INFO 360 FINAL – Flashcards

Unlock all answers in this set

Unlock answers
question
The reliability of the content in Wikipedia, the online encyclopedia, is question able because...
answer
d. It is difficult to test the authenticity of the content due to the fact that anyone can contribute content.
question
Which of the following is the most appropriate wireless networking standard for creating personal area networks?
answer
d. Bluetooth
question
Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet.
answer
d. 802.11g
question
The most fundamental information systems in an organization are:
answer
d. transaction processing systems
question
When the chief financial officer of a company wants a report on business units who have spent 10 percent more than their allotted budget, she would be requesting which type of report?
answer
a. Ad hoc c. Exception
question
Crowdsourcing involves outsourcing a job to a defined group of people.
answer
b. False
question
________ is the process whereby a fully automated electronic commerce transaction eliminates middlemen.
answer
d. Disintermediation
question
Routine reports are produced at scheduled intervals and have set data requirements. _____ reports are used when requirements are not routine.
answer
a. Ad hoc
question
The key mechanisms in the sell-side marketplace are customized electronic catalogs and reverse auctions.
answer
b. False
question
Which of the following is not an example of a transaction?
answer
d. Printing a report
question
A company's annual employee evaluation best fits which type of decision?
answer
c. semistructured
question
Being an entrepreneur, disturbance handler, and negotiator is part of the _____ managerial role.
answer
d. decisional
question
Which of the following is not a strategy for mitigating the risk of threats against information?
answer
e. Installing an updated operating system.
question
In a _____ system, participants are able to seamlessly and electronically share data, voice, images, graphics, and animation.
answer
c. Telepresence
question
Employees in which functional areas of the organization pose particularly grave threats to information security?
answer
b. human resources, management information systems
question
Success in the _____ phase of the decision-making process results in resolving the original problem, and failure leads to a return to previous phases.
answer
a. implementation
question
Which of the following factors is not increasing the threats to information security?
answer
d. limited storage capacity on portable devices
question
KPI stands for key process information (T/F)
answer
False (Key Performance Indicator)
question
The _____ is a global wide-area network that connects approximately 1 million organizational computer networks.
answer
c. Internet
question
Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key.
answer
b. public, private
question
Knowledge workers _____
answer
C. advise middle managers.
question
A database management system is primarily a(n) _____.
answer
C. interface between applications and a database.
question
The visibility of Internet applications on the Web makes proprietary systems more difficult to keep secret. This is an example of which of Porter's five forces?
answer
E. rivalry among existing firms in an industry
question
In a relational database, every row represents a(n) _____.
answer
B. record
question
A set of programs that enable the hardware to process data is _____.
answer
B. application
question
In a database, the primary key field is used to _____.
answer
D. uniquely identify a record
question
Which of the following is not an example of business - IT alignment?
answer
C. The company views IT as a way to support the business but not as a way to create new revenue streams.
question
In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n):
answer
A. attribute
question
_____ is a formal approach to managing data consistently across an entire organization.
answer
D. Data governance
question
_____ is/are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services.
answer
A. IT components
question
_____ systems provide interactive communication with the customer throughout the organization.
answer
b. Collaborative CRM
question
_____ systems support the front-office business processes which directly interact with customers.
answer
c. Operational CRM
question
Which of the following allows customers to connect to a company representative and conduct an instant messaging session?
answer
b. live chat
question
AT;T sells telephone services that include local and long-distance service, voice mail service, caller ID, and digital subscriber line access to the Internet. This is a form of:
answer
c. bundling
question
_____ are simple tools for answering repetitive customer questions.
answer
c. Frequently asked questions
question
Packaging, assembly, and manufacturing take place in which segment of the supply chain?
answer
b. internal
question
Which of the following is not a goal of supply chain management?
answer
c. to increase cycle time
question
The _____ refers to erratic shifts in orders up and down the supply chain.
answer
c. bullwhip effect
question
The benefits of EDI include which of the following?
answer
e. all of the above
question
_____ portals automate the business processes involved in selling products from a single supplier to multiple buyers.
answer
a. Distribution
question
The area of the earth reached by a satellite's transmission is referred to as its _____.
answer
c. Footprint
question
_____ is a wireless standard that enables temporary, short-range connection between mobile devices.
answer
a. Bluetooth
question
A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________.
answer
b. Hotspot
question
The _____ standard can transmit up to 75 Mbps and has a range of 31 miles.
answer
e. WiMAX
question
The major problem with RFID has been _______.
answer
a. Expense
question
When interest is credited to your savings account at your bank, it is called a:
answer
d. transaction
question
_____ integrate the planning, management, and use of all of an organization's resources, and are designed to tightly integrate the functional areas of the organization.
answer
d. Enterprise resource planning systems
question
_____ are interorganizational ERP systems that provide Web-enabled links between an organization's key business systems and its customers, suppliers, business partners, and others.
answer
e. ERP II systems
question
_____ are the most successful solutions or problem-solving methods for achieving a business objective.
answer
b. Best practices
question
_____ reports include only information that falls outside certain threshold standards.
answer
c. Exception
question
Companies use Web sites for commerce for all of the following reasons except:
answer
d. To reduce the amount of actual cash they need to deal with.
question
In _______ e-commerce, the sellers and buyers are organizations.
answer
c. business-to-business
question
Direct payment of Social Security benefits is an example of ______ e-commerce.
answer
a. government-to-citizen
question
A vendor asks its business partners to place logos or banners on their Web sites. If customers click on a logo, visit the vendor's site, and make a purchase, then the vendor pays a commission to the partner. This scenario illustrates which business model?
answer
e. affiliate marketing
question
_____ use credit card numbers, transmitted electronically over the Internet, to pay for goods and services. They are either unencrypted or encrypted, with coded data readable by an intermediary between the buyer's and seller's banks.
answer
b. Electronic credit cards
question
______ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary.
answer
b. Stored-value money cards
question
_____ enable two individuals to transfer funds without using a credit card.
answer
e. Person-to-person payments
question
Which type of electronic commerce is the largest by volume?
answer
c. business-to-business
question
The advantages of electronic commerce for consumers include all of the following except:
answer
c. You typically cannot access additional information, so you do not have information overload.
question
A _____ is automatically launched by some trigger and appears behind the active window.
answer
d. pop-under ad
question
You sign up for an RSS feed from CNN.com. Which of the following would you expect to happen?
answer
d. You will be notified of updates in the content areas you selected
question
You just started to work on a project with three other people. You realize that everyone has their own notes, which makes it hard for you to keep track of what has been done and what still needs to be done. Which of the following applications would you suggest the team use?
answer
e. Wikis
question
Which of the following is not a social networking site?
answer
d. Wikipedia
question
Which of the following is an advantage of social commerce over traditional ecommerce?
answer
b. The ability to predict buying habits based on real-time data
question
Which of the following is a true statement about the impact of social computing on a business?
answer
c. A small minority of individuals contribute the majority of feedback and can provide skewed data.
question
Groupon is an example of ________________
answer
c. Group shopping
question
Ratings, reviews, and recommendations
answer
d. Are an aspect of social shopping
question
Using social computing tools to do market research
answer
d. Can foster closer customer relationships.
question
HR departments use social computing applications to assist them in which of the following activities:
answer
e. All of the above
question
Crowdsourcing...
answer
e. presumes that a large number of enthusiasts can outperform a small group of experienced professionals.
question
An information system's _____ is the possibility that the system will be harmed by a threat.
answer
a. vulnerability
question
Cybercriminals can obtain the information they need in order to assume another person's identity by:
answer
e. All of the above are strategies to obtain information to assume another person's identity.
question
A _____ is a document that grants the holder exclusive rights on an invention for 20 years.
answer
b. patent
question
_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.
answer
c. Trojan horses
question
A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.
answer
d. Phishing
question
. _____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset.
answer
b. Risk analysis
question
In _____, the organization purchases insurance as a means to compensate for any loss.
answer
e. risk transference
question
Access controls involve _____ before _____.
answer
b. authentication, authorization
question
Passwords and passphrases are examples of:
answer
d. something the user knows.
question
In the _____ phase of the decision-making process, managers examine a situation and identify and define the problem.
answer
d. intelligence
question
The type of decision that can be made by following a definite procedure is called a(n) ______ decision.
answer
a. structured
question
_____ is the efficient and effective execution of specific tasks.
answer
a. Operational control
question
_____ provides users with a view of what is happening, whereas _____ addresses why it is happening.
answer
e. Multidimensional data analysis, data mining
question
_____ attempts to find the value of the inputs necessary to achieve a desired level of output.
answer
d. Goal-seeking analysis
question
The primary distinguishing characteristic of geographical information systems is:
answer
d. every record or digital object has an identified geographical location
question
The _____________ ethical standard states that ethical actions treat all human beings equally.
answer
b. Fairness
question
What is _____ is not necessarily _____.
answer
c. Unethical, illegal
question
_____ issues involve who may obtain information and how much they should pay for this information.
answer
e. Accessibility
question
______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
answer
e. Liability
question
_____ refers to the range of frequencies available in any communications channel.
answer
E. Bandwidth
question
_____ signals convey information in wave form, whereas _____ signals convey information in binary form.
answer
B. Analog, digital
question
A protocol is:
answer
B. A standard set of rules and procedures for the control of communications in a network.
question
In TCP/IP, IP is responsible for:
answer
A. Disassembling and reassembling of packets during transmission.
question
A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described as _______.
answer
B. Client/server
question
A(n) _____ is a network designed to serve the internal informational needs of a single organization.
answer
D. Intranet
question
Each site on the Internet gets an assigned address, which is a(n) _____.
answer
C. URL address
question
Many organizations have implemented corporate portals for which of the following reasons?
answer
E. All of the above
question
Skype is an example of _______.
answer
D. Voice over IP
question
The newest type of videoconferencing technology is ________.
answer
B. Telepresence
question
Organizations are turning to data governance for which of the following reasons?
answer
b) They are responding to federal regulations.
question
_____ describe the activities of the business, whereas _____ categorize(s), aggregate(s), and evaluate(s) data generated by the organization's activities.
answer
a) Transaction data, master data
question
_____ occurs when the same data are stored in many places.
answer
d) Data redundancy
question
In the data hierarchy, the smallest element is the _____.
answer
b) Bit.
question
In a database, the primary key field is used to _____.
answer
d) uniquely identify a record
question
At your university, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship?
answer
d) many-to-many
question
8) A standardized language used to manipulate data is _____.
answer
d) Structured Query Language
question
_____ is a method for analyzing and reducing a relational database to its most streamlined form.
answer
b) Normalization
question
Historically, management information systems have focused on capturing, storing, managing, and reporting _____ knowledge.
answer
b) explicit
question
Which of the following statements concerning technology pressures on modern businesses is true?
answer
b) New technologies offer alternative service options.
question
Producing customized items in large quantities is called:
answer
e) mass customization.
question
Information-based industries are most susceptible to which one of Porter's five forces?
answer
d) threat of substitute products
question
For most companies, the Web _____ the threat that new competitors will enter the market by _____ traditional barriers to entry.
answer
b) increases, decreasing
question
Buyer power is _____ when buyers have many choices from whom to buy and _____ when buyers have few choices.
answer
b) high, low
question
_____ activities create value for which customers are willing to pay, whereas _____ activities do not add value directly to the firm's products or services.
answer
d) Primary, support
question
Which strategy for competitive advantage involves offering different products, services, or product features?
answer
b) differentiation
question
Which strategy for competitive advantage involves introducing new products and putting new features in existing products?
answer
c) innovation
question
When Amazon welcomes you by name back to its Web site on your second visit, it is employing which strategy for competitive advantage?
answer
e) customer-orientation
question
Which of the following is not a cause of inadequate alignment between IT and business?
answer
e) Lack of funds
question
A(n) _____________ is a computer program designed to support a specific task or business process.
answer
b) Application
question
An organization's _____ consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization.
answer
b) Information technology infrastructure
question
Which of the following statements is false?
answer
b) Each functional area within an organization has only one application.
question
Enterprise resource planning systems...
answer
c) use a common database for all functional areas
question
A collection of related files, tables, and so on that stores data and the associations among them is _____.
answer
c) a database
question
_____ systems are designed to correct a lack of communications among _____.
answer
c) Enterprise resource planning systems, functional area information systems
question
When your purchases are swiped over the bar-code reader at the point-of-sale terminals at Wal-Mart, a _____ records the data.
answer
a) transaction processing system
question
Supply chain systems are which type of information system?
answer
c) interorganizational information systems
question
An information system that analyzes credit card applications and suggests approval or denial is a(n):
answer
a) expert system
question
Which of the following statements is false?
answer
d) IT reduces stress by giving managers more time to make decisions.
question
Allows distributed workforce (or digital nomads) to work from anywhere and anytime
answer
Telecommuting
question
outsourcing a task to an undefined, generally large group of people in the form of an open call
answer
Crowdsourcing
question
two or more individuals who act together to perform some task
answer
Work Group
question
when group members are in different locations
answer
Virtual Group (team)
question
Integrates voice, voice mail, fax, chat, e-mail, IM, short message service, and videoconferencing
answer
Unified Communication (UC)
question
Digitizes analog voice signals, sections them into packets, and sends them over the Internet
answer
Voice Communication (VoIP)
question
Virtual meeting place where groups of regulars come to chat
answer
Virtual Chat rooms
question
The largest-volume application on the Internet
answer
e-mail
question
Services that provide effective personalized customer contract as an important part of Web-based customer support
answer
Web-based call centers
question
Web-based, personalized gateways to information and knowledge that provide relevant information from different systems and the Internet using advanced search and indexing techniques
answer
Portals
question
Search several engines at once and integrate the findings of the various search engines to answer queries posted by users
answer
Metasearch Engines
question
Search for a specific information by key words and report the results
answer
Search Engines
question
Developed by U.S. universities collaborating with industry and government Not a separate physical network from the Internet Fast, always on, everywhere, natural, intelligent, easy, and trusted
answer
Internet2
question
A unique address for each computer on the Internet that distinguishes it from all other companies
answer
Internet Protocol Address
question
Expensive and usually only placed in new housing developments
answer
Fiber-to-the-home (FTTH)
question
Very convenient, and WiMAX will increase the use of broadband wireless
answer
Wireless
question
Access where cable and DSL are not available
answer
Satellite
question
Access over your TV coaxial cable. Can have degraded performance if many of your neighbors are accessing the Internet at once
answer
Cable Modem
question
Broadband access via telephone companies
answer
DSL
question
Still used in US where broadband is not available
answer
Dial-Up
question
Connects parts of the intranets of different organizations
answer
Extranet
question
Supports discovery, communication, and collaboration inside an organization
answer
Intranet
question
Began in 1969 as DoD's project ARPAnet
answer
Internet
question
Each computer acts as both server and client Access unused CPU power among networked computers Real-time, person-to-person collaboration: Microsoft SharePoint Peer-to-peer file-sharing: BitTorrent
answer
Peer-to-Peer Processing
question
End users access client computers to use services
answer
Client Computers
question
Provide computing services
answer
Server Computers
question
Divided processing works among two or more computers
answer
Distributed Processing
question
A file transfer protocol that can send large files of information across sometimes unreliable networks with assurance that the data will arrive uncorrupted
answer
Transmission control Protocol/ Internet Protocol (TGP/IP)
question
A common LAN protocol
answer
Ethernet
question
Transmission Speed
answer
bps, hertz, bandwidth
question
Converts digital signals to analog or vice versa
answer
Modem (Modulator Demodulator)
question
Monitoring and managing an organization's performance according to key performance indicators (KPIs)
answer
Corporate Performance Management (CPM)
question
The process of assigning a geographical location to every object Enables users to generate information for planning, problem solving, and decision making
answer
Geocoding
question
Uses GISs and Global Positioning Systems (GPSs) together Allows analysts to extract information from the usage patterns of mobile phones and other wireless devices
answer
Reality Mining
question
A computer-based system for capturing, integrating, manipulating, and displaying data using digitized maps
answer
Geographic-Information Systems (GIS)
question
The process of presenting data to users in visual formats, thereby making IT applications more attractive and understandable to users
answer
Data Visualization
question
A strategic management room displaying a series of dashboards that helps managers pilot their businesses better
answer
Management Cockpit
question
-Provide rapid access to timely information -Provide direct access to management reports -Are very user friendly and supported by graphics
answer
Digital Dashboards
question
Enables users to employ multidimensional analysis, data mining, and decision support systems to analyze data in real time
answer
Real-Time Business Intelligence
question
Computer-based information systems that combine models and data in an attempt to analyze semistructured and some unstructured problems with extensive user involvement
answer
Decision Support Systems (DSS)
question
The process of searching for valuable information in a large database, data warehouse, or data mart
answer
Data Mining
question
Also called multidimensional analysis Provides users with a look at what is happening or what has happened Allows users to analyze data in such a way that they can quickly answer business questions
answer
Online Analytical Processing (OLAP)
question
Privacy issues that international organizations and governments face when information spans countries and jurisdictions
answer
International Assets of Privacy
question
Organizations are prohibited from collecting any personal information unless the customer specifically authorizes it
answer
Opt-In model
question
Organizations are permitted to collect personal information until the customer specifically requests that the data not be collected
answer
Opt-Out model
question
An organization's guidelines with respect to protecting the privacy of customers, clients, and employees
answer
Privacy Codes and Policies
question
Banks, utility companies, government, and credit reporting agencies
answer
Personal information in databases
question
The tracking of people's activities, online or offline, with the aid of computers
answer
Electronic Surveillance
question
The right to determine when, and to what extent, information about you can be gathered and/or communicated to others
answer
Information Privacy
question
The right to be left alone and to be free of unreasonable personal intrusions
answer
Privacy
question
Revolve around who should have access to information and whether they should have to pay for that access
answer
Accessibility Issues
question
Involve the ownership and value of information
answer
Property Issues
question
Involve the authenticity, fidelity, and accuracy of information that is collected and processed
answer
Accuracy Issues
question
Involve collecting, storing, and disseminating information about individuals
answer
Privacy Issues
question
A legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems
answer
Liability
question
Determining who is responsible for actions that were taken
answer
Accountability
question
Accepting the consequences of your decisions and actions
answer
Responsibility
question
A collection of principles that are intended to guide decision making by members of an organization
answer
Code of Ethics
question
An ethical action is the one that best serves the community as a whole and is important to the welfare of everyone, not just some members.
answer
Common-Good Approach
question
An ethical action treats all humans equally, or if unequally, then fairly, based on some defensible standard.
answer
Fairness Approach
question
An ethical action is the one that best protects and respects the moral rights of the affected parties
answer
Rights Approach
question
An ethical action is the one that provides the most good or does the least harm.
answer
Utilitarian Approach
question
Use a combination of client data, auditor software, and client and auditor hardware
answer
Auditing WITH the computer
question
Inputs, outputs, and processing are checked Auditors review program logic and test data
answer
Auditing THROUGH the computer
question
Verify processing by checking for known outputs or specific inputs Best used in systems with limited outputs
answer
Auditing AROUND the computer
question
Review internal audit results and perform independent information systems audit
answer
External Auditors
question
Part of accounting internal auditing
answer
Internal Auditors
question
Examination of information systems including inputs, outputs, and processing to ensure that they work properly
answer
Information Systems Auditing
question
Provides physical location and utilities without no computer hardware or user workstations
answer
Cold Site
question
Has similar services and options as the hot site May not include the actual applications the company runs May include servers but not user workstations
answer
Warm Site
question
A fully configured computer facility, with all services, communications links, and physical plant operations
answer
Hot Site
question
Provides guidance on how to keep the business operating after a disaster occurs
answer
Business Continuity Planning
question
Monitor employees' computers, e-mail, and Internet activities
answer
Employee Monitoring Systems
question
An encryption standard for secure transactions such as credit card purchases and online banking
answer
Secure Socket Layer
question
Use logins and encryption to establish secure, private connection on a public network like the Internet
answer
Virtual Private Networking (VPN)
question
Converting an original message into a form that can only be read by the intended receiver
answer
Encryption
question
Allows everything to run unless it is on the blacklist
answer
Blacklisting
question
Allows acceptable software to run
answer
Whitelisting
question
Identify and eliminate malicious software
answer
Anti-Malware systems (AV)
question
Enforce access-control policy to prevent certain information from moving between untrusted and private networks
answer
Firewalls
question
Protect the movement of data across networks
answer
Communication Controls
question
Permission to do certain activities
answer
Authorization
question
Proof of identity
answer
Authentication
question
Restrict unauthorized user access to computer resources
answer
Access Controls
question
Prevent unauthorized individuals from gaining access to a company's facilities
answer
Physical Controls
question
Defense mechanisms to protect information assets
answer
Security Controls
question
Limit the risk by implementing controls that minimize the impact of threat
answer
Risk Limitation
question
Transfer the risk by using other means to compensate for the loss, such as purchasing insurance
answer
Risk Transference
question
Accept the potential risk, continue operating with no controls, and absorb any damages that occur
answer
Risk Acceptance
question
Organization takes concrete actions against risk
answer
Risk Mitigation
question
Prioritize assets (probability x value) Compare cost of security breach vs. cost of control
answer
Risk Analysis
question
Identify, control, and minimize the impact of threats
answer
Risk Management
question
The probability that a threat will impact an information resource
answer
Risk
question
Attack via the Internet using a target's computer systems to cause physical, real-world harm
answer
Cyberterrorism and cyberwarfare
question
SCADA systems control...
answer
chemical, physical, or transport processes
question
Small files stored on a computer containing information about visited Web sites
answer
Cookies
question
Creates a launchpad for sending out spam e-mails
answer
Spamware
question
Records keystrokes and Web browsing history
answer
Keystroke Logger
question
Collects personal information about users without their consent
answer
Spyware
question
Displays pop-up advertisements on computer screens
answer
Adware
question
Programs installed on a computer without user's consent or knowledge
answer
Alien Software (or pestware)
question
Dormant until activated at a certain date and time
answer
Logic bomb
question
Allows unauthorized access to the program or system, bypassing security measures
answer
Back Door or Trap Door
question
Disguised as an innocent program
answer
Trojan horse
question
Using hacked computers (zombies) to perform DoS attack
answer
Distributed DoS attack
question
Bombarding and crashing a target computer with bogus requests
answer
Denial-of-service (DoS) attack
question
Phishing attack on specific target
answer
Spear Phishing attack
question
Can spread by itself
answer
Worm
question
Attaches to a host computer
answer
Virus
question
Remote attack needing user action
answer
Software Attack
question
The property created by individuals or corporations
answer
Intellectual Property
question
Protects ownership of the property for the life of the creator plus 70 years
answer
Copyright
question
Protects an invention or process for 20 years
answer
Patent
question
Company secret, not public information
answer
Trade Secrets
question
Impersonating a trusted organization in an electronic communication
answer
Phishing
question
Deliberate assumption of another person's identity to access financial information or to frame a person for a crime through
answer
Identity Theft
question
Rummaging through trash to find discarded information
answer
Dumpster Diving
question
Smaller equipment is easier to steal Larger storage means more information lost
answer
Theft of equipment of information
question
Defacing an organization's Web site
answer
Sabotage (or vandalism)
question
Crosses the legal boundary
answer
Industrial Espionage
question
Legal information gathering
answer
Competitive Intelligence
question
Individual attempts to gain illegal access to organizational information
answer
Espionage (or Trespass)
question
The possibility that the system will be harmed by a threat
answer
Vulnerability
question
The harm, loss or damage that can result if a threat compromises that resource
answer
Exposure
question
Any danger to which a system may be exposed
answer
Threat
question
fuzzy, complex problems with no cut-and-dried procedures and solutions
answer
Unstructured Designs
question
routine and repetitive problems with standard procedures and solutions
answer
Structured Designs
question
The degree of protection against criminal activity, danger, damage, and/or loss
answer
Security
question
Protecting an organization's information resources from unauthorized access, use, disclosure, disruption, modification, or destruction
answer
Information Security
question
Achieving the organization's goals
answer
Output
question
* Interpersonal roles * Informational roles * Decisional roles
answer
Process (Management)
question
* People * Money * Materials * Information
answer
Input
question
A process by which an organization achieves its goals through the use of resources
answer
Management
question
Social computing helps improves...
answer
Customer Service
question
A process of monitoring, collecting, and analyzing socially generated data to support strategic decisions
answer
Social Intelligence
question
Using blogs, wikis, online forums, and social networking sites to collect feedback from customers
answer
Conversational Marketing
question
The open nature of social networking allows merchants to understand, identify, and target potential customers at zero or low cost
answer
Market Research
question
Viral marketing
answer
(word of mouth)
question
Branded online applications that support social interactions and user contributions examples: Nike+ app
answer
Social Apps
question
Leverages user dynamics to influence consumers Peer pressure, friend recommendations, likes, etc.
answer
Social Advertising
question
Two main processes of Marketing
answer
1. Advertising 2. Market research
question
A process of building profitable customer relationships by creating value for customers and capturing value in return
answer
Marketing
question
Online intermediaries using social networks for buying and selling products and services
answer
Social marketplaces
question
Offer discounts for members for limited time without diminishing a brand's image
answer
Shopping communities and clubs
question
Major discounts offered for a short time
answer
Group Shopping
question
Guide consumers in purchase decisions
answer
Ratings, reviews, and recommendations
question
A type of e-commerce using social networking tools to enhance the shopping experience
answer
Social Shopping
question
Benefits of Social Commerce (to businesses)
answer
can test new ideas/products less expensively and quickly learn more about their customers identify problems quicker and find solutions create better marketing
question
Benefits of Social Commerce (to customers)
answer
better and faster vendor responses to clients customers can assist other customers customers expectations met more regularly and quickly
question
Risks of social commerce
answer
Negative, unedited, and possibly invalid and unethical reviews Information security concerns Invasion of privacy Violation of intellectual property and copyright Data leakage of personal information or corporate strategic information
question
The delivery of electronic commerce activities and transactions through social computing
answer
Social Commerce
question
A Web site that takes different content from other Web sites and mixes them together to create a new kind of content
answer
Mashup
question
Business-oriented social network (www.linkedin.com)
answer
Enterprise Social Networks
question
A Web site that supports activities for maintaining social networks
answer
Social Networking websites
question
A form of blogging using short messages, image, or video (TWITTER)
answer
Microblogging
question
Millions of blogs on the Web
answer
Blogosphere
question
Personal Web sites, open to the public
answer
Blogs (or weblogs)
question
Subscribers receive customized information when they want it, without having to surf thousands of Web sites
answer
Really simple syndication (RSS)
question
Using a tag (a keyword) to describes a piece of information in multiple, overlapping associations rather than in rigid categories
answer
Tagging
question
A Web development technique that enables portions of Web pages to reload with fresh data instead of requiring the entire Web page to reload
answer
AJAX
question
A loose collection of information technologies, applications, and the Web sites that use them
answer
Web 2.0
question
First generation of the Web Focuses on creation and commercialization of the Web
answer
Web 1.0
question
Enforcing copyright laws is extremely difficult
answer
Copyright
question
Registrants using the five-day "grace period" at the beginning of a domain registration to profit from pay-per-click advertising
answer
Domain Tasting
question
Registering domain names solely for the purpose of selling them later at a higher price
answer
Cybersquatting
question
Delta.com belongs to Delta Faucet before Delta Airlines purchased it, is an example of:
answer
Domain Name Conflicts
question
Ethical Issues in E-commerce
answer
Privacy and Job Loss
question
Needed services such as temporary help or extra office space are traded on an "as-needed" basis
answer
Functional Exchanges
question
Exchanges across many industries mainly for MRO materials
answer
Horizontal Exchanges
question
Exchanges in a given industry
answer
Vertical Exchanges
question
Connect many buyers and many sellers
answer
Exchanges
question
-E-procurement and group purchasing Key mechanism: Reverse auctions
answer
Buy-Side Marketplace
question
-Organizations sell their products or services to other organizations electronically either from their own or from a third-party Web site Mechanisms: E-catalogs and forward auctions
answer
Sell-Side Marketplace
question
Involves finding the product to be shipped; packaging the product; arranging for delivery to the customer; and handling returns
answer
Order Fulfillment Effectiveness
question
A company integrates its offline and online channels
answer
Multichanneling
question
Occurs when manufacturers sell directly to customers online, alienating the distributors
answer
Channel conflict
question
Indiscriminate distribution of electronic ads without the permission of the receiver
answer
Spamming
question
-Online word-of-mouth marketing
answer
Viral marketing (Online advertising)
question
Asks consumers to give their permission to voluntarily accept online advertising and e-mail
answer
Permission marketing (Online advertising)
question
Sent to e-mail address on a customer database
answer
E-mail (Online advertising)
question
Appears underneath the active window. Users see it when they close the active window
answer
Pop-under ad (Online advertising)
question
Appears in front of the current browser window
answer
Pop-up ad (Online advertising)
question
Electronic billboards
answer
Banner Ad
question
Organizations advertise available positions, accept resumes, and applications via the Internet
answer
Online job market
question
Use computers to trade stocks, bonds, and other financial instruments
answer
Online securities trading
question
dedicated solely to Internet transactions
answer
Virtual banks
question
Conducting banking activities not at a physical location
answer
Cyberbanking
question
Customers accessing services via the Web
answer
Online Service Industries
question
Customer cannot buy anything but will be transferred to a participating storefront
answer
Referral e-mall
question
Customer can make a purchase
answer
Regular e-mall
question
A Web site that represents a single store
answer
Electronic storefront
question
Buying, selling, transferring, or exchanging of products, services, or information via computer networks, including the Internet
answer
Electronic commerce (e-commerce, EC)
question
Electronic business (E-business)
answer
-A broader definition of EC -Buying and selling goods and services -Servicing customers -Collaborating with partners -Conducting e-learning -Conducting electronic transactions within an organization
question
Extent to which the commerce has been transformed from physical to digital
answer
Degree of Digitization
question
Bricks-and-mortar
answer
Purely physical organizations
question
Partial EC
answer
Mix of digital/physical dimensions in terms of product, payment, process, delivery
question
Clicks-and-mortar (clicks-and-bricks)
answer
-Conduct e-commerce activities -Conduct primary business in physical world
question
Pure-play (virtual organizations)
answer
-All dimensions are digital Example: Purchasing e-books from an online store
question
Use of Internet technology and e-commerce to deliver information about public services to citizens, business partners, and suppliers
answer
E-government Government-to-citizen (G2C) and government-to-business (G2B)
question
E-commerce conducted in a wireless environment
answer
Mobile commerce (m-commerce)
question
Online direct marketing
answer
Manufacturers or retailers sell directly to customers
question
Businesses request quotes from suppliers
answer
Electronic tendering system
question
Customers decide how much they are willing to pay; an intermediator tried to match a provider
answer
Name-your-own-price
question
Customers specify a need; an intermediary compares providers and shows the lowest price. Customers must accept offer in a short time or may lose the deal
answer
Find-the-best-price
question
Vendor asks partners to place logos on partner's site. If customer's click on logo, go to vendor's site, and buy, then vendor's pay commissions to partners.
answer
Affiliate marketing
question
Receivers send information about your product to their friends
answer
Viral marketing
question
Customers use the Internet to self-configure products or services. Sellers then price them and fulfill them quickly (build-to-order)
answer
Product customization
question
Transactions are conducted efficiently (more information to buyers and sellers, lower transaction costs) in electronic marketplaces
answer
Electronic marketplaces and exchanges
question
Bartering online
answer
Intermediary administers online exchange of surplus products and or company receives "points" for its contribution, and the points can be used to purchase other needed items
question
Electronic catalogs
answer
-Backbone of most e-commerce sites -Include product database, directory, search and presentation capabilities
question
Electronic auctions
answer
Auctions can be conducted from the seller's site, the buyer's site, or a third party's site
question
Forward auctions
answer
Sellers place items at sites for auction and buyers bid continuously for them
question
Reverse auctions
answer
-Buyers post a request for quotation (RFQ) with information on the desired purchase -Suppliers study the RFQ and submit bids electronically
question
A set of long-range goals describing IT infrastructure and identifying IT initiatives needed to reach the goals.
answer
IT strategic plan
question
Steering committee
answer
helps develop and implement the IT strategic plan
question
Conducting the Cost-Benefit Analysis (Four common approaches):
answer
1. Net present value 2.Return on investment 3. Break-even analysis 4. Business case approach
question
80/20 rule (lease application)
answer
If the software meets 80% of the needs, the company should consider changing its business processes so it can utilize the remaining 20%
question
An agent or a vendor who assembles the software needed by enterprises and packages the software with services such as development, operations, and maintenance
answer
Application service provider (ASP)
question
A method of delivering software in which a vendor hosts the applications and provides them as a service to customers over the Internet
answer
Software-as-a-service (SaaS)
question
Organizations obtain a license to implement an open-source software product and either use it as is, customize it, or develop applications with it
answer
Use open-source software
question
Acquiring IT applications from outside contractors or external organizations
answer
outsourcing
question
Relocate these operations to other countries
answer
Offshoring
question
Systems development life cycle (SDLC)
answer
The traditional method used by organizations to develop large-scale IT projects
question
determines whether the company can develop and/or acquire the system
answer
Technical feasibility
question
determines whether the project investment is worth the financial risks
answer
Economic feasibility
question
addresses the human issues of the systems development project
answer
Behavioral feasibility
question
Adding system requirements after the project has been initiated
answer
Scope creep
question
Translating the design specifications into computer code
answer
Programming
question
Checking to see if the computer code will produce the expected and desired results and to detect errors in the computer code
answer
Testing
question
Checking to see if the computer code will produce the expected and desired results and to detect errors in the computer code
answer
Testing
question
Checking to see if the computer code will produce the expected and desired results and to detect errors in the computer code
answer
Testing
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New