Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
67 Cards in this Set
- Front
- Back
B2C
|
a type of e-commerce--Business to Consumer
i.e. web storefront |
|
What type of e-commerce is Target.com an example of?
|
B2C -- Business to Consumer (web storefront)
|
|
B2B
|
a type of e-commerce--Business to Business
i.e. sales between companies |
|
B2G
|
a type of e-commerce--Business to Government
|
|
What is the dominant type of e-commerce?
|
B2B - Business to Business (because every activity in a supply chain is pretty much B2B until the final step)
|
|
Electronic Marketplace
|
(e-marketplace)
Interactive business communities providing a central market where multiple buyers and sellers can engage in e-business activities i.e. madeinchina.com |
|
Reverse Auction
|
buyers use this to purchase a product or service, and the seller with the lowest bid is selected
|
|
E-Business
|
the conducting of business on the internet including, not only buying and selling, but also serving customers and collaborating with business partners
|
|
Intranet
|
internalized portion of the Internet, protected from outside access, for employees
|
|
Extranet
|
an intranet that is available to strategic allies
|
|
Disintermediation
|
elimination of middle layers in the supply chain, especially wholesale and retail links
|
|
Re-intermediation
|
using the internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways
recent developments in e-business has shown a spark in re-intermediation |
|
Web 2.0
|
Users add value! databases that get better when people use them
internet without deliberate refresh (real time updates) |
|
SaaS/On-Demand Software/Thin Client
|
applications that run on a server somewhere in Internet cloud
|
|
SOA
|
Service-Oriented Architecture;
techniques to model every activity as a service and interactions among services |
|
Service
|
Standardized and repeatable task that a business performs
|
|
Encapsulation
|
places logic for a service in one place and all other services go to it for that service
|
|
Information hiding
|
the principle of hiding design decisions in a computer program that are most likely to change, thus protecting other parts of the program from change if the design decision is changed
|
|
Social Networks
|
online communities of people who share interests and activities, or who are interested in exploring the interests or activities of others
|
|
Information Silos
|
data isolated in separated information systems; created over time as personal and workgroup support applications are implemented; silos duplicate data and become serious problems as organizations grow
|
|
BPR
|
Business Process Re-engineering; the analysis and redesign of workflow within and between enterprises
|
|
What is the difference between BPR and BPM
|
BPR seeks to totally redesign the system within an organization, so it is slow, difficult, and exceedingly expensive
BPM seeks to redesign at the business process level, so it is more agile and efficient |
|
Inherent Processes
|
pre-designed procedures for using software products; based on industry-best practices
|
|
CRM
|
Customer Relationship Management; a suite of applications, a database, and a set of inherent processes for managing all interactions with the customer, from lead generation to customer service
|
|
ERP
|
Enterprise Resource Planning
suite of applications, a database, and set of inherent processes for consolidating business operations into a single, consistent, computing platform |
|
Core ERP components
|
1. accounting & finance
2. production and materials management 3. human resource |
|
EAI
|
Enterprise Application Integration
1. suite of software to integrate existing applications together; 2. connects system "islands" via new software layer 3. enables existing applications to communicate and share data 4. provides integrated information 5. leverage existing systems--leaving functional applications as is, but providing integration top layer 6. enables gradual move to ERP |
|
What are the problems with new enterprise systems?
|
1. Collaborative Management
2. Requirement Gaps 3. Transition Problems 4. Employee Resistance |
|
Information Systems Development
|
Process of creating and maintaining information systems; involve all 5 IS components
|
|
What is the single most important criterion for information systems success?
|
For users to take ownership of their systems
|
|
What are the 5 major challenges in system development?
|
1. the difficulty in determining requirements
2. changes in requirements 3. difficulties involving scheduling and budgeting 4. changing technology 5. Diseconomies of scales (more workers = lower average contribution per worker) |
|
What is the number one cause of IT failure?
|
complexity
|
|
What is the approximate annual cost of IT failure?
|
$6 trillion ($1 trillion in US)
|
|
SDLC
|
Software Development Life Cycle--5 steps
Pre-Life Cycle: Business-Planning Process 1. System Definition 2. Requirement Analysis 3. Component Design 4. Implementation 5. System Maintenance |
|
Systems Definition Phase
|
1st step of SDLC
involves establishing a high-level plan of the intended project and determining project goals asses project feasibility; select a system; develop the project plan; form a leadership team |
|
Requirement Analysis Phase
|
Step 2 of SDLC
identify features and functions. analyze end-user business requirements and refine project goals into defined functions and operations of the intended system gather business requirements; create process diagrams |
|
Scope Creep
|
a problem found in the SDLC, this occurs when the scope increases
|
|
Feature Creep
|
a problem found in the SDLC, this occurs when extra features are added
|
|
Component Design Phase
|
Step 3 of SDLC
Involves describing the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation design the IT infrastructure; design system model |
|
Implementation Phase
|
Step 4 of SDLC
purchase, build, test, and convert to the new system develop the IT infrastructure; develop the system; test all functionalities along with development by developers |
|
In what step of SDLC does training occur?
|
Implementation phase
|
|
4 Different Types of Implementation
|
1. Parallel
2. Direct 3. Phased 4. Pilot |
|
Parallel Implementation
|
old and new systems are used at the same time
|
|
Direct Implementation
|
old system is discontinued on one day and the new system is used on the next
|
|
Phased Implementation
|
Parts of the new system are implemented over time
|
|
Pilot Implementation
|
Entire system is used in one location
|
|
System Maintenance Phase
|
Step 5 of SDLC
bug fix, add new features, maintain help desk support; perform system maintenance; support system changes |
|
Open Source (3 Components)
|
1. Free Redistribution
2. Source Code 3. Derived Work |
|
Free Redistribution
|
one of the 3 components of open source
the license shall not protect any party from selling or giving away the software as a component of an aggregated software distribution containing programs for several different sources. The license shall not require a royalty or other fee for such sale |
|
Source Code
|
one of the 3 components of open source
the program must include source code, and must allow distribution in source code as well as compiled form |
|
Derived Works
|
one of the 3 components of open source
the license must allow modifications and derived works, and must allow them to be distributed under the same terms as the license of the original software |
|
Information Security
|
the protection of information from accidental or intentional misuse from inside or outside the organization
|
|
Where does the majority of information misuse come from?
|
from within--it's a people issue, not a technology issue
|
|
Hacking
|
illegally breaking into a computer system
|
|
Malware
|
techniques for causing problems in a computer system (viruses); can be used to cause malicious, unauthorized data access or data loss
|
|
DoS
|
Denial of Service Attacks - tie up server with excess large hits to deny service to legitimate users
|
|
Authentication
|
the process of giving someone permission to do or have something (i.e. passwords)
|
|
Firewalls
|
Hardware and/or software to prevent unauthorized access to private networks; secure environment provided by forcing all access through firewall; can provide protection in either direction
|
|
Encryption
|
encoding of data based on converting clear text into ciphered d text; based on complex mathematical algorithms and binary encryption keys
|
|
Two primary types of encryption
|
1. Symmetric/Single key
2. Asymmetric/A pair of keys |
|
FTP
|
File Transfer Protocol - a network protocol used to transfer data from one computer through another through a network, such as over the Internet
|
|
Symmetric Encryption
|
sender and receiver encrypt and decrypt using the same key; all involved parties must possess and protect a copy of the key; key distribution can be a problem
|
|
Asymmetric Encryption
|
a pair of mathematically related keys (one public and one private)
public key--for encryption. can be shared to many sends. sender encrypts files using the public key private key--for decryption. only the receiving party has the private key |
|
Botnets
|
The criminal use of botnets--scores of compromised computers that they take over and control to commit identity theft, launch denial-of-service attacks, and install malicious software that logs users' key strokes
|
|
C_O
I T P K S |
Chief_Officer
Information Technology Privacy Knowledge Security |
|
CIO
|
Chief Information Officer - oversees all uses of IT and assures the strategic alignment of IT with business goals and objectives
manager; leader; communicator |
|
Is employee monitoring legal?
|
YES
|