MIS 301 Exam 2 Review

Ace your homework & exams now with Quizwiz!

Equifax Breach

Software was out of date, network inspection system had not been working for 10 months, and the hackers ran 9000 queries from 51 databases.The breach wasn't affecting sales revenue so they didn't do anything to change their software.

Vertical integration

When a single firm owns several layers in its value chain

black hat hacker

a computer criminal

phising

a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software

pay-per-click (PPC)or (CPC)

a concept where advertisers don't pay unless someone clicks on their ad

cookies

a line of identifying text, assigned and retrieved by a given web browser and stored by your browser

deep linking

a link that takes a user to a specific webpage (rather than a home page) or which launches an app and brings up a unique location rather than just launching the app - cuts out Google

Computer Virus

a malicious code that spreads by attatching itself to files that are a part of legitimate installed programs

server farms

a massive network of computer servers running software to coordinate their collective use; provide the infrastructure backbone to SaaS and hardware cloud efforts, as well as many large-scale internet services

cost per action (CPA)

a method for charging for advertising whenever a user responds to an ad by performing a specific activity, such as signing up for a service

plug-in

a small computer program that extends the features set or capabilities of another application

firewall

a system that acts as a control for network traffic, blocking unauthorized traffic while preventing permitting acceptable use

hack

a term that may, depending on the context, refer to either 1) breaking into a computer system 2) a particularly clever solution

hacker

a term that, depending on the context, mat be applied to either 1) someone who breaks into computer systems 2) to a particularly clever programmer

Turing Test

a test of AI that, if passed, would mean a computer is indistinguishable from a human being

proxy services

a third-party computer that passes traffic to and from a specific address without revealing the address of the connected user

dynamic search ads

ads generated automatically based on the content of a website; useful for firms with rapidly updating inventory or firms struggling to keep up with new search terms that may be relevant to their product lines

keyword advertising

advertisements that are targeting based on a user's query

contextual advertising

advertising based on a website's context - might lead to content adjacency problems

PageRank

algorithm developed by Google cofounder Larry Page to rank websites

link fraud

also called "spamdexing" or "link farming"; the process of creating a series of bogus websites, all linking back to the pages one is trying to promote

brute-force attack

an attack that exhausts all possible password combinations in order to break into an account. the larger and more complicated a password or key, the longer the attack will take

distributed denial of service (DDoS) attack

an attack where a firm's computer systems are flooded with thousands of seemingly legit requests, the sheer volume of which will slow or shut down a site's use

ad network

an effort that links advertisers to web sites and other content providers that are willing to host advertisements, typically in exchange for payment; also called AdSense

major participants in mobile industry

android and iOS, also Windows and Blackberry

Amazon's 2-sided network effect

by opening to 3rd party sellers, customers attract more sellers and sellers attract customers

Before Android was launched, what were the key challenges to handset manufacturers and content/app providers? Has Android addressed these challenges?

challenges for handset manufacturers: complexity of carrier aggregation power management challenges supporting expanding capabilities of phones Challenges for content providers: sharing revenue w OS provider expensive software development/certification Android combined hardware and software. Open Source software is also free and encouraging for manufacturers

Zara design team

consists of young and fresh designers from design school; regularly rotated to Cross-pollinate experience, Encourage innovation

online ad growth

due to enhanced targeting increased time online long tail of content providers. targeted ads provided by: contextual advertising geotargeting using cookies

impressions

each time an ad is shown to a user

fraudsters

firms that purchase assets from data haversters. actions may include using stolen credit card numbers to purchase goods, creating fake accounts via ID fraud, and more

shoulder surfing

gaining compromising information through observation (as in looking over someone's shoulder)

botnet or zombie network

hordes of surreptitiously infiltrated computers, linked and controlled remotely

botnets (zombie networks)

hordes of surreptitiously infiltrated computers, linked and controlled remotely

Geotargeting

identifying a user's physical location for the purpose of delivering tailored ads or other content

dark web

internet content that can't be indexed by Google or other search engines

malware

is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.

Amazon's CCC

is negative! - sells goods and collects money from customers before it pays its suppliers - ADVANTAGE: extra money for expanding operations, making interest-bearing investments, etc.

Zara's vertical integration

keeps huge size of its production process in-house

negative keywords

keywords that prevent an ad from showing up when specific terms are present

Retargeting

look at products on Amazon, don't buy it, product starts to pop up in ads on the web

affiliate marketing program

marketing practice where a firm rewards partners who bring in new business, often with a percentage of any sales

Goal of AWS

monetize the firm's expertise in scalability and reliability and turn this into a revenue-generating business

account payable

money owned for products and services purchased on credit - Amazon doesn't pay suppliers right away

random stowe

no two similar products sit next to each other - reduces chances that a picker will confuse one item for another

flash-sales

offering deep discounts of a limited quantity of inventory; offer is run for a fixed period or until inventory is completely depleted

Zara's IT expenditure is less than one-fourth the fashion industry average

only invests at the points in its value chain where it will have the most significant impact

cash conversion cycle (CCC)

period between distributing cash and collecting funds associated with a given operation - want CCC to be small, otherwise unsold inventory is sitting on shelves and doesn't generate any cash until it's sold

potential vulnerabilities

physical threats user and admin. threats tech. threats (malware)

Goal of gathering data for Zara

plan styles and issue orders based on feedback rather than hunches and guesswork The goal is to improve the frequency and quality of decisions made by the design and planning teams

How does google rank sponsored ads?

precise formula based 1. the max. CPC that advertiser willing to pay 2. the ads quality score (CTR,keywords etc.) 3. expected impact of ad format

confidentiality

prevent the disclosure of sensitive information from unauthorized people, resources, and processes

dynamic pricing

pricing that shifts over time, usually based on conditions that change demand

liquidity problems

problems that arise when organizations cannot easily convert assets to cash

opt-out

programs that enroll all customers by default, but allow customers to discontinue participation if they want to

agency pricing

publisher sets the price and the resellers get a cut; used by Apple

cached

refers to a temporary storage space used to speed computing tasks

encryption

scrambling data using code or formula, known as cipher, such that is hidden from those who don't have the unlocking key

query

search

organic/natural search

search engine results returned and ranked according to relevance, to determine the order Google uses PageRank.

RFID

small chip-based tags that wirelessly emit a unique identifying code for the item that they are attached to. Think of RFID systems as a next-generation bar code.

spiders/web crawlers/software robots

software that traverses available websites in an attempt to perform a given task; search engines use these to discover documents for indexing and retrieval

white hat hacker

someone who uncovers computer weaknesses without exploiting them the goal of white hat hackers is to improve security systems

third-party cookies

sometimes called "tracking cookies" and are served by ad networks or other customer profiling firms; used to identify users and record behavior across multiple websites

biometrics

technologies that measure and analyze human body characteristics for identification or authentication. these might include finger print readers, retina scanners etc.

Pure play firm

term to describe companies that rely solely on the Internet to distribute products and services.

what determines appeal of an ad network

the ad technology, infrastructure and sale of an ad network. more advertisers= more content providers=higher priced ads= increased accuracy of targeting. gives the ability to reach a wider potential customer base. creating a network effect that can give a firm competitive adv.

Availability

the assurance that systems and data are accessible by authorized users when needed

last-mile delivery

the final stage of getting a product to the consumer, typically via a smaller delivery van or other vehicle

inventory turns

the number of times inventory is sold or used during a specific period

click-through-rate (CTR)

the number of users who clicked on an ad divided by the number of times the ad was delivered (the impressions); measures the percentage of people who clicked on an ad to arrive at a destination site

search engine marketing (SEM)

the practice of designing, running, and optimizing search engine ad campaigns

search engine optimization (SEO)

the process of improving a page's organic search rankings; has become a critical function for marketing organizations

integrity

the protection of system information or processes from intentional or accidental modification

market capitalization (market cap)

the value of a firm calculated by multiplying its share price by the number of stores

Why did Google develop android

they didnt want one firm to control the smartphone market. by providing android for free it gives hardware manufacturers an incentive to use the Android OS

How did Zara build its brand?

through its physical store presence, with over 7,000 locations worldwide, Zara shifted attention to driving online sales, with plans to increase its presence in Europe from 22 countries to 35

can a firm buy a top ranking ad?

to an extent yes, since they are based on the max CPC per advertiser, if you can pay the top CPC you can obtain a top ad ranking

Zara is able to be so responsive through

vertical integration and technology-orchestrated coordination of suppliers, Just-in-time manufacturing, Finely tuned logistics

fork

when developers start with a copy of a project's program source code, but modify it, creating a distinct and separate product from the original base

Technologies used by Zara for: Firm Infrastructure

DSS for collaboration among designers, store managers, market specialists, production managers and planners

compliance

Following a rule or order

Zara's store managers are armed with personal digital assistants (PDAs) that can be used to:

Gather customer input Chat up with customers to gain feedback on what they'd like to see more of

Parent company of Zara

Inditex group

The downside of contract manufacturing

Skimp on safety Ignore environmental concerns Employ child labor

dumpster diving

combing through trash to identify valuable assets

CPM

cost per thousand impressions; used more for building campaigns targeting more at creating awareness than generating click-throughs

channel conflict

exists when a firm's potential partners see the firm as a threat

key challenges for network operators (At&T) in mobile industry

huge investments required have to control handset manufacturers constant upgrades and updates

remarketing/retargeting

lets a web browser show custom targeted ads to a user when visiting other sites if that user has already visited a given page on the advertiser's site; allows firms to "reintroduce" products to users or target them with special messages or promotions

landing page

the web page displayed when a user clicks on an advertisement

how to hide pages from search engine crawlers

- HTML tags - no-index file - make sure websites aren't linked to other pages and haven't been submitted to websites for indexing

Secrets of Google's success

- Pull (instead of Push) advertising - Pricing Method (CPC instead of CPM) - Selling Strategies (auction instead of fixed prices) - Ad Networks (AdSense)

3 factors driving online ad growth trends

1) Increased user time online 2) Improved measurement and accountability 3) Targeting

Metrics for Google's Ad Ranking Formula

1) Max CPC that an advertiser is WTP 2) Ad's quality score 3) Expected impact of extensions

Google's assets

1) brand 2) scale 3) network effects 4) data

3 pillars of Amazon's business

1) large selection 2) customer experience 3) lower prices

walled gardens

A closed network or single set of services controlled by one dominant firm. Term is often applied to mobile carriers that act as gatekeepers, screening out hardware providers and software services from their networks.

content adjacency problem

A situation where ads appear alongside text the advertiser would like to avoid. occurs due to contextual advertising. advertisers can also use negative keywords.

Point-of-sale (POS) system

A transaction process that captures customer purchase information, showing how garments rank by sales; linked to PDA's

Trojan Horse Virus

A type of malware program that substitutes itself as a legitimate program. Once installed it delivers a hidden, malicious payload.

challenges and adv. of Android being Open Source

ADV hardware manufacturers can charge lower prices for android smartphones. bugs can be easily caught and fixed CHALLENGES Google has no control over what Android OS is loaded into (quality of hardware)

AdWords v. AdSense

AdWords- businesses pay Google to display ads AdSense- Google pays businesses for space on their website to run Google ads

Running out of bestsellers at Zara delivers several benefits:

◦Allows the firm to cultivate the exclusivity of its offerings ◦Encourage customers to buy right away and at full price ◦Encourages customers to visit often ◦Reduces the rate of failed product introductions

Technologies used by Zara for: Outbound Logistics

Automated Conveyers, DSS to support warehousing and distribution

affiliate programs

CPA program where program sponsors pay referring websites a percentage of revenue earned from the referral

Technologies used by Zara for: Technology R&D

Development of technology for vertical integration

Capital Commitments Necessary?

Google has over 1.4 M servers -building massive server infrastrucure is one cost of entry -impacts competitiveness bc/ few if any companies have these kinds of resources

Technologies used by Zara for: Inbound logistics

IT enabled JIT, inventory management systems

Where do Amazon's profits go?

Investments in fulfillment center infrastructure and cloud computing business

Contract manufacturing

Involves outsourcing production to third-party firms

Why is android so successful?

Open SOurce SOftware free of cost for device manufacturers, numerous brands selling android phones highly customizeable

Technologies used by Zara for: Marketing and sales

POS, Information transmitted to headquarters; vertical integration, customer profiling systems, inventory management systems, IPODS, IPADS

service level agreement (SLA)

Part of a standardized service contract where a service is formally defined

wholesale pricing

Paying publishers for titles and then selling the books at whatever price it wanted

SLAM

Scan Label Apply Manifest

Computer Worm

Self-replicating program designed to carry out some unauthorized activity on a victim's computer. Worms can spread themselves from one computer to another without any assistance from victims.


Related study sets

NU271 PrepU: Reproduction (week 9)

View Set

YouTube Channel Growth Certification - Course 7

View Set

Bio Ch. 7: The Cardiovascular System

View Set

Chapters 14 - 16, Geography Test

View Set

chapter 7 the discovery of cells

View Set