MIS 301 Exam 2

Ace your homework & exams now with Quizwiz!

What You See Is What You Get (WYSIWYG)

A phrase used to describe graphical editing tools, such as those found in a wiki, page layout program, or other design tool

Pure Play

A business that operates on Internet only, without a physical store. Don't straddle!!

Avatar

A character that represents a user online. Users interact via these in a virtual world

Collaborative Filtering

A classification of software that monitors trends among customers and uses data to personalize individual experience. For Netflix, Cinematch (Netflix's proprietary recommendation system) creates a huge advantage. However, this can be MIMICKED by competitors. Amazon also utilizes this

Data Mart

A database or databases focused on addressing the concerns of a specific problem (e.g., increasing customer retention, improving product quality) or business unit (e.g., marketing, engineering). Answers 1 question. May contain huge volumes of data

Law of Large Numbers

A large entity which is growing rapidly cannot maintain that growth pace forever

Cookie

A line of identifying text, assigned and retrieved by a given Web server and stored by your browser

Blog Roll

A list of a blogger's favorite blogs. While not all blogs include this, those that do are often displayed on the right or left column of a blog's main page

Affiliate Marketing Program

A marketing practice where a firm rewards partners who bring in new business, often with a percentage of any resulting sales

Server Farms

A massive network of computer servers running software to coordinate their collective use. These provide the infrastructure backbone to SaaS and hardware cloud efforts, as well as many large-scale Internet services

Virtual Private Network (VPN)

A method for employing encryption to provide secure access to a remote computer over the internet; uses public Internet to create appearance of private network. AKA private pathway over shared network

Online Analytical Processing (OLAP)

A method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube

Incremental Development

A method of software development that is modeled around a gradual increase in feature additions and a cyclical release and upgrade pattern

Engagement Ads

A new ad model; marketers need to rethink how they advertise to take advantage of the social graph. Advertisers hope to reach many consumers with similar interests via these types of ads. Think advertisements with action verbs like "Buy Now," "Watch Video," or "Visit the Site". Example: Delete 10 of your Facebook friends, and Burger King will give you a free Whopper.

Spamdexing

A number of methods, such as repeating unrelated phrases, to manipulate relevance of resources indexed by a search engine

A/B Testing

A randomized group of experiments used to collect data and compare performance among two options studied

Wifi

A term used to brand wireless local-area networking devices. Devices typically connect to an antenna-equipped base station or hotspot, which is then connected to the Internet. Wifi devices use standards known as IEEE 802.11, and various versions of this standard (e.g., b, g, n) may operate in different frequency bands and have access ranges

Deliverable

A term used to describe an (in)tangible object produced as a result of the project that is intended to be delivered to the customer. This could be a report, document, server upgrade, or any other building block on overall project

Knowledge Management Systems

A type of BI system; creates value from existing intellectual capital. Shares knowledge of products, product uses, best practices, etc., among employees, managers, customers, and others. Improves decisions by publishing employee and others' knowledge. Fosters innovation, improves customer service, increases organizational responsiveness, and reduces costs. Think PIAZZA!!

Expert Systems

A type of BI system; encodes human knowledge in the form of If/Then rules and process those rules to make a diagnosis or recommendation. Improves diagnosis and decision making by non-experts by encoding, saving, and processing expert knowledge. Can guide a new employee to take actions and asks questions like an expert employee

Reporting Systems

A type of BI system; integrates data from multiple sources. Process data by sorting, grouping, summing, averaging, and comparing. Results formatted into reports. This system improves decision making by providing relevant, accurate, and timely information to the right person. Right information to right user at right time!!

Data Mining Systems

A type of BI system; process data using using sophisticated statistical techniques (such as regression analysis and decision tree analysis) to find patterns and relationships in order to anticipate events or predict outcomes. Improves decision making by DISCOVERING patterns and relationships in data to predict future outcomes

IPO (going public)

A type of public offering in which shares of a company usually are sold to institutional investors that in turn, sell to the general public, on a securities exchange, for the first time

Microblogging

A type of short-message blogging, often made via mobile device. Distribute time-sensitive information. These are designed to provide rapid notification to their readership (e.g., a news flash, an update of one's activities), rather than detailed of in-depth comments. Ex: Twitter !!! (the most popular service of this)

IP Address

A value used to identify a device that is connected to the Internet. These are usually expressed as four numbers (from 0 to 255) and are separated by periods

Neutral Point of View (NPOV)

An editorial style that is free of bias and opinion. Wikipedia norms dictate that all articles must be written in this

Embassy

An established online presence where customers can reach and interact with the firm. Usually firms will establish presences at various services with a consistent name. Think facebook.com/starbucks, twitter.com/starbucks, youtube.com/starbuck, etc. This can also be highlighted in physical space such as in print, on bags and packaging, and on store signage. Firms should try to ensure that all of these carry consistent design elements, so users see familiar visual cues that underscore they are now at a destination associated with the organization

Crowdsourcing

An example of this is the Netflix Prize: an open competition for the best collaborative filtering algorithm to predict user ratings for films, based on previous ratings. $1 million reward for a 10% improvement in Netflix's recommendation algorithm. GE also enlisted this is an Ecomagination Challenge to find new, breakthrough ideas to create cleaner, more efficient and economically viable grid technologies

Volatility

An issue regarding Bitcoin; the value of a single bitcoin went from less than $100 to over $1000, during a recent less than 12 month period, before losing half its value again. This makes bitcoin less useful as a dollar-like currency, limiting its appeal to speculators that often seem like get-rich-quick schemers or the much smaller legitimate market that is looking for in-and-out transactions such as cross border payments

Bitcoin

An open-source, decentralized payment system (sometimes controversially referred to as a digital, virtual, or cryptocurrency) that operates in a peer-to-peer environment, without bank or central authority. This is the transaction method favored by cybercriminals and illegal trade networks. Peer produced finance

Dark Web

Internet content that can't be indexed by Google and other search engines

Venture Capitalists (VCs)

Investor groups that provide funding in exchange for a stake in the firm and often (especially in early-stage investments), a degree of managerial control (this may be in the form of a voting seat or seats on the firm's board of director)

Offshoring

Involves moving a task or process across a geographic boundary. This is a decision about where, NOT WHO, should do the process

Canned and ad hoc reports, digital dashboards, OLAP

Name the tools that are available to turn data into information

1.0 (e-commerce)

Netflix & Amazon are part of Web

Software Platform

Netflix developed and made this available to manufacturers seeking to include Netflix access in their devices. Explosion on ALL screens not just TV's. Partnerships created distribution breadth, giving Netflix a growing base. Netflix thought beyond hardware

DVD by Mail Service Model

Netflix's business model where it charges a flat-rate monthly subscription. Customers pay NO mailing expenses or late fees. Discs arrive in Mylar envelopes containing prepaid postage & return address. After watching the video, consumers slip the DVD back into the envelope & drop the disc in the mail. Users make their video choices in their "request queue" at Netflix.com & use the website to rate video, specify movie preferences, get video recommendations, check out DVD details, and share their viewing habits and review

Data

Rent the Runway collects this from mobile and Web use, from interaction in its own websites and mobile offerings, and from social media. This also informs all sorts of aspects of the business, including dress, designer, and material durability; designer and style popularity; shipment priorities; shipping pricing decisions; warehouse worker scheduling; product and service refinement; pricing; and more

Suppliers

Rent the Runway had to work closely with their _________ and demonstrate that they could actually grow the market & create a channel for reaching customers with a potential for high customer lifetime value

Technology

Rent the Runway uses this to optimize shipping rates because it'll even prioritize return shipping based on inventory demands, printing a higher-priced but faster-shipping return label for a customer if product turn-around is especially acute. Shipping labels are automatically printed

Canned Reports

Reports that provide regular summaries of information in a predetermined format

Data Warehouses and Data Marts

Repositories for large amounts of transactional data awaiting analytics and reporting. Firms typically need to create separate data repositories since running analytics against transaction data can bog down a system and since most organizations need to combine and reformat data from multiple sources

Benefits

The different kinds of these for ERP systems include: - Cost savings: from staff reduction & reduced overtime also reduced printing costs, processing errors, and space costs - Productivity improvements: free up principal and clerical staff for crucial functions - Soft benefits: improved employee morale and productivity, improved recruiting efforts, and improved management access to mission-critical data

IPO

The downside of this, regarding Netflix, was that it was early and other companies got to see how truly profitable they were, which lead to competition arising (such as Walmart and Blockbuster) (fast followers)

Value Network

The early customers for a disruptive technology are part of a different type of network than anything addressed by incumbent market leaders. These customers care about different features and attributes than incumbent customers, such as a free call over a quality call. A network of organizations that provides some type of value to customers

Outsourcing

The enabling factors of this include: - Liberalization of global economies - Digitalization of business processes - Proliferation of computing and telecom - Education outside of US, Europe, & Japan - Propagation of worldwide business culture

Data Mining

The goal of this is DISCOVERY of new patterns and relationships from data

Data Mining

The goal of this is to extract knowledge from a data set in a human-understandable structure

Data Mining

The process of discovering new patterns from large data sets. The non-trivial discovery of novel, valid, comprehensible, and potentially useful patterns from data

Outsourcing

The risks of this include: loss of control, benefits outweighed by long-term costs, and no easy exit

Google

The secret to this firm's success includes: - Pull (instead of push) advertising - Pricing method (CPC instead of CPM) - Selling strategy (auction instead of fixed prices) - Ad networks (AdSense)

Ad Hike

Unlike Google ads, Facebook ads aren't directly related to the visit. Facebook's ads are merely adjacent (which can cause potential problems of bad content adjacency for advertisers), while Google's ads are contextual. Because of this concept, Facebook has a lower CTR than Google

Up Selling

Trying to get consumers to buy an alternative higher priced item after loss leading strategy

Cross Selling

Trying to get consumers to buy other goods after loss leading strategy

KB

Typewritten Page

Broadcast Media Advertising

Which of the following is NOT a field that Kiril pursued or researched in order to grow sales for Big Skinny? - Sponsored search advertising - Display advertising - Broadcast media advertising - Online distribution through Amazon

Cost, Schedule, Technology, Organizational Feasibility

To determine the feasibility of a project, these 4 issues must be considered:

Ad Hoc Reporting Tools

Tools that put users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters

Time and Costs (time can only be reduced to a point, adding more people can create diseconomies of scale, increasing time may reduce or increase costs)

Tradeoffs exist in any project against

Taxonomy

Web 1.0, directories

False

(True, False) A/B Testing is a top priority for Big Skinny since "instinctual" choices regarding the online site have seen little results

Yes

(Yes, No) Did you rewatch this video? http://www.youtube.com/watch?v=BNHR6IQJGZs

Yes

(Yes, No) Did you rewatch this video? https://www.youtube.com/watch?v=MpIOClX1jPE

Yes

(Yes, No) Did you rewatch this video? https://vimeo.com/25118844

Resources

1 component for organizational influences on creativity & innovation; includes everything that the organization has available to aid work in the domain targeted for innovation

Management Practices

1 component for organizational influences on creativity & innovation; includes management at both the level of the organization as a whole and the level of individual departments and projects. Creativity & innovation are fostered by allowing a considerable degree of freedom or autonomy in the conduct of one's work. Include the ability to constitute effective work groups that represent a diversity of skills and are made up of individuals who trust & communicate well w each other, challenge each other's ideas in construct ways, are mutually supportive, & are committed to their work

Organizational Motivation

1 component for organizational influences on creativity & innovation; made up of the basic orientation of the organization toward innovation, as well as supports for creativity and innovation throughout the organization. Should come primarily from the highest level of management. Also includes the absence of several elements that undermine creativity

Creative Thinking

1 component of creativity; an individual will not produce creative work if these skills are lacking. These skills include a cognitive style favorable to taking new perspectives on problems, an application of techniques for the exploration of new cognitive pathways, and a working style conducive to persistent, energetic pursuit of one's work

Expertise

1 component of creativity; the foundation for all creative work. Includes memory for factual knowledge, technical proficiency, and special talents in the target work domain

Intrinsic Task Motivation

1 component of creativity; this is driven by deep interest and involvement in the work, by curiosity, enjoyment, or a personal sense of challenge. Autonomy (desire to direct our own lives), mastery (the urge to get better and better), and purpose (yearning to do what we do in service of something larger than ourselves)

Accept

1 way a company can manage / respond to info security risk; acknowledge that the risk exists but apply no safeguard

Mitigate

1 way a company can manage / respond to info security risk; change the asset's risk exposure (apply safeguard)

Avoid

1 way a company can manage / respond to info security risk; eliminate the asset's exposure to risk, or eliminate the asset altogether

Transfer

1 way a company can manage / respond to info security risk; shift responsibility for the risk to a third party (ISP, insurance, etc.)

9 Business Model Building Blocks

1. Customer Segments: different groups of people or organizations an enterprise aims to reach & serve 2. Value Propositions: creates value for a specific customer segment, what does the product/service have to offer? (newness, performance, customization, design, brand/status, price, cost) 3. Channels: how a company communicates with and reaches its customer segments to deliver a value proposition 4. Customer Relationships: type of relationship a company establishes with specific customer segments (includes personal assistance, dedicated personal assistance, automated services, communities, etc.) 5. Revenue Streams: cash a company generates from each customer segment (costs must be subtracted from revenues, fixed or dynamic pricing) 6. Key Resources: most important assets required to make a business model work (physical, intellectual, human, financial) 7. Key Activities: most important things a company must do to make its business model work (production, problem solving, platform/network) 8. Key Partnerships: network of partners and suppliers that make the business model work 9. Cost Structure: all cost incurred to operate a business model (fixed, variable, economies of scale)

School Districts

3 serious unique problems hindered the successful implementation of ERP systems within this category: - Limited budgets: persistent lack of funding necessary to support the development of successful ERPs. Spent a disproportionately low amnt of funding on IT!! - Under qualified personnel: lack of knowledgable personnel was a primary reason for failure. Became overly reliant upon consultants and other outside experts, which resulted in few staff members developing skills necessary to maintain the system - Changing leadership: lack of continuity in top leadership. ERP is a large-scale long term undertaking. Constantly changing leadership is crippling towards efforts to modernize ERPs

Wikis

A Web site that can be modified by anyone, from directly within a Web browser (provided that user is granted edit access). Collaborate on common tasks or to create common knowledge base

Minimum Viable Product (MVP)

A bare-bones offering that allows entrepreneurs and product developers to collect customer feedback and to validate concepts and assumptions that underlie a business idea. If concepts don't work out, the founders want to know early so they can pivot, or alter their product offering, business model, or target market in hopes of crafting a more viable business

Walled Garden

A closed network or single set of services controlled by one dominant firm. The fear is that if increasingly large parts of the Web reside inside a single (and, for the most part, closed) service; innovation, competition, and exchange may suffer

Cloud

A collection of resources available for access over the Internet

Ad Network

A company that connects advertisers to web sites that want to host advertisements. These partner sites distribute ads in exchange for a percentage of the take. These handle advertiser recruitment, ad serving, and revenue collection, opening up revenue earning possibilities to even the smallest publishers

Cost Per Click (CPC)

A concept where advertisers don't pay unless someone clicks on their ad. Payment is based on the number of click-throughs. This is less RISKY for advertisers. How Google charges advertisers

Synectics

A creativity-enhancement training program; relies heavily on the use of metaphor and analogy in the generation of novel ideas

Creative Problem Solving (CPS)

A creativity-enhancement training program; this process involves the use of checklists and forced relationships in addition to the brainstorming principles of deferred judgement and quantity of idea generation

Sock Puppet

A fake online persona created to promote a particular point of view, often in praise of a firm, product, or individual. Be aware that the use of undisclosed relationships in endorsements is a violation of U.S. Federal Trade Commission rules

RSS (Rich Site Summary)

A format for delivering regularly changing web content. Solves a problem for people who regularly use the web. It allows you to easily stay informed by retrieving the latest content from the sites you are interested in. You save time by not needing to visit each site individually. This enables users to scan headlines of newly available content and click on item of interest, manage info overload, easy access, relevant news and info. Often called really simple syndication

SMART (social media awareness and response team)

A group tasked with creating policies and providing support, training, guidance, and development expertise for and monitoring of a firm's social media efforts

Dashboards

A heads-up display of critical indicators that allow manager to get a graphical glance at key performance metrics

Whitelist

A highly restrictive program that permits communication only with approved entities and / or in an approved manner

Data Warehouse

A set of databases designed to support decision making in an organization. It is structured for fast online queries and exploration. These may aggregate enormous amounts of data from many different operational systems

Content Adjacency Problems

A situation where ads appear alongside text the advertiser would like to avoid

Data Cube

A special database used to store data in OLAP reporting

Mash Up

A web page or application created by combining data or functionality from different sources

Expert Systems

AI systems that leverage rules or examples to perform a task in a way that mimics applied human expertise. A computer guiding humans based on human encoded rules

Product Quality Assurance (PQA)

AKA testing- testing specialists

Social Proof

Adding legitimacy for a product through its association with your friends. Ads with social context have been shown to perform better, so Facebook has baked opportunities for social ads into its ad products

Brook's Law

Adding more people to a late project makes the project later

Interstitials

Ads that run before a user arrives at a website's contents

Keyword Advertising

Advertisements that are targeted based on a user's search query

Cost Per Action (CPA)

Advertiser pays each time a user performs a specified action such as signing up for a service, requesting material (like an insurance quote), making a purchase, or installing an app

CPM

Advertiser pays for every thousand times an ad is displayed. Magazine advertising is paid for this way

Contextual Advertising

Advertising based on a web site's content

Brands

Advertising builds awareness, but these are built through customer experiences !! These are especially critical online where opinion spreads virally and competition is just a click away

Advergames

Advertising in video games. Theoretically promote repeated traffic to websites and reinforce brands. Users choosing to register to be eligible for prizes can help marketers collect customer data. Gamers may also invite their friends to participate, which could assist promotion by word of mouth, or "viral marketing."

Network Effects

Also known as Metcalfe's Law, or network externalities; when the value of a product or service increases as its number of users expands. User base is the key. The more people own phones, the more valuable the phone is to each owner. The more FB friends you have, the more value the site provides

Neural Networks

An AI system that examines data and hunts down and exposes patterns in order to build models to exploit findings. Use deep learning to find patterns and then create models that utilize those patterns. It is more the computer on its own

Exact Match

An ad assigned to this kind of matched keyword would only be shown following a query for that precise keyword

Pop Up Ad

An ad that displays in a new browser window

Banner Ad

An ad that is embedded into a web page

Brute Force Attack

An attack that exhausts all password combinations in order to break into an account (larger, more complex password = longer attack). Runs dictionary guesses of common words or phrases substituted by symbols / numbers for common characters. Ex: j3llyb3@n!

Distributed Denial of Service (DDoS) Attack

An attack where a firm's computer systems are flooded with thousands of seemingly legitimate requests, sheer volume of which will slow down / shut down site use. This is often performed via botnets and botnets have been discovered that are capable of sending out 100 billion spam messages a day

RFM Analysis (recently, frequency, money)

Analyzing and ranking customers according to purchasing patterns. Simple technique that considers how recently a customer ordered, how frequently customer orders, and how much money customer spends per order. Gives customers scores (1 is GOOD, 5 is BAD)

Query

Another term for search

Strings

Any time you want to use text in Python, you are using these. Quotes indicate this! x = "Nancy" print (x)

Low

Are the switching costs for search low or high?

Diseconomies of Scale

As development teams grow, the average contribution per worker decreases and can create this. Factors that cause average costs of production to rise when the scale of operation is increased

Marketing

As part of this strategy, Triangulate purchased Wings' ads on Facebook and on ad networks, some of which offered virtual currency monetization platforms for social & mobile games. The company was spending about $5000 per month on advertising through the summer of 2010. Of Wings' 33,000 users in October 2010, rough 60% had been acquired through advertising. Triangulate had experimented LITTLE w paid search marketing --> not worth it

Black Hat Hacker

Bad guy, computer criminal

Scale

Because of this characteristic of Amazon, the firm is provided with negotiating leverage to secure lower prices and longer payment turns (keep inventory turns high and pay suppliers later!)

Micropayments

Bitcoin open up the possibility of this; the small digital payments that are now impractical because of fees (think of everything from gum to bus fare to small donations). The digital purchase of goods with small value

Miners

Bitcoins are transferred from person to person like cash. Instead of using a bank as a middleman, transactions are recorded in a public ledger and verified by a pool of users called

Honeypots

Bogus offerings meant to draw hacking attempts; if hackers take bait, they can be identified by IP address of intrusion and action can be taken to prevent further attacks / alert authorities

Hack

Breaking into computer system (negative); clever solution (positive)

Server Farms

Building these to index the ever-growing Web is now the cost of admission for any firm wanting to compete in search

Fault Tolerant

Capable of continuing operation even if a component fails. This is seen in Google's server farms (if something breaks, a technician can easily swap it out w a replacement - no one failure should interrupt the firm's operations)

Sales Force, Web Sales

Channel type for the Business Model; Own --> Direct -->

Own Stores

Channel type for the Business Model; Own --> Indirect -->

Server

Communication between a web browser and web ______ can identify: IP address (which indicates a browser's employer or university, which can be further matched with info such as firm size or industry), type of browser, computer type, as well as computer operating system. The ability to identify a surfer's computer, browser, or OS can be used to target tech ads

Netflix

Competitors underestimated this firm because it was an Internet pure play without a store front and their overall customer base was microscopic in comparison --> this turns out to be wrong !

Augmented Reality

Computer app overlay real world images with computer generated imagery/ data. Ex: GPS, GoogleMaps

Social Engineering

Con games that trick people into revealing information or doing other compromising tasks. Ex: impersonating senior management

Phishing

Cons executed using technology. The goal of this is to leverage the reputation of a trusted firm or friend to trick the victim into performing an action (like installing malicious software) or revealing information. Ex: spam emails (uses technology)

Social Media

Content that is created, shared, commented on by a broader community of users. Sometimes called UGC sites (User Generated Content)

Fixed Development Costs

Costs that do not vary according to development volume. Electronic marginal cost is basically zero bc there's no cost to produce and distribute but costs come w licensing, software development, etc.

Pilot Installation

Dad moves in alone; when an organization implements the entire system on single, limited unit. If system fails, it only affects limited boundary and reduces exposure

Malware

Dangerous software, seeks to compromise system without permission. Ex: viruses, worms, botnets, malicious adware, spyware, keylogger, screen capture, blended threat

Telecommunications Bandwidth

Data transmission speeds. Facebook spends over half a million a month on this to keep the feed full and your status updated. This also isn't very high in foreign markets, making Facebook's move abroad harder

September 4, 1998

Date Google was founded

Imitated

Defeating Google with some sort of technical advantage will be difficult, since Web-based innovation can often be quickly

Information Systems

Development of this is difficult because: 1. Difficulty of determining requirements 2. Requirements change as system develops 3. Schedule and budget difficult to estimate 4. Technology changes 5. Diseconomies of scale

Podcasts

Digital audio or video files serves as a series of programs or a multimedia blog

Negative (When incoming inventory shows up at Amazon, they don't pay their suppliers right away but instead log an account payable. But when customers buy from a retailer, cash is collected immediately. Amazon alone consistently reports a neg CCC bc it actually sells goods and collects money from customers weeks before it has to pay its suppliers)

Does Amazon report a positive or negative cash conversion cycle?

Astroturfing

Engineering the posting of positive comments and reviews of a firm's product and services (or negative ones of a firm's competitors). Many rating sites will penalize firms that offer incentives for positive feedback posts

Production / Implementation

Fifth phase in the Iterative Design Process; in this phase you convert business activity from old system to new!!

Variable Deployment Costs

Expenses that change in proportion to the business's activities

Platform

Facebook created this for hosting and integrating with other services, helping the firm foster its stated mission to "make the world more open and connected". This allows the firm to further leverage network effects. Developers creating apps create complementary benefits that have the potential to add value to FB beyond what the firm itself provides to its users

Facebook Apps

Facebook users derive additional value through these, which people can use for free or a small fee. Ex: you can play games such as Scramble or Word Jumble and share w friends who also like word games. Every month, more than 70% of Facebook users engage w this

.04%

Facebook's click through rate (CTR)

ARPU (average revenue per user)

Facebook's low ad engagement rates are reflected in this figure. While a Facebook user is about twice as valuable in terms of this figure as someone using Twitter, all that time spent on Facebook is worth only about one-sixth one a per-user basis as time spent on Google

Inception Phase

First phase in the Iterative Design Process; this phase requires defining the system's goals, determining the project scope, and assessing the feasibility of the project (proof of concept)

Maintenance Phase

Fixing or adapting the system. Need method to track system failures and enhancements. Corrections usually prioritized based on severity while enhancements usually prioritized based on business decisions (must generate reasonable rate of return). This is 60% of the project!

SEO

For Big Skinny, one advisor suggested that Kiril make sure all the pages on bigskinny.net featured filenames that included relevant keywords. Another suggested using heading tags within each page to emphasize which areas were most important. Several tips suggested creating additional sites to link to a primary site to tell the search engine that multiple sources values that primary site. Another discussion board suggested repeating the most important keywords in small type at the bottom of every page. These are all examples of what?!

HRMS (human resource management system)

For the SDCS district, this included payroll, personnel, and benefit systems. However, there was no true integration among any of these systems, and sharing of data between the systems was not automatic.

Customer Acquisition Costs < CLV = NPV (the greater this gap, the more profitable the customer is)

Formula for CLV

Construction Phase

Fourth phase in the Iterative Design Process; in this phase, the system must be built, system must be tested (either by individual components or system integration) and users must be converted to new system!!

Porter's 5 Forces

Framework considering the interplay between- 1. The intensity of rivalry among existing competitors 2. The threat of new entrants 3. The threat of substitute goods or services 4. Bargaining power of buyers 5. Bargaining power of suppliers This model is focused externally, describing how a firm is positioned within its industry

Beta Testing

Future system users try out system on their own

1.4 million

Google doesn't disclose the number of servers it uses, but estimates say it runs over this many servers in over a dozen worldwide server farms

Database (index of web)

Google doesn't search the web, it searches a

Bing

Google is the dominant search provider, however, this firm is on the rise

Trendspotting

Google lets you see aggregate trends in what users search for, which yields powerful insights. This allows anyone to explore search trends; breaking out the analysis by region, date, and other criteria

August 19, 2004

Google's IPO date

PageRank

Google's algorithm developed by Google cofounder Larry Page to rank Web sites. A site with more pages linking to them are ranked higher. # of inbound links as well as quality of inbound links

2%

Google's click through rate (CTR). Google get paid every time a consumer clicks on a sponsored link

375 billion (makes it most valuable media company on the planet)

Google's market cap 04/2015

Key Words

Google's search engine advertisements displayed during a consumer's search are based on these typed into the search engine

Auction Price

Google's selling strategy; advertisers specify the maximum CPC they are willing to pay. The rank of ads is based on both maximum CPC and the quality of advertisers' web pages. Advertisers actually pay just one cent more than the second highest bid

Work Breakdown Structure (WBS)

Hierarchy of tasks required to complete project; each task is broken into smaller tasks that can be managed and estimated. Define task dependencies, estimate task durations, and may be input into project management software

Keep in House (!!!)

High future core competency -->

Outsourcing

Hiring another organization to perform services to save costs, gain expertise, free up management time, and refocus on core competencies. Moving a task or process across a firm boundary. "Make or Buy" decision. Ex: Yelp's storage in Amazon's cloud

Botnet (Zombie Network)

Hordes of surreptitiously infiltrated computers linked and controlled remotely. Don't show viruses immediately and are activated only when a hacker wants to act. Have found these as large as 10 million, more power than the world's supercomputers

Zombie Networks

Hordes or surreptitiously infiltrated computers, linked and controlled remotely. This technique is used to perpetrate click fraud, as well as a variety of other computer security crimes

Geotargeting

Identifying a user's physical location (sometimes called geolocation) for the purpose of delivering tailored ads or other content

While Loop

In Python, this repeats code until the condition is met. The number of iterations in it may be unknown. This ends if and only if the condition is true, repeats conditionally. count = 0 while count < 5: print "while count is:", count count = count + 1 Note: < does not include 5. <= would contain 5

User Quality Scores

In October 2010, Triangulate deprioritized its original matching engine in Wings. Instead, the company delivered daily matches based on this. The goal is to find a person, not an algorithm - customers just want to date

Conditions

In Python, the if statement is used for these. The if statement may be combined with certain operators such as equality (==), greater than (>=), smaller than (<=), and not equal (!=). These may be combined using the keywords or and and. if x == 2: print "x contains 2" elif x == 3: print "x contains 3" else: print "x is not 2 or 3" Note: only goes down one branch! Don't forget colon. And need to tab the print

Variables

In Python, these store a value. first = "Little" last = "Boo" print "full name:", first, last

For Loop

In Python, we use this to repeat actions. four counter in range(5): print "counter is", counter Note: range starts at 0 so it goes 0 --> 4. range (6): [0,1,2,3,4,5]

Input

In Python, you can get this. This function asks for keyboard input from the user. This function prompts text if a parameter is given. The function reads input from the keyboard, converts it to a string, and removes the newline (Enter). value = raw_input ("Enter number: ") print "The user entered", value

Functions

In Python, you can use this to group set of code. These contain reusable logic! These are small parts of repeatable code. def cube (num): result = num * num * num return result value = int(value) print value, "cubed -->", cube (value) Note: integers don't have quotes around them

List

In Python, you define this using brackets. These can store MANY values stocks = ["P", "T", "S", "LUV"] print stocks [2] ^^^^ that will print S!! Start at 0!

All the Above

In early October 2010, Wings featured 4 main pages to select from. Which of the following is not one of those page titles? - Home - My Profile - My Ideal Match - Invite Friends - All the above were titles

Offshoring

In house (inside the company), but in a different country

Test

In order to do this to the information system, the sequences of actions that user take when employing the system, both normal and incorrect actions, should be considered

5

In order to generate the ROI, Wiemann decided to base the length of time for the analysis on this amount of useful life of the system once implemented

Wikimasters

Individuals often employed by organizations to review community content (wikis) in order to delete excessive posts, move commentary to the best location, and edit as necessary

Creation of Value

Key partners, key activities, key resources, cost structure, and value proposition affect efficiency -->

International Outsourcing

Large companies do this outside of US because of large, well-educated, English-speaking population that works for 20-30% of US labor cost. Also advantageous for customer support and other functions that operate 24/7

2%

Large public schools represented the vast majority of k-12 organization seeking ERP solutions. 81 school districts in the US served 50,000 or more students and among these district, IT spending tended to be LOW, with an average of this percentage of revenues going to IT budgets

Compliance

Legally or professionally binding steps that must be taken. Failure to do so could result in fines and legal problems. The goal is taking appropriate measures to ensure a firm is secure for customers, employees, shareholders, etc. But this is often treated more like a "necessary evil"

TB

Library of Congress is 10 of these. National Climatic Data Center Database is 400 of these

Cookies

Line of identifying text, assigned and retrieved by a Web server and stored by your browser, associated with a login account profile on that computer

Trackbacks

Links in a blog post that refer readers back to cited sources. These allow a blogger to see which and how many other bloggers are referring to their content. This field is supported by most blog software and while it's not required to enter this when citing another post, it's considered good "netiquette" to do so

Eavesdropping

Listening to or recording conversations, transmissions, or keystrokes

Parallel Implementation

Live in both houses at once - secure but VERY expensive; the new system runs parallel with old system during testing. Expensive & time consuming. Data must be entered twice. Provides easy fallback position

Shoulder Surfing

Looking over someone's shoulder to steal / view passwords or other proprietary info that shows up on computer screen. Gain compromising information through observation

Disruptive Technology

Managers fail to respond to this threat because existing customers aren't requesting these innovations and the new innovations would often deliver worse financial performance (lower margins, smaller revenues)

Disruptive Technology

Many dominant firms have seen their market share evaporate due to the rise of this phenomenon. While this phenomenon occurs in a wade variety of industries, it often occurs when the forces of fast/cheap technology enable new offerings from new competitors

Board of Directors

Many entrepreneurs accept start-up capital from VCs, investor groups that provide funding in exchange for a stake in the firm and, often, a degree of managerial control that may be in the form of a seat on the firm's

Service Level Agreements (SLAs)

Many firms will build security expectations and commitments into performance guarantees known as these. Insist partner firms are compliant, audit them to ensure this is the case

Mainstream Media

Mass Media reflective of current thought, influence, activity

Genetic Algorithms

Model building techniques where computers examine many potential solutions to a problem, iteratively modifying (mutating) various mathematical models, and comparing the mutated models to search for a best alternative

Account Payable

Money owed for products and services purchased on credit

Agile

Most important business philosophy; break larger project into smaller projects that can be completed weekly, organize sprints w small teams to complete project deliverables early & often, daily scrum review of progress & feedback loops

Plunge Installation

Move into new, BLOW UP old; YOLO! No back up. This is the direct installation of a new system. Install new system & discontinue old

RescueTime

Nagaraj, of Triangulate, initially experiment with this downloadable application to capture an individual's computer usage data. This is a productivity tool that allowed businesses to monitor employee's web surfing at work

Network effects and switching costs

Name the 2 strategic resources that are most critical to Facebook's competitive advantage. Facebook was able to create these resources while MySpace fell short because trust created through user verification and friend approval requiring both parties to consent encouraged FB users to share more and helped the firm establish a stronger social graph than other social networking rivals

Resources, Scope, Time (these are the 3 critical drivers AKA triple constraint AKA can only pick 2)

Name the 3 Key Systems Development Issues

Organizational motivation, management practices, resources (these 3 components IMPACT individual creativity!!!!)

Name the 3 circles necessary for overall innovation in an organization

Expertise, Creative Thinking, Intrinsic Task Motivation (creativity is most likely to occur when people's skills overlap with their strongest intrinsic interests and that creativity will be higher, the higher the level of each of the 3 components)

Name the 3 components of creativity

Increasing user time online, improved measurement and accountability, targeting

Name the 3 drivers behind increased online ad spending

Growing engaged users, Retaining users, Self-perpetuating

Name the 3 levels for the Hierarchy of Engagement. As companies move up the hierarchy, their products become better, harder to leave, and ultimately create virtuous loops that make the product self-perpetuating. Companies that scale the hierarchy are incredibly well positioned to demonstrate growth and retention that investors are looking to see.

Diverse, decentralized, offer a collective verdict, independent

Name the 4 criteria necessary for a crowd (within the wisdom of crowds) to be "smart"

Lower costs, lower ongoing investment in internal infrastructure, control of budget more tightly for predictable costs, get work done more efficiently

Name the 4 main reasons to outsource

Awareness, evaluation, purchase, delivery, aftersales

Name the 5 channel phases for the Business Model

Hardware, software, data, procedures, people (who interact with and are impacted by the system)

Name the 5 components of an IS

Brazil, Russia, India, China (BRIC)

Name the biggest countries for offshoring information technology services

Confidentiality, Integrity, Availability

Name the components of the CIA triangle, a model designed to guide policies for information security within an organization

Advertisers, ad platform, ad network partners, consumers

Name the participants in the cross sided market for digital advertising

Flash Sales

Offering deep discounts of a limited quantity of inventory, often run for a fixed period or until inventory is depleted

Disruptive Technology

Once this is identified, the firm can invest in a portfolio of technology options—start-ups or in-house efforts otherwise isolated from the firm's core business and management distraction. Options give the firm the right (but not the obligation) to continue and increase funding as a technology shows promise.

B2C (business to consumer)

One of Nagaraj's, of Triangulate, advisors encouraged him to build this kind of online dating site. This would position Triangulate in the large but fiercely competitive online dating industry, which was dominated by eHarmony and Match.com. Triangulate could create a dating application for Facebook Platform, which provided an API that allowed third-party app developers to integrate with Facebook's "social graph" and access data on Facebook users

Availability

One of the goals of information security; assurance that systems and data are accessible by authorized users when needed

Confidentiality

One of the goals of information security; prevents disclosure of sensitive information from unauthorized people and resources

Integrity

One of the goals of information security; protection of data from modification. Maintains consistency, accuracy, and trust

Electronic Social Network

Online community that allows users to establish a personal profile, link to other profiles (i.e., friends), share content, and communicate with members via messaging / posts. Most personal relationships are reciprocal (i.e., both parties agree to be "friends"). Discover and reinforce affiliations. Examples: Facebook, LinkedIn

Blogs

Online journal entries, usually made in reverse chronological order. These typically provide comment mechanisms where users can post feedback for authors and other readers. Share ideas, obtain feedback, mobilize a community

Offshore Outsourcing

Outside a firm and in a different country (going across geographic boundaries)

Partner Stores, Wholesaler

Partner --> Indirect -->

Cash Conversion Cycle

Period between collecting cash and distributing fund associated with a given operation

GB

Pickup truck filled with books or the works of Beethoven

Prediction Markets

Polling a diverse crowd and aggregating opinions in order to form a forecast of an eventual outcome Ex: The stock market, w stock price representing collective assessment of a firm's future

Dynamic Pricing

Pricing that shifts over time, usually based on conditions that changed demands. Ex: charging more for scarce items

Demand Pricing

Pricing that shifts over time; also known as dynamic pricing. Usually based on conditions that change demand. Rent the Runway leverages analytics for this when a hot summer dress is available in limited quantities so it may be priced higher from May to August

Cost

Storage capacity is increasing as this is decreasing --> becoming nearly unlimited

Liquidity Problems

Problems that arise when organizations cannot convert assets to cash- cash is considered the most liquid asset

Consensual Assessment

Products or responses are creative to the extent that appropriate observers agree that they are creative. In this context, appropriate observers are people who are familiar with a domain. Ex: Inappropriate to ask school teacher if solutions to business problems are assessed on creativity

Two Sided Network Effect

Products or services that become more valuable as two distinct categories of participants expand. Ex: more buyers attracts more sellers and more sellers attracts more buyers

PMP (project management professional)

Professional certification that requires several years of actual project experience. Good to get if you want to manage multi-million $ projects

Opt In

Program (typically a marketing effort) that requires customer consent. This program is contrasted with opt-out programs, which enroll all customers by default

APIs

Programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data. For example, Amazon provides these to let developers write their own applications and Web sites that can send the firm orders. These are the instructions programmers follow to create and post applications on the site. The incentive of this is that it makes people add value to a firm!!

Opt Out

Programs that enroll all customers by default, but that allow consumers to discontinue participation if they want to

Click Farms

Recruiting a network of users to engage in click fraud with the goal of spreading IP addresses across several systems to make a fraud effort more difficult to detect

Cash Flow Positive

Revenue > Costs

Encryption

Scrambling data using a code / formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. Extremely sensitive data (trade secrets, passwords, credit card numbers, employee/ customer info) should employ this before sent / stored. This is also employed in virtual private network technology, which scrambles data passed across a network

Organic (or natural) Search

Search engine results returned and ranked according to relevance

Analysis Phase

Second phase in the Iterative Design Process; in this phase, you determine and document features and functions, approve requirements, and it is less expensive to change system in this phase

Dumpster Diving

Sifting through trash to uncover valuable data or insights to facilitate attacks

Requirements Creep (Scope Creep)

Small changes in a plan or project that necessitate other changes which lead to still more changes and so on

MB

Small novel or high-resolution photo

Open Source Software (OSS)

Software that is free and whose code can be accessed and potentially modified by anyone

Software Spiders

Software that traverses available Web sites in an attempt to perform a given task and uncover as much information as they can find. Search engines use these to discover documents for indexing and retrieval. They ask each public computer network for a list of its public websites then go through this list ("crawling" a site), following every available link until all pages are uncovered and reported back to Google's database. You can also submit your site to search engine for indexing

Hacker

Someone who breaks into a computer system (negative); clever programmer (positive)

ERP

Successful implementation of this reduced the fragmentation of systems and data across an organization. Sharing data across multiple systems was labor-intensive and disruptive, often requiring manual rekeying and reformatting of critical data. The hallmark of this was the creation of a single database that stored all-important information in a common storehouse accessible by all

Web 2.0

The "second generation" of the Web. Internet services that foster user participation, collaboration and information sharing, as contrasted to the static, transaction-oriented Web sites. This optimizes your brand --> a lot about user participation & user generated content. = social media + peer production + collaborative consumption

Disruptive Technology

The 2 characteristics of this are: - It comes to market with a set of performance attributes that existing customers don't value - Over time, the performance attributes improve to the point where they invade established markets. Some examples include: digital cameras, mobile phones, Internet phone service, Skype

Firewall

System that acts as control for network traffic while permitting acceptable use. Firms employ these to examine traffic as it enters and leaves the network, potentially blocking certain types of access, while permitting approved communication

Biometrics

Technologies that measure and analyze human body characteristics for identification and authorization. Ex: fingerprint readers, retina scan, voice / facial recognition

Cyberwarfare

Technology disruptions by terrorists that cut off power to millions

Social Graph

Term coined by Mark Zuckerberg; The global mapping of users and organizations and how they are connected. In this, you are at the center. The larger this is, the larger the switching cost!!!

HR MOdule

The San Diego City Schools (SDCS) district intended to implement a full ERP system, but planned to start with this module to mitigate risk. This module would require the least modification of any module, and would give the district's information technology (IT) staff valuable experience in deploying a major new capability

Roll Back

The ability to revert a wiki page to a prior version. This is useful for restoring earlier work in the event of a posting error, inaccuracy, or vandalism

Crowdsourcing

The act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined generally large group of people in the form of an open call. Facebook did this when users were asked to look at Facebook phrases and offer translation suggestions for their local language, helping the firm rapidly deploy versions in dozens of markets in global reach

Blogs

The advantages of this over the MSM is that corporations can publish these directly to the public, skipping the mainstream media and presenting their words without a journalist filtering their comments or an editor cutting out key points they'd hoped to make

Customer Acquisition Costs

The amount of money a firm spends to convince a customer to buy (or try or use) a product or service. This must be less than reasonably estimated customer lifetime value (it should cost you less to bring in a customer than the value that the customer will eventually return to your business)

Large Scale Development Projects

The challenges involving this include: - Coordination: often organized into dependent groups - Diseconomies of Scale: adding ppl increases coordination requirements - Configuration Control: changes must be carefully managed and monitored - Unexpected Events: chance of disruption due to unanticipated events

PMBOK (project management body of knowledge)

The collection of best practices for project management

Risk

The components of this SPECIFIC TO THE EDUCATION INDUSTRY for ERP implementation include: - Negotiations - IT experience - Software modifications - Possibility that staff reductions would not happen to the extent projected in the HR and fiscal departments

Risk

The components of this for ERP implementation include: - Scope creep - Wide scale deployment - Issue escalation - Organizational change

Switching Costs

The cost a consumer incurs when moving from one product to another

Customer Lifetime Value

The current value of future profits that will accrue from acquired customers. This equals NPV (which is the value of future cash flows discounted into today's dollars)!!!

White Hat Hacker

The good guys who probe for computer weaknesses without exploiting them. They share their knowledge in hopes that the holes they've found will be plugged and security will be improved. Many firms hire consultants to conduct these types of hacking expeditions

Cookies

The greatest personalization and targeting of advertisements comes from these. Can help personalize a page, target ads, or monitor traffic. However, problem if several people use same browser on same computer without logging on as separate users .They can't replicate and are not viruses but due to browser mechanism to set and read these, they can be used as spyware

Wisdom of Crowds

The idea that a group of individuals (the crowd), often consisting of untrained amateurs, will collectively have more insight than a single or small group of trained professionals. For the crowd to be "smart" the crowd must: be diverse (participants bringing diff pieces of information), be decentralized (no one at the top is dictating the crowd's answer), offer a collective verdict (that summarizes participant opinions), and be independent (each focuses on information rather than the opinions of others)

Atoms to Bits

The idea that many media products are sold in containers (physical products / atoms; ex: book, iPod) for bits (the ones and zeroes that make up a video file, song, or layout of a book). As the Internet offers fast wireless delivery to TVs, music players, book readers, and other devices, the "atoms" of the container aren't necessary. Physical inventory is eliminated, offering great cost savings & can eliminate a huge chunk of shipping and handling costs while bandwidth costs are minimal

Product/Market Fit

The idea that they were crafting a solution the market wants, one that customers are willing to pay for, and one that'll scaled into a large, profitable business. Conveys the degree to which a product satisfies market demand

School Managers

The ideal school district ERP system was one where the full power of ERP was used to face the challenges confronting ___________ ___________ since a district's finance, HR, food services, procurement, delivery, & student tracking functions would be seamlessly integrated

Entrepreneurial Creativity

The implementation of novel, useful ideas to establish a new business or new program to deliver products or services. The primary novel, useful ideas may have to do w (a) the products or services themselves, (b) identifying a market for the products or services, (c) ways of producing and delivering the products or services, or (d) ways of obtaining resources to produce or deliver the products or services

Social Proof

The implementation of the "wingman" idea for Triangulate created this! Wingmen would make the site unique and fun and help the site grow virally, which would drive down customer acquisition costs

Streaming Video Models

The key issues holding back these types of video models include a growing but highly unpredictable business in terms of future costs, content availability, rival intensity, appeal vs. alternatives, and more

Q & A Sites

The key uses of these sites are knowledge sharing, discovery, learning, and reputation building

Messaging

The key uses of this is to communicate with individuals or groups of users using short-format text, graphics, and video. Usually done using mobile device

Critical Path

The longest path of a project through the network of activities; used to determine the earliest date a project can be finished. Task dependencies compressed as much as possible. Put your money where it takes the most days!! Longest path = THIS!

Retailers

The lower or no transaction costs of Bitcoin appeal to these people, as well as those wishing to exchange currency across borders. Bitcoin could lower these people's transaction costs, create an opportunity for the digital purchase of goods with small value (micropayments), and open up markets where credit card access is limited

Inventory Turns

The number of times inventory is sold or used during a specific period (such as a year or a quarter). A higher number means a firm is selling products quickly (which is good)

Click Through Rate (CTR)

The number of users who clicked an ad divided by the number of times the ad was delivered (the impressions). This measures the percentage of people who clicked on an ad to arrive at a destination-site

Miners

The pool of users that verify bitcoin transactions. These users get an incentive for being involved: they can donate their computer power in exchange for the opportunity to earn additional bitcoins, and sometimes, some modest transaction fees

Customer Lifetime Value (CLV)

The present value of the likely future income stream generated by an individual purchaser

Net Neutrality

The principle that all Internet traffic should be treated equally. ISPs offer varying coverage, depending on service used and bandwidth consumed. Internet firms (Netflix, Youtube, Google, etc.) say it is vital to maintain the openness of the Internet while telecommunications firms say they should be able to limit access to services that overtax their networks. This is a potential threat to streaming video models because Netflix might have to pay for bandwidth

Operational Data

The problems with this type of data include: - Raw data usually unsuitable for sophisticated reported or data mining - Dirty data - Values may be missing - Inconsistent data - Data can be too fine or too coarse (1 click = too fine; 1 billion clicks = not useful) - Too much data! Too many dimensions = NOT USEABLE. Examples of dimensions: name, age, gender, ethnicity, income, religion, education, vehicles, hobbies, etc.

Risk Management

The process of assessing and quantifying risk and establishing an acceptable level of risk for the organization. Risk can be mitigated, but cannot be eliminated

System Analysis and Design

The process of creating & maintaining information systems. The development involves all 5 information system components. This requires more than technical expertise, also requires BUSINESS KNOWLEDGE and MANAGEMENT SKILL

Link Fraud

The process of creating a series of bogus Web sites, all linking back to the pages one is trying to promote. Google actively works to uncover and shut down such efforts

E Discovery

The process of identifying and retrieving relevant electronic information to support litigation efforts

SEO (Search Engine Optimization)

The process of improving a page's organic search rankings. This is done because it is critical for an organization to be at the top of the search results!

Data Mining

The process of using computers to identify hidden patterns in, and to build models from, large data sets

Creativity

The production of novel and useful ideas in any domain. In order to be considered this, a product or an idea must be different from what has been done before

Churn Rate

The rate at which customers leave a product or service. For Netflix, Cinematch helps establish a low rate bc it creates switching costs by storing personal data

Inventory Turnover Ratio

The ratio of a company's annual sales to its inventory. The higher this ratio the better. How often a firm sells the equivalent of its entire inventory

Data

The sources of this come from: - Internal operations systems - Externally brought from outside sources - Social networking, user-generated content applications - Transactional from company operations

Network Effect

The strongest virtuous loop is a

Business Model

The structure by which a corporation carries out operations, including sales, R&D, and management

Innovation

The successful implementation of creative ideas within an organization

Knowledge

The transformation of data into this is key

Market Capitalization (market cap)

The value of a firm calculated by multiplying its share price by the number of shares

Pop up ads and banner ads

These 2 kinds of ads are the traditional display ads and are included in the PUSH advertising category! Kind of mass advertising. A problem w these ads is the unmatched audience

Display Ads

These ads seemed the INternet's closest equivalent to a booth at a street fair. Although the rich graphics of these offered intriguing possibilities for showing Big SKinny's benefits, these also presented important complications. Internet users had largely become conditioned to ignore these. Typically sold on a per-impression basis

Social Networks (same as electronic social network)

These are major messaging services, supporting private one-to-one notes, public postings, and broadcast updates or "feeds"

Collaborative Consumption

These competitive factors influence success in the marketplace of this: - Two sided network effects are important (must attract buyers and sellers) - Move early - Allows for leverage of underutilized assets, reducing costs for firms - Fragmented markets are easy to infiltrate

Collaborative Consumption (same as sharing economy)

These factors have contributed to the rise of this: recession, wage stagnation, social media, environmental concerns, and the proliferation of smartphones

Storefronts

These make sense when products are novel and customers may need additional education to help them get over inertia and actually try the new firm's offerings. For Rent the Runway, these also act as mini-warehouses and additional points to gather experience-enhancing customer data

Business Intelligence

These tools analyze data, look for patterns, and use patterns to make business decisions (such as sharing information w partners, managing inventory, and design marketing and advertising strategies)

Broad Match

These types of ads were served widely, to a host of queries deemed similar by the search engine. This ad could be shown to a user who mentioned the specified keywords in a multi-word query or to users with misspellings or variations

reporting systems, expert systems, knowledge management systems, data mining systems

These types of business intelligence systems provide information for improving decision making. The 4 primary systems are:

Cost

These types of elements for ERP implementation projects include: - Software - Implementation / consulting: IT resources needed to design, build, and test the system - Infrastructure: hardware & network required to support the system - Training - Ongoing: software maintenance, infrastructure maintenance, and on-site staff

Business Intelligence

These types of systems use data created by other systems to provide reporting and analysis for organizational decision making. The ability to pull data from across an organization and make decisions is key to business success

Design Phase

Third phase in the Iterative Design Process; in this phase you develop and evaluate alternatives, hardware determined by project team, software depends on source, database, procedures for BI system, and job descriptions created for users

Social Media

This "kills" outfits, heightening interest in the kind of efficient, high-quality wardrobe rotation that Rent the Runway offers. This also creates social proof and helps spread the good word about the firm and fuel business demand

Scale Economies

This allows firms to lower prices & spend more on customer acquisition, new features, or other efforts. This also provides Netflix a huge advantage. Leads to PROFITS

Contemporary

This approach to creativity research assumes that all humans with normal capacities are able to produce at least moderately creative work in some domain, some of the time - and that the social environment can influence both the level and the frequency of creative behavior

Big Skinny

This brand also employed these online marketing strategies to propel online sales: - Social media: they maintained a Facebook page & Twitter feed to announce events & promotions as well as let satisfied customers engage w their brand - Interactive content - Online distributors: such as Amazon, Buy.com, and eBay. These typically had a strong brand value, which could bring additional customers - A/B Testing: not a priority!! Complex - Affiliate marketing: could let any interested site send traffic to website in exchange for commissions - Email marketing: keep in touch w existing customers - Coupon site: promote brand in daily emails and offer large discounts to entice purchases

Disruptive Technology

This comes to market with a set of performance attributes that existing customers do not demand; however, performance improves over time to the point where these new innovations can invade established markets

Business Model

This describes the rationale of how an organization creates, delivers, and captures value. Can be best described through 9 basic building blocks that show the logic of how a company intends to make money

Task Motivation

This determines the extent to which one will fully engage their domain-relevant skills and creativity-relevant skills in the service of creative performance. This includes 2 elements: the person's baseline attitude toward the task, and the person's perceptions of his or her reasons for undertaking the task in a given instance

Paid Search

This dominates Internet ad spending

Technology (this is at the center of the firm's brand building efforts)

This drives all of these capabilities (also subscriber expectations) for Netflix: - Huge selection - Ability to find what they want - Timely arrival - Fair price - Ease of use and convenience

Channel Conflict

This exists when a firm's potential partners see that firm as a threat. This threat could come because it offers competing products or services via alternative channels or because the firm works closely with especially threatening competitors. Amazon has become a victim of this when other retailers have dropped its offering (like Barnes & Noble refusing to carry titles from Amazon's publishing arm)

Google

This firm also acts as a prediction market because of the ability to monitor trends with the use of search frequency. Ex: spread of the flu

Rent the Runway

This firm appeals to not just young, cash-strapped women, but to all women who seek convenience and value and who are interested in more broadly sampling high-end fashion

Walmart

This firm uses data mining in numerous ways, from demand forecasting to predicting the number of cashiers needed at a store at a particular time. To help suppliers become more efficient, which lowers prices, this firm shares data with them. Also utilizes a proprietary system called Retail Link that records the sale of an item scanned by this firm's register as well as trigger inventory reordering, scheduling, and delivery (leading to a high inventory turnover ratio!)

Airbnb

This firm verifies the identify of both parties, monitors all communications between property listers and guests, provides twenty-four-hour support, and additional insurance coverage, all in an effort to reduce transaction friction stemming from a lack of trust

Google

This firm's mission is "to organize the world's information and make it universally accessible and useful" --> unofficial motto: don't be evil

YouTube

This firm, like Google, starts with meager beginnings & grows quickly. Now a large, influential business that people make their living off of with monetizing channels. This firm is a costly business but potential $$ maker now for Google

Uber

This firms advantages over traditional services include scheduling, service speed, reliability, increased trust, ease of payment, and car availability. The firm's disruptive model is creating growth that is outpacing the size of the traditional industry. This firm's technology should offer far more safety and security than the conventional industry, and the company continues to invest in furthering safety initiatives. This firm also leverages data to power the firm's operational model, alert drivers, improve service, set pricing, and even identify possible cities to enter

Moore's Law

This has made it easier for cybercriminals to commit crimes because of easier access to computing power. It also makes computing cheaper & faster

Technology

This helps Rent the Runway prioritize which items need to be sent out because receiving staff scan the outside of returned envelopes and a message pops up on-screen with each scan, immediately determining if an item needs to go out right away. Garments are placed into bins color coded for urgency: black can eventually be prepped for restocking, but red is for those high-priority items that need to be immediately turned-around for send-out to another customer. The system will also identify mid-term priority items, as in "get to this if you have time after taking care of priority items—if we ship it today, we'll save money"

Creativity

This is NOT: - Eccentric personality: this arises from a particular behavior & results in a particular product or idea; don't think of this as a quality of personality - Art: this can be included in any domain of human activity - Intelligence: there is much more to this than just "smarts" - Good

E Commerce

This is Netflix's business model; selling products or services over the Internet

Prototype

This is a mock up of an aspect of an information system. This varies in functionality and utility - some are designed to be thrown away. This helps users evaluate requirements by showing actual data in context, providing opportunity for users to test interfaces, and acts as a communication device between users and developers. Important to reinforce that this is only a mock-up

Virtual World

This is a simulated environment designed for users to interact with one another via avatars. Users can independently explore this and participate in its activities and communicate with others

Data Quality

This is an issue that needs to be addressed in order to design, deploy, and maintain data warehouses and data marts; Can our data be trusted as accurate? Is it clean, complete, and reasonable free of errors? How can the data be made more accurate and valuable for analysis? Will we need to "scrub," calculate, and consolidate data so that it can be used?

Data Sourcing

This is an issue that needs to be addressed in order to design, deploy, and maintain data warehouses and data marts; Can we even get the data we'll need? Where can this data be obtained from? Is it available via our internal systems? Via third-party data aggregators? Via suppliers or sales partners? Do we need to set up new systems, surveys, and other collection efforts to acquire the data we need?

Data Quantity

This is an issue that needs to be addressed in order to design, deploy, and maintain data warehouses and data marts; How much data is needed?

Data Relevance

This is an issue that needs to be addressed in order to design, deploy, and maintain data warehouses and data marts; What data is needed to compete on analytics and to meet our current and future goals?

Data Governance

This is an issue that needs to be addressed in order to design, deploy, and maintain data warehouses and data marts; What rules and processes are needed to manage data from its creation through its retirement? Are there operational issues (backup, disaster recovery)? Legal issues? Privacy Issues? How should the firm handle security and access?

Data Hosting

This is an issue that needs to be addressed in order to design, deploy, and maintain data warehouses and data marts; Where will the systems be housed? What are the hardware and networking requirements for the effort?

Extrinsic Task Motivation

This is driven by the desire to attain some goal that is apart from the work itself - such as achieving a promised reward or meeting a deadline or winning a competition

Digital (Internet ad spending on the rise)

This is the only type of advertising spending that is INCREASING

IP Targeting

This kind of advertising targeting can't reliably identify individual users, as users are regularly assigned different IP addresses when they connect and disconnect from various physical and wifi networks

IP Address Tracking

This kind of tracking can be used to help ensure there's not more than one click per computer - helping to prevent click fraud

Dark Web

This may give Facebook an advantage over Google since much of Facebook's content is private, unable to be indexed by Google or other search engines. Some suggest this may create an opportunity for Facebook to challenge Google in search. Partnerships with Bing and Facebook's own Graph Search attempt to harness this asset to answer questions

Porter's Value Chain Model

This model is internally focused, showing how products or information flow through an operation. Includes: inbound logistics, operations, outbound logistics, marketing and sales, service

Persistent Risk

This occurs because thus far, ERP had not delivered nearly what was promised to school districts. Across the country, district reported a very low level of satisfaction with enterprise systems

Agency Pricing

This occurs when the publisher sets the price and the reseller gets a cut (usually around 30%)

Blogosphere

This refers to all blogs and their interconnections; connected community (the ecosystem of users)

Long Tail

This refers to an extremely large selection of content or products. This is a phenomenon whereby firms can make money by offering a near-limitless selection. An advantage for Netflix is that it has no geographic restrictions meaning Netflix is more scalable and can provide access to a large selection of products

ERP

This refers to the software systems that organizations maintained in order to manage and coordinate the sharing of data across departments and other units within the organization. Successful implementations allowed firms to increase productivity by integrating their financial, manufacturing, supply chain, and HR information

Twitter

This social media network acts as a prediction market. It is recommended that those participating in this ecosystem: listen to customers, identify influencers, and monitor shifts in opinion

ERP

This system forces accountability and transparency infused through all levels of the organizations, benefiting those companies desiring greater central control. For those companies wishing to decentralize decision making, people at the periphery were empowered with the information they needed to make appropriate decisions

Best of Breed

This type of ERP system would be built by merging together a series of software systems. This would guarantee that the district had almost all of the functionality it wanted. However, integrating multiple software packages would greatly increase the complexity and cost of implementation so it was advised against!!

Sponsored Search Advertising

This type of advertising let advertisers place their listings within search engines' results for specific keywords, in special sections earmarked for these kinds of offers. When a user searched for keywords, the search engine would present corresponding advertisements. 2 options of this: broad match and exact match. Sold on a "per-click" basis

Facebook

This type of app will have to be hosted, as it is NOT stored by this firm. You must use the firm's API + FQL + FBML to translate HTML & SQL. Browser --> Firm --> App Website RATHER THAN Browser --> App Website

Version 1

This version of the Triangulate engine in October 2009 collected data using eight "life-stream connectors," based on browser plug-ins and APIs for Facebook, Twitter, Netflix, and other sites, as well as an engine that analyzed the data and generated inferences about users

Version 2

This version of the Triangulate engine would suggest compatible pairings based on an algorithm using historical data for successful couples

Long Tail

This works for Netflix DVD by mail model because: - Cost of production and distribution drop - It gives the firm a selection advantage that traditional stores cannot match - Geographic constraints go away and untapped markets open up - Recommendations create a positive feedback loop; the more obscure recommendations provided by this, the more dependent you are on a service that provides obscure music/movies/etc.

Print

This writes to the screen in Python

Trackability

Unlike magazines and TV, Internet ads are at an advantage because they have this. Online tools allow advertisers to calculate ROI, test creativity, and adjust ads quickly. Tools (such as Google Analytics) allow you to see performance of site by region, category, date, and other criteria

Capturing / Delivering Value To Customers

Value propositions, customer relationships, customer segments, channels, and revenue structure affect value -->

Folksonomy

Web 2.0, tagging

Probability * Severity = Exposure (exposure values prioritize the order for addressing risks)

What is the basic formula for determining risk?

B2B (Business 2 Business)

When Nagaraj, of Triangulate, initially spoke with venture capitalists, they encouraged him to focus on these kinds of opportunities rather than creating an online consumer dating site. He began creating this online dating matching engine

Wholesale Pricing

When a seller pays publishers for titles and then sells those books at whatever price the seller wishes. Amazon used this pricing mechanism in order to sell cheap books to their consumers

Cross Border Remittance

When family members working abroad often send funds home via services that can cost $10-$17 for a $200 transfer and take up to five days to clear in some countries. This bitcoin transfer would be immediate and could theoretically eliminate all transaction fees, although several firms are charging small fees to ease transactions and quickly get money moved from national currency to bitcoin & back

Free Rider Problem

When others take advantage of a user or service without providing any sort of reciprocal benefit

Peer Production

When users collaboratively work to create content, products, and services. Includes social media sites, open source software, and peer-produced services, such as Skype and BitTorrent, where the participation of users provides the infrastructure and computational resources that enable the service. User generated content !!

Transaction Fees

When using an intermediary like banks or credit card companies, these occur and can top 3 percent

Phased Installation

Whole family moves in, but only to the living room and kitchen; the new system installed in phases and tested after each phase. This continues until installed at entire organization


Related study sets

Medical Term. Chapter 9 Practice

View Set