MIS Exam 3 Review
Bullwhip Effect
Information about product demand gets distorted as it passes from one entity to next across supply chain
Global supply chains and the internet
Internet helps companies manage many aspects of global supply chains - warehouse management, transportation management, logistics
Spoofing
Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else
Subscription
Netflix, Hulu, Xbox, Match.com
Downstream Supply Chain
Organizations and processes responsible for delivering products to customers
Gramm-Leach-Bliley Act
Requires financial institutions to ensure the security and confidentiality of customer data
Viruses
Rogue software program that attaches itself to other software programs or data files in order to be executed
Push-based model (build-to-stock)
Schedules based on best guesses of demand Supplier —-> customer
Net Marketplaces
Single market for many buyers and sellers Generate revenue from transaction fees, other services
Spyware/Adware
Small programs that install themselves covertly on computers to monitor user web surfing activity and serve up advertising
Personalization/Customization
Technology permits modification of messages, goods Personalized messages can be sent to individuals as well as groups Products and services can be customized to individual preferences
Customer Relationship Management (CRM)
a company-wide business strategy designed to optimize profitability, revenue, and customer satisfaction by focusing on highly defined and precise customer groups
Trojan Horses
a software program that appears to be benign but then does something other than expected
Hackers
an individual who intends to gain unauthorized access to a computer system.
Control
are methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its records, and operational adherence to management standards
advertisement
attract a large audience and advertise to them. most widely model in e-commerce, aids in providing "free" content to users
Operational CRM
customer-facing applications such as sales force automation, call center and customer service support, and marketing automation
Computer Crime
defined as "any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution
Which of the following statements about passwords is not true? a. passwords can be sniffed when being transmitted over a network b. passwords are often disregarded by employees c. password systems that are too rigorous may hinder employee productivity d. passwords can be stolen through social engineering e. authentication cannot be established by the use of a password
e. authentication cannot be established by the use of a password
Secure Hypertext Transfer Protocol
encrypts at the Application Layer of the TCP/IP protocol
Secure Sockets Layer(SSL)
encrypts at the Transport Layer of the TCP/IP protocol
Evidence for White-Collar crimes
found in digital form- data stored on computer devices, email, instant messages, e-commerce transactions
Digital Goods
goods that can be delivered over a digital network ex: music tracks, video, software, newspapers, books
SQL Injection attacks
hackers submit data to Web forms that exploit the site's unprojected software and sends rogue SQL query to the database
Sarbanes-Oxley Act
imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally
Worms
independent computer programs that copy themselves from one computer to other computers over a network
HIPPA
medial security and privacy rules and procedures
Software metrics
objective assessments of system n form of quantified measurements
Click Fraud
occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase
Ensuring System Availibility
online transaction processing required 100% availability, no downtime
different methods of authentications
password, biometric authentication, etc.
Keyloggers
record every keystroke on the computer to steal serial numbers passwords, launch internet attacks
affiliate
referrals, community site, bloggers
Security
refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems
Ransom-ware
remote administration tool
Content Provider
revenue: access fees, advertising
E-tailer
revenue: margin on the sales
Sales Force Automation
sales prospect and contact information, and sales quote generation capabilities
Symmetric Key
sender and receiver use single, shared key
SSIDs
service set identifiers - identify access points - broadcast multiple times
Phishing
setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data
E commerce today
still in early stages and continues to grow exponentially over time
Long tail Marketing
the ability to market goods and services to very small online audiences, due to reduced costs of reaching those small market segments
B2C (business-to-consumer)
the process in which businesses sell to consumers example: BarnesandNoble.com
C2C (consumer-to-consumer)
the process in which consumers sell to other consumers example: Ebay
B2B (business-to-business)
the process of selling merchandise or services from one business to another example: ChemConnect
Disintermediation
the removal of organizations or businesses process layers responsible for intermediary steps in a value chain
Identity Thefts
theft of personal information (social security id, drivers license or credit card numbers) to impersonate someone else
Behavioral Targeting
tracking online behavior (click-streams) of individuals on thousands of sites to better understand their interests and intentions
Encryption
transforming text or data into ciphertext that cannot be read by unintended recipients
Use of Social Engineering
tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information
Cracker
typically used to denote a hacker with criminal internet
Authentication
verifying a persons identity/status
Evil Twins
wireless networks that pretend to offer trustworthy Wi-Fi connections to the internet
Upstream supply chain
Firm's suppliers, suppliers' suppliers, processes for managing relationships with them
DoS- Denial of Service Attacks
Flooding server with thousands of false requests to crash the system/network
Location Based services and applications
Geo-social, Geo-advertising, Geo-information
Securing Mobile Platforms
Guidelines for use of platforms and applications
What are Enterprise Systems? ERP
- integrated software modules - common central database
Analytical CRM
(Business/marketing analytics)- analyze customer data output from operational CRM applications
Pharming
(cross-site request forgery): redirects users to bogus Web page, even when individual types correct Web page address into his or her browser
WEP: (wired equivalent privacy) security can provide some security by
- Activating the security feature - Assigning unique name to network's SSID and not broadcasting SSID - Using VPN technology
Security for Cloud Computing
- Highly distributed computer, difficult to track unauthorized activities - Cloud users should ask for proof of security and privacy procedures
customer relationship management systems
- Capture and integrate customer data from all over the organization - Consolidate and analyze customer data - Distribute customer information to various systems and customer touchpoints across enterprise
Just-in-time
- Components arrive as they are needed - Finished goods shipped after leaving assembly line
Fault Tolerant computing
- For continuous availability, ex stock markets - Contain redundant hardware, software, and power supply components that create an environment that provides continuous, uninterrupted service
High-availability computing
- Helps recover quickly from crash - Minimizes, does not eliminate downtime
Software Vulnerability
- Hidden bugs, zero defects cannot be achieved -Patches
Computer Forensics
- Scientific collection, examination, authentication, preservation, and analysis of data from computer storage media for use as evidence in court of law - Includes recovery of ambient and hidden data
WEP: (Wired Equivalent Privacy)
- Security standard for 802.11; use is optional - Uses shared passwords for both users and access points
internet vulnerabilities
- network open to anyone - size of internet means abuses can have wide impact
Public Key
- Uses two, mathematically related keys: public key and private key - Sender encrypts message with recipient's public key - The recipient decrypts with private key
Enterprise Software
- built around predefined business processes - map business processes to software processes
Identity Management
-Automates keeping track of all users and privileges -Authenticates users, protecting identities, controlling access -Microsoft Active Directory (windows domain network)
Sniffer
-Packet sniffing/ packet analyzer -Eavesdropping program that monitors the information traveling over network
Electronic Data Interchange
1. Computer-to-computer exchange of standard transactions such as invoices, purchase orders 2. Major industries have standards that define structure and information fields of electronic documents for that industry
Web 2.0 service/crowdsourcing
1. Fastest growing area of e-commerce revenues 2. Users are able to "mine" for friends within the networks 3. Social networking sites sell banner ads, user preference information, and music, videos, etc
Enterprise Application Challanges
1. Highly expensive to purchase and implement 2. technological changes 3. business process changes 4. switching costs, dependence on software vendors 5. data standardization, management, cleansing
Exchanges
1. Independently owned third-party Net marketplaces 2. Connect thousands of suppliers and buyers for spot purchasing
Other Mobile Commerce Services
1. Mobile pay Games and entertainment
Universal Standards
1. One set of technology standards: internet standards 2. Being able to exchange files and data with anyone without regard to types of hardware and software
Social Technology
1. Promotes user content generation and social networking - YouTube!! 2. New internet social and business model enable user content creation and distribution, support social networks
Richness
1. Supports video, audio, and text messages 2. Is as exemplified in YouTube, Facebook, Instagram, etc. 3. Makes it possible to deliver rich messages with text, audio and video simultaneously to large numbers of people
Global reach
1. The technology reaches across national boundaries, around Earth 2. Means customers can buy products from another country 3. Market-space includes, potentially, billions of consumers and millions of businesses worldwide (online user population)
Interactivity
1. The technology works through interaction with the user 2. Means a chat window to interact with technical support at a merchant's Web site 3. consumer becomes co-participant in process of delivering goods to market
Social CRM
1. incorporating social networking technologies 2. Company social networks 3. Customer interaction via facebook/twitter/ etc 4. Other social media platforms businesses use
Business Value of Enterprise Systems
1. increase operational efficiency 2. provide firm-wide information to support decision making 3. enable rapid responses to customer requests for information or products 4. include analytical tools to evaluate overall organizational performance
Ubiquity
1. internet/Web technology available everywhere: work, home, etc., anytime 2. Enhanced customer convenience and reduced shopping costs
Next-Generation Enterprise Applications
1. move it to make applications more flexible, web enabled, integrated with other systems 2. Enterprise solutions/suites 3. open-source applications 4. Cloud-based-on-demand solutions 5. Mobile compatible
Social, mobile, local e-commerce marketing
1. social media 2. mobile, localized ads and apps, geo-locations 3. Measures "conversations" and "engagements" 4. Impressions
Original E-commerce marketing
1. web sites 2. display ads 3. measures "eyeballs" and impressions of display ads
customer service
Assigning and managing customer service requests; Web-based self-service capabilities
Safety Stock
Buffer for lack of flexibility in supply chain
Marketing
Capturing prospect and customer data, scheduling and tracking direct-marketing mailings or e-mail
m-commerce (mobile commerce)
Communicating with and even selling to customers through wireless handheld devices, such as cellular telephones and personal digital assistants.
Pull-based model (demand-driven)
Customer orders trigger events in supply chain Examples: Wal-mart and Dell Supplier ←—— customer
Wardiving
Eavesdroppers drive by buildings and try to detect SSID and gain access to the network and resources
Internal Threats
Employees-inside knowledge