Skip to main content

Cache

A Cache – is called like the English CASH – is hardware or software, which is used for temporary working of data. How does Cache work ? Meaning Web browsers such as Internet Explorer, Firefox, Safari and Chrome are managed browser-Caches When Internet users visit a web page, the...

Cache Poisoning

What is Cache Poisoning? Cache Poisoning is an attack vector that exploits the way DNS-Clients (Domain Name System) and web servers improve performance by storing old responses for a period of time in a temporary storage area called Cache. Attackers can corrupt Cache by replacing legitimately stored data in...

Cache Validator

Various web page resources such as images or CSSfiles can be stored temporarily in the Cache of a browser in order to speed up the retrieval of web pages. A Cache validator is used to check whether the stored information is still up-to-date. What is a Cache validator? A...

Cache-Control

What does Cache-Control mean? Cache -Control is an HTTP header used to specify browser caching policies in both Client requests and server responses. Policies include how a resource is cached, where it is cached, and the maximum age of the resource before it expires. The most common Cache request...

Call to Action

What does Call to Action mean ? Call to Action , short: CtA, is a marketing term. It denotes the specific request to a customer or prospect to perform a certain action. Why is Call to Action so important? It is not enough to present products and services in...

Candystorm

What does Candystorm mean ? The term Candystorm refers to mass expressions of sympathy in social networks and is thus the opposite of a shitstorm. “Candy” comes from the English language and can be translated as “sweetness”. Who is the originator of this term? This term comes from Germany,...

Canonical (Canonical-Tag)

What is a Canonical (Canonical-Tag)? A Canonical (Canonical-Tag), also called Canonical link or Canonical attribute, is a link in the source code of a web page and points to the so-called canonical URL that should be given preference in the index of Google and other search engines. If page...

Canvas Fingerprinting

What does Canvas Fingerprinting mean ? Canvas Fingerprinting is a procedure with which online users can be clearly assigned without having to collect personal data. The use of Cookies can be dispensed with. This is not necessarily an advantage, because Cookies users can object. At Canvas Fingerprinting this is...

Caphyon

Caphyon is a software company that creates programs to improve and intelligently manage search engine rankings. There are several tools for keyword research, checking your own website as well as competitor websites. Caphyon MSI Installer The MSI-Installer is the most important tool of the software company Caphyon. It contains...

Captcha

What is a Captcha? A Captcha is an anti-spam technology for form fields and other interactive web page elements to distinguish human input from automated queries by spam bots. Spam bots are thus prevented from placing automated advertisements. The term stands for“Completely Automated Public Turingtest to tell Computers and...

Card Sorting

What does Card Sorting mean ? Card Sorting (CS) is a procedure for determining and optimising user-friendliness. This test is usually used after a comprehensive analysis phase and often comes at the beginning of the conceptual phase of a project. It is intended to ensure that users find the...

Carewords

Keywords direct visitors to a website. Carewords address the visitors and contribute to the fact that visitors become customers. What are Carewords? Carewords are selected words that address the visitors of a website in a target group-oriented and emotional way. They bind visitors to a website, provide them with...

Cascading Style Sheet (CSS)

What does Cascading Style Sheet mean? CSS are style instructions for the HTML elements of web pages. The specifications in CSS thus determine the design of HTML elements. The CSS instructions contain, for example, specifications for colours, spacing, backgrounds, fonts, styles and sizes. In most cases, the CSS styles...

Case Sensitivity

In the IT sector,Case Sensitivity means that text elements require the correct entry of upper- or lower-case letters. This can be, for example, an input field, a password query or programming code. What does Case Sensitivity mean for URLS? While domain names are usually insensitive, whether the rest of...

Catch-All

E-mail addresses are not always spelled correctly and sometimes they do not even exist. So that the addressee receives these mails nevertheless, a Catch-All mailbox can be set up. What is a Catch-All email mailbox? A Catch-All email mailbox is a mailbox that collects all emails sent to a...

CATI – Computer Assisted Telephone Interview

What is CATI – Computer Assisted Telephone Interview? A CATI – Computer Assisted Telephone Interview is a telephone interviewing technique in which the interviewer follows a script provided by a software application. It is a structured system of microdata collection over the telephone that speeds up the collection and...

CcTLD

Each country has its own extensions for domains. These so-called ccTLD are important for visitors, search engines and the SEO . What does ccTLD mean ? ccTLD is used as abbreviation for “Country Code Top Level Domain” and means in German “länderspezifischer Top-Level Domain Name”. ccTLD s show users...

CERT – Computer Emergency Response Team

A CERT – Computer Emergency Response Team is a group of experts who respond to cybersecurity incidents. These teams deal with. Malware, viruses and other cyber attacks. What are the tasks of a CERT – Computer Emergency Response Team? Once a computer security incident has been detected, formal incident...

CERT-Bund

CERT-Bund is the name of a team of security experts based at the Federal Office for Information Security. This team has the task of supporting the authorities in preventing as well as combating security problems relating to information technology (IT). CERT -Bund – the main tasks The main tasks...

Certificate Policy

A Certificate Policy is a rule set that specifies the applicability of a certificate to a particular community and/or class of applications with common security requirements. What are the main points of a Certificate Policy (CP)? 1. architecture: The CP must describe the general structure of the relevant PKI....

Certified Senders Alliance (CSA)

What does Certified Senders Alliance mean? The Certified Senders Alliance is a project of the Association of the Internet Industry eco, which cooperates with the German Dialog Marketing Association for this purpose. Since 2004, the CSA has been certifying companies that send advertising mails. It includes all certified companies...

Chatbot

What is a Chatbot? A Chatbot is a program that serves the communication with humans. It uses a natural language and should be able to answer even more complicated questions. Chatbot s are therefore also called text-based dialogue systems. The simplest form of how a Chatbot works online is,...

Check Box

What is a Check Box? A Check Box is an HTML <input> element that appears by default as a square box in a form on a web page. A checkbox can be clicked to select or deselect individual values for submission in a form. If a checkbox is unchecked...

Chip card terminal

What is a smart card terminal? A smart card terminal (also smart card reader or smart card reader) is an electronic device that reads data from a card-shaped storage medium and may also be able to write to it. Typically, the cards are plastic cards that have a barcode,...

CHMOD

What does CHMOD mean ? CHMOD is one of the most important and oldest commands in the Linux environment and has been around since the first AT&T UNIX release in the 1970s. The command is entered directly in the shell or bash window. It changes the access rights of...

Chosen-Ciphertext-Attack

What does Chosen-Ciphertext-Attack mean ? The Chosen-Ciphertext-Attacke is a method of cryptanalysis. The aim is to obtain the key of an encrypted connection or single file. The attacker must be in possession of an encoded data set (Chosen Ciphertext) and the corresponding plaintext. With this knowledge, he can try...

Chosen-Plaintext Attack

Encrypted texts are intended to prevent the contents from being read by anyone. One way to find out how texts have been encrypted is the Chosen plaintext attack. What is a Chosen plaintext attack? A Chosen Plaintext Attack is a term used in cryptanalysis. The attack is used to...

Chunk

Definition – What does Chunk mean ? A Chunk is an information fragment used in many multimedia formats such as PNG, IFF, MP3 and AVI. Each block contains a header that specifies some parameters (e.g. the type of block, comments, size, etc.). In the middle there is a variable...

CIDR

CIDR (Classless Inter-Domain Routing) CIDR (Classless Inter-Domain Routing), sometimes referred to as supernetting, allows for more flexible allocation of IP addresses than was possible with the original system of IP address classes. As a result, the number of available Internet addresses has been greatly increased, which, along with the...

Claim

The term Claim originates from English, but is now absolutely common in the marketing industry. Claim is very often used without translation as synonymous with slogan. Just like a slogan or a logo, Claims can also be an essential part of the brand. Unlike a slogan, it primarily describes...

Clean URL

Meaning A Clean URLwhich is also called a semantic URL, can be read directly by a search engine. It briefly summarizes the content of a web page and helps the user to orientate himself as well as to classify the meaning of a web page. The dynamic URL A...

Clear Web

The Clear Web refers to that part of the Internet that search engines can index using web crawlers. Other terms for Clear Web are Surface Web and Visible Web. The Deep Web represents the opposite. Web pages that users can only access after entering a password, for example, do...

Click Fraud

What does Click Fraud mean ? Click Fraud in German (click fraud) is a type of fraud that can occur with Cost-per-Click (CPC) online advertising. In CPC advertising, the owners of websites that publish the ads are paid according to how many visitors click on the ads. Sites offering...

Click Path

How visitors navigate a website is shown by the Click Path. An analysis of the click path provides website operators with information for search engine optimization. What is a Click Path? The Click Pathclick path”, sometimes also called the Clickstream is the path that visitors choose when clicking or...

Click Popularity

Click Popularity (Click Popularity) is a ranking system for determining the order of results in search engines. The determined click popularity is used to improve the relevance of the search results. The algorithm for determining click popularity is usually kept secret by the search engine operator. The search engine...

Click Spamming

What is Click Spamming? Click Spamming , also referred to as “organics poaching,” is a type of scam that occurs when a scammer performs clicks for users who did not make them. It starts when a user lands on a mobile website or App that a scammer is running....

Click-Through-Rate (CTR)

What does click-through rate mean? The CTR or click-through rate refers to the percentage of ad impressions that have led to a click on an advertisement. Ad Impression or “Ad View” refers to the number of advertisements on a web page. CTR also refers to the percentage of page...

Click-to-call

Click-to-Call refers to a type of Google-Ads ad (formerly AdWords) that, when clicked, calls the business directly instead of linking to the website. These ads can only be served on mobile devices. Therefore, they are crucial for mobile marketing campaigns. , any advertiser who wants to drive calls for...

Clickbaiting

What is Clickbaiting? Clickbaiting is a form of misleading, sensational advertising on web pages to attract attention and entice users to follow a link. A teaser in the form of text or a thumbnail (preview image) aims to exploit curiosity by giving just enough information to make readers curious...

Clickjacking

Clickjacking is when a cybercriminal tricks a user into clicking on a link that appears to take them to a specific location, but for malicious reasons redirects them to a destination chosen by the attacker. It is also referred to as IFRAME overlay referred to as. In many cases,...

Clickstream

What is a Clickstream? A Clickstream is a dataset that contains data about a website user’s clicks on a computer screen via a mouse or touchpad. This type of information provides a visual overview of user activity with detailed feedback. Such data and related analytics facilitate market research and...

Client

What is a Client? A Client as part of a Client server model is a piece of hardware or software that accesses and receives data from a service provided by a so-called server. Servers are often located on a remote computer system. In this case, the Client accesses the...

Cloaking

The content of a website that visitors see and that is evaluated by search engine crawlers is not always identical. Cloaking is a technique with which visitors and search engines are deceived. What does Cloaking mean ? Cloaking is a SEO technique that is used to show search engines...

Closed-Loop-Marketing

Closed-Loop-Marketing Is marketing that relies on data and insights from closed-loop reporting.“Closing the loop” simply means that sales teams report to marketing on what happened to the leads they received. This helps marketing understand the best and worst lead sources. The 4 steps of Closed-Loop-Marketing:

Cloud

Cloud is a term from the field of modern IT infrastructure. It is a model for storing computer data (Cloud storage) or applications (Cloud computing), where the files and programs are kept in a storage and computer system remote from the application site. It is used over a network...

Cloud-Computing

What does Cloud Computing mean? When several PCs are connected to a computer or data cloud, this is referred to as Cloud computing. Essentially, servers, storage devices, databases and Applikations are then no longer available on site. Access is via interfaces and protocols. The Cloud may consist of one...

Cloudinary

What is Cloudinary? The US company Cloudinary, based in Santa Clara, California, offers an image and video management system based on Cloud. Users upload files to Cloudinary and can then embed them on their websites and blogs. The service provider has existed since 2011. How does Cloudinary work? After...

Clusteranalyse

What is Clusteranalyse? The Clusteranalyse is a statistical classification technique in which a set of objects or points with similar characteristics are grouped into clusters. It involves a number of different algorithms and methods, all of which are used to group objects of a similar nature into appropriate categories....

CMD-Befehle

What are CMD-Befehle? The CMD-Befehle were first used in the 86-DOS operating system. Microsoft bought 86-DOS in the early 1980s and developed it further into MS-DOS. This system was enormously popular among experts and laid the foundation for Microsoft’s later success. The CMD-Befehle in MS-DOS were housed in a...

Co-Citation

What is Co-Citation? Co-Citation is when a website or brand is mentioned (not linked) by two different sources. In the context of mutual mention of a single website and not due to actual links between the websites in the form of links, there is a strong content-driven connection between...

Co-Occurence

The term Co-Occurence describes the presence, frequency and proximity of similar keywords on different websites. Co-Occurence logically includes keywords that are currently relevant but not exactly the same. Meaning The idea for Co-Ocurence came from the observation that search engines refer to “relevant answers” to a query posed by...

COBOL

What does COBOL mean ? The abbreviation COBOL stands for Common Business Oriented Language and describes one of the first standardized programming languages in the world. What was it used for? In contrast to the simultaneously booming mathematical-scientific language FORTRAN, it covered the commercial and business aspects of programming....

Cognitive Computing

What does Cognitive Computing mean ? Cognitive Computing (CC) describes technologies that mimic the way the human mind works, with the goal of improving human decision making. CC is based on the science of artificial intelligence and signal processing. The term includes machine learning, logical reasoning, speech and object...

Cognitive Load

At Cognitive Load (CL) or Cognitive Load Theory is the concept that information should be presented at a pace and level of difficulty that corresponds to the way the human brain processes information. CL, according to Cognitive Load Theory, is equivalent to the cognitive load that information causes in...

Cognitive Walkthrough

What is Cognitive Walkthrough? Cognitive Walkthrough is a usability rating method in which one or more raters complete a series of tasks and ask a series of questions from the user’s point of view. The focus at Cognitive Walkthrough is on understanding the system’s ability to learn for new...

Collaborative Filtering

What is Collaborative Filtering? Collaborative Filtering is a technology that is often used to create personalized recommendations on the web. Some popular websites that use collaborative filtering technology include Amazon, Netflix, iTunes, and IMDB. At Collaborative Filtering, algorithms are used to make automatic predictions about a customer’s interests by...

Color Management System (CMS)

What is a Color Management System (CMS) ? A Color Management System (CMS) is a collection of software tools used to ensure that colors remain the same regardless of the medium or device used to display them. Since colors are device dependent and different devices use different technologies to...

Command und Control Server

What is Command und Control Server? Command und Control Server are computers that issue directives to devices that have been infected with ransomware or other types of Malware such as sRootkit. Using C & C servers, powerful networks of infected devices can be created that are capable of executing...

Commission Junction (CJ)

What is Commission Junction? Commission Junction (CJ) is one of the oldest affiliate marketing networks in the world. Founded in 1998, the company is based in Santa Barbara, California, and since 2014 it has been part of the public company Alliance Data, which renamed it CJ Affiliate. Due to...

Common Criteria

Common Criteria also called CC is an international set of guidelines and specifications for evaluating information security products specifically designed to ensure that they meet an agreed-upon security standard for government activities. CC is also more formally known as “Common Criteria for Information Technology Security Evaluation”. How does Common...

Common Gateway Interface

The data exchange between an application program and a server should function as simply and smoothly as possible. The Common Gateway Interface is the standard solution for this task. What is a Common Gateway Interface? The Common Gateway Interface, abbreviated CGI is a standard interface through which a web...

CommonJS

CommonJS (CJS) is a supplement to the script language JavaScript. By means of CommonJS, JavaScript can also be used outside the traditional browser environment. This use is made possible by newly developed interfaces, libraries and modules, which create a uniform basis for the integration of JavaScript in different environments....

Compiler

What does Compiler mean ? A Compiler (English translator) is a computer program that translates computer code written in one programming language (the source language) into another programming language (the target language). The term Compiler is mainly used for programs that translate source code from a higher programming language...

Conceptual User Interface Design

What is this Conceptual User Interface Design? In a competitive market, it is particularly important to make the user interface of products as simple as possible so that it is readily comprehensible to users. Hardly anyone is willing to familiarize themselves with a cumbersome Surface when there are offers...

Connected TV

Connected TV (CTV) is simply a television that connects to the internet. Unlike traditional TV, CTV includes Smart TVs, Apple TVs, devices like Tivo and Roku, and game consoles like X-Boxes and PlayStations. One of the reasons CTV is so attractive to advertisers is that it already has incredible...

Container Tag

What is a Container Tag? A Container Tag is a short Javascript code that is used to add, delete or change so-called tags (literally “labels”) on a website under central control. Container Tag s are inserted into the source code of web pages. The code is used to control...

Contao

What is Conta Contao is an open sourceCMS, with which users can design and manage websites and blogs of any size. There are now around 2,000 extensions available. It is based on the programming language PHP and uses MySQL as database. The CMS has been around since 2006, and...

Content Caching

Websites can be optimized for a better user experience using various methods. One of these methods is the so-called Content Caching. What does Content Caching mean ? Content Caching refers to the caching of the content of web pages on different servers, called Cache servers. This has the advantage...

Content Curation

The content of a website is one of the most important ranking factors for Google. Content Curation is a method by which website operators can provide new content on their website at short intervals. What does Content Curation mean ? Content Curation , in German “Kuratierung von Inhalten” refers...

Content Delivery Network (CDN)

The loading time of mobile websites in particular plays an important role for the user experience. With the help of Content Delivery Network , the loading time can be significantly reduced. What is the Content Delivery Network? The Content Delivery Network is a system of globally distributed servers called...

Content Encoding

The speed at which a web page loads plays an important role in the user experience. Through Content Encoding, the transfer time can be significantly reduced. What does Content Encoding mean ? Content Encoding , in German “Inhaltscodierung”, is used to compress large HTML documents before sending them to...

Content Farming

Content Farming is the provision of large amounts of mostly low-quality content on websites with the aim of attracting users and generating revenue via online advertising. Often news about , advice texts or instructions on everyday issues are published. Characteristic is a high degree of search engine optimization, which...

Content Governance

Content Governance Describes, a set of guidelines that govern how an organization’s content is created and published. At the most basic level, this allows them to avoid being sued or embarrassed, or both. However, when a content governance program realizes its true potential, it can revolutionize the content creation...

Content Management System (CMS)

CMS are systems for creating and editing websites and other digital content. In a CMS content and design are strictly separated. Therefore, content can be edited without changing the design of the web pages. The content is stored in a database in a CMS. Frequently used content management systems:...

Content Score

What is Content Score? Content Score is a metric for rating texts. Google evaluates the texts on the Internet with the Content Score. Thus, the content score is used to evaluate the relevance and the weighting of texts on a website. The aim of the evaluation is to assign...

Content Syndication

News, interviews and radio broadcasts are usually published several times in different media. This procedure is widespread offline and online and is referred to as Content Syndication. What is Content Syndication? Content Syndication is the term for the multiple publication of content, the content – for example news, blog...

Contextual Inquiry

At Contextual Inquiry is an interview method for gathering context of use information by first asking users a series of standard questions and then observing and interviewing them as they work in their own environment. The meaning Because users are interviewed in their own environment, the analysis data is...

Continuous Integration

At Continuous Integration (CI), it is a software development practice for regularly integrating code changes into a shared software project. Typically, this happens at least once or more a day (depending on the number of developers involved in the project), and this practice encourages small changes to be made...

Controllability

Controllability is an important property of a control system, and controllability plays a crucial role in many problems, such as stabilizing unstable systems through feedback. The concept roughly denotes the ability to move a system throughout its configuration space with only certain permitted manipulations. The exact definition varies slightly...

Conversational Commerce

Conversational Commerce Refers to any communication with the user or customer. This basically involves the use of natural language in real time, as opposed to traditionally written and formal communication. The conversation usually starts from the customer, who can contact the company using any device (web, App, mobile). Requirements...

Conversational Search

The term Conversational Search describes a relatively new type of interaction between humans and computers. The basic idea of Conversational Search is that a user can speak a sentence into a device and that device can respond with a complete sentence. This principle is also applied to search queries:...

Conversion

Most websites are published with the aim that the visitors take a certain action. Through the action, a conversion of the visitor, the so-called Conversion takes place. What does Conversion mean? Conversion means conversion and describes the change of the relationship of the visitor to the visited web page...

Conversion Funnel

Not every visitor to a website becomes a customer. The Conversion funnel shows where potential customers drop off in the sales process. What is a Conversion Funnel? A Conversion funnel describes the E-commerce the individual phases that a potential customer goes through when he or she becomes a customer...

Conversion Rate

The performance of a website can be measured and analyzed in online marketing using various key figures. Here, the Conversion rate is one of the important key figures. What is a Conversion rate? The Conversion rate is a key performance indicator (KPI) used in online marketing. The value called...

Cookie dropping

With Cookie dropping, Cookies are already set by affiliate networks when the user merely visits the page (view). Normally, an affiliate link or banner must be clicked in order to place the Cookies. The Cookie dropping is therefore referred to as a “black hat” technique (fraud method) in affiliate...

Cookie Spreading

What is Cookie Spreading? With Cookie Spreading (spreading Cookies) fake Cookies are deposited with visitors of websites. The fake Cookie overwrites Cookies from other affiliates. If the user actually buys from the Shop registered at Cookie, the commission is not credited to the original affiliate, but to the spreader...

Cookie-matching

The collection and merging of users’ digital traces is known as Cookie matching. Users leave digital traces on the websites they visit. By merging these different user IDs, a more targeted approach is achieved via Cookie matching. Each Cookie has its own universe Websites distribute their Cookies to visitors....

Copy Approach

What is the Copy Approach approach? In order to bring a product closer to the customer, it is not enough to point out its benefits in a factual manner. For successful product marketing, it is necessary to advertise the product in such a way that the customer finds a...

Copyscape

Copyscape is an online plagiarism checker from Indigo Stream Technologies for detecting duplicate texts (“duplicate content”). With Copyscape, the uniqueness of texts can be checked. To do this, the URL of the relevant web page is entered on the provider’s site. A listing shows where duplicate content exists. What...

Core Update

A Core Update at Google refers to updates that do not clearly focus on a specific type of search query or specific website characteristics. Instead, they make more subtle changes to the algorithm. While other well-known Google updates such as Panda or Penguin specifically target features such as quality...

Corporate Blog

What is a Corporate Blog? A Corporate Blog is a company blog that complements the other online offerings such as the homepage and presences in social networks. What kind of content is possible? A blog offers companies a wide range of possibilities for content design. One advantage compared to...

Cortana

If you are using the Windows 10 operating system, you have surely noticed the Cortana feature. The artificial intelligence (AI) can analyze and answer your search queries that you enter via keyboard or voice command. Cortana not only improves the user experience, but also the way you operate a...

Cost Per Mille (CPM)

What is Cost Per Mille (CPM)? Cost per Mille, also called Cost Per Thousand, is a marketing term used to refer to the price of 1,000 ad impressions on a website. If a website publisher charges €2.00 CPM, an advertiser must pay €2.00 for every 1,000 impressions of their...

Cost per Sale (CPS)

Cost per Sale (CPS) or Cost per Order is a model for charging commission on online purchases. With the help of the model used in online marketing, all costs incurred during an order or lead generationcan be calculated. This includes costs for various advertising measures such as taking out...

Cost per View (CPV)

What is Cost per View (CPV)? Cost Per View (CPV) is a method of charging for video ads. The costs are based on the number of views or interactions with a video ad. Companies that want to increase their awareness on the Internet can use CPV measures. Popular video...

Cost-per-Click (CPC)

What is Cost per Click (CPC)? Cost-per-Click (CPC) (also pay-per-click, PPC) is a model for Internet advertising. In this model, the advertiser pays the publisher (usually a search engine, website owner or network) for clicks on the ad. Bid price Cost-per-click is often associated with advertising on search engines...

CPG (Cost per GRP)

What does Cost per GRP mean ? CPG is a measure of cost effectiveness that allows companies to compare the cost of an ad or campaign plan to other ads. CPG (Cost per GRP) represents the gross reach of an ad or marketing campaign as a percentage within a...

Crash Reporting

What is Crash Reporting? Crash Reporting Informs the owner of a program about program crashes. If there is no Crash Reporting for a software program, programmers cannot log why individual software crashes occur. This makes it very difficult to fix the problem, as they do not know when the...

Crawl-Budget

Before a website can be displayed in the search results of the Google search engine, it must be captured and indexed. For this purpose, Google assigns a specific Crawl-Budget to each web page. What is the Crawl-Budget? The Crawl-Budget refers to the time and resources invested by the Google...

Credit Scoring

What is Credit Scoring? The Credit Scoring refers to a statistical method that can be used to assess the creditworthiness of consumers. A score indicates the likelihood that a customer will pay a debt. It is used by banks as an important basis for their lending decisions; in the...

Critical Infrastructures (KRITIS)

The term critical infrastructures (KRITIS) refers to companies and facilities whose functionality is essential for the supply of the population. It also includes institutions that are of particular importance for public security and order. These are to be given special protection. For those responsible, however, there are also obligations...

CRM

The more a company knows about its prospects and customers, the more targeted marketing measures can be carried out. CRM Systems support marketers in building and maintaining customer relationships. What does CRM mean ? CRM is an abbreviation for Customer Relationship Managementthe English term for customer relationship management. Customer...

Cronjob

The administration of servers, databases and software environment contains regularly recurring tasks, which can be executed automatically with a Cronjob at certain times. What is a Cronjob? Scheduled tasks that are executed by a software utility called Cron are referred to as Cronjobs. Cron is a time-based job scheduler...

Cross certificate

A cross-certificate enables the use of certificates across the boundaries of different public key infrastructures (PKIs). Digital communication is secured by certificates issued in this way. What is a cross certificate? A mutual trust relationship between two certificate authorities requires each certificate authority to issue a certificate to the...

Cross Channel Analytics

What is Cross Channel Analytics? Cross Channel Analytics is a business analytics process that combines or merges multiple data sets from different channels or sources and then analyzes them to provide customer and marketing information that the business can use. This can provide insight into which path the customer...

Cross Device Ad Targeting

What is Cross Device Ad Targeting? Cross Device Ad Targeting Enables companies to target ads to consumers across multiple platforms or devices. In most cases, messaging and advertising should be sent to a targeted audience across platforms so that companies can reach their audience at times and places where...

Cross Device Programmatic Attribution

What is Cross Device Programmatic Attribution? At Cross Device Programmatic Attribution, we identify which events and touchpoints in a customer’s journey contributed most to a Conversion when spread across multiple devices. What is the challenge with Cross Device Programmatic Attribution? Attributing purchase-influencing events and touchpoints has never been easy,...

Cross Linking

What is Cross Linking? Cross Linking Refers to the process of linking between two websites. Whether they are owned by the same person or not, cross-linking is the process on which the Internet is built. Users can link to websites whose content is similar to what they are already...

Cross-Cultural User Concepts

What is Cross-Cultural User Concepts? Cross-Cultural User Concept refers to approaches that take into account the different cultural backgrounds of potential customers. Such cross-cultural concepts are playing an increasing role in many areas of business management, including international human resources management, in the face of advancing globalization. Cross-Cultural User...

Cross-Device Tracking

What does Cross-Device Tracking mean ? By Cross-Device Tracking refers to the creation of user profiles based on data from various devices used by a user. This makes it possible to identify individual users regardless of the device and applications used and to target them at the right time....

Cross-Domain-Tracking

What does Cross-Domain-Tracking mean ? Cross Domain Tracking is a feature of Google Analytics that allows a visitor to be tracked as a continuous session on two or more websites. With this feature, a visitor can be tracked on www.beispielseite-a.de and on www.beispielseite-b.de in the same Google Analytics web...

Cross-Site Scripting

Cross-Site Scripting (XSS) is a type of security attack in which an attacker inserts data, such as a malicious script, into content on otherwise trusted websites. These attacks occur when an untrusted source is allowed to inject its own code into a web application, and this malicious code is...

Cross-Site-Request-Forgery (CSRF)

Internet users often do not notice that they have become the target of a cyber attack . Cross-Site-Request-Forgery (CSRF) is an attack method that forces users to perform unwanted actions without their knowledge. What does Cross-Site-Request-Forgery (CSRF) mean? Cross-Site-Request-Forgery (CSRF) refers to a criminal attack on a web application...

Crossmedia

What is Crossmedia? The term Crossmedia is often explained as something that involves the distribution of content (e.g. music, text, images, videos, etc.) across different media. Crossmedia is usually seen as an innovative use of traditional media. However, the term can be used in different ways; cross-media concepts are...

Crossposting

What is Crossposting? Crossposting (multiple posting) is the simultaneous sending of an online post to different web forums, mailing lists or newsgroups. The goal of crossposting is to reach a larger number of readers. At the same time, the discussion of the post is spread across different venues or...

Crowd-Eyetracking

What is Crowd-Eyetracking? Crowd-Eyetracking is the extension of eye-tracking, the recording of where a person looks, to a larger number of subjects. Eye movement registration involves the analysis of three different eye movements. These are: Fixations Saccades Regressions Fixations are points at which the subject’s gaze lingers for an...

Crowdsourcing

What does Crowdsourcing mean? At Crowdsourcing, a large number of users make their skills available for a specific project. The purposes of the Crowdsourcings differ, the principle is identical: Swarm intelligence contributes. For which cases is the Crowdsourcing suitable ? This method is recommended when participation of as many...

Crowdtesting

What does Crowdtesting mean ? At Crowdtesting many users test an unreleased software. Mostly it concerns web-based programs like online games and Apps. Sometimes developers also use this procedure for offline software. In the first step, programmers subject the programs to in-house testing. Crowdtesting can be the second step....

CSMA/CA

What does CSMA/CA mean? Theterm CSMA/CA stands for Carrier Sense Multiple Access/Collision Avoidance. This is a procedure that enables the use of a physical network connection with several end devices. The data packets of a subscriber are sent in such a way that a collision with packets of other...

CSS clip path

For a responsive web design, elements sometimes need to be trimmed in a certain way. With CSS clip path this is relatively easy to do. What is a CSS clip path? CSS Clip-Path is a so called CSS property, which can be used to show or hide certain parts...

CSS3

CSS3 (Cascading Style Sheets) is the latest version of a web standard that plays a major role in the design of websites. Style sheets are responsible for the visual design of a web page – completely independent of the page structure, which is defined by the use of HTML...

Curated Shopping

Some consumers like to get advice when shopping for a variety of reasons. Curated Shopping fulfills this consumer desire when pinging onlineShop. What is Curated Shopping? Curated ShoppingCurated or assisted shopping is a relatively new trend in onlineShopping that was first observed in 2012. This form of onlineShopping aims...

CURL

What does cURL mean ? The name cURL is an abbreviation of the term “Client for URL”. It is a software for sending files between networked computers. The target computer is identified by its address in the network, the URL. What is special about cURL? The software is open...

Custom Fields

What are Custom Fields? Custom Fields , in German “benutzerdefinierte Felder” are delimited areas that can be added to a website created with the WordPress CMS . These user-defined fields can be used to display additional content on a WordPress web page. Furthermore, it is possible to individualize the...

Customer Centricity

Customer Centricity describes creating a positive consumer experience from the point of sale through the actual sales process to after the sale. A customer-centric approach can elevate a business by allowing it to stand out from competitors that don’t offer the same experience. Customer-centricity is nothing new, but it...

Customer Life Cycle

The Customer Life Cycle (Customer Life Cycle) describes the different phases of the customer relationship with the company. The term originates from Customer Relationship Management (CRM), alternative terms are the customer loyalty circle and the customer life circle. What are the objectives defined by Customer Life Cycle management? The...

Customer Lifetime Value

In marketing, the Customer Lifetime Value (CLV) is a metric that represents a company’s total net profit from a particular customer. CLV is an important metric for determining how much financial resources a company is willing to spend to acquire new customers and how much repeat business is expected...

Customer Satisfaction Score

The Customer Satisfaction Score (CSAT) describes a basic measurement of customer satisfaction with a brand’s products and/or services. Using CSAT, marketers and brands can determine customer satisfaction levels at key interaction times, such as the time of purchase, onboarding process, or support ticket exchange. But also at the time...

Cyber activists

What are cyber activists? Cyber activists pursue political goals and use the Internet as a platform for protest. For example, they campaign for environmental protection, criticise authoritarian regimes or fight radical right-wing movements. The forms of protest range from the dissemination of information to cyberattacks. Into which categories can...

Cyber attack

What does cyber attack mean? A cyber attack is a targeted attack on computer networks. The attackers either want to cause damage or illegally obtain information such as sensitive government data or company secrets. What can be the originators and purposes behind a cyber attack? Cyber attacks can be...

Cyber criminals

What are cyber criminals? Cyber criminals are people who use the Internet or other data networks to commit crimes such as fraud. One common means is identity theft. Cybercrime: What are the types? Basically, cybercrime encompasses a variety of offenses. The greatest importance is attached to these forms: Identity...

Cyber Defense

What does cyber defense mean A powerful and comprehensive cyber defense is designed to prevent cyber attacks from causing economic, political or military damage. Preventive measures ensure that there are no points of attack. When an attack does occur, early detection and appropriate countermeasures are key. What methods are...

Cyber Security

What does cyber security mean? The topic of cyber security deals with measures that can be used to protect the entire information and communication technology, including the Internet and other networks, from dangers. Potential risks come from cyber criminals, cyber terrorists and spies. What are the dangers? Increasing digitalisation...

Cyber Space

What is cyberspace? The term cyberspace refers to worlds of experience, communication and work generated by computers. More commonly, the term is Cyberspace. In practice, it is used in different ways; a narrow and a broad definition can be distinguished: narrow sense: cyber space is a three-dimensional, artificially created...

Cyber Terrorists

Cyber-terrorists are terrorists who attack computer systems in different ways. Unlike cyber criminals with financial interests, they pursue political goals. As a rule, they work for the purpose of terrorist organizations that also carry out actions such as attacks outside the Internet. Possible attack strategies of cyber terrorists Cyber...

Cyberspace

What does Cyberspace mean? The Cyberspace (Engl. cybernetic space) refers to a virtual space for work, leisure and communication based on networked digital technology. The word first appeared in 1982 in a short story by science fiction author William Gibson. The description of the concept goes back further to...

Cybersquatting

What does Cybersquatting mean ? At Cybersquatting users register domains that contain a brand name (Brandjacking) or personal name (namejacking). The cybersquatters have no own reference to this name. Instead, they offer the domains to these persons or trademark rights holders, usually at high prices. They speculate that the...

Cyclic Redundancy Check (CRC)

Cyclic Redundancy Check (CRC) is a technique for detecting errors in digital data. CRC is a hash function that detects accidental changes to raw computer data commonly used in digital telecommunications networks and storage devices such as hard disk drives. A Cyclic Redundancy Check (CRC) can be implemented without...