Ch 11. Social Media & Peer Production
Ch 12. The Sharing Economy & Collaborative Consumption
Ch 19. Ad Tech / Privacy
Ch. 21 Information Security
Intellectual Property
100

An online community that allows users to establish a personal profile and communicate with others. Large public social networks include Facebook, LinkedIn, Instagram, TikTok, and Pinterest.

Social network

100
Company mentioned in the textbook you use to hire people for ad hoc jobs, such as assembling IKEA furniture.

Task Rabbit

100

A small piece of data generated by a web server and sent to a user’s web browser. The browser stores the this item for a predetermined period of time, or for the length of a user’s session on a website. These items enable web applications to store limited amounts of data and remember state information, making them essential for improving the user’s browsing experience.

Cookie

100

An acronym term to tell computers and humans apart.

CAPTCHA

100

Type of IP used to protect source identifiers such as logos and brand names.

Trademark

200

The data and body of knowledge used to train an AI model.

Corpus

200

The positive influence created when someone finds out that others are doing something.

social proof

200

A method of charging for advertising whenever a user responds to an ad by performing a specified activity, such as signing up for a service, requesting material, or making a purchase.

Cost-per-action (CPA)
200

Hordes of surreptitiously infiltrated computers, linked and controlled remotely; also known as zombie networks.

Botnets

200

Number of factors when considering fair use of copyright

Four

300

This type of website that can be modified by anyone, from directly within a web browser (provided that user is granted edit access).

Wiki

300

Altering a product offering, business model, or target market in hopes that the change will lead to a viable business.

Pivot

300

A region- or perimeter-defined physical space used to recognize if a device is within a location. These can be used to serve advertising, prompt the user with an alert, or provide some other form of personalized experience based on location.

Geofencing

300

A group approved by an organization to play the role of an adversary, probing for security vulnerabilities and weaknesses.

red team (may also consider white hats)

300

This type of IP is subservient to Constitutionally protected Free Speech.

Trademark

400

The act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined, generally large group of people in the form of an open call.

Crowdsourcing

400

The concept that a product and its composing materials is maximally used or finds new life through repair, refurbishment, and recycling, rather than being discarded by its original owner.

Circular economy

400

Invisible single, tiny images that are served on an individual Web page, e-mail, or other online service and can tell if a user has visited that page, opened the mail, played the game, etc.

tracking pixels

400

An attack that exhausts all possible password combinations in order to break into an account. The larger and more complicated a password or key, the longer a _____ will take.

Brute force attack

400

The two types of patents

Utility and design

500

Engineering the posting of positive comments and reviews of a firm’s product and services (or negative ones of a firm’s competitors). Many ratings sites will penalize firms that offer incentives for positive feedback posts.

Astroturfing

500

A technique where an organization will change prices in real time in order to maximize sales and profits.

Dynamic pricing (also accept demand pricing)

500

Ads that run before a user arrives at their intended destination in a website or app.

Interstitials

500

A seemingly tempting, but bogus target meant to draw hacking attempts. By monitoring infiltration attempts against ____, organizations may gain insight into the identity of hackers and their techniques, and they can share this with partners and law enforcement.

honeypot

500
Patents are valid and enforceable for this number of years

20