Information Age – BIS Flashcards

Unlock all answers in this set

Unlock answers
question
is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser
answer
click-fraud
question
when infinite quantities of facts are widely available to anyone who can use a computer.
answer
Information age
question
is a world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention.
answer
The Internet of Things (IoT)
question
raw facts that describe the characteristics of an event or object (order date, amount sold)
answer
Data
question
data converted into a meaningful and useful context (best-selling product, best customer)
answer
Information
question
information collected from multiple sources that analyzes patters, trends, and relationships for strategic decision making (lowest sales per week compared w/ economic interest rates) (suppliers, customers, competitors, partners, industries)
answer
Business Intelligence
question
the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources
answer
knowledge
question
a data characteristic that stands for a value that changes or varies over time
answer
variable
question
is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making
answer
Business Intelligence
question
which extracts information from data and uses it to predict future trends and identify behavioral patterns
answer
predictive analytics
question
A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part.
answer
Systems thinking
question
is information that returns to its original transmitter (input, transform, or output) and modifies the transmitter's actions.
answer
Feedback
question
responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses
answer
Chief security officer (CSO)
question
responsible for ensuring the speed, accuracy, availability, and reliability of the MUS
answer
Chief technology officer (CTO)
question
responsible for ensuring the ethical and legal use of information within a company
answer
Chief privacy officer (CPO)
question
responsible for (1) overseeing all uses of MIS and (2) ensuring that MIS strategically aligns with business goals and objectives
answer
chief information officer (CIO)
question
responsible for collecting, maintaining, and distributing company knowledge
answer
Chief knowledge officer (CKO)
question
An advantage that occurs when a company can significantly increase its market share by being first to market with a competitive advantage.
answer
first-mover advantage
question
is the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed.
answer
Competitive intelligence
question
analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry.
answer
Porter's Five Forces Model
question
1. need to analyze large amounts of information 2. must make decisions quickly 3. must apply sophisticated analysis techniques
answer
managerial decision making challenges
question
1. problem identification 2. data collection 3. solution generation 4. solution test 5. solution selection 6. solution implementation
answer
decision-making process
question
employees develop, control, and maintain core business activities required to run the day-to-day operations. - structured decions: reordering inventory, weekly production schedules
answer
Operational level
question
employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change - semistructured decisions: allocated resources and monitor performance of subunits, decisions about new products or employee benefits
answer
Managerial level
question
managers develop overall business strategies, goals, and objectives and monitor the strategic performance of the organization - highly unstructured: decision to enter a new market
answer
Strategic level
question
is a temporary activity a company undertakes to create a unique product, service, or result.
answer
project
question
are measurements that evaluate results to determine whether a project is meeting its goals.
answer
metrics
question
are the crucial steps companies perform to achieve their goals and objectives and implement their strategies (create high quality products, retain competitive advantage, reduce product costs, increase customer satisfaction)
answer
Critical success factors (CSFs)
question
are the quantifiable metrics a company uses to evaluate progress toward critical success factors.(turnover rates of employees, # of product returns, # of new customers, average customer spending)
answer
Key performance indicators (KPIs)
question
which indicates the earning power of a project. We measure it by dividing the profitability of a project by the costs.
answer
return on investment (ROI)
question
measure the performance of MIS itself, such as throughput, transaction speed, system availability, information accuracy, response time
answer
Efficiency MIS metrics
question
measure the impact MIS has on business processes and activities, including customer satisfaction, customer conversion rates, financial, and usability
answer
Effectiveness MIS metrics
question
is a process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance.
answer
Benchmarking
question
encompasses all the information contained within a single business process or unit of work, and its primary purpose is to support the performance of daily operational or structured decisions.
answer
Transactional information
question
is the capture of transaction and event information using technology to (1) process the information according to defined business rules, (2) store the information, and (3) update existing information to reflect the new information.
answer
Online transaction processing (OLTP)
question
The basic business system that serves the operational level (analysts) and assists in making structured decisions.
answer
transaction processing system (TPS)
question
encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions.
answer
Analytical information
question
is the manipulation of information to create business intelligence in support of strategic decision making.
answer
Online analytical processing (OLAP)
question
Analyzing complex relationships among thousands or even millions of data items to discover patterns, trends, and exception conditions is one of the key uses. For example, doctors may enter symptoms into a decision support system so it can help diagnose and treat patients. Insurance companies also use a DSS to gauge the risk of providing insurance to drivers who have imperfect driving records
answer
decision support systems (dss)
question
checks the impact of a change in a variable or assumption on the model
answer
what-if analysis
question
a special case of what-if analysis, is the study of the impact on other variables when on variable is change repeatedly
answer
sensitivity analysis
question
finds the inputs necessary to achieve a goal such as a desired level of output. it is the reverse of what-if and sensitivity.
answer
goal seeking analysis
question
an extension of goal-seeking, finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints
answer
optimization analysis
question
is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation, and insight.
answer
executive information system (EIS)
question
refers to the level of detail in the model or the decision-making process
answer
Granularity
question
produces graphical displays of patterns and complex relationships in large amounts of data.
answer
Visualization
question
which tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs.
answer
digital dashboard
question
is the aggregation of data from simple roll-ups to complex groupings of interrelated information
answer
Consolidation
question
enables users to view details, and details, and details of information
answer
drill-down
question
ability to look at information from different perspectives
answer
slice and dive
question
rotates data to display alternative presentations of the data
answer
pivot
question
simulates human thinking and behavior, such as the ability to reason and learn. Its ultimate goal is to build a system that can mimic human intelligence
answer
Artificial intelligence (AI)
question
are various commercial applications of artificial intelligence.
answer
Intelligent systems
question
are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. - playing chess
answer
Expert systems
question
a category of AI that attempts to emulate the way the human brain works. - credit card companies checking for fraud
answer
neural network
question
is a mathematical method of handling imprecise or subjective information.
answer
Fuzzy logic
question
is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem. - investment companies in trading decisions
answer
genetic algorithm
question
is the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome.
answer
Mutation
question
is a special-purpose, knowledge-based information system that accomplishes specific tasks on behalf of its users. - environmental scanning and competitive intelligence
answer
intelligent agent
question
is software that will search several retailer websites and provide a comparison of each retailer's offerings, including price and availability.
answer
shopping bot
question
is a computer-simulated environment that can be a simulation of the real world or an imaginary world.
answer
Virtual reality
question
is the viewing of the physical world with computer-generated layers of information added to it.
answer
Augmented reality
question
is a wearable computer with an optical head-mounted display (OHMD). Developed by Google, it adds an element of augmented reality to the user's world by displaying information in a smart phone-like hands-free format.
answer
google glass
question
provides access to internet information through documents, including text, graphics, and audio and video files that use a special formatting language called hypertext markup language - one part of the Internet, and its primary use is to correlate and disseminate information
answer
world wide web
question
A workplace that is not located in any one physical space.
answer
virtual workplace
question
uses technology allowing humans to interact with a computer through bodily sensations and movements—for example, a cell phone vibrating in your pocket.
answer
haptic interface
question
also called front-office processes, result in a product or service received by an organization's external customer. - order processing, customer service, sales process, customer billing, order shipping
answer
customer-facing processes
question
also called back-office processes, are invisible to the external customer but essential to the effective management of the business; - strategic planning, tactical planning, budget forecasting, training, purchasing raw materials
answer
Business-facing processes
question
banking, insurance, government, hotels, airline
answer
industry- specific customer facing
question
is a patent that protects a specific set of procedures for conducting a particular business activity.
answer
business process patent
question
Business processes, such as manufacturing goods, selling products, and providing service that make up the primary activities in a value chain.
answer
Core processes
question
Process that uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously. (unning payroll, calculating taxes, and creating financial statements) - If you throw a rock in the air, you can predict where it will land
answer
static process
question
A continuously changing process used to provide business solutions to ever-changing business operations. (managing layoffs of employees, changing order levels based on currency rates, and canceling business travel due to extreme weather.) - The bird will sense its environment and fly in any direction. The bird gathers and processes input and interacts with its environment.
answer
dynamic processes
question
is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence.
answer
Business process modeling (mapping)
question
A graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint.
answer
business process model
question
is a graphical notation that depicts the steps in a business process. provides businesses with a graphical view of the end-to-end flow of their business processes
answer
Business Process Model and Notation (BPMN)
question
is anything that happens during the course of a business process - customer requests, time requests, end of the process - circle
answer
BPMN Event
question
is a task in a business process, any work that is being performed in a process - checking availability, picking up the customer, confirming the booking - rounded rectangle
answer
BPMN Activity
question
is used to control the flow of a process, handle the forking, merging, and joining of paths within a process. - determining availability status, accepting/declining request - diamond
answer
BPMN Gateway
question
display the path in which the process flows, represented by arrow in a business process model - path of customer through booking process - arrow
answer
BPMN Flow
question
represent the current state of the operation that has been mapped, without any specific improvements or changes to existing processes.
answer
As-Is process models
question
show the results of applying change improvement opportunities to the current process model
answer
To-be process models
question
layout arranges the steps of a business process into a set of rows depicting the various elements
answer
swim lane
question
includes the tasks, activities, and responsibilities required to execute each step in a business process.
answer
Workflow
question
monitor processes to ensure tasks, activities, and responsibilities are executed as specified.
answer
Workflow control systems
question
1. There has been a pronounced shift in the market the process was designed to serve. 2. The company is markedly below industry benchmarks on its core processes. 3. To regain competitive advantage, the company must leapfrog competition on key dimensions.
answer
business process change indications
question
are static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes.
answer
Operational business processes
question
Attempts to understand and measure the current process and make performance improvements accordingly.
answer
Business process improvement
question
Involves computerizing manual tasks making them more efficient and effective and dramatically lowering operational costs.
answer
Automation
question
are semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements.
answer
Managerial business processes
question
Improves business process efficiencies, simplifying or eliminating unnecessary steps. - removes bottlenecks
answer
streamlining
question
Occurs when resources reach full capacity and cannot handle any additional demands; they limit throughput and impede operations.
answer
bottleneck
question
the time required to process an order, reducing this is a common KPI for operations management.
answer
cycle time
question
are dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions.
answer
Strategic business processes
question
the analysis and redesign of workflow within and between enterprises.
answer
business process reengineering (BPR)
question
Implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.
answer
Digital Darwinism
question
is a new way of doing things that initially does not meet the needs of existing customers.
answer
disruptive technology
question
produces an improved product customers are eager to buy, such as a faster car or larger hard drive.
answer
sustaining technology
question
a book by Clayton M. Christensen, discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders.
answer
The Innovator's Dilemma
question
is a massive network that connects computers all over the world and allows them to communicate with one another.
answer
Internet
question
is a term to refer to the World Wide Web during its first few years of operation between 1991 and 2003
answer
Web 1.0
question
is the buying and selling of goods and services over the Internet. refers only to online transactions.
answer
Ecommerce
question
includes ecommerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real-time information
answer
Ebusiness
question
occurs when a new, radical form of business enters the market that reshapes the way companies and organizations behave
answer
paradigm shift
question
- expanding global reach, opening new markets, reducing costs, improving effectiveness
answer
Ebusiness Advantages
question
refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information.
answer
information richness
question
measures the number of people a firm can communicate with all over the world.
answer
Information reach
question
is the ability of an organization to tailor its products or services to the customers' specifications. For example, customers can order M's in special colors or with customized sayings
answer
Mass customization
question
occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions
answer
Personalization
question
tail of a typical sales curve - how niche products can have viable and profitable business models when selling via ebusiness - Ebusinesses such as Amazon and eBay eliminated the shelf-space dilemma and were able to offer infinite products. - netflix can extend beyond tail bc no physical limitations
answer
long tail
question
are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together.
answer
Intermediaries
question
Occurs when a business sells direct to the customer online and cuts out the intermediary.
answer
disintermediation
question
steps are added to the value chain as new players find ways to add value to the business process
answer
reintermediation
question
refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness
answer
Cybermediation
question
measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement.
answer
Interactivity
question
is the length of time a visitor spends on a website. Businesses want their websites to be sticky and keep their customer's attention. To interpret such data properly, managers try to benchmark against other companies.
answer
Stickiness
question
applies to businesses buying from and selling to each other over the Internet. Examples include medical billing service, software sales and licensing, and virtual assistant businesses. B2B relationships represent 80 percent of all online business and are more complex with greater security needs than the other types
answer
business to business
question
applies to any business that sells its products or services directly to consumers online. Carfax offers car buyers detailed histories of used vehicles for a fee. - There are three ways to operate as a B2C: brick-and-mortar, click-and-mortar, and pure play (see Figure 3.10).
answer
business to consumer
question
applies to any consumer who sells a product or service to a business on the Internet. One example is customers of Priceline.com, who set their own prices for items such as airline tickets or hotel rooms and wait for a seller to decide whether to supply them.
answer
consumer to business
question
applies to customers offering goods and services to each other on the Internet. A good example of a C2C is an auction where buyers and sellers solicit consecutive bids from each other and prices are determined dynamically.
answer
Consumer-to-consumer (C2C)
question
is a plan that details how a company creates, delivers, and generates revenues on the internet
answer
ebusiness model
question
is website software that finds other pages based on keyword matching similar to Google.
answer
search engine
question
combines art with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking. - The better the SEO, the higher the ranking for a website in the list of search engine results.
answer
Search engine optimization (SEO)
question
Pay-per-click: Generates revenue each time a user clicks a link to a retailer's website. Pay-per-call: Generates revenue each time a user clicks a link that takes the user directly to an online agent waiting for a call. Pay-per-conversion: Generates revenue each time a website visitor is converted to a customer.
answer
Websites can generate revenue through
question
converts an audio broadcast to a digital music player
answer
podcasting
question
allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards. -Point-to-point videoconferences connect two people, and multipoint conferences connect more than two people at multiple locations.
answer
videoconference
question
blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants. Regardless of the type of hardware or software the attendees are running, every participant can see what is on anyone else's screen.
answer
Web conferencing (webinar)
question
help companies manage the creation, storage, editing, and publication of their website content.
answer
content management systems (CMS)
question
publishes hypertext on the WWW, which allows users to move from one document to another by simply clicking a hot spot or link
answer
hypertext markup language (HTML)
question
the current version of HTML, delivers everything from animations to graphics and music to movies; it can also be used to build complicated web applications and works across platforms, including a PC, tablet, smartphone, or smart TV
answer
HTML 5
question
internet protocol web browsers use to request and display web pages using URLs
answer
hypertext transport protocol (HTTP)
question
an international community that develops open standards to ensure the long-term growth of the Web
answer
World Wide Web Consortium (W3C)
question
allows users to access the WWW
answer
Web Browser
question
address of a file or resource on the web
answer
universal resource locator (URL)
question
service that allows the owner of a domain name to maintain a simple website and provide email capacity
answer
domain name hosting (web hosting)
question
program that runs with in another applications
answer
applet
question
nonprofit organization that has assumed responsibility for Internet Protocol (IP) address space allocation, parameter assignment, domain name system management, and root server system management functions previously performed under US gov.
answer
Internet Corporation for Assigned Names and Numbers (ICANN)
question
is the scientific classification of organisms into groups based on similarities of structure or origin. Taxonomies are also used for indexing the content on the website into categories and subcategories of topics.
answer
Taxonomy
question
Allows business to generate commissions or referral fees when a customer visiting its website clicks on a link to another merchant's website
answer
Associate program
question
Is a box running across a web site that advertises the products and services of another business, usually another e-business
answer
Banner ad
question
Is a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser.
answer
Click through
question
Is a small file deposited on a hard drive by a website containing information about customers and their browsing activities.
answer
Cookie
question
Is a small web page containing an advertisement that appears outside of the current website loaded in the browser.
answer
Pop-up ad
question
Is a technique that induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect.
answer
Viral marketing
question
Are interactive business communities providing a central market where multiple buyers and sellers can engage in e- business activities.
answer
Electronic marketplaces (e-marketplace)
question
A business that operates in a physical store no internet presence
answer
Brick and mortar business
question
A business that operates in a physical store and on the internet.
answer
Click and mortar business
question
A business that operates on the internet only without a physical store.
answer
Pure play (virtual) business
question
generate revenues by providing digital content such as news, music, photos, or videos (netflix/Itunes)
answer
Content providers
question
provide specialized information on behalf of producers G&S and their potential customers (Zillow)
answer
Infomediaries
question
bring together buyers and sellers of products and services (amazon)
answer
online marketplaces
question
operate a central website for users to access specialized content and other services (google)
answer
portals
question
provide services such as photo sharing, video sharing, online backup, and storage (youtube, map quest)
answer
service providers
question
process online sales transactions (Etrade, Fidelity)
answer
transaction brokers
question
keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages. -are chosen by the advertiser and are displayed on the results pages when the search keywords match the advertiser's keywords. - advertiser then pays a fee to Google for the search display.
answer
Adwords
question
-content management system - email - instant messaging - podcasting - videoconferencing - web conferencing
answer
Ebusiness tools
question
- identifying limited market segments - ensuring consumer protection -managing consumer trust - adhering to taxation rules
answer
challenges facing Ebusiness
question
is the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free. Encourages user participation and the formation of communities that contribute to the content. Technical skills are no longer required to use and publish information to the World Wide Web, eliminating entry barriers for online business.
answer
Web 2.0
question
nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate with the system.
answer
open system
question
contains instructions written by a programmer specifying the actions to be performed by computer software.
answer
source code
question
is any proprietary software licensed under exclusive legal right of the copyright holder.
answer
closed source
question
refers to any software whose source code is made available free (not on a fee or licensing basis as in ebusiness) for any third party to review and modify.
answer
open source
question
is created and updated by many users for many users. Websites such as Flickr, Wikipedia, and YouTube, for example, move control of online media from the hands of leaders to the hands of users
answer
User-contributed content (or user-generated content)
question
is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement.
answer
Native advertising
question
user-generated content in which buyers post feedback on sellers. - eBay buyers voluntarily comment on the quality of service, their satisfaction with the item traded, and promptness of shipping. Sellers comment about prompt payment from buyers or respond to comments left by the buyer.
answer
reputation system
question
is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information - generates more information faster from a wider audience
answer
collaboration system
question
is collaborating and tapping into the core knowledge of all employees, partners, and customers. Knowledge can be a real competitive advantage for an organization
answer
Collective intelligence
question
which involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions. - primary objective is to be sure that a company's knowledge of facts, sources of information, and solutions are readily available to all employees whenever it is needed
answer
knowledge management (KM)
question
supports the capture, organization, and dissemination of knowledge (i.e., know-how) throughout an organization. Can distribute an organization's knowledge base by interconnecting people and digitally gathering their expertise.
answer
knowledge management system (KMS)
question
consists of anything that can be documented, archived, and codified, often with the help of MIS
answer
explicit knowledge
question
is the knowledge contained in people's heads.
answer
Tacit knowledge
question
most common form of collective intelligence found outside the organization - refers to the wisdom of the crowd - idea that collective intelligence is greater than the sum of its individual parts has been around for a long time
answer
crowdsourcing
question
sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet.
answer
Crowdfunding
question
or communication such as email, in which the message and the response do not occur at the same time.
answer
asynchronous communications
question
brought by web 2.0 in which communications occur at same time (IM)
answer
synchronous communications
question
refers to websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg
answer
Social media
question
is an application that connects people by matching profile information. Providing individuals with the ability to network is by far one of the greatest advantages of Business 2.0.
answer
A social network
question
Maps group contacts identifying who knows each other and who works together. -It can also identify key experts with specific knowledge such as how to solve a complicated programming problem or launch a new product.
answer
Social networking analysis (SNA)
question
represent the interconnection of relationships in a social network. -sites can be especially useful to employers trying to find job candidates with unique or highly specialized skill sets that may be harder to locate in larger communities.
answer
Social graphs
question
are specific keywords or phrases incorporated into website content for means of classification or taxonomy. An item can have one or more tags associated with it to allow for multiple browseable paths through the items, and tags can be changed with minimal effort
answer
Tags
question
describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search. - The entire user community is invited to tag, and thus essentially define, the content
answer
Social tagging
question
is a locally stored URL or the address of a file or Internet page saved as a shortcut.
answer
website bookmark
question
allows users to share, organize, search, and manage bookmarks.
answer
social bookmarking
question
is an online journal that allows users to post their own comments, graphics, and video. - let writers communicate—and readers respond—on a regular basis through a simple yet customizable interface that does not require any programming
answer
blog (web log)
question
is the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages.
answer
microblogging
question
(the word is Hawaiian for quick) is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required
answer
wiki
question
1. content sharing through open sourcing 2. user-contributed content 3. collaboration inside the organization 4. collaboration outside the organization
answer
4 characteristics of web 2.0
question
a website or web application that uses content from more than one source to create a completely new product or service (Zillow)
answer
mashup
question
are WYSIWYG, or what you see is what you get tools. They provide a visual interface to build a mashup, often allowing the user to drag and drop data points into a web application.
answer
Mashup editors
question
is a magazine published only in electronic form on a computer network. - Flipboard is a social-network aggregation, magazine-format application software for multiple devices that collects content from social media and other websites, presents it in magazine format, and allows users to flip through the content.
answer
ezine
question
refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
answer
Ediscovery
question
protects data from unauthorized disclosure and confirmation of data source authenticity
answer
Information Secrecy
question
Method of government for information management or control
answer
Information governance
question
Examines organizational resource of information and regulates it ensuring it has everything required to function and grow effectively
answer
Information management
question
Act of conforming or yielding information
answer
Information compliance
question
Focuses on who owns information about individuals and how information can be sold and exchanged
answer
Information property
question
- policies and procedures that address information management along with the ethical use of computers and the internet in the business environment Ethical Computer Use - starting point and umbrella Information Privacy Acceptable Use Email Privacy Social Media Workplace Monitoring
answer
Epolicies
question
records every key stroke and mouse click
answer
Key logger
question
A hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
answer
hardware key logger
question
a small file deposited on a hard drive by a web site containing information about customers and their web activities
answer
cookie
question
software that generates ads that installs themselves on a computer when a person downloads some other program on the internet
answer
adware
question
Consists of one line of information for every visitor to a website and is usually stored on a web server
answer
web log
question
Exact pattern of a consumer's navigation through a site
answer
clickstream
question
is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system. Using the collective power of a community to identify and classify content significantly lowers content categorization costs because there is no complicated nomenclature to learn. Users simply create and apply tags as they wish.
answer
Folksonomy
question
a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format.
answer
Real Simple Syndication (RSS)
question
how products in a network increase in value to users as the number of users increases. -The more users and content managers on a wiki, the greater the network effect because more users attract more contributors, whose work attracts more users, and so on
answer
network effect
question
which is a set of routines, protocols, and tools for building software applications. A programmer then puts these building blocks together. - content used in mashups is typically sourced from this
answer
application programming interface (API)
question
1. violations of copyright and plagiarism 2. information vandalism 3. technology dependence
answer
challenges of business 2.0
question
a component of Web 3.0 that describes things in a way that computers can understand. -is not about links between web pages; rather it describes the relationships between things (such as A is a part of B and Y is a member of Z) and the properties of things (size, weight, age, price). If information about music, cars, concert tickets, and so on is stored in a way that describes the information and associated resource files, semantic web applications can collect information from many sources, combine it, and present it to users in a meaningful way.
answer
semantic web
question
is the legal protection afforded an expression of an idea, such as a song, book, or video game.
answer
copyright
question
is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents
answer
Intellectual property
question
is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.
answer
patent
question
is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.
answer
Privacy
question
which is the assurance that messages and information remain available only to those authorized to view them.
answer
confidentiality
question
govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies).
answer
information ethics
question
is the unauthorized use, duplication, distribution, or sale of copyrighted software.
answer
pirated software
question
is software that is manufactured to look like the real thing and sold as such
answer
counterfeit software
question
A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
answer
Digital rights management
question
break into other people's computers and may just look around or may steal/destroy info
answer
black hat hackers
question
refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
answer
Ediscovery (or electronic discovery)
question
includes threats, negative remarks, or defamatory comments transmitted through the Internet or posted on the website
answer
cyberbullying
question
is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser
answer
Click-fraud
question
is a computer crime in which a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking the advertiser's link.
answer
Competitive click-fraud
question
Contains general principles to guide computer user behavior.
answer
ethical computer use policy
question
policy allows employees to use their personal mobile devices and computers to access enterprise data and applications. Unlimited access for personal devices. Access only to nonsensitive systems and data. Access, but with IT control over personal devices, apps, and stored data. Access, but preventing local storage of data on personal devices.
answer
bring your own device (BYOD)
question
is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
answer
Fair information practices
question
A policy that a user must agree to follow to be provided access to corporate email, information systems, and the Internet.
answer
acceptable use policy (AUP)
question
is a contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions. typically contained in an acceptable use policy.
answer
Nonrepudiation
question
contains general principles to guide the proper use of the Internet.
answer
Internet use policy
question
is the electronic defacing of an existing website
answer
Cybervandalism
question
is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
answer
Typosquatting
question
is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
answer
Website name stealing
question
is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens. Generally, an Internet use policy: - Describes the Internet services available to users. - Defines the organization's position on the purpose of Internet access and what restrictions, if any, are placed on that access.
answer
Internet censorship
question
details the extent to which email messages may be read by others. Email is so pervasive in organizations that it requires its own specific policy. Most working professionals use email as their preferred means of corporate communications.
answer
email privacy policy
question
sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning.
answer
mail bomb
question
Simply states that email users will not send unsolicited emails (or spam).
answer
anti-spam policy
question
Antispamming approach by which the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
answer
Teergrubing
question
Outlines the corporate guidelines or principles governing employee online communications.
answer
social media policy
question
is the process of monitoring and responding to what is being said about a company, individual, product, or brand.
answer
Social media monitoring
question
a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand.
answer
social media manager
question
States explicitly how, when, and where the company monitors its employees.
answer
employee monitoring policy
question
tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed
answer
Workplace MIS monitoring
question
refers to a period of time when a system is unavailable. Unplanned downtime can strike at any time for any number of reasons
answer
Downtime
question
- financial performance - damaged reputation - revenue - other expense
answer
costs of downtime
question
is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
answer
Information security
question
are experts in technology who use their knowledge to break into computers and computer networks, either for profit or simply for the challenge.
answer
hackers
question
computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions w/o entering the office or organization that owns that network
answer
drive-by hacking
question
have criminal intent when hacking
answer
crackers
question
use computer tech against people to coeroce govts, individuals etc to attain religious or ideological goals
answer
cyberterrorism
question
philosophical, often deface website as a protest
answer
hactivist
question
find hacking code on the internet and click and point their way into systems to cause damage
answer
script kiddies
question
open a way into the network for future attack
answer
backdoor programs
question
floods a website w so many requests for service that it crashes
answer
denial of service attack (DoS)
question
attacks from multiple computers with so many requests for service that it crashes
answer
distributed denial of service attack (DDoS)
question
spreads itself not only from file to file but also from computer to computer. - do not need to attach to anything to spread and can tunnel themselves into computers
answer
worm
question
software written with malicious intent to cause annoyance or damage. If left can cause massive computer damage. -must attach to something, such as an executable file, to spread
answer
virus
question
change their form as they propagate
answer
polymorphic viruses and worms
question
inside other software, usually as an attachment or downloadable file
answer
trojan horse virus
question
process by which a user misleads a system into granting unauthorized rights, usually to compromise or destroy the system
answer
elevation of privilege
question
attack computer systems by transmitting a virus hoax with a real virus attached
answer
hoaxes
question
includes a variety of threats such as viruses, worms and trojan horses
answer
malicious code
question
consists of altering the content of packets as they travel over the internet or altering data on computer disks after penetrating a network
answer
packet tampering
question
a program or device that can monitor data traveling over a network
answer
sniffer
question
the forging of the return address on an email so that the message appears to come from somone other than the actual sender
answer
spoofing
question
fake blogs created solely to raise the search engine rank of affiliated websites
answer
splogs
question
software that comes hidden in free downloadable software that tracks online movements
answer
spyware
question
is a form of malicious software that infects your computer and asks for money
answer
ransomware
question
are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
answer
Insiders
question
hackers use their social skills to trick people into revealing access credentials or other valuable information
answer
social engineering
question
Looking through people's trash, another way hackers obtain information.
answer
Dumpster diving
question
identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days
answer
Information security policies
question
Details how an organization will implement the information security policies.
answer
Information security plan
question
are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.
answer
Destructive agents
question
technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
answer
phishing
question
masquerading attack that combines spam with spoofing. The perpetrator sends millions of spam emails that appear to be from a respectable company. The emails contain a link to a website that is designed to look exactly like the company's website.
answer
phishing expedition
question
a phishing expedition in which the emails are carefully designed to target a particular person or organization
answer
spear phishing
question
A phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information.
answer
Vishing
question
Reroutes requests for legitimate websites to false websites.
answer
Pharming
question
is a program that secretly takes over another computer for the purpose of launching attacks on other computers.
answer
Zombie
question
a group of computers on which a hacker has planted zombie programs
answer
zombie farm
question
Uses a zombie farm, often by an organized crime association, to launch a massive phishing attack.
answer
pharming attack
question
form of social engineering, individual lies to obtain confidential data about another individual
answer
pretexting
question
1. people: authentication & authorization 2. data: prevention & resistance 3. attacks: detection & response
answer
3 areas of information security
question
1. something the user knows: username or password 2. something the user has: token or smart cards 3. something that is part of the user: biometrics
answer
authentication & authorization
question
are small electronic devices that change user passwords automatically. The user enters his or her user ID and token-displayed password to gain access to the network
answer
tokens
question
is a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing
answer
smart card
question
is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting -voiceprint: set of measurable characteristics of a human voice that uniquely identifies an indiviual
answer
Biometrics
question
the traditional security process, which requires a user name and password
answer
single-factor authentication
question
requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).
answer
two-factor
question
requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)
answer
multi-factor
question
are computer viruses that wait for a specific date before executing their instructions.
answer
Time bombs
question
Occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information.
answer
Content filtering
question
scrambles information into an alternative form that requires a key or password to decrypt.
answer
Encryption
question
is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.
answer
Cryptography
question
is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.
answer
certificate authority
question
introduce by The National Institute of Standards and Technology (NIST) designed to keep government information secure
answer
advanced encryption standard (AES)
question
uses two keys: a public key that everyone can have and a private key for only the recipient
answer
Public key encryption (PKE)
question
is a data file that identifies individuals or organizations online and is comparable to a digital signature.
answer
digital certificate
question
hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings. If they are missing, the firewall prevents the information from entering the network. can even detect computers communicating with the Internet without approval.
answer
firewall
question
is an organized attempt by a country's military to disrupt or destroy information and communication systems for another country.
answer
cyberwar
question
is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals.
answer
Cyberterrorism
question
features full-time monitoring tools that search for patterns in network traffic to identify intruders.
answer
Intrusion detection software (IDS)
question
is a form of internet marketing that implements various social media networks in order to achieve marketing communication and branding goals. -social sharing of content, videos, and images for marketing purposes, as well as paid social media advertising.
answer
Social media marketing
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New