ISA 235 MU (Ch. 1-4)
mashup editor
WYSIWYGs or what you see is what you get tools
information security
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
management information systems (MIS)
a business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making & problem solving
neural network
a category of AI that attempts to emulate the way the human brain works
system
a collection of parts that link to achieve a common purpose
big data
a collection of rare, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods & tools
internet service (ISP)
a company that provides access to the internet for a monthly fee
semantic web
a component of web 3.0 that describes things in a way that computers can understand
drive-by hacking
a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
competitive click-fraud
a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
virtual reality
a computer-simulated environment that can be a simulation of the real world or an imaginary world
dynamic process
a continuously changing process that provides business solutions to ever-changing business operations
nonrepudiation
a contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions
variable
a data characteristic that stands for a value that changes or varies over time
digital certificate
a data file that identifies individuals or organizations online and is comparable to a digital signature
smart card
a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing
report
a document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information
competitive advantage
a feature of a product or service on which customers place a greater value than on similar offerings from competitors
entry barrier
a feature of a product or service that customers have come to expect and entering competitors must offer the same for survival
ransomware
a form of malicious software that infects your computer and asks for money. simple locker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys
pretexting
a form of social engineering in which one individual lies to obtain confidential data about another individual
fair information practices
a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy
business process model
a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint
business process model and notation (BPMN)
a graphical notation that depicts the steps in a business process
zombie farm
a group of computers on which a hacker has planted zombie programs
hardware key logger
a hardware device that captures keystrokes on their journey from the keyboard to the motherboard
hashtag
a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#)
child online protection act (COPA)
a law that protects minors from accessing inappropriate material on the internet
business strategy
a leadership plan that achieves a specific set of goals or objectives such as increasing sales, decreasing costs, entering new markets, or developing new products or services
website bookmark
a locally stored URL or the address of a file or internet page saved as a shortcut
phishing expedition
a masquerading attack that combines spam with spoofing
internet
a massive network that connects computers all over the world and allows them to communicate with one another
fuzzy logic
a mathematical method of handling imprecise or subjective information
authentication
a method for confirming users' identities
information governance
a method or system of government for information management or control
Porter's 5 Forces Model
a model for analyzing the competitive forces within the environment in which a company operates, to assess the potential for profitability in an industry
privilege escalation
a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications
disruptive technology
a new way of doing things that initially does not meet the needs of existing customers
business process patent
a patent that protects a specific set of procedures for conducting a particular business activity
stakeholder
a person or group that has an interest or concern in an organization
social media manager
a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand
spear phishing
a phishing expedition in which the emails are carefully designed to target a particular person or organization
vishing (voice phishing)
a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information
business model
a plan that deals how a company creates, delivers, and generates revenues
ebusiness model
a plan that details how a company creates, delivers, and generates revenues on the internet
acceptable use policy (AUP)
a policy that a user must agree to follow to be provided access to corporate email, information systems, and the internet
typosquatting
a problem that occurs when someone registers purposely misspelled variations of well0known domain names
benchmarking
a process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance
key logger, or key trapper, software
a program that records every keystroke and mouse click
zombie
a program that secretly takes over another computer for the purpose of launching attacks on other computers
loyalty program
a program to reward customers based on spending
static report
a report created once based on data that does not change
dynamic report
a report that changes automatically during creation
instant messaging (IM or IMing)
a service that enables "instant" or real-time communication between people
voiceprint
a set of measurable characteristics of a human voice that uniquely identifies an individual
application programming interface (API)
a set of routines, protocols, and tools for building software applications
collaboration system
a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information
model
a simplified representation or abstraction of reality
cookie
a small file deposited on a hard drive by a website containing information about customers and their web activities. cookies allow websites to record the comings and goings of customers, usually without their knowledge or consent
spyware
a special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission
intelligent agent
a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users
executive information system (EIS)
a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation, and insight
static process
a systematic approach in attempt to improve business effectiveness and efficiency
BPMN activity
a task in a business process -any work that is being performed in a process -represented by a rounded-corner rectangle -includes checking availability, picking up the customers, and confirming the booking
phishing
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that looks as though they came from legitimate sources
digital rights management
a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
certificate authority
a trusted third party, such as VeriSign, that validates user identities by means of digital certificatees
wiki
a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required
snapshot
a view of data at a particular moment in time
systems thinking
a way of monitoring the entire system by viewing multiple inputs being processed or transformed to product outputs while continuously gathering feedback on each part
real simple syndication (RSS)
a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video in a standardized format
mashup
a website or web application that uses content from more than one source to create a completely new product or service
internet of things
a world where interconnected, internet-enabled devices or "things" can collect & share data without human intervention
ebusiness revenue model
advertising fees, license fees, subscription fees, transaction fees, value-added service fees
intermediaries
agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together
supply chain
all parties involved, directly or indirectly, in obtaining raw materials or a product
bring your own device (BYOD) policy
allows employees to use their personal mobile derives and computer to access enterprise data and applications
video-conference
allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards
social bookmarking
allows users to share, organize, search, and manage bookmarks
threat
an act or object that poses a danger to assets
first-mover advantage
an advantage that occurs when a company can significantly increase its market share by being first to market with a competitive advantage
product differentiation
an advantage that occurs when a company develops unique differences in its products with the intent to influence demand
social network
an application that connects people by matching profile information
genetic algorithm
an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem
information property
an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged
patent
an exclusive right to make, use, and sell an invention granted by a government to the inventor
blog, or web log
an online journal that allows users to post their own comments, graphics, and video
native advertising
an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement
eshop (estore or etailer)
an online version of a retail store where customers can shop at any hour
cyberwar
an organized attempt by a country's military to disrupt or destroy information and communication systems for another country
teergrubing
anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam
closed source
any proprietary software licensed under exclusive legal right of the copyright holder
BPMN event
anything that happens during the course of a business process. -represented by a circle -includes customer requests, time requests, or the end of the process
business-to-consumer (B2C)
applies to any business that sells its products or services directly to consumers online
consumer-to-business (C2B)
applies to any consumer who sells a product or service to a business on the Internet
business-to-business (B2B)
applies to businesses buying from and selling to each other over the internet
consumer-to-consumer (C2C)
applies to customers offering goods and services to each other on the internet
vertical privilege escalation
attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data
horizontal privilege escalation
attackers grant themselves the same access levels they already have but assume the identity of another user
distributed denial-of-service attack (DDoS)
attacks from multiple computers that flood a website with so many requests for service that it slows down or crashes. a common type is the Ping of Death, in which thousands of computers try to access a website at the same time, overloading it and shutting it down
business process improvement
attempts to understand and measure the current process and make performance improvements accordingly
benchmark
baseline values the system seeks to attain
information example
best-selling product, best customer, worst-selling product, worst customer
web conferencing (webinar)
blends videoconferencing with document-sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants
business 2.0 tools for collaborating
blog, wiki, mashup
black-hat hackers
break into other people's computer systems and may just look around or may steal and destroy information
_______________________ is a standardized set of activities that accomplish a specific task
business process
core process
business processes, such as manufacturing goods, selling products, and providing service that make up the primary activities in a value chain
polymorphic viruses and worms
change their form as they propagate
knowledge example
choosing not to fire a sales representative who is underperforming knowing that person is experiencing family problems, listing products that are about to expire first on the menu or creating them as a daily special to move the product
collective intelligence
collaborating and tapping into the core knowledge of all employees, partners, and customers
search engine optimization (SEO)
combines art along with science to determine how to make URLs more attractive to search engine, resulting in higher search engine ranking
asynchronous communication
communication such as email in which the message and the response do not occur at the same time
synchronous communication
communications that occur at the same time such as IM or chat
time bombs
computer viruses that wait for a specific date before executing instructions
expert system
computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems
explicit knowledge
consists of anything that can be documented, archives, and codified, often with the help of MIS
open system
consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system
web log
consists of one line of information for every visitor to a website and is usually stored on a web server
digital dashboard analytical capabilities
consolidation, drill-down, slice-and-dice, pivot
information privacy policy
contains general principles regarding information privacy
ethical computer use policy
contains general principles to guide computer user behavior
internet use policy
contains general principles to guide the proper use of the internet
source code
contains instructions written by a programmer specifying the actions to be performed by computer software
user-contributed content (also referred to as user-generated content)
content created and updated by many users for many users
podcasting
converts an audio broadcast to a digital music plauer
switching costs
costs that make customers reluctant to switch to another product or service
chief user experience officer
create the optimal relationship between user and technology
critical success factors (CSFs)
crucial steps companies perform to achieve their goals and objectives and implement their strategies
information
data converted into a meaningful and useful context
machine-generated data
data created by a machine without human intervention
dashed line in LucidChart
data flow
structured data
data that has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address
human-generated data
data that humans, in interaction with computers, generate
unstructured data
data that is not defined and does not follow a specified format and is typically free-form text such as emails, Twitter tweets, and text messages
finance
deals with strategic financial issues including money, banking, credit, investments, and assets
decrypt
decodes information and is the opposite of encrypted
network effect
describes how products in a network increase in value to users as the number of users increases
social tagging
describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search
source document
describes the original transaction record along with details such as its date, purpose, and amount spent and includes cash receipts, canceled checks, invoices, customer refunds, employee time sheet, etc.
information security plan
details how an organization will implement the information security policies
email privacy policy
details the extent to which email messages may be read by others
chief automation officer
determines if a person or business process can be replaced by a robot or software
machine to machine (M2M)
devices that connect directly to other devices
effectiveness
doing the right things
efficiency
doing things right
business processes should _________ MIS choices & should be based on business strategies & goals
drive
strategic business processes
dynamic, nonroutine, long-term, business processes such as financial planning, expansion strategies, and stakeholder interactions
difference between ebusiness & ecommerce
ebusiness includes commence and ecommerce deals with transactions while ebusiness includes a lot more
managerial level
employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change
operational level
employees develop, control, and maintain core business activities required to run the day-to-day operations
drill-down
enables users to view details, and details of details, of information. (the reverse of consolidation)
transactional information
encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational or structured decisions
analytical information
encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis or semistructured decisions
overview of epolicies
ethical computer use, email privacy policy, information privacy policy, social media policy, acceptable use policy, workplace monitoring policy
SWOT analysis
evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies
search engine ranking
evaluates variables that search engines use to determine where a URL appears on the list of search results
clickstream data
exact pattern of a consumer's navigation through a site
information management
examines the organizational resource of information and regulates its definitions, uses, value, and distribution, ensuring that it has the types of data/information required to function and grow effectively
hackers
experts in technology who use their knowledge to break into computers and computer networks, either for profit or motivated by the challenge
predictive analytics
extracts information from data and uses it to predict future trends and identify behavioral patterns
intrusion detection software (IDS)
features full-time monitoring tools that search for patterns in network traffic to identify intruders
script kiddies or script bunnies
find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses
support value activities
firm infrastructure, human resource management, technology development (and R&D), procuremtn
denial-of-serivce attack (DoS)
floods a website with so many requests for a service that it slows down or crashes the site
support value activities
found along the top of the value chain and includes business processes, such as firm infrastructure, human resource management, technology development, and procurement that support the primary value activities
primary value activities
found at the bottom of the value chain, these include business processes that acquire raw materials and manufacture, deliver, market, sell, ad provide after-sales services
GIGO
garbage in, garbage out
pay-per-click
generates revenue each time a user clicks on a link to a retailer's website
pay-per-conversion
generates revenue each time a website visitor is converted to a customer
pay-per-call
generates revenue each time users click on a link that takes them directly to an online agent waiting for a call
porter's 3 generic strategies
generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service
information ethics
govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies)
internet censorship
government attempts to control internet traffic, thus preventing some material from being viewed by a country's citizens
social engineering
hackers use their social skills to trick people into revealing access credentials or other valuable information
firewall
hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings
crackers
have criminal intent when hacking
hactivists
have philosophical and political reasons for breaking into systems and will often deface the website as a protest
content management system (CMS)
helps companies manage the creation, storage, editing, and publication of their website content
trojan-horse virus
hides inside other software, usually as an attachment or a downloadable file
information security policies
identify the rules required to maintain information security, such as requrig users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days
digital darwinism
implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction
streamlining
improves business processes efficiencies simplifying or eliminating unnecessary steps
ebusiness
includes commerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real-time information
workflow
includes the tasks, activities, and responsibilities required to execute each step in a business process
return on investment (ROI)
indicates the earning power of a project
knowledge worker
individuals values for their ability to interpret and analyze information
business intelligence (BI)
information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyze patterns, trends, and relationship for strategic decision making
integration
information systems used as part of the manual process
feedback
information that returns to its original transmitter (input, transform, or output) and modifies the transmitter's actions
intellectual property
intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents
advanced encryption standard (AES)
introduced by the national institute of standards and technology (NIST), AES is an encryption standard designed to keep government information secure
business-facing process
invisible to the external customer but essential to the effective management of the business; they include goal setting, day-to-day planning, giving performance feedback and rewards, and allocating resources
knowledge management (KM)
involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions
automation
involves computerizing manual tasks making them more efficient and effective and dramatically lowering operational costs
structured decision
involves situations where established processes offer potential solutions
egovernment
involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government
adwords
keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages
swim lane
layout arranges the steps of a business process into a set of rows depicting the various elements
insiders
legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
dumpster diving
looking through people's trash, another way hackers obtain information
business intelligence example
lowest sales per week compared with the economic interest rates, best-selling product by month compared to sports season and city team wins and losses
web 3.0
machine-based learning & reasoning, intelligent applications
human resources
maintains policies, plans, and procedures for the effective management of employees
destructive agents
malicious agents designed by spammers and other internet attackers to farm email addresses off websites or deposit spyware on machines
chief intellectual property officer
manage and defend intellectual property, copyrights, and patens
strategic level
managers develop overall business strategies, goals, and objectives as part of the company's strategic plan
operations management
manages the process of converting or transforming or resources into goods or services
social networking analysis (SNA)
maps group contacts identifying who knows each other and who works together
goods
material items or products that customers will buy to satisfy a want or need. clothing, groceries, cell phones, and cards are all examples of goods that people buy to fulfill their needs
effectiveness MIS metrics
measure the impact MIS has on business processes and activities including customer satisfaction and customer conversion rates
efficiency MIS metrics
measure the performance of MIS itself such as throughput, transaction speed, and system availability
customer satisfaction
measured by satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer
metrics
measurements that evaluate results to determine whether a project is meeting its goals
interactivity
measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisements
information reach
measures the number of people a firm can communicate with all over the world
decision support system (DSS)
model information using OLAP, which provides assistance in evaluating and choosing among different courses of action
workflow control systems
monitor processes to ensure tasks, activities, and responsibilities are executed as specified
semistructured decision
occurs in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision
unstructured decision
occurs in situations in which no procedures or rules exist to guide decision makers toward the correct choice
disintermediation
occurs when a business sells direct to the customer online and cuts out the intermediary
personalization
occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions
paradigm shift
occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave
real-time communication
occurs when a system updates information at the same rate it receives it
redundancy
occurs when a task or activity is unnecessarily repeated
content filtering
occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information
bottleneck
occurs when resources reach full capacity and cannot handle any additional; they limit throughput and impede operations
threat of new entrants
one of porter's 5 forces, high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market
threat of substitute products or services
one of porter's 5 forces, high when there are many alternatives to a product or service and low when there are few alternatives from which to choose
rivalry among existing competitors
one of porter's 5 forces; high when competition is fierce in a market and low when competitors are more complacent
supplier power
one of porter's 5 forces; measures the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services)
backdoor programs
open a way into the network for future attacks
________________ software cannot be SOLD
open source
common company structure
operational (structured decisions) ---> managerial level (semistructured decisions) ---> strategic level (unstructured decisions)
In a SWOT analysis, ___________ and ___________ originate OUTSIDE an organization
opportunities & threats
Data example
order date, amount sold, customer number, quantity ordered
social media policy
outlines the corporate guidelines or principles governing employee online communications
sales
performs the function of selling goods or services
epolicies
policies and procedures that address information management along with the ethical use of computers and the internet in the business environment
sustaining technology
produces an improved product customers are eager to buy, such as a faster car or larger hard drive
visualization
produces graphical displays of patterns and complex relationships in large amounts of data
key performance indicators (KPIs)
quantifiable metrics a company uses to evaluate progress towards critical success factors
data
raw facts that describe the characteristics of an event or object
primary value activities
receive and store raw materials, make the product or service, deliver the product or service, market and sell the product or service, service after the sale
clickstream
records information about a customer during a web surfing session such as what websites were visited, how long the visit was, what ads were viewed, and what was purchased
accounting
records, measures, and reports monetary transactions
_________________ typically occurs during strategic business process improvement
reengineering
long tail
referring to the tail of a typical sales curve
downtime
refers to a period of time when a system is unavailable
open source
refers to any software whose source code is made available free for any third party to review and modify
ediscovery
refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
cybermediation
refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness
information richness
refers to the depth and breadth of details contained in a piece of textual, graphic, audio or video information
granularity
refers to the level of detail in the model or the decision-making process
crowdsourcing
refers to the wisdom of the crowd
web 1.0 (or business 1.0)
refers to the world wide web during its first few years or operation between 1991 and 2003
social media
refers to websites that rely on user participation and user-contributed content
social graphs
represent the interconnection of relationships in a social network
as-is process model
represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes
multifactor authentication
requires more than two means of authentication such as what the user knows (password)
two-factor authentication
requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)
pharming
reroutes requests for legitimate websites to false websites
chief knowledge officer (CKO)
responsbile for collecting, maintaining, and distributing company knowledge
chief privacy officer (CPO)
responsbile for ensuring the ethical and legal use of information within a company
chief data officer
responsible for determining the types of information the enterprise will capture, retain, analyze, and share
chief security officer (CSO)
responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers and viruses
chief technology officer (CTO)
responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology
chief information officer (CIO)
responsible for: 1) overseeing all uses of MIS and 2) ensuring that MIS strategically aligns with business goals and objectives
customer-facing process
results in a product or service that is received by an organization's external customer
pivot
rotates data to display alternative presentations of the data
antivirus software
scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware
encryption
scrambles information into an alternative form that requires a key or password to decrypt
cyberterrorists
seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction
managerial business processes
semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements
mail bomb
sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning
solid line in LucidChart
sequence flow (activity to activity)
to-be process model
shows the results of applying change improvement opportunities to to the current (as-is) process model
folksonomy
similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system
anti-spam policy
simply states that email users will not send unsolicited emails (spam)
artificial intelligence (AI)
simulates human thinking and behavior such as the ability to reason and learn
knowledge
skills, experience, and expertise coupled with information and intelligence that creates a person's intellectual resources
tokens
small electronic devices that change user passwords automatically
spyware (sneakware or stealthware)
software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about
adware
software that generates ads that install themselves on a computer when a person downloads some other program from the internet
counterfeit software
software that is manufactured to look like the real thing and sold as such
shopping bot
software that will search several retailer websites and provide a comparison of each retailer's offerings including price and availability
virus
software written with malicious intent to cause annoyance or damage
crowdfunding
sources capital for a project by raising many small amounts from a large number of individuals, typically via the internet
tag
specific keywords or phrases incorporated into website content for means of classification or taxonomy
worm
spreads itself not from file to file but also from computer to computer
business process
standardized set of activities that accomplish a specific task
employee monitoring policy
states explicitly how, when and where the company monitors its employees
running payroll is an example of a ____________ process
static
operational business processes
static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes
web 1.0
static-based information websites
reintermediation
steps are added to the value chain as new players find ways to add value to the business process
_____________ improves managerial level business processes
streamlining
password
string of alphanumeric characters used to authenticate a user and provide access to a system
marketing
supports sales by planning, pricing, and promoting goods or services
knowledge management system (KMS)
supports the capturing, organization, and dissemination of knowledge (I.e. know-how) throughout an organization
physical security
tangible protection such as alarms, guards, fireproof doors, fences, and vaults
service
tasks that customers will buy to satisfy a want or need
online companies may hire an information architect to create a well planned website ______________ to help ensure that the search and navigation functions are easy to use and user-friendly
taxonomy
challenges of business 2.0
technology dependence, information vandalism, violations of copyright and plagiarism
project
temporary activity a company undertakes to create a unique product, service or result
mass customization
the ability of an organization to tailor its products or services to the customers' specifications
buyer power
the ability of buyers to affect the price they must pay for an item
slice-and-dice
the ability to look at information from different perspectives
mobile business (or mbusiness, mcommerce)
the ability to purchase goods and services through a wireless internet-enabled device
click-fraud
the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
information compliance
the act of conforming, acquiescing, or yielding information
business process modeling (or mapping)
the activity of creating a detailed flowchart or process map of a work process tasks, and activities in a structured sequence
consolidation
the aggregation of data from simple roll-ups to complex groupings of interrelated information
throughput
the amount of information that can travel through a system at any point in time
transaction speed
the amount of time a system takes to perform a transaction
business process reengineering (BPR)
the analysis and redesign of workflow within and between enterprises
confidentiality
the assurance that messages and information remain available only to those authorized to view them
transaction processing system (TPS)
the basic business system that serves the operational level (analysts) and assists in making structured decisions
ecommerce
the buying and selling of goods and services over the internet
online transaction processing (OLTP)
the capturing of transaction and event information using technology to: 1) process the information according to defined business rules 2) store the information 3) update existing information to reflect the new information
information secrecy
the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
fact
the confirmation or validation of an event or object
MIS skills gap
the difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies
internet of things vs. internet
the difference is that Internet requires humans while internet of things does not require human intervention
usability
the easy with which people perform transactions and/or find information
cybervandalism
the electronic defacing of an existing website
information accuracy
the extent to which a system generates the correct results when executing the same transaction numerous times
identity theft
the forging of someone's identity for the purpose of fruad
biometrics
the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
tacit knowledge
the knowledge contained in people's heads
copyright
the legal protection afforded an expression of an idea, such as a song, book, or video game
online analytical processing (OLAP)
the manipulation of information to create business intelligence in support of strategic decision making
best practices
the most successful solutions or problem-solving methods that have been developed by a specific organization or industry
web 2.0 (or business 2.0)
the next generation of internet use--a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free
conversion rates
the number of customers an organization touches for the first time and persuades to purchase its products or services. this is a popular metric for evaluating the effectiveness of banner, pop-up, and pop-under ads on the internet
system availability
the number of hours a system is available for users
dot-com
the original term for a company operating on the Internet
social netowrking
the practice of expanding your business and/or social contacts by constructing a personal network
microblogging
the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages
information age
the present time, during which infinite quantities of facts are widely available to anyone who can use a computer
ethics
the principles and standards that guide our behavior toward other people
competitive intelligence
the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed
social media monitoring
the process of monitoring and responding to what is being said about a company, individual, product, or brand
authorization
the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amounts of allocated storage space
mutation
the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome
market share
the proportion of the market that a firm captures
productivity
the rate at which goods and services are produced based upon total output given total inputs
privacy
the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent
analytics
the science of fact-based decision making
cryptography
the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them
taxonomy
the scientific classification of organisms into groups based on similarities of structure or origin
information architecture
the set of ideas about how all information in a given context should be organized
website name stealing
the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
response time
the time it takes to respond to user interactions such as a mouse click
cycle time
the time required to process an order
single-factor authentication
the traditional security process, which requires a username and password
pirated software
the unauthorized use, duplication, distribution, or sale of copyrighted software
cyberterrorism
the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals
augmented reality
the viewing of the physical world of computer-generated layers of information added to it
production
there process where a business takes raw materials and processes them or converts them into a finished product for its goods or services
why did Polaroid go bankrupt
they put too much focus into sustaining technology instead of disruptive technologies
cyberbullying
threats, negative remarks, or defamatory comments transmitted via the internet or posted on a website
what is the primary goal of the as-is model?
to simplify, eliminate (steps), and improve the to-be processes
digital dashboard
tracks KPIs and CSFs by compiling information from multiple sources and tailoring to meet user needs
workplace MIS monitoring
tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processes
web 2.0
user-generated content
pharming attack
uses a zombie farm, often by an organized crime association, to launch a massive phishing attack
behavior analytics
uses data about people's behaviors to understand intent and predict future actions
public key encryption (PKE)
uses two keys: a public key that everyone can have and a private key for only the recipient
_______________________ executes the business strategy
value chain analysis
intelligent system
various commercial applications of artificial intelligence
value chain analysis
views a firm as a series of business processes that each add value to the product or service
search engine
website software that finds other pages based on keyword matching
reputation system
where buyers post feedback on sellers
white-hat hackers
work at the request of the system owners to find system vulnerabilities and plug the holes
ebusiness advantages
-expanding global reach -opening new markets -reducing costs -improving operations -improving effectiveness
types of artificial intelligence
-expert systems (playing chess) -neural networks (credit card companies checking for fraud) -genetic algorithms (investment companies in trading decisions) -intelligent agents (environmental scanning and competitive intelligence) -virtual reality (working virtually around the globe)
challenges facing Ebusiness
-identifying limited market segments -ensuring consumer protection -managing consumer trust -adhering to taxation rules
customer-facing processes
-order processing -customer service -sales process -customer billing -order shipping
examples of customer-facing processes
-order processing -customer service -sales process -customer billing -order shipping
business-facing processes
-strategic planning -tactical planning -budget forecasting -training -purchasing raw materials
examples of business-facing processes
-tactical planning -strategic planning -budget forecasting -training -purchasing raw materials
reasons for explosive growth of the World Wide Web
-the speed, convenience, and low cost of e-mail -the microcomputer revolution made it possible for an average person to own a computer -basic web pages are easy to create & extremely flexible
efficiency metrics
-throughput -transaction speed -system availability -information accuracy -response time
KPI examples
-turnover rates of employees -percentage of help desk calls answered in the first minute -number of product returns -number of new customers -average customer spending
4 basic options of BYOD policies
-unlimited access for personal devices -access only to nonsensitive systems and data -access, but with IT control over personal devices, apps, and stored data -access, but preventing local storage of data on personal devices
effectiveness metrics
-usability -customer satisfaction -conversion rates -financial
BPMN gateway
-used to control the flow of a process -handle the forking, merging, and joining of paths within a process -represented by a diamond shape -includes determining availability status or accepting/declining the request
managerial decision-making challenges
1) managers need to analyze large amounts of information 2) managers must make decisions quickly 3) manager's must apply sophisticated analysis techniques, such as porter's strategies or forecasting, to make strategic decisions
5 steps in the order-to-delivery business process
1) marketing (create campaign/check inventory) 2) sales (place order, notify production, check credit) 3) operations management (manufacture goods) 4) accounting & finance (deliver goods, bill customer) 5) customer service (support sale)
decision-making process
1) problem identification 2) data collection 3) solution generation 4) solution test 5) solution selection 6) solution implementation
business process reengineering model
1) set project scope 2) study competition 3) create new processes 4) implement solution
the time is right to initiate a business process change when:
1) the market being served makes a distinctive shift 2) the company is below industry benchmarks on its core processes 3) new technology is introduced 4) the company must leapfrog competition on key decisions to regain it's competitive advantage
ebusiness revenue models
-advertising fees -license fees -subscription feeds -transaction fees -value-added service feeds
industry-specific customer facing processes
-banking: loan processes -insurance: claims processing -government: grant allocation -hotel: reservation handling -airline: baggage handling
ways to generate revenue on the internet
-banner ads -pop-up ads -associate/affiliate programs -viral marketing
CSF examples
-create high-quality products -retain competitive advantages -reduce product costs -increase customer satisfaction -hire and retain the best business professionals
BPMN flows
-display the path in which the process flows -represented by arrows -show the path the customer takes through the taxi cab booking process
steps in business process improvement
-document as-is process -establish measures -follow process -measure performance -identify and implement improvements
ebusiness tools
-email -content management system -web conferencing -videoconferencing -podcasting -instant messaging