INFO Test #2 – Flashcards
Unlock all answers in this set
Unlock answersquestion
digital Darwinism
answer
implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.
question
disruptive technologies
answer
is a new way of doing things that initially does not meet the needs of existing customers. Disruptive technologies tend to open new markets and destroy old ones. typically enter the low end of the marketplace and eventually evolve to displace high-end competitors and their reigning technologies.
question
sustaining technology
answer
produces an improved product customers are eager to buy, such as a faster car or larger hard drive. Sustaining technologies tend to provide us with better, faster, and cheaper products in established markets. Incumbent companies most often lead sustaining technology to market, but they virtually never lead in markets opened by disruptive technologies.
question
internet
answer
is a massive network that connects computers all over the world and allows them to communicate with one another.
question
World Wide Web WWW
answer
provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML.
question
Hypertext markup language (HTML)
answer
links documents, allowing users to move from one to another simply by clicking on a hot spot or link.
question
Web browsers
answer
such as Internet Explorer or Mozilla's Firefox, allow users to access the WWW. used to correlate and disseminate info.
question
Hypertext transport protocol (HTTP)
answer
is the Internet protocol Web browsers use to request and display Web pages using universal resource locators.
question
domain name
answer
identifies the URL address apple.com
question
universal resource locator (URL)
answer
The address of a file or resource on the Web such as www.apple.com.
question
Web 1.0
answer
Refers to the World Wide Web during its first few years of operation between 1991 and 2003.
question
Ecommerce
answer
The buying and selling of goods and services over the Internet. Ecommerce refers only to online transactions.
question
Ebusiness
answer
Includes ecommerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real-time information. During Web 1.0, entrepreneurs began creating the first forms of ebusiness.
question
ebusiness advantages (5)
answer
1.) expanding global reach 2.) opening new markets 3.) reducing costs 4.) improving operations 5.) improving effectiveness
question
paradgim shift
answer
occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave. Ebusiness created a paradigm shift, transforming entire industries and changing enterprisewide business processes that fundamentally rewrote traditional business rules.
question
information richness
answer
refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information.
question
information reach
answer
measures the number of people a firm can communicate with all over the world. Buyers need information richness to make informed purchases, and sellers need information reach to properly market and differentiate themselves from the competition.
question
mass communication
answer
is the ability of an organization to tailor its products or services to the customers' specifications. For example, customers can order M&M's in special colors or with customized sayings such as "Marry Me."
question
personalization
answer
occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions. Amazon uses personalization to create a unique portal for each of its customers.
question
long tail
answer
referring to the tail of a typical sales curve. This strategy demonstrates how niche products can have viable and profitable business models when selling via ebusiness. In traditional sales models, a store is limited by shelf space when selecting products to sell.
question
intermediaries
answer
are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together.
question
disintermediation
answer
the introduction of ebusiness brought about disintermediation Occurs when a business sells direct to the customer online and cuts out the intermediary. This business strategy lets the company shorten the order process and add value with reduced costs or a more responsive and efficient service.
question
reintermediation
answer
steps are added to the value chain as new players find ways to add value to the business process. Levi Strauss originally thought it was a good business strategy to limit all online sales to its own website. A few years later, the company realized it could gain a far larger market share by allowing all retailers to sell its products directly to customers. As ebusiness matures it has become evident that to serve certain markets in volume, some reintermediation may be desirable.
question
cybermediation
answer
refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank.12
question
interactivity
answer
measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement. Interactivity measures are a giant step forward for advertisers, since traditional advertising methods—newspapers, magazines, radio, and television—provide few ways to track effectiveness. Figure 3.8 displays the ebusiness marketing initiatives allowing companies to expand their reach while measuring effectiveness.14
question
click stream data
answer
they can observe the exact pattern of a consumer's navigation through a site.
question
business model
answer
is a plan that details how a company creates, delivers, and generates revenues.
question
ebusiness model & 4 categories
answer
is a plan that details how a company creates, delivers, and generates revenues on the Internet. fall into one of the four categories: (1) business-to-business, (2) business-to-consumer, (3) consumer-to-business, and (4) consumer-to-consumer
question
Business-to-business (B2B)
answer
applies to businesses buying from and selling to each other over the Internet. Examples include medical billing service, software sales and licensing, and virtual assistant businesses. represent 80 percent of all online business and are more complex with greater security needs than the other types.
question
Business to Customer (B2C)
answer
applies to any business that sells its products or services directly to customers online. Carfax offers car buyers detailed histories of used cars for free.
question
eshop
answer
sometimes referred to as an estore. An online version of a retail store where customers can shop at any hour. or etailer. It can be an extension of an existing store such as The Gap or operate only online such as Amazon.com. There are three ways to operate as a B2C: 1.)brick-and-mortar, 2.)click-and-mortar, and 3.) pure play
question
Customer-to-Business (C2B)
answer
applies to any consumer who sells a product or service to a business on the Internet. One example is customers of Priceline.com, who set their own prices for items such as airline tickets or hotel rooms and wait for a seller to decide whether to supply them. The demand for C2B ebusiness will increase over the next few years due to customers' desire for greater convenience and lower prices.
question
Consumer-to-Consumer
answer
applies to customers offering goods and services to each other on the Internet. A good example of a C2C is an auction where buyers and sellers solicit consecutive bids from each other and prices are determined dynamically. eBay, the Internet's most successful C2C online auction website, links like-minded buyers and sellers for a small commission. Other types of online auctions include forward auctions where sellers market to many buyers and the highest bid wins, and reverse auctions where buyers select goods and services from the seller with the lowest bid.
question
Internet Service Provider (ISP)
answer
is a company that provides access to the Internet for a monthly fee. Major ISPs in the United States include AOL, AT, Comcast, Earthlink, and Netzero, as well as thousands of local ISPs including regional telephone companies.
question
real time communication
answer
occurs when a system updates information at the same rate it receives it. Email was a great advancement over traditional communication methods such as the U.S. mail, but it did not operate in real time.
question
...
answer
is a service that enables instant or real-time communication between people. Businesses immediately saw what they could do:
question
Instant messaging (Iming)
answer
Answer simple questions quickly and easily. Resolve questions or problems immediately. Transmit messages as fast as naturally flowing conversation. Easily hold simultaneous IM sessions with multiple people. Eliminate long-distance phone charges. Quickly identifying which employees are at their computers.
question
podcasting
answer
converts an audio broadcast to a digital music player. Podcasts can increase marketing reach and build customer loyalty. Companies use podcasts as marketing communication channels discussing everything from corporate strategies to detailed product overviews. The senior executive team can share weekly or monthly podcasts featuring important issues or expert briefings on new technical or marketing developments.
question
web conferencing or webinar
answer
blends videoconferencing with document sharing and allows the user to deliver a presentation over the Web to a group of geographically dispersed participants. Regardless of the type of hardware or software the attendees are running, every participant can see what is on anyone else's screen. Schools use Web conferencing tools such as Illuminate Live to deliver lectures to students, and businesses use tools such as WebEx to demonstrate products. Web conferencing is not quite like being there, but professionals can accomplish more sitting at their desks than in an airport waiting to make travel connections.
question
content magement systems (CMS)
answer
help companies manage the creation, storage, editing, and publication of their website content. CMSs are user-friendly; most include Web-based publishing, search, navigation, and indexing to organize information; and they let users with little or no technical expertise make website changes.
question
taxonomy
answer
is the scientific classification of organisms into groups based on similarities of structure or origin. Taxonomies are also used for indexing the content on the website into categories and subcategories of topics. For example, car is a subtype of vehicle. Every car is a vehicle, but not every vehicle is a car; some vehicles are vans, buses, and trucks. Taxonomy terms are arranged so that narrower/more specific/"child" terms fall under broader/more generic/"parent" terms.
question
information architecture
answer
is the set of ideas about how all information in a given context should be organized. Many companies hire information architects to create their website taxonomies. A well-planned taxonomy ensures search and navigation are easy and user-friendly. If the taxonomy is confusing, the site will soon fail.
question
challenges facing ebusiness
answer
1.) identifying limited market segments 2.)ensuring consumer protection 3.)managing consumer trust 4.) adhearing to taxation rules
question
advantages of web 2.0
answer
1.) content sharing through open sourcing 2.) user contributed content 3.) collaboration inside the organization 4.) collaboration outside of the organization
question
web 2.0
answer
is the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free. Business 2.0 encourages user participation and the formation of communities that contribute to the content. In Business 2.0, technical skills are no longer required to use and publish information to the World Wide Web, eliminating entry barriers for online business.
question
open system
answer
consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system. Thousands of hardware devices and software applications created and sold by third-party vendors interoperate with computers, such as iPods, drawing software, and mice.
question
source code
answer
contains instructions written by a programmer specifying the actions to be performed by computer software.
question
open source
answer
refers to any software whose source code is made available free (not on a fee or licensing basis as in ebusiness) for any third party to review and modify. Business 2.0 is capitalizing on open source software. Mozilla, for example, offers its Firefox Web browser and Thunderbird email software free. Mozilla believes the Internet is a public resource that must remain open and accessible to all; it continuously develops free products by bringing together thousands of dedicated volunteers from around the world. Mozilla's Firefox now holds over 20 percent of the browser market and is quickly becoming a threat to Microsoft's Internet Explorer. How do open source software companies
question
user contributed content or user generated content
answer
is created and updated by many users for many users. Websites such as Flickr, Wikipedia, and YouTube, for example, move control of online media from the hands of leaders to the hands of users. Netflix and Amazon both use user-generated content to drive their recommendation tools, and websites such as Yelp use customer reviews to express opinions on products and services. Companies are embracing user-generated content to help with everything from marketing to product development and quality assurance.
question
reputation system
answer
where buyers post feedback on sellers. eBay buyers voluntarily comment on the quality of service, their satisfaction with the item traded, and promptness of shipping. Sellers comment about prompt payment from buyers or respond to comments left by the buyer. Companies ranging from Amazon to restaurants are using reputation systems to improve quality and enhance customer satisfaction.
question
collaboration system
answer
s a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information. Business 2.0's collaborative mind-set generates more information faster from a wider audience.
question
collective intellegence
answer
is collaborating and tapping into the core knowledge of all employees, partners, and customers. Knowledge can be a real competitive advantage for an organization. The most common form of collective intelligence found inside the organization is knowledge management (KM)
question
knowledge management (KM)
answer
supports the capturing, organization, and dissemination of knowledge (i.e., know-how) throughout an organization. KMS can distribute an organization's knowledge base by interconnecting people and digitally gathering their expertise.
question
explicit knowledge
answer
consists of anything that can be documented, archived, and codified, often with the help of IT. Examples of explicit knowledge are assets such as patents, trademarks, business plans, marketing research, and customer lists.
question
tact knowledge
answer
is the knowledge contained in people's heads. The challenge inherent in tacit knowledge is figuring out how to recognize, generate, share, and manage knowledge that resides in people's heads.
question
crowdsourcing
answer
The most common form of collective intelligence found outside the organization is crowdsourcing The idea that collective intelligence is greater than the sum of its individual parts has been around for a long time
question
asnchronous communications
answer
Communication such as email in which the message and the response do not occur at the same time.,
question
synchronous communications
answer
Communications that occur at the same time such as IM or chat., or communications that occur at the same time such as IM or chat. Ask a group of college students when they last spoke to their parents. For most the answer is less than hour ago, as opposed to the traditional response of a few days ago. In business too, continuous connections are now expected in today's collaborative world.
question
social media
answer
refers to websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg
question
social network
answer
is an application that connects people by matching profile information. Providing individuals with the ability to network is by far one of the greatest advantages of Business 2.0.
question
social networking
answer
is the practice of expanding your business and/or social contacts by constructing a personal network Social networking sites provide two basic functions. The first is the ability to create and maintain a profile that serves as an online identity within the environment. The second is the ability to create connections between other people within the network.
question
social networking analysis (SNA)
answer
maps group contacts (personal and professional) identifying who knows each other and who works together. In a company it can provide a vision of how employees work together. It can also identify key experts with specific knowledge such as how to solve a complicated programming problem or launch a new product.
question
tags
answer
are specific keywords or phrases incorporated into website content for means of classification or taxonomy. An item can have one or more tags associated with it, to allow for multiple browseable paths through the items, and tags can be changed with minimal effort
question
social tagging
answer
describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search. The entire user community is invited to tag, and thus essentially defines, the content. Flickr allows users to upload images and tag them with appropriate keywords. After enough people have done so, the resulting tag collection will identify images correctly and without bias.
question
folksonomy
answer
is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system. Using the collective power of a community to identify and classify content significantly lowers content categorization costs, because there is no complicated nomenclature to learn. Users simply create and apply tags as they wish. For example, while cell phone manufacturers often refer to their products as mobile devices, the folksonomy could include mobile phone, wireless phone, smart phone, iPhone, BlackBerry, and so on. All these keywords, if searched, should take a user to the same site. Folksonomies reveal what people truly call things
question
website bookmark
answer
is a locally stored URL or the address of a file or Internet page saved as a shortcut.
question
social bookmarking
answer
allows users to share, organize, search, and manage bookmarks. Del.icio.us, a website dedicated to social bookmarking, provides users with a place to store, categorize, annotate, and share favorites. StumbleUpon is another popular social bookmarking website that allows users to locate interesting websites based on their favorite subjects. The more you use the service, the more the system "learns" about your interests and the better it can show you websites that interest you.
question
blog or web blog
answer
is an online journal that allows users to post their own comments, graphics, and video. Unlike traditional HTML Web pages, blog websites let writers communicate—and reader's respond—on a regular basis through a simple yet customizable interface that does not require any programming.
question
microblogging
answer
is the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages. The main advantage of microblogging is that posts can be submitted by a variety of means, such as instant messaging, email, or the Web.
question
Real Simple Syndication (RSS)
answer
is a Web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format. An RSS document or feed includes full or summarized text, plus other information such as publication date and authorship. News websites, blogs, and podcasts use RSS, constantly feeding news to consumers instead of having them search for it. In addition to facilitating syndication, RSS allows a website's frequent readers to track updates on the site.
question
wiki
answer
the word is Hawaiian for quick) is a type of collaborative Web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required. While blogs have largely drawn on the creative and personal goals of individual authors, wikis are based on open collaboration with any and everybody. Wikipedia, the open encyclopedia that launched in 2001, has become one of the 10 most popular Web destinations, reaching an estimated 217 million unique visitors a month
question
network effect
answer
describes how products in a network increase in value to users as the number of users increases. The more users and content managers on a wiki, the greater the network affect because more users attract more contributors, whose work attracts more users, and so on. For example, Wikipedia becomes more valuable to users as the number of its contributors increases.
question
mashup
answer
is a website or Web application that uses content from more than one source to create a completely new product or service. The term is typically used in the context of music; putting Jay-Z lyrics over a Radiohead song makes something old new. The Web version of a mashup allows users to mix map data, photos, video, news feeds, blog entries, and so on to create content with a new purpose.
question
application programming interface (API)
answer
Content used in mashups is typically sourced from an application programming interface (API) which is a set of routines, protocols, and tools for building software applications. A programmer then puts these building blocks together.
question
mashup editors
answer
are WYSIWYG, or What You See Is What You Get tools. They provide a visual interface to build a mashup, often allowing the user to drag and drop data points into a Web application.
question
challenges of business 2.0
answer
technology dependence information vandalism violations of copyright and plagiarism
question
semantic web
answer
as a component of Web 3.0 that describes things in a way that computers can understand. The semantic Web is not about links between Web pages; rather it describes the relationships between things (such as A is a part of B and Y is a member of Z) and the properties of things (size, weight, age, price).
question
egovernment
answer
involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government. One example of an egovernment portal, FirstGov.gov, the official U.S. gateway to all government information, is the catalyst for a growing electronic government. Its powerful search engine and ever-growing collection of topical and customer-focused links connect users to millions of Web pages, from the federal government, to local and tribal governments,
question
mobile business
answer
The ability to purchase goods and services through a wireless Internet-enabled device. (or mbusiness, mcommerce .
question
pirated software
answer
is the unauthorized use, duplication, distribution, or sale of copyrighted software.
question
counterfeit software
answer
is software that is manufactured to look like the real thing and sold as such.
question
information management
answer
examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
question
information governance
answer
is a method or system of government for information management or control
question
information compliance
answer
is the act of conforming, acquiescing, or yielding information.
question
ediscovery
answer
or electronic discovery refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
question
epolicies
answer
are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
question
name the epolicies (6)
answer
1.) ethical computer use policy 2.) information privacy policy 3.) acceptable use policy 4.) email privacy policy 5.) social media policy 6.) workplace monitoring policy
question
ethical computer use policy
answer
contains general principles to guide computer user behavior. For example, it might explicitly state that users should refrain from playing computer games during working hours. This policy ensures the users know how to behave at work and the organization has a published standard to deal with infractions. For example, after appropriate warnings, the company may terminate an employee who spends significant amounts of time playing computer games at work.
question
information privacy policy
answer
which contains general principles regarding information privacy. Visa created Inovant to handle all its information systems including its coveted customer information, which details how people are spending their money, in which stores, on which days, and even at what time of day.
question
acceptable use policy (AUP)
answer
requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet. Not using the service as part of violating any law. Not attempting to break the security of any computer network or user. Not posting commercial messages to groups without prior permission. Not performing any nonrepudiation. ----nonrepudiation
question
nonrepudiation
answer
is a contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions. A nonrepudiation clause is typically contained in an acceptable use policy.
question
internet use policy
answer
contains general principles to guide the proper use of the Internet. Because of the large amounts of computing resources that Internet users can expend, it is essential that such use be legitimate. Describes the Internet services available to users. Defines the organization's position on the purpose of Internet access and what restrictions, if any, are placed on that access. Describes user responsibility for citing sources, properly handling offensive material, and protecting the organization's good name. States the ramifications if the policy is violated.
question
email privacy policy
answer
details the extent to which email messages may be read by others. Email is so pervasive in organizations that it requires its own specific policy. Most working professionals use email as their preferred means of corporate communications. Defines legitimate email users and explains what happens to accounts after a person leaves the organization. Explains backup procedure so users will know that at some point, even if a message is deleted from their computer, it is still stored by the company. Describes the legitimate grounds for reading email and the process required before such action is performed. Discourages sending junk email or spam to anyone who does not want to receive it. Prohibits attempting to mail bomb a site. Informs users that the organization has no control over email once it has been transmitted outside the organization.
question
social media policy
answer
outlining the corporate guidelines or principles governing employee online communications. Employee online communication policy detailing brand communication. Employee blog and personal blog policies. Employee social network and personal social network policies. Employee Twitter, corporate Twitter, and personal Twitter policies. Employee LinkedIn policy. Employee Facebook usage and brand usage policy. Corporate YouTube policy.
question
information technology monitoring
answer
racks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed
question
employee monitoring policy
answer
stating explicitly how, when, and where the company monitors its employees. Several common stipulations an organization can follow when creating an employee monitoring policy include:
question
information security
answer
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization. Information security is the primary tool an organization can use to combat the threats associated with downtime.
question
black hat hackers
answer
break into other people's computer systems and may just look around or may steal and destroy information
question
crackers
answer
have criminal intent when hacking
question
cyberterrorists
answer
seeks to cause harm to people or destroy critical systems or information and use the internet as a weapon of mass destruction
question
hactivists
answer
have philosophical and political reasons
question
script kiddies or script bunnies
answer
find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses
question
white hat hackers
answer
work at the request of the system owners to find system vulnerabilities and plug the holes
question
virus
answer
s software written with malicious intent to cause annoyance or damage.
question
adware
answer
s software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
question
spyware
answer
is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission. collect specific data about the user, ranging from general demographics such as name, address, and browsing habits to credit card numbers, Social Security numbers, and user names and passwords.
question
insiders
answer
are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident. For example, many individuals freely give up their passwords or write them on sticky notes next to their computers, leaving the door wide open for hackers.
question
social engineering
answer
hackers use their social skills to trick people into revealing access credentials or other valuable information
question
information security policies
answer
identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days.
question
information security plan
answer
details how an organization will implement the information security policies. The best way a company can safeguard itself from people is by implementing and communicating its information security plan. Applications allowed to be placed on the corporate network, especially various file sharing applications (Kazaz), IM software, and entertainment or freeware created by unknown sources (iPhone applications). Corporate computer equipment used for personal reason on personal networks. Password creation and maintenance including minimum password length, characters to be included while choosing passwords, and frequency for password changes. Personal computer equipment allowed to connect to the corporate network. Virus protection including how often the system should be scanned and how frequently the software should be updated. This could also include if downloading attachments is allowed and practices for safe downloading from trusted and untrustworthy sources.
question
phishing
answer
is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
question
pharming
answer
reroutes requests for legitimate websites to false websites. For example, if you were to type in the URL to your bank, pharming could redirect to a fake site that collects your information.
question
authentication
answer
is a method for confirming users' identities. Once a system determines the authentication of a user, it can then determine the access privileges (or authorization) for that user.
question
authorization
answer
the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space. Authentication and authorization techniques fall into three categories; the most secure procedures combine all three: 1.Something the user knows, such as a user ID and password. 2.Something the user has, such as a smart card or token. 3.Something that is part of the user, such as a fingerprint or voice signature.
question
tokens
answer
are small electronic devices that change user passwords automatically. The user enters his or her user ID and token-displayed password to gain access to the network.
question
smart cards
answer
is a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing. Smart cards can act as identification instruments, a form of digital cash, or a data storage device with the ability to store an entire medical record.
question
biometrics
answer
(narrowly defined) is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting. Unfortunately, biometric authentication can be costly and intrusive
question
three areas of information security
answer
1.) People-- authentication and authorization 2.) Data-- prevention and resistance 3.) Attacks-- detection and response
question
data prevention and resistance
answer
content filtering encryption public key encription certificate authority digital certificate firewall antivirus software
question
attack: detection and response
answer
intrusion detection software
question
content filtering
answer
occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information. Organizations can use content filtering technologies to filter email and prevent emails containing sensitive information from transmitting, whether the transmission was malicious or accidental. It can also filter emails and prevent any suspicious files from transmitting such as potential virus-infected files. Email content filtering can also filter for spam, a form of unsolicited email.
question
encryption
answer
scrambles information into an alternative form that requires a key or password to decrypt. If there were a security breach and the stolen information were encrypted, the thief would be unable to read it. Encryption can switch the order of characters, replace characters with other characters, insert or remove characters, or use a mathematical formula to convert the information into a code.
question
public key encryption (PKE)
answer
uses two keys: a public key that everyone can have and a private key for only the recipient The organization provides the public key to all customers, whether end consumers or other businesses, who use that key to encrypt their information and send it via the Internet. When it arrives at its destination, the organization uses the private key to unscramble it.
question
certificate authority
answer
is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.
question
digital certificate
answer
is a data file that identifies individuals or organizations online and is comparable to a digital signature.
question
firewall
answer
is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings. If they are missing, the firewall prevents the information from entering the network. Firewalls can even detect computers communicating with the Internet without approval.
question
antivirus software
answer
scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware. Antivirus software must be frequently updated to protect against newly created viruses.
question
intrusion detection software (IDS)
answer
eatures full-time monitoring tools that search for patterns in network traffic to identify intruders. IDS protects against suspicious network traffic and attempts to access files and data. If a suspicious event or unauthorized traffic is identified, the IDS will generate an alarm and can even be customized to shut down a particularly sensitive part of a network. After identifying an attack, an MIS department can implement response tactics to mitigate the damage.
question
MIS infrastructure
answer
which includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets. A solid MIS infrastructure can increase reduce costs, improve productivity, optimize business operations, generate growth, and increase profitability.
question
hardware
answer
consists of the physical devices associated with a computer system
question
software
answer
is the set of instructions the hardware executes to carry out specific tasks. In today's business environment, most hardware and software is run via a network.
question
network
answer
is a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate. As more companies need to share more information, the network takes on greater importance in the infrastructure. Most companies use a specific form of network infrastructure called a client and server network.
question
client
answer
is a computer designed to request information from a server.
question
server
answer
is a computer dedicated to providing information in response to requests. A good way to understand this is when someone uses a Web browser (this would be the client) to access a website (this would be a server that would respond with the Web page being requested by the client).
question
enterprise architect
answer
is a person grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business. Firms employ enterprise architects to help manage change and dynamically update MIS infrastructure.
question
MIS infrastructure components
answer
Information MIS infrastructure (Support Opperations) Agile MIS Infrastructure (Support change) Sustainable MIS Infrastructure (supports sustainability)
question
Supporting Operations: information MIS infrastructure
answer
identifies where and how important information, such as customer records, is maintained and secured. 1.) backup 2.) recovery 3.) disaster recovery 4.) business continuity planning
question
Supporting the environment: sustainable MIS infrastructure
answer
identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption. 1.) accessibility 2.) availability 3.) maintainability 4.) portability 5.) reliability 6.) scalability 7.) usability
question
Supporting change: Agile MIS infrastructure
answer
includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals. 1.) grid computing 2.) cloud computing 3.) virtualization
question
backup
answer
is an exact copy of a system's information.
question
recovery
answer
is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup.
question
fault tolerence
answer
is the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service. For example, fault tolerance enables a business to support continuous business operations if there is a power failure or flood. Fault tolerance is an expensive form of backup, and only mission-critical applications and operations use it.
question
failover
answer
a specific type of fault tolerance, occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to the secondary server or backup server. This is a high-speed and high-cost method of backup and recovery.
question
failback
answer
occurs when the primary machine recovers and resumes operations, taking over from the secondary server.
question
backup and recovery plan
answer
backup recovery fault tolerence failover failback
question
disaster recovery
answer
able to recover information or systems in the event of a catastrophic disaster such as a fire or flood
question
business continuity planning
answer
creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruptions
question
disaster recovery plan
answer
which is a detailed process for recovering information or a system in the event of a catastrophic disaster. This plan includes such factors as which files and systems need to have backups and their corresponding frequency and methods along with the strategic location of the storage in a separate physical site that is geographically dispersed. A company might strategically maintain operations in New York and San Francisco, ensuring that a natural disaster would not impact both locations. A disaster recovery plan also foresees the possibility that not only the computer equipment but also the building where employees work may be destroyed
question
hot site
answer
is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.
question
cold site
answer
is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.
question
warm site
answer
is a separate facility with computer equipment that requires installation and configuration.
question
disaster recovery cost curve
answer
charts (1) the cost to the company of the unavailability of information and technology and (2) the cost to the company of recovering from a disaster over time. the best recovery plan in terms of cost and time is where the two lines intersect. Creating such a curve is no small task. Managers must consider the cost of losing information and technology within each department or functional area, and across the whole company.
question
business continuity planning (BCP)
answer
which details how a company recovers and restores critical business operations and systems after a disaster or extended disruption. This plan includes such factors such as identifying critical systems, business processes, departments, and the maximum amount of time the business can continue to operate without functioning systems. The plan will even detail the order in which functional areas should be restored, ensuring the most critical are focused on first.
question
accessibility
answer
refers to the varying levels that define what a user can access, view, or perform when operating a system. Imagine the people at your college accessing the main student information system. Each person that accesses the system will have different needs and requirements; for example, a payroll employee will need to access vacation information and salary information, or a student will need to access course information and billing information.
question
administrator access
answer
or unrestricted access to the entire system. Administrator access can perform functions such as resetting passwords, deleting accounts, and shutting down entire systems.
question
availability
answer
...
question
high availability
answer
...
question
maintainability or flexability
answer
efers to how quickly a system can transform to support environmental changes. For example, when starting a small business you might not consider that you will have global customers, a common mistake. When building your systems, you might not design them to handle multiple currencies and different languages, which might make sense if the company is not currently performing international business. Unfortunately, when the first international order arrives, which happens easily with ebusiness, the system will be unable to handle the request because it does not have the flexibility to be easily reconfigured for a new language or currency. When the company does start growing and operating overseas, the system will need to be redeveloped, which is not an easy or cheap task, to handle multiple currencies and different languages.
question
portability
answer
refers to the ability of an application to operate on different devices or software platforms, such as different operating systems. Apple's iTunes is readily available to users of Mac computers and also users of PC computers, smart phones, iPods, iPhones, iPads, and so on. It is also a portable application.
question
reliability (or accuracy)
answer
ensures a system is functioning correctly and providing accurate information. Inaccuracy can occur for many reasons, from the incorrect entry of information to the corruption of information during transmissions. Many argue that the information contained in Wikipedia is unreliable.
question
scalability
answer
describes how well a system can scale up, or adapt to the increased demands of growth. If a company grows faster than anticipated, it might experience a variety of problems, from running out of storage space to taking more time to complete transactions. Anticipating expected, and unexpected, growth is key to building scalable systems that can support that development.
question
performance
answer
measures how quickly a system performs a process or transaction. Performance is a key component of scalability as systems that can't scale suffer from performance issues. Just imagine your college's content management system suddenly taking five minutes to return a page after a button is pushed.
question
capacity planning
answer
determines future environmental infrastructure requirements to ensure high-quality system performance. If a company purchases connectivity software that is outdated or too slow to meet demand, its employees will waste a great deal of time waiting for systems to respond to user requests.
question
usability
answer
is the degree to which a system is easy to learn and efficient and satisfying to use. Providing hints, tips, shortcuts, and instructions for any system, regardless of its ease of use, is recommended.
question
Moore's Law
answer
which refers to the computer chip performance per dollar doubles every 18 months. Although Moore originally assumed a two-year period, many sources today refer to the 18-month figure.
question
three pressures driving sustainable MIS infrastructures
answer
1.) increased electronic waste 2.) increased energy consumption 3.) increased carbon emissons
question
grid computing
answer
is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem. With grid computing a problem is broken into pieces and distributed to many machines, allowing faster processing than could occur with a single system.
question
smart grid
answer
delivers electricity using two-way digital technology. It is meant to solve the problem of the world's outdated electrical grid, making it more efficient and reliable by adding the ability to remotely monitor, analyze, and control the transmission of power.
question
cloud computing
answer
refers to the use of resources and applications hosted remotely on the Internet. The term comes (at least in part) from the image of a cloud to represent the Internet or some large networked environment.
question
utility computing
answer
offers a pay-per-use revenue model similar to a metered service such as gas or electricity. Many cloud computing service providers use utility computing cloud infrastructures,
question
infrastructure as a Service (IaaS
answer
is a service that delivers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenue model. With IaaS the customer rents the hardware and provides its own custom applications or programs. IaaS customers save money by not having to spend a large amount of capital purchasing expensive servers, which is a great business advantage considering some servers cost more than $100,000.
question
dynamic scaling
answer
which means the MIS infrastructure can be automatically scaled up or down based on needed requirements.
question
software as a Service (SaaS)
answer
delivers applications over the cloud using a pay-per-use revenue model.
question
Platform as a Service (PaaS)
answer
supports the deployment of entire systems including hardware, networking, and applications using a pay-per-use revenue model. PaaS is a perfect solution for a business as it passes on to the service provider the headache and challenges of buying, managing, and maintaining Web development software. With PaaS the development, deployment, management, and maintenance is based entirely in the cloud and performed by the PaaS provider, allowing the company to focus resources on its core initiatives.
question
virtualization
answer
creates multiple "virtual" machines on a single computing device. A good analogy is a computer printer. In the past you had to purchase a fax machine, copy machine, answering machine, and computer printer separately. This was expensive, required enough energy to run four separate machines, not to mention created additional amounts of ewaste.
question
data center
answer
is a facility used to house management information systems and associated components, such as telecommunications and storage systems. Data centers, sometimes referred to as server farms, consume power and require cooling and floor space while working to support business growth without disrupting normal business operations and the quality of service.