Exam 2 SLIDES // Leveraging IS in Business
What is Explicit knowledge?
type of knowledge easily transferable to somebody else (EX specific step-by-step set of instructions)
What is Tacit knowledge?
type of knowledge that is not easily transferable between one another. It is more experienced in nature (EX riding a bike)
What is Association Bias?
where people associate things together and make assumptions based on whatever ideas that they have (EX the most expensive item is always better, but this assumption is not always true)
What falls into Intelligence CRM?
• AI and Machine Learning • Personal/Virtual assistants • Speech Analytics • Sentiment analysis • Real time predictive marketing • Enhanced CRM • behavior predictions • Increased efficiency • 360° view of customer experience
What falls into Natural Language processing (NLP) ? (Artificial Intelligence)
Content extraction Classification Machine translation Question answering Text generation
What are the 3 types of backups?
Full (monthly) (yearly) Incremental (weekly) Transactional (daily)
What falls into Agile Development?
Group of development methodologies Based on iterative development 1. Scrum 2. Rapid App Dev 3. Dev Ops 4. UX Design
What are some Backend Applications threats? (IT infrastructure)
Hacking Malware Theft and Fraud Vandalism Denial-of-service attacks
What is sCommerce? (Social Commerce)
Has three major attributes: -Social media technologies -Community interactions -Commercial activities -Social Network Driven Sales • Social Services • Group Buying (Social shopping) • Social Media Marketing / Viral Marketing (CRM) -Crowd Sourcing -User Review Websites (EX Facebook, Yelp)
What is Disintermediation?
the cutting out of marketing channel intermediaries by product or service producers or the displacement of traditional resellers by radical new types of intermediaries (From the use of Internet Technology) Producer->Wholesaler->Retailer->Consumer Producer->Retailer->Consumer Producer->Consumer
What is an exposure? (Information systems)
the harm, lost, or damage that can result if a threat compromises that resource.
What is the Systems Analysts?
the liaison between the users and the programmers
What is genetic algorithms?
this is a metaheuristic that is inspired by the process of natural selection that belongs to a larger of evolutionary algorithms.
What is risk management?
trying to identify, control, and minimize the impact of those given threats
What is Machine Learning (ML)? (Artificial Intelligence)
(Using statistics techniques to learn from data) -Allow computers to learn automatically • Patter recognition and algorithm training • Supervised vs unsupervised learning • Semantic analysis • Mimic human ability • Understand meaning of text Process Steps: 1. Define your problem 2. Prepare your data 3. Spot-check algorithms 4. Improve results 5. Present results
What does SCM (Supply Chain Management) do?
- Collection of people, tasks, equipment, and resources • Produce and move products from vendor to customer • Integrated partnership: Goods and services • Coordinate timely flow of information in the upstream and downstream of an organization upstream- suppliers/partners downstream - customers Internal- within the company
What does an ERP (Enterprise Resource Planning) do?
- Facilitate a company's cross-functional processes • Eliminate inconsistencies and duplications of efforts • Enable data sharing across operations • Shared practices across enterprise • Access information in a real time environment
What is artificial intelligence?
-A computer program that can perform tasks that can usually only be performed by humans. This technically includes translation and voice recognition. -programmed computers that can take information process it and make a decision on what to do (simplified version) -uses sophisticated algorithms
What are the Managerial Considerations?
-Build or buy -In-house vs outsourcing -System type and Methodology -Technical adoption vs resistance
How do companies use marketing with digital markets?
-Communication tools • Advancing CRM • Behavioral targeting -marketing intelligence, customer database, social media data, online behavior, competitor data • Long tail theory • Customized ads
What is Cognitive Supply Chains?
-Implementing innovative and new technologies (looks at the overall ecosystem) -New era of global trade -AI and Blockchain -Predictive models -Minimize disruption
What is mCommerce? (Mobile Commerce)
-Location-based services -Buying and selling of goods and services using a mobile device and anything relying on GPS data -"is a term that denotes software services that utilize geographic data and information to provide that service or information to its users" (health, object searching, personal life, advertisement)
What falls into the Blockchain and Customer Service Life Cycle?
-Single truth of customer data -Improved communication -Research and analytics -Reliability through automation
What is uCommerce? (Ubiquitous Commerce)
-To be a true uCommerce, you have to detach from mobile devices (pay using a thumbprint or chips as example) • Changing the view of time and space • Connectivity anytime/anywhere • Mediated by m-commerce • Bounded Rationality- rationality of individuals • IoE (Internet of Everything)
What is Amazon's Prime Now?
-crowdsourced delivery mechanism where someone will come pick up the package and deliver it to you (EX wholefoods)
What is Just-In-Time? (Supply Chain MGMT)
-developed in Japan with the automotive industries -reducing stock/inventory on hand -creating pull production strategy -inventory control -"just-in-time" for the customer
What is Safety Stock? (Supply Chain MGMT)
-this is a buffer for the lack of flexibility in the supply chain -additional stock set aside
What is Systems Development?
-this is how we develop new information systems, a development methodology -dividing software development into distinct phases that improves the design, product management, and project management SDLC (Waterfall) Prototyping Agile Development Rapid Application Development DevOps & UX Design
What is a Knowledge Management System?
-type of information system that is commonly used for managing knowledge -What is the baseline of a (KMS)? -process -advice -Insights -Information -practice -Improvement -people -technology
What is the Bullwhip Effect? (Supply Chain MGMT)
-unchain and downchain can both be affected -if there is a big change in demand, it could have a ripple effect throughout the whole supply chain to disrupt it -there is a lag in the time between the time when the demand is adjusted as well as all the different units in the supply chain to get adjusted as well
What is Business Process Redesign?
-use various methods to discover, model, analyze, measure, improve, optimize, and automate business processes Steps: 1. design 2. modeling 3. execution 4. monitoring- keep track of completion, level of change, and effectiveness 5. optimization- identify problems, opportunities and apply changes for greater cost savings and efficiency
What cause the dot-com bubble bust?
-websites were created, releasing IPO generating millions of dollars and venture capitalists/investors saw this was a way to make money so they started pouring money into eCommerce. So basically, if u had a eCommerce idea they would start funding it causing a hyper-inflation. -its burst because a lot of these businesses made money through these investors and IPOs, but they weren't earning revenue. The primary revenue strategy was selling marketing and ADs since people didn't trust using their credit cards on the internet, so products weren't being sold.
What are the stages of Just-In-Time? (Supply Chain MGMT)
1.Sales - sell jobs with short lead time 2.Design - Design for manufacturing 3. Procurement - Purchase only material needed. 4. Nesting - Nest for material optimization, 2-3 hrs 5. Production - Cut the right part. 6. Shipping - Ship parts instead of housing them.
Cryptography and Hashing
2 uniquely related keys Public Key → Private Key Public key encryption Only matching private key can decrypt Cipher The encrypted message being transmitted Cryptographic Hash Each unique input generates a unique output Authentication Hash is used to authenticate encrypted data
What is the list of the kinds of company security policies?
Acceptable Use Policy: how can the data within an organization be used. Disaster Recovery Plan Ethics Policy: ethics behind what people do with this data. take it home with them to work? Personal Device Policy: are you using a "bring your own device" policy or provide them? Internet Usage Policy Password Protection
What falls into SDLC?
Systems Development Life Cycle (Waterfall method) 1. Systems Analysis 2. System Design 3. Programming 4. Testing 5. Implementation 6. Maintenance
What are some Firewall/Authentication threats? (IT Infrastructure)
Tapping Sniffing Message Alteration Theft and Fraud Radiation
What is a risk? (Information systems)
The likelihood that a threat will occur.
What is a vulnerability? (Information systems)
The possibility that the system will suffer harm by a threat.
What is risk mitigation?
This is where an organization takes concrete actions against risk. (strategy) (acceptance, limitation, transference)
What are some Front-End Application threats? (IT Infrastructure)
Unauthorized access Man-in-the-middle attacks Errors
What is the list of security threats?
Unintentional acts Deliberate acts Natural disasters Technical failures Management failures (EX: Shoulder surfing or Dumpster diving)
What falls into Autonomous Systems? (Artificial Intelligence)
Vehicles IoT Robotics
What is risk analysis?
accessing the value of each asset being protected, estimating the probability that it might be compromised, compare the probability cost with it being compromised and the cost of actually protecting it. (Risk Balance)
What is a threat? (Information systems)
any danger to which a system may be exposed.
What is Racial Bias?
discriminating based on demographic characteristics. In particular race.
Give examples of physical vs digital goods? (Digital Markets)
eCommerce: -Physical products -Digitial products -Digitial services -Marketing Digital Product Examples: -eBooks -Software -Music -Photography -Graphics & digital art -Documents -Courses -Fonts -Web-based applications -Games -Video
What is organizational culture?
encompasses the values and behaviors that contribute to the unique social and psychologically environment of the business.
What is Observer Bias?
is the person who is observing the data, observing based on your personal experiences (based on background, history, any experience over a given situation or not)
What are the reasons to build/purchase a new information system?
problems opportunities upgrade replace
What is block hashing? (Blockchain)
process of having an input of any length but showing an output item of a fixed length. If we take the example of blockchain use in online transactions (using bitcoins), transactions of different lengths are run through a given hashing algorithm, and all give an output that is of a fixed length.
What are the push and pull strategies in supply chain?
push- driven by the long-term projections of customer's demand. push the products out to the customers. pull- what the actual customer demand is and that drives the process, adjusting the supply chain to meet that demand.
What are some of the benefits of Cognitive Supply Chains? (AI & Blockchain)
Artificial Intelligence: -Extraction of information -Analysis of data -Planning for supply and demand -Manage the flow of goods -Right place at the right time -Autonomous vehicles within distribution centers Blockchain: -Efficiency and transparency -Warehouse, delivery and payment -Full SCM Integration -Full SCM Auditing -Eliminate Bullwhip effects -Cryptocurrency for Global SCM
What is IoT Man-In-The_Middle Attack?
Attacks secretly relays info between two parties and they think they are actually talking to the person they say they are. Could be hijacking cameras. Protection for who? End users Creator of device Service provider Third parties Layers of Security Authentication Encryption Transport Layer Security (TLS) protocols
What falls into Prototyping?
Build experimental system rapidly and inexpensively Users are actively involved 1. Identify user requirements 2. Develop initial prototype 3. Use prototype 4. Revise and enhance
What are Expert Systems? (Artificial Intelligence)
Designed to solve complex problems emulating the decision-making ability of human experts by reasoning through bodies of knowledge to produce a set of rules.
What are the notable failures and survivors of Dot-Com?
Failures: govWorks.com theGlobe Pets.com Broadcast.com (Founded by Mark Cuban) GeoCitites Survivors: Coupons.com Shutterfly Priceline Ebay Google Amazon
What is a consensus mechanism? (what most blockchains use)
If 51% of all the nodes on that network agree that the data is correct, then that is what they are going to believe. So to hack a million nodes on the block chain, then you have to hack 51% of a million nodes.
What falls into Vision? (Artificial Intelligence)
Image recognition Machine vision
What are some Data Sources threats? (IT Infrastructure)
Intentional threats Unintentional threats Hardware/Software problems
What are Enterprise Systems?
Large-scale enterprise software packages that support business processes, information flows, reporting, and data analytics in complex organizations.
What are some traditional threats (Deliberate acts)?
Malware/Viruses/Worms Spyware SQL Injection attacks Phishing Employees (biggest threat)
What is CRM (customer relationship management)?
Manage and analyze customer interactions • Sales force automation • Customer Service • Marketing and Promotion • Business value • Increased customer satisfaction • Reduced marketing cost • Increased effectiveness • Reduced customers acquisition/retention cost • Increased sales revenue
Can you hack the blockchain?
No you cannot, but you are able to hack the exchanges (they have their own database keeping information for you).
What are the phases of the Customer Service Life Cycle?
Phase 1: Requirement -Establish requirements -Specification Phase 2: Acquisition -Source selections -Ordering -Authorization & payment -Acquisition -Testing and acceptance Phase 3: Ownership -Integration -Usage-monitoring -Upgrading -Maintain Phase 4: Retirement -Transfer or Disposal -Auditing & accounting
What falls into Natural Language Understanding?
Phonology- which is contrastive relationships among the speech sounds that constitutes the fundamental components of a language. Pragmatics- branch of linguistics dealing with language in use and the context of which it is used. Morphology- the study of forms of words, how words are formed. Syntax- the set of rules or principals or processes that govern the structure of sentences in a given language. Semantics- the branch of linguistics and logic concern with the meaning, the meaning of words
What is the list of security issues?
Policies Procedures Backup and Recovery Government regulations Risk Management
What falls into Agile Development Methodologies?
RAD Prioritizes rapid prototype releases and iterations. Emphasizes the use of software and user feedback 1. Define requirements 2. Prototype 3. Construction & Feedback 4. Finalize & Implement DevOps Combine software dev and IT Operations. Focused on continuous delivery with high quality • Code, build, test • Package & release • Configure & Monitor UX Design (User Experience) Lean UX: Matching degree of product and market. Agile UX: High efficiency and communication 1. Interactions 2. Working software 3. Customer collaboration 4. Responding to change
What are some emerging security threats (Deliberate acts)?
Ransomware - pay ransom to get data back Clipboard Hijacker - software to attack cyrpto Deepfakes (Video and voice) - using AI to fake vid/voice Synthetic Identities - fabricated credentials New cybersecurity challenges that 5G creates
What goes into Streaming Services?
Revenue Models: -PPV -Subscriptions -Ad Revenue Services: -Netflix -Sling -Hulu -Prime Video -Disney Plus -Apple TV -YouTube TV
What are the types of Enterprise Systems?
SCM- Supply Chain Management ERP- Enterprise Resource Planning CRM- Customer Relationship Management
What are the government regulations that protect information/consumers?
Sarbanes-Oxley Act -accounting reform/auditing PCI DSS - Payment Card Industry Data Security Standard (Businesses comply with this when taking credit card info for payments) Gramm-Leach-Bliley Act - Financial institutes that have to share how they protects customers data COPPA - Childrens Online Private Protection Act - certain requirements protecting kids underage 13 HIPPA - Health Insurance Portability and Accountability - protecting patient health information from being disclosed w/o consent. HIPPA does not apply to the blockchain. GDPR & CCPA - General Protection Regulation & California Consumer Privacy Act, protecting consumers private security information.
What is Knowledge Management Value Chain?
Set of business processes developed in an organization to create, store, transfer, and apply knowledge. (How do we acquire knowledge and disseminate it through the organization for other people to benefit from it) Steps: 1. Aquisition 2. Storage 3. Dissemination 4. Application
What falls into Speech? (Artificial Intelligence)
Speech to text Text to speech
What is Augmented Intelligence? (IA)
• Enhancement of human intelligence • Assistive role rather than replacement • Aiding decision makers • Automate job functions, not job roles • Impact productivity through efficiency and effectiveness IA Functions: -understand -interpret -reason -learn -assure 3 Categories: Automate: increase efficiency and effectiveness Augment: Identify new Business Insights Amplify: Redesign workflow and processes EX: Financial services, Air travel, Manufacturing and Logisitics
What are the challenges with Enterprise Applications?
• Expensive technology • Technology changes • Business process changes • Organizational learning • Switching costs • Data issues • Data standardization • Data management • Data cleaning
What is Deep Learning? (Artificial Intelligence)
• Extension of Artificial Neural Networks • Able to learn without human supervision • Draws from data that is unstructured and unlabeled
What are some of the Emerging Technology Effects?
• IoT, AI, Blockchain • Digitizing physical goods (tokenization) • Digital certificate (hashed) on a physical drive • Locked USB, not able to be copied. • Blockchain cards by Panini • Issues • Alexa accidental ordering • AI biometric recognition capabilities • Blockchain music shutdown
What are Neural Networks? (Artificial Intelligence)
• Neural nets for machine learning • Supervised & Unsupervised • Artificial neurons: conceptually derived from biological neurons • Connections and weights • Propagation function • Final output accomplishes a task -Facebook does a good job with this with Face recognition
What are the Covid-19 effects on ecommerce?
• Realized the need for eCommerce • Virtual businesses prospered • Amazon, Netflix, Zoom, other... • Brick and mortal business struggled or failed
What is Data Bias?
• The available data is not representative of the population or phenomenon of study • Data does not include variables that properly capture the phenomenon we want to predict • Types of Bias • Sample bias • Exclusion bias • Measurement bias • Recall bias • Observer bias • Racial bias • Association bias