CIS Final Ju Long TxState

Ace your homework & exams now with Quizwiz!

VOIP; voice over internet protocol:

transmission technologies that enable voice communications (phone calls) to take place over the internet as well as private packet-switched networks.

Content filtering:

occurs when organizations use software that filters content to prevent the transmission of unauthorized information

List the problems using Spreadsheets to manage data

-Redundancy -Duplication of data or storing the same data in more than one place -Difficulty accessing data -Limited security -Size limitation

What is the goal of your company in ERPSim?

-The goal is to maximize your company's profits

primary key and how is it used?

o A field that is a unique identifier of each record in a table

foreign key and how is it used?

o A primary key in one table that appears as a field in another table - provides logical relationship among two table

entity

o Person, place, thing, or event o Customers, orders, products, sales reps o Represented by tables in a relational database

attribute (for field)

o Property of a entity o Customer has name, street, city, etc. o Represented by columns in tables

What is ETL?

o a process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse

Last mile:

technologies that connect end users to the internet. The last mile problem refers to the fact that these connections are usually the slowest part of the network. AT&T estimates that it's not uncommon for 80% of game-day iPhone users to take out their phones and surf the web. Often, cell phone towers won't load. If you've ever lost coverage in a crowd, you've witnessed mobile network congestion firsthand.

Cyberwarefare:

Stuxnet infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges. The worms made the devices spin so fast that the centrifuges effectively destroyed themselves, in the process of setting back any Iranian nuclear ambitions. The attack was so sophisticated that is even altered equipment reading to report normal activity so that operators didn't even know something was wrong until it was too late. • Target Programmable Logic Controllers • ruined almost one-fifth of Iran's nuclear centrifuges

Social Engineering? Give the example we discussed in class?

• -Con games use one's social skills to trick employees into revealing information or performing other tasks that compromise a firm • -Social media sites are a major source of information for social engineering scammers

Describe why the people are the first line of defense when it comes to security?

• -Organizations must enable employees, customers, and partners to access information electronically • -The biggest issue surrounding information security is not a technical issue, but a people issue • -33% of security incidents originate within the organization

An example is the vacation travel market. Recent research has identified three clusters or market segments. They are the:

• 1) The demanders - they want exceptional service and expect to be pampered; • 2) The escapists - they want to get away and just relax; • 3) The educationalist - they want to see new things, go to museums, go on a safari, or experience new cultures.

What we learn from the facebook case in terms of ethics?

• Corporate recruiters have begun to utilize the facebook to perform a background check. • The Career Services Director from UCLA: Facebook that caused employers to feel some students were not the right fit for their company.

What are the advantages of Hadoop?

• Flexibility: Hadoop can absorb any type of data, structured or not, from any type of source (geeks would say such a system is schema-less). But this disparate data can still be aggregated and analyzed. • Scalability: Hadoop systems can start on a single PC, but thousands of machines can eventually be combined to work together for storage and analysis. • Cost effectiveness: Since the system is open source and can be started with low-end hardware, the technology is cheap by data-warehousing standards. Many vendors also offer Hadoop as a cloud service, allowing firms to avoid hardware costs altogether. • Fault tolerance: One of the servers running your Hadoop cluster just crashed? No big deal. Hadoop is designed in such a way so that there will be no single point of failure. The system will continue to work, relying on the remaining hardware.

-The most secure type of authentication involves a combination of the following:

• Something the user knows such as a user ID and password • Something the user has such as a smart card or token • Something that is part of the user such as a fingerprint or voice signature

-Authentication:

- a method for confirming users' identities

- Data driven practices

Caesars identifies the high value customers and gives them special attention. (Customers could obtain reserved tables and special offers. It monitors even gamblers suffering unusual losses, and provides feel-good offers to them). The firm's CRM effort monitors any customer behavior changes (enticing them to be back after a while of absence). Customers come back to Caesars bc they feel that those casinos treat them better than the competition. Employees are measured on customer-centric metrics. (Speed and friendliness and are compensated based on guest satisfaction ratings. Changed the corporate culture to a collaborative, customer-focused enterprise). Caesars is keenly sensitive to respecting consumer data (Never sold or share data with 3rd parties). Some of its efforts to track customers have misfired ("creepy and Big Brother-ish" when employees tried to greet them by name and talk with them about their past history).

TCP/IP; transmission control protocol:

(the internet's secret sauce) works at both ends of most internet communication to ensure a perfect copy of a message is sent. They are built into any device that a user would use to connect to the internet - from handhelds to desktops to supercomputers - and together TCP/IP make internetworking happen.

Caesar's Case

- An example of exceptional data asset leverage in the service sector. How customer relationship management enables that. Caesars became the largest gaming company by revenue (53 casinos, 85 thousand workers on 5 continents). Could have done at most firms in most other industries - Data collecting strategy Everything you might do at their properties. They track your preferences. (decide if the customer is worth wooing). Once you prove your worth, the firm will surround you with top-tier service and develop a targeted marketing campaign to keep you coming back. Total rewards loyalty card system (Essential: an IT staff of 700, an annual budget in excess of $100 million. Customers consider the incentives to be so good that the card is used by 80% of patrons, collecting data on over 44 million customers. Demographics and behavioral).

What is Hadoop?

- The open-source project known as Hadoop was created to analyze massive amounts of raw information better than traditional, highly-structured databases. - Hadoop is made up of some half a dozen separate software pieces and requires the integration of theses pieces to work.

Market basket analysis? Give examples.

- analyzes such items as Web sites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services An example - Amazon has a "better together" option in which they bundle products that are frequently purchased together. This feature allows you to add both products to your cart with one click.

Target incidents

-Business establishments are increasingly under risk of information security threats • Network in TJX retail store was infiltrated via an insecure Wi-Fi base station • 45.7 million credit and debit card numbers were stolen • Driver's licenses and other private information pilfered from 450,000 customers • TJX suffered under settlement costs and court-imposed punitive action to the tune of $150 million

Cluster analysis? Give examples.

-Cluster analysis is the process of grouping observations into clusters so that the degree of similarity is strong between members of the same cluster and weak between members of different clusters.

the products

1 L ClearPure 1 L Spritz 1 L Lemon Spritz 500 mL ClearPure 500 mL Spritz 500 mL Lemon Spritz

How much purchase requisition will be created?

1000.

relational database

A database where multiple tables are related based on common keys. -A structure that can store information about: Multiple types of entities (stored as tables in the database), Attributes of those entities (stored as columns of the database tables), Relationships among entities (tables linked together with special keys)

- Identify the best customers

Accurately project Customer Lifetime Value (CLV, the likely future income stream generated by an individual purchaser. Once you know this, you can get a sense of how much you should spend to keep that customer coming back.). The firm tracks over 90 demographic segments and each responds differently to different marketing approaches. From its data, Caesars realized that most of its profits came from: Not Saudi princes, or Hong Kong shipping tycoons, but the locals. 80-20 rule: 30% customers account for 80% spending. Customers 45 years and older. The data showed that the firm's most important customers weren't the families that many Vegas competitors were trying to woo with Disneyland style theme casinos - it was grandma!

Forecasting:

In which month do you put in your forecast numbers? Next month After forecasting, what will you create? Independent requirements

- Innovations

Interactive billboards in NYC Time Square, virtual slot machines. RFID-enabled poker chips and under-table RFID readers. Incorporation of drink ordering to gaming machines. Microsoft Surface touch-screen. Facial recognition software. Tie in with social media: check-ins, instagram.

SAP Navigation:

Know how to log in. Know your client number 762 Know the icons for Execute, Save, Exit, Back to the menu, etc common icons for SAP.

FTC fair information practice?

NCAS • -Notice - person's right to know what is collected and how it will be used. • -Choice - person's right to object for other uses of information • -Access - person's right to view and correct information • -Security - data integrity & protection of information

warehouses

North South West`

decision points

Pricing, marketing, and forecasting

What will you create at the end of MRP Run? (Purchase Requisition or Purchase Order?)

Purchase requisition

Encryption:

Scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key -Even the largest known brute force attacks haven't come close to breaking encryption that scrambles transmissions most browsers use in communication with banks and shopping sites

- Data centric strategies

The data advantage creates intelligence for a high-quality and highly personal customer experience. Data gives the firm a service differentiation edge. The loyalty program also represents a switching cost. And these assets combined to be leveraged across a firm that has gained so much scale that it's now the largest player in the industry, gaining the ability to cross-sell customers on a variety of properties. The firm's technology has been pretty tough for other to match. Caesars holds several patents covering key business methods and technologies used in its systems.

Change Price:

This is where you can adjust the prices

How to achieve that goal?

To achieve that goal you can manipulate the price and adjust marketing expenses

Purchasing:

What will you create at the end of this process? Purchase order What's the reason for "no suitable requisitions found"? Did not do MRP Run? Still have stocks? MRP was not run.

Does it depend on how much stock you have?

Yes it does. Say, for instance, if you have 200 in stock, and your independent requirement is $500, how much will purchase requisition be created? 300

Phishing:

a con executed using technology, typically targeted at acquiring sensitive info or tricking someone into installing malicious software. ("Click here to update needed information to receive your tax refund transfer.")

Data mart:

a database focused on addressing the concerns of a specific problem (increasing customer retention, improving product quality, etc.) o Marts and warehouses are helpful to managers so that they can hunt for patterns and trends that occur over time.

Database:

a list or several related lists of data. Firms often create specialized databases for recording transactions, as well as databases that aggregate data from multiple sources in order to support reporting and analysis.

Data warehouse:

a logical collection information - gathered from many different operational databases - that supports business analysis activities and decision-making tasks. Or a set of databases designed to support decision making in an organization. It is structures for fast online queries and exploration. -primary purpose of a data warehouse is to aggregate information throughout an organization into a single repository for decision-making purposes

FTP; file transfer protocol:

application transfer protocol that is used to copy files from one computer to another.

1 to 1:

between two entities in which an instance of entity A can be related to only one instance of entity B and entity B can be related to only one instance of entity A

One to many:

between two entities, in which an instance of entity A, can be related to zero, one, or more instances of entity B and entity B can be related to only one instance of entity A

Fiber:

broadband service provided via-light-transmitting fiber-optic cables. It's the fastest last-mile technology around. It also works over long distances. The problem with it is that unlike cable or DSL, fiber to the home networks weren't already in place. Firms had to build their own fiber networks from scratch.

cable weakness:

lies in the fact that most residential providers use a system that requires customers to share bandwidth with neighbors.

Customer relationship management (CRM) systems:

depend on cluster analysis to segment customer information and identify behavioral traits - CRM's are often used to empower employees to track and record data at nearly every point of customer contact. - Examples on CRM using cluster analysis -Consumer goods by content, brand loyalty or similarity -Retail store layouts and sales performances -Design of assembly line control functions

- Churn analysis

determining which customers are likely to leave, and what tactics can help the firm avoid unwanted defections. -Netflix has reduced its churn rate by developing original content. In a survey of 1,078 U.S. Netflix users, 43% said original content was a "moderately" to "extremely" important factor influencing their decision to keep the service.

Wireless:

frequencies used for communication. Most mobile cell phone services have license spectrum. Some technologies (such as Wi-Fi) use unlicensed public spectrum.

Firewalls:

hardware and/or software that guards a private network by analyzing the information leaving and entering the network

Botnet:

hordes of surreptitiously infiltrated computers, linker and controlled remotely, also known as zombie networks. Used for sending spam from thousands of difficult-to-shut-down accounts, launching tough-to-track click fraud efforts, or staging what's known as distributed denial of service attacks (actively shutting down web sites by overwhelming them with a crushing load of seemingly legitimate requests sent simultaneously by thousands of machines).

HTTP:

hypertext transfer protocol: application transfer protocol at allows Web browsers and web servers to communicate with each other.

ISP:

internet service provider; an organization or firm that provides internet access

the main processes

planning procurement sales

Association detection -

reveals the degree to which variables are related and the nature and frequency of these relationships in the information An example - around the time of Halloween and Valentine's Day people purchase more candy

Cable:

roughly 90% of US homes are serviced by a cable provider, each capable of using a thick copper wire to offer broadband access. That wire has shielding that reduces electrical interference, allowing cable signals to travel longer distances without degrading and with less change of interference than conventional telephone equipment.

IP; internet protocol:

routing protocol that is in charge of forwarding packets on the internet.

DSL (digital subscriber line):

technology uses the copper wire the phone company has already run into most homes. Even as customers worldwide are dropping their landline phone numbers, the wires used to provide this infrastructure can still be used for broadband. • DSL uses standard copper wiring. These lines lack the shielding by cable, so signals begin to degrade the further you are from the connecting equipment in telephone company offices. Speeds drop off significantly at less than 2 miles from a central office of DSL hub. At 4 miles out, the technology is unusable.

Examples to describe what is data mining?

the process of using computers to identify hidden patterns and to build models from large data sets. For data mining to work, two critical conditions must be present: the organization must have clean, consistent data the events in that data should reflect current and future trends (the recent financial crisis shows us what can happen when either of these conditions is not met) An example - a grocery chain used data mining to analyze local buying patterns. They discovered that when men bought diapers on Thursdays, they also tended to buy beer. The grocery chain could use this newly discovered information to increase revenue. For example, they could move the beer display closer to the diaper display. Additionally, they could make sure beer and diapers were sold at full price on Thursdays.

Fraud detection -

uncovering patterns consistent with criminal activity -Many credit card companies use data mining for fraud detection. Advances in how card providers and networks process massive amounts of data from card usage means they often alert consumers to potential fraud before consumers notice anything amiss.

URL:

uniform resource locator; identify resources on the internet along with application protocol needed to retrieve it.

Three V's of Big Data:

volume, velocity and variety - which distinguish it from conventional data analysis problems and require a new breed of technology. Big data is forcing companies to rethink both the technology infrastructure and the necessary skills needed to successfully interpret and ac ton the information.


Related study sets

Financial Equity Securities Exam 1

View Set

Ch 5 Utilitarianism & John Stuart Mill

View Set

Chapter 5: Sexually Transmitted Infections

View Set

AP Government Test Edmodo Questions

View Set

EDAPT: Homeostasis and Elimination

View Set

Psychology Chapter 9 Lifespan Development

View Set

Automotive Technology Ch.39 & 40

View Set

Anatomy and Physiology Final (First Semester)

View Set