TIM50 Final
IP address
-Hierarchical: beginning bits say which network the host is on, last bits tell which host of the network -Changeable: changes with the location of the host -4 bytes -4.2 billion (not a lot) -32 bits
MAC address
-Not hierarchical: beginning bits tell nothing useful -Not changeable -6 bytes -281 trillion
Digital goods
0 or nearly 0 marginal cost Goods delivered over a digital network Costs of delivery over internet are very low Cost of producing the first unit is almost the entire cost of the product Marketing costs the same, pricing is highly variable Industries with digital goods undergoing huge changes
Digital certificates
A data file used to establish the identity of users and electronic assets for the protection of online transactions Uses a trusted third party (certification authority (CA)), to validate a user's identity The CA verifies the user's identity, then stores the information in a CA server, which generates a encrypted digital certificate containing the owner ID information and copy of the owner's public key
Host
A device that communicates with others hosts on a network; _____ on a network include 'clients and servers' that send or receive data, services, or applications
What is a distributed denial of service attack?
A distributed denial of service (DDOS) attack involves sending traffic from a large number of hosts to a target system in attempt to overwhelm that system, diminishing its ability to serve legitimate users. Often DDOS attacks are launched by networks of infected computers known as "botnets."
Botnet
A group of computers that have been infected with a bot malware without the users knowledge, enabling a hacker to use the amassed resources of the computers to launch distributed denial-of-service attacks
Router
A physical or virtual device that passes information between the Internet and the devices connected to the Internet. 'routes' traffic between the devices and the internet
Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?
A))) Security ▪ B) Controls ▪ C) Benchmarking ▪ D) Algorithms
keyloggers
Action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored
Revenue models
Advertising, sales, subscription, free/freemium, transaction fees, affiliate
Customer lifetime value (CLTV)
Analytical CRM, analyzes customer data Difference between revenues produced by a specific customer and the expenses for acquiring and servicing that customer minus the cost of promotional marketing over the lifetime of the customer relationship expressed in today's dollars
Analytical CRM types
Based on data warehouses populated by operational CRM systems and customer touch points Analyzes customer data (OLAP, data mining, etc.) Also does customer lifetime value (CLTV)
Consumer Commerce (B2C)
Business to consumer Amazon
Link layer
Can make a Frame link out of a bit link Distinct packages of data that are separate from one another Can tell where a new frame begins by inserting a special sequence In binary 0's and 1's Can also do error detections and corrections Insert extra information that helps the receiver determine if the data has been corrupted Parity bit The sender adds either a 0 or 1 to make it odd or even If the receiver counts the opposite of what it should be, it's corrupted
Antivirus software
Checks computers for the presence of malware and can oftentimes eliminate it as well Requires continual updating
CKO and COPs
Chief Knowledge Officer Communities of practice (COPs) Informal social networks of professionals and employees Activities include education, online newsletters, and sharing knowledge Also reduces learning curves of new employees
• Enterprise Resource Planning (ERP)
Collects data from many divisions of the firm for use in nearly all of the firm's internal business activities Based on integrated software modules and common central database Info entered in one process is immediately available for others
Just-in-time strategy
Components arrive as they are needed Finished goods are shipped after leaving the assembly line
-Artificial intelligence
Computer hardware and software systems that are as "smart" as humans Grand vision of it Realistically are systems that take data inputs, process them, and produce outputs (like software programs) and that can perform many complex tasks that would be difficult or impossible for humans to perform Many different types and examples Below are the major types of AI
Interconsumer Commerce (C2C)
Consumer to consumer eBay
Physical layer
Convey bits over a wire Other ways to map a bit sequence Modulation schemes
CRM
Customer relationship management (knowing the customer) CRM systems Capture and integrate customer data from all over the organization Consolidate and analyze customer data Distribute customer information to various systems and customer touch points across enterprise Provides a single enterprise view of customers PRM: partner relationship management Lead generation, pricing, promotions, orders, availability Assess partner performance ERM: employee relationship management Objectives, performance, training, compensation Sales, Marketing, Service
Operational CRM types
Customer-facing applications Sales force automation call center and customer service support Marketing automation
Acceptable use policy (AUP)
Defines acceptable uses of firms information resources and computing equipment
Acquisition: (KMVC)
Documenting both tacit and explicit knowledge This includes storing documents, reports, presentations, best practices; unstructured documents; developing online knowledge Creating knowledge and tracking data from TPS and external sources
DNS
Domain Name System Move from root name server to more specific to more specific Ex: root server to UCSC name server to S&E name server Way to map domain names
E-Commerce
E-Commerce Use of internet and web to transact business Began in 1995 and grew exponentially Social, mobile, and local
Packet
Each time a device sends a file to another device, the data is broken down into ____ so that it can be sent efficiently. Data transmission across digital networks
Business to Business (B2B)
Ex: elemica (supply) New ways of buying and selling Private industry networks: private exchanges, large firm using a secure website to link to suppliers and partners New marketplaces (e-hubs): Single digital marketplace for many buyers and sellers, may focus on direct or indirect goods, may be vertical or horizontal marketplaces Exchanges: independently owned third-party net marketplaces for spot purchasing
Information systems audit
Examines the firm's overall security environment as well as controls governing individual information systems
True or False: An example of the content provider business model is Barnesandnoble.com, a retailer of printed books.
False
True or False: Disintermediation provides major benefits to the distributor.
False
Controls
General controls: They govern design, security, and use of computer programs and security of data files in general throughout an organization Software controls, hardware controls, computer operations controls, data security controls, system development controls, and administrative controls Application controls: These are controls unique to each computerized application Input controls, processing controls, output controls
-Machine learning
How computer programs improve performance without explicit programming They recognize patterns, experience, prior learnings, supervised/unsupervised learning Ex: google searches, recommender systems (Amazon, Netflix)
Knowledge Management Value Chain
IS Activities: Acquire, Store, Disseminate, Apply
Network Layer
If Host A wants to send data to Host C, and knows C's address it sends the packets towards C Does this by marking the packet with C's IP address A uses a link to send it to B When it gets to B it looks at the packet header and routing table to choose link to destination
Storage (KMVC)
In databases, document management systems, and role of management
Application (KMVC)
In new business practices, products and services, and new markets
Large e-business topology
Incoming HTTP requests go to load balancer which go to presentation logic (web servers), logic flow of interaction (application servers) to databases
Computer worm
Independent software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs
Bullwhip effect
Information about product demand gets distorted as it passes from one entity to the next across the supply chain Upstream and downstream
-Transport Protocols - TCP/UDP
Internet is unreliable and will make its best effort to get packet to destination Packets can be lost because of congestion, link errors, or routing problems Transport is under Application, Presentation, and Session AND above Network, Link, and Physical There is a retransmit mechanism for reliability The receiver sends acknowledgement to sender When a packet is lost, there is no acknowledgement, so it retransmits Congestion control If there is perceived congestion (lost packets), the source reduces its send rate by half, then slowly increases TCP Header has TCP port numbers These help to sort out how to route packets to applications
Hierarchical addressing
Internet routing is hierarchical Addresses are hierarchical in topology Maximize wild cards Distribute address administration Names are hierarchical in administration Single administered organizations are often distributed topologically (ibm.com)
ISP topology
Internet service provider Local loops (from homes) to telephone switch and DSL Modem Switch goes to telephone network Modem goes to DSLAM to leased line to NAP
Firewall
It is a combination of hardware and software that prevents unauthorized users from accessing private networks Packet filtering, stateful inspection, network address translation (NAT), and application proxy filtering Corporate firewalls have an outer firewall to a web server then an inner firewall to corporate systems to databases The walls have policy rules
Statistical Multiplexing
Links are shared in a way that connections are not assigned a fixed fraction of Link Sources A and B will unlikely offer peak rate at the same time Possible that offer loads too high because resources aren't reserved When this happens packets are put into a queue
▪ Differences between early MRP and modern ERP
MRP evolved into ERP A common software architecture with modules to support different business functions Multi-functional, integrated, modular
Malware
Malicious software programs such as computer viruses, worms and trojan horses
Supply Chain Planning Systems
Model existing supply chain, enable demand planning, optimize sourcing and manufacturing plans, establish inventory levels, identify transportation modes
Intrusion detection systems
Monitors hot spots on corporate networks to detect and deter intruders
Ethernet
Multiple hosts want to share a link To avoid the hosts talking at the same time: Don't transmit if another host is talking If there is a collision, stop, wait a random amount of time, then try Medium Access Control (MAC) Protocol is this ^ How hosts on wireless ethernet identify each other: Each host (interface): has a globally unique MAC address, and cannot be changed
Layering of architecture
Network architectures are layered Each layer uses the services of the layer below it and offer more advanced services to the layer above Layers are designed independently 3 layers: Network - Link - Physical
Does the IP address of your laptop remain the same wherever you go?
No. The IP address changes when the computer is connected to different parts of the network. This is necessary since the IP addressing scheme is hierarchical - so that information about the location of the IP address can be discerned by reading the beginning parts of the address. This structure could not be maintained if hosts moved around the network without changing addresses.
Click fraud
Occurs when an individual or computer program fraudulently clicks an online ad without any intention of learning more about the advertiser or making a purchase
Secure Sockets Layer (SSL)
One type of encryption on networks Also has successor Transport Layer Security (TLS) Enables client and server computers to manage encryption and decryption activities as they communicate with each other during a secure web session
Secure Hypertext Transfer Protocol (S-HTTP)
One type of encryption on networks Protocol used for encrypting data flowing over the internet; limited to individual messages
SCM (supply chain management)
Organizations and processes for procuring materials, transforming materials into products, distributing the products
EDI (Electronic Data Interchange)
Part of internet-enabled technologies in B2B Computer-to-computer exchange of standard transactions such as invoices, purchase orders Major industries have EDI standards: Define structure and information fields of electronic documents More companies are moving to this, can link to other firms with EDI, wider range of info Supplier and firm systems
Home network topology
Personal computers to ethernet switch to router to DSL modem to telephone line which goes to local office
Small/medium business topology
Personal computers to ethernet switch to router with firewall, website server to local office
Popular business model categories
Portal/search engine, e-tailer, content provider, market creator, transaction broker, service provider, community provider
Dissemination (spread) (KMVC)
Portals, wikis, email, instant messaging Search engines, collaboration tools Training programs, informal networks, and shared management experience
Post office analogy (Hierarchical addressing )
Post office analogy Bob is in NY and wants to send letter to Alice on High St in SC NY Post Office: plane to London or SFO Make forwarding decision on beginning of zip code SFO Post office: truck to Santa Rosa or Santa Cruz Make forwarding decision on address Santa Cruz Post Office: 41st st or High st Final destination
Spoofing
Redirecting a web link to an address different from the intended one, with the site masquerading as the intended destination
Digital markets
Reduce: information asymmetry, search costs, transaction costs, menu costs o Enable: dynamic pricing, disintermediation
Computer virus
Rogue software program that attaches itself to other software programs or data files in order to be executed, often causing hardware and software malfunctions
-Routing Table, Packet Forwarding, IP Addresses
Routing algorithms is where routers talk to each other to build routing tables Routing tables have wild cards Prefixes in the table vary so generally route to the longest prefix match
Sales force automation vs. customer service vs. marketing roles
Sales Force automation (SFA) Sales prospect and contact information Sales quote generation capabilities Customer service assigning and managing customer service requests web-based self-service capabilities Marketing Capturing prospect and customer data, scheduling and tracking direct marketing mailings or email Cross-selling
Zero Day vulnerability
Security vulnerabilities in software, unknown to the creator, that hackers can exploit before the vendor becomes aware of the problem
CRM Service platforms
Service delivery, customer satisfaction, returns, planning, call center/help, analytics
Patches
Small pieces of software to repair the software flaws without disturbing the proper operation of the software
Supply chain management
Supply chain planning systems Model existing supply chain, enable demand planning, optimize sourcing - manufacturing plans, establish inventory levels, identify transportation modes Supply chain execution systems Manage flow of products through distribution centers and warehouses
MRP (Material or Manufacturing Resource Planning)
Takes: product development forecasts, inventory balances, and replenishment lead times; to Develop a production schedule for a single plant Planning tool
Spyware
Technology that aids in gathering information about a person or organization without their knowledge
Encryption
The coding and scrambling of messages to prevent their being read or accessed without authorization Transforming text or data into cipher text that cannot be read by unintended recipients Two methods for the encryption on networks Secure Sockets Layer (SSL) and Successor Transport Layer Security (TLS) Secure Hypertext Transfer Protocol (S-HTTP) Symmetric key encryption Sender and receiver use single, shared key Public key encryption Uses two, mathematically related keys Public and private key The sender encrypts the message with the recipients public key The recipient decrypts with the private key
What responsibilities does the link layer have?
The link layer is responsible for turning a "bit link" provided by the physical layer into a "frame" link that sends groupings of bits called frames. The link layer also is responsible for medium access control to allow multiple hosts to share a medium like a wire or radio channel. Finally the link layer does error correction and/or detection.
Churn rate
The number of customers who stop using or purchasing products or services from the company Indicates growth or decline of the firms customer base
Describe how an IP packet is sent over an Ethernet to a gateway router.
The packet is encapsulated by an Ethernet frame and this frame is sent to the gateway. The Ethernet frame has a header which will have a destination MAC address field set to be the MAC address of the gateway router. The encapsulated packet will have a header with a destination IP address set to be the IP address the final destination.
Parity bit
The sender adds either a 0 or 1 to make it odd or even If the receiver counts the opposite of what it should be, it's corrupted
Risk assessment
This determines the level of risk to the firm if specific activity or process is not properly controlled -Types of threat -Probability of occurrence during the year -Potential losses Value of the threat -Expected annual loss
Structured, unstructured, and semistructured data
This is knowledge in an enterprise Structured documents: reports, presentations, formal rules Semi Structured documents: emails, videos Unstructured: tacit knowledge 80% is structured or semistructured
Web caching
This speeds up web page loading by storing previously seen components locally
Behavioral targeting
Tracking online behavior of individuals Found on individual websites/apps and across advertising networks
True or False: Companies can use configuration tables provided by the enterprise software to tailor a particular aspect of the system to the way it does business.
True
Token
Type of authentication to safeguard information systems Physical device similar to an identification card that is designed to prove the identity of a single user
Push-based model (built to stock)
Uses earlier SCM systems Schedules based on best guesses of demand Manufacturer: to supplier; and distributor to retailer to customer Supply chain driven by production master schedules based on forecasts or best guesses of demand for products, and products are 'pushed' to customers
Public key encryption
Uses two, mathematically related keys Public and private key The sender encrypts the message with the recipients public key The recipient decrypts with the private key Public key infrastructure The use of a public key cryptography working with CA It is widely used in e-commerce
Knowledge management
Very large part of labor force and very fast growing area Intangible assets (very important): knowledge, brands, reputations, business processes Data, knowledge, wisdom Knowledge is: firm asset, different forms, location, situational Documenting tacit and explicit knowledge: Storing documents, reports, presentations, best practices; unstructured documents; developing online knowledge Creating knowledge and tracking data from TPS and external sources Knowledge storage: databases, document management systems, role of managemen
Pull-based model (demand driven)
Web-based Customer orders trigger events in the supply chain Customer to retailer to distributor to manufacturer to supplier Supply chain driven by actual customer orders or purchases so that members of the supply chain produce and deliver only what customers have ordered
Ethernet Switch
When a switch knows where the destination is it forwards an incoming frame to the destination only Parallel conversations are made possible
Congestion control
When networks are congested, some sessions should reduce offered rates All TCP sessions slow down when there are packet losses today UDP sessions, however, do not slow down
HTTP
hypertext transfer protocol Communications standard for transferring web pages
WWW
in a URL (uniform resource locators)
E-commerce differences with traditional commerce
marketplace is virtual and transaction costs are reduced Global reach: transactions cross cultural and national boundaries Universal standards: one set technology standards, Internet standards Richness: supports video, audio, and text messages Interactivity Information density: greater price and cost transparency; enables price discrimination Personalization and customization: technology permits modification of messages/goods Social technology: promotes user content generation and social networking
ERP Notes
o Key features of ERP ▪ Multi-functional, integrated, modular o Design around key business processes Reflect best practices Finance and accounting; human resources; manufacturing and production; sales and marketing o Customizable options Use software's configuration tables
Routing table
used by routers to determine where a packet will be sent by examining its destination IP address A set of rules This destination IP address is hierarchical; the beginning bits tell you which network the host is on. The IP address prefixes are stored in the table.
A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of:
▪ A) phishing ▪ B) pharming. ▪ C) spoofing. ▪ D) evil twins. E))) click fraud.
The effort required to locate a suitable product is called: ▪ A) price discrimination. ▪ B) search costs. ▪ C) menu costs. ▪ D) shopping costs.
▪ B) search costs.
Why is overstocking warehouses not an effective solution for a problem of low availability? ▪ A) It does not speed product time to market. ▪ B) It is an inefficient use of raw materials. ▪ C) It increases sales costs. ▪ D) It increases inventory costs.
▪ D) It increases inventory costs.