MIS Final
Public Key Encryption
Two key system used for securing electronic transmissions
Linux
An open source software operating system.
expert systems
computer program that uses AI tech to simulate the judgment and behavior of a human or an organization that has expert knowledge and experience in a particular field
deeplearning
a type of machine learning that uses multiple layers of interconnections among data to identify patterns and improve predicted results- applied in tasks like speech recognition, image recognition, and computer vision
type 1
hardware, hypervisor, OS
cheap land, low-cost power, ultrafast fiber-optic connections, and mild climates
requierements of server farms
CAPTCHAs
An acronym for Completely Automated Public Turing Test to Tell Computers and Humans Apart. CAPTCHAs are those scrambled character images that many sites require to submit some sort of entry (account setup, ticket buying) and are meant to be a Turing Test—a test to distinguish if a task is being performed by a computer or a human.
CAPTCHAs
An acronym standing for completely automated public Turing test to tell computers and humans apart. The Turing Test is, rather redundantly, an idea (rather than an official test) that one can create a test to tell computers apart from humans.
graphical query tools
Allow a user to create a query through a point-and-click or drag-and-drop interface, rather than requiring programming knowledge.
security-focused
Also known as "hardened." Term used to describe technology products that contain particularly strong security features.
Integrated Development Environment (IDE)
An application that includes an editor (a sort of programmer's word processor), debugger, and compiler, among other tools.
feature creep
An expansion of the scope of a project.
provider: applications, data, OS, virtualization, servers, storage, networking
SaaS
encryption
Scrambling data using a CODE or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
Service-oriented architecture (SOA)
Set of Web services built around an organization's processes and procedures
web services
Small pieces of code that are accessed via the application server which permit interoperable machine-to-machine interaction over a network.
firmware
Software stored on nonvolatile memory chips
wisdom of crowds
The idea that a group of individuals (the crowd), often consisting of untrained amateurs, will collectively have more insight than a single or small group of trained professionals.
scrum
The leading agile development methodology for completing projects with a complex, innovative scope of work
artificial intelligence
The science of designing and programming computer systems to do intelligent things and to simulate human thought processes, such as intuitive reasoning, learning, and understanding language.
machine learning
The science of getting machines to learn and act in a similar way to humans while also autonomously learning from real-world interactions and sets of teaching data that we feed them
SMART
The social media awareness and response team. A group tasked with creating policies and providing support, training, guidance, and development expertise for and monitoring of a firm's social media efforts.
interpreted
command are -- within their applications, rather than compiled to run directly by a microprocessor
risk assessment team
consider vulnerabilities and countermeasure investments
vigilance
constant -- regarding security needs to be-part of one's individual skill set, and key component in orgs culture
containers
a type of virtualization that allows for shared operating systems for more resource savings and faster execution
Unsupervised Machine Learning
algorithms are used when the information used to train is neither classified nor labeled
Supervised Machine Learning
algorithms can apply what has been learned in the past to new data using labeled examples to predict future events
platform specific
applications are --
row (record)
collection of a set of values for all fields in one table
firewalls, intrusion detection systems, blacklists, whitelists
lock down networks
program
malware is any -- or file that is harmful to a computer user
SEO rankings
material deemed useful is likely to gain more Web links and cause firm-affiliated content to rise in --, making the firm easier to find
shoulder surfing
physical threats; Gaining compromising information through observation (as in looking over someone's shoulder).
dumpster diving
physical threats; combing through trash to identify valuable assets
business intelligence
technologies, applications, and practices for the collection, integration, analysis, and presentation of business information
computer-to-computer exchange
the -- of business documents from a retailer to a vendor and back
survey
the collection of data by having people answer a series of questions
effectively zero
the marginal cost of producing an additional copy of a software product is
Database Management System (DBMS)
creates, reads, updates, and deletes data in a database while controlling access and security
zero-day exploit
cyber attack that occurs on the same day a weakness is discovered in software
phishing
cyber attack that uses disguised email as a weapon
transactional system, relation databases, regular cadence
data flows into a data warehouse from --, --, and other sources on a --
repositories of summarized
data marts contain -- data collected for analysis on a specific section or unit within an organization
mathematical
data mining uses sophisticated -- algorithms to segment the data and evaluate the probability of future events
data-driven , fact-based
decision making is --, --
risks associated w SaaS
dependence on a single vendor, concern about long-term viability of partner firms, reliance on network connection, data assets store offsite may lead to security concerns, limited configuration, customization, an integration. UI of web-based software is less sophisticated
information
derived from combining data to resolve the uncertainty possessed by data, thereby providing answers to simple questions
knowledge
insight derived from experience and expertise
crowdsourcing
inviting broad communities of people - customers, employees, independent scientists and researchers, and even the public at large - into the new product innovation process
bad data
using -- in data mining can give wrong estimates
viral
when information or applications spread rapidly between users
relation
when the data in one table can be related to the data in another table
peer production
when users collaboratively work to create content, products, and services
cost effective, security/transparency, easy integration, quality, availability of source code
why open source?
sharing
wiki acts as a collective corporate memory that is vital for --
lock down partners
•Insist on partner firms being compliant with security guidelines and audit them regularly. •Use access controls to control data access on a need-to-know basis. •Use recording, monitoring, and auditing to hunt for patterns of abuse. •Maintain multiple administrators to jointly control key systems.
Hadoop
a set of mostly open-source tools to manage massive amounts of unstructured data for storage, extraction, and computation
field
a single characteristic of data that appears in a table as a column
enterprise resource planning
a software package that integrates the many functions of a business
neutral point of view
an editorial style that is free of bias and opinion
social network
an online community that allows users to establish a personal profile and communicate with others
database server, analytics engine, presented results
basic components of data warehouse
variety, volumes, velocity
big data is data that contains greater -- arriving in increasing -- and with ever-higher --
reporting, analysis
business intelligence is systems that use data created by other systems to provide -- and -- for organizational decision making
packaged enterprise system
can streamline processes, make data more usable, and ease the linking of systems with software across the firm and with key business partners
accelerate
cloud computing can -- innovation
pools of computing resources
cloud computing is -- that reside inside an organization and that can be served up for specific tasks as need arrives
database
A single table or a collection of related tables.
table
An arrangement of data made up of horizontal rows and vertical columns.
data cube
A special database used to store data in OLAP reporting.
data aggregators
Firms that collect and resell data.
technology threats
- Compromising poorly designed software - Push-Button hacking: Tools designed to easily automate attacks. - Network threats: Network itself is a source of compromise.
have failure and recovery plans
- Employ recovery mechanisms to regain control if key administrators are incapacitated or uncooperative. - Broad awareness reduces organizational stigma in coming forward. - Share knowledge on hacking techniques with technology partners.
computing hardware
- Storage devices - Input devices - Output devices
unstructured, structured
-,-, big, and costly to work through conventional data bases because of large amount of data
compromising
-- computing assets for use in other crimes
Scalable
-- computing resources can help a firm deal with spiking impact from Black Swan events
markup, encoding
-- language that defines a set of rules for -- documents in a format that is both human-readable and machine-readable
server, client
-- program that fulfills the request of a --
client, server
-- software program that makes requests of a -- program
paid media
Refers to efforts where an organization pays to leverage a channel or promote a message.
bad apples
Rogue employees who steal secrets, install malware, or hold a firm hostage
social engineering
A non-technical method of intrusion that relies on human interaction and often involves tricking people into breaking normal security procedures.
physical threats
-Dumpster Diving -Shoulder Surfing -Brute-force Attacks
JSON
A popular data interchange format. It is often used when receiving data from Web services, e.g. Google Vision API
data, information
knowledge is based on
service level agreement
A negotiated agreement between the customer and the vendor. The -- may specify the levels of availability, serviceability, performance, operation, or other commitment requirements.
software
A computer program or a collection of programs. It is a precise set of instructions that tells hardware what to do.
cloud bursting
A configuration that's set up between a private cloud and a public cloud. If 100 percent of the resource capacity in a private cloud is used, then overflow traffic is directed to the public cloud using cloud bursting.
Capability Maturity Model Integration (CMMI)
A process-improvement approach (useful for but not limited to software engineering projects) that can assist in assessing the maturity, quality, and development of certain organizational business processes, and suggest steps for their improvement.
expert systems
A set of technologies used in the development of AI systems that use a set of programmed decision rules or example outcomes to perform a task in a way that mimics applied human expertise.
agile development
A software development methodology that delivers functionality in rapid iterations, measured in weeks, requiring frequent communication, development, testing, and delivery.
software package
A software product offered commercially by a third party.
neural networks
A statistical techniques used in AI, and particularly in machine learning. Neural networks hunt down and expose patterns, building multilayered relationships that humans can't detect on their own.
hack
A term that may, depending on the context, refer to either 1) breaking into a computer system, or 2) a particularly clever solution.
Turing test
A test proposed by Alan Turing in which a machine would be judged "intelligent" if the software could use conversation to fool a human into thinking it was talking with a person instead of a machine.
query tools
A tool to interrogate a data source or multiple sources and return a subset of data, possibly summarized, based on a set of criteria.
certificate authority
A trusted third party that provides authentication services in public key encryption schemes.
semi-supervised learning
A type of machine learning where the data used to build models contains data with explicit classifications, but is also free to develop its own additional classifications that may further enhance result accuracy.
e-discovery
Any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
malware
Any program that is harmful to a computer or, by extension, a computer user.
desktop software
Applications installed on a personal computer, typically supporting tasks performed by a single user.
enterprise software
Applications that address the needs of multiple users throughout an organization or work group.
trojans
Attempt to sneak in by masquerading as something they're not
Transaction Processing System (TPS)
Basic business system that serves the operational level and assists in making structured decisions
Over-engineering
Building a model with so many variables that it will only work on the data you used to create the model. (BTW, this is also known as "overfitting". )
decision making
Choosing among two or more alternatives.
Platform as a Service (PaaS)
Cloud providers offer services for customers to build their own applications on the provider's infrastructure.
Infrastructure as a Service (IaaS)
Cloud providers offer services that include running the remote hardware, storage, and networking.
Key
Code that unlocks encryption.
owned media
Communication channels that an organization controls. These can include firm-run blogs, Web sites, apps, and organization accounts on social media such as Twitter, Facebook, Pinterest, YouTube, and Instagram.
firewalls
Control network traffic, block unauthorized traffic
cash-out fraudsters
Criminals that purchase assets from data harvesters to be used for illegal financial gain. Actions may include using stolen credit card numbers to purchase goods, creating fake accounts via identity fraud, and more.
data harvesters
Cybercriminals who infiltrate systems and collect data for illegal resale.
blacklists
Deny the entry of specific IP addresses and other entities
applications
Desktop applications, enterprise software, utilities, and other programs that perform specific tasks for users and organizations
analytics
Driving decisions and actions through extensive use of: -Data -Statistical and quantitative analysis -Explanatory and predictive models -Fact-based management
astroturfing
Engineering the posting of positive comments and reviews of a firm's product and services (or negative ones of a firm's competitors). Many ratings sites will penalize firms that offer incentives for positive feedback posts.
compliance
Ensuring that an organization's systems operate within required legal constraints, and industry and organizational obligations
ETL
Extraction, Transformation, and Loading- key step in getting data into a data warehouse/mart
LAMP
Linux, Apache, MySQL, PHP (powers many sites we visit each day)
sock puppet
Fake online persona created to promote a particular point of view, product, or individual
Software as a Service (SaaS)
Firm subscribes to a third-party software and receives a service that is delivered online
customer: applications, data, OS provider: virtualization, servers, storage, networking
IaaS
embassy
In the context of social media, an established online presence where customers can reach and interact with the firm. An effective embassy approach uses a consistent firm name in all its social media properties.
wikimasters
Individuals often employed by organizations to review community content in order to delete excessive posts, move commentary to the best location, and edit as necessary.
griefers
Internet vandal and mischief maker; also sometimes referred to as a troll.
Biometrics
Measure and analyze human body characteristics for identification or authentication
user interface
Mechanism through which users interact with a computing device
waterfall method
Method in which the systems development life cycle tasks occur sequentially, with one activity starting only after the previous one has been completed.
Intrusion Detection System (IDS)
Monitor network use for hacking attempts and take preventive action
cost
OSS lowers the -- of computing and makes computing options accessible to smaller firms
operating systems
OSX, Linux, Windows
customer: applications, data provider: OS, virtualization, servers, storage, networking
PaaS
whitelists
Permit communication only with approved entities or in an approved manner
long tail
Phenomenon whereby firms can make money by offering a near-limitless selection of contents and products
computing hardware
Physical components of information technology, which includes the computer and its peripherals
prediction market
Polling a diverse crowd and aggregating opinions in order to form a forecast of an eventual outcome.
lock down hardware
Prevent unapproved software installation. Force file saving to hardened, backed-up, and monitored servers. Reimage hard drives of end-user PCs. Disable boot capability of removable media. Prevent Wi-Fi use and require VPN encryption for network transmissions.
analytics, statistical, and graphical computing
R deals with
data cloud
Sometimes referred to as cloud data warehousing, this term refers to a cloud service that provides tools to extract and transform data from disparate sources so that it can be interrogated as needed. Unlike data warehouses, data lakes, or similar tools that an organization might run on-site, a data cloud can be spun up to temporarily hold a very large amount of data for short-term use, then disbanded when it is no longer needed. Snowflake is the best known of the many firms providing services in this space.
vertical niches
Sometimes referred to as vertical markets. Products and services designed to target a specific industry (e.g., pharmaceutical, legal, apparel retail).
embedded systems
Special-purpose software designed and included inside physical products
compile
Step in which program code written in a language that humans can more easily understand, is then converted into a form (expressed in patterns of ones and zeros) that can be understood and executed by a microprocessor. Programmers using conventional programming languages must compile their software before making it available for execution.
botnets
Surreptitiously infiltrated computers, controlled remotely
supply chain management
Systems that can help a firm manage aspects of its value chain through delivery of finished products and services at the point-of-consumption.
Customer Relationship Management (CRM)
Systems used to support customer-related sales and marketing activities.
black swans
Unpredicted, but highly impactful events
Structured Query Language (SQL)
Used to create and manipulate databases
WYSIWYG
What You See Is What You Get
free rider problem
When others take advantage of a user or service without providing any sort of reciprocal benefit.
data mart
contains a subset of data warehouse information oriented to a specific business line
closely guarded secrets, never
conventional software firms treat their intellectual property like --, and the almost -- provide the source code
deepfake
creates bogus media by AI
funds, other
diverts -- that can be used for -- competitive initiatives and encouraging innovation
offline
e-discovery can be carried out -- on a particular computer or it can be done in a network
acquisition
efficient and integrated enterprise systems may also make firms more attractive -- targets or makes it easier for a firm to acquire other firms and realize benefits
device specific
embedded systems are --
trained, understand
employees should be -- and -- the penalties
Ubuntu.com
example of OSS
NO
is linux common on desktops?
legacy systems
older information systems that remain in use because they still function and are costly to replace (incompatible systems)
blogs
online journals where people and companies post their thoughts and other content, usually related to narrowly defined topics
OCR
optical character recognition, the branch of computer science that involves reading text from paper and translating the images into a form that the computer can manipulate
free
other SaaS firms offer -- services supported by advertising
upgraded/premium
other SaaS firms promote the sale of -- versions for additional fees
streamline processes, usable, linking , business partners
packaged enterprise system can --, make data more --, and ease the -- of systems with software across the firm and with key --
disguised email
phishing utilizes
brue-force attacks
physical threat; trial and error method used by application programs to decode encrypted data such as password
network threats
tech threat, Network itself is a source of compromise
distributed computing
processes and manages algorithms across many machines in a computing environment
platform
products and services that allow for the development and integration of software products and other complementary goods
APIs
programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data
Application Programming Interface
programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data
earned media
promotions that grow organically from customer efforts or other favorable publicity. Social media can be a key driver of earned media (think positive tweets, referring Facebook posts, and pins on Pinterest).
automatic discovery, predictions, creations of info, focus on large data sets
properties of data mining
canned reports
provide regular summaries of information in a predetermined format
incompatible systems
reason for poor information
cloud computing
replacing computing resources with services provided over the internet
execute within an application
scripting languages ---
neutral network
series of algorithms that endeavors to recognize underlying relationships in a set of data through process that mimics the way that the human brain operates
margin structure
shifting to cloud computing modifies the -- for many in the computing industry
Distributed Denial of Service (DDoS)
shutting down websites by overwhelming them with a crushing load of what seems like legitimate requests sent simultaneously by thousands of machines (Multiple computers)
Enterprise Resource Planning (ERP)
slaes/inventory, manufactoring/purchasing, HR, order tracking and decision support
data mining
using computers to identify hidden patterns in large data sets and to build models from this data
support and consulting services
vendors make money on OSS by selling --
web 2.0
web applications that facilitate interactive information sharing, interoperability, user-centered design, and interactivity
Multi-factor authentication
when identity is proven by presenting more than one item for proof of credentials
external sources
information provided by the media and other people
spoofing
The act of disguising a communication from an unknown source as being from a known, trusted source.
primary key
A field (or group of fields) that uniquely identifies a given entity in a table
utility computing
A form of cloud computing where a firm develops its own software, and then runs it over the Internet on a service provider's computers.
Data Visualization
A graphical representation of data
dashboards
A heads-up display of critical indicators that allow managers to get a graphical glance at key performance metrics.
server farm
A massive network of computer servers running software to coordinate their collective use
hash tag
A method for organizing tweets where keywords are preceded by the # character.
genetic algorithms
A method for solving both constrained and unconstrained optimization problems that is based on natural selection, the process that drives biological evolution. They are commonly used to generate high-quality solutions to optimization and search problems by relying on bio-inspired operators.
Online Analytical Processing (OLAP)
A method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube.
serverless computing
A type of cloud computing where a third-party vendor manages servers, replication, fault-tolerance, computing scalability, and certain aspects of security, freeing software developers to focus on building "Business Solutions" and eliminating the need to spend time and resources managing the technology complexity of much of the underlying "IT Solution."
Wiki
A website that can be modified by anyone, from directly within a web browser (provided that user is granted edit access).
scalability
Ability to either handle increasing workloads or to be easily expanded to manage workload increases. In a software context, systems that aren't scalable often require significant rewrites or the purchase or development of entirely new systems.
total cost of ownership
All of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system.
total cost of ownership
An economic measure of the full cost of owning a product (typically computing hardware and/or software). TCO includes direct costs such as purchase price, plus indirect costs such as training, support, and maintenance.
black hat hacker
Computer criminals who exploit a system's weakness for personal gain
database administrator
Job focused on directing, performing, or overseeing activities associated with a database or set of databases
interpreted
Languages where each line of written code is converted for execution at run-time.
Hactivists
a protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage
Java
Programming language designed to provide true platform independence for application developers
scripting languages
Programming tool that executes within an application. -- are interpreted within their applications, rather than compiled to run directly by a microprocessor.
omnichannel
Providing customers with a unified experience across customer channels, which may include online, mobile, catalog, phone, and retail. Pricing, recommendations, and incentives should reflect a data-driven, accurate, single view of the customer.
ad hoc reporting tools
Puts users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters
audits
Real-time monitoring of usage: announced and surprise
virtual desktops
Running an instance of a PC's software on another machine and delivering the image of what is executing to the remote device
SEO
Search Engine Optimization. The process of improving a page's organic page rankings (rank in search results).
infrastructure backbone
Server farms provide the -- to SaaS and hardware cloud efforts, as well as many large-scale Internet services.
SDK
Software Development Kit. Tools that allow the creation of products or add-ons for a specific operating system or other computing platform.
application server
Software that houses and serves business logic for use (and reuse) by multiple applications.
Open Source Software (OSS)
Software that is free and where anyone can look at and potentially modify the code.
patches
Software updates that plug existing holes
computer hardware and software
TPS consist of -- hosting a transaction-oriented application that performs the routine transactions necessary to conduct business
worms
Take advantage of security vulnerability to automatically spread
virtualization
Technology that can make a single computer behave like many separate computers
voice-print
Technology that identifies users via unique characteristics in speech.
roll back
The ability to revert a wiki page to a prior version. This is useful for restoring earlier work in the event of a posting error, inaccuracy, or vandalism.
Online Reputation Management
The process of tracking and responding to online mentions of a product, organization, or individual. Services supporting online reputation management range from free Google Alerts to more sophisticated services that blend computer-based and human monitoring of multiple media channels.
collaborative consumption
When participants share access to products and services rather than having ownership. Shared resources can be owned by a central service provider (e.g., ZipCar) or provided by a community that pools available resources (e.g., Airbnb, Uber).
transaction
a -- is an elementary activity conducted during business operations
loyalty card
a card issued by a shop to allow customers to save money on the basis of what they spend
data lake
a catch-all term for storage and access technologies used in Big Data
data warehouse
a central repository for data from various functional areas of the organization that are stored and inventoried on a centralized computer system so that the information can be shared across all functional departments of the business
big data
a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools
blog rolls
a list of a blogger's favorite blogs
dynamic pricing
a pricing strategy in which the price can easily be adjusted to meet changes in the marketplace
R
a programming language specifically created for analytics, statistical, and graphical computing
viral campaign
a promotion in which a few online mentions produce millions of comments
honeypots
false targets for computer criminals to attack
strategic advantages
firms need to think about the -- that can be created with CC
data storage plans
firms should account for e-discovery in its archiving an d-- as data is often complex because of the sheer volume of electronic data produced and stored
dynamic pricing
flexible prices based on market demands
emerging threats, updating, governance
functions of research and development- understanding - and - security techniques, working on broader - issues
python
general purpose programming language
type 2
hardware, OS, hypervisor, OS
User, Operating System, Hardware
hardware/software layer cake
viruses
infect other software or files
platform independence
java is meant to provide
immediate/unfiltered publication, ease of use, comments, reverse chronology, persistence, search ability, tags
key features of blogs
Compliance Requirements
legal or professionally binding steps that must be taken
trackbacks
links in a blog post that refer readers back to cited sources
artificial intelligence
machine learning is an application of --
operating systems
make it easier for user/computer interaction and make it easier to write application software
shallowfakes
manipulating media without using artificial intelligence
viruses, worms, trojans
methods of infection
usage-based, monthly subscription
money can be earned through SaaS via a -- pricing model similar to a --
NOT
most transactional databases are -- set up to be simultaneously accessed for reporting and analysis
lock in
network effects and switching costs can offer a degree of customer preference and --
on-line mode, batch mode
types of TPS
inbound marketing
refers to leveraging online channels to draw consumers to the firm with compelling content rather than conventional forms of promotion such as advertising, e-mail marketing, traditional mailings, and sales calls
Change Management
refers to the many techniques used to bring about successful change in a business
white hat hacker
uncover computer weaknesses without exploiting them
human interaction
social engineering relies heavily on
database management system
software for creating, maintaining, and manipulating data
operating system
software that controls the computer hardware
applications
software that houses business logic for use by multiple --
independent tool
software/hardware -- for storing and translating data
XML
software/hardware independent tool for storing and translating data
openly shared
source code for OSS products is --
business intelligence
systems that use data created by other systems to provide reporting and analysis for organizational decision making
education, audit, and enforcement
taking action as an organization: -,-,-
frameworks, standards, and compliance
taking action as an organization: follow ---
push-button hacking
tech threat, Tools designed to easily automate attacks
poorly designed
tech threat: Compromising --software
EDI
the computer-to-computer exchange of business documents from a retailer to a vendor and back
marginal cost
the cost of producing one more unit of a good
cloud computing
the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
data
the raw collection of unrelated facts that don't necessarily have any context