faster, and with fewer
resources.
C) making fewer decisions and/or decisions less frequently.
D) considering less information when making decisions.
Answer: B
Diff: 2
Page Ref: 27
22) According to the Business Environment and Performance Impact Model, ________ provide
support to organizations' activities and to actual performance, countering business pressures.
A) EC and IT
B) missions and strategies
C) core competencies and critical response activities
D) markets and government
Answer: A
Diff: 2
Page Ref: 28
AACSB Standard: Reflective Thinking
23) A ________ is a series of activities that a company performs to achieve its goals, such as
making a profit, at various stages of the production process.
A) marketing strategy
B) business model
C) value chain
D) business plan
Answer: B
Diff: 1
Page Ref: 30
8
Copyright © 2010 Pearson Education, Inc.
24) According to the ________ revenue model, customers pay a fixed amount, usually monthly,
to receive some type of service.
A) subscription fees
B) transaction fees
C) advertising fees
D) affiliate fees
Answer: A
Diff: 2
Page Ref: 31
25) According to the ________ revenue model, companies receive commissions for referring
customers to others' EC Web sites.
A) advertising fees
B) subscription fees
C) affiliate fees
D) transaction fees
Answer: C
Diff: 2
Page Ref: 31
26) Large private organizational buyers and government agencies make large-volume or largevalue purchases through ________, also known as reverse auctions.
A) electronic tendering systems
B) online direct marketing
C) name-your-own-price models
D) viral marketing
Answer: A
Diff: 2
Page Ref: 33
27) According to the ________ model, an organization can increase brand awareness or even
generate sales by Web-based word-of-mouth marketing or promoting a product or service to
other people.
A) electronic tendering systems
B) online direct marketing
C) name-your-own-price
D) viral marketing
Answer: D
Diff: 2
Page Ref: 34
28) Major barriers to EC include all of the following except:
A) cost
B) lack of potential customers
C) implementation difficulties
D) lack of technology
Answer: D
Diff: 2
Page Ref: 34
9
Copyright © 2010 Pearson Education, Inc.
29) Benefits of EC to organizations include each of the following except:
A) cost reduction
B) information security
C) supply chain improvements
D) efficient procurement
Answer: B
Diff: 2
Page Ref: 35
30) All of the following are benefits of EC to society except:
A) more public services
B) closing the digital divide
C) fewer permits and less tax
D) improve homeland security
Answer: C
Diff: 3
Page Ref: 35
AACSB Standard: Reflective Thinking
31) Which of the following is not one of the benefits that EC provides to consumers?
A) global reach
B) instant delivery
C) enable telecommuting
D) ubiquity
Answer: A
Diff: 2
Page Ref: 35
32) Which of the following is a technological limitation of EC?
A) security and privacy concerns that deter customers from buying
B) difficulty obtaining venture capital
C) order fulfillment requirements of large-scale B2C
D) unresolved taxation, public policy, and legal issues
Answer: C
Diff: 3
Page Ref: 36
33) All of the following are non-technological limitations of EC except:
A) Software development tools are still evolving.
B) Lack of trust in EC and in unknown sellers hinders buying.
C) People do not yet sufficiently trust paperless, faceless transactions.
D) Online fraud is increasing.
Answer: A
Diff: 3
Page Ref: 36
10
Copyright © 2010 Pearson Education, Inc.
34) Which is not one of the EC trends?
A) EC topics have been integrated into all functional fields.
B) EC is penetrating more and more business areas, services, and governments.
C) EC applications frequently cross departmental and organizational boundaries.
D) National and international government regulations of EC have been resolved.
Answer: D
Diff: 2
Page Ref: 36
35) The success of the entrepreneurial company JetPens was due to keeping costs low by each of
the following methods except:
A) using open source free software
B) advertising via e-mail
C) giving away free samples via social networks
D) using smart key words to rank high with search engines
Answer: C
Diff: 3
Page Ref: 37
AACSB Standard: Use of Information Technology
1.3 Fill in the Blank
1) ________ is the process of buying, selling, or exchanging products, services, or information
via computer networks.
Answer: Electronic commerce
Diff: 1
Page Ref: 4
2) ________ refers to a broad range of business activities that includes not just the buying and
selling of goods and services, but also servicing customers, collaborating with business partners,
and conducting electronic transactions within an organization.
Answer: E-business
Diff: 1
Page Ref: 5
3) ________ are organizations that conduct their business activities solely online.
Answer: Virtual (pure-play) organizations
Diff: 2
Page Ref: 6
4) ________ are organizations that conduct some EC activities, usually as an additional
marketing channel.
Answer: Click-and-mortar (or click-and-brick) organizations
Diff: 1
Page Ref: 6
5) EC can be conducted in a(n) ________ where buyers and sellers meet online to exchange
goods, services, money, or information.
Answer: electronic market (e-marketplace)
Diff: 2
Page Ref: 6
11
Copyright © 2010 Pearson Education, Inc.
6) A(n) ________ is a corporate or government network that uses Internet tools, such as Web
browsers, and Internet protocols.
Answer: intranet
Diff: 2
Page Ref: 7
7) A(n) ________ is a network that uses the Internet to link multiple intranets.
Answer: extranet
Diff: 2
Page Ref: 7
8) An EC model in which all of the participants are either businesses or other organizations is
________ e-commerce.
Answer: business-to-business (B2B)
Diff: 1
Page Ref: 8
9) ________ is an EC model in which businesses sell to individual shoppers.
Answer: Business-to-consumer (B2C)
Diff: 1
Page Ref: 9
10) ________ is an EC model in which a business provides some product or service to a client
business that maintains its own customers.
Answer: Business-to-business-to-consumer (B2B2C)
Diff: 2
Page Ref: 9
11) ________ is an e-commerce category that includes all internal organizational activities that
involve the exchange of goods, services, or information among various units and individuals in
an organization.
Answer: Intrabusiness EC
Diff: 2
Page Ref: 9
12) ________ is an EC model in which individuals or groups communicate online.
Answer: Collaborative commerce (C-commerce)
Diff: 2
Page Ref: 10
13) With ________, funds are routed electronically from one organization to another.
Answer: EFT (electronic funds transfer)
Diff: 2
Page Ref: 11
14) ________ is an EC model in which EC transactions and activities are conducted in a wireless
environment.
Answer: Mobile commerce (M-commerce)
Diff: 1
Page Ref: 11
12
Copyright © 2010 Pearson Education, Inc.
15) Since 2001, no other company has had more of an impact on EC than ________.
Answer: Google
Diff: 2
Page Ref: 12
16) The term ________ was coined by O'Reilly Media in 2004 to refer to a supposed second
generation of Internet-based services that let people collaborate and share information online in
new ways, such as social networking and wikis.
Answer: Web 2.0
Diff: 2
Page Ref: 13
17) A ________ is a gateway through which employees, business partners, and the public can
enter a corporate Web site.
Answer: corporate portal
Diff: 2
Page Ref: 21
18) ________ chips are tiny tags that can be implanted into humans or attached to products for
tracking and identification purposes.
Answer: Radio frequency identification (RFID)
Diff: 3
Page Ref: 24
19) ________ is the rapid production of customized products or services at a reasonable cost for
a large number of customers.
Answer: Mass customization
Diff: 2
Page Ref: 29
20) A(n) ________ is a method of doing business by which a company can generate revenue to
sustain itself.
Answer: business model
Diff: 2
Page Ref: 30
21) A(n) ________ is a description of how a company or an EC project will generate revenue.
Answer: revenue model
Diff: 1
Page Ref: 31
22) A(n) ________ refers to the benefits, including the intangible, nonquantitative ones, that a
company can derive from using EC.
Answer: value proposition
Diff: 3
Page Ref: 31
23) Companies receive commissions called ________ for referring customers to others' Web
sites.
Answer: affiliate fees
Diff: 3
Page Ref: 31
13
Copyright © 2010 Pearson Education, Inc.
24) A way to create value is through ________, which involve bundling some goods and services
together to provide more value than from offering them separately.
Answer: complementarities
Diff: 3
Page Ref: 33
25) The branch of philosophy that deals with what is considered to be right and wrong is called
________.
Answer: Ethics
Diff: 1
Page Ref: 34
1.4 Essay
1) List and briefly explain three of the five ES support EC areas.
Answer:
People. Sellers, buyers, intermediaries, information systems specialists, other employees, and
any other participants comprise an important support area.
Public policy. Legal and other policy and regulatory issues, such as privacy protection and
taxation, technical standards, and compliance with the regulations.
Marketing and advertisement. These are important in B2C online transactions because the buyers
and sellers usually do not know each other.
Support services. Many services are needed including content creation, payment methods,
customer service, and order fulfillment.
Business partnerships. Joint ventures, exchanges, and business partnerships of various types are
needed for success in EC.
Diff: 3
Page Ref: 7
2) List and briefly discuss three of the five common classifications of EC by the nature of the
transaction.
Answer:
Business-to-Business (B2B). All of the participants in B2B are either businesses or other
organizations.
Business-to-Consumer (B2C). B2C includes retail transactions of products or services from
businesses to individual shoppers.
Business-to-Business-to-Consumer (B2B2C). In B2B2C, a business provides some product or
service to a client business. The client business maintains its own customers.
Consumer-to-Business (C2B). In C2B, individuals use the Internet to sell products or services to
organizations and individuals who seek sellers to bid on products or services.
Intrabusiness EC. All internal EC organizational activities that involve the exchange of goods,
services, or information among various units and individuals in that organization.
Diff: 2
Page Ref: 9
14
Copyright © 2010 Pearson Education, Inc.
3) Define enterprise social networks. How can companies use Web 2.0 tools to offer customers
more ways to engage and interact on their Web sites?
Answer: Enterprise social networks are social networks that facilitate business.
Using Web 2.0 tools, a company can:
- Encourage consumers to rate and comment on products.
- Allow consumers to create their own topic areas and build communities (forums) around shared
interests possibly related to company's products.
- Hire bloggers or staff editors who can lead more company-formatted essays and discussions
that allow, but are not driven by, customer comments.
- Provide incentives such as sweepstakes and contests for customers to get involved in new
product (service) design and marketing campaigns.
- Encourage user-made videos about products/services and offer prizes for video ads.
Provide interesting stories in e-newsletters.
Diff: 3
Page Ref: 18
4) Identify two of the three categories of major business pressures and two main type of business
pressures in each category.
Answer:
Market and economic pressures: Strong competition, global economy, regional trade
agreements, very low labor costs in other countries, increased power of consumers.
Societal pressures: Changing nature of the workforce; government deregulation, compliance,
shrinking government subsidiaries; increased ethical, social, and legal responsibilities.
Technological pressures: Emerging innovations and new technologies; rapid technological
obsolescence; information overload; rapid decline in technology costs to labor costs.
Diff: 2
Page Ref: 29
5) Define revenue model and identify four major revenue models.
Answer: A revenue model describes how the organization or the EC project will generate
revenue.
Major revenue models are:
- Sales. Companies generate revenue from selling merchandise or services over their Web sites.
- Transaction fees. A company receives a commission based on the volume of transactions
made, or transaction fees can be levied per transaction.
- Subscription fees. Customers pay a fixed amount, usually monthly, to get some type of service.
- Advertising fees. Companies charge others for allowing them to place a banner on their sites.
- Affiliate fees. Companies receive commissions for referring customers to others' Web sites.
Diff: 3
Page Ref: 31
15
Copyright © 2010 Pearson Education, Inc.
Electronic Commerce 2010 (Turban / Lee / King / Liang / Turban)
Chapter 2 E-Marketplaces: Mechanisms, Tools, and Impacts of E-Commerce
2.1 True/False
1) Eastern Mountain Sports used a successful multistep sales technique that included
recommending special socks using the RSS feed.
Answer: TRUE
Diff: 2
Page Ref: 49
AACSB Standard: Use of Information Technology
2) E-procurement is the process of distributing materials and supplies.
Answer: FALSE
Diff: 1
Page Ref: 51
3) E-marketplaces have resulted in lower purchasing and transactions costs
Answer: TRUE
Diff: 1
Page Ref: 52
AACSB Standard: Reflective Thinking
4) Private, public, and consortia are three types of e-marketplaces.
Answer: TRUE
Diff: 1
Page Ref: 53
AACSB Standard: Use of Information Technology
5) Front end refers to the activities that support online order fulfillment, inventory management,
purchasing from suppliers, payment processing, packaging, and delivery.
Answer: FALSE
Diff: 2
Page Ref: 54
6) In marketing, an intermediary is a third party that operates between sellers and buyers.
Intermediaries of all kinds offer their services on the Web.
Answer: TRUE
Diff: 2
Page Ref: 54
7) Electronic storefronts, Internet malls, and exchanges are major B2B e-marketplaces.
Answer: FALSE
Diff: 1
Page Ref: 55
AACSB Standard: Reflective Thinking
8) A portal is an information gateway that attempts to address information overload by enabling
people to search and access relevant information from disparate IT systems and the Internet,
using advanced search and indexing techniques, such as Google's desktop.
Answer: TRUE
Diff: 2
Page Ref: 55
16
Copyright © 2010 Pearson Education, Inc.
9) Intermediaries play an important role in EC by providing value-added services such as making
payment arrangements to buyers and sellers.
Answer: TRUE
Diff: 2
Page Ref: 58
10) WebMD, which is the largest U.S. medical services company, is known mainly for its
webmd.com consumer portal, but its core business is being an e-intermediary.
Answer: TRUE
Diff: 2
Page Ref: 59
AACSB Standard: Reflective Thinking
11) An electronic shopping cart is an order-processing technology that allows customers to
accumulate items they wish to buy while they continue to shop.
Answer: TRUE
Diff: 1
Page Ref: 63
12) Search engines not only "search and match," but also have capabilities that can be used to
perform routine tasks that require intelligence.
Answer: FALSE
Diff: 1
Page Ref: 63
AACSB Standard: Use of Information Technology
13) Shopping carts for B2B are fairly simple, but a shopping cart for B2C may be more complex.
Answer: FALSE
Diff: 2
Page Ref: 63
14) An auction is a market mechanism that uses a competitive process by which a seller solicits
consecutive bids from buyers or a buyer solicits bids from sellers.
Answer: TRUE
Diff: 1
Page Ref: 64
15) Negotiation and bargaining are two types of auctions where prices are not fixed, but rather
are allowed to fluctuate as market supply and demand change.
Answer: FALSE
Diff: 2
Page Ref: 66
16) Reverse auctions are bidding or tendering systems in which the buyer places an item for bid
on a request for quote (RFQ) system; then potential suppliers bid on the job, with the price
reducing sequentially, and the lowest bid wins.
Answer: TRUE
Diff: 3
Page Ref: 66
17
Copyright © 2010 Pearson Education, Inc.
17) E-auctions are becoming less important selling and buying channels for companies and
individuals.
Answer: FALSE
Diff: 1
Page Ref: 67
AACSB Standard: Reflective Thinking
18) The major limitations of e-auctions are insufficient security, risk of fraud, and a limited pool
of participants.
Answer: TRUE
Diff: 2
Page Ref: 68
AACSB Standard: Reflective Thinking
19) A limitation of e-bartering for businesses is that excess capacity items such as office space,
storage, factory space, idle facilities, and labor cannot be bartered.
Answer: FALSE
Diff: 2
Page Ref: 69
AACSB Standard: Reflective Thinking
20) Online negotiation can be facilitated by computer technology for the negotiation process and
software agents for searches and comparisons.
Answer: TRUE
Diff: 1
Page Ref: 69
21) E-marketplaces, shopping carts, e-catalogs, and auctions are the major Web 2.0 mechanisms.
Answer: FALSE
Diff: 3
Page Ref: 70
22) Features that distinguish a blog from a regular Web page are trackbacks, blogrolls, pings, and
RSS feeds.
Answer: TRUE
Diff: 1
Page Ref: 71
AACSB Standard: Reflective Thinking
23) Twitter is a free micro-blogging service that allows its users to send tweets up to 140
characters in length.
Answer: TRUE
Diff: 3
Page Ref: 72
AACSB Standard: Use of Information Technology
24) A new service known as Pownce integrates micro-blogging with file sharing and event
invitations.
Answer: TRUE
Diff: 2
Page Ref: 72
AACSB Standard: Reflective Thinking
18
Copyright © 2010 Pearson Education, Inc.
25) Travelers using airline Web sites to book their flights directly without the use of travel agents
is resulting in the reintermediation of travel agents.
Answer: FALSE
Diff: 3
Page Ref: 85
AACSB Standard: Reflective Thinking
2.2 Multiple Choice
1) Eastern Mountain Sports introduced ________ tools in order to increase collaboration,
information sharing, and communication among stores and their employees, suppliers, and
customers.
A) business intelligence
B) B2B
C) B2C
D) Web 2.0
Answer: D
Diff: 2
Page Ref: 48
AACSB Standard: Use of Information Technology
2) Traditional and electronic markets have three main functions, which include each of the
following except:
A) matching buyers and sellers
B) facilitating the exchange, purchase or transfer of information, goods, services, and payments
associated with transactions
C) financing the transformation of raw materials into finished products
D) providing an institutional infrastructure, such as a legal and regulatory framework that
enables the efficient functioning of the market
Answer: C
Diff: 1
Page Ref: 51
AACSB Standard: Reflective Thinking
3) The cost curves of digital products differ from the cost curves of physical products because in
digitization:
A) most costs are variable and fixed costs are low.
B) most costs are fixed and variable costs are very low.
C) most costs are fixed, but variable costs are high.
D) all costs are variable.
Answer: B
Diff: 3
Page Ref: 52
AACSB Standard: Analytic Skills
19
Copyright © 2010 Pearson Education, Inc.
4) Because of their cost curve, digital products profits will:
A) remain constant regardless of volume, once the variable costs are paid.
B) decrease as volume increases, once labor costs are paid.
C) increase very rapidly as volume increases, once the fixed costs are paid.
D) increase rapidly as volume increases, once the fixed costs are paid.
Answer: C
Diff: 3
Page Ref: 52
AACSB Standard: Analytic Skills
5) The portion of an e-seller's business through which customers interact, including the seller's
portal, electronic catalogs, shopping cart, and payment gateway, is referred to as the ________ of
the business.
A) front end
B) back end
C) infrastructure
D) intermediary
Answer: A
Diff: 2
Page Ref: 54
6) Activities related to order fulfillment, inventory management, purchasing from suppliers,
accounting and finance, packaging, and delivery are done in what is termed the ________ of the
business.
A) front end
B) back end
C) infrastructure
D) intermediary
Answer: B
Diff: 2
Page Ref: 54
7) The major ________ e-marketplaces are storefronts and Internet malls.
A) B2B
B) C2B
C) B2B2C
D) B2C
Answer: D
Diff: 1
Page Ref: 55
8) An electronic storefront includes several mechanisms to help sales and sales transactions. The
most common mechanisms include all of the following except:
A) electronic catalog
B) search engine
C) supply chain
D) payment gateway
Answer: C
Diff: 1
Page Ref: 55
20
Copyright © 2010 Pearson Education, Inc.
9) Online markets that are owned and operated by a single company and that are either sell-side
or buy-side are known as ________.
A) private e-marketplaces
B) commercial portals
C) e-malls
D) B2B marketplaces
Answer: A
Diff: 2
Page Ref: 55
10) Insurance companies and hotels sell services through storefronts called ________.
A) RSS
B) browsers
C) portals
D) wikis
Answer: C
Diff: 2
Page Ref: 55
11) Employees may waste time trying to find relevant and accurate information if they have to
access multiple information systems. The best solution to this problem is the use of ________.
A) Web portals
B) intermediaries
C) browsers
D) intranets
Answer: A
Diff: 2
Page Ref: 57
12) A type of broker that helps consumers compare different stores is a ________.
A) remediator
B) search engine
C) shopping facilitator
D) virtual mall
Answer: C
Diff: 1
Page Ref: 58
AACSB Standard: Use of Information Technology
13) Human or electronic intermediaries attempt to reduce each of the following limitations of
direct interaction except:
A) search costs
B) lack of privacy
C) contract risk
D) product distribution
Answer: D
Diff: 3
Page Ref: 58
21
Copyright © 2010 Pearson Education, Inc.
14) Customized catalogs are especially useful in B2B e-commerce for each of the following
reasons except:
A) E-catalogs can be designed to show only the items that the employees in a specific
organization are allowed to purchase.
B) Intranets, in particular, can deliver customized catalogs to different business customers.
C) E-catalogs can show the buyer's ID number for the item, model, or SKU number rather than
the seller's ID numbers.
D) E-catalogs can be customized to show the same item to different customers at different prices,
reflecting discounts or purchase-contract agreements.
Answer: B
Diff: 3
Page Ref: 61
15) E-catalogs have several common characteristics. Which of the following is not a
characteristic of e-catalogs?
A) easy to create without advanced information technology
B) easy to update product information
C) easy to customize
D) good search and comparison capabilities
Answer: A
Diff: 2
Page Ref: 62
AACSB Standard: Reflective Thinking
16) The major challenge faced by ________ is the need to index documents from a variety of
sources, such as file systems, intranets, document management systems, e-mail, and databases,
and then present a consolidated list of relevance-ranked documents.
A) mobile portals
B) intelligent engines
C) enterprise searches
D) knowledge portals
Answer: C
Diff: 3
Page Ref: 62
17) Which is not a popular search engine?
A) Google
B) Linux
C) AltaVista
D) Lycos
Answer: B
Diff: 1
Page Ref: 63
22
Copyright © 2010 Pearson Education, Inc.
18) A(n) ________ is an order-processing technology that allows customers to accumulate items
they wish to buy while they continue to shop
A) intelligent agent
B) e-fulfillment agent
C) electronic shopping cart
D) mobile portal
Answer: C
Diff: 2
Page Ref: 63
19) When prices are negotiated or discounted, as in auctions or stock markets, that pricing mode
is called ________.
A) dynamic pricing
B) commodity pricing
C) pre-shopping
D) negotiation
Answer: A
Diff: 2
Page Ref: 66
20) The most common and traditional form of auctions in which one seller entertains bids from
many buyers is referred to as ________.
A) forward auctions
B) reverse auctions
C) bidding auction system
D) tendering system
Answer: A
Diff: 2
Page Ref: 66
21) An auction in which there is one buyer and many potential sellers or in which a buyer places
an item for bid on an RFQ system and the lowest bid wins is referred to as all of the following
except:
A) forward auctions
B) reverse auctions
C) bidding auction system
D) tendering system
Answer: B
Diff: 3
Page Ref: 66
22) What is a benefit of e-auctions to the sellers?
A) anonymity
B) convenience of bidding anywhere and any time
C) lack of differentiation
D) optimal price determined by the market
Answer: D
Diff: 2
Page Ref: 67
AACSB Standard: Reflective Thinking
23
Copyright © 2010 Pearson Education, Inc.
23) All of the following are benefits of e-auctions to buyers except:
A) can liquidate large quantities quickly
B) convenience of bidding anywhere and any time
C) opportunity to bargain
D) opportunities to find unique items
Answer: A
Diff: 2
Page Ref: 67
24) Which of the following statements does not describe bartering?
A) It is the oldest method of trade.
B) It is primarily done between private parties.
C) The problem with bartering is that it is difficult to find trading partners.
D) Intermediaries can be helpful, but they are expensive and very slow.
Answer: B
Diff: 3
Page Ref: 68
25) Which of the following is a Web 2.0 application?
A) auctions
B) blogs
C) shopping carts
D) e-catalogs
Answer: B
Diff: 2
Page Ref: 70
26) Which is not one of the seven principles for building effective blogs?
A) Set up the blog so that each post gets its own permanent URL.
B) Blog frequently and create at least half a dozen posts every weekday.
C) Focus on a broad topic to appeal to a large audience.
D) Make friends with other bloggers, online and off.
Answer: C
Diff: 2
Page Ref: 71
27) ________ are audio files that enable companies to deliver audio-specific content, including
music, speeches, radio-style presentations, and more.
A) Blogs
B) Mashups
C) Podcasts
D) Wikis
Answer: C
Diff: 2
Page Ref: 71
24
Copyright © 2010 Pearson Education, Inc.
28) Commercial uses of blogs include all of the following except:
A) to allow everyone to participate as a peer
B) to communicate with customers and other third parties
C) to enhance employee communication with one another
D) to supplement corporate public relations and press releases with personal from the heart talk
Answer: A
Diff: 3
Page Ref: 72
29) The elimination of various types of agents that mediate between buyers and sellers, such as
travel and insurance agents, is referred to as ________.
A) automation
B) disintermediation
C) remediation
D) e-distribution
Answer: B
Diff: 2
Page Ref: 86
30) ________ provides customers with exactly what they want, when and where they want it.
Effective communication between the supply chain and the factory floor is needed to make it
happen.
A) Build-to-order manufacturing
B) Demand-driven manufacturing
C) Real-time manufacturing
D) Virtual manufacturing
Answer: B
Diff: 3
Page Ref: 87
AACSB Standard: Use of Information Technology
2.3 Fill in the Blank
1) A(n)________ is a virtual marketplace in which sellers and buyers meet and conduct different
types of transactions.
Answer: e-marketplace
Diff: 1
Page Ref: 53
2) All of the activities related to order fulfillment, inventory management, payment processing,
packaging, and delivery are done in what is called the ________ of the business.
Answer: back end
Diff: 2
Page Ref: 54
3) In a(n) ________ e-marketplace, a company purchases from many suppliers. This type of
purchasing arrangement is considered to be many-to-one.
Answer: buy-side
Diff: 3
Page Ref: 55
25
Copyright © 2010 Pearson Education, Inc.
4) An online shopping center where many online stores are located is called a(n) ________.
Answer: e-mall (online mall)
Diff: 1
Page Ref: 56
5) A(n) ________ is a single point of access through a Web browser to critical business
information located inside and outside of an organization.
Answer: information portal
Diff: 2
Page Ref: 57
6) ________ are electronic intermediaries that provide and/or control information flow in
cyberspace, often bundling information and then selling it to others.
Answer: Infomediaries
Diff: 2
Page Ref: 58
7) In a(n) ________ catalog, information is presented in motion pictures or animation and
information can be presented or changed in real-time, as with stock prices.
Answer: dynamic
Diff: 2
Page Ref: 61
8) The major challenge faced by enterprise search is the need to ________ documents from a
variety of sources, such as file systems, intranets, document management systems, and e-mail.
Answer: index
Diff: 1
Page Ref: 57
AACSB Standard: Use of Information Technology
9) WebMD is the largest medical information services company in the United States. Although
the company is known mainly for its consumer portal, webmd.com, its core business is being an
electronic ________.
Answer: intermediary
Diff: 2
Page Ref: 59
AACSB Standard: Use of Information Technology
10) ________ refers to prices that are not fixed, but that are allowed to fluctuate as supply and
demand in a market exchange.
Answer: Dynamic pricing
Diff: 3
Page Ref: 66
11) An auction in which a seller takes bids from buyers is called a(n) ________ auction.
Answer: forward
Diff: 2
Page Ref: 66
12) Priceline.com pioneered the ________ model. In this model, a potential buyer specifies the
price that he or she is willing to pay to any seller who will sell at that price.
Answer: name-your-own price
Diff: 2
Page Ref: 67
26
Copyright © 2010 Pearson Education, Inc.
13) ________ tools are social networking tools used by organizations.
Answer: Enterprise 2.0
Diff: 2
Page Ref: 70
14) Trackbacks, pings, and RSS feeds are some of the features that distinguish ________ from
regular Web pages.
Answer: blogs
Diff: 2
Page Ref: 71
15) ________ is a free micro-blogging service that allows its users to send and read other users'
short text messages, which are up to 140 characters in length.
Answer: Twitter
Diff: 2
Page Ref: 72
16) Blogs and wikis are ________ applications.
Answer: Web 2.0
Diff: 1
Page Ref: 72
17) ________ have become more and more active in politics.
Answer: Bloggers
Diff: 3
Page Ref: 73
18) A(n) ________ is a type of social network that allows everyone to participate as a peer
enabling anyone to add, delete, or change content.
Answer: wiki
Diff: 2
Page Ref: 75
AACSB Standard: Use of Information Technology
19) ________ are animated computer representations of humanlike movements and behaviors in
a
computer-generated 3-dimensional world.
Answer: Avatars
Diff: 2
Page Ref: 75
AACSB Standard: Use of Information Technology
20) Companies are using Second Life, which is an example of a(n) ________, to bolster their
physical businesses.
Answer: virtual world
Diff: 2
Page Ref: 76
AACSB Standard: Use of Information Technology
21) The Internet economy has ________ barriers to entry.
Answer: low
Diff: 2
Page Ref: 77
AACSB Standard: Reflective Thinking
27
Copyright © 2010 Pearson Education, Inc.
22) ________ tools are used to tailor a product, service, or Web content to specific user
preferences.
Answer: Personalization
Diff: 2
Page Ref: 79
AACSB Standard: Use of Information Technology
23) Porter divided the impacts of the Internet into either positive or negative impacts for the
industry. According to his model, most of the impacts are ________.
Answer: negative
Diff: 2
Page Ref: 80
24) ________ is a method that enables manufacturers to create specific products for each
customer based on the customer's exact needs.
Answer: Mass customization
Diff: 3
Page Ref: 86
AACSB Standard: Use of Information Technology
25) One of the major changes in the supply chain of e-markets is to transfer some activities to
customers and/or employees through ________.
Answer: self-service
Diff: 2
Page Ref: 87
2.4 Essay
1) List and briefly describe three ways in which electronic marketplaces have changed the
processes used in trading and supply chains.
Answer:
Greater information richness of the transactional and relational environment.
Lower information search costs for buyers.
Diminished information asymmetry between sellers and buyers.
Less time between purchase and time of possession of physical products purchased in the emarketplace.
Greater temporal proximity between time of purchase and time of possession of digital products
purchased in the e-marketplace.
The ability of buyers, sellers, and virtual markets to be in different locations.
The ability for EC to leverage capabilities with increased effectiveness and lower transaction and
distribution costs, leading to more efficient friction-free markets.
Diff: 2
Page Ref: 53
AACSB Standard: Use of Information Technology
28
Copyright © 2010 Pearson Education, Inc.
2) Identify and briefly discuss the roles and value of intermediaries in e-marketplaces.
Answer: Intermediaries (brokers) play an important role in commerce by providing value-added
activities and services to buyers and sellers. Web sites that gather and organize large amounts of
data and act as intermediaries between those who want the information and those who supply the
information are one type of infomediary. One type offers consumers a place to gather
information about specific products and companies before they make purchasing decisions. It is a
third-party provider of unbiased information; it does not promote or try to sell specific products
in preference over other products or act on behalf of any vendors
There are many types of intermediaries. In cyberspace, there are intermediaries that provide
and/or control information flow. These electronic intermediaries are known as infomediaries.
The information flows to and from buyers and sellers via infomediaries. Frequently,
intermediaries aggregate information and sell it to others. Online intermediaries are companies
that facilitate transactions between buyers and sellers and receive a percentage of the
transaction's value.
Diff: 3
Page Ref: 58
3) Describe the major characteristic of dynamic pricing in electronic auctions (e-auctions).
Identify a benefit and a limitation of e-auctions to sellers involved in B2B.
Answer: With dynamic pricing, prices change based on the supply and demand relationships at
any given time.
Benefits of e-auctions to B2B sellers are:
- Sellers can liquidate large quantities of products quickly.
- Can improve customer relationship and loyalty.
- Can sell globally.
- Can gain more customer dollars by offering items directly to business customers.
Limitation of e-auctions to B2B sellers are:
- Minimal security
- Possibility of fraud.
Diff: 2
Page Ref: 67
29
Copyright © 2010 Pearson Education, Inc.
4) Describe the commercial uses of blogs. Identify the potential risks of blogs. Describe blog
management methods to reduce those risks.
Answer: Many organizations have deployed blogs to promote collaboration, advertise products
and services, and obtain feedback from customers. External, or facing out, blogs are used to
communicate with customers and other third parties, build trust-based relationships, polish
corporate reputations, promote social causes, and support CRM.
Blogs can supplement corporate public relations, press releases, and brochures with more
personal communication.
Two potential risks are revealing trade secrets (in corporate-related blogs) and making statements
that are or that could be construed as libel or defamation.
Blog management methods to reduce risk are:
- Establish comprehensive, written rules and policies -- and make sure that employees understand
that they apply regardless of whether employees are blogging at the office or from home.
- Educate employees about blog-related risks, rules, and regulations.
- Enforce blog policy with disciplinary action and technology.
- Have corporate lawyers review the contents of blogs to verify that they don't put the company
at risk.
Diff: 3
Page Ref: 71, 74
AACSB Standard: Ethical Reasoning
5) Explain competition in the Internet ecosystems. Explain how lower search costs for buyers has
intensified EC competition.
Answer: The Internet economy has low barriers to entry and a worldwide market, which has
significantly increased competition.
E-markets reduce the cost of searching for product information (e.g., sellers, models, prices),
frequently close to zero. This can significantly impact competition, enabling customers to find
less expensive (or better) products and forcing sellers, in turn, to reduce prices or improve
customer service. Sellers who provide information to buyers can exploit the Internet to gain a
larger market share.
Diff: 3
Page Ref: 77
Electronic Commerce 2010 (Turban / Lee / King / Liang / Turban)
Chapter 3 Retailing in Electronic Commerce: Products and Services
3.1 True/False
1) Amazon is recognized as an online leader in creating sales through customer intimacy and
customer relationship management (CRM).
Answer: TRUE
Diff: 1
Page Ref: 99
2) Sales of goods on the Internet are no longer increasing rapidly because of the bankruptcy of
numerous dot-coms.
Answer: FALSE
Diff: 2
Page Ref: 101
AACSB Standard: Reflective Thinking
30
Copyright © 2010 Pearson Education, Inc.
3) According to Internet Retailer, in 2007, approximately 80 percent of adult U.S. Internet users
shopped online and/or research offline sales online.
Answer: FALSE
Diff: 2
Page Ref: 101
4) As the number of Internet users reaches saturation, the challenge for e-retailers to increase the
amount that shoppers spend online because the rate of increase in online shoppers will slow.
Answer: TRUE
Diff: 3
Page Ref: 101
AACSB Standard: Analytic Skills
5) A retailer is a sales intermediary, a seller that operates between manufacturers and customers.
Answer: FALSE
Diff: 1
Page Ref: 101
6) On average, e-tailing sales are expected to grow at an annual rate of 2.6 percent from 2010 to
2012, compared to 14 percent for brick-and-mortar stores.
Answer: FALSE
Diff: 1
Page Ref: 102
AACSB Standard: Reflective Thinking
7) When new capabilities are required to conduct EC, for example capabilities in logistics and
distribution, one method is to obtain them through external strategic alliances.
Answer: TRUE
Diff: 1
Page Ref: 102
AACSB Standard: Use of Information Technology
31
Copyright © 2010 Pearson Education, Inc.
8) With all else being equal in the online environment, goods that are relatively expensive or
frequently purchased are expected to have higher sales volumes then goods that are inexpensive
or infrequently purchased.
Answer: FALSE
Diff: 3
Page Ref: 103
AACSB Standard: Reflective Thinking
9) A business model is a description of how an organization intends to generate revenue through
its business operations.
Answer: TRUE
Diff: 2
Page Ref: 105
10) Direct marketing describes marketing that takes place over the Internet involving wholesalers
and retailers.
Answer: FALSE
Diff: 2
Page Ref: 106
AACSB Standard: Use of Information Technology
11) A click-and-mortar retailer is a combination of both the brick-and-mortar retailer and an
online transactional Web site.
Answer: TRUE
Diff: 1
Page Ref: 106
12) Being a virtual seller has several benefits, such as lower overhead costs, but it also has many
drawbacks and barriers.
Answer: TRUE
Diff: 2
Page Ref: 106
13) Online travel bookings and associated travel services are not yet profitable e-commerce
implementations.
Answer: FALSE
Diff: 1
Page Ref: 109
14) Competition among online travel e-tailers is fierce, with low margins, little customer loyalty,
and increasing commoditization of products and services
Answer: TRUE
Diff: 3
Page Ref: 110
15) Airlines and hotel chains encourage travelers to book directly from their Web sites,
bypassing travel agents. This is an example of the Internet's indirect impact on the role of travel
agents.
Answer: TRUE
Diff: 2
Page Ref: 112
AACSB Standard: Reflective Thinking
32
Copyright © 2010 Pearson Education, Inc.
16) WAYN is a social networking Web site with a goal of uniting college student travelers from
North America.
Answer: FALSE
Diff: 3
Page Ref: 112
17) The electronic job market can create high turnover costs for employers by accelerating
employees' movement to other jobs.
Answer: TRUE
Diff: 2
Page Ref: 113
18) Online banking and other financial services are growing slowly on the Internet because many
customers are not yet embracing it.
Answer: FALSE
Diff: 2
Page Ref: 118
19) Many insurance companies use a dual strategy, keeping human agents, but also selling
online.
Answer: TRUE
Diff: 2
Page Ref: 118
AACSB Standard: Use of Information Technology
20) The major risk of online trading is security.
Answer: TRUE
Diff: 1
Page Ref: 119
AACSB Standard: Reflective Thinking
21) Only a few pure-play virtual banks failed by 2003 due to lack of financial viability.
Answer: FALSE
Diff: 2
Page Ref: 121
22) Customers accessing the bank system from the outside should verify that the Web site uses
encryption provided by SSL (Secure Socket Layer) and digital certificates.
Answer: TRUE
Diff: 3
Page Ref: 122
AACSB Standard: Use of Information Technology
23) Both online banks and click-and-mortar banks carry some risks and problems, especially in
international banking, including hackers and liquidity risk.
Answer: TRUE
Diff: 2
Page Ref: 123
AACSB Standard: Reflective Thinking
33
Copyright © 2010 Pearson Education, Inc.
24) The direct sale of digital content through download allows a producer of digital content to
bypass the traditional retail channel, thereby reducing overall costs and capturing greater profits.
Answer: TRUE
Diff: 2
Page Ref: 125
AACSB Standard: Analytic Skills
25) Channel conflict occurs when adding an online distribution channel causes problems with
existing distribution channels.
Answer: FALSE
Diff: 2
Page Ref: 132
AACSB Standard: Reflective Thinking
3.2 Multiple Choice
1) Amazon.com experienced all of the following except:
A) It maintained its position as the number one e-tailer in 2006.
B) Growth was driven largely by product diversification and its international presence.
C) It assured its financial success and profitability by 2005.
D) Profitability dropped in 2006 because of huge investments in IT infrastructure and their new
Prime discount shipping program.
Answer: C
Diff: 3
Page Ref: 99
2) According to Internet Retailer (2007), approximately ________ percent of adult U.S. Internet
users shop online or research offline sales online.
A) 25
B) 45
C) 65
D) 85
Answer: B
Diff: 2
Page Ref: 101
3) All of the following describe retailing except:
A) A retailer is a sales intermediary.
B) Many manufacturers sell directly to consumers and through wholesalers and retailers.
C) E-tailing makes it easier for a manufacturer to sell directly to customers by cutting out the
intermediary.
D) Companies that produce a large number of products, such as Procter & Gamble, do not need
retailers for efficient distribution.
Answer: D
Diff: 3
Page Ref: 101
34
Copyright © 2010 Pearson Education, Inc.
4) What is the primary advantage of catalog sales?
A) It eliminates the constraints of space and time.
B) Customers prefer catalog shopping to e-tailing.
C) Catalogs increase interest in products that are then bought online.
D) Products and services can both be sold via catalogs.
Answer: A
Diff: 2
Page Ref: 101
AACSB Standard: Reflective Thinking
5) All of the following categories have been selling well online except:
A) groceries
B) travel
C) cars
D) health and beauty
Answer: A
Diff: 1
Page Ref: 103
AACSB Standard: Reflective Thinking
6) With all else being equal in the online environment, goods with any of the following product
characteristics are expected to facilitate greater online sales except:
A) relatively expensive items
B) high brand recognition
C) digitized format
D) frequently purchased items
Answer: A
Diff: 2
Page Ref: 103
AACSB Standard: Reflective Thinking
7) Which of the following is a characteristic of e-tailing?
A) Competition is local.
B) Customer relations are less stable due to anonymous contacts.
C) Price changes are expensive, but can be done at anytime.
D) Fewer resources are needed to increase customer loyalty.
Answer: B
Diff: 3
Page Ref: 104
AACSB Standard: Reflective Thinking
8) A key difference in competition between retailing and e-tailing is that ________.
A) retailers face greater global competition
B) e-tailers face fewer competitors
C) retailers face fewer competitors
D) e-tailers face greater local competition
Answer: C
Diff: 2
Page Ref: 104
AACSB Standard: Reflective Thinking
35
Copyright © 2010 Pearson Education, Inc.
9) Direct marketers ________.
A) use one or more distribution channels
B) do not operate physical stores
C) are pure-play e-tailers
D) are manufacturers
Answer: A
Diff: 2
Page Ref: 105
10) Dell's distribution strategy is best described as ________.
A) a brick-and-mortar strategy
B) a shared service mall strategy
C) a click-and-mortar strategy
D) direct marketing from a manufacturer
Answer: D
Diff: 3
Page Ref: 106
AACSB Standard: Use of Information Technology
11) Sears' marketing strategy would best be described as ________.
A) a brick-and-mortar strategy
B) a shared service mall strategy
C) a click-and-mortar strategy
D) direct marketing from a manufacturer
Answer: C
Diff: 2
Page Ref: 106
AACSB Standard: Use of Information Technology
12) An online seller of travel services that generates revenue by charging fees for its services is
an example of a ________.
A) market maker
B) transaction broker
C) content disseminator
D) viral marketer
Answer: B
Diff: 3
Page Ref: 109
AACSB Standard: Use of Information Technology
13) A marketer that uses e-mail to advertise to potential customers is called a ________.
A) market maker
B) transaction broker
C) content disseminator
D) viral marketer
Answer: D
Diff: 2
Page Ref: 109
AACSB Standard: Use of Information Technology
36
Copyright © 2010 Pearson Education, Inc.
14) A company that creates and manages many-to-many markets is called a ________.
A) market maker
B) transaction broker
C) content disseminator
D) viral marketer
Answer: A
Diff: 2
Page Ref: 109
AACSB Standard: Use of Information Technology
15) In an e-market, Federal Express and PayPal are examples of ________.
A) intermediaries
B) service providers
C) content disseminators
D) viral marketers
Answer: B
Diff: 2
Page Ref: 109
AACSB Standard: Use of Information Technology
16) All of the following are revenue models for online independent travel agents except:
A) direct marketing revenues
B) direct revenues from commissions
C) subscription or membership fees
D) revenue sharing fees
Answer: A
Diff: 3
Page Ref: 110
17) Which is not a characteristic of social computing technologies?
A) Social computing is increasingly playing a larger role in corporate online strategy.
B) Social computing has shifted online travel from passive selling to active customer
engagement.
C) Companies that implement social computing technologies on their own Web sites should
view it primarily as a sales tool and less as supporting business goals.
D) Social computing plays an important role by providing more correct and relevant information.
Answer: C
Diff: 3
Page Ref: 111
18) One of the characteristics of Web 2.0 in the travel industry is ________.
A) standardization
B) segmentation
C) personalization.
D) intermediation
Answer: C
Diff: 3
Page Ref: 111
37
Copyright © 2010 Pearson Education, Inc.
19) All of the following are characteristics of WAYN except:
A) It is a popular social networking Web site.
B) When it introduced fees for its premier travel membership service, it lost most of its new
subscriptions.
C) It is not aimed at any particular age group.
D) It enables its users to create a personal profile and upload and store photos.
Answer: B
Diff: 3
Page Ref: 112
20) Characteristics of the job market and employment placement include all of the following
except:
A) They are very stable.
B) There is an unbalanced supply and demand.
C) Career portals on corporate Web sites reduce recruitment costs.
D) The job market has essentially moved online.
Answer: A
Diff: 3
Page Ref: 113
21) Compared to the traditional job market, the online job market ________.
A) has a shorter life cycle
B) is usually specialized and local in scope
C) tends to be less reliable
D) tends to be much less expensive
Answer: D
Diff: 2
Page Ref: 113
22) Characteristics of JobCentral.com include all of the following except:
A) It is a career portal created by a number of leading companies to reduce recruitment costs.
B) It provides people at all education levels with timely information about careers and
employment opportunities nationwide.
C) It is used primarily to catalog business and accounting job postings.
D) It makes it easy for job searchers to explore available openings.
Answer: C
Diff: 3
Page Ref: 115
23) A disadvantage of online job advertising and recruitment for employers is ________.
A) an overload of applicants, both qualified and unqualified
B) a huge increase in employee turnover
C) an increase in the costs of finding candidates
D) a significant decrease in the number of qualified applicants
Answer: A
Diff: 2
Page Ref: 116
AACSB Standard: Use of Information Technology
38
Copyright © 2010 Pearson Education, Inc.
24) Changes in the real estate industry driven by real estate online include all of the following
except:
A) use of live chat
B) offering 3D video tours
C) stabilizing the industry and reducing credit fraud by borrowers
D) disintermediation of real estate agents
Answer: C
Diff: 3
Page Ref: 117
AACSB Standard: Use of Information Technology
25) Which of the following is not a characteristic of e-banking?
A) saves users time and money
B) is more expensive for banks
C) is becoming an enabling feature of business growth in the developing world
D) is increasing peer-to-peer (P2P) online lending
Answer: B
Diff: 2
Page Ref: 120
AACSB Standard: Use of Information Technology
26) Security for online bank transactions include all of the following except:
A) firewalls
B) SSL encryption
C) virtual biometrics
D) digital certificates
Answer: C
Diff: 2
Page Ref: 122
AACSB Standard: Use of Information Technology
27) Gateways to storefronts and e-malls are referred to as ________.
A) shopping portals
B) shopbots
C) shopping browsers
D) intelligent search engines
Answer: A
Diff: 2
Page Ref: 128
AACSB Standard: Use of Information Technology
28) Software tools that scout the Web for stores that sell similar items at low prices are called
________.
A) shopping portals
B) shopbots
C) shopping browsers
D) intelligent search engines
Answer: B
Diff: 2
Page Ref: 128
AACSB Standard: Use of Information Technology
39
Copyright © 2010 Pearson Education, Inc.
29) The TRUSTe seal is an example of ________.
A) a business rating
B) an intermediary
C) a B2B exchange
D) a trustmark
Answer: D
Diff: 1
Page Ref: 129
AACSB Standard: Use of Information Technology
30) Charles wants to buy a John Lennon lithograph over the Internet, but he is unwilling to pay
for it until he inspects it to ascertain authenticity. The auction site through which he purchases
the painting agrees to hold his money until he tells them to release it to the seller. This is an
example of ________.
A) an escrow service
B) a trustmark
C) a warranty
D) a verification
Answer: A
Diff: 2
Page Ref: 129
AACSB Standard: Reflective Thinking
3.3 Fill in the Blank
1) Retailing conducted over the Internet is called ________.
Answer: electronic retailing
Diff: 1
Page Ref: 101
2) ________ are firms that conduct retail business online.
Answer: E-tailers
Diff: 1
Page Ref: 101
3) Amazon.com is an example of a(n) ________ because it sells directly to consumers over the
Internet without maintaining a physical sales channel.
Answer: pure-play e-tailer
Diff: 2
Page Ref: 106
AACSB Standard: Reflective Thinking
4) ________ refers to marketing that takes place without intermediaries between manufacturers
and buyers; or marketing done online between any seller and buyer.
Answer: Direct marketing
Diff: 2
Page Ref: 106
AACSB Standard: Reflective Thinking
40
Copyright © 2010 Pearson Education, Inc.
5) A(n) ________ is a combination of both the brick-and-mortar retailer and an online
transactional Web site.
Answer: click-and-mortar retailer
Diff: 2
Page Ref: 106
6) ________ are retailers who conduct business in the physical world, in traditional stores.
Answer: Brick-and-mortar retailers
Diff: 2
Page Ref: 107
7) A firm that operates both physical stores and an online e-tail site is said to be a click-andmortar business selling in a(n) ________ model.
Answer: multichannel business
Diff: 3
Page Ref: 107
8) ________ are meta-search engines that search a range of related sites or search engines,
seeking the best product or service for a particular consume.
Answer: Travel bots
Diff: 3
Page Ref: 110
9) In today's age of Web 2.0, the wide reach of ________ sites such as MySpace and LinkedIn
can get people hired faster.
Answer: social networking
Diff: 3
Page Ref: 115
AACSB Standard: Use of Information Technology
10) The two major limitations of the electronic job market are privacy and ________ because
resumes are typically not encrypted.
Answer: security
Diff: 2
Page Ref: 116
11) ________ services enable users to receive information on their bank account balances via
SMS and to settle payments for bills and purchase stocks.
Answer: Mobile banking
Diff: 2
Page Ref: 119
12) In addition to regular banks adding online services, ________ have emerged; these have no
physical location, but conduct only online transactions.
Answer: virtual banks
Diff: 3
Page Ref: 120
13) ________ are gateways to storefronts and e-malls that may be comprehensive or niche
oriented.
Answer: Shopping portals
Diff: 2
Page Ref: 128
41
Copyright © 2010 Pearson Education, Inc.
14) ________ are tools that scout the Web for consumers who specify search criteria.
Answer: Shopping robots (shopbots)
Diff: 2
Page Ref: 128
15) Members of ________ hope that consumers will use their trustmark seal as an assurance and
as a proxy for actual research into their conduct of business, privacy policy, and personal
information protection.
Answer: TRUSTe
Diff: 2
Page Ref: 129
16) A shopping tool referred to as a(n) ________ is a program that contains the shopper's
information.
Answer: electronic wallet
Diff: 2
Page Ref: 130
17) ________ refers to the removal of organizations or business process layers responsible for
certain intermediary steps in a given supply chain.
Answer: Disintermediation
Diff: 2
Page Ref: 131
18) ________ is the process whereby intermediaries, either new ones or those that had been
disintermediated, take on new intermediary roles.
Answer: Reintermediation
Diff: 2
Page Ref: 132
19) ________ is the use of software (intelligent) agents to facilitate intermediation.
Answer: Cybermediation
Diff: 3
Page Ref: 132
20) ________ refers to any situation in which direct competition and/or damage caused by
bypassing a former existing channel partner is perceived to have resulted from the introduction
of a new, often online, channel.
Answer: Channel conflict
Diff: 2
Page Ref: 132
21) EC offers companies new opportunities to test prices and make prices more precise, which
are referred to as ________ prices.
Answer: optimal
Diff: 3
Page Ref: 133
22) A major problem in B2C is the increasing rate of online ________.
Answer: fraud
Diff: 2
Page Ref: 133
42
Copyright © 2010 Pearson Education, Inc.
23) The Internet has created a large demand for personalized products and services.
Manufacturers can meet that demand by using a ________ strategy.
Answer: mass customization
Diff: 2
Page Ref: 133
24) An e-tailer can use cookie files and other technologies to track the specific browsing and
buying behavior of each consumer. With that information, the e-tailer can create a marketing
plan tailored to that consumer's pattern by showing items of interest or offering incentives that
appeal to that consumer's sense of value, which is referred to as ________.
Answer: personalization
Diff: 2
Page Ref: 133
25) Merchants can study and find out what customers want through ________.
Answer: market research
Diff: 2
Page Ref: 120
AACSB Standard: Use of Information Technology
3.4 Essay
1) Describe the characteristics of successful e-tailing. How do the principles of offline retail
success apply to e-tail success?
Answer: Many of the same basic principles that apply to retail success also apply to e-tail
success. Sound business thinking, visionary leadership, thorough competitive analysis and
financial analysis, and the articulation of a well-thought-out EC strategy are essential.
Ensuring appropriate infrastructure, particularly a stable and scalable technology infrastructure to
support the online and physical aspects of EC business operations, is important. Newly required
capabilities (e.g., capabilities in logistics and distribution) might need to be obtained through
external strategic alliances.
Offering quality merchandise at good prices, coupled with excellent service, and cross-channel
coordination and integration in which customers can almost seamlessly operate between the
online and physical environments of a business are also important elements in successful etailing.
Diff: 3
Page Ref: 102
AACSB Standard: Reflective Thinking
2) What are virtual (pure play) e-tailers? Give an example. List one advantage and one
disadvantage of this business model.
Answer: Virtual (pure-play) e-tailers are firms that sell directly to consumers over the Internet
without maintaining a physical sales channel. Amazon.com is a prime example of this type of etailer. Virtual e-tailers have the advantage of low overhead costs and streamlined processes. One
disadvantage is a lack of established infrastructure or back office to support the online frontoffice activities.
Diff: 2
Page Ref: 106
AACSB Standard: Reflective Thinking
43
Copyright © 2010 Pearson Education, Inc.
3) Compare the advantages of online job markets over traditional job markets on five
characteristics.
Answer: See Exhibit 3.6 on page 113.
Diff: 2
Page Ref: 113
4) Why are trust verification sites important to e-tailers and other online sellers? List two
verification sites. What is their function?
Answer: With so many sellers online, many consumers are not sure whom they can trust.
Several companies evaluate and verify the trustworthiness of various e-tailers. One such
company is TRUSTe. The TRUSTe seal appears at the bottom of each TRUSTe-approved etailer's Web site. E-tailers pay TRUSTe for use of the seal, or trustmark. Two trust verification
sites are VeriSign and BBBOnline. TRUSTe's members hope that consumers will see the seal as
an assurance of their ethical conduct, privacy policy, and personal information protection.
Diff: 2
Page Ref: 129
5) List and briefly describe three B2C e-tailing business models classified by the distribution
channel used.
Answer: Mail-order retailers that go online. Most traditional mail-order retailers, such as QVC
and Sharper Image, simply added another distribution channel–the Internet.
Direct marketing from manufacturers. Manufacturers, such as Dell and Nike, market directly
online from company sites to individual customers.
Pure-play e-tailers. These e-tailers do not have physical stores, only an online sales presence..
Click-and-mortar retailers. These are either traditional businesses that developed Web sites to
support their business activities in some way; or e-tailers who introduced physical storefronts.
Internet (online) malls. These malls include large numbers of independent storefronts. Ideally,
the customer would like to go to different stores in the same mall, use one shopping cart, and pay
only once.
Also see Exhibit 3.5 on page 109.
Diff: 3
Page Ref: 105-109
AACSB Standard: Use of Information Technology
Electronic Commerce 2010 (Turban / Lee / King / Liang / Turban)
Chapter 4 Consumer Behavior, Internet Marketing, and Advertising
4.1 True/False
1) The world's largest online movie rental subscription company, Netflix, implemented
intelligent agents in its movie recommendation service called CineMatch to help customers
select movies they would like to watch and to better manage its inventory.
Answer: TRUE
Diff: 2
Page Ref: 143
2) Finding and retaining customers is a major critical success factor for offline and online
businesses operating in an increasingly competitive environment.
Answer: TRUE
Diff: 1
Page Ref: 144
44
Copyright © 2010 Pearson Education, Inc.
3) One of the keys to building effective customer relationships is to understand intelligent agents.
Answer: FALSE
Diff: 2
Page Ref: 144
4) The purpose of an EC customer behavior model is to help firms understand how a consumer
makes a purchasing decision to be able to influence that decision through advertising or other
marketing method.
Answer: TRUE
Diff: 3
Page Ref: 145
AACSB Standard: Reflective Thinking
5) Personal characteristics of customers, such as age and income, are independent variables,
which are uncontrollable variables for EC companies.
Answer: TRUE
Diff: 3
Page Ref: 145
AACSB Standard: Reflective Thinking
6) The first step in the buying decision process is product evaluation and comparison.
Answer: FALSE
Diff: 2
Page Ref: 146
7) Consumer processing of an advertising message includes four stages: interest, desire,
attention, and action.
Answer: FALSE
Diff: 2
Page Ref: 146
45
Copyright © 2010 Pearson Education, Inc.
8) When Chaplin's auto lease is about to expire, he decides it is time to buy a new car. This
imbalance between a desired state and an actual state is called need identification.
Answer: TRUE
Diff: 3
Page Ref: 147
AACSB Standard: Reflective Thinking
9) In the consumer purchasing-decision process, virtual catalogs and links to external sources
support the evaluation and selection phase of that process.
Answer: FALSE
Diff: 2
Page Ref: 147
10) In the consumer decision-making process, the buyer is the person who ultimately makes the
buying decision.
Answer: FALSE
Diff: 3
Page Ref: 149
AACSB Standard: Reflective Thinking
11) Mass marketing is an approach to marketing that treats each customer in a unique way such
as fitting advertising to the customer's profile and needs.
Answer: FALSE
Diff: 2
Page Ref: 149
AACSB Standard: Reflective Thinking
12) Segmentation refers to the matching of services, products, and advertising content to
individuals and their preferences.
Answer: FALSE
Diff: 2
Page Ref: 150
13) Personalization is the matching of services or products with large groups of customer
segments.
Answer: FALSE
Diff: 2
Page Ref: 152
14) A user profile defines a customer's preferences, behaviors, and demographics and can be
generated by observing what the user does online.
Answer: TRUE
Diff: 3
Page Ref: 152
15) Behavioral targeting helps marketers by providing information about an individual's actual
Internet purchases to select the most effective advertisements to display to that individual.
Answer: FALSE
Diff: 3
Page Ref: 153
46
Copyright © 2010 Pearson Education, Inc.
16) Customer loyalty is important because it is a customer's deep commitment to rebuy a product
or service consistently in the future, thereby causing repetitive same-brand or same brand-set
purchasing.
Answer: TRUE
Diff: 2
Page Ref: 154
17) One of the major objectives of universal services is to increase customer loyalty through
individual personalization.
Answer: FALSE
Diff: 2
Page Ref: 154
18) Customer loyalty can lead to enhanced resistance to competitors, a decrease in price
sensitivity, and an increase in favorable word-of-mouth.
Answer: TRUE
Diff: 2
Page Ref: 154
19) Attracting and retaining loyal customers is the most important issue for e-tailers because
customer loyalty can lower marketing and advertising costs, transaction costs, customer turnover
expenses, and failure costs such as warranty claims.
Answer: TRUE
Diff: 3
Page Ref: 154
AACSB Standard: Reflective Thinking
20) Satisfaction is one of the most important consumer reactions in the B2C online environment.
Answer: TRUE
Diff: 2
Page Ref: 155
21) Spyware are tiny graphics files embedded in e-mail messages and in Web sites that transmit
information about users and their movements to a Web server.
Answer: FALSE
Diff: 1
Page Ref: 163
22) A cookie is a data file that is placed on a user's hard drive by a remote Web server only when
the users gives full consent to collect information about the user's activities at a site.
Answer: FALSE
Diff: 1
Page Ref: 163
23) One problem with Web analytics, Web mining, clickstream data, and so on is that we
observe and follow a computer, not knowing who is actually moving the mouse, which can be
solved with biometric marketing.
Answer: TRUE
Diff: 2
Page Ref: 163
47
Copyright © 2010 Pearson Education, Inc.
24) Banner exchanges are markets where companies can trade or exchange placement of banner
ads on each other's Web sites.
Answer: TRUE
Diff: 2
Page Ref: 169
25) Social factors such as word-of-mouth play an influential role in EC shopping or online
gaming.
Answer: TRUE
Diff: 2
Page Ref: 174
4.2 Multiple Choice
1) The number of organizational buyers is much smaller than the number of individual
consumers, and their transaction volumes are:
A) a little larger, and the terms of negotiations and purchasing are more complex.
B) far smaller, and the terms of negotiations and purchasing are less complex.
C) about the same and the terms of negotiations and purchasing are simpler.
D) far larger, and the terms of negotiations and purchasing are more complex.
Answer: D
Diff: 3
Page Ref: 144
AACSB Standard: Reflective Thinking
2) Paws 'n Tails is an online pet shop that wants to influence what customers buy and build
effective customer relationships and loyalty. What is the key to influencing behavior and
building these relationships?
A) understanding consumer online behavior and then influencing it through advertising and
promotions
B) understanding competitors' pricing strategy and then undercutting it
C) identifying the wants and needs of major customer segments
D) suggesting as many products as possible to online shoppers as soon as they visit the EC site
Answer: A
Diff: 3
Page Ref: 145
3) A(n) ________ is someone whose advice or view carries some weight in making a final
purchasing decision.
A) initiator
B) influencer
C) decider
D) buyer
Answer: B
Diff: 2
Page Ref: 149
48
Copyright © 2010 Pearson Education, Inc.
4) Marketing and advertising approaches have evolved from mass marketing to market
segmentation to one-to-one marketing. This evolution occurred because:
A) the marketing focus shifted from customers to products.
B) companies sought to decrease the number of marketing campaigns.
C) concerns about privacy have diminished.
D) the Internet enabled companies to better communicate with customers and understand their
needs and buying habits.
Answer: D
Diff: 3
Page Ref: 152
AACSB Standard: Reflective Thinking
5) By increasing customer loyalty, EC companies can achieve each of the following benefits
except:
A) lower marketing and advertising costs.
B) higher warranty claims costs.
C) lower transaction costs.
D) lower resistance to competitors.
Answer: B
Diff: 2
Page Ref: 154
AACSB Standard: Reflective Thinking
6) The introduction of EC has:
A) decreased customer loyalty because customers can more easily shop, compare, and switch to
different vendors.
B) increased customer loyalty because customers don't have time to shop around.
C) increased the cost of acquiring and retaining customers.
D) decreased advertising and promotion costs.
Answer: A
Diff: 3
Page Ref: 154
AACSB Standard: Reflective Thinking
7) The ethical issue raised by profiling customers too precisely is:
A) spamming.
B) invasion of privacy.
C) theft of intellectual property.
D) security.
Answer: B
Diff: 2
Page Ref: 154
AACSB Standard: Ethical Reasoning
49
Copyright © 2010 Pearson Education, Inc.
8) What has been the impact of the introduction of EC on customer loyalty in general?
A) Loyalty has decreased because of customers' increased ability to shop, compare prices and
features, and change vendors.
B) Loyalty has increased because of targeted relationship marketing.
C) There has been little change in loyalty because the impacts have cancelled each other out.
D) It is not known whether loyalty has increased or decreased.
Answer: A
Diff: 3
Page Ref: 155
9) According to research, customer satisfaction with an Internet store:
A) cannot be predicted.
B) depends on two types of factors: information quality and customer service quality.
C) drops dramatically when certain Web site features fail to perform properly, such as the
content's reliability, loading speed, or usefulness.
D) is higher for new customers than former customers.
Answer: C
Diff: 2
Page Ref: 155
10) An Internet merchant can increase its trustworthiness by using each of the following except:
A) a vendor evaluation, such as BBB Online
B) co-branding
C) simple design
D) a convenient return policy
Answer: C
Diff: 2
Page Ref: 157
AACSB Standard: Reflective Thinking
11) Procter & Gamble (P&G) used the Internet in the new product development of Whitestrips, a
teeth-brightening product. Based on this experience, P&G:
A) decided to add Internet research to its traditional marketing test model.
B) could not determine the target market segments for the Whitestrips.
C) learned that the cost of online surveys was about the same as similarly sized telephone
surveys, but online surveys expedited research considerably.
D) reduced the time-to-market from concept to market launch by approximately two years.
Answer: D
Diff: 3
Page Ref: 159
AACSB Standard: Reflective Thinking
12) The use of cookies:
A) is one of the most controversial issues in EC.
B) has not helped Internet marketers target their ads.
C) is a widely used method for mass marketing.
D) is being replaced by adware and spyware programs.
Answer: A
Diff: 2
Page Ref: 160
AACSB Standard: Reflective Thinking
50
Copyright © 2010 Pearson Education, Inc.
13) All of the following are correct about market research methods except:
A) It is important first to understand how groups of consumers are classified or segmented.
B) Markets can be segmented to increase the percentage of responses and to formulate effective
marketing strategies that appeal to specific consumer groups.
C) Direct mail marketing methods are usually cost-effective.
D) Market segmentation is done with the aid of tools such as data modeling and data
warehousing.
Answer: C
Diff: 3
Page Ref: 160
AACSB Standard: Reflective Thinking
14) To avoid getting inaccurate information from participants of online surveys, marketers learn
about customers by observing their behavior using each of the following except:
A) transaction logs that record user activities at a company's Web site
B) cookies that allow a Web site to store data on the user's PC
C) spyware that gathers user information through an Internet connection without the user's
knowledge
D) data mining to analyze clickstream data
Answer: D
Diff: 2
Page Ref: 160
15) Once a company knows a consumer's preferences, the company can predict, without asking
the consumer directly, what other products or services that consumer might enjoy through:
A) active web bugs.
B) spyware.
C) collaborative filtering.
D) personalization.
Answer: C
Diff: 3
Page Ref: 160
AACSB Standard: Reflective Thinking
16) Which of the following is not a specific method for collecting online data?
A) phone surveys to learn if there are too many products for the customer to look through
B) e-mail communication with individual customers
C) moderated focus groups conducted in chat rooms
D) tracking customers' movements on the Web
Answer: A
Diff: 2
Page Ref: 161
AACSB Standard: Analytic Skills
51
Copyright © 2010 Pearson Education, Inc.
17) Two key factors limiting the use of personalization to more precisely target marketing efforts
to individual customers are:
A) matching profiles with product offerings and delivering those offerings.
B) communication costs and filtering costs.
C) privacy and trust issues.
D) lack of customer loyalty and service customization costs.
Answer: C
Diff: 3
Page Ref: 163
AACSB Standard: Reflective Thinking
18) Which of the following statement about Web mining is false?
A) Web mining refers to the use of data mining techniques for discovering and extracting
information from Web documents.
B) Web mining explores both Web content and Web usage.
C) Web mining uses customer data to infer or predict customer interest in other products or
services.
D) Usage analysis is derived from clickstream data.
Answer: C
Diff: 3
Page Ref: 163
AACSB Standard: Reflective Thinking
19) What is the key problem that biometric marketing is intended to solve?
A) knowing the identity of the actual shopper
B) improving accuracy of the shopper's data
C) increasing the speed of order processing
D) creating a loyalty program
Answer: A
Diff: 2
Page Ref: 164
AACSB Standard: Reflective Thinking
20) ________ is an advertising network that a B2B company can use as part of its advertising
strategy to reach new customers.
A) Amazon.com
B) BBB Online
C) DoubleClick
D) WebMonkey
Answer: C
Diff: 2
Page Ref: 167
52
Copyright © 2010 Pearson Education, Inc.
21) Ways in which user profiles are typically generated by EC businesses include all of the
following except:
A) asking users to fill in a questionnaire
B) using cookies, spyware, or Web bugs to observe what people are doing online
C) using customer segmentation to identify customers' preferences
D) basing them on what customers have purchased online before
Answer: C
Diff: 2
Page Ref: 168
AACSB Standard: Reflective Thinking
22) All of the following describe click-through rate except:
A) It is the ratio between the number of clicks on a banner ad and the number of times it is seen
by viewers.
B) It is a request for data from a Web page or file.
C) It measures the success of a banner in attracting visitors to click on the ad.
D) It may be less than or equal to the conversion rate.
Answer: B
Diff: 2
Page Ref: 168
23) Word-of-mouth marketing by which customers promote a product or service by telling others
via social networks or other means is referred to as:
A) affiliate marketing.
B) viral marketing.
C) target marketing.
D) search engine marketing.
Answer: B
Diff: 2
Page Ref: 176
AACSB Standard: Reflective Thinking
24) ________, such as concerts and videos, can generate tremendous public excitement and
bring huge crowds to a Web site.
A) Live Web events
B) Webcasting
C) Phone casting
D) Mobile casting
Answer: A
Diff: 2
Page Ref: 178
AACSB Standard: Use of Information Technology
53
Copyright © 2010 Pearson Education, Inc.
25) The popularity of Apple's iPhone and Application Store has made ________ important to
advertisers, who see social networking widgets, restaurant locators, mobile games, and other
applications as prime targets.
A) stickiness
B) direct marketing
C) mobile advertising
D) banner ads
Answer: C
Diff: 2
Page Ref: 179
26) How many Apple Application Store downloads were made by users in the five months
spanning July 2008 to December 2008?
A) 100 million
B) 25 million
C) 5 million
D) 1 million
Answer: A
Diff: 2
Page Ref: 179
27) One of the major challenges of one-to-one advertising is ________, or the flooding of users
with junk e-mail, banners, pop-ups, and so on.
A) interstitial ads
B) permission marketing
C) spamming
D) behavioral targeting
Answer: C
Diff: 1
Page Ref: 180
28) Web site content is especially important to increase stickiness because:
A) customers are expensive to acquire.
B) Web sites are expensive to maintain.
C) competitors are always attempting to steal away customers.
D) of Internet-accessible mobile devices.
Answer: A
Diff: 3
Page Ref: 183
AACSB Standard: Reflective Thinking
54
Copyright © 2010 Pearson Education, Inc.
29) Banner advertising on Web sites helps trigger a realization that there is a gap between reality
and a desired state, which occurs in the ________ stage of the EC purchase decision-making
process.
A) need identification or recognition
B) information search
C) evaluation
D) product or merchant brokering
Answer: A
Diff: 2
Page Ref: 184
AACSB Standard: Use of Information Technology
30) As the volume of customers, products, vendors, and information increases, it becomes
uneconomical or impossible for customers to consider all relevant information, and available
products/services. The practical solution to handling such information overload is:
A) to use permission marketing.
B) to use software or intelligent agents.
C) to increase the use of ad agencies.
D) to design Web sites with minimal content.
Answer: B
Diff: 2
Page Ref: 184
4.3 Fill in the Blank
1) A(n) ________ is a person whose advice or view carries some weight in making a final
purchasing decision.
Answer: influencer
Diff: 2
Page Ref: 149
2) ________ is marketing that treats each customer in a unique way to fit marketing and
advertising with the customer's profile and needs.
Answer: One-to-one (relationship) marketing
Diff: 2
Page Ref: 150
3) The classification of groups of similar customers is called ________.
Answer: market segmentation
Diff: 2
Page Ref: 150
4) ________ is the matching of services, products, and advertising content with individual
consumers and their preferences.
Answer: Personalization
Diff: 2
Page Ref: 152
5) The requirements, preferences, behaviors, and demographic traits of a particular customer is
referred to as the ________.
Answer: user profile
Diff: 2
Page Ref: 152
55
Copyright © 2010 Pearson Education, Inc.
6) A(n) ________ is a data file that is placed on a user's hard drive by a remote Web server,
frequently without disclosure or the user's consent, that collects information about the user's
activities at a site.
Answer: cookie
Diff: 2
Page Ref: 152
7) ________ is the use of information collected on an individual's Internet browsing behavior to
select which advertisements to display to that individual.
Answer: Behavioral targeting
Diff: 2
Page Ref: 153
8) ________ refers to a deep commitment to rebuy or repatronize a preferred product/service
consistently in the future, thereby causing repetitive same-brand or same brand-set purchasing.
Answer: Customer loyalty
Diff: 1
Page Ref: 154
9) Trust and ________ are the two most important factors in determining customer e-loyalty.
Answer: satisfaction
Diff: 1
Page Ref: 156
AACSB Standard: Reflective Thinking
10) ________ is the psychological status of willingness to depend on another person or
organization.
Answer: Trust
Diff: 1
Page Ref: 156
11) Several market research firms create panels of qualified Web shoppers to participate in
online ________.
Answer: focus groups
Diff: 2
Page Ref: 162
12) A(n) ________ records user activities at a company's Web site.
Answer: transaction log
Diff: 2
Page Ref: 162
13) As customers move from a Web site to other Web sites, they establish their ________, which
is a pattern of their movements on the Internet.
Answer: clickstream behavior
Diff: 2
Page Ref: 162
14) ________ are tiny graphics files embedded in e-mail messages and in Web sites that transmit
information about users and their movements to a Web server.
Answer: Web bugs
Diff: 2
Page Ref: 163
56
Copyright © 2010 Pearson Education, Inc.
15) ________ is software that gathers user information through an Internet connection without
the user''s knowledge.
Answer: Spyware
Diff: 1
Page Ref: 163
16) ________ is data that occurs inside the Web environment and provides a trail of the user's
activities in the Web site.
Answer: Clickstream data
Diff: 2
Page Ref: 163
17) ________ refers to the use of data mining techniques for discovering and extracting
information from Web documents.
Answer: Web mining
Diff: 2
Page Ref: 163
18) ________ refers to online marketing facilitated by the Internet, and by which marketers and
advertisers can interact directly with customers and consumers can interact with advertisers or
vendors.
Answer: Interactive marketing
Diff: 1
Page Ref: 165
AACSB Standard: Reflective Thinking
19) ________ are the number of times users call up a page that has a banner on it during a
specific period; known as impressions or page views.
Answer: Ad views
Diff: 2
Page Ref: 166
20) ________ is the fee an advertiser pays for each 1,000 times a page with a banner ad is
shown.
Answer: Cost per thousand impressions
Diff: 3
Page Ref: 166
21) ________ is the characteristic that influences the average length of time a visitor stays in a
site.
Answer: Stickiness
Diff: 2
Page Ref: 167
22) ________ are firms that offer specialized services such as brokering banner ads for sale and
helping target ads to consumers who are likely to be interested in categories of advertisements
based on consumer profiles.
Answer: Advertising networks
Diff: 2
Page Ref: 167
57
Copyright © 2010 Pearson Education, Inc.
23) ________ is the method of increasing a Web site's ranking on search engines based on
knowing the ranking algorithm.
Answer: Search engine optimization
Diff: 2
Page Ref: 171
24) ________ is the process of converting media products and advertisement material developed
in one environment (e.g., a country) to a form culturally and linguistically acceptable in countries
outside the original target market.
Answer: Localization
Diff: 2
Page Ref: 182
AACSB Standard: Use of Information Technology
25) Intelligent agents that support ________ help people deciding what product to buy.
Answer: product brokering
Diff: 2
Page Ref: 184
4.4 Essay
1) Identify and discuss the five phases in the generic purchasing-decision model.
Answer: The five phases are:
(1) Need identification: Consumer is faced with an imbalance between the actual and the desired
states of a need.
(2) Information search: Search of the various alternatives to satisfy the need.
(3) Alternative evaluation: Collect information to develop a set of criteria to help evaluate and
compare alternatives.
(4) Purchase and delivery: Consumer makes the purchasing decision, arranges payment and
delivery, and purchases warranties.
(5) Postpurchase behavior: Customer service and the buyer's evaluation of the usefulness of the
product.
Diff: 2
Page Ref: 147
AACSB Standard: Reflective Thinking
2) How can live Web events be used an advertising strategy? Explain three of the best practices
for successful live Web events.
Answer: Live Web events (concerts, shows, interviews, debates, videos), if properly done, can
generate tremendous public excitement and bring huge crowds to a Web site. Some of the best
practices for successful live Web events are:
- Carefully plan the content for the audience, interactivity level, preproduction, and schedule.
- Execute the production of the Live even using rich media.
- Conduct appropriate promotion via e-mails, affinity sites, and streaming media directories, and
conduct proper offline and online advertisement.
- Prepare for a high-quality delivery of the event.
- Capture data and analyze the audience's response so that improvements can be made.
Diff: 2
Page Ref: 178
AACSB Standard: Use of Information Technology
58
Copyright © 2010 Pearson Education, Inc.
3) List four reasons why Web advertising is growing rapidly.
Answer:
Cost. Online ads are sometimes cheaper than those in other media. In addition, ads can be
updated at any time with minimal cost.
Richness of format. Web ads can effectively use the convergence of text, audio, graphics, and
animation. In addition, games, entertainment, and promotions can be easily combined in online
advertisements..
Personalization. Web ads can be interactive and targeted to specific interest groups and/or
individuals; the Web is a much more focused medium.
Timeliness. Internet ads can be fresh and up-to-the-minute.
Location-basis. Using wireless technology and GPS, Web advertising can be location-based;
Internet ads can be sent to consumers whenever they are in a specific time and location; e.g., near
a restaurant or a theater.
Linking. It is easy to link from an online ad to a storefront–one click does it.
Digital branding. Even the most price-conscious online shoppers are willing to pay premiums
for brands they trust.
Diff: 2
Page Ref: 167
AACSB Standard: Use of Information Technology
4) What are two of the major considerations when implementing an online ad campaign?
Answer: Some of the major considerations when implementing an online ad campaign include
the following:
- The target audience needs to be clearly understood and should be online surfers.
- The traffic to the site should be estimated, and a powerful enough server must be prepared to
handle the expected traffic volume.
- Assuming that the promotion is successful, what will the result be? This assessment is needed
to evaluate the budget and promotion strategy.
- Consider cobranding; many promotions succeed because they bring together two or more
powerful partners.
Diff: 2
Page Ref: 181
5) Explain the importance of customer loyalty and identify ways to increase e-loyalty.
Answer: Attracting and retaining loyal customers remains the most important issue for any
selling company, including e-tailers. Increased customer loyalty can bring cost savings to a
company in various ways: lower marketing and advertising costs, lower transaction costs, lower
customer turnover expenses, and lower failure costs such as warranty claims.
Customer loyalty also strengthens a company's market position because loyal customers are kept
away from the competition. It can lead to enhanced resistance to competitors, a decrease in price
sensitivity, and an increase in favorable word-of-mouth.
Companies can foster e-loyalty by learning about their customers' needs, interacting with
customers, and providing superb customer service.
Diff: 3
Page Ref: 155
AACSB Standard: Use of Information Technology
Electronic Commerce 2010 (Turban / Lee / King / Liang / Turban)
Chapter 5 B2B E-Commerce
59
Copyright © 2010 Pearson Education, Inc.
5.1 True/False
1) Portsmouth Hospitals NHS Trust's use of online auctions successfully enabled the UK healthcare service provider to reduce costs without reducing the quality of care.
Answer: TRUE
Diff: 2
Page Ref: 194
2) Reverse auctions are one method of electronic procurement that is very popular with public
organizations where tendering is usually mandatory.
Answer: TRUE
Diff: 3
Page Ref: 194
AACSB Standard: Use of Information Technology
3) B2B e- commerce refers to transactions between businesses that are conducted electronically
over the public Internet only.
Answer: FALSE
Diff: 1
Page Ref: 195
4) A major characteristic of B2B e-commerce is that companies attempt to electronically
automate trading, communication, and collaboration processes in order to improve them, which
cannot be done without the Internet.
Answer: FALSE
Diff: 2
Page Ref: 195
5) The availability of a secure broadband Internet platform is one of the key drivers of B2B EC.
Answer: TRUE
Diff: 1
Page Ref: 195
AACSB Standard: Reflective Thinking
6) Market forecasters estimate that by 2012 the global B2B market, both online and offline,
could reach $1 trillion.
Answer: FALSE
Diff: 2
Page Ref: 195
7) B2B EC marketplaces that involve one seller selling to many buyers is called an exchange.
Answer: FALSE
Diff: 1
Page Ref: 196
8) In one-to-many and many-to-one marketplaces, if all selling is done by one company, it is a
buy-side market.
Answer: FALSE
Diff: 2
Page Ref: 196
60
Copyright © 2010 Pearson Education, Inc.
9) In company-centric marketplaces, the individual company has very little control over who
participates in selling or buying transactions.
Answer: FALSE
Diff: 2
Page Ref: 196
AACSB Standard: Use of Information Technology
10) E-marketplace exchanges are usually owned and run by a third party or by a consortium.
Answer: TRUE
Diff: 2
Page Ref: 196
AACSB Standard: Use of Information Technology
11) Businesses deal with other businesses for purposes beyond just selling or buying. One
example is that of collaborative commerce, which includes communication, design, planning,
and information sharing among business partners.
Answer: TRUE
Diff: 2
Page Ref: 196
AACSB Standard: Use of Information Technology
12) Intermediaries in B2B commerce that broker transactions between buyers and sellers are
third-parties that are either virtual or brick-and-mortar.
Answer: TRUE
Diff: 2
Page Ref: 197
AACSB Standard: Reflective Thinking
13) Spot buying refers to the purchasing of goods and services according to a schedule, usually
at prevailing market prices that are determined by supply and demand.
Answer: FALSE
Diff: 2
Page Ref: 197
14) Stock exchanges and commodity exchanges (such as oil and sugar) are examples of spot
buying.
Answer: TRUE
Diff: 1
Page Ref: 197
AACSB Standard: Reflective Thinking
15) Strategic sourcing purchases involve long-term contracts that usually are based on private
negotiations between sellers and buyers.
Answer: TRUE
Diff: 2
Page Ref: 197
AACSB Standard: Reflective Thinking
16) Two examples of direct materials for a food processing company are computers and
communication devices.
Answer: FALSE
Diff: 2
Page Ref: 198
AACSB Standard: Reflective Thinking
61
Copyright © 2010 Pearson Education, Inc.
17) MRO, which stands for "maintenance, repair, and operation," refers to indirect or
nonproduction materials that support the production process.
Answer: FALSE
Diff: 2
Page Ref: 198
18) Markets that focus on providing materials or products that are used in various types of
industries are known as horizontal marketplaces.
Answer: TRUE
Diff: 2
Page Ref: 198
19) B2B services are completely replacing human agents in commercial real estate and travel
industries.
Answer: FALSE
Diff: 2
Page Ref: 199
20) By using the Internet and automatic-response software agents for customer service,
companies have been able to reduce their customer service costs by up to fifty percent.
Answer: FALSE
Diff: 2
Page Ref: 203
AACSB Standard: Use of Information Technology
21) If a company wants to dispose of unwanted assets without advertising to the public that it is
doing so, an intermediary-conducted public auction is a logical choice.
Answer: TRUE
Diff: 2
Page Ref: 208
22) Maverick buying refers to the planning, organizing, and coordinating of all the activities
pertaining to the purchasing of the goods and services necessary to accomplish the mission of an
enterprise.
Answer: FALSE
Diff: 2
Page Ref: 221
AACSB Standard: Use of Information Technology
23) Aggregating the catalogs of all approved suppliers and combining them into a single
electronic catalog is an effective solution for internal procurement because it minimizes
maverick buying.
Answer: TRUE
Diff: 3
Page Ref: 215
24) Caltex, a multinational oil company, reduced the number of its suppliers from over 3,000 to
800 by implementing a central catalog for internal purchasing, lowering the per unit prices.
Answer: TRUE
Diff: 3
Page Ref: 215
62
Copyright © 2010 Pearson Education, Inc.
25) Google's OpenSocial is a programming standard that lets developers create applications that
can run on a wide range of social networking platforms, which may increase B2B social
networking.
Answer: TRUE
Diff: 2
Page Ref: 232
5.2 Multiple Choice
1) Portsmouth Hospitals NHS Trust, which provided health-care services for almost 1 million
people in the United Kingdom, cut back-office purchasing costs by:
A) using online reverse auctions to purchase from suppliers at the the lowest mutually acceptable
purchase price.
B) implementing online catalogs.
C) buying via its intranet.
D) using collaborative commerce.
Answer: A
Diff: 2
Page Ref: 194
AACSB Standard: Use of Information Technology
2) Key business drivers for B2B are all of the following except:
A) the availability of a secure broadband Internet platform
B) numerous private and public B2B e-marketplaces
C) the willingness of companies to incur higher costs to improve collaboration
D) the need for collaborations between suppliers and buyers
Answer: C
Diff: 1
Page Ref: 195
3) B2B transactions that involve communication, design, planning, information sharing, and
activities beyond financial transactions among business partners is referred to as:
A) exchanges.
B) collaborative commerce.
C) trading communities.
D) public marketplaces.
Answer: B
Diff: 2
Page Ref: 195
4) A(n) ________ is an online third party that brokers B2B transactions between a buyer and
seller.
A) strategic source
B) horizontal marketplace
C) vertical marketplace
D) intermediary
Answer: D
Diff: 2
Page Ref: 196
63
Copyright © 2010 Pearson Education, Inc.
5) The purchase of goods and services as they are needed, usually at prevailing market prices, is
referred to as ________.
A) direct materials
B) consolidation
C) spot buying
D) strategic sourcing
Answer: C
Diff: 2
Page Ref: 197
6) Purchases of goods and services based on long-term contracts is referred to as ________.
A) direct materials
B) consolidation
C) spot buying
D) strategic sourcing
Answer: D
Diff: 2
Page Ref: 197
7) ________ can be supported more effectively and efficiently through direct buyer-seller
negotiations that are either offline or online, which can be done in private exchanges.
A) Strategic sourcing
B) Spot buying
C) B2C e-commerce
D) MRO
Answer: A
Diff: 2
Page Ref: 197
AACSB Standard: Reflective Thinking
8) What are the two types of materials and supplies that are traded in B2B?
A) digital and physical
B) direct and indirect
C) horizontal and vertical
D) commodities and nonproduction
Answer: B
Diff: 1
Page Ref: 198
9) Nonproduction materials such as equipment and tools that support production are called:
A) indirect materials.
B) operational materials.
C) direct materials.
D) virtual materials.
Answer: A
Diff: 2
Page Ref: 198
64
Copyright © 2010 Pearson Education, Inc.
10) The ________ consists of a number of interrelated subprocesses that extend from the
acquisition of materials from suppliers to packaging it and moving it to distributors and retailers.
A) supply chain
B) vertical market
C) horizontal marketplace
D) production chain
Answer: C
Diff: 2
Page Ref: 198
11) The major B2B service industries include each of the following except:
A) travel
B) financial
C) stock trading
D) retail
Answer: D
Diff: 2
Page Ref: 199
12) Which of the following is not one of the major benefits of B2B for both buyers and sellers?
A) expedites processing and reduces cycle time
B) reduces procurement costs
C) enables customized online catalogs with different prices for different customers
D) increases opportunities for collaboration
Answer: B
Diff: 2
Page Ref: 200
13) All are benefits of B2B except:
A) creates new sales or purchase opportunities
B) eliminates paper and reduces administrative costs
C) increases channel conflict
D) lowers search costs and time for buyers to find products and vendors
Answer: C
Diff: 2
Page Ref: 200
14) ________ occurs when B2B eliminates a distributor or a retailer.
A) Disintermediation
B) Channel conflict
C) Just-in-time delivery
D) Collaboration
Answer: A
Diff: 1
Page Ref: 200
65
Copyright © 2010 Pearson Education, Inc.
15) In a sell-side e-marketplace, a business sells its products and services to other business
customers, frequently over its:
A) exchange.
B) extranet.
C) intranet.
D) Web service.
Answer: B
Diff: 2
Page Ref: 201
AACSB Standard: Use of Information Technology
16) EC companies will usually separate their B2C orders from their B2B orders because B2C
and B2B orders have different:
A) buying and delivery processes.
B) accounting and financial processes.
C) marketing processes.
D) order-fulfillment processes and pricing.
Answer: D
Diff: 2
Page Ref: 202
17) By using the Internet and automatic-response software agents, GE reduced the cost of
customer service calls from $5.00 per call when done by phone to ________ per electronically
answered call.
A) $2.50
B) $1.00
C) $0.20
D) $0.05
Answer: C
Diff: 2
Page Ref: 202
18) Several benefits of Microsoft's ________ are that distributors can check inventory, make
transactions, and look up the status of their orders, significantly reducing the number of phone
calls, e-mails, and incorrect product shipments.
A) extranet-based order-entry tools
B) electronic data interchanges
C) customized catalogs
D) auto-responders
Answer: A
Diff: 3
Page Ref: 203
66
Copyright © 2010 Pearson Education, Inc.
19) High-quality bicycle manufacturer Gregg's Cycles does not sell its products online, nor do
they allow their bicycles to be sold online by others. By not selling online, Gregg's Cycles avoids
________ with its dealers and the independent bike shops that sell its bikes.
A) pricing conflict
B) channel conflict
C) multichannel distribution
D) disintermediation
Answer: B
Diff: 2
Page Ref: 204
AACSB Standard: Reflective Thinking
20) One of the major problems facing Cisco Systems and other direct sellers is:
A) how to find buyers.
B) how to find suppliers.
C) how to advertise in traditional channels.
D) how to manage the supply chain.
Answer: A
Diff: 1
Page Ref: 203
AACSB Standard: Reflective Thinking
21) Benefits of using a third-party hosting company for conducting B2B auctions instead of
developing an auction site in-house include all of the following except:
A) no hiring costs
B) no redeployment of corporate resources
C) time-to-market of several weeks
D) no need for additional resources such as hardware, bandwidth, or IT personnel
Answer: C
Diff: 3
Page Ref: 207
22) Companies use ________ to sell their unneeded assets for quick disposal or to dispose of
excess, obsolete, and returned products.
A) private auctions
B) liquidation
C) reverse auctions
D) forward auctions
Answer: D
Diff: 2
Page Ref: 208
67
Copyright © 2010 Pearson Education, Inc.
23) A company's acquisition Web site that uses e-procurement methods such as reverse auctions,
negotiations, or group purchasing to overcome the manual searching of e-stores is referred to as
________.
A) desktop procurement method
B) buy-side e-marketplace
C) an intermediary
D) aggregated catalog
Answer: B
Diff: 3
Page Ref: 209
24) Benefits of e-procurement over traditional procurement methods include all of the following
except:
A) increasing the productivity of purchasing agents
B) lowering purchase prices through product standardization, reverse auctions, volume
discounts, and consolidation of purchases
C) increasing the skill requirements and training needs of purchasing agents
D) streamlining invoice reconciliation and dispute resolution
Answer: C
Diff: 3
Page Ref: 212
AACSB Standard: Analytic Skills
25) The aggregation of suppliers' catalogs on the buyer's server to make it easier to centralize and
control all procurement is called a(n):
A) bartering exchange.
B) buy-side e-marketplace.
C) sell-side e-marketplace.
D) internal procurement marketplace.
Answer: D
Diff: 3
Page Ref: 215
AACSB Standard: Reflective Thinking
26) An example of a successful aggregation of suppliers' catalogs is that of ________, which
aggregates more than 10,000 items from the catalogs of approved suppliers into an internal
electronic catalog.
A) MasterCard International
B) Amazon.com
C) Google
D) Priceline.com
Answer: A
Diff: 2
Page Ref: 215
68
Copyright © 2010 Pearson Education, Inc.
27) With a bartering exchange, a company submits its surplus to the exchange and receives:
A) points of credit, which the company can then use to buy items that it needs.
B) an equivalent amount of products or services.
C) interest payments until it buys something from the exchange.
D) cash minus a small commission for services.
Answer: A
Diff: 2
Page Ref: 217
28) All of the following are true of dynamic pricing except:
A) Anonymity often is a key ingredient.
B) Buyers and sellers interact with bids and offers in real time.
C) E-malls are a prime example of this pricing model.
D) A deal is struck when there is an exact match between a buyer and a seller on price, volume,
and other variables, such as location or quality.
Answer: C
Diff: 3
Page Ref: 220
AACSB Standard: Reflective Thinking
29) Denver Boards, a B2B manufacturer of snowboard equipment, can reach and target new
retail customers in order to grow its online business by:
A) hiring an affiliation service to drive traffic to its Web site.
B) reviewing POS data.
C) mining data.
D) advertising in traditional media.
Answer: A
Diff: 3
Page Ref: 233
AACSB Standard: Use of Information Technology
30) Services provided by infomediaries to marketing managers include all of the following
except:
A) data mining to produce constructive knowledge
B) community services such as chat rooms and bulletin boards
C) analyzing clickstream data
D) processing existing data
Answer: B
Diff: 2
Page Ref: 234
AACSB Standard: Use of Information Technology
5.3 Fill in the Blank
1) ________ are public e-marketplaces that are open to all interested sellers and buyers.
Answer: Exchanges
Diff: 2
Page Ref: 195
69
Copyright © 2010 Pearson Education, Inc.
2) B2B e-commerce can be conducted either directly between a customer and a manufacturer or
indirectly by a third party though an online ________.
Answer: intermediary
Diff: 2
Page Ref: 197
3) ________ is the purchase of goods and services as they are needed, usually at prevailing
market prices.
Answer: Spot buying
Diff: 2
Page Ref: 197
4) ________ are markets that deal with one industry or industry segment such as steel or
chemicals.
Answer: Vertical marketplaces
Diff: 2
Page Ref: 198
AACSB Standard: Use of Information Technology
5) ________ are markets that concentrate on a service, product, or materials that are used in
various types of industries such as office supplies or PCs.
Answer: Horizontal marketplaces
Diff: 2
Page Ref: 198
AACSB Standard: Use of Information Technology
6) MRO types of materials, such as office supplies, are referred to as ________ materials
because they are used in activities that support production.
Answer: indirect
Diff: 2
Page Ref: 198
7) A(n) ________ e-marketplace is a B2B Web site that uses reverse auctions or other eprocurement methods.
Answer: buy-side
Diff: 2
Page Ref: 201
AACSB Standard: Use of Information Technology
8) In a(n) ________ e-marketplace, one company sells to many business buyers from e-catalogs
or auctions, usually over an extranet.
Answer: sell-side
Diff: 2
Page Ref: 201
AACSB Standard: Use of Information Technology
9) ________ management refers to the planning, organizing, and coordination of all the
management activities pertaining to the purchasing of goods and services needed to accomplish
the mission of an enterprise.
Answer: Procurement
Diff: 2
Page Ref: 210
70
Copyright © 2010 Pearson Education, Inc.
10) ________ refers to the unplanned purchases of items needed quickly, often at non-negotiated
higher prices.
Answer: Maverick buying
Diff: 2
Page Ref: 211
11) The electronic acquisition of goods and services for organizations is ________.
Answer: e-procurement
Diff: 2
Page Ref: 211
12) A(n) ________ is a tendering (bidding) system in which suppliers are invited to bid on the
fulfillment of an order and the lowest bid wins.
Answer: reverse auction
Diff: 2
Page Ref: 213
13) The invitation to participate in reverse auctions is a form or document called a(n) ________.
Answer: RFQ (request for quote)
Diff: 2
Page Ref: 213
14) ________ is the direct purchasing from internal marketplaces without the approval of
supervisors and without the intervention of a procurement department.
Answer: Desktop purchasing
Diff: 2
Page Ref: 215
15) With ________, orders from several buyers are combined into volume purchases so that
better prices can be negotiated.
Answer: group purchasing
Diff: 2
Page Ref: 216
16) With a(n) ________, a company submits its surplus to the exchange and receives points of
credit, which the company can then use to buy items that it needs.
Answer: bartering exchange
Diff: 2
Page Ref: 217
17) ________ refers to a rapid movement of prices over time and possibly across customers.
Answer: Dynamic pricing
Diff: 2
Page Ref: 220
18) Transaction fees and membership fees are two examples of ________ for exchanges.
Answer: revenue models
Diff: 2
Page Ref: 222
19) B2B portals that focus on a single industry or industry segment are referred to as ________.
Answer: vertical portals (or vortals)
Diff: 2
Page Ref: 223
71
Copyright © 2010 Pearson Education, Inc.
20) A subset of third-party exchanges is a(n) ________, an exchange formed and operated by a
group of major companies in one industry.
Answer: consortium trading exchange (CTE)
Diff: 3
Page Ref: 226
21) The strategy of providing such comprehensive, quality e-service for business partners is
sometimes called ________.
Answer: partner relationship management (PRM)
Diff: 2
Page Ref: 229
22) Of the ________ frequented by business and EC professionals, LinkedIn was the most well
known.
Answer: social networks
Diff: 2
Page Ref: 231
23) According to the model of organizational buyer behavior, age, gender, education, and
lifestyle are types of ________ influences.
Answer: individual
Diff: 2
Page Ref: 233
24) According to the model of organizational buyer behavior, authority, status, and
persuasiveness are types of ________ influences.
Answer: individual
Diff: 2
Page Ref: 233
25) The processing of existing date to identify useful information, such as trends and other
relationships in the data, is referred to as ________.
Answer: data mining
Diff: 2
Page Ref: 234
AACSB Standard: Use of Information Technology
5.4 Essay
1) List and briefly describe the four basic types of B2B transactions and activities.
Answer: Sell-side. One seller to many buyers.
Buy-side. One buyer from many sellers.
Exchanges. Many sellers to many buyer.
Supply chain improvements and collaborative commerce. Activities--other than buying or
selling--among business partners, such as supply chain improvements, communication,
collaboration, and information sharing for joint design and planning.
Diff: 1
Page Ref: 195
AACSB Standard: Use of Information Technology
72
Copyright © 2010 Pearson Education, Inc.
2) List five major benefits of B2B for buyers or sellers or both.
Answer:
Creates new sales or purchase opportunities
Eliminates paper and reduces administrative costs
Expedites processing and reduces cycle time
Lowers search costs and time for buyers to find products and vendors
Increases productivity of employees dealing with buying and/or selling
Reduces errors and improves quality of services
Makes product configuration easier
Reduces marketing and sales costs for sellers
Reduces inventory levels and costs
Enables customized online catalogs with different prices for different customers
Increases production flexibility, permitting just-in-time delivery
Reduces procurement costs for buyers
Facilitates customization via configuration
Provides for efficient customer service
Increases opportunities for collaboration
Diff: 2
Page Ref: 200
3) Briefly explain channel conflict caused by B2B. Give an example of how channel conflict can
be avoided or lessened.
Answer: In selling directly to customers, manufacturers may encounter channel conflict with the
regular distributors, including corporate dealers. B2B sellers that also sell B2C risk channel
conflicts with their existing distribution systems.
One solution, as illustrated by Gregg's Cycles, is for the manufacturer to sell its major product
(bicycles) only to distributors (B2B) and sell peripheral products, such as parts and accessories to
customers (B2C).
Diff: 2
Page Ref: 203
AACSB Standard: Reflective Thinking
4) List three goals or benefits of e-procurement.
Answer:
Increase the productivity of purchasing agents
Lower purchase prices
Improve information flow and management
Minimize maverick buying
Establish efficient collaborative supplier relations
Minimize human error
Reduce administrative costs
Diff: 3
Page Ref: 212
AACSB Standard: Use of Information Technology
73
Copyright © 2010 Pearson Education, Inc.
5) What are the three major functions of exchanges?
Answer:
Matching buyers and sellers
Facilitating transactions
Maintaining exchange policies and infrastructure
Diff: 1
Page Ref: 220
Electronic Commerce 2010 (Turban / Lee / King / Liang / Turban)
Chapter 6 E-Supply Chains, Collaborative Commerce, and Corporate Portals
6.1 True/False
1) During the design of the Boeing Dreamliner 787, IT-supported collaboration reduced the need
for physical prototyping and testing.
Answer: TRUE
Diff: 1
Page Ref: 244
2) A company's internal operations are those that deal with relationships with suppliers and other
business partners are less critical than their customer-facing applications.
Answer: FALSE
Diff: 2
Page Ref: 245
AACSB Standard: Reflective Thinking
3) A company's success is clearly dependent on finding and retaining customers and far more
dependent on what is on the Web site than on what is going on behind the site.
Answer: FALSE
Diff: 3
Page Ref: 245
AACSB Standard: Reflective Thinking
4) The term supply chain comes from the concept of how systems and processes within an
organization are linked together.
Answer: FALSE
Diff: 2
Page Ref: 245
5) The success of many private, public, and military organizations depends on their ability to
manage the flows of materials, information, and money, which is referred to as the product life
cycle.
Answer: TRUE
Diff: 2
Page Ref: 246
6) Product delays, products not being where they are required at the right time, customer
dissatisfaction, and lost sales can all be caused by supply chain problems.
Answer: TRUE
Diff: 2
Page Ref: 245
7) A supply chain involves activities that take place during the entire product life cycle, from dirt
to dust.
74
Copyright © 2010 Pearson Education, Inc.
Answer: TRUE
Diff: 2
Page Ref: 246
AACSB Standard: Reflective Thinking
75
Copyright © 2010 Pearson Education, Inc.
8) The downstream part of the supply chain includes the activities of a company with its
suppliers, which can be manufacturers, assemblers, or both, or service providers, and their
connections with their suppliers.
Answer: FALSE
Diff: 1
Page Ref: 246
9) In the internal part of the supply chain, the major concerns are production management,
manufacturing, and inventory control.
Answer: TRUE
Diff: 1
Page Ref: 246
10) In the upstream supply chain, attention is directed at distribution, warehousing,
transportation, and after-sale service.
Answer: FALSE
Diff: 1
Page Ref: 246
11) SCM aims to minimize inventory levels, optimize production and increase throughput,
decrease manufacturing time, optimize logistics and distribution, streamline order fulfillment,
and overall reduce the costs associated with these activities.
Answer: TRUE
Diff: 3
Page Ref: 247
AACSB Standard: Reflective Thinking
12) E-supply chain management is the collaborative use of technology to enhance B2C processes
and improve speed, agility, real-time control, and customer satisfaction.
Answer: FALSE
Diff: 1
Page Ref: 247
AACSB Standard: Use of Information Technology
13) The success of an e-supply chain depends on managing information with strict policies,
discipline, and daily monitoring.
Answer: TRUE
Diff: 2
Page Ref: 248
AACSB Standard: Ethical Reasoning
14) The success of an e-supply chain depends on an e-supply chain that is loosely integrated both
within a company and across an extended enterprise made up of suppliers, trading partners,
logistics providers, and the distribution channel.
Answer: FALSE
Diff: 2
Page Ref: 248
AACSB Standard: Reflective Thinking
76
Copyright © 2010 Pearson Education, Inc.
15) Companies can use replenishment information to reduce inventories and eliminate stocking
points.
Answer: TRUE
Diff: 2
Page Ref: 248
16) By combining bar coding and wireless technologies, automobile dealers are able to scan in
goods electronically as they arrive and place them in inventory up to 10 percent faster than
previously.
Answer: FALSE
Diff: 2
Page Ref: 249
17) At hospitals and supermarkets, inventory reorder points have been automated so that when
inventory gets down to a certain point the system will automatically notify a human of the exact
amount to reorder.
Answer: FALSE
Diff: 2
Page Ref: 249
18) Products such as groceries or gasoline have predictable demand. For these products, an
effective supply chain emphasizes speed and flexibility to minimize the bullwhip effect rather
than low costs.
Answer: FALSE
Diff: 3
Page Ref: 251
AACSB Standard: Reflective Thinking
19) Pure EC companies are likely to have more supply chain problems if they lack a logistics
infrastructure and must use external logistics services.
Answer: TRUE
Diff: 3
Page Ref: 251
AACSB Standard: Reflective Thinking
20) Some of the limitations of RFID can be overcome by a new wireless standard, RuBee.
Answer: TRUE
Diff: 3
Page Ref: 253
AACSB Standard: Use of Information Technology
21) RuBee relies on low-frequency magnetic waves to track products and transfer information.
Answer: FALSE
Diff: 2
Page Ref: 258
22) With vendor-managed inventory, retailers make their suppliers responsible for determining
when to order and how much to order. The retailer provides the supplier with real-time
information such as point-of-sale data, inventory levels, and a threshold below which orders are
replenished.
Answer: TRUE
Diff: 2
Page Ref: 262
77
Copyright © 2010 Pearson Education, Inc.
23) Studies have shown that electronic-based collaboration and product lifecycle management
(PLM) can reduce product costs and travel expenses by 50 percent, as well as significantly
reduce costs associated with product-change management.
Answer: FALSE
Diff: 3
Page Ref: 263
AACSB Standard: Reflective Thinking
24) The goal of collaborative planning, forecasting, and replenishment (CPFR) is to streamline
product flow from manufacturing plants to retailers.
Answer: FALSE
Diff: 2
Page Ref: 265
25) As with any IT project, management needs to be able to justify the development and use of a
corporate portal by comparing its cost with its benefits. The challenge is that despite the tangible
benefits from investment in portal technology, such as include increased revenues and customer
loyalty, most of the benefits of portals are intangible.
Answer: TRUE
Diff: 2
Page Ref: 271
AACSB Standard: Reflective Thinking
6.2 Multiple Choice
1) A company's internal operations and its relationships with suppliers and other business
partners are frequently:
A) much more complex than customer-facing applications such as taking an order online.
B) as complex as customer-facing applications such as taking an order online.
C) much less complex than customer-facing applications such as taking an order online.
D) replaced by customer-facing applications.
Answer: B
Diff: 3
Page Ref: 245
2) For a manufacturer, the supply chain ends:
A) when the supplier delivers raw materials and component parts to the manufacturer.
B) when the product is used up and disposed of.
C) when the customer buys the product.
D) when the customer decides he/she is satisfied with a product.
Answer: B
Diff: 3
Page Ref: 246
AACSB Standard: Reflective Thinking
78
Copyright © 2010 Pearson Education, Inc.
3) The e-SCM process that includes integrated production and distribution processes is:
A) supply chain replenishment.
B) collaborative planning.
C) e-procurement.
D) e-logistics.
Answer: A
Diff: 2
Page Ref: 248
4) When planning, designing and implementing integrated supply chain operations, management
requires a holistic focus that takes into account all of the following primary factors except:
A) strategy, structure, and people
B) location and revenues
C) IT and business processes
D) culture, including performance measurement, monitoring, and incentives
Answer: B
Diff: 3
Page Ref: 248
5) The use of Web technologies to manage warehousing and transportation processes is called:
A) collaborative planning.
B) downstream processing.
C) e-logistics.
D) e-replenishment.
Answer: C
Diff: 2
Page Ref: 249
6) Which of the following about supply chain problems is not true?
A) Supply chains in military and business operations have been plagued with problems for
generations.
B) Supply chain problems have sometimes caused armies to lose wars and companies to go out
of business.
C) Supply chain problems are most apparent in complex supply chains.
D) Supply chain problems are lowest when many business partners are involved.
Answer: D
Diff: 3
Page Ref: 250
7) The last fifteen orders from a manufacturer to its suppliers range from $100,000 to
$8,750,000. This is an example of:
A) the bullwhip effect.
B) demand manipulation.
C) supply inadequacy.
D) order instability.
Answer: A
Diff: 2
Page Ref: 251
79
Copyright © 2010 Pearson Education, Inc.
8) A major block in the widespread implementation of collaborative commerce is:
A) the theory of collaborative commerce hasn't been proven effective in real-world applications.
B) the technology needed isn't available.
C) collaborative commerce is extremely expensive.
D) the lack of universally accepted standards.
Answer: D
Diff: 2
Page Ref: 264
9) Wal-Mart and Levi Strauss collaborate on demand forecasting in order to optimize the flow of
materials along the supply chain. This is an example of:
A) reducing design cycle time.
B) APS.
C) CPFR.
D) reducing product development time.
Answer: C
Diff: 2
Page Ref: 265
AACSB Standard: Reflective Thinking
10) The purpose of CPFR is to:
A) minimize quality problems in supplies.
B) ensure that supply chain members have the right amount of materials and goods when needed.
C) eliminate supply chain intermediaries.
D) optimize the flow of materials along the supply chain.
Answer: B
Diff: 3
Page Ref: 265
AACSB Standard: Reflective Thinking
11) ________ is a business strategy that enables manufacturers to control and share productrelated data as part of product design and development efforts.
A) Advanced planning and scheduling
B) Collaborative planning
C) Product lifecycle management
D) Internal commerce
Answer: C
Diff: 2
Page Ref: 266
12) All of the following are true about product lifecycle management (PLM) except:
A) PLM can have significant beneficial impacts in cycle time, design reuse, and engineering.
B) The demand for PLM is limited because it does not apply to products that have short life
cycles or are complex.
C) PLM is a big step for an organization because it requires integrating different processes and
systems.
D) PLM tools are offered by major IT companies such as SAP and IBM.
Answer: B
Diff: 2
Page Ref: 266
80
Copyright © 2010 Pearson Education, Inc.
13) Today, many business experts agree with each of the following except:
A) Supply chain integration has reduced the intensity of competition in most industries.
B) The insightful way to view contemporary business is that competition exists between or
among supply chains rather then individual companies.
C) Supply chains from the suppliers' suppliers to the customers' customers should be jointly
planned and designed for overall optimality by all of the supply chain partners.
D) The supply chain needs to be operationally integrated so that inventory activities link
seamlessly to manufacturing activities.
Answer: A
Diff: 3
Page Ref: 267
AACSB Standard: Reflective Thinking
14) Software that helps integrate different types of information systems among collaborating
companies is called:
A) middleware.
B) browser technology.
C) collaborative software.
D) extranet technology.
Answer: A
Diff: 2
Page Ref: 268
AACSB Standard: Use of Information Technology
15) Groupware is appropriate in all of the following situations except:
A) for groups to share ideas and opinions
B) for people working on different tasks or projects
C) for networked environments
D) for people in the same room
Answer: B
Diff: 3
Page Ref: 273
AACSB Standard: Reflective Thinking
16) The growth in electronic meeting systems has been driven by all of the following except:
A) lower energy costs
B) improvements in supporting technology
C) reductions in the price of the technology
D) acceptance of virtual meetings as a respected way of doing business
Answer: A
Diff: 1
Page Ref: 275
17) ________ means that the communication and collaboration are done in real time.
A) Synchronous
B) Asynchronous
C) Bi-synchronous
D) Multi-synchronous
Answer: A
Diff: 1
Page Ref: 276
81
Copyright © 2010 Pearson Education, Inc.
18) All of the following are types of communication and collaboration done in real time except:
A) blogging
B) webinars
C) instant messaging
D) VoIP
Answer: A
Diff: 1
Page Ref: 276
19) The major benefit of real-time collaboration is:
A) faster decision making.
B) easier decision making.
C) that it is cheaper than asynchronous collaboration.
D) greater agreement.
Answer: B
Diff: 2
Page Ref: 276
AACSB Standard: Reflective Thinking
20) ________ is the transfer of documents and computer files while videoconferencing.
A) Web conferencing
B) Interactive whiteboarding
C) Data conferencing
D) CPFR
Answer: C
Diff: 1
Page Ref: 277
AACSB Standard: Reflective Thinking
21) All of the following are characteristics of Web conferencing except:
A) It is conducted on the Internet for as few as two and as many as twenty people.
B) It allows users to simultaneously view something on their computer screens.
C) It is much cheaper than videoconferencing because it runs over the Internet.
D) The latest technological innovations support both B2B and B2C Web conferencing
applications.
Answer: A
Diff: 2
Page Ref: 278
AACSB Standard: Use of Information Technology
22) Advantages of interactive whiteboards include all of the following except:
A) All participants can join in.
B) Throughout a meeting, each user can view and draw on a single document.
C) They enable the display of video clips.
D) There is stronger data security.
Answer: D
Diff: 2
Page Ref: 278
AACSB Standard: Reflective Thinking
82
Copyright © 2010 Pearson Education, Inc.
23) The Lotus Notes/Domino suite includes all of the following except:
A) instant video
B) document management
C) database
D) communication support
Answer: A
Diff: 2
Page Ref: 279
24) ________ are collaborative tools that enable people to work on the same files and
documents, making changes in a very rapid way.
A) Portals
B) Wikis
C) Lotus Notes
D) Document management
Answer: B
Diff: 2
Page Ref: 281
AACSB Standard: Use of Information Technology
25) Infrastructure needed for groupware include all of the following except:
A) VoIP
B) intranets
C) extranets
D) the Internet
Answer: A
Diff: 2
Page Ref: 282
26) Corporations are moving their phone systems to ________ to cut costs and boost efficiency.
A) RTC
B) VoIP
C) GDSS
D) bluetooth
Answer: B
Diff: 2
Page Ref: 282
27) A messaging service that transposes the desktop messaging experience to the usage scenario
of being on the move is ________.
A) mobile instant messaging
B) VoIP
C) instant video
D) data messaging
Answer: A
Diff: 2
Page Ref: 282
83
Copyright © 2010 Pearson Education, Inc.
28) Mobile support systems include each of the following except:
A) mobile social networking
B) mobile handset
C) mobile VoIP
D) mobile instant messaging
Answer: C
Diff: 2
Page Ref: 282
AACSB Standard: Use of Information Technology
29) ________ are required to create a truly collaborative environment, to integrate different
applications, and for standardizing communication.
A) Web services
B) Portals
C) Protocols
D) Collaborative workflows
Answer: C
Diff: 2
Page Ref: 283
30) All of the following apply to instant video except:
A) It evolved from the spread of instant messaging and Internet telephony.
B) The idea is for a kind of video chat room that allows users to chat in real time and see the
people they are communicating with.
C) It is the natural result of wanting to link people via both voice and audio.
D) The highest quality approach is to add video cameras to the participants' computers.
Answer: D
Diff: 2
Page Ref: 283
6.3 Fill in the Blank
1) Boeing's Dreamliner was referred to as a ________ airliner because IT and electronic
communication were used to support its planning and many other critical activities.
Answer: paperless
Diff: 2
Page Ref: 244
2) The success of many organization
manage the flow of materials, information, and money into, within, and out of the organization.
Such a flow is referred to as a ________.
Answer: supply chain
Diff: 2
Page Ref: 245
3) The term supply chain comes from the concept of how the partnering organizations are
________ together.
Answer: linked
Diff: 2
Page Ref: 245
84
Copyright © 2010 Pearson Education, Inc.
4) A supply chain involves activities that take place during the entire ________, from dirt to
dust.
Answer: product life cycle
Diff: 2
Page Ref: 246
5) When a supply chain is managed electronically, usually with Web technologies, it is referred
to as a(n) ________.
Answer: e-supply chain
Diff: 1
Page Ref: 246
6) A supply chain can be broken into three major parts. The ________ part of the supply chain
includes the activities of a company with its suppliers and their connections with their suppliers.
Answer: upstream
Diff: 2
Page Ref: 246
7) ________ is the process made up of a range of activities by which an organization obtains or
gains access to the resources they require to undertake their core business activities.
Answer: Procurement
Diff: 2
Page Ref: 247
8) ________ is a complex process that requires the coordination of many activities so that the
shipment of goods and services from supplier right through to customer is done efficiently and
effectively for all parties concerned.
Answer: Supply chain management
Diff: 2
Page Ref: 247
9) Increasingly, companies are recognizing that the efficient and effective flow of information
and materials along their supply chains is a source of ________.
Answer: competitive advantage or differentiation
Diff: 2
Page Ref: 247
10) ________ is the collaborative use of technology to enhance B2B processes and improve
speed, agility, real-time control, and customer satisfaction.
Answer: E-supply chain management
Diff: 2
Page Ref: 247
11) ________ is the use of Web-based technologies to support the material acquisition,
warehousing, and transportation processes.
Answer: E-logistics
Diff: 2
Page Ref: 249
12) The ________ refers to erratic shifts in orders up and down supply chains.
Answer: bullwhip effect
Diff: 2
Page Ref: 251
85
Copyright © 2010 Pearson Education, Inc.
13) ________ can lead to as many as 100 days of additional inventory waiting just in case.
Answer: Stockpiling
Diff: 2
Page Ref: 251
14) Inventories can be minimized by introducing a ________ manufacturing process as well as
by providing fast and accurate information to suppliers.
Answer: build-to-order (on demand)
Diff: 2
Page Ref: 252
15) With ________, retailers make their suppliers responsible for determining when to order and
how much to order. The retailer provides the supplier with real-time information, inventory
levels, and a threshold below which orders are replenished.
Answer: vendor-managed inventory
Diff: 2
Page Ref: 262
16) ________ is a business strategy that enables manufacturers to control and share productrelated data as part of product design and development efforts and in support of supply chain
operations.
Answer: Product lifecycle management
Diff: 2
Page Ref: 263
AACSB Standard: Reflective Thinking
17) ________ is an architecture that enables the assembly of distributed applications from
software services and ties them together.
Answer: Web services
Diff: 2
Page Ref: 268
18) ________ refers to software products that support groups of people who share a common
task or goal and collaborate on its accomplishment.
Answer: Groupware
Diff: 2
Page Ref: 273
19) ________ are online meetings whose members are in different locations, even in different
countries.
Answer: Virtual meetings
Diff: 2
Page Ref: 275
20) In collaborative work, members frequently are in different locations. Using ________
software, group members can work on the same document, which is shown on the PC screen of
each participant.
Answer: screen sharing
Diff: 2
Page Ref: 277
86
Copyright © 2010 Pearson Education, Inc.
21) ________ are computer-based whiteboards that work like real-world whiteboards with
markers and erasers, except all participants can join in.
Answer: Interactive whiteboards
Diff: 2
Page Ref: 278
22) A ________ is an interconnected environment in which all the participants in dispersed
locations can access and interact with each other just as inside a single entity.
Answer: collaborative (shared) workspace
Diff: 2
Page Ref: 281
23) ________ refers to communication systems that transmit voice calls over Internet Protocol
based networks.
Answer: VoIP
Diff: 2
Page Ref: 282
24) ________ is a status indicator that conveys ability and willingness of a potential
communication partner.
Answer: Presence information
Diff: 2
Page Ref: 282
25) The spread of instant messaging and Internet telephony has naturally led to the idea of
linking people via a video chat room, which is called ________.
Answer: instant video
Diff: 1
Page Ref: 283
6.4 Essay
1) Define supply chain and list the activities that are involved.
Answer: A supply chain is the flow of materials, information, money, and services from raw
material suppliers through factories and warehouses to the end customers. A supply chain also
includes the organizations and processes that create and deliver products, information, and
services to the end customers. The term supply chain comes from the concept of how the
partnering organizations are linked together.
A supply chain involves activities that take place during the entire product life cycle, from dirt to
dust. However, a supply chain is more than that, because it also includes the movement of
information and money and the procedures that support the movement of a product or a service.
Finally, the organizations and individuals involved are considered part of the supply chain as
well. When looked at broadly, the supply chain actually ends when the product reaches its afteruse disposal.
Diff: 2
Page Ref: 245
87
Copyright © 2010 Pearson Education, Inc.
2) Identify three factors or capabilities that the success of an e-supply chain depends on.
Answer: The success of an e-supply chain depends on the following:
- The ability of all supply chain partners to view partner collaboration as a strategic asset
- A well-defined supply chain strategy
- Information visibility along the entire supply chain
- Speed, cost, quality, and customer service
- Integrating the supply chain more tightly
Diff: 2
Page Ref: 248
3) List and briefly explain the major infrastructure elements and tools of e-supply chain
management.
Answer:
Electronic Data Interchange. EDI is the major tool used by large corporations to facilitate supply
chain relationships. Many companies are shifting from internal EDI to Internet-based EDI.
Extranets. Their major purpose is to support interorganizational communication and
collaboration.
Intranets. These are the corporate internal networks for communication and collaboration.
Corporate portals. These provide a gateway for external and internal collaboration,
communication, and information search.
Workflow systems and tools. These are systems that manage the flow of information in
organizations.
Groupware and other collaborative tools. A large number of tools facilitate collaboration and
communication between two parties and among members of small as well as large groups.
Various tools, some of which are collectively known as groupware, enable such collaboration.
Diff: 2
Page Ref: 249
AACSB Standard: Use of Information Technology
4) What are three solutions to supply chain problems provided by EC?
Answer: EC technologies automate and expedite order taking, speed order fulfillment, provide
for e-payments, properly control inventories, provide for correct forecasting and thus better
scheduling, and improve collaboration among supply chain partners.
Diff: 2
Page Ref: 251
5) List three benefits of VoIP communications for businesses.
Answer:
Lowers total cost of ownership
Lowers operational costs
Reduces hardware requirements
Provides a holistic approach to security
Helps streamline workflows
Enables optimized conferencing tools to replace business travel
Diff: 2
Page Ref: 282
Electronic Commerce 2010 (Turban / Lee / King / Liang / Turban)
Chapter 6 E-Supply Chains, Collaborative Commerce, and Corporate Portals
6.1 True/False
88
Copyright © 2010 Pearson Education, Inc.
1) During the design of the Boeing Dreamliner 787, IT-supported collaboration reduced the need
for physical prototyping and testing.
Answer: TRUE
Diff: 1
Page Ref: 244
2) A company's internal operations are those that deal with relationships with suppliers and other
business partners are less critical than their customer-facing applications.
Answer: FALSE
Diff: 2
Page Ref: 245
AACSB Standard: Reflective Thinking
3) A company's success is clearly dependent on finding and retaining customers and far more
dependent on what is on the Web site than on what is going on behind the site.
Answer: FALSE
Diff: 3
Page Ref: 245
AACSB Standard: Reflective Thinking
4) The term supply chain comes from the concept of how systems and processes within an
organization are linked together.
Answer: FALSE
Diff: 2
Page Ref: 245
5) The success of many private, public, and military organizations depends on their ability to
manage the flows of materials, information, and money, which is referred to as the product life
cycle.
Answer: TRUE
Diff: 2
Page Ref: 246
6) Product delays, products not being where they are required at the right time, customer
dissatisfaction, and lost sales can all be caused by supply chain problems.
Answer: TRUE
Diff: 2
Page Ref: 245
7) A supply chain involves activities that take place during the entire product life cycle, from dirt
to dust.
Answer: TRUE
Diff: 2
Page Ref: 246
AACSB Standard: Reflective Thinking
89
Copyright © 2010 Pearson Education, Inc.
8) The downstream part of the supply chain includes the activities of a company with its
suppliers, which can be manufacturers, assemblers, or both, or service providers, and their
connections with their suppliers.
Answer: FALSE
Diff: 1
Page Ref: 246
9) In the internal part of the supply chain, the major concerns are production management,
manufacturing, and inventory control.
Answer: TRUE
Diff: 1
Page Ref: 246
10) In the upstream supply chain, attention is directed at distribution, warehousing,
transportation, and after-sale service.
Answer: FALSE
Diff: 1
Page Ref: 246
11) SCM aims to minimize inventory levels, optimize production and increase throughput,
decrease manufacturing time, optimize logistics and distribution, streamline order fulfillment,
and overall reduce the costs associated with these activities.
Answer: TRUE
Diff: 3
Page Ref: 247
AACSB Standard: Reflective Thinking
12) E-supply chain management is the collaborative use of technology to enhance B2C processes
and improve speed, agility, real-time control, and customer satisfaction.
Answer: FALSE
Diff: 1
Page Ref: 247
AACSB Standard: Use of Information Technology
13) The success of an e-supply chain depends on managing information with strict policies,
discipline, and daily monitoring.
Answer: TRUE
Diff: 2
Page Ref: 248
AACSB Standard: Ethical Reasoning
14) The success of an e-supply chain depends on an e-supply chain that is loosely integrated both
within a company and across an extended enterprise made up of suppliers, trading partners,
logistics providers, and the distribution channel.
Answer: FALSE
Diff: 2
Page Ref: 248
AACSB Standard: Reflective Thinking
90
Copyright © 2010 Pearson Education, Inc.
15) Companies can use replenishment information to reduce inventories and eliminate stocking
points.
Answer: TRUE
Diff: 2
Page Ref: 248
16) By combining bar coding and wireless technologies, automobile dealers are able to scan in
goods electronically as they arrive and place them in inventory up to 10 percent faster than
previously.
Answer: FALSE
Diff: 2
Page Ref: 249
17) At hospitals and supermarkets, inventory reorder points have been automated so that when
inventory gets down to a certain point the system will automatically notify a human of the exact
amount to reorder.
Answer: FALSE
Diff: 2
Page Ref: 249
18) Products such as groceries or gasoline have predictable demand. For these products, an
effective supply chain emphasizes speed and flexibility to minimize the bullwhip effect rather
than low costs.
Answer: FALSE
Diff: 3
Page Ref: 251
AACSB Standard: Reflective Thinking
19) Pure EC companies are likely to have more supply chain problems if they lack a logistics
infrastructure and must use external logistics services.
Answer: TRUE
Diff: 3
Page Ref: 251
AACSB Standard: Reflective Thinking
20) Some of the limitations of RFID can be overcome by a new wireless standard, RuBee.
Answer: TRUE
Diff: 3
Page Ref: 253
AACSB Standard: Use of Information Technology
21) RuBee relies on low-frequency magnetic waves to track products and transfer information.
Answer: FALSE
Diff: 2
Page Ref: 258
22) With vendor-managed inventory, retailers make their suppliers responsible for determining
when to order and how much to order. The retailer provides the supplier with real-time
information such as point-of-sale data, inventory levels, and a threshold below which orders are
replenished.
Answer: TRUE
Diff: 2
Page Ref: 262
91
Copyright © 2010 Pearson Education, Inc.
23) Studies have shown that electronic-based collaboration and product lifecycle management
(PLM) can reduce product costs and travel expenses by 50 percent, as well as significantly
reduce costs associated with product-change management.
Answer: FALSE
Diff: 3
Page Ref: 263
AACSB Standard: Reflective Thinking
24) The goal of collaborative planning, forecasting, and replenishment (CPFR) is to streamline
product flow from manufacturing plants to retailers.
Answer: FALSE
Diff: 2
Page Ref: 265
25) As with any IT project, management needs to be able to justify the development and use of a
corporate portal by comparing its cost with its benefits. The challenge is that despite the tangible
benefits from investment in portal technology, such as include increased revenues and customer
loyalty, most of the benefits of portals are intangible.
Answer: TRUE
Diff: 2
Page Ref: 271
AACSB Standard: Reflective Thinking
6.2 Multiple Choice
1) A company's internal operations and its relationships with suppliers and other business
partners are frequently:
A) much more complex than customer-facing applications such as taking an order online.
B) as complex as customer-facing applications such as taking an order online.
C) much less complex than customer-facing applications such as taking an order online.
D) replaced by customer-facing applications.
Answer: B
Diff: 3
Page Ref: 245
2) For a manufacturer, the supply chain ends:
A) when the supplier delivers raw materials and component parts to the manufacturer.
B) when the product is used up and disposed of.
C) when the customer buys the product.
D) when the customer decides he/she is satisfied with a product.
Answer: B
Diff: 3
Page Ref: 246
AACSB Standard: Reflective Thinking
92
Copyright © 2010 Pearson Education, Inc.
3) The e-SCM process that includes integrated production and distribution processes is:
A) supply chain replenishment.
B) collaborative planning.
C) e-procurement.
D) e-logistics.
Answer: A
Diff: 2
Page Ref: 248
4) When planning, designing and implementing integrated supply chain operations, management
requires a holistic focus that takes into account all of the following primary factors except:
A) strategy, structure, and people
B) location and revenues
C) IT and business processes
D) culture, including performance measurement, monitoring, and incentives
Answer: B
Diff: 3
Page Ref: 248
5) The use of Web technologies to manage warehousing and transportation processes is called:
A) collaborative planning.
B) downstream processing.
C) e-logistics.
D) e-replenishment.
Answer: C
Diff: 2
Page Ref: 249
6) Which of the following about supply chain problems is not true?
A) Supply chains in military and business operations have been plagued with problems for
generations.
B) Supply chain problems have sometimes caused armies to lose wars and companies to go out
of business.
C) Supply chain problems are most apparent in complex supply chains.
D) Supply chain problems are lowest when many business partners are involved.
Answer: D
Diff: 3
Page Ref: 250
7) The last fifteen orders from a manufacturer to its suppliers range from $100,000 to
$8,750,000. This is an example of:
A) the bullwhip effect.
B) demand manipulation.
C) supply inadequacy.
D) order instability.
Answer: A
Diff: 2
Page Ref: 251
93
Copyright © 2010 Pearson Education, Inc.
8) A major block in the widespread implementation of collaborative commerce is:
A) the theory of collaborative commerce hasn't been proven effective in real-world applications.
B) the technology needed isn't available.
C) collaborative commerce is extremely expensive.
D) the lack of universally accepted standards.
Answer: D
Diff: 2
Page Ref: 264
9) Wal-Mart and Levi Strauss collaborate on demand forecasting in order to optimize the flow of
materials along the supply chain. This is an example of:
A) reducing design cycle time.
B) APS.
C) CPFR.
D) reducing product development time.
Answer: C
Diff: 2
Page Ref: 265
AACSB Standard: Reflective Thinking
10) The purpose of CPFR is to:
A) minimize quality problems in supplies.
B) ensure that supply chain members have the right amount of materials and goods when needed.
C) eliminate supply chain intermediaries.
D) optimize the flow of materials along the supply chain.
Answer: B
Diff: 3
Page Ref: 265
AACSB Standard: Reflective Thinking
11) ________ is a business strategy that enables manufacturers to control and share productrelated data as part of product design and development efforts.
A) Advanced planning and scheduling
B) Collaborative planning
C) Product lifecycle management
D) Internal commerce
Answer: C
Diff: 2
Page Ref: 266
12) All of the following are true about product lifecycle management (PLM) except:
A) PLM can have significant beneficial impacts in cycle time, design reuse, and engineering.
B) The demand for PLM is limited because it does not apply to products that have short life
cycles or are complex.
C) PLM is a big step for an organization because it requires integrating different processes and
systems.
D) PLM tools are offered by major IT companies such as SAP and IBM.
Answer: B
Diff: 2
Page Ref: 266
94
Copyright © 2010 Pearson Education, Inc.
13) Today, many business experts agree with each of the following except:
A) Supply chain integration has reduced the intensity of competition in most industries.
B) The insightful way to view contemporary business is that competition exists between or
among supply chains rather then individual companies.
C) Supply chains from the suppliers' suppliers to the customers' customers should be jointly
planned and designed for overall optimality by all of the supply chain partners.
D) The supply chain needs to be operationally integrated so that inventory activities link
seamlessly to manufacturing activities.
Answer: A
Diff: 3
Page Ref: 267
AACSB Standard: Reflective Thinking
14) Software that helps integrate different types of information systems among collaborating
companies is called:
A) middleware.
B) browser technology.
C) collaborative software.
D) extranet technology.
Answer: A
Diff: 2
Page Ref: 268
AACSB Standard: Use of Information Technology
15) Groupware is appropriate in all of the following situations except:
A) for groups to share ideas and opinions
B) for people working on different tasks or projects
C) for networked environments
D) for people in the same room
Answer: B
Diff: 3
Page Ref: 273
AACSB Standard: Reflective Thinking
16) The growth in electronic meeting systems has been driven by all of the following except:
A) lower energy costs
B) improvements in supporting technology
C) reductions in the price of the technology
D) acceptance of virtual meetings as a respected way of doing business
Answer: A
Diff: 1
Page Ref: 275
17) ________ means that the communication and collaboration are done in real time.
A) Synchronous
B) Asynchronous
C) Bi-synchronous
D) Multi-synchronous
Answer: A
Diff: 1
Page Ref: 276
95
Copyright © 2010 Pearson Education, Inc.
18) All of the following are types of communication and collaboration done in real time except:
A) blogging
B) webinars
C) instant messaging
D) VoIP
Answer: A
Diff: 1
Page Ref: 276
19) The major benefit of real-time collaboration is:
A) faster decision making.
B) easier decision making.
C) that it is cheaper than asynchronous collaboration.
D) greater agreement.
Answer: B
Diff: 2
Page Ref: 276
AACSB Standard: Reflective Thinking
20) ________ is the transfer of documents and computer files while videoconferencing.
A) Web conferencing
B) Interactive whiteboarding
C) Data conferencing
D) CPFR
Answer: C
Diff: 1
Page Ref: 277
AACSB Standard: Reflective Thinking
21) All of the following are characteristics of Web conferencing except:
A) It is conducted on the Internet for as few as two and as many as twenty people.
B) It allows users to simultaneously view something on their computer screens.
C) It is much cheaper than videoconferencing because it runs over the Internet.
D) The latest technological innovations support both B2B and B2C Web conferencing
applications.
Answer: A
Diff: 2
Page Ref: 278
AACSB Standard: Use of Information Technology
22) Advantages of interactive whiteboards include all of the following except:
A) All participants can join in.
B) Throughout a meeting, each user can view and draw on a single document.
C) They enable the display of video clips.
D) There is stronger data security.
Answer: D
Diff: 2
Page Ref: 278
AACSB Standard: Reflective Thinking
96
Copyright © 2010 Pearson Education, Inc.
23) The Lotus Notes/Domino suite includes all of the following except:
A) instant video
B) document management
C) database
D) communication support
Answer: A
Diff: 2
Page Ref: 279
24) ________ are collaborative tools that enable people to work on the same files and
documents, making changes in a very rapid way.
A) Portals
B) Wikis
C) Lotus Notes
D) Document management
Answer: B
Diff: 2
Page Ref: 281
AACSB Standard: Use of Information Technology
25) Infrastructure needed for groupware include all of the following except:
A) VoIP
B) intranets
C) extranets
D) the Internet
Answer: A
Diff: 2
Page Ref: 282
26) Corporations are moving their phone systems to ________ to cut costs and boost efficiency.
A) RTC
B) VoIP
C) GDSS
D) bluetooth
Answer: B
Diff: 2
Page Ref: 282
27) A messaging service that transposes the desktop messaging experience to the usage scenario
of being on the move is ________.
A) mobile instant messaging
B) VoIP
C) instant video
D) data messaging
Answer: A
Diff: 2
Page Ref: 282
97
Copyright © 2010 Pearson Education, Inc.
28) Mobile support systems include each of the following except:
A) mobile social networking
B) mobile handset
C) mobile VoIP
D) mobile instant messaging
Answer: C
Diff: 2
Page Ref: 282
AACSB Standard: Use of Information Technology
29) ________ are required to create a truly collaborative environment, to integrate different
applications, and for standardizing communication.
A) Web services
B) Portals
C) Protocols
D) Collaborative workflows
Answer: C
Diff: 2
Page Ref: 283
30) All of the following apply to instant video except:
A) It evolved from the spread of instant messaging and Internet telephony.
B) The idea is for a kind of video chat room that allows users to chat in real time and see the
people they are communicating with.
C) It is the natural result of wanting to link people via both voice and audio.
D) The highest quality approach is to add video cameras to the participants' computers.
Answer: D
Diff: 2
Page Ref: 283
6.3 Fill in the Blank
1) Boeing's Dreamliner was referred to as a ________ airliner because IT and electronic
communication were used to support its planning and many other critical activities.
Answer: paperless
Diff: 2
Page Ref: 244
2) The suc
manage the flow of materials, information, and money into, within, and out of the organization.
Such a flow is referred to as a ________.
Answer: supply chain
Diff: 2
Page Ref: 245
3) The term supply chain comes from the concept of how the partnering organizations are
________ together.
Answer: linked
Diff: 2
Page Ref: 245
98
Copyright © 2010 Pearson Education, Inc.
4) A supply chain involves activities that take place during the entire ________, from dirt to
dust.
Answer: product life cycle
Diff: 2
Page Ref: 246
5) When a supply chain is managed electronically, usually with Web technologies, it is referred
to as a(n) ________.
Answer: e-supply chain
Diff: 1
Page Ref: 246
6) A supply chain can be broken into three major parts. The ________ part of the supply chain
includes the activities of a company with its suppliers and their connections with their suppliers.
Answer: upstream
Diff: 2
Page Ref: 246
7) ________ is the process made up of a range of activities by which an organization obtains or
gains access to the resources they require to undertake their core business activities.
Answer: Procurement
Diff: 2
Page Ref: 247
8) ________ is a complex process that requires the coordination of many activities so that the
shipment of goods and services from supplier right through to customer is done efficiently and
effectively for all parties concerned.
Answer: Supply chain management
Diff: 2
Page Ref: 247
9) Increasingly, companies are recognizing that the efficient and effective flow of information
and materials along their supply chains is a source of ________.
Answer: competitive advantage or differentiation
Diff: 2
Page Ref: 247
10) ________ is the collaborative use of technology to enhance B2B processes and improve
speed, agility, real-time control, and customer satisfaction.
Answer: E-supply chain management
Diff: 2
Page Ref: 247
11) ________ is the use of Web-based technologies to support the material acquisition,
warehousing, and transportation processes.
Answer: E-logistics
Diff: 2
Page Ref: 249
12) The ________ refers to erratic shifts in orders up and down supply chains.
Answer: bullwhip effect
Diff: 2
Page Ref: 251
99
Copyright © 2010 Pearson Education, Inc.
13) ________ can lead to as many as 100 days of additional inventory waiting just in case.
Answer: Stockpiling
Diff: 2
Page Ref: 251
14) Inventories can be minimized by introducing a ________ manufacturing process as well as
by providing fast and accurate information to suppliers.
Answer: build-to-order (on demand)
Diff: 2
Page Ref: 252
15) With ________, retailers make their suppliers responsible for determining when to order and
how much to order. The retailer provides the supplier with real-time information, inventory
levels, and a threshold below which orders are replenished.
Answer: vendor-managed inventory
Diff: 2
Page Ref: 262
16) ________ is a business strategy that enables manufacturers to control and share productrelated data as part of product design and development efforts and in support of supply chain
operations.
Answer: Product lifecycle management
Diff: 2
Page Ref: 263
AACSB Standard: Reflective Thinking
17) ________ is an architecture that enables the assembly of distributed applications from
software services and ties them together.
Answer: Web services
Diff: 2
Page Ref: 268
18) ________ refers to software products that support groups of people who share a common
task or goal and collaborate on its accomplishment.
Answer: Groupware
Diff: 2
Page Ref: 273
19) ________ are online meetings whose members are in different locations, even in different
countries.
Answer: Virtual meetings
Diff: 2
Page Ref: 275
20) In collaborative work, members frequently are in different locations. Using ________
software, group members can work on the same document, which is shown on the PC screen of
each participant.
Answer: screen sharing
Diff: 2
Page Ref: 277
100
Copyright © 2010 Pearson Education, Inc.
21) ________ are computer-based whiteboards that work like real-world whiteboards with
markers and erasers, except all participants can join in.
Answer: Interactive whiteboards
Diff: 2
Page Ref: 278
22) A ________ is an interconnected environment in which all the participants in dispersed
locations can access and interact with each other just as inside a single entity.
Answer: collaborative (shared) workspace
Diff: 2
Page Ref: 281
23) ________ refers to communication systems that transmit voice calls over Internet Protocol
based networks.
Answer: VoIP
Diff: 2
Page Ref: 282
24) ________ is a status indicator that conveys ability and willingness of a potential
communication partner.
Answer: Presence information
Diff: 2
Page Ref: 282
25) The spread of instant messaging and Internet telephony has naturally led to the idea of
linking people via a video chat room, which is called ________.
Answer: instant video
Diff: 1
Page Ref: 283
6.4 Essay
1) Define supply chain and list the activities that are involved.
Answer: A supply chain is the flow of materials, information, money, and services from raw
material suppliers through factories and warehouses to the end customers. A supply chain also
includes the organizations and processes that create and deliver products, information, and
services to the end customers. The term supply chain comes from the concept of how the
partnering organizations are linked together.
A supply chain involves activities that take place during the entire product life cycle, from dirt to
dust. However, a supply chain is more than that, because it also includes the movement of
information and money and the procedures that support the movement of a product or a service.
Finally, the organizations and individuals involved are considered part of the supply chain as
well. When looked at broadly, the supply chain actually ends when the product reaches its afteruse disposal.
Diff: 2
Page Ref: 245
101
Copyright © 2010 Pearson Education, Inc.
2) Identify three factors or capabilities that the success of an e-supply chain depends on.
Answer: The success of an e-supply chain depends on the following:
- The ability of all supply chain partners to view partner collaboration as a strategic asset
- A well-defined supply chain strategy
- Information visibility along the entire supply chain
- Speed, cost, quality, and customer service
- Integrating the supply chain more tightly
Diff: 2
Page Ref: 248
3) List and briefly explain the major infrastructure elements and tools of e-supply chain
management.
Answer:
Electronic Data Interchange. EDI is the major tool used by large corporations to facilitate supply
chain relationships. Many companies are shifting from internal EDI to Internet-based EDI.
Extranets. Their major purpose is to support interorganizational communication and
collaboration.
Intranets. These are the corporate internal networks for communication and collaboration.
Corporate portals. These provide a gateway for external and internal collaboration,
communication, and information search.
Workflow systems and tools. These are systems that manage the flow of information in
organizations.
Groupware and other collaborative tools. A large number of tools facilitate collaboration and
communication between two parties and among members of small as well as large groups.
Various tools, some of which are collectively known as groupware, enable such collaboration.
Diff: 2
Page Ref: 249
AACSB Standard: Use of Information Technology
4) What are three solutions to supply chain problems provided by EC?
Answer: EC technologies automate and expedite order taking, speed order fulfillment, provide
for e-payments, properly control inventories, provide for correct forecasting and thus better
scheduling, and improve collaboration among supply chain partners.
Diff: 2
Page Ref: 251
5) List three benefits of VoIP communications for businesses.
Answer:
Lowers total cost of ownership
Lowers operational costs
Reduces hardware requirements
Provides a holistic approach to security
Helps streamline workflows
Enables optimized conferencing tools to replace business travel
Diff: 2
Page Ref: 282
Electronic Commerce 2010 (Turban / Lee / King / Liang / Turban)
Chapter 8 Mobile Computing and Commerce, and Pervasive Computing
8.1 True/False
102
Copyright © 2010 Pearson Education, Inc.
1) The U.S. supermarket chain Food Lion sought an advantage against low-price competitors by
providing a high-level of convenience for shoppers.
Answer: TRUE
Diff: 1
Page Ref: 340
AACSB Standard: Use of Information Technology
2) Using wireless technologies, one can create EC applications that are not available with
wireline systems.
Answer: TRUE
Diff: 1
Page Ref: 341
3) Mobile computing refers to a computing paradigm designed for workers who travel outside
the boundaries of their organizations or for anyone on the move.
Answer: TRUE
Diff: 2
Page Ref: 344
AACSB Standard: Use of Information Technology
4) A laptop or notebook computer can become wireless with the addition of a cellular chip.
Answer: FALSE
Diff: 2
Page Ref: 344
AACSB Standard: Reflective Thinking
5) What distinguishes one type of mobile computer from another is its battery life.
Answer: FALSE
Diff: 2
Page Ref: 344
AACSB Standard: Reflective Thinking
6) A Web server may need two versions of the same We
between devices requesting the Web page.
Answer: TRUE
Diff: 1
Page Ref: 344
AACSB Standard: Use of Information Technology
7) The infrastructure to support mobile commerce is inexpensive and relatively simple to put in
place.
Answer: FALSE
Diff: 1
Page Ref: 344
AACSB Standard: Reflective Thinking
103
Copyright © 2010 Pearson Education, Inc.
8) Common standards for various mobile devices simplify the development of software
applications for wireless devices.
Answer: FALSE
Diff: 2
Page Ref: 345
AACSB Standard: Use of Information Technology
9) PDAs, smartphones, Internet appliances, and multimedia players appear to be converging
toward the same endpoint, which is a small-footprint, handheld mobile device that combines all
the capabilities of these devices in one package.
Answer: TRUE
Diff: 2
Page Ref: 345
AACSB Standard: Use of Information Technology
10) Short message service (SMS), or texting, is a service that supports the transmittal of long text
messages (up to 360 characters) between mobile phones on a cellular telephone network.
Answer: FALSE
Diff: 2
Page Ref: 345
AACSB Standard: Reflective Thinking
11) Multimedia messaging service (MMS) is the emerging generation of wireless messaging,
delivering rich media, including video and audio, to mobile phones and other devices.
Answer: FALSE
Diff: 2
Page Ref: 345
AACSB Standard: Use of Information Technology
12) The highest level of voice support services is a voice portal, which is a Web site with an
audio interface that can be accessed through a telephone call.
Answer: TRUE
Diff: 2
Page Ref: 346
13) Wi-Fi is a set of telecommunications standards that enables wireless devices to communicate
with each other over short distances, but which suffers from interference and security problems.
Answer: FALSE
Diff: 2
Page Ref: 347
14) WiMax is an IEEE 802.16 wireless standard for making broadband network access widely
available for data and voice over a medium-sized area.
Answer: TRUE
Diff: 2
Page Ref: 348
15) A wireless wide area network (WWAN) offers the broadest wireless coverage and relies on
the same network technologies as cell phones.
Answer: TRUE
Diff: 2
Page Ref: 348
AACSB Standard: Use of Information Technology
104
Copyright © 2010 Pearson Education, Inc.
16) Expansion of PayPal services into mobile remote payment services will facilitate a shift in
global consumer payment services now and into the future.
Answer: TRUE
Diff: 2
Page Ref: 352
AACSB Standard: Use of Information Technology
17) An m-commerce security challenge unique to mobile computing is the open-air transmission
of signals across multiple networks that opens up opportunities for interception.
Answer: TRUE
Diff: 2
Page Ref: 365
AACSB Standard: Reflective Thinking
18) When mobile users want to access the Internet, the usability of the site is critical to achieve
the purpose of the visit and to increase user stickiness.
Answer: TRUE
Diff: 2
Page Ref: 365
19) Several key ethical issues in m-commerce include isolation, loss of privacy, and potential
health damage from cellular radio frequency emissions.
Answer: TRUE
Diff: 2
Page Ref: 366
AACSB Standard: Ethical Reasoning
20) The widespread appearance of mobile devices in society has led to the need for cell phone
etiquette, the creation of cell free zones in hospitals and airport lounges, and National Cell Phone
Courtesy Month.
Answer: TRUE
Diff: 2
Page Ref: 366
AACSB Standard: Ethical Reasoning
21) A study by Seoul National University found that 30 percent of South Korean high school
students reported addiction effects, which are anxious feelings when they did not have their
phones with them.
Answer: TRUE
Diff: 2
Page Ref: 367
AACSB Standard: Ethical Reasoning
22) Pervasive computing is embedded in the environment is typically mobile.
Answer: FALSE
Diff: 2
Page Ref: 367
AACSB Standard: Reflective Thinking
105
Copyright © 2010 Pearson Education, Inc.
23) Most RFID tags have a large footprint and can be embedded or attached to most objects,
such as products, people, animals, or vehicles.
Answer: FALSE
Diff: 2
Page Ref: 368
AACSB Standard: Use of Information Technology
24) Real world awareness is a concept used to describe a company's ability to sense information
in real time from people, IT sources, and physical objects by using RFID and sensors and then
responding quickly and effectively.
Answer: FALSE
Diff: 2
Page Ref: 371
AACSB Standard: Use of Information Technology
25) Hardware and software designers need to consider the special requirements of mobile
devices such as small screens, reduced memory, limited bandwidth, and restricted input
capabilities.
Answer: TRUE
Diff: 1
Page Ref: 376
8.2 Multiple Choice
1) Food Lion is a U.S. supermarket chain that relies on ________ to compete against Wal-Mart
and other stores.
A) low prices and vast selection
B) m-commerce technology for customer convenience
C) huge online selection and fast delivery
D) organic and unique gourmet foods
Answer: A
Diff: 2
Page Ref: 340
AACSB Standard: Use of Information Technology
2) The major value-added attributes of the mobile commerce landscape include all of the
following except:
A) ubiquity
B) localization
C) security
D) personalization
Answer: C
Diff: 2
Page Ref: 341
AACSB Standard: Reflective Thinking
106
Copyright © 2010 Pearson Education, Inc.
3) The development of m-commerce is being driven by all of the following technological,
business, social, and economic factors except:
A) the transition to a manufacturing economy
B) the widespread availability of more powerful mobile devices
C) the growth of a handset culture and mobile workforce
D) the improved price/performance of mobile services
Answer: A
Diff: 1
Page Ref: 341
AACSB Standard: Reflective Thinking
4) As in e-commerce, m-commerce B2C applications are concentrated in each of the following
areas except:
A) retail shopping
B) advertising
C) telecommunications
D) financial
Answer: C
Diff: 3
Page Ref: 341
AACSB Standard: Reflective Thinking
5) M-commerce transactions and activities require ________ and ________.
A) wired networks; access points
B) cell phones; portable computers
C) hardware and software infrastructures; infrastructure support
D) smartphones; switches
Answer: C
Diff: 2
Page Ref: 344
AACSB Standard: Use of Information Technology
6) Infrastructures that support mobile computing are:
A) mobile devices, network access points, and servers.
B) WAP gateways, GPS locators, and GPS satellites.
C) PDAs, smartphones, and PCs.
D) Web servers, mobile devices, and microbrowsers.
Answer: A
Diff: 3
Page Ref: 344
AACSB Standard: Reflective Thinking
107
Copyright © 2010 Pearson Education, Inc.
7) Components of a wireless infrastructure that support delivery of services over a wireless
connection are:
A) mobile communications server switches.
B) GPS locators.
C) smartphones.
D) Web servers and microbrowsers.
Answer: B
Diff: 3
Page Ref: 344
8) Characteristics of mobile devices that need to be considered when designing mobile
computing systems include all of the following except:
A) small screens
B) reduced memory
C) restricted input capabilities
D) broad bandwidth
Answer: D
Diff: 2
Page Ref: 344
AACSB Standard: Reflective Thinking
9) The exchange of updated information with other computing devices is called:
A) docking.
B) data transferring.
C) synchronization.
D) texting.
Answer: C
Diff: 2
Page Ref: 344
10) ________ is computing that connects a mobile device to a network or another computing
device, any time, anywhere.
A) Wireless application protocol
B) Mobile operating system
C) Wireless mobile computing
D) Wireless middleware
Answer: C
Diff: 1
Page Ref: 344
11) ________ enables the determination of the location of an enabled device.
A) GPS
B) PDA
C) SMS
D) WAP
Answer: A
Diff: 2
Page Ref: 346
108
Copyright © 2010 Pearson Education, Inc.
12) Rick sends a message from a delayed flight to his friend on her cell phone that he will be
arriving late. The service that allows the sending and receiving of such short text messages on
mobile phones is called:
A) LOL.
B) MSG.
C) SMS.
D) TMG.
Answer: C
Diff: 2
Page Ref: 346
13) A ________ is suitable for mobile users who need to make very short-range device-to-device
wireless connections within a small space, such as a single room, and most commonly with
Bluetooth.
A) personal area network
B) local area network
C) wireless area network
D) Wi-Fi area network
Answer: A
Diff: 2
Page Ref: 346
AACSB Standard: Use of Information Technology
14) ________ systems enable users to interact with a computerized system to request and receive
information and to enter and change data using a telephone.
A) Interactive voice response (IVR)
B) Multimedia messaging
C) Mobile commerce
D) WiMax
Answer: A
Diff: 2
Page Ref: 346
15) Physically, the heart of a WLAN is a ________ that connects wireless devices to the desired
network.
A) router
B) wireless network PC card
C) wireless access point
D) modem
Answer: C
Diff: 2
Page Ref: 347
109
Copyright © 2010 Pearson Education, Inc.
16) Most WLANs run on a telecommunications standard known as ________, which is more
commonly called ________.
A) WLAN; hotspot
B) IEEE 802.16; WiMax
C) IEEE 802.11; Bluetooth
D) 802.11g; Wi-Fi
Answer: D
Diff: 3
Page Ref: 347
17) By using a large number of connected hotspots, one can create a wireless city. This is known
as a city-wide or ________ network.
A) 802.11b
B) WLAN
C) municipal Wi-Fi
D) GoogleWiFi
Answer: C
Diff: 3
Page Ref: 347
AACSB Standard: Use of Information Technology
18) Which of the following about wireless wide area networks (WWAN) is not true?
A) The single WWAN network standard insures compatibility of handsets within and between
countries.
B) WWANs offer the broadest wireless coverage.
C) WWANs can be distinguished by their speed, e.g., 2G, 3G, or 4G.
D) WWANs rely on the same network technologies as cell phones.
Answer: A
Diff: 3
Page Ref: 348
AACSB Standard: Use of Information Technology
19) WiMax and 3G wireless mobile technologies could offer telemedicine application
opportunities that include all of the following except:
A) Prescriptions can be transferred electronically to the appropriate pharmacy reducing errors.
B) Wearable heart monitors linked to a cell phone can automatically contact doctors or family
members at the first sign of health problems.
C) There can be eal-time consultation between a patient in one location and a medical specialist
in another.
D) There is a reduced threat of malpractice suits because there is no hands-on interaction
between the remote physician and the patient.
Answer: D
Diff: 3
Page Ref: 348
AACSB Standard: Reflective Thinking
110
Copyright © 2010 Pearson Education, Inc.
20) Mobile POS (point-of-sale) payments are also known as ________ or contactless payments.
A) mobility
B) remote
C) proximity
D) distance
Answer: C
Diff: 2
Page Ref: 350
21) The major enterprise mobile applications are all of the following except:
A) e-mail and cell phone contacts
B) sales force automation
C) field force automation
D) research and development
Answer: D
Diff: 2
Page Ref: 355
AACSB Standard: Reflective Thinking
22) By enabling sales force employees to record orders in real time, the enterprise would be
expected to benefit through each of the following except:
A) improved manufacturing and delivery scheduling
B) greater inventory levels
C) fewer data entry errors
D) lower clerical and administrative overhead
Answer: B
Diff: 2
Page Ref: 355
AACSB Standard: Reflective Thinking
23) All of the following are barriers to location-based m-commerce except:
A) Wireless bandwidth is limited.
B) The accuracy of location technologies is often less than consumers expect.
C) There are presently not enough location-based systems to make this a viable technology.
D) Consumers see constant location data transmissions as a violation of privacy.
Answer: C
Diff: 2
Page Ref: 360
AACSB Standard: Reflective Thinking
24) A(n) ________ is a computer system capable of integrating, storing, editing, analyzing,
sharing, and displaying spatial information.
A) GIS
B) GPS
C) L-commerce system
D) OnStar system
Answer: A
Diff: 2
Page Ref: 362
111
Copyright © 2010 Pearson Education, Inc.
25) You are walking near a coffee shop and suddenly your cell phone beeps with a message:
"Come inside and get a free biscotti with any purchase." This is an example of:
A) permission marketing.
B) location-based advertising.
C) customer relationship management.
D) m-commerce.
Answer: B
Diff: 2
Page Ref: 362
AACSB Standard: Reflective Thinking
26) All of the following are security-related issues of m-commerce except:
A) Post-transaction security issues of auditing and nonrepudiation are less difficult because cell
phones have the capability to store the digital equivalent of a receipt.
B) The basic security goals of confidentiality, authentication, authorization, and integrity are just
as important for m-commerce as they are for e-commerce.
C) As the capabilities of cell phones and PDAs increase and converge, the threat of attack from
malicious code increases.
D) An appropriate level of security must be maintained on each network that traffic flows
through, in spite of the fact that interoperability among the various networks is difficult.
Answer: A
Diff: 3
Page Ref: 365
27) Health risks of cell phone use include all of the following except:
A) cell phone addiction
B) damage from cell radio frequency emissions
C) spinal injury
D) repetitive stress injury
Answer: C
Diff: 2
Page Ref: 366
28) Ethical issues raised by m-commerce include all of the following except:
A) limited access to data and documents
B) privacy invasion
C) infringing on workers' personal time
D) isolation
Answer: A
Diff: 2
Page Ref: 366
112
Copyright © 2010 Pearson Education, Inc.
29) One of the keys to the RFID standards is the ________, which serves the same purpose as an
IP address on the Internet, providing a unique identifier for each tagged item.
A) Object Name Service (ONS)
B) Electronic Product Code (EPC)
C) IP for Smart Objects (IPSO)
D) IPv4
Answer: B
Diff: 3
Page Ref: 372
AACSB Standard: Use of Information Technology
30) In order to protect the privacy of individuals, privacy protection defenses must be:
A) designed into RFID tags, nodes, and networks.
B) addressed in a post hoc fashion.
C) addressed in an ad hoc fashion.
D) the responsibility of government agencies.
Answer: A
Diff: 2
Page Ref: 375
AACSB Standard: Ethical Reasoning
8.3 Fill in the Blank
1) ________ includes any business activity conducted over a wireless telecommunications
network.
Answer: Mobile commerce (m-commerce)
Diff: 1
Page Ref: 341
AACSB Standard: Use of Information Technology
2) A wireless mobile device provides ________ , which is availability at any location at any
time.
Answer: ubiquity
Diff: 2
Page Ref: 341
3) Businesses in which customer support and delivery of services require a high level of
________ with the customer are likely to find a high value-added component in mobile
computing.
Answer: interactivity
Diff: 1
Page Ref: 342
4) Mobile devices enable consumer ________, which is the delivery of information, products,
and services designed to meet the needs of individual consumers.
Answer: personalization
Diff: 1
Page Ref: 342
113
Copyright © 2010 Pearson Education, Inc.
5) Knowing where a user is physically located at any particular moment is known as ________,
which is key to offering relevant mobile services in real-time.
Answer: localization
Diff: 2
Page Ref: 342
AACSB Standard: Reflective Thinking
6) The transition from a manufacturing economy to a(n) ________ economy is encouraging the
development of mobile-based services.
Answer: service
Diff: 1
Page Ref: 343
AACSB Standard: Reflective Thinking
7) ________ transmission speeds are much slower than Wi-Fi, and have actual rates somewhere
between .1 and .5 Mbps.
Answer: 3G
Diff: 3
Page Ref: 343
8) To properly conduct m-commerce, it is necessary to have sufficient ________ to transmit the
desired information via text, picture, voice, video, or multimedia.
Answer: bandwidth
Diff: 1
Page Ref: 343
AACSB Standard: Use of Information Technology
9) ________ offers a computing environment suitable for workers who travel outside the
boundaries of their workplace or for anyone on the move.
Answer: Mobile computing
Diff: 1
Page Ref: 344
10) What distinguishes one type of mobile computer from another is its physical ________,
which refers to its size.
Answer: footprint
Diff: 2
Page Ref: 344
11) Most PDAs now have added support for wireless connectivity to the Internet through
________.
Answer: Wi-Fi
Diff: 2
Page Ref: 344
12) A ________ is a mobile phone with PDA-like or PC-like functionality.
Answer: smartphone
Diff: 1
Page Ref: 345
13) ________ is frequently referred to as texting and is a service that supports the transmittal of
short text messages.
Answer: Short Message Service (SMS)
Diff: 1
Page Ref: 345
114
Copyright © 2010 Pearson Education, Inc.
14) ________ is the emerging generation of wireless messaging to deliver rich media.
Answer: Multimedia Messaging Service (MMS)
Diff: 2
Page Ref: 345
15) ________ is a set of telecommunications standards that enables wireless devices to
communicate with each other over short distances of up to 20 meters (60 feet).
Answer: Bluetooth
Diff: 1
Page Ref: 346
16) ________ is a voice system that enables users to request and receive information and to enter
and change data through a telephone to a computerized system.
Answer: Interactive voice response (IVR)
Diff: 2
Page Ref: 346
17) ________ is the wireless standard (IEEE802.16) for making broadband network connections
over a medium-size area such as a city.
Answer: WiMax
Diff: 2
Page Ref: 348
18) ________ refers to the gap between people with effective access to digital and information
technology and those without such access.
Answer: Digital divide
Diff: 2
Page Ref: 352
AACSB Standard: Ethical Reasoning
19) In Las Vegas, the Luxor preregisters guests when their airplane lands and they turn on their
cell phones. This is an example of a(n) ________ system.
Answer: location-based
Diff: 2
Page Ref: 360
AACSB Standard: Reflective Thinking
20) A(n) ________ is a computer system capable of integrating, storing, editing, analyzing,
sharing, and displaying geographically referenced information.
Answer: geographical information system (GIS)
Diff: 2
Page Ref: 362
21) The highest level of voice support services is a ________, a Web site with an audio interface
that can be accessed through a telephone call.
Answer: voice portal
Diff: 2
Page Ref: 364
22) ________ remains the Wi-Fi standard of choice for inexpensive installations in most public
areas and homes.
Answer: 802.11b
Diff: 2
Page Ref: 366
115
Copyright © 2010 Pearson Education, Inc.
23) A widely publicized health issue is the potential health damage from cell phone usage due to
________.
Answer: radio frequency emissions
Diff: 2
Page Ref: 366
AACSB Standard: Ethical Reasoning
24) ________ is a short-range radio frequency communication technology for remotely storing
and retrieving data using tags and readers.
Answer: RFID
Diff: 2
Page Ref: 368
25) ________ is a product identification standard that specifies the manufacturer, producer,
version, and serial number of each product.
Answer: Electronic product code (EPC)
Diff: 2
Page Ref: 370
8.4 Essay
1) The development of m-commerce is being driven by the following technological, business,
social, and economic factors. Identify four of the factors.
Answer:
Widespread availability of powerful mobile devices.
The handset culture. A closely related driver is the widespread use of cell phones among the 15to 25-year-old age group.
The service economy. The transition from a manufacturing to a service-based economy is
encouraging the development of mobile-based services.
Vendors' push. Both mobile communication network operators and manufacturers of mobile
devices are advertising the many potential applications of m-commerce.
The mobile workforce. Increased mobility of the population.
Improvement of bandwidth. To properly conduct m-commerce, it is necessary to have sufficient
bandwidth to transmit the desired information via text, picture, voice, video, or multimedia.
Diff: 2
Page Ref: 341
AACSB Standard: Reflective Thinking
116
Copyright © 2010 Pearson Education, Inc.
2) What are two principles of pervasive computing that define its development?
Answer:
Decentralization. The decentralization of computing that began with the transition from the
centralized mainframe computer to the personal computer will continue in pervasive computing.
Indeed, computing devices in the future will not be computers but tags, sensors, badges, and
commonplace objects all cooperating together in a service oriented infrastructure.
Diversification. Computing devices will evolve from a fully functional one computer-does-all
paradigm to one in which specialized, diversified devices will suit the requirements of an
individual for a specific purpose. A person may own several devices that slightly overlap in
functionality, but each will be the preferred tool for each specific purpose.
Connectivity. The independent pervasive computing devices—tags, sensors, badges—will be
seamlessly connected to the network or to each other. Open, common standards will be required
to achieve this level of connectivity and interoperability.
Simplicity. These devices must be designed for simplicity of use. Intuitive interfaces, speech
recognition, one-handed operation, instant on, and always connected are a few of the
requirements for high, but simple, usability.
Diff: 2
Page Ref: 368
AACSB Standard: Ethical Reasoning
3) Compare the second generation (2G) and third generation (3G) of WWAN technologies.
Answer:
The 2G is based on digital radio technology and is able to accommodate voice and text messages
(SMS).
The 3G supports rich media, such as video. 3G utilizes packet switching. Connectivity is always
on. The potential exists for 3G to grow and change the way mobile devices are used and
dramatically increase m-commerce applications and activities.
Diff: 3
Page Ref: 348
AACSB Standard: Communication
4) What are two factors that are holding back the widespread use of location-based mcommerce?
Answer:
Accuracy of devices. Some of the location technologies are not as accurate a people expect them
to be.
Cost-benefit justification. For many potential users, the benefits of location-based services do
not justify the cost of the devices or the inconvenience and time required to utilize the service.
Limited network bandwidth. Wireless bandwidth is currently limited; it will be improved as 3G
technology spreads. As bandwidth improves, applications will improve, which will attract more
customers.
Invasion of privacy. When always-on cell phones are a reality, many people will be hesitant to
have their whereabouts and movements tracked throughout the day, even if they have nothing to
hide.
Diff: 3
Page Ref: 363
AACSB Standard: Ethical Reasoning
117
Copyright © 2010 Pearson Education, Inc.
5) Identify and briefly describe three technical limitations of mobile computing.
Answer:
Insufficient bandwidth. Sufficient bandwidth is necessary for widespread mobile computing,
and it must be inexpensive.
Security standards. Universal standards are still under development. It may take three or more
years for sufficient standards to be in place.
Power consumption. Batteries with long life are needed for mobile computing.
Transmission. Weather and terrain, including tall buildings, can limit reception.
GPS accuracy. GPS may be inaccurate in a city with tall buildings, limiting the use of locationbased m-commerce.
WAP limitations. Many mobile phone users find that WAP is expensive and difficult to access.
Potential health hazards. Potential health damage from cellular radio frequency emission is not
known yet. Known health hazards include cell phone addiction, thumb-overuse syndrome, and
accidents caused by people using cell phones while driving.
Human-computer interface. Screens and keyboards are too small, making mobile devices
uncomfortable and difficult for many people to use.
Complexity. Too many optional add-ons are available.
Diff: 2
Page Ref: 366
AACSB Standard: Ethical Reasoning
Electronic Commerce 2010 (Turban / Lee / King / Liang / Turban)
Chapter 9 The Web 2.0 Environment and Social Networks
9.1 True/False
1) Wikipedia is the largest free online collaborative encyclopedia whose greatest strength and
biggest weakness is that users create the content.
Answer: TRUE
Diff: 1
Page Ref: 384
2) A characteristic of Web 2.0 is the frequent software updates that are needed to control the
content and data.
Answer: FALSE
Diff: 2
Page Ref: 385
AACSB Standard: Reflective Thinking
3) One of the major phenomena of Web 2.0 is the emergence and rise of e-auctions.
Answer: FALSE
Diff: 2
Page Ref: 386
4) The key feature of mass social media is that people rather than organizations control them and
third-person voice is discouraged.
Answer: TRUE
Diff: 2
Page Ref: 387
5) One-way marketing and advertising and command-and-control management are typical
examples of pull-based systems, and nowhere as efficient as push systems.
118
Copyright © 2010 Pearson Education, Inc.
Answer: FALSE
Diff: 3
Page Ref: 388
AACSB Standard: Reflective Thinking
6) A characteristic of social media is centralization, instead of distribution.
Answer: FALSE
Diff: 3
Page Ref: 388
AACSB Standard: Reflective Thinking
7) Companies that introduce a significant change in their industries, thus, causing radical
changes in business operations are referred to as disruptors.
Answer: TRUE
Diff: 2
Page Ref: 388
8) Disruption did not occur in the real estate brokerage industry.
Answer: FALSE
Diff: 2
Page Ref: 389
AACSB Standard: Reflective Thinking
119
Copyright © 2010 Pearson Education, Inc.
9) A search engine is basically a document or file retrieval system designed to help find
information stored on a computer system, such as on the Web.
Answer: TRUE
Diff: 3
Page Ref: 390
AACSB Standard: Reflective Thinking
10) GeoCities is one example of a virtual community with many subcommunities.
Answer: TRUE
Diff: 2
Page Ref: 392
11) Facebook is the second-largest social network service in the world, with more than 120
million active users worldwide as of January 2009.
Answer: TRUE
Diff: 2
Page Ref: 396
12) A logical step as a community site grows in members and influence may be to turn it into a
commercial or revenue-generating site.
Answer: TRUE
Diff: 3
Page Ref: 400
AACSB Standard: Reflective Thinking
13) Social network analysis software provides both a visual and a mathematical analysis of
relationships where the nodes in the network are the people or groups, and the links show
relationships between the nodes.
Answer: TRUE
Diff: 2
Page Ref: 400
AACSB Standard: Use of Information Technology
14) Business networking functions best when individuals offer to help others form commercial
or business relationship or to find prospects.
Answer: FALSE
Diff: 2
Page Ref: 400
15) In addition to providing leadership, entrepreneurial networks may become online
communities involved in endorsing reforms, legislation, or other municipal drives to advance
their organization's goals.
Answer: TRUE
Diff: 2
Page Ref: 404
16) MySpace's music download service that allows the site's independent musicians to sell their
work directly from their profile pages has not been successful because it's illegal.
Answer: FALSE
Diff: 2
Page Ref: 407
AACSB Standard: Use of Information Technology
120
Copyright © 2010 Pearson Education, Inc.
17) Mobile advertising is a rapidly developing area of advertisement on cell phones and other
mobile devices.
Answer: TRUE
Diff: 2
Page Ref: 407
18) Although advertising and sales are the major EC activities in public social networks, there
are emerging possibilities for commercial activities in business-oriented networks such as
LinkedIn and in enterprise social networks.
Answer: TRUE
Diff: 2
Page Ref: 409
19) Several companies use enterprise social networking, and virtual worlds in particular, for
training purposes. For example, Cisco is trying to use its virtual campus in Second Life for
product training and executive briefings.
Answer: TRUE
Diff: 2
Page Ref: 410
20) Caterpillar created a knowledge network system for its employees, and it even markets the
software to other companies.
Answer: TRUE
Diff: 2
Page Ref: 410
21) Social networks are only for social purposes and do not generate revenue.
Answer: FALSE
Diff: 2
Page Ref: 411
22) Many companies find it easy to justify social media and networking because most of their
benefits are intangible, or positive word-of-mouth.
Answer: FALSE
Diff: 2
Page Ref: 412
23) Apple and Google undertook a formal merger to offer iPhone capabilities, such as delivering
Google services through Apple hardware.
Answer: FALSE
Diff: 2
Page Ref: 415
24) Web 3.0 will deliver a new generation of business applications that will see business and
social computing converge on the same fundamentals as on-demand architecture is converging
with consumer applications today.
Answer: FALSE
Diff: 2
Page Ref: 417
AACSB Standard: Use of Information Technology
121
Copyright © 2010 Pearson Education, Inc.
25) LinkedIn's "gated-access approach," whereby contact with another professional requires
either a preexisting relationship or the intervention of a contact, is intended to build trust among
the service's users.
Answer: TRUE
Diff: 2
Page Ref: 423
9.2 Multiple Choice
1) Wikipedia is a free online collaborative encyclopedia that had to resolve each of the following
problems except:
A) people with malicious agendas posting false information
B) competition from the bigger Encyclopedia Britannica
C) poor or substandard quality of the content
D) invasions of privacy
Answer: B
Diff: 2
Page Ref: 384
AACSB Standard: Ethical Reasoning
2) Perspectives about Web 2.0 include all of the following except:
A) Web 2.0 is organized around pages, software, technology, individuals, and corporations.
B) Web 2.0 has become the framework for bringing together the contributions of millions of
people to enhance creativity, information sharing, and collaboration.
C) Web 2.0 communities are one of the most powerful influences on society.
D) Web 2.0 stands to greatly improve internal business processes and marketing.
Answer: A
Diff: 2
Page Ref: 385
3) The following are representative characteristics of Web 2.0 except:
A) frequent software-upgrade cycles
B) the ability to tap into the collective intelligence of users
C) making data available in new or never-intended ways
D) the presence of lightweight programming techniques and tools that lets nearly anyone act as a
developer
Answer: A
Diff: 2
Page Ref: 385
4) ________ is a Web development technique for creating quicker and more responsive Web
applications by exchanging small amounts of data with the server so that the entire Web page
does not have to be reloaded each time the user makes a change.
A) RSS
B) Ajax
C) Wiki
D) ZOPA
Answer: B
Diff: 2
Page Ref: 386
122
Copyright © 2010 Pearson Education, Inc.
5) The banking industry was a good candidate for disruption by person-to-person (P2P)
technology and disintermediation by ZOPA because:
A) the industry offers a widely-needed service.
B) of fierce competition and low barriers to entry.
C) the industry was making huge profit margins off customers.
D) the industry had small profit margins.
Answer: C
Diff: 2
Page Ref: 387
6) ________ are companies that introduce a significant change in their industries, thus causing a
disruption in
normal business operations.
A) Disruptors
B) Mashups
C) Information clouds
D) Web 3.0
Answer: A
Diff: 2
Page Ref: 387
AACSB Standard: Use of Information Technology
7) The real estate brokerage industry has been disrupted by companies such as Zillow and
HomeGain for each of the following reasons except:
A) Homeowners can enter zillow.com and go to zestimate to get an approximation of their
home's market value with a map of the neighborhood.
B) The Zillow and Homegain sites provide more services and information than Web 1.0.
C) The Web 2.0 real estate sites have driven down commissions from 6 percent to almost 1
percent.
D) Homeowners can get comparisons of the estimated price of their home with neighbors'
homes.
Answer: C
Diff: 3
Page Ref: 389
8) What is the expected impact of industry disruptors on the real estate industry?
A) elimination of real estate agents
B) the 6 percent realtor commission paid in the United States moving closer to the 1 percent
commission commonly paid in other countries
C) greater specialization of real estate agents with higher commissions
D) Increased competition and bidding wars to find and buy homes
Answer: B
Diff: 2
Page Ref: 389
AACSB Standard: Reflective Thinking
123
Copyright © 2010 Pearson Education, Inc.
9) ________ are virtual communities organized by an interest, such as political parties, or by
product, company, or health topic.
A) Associations
B) Megacommunities
C) Social networks
D) Affinity portals
Answer: D
Diff: 2
Page Ref: 390
10) ________ are communities that are country- or language-specific.
A) Associations
B) Megacommunities
C) Ethnic communities
D) Social networks
Answer: C
Diff: 1
Page Ref: 390
11) Alloy.com, bolt.com, and blueskyfrog.com are communities that:
A) cater to young people.
B) provide B2B networks.
C) are exchanges supporting community programs.
D) offer interactive Webcasts for government or professional associations.
Answer: A
Diff: 2
Page Ref: 390
12) All of the following are categories and examples of interaction in a virtual community
except:
A) communication via bulletin boards
B) information using search engines
C) EC using advertisements
D) financial sponsorship via experts
Answer: D
Diff: 1
Page Ref: 390
AACSB Standard: Reflective Thinking
13) All of the following are types of virtual communities except:
A) associations
B) affinity portals
C) search engines
D) gender and ethnic communities
Answer: C
Diff: 2
Page Ref: 390
AACSB Standard: Reflective Thinking
124
Copyright © 2010 Pearson Education, Inc.
14) What is the top social network?
A) Bebo
B) Facebook
C) Friendster
D) MySpace
Answer: D
Diff: 2
Page Ref: 393
15) ________ is the mapping and measuring of relationships and flows between people, groups,
organizations, animals, computers, or other information or knowledge processing entities.
A) Social network analysis
B) Virtual analysis
C) Social network theory
D) Internet community theory
Answer: A
Diff: 3
Page Ref: 394
16) A(n) ________ is defined as a group of people that have some kind of commercial or
business relationship such as the relationships between sellers and buyers, buyers among
themselves, buyers and suppliers, and colleagues and other colleagues.
A) affinity portal
B) Web portal
C) business network
D) entrepreneurial network
Answer: C
Diff: 2
Page Ref: 399
17) Companies can interface with social networks in all of the following ways except:
A) Use search engine optimization (SEO) to increase search engine ranking.
B) Use existing public social networks, such as Facebook or MySpace, or virtual worlds, such as
Second Life to create pages and microcommunities.
C) Create an in-house private social network and then use it for communication and
collaboration among employees and retirees or with outsiders.
D) Conduct business activities in a business-oriented social network, such as LinkedIn, or
sponsor such a site.
Answer: A
Diff: 2
Page Ref: 402
AACSB Standard: Reflective Thinking
125
Copyright © 2010 Pearson Education, Inc.
18) All of the following are ways social networks generate revenues except:
A) offer a premium service for a monthly or per service fee
B) charge organizations a monthly service fee
C) host auctions for individuals or enterprises
D) have members pay a fee to be affiliated with the social network
Answer: C
Diff: 3
Page Ref: 402
AACSB Standard: Reflective Thinking
19) All of the following are true about YouTube except:
A) YouTube is building a community that is highly motivated to watch and share videos.
B) The company encourages users to contact YouTube.
C) Some experts think Yahoo paid too much for YouTube.
D) The growth of YouTube has been extremely rapid, depending largely on referrals from users
who alerted their friends and family to a favorite video.
Answer: C
Diff: 2
Page Ref: 405
20) ________ , also called viral marketing, is free advertising that can increase the visibility of
niche retailers and products.
A) Mixi
B) Word-of-mouth
C) Web 4.0
D) Semantic Web
Answer: B
Diff: 2
Page Ref: 406
21) The main purpose of LinkedIn is to allow registered users to:
A) create and maintain a list of contact details of people they know and trust in business.
B) develop a client base based on referrals.
C) post and find technology jobs.
D) aid successful business launches.
Answer: A
Diff: 2
Page Ref: 407
22) Craigslist and MySpace provide ________ to search based on friends and contacts or by
geographic proximity.
A) entrepreneurial networks
B) classifieds and job listings
C) virtual malls
D) advertising campaigns
Answer: B
Diff: 2
Page Ref: 407
AACSB Standard: Use of Information Technology
126
Copyright © 2010 Pearson Education, Inc.
23) Apple's iPhone uses a ________ , which is an accurate and patented interface.
A) multitouch touch screen
B) dedicated control
C) touch-sensitive display
D) touch-pad
Answer: A
Diff: 2
Page Ref: 415
24) Wikis, blogs and RSS would most likely replace e-mail for all of the following reasons
except:
A) E-mail is limited as a collaborative tool.
B) E-mail is primarily for point-to-point communication.
C) CC and BCC fields in an e-mail can be dangerous because often the wrong person gets a copy
of the message.
D) Wikis, blogs, and RSS are more secure than e-mail.
Answer: D
Diff: 3
Page Ref: 416
AACSB Standard: Reflective Thinking
25) ________ has/have the potential to enable faster connectivity, richer ways of interacting, and
more powerful search engines.
A) Enterprise applications
B) Application program interface (API) services
C) Web 3.0
D) RSS and Web services
Answer: C
Diff: 2
Page Ref: 417
AACSB Standard: Reflective Thinking
26) Distinct layers of the Web 3.0 topology include each of the following except:
A) v-commerce
B) API services
C) application services
D) serviced clients
Answer: A
Diff: 3
Page Ref: 417
27) Characteristics of the next generation Internet, Web 3.0, are expected to include all of the
following except:
A) more portable and personal
B) faster, and more far-flung connectivity
C) more clout for ordinary people and more user-friendly application-creation capabilities
D) decreased use of the semantic Web
Answer: D
Diff: 2
Page Ref: 417
AACSB Standard: Reflective Thinking
127
Copyright © 2010 Pearson Education, Inc.
28) An evolving extension of the Web in which Web content can be expressed not only in
natural language, but also in a form that can be understood, interpreted, and used by intelligent
computer software agents is known as:
A) Net neutrality.
B) mobile social networks.
C) semantic web.
D) voice commerce.
Answer: C
Diff: 2
Page Ref: 417
29) ________ would be the environment of choice for Web 3.0 users.
A) Wireless
B) iPhone
C) Social networks
D) Google
Answer: A
Diff: 1
Page Ref: 418
AACSB Standard: Reflective Thinking
30) Each of the following is a trend that may slow EC and Web 3.0 except:
A) security concerns
B) copyright complaints
C) Net neutrality
D) choppy connectivity
Answer: C
Diff: 2
Page Ref: 419
AACSB Standard: Reflective Thinking
9.3 Fill in the Blank
1) ________ is the popular term for advanced Internet technology and applications including
blogs, wikis, RSS, and social bookmarking.
Answer: Web 2.0
Diff: 1
Page Ref: 385
2) The online platforms and tools that people use to share opinions and experiences, including
photos, videos, music, insights, and perceptions with each other are known as ________.
Answer: social media
Diff: 2
Page Ref: 385
3) Companies that introduce innovations that significantly change markets or entire industries
due to their activities are referred to as ________.
Answer: disruptors
Diff: 2
Page Ref: 387
128
Copyright © 2010 Pearson Education, Inc.
4) The process of lending that is done between individuals and that circumvents the bank's
traditional role is known as ________.
Answer: person-to-person lending
Diff: 2
Page Ref: 387
5) A(n) ________ is a group of people with a common interest who interact on the Internet.
Answer: virtual (Internet) community
Diff: 2
Page Ref: 389
6) ________ are communities organized by interest, such as hobbies, vocations, political parties,
or unions
Answer: Affinity portals
Diff: 2
Page Ref: 390
7) ________ are communities that are country- or language-specific.
Answer: Ethnic communities
Diff: 2
Page Ref: 390
AACSB Standard: Multicultural and Diversity
8) A(n) ________ is a place, such as MySpace, where people create their own space or home
page on which they write blogs; post pictures, videos, or music; share ideas; and link to other
Web locations they find interesting.
Answer: social network
Diff: 1
Page Ref: 391
9) The top social networking Web site as of 2009 was ________ with over 250 million users.
Answer: MySpace
Diff: 1
Page Ref: 393
10) ________ is the mapping and measuring of relationships and flows between people, groups,
organizations, animals, computers, or other information processing entities.
Answer: Social network analysis
Diff: 2
Page Ref: 394
11) ________ is a consumer media company where people can watch and share original videos
worldwide via the Web.
Answer: YouTube
Diff: 2
Page Ref: 394
12) ________ is a community-based Web site with an emphasis on technology and science
articles.
Answer: Digg
Diff: 1
Page Ref: 395
129
Copyright © 2010 Pearson Education, Inc.
13) ________ is a Web service for sharing Internet bookmarks for sites.
Answer: Social bookmarking
Diff: 2
Page Ref: 395
14) A(n) ________ is a group of people who have some kind of commercial or business
relationship.
Answer: business network
Diff: 1
Page Ref: 399
15) The 3D capability of ________ and the ease of manipulating avatars has opened the door to a
variety of entertainment options, most notably adult entertainment.
Answer: virtual worlds
Diff: 2
Page Ref: 403
16) ________ refers to the technologies and business practices that free the workforce from the
constraints of legacy communication such as e-mail by providing managers with access to the
right information at the right time through a Web of interconnected applications, services, and
devices.
Answer: Enterprise 2.0
Diff: 2
Page Ref: 403
AACSB Standard: Communication
17) The term ________ is an online community that uses the power of social networks for the
introduction, buying, and selling of products and services, including people's own creations.
Answer: social marketplace
Diff: 2
Page Ref: 404
18) Before being bought by ________, YouTube had an advertising-based business model.
Answer: Google
Diff: 1
Page Ref: 405
19) Increased Web site traffic, a common effect of viral marketing, inevitably brings more
________ dollars with it.
Answer: advertising
Diff: 1
Page Ref: 405
AACSB Standard: Reflective Thinking
20) ________ is word-of-mouth marketing that often takes place in social networks.
Answer: Viral blogging
Diff: 2
Page Ref: 406
21) ________ is a rapidly developing area. It refers to advertisement on cell phones and other
mobile devices.
Answer: Mobile advertising
Diff: 2
Page Ref: 407
AACSB Standard: Use of Information Technology
130
Copyright © 2010 Pearson Education, Inc.
22) Companies are finding that ________ outlets, such as blogs and wikis, not only generate
faster and cheaper results than traditional focus groups, but also foster closer relationships with
customers.
Answer: conversational marketing
Diff: 3
Page Ref: 408
AACSB Standard: Use of Information Technology
23) Organizations do face some ________ in opening up their marketing and advertising to
social networks.
Answer: risks
Diff: 2
Page Ref: 412
24) The ________ is an extension of the Web in which content can be expressed not only in
natural language, but also in a form that can be understood, interpreted, and used by intelligent
computer software agents.
Answer: Semantic Web
Diff: 2
Page Ref: 417
25) ________ is the next generation of the Web, which will combine social and business
computing.
Answer: Web 3.0
Diff: 1
Page Ref: 417
9.4 Essay
1) Briefly describe Web 2.0. How does it differ from the traditional Web?
Answer: Web 2.0 refers to advanced Internet technology and applications including blogs,
wikis, RSS, and social bookmarking. Web 2.0 is about everyday people (you and me) using the
Web for communication, collaboration, and creation. No one had more power to influence
society than Web 2.0 communities.
One of the most significant differences between Web 2.0 and the traditional World Wide Web is
greater collaboration among Internet users and other users, content providers, and enterprises.
Diff: 2
Page Ref: 385
AACSB Standard: Reflective Thinking
131
Copyright © 2010 Pearson Education, Inc.
2) Explain industry and market disruptors and one of their potential impacts. Select one industry
and discuss a disruption that can occur as a result.
Answer: Several companies have introduced Web 2.0 innovations that could disrupt and reorder
markets, or even entire industries, introducing major changes in the way companies do business.
An example is Blue Nile, which displaced hundreds of jewelers and is changing the jewelry retail
industry. Some refer to such companies as disruptors. For example, Zopa, which facilitates
person-to-person money lending, may disrupt the lending business. Consumer-generated content
is disrupting traditional media.
Specifically, large numbers of blogs and videos are posted everyday and then viewed by millions
around the globe. Content is created continuously by millions of people. The result is that
individuals are becoming both publishers of Web-based content and consumers of that content.
In real estate, disruptors are reducing the need and number of agents and decreasing the
commissions paid to agents.
Diff: 3
Page Ref: 387
AACSB Standard: Reflective Thinking
3) Define business networks and what determines their success. Identify locations where
business networking can take place.
Answer: A business network is a group of people that have some kind of commercial or
business relationship such as the relationships between sellers and buyers, buyers among
themselves, buyers and suppliers, and colleagues and other colleagues. Business networking
functions best when individuals offer to help others to find connections rather than cold-calling
on prospects.
Business networking can take place outside of traditional business physical environments. For
example, public places such as airports or golf courses provide opportunities to make new
business contacts if an individual has good social skills.
Diff: 2
Page Ref: 399
AACSB Standard: Use of Information Technology
4) What are two expected impacts of the explosive growth in mobile social networks?
Answer: The explosion of wireless Web 2.0 services and companies will enable many social
communities to be based on the mobile phone and other portable wireless devices. This extends
the reach of social interaction to millions of people who do not have regular or easy access to
computers. At minimum, existing members who use PCs will supplement their activities with
wireless devices. Thus, wireless would be the environment of choice for the Web 3.0 users.
Diff: 2
Page Ref: 395
AACSB Standard: Reflective Thinking
132
Copyright © 2010 Pearson Education, Inc.
5) What are two trends that may slow EC and Web 3.0 and even cripple the Internet?
Answer:
Security concerns. Both shoppers and users of e-banking and other services worry about online
security. The Web needs to be made safer.
Lack of Net neutrality. If the big telecom companies are allowed to charge companies for a
guarantee of faster access, critics fear that small innovative Web companies could be crowded
out by the Microsofts and Googles that can afford to pay more.
Copyright complaints. The legal problems of YouTube, Wikipedia, and others might result in a
loss of vital outlets of public opinion, creativity, and discourse.
Choppy connectivity. Upstream bandwidths are still constricted, making uploading of video files
a time-consuming task. Usable mobile bandwidth still costs.
Diff: 2
Page Ref: 419
AACSB Standard: Ethical Reasoning
Electronic Commerce 2010 (Turban / Lee / King / Liang / Turban)
Chapter 10 E-Commerce Fraud and Security
10.1 True/False
1) Seattle's Northwest Hospital and Medical Center was attacked by malware that was able to
enter their network through a Windows flaw.
Answer: TRUE
Diff: 2
Page Ref: 428
2) The attacks and defense of computers can affect individuals, organizations, countries, or the
entire Web.
Answer: TRUE
Diff: 2
Page Ref: 429
3) According to the CSI 2008 Security Survey, the most expensive security incidents were those
involving viruses.
Answer: FALSE
Diff: 2
Page Ref: 429
4) Major information security methods used in 2008 included antivirus software, firewalls,
VPNs, encryption, and Web filtering.
Answer: TRUE
Diff: 2
Page Ref: 431
AACSB Standard: Use of Information Technology
5) Protection of the U.S. computer networks is in the hands of the Department of the Interior
(DOI).
Answer: FALSE
Diff: 2
Page Ref: 431
6) The Internet, or more specifically the Internet and network protocols, was never intended for
use by untrusted users or components.
133
Copyright © 2010 Pearson Education, Inc.
Answer: TRUE
Diff: 1
Page Ref: 431
AACSB Standard: Reflective Thinking
7) The Internet was designed for maximum efficiency and security by providing for error
checking to ensure that the message was sent and received correctly, user authentication, and
access control.
Answer: FALSE
Diff: 2
Page Ref: 432
AACSB Standard: Reflective Thinking
134
Copyright © 2010 Pearson Education, Inc.
8) An IP address uniquely identifies each computer connected to a network or the Internet.
Answer: TRUE
Diff: 2
Page Ref: 432
9) There is a clear shift in the nature of the operation of computer criminals from the desire for
fame to the desire for financial gain.
Answer: FALSE
Diff: 2
Page Ref: 432
AACSB Standard: Reflective Thinking
10) Social engineering is a type of technical attack to circumvent security measures by
manipulating people to get them to reveal crucial authentication information.
Answer: FALSE
Diff: 2
Page Ref: 434
AACSB Standard: Reflective Thinking
11) Risk creates vulnerability, which is the probability that this weakness will be known and
used.
Answer: FALSE
Diff: 2
Page Ref: 436
AACSB Standard: Reflective Thinking
12) Hackers are able to easily gain access to a network when IS staff do not ensure that all traffic
into and out of a network passes through a firewall.
Answer: TRUE
Diff: 3
Page Ref: 436
AACSB Standard: Reflective Thinking
13) An EC security strategy requires multiple layers of defense against risks from malware,
fraudsters, customers, and employees.
Answer: TRUE
Diff: 2
Page Ref: 437
AACSB Standard: Reflective Thinking
14) Administrators need to check the integrity of programs and patches that are installed; and
new programs and tools should be installed in a test environment before putting them into a
production environment.
Answer: TRUE
Diff: 2
Page Ref: 441
15) Shoppers can rely on online fraud protection provided by credit card issuers to protect them
from identity theft.
Answer: FALSE
Diff: 2
Page Ref: 444
135
Copyright © 2010 Pearson Education, Inc.
16) Spam is rampant because some people respond to it and make it profitable.
Answer: TRUE
Diff: 1
Page Ref: 447
17) Active tokens are storage devices (e.g., magnetic strip) that contain a secret code used in a
two-factor authentication system.
Answer: FALSE
Diff: 2
Page Ref: 452
AACSB Standard: Use of Information Technology
18) Biometric systems are authentication systems that identify a person by measurement of a
biological characteristic, such as fingerprints, iris patterns, facial features, or voice.
Answer: TRUE
Diff: 2
Page Ref: 452
AACSB Standard: Use of Information Technology
19) SSL makes it possible to encrypt credit card numbers and other transmissions between a
Web server and a browser, but it is not designed to check the validity of the credit card number.
Answer: TRUE
Diff: 3
Page Ref: 456
20) An intrusion detection system uses the public Internet to carry information but remains
private by using encryption, authentication, and access control to verify the identity of anyone
using the network.
Answer: FALSE
Diff: 3
Page Ref: 458
21) Because the consequences of weak network security can be severe, it is necessary that senior
management have a basic understanding of best practices in network risk management.
Answer: TRUE
Diff: 2
Page Ref: 467
22) Acceptable use policies (AUP) inform users of their responsibilities when a cyberattack or
network intrusion has occurred.
Answer: FALSE
Diff: 2
Page Ref: 468
AACSB Standard: Ethical Reasoning
23) The PCI data security standard was developed by the FTC to protect against credit card fraud
and identity theft.
Answer: FALSE
Diff: 3
Page Ref: 469
136
Copyright © 2010 Pearson Education, Inc.
24) A CompTIA study revealed that more than half of all information security breaches that were
related to human error had happened often because staff did not follow security procedures.
Answer: TRUE
Diff: 2
Page Ref: 470
25) Due care in EC are those actions that a company is reasonably expected to take based on the
risks affecting its business and transactions.
Answer: TRUE
Diff: 2
Page Ref: 471
10.2 Multiple Choice
1) According to the CSI 2008 Security Survey, the most expensive computer security incidents
were those involving ________.
A) financial fraud
B) viruses and worms
C) unintentional human errors
D) targeted attacks
Answer: A
Diff: 2
Page Ref: 429
AACSB Standard: Reflective Thinking
2) Which of the following is not an underlying reason why a comprehensive EC security strategy
is needed?
A) The Internet was designed for maximum efficiency without regard for its security or users
with malicious intent.
B) The shift is toward profit-motivated crimes.
C) Managers treat EC security as a process.
D) Many companies fail to implement basic IT security management best practices, business
continuity plans, and disaster recovery plans.
Answer: C
Diff: 3
Page Ref: 431
AACSB Standard: Reflective Thinking
3) The ________ translates or converts domain names to their IP addresses.
A) IPS
B) DOS
C) VPN
D) DNS
Answer: D
Diff: 2
Page Ref: 432
137
Copyright © 2010 Pearson Education, Inc.
4) ________ refers to the e-markets for stolen information.
A) Internet underground economy
B) Denial of service
C) Cybercriminal
D) Virtual private network
Answer: A
Diff: 2
Page Ref: 432
AACSB Standard: Ethical Reasoning
5) ________ systems are highly useful for both law enforcement and for law breaking, for
example, by providing a means to obtain passwords or encryption keys and thus bypassing other
security measures.
A) Biometric
B) Keystroke logging
C) Access control
D) Intrusion detection
Answer: B
Diff: 2
Page Ref: 433
AACSB Standard: Use of Information Technology
6) ________ is a crimeware technique used to steal the identity of target companies to get the
identities of their customers.
A) Spamming
B) Pretexting
C) Social engineering
D) Phishing
Answer: D
Diff: 2
Page Ref: 434
7) What is a vulnerability?
A) software bug
B) risk of an attack or intrusion
C) spyware
D) weakness in software or network
Answer: D
Diff: 2
Page Ref: 435
8) The process of determining what the authenticated entity is allowed to access and what
operations it is allowed to perform is known as:
A) integrity.
B) availability.
C) authentication.
D) nonrepudiation.
Answer: C
Diff: 2
Page Ref: 437
AACSB Standard: Use of Information Technology
138
Copyright © 2010 Pearson Education, Inc.
9) The assurance that an online customer or trading partner cannot falsely deny their purchase or
transaction is referred to as:
A) integrity.
B) availability.
C) authentication.
D) nonrepudiation.
Answer: D
Diff: 2
Page Ref: 437
10) The protection of information systems against unauthorized access to or modification of
information that is stored, processed, or being sent over a network is referred to as:
A) information assurance.
B) data integrity.
C) information integrity.
D) human firewall.
Answer: A
Diff: 2
Page Ref: 438
11) A botnet is:
A) a collection of a few hundred hijacked Internet computers that have been set up to forward
traffic, including spam and viruses, to other computers on the Internet.
B) a piece of software code that inserts itself into a host or operating system to launch DOS
attacks.
C) a piece of code in a worm that spreads rapidly and exploits some known vulnerability.
D) a coordinated network of computers that can scan and compromise other computers and
launch DOS attacks.
Answer: D
Diff: 2
Page Ref: 442
12) The incidence of online fraud and identify theft would increase for each of the following
reasons except:
A) There is growth in EC sales and the number of shoppers with higher incomes.
B) Information is a valuable form of currency.
C) Hackers are increasingly motived by fame and notoriety.
D) Scammers are outsourcing work to programmers to gain control of computers or wireless
networks.
Answer: C
Diff: 3
Page Ref: 443
AACSB Standard: Reflective Thinking
139
Copyright © 2010 Pearson Education, Inc.
13) Assurance that stored data has not been modified without authorization and a message that
was sent is the same message that was received is referred to as:
A) integrity.
B) availability.
C) authentication.
D) nonrepudiation.
Answer: A
Diff: 2
Page Ref: 449
14) The success and security of EC depends on the ________ of information and the business
Web site.
A) encryption, functionality, and privacy
B) quality, reliability, and speed
C) authentication, authorization, and nonrepudiation
D) confidentiality, integrity, and availability
Answer: D
Diff: 3
Page Ref: 449
15) The most cost-effective approach to EC security is to develop and implement a strategy that:
A) depends on the trust and confidence of customers.
B) proactively meets regulatory, financial, marketing and operational requirements.
C) protects against unauthorized transactions and overrides of accounting controls.
D) requires digital signatures or digital certificates for all transactions.
Answer: B
Diff: 3
Page Ref: 450
AACSB Standard: Reflective Thinking
16) All of the following are characteristics of access control except:
A) Access control determines which persons, programs, or machines can legitimately use a
network resource and which resources he, she, or it can use.
B) Access control lists (ACLs) define users' rights, such as what they are allowed to read, view,
write, print, copy, delete, execute, modify, or move.
C) All resources need to be considered together to identify the rights of users or categories of
users.
D) After a user has been identified, the user must be authenticated.
Answer: C
Diff: 2
Page Ref: 451
140
Copyright © 2010 Pearson Education, Inc.
17) Fingerprint scanners, facial recognition systems, and voice recognition all are examples of
________ that recognize a person by some physical trait.
A) biometric systems
B) human firewalls
C) intrusion detection systems
D) access control lists
Answer: A
Diff: 2
Page Ref: 452
18) Authentication can be based on the public key infrastructure (PKI) which is based on:
A) message digest.
B) plaintext.
C) encryption.
D) key space.
Answer: C
Diff: 2
Page Ref: 453
19) Public key infrastructure (PKI) is an authentication method that:
A) has become the cornerstone for secure e-payments and intranet applications.
B) is based on the Data Encryption Standard, which is the standard symmetric encryption
algorithm supported by U.S. government agencies.
C) encrypts and decrypts large amounts of data effectively.
D) uses encryption keys ranging from 64 bits to 128 bits.
Answer: A
Diff: 2
Page Ref: 454
20) Security functions or characteristics of digital signatures include all of the following except:
A) A digital signature is the electronic equivalent of a personal signature, which can be forged.
B) Digital signatures are based on public keys for authenticating the identity of the sender of a
message or document.
C) Digital signatures ensure that the original content of an electronic message or document is
unchanged.
D) Digital signatures are portable.
Answer: A
Diff: 3
Page Ref: 455
AACSB Standard: Use of Information Technology
21) Digital signatures or digital certificates:
A) are used to validate the sender and time stamp of the transaction so it cannot be later claimed
that the transaction was unauthorized or invalid.
B) have been compromised by phishers and spammers.
C) provide complete confidence that the transactions are secure.
D) Both A and B
Answer: D
Diff: 2
Page Ref: 455
141
Copyright © 2010 Pearson Education, Inc.
22) The ________ was invented by Netscape to use standard certificates for authentication and
data encryption to ensure privacy or confidentiality.
A) certificate authority
B) public key infrastructure
C) secure socket layer
D) digital envelope
Answer: C
Diff: 2
Page Ref: 456
23) Which of the following is not a disadvantage of firewalls that act as packet filters?
A) Packet-filtering routers often are the first layer of network defense.
B) An administrator might miss some important rules, which would leave a hole in the firewall.
C) Because the content of a packet is irrelevant to a packet filter, once a packet is let through the
firewall, the inside network is open to data-driven attacks.
D) An administrator might incorrectly specify a rule creating a vulnerability.
Answer: A
Diff: 3
Page Ref: 457
24) Which is not an advantage of virtual private networks (VPN) for data communications?
A) They are less expensive than private leased lines because they use the public Internet to carry
information.
B) They ensure the confidentiality and integrity of the data transmitted over the Internet without
requiring encryption.
C) They can reduce communication costs dramatically because VPN equipment is cheaper than
other remote solutions.
D) Remote users can use broadband connections rather than make long distance calls to access
an organization's private network.
Answer: B
Diff: 3
Page Ref: 458
25) A host-based intrusion detection system (IDS):
A) uses rules to analyze suspicious activity at the perimeter of a network or at key locations in
the network.
B) resides on the server that is being monitored where it can detect whether critical or securityrelated files have been tampered with or whether a user has attempted to access files that he or
she is not authorized to use.
C) can perform certain actions when an attack occurs, such as terminating network connections
based on security policies.
D) consists of information system resources–firewalls, routers, Web servers, database servers,
and files that look like production systems, but do no real work.
Answer: B
Diff: 2
Page Ref: 458
142
Copyright © 2010 Pearson Education, Inc.
26) Why should EC companies comply with ethical privacy practices?
A) Customers need to trust that the online marketplace and its businesses will not violate the
right to privacy.
B) Unethical privacy practices can have both immediate and long-term negative business
consequences.
C) Violators expose themselves to harsh penalties from various government agencies and
victimized customers, as well as bloggers and consumer interest groups.
D) All of the above
Answer: D
Diff: 2
Page Ref: 467
AACSB Standard: Ethical Reasoning
27) An EC security strategy and program begins with:
A) the commitment and involvement of executive management.
B) layers of hardware and software defenses.
C) information security policies and training.
D) secure design of EC applications.
Answer: A
Diff: 2
Page Ref: 467
AACSB Standard: Reflective Thinking
28) The key reasons why EC criminals cannot be stopped include each of the following except:
A) Sophisticated hackers use browsers to crack into Web sites.
B) Strong EC security makes online shopping inconvenient and demanding on customers.
C) There is a lack of cooperation from credit card issuers and foreign ISPs.
D) Online shoppers do not take necessary precautions to avoid becoming a victim.
Answer: A
Diff: 2
Page Ref: 468
AACSB Standard: Reflective Thinking
29) Which of the following statements about hardware and software security defenses is false?
A) Hardware and software security defenses protect against irresponsible business practices or
corrupt management.
B) There is no single hardware or software solution appropriate for all companies.
C) If firewalls and antivirus software are not upgraded and monitored constantly, they will not
remain useful.
D) After the EC security program and policies are defined and risk assessment completed, then
the software and hardware needed to support and enforce them can be put in place.
Answer: A
Diff: 3
Page Ref: 469
143
Copyright © 2010 Pearson Education, Inc.
30) Firewalls that filter requests from the Internet to a private network based on the IP address of
the computer sending or receiving those requests are called:
A) application-level proxies.
B) bastion gateways.
C) packet-filtering routers.
D) IP blockers.
Answer: C
Diff: 2
Page Ref: 473
10.3 Fill in the Blank
1) Any business activity that uses deceitful practices or devices to deprive another of property or
other rights is known as ________.
Answer: fraud
Diff: 1
Page Ref: 434
2) ________ is a nontechnical attack that uses a ruse to trick users into revealing information or
performing an action that compromises a computer or network.
Answer: Social engineering
Diff: 2
Page Ref: 434
3) ________ refers to techniques to steal the identity of a target company to get the identities of
its customers.
Answer: Phishing
Diff: 2
Page Ref: 434
4) Malicious code, also known as malware, is classified by how it ________.
Answer: spreads
Diff: 2
Page Ref: 434
5) ________ are weaknesses in software or other mechanisms that a hacker can use directly to
gain access to a system or network.
Answer: Vulnerabilities
Diff: 2
Page Ref: 435
6) ________ is a process to verify the real identity of an entity, which could be an individual,
computer, computer program, or EC Web site.
Answer: Authentication
Diff: 2
Page Ref: 437
7) ________ is the process of determining what the authenticated entity is allowed to access and
what operations it is allowed to perform.
Answer: Authorization
Diff: 2
Page Ref: 437
144
Copyright © 2010 Pearson Education, Inc.
8) ________ is assurance that online customers or trading partners cannot falsely deny their
purchase or transaction.
Answer: Nonrepudiation
Diff: 2
Page Ref: 437
9) ________ is the protection of information systems against unauthorized access to or
modification of information whether in storage, processing, or in transit.
Answer: Information assurance
Diff: 2
Page Ref: 438
10) ________ attacks are those in which a perpetrator uses some form of deception to trick
people into revealing information or performing actions that harm the security of a network.
Answer: Nontechnical
Diff: 1
Page Ref: 438
11) A(n) ________ is a program that appears to have a useful function but contains a hidden
function that presents a security risk.
Answer: Trojan horse
Diff: 2
Page Ref: 439
12) A(n) ________ attack is an attack in which a server gets so many requests for service or
access that it crashes and cannot respond.
Answer: denial of service (DoS)
Diff: 2
Page Ref: 441
13) A(n) ________ is a huge number (e.g., hundreds of thousands) of hijacked Internet
computers that have been set up to forward traffic, including spam and viruses, to other
computers on the Internet.
Answer: botnet
Diff: 2
Page Ref: 442
14) ________ is the assurance that data is accurate or that a message has not been altered.
Answer: Integrity
Diff: 2
Page Ref: 449
15) ________ is the assurance of data privacy.
Answer: Confidentiality
Diff: 2
Page Ref: 449
16) ________ consist of all the policies, procedures, documents, standards, hardware, software,
training, and personnel that work together to protect information, the ability to conduct business,
and other assets.
Answer: EC security programs
Diff: 2
Page Ref: 451
145
Copyright © 2010 Pearson Education, Inc.
17) ________ is the process of transforming or scrambling data in such a way that it is difficult,
expensive, or time-consuming for an unauthorized person to unscramble it.
Answer: Encryption
Diff: 2
Page Ref: 453
18) A mathematical computation that is applied to a message, using a private key, to encrypt the
message is called a(n) ________.
Answer: hash
Diff: 2
Page Ref: 455
19) ________ are barriers between a trusted network or PC and the untrustworthy Internet.
Answer: Firewalls
Diff: 1
Page Ref: 457
20) A virtual private network (VPN) uses the public Internet to carry information but remains
private by using ________.
Answer: encryption
Diff: 2
Page Ref: 458
21) ________ are information system resources, such as firewalls, routers, Web servers, database
servers and files, that only look like production systems to attack hackers and study their
attempts to attack a network.
Answer: Honeypots
Diff: 2
Page Ref: 459
22) ________ is an exercise that determines the impact of losing the support of an EC resource
to an organization, estimates how that loss may escalate over time, identifies the minimum
resources needed to recover from the loss, and prioritizes the steps in the recovery of the
processes and supporting systems.
Answer: Business impact analysis
Diff: 3
Page Ref: 468
AACSB Standard: Reflective Thinking
23) Policies that inform users of their responsibilities when using company networks, wireless
devices, customer data, and so forth are known as ________.
Answer: acceptable use policies (AUP)
Diff: 3
Page Ref: 468
24) The purpose of the ________ is to improve customers' trust in e-commerce, especially when
it comes to online payments, and to increase the Web security of online merchants.
Answer: PCI DSS
Diff: 3
Page Ref: 469
146
Copyright © 2010 Pearson Education, Inc.
25) ________ in EC are those actions that a company is reasonably expected to take based on the
risks affecting its EC business and online transactions.
Answer: Due care
Diff: 2
Page Ref: 471
10.4 Essay
1) Compare current motives of hackers to those of the past.
Answer: In the early days of EC, many hackers simply wanted to gain fame or notoriety
by defacing Web sites or gaining root, which means gaining unrestricted access to a network.
Criminals and criminal gangs are now profit-oriented, and their tactics are not limited to the
online world.
Diff: 1
Page Ref: 432
2) List and briefly describe the three assurances of the CIA security triad.
Answer: The CIA triad refers to the confidentiality, integrity, and availability (or accessibility)
of information and business Web sites.
- Confidentiality is the assurance of data privacy. The data or transmitted message is encrypted
so that it is readable only by the person for whom it is intended. The confidentiality function
prevents unauthorized disclosure of information.
- Integrity is the assurance that data is accurate or that a message has not been altered. It means
that stored data has not been modified without authorization; a message that was sent is the same
message that was received.
- Availability is the assurance that access to data, the Web site, or other EC data service is
timely, available, reliable, and restricted to authorized users.
Diff: 2
Page Ref: 449
AACSB Standard: Ethical Reasoning
3) Briefly describe nonrepudiation and its importance for EC and electronic transactions.
Answer: Nonrepudiation is assurance that an online customer or trading partner cannot falsely
deny their purchase, transaction, etc. For EC and other electronic transactions, including cash
machines or ATMs, all parties in a transaction must be confident that the transaction is secure;
the parties are who they say they are (authentication), and that the transaction is verified being
completed or final. Authentication and nonrepudiation are potential defenses against phishing
and identity theft.
Diff: 2
Page Ref: 449
147
Copyright © 2010 Pearson Education, Inc.
4) Why does the success of an EC security strategy and program depend on the commitment and
involvement of executive management?
Answer: The authority of senior managers is needed to establish and maintain EC security
programs. A genuine and well-communicated executive commitment about EC security and
privacy measures is needed to convince users that insecure practices, risky or unethical methods,
and mistakes due to ignorance will not be tolerated. Most forms of security (e.g., airport and
sports arena security) are unpopular because they are inconvenient, restrictive, time consuming,
and expensive. Security practices tend not to be a priority unless they are mandatory and there
are negative consequences for noncompliance.
Diff: 2
Page Ref: 467
AACSB Standard: Reflective Thinking
5) What technologies can help establish trust in EC communications and transactions?
Answer: Trust starts with the authentication of the parties involved in a transaction; that is,
identifying the parties in a transaction along with the actions they can perform. Authentication
can be established with something one knows (e.g., a password), something one has (e.g., a
token), or something one possesses (e.g., a fingerprint). Biometric systems can confirm a
person's identity. Public key infrastructure (PKI) can authenticate the parties in a transaction.
Digital signatures are themselves authenticated through a system of digital certificates issued by
certificate authorities (CAs). For the average consumer and merchant, PKI is simplified because
it is built into Web browsers and services. Such tools are secure because security is based on SSL
communications.
Diff: 3
Page Ref: 473
AACSB Standard: Use of Information Technology
Electronic Commerce 2010 (Turban / Lee / King / Liang / Turban)
Chapter 14 Economics and Justification of Electronic Commerce
14.1 True/False
1) From 1995 through 2000, many EC projects and start-up companies were funded with little
analysis of their business viability or finances.
Answer: TRUE
Diff: 1
Page Ref: 587
AACSB Standard: Reflective Thinking
2) The result of the rush to invest in EC projects and start-up companies was the 2001-2003 "dotcom bust," when hundreds of EC startups went out of business and the stock market crashed.
Answer: TRUE
Diff: 1
Page Ref: 587
3) After the dot-com bust, most IT executives acquired the knowledge and tools to do ROI
calculations on proposed EC investments.
Answer: FALSE
Diff: 2
Page Ref: 587
148
Copyright © 2010 Pearson Education, Inc.
4) One reason why EC justification is needed is that companies now realize that EC is not
necessarily the solution to all problems.
Answer: TRUE
Diff: 2
Page Ref: 588
AACSB Standard: Reflective Thinking
5) According to a CIO Insight report, EC justification decreases the credibility of EC projects.
Answer: FALSE
Diff: 1
Page Ref: 588
6) One basic way to categorize different EC investments is to distinguish between investment in
infrastructure and investment in specific EC applications.
Answer: TRUE
Diff: 1
Page Ref: 588
AACSB Standard: Use of Information Technology
7) Infrastructure investments are made for the short-term because of frequent technological
changes.
Answer: FALSE
Diff: 1
Page Ref: 588
AACSB Standard: Use of Information Technology
8) Cost-benefit analysis is frequently assessed by return on investment (ROI), which is also the
name of a specific method for evaluating investments.
Answer: TRUE
Diff: 2
Page Ref: 588
9) All EC investments need to be formally justified to insure that they align with the company's
competitive strategy.
Answer: FALSE
Diff: 2
Page Ref: 589
10) Metrics are used to describe costs, benefits, or the ratio between them and need to be defined
properly with a clear way to measure them.
Answer: TRUE
Diff: 3
Page Ref: 589
AACSB Standard: Analytic Skills
11) Key performance indicators (KPI) are used to qualitatively track critical metrics or success
factors.
Answer: FALSE
Diff: 2
Page Ref: 590
AACSB Standard: Analytic Skills
12) A major difficulty in justifying EC projects is that many costs and benefits are intangible and
therefore very difficult to measure.
Answer: TRUE
149
Copyright © 2010 Pearson Education, Inc.
Diff: 2
Page Ref: 591
AACSB Standard: Analytic Skills
13) Creating a competitive advantage, providing a benefit to society, and improving the
company's image are examples of tangible benefits that might be realized from an EC project.
Answer: FALSE
Diff: 2
Page Ref: 591
AACSB Standard: Use of Information Technology
14) Cannibalization occurs when a new EC initiative produces substantial online sales, but
traditional sales fall such that no increase in total revenue occurs.
Answer: TRUE
Diff: 2
Page Ref: 592
AACSB Standard: Use of Information Technology
15) The results of any investment justification in eCRM depend on the time frame used to
measure changes in productivity.
Answer: TRUE
Diff: 2
Page Ref: 592
AACSB Standard: Use of Information Technology
16) Because many EC investments in eCRM take five to six years to show significant positive
results, real productivity gains often do not get measured correctly.
Answer: TRUE
Diff: 2
Page Ref: 592
AACSB Standard: Use of Information Technology
17) In preparing the business case for EC investment, managers should examine the potential
additional revenues, such as increased revenues via products or services from a larger global
market because of more effective product marketing on the Web.
Answer: TRUE
Diff: 2
Page Ref: 592
AACSB Standard: Analytic Skills
18) The ROI method uses a formula that divides net revenues by the initial cost. The result is a
ratio that measures the ROI for each year or for an entire period.
Answer: FALSE
Diff: 2
Page Ref: 596
AACSB Standard: Analytic Skills
19) In an NPV analysis, analysts convert future values of benefits to their present-value
equivalents by discounting future cash flows at the risk-free rate set by the Federal Reserve
Bank.
Answer: FALSE
Diff: 2
Page Ref: 596
AACSB Standard: Analytic Skills
150
Copyright © 2010 Pearson Education, Inc.
20) Given the diversity of activities involved in e-procurement, the metrics used to measure the
value of e-procurement must reflect how well each process is accomplished and take into
consideration whether the company is a buyer or seller.
Answer: TRUE
Diff: 2
Page Ref: 600
AACSB Standard: Use of Information Technology
21) According to recent surveys of eCRM applications, there have been mixed payoffs, but a
majority of companies have demonstrated a significantly positive ROI for their eCRM
investments.
Answer: FALSE
Diff: 2
Page Ref: 601
AACSB Standard: Analytic Skills
22) Large companies often have several integrated intranet and other information systems that
determine the success of a Web portal. Thus, the justification for a Web portal must focus on
both business ROI and technology ROI.
Answer: TRUE
Diff: 2
Page Ref: 602
AACSB Standard: Analytic Skills
23) The average cost curve of regular products is U-shaped and has an optimal lowest point, but
with digital products the average cost per unit declines and quantity increases.
Answer: TRUE
Diff: 2
Page Ref: 607
AACSB Standard: Analytic Skills
24) Critical elements that can affect the value of EC across cultures are perceived trust, consumer
loyalty, regulation, political influences, and even the content of online ads.
Answer: TRUE
Diff: 2
Page Ref: 616
AACSB Standard: Use of Information Technology
25) Developing economies often face power blackouts, unreliable telecommunications
infrastructure, undependable delivery mechanisms, and a relatively few customers who own
computers and credit cards. These limitations can be overcome when predicting EC investment
payoffs by using a combination of break-even analysis and NPV.
Answer: FALSE
Diff: 2
Page Ref: 616
AACSB Standard: Use of Information Technology
14.2 Multiple Choice
1) CIOs need to effectively communicate the value of proposed EC projects in order to gain
approval for all of the following reasons except:
A) Companies now realize that EC is not necessarily the solution to all problems.
151
Copyright © 2010 Pearson Education, Inc.
B) Some large companies, and many public organizations, mandate a formal evaluation of
requests for funding.
C) The success of EC projects may be assessed in order to pay bonuses to those involved with
the project.
D) Demand for expanding or initiating e-business projects is no longer strong so there are fewer
requests for funding.
Answer: D
Diff: 2
Page Ref: 588
AACSB Standard: Analytic Skills
2) One basic way to categorize different EC investments is to distinguish between investments in
infrastructure and investments in specific EC applications because benefits from infrastructure
investments:
A) are made for the long-term.
B) depend on the EC applications.
C) are very complex.
D) have a low return.
Answer: A
Diff: 1
Page Ref: 588
AACSB Standard: Analytic Skills
3) The basic reasons that companies invest in IT and EC are all of the following except:
A) to improve business processes
B) to increase customer satisfaction and retention
C) to reduce time-to-market
D) to justify new marketing campaigns
Answer: D
Diff: 2
Page Ref: 588
AACSB Standard: Analytic Skills
4) Not all EC investments need to be formally justified. All of the following are cases where
formal evaluation may not be needed except:
A) when the value of the investment is relatively small for the organization
B) when competitors have made that type of investment
C) when the relevant data are not available, are inaccurate, or are too volatile
D) when the EC project is mandated and must be done regardless of the costs and benefits
Answer: B
Diff: 2
Page Ref: 589
AACSB Standard: Analytic Skills
5) Metrics are used to describe all of the following except:
A) standards
B) costs
C) benefits
D) the ratio of costs to benefits
Answer: A
Diff: 2
Page Ref: 589
152
Copyright © 2010 Pearson Education, Inc.
AACSB Standard: Analytic Skills
6) In B2C, an example of a tangible EC metric from the buyer's perspective is:
A) ease of use of EC.
B) convenience in purchasing
C) profit per customer.
D) cost/price of the product.
Answer: D
Diff: 3
Page Ref: 590
AACSB Standard: Reflective Thinking
7) For governments, an example of an intangible EC metric is:
A) reelection of candidates.
B) lower tax rates.
C) increase in participation in government programs.
D) risk reduction.
Answer: A
Diff: 2
Page Ref: 590
8) Productivity benefits from using EC are difficult to measure because:
A) the payoffs are too short.
B) there is no time lag in EC gains.
C) EC gains in certain areas of the company may be offset by losses in other areas.
D) qualitative benefits do not count.
Answer: C
Diff: 3
Page Ref: 592
AACSB Standard: Analytic Skills
9) EC costs and benefits can be classified into two broad categories:
A) direct and routine.
B) short-term and capital.
C) tangible and intangible.
D) operational and strategic.
Answer: C
Diff: 1
Page Ref: 593
AACSB Standard: Analytic Skills
10) The relationship between EC investment and organizational performance is:
A) direct.
B) indirect.
C) shared with other investments.
D) not measurable.
Answer: B
Diff: 3
Page Ref: 594
AACSB Standard: Analytic Skills
153
Copyright © 2010 Pearson Education, Inc.
11) The New York Metropolitan Transit Authority (MTA) did not need to open another airport
for almost two decades, even though air traffic had tripled because of productivity gains derived
from improved IT systems. IT systems added by the MTA played critical roles in ticket
reservations, passenger and luggage check-in, crew assignment and scheduling, runway
maintenance and management, and gate assignments. This case illustrates that:
A) intangible benefits can be complex, yet substantial.
B) tangible benefits can be complex, yet substantial.
C) tangible costs can be high, yet payoffs can be achieved quickly.
D) intangible costs can be high, yet payoffs can be achieved quickly.
Answer: A
Diff: 2
Page Ref: 594
AACSB Standard: Analytic Skills
12) The major steps in the process of justifying large-scale EC and IT projects include all of the
following except:
A) Lay an appropriate foundation for analysis with your vendor, and then conduct your ROI.
B) Document and verify all figures used in the calculation. Clarify all assumptions.
C) Do not leave out strategic benefits, including long-term ones.
D) Be careful not to overestimate cost and underestimate benefits (a tendency of many
managers).
Answer: D
Diff: 3
Page Ref: 594
AACSB Standard: Analytic Skills
13) Traditional methods for evaluating EC investments include all of the following except:
A) ROI
B) break-even or payback period
C) discount rate
D) NPV
Answer: C
Diff: 1
Page Ref: 596
AACSB Standard: Analytic Skills
14) Pouilly's Poodle Shop wants to produce monthly cash flows from its Internet Doggie-Cam
investment. The most appropriate method for assessing this investment is:
A) break-even analysis.
B) total cost of ownership.
C) payoff.
D) internal rate of return (IRR).
Answer: D
Diff: 2
Page Ref: 596
AACSB Standard: Analytic Skills
15) Dan Welch, who owns three World Cup Coffee shops in Portland, Oregon, estimates that his
free Wi-Fi network has added 10 percent to his overall revenue. Welch credits Wi-Fi consumers
with spending three times as much on food compared with the average consumer. This is an
example of ________.
154
Copyright © 2010 Pearson Education, Inc.
A) business ROI
B) business NPV
C) technology ROI
D) technology IRR
Answer: A
Diff: 2
Page Ref: 598
AACSB Standard: Analytic Skills
16) By calculating the difference between TCO and TBO, one can compute the ________ of an
IT investment.
A) break-even analysis
B) total cost of ownership
C) payoff
D) internal rate of return (IRR)
Answer: C
Diff: 1
Page Ref: 597
AACSB Standard: Analytic Skills
17) The disadvantage of the NPV method for evaluating EC and IT is:
A) the true benefits are difficult to measure.
B) it is difficult to compare projects of unequal life spans pans or sizes.
C) it assumes reinvestment at the same rate.
D) it may be difficult to classify outlays as expenses or investments.
Answer: B
Diff: 3
Page Ref: 597
AACSB Standard: Analytic Skills
18) All of the following direct metrics indicate progress in e-procurement except:
A) increased order fulfillment rate
B) decreased number of rejects received from suppliers
C) reduced inventory costs
D) increased on-time deliveries
Answer: C
Diff: 3
Page Ref: 600
AACSB Standard: Analytic Skills
19) Justifying information security projects:
A) is not needed because it is well-known that preventing network security problems is less labor
intensive than cleaning up virus infections.
B) is not done because ROI calculators are not available.
C) should focus on defending against external threats such as hackers and malware.
D) should be done because employee security training is usually poorly done.
Answer: D
Diff: 3
Page Ref: 603
AACSB Standard: Analytic Skills
20) Antivirus investments are easily justified because more than ________ percent of viruses
155
Copyright © 2010 Pearson Education, Inc.
enter business networks via e-mail.
A) 25
B) 33
C) 50
D) 85
Answer: D
Diff: 2
Page Ref: 606
21) The average-cost curves (AVC) of physical products and digital products:
A) are different because the AVC of digital products declines as quantity increases forming an Lshape, while the AVC of physical products is U-shaped.
B) are both U-shaped.
C) are both L-shaped.
D) are different because the AVC of physical products declines as quantity increases forming an
L-shape, while the AVC of digital products is U-shaped.
Answer: A
Diff: 3
Page Ref: 607
AACSB Standard: Analytic Skills
22) When computing agency cost, companies should:
A) consider both production-related costs and transaction costs.
B) consider only production-related costs and ignore transaction costs.
C) consider only transaction costs and ignore production-related costs.
D) ignore production-related costs and transaction costs.
Answer: B
Diff: 3
Page Ref: 607
AACSB Standard: Analytic Skills
23) Transaction costs include all of the following except:
A) production costs incurred for labor and overhead
B) search costs incurred by buyers and sellers in locating each other and specific products and
services
C) negotiation costs that result from meetings, communication-related expenses, exchanges of
technical data or brochures, entertainment, and legal costs
D) monitoring costs incurred when buyers and sellers make sure that the exchange proceeds
according to the terms under which the sale was made
Answer: A
Diff: 2
Page Ref: 608
AACSB Standard: Analytic Skills
24) EC can increase revenues by all of the following except:
A) increasing both reach and richness
B) allowing customers to order anytime from any place via the use of m-commerce and lcommerce
C) becoming an online portal
D) creating value-added content from selling searches, access to data, and electronic documents
Answer: A
156
Copyright © 2010 Pearson Education, Inc.
Diff: 2
Page Ref: 609
25) McAfee allows users of its VirusScan virus-detection software to automatically update the
latest security patches online. This is an example of ________ to attract customers who value
this automatic update.
A) competitive advantage
B) core competency
C) product or service differentiation
D) agility
Answer: C
Diff: 2
Page Ref: 610
AACSB Standard: Reflective Thinking
26) A Web-based seller of CDs carefully monitors the prices charged by its competitors for
identical products. This company has the ability to change a given price within three minutes in
response to changes by competitors. This is an example of EC:
A) competitive advantage.
B) core competency.
C) product or service differentiation.
D) agility.
Answer: D
Diff: 2
Page Ref: 610
AACSB Standard: Reflective Thinking
27) All of the following are critical success factors (CSFs) of the Old Economy except:
A) deliver high-value products
B) compete to sell product
C) build market share to get economies of scale
D) create new partnerships, stay with core competency
Answer: D
Diff: 2
Page Ref: 614
28) One of the strengths of EC is the ease with which its adopters can reach a global population
of consumers. However, EC-driven businesses must consider the critical elements affecting the
value of EC across cultures. Those elements include all of the following except:
A) delivery delays
B) perceived trust
C) consumer loyalty
D) political influences
Answer: A
Diff: 2
Page Ref: 616
29) All of the following apply to EC in developing economies except:
A) Developing economies often face power blackouts and unreliable infrastructure and delivery
mechanisms creating limitations that make it difficult for firms to predict whether EC
investments will pay off, and when.
157
Copyright © 2010 Pearson Education, Inc.
B) Developing economies, such as China and India, represent a significant opportunity for EC to
connect businesses to customers, as well as other businesses.
C) Developing economies struggle with various issues that create too many business and
technology risks to justify investment in those economies at this time.
D) The potential volume of transactions in developed countries can make EC investments more
attractive for established firms than new firms because established firms have already recovered
the costs of their IT infrastructures.
Answer: C
Diff: 2
Page Ref: 616
AACSB Standard: Analytic Skills
30) As a company moves to incorporate an online presence with its traditional brick-and-mortar
operation, it adds the costs related to training for all personnel in the capabilities of the EC
system and a new advertising campaign to announce its new site to the costs directly associated
with building the new Web presence. In this case, training and advertising are examples of
________.
A) transaction costs
B) complementary investments
C) direct costs
D) indirect costs
Answer: B
Diff: 2
Page Ref: 618
AACSB Standard: Analytic Skills
14.3 Fill in the Blank
1) Justifying an EC investment means comparing the costs of each project against its benefits in
what is known as a ________.
Answer: cost-benefit analysis
Diff: 2
Page Ref: 588
2) A ________ is a specific, measurable standard against which actual performance is compared.
Answer: metric
Diff: 1
Page Ref: 589
3) The ________ method for EC justification evaluation is used to measure the performance of
the organization by looking at a broad set of factors, not just financial ones.
Answer: balanced scorecard
Diff: 2
Page Ref: 589
4) The ________ is a very common IT investment method, which maximizes value for
unconstrained project selection.
Answer: net present value (NPV)
Diff: 1
Page Ref: 589
AACSB Standard: Analytic Skills
158
Copyright © 2010 Pearson Education, Inc.
5) ________, which are the quantitative expression of critically important metrics, known as
critical success factors, measure metrics that deal directly with performance, such as sales and
profits.
Answer: Key performance indicators (KPI)
Diff: 2
Page Ref: 590
AACSB Standard: Analytic Skills
6) The value of competitive advantage, quality improvement, risk of not investing, and
reputation are difficult to assess because they are ________ factors.
Answer: intangible
Diff: 2
Page Ref: 591
AACSB Standard: Analytic Skills
7) Increased online sales may decrease offline sales resulting in a situation known as ________.
Answer: cannibalism
Diff: 2
Page Ref: 592
8) A ________ is the point at which the benefits of a project are equal to the costs.
Answer: break-even point
Diff: 1
Page Ref: 596
9) ________ is a formula for calculating the cost of owning, operating, and controlling an IT
system.
Answer: Total cost of ownership
Diff: 1
Page Ref: 596
10) Benefits of ownership that include both tangible and intangible benefits are known as
________.
Answer: total benefits of ownership
Diff: 1
Page Ref: 597
11) ________ attempts to quantify the net value added by an investment.
Answer: Economic value added (EVA)
Diff: 2
Page Ref: 597
12) The ________ is the discount rate that makes the NPV of those cash flows equal to zero.
Answer: internal rate of return
Diff: 2
Page Ref: 597
AACSB Standard: Analytic Skills
13) Vendors and consulting companies have accumulated experience in developing metrics and
tools, such as a calculator that uses metrics and formulas to compute investment returns, which is
known as a(n) ________.
Answer: ROI calculator
Diff: 1
Page Ref: 598
AACSB Standard: Analytic Skills
159
Copyright © 2010 Pearson Education, Inc.
14) With the ________, the organization evaluates intangible benefits using a low-cost, trial EC
system before deciding to commit to a larger, more complete system.
Answer: value analysis method
Diff: 2
Page Ref: 599
AACSB Standard: Analytic Skills
15) An organization may use the ________ method to determine how much it should invest in
large EC and IT infrastructures.
Answer: management by maxim
Diff: 3
Page Ref: 599
16) In addition to buying and selling, ________ also includes selecting suppliers, getting
approval from buyers, processing purchase orders, delivering and receiving items, and
processing payments.
Answer: e-procurement
Diff: 2
Page Ref: 601
17) The ________ represents the behavior of average costs as quantity changes.
Answer: average-cost curve
Diff: 2
Page Ref: 606
AACSB Standard: Analytic Skills
18) ________ are the costs to produce the product or service a company is selling.
Answer: Production costs
Diff: 2
Page Ref: 606
19) Costs incurred in ensuring that the agent performs tasks as expected are known as ________.
Answer: agency costs
Diff: 1
Page Ref: 607
20) ________ cover a wide range of costs that are associated with the distribution (sale) and/or
exchange of products and services.
Answer: Transaction costs
Diff: 2
Page Ref: 608
AACSB Standard: Analytic Skills
21) Having special features available in products that make them distinguishable from other
products is known as ________.
Answer: product differentiation
Diff: 2
Page Ref: 610
22) An EC firm's ability to capture, report, and quickly respond to changes happening in the
marketplace and business environment is known as ________.
Answer: agility
Diff: 2
Page Ref: 610
160
Copyright © 2010 Pearson Education, Inc.
23) ________ is the fair market value of a business or the price at which a property would
change hands between a willing buyer and a willing seller who are both informed and under no
compulsion to act.
Answer: Valuation
Diff: 2
Page Ref: 610
AACSB Standard: Analytic Skills
24) IT-enabled capabilities in the form of digitized enterprise work processes and knowledge
systems are known as ________.
Answer: digital options
Diff: 3
Page Ref: 611
25) ________ are additional investments, such as training, made to maximize the returns from
EC investments.
Answer: Complementary investments
Diff: 2
Page Ref: 611
14.4 Essay
1) List and briefly describe three reasons why EC justification is needed.
Answer: Companies realize that EC is not necessarily the solution to all problems. Therefore,
EC projects must compete for funding and resources with other internal and external projects.
Analysis is needed to determine when funding of an EC project is appropriate.
Some large companies, and many public organizations, mandate a formal evaluation of requests
for funding.
Companies need to assess the success of EC projects after completion, and later on a periodic
basis.
The success of EC projects may be assessed in order to pay bonuses to those involved with the
project.
Diff: 2
Page Ref: 588
AACSB Standard: Analytic Skills
2) List and briefly discuss the difficulties in measuring productivity and performance gains from
EC investments.
Answer: Data, or the analysis of the data, may hide productivity gains. In service industries,
such as finance or health-care delivery, it is more difficult to define what the products are, how
they change in quality, and how they may be related to corresponding benefits and costs.
EC productivity gains in certain areas of the company may be offset by losses in other areas. For
example, increased online sales may decrease offline sales, a situation known as cannibalism.
The results of any investment justification depend on what is actually measured. To assess the
benefits of EC investment, one should look at productivity improvement in the area where the
EC project was installed. However, productivity increase may not necessarily be a profitable
improvement if there are losses in other areas.
Many EC investments, especially those in eCRM, take five to six years to show significant
positive results, but many studies do not wait that long to measure productivity changes.
Diff: 3
Page Ref: 592
AACSB Standard: Analytic Skills
161
Copyright © 2010 Pearson Education, Inc.
3) Explain tangible costs and benefits; and intangible costs and benefits.
Answer: Tangible costs are those that are easy to measure and quantify and that relate directly to
a specific investment. The costs involved in purchasing hardware, software, consulting, and
support services usually are tangible, as are labor costs. These costs can be measured through
accounting information.
Tangible benefits are direct benefits such as increased profitability, improved productivity, and
greater market share, can be measured with relative ease.
Intangible costs are indirect costs that may include the learning curve of the firm's customer
service employees to incorporate an EC system to respond to customer inquiries. Another
intangible cost may involve having to adapt other business processes or information systems,
such as processing items returned by customers or building and operating an inventory tracking
system.
In many cases, EC projects generate intangible benefits, such as faster time-to-market, increased
employee and customer satisfaction, easier distribution, greater organizational agility, and
improved control. These are very desirable benefits, but it is difficult to place an accurate
monetary value on them.
Diff: 2
Page Ref: 593
AACSB Standard: Analytic Skills
4) What are the ROI and payback period methods for evaluating EC investments?
Answer: The ROI method uses a formula that divides the total net benefits (revenues less costs,
for each year) by the initial cost. The result is a ratio that measures the ROI for each year or for
an entire period.
With the payback-period method, the company calculates how long it will take for the net
benefits to pay back the entire initial investment.
Diff: 1
Page Ref: 596
AACSB Standard: Analytic Skills
162
Copyright © 2010 Pearson Education, Inc.
5) List and explain five methods for evaluating IT investments.
Answer:
ROI. Uses a formula to determine the value of a product by dividing net benefits by the initial
cost of the project.
Payback Period. Calculates how long it will take to recover the cost of a new project.
Net Present Value. Net benefits for each year are discounted back to the present, and then
compared with the cost of doing the project.
Value Analysis. Evaluate the performance of a low-cost, small-scale version of the project
before committing major investment dollars to the full project.
Information Economics. Look at how a project will impact key organizational objectives.
Scoring Methodology. Assigns weights and scores to the various aspects of a project, then
calculates a total score for comparison to other projects.
Benchmarks. Used for infrastructure evaluation. Compares EC investments with those of
competitors.
Management by Maxim. A combination of brainstorming and consensus-reaching
methodologies used to determine investment size in infrastructure and EC.
Real-option Valuation. Look at future options opened up by the proposed project and assign
dollar values to them.
Balanced Scorecard. Look at a broad set of factors, not just financial factors to determine
organizational health.
Performance Dashboard. Utilizes a broad set of factors presented in a single view to ascertain
the success or progress of a project.
Activity-based costing. Uses managerial accounting concepts to study the success of EC.
Diff: 3
Page Ref: 599
AACSB Standard: Analytic Skills
163
Copyright © 2010 Pearson Education, Inc.
Download