Tech in Technology
Phishing
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail
Firewall
software that runs on servers (often routers) that only allows traffic through according to some set of security rules.
Geographical Information System (GIS)
uses date visualization technology to analyze/display maps
Business Process Managements (BPM)
A management methodology that tries to systematically translate a firm's strategy into operational targets.
Two-Factor Authentication
A multi-step process of authentication.
Acceptable Use Policy (AUP)
A policy that outlines the acceptable uses of a firm's resources.
pull-based method
A supply chain driven by actual customer orders.
push-based method
A supply chain driven by forecasts or best guesses of consumer demand.
Trojan Horse
A type of malware disguised as legitimate software.
Organizational Learning
Changing organizational behavior by sensing and responding to new experience and knowledge.
best practices
Enterprise software is built around thousands of predefined business processes that reflect ____ ________.
unstructured decision
Establishing a firm's long term goals is an example of a ___________ __________.
True or False? The third stage in Simon's description of decision making is implementation.
False, Implementation is the 4th stage
structured decision
If you can follow a definite procedure to make a business decision, you are a making a ______ ______.
Just-in-time strategy (JIT)
In Supply Chain Management, in which commerce companies receive the exact amount of inventory hey need, right when they need it.
the knowledge base
In an expert system, the set of rules that models human knowledge is called:
Ransomware
Malware that hijacks a user's computer and demands payments in return for giving back access.
Key performance indicators (KPIs)
Measures defined by management, used to internally evaluate the success of a firm financial, learning, customer growth.
Interpersonal, Informational, decisional
Mintzberg outlined three categories of managerial notes.
Provide predictive modeling for Senior Managers
Operational CRM applications include tools for all of the following EXCEPT:
Security
Refers to policies/technical measures used to prevent unauthorized access/altercation/theft.
Deep learning networks
Some commentators believe which of the following comes closest to the "Grand Vision" of AI?
Keylogger
Spyware that logs and transmits everything a user types.
Design
The ______ phase of decision making involves identifying and exploring various solutions to a problem.
Cyber Vandalism
The destruction of a website.
tacit knowledge
The text defines _____________ as expertise of organizational.
TRUE or FALSE? Enterprises can rewrite enterprise system software to support their existing business processes.
True
TRUE or FALSE? Knowledge work systems require strong links to external knowledge.
True
TRUE or FALSE? Managing a global supply chain is more complex than managing a domestic supply chain.
True
True or False? AI applications are used by search engines.
True
neural networks
Uses Learning Rules to identify the optimal path through networks.
DDoS
Using numerous computers to inundate and overwhelm the network from numerous launch points.
Reducing information uncertainty
What can the bullwhip effect can be countered by?
knowledge is hard to move
What is meant by the statement "knowledge is sticky"?
Click Fraud
When a salesperson clicks repeatedly on the ads of a competitor to drive the competitor's costs up.
Interpersonal role
When managers represent their company in the outside world and perform symbolic duties, they are acting in their _______________ _____.
Social CRM
Which enables a business to connect customer conversations/relationships?
Analytical CRM
Which of the following applications provides analysis of customer data?
Disaster Recovery Process
Which of the following focuses primarily on the technical issues of keeping systems up and running?