• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/67

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

67 Cards in this Set

  • Front
  • Back
B2C
a type of e-commerce--Business to Consumer

i.e. web storefront
What type of e-commerce is Target.com an example of?
B2C -- Business to Consumer (web storefront)
B2B
a type of e-commerce--Business to Business

i.e. sales between companies
B2G
a type of e-commerce--Business to Government
What is the dominant type of e-commerce?
B2B - Business to Business (because every activity in a supply chain is pretty much B2B until the final step)
Electronic Marketplace
(e-marketplace)
Interactive business communities providing a central market where multiple buyers and sellers can engage in e-business activities

i.e. madeinchina.com
Reverse Auction
buyers use this to purchase a product or service, and the seller with the lowest bid is selected
E-Business
the conducting of business on the internet including, not only buying and selling, but also serving customers and collaborating with business partners
Intranet
internalized portion of the Internet, protected from outside access, for employees
Extranet
an intranet that is available to strategic allies
Disintermediation
elimination of middle layers in the supply chain, especially wholesale and retail links
Re-intermediation
using the internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways

recent developments in e-business has shown a spark in re-intermediation
Web 2.0
Users add value! databases that get better when people use them

internet without deliberate refresh (real time updates)
SaaS/On-Demand Software/Thin Client
applications that run on a server somewhere in Internet cloud
SOA
Service-Oriented Architecture;

techniques to model every activity as a service and interactions among services
Service
Standardized and repeatable task that a business performs
Encapsulation
places logic for a service in one place and all other services go to it for that service
Information hiding
the principle of hiding design decisions in a computer program that are most likely to change, thus protecting other parts of the program from change if the design decision is changed
Social Networks
online communities of people who share interests and activities, or who are interested in exploring the interests or activities of others
Information Silos
data isolated in separated information systems; created over time as personal and workgroup support applications are implemented; silos duplicate data and become serious problems as organizations grow
BPR
Business Process Re-engineering; the analysis and redesign of workflow within and between enterprises
What is the difference between BPR and BPM
BPR seeks to totally redesign the system within an organization, so it is slow, difficult, and exceedingly expensive

BPM seeks to redesign at the business process level, so it is more agile and efficient
Inherent Processes
pre-designed procedures for using software products; based on industry-best practices
CRM
Customer Relationship Management; a suite of applications, a database, and a set of inherent processes for managing all interactions with the customer, from lead generation to customer service
ERP
Enterprise Resource Planning

suite of applications, a database, and set of inherent processes for consolidating business operations into a single, consistent, computing platform
Core ERP components
1. accounting & finance
2. production and materials management
3. human resource
EAI
Enterprise Application Integration

1. suite of software to integrate existing applications together;
2. connects system "islands" via new software layer
3. enables existing applications to communicate and share data
4. provides integrated information
5. leverage existing systems--leaving functional applications as is, but providing integration top layer
6. enables gradual move to ERP
What are the problems with new enterprise systems?
1. Collaborative Management
2. Requirement Gaps
3. Transition Problems
4. Employee Resistance
Information Systems Development
Process of creating and maintaining information systems; involve all 5 IS components
What is the single most important criterion for information systems success?
For users to take ownership of their systems
What are the 5 major challenges in system development?
1. the difficulty in determining requirements
2. changes in requirements
3. difficulties involving scheduling and budgeting
4. changing technology
5. Diseconomies of scales (more workers = lower average contribution per worker)
What is the number one cause of IT failure?
complexity
What is the approximate annual cost of IT failure?
$6 trillion ($1 trillion in US)
SDLC
Software Development Life Cycle--5 steps

Pre-Life Cycle: Business-Planning Process
1. System Definition
2. Requirement Analysis
3. Component Design
4. Implementation
5. System Maintenance
Systems Definition Phase
1st step of SDLC

involves establishing a high-level plan of the intended project and determining project goals

asses project feasibility; select a system; develop the project plan; form a leadership team
Requirement Analysis Phase
Step 2 of SDLC

identify features and functions. analyze end-user business requirements and refine project goals into defined functions and operations of the intended system

gather business requirements; create process diagrams
Scope Creep
a problem found in the SDLC, this occurs when the scope increases
Feature Creep
a problem found in the SDLC, this occurs when extra features are added
Component Design Phase
Step 3 of SDLC

Involves describing the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation

design the IT infrastructure; design system model
Implementation Phase
Step 4 of SDLC

purchase, build, test, and convert to the new system

develop the IT infrastructure; develop the system; test all functionalities along with development by developers
In what step of SDLC does training occur?
Implementation phase
4 Different Types of Implementation
1. Parallel
2. Direct
3. Phased
4. Pilot
Parallel Implementation
old and new systems are used at the same time
Direct Implementation
old system is discontinued on one day and the new system is used on the next
Phased Implementation
Parts of the new system are implemented over time
Pilot Implementation
Entire system is used in one location
System Maintenance Phase
Step 5 of SDLC

bug fix, add new features, maintain

help desk support; perform system maintenance; support system changes
Open Source (3 Components)
1. Free Redistribution
2. Source Code
3. Derived Work
Free Redistribution
one of the 3 components of open source

the license shall not protect any party from selling or giving away the software as a component of an aggregated software distribution containing programs for several different sources. The license shall not require a royalty or other fee for such sale
Source Code
one of the 3 components of open source

the program must include source code, and must allow distribution in source code as well as compiled form
Derived Works
one of the 3 components of open source

the license must allow modifications and derived works, and must allow them to be distributed under the same terms as the license of the original software
Information Security
the protection of information from accidental or intentional misuse from inside or outside the organization
Where does the majority of information misuse come from?
from within--it's a people issue, not a technology issue
Hacking
illegally breaking into a computer system
Malware
techniques for causing problems in a computer system (viruses); can be used to cause malicious, unauthorized data access or data loss
DoS
Denial of Service Attacks - tie up server with excess large hits to deny service to legitimate users
Authentication
the process of giving someone permission to do or have something (i.e. passwords)
Firewalls
Hardware and/or software to prevent unauthorized access to private networks; secure environment provided by forcing all access through firewall; can provide protection in either direction
Encryption
encoding of data based on converting clear text into ciphered d text; based on complex mathematical algorithms and binary encryption keys
Two primary types of encryption
1. Symmetric/Single key
2. Asymmetric/A pair of keys
FTP
File Transfer Protocol - a network protocol used to transfer data from one computer through another through a network, such as over the Internet
Symmetric Encryption
sender and receiver encrypt and decrypt using the same key; all involved parties must possess and protect a copy of the key; key distribution can be a problem
Asymmetric Encryption
a pair of mathematically related keys (one public and one private)

public key--for encryption. can be shared to many sends. sender encrypts files using the public key

private key--for decryption. only the receiving party has the private key
Botnets
The criminal use of botnets--scores of compromised computers that they take over and control to commit identity theft, launch denial-of-service attacks, and install malicious software that logs users' key strokes
C_O

I
T
P
K
S
Chief_Officer

Information
Technology
Privacy
Knowledge
Security
CIO
Chief Information Officer - oversees all uses of IT and assures the strategic alignment of IT with business goals and objectives

manager; leader; communicator
Is employee monitoring legal?
YES