MCS2020 U of G
CIO
Chief Information Officer This is an executive position that involves strategic planning and management of technology. The main goal here is to align information technology use and planning with the organization's overall objectives. In other words, this person is the bridge connecting business and technology forces within the organization.
CKO
Chief Knowledge Officer This person is responsible for designing and implementing information systems that allow people within the organization to share, re-use, and distribute information. CKOs help the business capture and capitalize on its less tangible information assets. By providing repositories for information, procedures for storing information, and tools for sharing information, the CKO can greatly improve workflow and avoid knowledge loss in the organization.
CPO
Chief Privacy Officer This person ensures that the company collects and uses information in an ethical and legal manner. Typically, CPOs are trained as lawyers and have extensive knowledge of consumer law and the collection of personally identifiable information (PII).
CSO
Chief Security Officer This person is responsible for ensuring the security of the company's information technology infrastructure and information assets. The CSO implements policies, procedures and safeguards to combat external threats (hackers, malware) and internal threats (unauthorized access by employees).
CTO
Chief Technology Officer This person is responsible for the performance and reliability of technology (hardware and software) within the organization. The primary concern for the CTO is to make sure that all systems are performing efficiently - servers and systems should be fully operational and fully functioning. In high-tech organizations, the CTO may have less to do with the information infrastructure and more to do with overseeing the development of new technologies. As such, they may be heavily involved in the organization's Research & Development activities.
Clickstream Analysis
Clickstream refers to the path a user takes while browsing a website. Not surprisingly, when you analyze enough user behaviour, patterns start to emerge. Based on the data you glean from clickstream analysis organizations may be able to redesign their websites to maximize profit and increase usability. The problem with clickstream analysis is that the data is usually anonymous. Unless users are required to log into the website first, it is difficult to determine the type of user on the end of the mouse making clicks. As a result, clickstreams can provide useful data but only by aggregating it (i.e. by pooling every visitor's behaviour).
Servers vs. Clients
Clients request info from other machines (servers) and servers provide requested services.
Search Engines
Collects information indiscriminately (whatever it can find is collected) Collects information inconsistently Information selection is automated by search engine applications Information falls into lists; organized according to search engine preferences (e.g. most recent, most frequent, etc.) Designed for searching (though browsing is possible) Facilitates serendipity through non-linear associations (e.g. hypertext links)
Directories
Collects predetermined categories of information (e.g. name, phone number, etc.) Collects information consistently Humans play an active role in selecting and editing information Information falls into categories; organized according to accepted conventions (e.g. alphabetical order, numerical order, etc.) Designed for browsing (though search is possible) Facilitates serendipity by placing related information in close proximity.
Parts of CC license
Commons Deed: legal contract in plain language Legal Code: full legal language behind the license Digital Code: metadata = code that gets attached to your creative works so that computers understand the rights attached to your creation.
Confidentiality
Confidentiality means that you can conduct your affairs while your identity remains protected.
Electronic Data Interchange
...
Executive Support Systems / Executive Information Systems
...
Experiments
...
Focus Groups
...
Hotspot
...
Identity Theft
...
Info Characteristics
...
Robot Exclusion Protocol
...
Sample vs. Population
...
Sniffer
...
Subscription data vs. Transaction data
...
Surveys
...
Transaction Processing Systems
...
Web Cookies
...
Index
list
Blogs.
Blogs are essentially online web journals.
Probabilistic
Focuses on facts and specific events
(Lack of) Information scarcity
Info not scarce - info overload, attention scarce
Identity
combination of characteristics by which someone or something is known.
Noise
info that interferes with the original msg also missing info
Dynamic Content
pages that don't exist until the user submits a search query
Data Brokering
practice of selling information about individual citizens
E-commerce payment systems
...
Info Navigation
...
Infringement
...
Internet Advertising
...
Invisible web / Deep web
...
Keywords
...
Legacy systems
...
Management Information Systems
...
Pervasive computing / ubiquitous computing
...
Probability sampling vs. Non-probability sampling
...
Public Domain
...
Access management
(administer passwords to employees, block users from restricted areas of the system)
Reverse engineering
(disassemble competitor's products to learn trade secrets)
Request for Tender / Request for Proposals
(manage process for suppliers to bid for our business and special projects)
Rule of Change
(sometimes called the "slippery slope"). This approach says that if an action cannot be taken repeatedly, it is not right to take at all. In other words, if you can't steal repeatedly then you shouldn't start stealing. For example, if you start compromising with small transgressions (like taking office supplies) you may be tempted toward larger transgressions (like embezzling money).
Feedback
+'ve -> move forward with information processing -'ve -> alter channel or msg
Applications
...
Bandwidth
...
Bias
...
Click Through
...
Commercial use
...
Consequences
...
Customer profiling
...
Customer visits / Face-to-face
...
Cyber terrorism
...
Decision Support Systems
...
Demographic profiles vs. Behaviour profiles
...
Destructive code / malware
...
Duty
...
E-commerce Models
...
Batch Processing
1957 - computers worked on one thing at a time
Division of Technical Expertise
: when organizations combine their member reservoir with their tool reservoir, they can more easily determine which employees should operate which technologies
GIS
A geographic information system (GIS) **map potential locations for expansion** is a database that connects information to geography and data to location. In other words, a GIS can help you connect what is happening to where it is happening, allowing you to add another dimension (location) to your data analysis. Originally, GIS was a tool for geographers and environmental researchers, but recently businesses have begun to incorporate GIS applications. Businesses use GIS for: Market analysis. What area will support a new store? Why is the new location not performing? Site selection. Where is the trade area? Where should I locate a new store? Customer analysis. Where are the best customers? Are there more like them? Logistical routing. What is the most efficient route for delivery trucks?
Mash-ups.
A mash-up describes when someone takes two Web 2.0 services and uses the Application Programming Interfaces (API) to mix them together.
When evaluating the quality of information...
Accuracy - information is based on correct and complete data Timeliness - information arrives before it is needed Relevancy - information is related to the topic Sufficiency - information provides necessary detail to meet the need Cost effective - information is worth the cost to produce it
Basic Types of RFID
Active and Passive Tags
Advanced Research Projects Agency (ARPA)
Advanced research projects agency, formed in US in 1957. developed reliable system called ARPANET used as a test case for networking
Processor
Always completing tasks and making things work together ex. butler
Vannevar Bush and the Memex
American engineer introduced memex
What is RFID
An RFID system is different than the barcode system. In the barcode system every product has a universal product code (UPC), but with the RFID system every unit has a unique tag. This means that instead of simply knowing that a box of Cap'n Crunch cereal has been purchased, you would know exactly which box of Cap'n Crunch was purchased. The rich data provided by RFID means that you can track when that box arrived the store, when it was put on the shelf, how long it sat on the shelf, how long it sat in the customer's cart, etc. This kind of data can be analyzed to identify real-world consumer patterns or highlight inefficient internal processes. RFID is becoming an increasingly popular business strategy it's used to track shipments (e.g. Wal-Mart), track parts around large warehouses (e.g. Toyota), track missing items (e.g. beer companies track missing kegs), and decrease the number of out-of-stock products (e.g. grocery stores).
Extranet
An extranet is in-between the fully available public Internet and a privately secured intranet. Extranets are private networks that use common Internet protocol, but they extend access to users outside the organization. Typically, extranets are used in business-to-business environments when different companies need to collaborate and share information.
How Does Radio Frequency Identification Work?
As you might suspect, Radio frequency identification (RFID) networks use radio frequencies to transfer information. In business, RFID is most often used as a system to track the movement of items across a supply chain. Here's how it works: Each item that you want to keep track of receives a "tag." This tag consists of two basic parts: A microchip that contains detailed information about the item An antenna for transmitting that information to nearby RFID readers. As the item moves around the supply chain or within the warehouse, its location is automatically updated by strategically placed RFID readers Data from the readers is sent wirelessly to the information system that updates the item location.
Drucker: productive knowledge work demands:
Asking the question: "What is the task?" Knowledge workers should focus on the information needs. Accepting responsibility for productivity. Knowledge workers should be given the autonomy to manage themselves. Focusing on innovation. Knowledge workers should recognize that their work informs the innovation process. Learning continuously. Knowledge workers should expect to have to learn on the job. Emphasizing quality. Knowledge workers should be measured on the quality of their output more than the quantity. Treating knowledge work as an asset. Knowledge workers should be viewed as integral to business success - not as a cost of doing business.
ACRL
Association of College and Research Libraries (ACRL) defines the following five standards for information literacy in learning environments. The information literate individual: Determines the nature and extent of the information needed. Accesses the needed information effectively and efficiency. Evaluates information and its sources critically and incorporates selected information into his or her knowledge base and values system. Uses information effectively to accomplish a specific purpose. Understands many of the ethical, legal and socio-economic issues surrounding information and information technology.
Emulation
Emulation reproduces the look and feel of previous systems, but those systems are already outdated - so organizations may need to constantly create new emulators.
six possible licenses creative commons
Attribution Non-commercial No derivatives: This license lets people use your work, but they can't modify it, can't make money from it, and must acknowledge you. Attribution Non-commercial Share Alike: This license lets people modify your work as long as they agree to let their version be modified by others; however, the work cannot be used for commercial purposes, and it must acknowledge you. Attribution Non-commercial: This license lets people modify your work and protect their modifications as they see fit, but they can't use it to make money and they must acknowledge you. Attribution No Derivatives: This license lets others copy, distribute, display, and perform only verbatim copies of your work, not derivative works based upon it - and they must acknowledge you. This license also permits commercial activity. Attribution Share alike: This license allows others to distribute modified versions of your work, but their modifications must also be licensed for modification. Attribution: This license allows others to modify or resell your work as long as they acknowledge you and your work in the process.
3 basic strategies for protecting information systems
Authentication and authorization. Confirm that people trying to access the system are who they say they are. Prevention and resistance. Use firewalls to filter traffic and keep unauthorized users from accessing the system. Detection and response. Use anti-virus software to scan media devices and incoming packets to reduce the risk of picking up malicious code.
Bluetooth
Bluetooth Basically, Bluetooth is like Wi-Fi but for personal use - it allows you to connect your devices remotely and eliminates the need for cables or cords. For example, Bluetooth headsets enable people to talk on a cell phone while the phone is tucked away. Since Bluetooth technology operates with lower power requirements, it works well for portable devices. But Bluetooth is also available on objects like personal computers that may not be "portable" - but they need to talk to cordless devices (e.g. mouse, keyboard, microphone, etc.).
All rights reserved vs. Some rights reserved
Copyright vs. Creative Commons
Program-data independence
Databases separate the data from the application or program used to manipulate the data. This means that when you update the software application, the data remains unaffected. For example, when the Internet Movie Database (IMDb) changes the layout of its pages, or the functionality of its search engine, it doesn't affect the underlying data itself.
Nick Carr
IT so common that no longer enables competitive advantage you can only gain an edge when you have something that other's don't have standardization of technology means that all of the players share the same advantage
CRM
Customer Relationship Management **systems to track contact with customers** One of the primary information systems used in business is the Customer Relationship Management system. As you might suspect, the purpose of the CRM is to manage relationships with customers. Well-designed CRMs enable companies to: Differentiate customer treatment according to individual preferences Anticipate customers' unspoken needs Add a human element to the purchase (by referencing information from past encounters) Ultimately, a CRM helps the company move from providing a great product or a great service, to providing a great experience too. Usually CRMs consist of an operational component and an analytical component which work together to increase loyalty and profitability in the corporation. The operational side of the CRM deals with areas where contact with the customer occurs. The analytical CRM is the behind-the-scenes data that is meant for analysis by managers. Ideally, the CRM enables an organization to recognize consumer trends early and refine business processes accordingly.
Disadvantages of internet publishing
Cutting out the "gatekeepers of the knowledge production process may ultimately lead to lower quality information (no one to check the facts), higher quantities of irrelevant information, and more biased perspectives. Clearly, we need our information literacy and technological competency standards more than ever.
Data
Data can exist in any form of observation (think of the environment where you are right now - if you're too hot or too cold, you don't need someone to tell you that, you can just feel it)
Improved data quality & accessibility
Databases can be used by many users simultaneously. For example, visitors to IMDb can be viewing Daniel Craig's actor page while IMDb staff writers are adding new information behind the scenes.
Enforcement of standards
Databases can enforce rules for data creation and modification. When people are entering data into the database they can be required to collect and submit the same pieces of information. For example, when a new movie gets added to the IMDb, certain details must be included (e.g. title of the movie, name of the director, actors, genre, etc.). Additionally, databases can enforce that the data always follow the adopt the same conventions (e.g. the plot summary can only be 150 words, the movie can only fall into three genres, etc.)
Improved data consistency & sharing
Databases enable you to present information according to consistent standards (common look and feel). For instance, on the IMDb each actor page follows the same basic format. Databases also provide a more seamless method of sharing information. For example, while the IMDb is constantly reviewing, updating and correcting their content, they also have a spot where visitors can contribute their feedback (ratings and comments) on the movies in the database.
Minimal data redundancy
Databases reduce the need to keep multiple copies of the same thing. Minimal data redundancy means that storage space isn't wasted and that only the most current information is on file (reduces the possibility of conflicting information). For example, if you wanted to access the database page for the cult classic, Office Space (http://www.imdb.com/title/tt0102578/) you could use the search function on the website, or you could browse for it using various categories (Comedy, Movies from 1991, Alphabetically, etc.). Regardless, each of those routes ends up at the single page for Office Space.
Metadata
Digital Code - code that gets attached to digital creative works so that computers can also understand the rights attached to your creation
Disruptive Technology
Disruptive technology improves products or services in radical ways. Often these improvements are entirely unexpected and unanticipated by the market. At first, these technologies are inferior to the more mature technology preferred by the market, so they are not immediately adopted; however, as the technology improves a significant market develops and the new technology eventually overtakes the old.
ERM
Employee Relationship Management (ERM) This information system is like a Customer Relationship Management system, but it focuses on the relationship between the employees and the company. This system is often used in Human Resources to keep track of training, compensation, recruiting and career management of employees.
Efficiency vs. Effectiveness.
Efficiency is all about the measuring the performance of a system - it's about productivity metrics. To test efficiency metrics, information systems are often measured against optimal performance levels in a process known as benchmarking. Effectiveness is more about evaluating the impact of the technology and information systems - it's about quality metrics
ERP
Enterprise Resource Planning (ERP) The ERP is an information system which attempts to integrate all resources and information functions into a single I.T. system - or at the very least a set of integrated systems. Consolidating information systems may seem like the silver bullet for information management issues, because it eliminates redundancies, and improves information sharing; however, implementing an ERP can be a difficult undertaking (incompatible systems, different data formats, legacy systems, etc.). The core components of most ERPs include: Accounting and financial data, production and materials data, and human resources data. A highly functioning ERP will automate information sharing within the organization and provide and enterprise-wide information management solution.
Social Media
Entire communities are developing around rich media sites.
Signal triangulation
Even if your cell phone does not have GPS capabilities, your location can be roughly determined by the cell phone towers that relayed your call.
Rise of the Amateur
Extremism. Opinions tend to become more extreme because the value system is constantly reinforced by other group members. Myopic focus. Groups focus on their favourite topics and lose sight of the bigger picture. Imitation. Groups often imitate previous decisions and fail to conduct due diligence or investigate other potential choices. Division. When differences of opinion occur, groups often form factions and may eventually split into separate groups. Homogeneity. Diverse groups perform better, yet diversity can be uncomfortable to the community.
3 Functions of Databases
First users need to be able to enter data. Second, users should be able to query or search for data. The third function is that users should be able to generate reports from the data.
Differences between Westinghouse model and Vickery Model
First, Westinghouse could take a pragmatic approach and eliminate any confusing parts or downplay some unpopular features. By simplifying the message, they can reach a broader audience. Second, Westinghouse could take the semantic approach and tweak the advertisement so that it has a more appealing message. For example, they could strengthen their message about how this product will improve relationships. Third, Westinghouse could take a technical approach and compare features with competitors. This strategy would help counter messages from opponents and try to set the record straight about their new television.
Reduced program maintenance
Generally, databases require less day-to-day maintenance than other systems of organization. When you make one change in the database it is replicated across the whole system. With proper data backup procedures and archiving the chance of losing data forever is slim.
Salami Slicing
Hackers break into a financial system and install applications that allow them to take small bits of money from multiple accounts and deposit them into a single account
Info Overload
Having too much information to make a quality decision and Receiving too much information to stay informed about a topic
Granularity
Granularity describes the level of detail in a given piece of information. If something has coarse granularity, then it is highly summarized information. If something has fine granularity, then it has more detail. This distinction is particularly important when you're trying to compare data. Ideally, you want to be comparing information with the same level of detail.
Problems with Carr's theory
IT creates new opportunities ignores human factors - people who know how to use IT effectively
Steps in Knowledge Creation
Idea is born. Author composes her thoughts on a topic and writes a coherent argument. Idea is refined. Author submits her piece to a series of "information gatekeepers" (editors and reviewers) who provide feedback. The original piece is tweaked based on the reviewers' commentary. Idea is published. Once the draft suitable for publication, it is handed to a publisher and published in an appropriate format (book, journal, magazine, etc.). Idea is organized. Published work is described and categorized (by librarians, indexers, etc.) and is organized into existing knowledge systems. Idea is distributed. Published work becomes accessible to a broader readership through the publisher's distribution channels (e.g. direct sales, book stores, etc.).
Privacy: Balance
If everyone had total anonymity our society could devolve into complete anarchy. if we had complete identifiability (no anonymity at all) individuals would feel exposed and may choose to censor opinions to avoid undue retribution
Security: The Balance
If we focus too much on keeping society secure, then authorities may be tempted to abuse their power. But if we ignore security concerns, then individuals might be tempted to abuse their freedom and take the law into their own hands.
Wireless-fidelity (Wi-fi).
If you use a wireless connection, your traffic and approximate location can be determined by the network access point where you connected to the Internet.
Immediacy
Immediacy refers to the proximity of the information to the actual event it describes. Primary information has been witnessed and collected first hand (high immediacy). For example, interacting with a customer, or generating daily transaction data on every sale would be considered primary information. Secondary information is an edited first-hand account (low immediacy). For example, the minutes of a board meeting, or financial summaries of sales numbers might be considered secondary information. Typically, secondary information has been filtered and summarized for the intended audience.
Creative Commons
designed to restore the balance that appears to be missing in current practices related to intellectual property. It is designed to be a more reasonable approach to copyright because it puts control in the hands of the original creator. Instead of reserving all rights, Creative Commons allows the creator to reserve some rights.
Digital Rights Management
digital property rights protection scheme. uses encryption to enforce copyright
Explicit Knowledge
easily articulated and shared. Since the focus of explicit knowledge is codifying (expressing) content, it is by far the most common type of knowledge
Conflicting signals + Missing Signals for Info, Technology, and People
Information Conflicting Signals Receiver splits focus between multiple sources of information. Missing Signals Message neglects to include necessary details (e.g. timelines, performance expectations, etc.) Technology Conflicting Interference from other messages traveling on the network (especially true for wireless transmissions). Missing Transmission errors in the technology lose important packets of information, potentially dropping the connection. People Conflicting Receiver has preconceived biases - new information clashes with personally held beliefs. Missing Receiver possesses inadequate knowledge needed to interpret the message.
Information vs. Information Record
Information refers to the content or message (e.g. the content in the textbook) and the information record refers to the carrier or container of that message (e.g. the physical book itself). The traditional view is that information can be given away and retained at the same time, while the container either be kept or given away. Interestingly, the digital world is starting to blur the line between information and the information record. For example, the container of an MP3 song would be the digital code - but in the digital world you can give this container to your friend and keep it for yourself.
The Hacker Ethic
Information should be free (from cost). They believed that information should be freely exchanged - particularly raw programming code. Hackers were always trying to improve things so they expected unlimited access to the binary code and supplementary information that would help them do so. Information should be free (from control/ownership). Hackers knew that if organizations started to control or own information, then the open nature of the Internet would be compromised. They felt that computing technology would help make the world a better place, but only if it wasn't heavily restricted. Information should be free (from restriction/censorship). Hackers felt that all information should be available - nothing should be off-limits. Authorities should be limited in their ability to determine what information the people can have.
Digital Millennium Copyright Act (DMCA)
first attempt to adapt intellectual property legislation for the digital age
Golden Rule
It asks you to treat others as you would like to be treated. While this is a great guiding principle for interpersonal relationships, it may not adequately cover the complexities of the business environment.
LAN
Local Area Network (LAN) - computers are connected within a geographically limited area. For example, the computers in the library would be on a LAN.
3 key issues with location privacy
Location information is collected pervasively. Most GPS devices (including phones) regularly check in with satellites, continually marking the real-time location of the owner. Location information is collected silently. In public it is difficult to know when our location information is being recorded. In some cases, we know it's being recorded, but there is little we can do about it. Location information is collected inexpensively. Collecting location information is built into the technology and the costs of storing are minimal.
Location Services
Location services - information providers can deliver relevant local information based on the user's current location.
Lumping vs. Splitting
Lumping - when we group info together based on similar attributes Splitting - process of separating info and recombining it according to a more specific set of criteria.
M-Commerce
M-commerce (mobile commerce) describes the ability to conduct electronic commerce activities with mobile devices (cell phones, laptops, MP3 players, etc.). As consumers purchase more of these devices and the infrastructure (e.g. mobile networks) improves, m-commerce becomes a viable channel for new business. There are many potential m-commerce applications; here is a small sample: Mobile advertising - companies can beam coupons and special advertising straight to the mobile devices of nearby customers. Mobile banking - customers can pay bills, check account balances, and transfer money via their mobile device. SMS purchasing - customers can pay bills, feed a parking meter, or transfer money via Short Message Service (text messaging). Location services - information providers can deliver relevant local information based on the user's current location. Wireless purchasing - mobile customers can make purchases via online stores or participate in online auctions. M-commerce applications are fairly common in other parts of the world (e.g. Europe, South Korea, etc.), but they have been slower to catch on in North America; however, it is only a matter of time before we adopt more m-commerce habits. It seems that the smart phones in our pockets are drawing us closer to the world of pervasive computing (sometimes called ubiquitous computing). This is a future in which every object we own - even "dumb" appliances like refrigerators - has a processor and is plugged into a global network.
M2A
Measure to analyze (M2A) metrics are used to understand trends. They might examine web use patterns, or help explain changes in existing Measure to Control metrics. For example, M2A metrics might indicate why sales numbers for a particular product are declining. Typically, M2A metrics answer more difficult questions (e.g. Who? Why? Where?). These types of metrics incorporate both qualitative and quantitative data. In a web context, M2A metrics might measure: referring web sites, exit pages (where do people leave your site?), why consumers abandon their shopping carts, click paths, etc.
M2C
Measure to control (M2C) analysis is used to monitor business or customer value. In business terminology, M2C metrics are often called Key Performance Indicators (KPI) because they focus on how well the organization is meeting its predetermined goals; as a result, M2C metrics usually adopt a quantitative approach (How much? How many? How often?). In a web context, M2C metrics might measure things like: number of visitors, percentage of visitors who make a purchase, most popular pages, percentage of people who use a coupon, etc.
Argote and Ingram "Reservoirs"
Members: each company has a unique group of employees with expertise, experience and "know-how." Think of this as the organization's social network - information flows organically between members Tools: each company has a unique combination of technology to accomplish its goals (software, hardware, machinery) Tasks: each company has a set of unique routines and operating procedures that determine how to conduct business (best practices, standard routines, etc.) They also argue that when you combine these primary areas you get an additional three areas: Division of Labour: Division of Technical Expertise: Division of Technology:
MAN
Metropolitan Area Network (MAN) - computers are connected over a geographic region that is bigger than a LAN but smaller than a WAN. For example, a university might use a MAN to connect all of the smaller LANs on campus.
Migration
Migration moves the data into current formats, but requires an unbroken string of migrations with each new technology upgrade.
Mobile Advertising
Mobile advertising - companies can beam coupons and special advertising straight to the mobile devices of nearby customers.
Mobile Banking
Mobile banking - customers can pay bills, check account balances, and transfer money via their mobile device.
Advantages of Online Knowledge Creation
More efficient knowledge distribution. The Internet acts as both the medium for the information and the distribution channel for the message. Dissemination is not restricted to limited distribution channels or paper-based formats. New knowledge representation. Digital information enables authors to create new types of knowledge products and services (video, animation, audio, etc.). Shortened information production timeline. Authors can bypass gatekeepers and publish directly online, enabling the audience to consume the information more quickly.
Explicit
Msgs are clearly expressed and readily observable
Implicit
Msgs are implied, metaphors, similes,
The Database Management System
is the software manages the data. Note here that the software and the data are separate in this model. Typically, Database Management Systems are run by database administrators - or someone who knows a lot more about the nuts and bolts of a given system.
National Science Foundation (NSF)
National Science Foundation built high speed network to connect its research centres
Non-deterministic
Not based on history
2 kinds of software
Operating System + Software Programs
4 main reasons that the digital divide should be a concern for many not-for-profit, public sector, or business organizations
Organizations need to access new markets. Organizations need access to new skills. Organizations may lose competitive advantage. Organizations should be committed to social responsibility.
Information Economy
Organizations or individuals who acquire, analyze, and act on available information generate more advantageous opportunities for themselves than their competitors
Personal Information Management
PIM argues that since individuals are the decision making agents within an organization, then information management is ultimately a personal responsibility. In essence, it is not the organization's responsibility to teach you what you need to know, it's your responsibility to know what you need to know. Should a situation arise when you don't know what you need to know, you have to figure out how to learn it.
Accessibility: The Balance
the information angle and the technology angle. Citizens should have the right to access the information they need - no matter how controversial it is. And citizens should have the means or technology required to get to the information they want. Again, we can argue that accessibility requires balance.
Gutenburg: Printing Press Revolution
PRINTING PRESS ERA Breakthrough developments in communication First one-to-many communications medium - authors had a way to communicate with the masses Changes in Knowledge Production Knowledge was reproduced exactly and mechanically (instead of using scribes) - publishers became the "gatekeepers" of knowledge production Changes in Knowledge Distribution and Accessibility Printing and publishing made more copies of existing knowledge available, driving the costs of reproduction even lower and increasing the audience Changes in Knowledge Preservation The printed record made the existing knowledge base more stable, ushering in the Scientific Revolution. Changes in Knowledge Retrieval Innovations in writing and organization (indexes, classification schemes, references, etc.) directed scholars to related information. INTERNET ERA Breakthrough developments in communication First many-to-many communications medium - the masses have a way to communicate with each other Changes in Knowledge Production Individuals can be publishers and consumers of information, bypassing the gatekeepers of information production Changes in Knowledge Distribution and Accessibility The Internet doesn't increase the copies of existing knowledge; it increases the number of paths to that knowledge - the masses have access to everything online. Changes in Knowledge Preservation The ease of knowledge production creates an explosion of available information, but preserving it all remains a challenge. Changes in Knowledge Retrieval Hypertext enables dynamic linking to related material - search engines expand functionality and automate the retrieval process.
PRM
Partner Relationship Management (PRM) Although use varies by industry, this information system allows companies to properly manage their partners and resellers. Working effectively with the right companies and representatives can help companies expand into new markets. For example, a sporting goods manufacturer might partner with a series of regional sales representatives (and pay commission fees) rather than hire an entire sales force.
3 moral rights of copyright
Paternity, Integrity, and Association.
Information systems
People, Technology, and Info most tend to focus on info and technology forget about people employs technology (hardware, software, applications) to manipulate info, and leverage the talents of people in pursuit of an objective **help us solve problems.
PAN
Personal Area Network (PAN) - devices are connected within a very small area (within a few metres). For example, a computer with a wireless mouse and wireless keyboard would be part of a PAN.
PIPEDA
Personal Information Protection and Electronic Documents Act Accountability. Organizations must protect information in their possession and appoint someone to oversee privacy matters (e.g. Privacy Officer). Even when information is transferred to a third party, privacy of individuals must be protected. Identifying Purposes. Organizations must clearly state why they are collecting the information and the reasons should be as narrowly defined as possible. Consent. Individuals must give consent to the organization to collect personal information. Permission can be given through an explicit statement (e.g. checking a box on a web form) or through implicit behavior (e.g. handing over your credit card to make a purchase). Limiting collection. Organizations cannot collect information though deception. There must be a purpose behind the information gathering, it cannot happen indiscriminately. Limiting use. Organizations can only keep the information as long as it is necessary to fulfill the original purpose. Guidelines for the disposal of information (or the procedures under which information is made anonymous) should be established. Accuracy. Organizations have an obligation to ensure that the information is current and correct and limit the amount of duplication. Safeguards. Organizations should provide adequate security to protect the information they collect (e.g. secure databases with passwords, restrict physical access to data centres, etc.). More sensitive information requires greater safeguards. Openness. Organizations must make privacy policies readily available to employees and customers. Individual access. Individuals can request to access their personal information and have a right to challenge any information collected about them. Organizations have 30 days to provide the information. Challenging compliance. Individuals or government bodies can challenge an organization's compliance and commitment to these principles. Failure to uphold PIPEDA can result in fines.
AIIP + AITP
The Association of Independent Information Professionals (AIIP) Code of Ethics The Association of Information Technology Professionals (AITP) Code of Ethics Ensure accuracy and reliability. Members should be precise in what they do and reliable in how they do it. Respect confidentiality. Members will encounter sensitive information and should treat it accordingly. Recognize intellectual property rights. Members should properly compensate the owners of the information and avoid using unauthorized information. Follow the rules of access. Members should not circumvent the systems, policies, or procedures to get information. Recognize your obligations. Members should recognize their obligations to employers, to fellow members and to society as a whole.
Digital Natives
Prefer receiving information quickly from multiple multimedia sources. Prefer parallel processing and multitasking. Prefer random access to hyperlinked multimedia information. Prefer to interact/network simultaneously with many others. Prefer to learn "just-in-time." Prefer instant gratification and instant rewards.
Digital Immigrants
Prefer slow and controlled release of information from limited sources. Prefer singular processing and single or limited tasking. Refer to provide information linearly, logically, and sequentially. Prefer to work independently rather than network and interact. Prefer to learn "just-in-case." Prefer deferred gratification and deferred rewards.
WiFi
Wireless Fidelity (Wi-Fi) Wireless data transfer refers to a series of standards (802.11) established by the IEEE (Institute for Electrical and Electronics Engineers) that enables information to travel using infrared or radio signals. Most wireless devices can operate in two modes: Infrastructure mode (by far the most common) where the access points are connected to a local area network (e.g. the U of G wireless network) Ad-hoc mode (for small scale uses) - wireless devices connect to each other but not to a broader network A wireless access point in a public space is known as a hotspot. For example, the campus features hotspots in many of the buildings, which enable students to roam around campus while still connected to the Internet.
Surveillance
Purposeful. There is an ultimate objective (usually protection of property or people) Routine. It is conducted regularly and on schedule (not randomly). Systematic. It is planned and coordinated. Detailed. It is focused on individual behaviour.
Wireless Purchasing
Wireless purchasing - mobile customers can make purchases via online stores or participate in online auctions.
Wisdom
Wisdom extrapolates everything we know into broader principles. It is a non-probabilistic undertaking because it is not concerned with predicting the future based on past events. Trusting your instincts may not be the traditional view of "wisdom," but it can be described as non-probabilistic and non-deterministic behaviour.
SMS Purchasing
SMS purchasing - customers can pay bills, feed a parking meter, or transfer money via Short Message Service (text messaging).
SEO
Search Engine Optimization companies hire web consultants to improve their search engine ranking. SEO works because consultants try to "game" or tweak the key components of a website to take advantage of the search engine's algorithm.
Time Sharing
Share processing power of one computer with multiple users (first)
Management Information Systems (The "Geeks")
The MIS department (sometimes simply called "I.T.") is responsible for the planning, implementation, and maintenance of the organization's technology infrastructure. They deal with operational issues of the systems used to acquire, process, and store information. Typical responsibilities include: Access management (administer passwords to employees, block users from restricted areas of the system) Data preservation (back up information systems, archive files, recover data in the event of system failure) Data maintenance (maintain databases and systems of information, update network security) Maintain web systems (manage server load and bandwidth usage; administer email systems and web-accessible databases) Technical support (troubleshoot tech problems, install software upgrades, provide software patches)
Social networks
Social networks allow people to build communities and share information very easily
Source/Origin
Source refers to the individual, group or organization that first created the information. Internal information is information that has been created by and is shared within the organization (and organizations generate a lot of this type of information). External information is created outside the organization, but it also impacts the organization in some way. For organizations, both internal and external sources need to be integrated into the appropriate Decision Support Systems that we discussed last week.
Hardrive
Stores all of the things you need for later ex. your basement
Porter's Five Forces
Supplier Power Buyer Power Competitive Rivalry Threat of Substitution Threat of New Entry
SRM
Supplier Relationship Management (SRM) This information system allows companies to evaluate and analyze supplier performance (pricing, business goals, geographic coverage, expertise, etc.). It also helps companies choose appropriate suppliers to work with. For example, a consumer electronics manufacturer might use an SRM to manage relationships and grade the performance of suppliers of key electrical components.
SCM
Supply Chain Management (SCM) ** systems to handle company inventory** A supply chain includes all of the parties involved in the creation and delivery of a product or service. It consists of suppliers who provide raw materials, internal assembly lines which manufacture goods, and logistics departments responsible for delivering the product. The supply chain management system is the information technology which coordinates all of this activity. Typically, coordination happens at 3 levels: Inbound - materials flow from suppliers (and their upstream suppliers) Internal - goods are assembled or manufactured using the organization's production processes Outbound - finished product is delivered to the customer A high-functioning supply chain management system should deliver increased efficiency, better inventory management, along with better coordination and communication among companies.
Sustaining Technology
Sustaining technology improves products or services in incremental ways. Generally speaking these technologies do not upset the existing market. Most companies focus on delivering this type of innovation. Occasionally sustaining technologies are unexpected - and when that happens they're called "revolutionary" or "discontinuous" innovations. However, they should not be confused with disruptive technologies. Revolutionary technologies are new ways of doing something, but they do not fully replace the previous way. Cell phones, for example, have the capability of making mobile calls, but they have not completely replaced more traditional landline telephones. When the technology is completely expected by the market it is called "evolutionary" because it signifies the slow steps of progress. Many advances in information technology follow this incremental path. Central Processing Units (CPUs), for instance, are able to offer faster and faster processing power for our computers, but this type of innovation is entirely expected by the industry.
Symbols
Symbols provide the absolute foundation of our ability to create, transmit, and receive information. They can be simple (letters of the alphabet), complex (elements of a schematic diagram), controversial (political iconography like the Nazi swastika), or relatively innocuous (telephone symbol). In a business context, corporate logos might be considered symbols, because you can't really "speak" a logo (you can say "Yahoo!" but you can't say it in a way that duplicates the company's trademarked purple font and exclamation point). While there are entire fields devoted to studying symbols and their meanings (semiotics), for our purposes the analysis of symbols is an interesting side note - we want to get to data.
Intellectual Property: The Balance
The "western" view of intellectual property has always placed the creator at the centre. According to this view intellectual property is an individual right and flows from individual creative efforts; therefore, creative works should be owned by creator. In contrast, the "eastern" view of intellectual property places more emphasis on the commons. According to this view, intellectual property is a social and collective exercise. The creator is merely a conduit through which the creative spirit of society is manifested; therefore, the creation should belong to the people more than to an individual.
Public Relations (The "Public Face")
The PR department manages relationships with people and organizations that are external to the corporation. Typical responsibilities include: Customer service (answer customer questions on order status and product use; provide web help via corporate website) Complaint management (handle dissatisfied customers, product recalls) Media relations and press releases (manage relationships with media and investors)
Accounting and Finance (The "Numbers" People)
The accounting department handles the operational (day-to-day) financial information, including: Budgeting (quantify goals for revenue and expenses; track progress of the budget) General ledger (manage assets, liabilities, equity, accounts receivable, accounts payable) Cash management (manage inflows and outflows of cash; seek external financing when needed) The finance department is responsible for more strategic financial issues (longer term). Their task is to increase the value of the business through sound financial practices. Responsibilities include: Financial reporting (provide financial information for investors, creditors, governments, etc.) Business analysis (help with pricing analysis, improve business efficiencies) Treasury management (manage earnings, stock dividends, long-term financing)
Application Software
The application software enables users to add, modify and retrieve data. Basically, these applications work with the database management system to manipulate the primary data files.
Risk Aversion principle
The approach here evaluates the cost of the decision (financial or otherwise), and chooses whichever option will produce the least amount of risk. This approach works well in organizational contexts, but it can be fairly conservative.
Global Positioning Systems.
The satellite system that provides turn-by-turn directions to drivers is now embedded in smart phones and other mobile devices.
Decentralization
to avoid breakdown during a nuclear attack a decentralized network architecture had to be developed which in case of loss of a node would still be operative
True anonymity is difficult because....
The ease of dissemination. Information can be spread quickly and easily - especially over the Internet. Those unflattering comments you made about your co-worker in a recent email can be easily forwarded to the entire staff. The persistence of information. Information doesn't easily disappear in a network world. Every company archives their data. The information you deleted from Facebook two months ago is still backed up somewhere on one of Facebook's servers. Your past follows you because information systems don't forget.
3 Components of Databases
The first component is an entity. An entity is something that you collect data about. The second component is the attribute. Attributes are the individual pieces of information that might describe an entity. And the third component is a record. A record is a collection of related attributes that are used to describe one particular entity.
When trying to find info, always consider...
The intended audience - who is the information for? The scope and coverage - what are the limitations of the information? The currency - when was the information published? The authority/credibility of the source - who wrote/published the information? The level of objectivity - is the information supported with evidence?
Vickery Information Transfer Model
The model of information transfer (or the model of communication) that I like is called the Vickery Information Transfer Model. Here is the first part of the model (without the feedback loops). Starting on the left you've got the "S" which stands for sender. That sender sends a message (or the "M(S)"). The message is received and you see it on the diagram as "M)." The information from that message is added to the knowledge state of the receiver. So "K(1)" is the knowledge state of the receiver as they receive the message. If that information impacts the receiver, then the receiver moves to knowledge state two or a new knowledge state. If the information that the receiver receives is not new information, then the receiver never actually makes it to a new knowledge state. Because the information from the message didn't actually add anything to their lives. The first feedback loop compares the current knowledge state with the information received in the message. If the receiver, or the audience, doesn't gain anything new from the advertisement, then the receiver never gets to the new knowledge state and, ultimately, the company fails to deliver its message. The second feedback loop deals with the channels between the message sent and the message received. In other words, maybe Westinghouse didn't reach its target audience because those particular people just don't read the Saturday Evening Post. The third feedback loop deals with the message itself. If the receiver somehow received a different message than the one Westinghouse intended, then Westinghouse needs to alter the message that was sent in the first place.
Association
The moral right of association grants the author the right to refuse that his work be associated with an undesirable organization or cause. For example, if you took a great picture and saw that it was used on a white supremacy website, you could request that it be taken down.
Integrity
The moral right of integrity grants the author the right to object to any adaptation of her work that harms the original intent. This means that if someone was making a film based on a book, but the author of the book didn't like the film version, she could claim that the film violated her moral rights.
How can knowledge transfer be measured
The organization demonstrates increased performance and productivity levels. The organization increases its knowledgebase and raises its level of expertise.
Trademark
The purpose of a trademark is to point to the original owner of the product or service. Basically, it designates the source of something and they're granted on a first-come-first-served basis. Do not expire
What do Sales and Marketing Promoters do?
The sales department is responsible for selling the company's products or services - with the obvious goal to increase sales. Typical responsibilities include: Customer management (maintain list of contacts, credit status, past-orders) Lead tracking (identify potential customers; expand the market) Sales forecasting (project sales figures; monitor sales by individual, by territory, by region) The marketing department is responsible for overall promotion of the company's goods or services. It supports the sales efforts through: Promotions & advertising (create and assess advertising, sales channels, marketing strategy) Special event planning (product launches, celebrity sponsorship, etc.) Campaign management (contests, giveaways, media purchases)
Knowledge
The thing to remember about knowledge is that it is deterministic process. Everything we "know" is determined by occurrences that happened before and those events led to a particular insight. Simply put: there is a cause behind every effect.
No Free Lunch rule
This approach assumes that nothing is free. When you imagine that everything is owned by someone else, you choose to compensate the rightful owner fairly. This approach works in organizational contexts, but it tends to be used primarily for intellectual property matters.
Format
There are many ways to divide information according to format. For instance, you could think of different file extensions as an indication of format (.pdf, .docx, .pptx, .mov, .psd). In this case, I think the most interesting distinction in terms of format is analog or digital. Analog information is a continuous data stream where everything happens (and is recorded) in sequence. Digital information is a discontinuous data stream where information is broken down into binary format (computer language).
Passive Tags RFID
These tags don't transmit information unless there is a reader present. In this case, the reader sends out a signal and the tag simply responds (like an echo). The reader picks up the response and feeds the location information to the information system. Since passive tags are not self-powered their range is much shorter.
Active Tags RFID
They are called active tags because they are always "on." The tag is powered by an internal battery, which means that it is always transmitting its location information. Since these tags are self-powered they usually work at a greater range. Highway transponders, like the ones used on Highway 407 in Ontario, are one common application of active RFID.
Database Management Systems - Disadvantages
They can require specialized personnel (database administrators, designers, coders) to build, maintain and archive important company data They can be costly to install - initial costs are very expensive and maintenance costs can be high too They can be complex to manage (there are always exceptions to accommodate and anticipate in the database design) They need to be backed up regularly and covered by appropriate data recovery policies (risk of data loss is high without these procedures in place)
Operations Management (The "Doers")
This department (sometimes called production management) is responsible for the production, manufacture, and assembly of the company's goods or services. Often this department is sub-divided into smaller departments like Procurement, and Logistics. Operations Management responsibilities include: Inventory management (manage and control inventory levels) Quality management (manage health and safety issues for employees and customers; products must conform to industry standards) Planning (organize schedule for production equipment, personnel, facilities, etc.) Maintenance and repair (maintain production equipment, facilities) The Logistics department is typically responsible for all transportation matters including: Delivery of goods or services Supply chain management (handle timing of delivery, product shortages, payment schedules) Fleet maintenance (ensure that the vehicles are fit to deliver products) The Procurement (or Purchasing) department is responsible for acquiring the goods and services that the company needs to produce its products or conduct its business activities. This department would be responsible for: Supplier relations (identifying new suppliers, perform background checks on suppliers, negotiate pricing, repeat orders from existing suppliers) Requests for Tender / Requests for Proposal (manage process for suppliers to bid for our business and special projects) Testing and assessment (ensure that goods received meet industry standards, assess relationships with suppliers)
Research and Development (The "Scientists")
This department is concerned with developing new products and ideas for the marketplace. In many corporations, R&D activities are cloaked in secrecy. Responsibilities in R&D include: Managing intellectual property (protecting the corporation's patents and trade secrets) Innovative product development (create new products and materials for market; tackle organization's unsolved problems) Prototyping and design (test new product ideas for customer acceptance and industry standard specifications) Research (monitor industry developments, trends, scientific research, academic literature) Reverse engineering (disassemble competitor's products to learn trade secrets)
Human Resources (The "People" People)
This department is responsible for all matters related to the organization's personnel. Responsibilities would include: Recruiting new employees (job postings, resume processing, interviewing, hiring, firing) Compensation (payroll, vacation, health benefits, retirement plans, stock options, employee plan contributions) Assessment (job descriptions, job requirements, performance evaluations) Development and training (development programs for employees, training classes) Complaint management (harassment complaints, union grievances) Strategic personnel planning (organizational standards, salary ranges, future requirements for employee skills)
Radio Frequency Identification
This technology is used to track vehicles on toll highways, and has been implemented in security passes, credit cards, and US passports.
Black hat vs. White hat vs. Greay hat
White hat: experts who test info systems to ensure that they are secure Black hat: attack info systems with intent of committing a crime Grey Hat: Bit of both
WAN
Wide Area Network (WAN) - computers are connected across geographically dispersed regions. For example, the Internet would be considered a worldwide WAN.
Wikis
Wikis allow people to contribute content to a webpage without having to know any HTML coding.
Efficiency Metrics
Throughput - how much information can the system handle? Response time - how fast does the system respond to user interaction? Availability (Uptime) - how many hours is the system available for use? Accuracy - does the system produce the same results when executing the same transaction? Security - does the system keep out unwanted intruders?
TCP
Transmission Control Protocol verification of file transfer shared language and rules
Effectiveness Metrics
Usability - how easy it is for people to use the system? User satisfaction - how satisfied the users are with the system? Conversion rate - how many first time visitors are persuaded to purchase? Return on investment - does the system contribute value to the organization? Cost-benefit analysis - is the system worth the cost of development and maintenance?
Corporate espionage
When competitive intelligence goes too far tends to be more targeted information gathering. It's usually focused on trying to gather specific information, like details from the competition's research and development department. There is a distinct attempt to find private or sensitive information that is not yet well-known within the industry. Companies have been known to hack into competitors' networks, dig through garbage, and even install listening devices in corporate boardrooms.
Evolutionary technologies
When the technology is completely expected by the market it is called "evolutionary" because it signifies the slow steps of progress. Many advances in information technology follow this incremental path
Participation: The Balance
When you have a gatekeeper you have bottlenecks and the potential for censorship, but you also have higher quality information. When you remove the gatekeeper you empower the people to create and contribute, but you open the floodgates to misinformation.
Value activity
business process
Zombies Botnets
Zombie: infected computer Botnet: collection of zombie machines, can be instructed to commit any number of requests
Social Bookmarking
a great way to have access to your favourite websites from anywhere and it is a great way of sharing your bookmarks with the public.
info poverty
a lack of info and a lack of the means to get essential info
Memex
a repository for key pieces of info, but it was also organized and mechanized in such a way that it could retrieve the info easily. Like having your own personal library at your fingertips
Protocol
a shared set of rules an procedures. TCIP Transmission Control Protocol/ Internet Protocol provided instructions to computers for tranmitting and transferring info TCP manages disassembling/reassembling of packets IP establishes the connection between computers
Conflict of interest
a situation in which a person, such as a public official, an employee, or a professional, has a private or personal interest sufficient to appear to influence the objective exercise of his or her official duties." If you look at this definition you'll see three key points: An individual has a personal private interest. The private interest conflicts with his/her professional duty. The conflict interferes with professional judgement.
Worm
can be programmed to destroy data, more often use to to open up back door access into affected user's system
DARPANET
accelerate knowledge transfer, and avoid dubling up of existing research
Corporate Intelligence
an ongoing business process designed to assist with decision making.
Computer ethics
analysis of the nature and social impact of computer tech and the corresponding formulation and justification of policies for the ethical use of such technology.
Price elasticity modeling
analyzing customer data to help optimize pricing and maximize profits
Social Engineering
any activity where hacker misrepresents himself to get what he needs
Data mining
applies sophisticated statistical models to aggregated data in order to predict consumer behaviour
Cyberstalking
arassment conducted via info tech
Overload cycle
as we become overwhelmed with information we develop a lack of desire to learn (don't have time); we have a greater tolerance for error (work is "good enough"); we create poor search strategies (whatever is easiest); we contribute superficial analysis (believe everything we read); and, we are unable to differentiate between details and the big picture; we develop overconfidence in our own abilities
Ted Nelson and hypertext
attempted to put bush's idea in practice. invented hypertext , a protocol that enabled users to jump from one document to another (h in http)
Attention Economy
attention is a combination of how much time you devote to something, as well as how many brain cells you devote to something.
Primary Key
attribute that uniquely identifies each record database will not function properly unless there is a primary key for every single entity in the database.
Deterministic
based on (or determined by) things that have happened before (antecedents). Knowledge is a deterministic process
Detection and response
be vigilant and test regularly for malicious code and malware
Database
collection of data that has been organized to facilitate collecting, searching, and retrieving info
Pseudonymity
conducting affairs under an assumed
Utilitarian Principle / Teleological
consequence based system
Patent Trolls
consist mainly of lawyers who buy promising patents and then charge others to use their ideas or sue companies who are potentially infringing on their ideas. According to the patent system these types of companies are perfectly legitimate, but views on patent trolls vary widely.
Trade Secrets
consist of confidential info to is essential to ops of an organization. counts as intellectual property, is covered by the law
Communication
cross between info and technology leads to info sharing leads to shared meaning leads to community building leads to identity forming *com is at core of our identity
Dignity Principle
employees should acknowledge the dignity of all people, promoting human rights and preventing abuses
Citizenship Principle
employees should act as responsible citizens, obeying all applicable laws and regulations
Fiduciary Principle
employees should be diligent and loyal, promoting company's legitimate long-term interests
Responsiveness Principle
employees should be responsive to concerns and complaints raised about company activities, protecting the public interest
Transparency Principle
employees should conduct business in a truthful manner, refraining from deceptive practices
Fairness Principle
employees should engage in free and fair competition, avoiding discrimination with all stakeholders
Reliability Principle
employees should honour all commitments, fulfilling obligations to key stakeholders
Property Principle
employees should protect company assets (intellectual and physical) and respect the property rights of competitors
Trojan Horse
enter's user's system under the guise of a useful program ,but is performing a number of unsavoury tasks under the surface
# basic concepts of databases
entities, attributes, and records entity - something you collect data about attribute - info about an entity record - collection os related attributes
Combination
explicit to explicit explicit info is synthesized with other explicit info
Internalization
explicit to tacit learning by doing
Here be monsters
explorers in the sixteen century admission of fear - we're afraid of this area, you should be too acknowledgment of ignorance - we don't know what's here. We're missing information
Denial of Service (DoS) Attack
flood server with so many requests it can't tell which is legitimate and which is fake. data isn't destroyed, but crippling effect of thousands of simultaneous requests means that requested data cannot be delivered
Info Literacy
focuses on info. describes ability to recognize when info is needed and have the ability to locate, evaluate, and use effectively the needed information
deontological ethics
focuses on the action themselves and their motivators
Free Speech and Censorship
freedom of speech means that citizens have the right to speak freely without fear that their opinions will be censored and that citizens won't be persecuted for sharing their opinions
Hierarchy
generally utilize parent-child relationships to structure info
Egoism
goism is diametrically opposed to the Golden Rule because it stems from personal self-interest. According to egoism, you weigh decisions based on the impact they will have on your personal well-being. Again, this approach favours individual ethical behaviour, so it may not be robust enough for a business environment.
Taxonomy
group, or classify, content based on similar attributes
Data Diddling
hackers use remote computers to penetrate security and break into an info system
Phreaking
hacks committed against telephone networks. scamming free long distance calls, impersonating operator services, cloning cell phones
Tacit Knowledge
harder to articulate - which makes it even harder to share. One of the main problems with tacit knowledge is it is unique to individuals (and their own experience or expertise). Tacit knowledge manifests itself in practice - we choose to behave in certain ways because of our unique tacit knowledge of a situation.
Paternity
he moral right of paternity grants the author the right to have her name published with the work, pseudonymously or anonymously. In other words, the original creator can always be connected to the work - even if the economic rights are sold.
Understanding
he process we use to take the new knowledge we encounter and mash it up with our existing knowledge - or our old knowledge. First, understanding is an interpolative process which means it makes connections between concepts. It takes various points of data and tries to discover relationships and meaning among them. Second, understanding is a probabilistic exercise, meaning that it looks at the likelihood that an event will occur again. It recognizes information patterns in an attempt to predict or anticipate what will happen next.
Interpolative
helps us connect ideas
Kant's categorical imperative
if an action is not right for everyone to take, then it is not right for anyone
Knowledge Spiral
imagine knowledge production happening in four basic ways: tacit to tacit, explicit to explicit, tacit to explicit, and explicit to tacit
Packet Switching
in order to avoid congestion of the lines the sent files were divided onto smaller packets which were put together again at the receiver
Info Transfer
information requires human interaction to have meaning. First, We need a source. We need someone who is going to send a message. We need to know where the information comes from. Second, we need a channel or medium through which that message will travel. And lastly, we need a destination for the message.
Aggregation
is about combining similar things into a (mostly) homogenous group
Clayton Christensen
known for grouping technology into two basic categories: disruptive and sustaining. From a business perspective, it is important to identify the disruptive innovations in the market so you don't get left behind (even large companies can miss important technology trends). Since technologies are often combined with business strategy before they have a transformational impact on the market, Christensen eventually replaced disruptive technology and sustaining technology with disruptive innovation and sustaining innovation.
Software Programs
makes computers more personalized and useful photo editing software by adding and removing software programs you can make your computer fit with exactly what you want to do Essentially a set of instructions that tells the computer exactly what to do
RAM
makes some information quick and easy to access ex. closet on main floor
Domain Name System
matches IP addresses to their more familiar text address
Uniform Resource Locator (URL)
matches IP addresses to their more familiar text address
Extrapolative
moving beyond knowledge to a deeper understanding because it expands beyond what is known Wisdom
Revolutionary technologies
new ways of doing something, but they do not fully replace the previous way.
Non Probabilistic
not concerned with probabilities or predictions of specific events. Focuses on bigger picture reasoning and abstract thoughts that are beyond natural laws or causes. Wisdom is an example
Competitive advantage
occurs when customers have some reason to place a greater value on one company's products over its competitors' products value proposition to the customer hard to duplicate
World Wide Web Consortium (W3C)
one of the primary organizations behind developing interoperable tech and promoting standardization to improve accessibility
Unlinked Content
pages that are online but do not have inbound or outbound links
Non-HTML Content
pages that feature heavy multimedia content
Excluded Content
pages that have blocked search engines from indexing the content
Private Content
pages that require password access
Phishing Scams
password harvesting
Digital Immigrant accent
past habit retention
Patents
patents protect a unique process or product; however, proving the originality of an idea is much more difficult. Patents can only be granted for non-obvious ideas and are only granted after a rigorous application process. Successful patent applications are granted clear economic rights. The patent owner can make and market the product or idea exclusively, license the idea to another party (including competitors), or sell the patent outright.
Digital deterioration
physical container of data may decay data may decay software no longer has technical support hardware obsolescence
Pleasure vs. Pain
pleasure makes life happy pain makes life sad Mill suggested measure quality of pleasure/pain
Digital divide
points to fundamental problem of access. linguistic, economic, educational, social and geographical reasons for digital divide.
Intranet
private network. Intranets often use the same protocols as the broader Internet, access is restricted to employees of the organization. Intranets provide an online space where people can share and archive information internally.
4 basic problems of info poverty
problem with property problem with real poverty problem of infrastructure problem of interpretation
democratization
process of adopting more democratic ideals
Authentication and authorization
process of confirming that people are who they say they are
Virus
program that infects a computer without the owner's permission and attempts to copy itself to other computers
Utility
property of an object whereby it tends to produce pleasure or prevent pain. can be measured in terms of the amount of pleasure is tends to produce and pain it tends to prevent.
Copyright
protects the expression of an idea, not the idea itself. expire
Proprietary technology
provide sole benefit (read: competitive advantage) to the owner of the technology.
Internet
public network
Prevention and Resistance
puts appropriate roadblocks in place to make the system difficult to penetrate
Codes of Conduct
reminds employees of their obligation to their employer, to their fellow members, and to society as a whole
Query
requests for information from search engine
Ontology
rigorous and exhaustive organization of some knowledge domain that is usually hierarchical and contains all the relevant entities and their relations
Spiders
robots that build indexes software programs that crawl the internet and report back on what they find
OS
saving files, using a mouse, fixing problems, covers basics.
Algorithm
search engines are mechanized to solve user queries through a series of mathematical rules called algorithms
3 basic tasks of search engines
search for info keep an index permit users to search index
Coping with info overload
set quality standards add value to existing info reduce duplicates of info we retain not less info - better info use better tools
Infrastructure technology
shared by all and are more beneficial when more people use them. For instance, email is a better communication technology because no single company has cornered the market. Since every company can easily offer email service for employees it doesn't really provide a competitive advantage for anyone.
Microblogs
short message broadcasts from individuals.
Technological Competency
skill-based in improvements like learning to use a software program, or administering a Local Area Network Describes a broader understanding of the application of technology
Renaissance Man
someone who knows most of what there is to know impossible
Benchmarking
standard for comparison process of comparing the current performance of a system against its optimal performance
Articulation / Externalization
tacit to explicit moving knowledge out realm of individual expertise to a more structured form.
Socialization
tacit to tacit transfer. sharing of unique experiences and expertise
Commodity
tangible product rather than service situation of personal advantage, benefit, or opportunity; in particular, an opportunity for private profit or selfish interest
Technological determinism
technology causes social changes and termines cultural value. technology determines history technology is autonomous, can be viewed independent of the human experience.
Really Simple Syndication (or Rich Site Summary)
technology changes the direction of information distribution: instead of having to go online and visit multiple websites get the information you want, you can set up a series of RSS feeds to deliver the content directly to you. Using RSS is a great strategy for managing information overload.
Entity integrity
that each entity has an attribute that uniquely identifies each record. This particular attribute is called the primary key.
Location Privacy
the ability of an individual to move in public space with the expectation that under normal circumstances their location will not be systematically and secretly recorded for later use
Tagging
the act of labeling items based on individual user preferences. It puts power of description and classification into the hands of the user
Switching Costs
too much trouble to switch to another service when costs/ perceived costs of switching to new supplier or providers are higher, it becomes more difficult to make the switch (even if beneficial) related to competitive advantage. if company makes it hard for you to switch, you're less likely to.
Piggy-backing
trying to steal PINs by looking over the victim's shoulder
Spam
unsolicited electronic comm
Next sequential purchase
use past data to determine which products consumers are likely to purchase next. analyzing data to help deliver promotional offers at the appropriate time
Product affinity
use past data to pair products for special promotions. analyzing purchasing patterns to identify common product combinations
Propensity to buy
using past data to anticipate the demand. patterns to improve inventory mgmt
Technology
usually refers to specific objects - tools, machines, appliances, networks, computers
Tim Berners-Lee and the World Wide Web (www)
was frustrated with the text only nature of the network, so he developed the world wide web. This platform provided more tools for organizing and presenting information, improved access to multimedia data, and linked content sites around the globe
Why aren't we ethical
we: are competitive are lazy rationalize our choices with relativism believe that people can change and situations are too complex for us to understand fully
Web Metrics
web metrics is about learning what visitors to your web site are actually doing
Division of Labour
when organizations combine their member reservoir with their task reservoir they can more easily determine which employees should do which tasks
Division of Technology
when organizations combine their task reservoir with their tool reservoir they can more easily determine which tools should be devoted to which tasks
Folksonomy
when people start tagging their images so that other people can find them an organic taxonomy develops - r as some call it a "folksonomy"
Obsolescence
when tech becomes outdated or falls into disuse
wisdom of the crowd
when the majority of the population (crowd) speaks through voting, we see the group's collective values (wisdom). participation and trust. Widespread participation is essential to successfully capitalizing on the wisdom of the crowd model. We have to trust that everyone who is in the "crowd" has the same basic intentions.
Knowledge Production
when we have the tools to produce and distribute knowledge, our circle of influence expands.
Lists
work well for relatively simple organizational tasks, but not for more diverse collections of info