MCS2020 U of G

¡Supera tus tareas y exámenes ahora con Quizwiz!

CIO

Chief Information Officer This is an executive position that involves strategic planning and management of technology. The main goal here is to align information technology use and planning with the organization's overall objectives. In other words, this person is the bridge connecting business and technology forces within the organization.

CKO

Chief Knowledge Officer This person is responsible for designing and implementing information systems that allow people within the organization to share, re-use, and distribute information. CKOs help the business capture and capitalize on its less tangible information assets. By providing repositories for information, procedures for storing information, and tools for sharing information, the CKO can greatly improve workflow and avoid knowledge loss in the organization.

CPO

Chief Privacy Officer This person ensures that the company collects and uses information in an ethical and legal manner. Typically, CPOs are trained as lawyers and have extensive knowledge of consumer law and the collection of personally identifiable information (PII).

CSO

Chief Security Officer This person is responsible for ensuring the security of the company's information technology infrastructure and information assets. The CSO implements policies, procedures and safeguards to combat external threats (hackers, malware) and internal threats (unauthorized access by employees).

CTO

Chief Technology Officer This person is responsible for the performance and reliability of technology (hardware and software) within the organization. The primary concern for the CTO is to make sure that all systems are performing efficiently - servers and systems should be fully operational and fully functioning. In high-tech organizations, the CTO may have less to do with the information infrastructure and more to do with overseeing the development of new technologies. As such, they may be heavily involved in the organization's Research & Development activities.

Clickstream Analysis

Clickstream refers to the path a user takes while browsing a website. Not surprisingly, when you analyze enough user behaviour, patterns start to emerge. Based on the data you glean from clickstream analysis organizations may be able to redesign their websites to maximize profit and increase usability. The problem with clickstream analysis is that the data is usually anonymous. Unless users are required to log into the website first, it is difficult to determine the type of user on the end of the mouse making clicks. As a result, clickstreams can provide useful data but only by aggregating it (i.e. by pooling every visitor's behaviour).

Servers vs. Clients

Clients request info from other machines (servers) and servers provide requested services.

Search Engines

Collects information indiscriminately (whatever it can find is collected) Collects information inconsistently Information selection is automated by search engine applications Information falls into lists; organized according to search engine preferences (e.g. most recent, most frequent, etc.) Designed for searching (though browsing is possible) Facilitates serendipity through non-linear associations (e.g. hypertext links)

Directories

Collects predetermined categories of information (e.g. name, phone number, etc.) Collects information consistently Humans play an active role in selecting and editing information Information falls into categories; organized according to accepted conventions (e.g. alphabetical order, numerical order, etc.) Designed for browsing (though search is possible) Facilitates serendipity by placing related information in close proximity.

Parts of CC license

Commons Deed: legal contract in plain language Legal Code: full legal language behind the license Digital Code: metadata = code that gets attached to your creative works so that computers understand the rights attached to your creation.

Confidentiality

Confidentiality means that you can conduct your affairs while your identity remains protected.

Electronic Data Interchange

...

Executive Support Systems / Executive Information Systems

...

Experiments

...

Focus Groups

...

Hotspot

...

Identity Theft

...

Info Characteristics

...

Robot Exclusion Protocol

...

Sample vs. Population

...

Sniffer

...

Subscription data vs. Transaction data

...

Surveys

...

Transaction Processing Systems

...

Web Cookies

...

Index

list

Blogs.

Blogs are essentially online web journals.

Probabilistic

Focuses on facts and specific events

(Lack of) Information scarcity

Info not scarce - info overload, attention scarce

Identity

combination of characteristics by which someone or something is known.

Noise

info that interferes with the original msg also missing info

Dynamic Content

pages that don't exist until the user submits a search query

Data Brokering

practice of selling information about individual citizens

E-commerce payment systems

...

Info Navigation

...

Infringement

...

Internet Advertising

...

Invisible web / Deep web

...

Keywords

...

Legacy systems

...

Management Information Systems

...

Pervasive computing / ubiquitous computing

...

Probability sampling vs. Non-probability sampling

...

Public Domain

...

Access management

(administer passwords to employees, block users from restricted areas of the system)

Reverse engineering

(disassemble competitor's products to learn trade secrets)

Request for Tender / Request for Proposals

(manage process for suppliers to bid for our business and special projects)

Rule of Change

(sometimes called the "slippery slope"). This approach says that if an action cannot be taken repeatedly, it is not right to take at all. In other words, if you can't steal repeatedly then you shouldn't start stealing. For example, if you start compromising with small transgressions (like taking office supplies) you may be tempted toward larger transgressions (like embezzling money).

Feedback

+'ve -> move forward with information processing -'ve -> alter channel or msg

Applications

...

Bandwidth

...

Bias

...

Click Through

...

Commercial use

...

Consequences

...

Customer profiling

...

Customer visits / Face-to-face

...

Cyber terrorism

...

Decision Support Systems

...

Demographic profiles vs. Behaviour profiles

...

Destructive code / malware

...

Duty

...

E-commerce Models

...

Batch Processing

1957 - computers worked on one thing at a time

Division of Technical Expertise

: when organizations combine their member reservoir with their tool reservoir, they can more easily determine which employees should operate which technologies

GIS

A geographic information system (GIS) **map potential locations for expansion** is a database that connects information to geography and data to location. In other words, a GIS can help you connect what is happening to where it is happening, allowing you to add another dimension (location) to your data analysis. Originally, GIS was a tool for geographers and environmental researchers, but recently businesses have begun to incorporate GIS applications. Businesses use GIS for: Market analysis. What area will support a new store? Why is the new location not performing? Site selection. Where is the trade area? Where should I locate a new store? Customer analysis. Where are the best customers? Are there more like them? Logistical routing. What is the most efficient route for delivery trucks?

Mash-ups.

A mash-up describes when someone takes two Web 2.0 services and uses the Application Programming Interfaces (API) to mix them together.

When evaluating the quality of information...

Accuracy - information is based on correct and complete data Timeliness - information arrives before it is needed Relevancy - information is related to the topic Sufficiency - information provides necessary detail to meet the need Cost effective - information is worth the cost to produce it

Basic Types of RFID

Active and Passive Tags

Advanced Research Projects Agency (ARPA)

Advanced research projects agency, formed in US in 1957. developed reliable system called ARPANET used as a test case for networking

Processor

Always completing tasks and making things work together ex. butler

Vannevar Bush and the Memex

American engineer introduced memex

What is RFID

An RFID system is different than the barcode system. In the barcode system every product has a universal product code (UPC), but with the RFID system every unit has a unique tag. This means that instead of simply knowing that a box of Cap'n Crunch cereal has been purchased, you would know exactly which box of Cap'n Crunch was purchased. The rich data provided by RFID means that you can track when that box arrived the store, when it was put on the shelf, how long it sat on the shelf, how long it sat in the customer's cart, etc. This kind of data can be analyzed to identify real-world consumer patterns or highlight inefficient internal processes. RFID is becoming an increasingly popular business strategy it's used to track shipments (e.g. Wal-Mart), track parts around large warehouses (e.g. Toyota), track missing items (e.g. beer companies track missing kegs), and decrease the number of out-of-stock products (e.g. grocery stores).

Extranet

An extranet is in-between the fully available public Internet and a privately secured intranet. Extranets are private networks that use common Internet protocol, but they extend access to users outside the organization. Typically, extranets are used in business-to-business environments when different companies need to collaborate and share information.

How Does Radio Frequency Identification Work?

As you might suspect, Radio frequency identification (RFID) networks use radio frequencies to transfer information. In business, RFID is most often used as a system to track the movement of items across a supply chain. Here's how it works: Each item that you want to keep track of receives a "tag." This tag consists of two basic parts: A microchip that contains detailed information about the item An antenna for transmitting that information to nearby RFID readers. As the item moves around the supply chain or within the warehouse, its location is automatically updated by strategically placed RFID readers Data from the readers is sent wirelessly to the information system that updates the item location.

Drucker: productive knowledge work demands:

Asking the question: "What is the task?" Knowledge workers should focus on the information needs. Accepting responsibility for productivity. Knowledge workers should be given the autonomy to manage themselves. Focusing on innovation. Knowledge workers should recognize that their work informs the innovation process. Learning continuously. Knowledge workers should expect to have to learn on the job. Emphasizing quality. Knowledge workers should be measured on the quality of their output more than the quantity. Treating knowledge work as an asset. Knowledge workers should be viewed as integral to business success - not as a cost of doing business.

ACRL

Association of College and Research Libraries (ACRL) defines the following five standards for information literacy in learning environments. The information literate individual: Determines the nature and extent of the information needed. Accesses the needed information effectively and efficiency. Evaluates information and its sources critically and incorporates selected information into his or her knowledge base and values system. Uses information effectively to accomplish a specific purpose. Understands many of the ethical, legal and socio-economic issues surrounding information and information technology.

Emulation

Emulation reproduces the look and feel of previous systems, but those systems are already outdated - so organizations may need to constantly create new emulators.

six possible licenses creative commons

Attribution Non-commercial No derivatives: This license lets people use your work, but they can't modify it, can't make money from it, and must acknowledge you. Attribution Non-commercial Share Alike: This license lets people modify your work as long as they agree to let their version be modified by others; however, the work cannot be used for commercial purposes, and it must acknowledge you. Attribution Non-commercial: This license lets people modify your work and protect their modifications as they see fit, but they can't use it to make money and they must acknowledge you. Attribution No Derivatives: This license lets others copy, distribute, display, and perform only verbatim copies of your work, not derivative works based upon it - and they must acknowledge you. This license also permits commercial activity. Attribution Share alike: This license allows others to distribute modified versions of your work, but their modifications must also be licensed for modification. Attribution: This license allows others to modify or resell your work as long as they acknowledge you and your work in the process.

3 basic strategies for protecting information systems

Authentication and authorization. Confirm that people trying to access the system are who they say they are. Prevention and resistance. Use firewalls to filter traffic and keep unauthorized users from accessing the system. Detection and response. Use anti-virus software to scan media devices and incoming packets to reduce the risk of picking up malicious code.

Bluetooth

Bluetooth Basically, Bluetooth is like Wi-Fi but for personal use - it allows you to connect your devices remotely and eliminates the need for cables or cords. For example, Bluetooth headsets enable people to talk on a cell phone while the phone is tucked away. Since Bluetooth technology operates with lower power requirements, it works well for portable devices. But Bluetooth is also available on objects like personal computers that may not be "portable" - but they need to talk to cordless devices (e.g. mouse, keyboard, microphone, etc.).

All rights reserved vs. Some rights reserved

Copyright vs. Creative Commons

Program-data independence

Databases separate the data from the application or program used to manipulate the data. This means that when you update the software application, the data remains unaffected. For example, when the Internet Movie Database (IMDb) changes the layout of its pages, or the functionality of its search engine, it doesn't affect the underlying data itself.

Nick Carr

IT so common that no longer enables competitive advantage you can only gain an edge when you have something that other's don't have standardization of technology means that all of the players share the same advantage

CRM

Customer Relationship Management **systems to track contact with customers** One of the primary information systems used in business is the Customer Relationship Management system. As you might suspect, the purpose of the CRM is to manage relationships with customers. Well-designed CRMs enable companies to: Differentiate customer treatment according to individual preferences Anticipate customers' unspoken needs Add a human element to the purchase (by referencing information from past encounters) Ultimately, a CRM helps the company move from providing a great product or a great service, to providing a great experience too. Usually CRMs consist of an operational component and an analytical component which work together to increase loyalty and profitability in the corporation. The operational side of the CRM deals with areas where contact with the customer occurs. The analytical CRM is the behind-the-scenes data that is meant for analysis by managers. Ideally, the CRM enables an organization to recognize consumer trends early and refine business processes accordingly.

Disadvantages of internet publishing

Cutting out the "gatekeepers of the knowledge production process may ultimately lead to lower quality information (no one to check the facts), higher quantities of irrelevant information, and more biased perspectives. Clearly, we need our information literacy and technological competency standards more than ever.

Data

Data can exist in any form of observation (think of the environment where you are right now - if you're too hot or too cold, you don't need someone to tell you that, you can just feel it)

Improved data quality & accessibility

Databases can be used by many users simultaneously. For example, visitors to IMDb can be viewing Daniel Craig's actor page while IMDb staff writers are adding new information behind the scenes.

Enforcement of standards

Databases can enforce rules for data creation and modification. When people are entering data into the database they can be required to collect and submit the same pieces of information. For example, when a new movie gets added to the IMDb, certain details must be included (e.g. title of the movie, name of the director, actors, genre, etc.). Additionally, databases can enforce that the data always follow the adopt the same conventions (e.g. the plot summary can only be 150 words, the movie can only fall into three genres, etc.)

Improved data consistency & sharing

Databases enable you to present information according to consistent standards (common look and feel). For instance, on the IMDb each actor page follows the same basic format. Databases also provide a more seamless method of sharing information. For example, while the IMDb is constantly reviewing, updating and correcting their content, they also have a spot where visitors can contribute their feedback (ratings and comments) on the movies in the database.

Minimal data redundancy

Databases reduce the need to keep multiple copies of the same thing. Minimal data redundancy means that storage space isn't wasted and that only the most current information is on file (reduces the possibility of conflicting information). For example, if you wanted to access the database page for the cult classic, Office Space (http://www.imdb.com/title/tt0102578/) you could use the search function on the website, or you could browse for it using various categories (Comedy, Movies from 1991, Alphabetically, etc.). Regardless, each of those routes ends up at the single page for Office Space.

Metadata

Digital Code - code that gets attached to digital creative works so that computers can also understand the rights attached to your creation

Disruptive Technology

Disruptive technology improves products or services in radical ways. Often these improvements are entirely unexpected and unanticipated by the market. At first, these technologies are inferior to the more mature technology preferred by the market, so they are not immediately adopted; however, as the technology improves a significant market develops and the new technology eventually overtakes the old.

ERM

Employee Relationship Management (ERM) This information system is like a Customer Relationship Management system, but it focuses on the relationship between the employees and the company. This system is often used in Human Resources to keep track of training, compensation, recruiting and career management of employees.

Efficiency vs. Effectiveness.

Efficiency is all about the measuring the performance of a system - it's about productivity metrics. To test efficiency metrics, information systems are often measured against optimal performance levels in a process known as benchmarking. Effectiveness is more about evaluating the impact of the technology and information systems - it's about quality metrics

ERP

Enterprise Resource Planning (ERP) The ERP is an information system which attempts to integrate all resources and information functions into a single I.T. system - or at the very least a set of integrated systems. Consolidating information systems may seem like the silver bullet for information management issues, because it eliminates redundancies, and improves information sharing; however, implementing an ERP can be a difficult undertaking (incompatible systems, different data formats, legacy systems, etc.). The core components of most ERPs include: Accounting and financial data, production and materials data, and human resources data. A highly functioning ERP will automate information sharing within the organization and provide and enterprise-wide information management solution.

Social Media

Entire communities are developing around rich media sites.

Signal triangulation

Even if your cell phone does not have GPS capabilities, your location can be roughly determined by the cell phone towers that relayed your call.

Rise of the Amateur

Extremism. Opinions tend to become more extreme because the value system is constantly reinforced by other group members. Myopic focus. Groups focus on their favourite topics and lose sight of the bigger picture. Imitation. Groups often imitate previous decisions and fail to conduct due diligence or investigate other potential choices. Division. When differences of opinion occur, groups often form factions and may eventually split into separate groups. Homogeneity. Diverse groups perform better, yet diversity can be uncomfortable to the community.

3 Functions of Databases

First users need to be able to enter data. Second, users should be able to query or search for data. The third function is that users should be able to generate reports from the data.

Differences between Westinghouse model and Vickery Model

First, Westinghouse could take a pragmatic approach and eliminate any confusing parts or downplay some unpopular features. By simplifying the message, they can reach a broader audience. Second, Westinghouse could take the semantic approach and tweak the advertisement so that it has a more appealing message. For example, they could strengthen their message about how this product will improve relationships. Third, Westinghouse could take a technical approach and compare features with competitors. This strategy would help counter messages from opponents and try to set the record straight about their new television.

Reduced program maintenance

Generally, databases require less day-to-day maintenance than other systems of organization. When you make one change in the database it is replicated across the whole system. With proper data backup procedures and archiving the chance of losing data forever is slim.

Salami Slicing

Hackers break into a financial system and install applications that allow them to take small bits of money from multiple accounts and deposit them into a single account

Info Overload

Having too much information to make a quality decision and Receiving too much information to stay informed about a topic

Granularity

Granularity describes the level of detail in a given piece of information. If something has coarse granularity, then it is highly summarized information. If something has fine granularity, then it has more detail. This distinction is particularly important when you're trying to compare data. Ideally, you want to be comparing information with the same level of detail.

Problems with Carr's theory

IT creates new opportunities ignores human factors - people who know how to use IT effectively

Steps in Knowledge Creation

Idea is born. Author composes her thoughts on a topic and writes a coherent argument. Idea is refined. Author submits her piece to a series of "information gatekeepers" (editors and reviewers) who provide feedback. The original piece is tweaked based on the reviewers' commentary. Idea is published. Once the draft suitable for publication, it is handed to a publisher and published in an appropriate format (book, journal, magazine, etc.). Idea is organized. Published work is described and categorized (by librarians, indexers, etc.) and is organized into existing knowledge systems. Idea is distributed. Published work becomes accessible to a broader readership through the publisher's distribution channels (e.g. direct sales, book stores, etc.).

Privacy: Balance

If everyone had total anonymity our society could devolve into complete anarchy. if we had complete identifiability (no anonymity at all) individuals would feel exposed and may choose to censor opinions to avoid undue retribution

Security: The Balance

If we focus too much on keeping society secure, then authorities may be tempted to abuse their power. But if we ignore security concerns, then individuals might be tempted to abuse their freedom and take the law into their own hands.

Wireless-fidelity (Wi-fi).

If you use a wireless connection, your traffic and approximate location can be determined by the network access point where you connected to the Internet.

Immediacy

Immediacy refers to the proximity of the information to the actual event it describes. Primary information has been witnessed and collected first hand (high immediacy). For example, interacting with a customer, or generating daily transaction data on every sale would be considered primary information. Secondary information is an edited first-hand account (low immediacy). For example, the minutes of a board meeting, or financial summaries of sales numbers might be considered secondary information. Typically, secondary information has been filtered and summarized for the intended audience.

Creative Commons

designed to restore the balance that appears to be missing in current practices related to intellectual property. It is designed to be a more reasonable approach to copyright because it puts control in the hands of the original creator. Instead of reserving all rights, Creative Commons allows the creator to reserve some rights.

Digital Rights Management

digital property rights protection scheme. uses encryption to enforce copyright

Explicit Knowledge

easily articulated and shared. Since the focus of explicit knowledge is codifying (expressing) content, it is by far the most common type of knowledge

Conflicting signals + Missing Signals for Info, Technology, and People

Information Conflicting Signals Receiver splits focus between multiple sources of information. Missing Signals Message neglects to include necessary details (e.g. timelines, performance expectations, etc.) Technology Conflicting Interference from other messages traveling on the network (especially true for wireless transmissions). Missing Transmission errors in the technology lose important packets of information, potentially dropping the connection. People Conflicting Receiver has preconceived biases - new information clashes with personally held beliefs. Missing Receiver possesses inadequate knowledge needed to interpret the message.

Information vs. Information Record

Information refers to the content or message (e.g. the content in the textbook) and the information record refers to the carrier or container of that message (e.g. the physical book itself). The traditional view is that information can be given away and retained at the same time, while the container either be kept or given away. Interestingly, the digital world is starting to blur the line between information and the information record. For example, the container of an MP3 song would be the digital code - but in the digital world you can give this container to your friend and keep it for yourself.

The Hacker Ethic

Information should be free (from cost). They believed that information should be freely exchanged - particularly raw programming code. Hackers were always trying to improve things so they expected unlimited access to the binary code and supplementary information that would help them do so. Information should be free (from control/ownership). Hackers knew that if organizations started to control or own information, then the open nature of the Internet would be compromised. They felt that computing technology would help make the world a better place, but only if it wasn't heavily restricted. Information should be free (from restriction/censorship). Hackers felt that all information should be available - nothing should be off-limits. Authorities should be limited in their ability to determine what information the people can have.

Digital Millennium Copyright Act (DMCA)

first attempt to adapt intellectual property legislation for the digital age

Golden Rule

It asks you to treat others as you would like to be treated. While this is a great guiding principle for interpersonal relationships, it may not adequately cover the complexities of the business environment.

LAN

Local Area Network (LAN) - computers are connected within a geographically limited area. For example, the computers in the library would be on a LAN.

3 key issues with location privacy

Location information is collected pervasively. Most GPS devices (including phones) regularly check in with satellites, continually marking the real-time location of the owner. Location information is collected silently. In public it is difficult to know when our location information is being recorded. In some cases, we know it's being recorded, but there is little we can do about it. Location information is collected inexpensively. Collecting location information is built into the technology and the costs of storing are minimal.

Location Services

Location services - information providers can deliver relevant local information based on the user's current location.

Lumping vs. Splitting

Lumping - when we group info together based on similar attributes Splitting - process of separating info and recombining it according to a more specific set of criteria.

M-Commerce

M-commerce (mobile commerce) describes the ability to conduct electronic commerce activities with mobile devices (cell phones, laptops, MP3 players, etc.). As consumers purchase more of these devices and the infrastructure (e.g. mobile networks) improves, m-commerce becomes a viable channel for new business. There are many potential m-commerce applications; here is a small sample: Mobile advertising - companies can beam coupons and special advertising straight to the mobile devices of nearby customers. Mobile banking - customers can pay bills, check account balances, and transfer money via their mobile device. SMS purchasing - customers can pay bills, feed a parking meter, or transfer money via Short Message Service (text messaging). Location services - information providers can deliver relevant local information based on the user's current location. Wireless purchasing - mobile customers can make purchases via online stores or participate in online auctions. M-commerce applications are fairly common in other parts of the world (e.g. Europe, South Korea, etc.), but they have been slower to catch on in North America; however, it is only a matter of time before we adopt more m-commerce habits. It seems that the smart phones in our pockets are drawing us closer to the world of pervasive computing (sometimes called ubiquitous computing). This is a future in which every object we own - even "dumb" appliances like refrigerators - has a processor and is plugged into a global network.

M2A

Measure to analyze (M2A) metrics are used to understand trends. They might examine web use patterns, or help explain changes in existing Measure to Control metrics. For example, M2A metrics might indicate why sales numbers for a particular product are declining. Typically, M2A metrics answer more difficult questions (e.g. Who? Why? Where?). These types of metrics incorporate both qualitative and quantitative data. In a web context, M2A metrics might measure: referring web sites, exit pages (where do people leave your site?), why consumers abandon their shopping carts, click paths, etc.

M2C

Measure to control (M2C) analysis is used to monitor business or customer value. In business terminology, M2C metrics are often called Key Performance Indicators (KPI) because they focus on how well the organization is meeting its predetermined goals; as a result, M2C metrics usually adopt a quantitative approach (How much? How many? How often?). In a web context, M2C metrics might measure things like: number of visitors, percentage of visitors who make a purchase, most popular pages, percentage of people who use a coupon, etc.

Argote and Ingram "Reservoirs"

Members: each company has a unique group of employees with expertise, experience and "know-how." Think of this as the organization's social network - information flows organically between members Tools: each company has a unique combination of technology to accomplish its goals (software, hardware, machinery) Tasks: each company has a set of unique routines and operating procedures that determine how to conduct business (best practices, standard routines, etc.) They also argue that when you combine these primary areas you get an additional three areas: Division of Labour: Division of Technical Expertise: Division of Technology:

MAN

Metropolitan Area Network (MAN) - computers are connected over a geographic region that is bigger than a LAN but smaller than a WAN. For example, a university might use a MAN to connect all of the smaller LANs on campus.

Migration

Migration moves the data into current formats, but requires an unbroken string of migrations with each new technology upgrade.

Mobile Advertising

Mobile advertising - companies can beam coupons and special advertising straight to the mobile devices of nearby customers.

Mobile Banking

Mobile banking - customers can pay bills, check account balances, and transfer money via their mobile device.

Advantages of Online Knowledge Creation

More efficient knowledge distribution. The Internet acts as both the medium for the information and the distribution channel for the message. Dissemination is not restricted to limited distribution channels or paper-based formats. New knowledge representation. Digital information enables authors to create new types of knowledge products and services (video, animation, audio, etc.). Shortened information production timeline. Authors can bypass gatekeepers and publish directly online, enabling the audience to consume the information more quickly.

Explicit

Msgs are clearly expressed and readily observable

Implicit

Msgs are implied, metaphors, similes,

The Database Management System

is the software manages the data. Note here that the software and the data are separate in this model. Typically, Database Management Systems are run by database administrators - or someone who knows a lot more about the nuts and bolts of a given system.

National Science Foundation (NSF)

National Science Foundation built high speed network to connect its research centres

Non-deterministic

Not based on history

2 kinds of software

Operating System + Software Programs

4 main reasons that the digital divide should be a concern for many not-for-profit, public sector, or business organizations

Organizations need to access new markets. Organizations need access to new skills. Organizations may lose competitive advantage. Organizations should be committed to social responsibility.

Information Economy

Organizations or individuals who acquire, analyze, and act on available information generate more advantageous opportunities for themselves than their competitors

Personal Information Management

PIM argues that since individuals are the decision making agents within an organization, then information management is ultimately a personal responsibility. In essence, it is not the organization's responsibility to teach you what you need to know, it's your responsibility to know what you need to know. Should a situation arise when you don't know what you need to know, you have to figure out how to learn it.

Accessibility: The Balance

the information angle and the technology angle. Citizens should have the right to access the information they need - no matter how controversial it is. And citizens should have the means or technology required to get to the information they want. Again, we can argue that accessibility requires balance.

Gutenburg: Printing Press Revolution

PRINTING PRESS ERA Breakthrough developments in communication First one-to-many communications medium - authors had a way to communicate with the masses Changes in Knowledge Production Knowledge was reproduced exactly and mechanically (instead of using scribes) - publishers became the "gatekeepers" of knowledge production Changes in Knowledge Distribution and Accessibility Printing and publishing made more copies of existing knowledge available, driving the costs of reproduction even lower and increasing the audience Changes in Knowledge Preservation The printed record made the existing knowledge base more stable, ushering in the Scientific Revolution. Changes in Knowledge Retrieval Innovations in writing and organization (indexes, classification schemes, references, etc.) directed scholars to related information. INTERNET ERA Breakthrough developments in communication First many-to-many communications medium - the masses have a way to communicate with each other Changes in Knowledge Production Individuals can be publishers and consumers of information, bypassing the gatekeepers of information production Changes in Knowledge Distribution and Accessibility The Internet doesn't increase the copies of existing knowledge; it increases the number of paths to that knowledge - the masses have access to everything online. Changes in Knowledge Preservation The ease of knowledge production creates an explosion of available information, but preserving it all remains a challenge. Changes in Knowledge Retrieval Hypertext enables dynamic linking to related material - search engines expand functionality and automate the retrieval process.

PRM

Partner Relationship Management (PRM) Although use varies by industry, this information system allows companies to properly manage their partners and resellers. Working effectively with the right companies and representatives can help companies expand into new markets. For example, a sporting goods manufacturer might partner with a series of regional sales representatives (and pay commission fees) rather than hire an entire sales force.

3 moral rights of copyright

Paternity, Integrity, and Association.

Information systems

People, Technology, and Info most tend to focus on info and technology forget about people employs technology (hardware, software, applications) to manipulate info, and leverage the talents of people in pursuit of an objective **help us solve problems.

PAN

Personal Area Network (PAN) - devices are connected within a very small area (within a few metres). For example, a computer with a wireless mouse and wireless keyboard would be part of a PAN.

PIPEDA

Personal Information Protection and Electronic Documents Act Accountability. Organizations must protect information in their possession and appoint someone to oversee privacy matters (e.g. Privacy Officer). Even when information is transferred to a third party, privacy of individuals must be protected. Identifying Purposes. Organizations must clearly state why they are collecting the information and the reasons should be as narrowly defined as possible. Consent. Individuals must give consent to the organization to collect personal information. Permission can be given through an explicit statement (e.g. checking a box on a web form) or through implicit behavior (e.g. handing over your credit card to make a purchase). Limiting collection. Organizations cannot collect information though deception. There must be a purpose behind the information gathering, it cannot happen indiscriminately. Limiting use. Organizations can only keep the information as long as it is necessary to fulfill the original purpose. Guidelines for the disposal of information (or the procedures under which information is made anonymous) should be established. Accuracy. Organizations have an obligation to ensure that the information is current and correct and limit the amount of duplication. Safeguards. Organizations should provide adequate security to protect the information they collect (e.g. secure databases with passwords, restrict physical access to data centres, etc.). More sensitive information requires greater safeguards. Openness. Organizations must make privacy policies readily available to employees and customers. Individual access. Individuals can request to access their personal information and have a right to challenge any information collected about them. Organizations have 30 days to provide the information. Challenging compliance. Individuals or government bodies can challenge an organization's compliance and commitment to these principles. Failure to uphold PIPEDA can result in fines.

AIIP + AITP

The Association of Independent Information Professionals (AIIP) Code of Ethics The Association of Information Technology Professionals (AITP) Code of Ethics Ensure accuracy and reliability. Members should be precise in what they do and reliable in how they do it. Respect confidentiality. Members will encounter sensitive information and should treat it accordingly. Recognize intellectual property rights. Members should properly compensate the owners of the information and avoid using unauthorized information. Follow the rules of access. Members should not circumvent the systems, policies, or procedures to get information. Recognize your obligations. Members should recognize their obligations to employers, to fellow members and to society as a whole.

Digital Natives

Prefer receiving information quickly from multiple multimedia sources. Prefer parallel processing and multitasking. Prefer random access to hyperlinked multimedia information. Prefer to interact/network simultaneously with many others. Prefer to learn "just-in-time." Prefer instant gratification and instant rewards.

Digital Immigrants

Prefer slow and controlled release of information from limited sources. Prefer singular processing and single or limited tasking. Refer to provide information linearly, logically, and sequentially. Prefer to work independently rather than network and interact. Prefer to learn "just-in-case." Prefer deferred gratification and deferred rewards.

WiFi

Wireless Fidelity (Wi-Fi) Wireless data transfer refers to a series of standards (802.11) established by the IEEE (Institute for Electrical and Electronics Engineers) that enables information to travel using infrared or radio signals. Most wireless devices can operate in two modes: Infrastructure mode (by far the most common) where the access points are connected to a local area network (e.g. the U of G wireless network) Ad-hoc mode (for small scale uses) - wireless devices connect to each other but not to a broader network A wireless access point in a public space is known as a hotspot. For example, the campus features hotspots in many of the buildings, which enable students to roam around campus while still connected to the Internet.

Surveillance

Purposeful. There is an ultimate objective (usually protection of property or people) Routine. It is conducted regularly and on schedule (not randomly). Systematic. It is planned and coordinated. Detailed. It is focused on individual behaviour.

Wireless Purchasing

Wireless purchasing - mobile customers can make purchases via online stores or participate in online auctions.

Wisdom

Wisdom extrapolates everything we know into broader principles. It is a non-probabilistic undertaking because it is not concerned with predicting the future based on past events. Trusting your instincts may not be the traditional view of "wisdom," but it can be described as non-probabilistic and non-deterministic behaviour.

SMS Purchasing

SMS purchasing - customers can pay bills, feed a parking meter, or transfer money via Short Message Service (text messaging).

SEO

Search Engine Optimization companies hire web consultants to improve their search engine ranking. SEO works because consultants try to "game" or tweak the key components of a website to take advantage of the search engine's algorithm.

Time Sharing

Share processing power of one computer with multiple users (first)

Management Information Systems (The "Geeks")

The MIS department (sometimes simply called "I.T.") is responsible for the planning, implementation, and maintenance of the organization's technology infrastructure. They deal with operational issues of the systems used to acquire, process, and store information. Typical responsibilities include: Access management (administer passwords to employees, block users from restricted areas of the system) Data preservation (back up information systems, archive files, recover data in the event of system failure) Data maintenance (maintain databases and systems of information, update network security) Maintain web systems (manage server load and bandwidth usage; administer email systems and web-accessible databases) Technical support (troubleshoot tech problems, install software upgrades, provide software patches)

Social networks

Social networks allow people to build communities and share information very easily

Source/Origin

Source refers to the individual, group or organization that first created the information. Internal information is information that has been created by and is shared within the organization (and organizations generate a lot of this type of information). External information is created outside the organization, but it also impacts the organization in some way. For organizations, both internal and external sources need to be integrated into the appropriate Decision Support Systems that we discussed last week.

Hardrive

Stores all of the things you need for later ex. your basement

Porter's Five Forces

Supplier Power Buyer Power Competitive Rivalry Threat of Substitution Threat of New Entry

SRM

Supplier Relationship Management (SRM) This information system allows companies to evaluate and analyze supplier performance (pricing, business goals, geographic coverage, expertise, etc.). It also helps companies choose appropriate suppliers to work with. For example, a consumer electronics manufacturer might use an SRM to manage relationships and grade the performance of suppliers of key electrical components.

SCM

Supply Chain Management (SCM) ** systems to handle company inventory** A supply chain includes all of the parties involved in the creation and delivery of a product or service. It consists of suppliers who provide raw materials, internal assembly lines which manufacture goods, and logistics departments responsible for delivering the product. The supply chain management system is the information technology which coordinates all of this activity. Typically, coordination happens at 3 levels: Inbound - materials flow from suppliers (and their upstream suppliers) Internal - goods are assembled or manufactured using the organization's production processes Outbound - finished product is delivered to the customer A high-functioning supply chain management system should deliver increased efficiency, better inventory management, along with better coordination and communication among companies.

Sustaining Technology

Sustaining technology improves products or services in incremental ways. Generally speaking these technologies do not upset the existing market. Most companies focus on delivering this type of innovation. Occasionally sustaining technologies are unexpected - and when that happens they're called "revolutionary" or "discontinuous" innovations. However, they should not be confused with disruptive technologies. Revolutionary technologies are new ways of doing something, but they do not fully replace the previous way. Cell phones, for example, have the capability of making mobile calls, but they have not completely replaced more traditional landline telephones. When the technology is completely expected by the market it is called "evolutionary" because it signifies the slow steps of progress. Many advances in information technology follow this incremental path. Central Processing Units (CPUs), for instance, are able to offer faster and faster processing power for our computers, but this type of innovation is entirely expected by the industry.

Symbols

Symbols provide the absolute foundation of our ability to create, transmit, and receive information. They can be simple (letters of the alphabet), complex (elements of a schematic diagram), controversial (political iconography like the Nazi swastika), or relatively innocuous (telephone symbol). In a business context, corporate logos might be considered symbols, because you can't really "speak" a logo (you can say "Yahoo!" but you can't say it in a way that duplicates the company's trademarked purple font and exclamation point). While there are entire fields devoted to studying symbols and their meanings (semiotics), for our purposes the analysis of symbols is an interesting side note - we want to get to data.

Intellectual Property: The Balance

The "western" view of intellectual property has always placed the creator at the centre. According to this view intellectual property is an individual right and flows from individual creative efforts; therefore, creative works should be owned by creator. In contrast, the "eastern" view of intellectual property places more emphasis on the commons. According to this view, intellectual property is a social and collective exercise. The creator is merely a conduit through which the creative spirit of society is manifested; therefore, the creation should belong to the people more than to an individual.

Public Relations (The "Public Face")

The PR department manages relationships with people and organizations that are external to the corporation. Typical responsibilities include: Customer service (answer customer questions on order status and product use; provide web help via corporate website) Complaint management (handle dissatisfied customers, product recalls) Media relations and press releases (manage relationships with media and investors)

Accounting and Finance (The "Numbers" People)

The accounting department handles the operational (day-to-day) financial information, including: Budgeting (quantify goals for revenue and expenses; track progress of the budget) General ledger (manage assets, liabilities, equity, accounts receivable, accounts payable) Cash management (manage inflows and outflows of cash; seek external financing when needed) The finance department is responsible for more strategic financial issues (longer term). Their task is to increase the value of the business through sound financial practices. Responsibilities include: Financial reporting (provide financial information for investors, creditors, governments, etc.) Business analysis (help with pricing analysis, improve business efficiencies) Treasury management (manage earnings, stock dividends, long-term financing)

Application Software

The application software enables users to add, modify and retrieve data. Basically, these applications work with the database management system to manipulate the primary data files.

Risk Aversion principle

The approach here evaluates the cost of the decision (financial or otherwise), and chooses whichever option will produce the least amount of risk. This approach works well in organizational contexts, but it can be fairly conservative.

Global Positioning Systems.

The satellite system that provides turn-by-turn directions to drivers is now embedded in smart phones and other mobile devices.

Decentralization

to avoid breakdown during a nuclear attack a decentralized network architecture had to be developed which in case of loss of a node would still be operative

True anonymity is difficult because....

The ease of dissemination. Information can be spread quickly and easily - especially over the Internet. Those unflattering comments you made about your co-worker in a recent email can be easily forwarded to the entire staff. The persistence of information. Information doesn't easily disappear in a network world. Every company archives their data. The information you deleted from Facebook two months ago is still backed up somewhere on one of Facebook's servers. Your past follows you because information systems don't forget.

3 Components of Databases

The first component is an entity. An entity is something that you collect data about. The second component is the attribute. Attributes are the individual pieces of information that might describe an entity. And the third component is a record. A record is a collection of related attributes that are used to describe one particular entity.

When trying to find info, always consider...

The intended audience - who is the information for? The scope and coverage - what are the limitations of the information? The currency - when was the information published? The authority/credibility of the source - who wrote/published the information? The level of objectivity - is the information supported with evidence?

Vickery Information Transfer Model

The model of information transfer (or the model of communication) that I like is called the Vickery Information Transfer Model. Here is the first part of the model (without the feedback loops). Starting on the left you've got the "S" which stands for sender. That sender sends a message (or the "M(S)"). The message is received and you see it on the diagram as "M)." The information from that message is added to the knowledge state of the receiver. So "K(1)" is the knowledge state of the receiver as they receive the message. If that information impacts the receiver, then the receiver moves to knowledge state two or a new knowledge state. If the information that the receiver receives is not new information, then the receiver never actually makes it to a new knowledge state. Because the information from the message didn't actually add anything to their lives. The first feedback loop compares the current knowledge state with the information received in the message. If the receiver, or the audience, doesn't gain anything new from the advertisement, then the receiver never gets to the new knowledge state and, ultimately, the company fails to deliver its message. The second feedback loop deals with the channels between the message sent and the message received. In other words, maybe Westinghouse didn't reach its target audience because those particular people just don't read the Saturday Evening Post. The third feedback loop deals with the message itself. If the receiver somehow received a different message than the one Westinghouse intended, then Westinghouse needs to alter the message that was sent in the first place.

Association

The moral right of association grants the author the right to refuse that his work be associated with an undesirable organization or cause. For example, if you took a great picture and saw that it was used on a white supremacy website, you could request that it be taken down.

Integrity

The moral right of integrity grants the author the right to object to any adaptation of her work that harms the original intent. This means that if someone was making a film based on a book, but the author of the book didn't like the film version, she could claim that the film violated her moral rights.

How can knowledge transfer be measured

The organization demonstrates increased performance and productivity levels. The organization increases its knowledgebase and raises its level of expertise.

Trademark

The purpose of a trademark is to point to the original owner of the product or service. Basically, it designates the source of something and they're granted on a first-come-first-served basis. Do not expire

What do Sales and Marketing Promoters do?

The sales department is responsible for selling the company's products or services - with the obvious goal to increase sales. Typical responsibilities include: Customer management (maintain list of contacts, credit status, past-orders) Lead tracking (identify potential customers; expand the market) Sales forecasting (project sales figures; monitor sales by individual, by territory, by region) The marketing department is responsible for overall promotion of the company's goods or services. It supports the sales efforts through: Promotions & advertising (create and assess advertising, sales channels, marketing strategy) Special event planning (product launches, celebrity sponsorship, etc.) Campaign management (contests, giveaways, media purchases)

Knowledge

The thing to remember about knowledge is that it is deterministic process. Everything we "know" is determined by occurrences that happened before and those events led to a particular insight. Simply put: there is a cause behind every effect.

No Free Lunch rule

This approach assumes that nothing is free. When you imagine that everything is owned by someone else, you choose to compensate the rightful owner fairly. This approach works in organizational contexts, but it tends to be used primarily for intellectual property matters.

Format

There are many ways to divide information according to format. For instance, you could think of different file extensions as an indication of format (.pdf, .docx, .pptx, .mov, .psd). In this case, I think the most interesting distinction in terms of format is analog or digital. Analog information is a continuous data stream where everything happens (and is recorded) in sequence. Digital information is a discontinuous data stream where information is broken down into binary format (computer language).

Passive Tags RFID

These tags don't transmit information unless there is a reader present. In this case, the reader sends out a signal and the tag simply responds (like an echo). The reader picks up the response and feeds the location information to the information system. Since passive tags are not self-powered their range is much shorter.

Active Tags RFID

They are called active tags because they are always "on." The tag is powered by an internal battery, which means that it is always transmitting its location information. Since these tags are self-powered they usually work at a greater range. Highway transponders, like the ones used on Highway 407 in Ontario, are one common application of active RFID.

Database Management Systems - Disadvantages

They can require specialized personnel (database administrators, designers, coders) to build, maintain and archive important company data They can be costly to install - initial costs are very expensive and maintenance costs can be high too They can be complex to manage (there are always exceptions to accommodate and anticipate in the database design) They need to be backed up regularly and covered by appropriate data recovery policies (risk of data loss is high without these procedures in place)

Operations Management (The "Doers")

This department (sometimes called production management) is responsible for the production, manufacture, and assembly of the company's goods or services. Often this department is sub-divided into smaller departments like Procurement, and Logistics. Operations Management responsibilities include: Inventory management (manage and control inventory levels) Quality management (manage health and safety issues for employees and customers; products must conform to industry standards) Planning (organize schedule for production equipment, personnel, facilities, etc.) Maintenance and repair (maintain production equipment, facilities) The Logistics department is typically responsible for all transportation matters including: Delivery of goods or services Supply chain management (handle timing of delivery, product shortages, payment schedules) Fleet maintenance (ensure that the vehicles are fit to deliver products) The Procurement (or Purchasing) department is responsible for acquiring the goods and services that the company needs to produce its products or conduct its business activities. This department would be responsible for: Supplier relations (identifying new suppliers, perform background checks on suppliers, negotiate pricing, repeat orders from existing suppliers) Requests for Tender / Requests for Proposal (manage process for suppliers to bid for our business and special projects) Testing and assessment (ensure that goods received meet industry standards, assess relationships with suppliers)

Research and Development (The "Scientists")

This department is concerned with developing new products and ideas for the marketplace. In many corporations, R&D activities are cloaked in secrecy. Responsibilities in R&D include: Managing intellectual property (protecting the corporation's patents and trade secrets) Innovative product development (create new products and materials for market; tackle organization's unsolved problems) Prototyping and design (test new product ideas for customer acceptance and industry standard specifications) Research (monitor industry developments, trends, scientific research, academic literature) Reverse engineering (disassemble competitor's products to learn trade secrets)

Human Resources (The "People" People)

This department is responsible for all matters related to the organization's personnel. Responsibilities would include: Recruiting new employees (job postings, resume processing, interviewing, hiring, firing) Compensation (payroll, vacation, health benefits, retirement plans, stock options, employee plan contributions) Assessment (job descriptions, job requirements, performance evaluations) Development and training (development programs for employees, training classes) Complaint management (harassment complaints, union grievances) Strategic personnel planning (organizational standards, salary ranges, future requirements for employee skills)

Radio Frequency Identification

This technology is used to track vehicles on toll highways, and has been implemented in security passes, credit cards, and US passports.

Black hat vs. White hat vs. Greay hat

White hat: experts who test info systems to ensure that they are secure Black hat: attack info systems with intent of committing a crime Grey Hat: Bit of both

WAN

Wide Area Network (WAN) - computers are connected across geographically dispersed regions. For example, the Internet would be considered a worldwide WAN.

Wikis

Wikis allow people to contribute content to a webpage without having to know any HTML coding.

Efficiency Metrics

Throughput - how much information can the system handle? Response time - how fast does the system respond to user interaction? Availability (Uptime) - how many hours is the system available for use? Accuracy - does the system produce the same results when executing the same transaction? Security - does the system keep out unwanted intruders?

TCP

Transmission Control Protocol verification of file transfer shared language and rules

Effectiveness Metrics

Usability - how easy it is for people to use the system? User satisfaction - how satisfied the users are with the system? Conversion rate - how many first time visitors are persuaded to purchase? Return on investment - does the system contribute value to the organization? Cost-benefit analysis - is the system worth the cost of development and maintenance?

Corporate espionage

When competitive intelligence goes too far tends to be more targeted information gathering. It's usually focused on trying to gather specific information, like details from the competition's research and development department. There is a distinct attempt to find private or sensitive information that is not yet well-known within the industry. Companies have been known to hack into competitors' networks, dig through garbage, and even install listening devices in corporate boardrooms.

Evolutionary technologies

When the technology is completely expected by the market it is called "evolutionary" because it signifies the slow steps of progress. Many advances in information technology follow this incremental path

Participation: The Balance

When you have a gatekeeper you have bottlenecks and the potential for censorship, but you also have higher quality information. When you remove the gatekeeper you empower the people to create and contribute, but you open the floodgates to misinformation.

Value activity

business process

Zombies Botnets

Zombie: infected computer Botnet: collection of zombie machines, can be instructed to commit any number of requests

Social Bookmarking

a great way to have access to your favourite websites from anywhere and it is a great way of sharing your bookmarks with the public.

info poverty

a lack of info and a lack of the means to get essential info

Memex

a repository for key pieces of info, but it was also organized and mechanized in such a way that it could retrieve the info easily. Like having your own personal library at your fingertips

Protocol

a shared set of rules an procedures. TCIP Transmission Control Protocol/ Internet Protocol provided instructions to computers for tranmitting and transferring info TCP manages disassembling/reassembling of packets IP establishes the connection between computers

Conflict of interest

a situation in which a person, such as a public official, an employee, or a professional, has a private or personal interest sufficient to appear to influence the objective exercise of his or her official duties." If you look at this definition you'll see three key points: An individual has a personal private interest. The private interest conflicts with his/her professional duty. The conflict interferes with professional judgement.

Worm

can be programmed to destroy data, more often use to to open up back door access into affected user's system

DARPANET

accelerate knowledge transfer, and avoid dubling up of existing research

Corporate Intelligence

an ongoing business process designed to assist with decision making.

Computer ethics

analysis of the nature and social impact of computer tech and the corresponding formulation and justification of policies for the ethical use of such technology.

Price elasticity modeling

analyzing customer data to help optimize pricing and maximize profits

Social Engineering

any activity where hacker misrepresents himself to get what he needs

Data mining

applies sophisticated statistical models to aggregated data in order to predict consumer behaviour

Cyberstalking

arassment conducted via info tech

Overload cycle

as we become overwhelmed with information we develop a lack of desire to learn (don't have time); we have a greater tolerance for error (work is "good enough"); we create poor search strategies (whatever is easiest); we contribute superficial analysis (believe everything we read); and, we are unable to differentiate between details and the big picture; we develop overconfidence in our own abilities

Ted Nelson and hypertext

attempted to put bush's idea in practice. invented hypertext , a protocol that enabled users to jump from one document to another (h in http)

Attention Economy

attention is a combination of how much time you devote to something, as well as how many brain cells you devote to something.

Primary Key

attribute that uniquely identifies each record database will not function properly unless there is a primary key for every single entity in the database.

Deterministic

based on (or determined by) things that have happened before (antecedents). Knowledge is a deterministic process

Detection and response

be vigilant and test regularly for malicious code and malware

Database

collection of data that has been organized to facilitate collecting, searching, and retrieving info

Pseudonymity

conducting affairs under an assumed

Utilitarian Principle / Teleological

consequence based system

Patent Trolls

consist mainly of lawyers who buy promising patents and then charge others to use their ideas or sue companies who are potentially infringing on their ideas. According to the patent system these types of companies are perfectly legitimate, but views on patent trolls vary widely.

Trade Secrets

consist of confidential info to is essential to ops of an organization. counts as intellectual property, is covered by the law

Communication

cross between info and technology leads to info sharing leads to shared meaning leads to community building leads to identity forming *com is at core of our identity

Dignity Principle

employees should acknowledge the dignity of all people, promoting human rights and preventing abuses

Citizenship Principle

employees should act as responsible citizens, obeying all applicable laws and regulations

Fiduciary Principle

employees should be diligent and loyal, promoting company's legitimate long-term interests

Responsiveness Principle

employees should be responsive to concerns and complaints raised about company activities, protecting the public interest

Transparency Principle

employees should conduct business in a truthful manner, refraining from deceptive practices

Fairness Principle

employees should engage in free and fair competition, avoiding discrimination with all stakeholders

Reliability Principle

employees should honour all commitments, fulfilling obligations to key stakeholders

Property Principle

employees should protect company assets (intellectual and physical) and respect the property rights of competitors

Trojan Horse

enter's user's system under the guise of a useful program ,but is performing a number of unsavoury tasks under the surface

# basic concepts of databases

entities, attributes, and records entity - something you collect data about attribute - info about an entity record - collection os related attributes

Combination

explicit to explicit explicit info is synthesized with other explicit info

Internalization

explicit to tacit learning by doing

Here be monsters

explorers in the sixteen century admission of fear - we're afraid of this area, you should be too acknowledgment of ignorance - we don't know what's here. We're missing information

Denial of Service (DoS) Attack

flood server with so many requests it can't tell which is legitimate and which is fake. data isn't destroyed, but crippling effect of thousands of simultaneous requests means that requested data cannot be delivered

Info Literacy

focuses on info. describes ability to recognize when info is needed and have the ability to locate, evaluate, and use effectively the needed information

deontological ethics

focuses on the action themselves and their motivators

Free Speech and Censorship

freedom of speech means that citizens have the right to speak freely without fear that their opinions will be censored and that citizens won't be persecuted for sharing their opinions

Hierarchy

generally utilize parent-child relationships to structure info

Egoism

goism is diametrically opposed to the Golden Rule because it stems from personal self-interest. According to egoism, you weigh decisions based on the impact they will have on your personal well-being. Again, this approach favours individual ethical behaviour, so it may not be robust enough for a business environment.

Taxonomy

group, or classify, content based on similar attributes

Data Diddling

hackers use remote computers to penetrate security and break into an info system

Phreaking

hacks committed against telephone networks. scamming free long distance calls, impersonating operator services, cloning cell phones

Tacit Knowledge

harder to articulate - which makes it even harder to share. One of the main problems with tacit knowledge is it is unique to individuals (and their own experience or expertise). Tacit knowledge manifests itself in practice - we choose to behave in certain ways because of our unique tacit knowledge of a situation.

Paternity

he moral right of paternity grants the author the right to have her name published with the work, pseudonymously or anonymously. In other words, the original creator can always be connected to the work - even if the economic rights are sold.

Understanding

he process we use to take the new knowledge we encounter and mash it up with our existing knowledge - or our old knowledge. First, understanding is an interpolative process which means it makes connections between concepts. It takes various points of data and tries to discover relationships and meaning among them. Second, understanding is a probabilistic exercise, meaning that it looks at the likelihood that an event will occur again. It recognizes information patterns in an attempt to predict or anticipate what will happen next.

Interpolative

helps us connect ideas

Kant's categorical imperative

if an action is not right for everyone to take, then it is not right for anyone

Knowledge Spiral

imagine knowledge production happening in four basic ways: tacit to tacit, explicit to explicit, tacit to explicit, and explicit to tacit

Packet Switching

in order to avoid congestion of the lines the sent files were divided onto smaller packets which were put together again at the receiver

Info Transfer

information requires human interaction to have meaning. First, We need a source. We need someone who is going to send a message. We need to know where the information comes from. Second, we need a channel or medium through which that message will travel. And lastly, we need a destination for the message.

Aggregation

is about combining similar things into a (mostly) homogenous group

Clayton Christensen

known for grouping technology into two basic categories: disruptive and sustaining. From a business perspective, it is important to identify the disruptive innovations in the market so you don't get left behind (even large companies can miss important technology trends). Since technologies are often combined with business strategy before they have a transformational impact on the market, Christensen eventually replaced disruptive technology and sustaining technology with disruptive innovation and sustaining innovation.

Software Programs

makes computers more personalized and useful photo editing software by adding and removing software programs you can make your computer fit with exactly what you want to do Essentially a set of instructions that tells the computer exactly what to do

RAM

makes some information quick and easy to access ex. closet on main floor

Domain Name System

matches IP addresses to their more familiar text address

Uniform Resource Locator (URL)

matches IP addresses to their more familiar text address

Extrapolative

moving beyond knowledge to a deeper understanding because it expands beyond what is known Wisdom

Revolutionary technologies

new ways of doing something, but they do not fully replace the previous way.

Non Probabilistic

not concerned with probabilities or predictions of specific events. Focuses on bigger picture reasoning and abstract thoughts that are beyond natural laws or causes. Wisdom is an example

Competitive advantage

occurs when customers have some reason to place a greater value on one company's products over its competitors' products value proposition to the customer hard to duplicate

World Wide Web Consortium (W3C)

one of the primary organizations behind developing interoperable tech and promoting standardization to improve accessibility

Unlinked Content

pages that are online but do not have inbound or outbound links

Non-HTML Content

pages that feature heavy multimedia content

Excluded Content

pages that have blocked search engines from indexing the content

Private Content

pages that require password access

Phishing Scams

password harvesting

Digital Immigrant accent

past habit retention

Patents

patents protect a unique process or product; however, proving the originality of an idea is much more difficult. Patents can only be granted for non-obvious ideas and are only granted after a rigorous application process. Successful patent applications are granted clear economic rights. The patent owner can make and market the product or idea exclusively, license the idea to another party (including competitors), or sell the patent outright.

Digital deterioration

physical container of data may decay data may decay software no longer has technical support hardware obsolescence

Pleasure vs. Pain

pleasure makes life happy pain makes life sad Mill suggested measure quality of pleasure/pain

Digital divide

points to fundamental problem of access. linguistic, economic, educational, social and geographical reasons for digital divide.

Intranet

private network. Intranets often use the same protocols as the broader Internet, access is restricted to employees of the organization. Intranets provide an online space where people can share and archive information internally.

4 basic problems of info poverty

problem with property problem with real poverty problem of infrastructure problem of interpretation

democratization

process of adopting more democratic ideals

Authentication and authorization

process of confirming that people are who they say they are

Virus

program that infects a computer without the owner's permission and attempts to copy itself to other computers

Utility

property of an object whereby it tends to produce pleasure or prevent pain. can be measured in terms of the amount of pleasure is tends to produce and pain it tends to prevent.

Copyright

protects the expression of an idea, not the idea itself. expire

Proprietary technology

provide sole benefit (read: competitive advantage) to the owner of the technology.

Internet

public network

Prevention and Resistance

puts appropriate roadblocks in place to make the system difficult to penetrate

Codes of Conduct

reminds employees of their obligation to their employer, to their fellow members, and to society as a whole

Query

requests for information from search engine

Ontology

rigorous and exhaustive organization of some knowledge domain that is usually hierarchical and contains all the relevant entities and their relations

Spiders

robots that build indexes software programs that crawl the internet and report back on what they find

OS

saving files, using a mouse, fixing problems, covers basics.

Algorithm

search engines are mechanized to solve user queries through a series of mathematical rules called algorithms

3 basic tasks of search engines

search for info keep an index permit users to search index

Coping with info overload

set quality standards add value to existing info reduce duplicates of info we retain not less info - better info use better tools

Infrastructure technology

shared by all and are more beneficial when more people use them. For instance, email is a better communication technology because no single company has cornered the market. Since every company can easily offer email service for employees it doesn't really provide a competitive advantage for anyone.

Microblogs

short message broadcasts from individuals.

Technological Competency

skill-based in improvements like learning to use a software program, or administering a Local Area Network Describes a broader understanding of the application of technology

Renaissance Man

someone who knows most of what there is to know impossible

Benchmarking

standard for comparison process of comparing the current performance of a system against its optimal performance

Articulation / Externalization

tacit to explicit moving knowledge out realm of individual expertise to a more structured form.

Socialization

tacit to tacit transfer. sharing of unique experiences and expertise

Commodity

tangible product rather than service situation of personal advantage, benefit, or opportunity; in particular, an opportunity for private profit or selfish interest

Technological determinism

technology causes social changes and termines cultural value. technology determines history technology is autonomous, can be viewed independent of the human experience.

Really Simple Syndication (or Rich Site Summary)

technology changes the direction of information distribution: instead of having to go online and visit multiple websites get the information you want, you can set up a series of RSS feeds to deliver the content directly to you. Using RSS is a great strategy for managing information overload.

Entity integrity

that each entity has an attribute that uniquely identifies each record. This particular attribute is called the primary key.

Location Privacy

the ability of an individual to move in public space with the expectation that under normal circumstances their location will not be systematically and secretly recorded for later use

Tagging

the act of labeling items based on individual user preferences. It puts power of description and classification into the hands of the user

Switching Costs

too much trouble to switch to another service when costs/ perceived costs of switching to new supplier or providers are higher, it becomes more difficult to make the switch (even if beneficial) related to competitive advantage. if company makes it hard for you to switch, you're less likely to.

Piggy-backing

trying to steal PINs by looking over the victim's shoulder

Spam

unsolicited electronic comm

Next sequential purchase

use past data to determine which products consumers are likely to purchase next. analyzing data to help deliver promotional offers at the appropriate time

Product affinity

use past data to pair products for special promotions. analyzing purchasing patterns to identify common product combinations

Propensity to buy

using past data to anticipate the demand. patterns to improve inventory mgmt

Technology

usually refers to specific objects - tools, machines, appliances, networks, computers

Tim Berners-Lee and the World Wide Web (www)

was frustrated with the text only nature of the network, so he developed the world wide web. This platform provided more tools for organizing and presenting information, improved access to multimedia data, and linked content sites around the globe

Why aren't we ethical

we: are competitive are lazy rationalize our choices with relativism believe that people can change and situations are too complex for us to understand fully

Web Metrics

web metrics is about learning what visitors to your web site are actually doing

Division of Labour

when organizations combine their member reservoir with their task reservoir they can more easily determine which employees should do which tasks

Division of Technology

when organizations combine their task reservoir with their tool reservoir they can more easily determine which tools should be devoted to which tasks

Folksonomy

when people start tagging their images so that other people can find them an organic taxonomy develops - r as some call it a "folksonomy"

Obsolescence

when tech becomes outdated or falls into disuse

wisdom of the crowd

when the majority of the population (crowd) speaks through voting, we see the group's collective values (wisdom). participation and trust. Widespread participation is essential to successfully capitalizing on the wisdom of the crowd model. We have to trust that everyone who is in the "crowd" has the same basic intentions.

Knowledge Production

when we have the tools to produce and distribute knowledge, our circle of influence expands.

Lists

work well for relatively simple organizational tasks, but not for more diverse collections of info


Conjuntos de estudio relacionados

MOC EXAM Questions for Child Neurology From Practice Test 2

View Set

APUSH Historical Evidence, Periods 1-9

View Set

Lesson 2: Citric Acid Cycle (Krebs Cycle) & The Electron Transport Chain

View Set

Chapter 8: Supporting Your Ideas

View Set

CIST 1220 SQL Final Exam Study Guide

View Set

HDFS 186 Consumer Economics Exam 2

View Set

Chapter 10: Moral Hazard, Systemic Risks, and Bailout

View Set