Information Systems final exam

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

spiders, web crawlers, software robots

"crawl" the web and find as much information as possible that is then indexed for retrieval when you make a search

crowdsourcing

a type of peer production where initially undefined groups of users band together to solve problems, create code, and develop services

where does data come from?

different internal systems, surveys, external sources, RFID

HTTP

hypertext transfer protocol, defines how a web browser and server communicate

bandwidth

transmission speeds

business intelligence systems (BI)

a variety of software applications used to analyze an organizations raw data

benefits of RFID system

accurate info, hands-free scanning, instant access to data through asset tracking, maintenance, security, quality control

example of insertion anomaly

adding a new customer/book before it is ordered

RFID can eliminate

administrative errors, poor forecasting, inventory visibility, order accuracy, receiving errors, internal theft, slow order fulfillment

adsense

advertising program through which content providers allow google to sell advertising space on their webpages, ads are related to what visitors are reading/doing

phishing

attempting to fraudulently acquire sensitive information by masquerading as a trustworthy person or business in an electronic communication

issues in B2C

long-tail of products, channel conflict, order fulfillment (holidays, large orders)

technology threats

malware, poorly designed software, DNS cache poisoning

social media

media for social interaction, using highly accessible and scalable publishing techniques

facebooks key resources for competitive advantage

network effects, switching costs

m-commerce

new category of e-commerce where transactions are conducted using a mobile device

data in a warehouse is...

nonvolatile (data not updated), consistent

deletion anomaly

the loss of a piece of information about one object when a piece of information about a different object is deleted

internal systems

transaction processing systems (TPS) aka OLTP, ERP SCM, CRM

social graph

collect, express, and leverage connections, provide competitive advantage, newsfeed. express connections between individuals and organizations

social media categories include:

communications, collaborating, multimedia, entertainment

challenges with running a platform

copyright, security, appropriateness, free speech, privacy

relational database approach

create a series of logically related two-dimensional tables to store the information

link fraud

creating a series of bogus websites that link back to the pages their trying to promote on organic searches

examples of data sources

credit card swipes, RFID tags, digital video surveillance, emails, blogs, click-stream, radiology exams

large scale data analytics projects need to address.....

data relevance, sourcing, quantity/quality, hosting and governance to maintain its system

solution for data rich companies that are information poor?

data warehouse and data marts

information

data within a context

hierarchy of data for a computer-based file

database file (or table) record field byte bit

benefits of e-commerce: organizations

decreases costs, reduced inventories, reach customers outside immediate area

example of deletion anomaly

deleting an order --> deleting a customer/book

online advertising

delivery of digital advertisements to internet users

relationship databases (DBMS)

designed to centrally store the data generated by the daily transactions

Data warehouse (storage for BI, specialized for OLAP)

designed to collect historical data and organize in multidimensional structure to handle queries required to discover trends and aid data analysis (help make decisions)

problems/anomalies that arise if data is not organized/structured properly (i.e. un-normalized)

insertion anomaly, deletion anomaly, update/modification anomaly

trade secret

intellectual work such as a business plan, that is a company secret and is not based on public information

ICANN

internet corporation for assigning names and numbers

IP

internet protocol, routes packets to their final destinations

ISP

internet service provider examples: verizon, comcast, AT&T

in contrast to OLAP, OLTP...

involves a database, where data form business transactions are processed online as soon as they occur

trojan horse

is a computer program that hides in another program and reveals its designated behaviour only when activated

logic bomb

is a segment of computer code that is embedded inside an organization's existing computer programs and is designed to activate and perform a destructive action at a certain time or date

worm

is a segment of computer code that performs malicious actions and will spread by itself without requiring another computer program

data mining software/tools

use statistical techniques (regression, clustering) and artificial intelligence techniques (algorithms)

data cube

used by data warehouses, has 3 dimensions: 1. customer 2. product 3. time

user attention problem

users aren't on social media to "hunt" for a product/service like they are on google, they are there for a "hike" to chill out

enriching impression fraud

when site operators generate false page views in order to boost their sites CPM earnngs

peer production (web 2.0's most powerful feature)

when users collaboratively work to create content, products, and services. creates open source software

databases

where data is stored, a collection of related tables consisting or rows, columns and keys

factors affecting information security

wirelessly-reworked business, lack of government legislation, availability of hacking software and code

walled garden

www create tim bernes-lee warned, if increasingly large parts of the web reside inside a singular service "walled garden", innovation, competition, and exchange may suffer

a new legal regime facilitates interaction

you are free to, share & remix, given that you attribute the work in a manner specified and don't use it for commercial purposes

virus

a segment of computer code that performs malicious actions by attaching to another computer program

Amdahl's law

a system's speed is determined by its slowest component

open graph

allow other websites to use Facebook for identification,sharing, personalization, acting as a bank

web-based EDI

allows processing of electronic documents using just a web browser instead of implementing a complex EDI infrastructure

digital certificate

an electronic document attached to a file certifying that it is from the organization that it claims to be from and has not been modified from original format

online community

an identifiable social system that relies primarily on electronic communication in order to form webs of relationships, exchange information, and coordinate actions

communication controls

authentication, authorization, border security

B2C e-commerce

based on level of transactions related features available on sellers website can be classified as: e-brochure, e-promotion, e-sales

key tools/applications of web 2.0

blogs, wikis, social networks

firms can be classified as

bricks and motar ex. grocery store clicks and mortar ex. stamples.com pure-play ex. iTunes

examples of shifts from web 1.0--> web 2.0

britannica online--> wikipedia kodak express--> fliker IM--> twitter personal websites--> blogging

TCPIP

built into any device that is used to access internet, helps get perfect copies of internet transmissions from one location to another

historial data in data warehouse....

can be used for identifying trends, forecasting, and making comparisons over time

benefits of e-commerce: society

can work at home, merchandise sold at lower prices, improved quality, farther reach

BI query and reporting tools

canned reports, ad hoc reporting tools, dashboards, data mining software/tools

features of wiki

centralized repository, versioning, rollback, tagging, control/flexibility, LOW COST

wiki

collaborative website, users can add/edit, common knowledge base

data aggregators

collect and resell data

data

raw facts and figures

cybersquatting

knowingly requesting a domain name to profit from someone else's firm or trademark

firms face 2 key challenges with advertising on social networking sites

1. content adjacency 2. user attention

5 steps to managing social media within an organization

1. create a social media use policy 2. track the web 3. create assertive not aggressive policies 4. trust 5. mission statement/vision

4 threats to privacy

1. data aggregators 2. electronic surveillance 3. personal information databases 4. social networking sites

a RFID system consists of 3 main parts

1. data carrier 2. antenna 3. reader unit

how to connect tables together using keys

1. each table should have a primary key 2. tables are connected using foreign keys

3 factors driving online ad growth trends

1. increased user time online 2. improved measurement and accountability 3. targeting

knowledge exchanged on an electronic network has 2 unique public good characteristics

1. non-excludability (goods can't be withheld from others) 2. good costs the same to provide no matter the number of beneficiaries

two approaches to privacy codes and policies

1. opt-out (automatically included, you must then change your privacy settings) 2. opt-in (automatically not added, you can choose to join)

4 categories of ethical issues

1. privacy 2. accuracy 3. property 4. accessibility

DNS cache poisoning

DNS software maps an URL address to an IP address, remap to direct users to fake sites

normalized data

Normalized data is when attributes in the table depend only on the primary key

what happens if a DNS gets hacked?

V BAD, could redirect you to imposter sites that steal passwords and bank info

piracy

copying a software program without making payment to owner

sample data mining applications

direct marketing, market segmentation, customer churn, market basket analysis, insurance claims analysis

channel conflict in B2C

disintermediation- conflict with channel partners, managers ignore them by selling products online cannibalization- conflict with own distribution channels, logistics, pricing

some online ad types

display (banners) email (spamming) search (sponsored search) referral ads videos

dashboards

display a critical indicators that allow managers to get a graphical glance at key performance metrics

prediction markets

diverse crowd is polled and opinions aggregated to form a forecast of an eventual outcome

success factors of prediction markets

diverse, decentralized, independent, summarize

blogs

do it yourself publishing tool, easy to post, fosters interaction

B2B e-commerce

e-commerce between companies

private e-markeplaces

formed by a single company buy-side: reverse auctions, group purchasing sell-side: electronic catalogs and forward auctions

advertising

forms of bulk revenue, precise targeting, social engagement

taking action to protect: organizational policy

frameworks, standards, compliance, education, audit, enforcement

types of business intelligence

online analytical processing (OLAP), data mining, querying, reporting

e-payment methods

online credit card payments, electronic cash system

internet business models include

online sales model, brokerage, advertising

OSS

open source software, example: linux operating system

information we want to track

order related, customer related, books related

corporate use of social networks

organizational productivity tools, replaced traditional employee directory, mining networks for customer ideas, innovation, feedback

canada's privacy legislation (PIPEDA)

organizations must establish a privacy policy and procedures to adhere to

the technology that launched google

pagerank-wepbage ranking algorithm

access controls

passwords

technology options for security

patch, lockdown hardware, authentication, firewall's, intrusion detection system, blacklist, anti-malware systems, encryption

physical control mechanisms

physical protection of computer facilities, fences/security guards

canned reports

provide regular summaries of information in a predetermined format

platform

provides a set of application programming interfaces (API's), apps, sustainable value, each app ads value

e-commerce classification

pure vs. partial EC, based on degree of digitization involved

online analytical processing (OLAP) systems

purpose: support decision and provide answer to business and management queries, for extensive data analysis

online transaction processing (OLTP) aka TPS

purpose: to register the transactions occurring in real time

ad hoc reporting tools

put users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other paramaters

social media properties include:

reach, accessibility, usability, recency, and permanence

methods of protection information resources

risk management, control mechanisms (physical, access), auditing

targeting is based on

search intent, context, geography, online behaviour

what does S.M.A.R.T do?

set a social media policy, monitor, engage, establish first-responders network

infrastructure needed to provide search results

sever farms, competitive advantage

micro blogging

short message blogging, asymmetric communication, spread ideas, run contests/promotions, tract commentary

enriching click fraud

site operates generate bogus ad clicks to earn PPC income

dark web

sites that can't be indexed by google and other search engines

when to use a spreadsheet to store data

small amounts of data, uncomplicated relationship, modelling/calculating/graphing

malware

virus, worms, trojans

Web 2.0

web sites and internet services that foster collaboration, informations haring, social media

risk mitigation

when an organization takes concrete actions against risk. 2 functions: implement controls to prevent threats, 2. develop means of recovery if threat happens

disadvantages of EDI

inflexible, cost, many standards, long-startup period

types of brokers

infomediary auction payment

why are companies data rich but information poor?

1.incompatible legacy systems inhibit data sharing 2. operational data stored in relational database are not efficient for extensive data analysis and summaries

E-marketplace: nature of ownership

1.public (many firms connect to many other firms) 2. private (one firm connecting to many other firms)

mashups

a combination of two or more technologies or data feeds into a single integrated tool

open innovation

a community perspective on innovating, vibrant ecosystem/marketplace, leverage other actor's talent/idea/assets/energy

foreign keys

a field that is a primary key in one table and appears in a different table

primary key

a field/attribute that uniquely identifies each record/entity in a table

structured query language (SQL)

a language used to create and manipulate databases

normalization

a method for analyzing and reducing a relational database to its most streamlined form for: minimum redundancy, maximum data integrity, best processing performance

update/modification anomaly

a need to change the same piece of information about an object multiple times

benefits of data warehousing

end users can access data quickly and easily, have consolidated view, conduct extensive analysis, allow OLAP analysis, set stage for data mining

types of online advertising fraud

enriching fraud, enriching impression fraud, deleting click fraud, disbarring fraud, rank-based impression fraud

deliberate acts

espionage or trespass, sabatoge, vandalism, piracy, identity theft, dumpster diving, cyber terrorism, virus

problems with creating data warehouses

expensive to build and maintain, difficult to incorporate data from legacy systems

limitations of RFID systems

expensive, lack of standards, concerns about privacy, implementation time

difficulties managing data

exponential increase in data, scattered data, diverse sources, importance of data security, quality, integrity, unstructured data, data decay

Datawarehouses ETL

extract required data from database, transform it based on some predetermined business rules, loads it into data warehouse

depleting click/impression fraud

generating clicks/bogus impressions to exhaust a rival's CPM budget

google's pagerank

google's algorithm for determining organic search results, sort of a popularity contest. google doesn't accept money for placement of links on organic search (on page 1 at the top vs. page 72)

patent

grants holder excluding rights on an invention or process for 20 years

public e-marketplaces

greater ease,speed, and volume of transactions. reduces marketplace friction

business continuity

hot site, warm site, cold site

data as a strategic asset

how data is created, stored, accessed and leveraged

unintentional acts

human errors (shoulder surfing, tailgating, opening questionable emails), social and reverse social engineering

market segmentation

identify common characteristics of customers who buy same products

direct marketing

identify which prospects should be included in a mailing list

insertion anomaly

inability to insert a piece of information about an object that can exist independently of another object without having to artificially insert some information about the other object

social engineering

is an attack where the attacker uses social skills to trick a legitimate employee into providing confidential company information such as passwords (unintentional human error on part of employee, deliberate on part of attacker)

technical limitations of e-commerce

lack of universally accepted security standards, expensive accessibility, insufficient telecommunications bandwidth

risk

likelihood that the threat will occur

vulnerability

likelihood that threat will harm the system

cookies

line of identifying text assigned and retrieved by a given web server and stored on your computer by your browsers. cookies build profiles of you as a user.

issues with organic search

link fraud (fake websites), keyword stuffing (putting unrelated buzzwords on sites), existence of dark web

domain name service (DNS)

looks up host and domain names and returns an IP address (internet protocol)

when to use a database to store data

lots of data, complex relationships, reporting/extracting/gathering

data marts

lower cost, scaled down version of data warehouse; emphasizes access and usability for a specific purpose

auction broker

matching advertisors with content providers/add slots

payment broker

matching buyers and sellers

infomediary

matching searchers with content providers/advertisors

google's "trick"

matchmaking, pairing internet surfers with advertisers and making a cut along the way

business model

method by which a company generates revenue to sustain itself

benefits of e-commerce: consumers

more choices, shop 24/7, receive information faster

does data mining need a data warehouse in order to work?

no, but data warehouse greatly improves chances of success

significant advantages of RFID systems

non-contact, non-line-of-sight, great at remarkable speeds, maintenance tracking, automated data collection, identification applications

TCP

transmission control protocol, slices up web pages into smaller chunks called packets

exposure

potential harm if threat breaks the controls and comprises resources

tagging (folksonomies)

practice and method of collaborative categorization using freely chosen keywords. folk+taxonomy= peoples classification

customer churn

predict which customers are likely to leave your company for a competitor

net neutrality

principle that all internet traffic should be treated equally

data mining

process of analyzing data for hidden or known intelligence, used for making predictions

advantages of e-markeplaces

real time transactions, immediate/frequent/accurate communication

RSS

really simple syndication, automatic notifications of content updates

advantage of EDI

reduces handling costs of manually processing paper documents, reduces errors, reduces cycle times

differences between OLAP and OLTP

refer to page 5 of notes

content adjacency problem

refers to concern over where a firm's advertisements will run. ex. ads beside race, offensive, illegal conversations

URL

uniform resource locator, tells a web browser what your looking for

categories of threats to information systems

unintentional acts, deliberate acts, natural disasters, technical failures, management failures

non-technical imitates of e-commerce

unsecure, unresolved legal issues, expensive, psychological issues (social interaction)

data storage for enterprise software

use relational databases (DBMS) and online transaction processing (OLTP)

facebook- a business based on social graph

social graph, platform, advertising, open graph

get S.M.A.R.T

social media awareness and response team

database management system (DBMS)

software for creating (add), maintaining (delete, modify) and manipulating (access and analyze) data

O3b satellite network

stands for other 3 billion, O3b plans to have multiple satellites circling the globe, blanketing underserved regions with high speed internet access

copyright

statutory that provides creators of intellectual property with ownership of the property for life and of the creator plus 70 years

motivations for criminals to hack information systems

steal data, extortion, hide trace of their criminal act, corporate espionage, terrorism, pranks, protest, revenge

electronic cash system

stored value money cards, smart cards, digital wallet

sematic web

the Web as a whole can be made more intelligent and perhaps even intuitive about how to serve a user's needs.

online analytical processing (OLAP) involves...

the analysis of accumulated data by end users (usually in data warehouse

e-commerce

the marketing, buying, selling, and support of products and services via computer networks including the internet

electronic data interchange (EDI)

the transfer of structured data from one computer to another

what if you don't want your info caught by the spiders?

there is a way to remain off limits to indexing which commercial search engines respect. A lot of this involves the "dark web" such as Facebook profiles

why do companies use BI?

to improve decision making, cut costs and identify business opportunities

B2B e-marketplaces

trading platform for conducting business among many buyers, sellers and trading partners


Kaugnay na mga set ng pag-aaral

AP Human Geography Chapter 10 - Agriculture

View Set

Sociology - CH 1: An introduction to sociology

View Set

ADV ECONOMICS: Chapters 3 and 4 - Supply and Demand

View Set