An online community that allows users to establish a personal profile and communicate with others. Large public social networks include Facebook, LinkedIn, Instagram, TikTok, and Pinterest.
Social network
Task Rabbit
A small piece of data generated by a web server and sent to a user’s web browser. The browser stores the this item for a predetermined period of time, or for the length of a user’s session on a website. These items enable web applications to store limited amounts of data and remember state information, making them essential for improving the user’s browsing experience.
Cookie
An acronym term to tell computers and humans apart.
CAPTCHA
Type of IP used to protect source identifiers such as logos and brand names.
Trademark
The data and body of knowledge used to train an AI model.
Corpus
The positive influence created when someone finds out that others are doing something.
social proof
A method of charging for advertising whenever a user responds to an ad by performing a specified activity, such as signing up for a service, requesting material, or making a purchase.
Hordes of surreptitiously infiltrated computers, linked and controlled remotely; also known as zombie networks.
Botnets
Number of factors when considering fair use of copyright
Four
This type of website that can be modified by anyone, from directly within a web browser (provided that user is granted edit access).
Wiki
Altering a product offering, business model, or target market in hopes that the change will lead to a viable business.
Pivot
A region- or perimeter-defined physical space used to recognize if a device is within a location. These can be used to serve advertising, prompt the user with an alert, or provide some other form of personalized experience based on location.
Geofencing
A group approved by an organization to play the role of an adversary, probing for security vulnerabilities and weaknesses.
red team (may also consider white hats)
This type of IP is subservient to Constitutionally protected Free Speech.
Trademark
The act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined, generally large group of people in the form of an open call.
Crowdsourcing
The concept that a product and its composing materials is maximally used or finds new life through repair, refurbishment, and recycling, rather than being discarded by its original owner.
Circular economy
Invisible single, tiny images that are served on an individual Web page, e-mail, or other online service and can tell if a user has visited that page, opened the mail, played the game, etc.
tracking pixels
An attack that exhausts all possible password combinations in order to break into an account. The larger and more complicated a password or key, the longer a _____ will take.
Brute force attack
The two types of patents
Utility and design
Engineering the posting of positive comments and reviews of a firm’s product and services (or negative ones of a firm’s competitors). Many ratings sites will penalize firms that offer incentives for positive feedback posts.
Astroturfing
A technique where an organization will change prices in real time in order to maximize sales and profits.
Dynamic pricing (also accept demand pricing)
Ads that run before a user arrives at their intended destination in a website or app.
Interstitials
A seemingly tempting, but bogus target meant to draw hacking attempts. By monitoring infiltration attempts against ____, organizations may gain insight into the identity of hackers and their techniques, and they can share this with partners and law enforcement.
honeypot
20