MIS Exam 3 Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Bullwhip Effect

Information about product demand gets distorted as it passes from one entity to next across supply chain

Global supply chains and the internet

Internet helps companies manage many aspects of global supply chains - warehouse management, transportation management, logistics

Spoofing

Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else

Subscription

Netflix, Hulu, Xbox, Match.com

Downstream Supply Chain

Organizations and processes responsible for delivering products to customers

Gramm-Leach-Bliley Act

Requires financial institutions to ensure the security and confidentiality of customer data

Viruses

Rogue software program that attaches itself to other software programs or data files in order to be executed

Push-based model (build-to-stock)

Schedules based on best guesses of demand Supplier —-> customer

Net Marketplaces

Single market for many buyers and sellers Generate revenue from transaction fees, other services

Spyware/Adware

Small programs that install themselves covertly on computers to monitor user web surfing activity and serve up advertising

Personalization/Customization

Technology permits modification of messages, goods Personalized messages can be sent to individuals as well as groups Products and services can be customized to individual preferences

Customer Relationship Management (CRM)

a company-wide business strategy designed to optimize profitability, revenue, and customer satisfaction by focusing on highly defined and precise customer groups

Trojan Horses

a software program that appears to be benign but then does something other than expected

Hackers

an individual who intends to gain unauthorized access to a computer system.

Control

are methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its records, and operational adherence to management standards

advertisement

attract a large audience and advertise to them. most widely model in e-commerce, aids in providing "free" content to users

Operational CRM

customer-facing applications such as sales force automation, call center and customer service support, and marketing automation

Computer Crime

defined as "any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution

Which of the following statements about passwords is not true? a. passwords can be sniffed when being transmitted over a network b. passwords are often disregarded by employees c. password systems that are too rigorous may hinder employee productivity d. passwords can be stolen through social engineering e. authentication cannot be established by the use of a password

e. authentication cannot be established by the use of a password

Secure Hypertext Transfer Protocol

encrypts at the Application Layer of the TCP/IP protocol

Secure Sockets Layer(SSL)

encrypts at the Transport Layer of the TCP/IP protocol

Evidence for White-Collar crimes

found in digital form- data stored on computer devices, email, instant messages, e-commerce transactions

Digital Goods

goods that can be delivered over a digital network ex: music tracks, video, software, newspapers, books

SQL Injection attacks

hackers submit data to Web forms that exploit the site's unprojected software and sends rogue SQL query to the database

Sarbanes-Oxley Act

imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally

Worms

independent computer programs that copy themselves from one computer to other computers over a network

HIPPA

medial security and privacy rules and procedures

Software metrics

objective assessments of system n form of quantified measurements

Click Fraud

occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase

Ensuring System Availibility

online transaction processing required 100% availability, no downtime

different methods of authentications

password, biometric authentication, etc.

Keyloggers

record every keystroke on the computer to steal serial numbers passwords, launch internet attacks

affiliate

referrals, community site, bloggers

Security

refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems

Ransom-ware

remote administration tool

Content Provider

revenue: access fees, advertising

E-tailer

revenue: margin on the sales

Sales Force Automation

sales prospect and contact information, and sales quote generation capabilities

Symmetric Key

sender and receiver use single, shared key

SSIDs

service set identifiers - identify access points - broadcast multiple times

Phishing

setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data

E commerce today

still in early stages and continues to grow exponentially over time

Long tail Marketing

the ability to market goods and services to very small online audiences, due to reduced costs of reaching those small market segments

B2C (business-to-consumer)

the process in which businesses sell to consumers example: BarnesandNoble.com

C2C (consumer-to-consumer)

the process in which consumers sell to other consumers example: Ebay

B2B (business-to-business)

the process of selling merchandise or services from one business to another example: ChemConnect

Disintermediation

the removal of organizations or businesses process layers responsible for intermediary steps in a value chain

Identity Thefts

theft of personal information (social security id, drivers license or credit card numbers) to impersonate someone else

Behavioral Targeting

tracking online behavior (click-streams) of individuals on thousands of sites to better understand their interests and intentions

Encryption

transforming text or data into ciphertext that cannot be read by unintended recipients

Use of Social Engineering

tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information

Cracker

typically used to denote a hacker with criminal internet

Authentication

verifying a persons identity/status

Evil Twins

wireless networks that pretend to offer trustworthy Wi-Fi connections to the internet

Upstream supply chain

Firm's suppliers, suppliers' suppliers, processes for managing relationships with them

DoS- Denial of Service Attacks

Flooding server with thousands of false requests to crash the system/network

Location Based services and applications

Geo-social, Geo-advertising, Geo-information

Securing Mobile Platforms

Guidelines for use of platforms and applications

What are Enterprise Systems? ERP

- integrated software modules - common central database

Analytical CRM

(Business/marketing analytics)- analyze customer data output from operational CRM applications

Pharming

(cross-site request forgery): redirects users to bogus Web page, even when individual types correct Web page address into his or her browser

WEP: (wired equivalent privacy) security can provide some security by

- Activating the security feature - Assigning unique name to network's SSID and not broadcasting SSID - Using VPN technology

Security for Cloud Computing

- Highly distributed computer, difficult to track unauthorized activities - Cloud users should ask for proof of security and privacy procedures

customer relationship management systems

- Capture and integrate customer data from all over the organization - Consolidate and analyze customer data - Distribute customer information to various systems and customer touchpoints across enterprise

Just-in-time

- Components arrive as they are needed - Finished goods shipped after leaving assembly line

Fault Tolerant computing

- For continuous availability, ex stock markets - Contain redundant hardware, software, and power supply components that create an environment that provides continuous, uninterrupted service

High-availability computing

- Helps recover quickly from crash - Minimizes, does not eliminate downtime

Software Vulnerability

- Hidden bugs, zero defects cannot be achieved -Patches

Computer Forensics

- Scientific collection, examination, authentication, preservation, and analysis of data from computer storage media for use as evidence in court of law - Includes recovery of ambient and hidden data

WEP: (Wired Equivalent Privacy)

- Security standard for 802.11; use is optional - Uses shared passwords for both users and access points

internet vulnerabilities

- network open to anyone - size of internet means abuses can have wide impact

Public Key

- Uses two, mathematically related keys: public key and private key - Sender encrypts message with recipient's public key - The recipient decrypts with private key

Enterprise Software

- built around predefined business processes - map business processes to software processes

Identity Management

-Automates keeping track of all users and privileges -Authenticates users, protecting identities, controlling access -Microsoft Active Directory (windows domain network)

Sniffer

-Packet sniffing/ packet analyzer -Eavesdropping program that monitors the information traveling over network

Electronic Data Interchange

1. Computer-to-computer exchange of standard transactions such as invoices, purchase orders 2. Major industries have standards that define structure and information fields of electronic documents for that industry

Web 2.0 service/crowdsourcing

1. Fastest growing area of e-commerce revenues 2. Users are able to "mine" for friends within the networks 3. Social networking sites sell banner ads, user preference information, and music, videos, etc

Enterprise Application Challanges

1. Highly expensive to purchase and implement 2. technological changes 3. business process changes 4. switching costs, dependence on software vendors 5. data standardization, management, cleansing

Exchanges

1. Independently owned third-party Net marketplaces 2. Connect thousands of suppliers and buyers for spot purchasing

Other Mobile Commerce Services

1. Mobile pay Games and entertainment

Universal Standards

1. One set of technology standards: internet standards 2. Being able to exchange files and data with anyone without regard to types of hardware and software

Social Technology

1. Promotes user content generation and social networking - YouTube!! 2. New internet social and business model enable user content creation and distribution, support social networks

Richness

1. Supports video, audio, and text messages 2. Is as exemplified in YouTube, Facebook, Instagram, etc. 3. Makes it possible to deliver rich messages with text, audio and video simultaneously to large numbers of people

Global reach

1. The technology reaches across national boundaries, around Earth 2. Means customers can buy products from another country 3. Market-space includes, potentially, billions of consumers and millions of businesses worldwide (online user population)

Interactivity

1. The technology works through interaction with the user 2. Means a chat window to interact with technical support at a merchant's Web site 3. consumer becomes co-participant in process of delivering goods to market

Social CRM

1. incorporating social networking technologies 2. Company social networks 3. Customer interaction via facebook/twitter/ etc 4. Other social media platforms businesses use

Business Value of Enterprise Systems

1. increase operational efficiency 2. provide firm-wide information to support decision making 3. enable rapid responses to customer requests for information or products 4. include analytical tools to evaluate overall organizational performance

Ubiquity

1. internet/Web technology available everywhere: work, home, etc., anytime 2. Enhanced customer convenience and reduced shopping costs

Next-Generation Enterprise Applications

1. move it to make applications more flexible, web enabled, integrated with other systems 2. Enterprise solutions/suites 3. open-source applications 4. Cloud-based-on-demand solutions 5. Mobile compatible

Social, mobile, local e-commerce marketing

1. social media 2. mobile, localized ads and apps, geo-locations 3. Measures "conversations" and "engagements" 4. Impressions

Original E-commerce marketing

1. web sites 2. display ads 3. measures "eyeballs" and impressions of display ads

customer service

Assigning and managing customer service requests; Web-based self-service capabilities

Safety Stock

Buffer for lack of flexibility in supply chain

Marketing

Capturing prospect and customer data, scheduling and tracking direct-marketing mailings or e-mail

m-commerce (mobile commerce)

Communicating with and even selling to customers through wireless handheld devices, such as cellular telephones and personal digital assistants.

Pull-based model (demand-driven)

Customer orders trigger events in supply chain Examples: Wal-mart and Dell Supplier ←—— customer

Wardiving

Eavesdroppers drive by buildings and try to detect SSID and gain access to the network and resources

Internal Threats

Employees-inside knowledge


Ensembles d'études connexes

Principles of Finance Unit 4 milestone 4

View Set

Chapter 03: Health, Wellness, and Health Disparities

View Set