MSIS 5623 Final
Ebusiness models fall into one of the four categories
(1) business-to-business (2) business-to-consumer (3) consumer-to-business (4) consumer-to-consumer
The ________, ___________, ________ _________ of email have made it an incredibly popular tool for business and personal communications.
- speed - convenience - low cost
Incumbent companies most often lead _______________ ____________ to market, but they virtually never lead in markets opened by ____________ _____________
- sustaining technology - disruptive technologies.
Disadvantages of the Waterfall Methodology.
- the business problem - the plan - the solution
Advantages of Ebusiness
-expanding global reach -opening new markets -reducing costs -improving effectiveness - easy access to real-time information
Characteristics of Business 2.0
1. Content sharing through open sourcing 2. User-contributed content 3. Collaboration inside the organization 4. Collaboration outside the organization
A well-defined project plan should be...
1. Easy to understand and read 2. Communicated to all key participants 3. Appropriate to the project's size, complexity, and criticality 4. Prepared by the team, rather than by the individual project manager
3 Website Visit Metrics
1. Stickiness 2. Raw Visit Depth 3. Visit Depth
3 Challenges associated with Business 2.0
1. Technology Dependence 2. Information Vandalism 3. Violations of Copyright and Plagiarism As much as Business 2.0 has positively changed the global landscape of business, a few challenges remain in open source software, user-contributed content systems, and collaboration systems
two levels of clickstream analytics:
1. Traffic Analytics 2. Ebusiness Analytics
Cookie
A small file deposited on a hard drive by a website, containing information about customers and their browsing activities. Ex: Cookies allow websites to record the comings and goings of customers, usually without their knowledge or consent.
Pop-up Ad
A small web page containing an advertisement that appears outside of the current website loaded in the browser. Ex: A form of a pop-up ad that users do not see until they close the current web browser screen.
Project
A temporary endeavor undertaken to create a unique product, service, or result.
Wireless WAN (WWAN)
A wide area network that uses radio signals to transmit and receive data
Social Network
An application that connects people by matching profile information.
The cost of finding errors in the SDLC
An error found during the analysis and design phase is relatively inexpensive to fix. All that is typically required is a change to a Word document. However, exactly the same error found during the testing or implementation phase will cost the organization an enormous amount to fix because it has to change the actual system.
__________________ reveal what people truly call things
Folksonomies - They have been a point of discussion on the web because the whole point of having a website is for your customers to find it. The majority of websites are found through search terms that match the content.
Pay-per-Call
Generates revenue each time a user clicks a link that takes the user directly to an online agent waiting for a call.
Pay-per-click
Generates revenue each time a user clicks a link to a retailer's website.
Pay-per-Conversion
Generates revenue each time a website visitor is converted to a customer.
Shelf space dilemma
In traditional sales models, a store is limited by shelf space when selecting products to sell. For this reason, store owners typically purchase products that will be wanted or needed by masses, and the store is stocked with broad products as there is not room on the shelf for niche products that only a few customers might purchase. Ebusinesses such as Amazon and eBay eliminated the shelf-space dilemma and were able to offer infinite products.
_________ is the largest offshore marketplace because it...
India promotes English along with a technologically advanced population.
Project Stakeholder
Individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion
Length of Contract
Most companies look at outsourcing as a long-term solution with a time period of several years. Training and transferring resources around the globe is difficult and expensive; hence, most companies pursuing offshore outsourcing contract for multiple years of service.
Unidentified Visitor
No information about the visitor is available
Open System
Nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system
Unique Visitor
One who can be recognized and counted only once within a given period of time
RUP Gate 4: Transition
Primary questions answered in this phase address ownership of the system and training of key personnel.
World Wide Web (WWW)
Provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML Ex: Tim Berners-Lee, a British computer scientist, is considered the inventor of the WWW on March 12, 1989.
Sustaining Technology
Produces an improved product customers are eager to buy ex: faster car, larger hard drive
Hypertext Markup Language (HTML)
Publishes hypertext on the WWW, which allows users to move from one document to another simply by clicking a hot spot or link. Ex: HTML uses tags such as <h1> and </h1> to structure text into headings, paragraphs, lists, hypertext links, and so on.
Mashup Editors
WYSIWYG, or What You See Is What You Get, tools. They provide a visual interface to build a mashup, often allowing the user to drag and drop data points into a web application.
PERT (Program Evaluation and Review Technique) chart
a graphical network model that depicts a project's tasks and the relationships between them. - PERT charts define dependency between project tasks before those tasks are scheduled.
Help Desk
a group of people who respond to users' questions - One of the best ways to support users is to create a help desk
Dependency
a logical relationship that exists between the project tasks, or between a project task and a milestone
Ezine
a magazine published only in electronic form on a computer network
Methodology
a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges -Firms use a methodology to manage the deployment of technology with work plans, requirements documents, and test plans, for instance. - A formal methodology can include coding standards, code libraries, development practices, and much more.
Gantt Chart
a simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally - A Gantt chart works well for representing the project schedule. - It also shows actual progress of tasks against the planned duration.
Social Bookmarking
allows users to share, organize, search, and manage bookmarks Ex: StumbleUpon, Del.icio.us The more you use the service, the more the system "learns" about your interests and the better it can show you websites that interest you.
Consumer-to-business (C2B)
applies to any consumer who sells a product or service to a business on the internet Ex: customers of Priceline.com, who set their own prices for items such as airline tickets or hotel rooms and wait for a seller to decide whether to supply them. - The demand for C2B ebusiness will increase over the next few years due to customers' desire for greater convenience and lower prices.
Business-to-business (B2B)
applies to businesses buying from and selling to each other over the internet Ex: medical billing service, software sales and licensing, and virtual assistant businesses. - B2B relationships represent 80 percent of all online business and are more complex with greater security needs than the other types.
Wi-Fi operates at considerably higher frequencies than cell phones use, which allows greater _____________
bandwidth -
synchronous communication
communications that occur at the same time such as IM or chat.
Source Code
contains instructions written by a programmer specifying the actions to be performed by computer software.
Bugs
defects in the code of an information system
Communication plan
defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations
Intangible Benefits
difficult to quantify or measure
Passive RFID Tags
do not have a power source - Passive RFID tags draw power from the RFID reader, which sends out electromagnetic waves that induce a current in the tag's antenna.
Tangible Benefits
easy to quantify and typically measured to determine the success or failure of a project
Onshore outsourcing
engaging another company within the same country for services
Folksonomy
similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system - For example, while cell phone manufacturers often refer to their products as mobile devices, the folksonomy could include mobile phone, wireless phone, smartphone, iPhone, BlackBerry, and so on. All these keywords, if searched, should take a user to the same site. Folksonomies reveal what people truly call things
Computer-aided software engineering (CASE) tools
software suites that automate systems analysis, design, and development. - Process models and data flow diagrams can provide the basis for the automatic generation of the system if they are developed using a CASE tool.
Deep Web
sometimes called the invisible web, is the large part of the Internet that is inaccessible to conventional search engines. - Deep web content includes email messages, chat messages, private content on social media sites, electronic bank statements, electronic health records, and other content that is accessible over the Internet but is not crawled and indexed by search engines such as Google, Yahoo, or Bing. It is not known how large the deep web is, but many experts estimate that search engines crawl and index less than 1 percent of all the content that can be accessed over the Internet. - That part of the Internet that is crawled and indexed by search engines is sometimes referred to as the surface web. coined by BrightPlanet in a 2001 white paper entitled "The Deep Web: Surfacing Hidden Value" and is often confused in the media with the term dark web.
Project Constraint
specific factors that can limit options, including budget, delivery dates, available skilled resources, and organizational policies
Reintermediation
steps are added to the value chain as new players find ways to add value to the business process Ex: Levi Strauss originally thought it was a good business strategy to limit all online sales to its own website. A few years later, the company realized it could gain a far larger market share by allowing all retailers to sell its products directly to customers.
Off-the-shelf application software
supports general business processes and does not require any specific software customization to meet the organization's needs
One goal of Web 3.0 is to...
tailor online searches and requests specifically to users' preferences and needs. for example, instead of making multiple searches, the user might type a complex sentence or two in a Web 3.0 browser, such as "I want to see a funny movie and then eat at a good Mexican restaurant. What are my options?" The Web 3.0 browser will analyze the request, search the web for all possible answers, organize the results, and present them to the user.
SDLC Development Phase
takes all the detailed design documents from the design phase and transforms them into the actual system - In this phase, the project transitions from preliminary designs to actual physical implementation. - During development, the company purchases and implements the equipment necessary to support the architecture. - During development, the team defines the programming language it will use to build the system.
You are not finished with the project until you have finished all the __________
tasks
A Worldwide Database
the ability for databases to be distributed and accessed from anywhere.
Click Fraud
the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser. - Click fraud is the practice of artificially inflating traffic statistics for online advertisements.
Slack
the amount of time an activity may be delayed without delaying a succeeding activity or the project finish date.
IT Consumerization
the blending of personal and business use of technology devices and applications. - Today, MIS departments must determine how to protect their networks and manage technology that they did not authorize or recommend.
Ecommerce
the buying and selling of goods and services over the internet - refers only to online trsnsactions
Open Technologies
the design of websites and other software so they can be easily integrated and work together
The majority of online business activities consist of....
the exchange of products and services either between businesses or between businesses and consumers.
SDLC Maintenance Phase
the organization performs changes, corrections, additions, and upgrades to ensure the system continues to meet business goals. - final stage - This phase continues for the life of the system because the system must change as the business evolves and its needs change, which means conducting constant monitoring, supporting the new system with frequent minor changes (for example, new reports or information capturing), and reviewing the system to be sure it is moving the organization toward its strategic goals.
SDLC Implementation Phase
the organization places the system into production so users can begin to perform actual business operations with it
Dark Web
the portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser.
Social Networking
the practice of expanding your business and/or social contacts by constructing a personal network
War Chalking
the practice of tagging pavement with codes displaying where Wi-Fi access is available. - The codes for war chalking tell other users the kind of access available, the speed of the network, and if the network is secured.
Clickstream Analytics
the process of collecting, analyzing, and reporting aggregate data about which pages a website visitor visits—and in what order. - considered to be most effective when used in conjunction with other, more traditional market evaluation resources.
Project Planning
the process of detailed planning that generates answers to common operational questions such as why are we doing this project or what is the project going to accomplish for the business?
Requirements Management
the process of managing changes to the business requirements throughout the project - Projects are typically dynamic in nature, and change should be expected and anticipated for successful project completion.
Project Management
the science of making intelligent trade-offs between time, cost, and scope.
Business Requirements
the specific business requests the system must meet to be successful - Gathering business requirements is basically conducting an investigation in which users identify all the organization's business needs and take measurements of these needs.
long tail
the tail of a typical sales curve used to describe niche-market ebusiness strategies - Netflix is an excellent example: Let's assume that an average Blockbuster store maintains 3,000 movies in its inventory, whereas Netflix, without physical shelf limitations, can maintain 100,000 movies in its inventory. Looking at sales data, the majority of Blockbuster's revenue comes from new releases that are rented daily, whereas older selections are rented only a few times a month and don't repay the cost of keeping them in stock. Thus Blockbuster's sales tail ends at title 3,000 (see Figure 13.7) However, Netflix, with no physical limitations, can extend its tail beyond 100,000 (and with streaming video perhaps 200,000). By extending its tail, Netflix increases sales, even if a title is rented only a few times.
Clickstream Data
tracks the exact pattern of a consumer's navigation through a website
Ebusinesses operate 24 hours a day, 7 days a week. This availability directly reduces....
transaction costs, since consumers no longer have to spend a lot of time researching purchases or traveling great distances to make them. - The faster delivery cycle for online sales helps strengthen customer relationships, improving customer satisfaction and ultimately sales.
semi-passive RFID tags
use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader.
Chipless RFID Tags
use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip
Automatic vehicle location (AVL)
uses GPS tracking to track vehicles
Non-line-of-sight service
uses a small antenna on a mobile device that connects to a WiMAX tower less than six miles away where transmissions are disrupted by physical obstructions.
Parallel Implementation
uses both the legacy system and new system until all users verify that the new system functions correctly
Website Ebusiness Analytics
uses clickstream data to determine the effectiveness of the site as a channel-to-market. Website ebusiness analytics tracks what pages the shopper lingers on, what the shopper puts in or takes out of a shopping cart, what items the shopper purchases, whether or not the shopper belongs to a loyalty program and uses a coupon code, and the shopper's preferred method of payment.
Website Traffic Analytics
uses clickstream data to determine the efficiency of the site for the users and operates at the server level. Traffic analytics tracks data on how many pages are served to the user, how long it takes each page to load, how often the user hits the browser's back or stop button, and how much data is transmitted before the user moves on.
RADIO-FREQUENCY IDENTIFICATION (RFID)
uses electronic tags and labels to identify objects wirelessly over short distances. - It holds the promise of replacing existing identification technologies such as the bar code - RFID wirelessly exchanges information between a tagged object and a reader/writer.
Offshore Outsourcing
using organizations from developing countries to write code and develop systems (geographically far away)
One key to delivering a successful product or system is to deliver _________ to users as soon as possible
value - give them something they want and like early to create buy-in, generate enthusiasm, and, ultimately, reduce scope.
computer-aided software engineering (CASE) tools
which provide automated support for the development of the system. - used by software engineers
anytime a... , the wireless network can serve as a conduit for a hacker to gain entry into an otherwise secure wired network.
wireless network connects to a wired one - This risk is especially high if the wireless network is not sufficiently secured in its own right.
SDLC Planning phase
establishes a high-level plan of the intended project and determines project goals. - Planning is the first and most critical phase of any systems development effort, regardless of whether the effort is to develop a system that allows customers to order products online, determine the best logistical structure for warehouses around the world, or develop a strategic information alliance with another organization.
Search Engine Ranking
evaluates variables that search engines use to determine where a URL appears on the list of search results
Asset Tracking
occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention. - Asset tracking allows a company to focus on its supply chain, reduce theft, identify the last known user of assets, and automate maintenance routines. - Active and semi-passive tags are useful for tracking high-value goods that need to be scanned over long ranges, such as railway cars on a track.
Paradigm Shift
occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave - Ebusiness created a paradigm shift, transforming entire industries and changing enterprisewide business processes that fundamentally rewrote traditional business rules. - Deciding not to make the shift to ebusiness proved fatal for many companies
Feature Creep
occurs when developers add extra features that were not part of the initial requirements
Edge matching (warping, rubber sheeting)
occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match
Line-of-sight service
offers a fixed antenna that points at the WiMAX tower from a rooftop or pole. - This option is much faster than non-line-of-sight service, and the distance between the WiMAX tower and antenna can be as great as 30 miles.
Portals
operate central website for users to access specialized content and other services Ex: Google, Yahoo, MSN
Blog
or web log, is an online journal that allows users to post their own comments, graphics, and video
Summary Internal Report
organizes and categorizes data for managerial perusal
rational unified process (RUP) methodology
owned by IBM, provides a framework for breaking down the development of software into four "gates." - Each gate consists of executable iterations of the software in development. A project stays in a gate waiting for the stakeholder's analysis, and then it either moves to the next gate or is cancelled.
The cost of active and semi-passive RFID tags is significant; hence, low-cost items typically use __________ RFID tags.
passive
7 Distinct Phases of SDLC
planning, analysis, design, development, testing, implementation, maintenance
4 Basic Phases of XP
planning, designing, coding, and testing. - Planning can include user interviews, meetings, and small releases. During design, functionality is not added until it is required or needed. During coding, the developers work together soliciting continuous feedback from users, eliminating the communication gap that generally exists between developers and customers. During testing, the test requirements are generated before any code is developed. - Extreme programming saves time and produces successful projects by continuously reviewing and revamping needed and unneeded requirements.
Post-Implementation Report
presents a formal report or audit of a project after it is up and running
Detailed Internal Report
presents information with little or no filtering or restrictions of the data
requirements definition document
prioritizes all of the business requirements by order of importance to the company.
Project Objectives
quantifiable criteria that must be met for the project to be considered a success
Open Source
refers to any software whose source code is made available free (not on a fee or licensing basis as in ebusiness) for any third party to review and modify. Business 2.0 is capitalizing on open source software.
Information Richness
refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information
Social Media
refers to websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg.
Latitude
represents a north/south measurement of position.
Longitude
represents an east/west measurement of position.
Social Graph
represents the interconnection of relationships in a social network - Social networking sites can be especially useful to employers trying to find job candidates with unique or highly specialized skill sets that may be harder to locate in larger communities. - Many employers also search social networking sites to find "dirt" and character references for potential employees. Keep in mind that what you post on the Internet stays on the Internet.
Institute of Electrical and Electronics Engineers (IEEE)
researches and institutes electrical standards for communication and other technologies.
Ebusinesses must have a ______________ for making money
revenue model (model)
Online Training
runs over the Internet or on a CD or DVD, and employees complete the training on their own time at their own pace
Project Plan
formal, approved document that manages and controls project execution. The project plan should include a description of the project scope, a list of activities, a schedule, time estimates, cost estimates, risk factors, resources, assignments, and responsibilities. In addition to these basic components, most project professionals also include contingency plans, review and communications strategies, and a kill switch
Content Providers
generate revenues by providing digital content such as news, music, photos, or videos Ex: Netflix, iTunes, CNN
User Documentation
highlights how to use the system and how to troubleshoot issues or problems
Spatial data (geospatial data or geographic information)
identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. - A GIS accesses, manipulates, and analyzes spatial data
Process Modeling Data Flow Diagram (DFD)
illustrates the movement of information between external entities and the processes and data stores within the system - process models and data flow diagrams establish the specifications of the system.
Digital Darwinism
implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction
Wi-Fi Infrastructure
includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal
The big selling point for offshore outsourcing is...
inexpensive but good work.
Phased Implementation
installs the new system in phases (for example, by department) until it is verified that it works correctly
Electronic marketplaces, or emarketplaces
interactive business communities providing a central market where multiple buyers and sellers can engage in ebusiness activities. - By tightening and automating the relationship between the two parties, they create structures for conducting commercial exchange, consolidating supply chains, and creating new sales channels.
Adwords
keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages - Adwords, a part of the Google site, allows advertisers to bid on common search terms.
EXTREME PROGRAMMING (XP) METHODOLOGY
like other agile methods, breaks a project into four phases, and developers cannot continue to the next phase until the previous phase is complete. - the quicker the feedback the more improved the results.
GIS Map Automation
links business assets to a centralized system where they can be tracked and monitored over time
The Microcomputer Revolution
made it possible for an average person to own a computer
Preventative Maintenance
makes system changes to reduce the chance of future system failure.
Corrective Maintenance
makes system changes to repair design flaws, coding errors, or implementation issues
Interactivity
measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement
Information Reach
measures the number of people a firm can communicate with all over the world
SEO is critical because...
most people view only the first few pages of a search result. - After that a person is more inclined to begin a new search than review pages and pages of search results.
Disintermediation
occurs when a business sells directly to the customer online and cuts out the intermediary - brought about by the introduction of ebusiness
Software Facts
•Software that is built correctly can transform as the organization and its business transforms •Software that effectively meets employee needs will help an organization become more productive and enhance decision making •Software that does not meet employee needs may have a damaging effect on productivity and can even cause a business to fail
Web 2.0
•The next generation of Internet use - a more mature, distinctive communications platform characterized by three qualities •Collaboration •Sharing •Free
Although Web 3.0 is still a bit speculative, some topics and features are certain to be included in it, such as:
■ Integration of legacy devices ■ Intelligent applications ■ Open ID ■ Open technologies ■ A worldwide database
RAPID APPLICATION DEVELOPMENT (RAD) METHODOLOGY
(also called rapid prototyping) emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process.
the _____ web is part of the ____ web.
- Dark - Deep Like deep web content, dark web content cannot be accessed by conventional search engines, but most often the reason dark web content remains inaccessible to search engines is because the content is illegal.
4G
- High-speed access, anywhere, anytime, to anything digital—audio, video, text - Improved video transmissions Speed: 100 mbps
In the high-speed global business environment, an organization needs to increase profits, grow market share, and reduce costs. Two basic options are available to organizations wishing to develop and maintain their information systems:
- In-sourcing - Outsourcing
Benefits of short URL's
- Long URLs in email messages can break if they fail to wrap properly - long URLs in Twitter tweets can leave no room for a message to accompany it - long URLs in text messages can make the accompanying message difficult to read
Reasons for Growth of the World Wide Web.
- Microcomputer revolution - Advancements in networking - Easy browser software - Speed, convenience, and low cost of email - Web pages easy to create and flexible
5 Types of Searching
- Search Engine - Search Engine Ranking - Search optimization - pay-per click - pay-per-call - pay-per-conversion
5G
- Superior data communication rate - Expected to provide artificial intelligence capabilities on wearable devices Speed: 1.5Gbps over a distance of 90 meters
1G
- The original analog cell phone network - speed: 14.4 kbps
Whereas _________ brings people closer together with information using machines, ___________ brings machines closer together using information.
- Web 2.0 - Web 3.0
three ways to operate as a B2C
- brick-and-mortar - click-and-mortar - pure play
Operational benefits of ebusiness include..... One of the most exciting benefits of ebusiness is that ____________________________.
- business processes that require less time and human effort or can be eliminated. - low start up costs Today, anyone can start an ebusiness with just a website and a great product or service.
WWAN technologies can be divided into two categories:
- cellular communication systems - satellite communication systems
Fundamentals of RAD.
- focus initially on creating a prototype that looks and acts like the desired system - actively involve system users in the analysis, design, & development phases - accelerate collecting the business requirements through an interactive & iterative construction approach
the __________ the project, the ___________ the success rate.
- smaller - greater The iterative development style is the ultimate in small projects.
Balance of the Triple Constraints
- time - cost - scope The relationship among these variables is such that if any one changes, at least one other is likely to be affected. Project quality is affected by the project manager's ability to balance these competing demands. For example, moving up a project's finish date could mean either increasing costs to hire more staff or decreasing the scope to eliminate features or functions. Increasing a project's scope to include additional customer requests could extend the project's time to completion or increase the project's cost—or both—to accommodate the changes.
The three forms of outsourcing options available for a project are:
1. Onshore Outsourcing 2. Nearshore Outsourcing 3. Offshore Outsourcing
Challenges of Business Mobility
1. Protecting against theft 2. Protecting wireless connections 3. Preventing viruses on a mobile device 4. Addressing privacy concerns with RFID and LBS
The bandwidths associated with Wi-Fi are separated according to several wireless networking standards, known as __________, for carrying out wireless local area network communication.
802.11
SOA Service
A business task, such as checking a potential customer's credit rating when opening a new account. - this is part of a business process. Services are "like" software products; however, when describing SOA, do not think about software or MIS. Think about what a company does on a day-to-day basis, and break up those business processes into repeatable business tasks or components. SOA works with services that are not just software or hardware but, rather, business tasks
Managing Consumer Trust
A few ways to build trust when working online include being accessible and available to communicate in person with your customers; using customers' testimonials that link to your client website or to provide their contact information; and accepting legitimate forms of payment such as credit cards.
Project Plan
A formal, approved document that manages and controls project execution
Internet
A global network connecting millions of computers, making it possible to exchange information.•Organizations must be able to transform as markets, economic environments, and technologies change •Focusing on the unexpected allows an organization to capitalize on the opportunity for new business growth from a disruptive technology •The Internet began as an emergency military communications system operated by the Department of Defense •Gradually the Internet moved from a military pipeline to a communication tool for scientists to businesses
Viral Marketing
A technique that induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect. Ex: One example of successful viral marketing is Hotmail, which promotes its service and its own advertisers' messages in every user's email notes. Viral marketing encourages users of a product or service supplied by an ebusiness to encourage friends to join. Viral marketing is a word-of-mouth type of advertising program.
Web 1.0
A term to refer to the WWW during its first few years of operation between 1991 and 2003 - the first forms of ebusiness were created during this time
Banner Ad
Box running across a web page that contains advertisements. A count of the number of people who visit one site and click an advertisement that takes them to the site of the advertiser. Ex: Tracking effectiveness based on click-throughs guarantees exposure to target ads; however, it does not guarantee that the visitor liked the ad, spent any substantial time viewing the ad, or was satisfied with the information contained in the ad.
____________ _______________ is the primary reason XP finds success as developers quickly respond to changing business requirements, even late in the life cycle.
Customer satisfaction
Rapid Growth
Firms must get their products to market quickly and still be able to react to market changes. - By taking advantage of outsourcing, an organization can acquire the resources required to speed up operations or scale to new demand levels.
Exception Reporting
Highlights situations occurring outside of the normal operating range for a condition or standard. These internal reports include only exceptions and might highlight accounts that are unpaid or delinquent or identify items that are low in stock
Ebusiness
Includes ecommerce along with all activities related to internal and external business operations Ex: servicing customer accounts, collaborating with partners, exchanging real-time information
Knowledge Management
Involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions
Adhering to Taxation Rules
Many believe that U.S. tax policy should provide a level playing field for traditional retail businesses, mail-order companies, and online merchants. Yet the Internet marketplace remains mostly free of traditional forms of sales tax, partly because ecommerce law is vaguely defined and differs from state to state. For now, companies that operate online must obey a patchwork of rules about which customers are subject to sales tax on their purchases and which are not.
Threat to Competitive Advantage
Many businesses view MIS as a competitive advantage and view outsourcing as a threat because the outsourcer could share the company's trade secrets.
Core Competencies
Many companies have recently begun to consider outsourcing as a way to acquire best-practices and the business process expertise of highly skilled technology resources for a low cost. Technology is advancing at such an accelerated rate that companies often lack the technical resources required to keep current.
Technology Dependence
Many people today expect to be continuously connected, and their dependence on technology glues them to their web connections for everything from web conferencing for a university class or work project to making plans with friends for dinner. If a connection is down, how will they function? How long can people go without checking email, text messaging, or listening to free music on Pandora or watching on-demand television? As society becomes more technology-dependent, outages hold the potential to cause ever-greater havoc for people, businesses, and educational institutions.
Personalization
Occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person Ex: tailoring its website to individuals or groups based on profile information, demographics, or prior transactions. - Amazon uses personalization to create a unique portal for each of its customers.
Smartphones
Offer more advanced computing ability and connectivity than basic cell phones - They allow for web browsing, emailing, listening to music, watching video, computing, keeping track of contacts, sending text messages, and taking and sending photos.
Violations of Copyright and Plagiarism
Online collaboration makes plagiarism as easy as clicking a mouse. - Unfortunately a great deal of copyrighted material tends to find its ways to blogs and wikis where many times blame cannot be traced to a single person. Clearly stated copyright and plagiarism policies are a must for all corporate blogs and wikis.
Information Vandalism
Open source and sharing are both major advantages of Business 2.0, and ironically they are major challenges as well. Allowing anyone to edit anything opens the door for individuals to purposely damage, destroy, or vandalize website content. - One of the most famous examples of wiki vandalism occurred when a false biography entry read that John Seigenthaler Sr. was assistant to Attorney General Robert F. Kennedy in the early 1960s and was thought to have been directly involved in the assassinations of both Kennedy and his brother, President John F. Kennedy. Seigenthaler did work as an assistant to Robert Kennedy, but he was never involved in the assassinations. Wiki vandalism is a hot issue and for this reason wiki software can now store all versions of a web page, tracking updates and changes and ensuring the site can be restored to its original form if the site is vandalized. It can also color-code the background ensuring the user understands which areas have been validated and which areas have not. The real trick to wiki software is to determine which statements are true and which are false, a huge issue when considering how easily and frequently wiki software is updated and changed
___________________ MIS enables organizations to keep up with market and technology advances
Outsourcing — with less strain on human and financial resources and more assurance that the IT infrastructure will keep pace with evolving business priorities
_______________ is the ultimate in targeted advertising because consumers type in exactly what they want.
Paid Search - A general search term such as tropical vacation costs less than a more specific term such as Hawaiian vacation. Whoever bids the most for a term appears in a sponsored advertisement link either at the top or along the side of the search-results page.
Status Report
Periodic reviews of actual performance versus expected performance.
Internal Report
Presents data that are distributed inside the organization and intended for employees within an organization. Internal reports typically support day-to-day operations monitoring that supports managerial decision making.
Examples of the innovative uses of RFID include:
RFID chips injected under the skin of animals using a syringe can help ranchers meet regulations, track wild animals for ecological studies, and return lost pets to their owners. ■ Retail stores use RFID to track and monitor inventory. Hospitals and pharmaceutical companies meet government regulations and standards with RFID. Even local libraries are using RFID to control theft and speed up the checkout process. ■ Car manufacturers install RFID antitheft systems. Toll roads use RFID to collect payments from passing cars. ■ Hospitals track patients', doctors', and nurses' locations to facilitate emergency situations and ensure safety. RFID also tracks equipment location to ensure quick response times during an emergency. ■ American Express and MasterCard use RFID for automatic payments. ■ Walmart and other large retailers use RFID to maintain inventory, stop shoplifting, and speed customer checkout processes.
Project milestone
Represents key dates when a certain group of activities must be performed
Tags
Specific keywords or phrases incorporated into website content for means of classification or taxonomy
__________ _________ tend to provide us with better, faster and cheaper products in established markets
Sustaining technologies
Mass Customization
The ability of an organization to tailor its products or services to the customers' specifications Ex: customers can order M&M's in special colors or with customized sayings such as "Marry Me."
Integration of Legacy Devices
The ability to use current devices such as Iphones, laptops, and so on, as credit cards, tickets and reservations tools
Universal resource locator (URL)
The address of a file or resource on the web. Ex: GoDaddy.com, 1&1.com, Web.com
Project management
The application of knowledge, skills, tools, and techniques to project activities to meet project requirements
HTML 5
The current version of HTML delivers everything from animation to graphics and music to movies; it can also be used to build complicated web applications and works across platforms, including a PC, tablet, smartphone, or smart TV. Ex: Includes new tags such as doctype, a simple way to tell the browser what type of document is being looked at. <!DOCTYPE html PUBLIC>
Skipped Phases
The first thing individuals tend to do when a project falls behind schedule is to start skipping phases in the SDLC. - For example, if a project is three weeks behind in the development phase, the project manager might decide to cut testing from six weeks to three weeks. Obviously, it is impossible to perform all the testing in half the time. Failing to test the system will lead to unfound errors, and chances are high that the system will fail. It is critical for an organization to perform all phases in the SDLC during every project. Skipping any of the phases is sure to lead to system failure.
Identifying Limited Market Segments
The main challenge of ebusiness is the lack of growth in some sectors due to product or service limitations - The online food sector has not grown in sales, in part because food products are perishable and consumers prefer to buy them at the supermarket as needed. - Other sectors with limited ebusiness appeal include fragile or consumable goods and highly sensitive or confidential businesses such as government agencies.
Unclear or missing business requirements
The most common reason systems fail - The business requirements drive the entire system. If they are not accurate or complete, the system will not be successful.
difference between traditional, tightly bound interactions and loosely coupled services (ex)
The next time the same service is called, it could be as part of a different business process with different calling and destination services. A great way to understand this is through the analogy of the telephone system. At the dawn of widespread phone usage, operators had to plug in a wire physically to create a semi-permanent connection between two parties. Callers were "tightly bound" to each other. Today you pick up your cell phone and put it to your ear, and there's no dial tone—it's disconnected. You enter a number, you push "Talk," and only then does the process initiate, establishing a loosely coupled connection just long enough for your conversation. Then when the conversation is over, your cell phone goes back to dormant mode until a new connection is made with another party. As a result, supporting a million cell phone subscribers does not require the cell phone service provider to support a million live connections; it requires supporting only the number of simultaneous conversations at any given time. It allows for a much more flexible and dynamic exchange.
Systems Development Life Cycle (SDLC)
The overall process for developing information systems from planning and analysis through implementation and maintenance - The SDLC is the foundation for all systems development methods, and hundreds of different activities are associated with each phase - These activities typically include determining budgets, gathering system requirements, and writing detailed user documentation.
Executive Sponsor
The person or group who provides the financial resources for the project
The Internet and Globalization
The pervasive nature of the Internet has made more people comfortable with outsourcing abroad as India, China, and the United States become virtual neighbors.
Microblogging
The practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages. - The main advantage of microblogging is that posts can be submitted by a variety of means, such as instant messaging, email, or the web. Twitter!!!
Visit Depth
The total number of unique pages a visitor is exposed to during a single visit to a website.
The Traditional Waterfall Methodology.
The traditional waterfall method no longer serves most of today's development efforts, however; it is inflexible and expensive, and it requires rigid adherence to the sequence of steps. Its success rate is only about 1 in 10.
Scope Creep
The uncontrolled expansion to product or project scope without adjustments to time, cost, and resources.
The Solution
The waterfall methodology is problematic in that it assumes users can specify all business requirements in advance. Defining the appropriate IT infrastructure that is flexible, scalable, and reliable is a challenge. The final IT infrastructure solution must meet not only current but also future needs in terms of time, cost, feasibility, and flexibility. Vision is inevitably limited at the head of the waterfall.
RUP Gate 1: Inception
This phase ensures all stakeholders have a shared understanding of the proposed system and what it will do.
RUP Gate 2: Elaboration
This phase expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it.
RUP Gate 3: Construction
This phase includes building and developing the product.
Business 2.0
With Business 2.0, people can be continuously connected, a driving force behind collaboration. - simplifies access to information and improves the ability to share it. Instead of spending $1,000 and two days at a conference to meet professional peers, business people can now use social networks such as LinkedIn to meet new contacts for recruiting, prospecting, and identifying experts on a topic.
Click-and-mortar
a business that operates in a physical store and on the internet (Barnes & Noble)
brick-and-mortar
a business that operates in a physical store without an internet presence (TJ Maxx)
Pure-Play (Virtual) Business
a business that operates on the internet only without a physical store (Google)
Semantic Web
a component of Web 3.0 that describes things in a way that computers can understand. - The semantic web is not about links between web pages; rather it describes the relationships between things (such as A is a part of B and Y is a member of Z) and the properties of things (size, weight, age, price). If information about music, cars, concert tickets, and so on is stored in a way that describes the information and associated resource files, semantic web applications can collect information from many different sources, combine it, and present it to users in a meaningful way.
Cell phone
a device for voice and data, communicating wirelessly through a collection of stationary ground-based sites called base stations, each of which is linked to its nearest neighbor stations. Base station coverage areas are about 10 square miles and are called cells - The first cell phone was demonstrated in 1973 by Motorola (it weighed almost 2 pounds), but it took 10 years for the technology to become commercially available. The Motorola DynaTAC, marketed in 1983, weighed 1 pound and cost about $4,000. Cellular technology has come a long way since then.8
Hashtag
a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#).
Wireless LAN's (WLAN)
a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.
Extensive Markup Language (XML)
a markup language for documents, containing structured information. - Technically, web services are based on Extensible Markup Language (XML) - think about XML as the official translator for structured information. Structured information is both the content (word, picture, and so on) and the role it plays. XML is the basis for all web service technologies and the key to interoperability; every web service specification is based on XML.
Wireless Fidelity (Wi-Fi)
a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves. - Wi-Fi has a maximum range of about 1,000 feet in open areas such as a city park and 250 to 400 feet in closed areas such as an office building.
Streaming
a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred. - Streaming is not limited to cellular usage; all wireless and even wired networks can take advantage of this method. - The most obvious advantage is speed, a direct benefit for mobile and wireless devices since they are still not as fast as their wired counterparts.
Wireless MAN (WMAN)
a metropolitan area network that uses radio signals to transmit and receive data. - WMAN technologies have not been highly successful to date, mainly because they are not widely available, at least in the United States.
Global Positioning System (GPS)
a satellite-based navigation system providing extremely accurate position, time, and speed information. - GPS uses 24 global satellites that orbit Earth, sending signals to a receiver that can communicate with three or four satellites at a time. - GPS can produce very accurate results, typically within 5 to 50 feet of the actual location (military versions have higher accuracy).
Control Objects for Information and Related Technology (COBIT)
a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors.
Application Programming Interface (API)
a set of routines, protocols, and tools for building software applications. - Content used in mashups is typically sourced from an application programming interface (API) - Most operating environments, such as Microsoft Windows, provide an API so that programmers can write applications consistent with them.
Wi-Fi Protected Access (WPA)
a wireless security protocol to protect Wi-Fi networks. - It is an improvement on the original Wi-Fi security standard, wired equivalent privacy (WEP), and provides more sophisticated data encryption and user authentication. Anyone who wants to use an access point must know the WPA encryption key to access the Wi-Fi connection.
mobile application management (MAM)
administers and delivers applications to corporate and personal smartphones and tablets. - MAM software assists with software delivery, licensing, and maintenance and can limit how sensitive data can be shared among apps. An important feature of MAM is that it provides corporate network administrators with the ability to wipe corporate mobile apps from an end user's device remotely.
Agile Methodology
aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements. - fast and efficient, with lower costs and fewer features. - Using agile methods helps refine feasibility and supports the process for getting rapid feedback as functionality is introduced. - Developers can adjust as they move along and better clarify unclear requirements.
Voice over LTE (VoLTE)
allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls - One easy way to think of VoLTE is as, essentially, a VoIP call on your mobile phone. The functionality is still the same, but the data transfers in a faster and more efficient manner.
Videoconference
allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards - Point-to-point videoconferences connect two people, and multipoint conferences connect more than two people at multiple locations. - Videoconferences can increase productivity because users participate without leaving their offices. - They can improve communication and relationships, because participants see each other's facial expressions and body language, both important aspects of communication that are lost with a basic telephone call or email. - They also reduce travel expenses, a big win for firms facing economic challenges. Of course, nothing can replace meeting someone face-to-face and shaking hands, but videoconferencing offers a viable and cost-effective alternative.
Cyborg Anthropologist
an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives. - Cyborg anthropology as a discipline originated at the 1993 annual meeting of the American Anthropological Association. Cyborg anthropologists study the different online communication methods for businesses, including the technology tools highlighted in and covered below in detail.
Legacy System
an old system that is fast approaching or beyond the end of its useful life within an organization
Web 3.0
based on "intelligent" web applications using natural language processing, machine-based learning and reasoning, and intelligent applications. - Web 3.0 is the next step in the evolution of the Internet and web applications.
asynchronous communication
communication such as email in which the message and the response do not occur at the same time.
The most important part of the plan is ______________
communication. - The project manager must communicate the plan to every member of the project team and to any key stakeholders and executives.
Ebusiness websites must create a sense of...
community and collaboration
Competitive Click Fraud
computer crime in which a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking the advertiser's link.
Iterative Development
consists of a series of tiny projects - has become the foundation of multiple agile methodologies.
Explicit Knowledge
consists of anything that can be documented, archived, and codified, often with the help of IT
Sign-Off
consists of the users' actual signatures indicating they approve all of the business requirements.
Hitbots
create the illusion that a large number of potential customers are clicking the advertiser's links when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser. - Some unethical individuals or click fraud scammers even use automated clicking programs called hitbots.
User contributed content
created and updated by many users for many users
The ___________ path has the least amount of slack.
critical
Responsibility matrix
defines all project roles and indicates what responsibilities are associated with each role
Project Requirements document
defines the specifications for product/output of the project and is key for managing expectations, controlling scope, and completing other planning efforts
War Driving
deliberately searching for Wi-Fi signals while driving by in a vehicle.
Network Effect
describes how products in a network increase in value to users as the number of users increases The more users and content managers on a wiki, the greater the network effect because more users attract more contributors, whose work attracts more users, and so on. For example, Wikipedia becomes more valuable to users as the number of its contributors increases.
Project Scope
describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project
Social Tagging
describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search - Flickr allows users to upload images and tag them with appropriate keywords - After enough people have done so, the resulting tag collection will identify images correctly and without bias.
test conditions
detail the steps the system must perform along with the expected result of each step. - Each time the actual result is different from the expected result, a "bug" is generated and the system goes back to development for a bug fix.
Project Management Institute (PMI)
develops procedures and concepts necessary to support the profession of project management (www.pmi.org).
Plunge Implementation
discards the legacy system and immediately migrates all users to the new system
Innovator's Dilemma
discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders
The best way to measure ebusiness success is to use..
effectiveness MIS metrics ex: the revenue generated by web traffic, number of new customers acquired by web traffic, and reductions in customer service calls resulting from web traffic.
Wireless Access point (WAP)
enables devices to connect to a wireless network to communicate with each other.
Critical Path
for a project is the series of activities that determine the earliest time by which the project can be completed. - In other words, it represents the longest path through the project and the maximum amount of time it will take you to finish.
Because RUP is an ___________ methodology, the user can reject the product and force the developers to go back to gate one.
iterative - RUP helps developers avoid reinventing the wheel and focuses on rapidly adding or removing reusable chunks of processes addressing common problems.
Social Networking Analysis (SNA)
maps group contacts (personal and professional), identifying who knows each other and who works together - In a company it can provide a vision of how employees work together. It can also identify key experts with specific knowledge such as how to solve a complicated programming problem or launch a new product.
Real-Time Communication
occurs when a system updates information at the same rate it receives it
Transaction Brokers
process online sales transactions Ex: Etrade, Charlesschwab, Fidelity
Personal Area Network (PAN)
provides communication for devices owned by a single user that work over a short distance - PANs are used to transfer files, including email, calendar appointments, digital photos, and music. A PAN can provide communication between a wireless headset and a cell phone or between a computer and a wireless mouse or keyboard. Personal area networks generally cover a range of less than 10 meters (about 30 feet).
Cybermediation
refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness Ex: comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank.
Mobile Device Management (MDM)
remotely controls smartphones and tablets, ensuring data security. - MIS departments implement MDM by requiring passcodes on organizational smartphones to ensure data encryption and, in the event of a lost smartphone, that all data on the device can be deleted remotely. MDM tools can also enforce policies, track inventory, and perform real-time monitoring and reporting. One problem with MDM is that the full-device approach can be too heavy-handed in an era when employees, not their employers, own their smartphones and tablets. Users may wonder, "If I only use my phone to check email at night, why do I have to enter my work password every time I want to use the phone?" or "If I lose my phone, why does my IT department want to wipe pictures of my dog remotely?"
Changing Technology
technology changes at an incredibly fast pace; therefore, it is possible that an entire project plan will need to be revised in the middle of a project as a result of a change in technology. - Technology changes so fast that it is almost impossible to deliver an information system without feeling the pain of updates.
Conversion
the process of transferring information from a legacy system
Open ID
the provision of an online identity that can be easily carried to a variety of devices (cell phones, PCs) allowing for easy authentication across different websites.
Mobile
the technology can travel with the user Ex: users can download software, email messages, and web pages onto a laptop or other mobile device for portable reading or reference.
Raw Visit Depth
the total number of pages a visitor is exposed to during a single visit to a website
URL Shortening
the translation of a long URL into an abbreviated alternative that redirects to the longer URL
Intelligent Applications
the use of agents, machine learning, and semantic web concepts to complete intelligent tasks for users
Crwodsourcing
the wisdom of the crowd - The most common form of collective intelligence found outside the organization
Scrum Methodology
uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervals, to achieve an appointed goal - each day ends or begins with a stand-up meeting to monitor and control the development effort
In-sourcing (in-house devlopment)
uses the professional expertise within an organization to develop and maintain its information technology systems. - In-sourcing has been instrumental in creating a viable supply of IT professionals and in creating a better quality workforce combining both technical and business skills.
Project Management Facts
•Analysts predict investment in MIS projects worldwide is over $1 trillion •70 percent will be lost due to failed projects The consequences of failed projects include: •Damaged brand •Lost goodwill •Dissolution of partnerships •Lost investment opportunities •Low morale
The Triple Constraint Facts
•Benjamin Franklin's timeless advice - by failing to prepare, you prepare to fail - applies to software development projects •The Hackett Group analyzed 2,000 companies and discovered •Three in 10 major IT projects fail •21 percent of the companies state that they cannot adjust rapidly to market changes •One in four validates a business case for IT projects after completion
Benefits of Business Mobility
•Enhance mobility •Provides immediate data access •Increases location and monitoring capability •Improves work flow •Provides mobile business opportunities •Provides alternative to wiring
•As organizations' reliance on software grows, so do the business-related consequences of software successes and failures including:
•Increase or decrease revenue •Repair or damage to brand reputation •Prevent or incur liabilities •Increase or decrease productivity
Most Common Programming Languages
■ C: A powerful language used primarily for operating hardware. ■ C++: Based on C using an object-oriented approach. ■ Ada: Used to control spacecraft, satellites, and airplanes. ■ Java: Works on computers, cell phones, and tablets. ■ MATLAB: Ideal for mathematical computations. page 311■ PHP: Creates interactive websites. ■ Python: A text-based language that can be used to build computer programs. ■ Scratch: A visual language that is ideal for learning programming. ■ Ruby: Automatically turns lots of information into web pages. ■ Javascript: Builds interactive websites. ■ XML: Used to manipulate Excel files and workbooks
Many LBS applications complement GPS and GIS, such as:
■ Emergency services ■ Field service management ■ Find-it services ■ Mapping ■ Navigation ■ Tracking assets ■ Traffic information ■ Vehicle location ■ Weather information ■ Wireless advertising
key questions project planning can help answer include:
■ How are deliverables being produced? ■ What activities or tasks need to be accomplished to produce the deliverables? ■ Who is responsible for performing the tasks? ■ What resources are required to perform the tasks? ■ When will the tasks be performed? ■ How long will it take to perform each task? ■ Are any tasks dependent upon other tasks being completed before they can begin? ■ How much does each task cost? ■ What skills and experience are required to perform each task? ■ How is the performance of the task being measured including quality? ■ How are issues being tracked? ■ How is change being addressed? ■ How is communication occurring and when? ■ What risks are associated with each task?
Outsourcing benefits
■ Increased quality and efficiency of business processes. ■ Reduced operating expenses for head count and exposure to risk for large capital investments. ■ Access to outsourcing service provider's expertise, economies of scale, best practices, and advanced technologies. ■ Increased flexibility for faster response to market changes and less time to market for new products or services.
The emerging technology behind mbusiness is a mobile device equipped with a web-ready micro-browser that can perform the following services:
■ Mobile entertainment—downloads for music, videos, games, voting, ring tones, as well as text-based messaging services. ■ Mobile sales/marketing—advertising, campaigns, discounts, promotions, and coupons. ■ Mobile banking—manage accounts, pay bills, receive alerts, and transfer funds. ■ Mobile ticketing—purchase tickets for entertainment, transportation, and parking including the ability to automatically feed parking meters. ■ Mobile payments—pay for goods and services including in-store purchases, home delivery, vending machines, taxis, gas, and so on.
Advantages of Prototyping
■ Prototyping encourages user participation. ■ Prototypes evolve through iteration, which better supports change. ■ Prototypes have a physical quality allowing users to see, touch, and experience the system as it is developed. ■ Prototypes tend to detect errors earlier. ■ Prototyping accelerates the phases of the SDLC, helping to ensure success.
The primary forms of agile methodologies include:
■ Rapid prototyping or rapid application development methodology. ■ Extreme programming methodology. ■ Rational unified process (RUP) methodology. ■ Scrum methodology. ** It is important not to get hung up on the names of the methodologies—some are proprietary brand names; others are generally accepted names. It is more important to know how these alternative methodologies are used in today's business environment and the benefits they can deliver.
URL shortening services typically provide users with:
■ The ability to track, analyze, and graph traffic statistics. ■ Bookmarklets that enable URL shortening without visiting the site. ■ The ability to customize shortened URL extensions. ■ A preview function.
primary reasons projects fail
■ Unclear or missing business requirements. ■ Skipped SDLC phases. ■ Changing technology. ■ The cost of finding errors. ■ Balance of the triple constraints.
Marketing Benefits from Ebusiness
- Associate (affiliate) program - Banner ad - click-through - cookie - pop-up ad - viral marketing
3G
- Broadband Internet services over cellular networks - Added MMS (multimedia message services) or picture message services Speed: 144 kbps - 4 mbps
_____________ need information richness to make informed purchases, and ___________ need information reach to properly market and differentiate themselves from the competition.
- Buyers - Sellers
Common reasons companies outsource include:
- Core Competencies - Financial Savings - Rapid Growth - The Internet and Globalization
2G
- Digital cell phone service Speed: 10 kbps - 144 kbps
The two primary diagrams most frequently used in project planning
- PERT Chart - Gantt Charts
Websites can generate revenue through:
- Pay-per-click - Pay-per-call. - Pay-per-conversion
A _____ user can generally alter the original content of any article, while the _____ user can only add information in the form of comments.
- wiki - blog
RUP Gates:
1. Inception 2. Elaboration 3. Construction 4. Transition
A few of the challenges facing the length of the contract include:
1. It can be difficult to break the contract. 2. Forecasting business needs for the next several years is challenging and the contract might not meet future business needs. 3. Re-creating an internal MIS department if the outsource provider fails is costly and challenging.
Outsourcing Challenges
1. Length of contract 2. Threat to competitive advantage 3. Loss of confidentiality - many challenges can be avoided with proper research
Ebusiness Forms
1. content providers 2. infomediaries 3. online marketplaces 4. portals 5. service providers 6. transaction brokers
Knowledge Based assets fall into two categories:
1. explicit knowledge 2. tacit knowledge
challenges facing ebusiness
1. identifying limited market segments 2. managing consumer trust 3. ensuring consumer protection 4. adhering to taxation rules
Two ways an MIS department can manage IT consumerization is through:
1. mobile device management 2. mobile application management
Social networking sites provide two basic functions:
1. the ability to create and maintain a profile that serves as an online identity within the environment. 2. the ability to create connections between other people within the network.
3 Website Visitor metrics
1. unidentified Visitor 2. Unique Visitor 3. Identified Visitor
3 Areas of PMI Focus
1.The distinguishing characteristics of a practicing professional (ethics) 2.The content and structure of the profession's body of knowledge (standards) 3.Recognition of professional attainment (accreditation)
GPS Receiver
A GPS receiver can be a separate unit connected to a mobile device using cable or wireless technology such as Bluetooth, or it can be included in devices such as mobile phones or vehicle navigation systems - The satellites broadcast signals constantly, while the receiver measures the time it takes for the signals to reach it. - This measurement, which uses the speed of the signal to determine the distance, is taken from three distinct satellites to provide precise location information.
Geocache
A GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find
RFID accelerometer
A device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
Website Bookmark
A locally stored URL or the address of a file or Internet page saved as a shortcut
Disruptive Technology
A new way of doing things that initially does not meet the needs of existing customers
Internet Corporation for Assigned Names and Numbers (ICANN)
A nonprofit organization that has assumed the responsibility for Internet Protocol (IP) address space allocation, protocol parameter assignment, domain name system management, and root server system management functions previously performed under U.S. government contract. Ex: https://www.icann.org/ Individuals, industry, noncommercial, and government representatives discuss, debate, and develop policies about the technical coordination of the Internet's Domain Name System.
Applet
A program that runs within another application such as a website. Ex: The common "Hello World" applet types Hello World across the screen
Waterfall Methodology
A sequence of phases in which the output of each phase becomes the input for the next - oldest and best known methodology - In the SDLC, this means the steps are performed one at a time, in order, from planning through implementation and maintenance.
Web Browser
Allows users to access the WWW. Ex: Internet Explorer, Mozilla's Firefox, Google Chrome
Identified Visitor
An ID is available that allows a user to be tracked across multiple visits to a website
Hotspots
Areas around access points where users can connect to the Internet - designated locations where Wi-Fi access points are publically available.
Project Manager
An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget
Project Management Office (PMO)
An internal department that oversees all organizational projects
World Wide Web Consortium (W3C)
An international community that develops open standards to ensure the long-term growth of the Web ( www.w3.org ). Ex: Tim Berners-Lee founded the W3C to act as a steward of web standards, which the organization has done for more than 15 years.
Ensuring Consumer Protection
An organization that wants to dominate with superior customer service as a competitive advantage must not only serve but also protect its customers, guarding them against unsolicited goods and communication, illegal or harmful goods, insufficient information about goods and suppliers, invasion of privacy and misuse of personal information, and online fraud. System security, however, must not make ebusiness websites inflexible or difficult to use.
The Business Problem
Any flaws in accurately defining and articulating the business problem in terms of what the business users actually require flow onward to the next phase.
Project Deliverable
Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project
Information Systems Audit Report
Assesses a company's information system to determine necessary changes and to help ensure the information system's availability, confidentiality, and integrity.
Collective intelligence
Collaborating and tapping into the core knowledge of all employees, partners, and customers
Search Engine Optimization
Combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking - The better the SEO, the higher the ranking for a website in the list of search engine results.
Geographic Information System (GIS)
Consists of hardware, software, and data that provide location information for display on a multidimensional map - GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps. - A GIS can find the closest gas station or bank or determine the best way to get to a particular location. But it is also good at finding patterns, such as finding the most feasible location to hold a conference according to where the majority of a company's customers live and work.
_____________ ______________ ______________ play a crucial role in getting site visitors to view more than just the home page.
Content management systems - If navigation choices are unclear, visitors may hit the "Back" button on their first (and final) visit to a website. - One rule of thumb to remember is that each time a user has to click to find search information, there is a 50 percent chance the user will leave the website instead. A key principle of good website design, therefore, is to keep the number of clicks to a minimum.
Low-Orbit Satellite
Conventional communication satellites move in stationary orbits approximately 22,000 miles above Earth. A newer satellite medium, the low-orbit satellite, travels much closer to Earth and is able to pick up signals from weak transmitters. Low-orbit satellites also consume less power and cost less to launch than conventional satellites.
___________________________ lets the company shorten the order process and add value with reduced costs or a more responsive and efficient service.
Disinintermediation Ex: The disintermediation of the travel agent occurred as people began to book their own vacations online, often at a cheaper rate. At Amazon anyone can publish and sell print-on-demand books, online music, and custom calendars, making the publisher obsolete. - The more intermediaries that are cut from the distribution chain, the lower the product price. When Dell decided to sell its PCs through Walmart many were surprised, because Dell's direct-to-customer sales model was the competitive advantage that had kept Dell the market leader for years.
__________ ___________ tend to open new markets and destroy old ones
Disruptive Technologies
___________ ________________ typically enter the low end of the marketplace and eventually evolve to displace high-end competitors and their reigning technologies.
Disruptive technologies
_____________ opened up a new marketplace for any company willing to move its business operations online.
Ebusiness
Information System Control Report
Ensures the reliability of information, consisting of policies and their physical implementation, access restrictions, or record keeping of actions and transactions
SDLC Design Phase
Establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation - During the analysis phase, end users and MIS specialists work together to gather the detailed business requirements for the proposed project from a logical point of view - business requirements are documented without respect to technology or the technical infrastructure that will support the system.
ETA vs ETE
Estimated time of arrival (ETA) is the time of day of an expected arrival at a certain destination and is typically used for navigation applications. Estimated time enroute (ETE) is the time remaining before reaching a destination using the present speed and is typically used for navigation applications.
_____________ is an excellent example of an ebusiness that did not figure out a way to generate profits until many years after its launch.
Google - Google's primary line of business is its search engine; however, the company does not generate revenue from people using its site to search the Internet. It generates revenue from the marketers and advertisers that pay to place their ads on the site.
Loss of Confidentiality
Information on pricing, products, sales, and customers can be a competitive asset and often critical for business success. Outsourcing could place confidential information in the wrong hands. Although confidentiality clauses contained in the contracts are supposed to protect the company, the potential risk and costs of a breach must be analyzed.
Financial Savings
It is far cheaper to hire people in China and India than pay the required salaries for similar labor in the United States.
Tacit knowledge
Knowledge contained in people's heads
Project Scope Statement
Links the project to the organization's overall business goals. It describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project. It defines the work that must be completed to deliver the product with the specified features and functions, and it includes constraints, assumptions, and requirements—all components necessary for developing accurate cost estimates.
The Plan
Managing costs, resources, and time constraints is difficult in the waterfall sequence. What happens to the schedule if a programmer quits? How will a schedule delay in a specific phase impact the total cost of the project? Unexpected contingencies may sabotage the plan.
SOA Integration Chart
SOA is a pattern for developing a more flexible kind of software application that can promote loose coupling among software components while reusing existing investments in technology in new, more valuable ways across the organization. SOA is based on standards that enable interoperability, business agility, and innovation to generate more business value for those who use these principles. SOA helps companies become more agile by aligning business needs and the MIS capabilities that support these needs. Business drives requirements for MIS; SOA enables the MIS environment to respond to these requirements effectively and efficiently. SOA is about helpingpage 325 companies apply reusability and flexibility that can lower cost (of development, integration, and maintenance), increase revenue, and obtain sustainable competitive advantage through technology. It is very important to note that SOA is an evolution. Although its results are revolutionary, it builds on many technologies used in the marketplace, such as web services, transactional technologies, information-driven principles, loose coupling, components, and object-oriented design. The beauty of SOA is that these technologies exist together in SOA through standards, well-defined interfaces, and organizational commitments to reuse key services instead of reinventing the wheel. SOA is not just about technology, but about how technology and business link themselves for a common goal of business flexibility.
Hypertext Transport Protocol (HTTP)
The Internet protocol web browsers use to request and display web pages using universal resource locators (URLs). Ex: To retrieve the file at the URL http://www.somehost.com/path/file.html
Mobile business (mbusiness, mcommerce)
The ability to purchase goods and services through a wireless Internet-enabled device
Cartography
The science of making maps
Collaboration System
Tools that support the work of teams or groups by facilitating the sharing and flow of information
____________ is the next step in the evolution of the Internet and web applications.
Web 3.0 - Business leaders who explore its opportunities will be the first to market with competitive advantages. - Web 3.0 offers a way for people to describe information such that computers can start to understand the relationships among concepts and topics. To demonstrate the power of Web 3.0, let's look at a few sample relationships, such as Adam Sandler is a comedian, Lady Gaga is a singer, and Hannah is friends with Sophie. These are all examples of descriptions that can be added to web pages allowing computers to learn about relationships while displaying the information to humans
Search Engine
Website software that finds other pages based on keyword matching similar to Google
Clickstream Metrics
When a visitor reaches a website, a hit is generated, and his or her computer sends a request to the site's computer server to begin displaying pages. Each element of a request page is recorded by the website's server log file as a hit.
Hits (Website hit metrics)
When visitors reach a website, their computer sends a request to the site's computer server to begin displaying pages. Each element of a requested page is recorded by the website's server log file as a "hit."
Service-oriented architecture (SOA)
a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services - It is important to understand that SOA is not a concrete architecture; it is thought that leads to a concrete architecture. - It might be described as a style, paradigm, concept, perspective, philosophy, or representation. That is, SOA is an approach, a way of thinking, a value system that leads to decisions that design a concrete architecture allowing enterprises to plug in new services or upgrade existing services in a granular approach. - the basic unit of communication is a message rather than an operation, web services are usually loosely coupled.
Geocoding
a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category).
Worldwide Interoperability for Microwave Access (WiMAX)
a communications technology aimed at providing high-speed wireless data over metropolitan area networks. - In many respects, WiMAX operates like Wi-Fi, only over greater distances and with higher bandwidths. - A WiMAX tower serves as an access point and can connect to the Internet or another tower. - A single tower can provide up to 3,000 square miles of coverage, so only a few are needed to cover an entire city. - WiMAX can support data communications at a rate of 70 Mbps. - In New York City, for example, one or two WiMAX access points around the city might meet the heavy demand more cheaply than hundreds of Wi-Fi access points. - WiMAX can also cover remote or rural areas where cabling is limited or nonexistent, and where it is too expensive or physically difficult to install wires for the relatively few users.
Internet Service Provider (ISP)
a company that provides access to the internet for a monthly fee - Major ISPs in the United States include AOL, AT&T, Comcast, Earthlink, and Netzero, as well as thousands of local ISPs including regional telephone companies.
Software Engineering
a disciplined approach for constructing information systems through the use of common methods, techniques, or tools
Prototyping
a modern design approach where the designers and system users use an iterative approach to building the system•Prototype - A smaller-scale representation or working model of the users' requirements or a proposed design for an information system•The prototype is an essential part of the analysis phase when using a RAD methodology
Change Agent
a person or event that is the catalyst for implementing major changes for a system to meet business changes.
Business Model
a plan that details how a company creates, delivers, and generates revenues
eBusiness Model
a plan that details how a company creates, delivers, and generates revenues on the Internet.
Scripting Language
a programming method that provides for interactive modules to a website
Critical Path Analysis
a project diagramming method used to predict total project duration. - This important tool will help ensure you complete your project on-time and within your budget.
Telepresence Robot
a remote-controlled, wheeled device with a display to enable video chat and videoconferencing. Ex: iRobot's Remote Presence Virtual + Independent Telemedicine Assistant (RP-VITA) is designed for use in hospitals where it makes it possible for doctors to consult with patients, guide staff, and confer with other medical practitioners remotely. ■ Double Robotics' Double, which consists of a wheeled base integrated with an iPad, is designed for a business environment to enhance telecommuting or teleconferencing. ■ Suitable Technologies' Beam+ is designed for in-home uses, such as mobile video chat, oversight of children or elderly people, and remote security monitoring. The vendor's Beam Pro product is designed for the workplace.
Geocoin
a round, coin-sized object, is uniquely numbered and hidden in geocache. - Geocoins can also be shaped to match a theme such as the state of Colorado or a birthday party hat. Geocoins are often decorative or commemorative, making them collectible and highly valuable for technology adventures.
eShop (eStore, eTailor)
an online version of a retail store where customers can shop at any hour.
Satellite
a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area. - When satellite systems first came into consideration in the 1990s, the goal was to provide wireless voice and data coverage for the entire planet, without the need for mobile phones to roam between many different provider networks. But by the time satellite networks were ready for commercial use, they had already been overtaken by cellular systems. - The peak data transmission speeds range from 2.4 Kbps to 2 Mbps. - For the everyday mobile professional, satellite communication may not provide a compelling benefit, but for people requiring voice and data access from remote locations or guaranteed coverage in nonremote locations, satellite technology is a viable solution. - With satellite networks, business people almost anywhere in the world have access to full communication capabilities, including voice, videoconferencing, and Internet access
RFID reader (RFID interrogator)
a transmitter/receiver that reads the contents of RFID tags in the area - A RFID system is comprised of one or more RFID tags, one or more RFID readers, two or more antennas (one on the tag and one on each reader), RFID application software, and a computer system or server
Kill switch
a trigger that enables a project manager to close the project before completion - Managers need to continuously monitor projects to measure their success. If a project is failing, the manager must cancel the project and save the company any further project costs. - Canceling a project is not necessarily a failure as much as it is successful resource management as it frees resources that can be used on other projects that are more valuable to the firm.
heat map
a two-dimensional representation of data in which values are represented by colors. - A simple heat map provides an immediate visual summary of information. - More elaborate heat maps allow the viewer to understand complex data.
Wiki
a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required. - Large wikis, such as Wikipedia, protect the quality and accuracy of their information by assigning users roles such as reader, editor, administrator, patroller, policy maker, subject matter expert, content maintainer, software developer, and system operator. Access to some important or sensitive Wikipedia material is limited to users in these authorized roles.9
Programming Language
a unique set of keywords (words that it understands) along with a special syntax for organizing program instructions that execute computer commands.
Real Simple Syndication (RSS)
a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format - An RSS document or feed includes full or summarized text, plus other information such as publication date and authorship. News websites, blogs, and podcasts use RSS, constantly feeding news to consumers instead of having them search for it. In addition to facilitating syndication, RSS allows a website's frequent readers to track updates on the site.
Mashup
a website or web application that uses content from more than one source to create a completely new product or service The term is typically used in the context of music; putting Jay-Z lyrics over a Radiohead song makes something old new. The web version of a mashup allows users to mix map data, photos, video, news feeds, blog entries, and so on to create content with a new purpose.
Bluetooth
a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices. Bluetooth operates at speeds up to 1 Mbps within a range of 33 feet or less. Devices that are Bluetooth-enabled communicate directly with each other in pairs, like a handshake. Up to eight can be paired simultaneously
Intermediaries
agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together
Affiliate Programs
allow a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website. - Click fraud scammers often take advantage of the affiliate programs by agreeing to provide exposure to an advertisement in order to receive a portion of the pay-per-click fees the advertiser is paying the affiliate. - Instead of placing the ad on legitimate websites, the scammer might place the ad on websites created solely for the purpose of placing the ad. And a site like that, quite naturally, will not have any real, organic traffic. Once the ads are in place, the hitbots generate large volumes of fraudulent clicks, often in a very short time period, for which the scammer bills the owner of the affiliate program. This, of course, costs the company a tremendous amount of money.
associate (affiliate) program
allows a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website Ex: If a customer to a company website clicks a banner ad to another vendor's website, the company will receive a referral fee or commission when the customer performs the desired action, typically making a purchase or completing a form.
Native Advertising
an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement.
Outsourcing
an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house. - In some cases, the entire MIS department is outsourced, including planning and business analysis as well as the design, development, and maintenance of equipment and projects. - Outsourcing can range from a large contract under which an organization such as IBM manages all MIS services for another company, to hiring contractors and temporary staff on an individual basis.
Browser software such as Microsoft's Internet Explorer and Netscape Navigator gave computer users...
an easy to use graphical interface to find, download and display web pages
RFID Tag
an electronic identification device that is made up of a chip and antenna. - Tags, often smaller than a grain of rice, can be applied to books or clothing items as part of an adhesive bar-code label, or included in items such as ID cards or packing labels. Readers can be stand-alone devices, such as for self-checkout in a grocery store, integrated with a mobile device for portable use, or built in as in printers. The reader sends a wireless request that is received by all tags in the area that have been programmed to listen to wireless signals. Tags receive the signal via their antennas and respond by transmitting their stored data. The tag can hold many types of data, including a product number, installation instructions, and history of activity (such as the date the item was shipped). The reader receives a signal from the tag using its antenna, interprets the information sent, and transfers the data to the associated computer system or server.
Wired Equivalent Privacy (WEP)
an encryption algorithm designed to protect wireless transmission data. - If you are using a Wi-Fi connection, WEP encrypts the data by using a key that converts the data to a nonhuman readable form. - The purpose of WEP was to provide wireless networks with the equivalent level of security as wired networks. Unfortunately, the technology behind WEP has been demonstrated to be relatively insecure compared to newer protocols such as WPA
Web Real-Time Communications (WebRTC)
an open source project that seeks to embed real-time voice, text, and video communications capabilities in web browsers. - WebRTC is expected to make audio, video, and data communication between browsers more user-friendly. - The goal of WebRTC is to enable communications between browsers. - With WebRTC, end-users do not have to download a special software application or use the same client or browser plug-in to communicate directly with each other.
Web Service
an open-standards way of supporting interoperability - Although SOA can exist without web services, the best-practice implementation of SOA for flexibility always involves web services.
Closed Source
any proprietary software licensed under exclusive legal right of the copyright holder.
Wireless
any type of operation accomplished without the use of a hard-wired connection. - There are many environments in which the network devices are wireless but not mobile, such as wireless home or office networks with stationary PCs and printers. Some forms of mobility do not require a wireless connection; for instance, a worker can use a wired laptop at home, shut down the laptop, drive to work, and attach the laptop to the company's wired network.
Location-based services (LBS)
applications that use location information to provide a service - LBS is designed to give mobile users instant access to personalized local content and range from 911 applications to buddy finders ("Let me know when my friend is within 1,000 feet") to games (treasure hunts) to location-based advertising ("Visit the Starbucks on the corner and get $1.00 off a latte").
Business-to-consumer (B2C)
applies to any business that sells its products or services directly to consumers online. Ex: Carfax offers car buyers detailed histories of used vehicles for a fee.
Consumer-to-consumer (C2C)
applies to customers offering goods and services to each other on the internet - A good example of C2C is an auction where buyers and sellers solicit consecutive bids from each other and prices are determined dynamically. EBay, the Internet's most successful C2C online auction website, links like-minded buyers and sellers for a small commission. Other types of online auctions include forward auctions, where sellers market to many buyers and the highest bid wins, and reverse auctions, where buyers select goods and services from the seller with the lowest bid.
Pilot Implementation
assigns a small group of people to use the new system until it is verified that it works correctly, then the remaining users migrate to the new system
Web Conferencing/Webinar
blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants
Online Marketplaces
bring together buyers and sellers of products and services Ex: Amazon, eBay, Priceline
SDLC Testing Phase
brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase.
Discovery Prototyping
builds a small-scale representation or working model of the system to ensure it meets the user and business requirements
Advancements in networking hardware, software and media made it possible for...
business computers to be connected to larger networks at a minimal cost
the analysis phase is critical because...
business requirements drive the entire systems development effort.
Reputation System
buyers post feedback on sellers.
Snackable Content
content that is designed to be easy for readers to consume and to share. Snackable content captures website visitors' attention by offering small consumable pieces of information that can be quickly read and understood. Infographics, photos, and attention-grabbing headlines that ask questions or use humor play a critical part when attracting readers attention who are browsing and don't have the time or patience to consume long, text-heavy articles. Many people believe that snackable content is dumbing down the Internet, while others believe it fits the mobile delivery channel so many consumers use today. To make long-form articles more snackable, they can be broken down into smaller components. Responsive or adaptive website design can also help make content more snackable, as flexible website design makes content easier to view on smart phones and tablets.
nearshore outsourcing
contracting an outsourcing arrangement with a company in a nearby country (often sharing a border)
Podcasting
converts an audio broadcast to a digital music player - Podcasts can increase marketing reach and build customer loyalty. - Companies use podcasts as marketing communication channels discussing everything from corporate strategies to detailed product overviews. - The senior executive team can share weekly or monthly podcasts featuring important issues or expert briefings on new technical or marketing developments.
Project Assumption
factors considered to be true, real, or certain without proof or demonstration
Object-Oriented Languages
group data and corresponding processes into objects
multiple-in/multiple-out (MIMO) technology
have multiple transmitters and receivers, allowing them to send and receive greater amounts of data than traditional networking devices
Active RFID Tags
have their own transmitter and a power source (typically a battery)
Taxonomy
he scientific classification of organisms into groups based on similarities of structure or origin. - Taxonomies are also used for indexing the content on the website into categories and subcategories of topics. For example, car is a subtype of vehicle. Every car is a vehicle, but not every vehicle is a car; some vehicles are vans, buses, and trucks. - Taxonomy terms are arranged so that narrower/more specific/"child" terms fall under broader/more generic/"parent" terms. Information architecture is the set of ideas about how all information in a given context should be organized. - A well-planned taxonomy ensures search and navigation are easy and user-friendly. If the taxonomy is confusing, the site will soon fail.
Workshop Training
held in a classroom environment and led by an instructor
Content management Systems
help companies manage the creation, storage, editing, and publication of their website content Content management systems are user-friendly; most include web-based publishing, search, navigation, and indexing to organize information; and they let users with little or no technical expertise make website changes.
Egovernment
involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer and all branches of government. - Recent business models that have arisen to enable organizations to take advantage of the Internet and create value are within egovernment. - One example of an egovernment portal, FirstGov.gov, the official U.S. gateway to all government information, is the catalyst for a growing electronic government. Its powerful search engine and ever-growing collection of topical and customer-focused links connect users to millions of web pages, from the federal government, to local and tribal governments, to foreign nations around the world
Instant Messaging (IMing)
is a service that enables instant or real-time communication between people. Businesses immediately saw what they could do: ■ Answer simple questions quickly and easily. ■ Resolve questions or problems immediately. ■ Transmit messages as fast as naturally flowing conversation. ■ Easily hold simultaneous IM sessions with multiple people. ■ Eliminate long-distance phone charges. ■ Quickly identify which employees are at their computers.
Fourth-Generation Languages (4GL)
programming languages that look similar to human languages - For example, a typical 4GL command might state, "FIND ALL RECORDS WHERE NAME IS "SMITH".
The __________ ____________ are among the most important areas to define because they are essentially the major elements of the project.
project objectives - When an organization achieves the project objectives, it has accomplished the major goals of the project and the project scope is satisfied - Project objectives must include metrics so that the project's success can be measured.
Service Providers
provide services such as photo sharing, video sharing, online backup and storage Ex: Flickr, Mapquest, YouTube
Infomediaries
provide specialized information on behalf of producers of goods and services and their potential customers Ex: Edmunds, BizRate, Bloomberg, Zillow
The ultimate outcome of any advertisement is a ____________
purchase
short for electronic mail, is the exchange of digital messages over the Internet. - No longer do business professionals have to wait for the mail to receive important documents as email single-handedly increased the speed of business by allowing the transfer of documents with the same speed as the telephone. - Its chief business advantage is the ability to inform and communicate with many people simultaneously, immediately, and with ease. There are no time or place constraints, and users can check, send, and view emails whenever they require.
Loose Coupling
the capability of services to be joined on demand to create composite services or disassembled just as easily into their functional components - a way of ensuring that the technical details such as language, platform, and so on are decoupled from the service. - Creating a common customer ID that is independent of applications and databases allows loosely coupling the service, customer ID, to data and applications without the application or database ever knowing who it is or where it is.
Interoperability
the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers - With SOA, a business can create solutions that draw on functionality from these existing, previously isolated systems that are portable, interoperable, or both, regardless of the environment in which they exist.
Access Point (AP)
the computer or network device that serves as an interface between devices and the network. - Each computer initially connects to the access point and then to other computers on the network.
SDLC Analysis Phase
the firm analyzes its end-user business requirements and refines project goals into defined functions and operations of the intended system.
Graphical user Interface (GUI)
the interface to an information system
Feasibility
the measure of the tangible and intangible benefits of an information system - One of the most difficult decisions managers make is identifying the projects in which to invest time, energy, and resources. An organization must choose what it wants to do—justifying it, defining it, and listing expected results—and how to do it, including project budget, schedule, and analysis of project risks.
Stickiness
the measurement of how long visitors linger at a website
IEEE 802.11n (or Wireless-N)
the newest standard for wireless networking - Compared with earlier standards such as 802.11b, Wireless-N offers faster speeds, more flexibility, and greater range