IS 290 Exam 3 Blake / Stone

Ace your homework & exams now with Quizwiz!

How does disaster recovery planning differ from business continuity planning?

disaster- Planning for the restoration of computing and communications services after they have been disrupted. business- planning that focuses on how the company can restore business operations after a disaster strikes.

What is social CRM and how is it being used?

enable users to exploit social network data for customer management purposes. • Social media data can be used to enhance analytical CRM. • Where consumers use social media (e.g. Facebook) to make purchases

Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measures for a firm to take to protect itself from this?

firewalls, investigation of personnel to be hired, physical and software security and controls, antivirus software, and internal education measures. These measures are best put in place at the time the system is designed, and careful attention paid to them. A prudent company will engage in disaster protection measures, frequent updating of security software, and frequent auditing of all security measures and of all data upon which the company depends. Companies should also conduct a risk assessment, and after learning their risks, create a security policy that sufficiently protects the company.

What are geosocial services and how are they being used?

Geosocial services help you find friends, or your friends to find you, by checking in to the service, announcing your presence in a restaurant or other place. Your friends are instantly notified

What are digital goods, and how does the Internet impact the market for digital goods?

Digital goods are the common goods that are available to buy online. social media and online books can be treated as digital goods. without the internet, the digital goods are next to useless. digital goods are available in every nook and corner in the world and are readily usable

Three major concerns of system builders and users are disaster, security, and human error. Of the three, which do you think is most difficult to deal with? Why?

-Disaster might be the most difficult because it is unexpected, broad-based, and frequently life threatening. the company cannot know if the disaster plan will work until a disaster occurs, and then it's too late to make corrections. - Security might be the most difficult because it is an ongoing problem, new viruses are devised constantly, and hackers get smarter every day. damage done by a trusted employee from inside cannot be obviated by system security measures. -Human error might be most difficult because it isn't caught until too late, and the consequences may be disastrous. Also, administrative error can occur at any level and through any operation or procedure in the company

List and describe at least five different Internet business models. Which of these models do you think would be the riskiest for a startup business today? Support your answer.

1. Online retail model: One of the main types of online business is the online shop. You can sell your products and brands on different online websites like Amazon, eBay, etc 2. Online service model: a person can do work from home, provide flexible hours of work and get extra income from their regular job. These include website designing, computer programming, video editing, print design 3. Affiliate marketing model: a website can promote products and services of another company and provide link to access further action through company website. If someone clicks on the ad given on website and purchase some item them website on which ad is placed get a commission. 4. Membership site model: website where two types of content are present, one is free and other one is premium. Free content is basic content which can attract customers and get them in the door to purchase premium. 5. Online directory model: Tprovide a wide range of services to business. Example of niche directories includes wedding singer, second hand cloth reseller, children castle provider etc.

What are the two types of signals used to communicate a message in a network and how are they different? What device converts one type to the other type?

ANALOG SIGNAL-a continuous waveform, used for voice communication. ex: telephone handset DIGITAL SIGNALS- non continuous waveforms that communicate information as strings of 1 bit or zero bits. Computers use these types of signals and use modems to convert digital signals to analog signals.

What is a digital certificate? How does it work?

Attachments to an electronic message to verify the identity of the sender and provide the receiver with the means to encode a reply.

List and describe the three main categories of electronic commerce. Which do you think is ultimately the most valuable to the individual consumer? Support your answer.

Business-to-consumer, business-to-business, and consumer-to-consumer. All three are valuable to the consumer, but in the long run, business-to-business may be the most valuable to the individual consumer because it will reduce prices and increase both goods and services.

Identify and describe three major enterprise applications

ENTERPRISE SYSTEMS- utilize enterprise software to support financial and accounting, human resources, manufacturing and production, and sales and marketing processes. They provide many benefits including an enterprise-enabled organization, improved management reporting and decision making, a unified information systems technology platform, and more efficient operations and customer-driven business processes. SUPPLY CHAIN MANAGEMENT- helps an organization better manage its supply chain, including planning, sourcing, making, delivering, and returning items. enables a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product. manages the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner. benefits include improved customer service and responsiveness, cost reduction, and cash utilization. CUSTOMER RELATIONSHIP MANAGEMENT- help firms maximize the benefits of their customer assets. These systems capture data from all over the organization and distribute the results to various systems and customer touch points across the enterprise.

Identify at least four benefits and four challenges of enterprise systems.

Enterprise systems provide many benefits including an enterprise-enabled organization, improved management reporting and decision making, a unified information systems technology platform, and more efficient operations and customer-driven business processes. Supply chain management benefits include improved customer service and responsiveness, cost reduction, and cash utilization. Customer relationship management Benefits include increased customer satisfaction, reduced direct marketing costs, more effective marketing, and lower costs for customer acquisition and retention

Describe the use of personalization and customization in e-commerce. What business value do these techniques have?

In personalization, merchants can target their marketing messages to specific individuals. With customization, merchants can change the delivered product or service based on a user's preferences or prior behavior. The business value of personalization is reduced marketing costs, as you spend only the money to target customers that are more likely to be receptive and are more profitable.

What are the business advantages of using voice over IP (VoIP) technology?

LOWER COSTS by using the Internet to deliver voice information, avoiding the tolls charged by long-distance telephone networks, and not having to create a separate telephone network. supports Internet conference calls using video. also provides flexibility—phones can be added or moved to different offices without rewiring or reconfiguring the network.

Define location-based services and describe the main categories of these services. Which of the categories do you feel has the most potential in terms of e-commerce revenues, and why?

Location based services that utilize GPS map services available on android phones to deliver value added services. They have geo-information services, geo-social services, and. geo-advertising A geo-social service can inform you where your friends are assembly. Geo-advertising services can inform you where to locate the nearby Italian restaurant, and geo-information services can inform you the cost of a home you are look at, or about special exhibit at a museum you are transitory. Learner answers as to the mainly important of these services will differ; a pattern is: I consider that geo-advertising services have the mainly potential for income, as it base on a income make method: advertising. Geo-social services and geo-information services, by themselves, are further contented and message oriented

How are modern telephone and computer networks different from what firms used in the past?

Modern telephone and computer networks are converging into a single digital network. In the past, these 2 types of networks were distinct/performed completely different services/were not affiliated with one another. modern communication networks are also much faster and more cost effective than they were in the past.

Identify and describe the two types of Customer Relationship Management applications

Operational CRM- customer-facing applications, such as sales force automation, call center and customer service support, and marketing automation. Analytical CRM-applications dealing with the analysis of customer data to provide information for improving business performance

How can a firm's security policies contribute and relate to the six main business objectives? Give examples (Operational excellence. New products/services Customer and supplier intimacy. Improved decision making. Competitive advantage. Survival.)

Operational excellence: Security policies are essential to OE. A firm's daily transactions can be severely disrupted by cybercrime such as hackers. A firm's efficiency relies on accurate data. information assets have tremendous value, and the repercussions can be devastating if they are lost, destroyed, or placed in the wrong hands. New products, services, business models. Security policies protect a company's ideas for new products and services, which could be stolen by competitors. enhanced security could be seen by a customer as a way to differentiate your product. Customer and supplier intimacy: Customers rely on your security if they enter personal data into your information system, for example, credit card information into your e-commerce site. The information you receive from customers and suppliers directly affects how able you are to customize your product, service, or communication with them. Improved decision making: Secure systems make data accuracy a priority, and good decision making relies on accurate and timely data. Lost and inaccurate data would lead to compromised decision making. Competitive advantage: The knowledge that your firm has superior security than another would, on an otherwise level playing field, make your firm more attractive to do business with. Also, improved decision-making, new products and services, which are also affected by security. Strong security and control also increase employee productivity and lower operational costs. Survival: New laws and regulations make keeping your security system up-to-data a matter of survival. Inadequate security and control may result in serious legal liability. Firms have been destroyed by errors in security policies.

Name and describe four firewall screening technologies.

PACKET FILTERING-examines selected fields in the headers of data packets flowing back and forth between the trusted network and the Internet, examining individual packets in isolation. This filtering technology can miss many types of attacks. STATEFUL INSPECTION- Packets are accepted or rejected based on whether they are part of an approved conversation or attempting to establish a legitimate connection. NETWORK ADRESS TRANSLATION (NAT)- conceals the IP addresses of the organization's internal host computer(s) to prevent sniffer programs outside the firewall from ascertaining them and using that information to penetrate internal systems. APPLICATION PROXY FILTERING- examines the application content of packets. A proxy server stops data packets originating outside the organization, inspects them, and passes a proxy to the other side of the firewall.

What is a PRM module? How does it differ from an ERM module?

PRM helps channels sell to customers directly. It provides the ability to trade information and distribute leads and data about customers. It also provides firm tools to assess its partners' performances so it can make sure they receive the support they need to close more business. ERM software deals with employee issues such as employee performance management, performance-based compensation, and employee training

Identify two supply chain models. Which is better?

Push-based-based on forecasts or best guesses of demand for products. Pull-driven by actual customer orders or purchases so that members of the supply chain produce and deliver only what customers have ordered. Pull-based models are better.

How are RFID systems used in inventory control and supply chain management?

RFID systems get more detailed information about items in warehouses or in production than bar coding systems. If a large number of items are shipped together, the systems track everything in the shipment. This technology may help companies improve by enhancing their ability to "see" exactly what stock is in stock.

What are some of the common types of physical transmission media and what differentiates them from one another?

TWISTED PAIR WIRE-strands of copper wire twisted in pairs for voice and data communications. COAXIAL CABLE- insulated copper wires capable of high-speed data transmission and resistance to interference. FIBER OPTIC CABLES- transmit data generated by lasers. WIRELESS TRANSMISSION-based on radio signals and involves satellite microwave systems and cellular networks

What is dynamic pricing and how is it used in e-commerce?

The Pricing of items based on interactions between buyers and sellers that determine what an item is worth at any particular moment. Online retailers change prices on many products based on time of day, demand for the product, and users' prior visits to their sites.

Identify five benefits of customer relationship management systems

better customer service, make call centers more efficient, reduce costs, sell more, keep good customers

What are the security challenges faced by wireless networks?

can be more easily penetrated by outsiders armed with hacking software. the access points can be picked up fairly easily by intruders' sniffer programs. Wireless networks in many locations do not have basic protections. An intruder that has associated with an access point is capable of accessing other resources on the network. Intruders also use the information they obtain to set up rogue access points to associate with a user's NIC so that they can capture names and passwords.

Define computer forensics and describe the types of problems it is designed to address.

the scientific collection and analysis of data that can be used as evidence in a court of law. It deals with • Recovering data from computers while preserving evidential integrity • Securely storing and handling recovered electronic data • Finding significant information in a large volume of electronic data • Presenting the information to a court of law

What is the role of an information systems audit?

to evaluate the systems that are in place to guard an organization's information. information technology audits are used to evaluate the organization's ability to protect its information assets and to properly dispense information to authorized parties.

What business processes are supported by enterprise systems? Give specific examples

• Financial/accounting • Human resources • Manufacturing • Sales/marketing


Related study sets

Chapter 26 Upper Repiratory Disorders ( Allergic Rhinitis)

View Set

Ch 11: The Healthcare Delivery System

View Set

Quiz: Chapter 42, Care of Patents With Integumentary Disorders and Burns EAQ

View Set

Case activity -You Make the Decision: Introduction to Management

View Set

Unit 2B- Executive Branch Vocabulary

View Set

Quiz - Fluid & Electrolyte & Acid-Base Balance - Med Surg

View Set

English 11 A, Cumulative Exam 82%

View Set