ISA 235 MU (Ch. 1-4)

Ace your homework & exams now with Quizwiz!

mashup editor

WYSIWYGs or what you see is what you get tools

information security

a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization

management information systems (MIS)

a business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making & problem solving

neural network

a category of AI that attempts to emulate the way the human brain works

system

a collection of parts that link to achieve a common purpose

big data

a collection of rare, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods & tools

internet service (ISP)

a company that provides access to the internet for a monthly fee

semantic web

a component of web 3.0 that describes things in a way that computers can understand

drive-by hacking

a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network

competitive click-fraud

a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link

virtual reality

a computer-simulated environment that can be a simulation of the real world or an imaginary world

dynamic process

a continuously changing process that provides business solutions to ever-changing business operations

nonrepudiation

a contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions

variable

a data characteristic that stands for a value that changes or varies over time

digital certificate

a data file that identifies individuals or organizations online and is comparable to a digital signature

smart card

a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing

report

a document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information

competitive advantage

a feature of a product or service on which customers place a greater value than on similar offerings from competitors

entry barrier

a feature of a product or service that customers have come to expect and entering competitors must offer the same for survival

ransomware

a form of malicious software that infects your computer and asks for money. simple locker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys

pretexting

a form of social engineering in which one individual lies to obtain confidential data about another individual

fair information practices

a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy

business process model

a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint

business process model and notation (BPMN)

a graphical notation that depicts the steps in a business process

zombie farm

a group of computers on which a hacker has planted zombie programs

hardware key logger

a hardware device that captures keystrokes on their journey from the keyboard to the motherboard

hashtag

a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#)

child online protection act (COPA)

a law that protects minors from accessing inappropriate material on the internet

business strategy

a leadership plan that achieves a specific set of goals or objectives such as increasing sales, decreasing costs, entering new markets, or developing new products or services

website bookmark

a locally stored URL or the address of a file or internet page saved as a shortcut

phishing expedition

a masquerading attack that combines spam with spoofing

internet

a massive network that connects computers all over the world and allows them to communicate with one another

fuzzy logic

a mathematical method of handling imprecise or subjective information

authentication

a method for confirming users' identities

information governance

a method or system of government for information management or control

Porter's 5 Forces Model

a model for analyzing the competitive forces within the environment in which a company operates, to assess the potential for profitability in an industry

privilege escalation

a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications

disruptive technology

a new way of doing things that initially does not meet the needs of existing customers

business process patent

a patent that protects a specific set of procedures for conducting a particular business activity

stakeholder

a person or group that has an interest or concern in an organization

social media manager

a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand

spear phishing

a phishing expedition in which the emails are carefully designed to target a particular person or organization

vishing (voice phishing)

a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information

business model

a plan that deals how a company creates, delivers, and generates revenues

ebusiness model

a plan that details how a company creates, delivers, and generates revenues on the internet

acceptable use policy (AUP)

a policy that a user must agree to follow to be provided access to corporate email, information systems, and the internet

typosquatting

a problem that occurs when someone registers purposely misspelled variations of well0known domain names

benchmarking

a process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance

key logger, or key trapper, software

a program that records every keystroke and mouse click

zombie

a program that secretly takes over another computer for the purpose of launching attacks on other computers

loyalty program

a program to reward customers based on spending

static report

a report created once based on data that does not change

dynamic report

a report that changes automatically during creation

instant messaging (IM or IMing)

a service that enables "instant" or real-time communication between people

voiceprint

a set of measurable characteristics of a human voice that uniquely identifies an individual

application programming interface (API)

a set of routines, protocols, and tools for building software applications

collaboration system

a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information

model

a simplified representation or abstraction of reality

cookie

a small file deposited on a hard drive by a website containing information about customers and their web activities. cookies allow websites to record the comings and goings of customers, usually without their knowledge or consent

spyware

a special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission

intelligent agent

a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users

executive information system (EIS)

a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation, and insight

static process

a systematic approach in attempt to improve business effectiveness and efficiency

BPMN activity

a task in a business process -any work that is being performed in a process -represented by a rounded-corner rectangle -includes checking availability, picking up the customers, and confirming the booking

phishing

a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that looks as though they came from legitimate sources

digital rights management

a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

certificate authority

a trusted third party, such as VeriSign, that validates user identities by means of digital certificatees

wiki

a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required

snapshot

a view of data at a particular moment in time

systems thinking

a way of monitoring the entire system by viewing multiple inputs being processed or transformed to product outputs while continuously gathering feedback on each part

real simple syndication (RSS)

a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video in a standardized format

mashup

a website or web application that uses content from more than one source to create a completely new product or service

internet of things

a world where interconnected, internet-enabled devices or "things" can collect & share data without human intervention

ebusiness revenue model

advertising fees, license fees, subscription fees, transaction fees, value-added service fees

intermediaries

agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together

supply chain

all parties involved, directly or indirectly, in obtaining raw materials or a product

bring your own device (BYOD) policy

allows employees to use their personal mobile derives and computer to access enterprise data and applications

video-conference

allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards

social bookmarking

allows users to share, organize, search, and manage bookmarks

threat

an act or object that poses a danger to assets

first-mover advantage

an advantage that occurs when a company can significantly increase its market share by being first to market with a competitive advantage

product differentiation

an advantage that occurs when a company develops unique differences in its products with the intent to influence demand

social network

an application that connects people by matching profile information

genetic algorithm

an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem

information property

an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged

patent

an exclusive right to make, use, and sell an invention granted by a government to the inventor

blog, or web log

an online journal that allows users to post their own comments, graphics, and video

native advertising

an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement

eshop (estore or etailer)

an online version of a retail store where customers can shop at any hour

cyberwar

an organized attempt by a country's military to disrupt or destroy information and communication systems for another country

teergrubing

anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

closed source

any proprietary software licensed under exclusive legal right of the copyright holder

BPMN event

anything that happens during the course of a business process. -represented by a circle -includes customer requests, time requests, or the end of the process

business-to-consumer (B2C)

applies to any business that sells its products or services directly to consumers online

consumer-to-business (C2B)

applies to any consumer who sells a product or service to a business on the Internet

business-to-business (B2B)

applies to businesses buying from and selling to each other over the internet

consumer-to-consumer (C2C)

applies to customers offering goods and services to each other on the internet

vertical privilege escalation

attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data

horizontal privilege escalation

attackers grant themselves the same access levels they already have but assume the identity of another user

distributed denial-of-service attack (DDoS)

attacks from multiple computers that flood a website with so many requests for service that it slows down or crashes. a common type is the Ping of Death, in which thousands of computers try to access a website at the same time, overloading it and shutting it down

business process improvement

attempts to understand and measure the current process and make performance improvements accordingly

benchmark

baseline values the system seeks to attain

information example

best-selling product, best customer, worst-selling product, worst customer

web conferencing (webinar)

blends videoconferencing with document-sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants

business 2.0 tools for collaborating

blog, wiki, mashup

black-hat hackers

break into other people's computer systems and may just look around or may steal and destroy information

_______________________ is a standardized set of activities that accomplish a specific task

business process

core process

business processes, such as manufacturing goods, selling products, and providing service that make up the primary activities in a value chain

polymorphic viruses and worms

change their form as they propagate

knowledge example

choosing not to fire a sales representative who is underperforming knowing that person is experiencing family problems, listing products that are about to expire first on the menu or creating them as a daily special to move the product

collective intelligence

collaborating and tapping into the core knowledge of all employees, partners, and customers

search engine optimization (SEO)

combines art along with science to determine how to make URLs more attractive to search engine, resulting in higher search engine ranking

asynchronous communication

communication such as email in which the message and the response do not occur at the same time

synchronous communication

communications that occur at the same time such as IM or chat

time bombs

computer viruses that wait for a specific date before executing instructions

expert system

computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems

explicit knowledge

consists of anything that can be documented, archives, and codified, often with the help of MIS

open system

consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system

web log

consists of one line of information for every visitor to a website and is usually stored on a web server

digital dashboard analytical capabilities

consolidation, drill-down, slice-and-dice, pivot

information privacy policy

contains general principles regarding information privacy

ethical computer use policy

contains general principles to guide computer user behavior

internet use policy

contains general principles to guide the proper use of the internet

source code

contains instructions written by a programmer specifying the actions to be performed by computer software

user-contributed content (also referred to as user-generated content)

content created and updated by many users for many users

podcasting

converts an audio broadcast to a digital music plauer

switching costs

costs that make customers reluctant to switch to another product or service

chief user experience officer

create the optimal relationship between user and technology

critical success factors (CSFs)

crucial steps companies perform to achieve their goals and objectives and implement their strategies

information

data converted into a meaningful and useful context

machine-generated data

data created by a machine without human intervention

dashed line in LucidChart

data flow

structured data

data that has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address

human-generated data

data that humans, in interaction with computers, generate

unstructured data

data that is not defined and does not follow a specified format and is typically free-form text such as emails, Twitter tweets, and text messages

finance

deals with strategic financial issues including money, banking, credit, investments, and assets

decrypt

decodes information and is the opposite of encrypted

network effect

describes how products in a network increase in value to users as the number of users increases

social tagging

describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search

source document

describes the original transaction record along with details such as its date, purpose, and amount spent and includes cash receipts, canceled checks, invoices, customer refunds, employee time sheet, etc.

information security plan

details how an organization will implement the information security policies

email privacy policy

details the extent to which email messages may be read by others

chief automation officer

determines if a person or business process can be replaced by a robot or software

machine to machine (M2M)

devices that connect directly to other devices

effectiveness

doing the right things

efficiency

doing things right

business processes should _________ MIS choices & should be based on business strategies & goals

drive

strategic business processes

dynamic, nonroutine, long-term, business processes such as financial planning, expansion strategies, and stakeholder interactions

difference between ebusiness & ecommerce

ebusiness includes commence and ecommerce deals with transactions while ebusiness includes a lot more

managerial level

employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change

operational level

employees develop, control, and maintain core business activities required to run the day-to-day operations

drill-down

enables users to view details, and details of details, of information. (the reverse of consolidation)

transactional information

encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational or structured decisions

analytical information

encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis or semistructured decisions

overview of epolicies

ethical computer use, email privacy policy, information privacy policy, social media policy, acceptable use policy, workplace monitoring policy

SWOT analysis

evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies

search engine ranking

evaluates variables that search engines use to determine where a URL appears on the list of search results

clickstream data

exact pattern of a consumer's navigation through a site

information management

examines the organizational resource of information and regulates its definitions, uses, value, and distribution, ensuring that it has the types of data/information required to function and grow effectively

hackers

experts in technology who use their knowledge to break into computers and computer networks, either for profit or motivated by the challenge

predictive analytics

extracts information from data and uses it to predict future trends and identify behavioral patterns

intrusion detection software (IDS)

features full-time monitoring tools that search for patterns in network traffic to identify intruders

script kiddies or script bunnies

find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses

support value activities

firm infrastructure, human resource management, technology development (and R&D), procuremtn

denial-of-serivce attack (DoS)

floods a website with so many requests for a service that it slows down or crashes the site

support value activities

found along the top of the value chain and includes business processes, such as firm infrastructure, human resource management, technology development, and procurement that support the primary value activities

primary value activities

found at the bottom of the value chain, these include business processes that acquire raw materials and manufacture, deliver, market, sell, ad provide after-sales services

GIGO

garbage in, garbage out

pay-per-click

generates revenue each time a user clicks on a link to a retailer's website

pay-per-conversion

generates revenue each time a website visitor is converted to a customer

pay-per-call

generates revenue each time users click on a link that takes them directly to an online agent waiting for a call

porter's 3 generic strategies

generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service

information ethics

govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies)

internet censorship

government attempts to control internet traffic, thus preventing some material from being viewed by a country's citizens

social engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

firewall

hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings

crackers

have criminal intent when hacking

hactivists

have philosophical and political reasons for breaking into systems and will often deface the website as a protest

content management system (CMS)

helps companies manage the creation, storage, editing, and publication of their website content

trojan-horse virus

hides inside other software, usually as an attachment or a downloadable file

information security policies

identify the rules required to maintain information security, such as requrig users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days

digital darwinism

implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction

streamlining

improves business processes efficiencies simplifying or eliminating unnecessary steps

ebusiness

includes commerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real-time information

workflow

includes the tasks, activities, and responsibilities required to execute each step in a business process

return on investment (ROI)

indicates the earning power of a project

knowledge worker

individuals values for their ability to interpret and analyze information

business intelligence (BI)

information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyze patterns, trends, and relationship for strategic decision making

integration

information systems used as part of the manual process

feedback

information that returns to its original transmitter (input, transform, or output) and modifies the transmitter's actions

intellectual property

intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents

advanced encryption standard (AES)

introduced by the national institute of standards and technology (NIST), AES is an encryption standard designed to keep government information secure

business-facing process

invisible to the external customer but essential to the effective management of the business; they include goal setting, day-to-day planning, giving performance feedback and rewards, and allocating resources

knowledge management (KM)

involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions

automation

involves computerizing manual tasks making them more efficient and effective and dramatically lowering operational costs

structured decision

involves situations where established processes offer potential solutions

egovernment

involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government

adwords

keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages

swim lane

layout arranges the steps of a business process into a set of rows depicting the various elements

insiders

legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident

dumpster diving

looking through people's trash, another way hackers obtain information

business intelligence example

lowest sales per week compared with the economic interest rates, best-selling product by month compared to sports season and city team wins and losses

web 3.0

machine-based learning & reasoning, intelligent applications

human resources

maintains policies, plans, and procedures for the effective management of employees

destructive agents

malicious agents designed by spammers and other internet attackers to farm email addresses off websites or deposit spyware on machines

chief intellectual property officer

manage and defend intellectual property, copyrights, and patens

strategic level

managers develop overall business strategies, goals, and objectives as part of the company's strategic plan

operations management

manages the process of converting or transforming or resources into goods or services

social networking analysis (SNA)

maps group contacts identifying who knows each other and who works together

goods

material items or products that customers will buy to satisfy a want or need. clothing, groceries, cell phones, and cards are all examples of goods that people buy to fulfill their needs

effectiveness MIS metrics

measure the impact MIS has on business processes and activities including customer satisfaction and customer conversion rates

efficiency MIS metrics

measure the performance of MIS itself such as throughput, transaction speed, and system availability

customer satisfaction

measured by satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer

metrics

measurements that evaluate results to determine whether a project is meeting its goals

interactivity

measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisements

information reach

measures the number of people a firm can communicate with all over the world

decision support system (DSS)

model information using OLAP, which provides assistance in evaluating and choosing among different courses of action

workflow control systems

monitor processes to ensure tasks, activities, and responsibilities are executed as specified

semistructured decision

occurs in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision

unstructured decision

occurs in situations in which no procedures or rules exist to guide decision makers toward the correct choice

disintermediation

occurs when a business sells direct to the customer online and cuts out the intermediary

personalization

occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions

paradigm shift

occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave

real-time communication

occurs when a system updates information at the same rate it receives it

redundancy

occurs when a task or activity is unnecessarily repeated

content filtering

occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information

bottleneck

occurs when resources reach full capacity and cannot handle any additional; they limit throughput and impede operations

threat of new entrants

one of porter's 5 forces, high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market

threat of substitute products or services

one of porter's 5 forces, high when there are many alternatives to a product or service and low when there are few alternatives from which to choose

rivalry among existing competitors

one of porter's 5 forces; high when competition is fierce in a market and low when competitors are more complacent

supplier power

one of porter's 5 forces; measures the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services)

backdoor programs

open a way into the network for future attacks

________________ software cannot be SOLD

open source

common company structure

operational (structured decisions) ---> managerial level (semistructured decisions) ---> strategic level (unstructured decisions)

In a SWOT analysis, ___________ and ___________ originate OUTSIDE an organization

opportunities & threats

Data example

order date, amount sold, customer number, quantity ordered

social media policy

outlines the corporate guidelines or principles governing employee online communications

sales

performs the function of selling goods or services

epolicies

policies and procedures that address information management along with the ethical use of computers and the internet in the business environment

sustaining technology

produces an improved product customers are eager to buy, such as a faster car or larger hard drive

visualization

produces graphical displays of patterns and complex relationships in large amounts of data

key performance indicators (KPIs)

quantifiable metrics a company uses to evaluate progress towards critical success factors

data

raw facts that describe the characteristics of an event or object

primary value activities

receive and store raw materials, make the product or service, deliver the product or service, market and sell the product or service, service after the sale

clickstream

records information about a customer during a web surfing session such as what websites were visited, how long the visit was, what ads were viewed, and what was purchased

accounting

records, measures, and reports monetary transactions

_________________ typically occurs during strategic business process improvement

reengineering

long tail

referring to the tail of a typical sales curve

downtime

refers to a period of time when a system is unavailable

open source

refers to any software whose source code is made available free for any third party to review and modify

ediscovery

refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry

cybermediation

refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness

information richness

refers to the depth and breadth of details contained in a piece of textual, graphic, audio or video information

granularity

refers to the level of detail in the model or the decision-making process

crowdsourcing

refers to the wisdom of the crowd

web 1.0 (or business 1.0)

refers to the world wide web during its first few years or operation between 1991 and 2003

social media

refers to websites that rely on user participation and user-contributed content

social graphs

represent the interconnection of relationships in a social network

as-is process model

represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes

multifactor authentication

requires more than two means of authentication such as what the user knows (password)

two-factor authentication

requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)

pharming

reroutes requests for legitimate websites to false websites

chief knowledge officer (CKO)

responsbile for collecting, maintaining, and distributing company knowledge

chief privacy officer (CPO)

responsbile for ensuring the ethical and legal use of information within a company

chief data officer

responsible for determining the types of information the enterprise will capture, retain, analyze, and share

chief security officer (CSO)

responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers and viruses

chief technology officer (CTO)

responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology

chief information officer (CIO)

responsible for: 1) overseeing all uses of MIS and 2) ensuring that MIS strategically aligns with business goals and objectives

customer-facing process

results in a product or service that is received by an organization's external customer

pivot

rotates data to display alternative presentations of the data

antivirus software

scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware

encryption

scrambles information into an alternative form that requires a key or password to decrypt

cyberterrorists

seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction

managerial business processes

semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements

mail bomb

sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning

solid line in LucidChart

sequence flow (activity to activity)

to-be process model

shows the results of applying change improvement opportunities to to the current (as-is) process model

folksonomy

similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system

anti-spam policy

simply states that email users will not send unsolicited emails (spam)

artificial intelligence (AI)

simulates human thinking and behavior such as the ability to reason and learn

knowledge

skills, experience, and expertise coupled with information and intelligence that creates a person's intellectual resources

tokens

small electronic devices that change user passwords automatically

spyware (sneakware or stealthware)

software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about

adware

software that generates ads that install themselves on a computer when a person downloads some other program from the internet

counterfeit software

software that is manufactured to look like the real thing and sold as such

shopping bot

software that will search several retailer websites and provide a comparison of each retailer's offerings including price and availability

virus

software written with malicious intent to cause annoyance or damage

crowdfunding

sources capital for a project by raising many small amounts from a large number of individuals, typically via the internet

tag

specific keywords or phrases incorporated into website content for means of classification or taxonomy

worm

spreads itself not from file to file but also from computer to computer

business process

standardized set of activities that accomplish a specific task

employee monitoring policy

states explicitly how, when and where the company monitors its employees

running payroll is an example of a ____________ process

static

operational business processes

static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes

web 1.0

static-based information websites

reintermediation

steps are added to the value chain as new players find ways to add value to the business process

_____________ improves managerial level business processes

streamlining

password

string of alphanumeric characters used to authenticate a user and provide access to a system

marketing

supports sales by planning, pricing, and promoting goods or services

knowledge management system (KMS)

supports the capturing, organization, and dissemination of knowledge (I.e. know-how) throughout an organization

physical security

tangible protection such as alarms, guards, fireproof doors, fences, and vaults

service

tasks that customers will buy to satisfy a want or need

online companies may hire an information architect to create a well planned website ______________ to help ensure that the search and navigation functions are easy to use and user-friendly

taxonomy

challenges of business 2.0

technology dependence, information vandalism, violations of copyright and plagiarism

project

temporary activity a company undertakes to create a unique product, service or result

mass customization

the ability of an organization to tailor its products or services to the customers' specifications

buyer power

the ability of buyers to affect the price they must pay for an item

slice-and-dice

the ability to look at information from different perspectives

mobile business (or mbusiness, mcommerce)

the ability to purchase goods and services through a wireless internet-enabled device

click-fraud

the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser

information compliance

the act of conforming, acquiescing, or yielding information

business process modeling (or mapping)

the activity of creating a detailed flowchart or process map of a work process tasks, and activities in a structured sequence

consolidation

the aggregation of data from simple roll-ups to complex groupings of interrelated information

throughput

the amount of information that can travel through a system at any point in time

transaction speed

the amount of time a system takes to perform a transaction

business process reengineering (BPR)

the analysis and redesign of workflow within and between enterprises

confidentiality

the assurance that messages and information remain available only to those authorized to view them

transaction processing system (TPS)

the basic business system that serves the operational level (analysts) and assists in making structured decisions

ecommerce

the buying and selling of goods and services over the internet

online transaction processing (OLTP)

the capturing of transaction and event information using technology to: 1) process the information according to defined business rules 2) store the information 3) update existing information to reflect the new information

information secrecy

the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity

fact

the confirmation or validation of an event or object

MIS skills gap

the difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies

internet of things vs. internet

the difference is that Internet requires humans while internet of things does not require human intervention

usability

the easy with which people perform transactions and/or find information

cybervandalism

the electronic defacing of an existing website

information accuracy

the extent to which a system generates the correct results when executing the same transaction numerous times

identity theft

the forging of someone's identity for the purpose of fruad

biometrics

the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting

tacit knowledge

the knowledge contained in people's heads

copyright

the legal protection afforded an expression of an idea, such as a song, book, or video game

online analytical processing (OLAP)

the manipulation of information to create business intelligence in support of strategic decision making

best practices

the most successful solutions or problem-solving methods that have been developed by a specific organization or industry

web 2.0 (or business 2.0)

the next generation of internet use--a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free

conversion rates

the number of customers an organization touches for the first time and persuades to purchase its products or services. this is a popular metric for evaluating the effectiveness of banner, pop-up, and pop-under ads on the internet

system availability

the number of hours a system is available for users

dot-com

the original term for a company operating on the Internet

social netowrking

the practice of expanding your business and/or social contacts by constructing a personal network

microblogging

the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages

information age

the present time, during which infinite quantities of facts are widely available to anyone who can use a computer

ethics

the principles and standards that guide our behavior toward other people

competitive intelligence

the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed

social media monitoring

the process of monitoring and responding to what is being said about a company, individual, product, or brand

authorization

the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amounts of allocated storage space

mutation

the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome

market share

the proportion of the market that a firm captures

productivity

the rate at which goods and services are produced based upon total output given total inputs

privacy

the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent

analytics

the science of fact-based decision making

cryptography

the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them

taxonomy

the scientific classification of organisms into groups based on similarities of structure or origin

information architecture

the set of ideas about how all information in a given context should be organized

website name stealing

the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner

response time

the time it takes to respond to user interactions such as a mouse click

cycle time

the time required to process an order

single-factor authentication

the traditional security process, which requires a username and password

pirated software

the unauthorized use, duplication, distribution, or sale of copyrighted software

cyberterrorism

the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals

augmented reality

the viewing of the physical world of computer-generated layers of information added to it

production

there process where a business takes raw materials and processes them or converts them into a finished product for its goods or services

why did Polaroid go bankrupt

they put too much focus into sustaining technology instead of disruptive technologies

cyberbullying

threats, negative remarks, or defamatory comments transmitted via the internet or posted on a website

what is the primary goal of the as-is model?

to simplify, eliminate (steps), and improve the to-be processes

digital dashboard

tracks KPIs and CSFs by compiling information from multiple sources and tailoring to meet user needs

workplace MIS monitoring

tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processes

web 2.0

user-generated content

pharming attack

uses a zombie farm, often by an organized crime association, to launch a massive phishing attack

behavior analytics

uses data about people's behaviors to understand intent and predict future actions

public key encryption (PKE)

uses two keys: a public key that everyone can have and a private key for only the recipient

_______________________ executes the business strategy

value chain analysis

intelligent system

various commercial applications of artificial intelligence

value chain analysis

views a firm as a series of business processes that each add value to the product or service

search engine

website software that finds other pages based on keyword matching

reputation system

where buyers post feedback on sellers

white-hat hackers

work at the request of the system owners to find system vulnerabilities and plug the holes

ebusiness advantages

-expanding global reach -opening new markets -reducing costs -improving operations -improving effectiveness

types of artificial intelligence

-expert systems (playing chess) -neural networks (credit card companies checking for fraud) -genetic algorithms (investment companies in trading decisions) -intelligent agents (environmental scanning and competitive intelligence) -virtual reality (working virtually around the globe)

challenges facing Ebusiness

-identifying limited market segments -ensuring consumer protection -managing consumer trust -adhering to taxation rules

customer-facing processes

-order processing -customer service -sales process -customer billing -order shipping

examples of customer-facing processes

-order processing -customer service -sales process -customer billing -order shipping

business-facing processes

-strategic planning -tactical planning -budget forecasting -training -purchasing raw materials

examples of business-facing processes

-tactical planning -strategic planning -budget forecasting -training -purchasing raw materials

reasons for explosive growth of the World Wide Web

-the speed, convenience, and low cost of e-mail -the microcomputer revolution made it possible for an average person to own a computer -basic web pages are easy to create & extremely flexible

efficiency metrics

-throughput -transaction speed -system availability -information accuracy -response time

KPI examples

-turnover rates of employees -percentage of help desk calls answered in the first minute -number of product returns -number of new customers -average customer spending

4 basic options of BYOD policies

-unlimited access for personal devices -access only to nonsensitive systems and data -access, but with IT control over personal devices, apps, and stored data -access, but preventing local storage of data on personal devices

effectiveness metrics

-usability -customer satisfaction -conversion rates -financial

BPMN gateway

-used to control the flow of a process -handle the forking, merging, and joining of paths within a process -represented by a diamond shape -includes determining availability status or accepting/declining the request

managerial decision-making challenges

1) managers need to analyze large amounts of information 2) managers must make decisions quickly 3) manager's must apply sophisticated analysis techniques, such as porter's strategies or forecasting, to make strategic decisions

5 steps in the order-to-delivery business process

1) marketing (create campaign/check inventory) 2) sales (place order, notify production, check credit) 3) operations management (manufacture goods) 4) accounting & finance (deliver goods, bill customer) 5) customer service (support sale)

decision-making process

1) problem identification 2) data collection 3) solution generation 4) solution test 5) solution selection 6) solution implementation

business process reengineering model

1) set project scope 2) study competition 3) create new processes 4) implement solution

the time is right to initiate a business process change when:

1) the market being served makes a distinctive shift 2) the company is below industry benchmarks on its core processes 3) new technology is introduced 4) the company must leapfrog competition on key decisions to regain it's competitive advantage

ebusiness revenue models

-advertising fees -license fees -subscription feeds -transaction fees -value-added service feeds

industry-specific customer facing processes

-banking: loan processes -insurance: claims processing -government: grant allocation -hotel: reservation handling -airline: baggage handling

ways to generate revenue on the internet

-banner ads -pop-up ads -associate/affiliate programs -viral marketing

CSF examples

-create high-quality products -retain competitive advantages -reduce product costs -increase customer satisfaction -hire and retain the best business professionals

BPMN flows

-display the path in which the process flows -represented by arrows -show the path the customer takes through the taxi cab booking process

steps in business process improvement

-document as-is process -establish measures -follow process -measure performance -identify and implement improvements

ebusiness tools

-email -content management system -web conferencing -videoconferencing -podcasting -instant messaging


Related study sets

PrepU Chapter 40: Nursing Care of the Child With an Alteration in Gas Exchange/Respiratory Disorder

View Set

Estructura de las palabras. Los monemas (teoría)

View Set

Electromagnet Physic Test( Anderson)

View Set

Organizational Behavior Final MC and Short Answer Textbook

View Set

Microeconomics Chapter 15 Monopolies

View Set

Unit 2 Solving Systems on equations by graphing

View Set

CHAPTER 10: PRETRIAL ACTIVITIES AND CRIMINAL TRIAL

View Set

Chapter 14 Review Questions Troubleshooting Windows Startup Problems

View Set

Financial Analysis for Decision Making Chapter 11 (Ross)

View Set