Data
architectures for data access and data management, 135–136
data warehouses for customer data, 366, 369–377
Enterprise Application Integration (EAI) and access to, 243
meta-data, 180
product data and content management, 180–181
shopping baskets and data transactions, 135
tools for customer relationship data, 184–185
see also customer data
Data alteration, 105
Databases
application development and, 161
architectures for data access and data management, 135–136
CORBA, 193
Embedded SQL, 188
heterogeneous environments and development of, 191
interface implementations, 187–190, 195
Java servlets and, 192
JDBC (Java Database Connectivity), 189–190
ODBC (Open Database Connectivity), 188–189
OLE DB (Object Linking and Embedding Data Base), 189
performance measures, 191
relational database management systems (RDBMS), 135, 193–194
scalability, 191
security of, 215
shopping carts systems and data availability, 139
Web access and, 194–195
for Web sites, 119–120, 124–127
XML and, 192–193
Data Interchange Standards Association, 431
Data transactions, shopping baskets and, 135
Debit cards, 305, 347
Delivery channels, cost effectiveness, 223–224
Demand management, 79
Demilitarized Zones (DMZs), 127–128
Denial-of-service (DoS) attacks, 210
Deregulation of telecommunication industry, 49–50
Development suites, 384–385, 386
DigiBuy, 346, 348
Digital certificates, 228–233, 288
signer certificates, 229–233
see also SSL certificates
Digital currencies
accessibility, 323
advantages of, 327–331, 334–335
anonymity of, 330–331
cost of transactions, 327–328
currency competition, 332
defined and described, 324–326
e-bullion, 325
e-gold, 325
evocash, 325
financial industries, impacts on, 335–338
fraud and, 328–329, 337
global markets and, 328
inflation and, 336–337
integrity of, 323
legal issues and payment policies for, 335–336
money laundering, 331, 338–339, 340
person-to-person payments, 329
privacy and, 329–331
recommendations for, 340
regulation and restrictions of, 332–333, 335, 340
security of, 328–329
speed of transactions, 328
stored-value or smart cards, 326–327
tax evasion, 331
trends, 332–335, 337–338
“Digital divide,” 49
Digital gold. See digital currencies
Digital ID technology, 268–269, 276
see also SSL certificates
Digital River, case study, 455–459
Digital signatures, 227–228
Digital Subscriber Line (DSL) connections, 48
Digital wallets, 349
Discounts, 140
Distributed systems, security and, 250–253
Distribution, inbound / outbound logistics, 79
DMZs, 127–128
DMZs (Demilitarized Zones), 127–128
Domain names, 98–99
buying existing, 100
promotion and, 112
registration of, 99, 100, 282, 426
Domains, SSL Server certificates and, 238
DoS (Denial-of-service) attacks, 210
Downloads, security and, 211
Duties on computers and related devices, 46–47