• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/214

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

214 Cards in this Set

  • Front
  • Back
disruptive technology
a new way of doing things that initially does not meet the needs of existing customers
Digital Darwinism
implies that organizations which cannot adapt to the new demands placed on them for surviving in the info age are doomed to extinction
sustaining technology
produces an improved product customers are eager to buy
World Wide Web
a global hypertext system that uses the Internet as its transport mechanism
HTTP
the Internet standard that supports the exchange of information on the WWW.
digital divide
when those with access to technology have great advantages over those who don't.
Web 2.0
a set of economic, social, and technology trends that collectively form the basis for the next generation of the Internet
web mashup
a website or web application that uses content from more than one source to create a completely new service
API
a set of routines, protocols, and tools for building software applications.
mashup editors
provide a visual interface to build a mashup
semantic web
an evolving extension of the WWW in which web content can be expressed not only in natural language, but also in a format that can be read and used by software agents
SOA
a business-driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services
intranet
an internalized portion of the Internet, protected from outside access
extranet
an intranet that is available to strategic allies
portal
a website that offers a broad array of resources and services, such as email, online discussion groups, search engines, and online shopping malls
kiosk
a publicly accessible computer system that has been set up to allow interactive information browsing
ISP
a company that provides individuals and other companies access to the Internet along with additional related services, such as website building
WISP
an ISP that allows subscribers to connect to a server at designated hotspots or access points using a wireless connection
OSP (online service provider)
offers an extensive array of unique services such as its own version of a web browser
ASP (application service provider)
a company that offers an organization access over the Internet to systems and related services that would otherwise have to be located in personal or organizational computers
service level agreement (SLA)
defines the specific responsibilities of the service provider and set the customer expectations
Ecommerce
the buying and selling of goods and services over the internet
Ebusiness
the conducting of business on the Internet, not only buying and selling, but also serving customers and collaborating with business partners
ebusiness model
an approach to conducting electronic business on the Internet
Business-to-business (B2B)
businesses buying from and selling to each other over the Internet
Electronic marketplaces (emarketplaces)
interactive business communities providing a central market where multiple buyers and sellers can engage in ebusiness activities
Business-to-consumer (B2C)
applies to any business that sells its products or services to consumers over the Internet
eshop
a version of a retail store where customers can shop at any hour of the day without leaving their home or office
emall
a number of eshops; a gateway through which a visitor can access other eshops
Consumer-to-business (C2B)
applies to any consumer that sells a product or service to a business over the Internet
Consumer-to-consumer (C2C)
applies to sites primarily offering goods and services to assist consumers interacting with each other over the Internet
Brick-and-mortar business
a business that operates in a physical store without an Internet presence
Pure-play business
a business that operates on the Internet only without a physical store
Click-and-mortar business
a business that operates in a physical store and on the Internet
online ad
a box running across a web page that is often used to contain advertisements
pop-up ad
a small web page containing an advertisement that appears on the web page outside of the current website loaded in the browser
pop-under ad
a form of a pop-up that users to not see until they close the current web browser screen
Associate programs
allow businesses to generate commissions or royalties from an Internet site
Viral marketing
a technique that induces websites or users to pass on a marketing message to other websites or users
Mass customization
the ability of an organization to give its customers the opportunity to tailor its products or services to the customers' specifications
Personalization
occurs when a website can know enough about a person's likes and dislikes that it can fashion offers that are more likely to appeal to that person
blog
a website in which items are posted on a regular basis and displayed in reverse chronological order
Real simple syndications (RSS)
a family of web feed formats used for web syndication of programs and content
Podcasting
the distribution of audio or video files, such as radio programs or music videos, over the Internet to play on mobile devices and personal computers
Search engine optimization (SEO)
a set of methods aimed at improving the ranking of a website in search engine listings
Electronic data interchange (EDI)
a standard format for exchanging business data
value-added network (VAN)
a private network, provided by a third party, for exchanging information through a high-capacity connection
Financial EDI
a standard electronic process for B2B market purchase payments
Maintenance, repair, and operations (MRO) materials, aka indirect materials
necessary for running an organization, but do not relate to the company's primary business activities
Eprocurement
the B2B purchase and sale of supplies and services over the Internet
electronic catalog
presents customers with information about goods and services offered for sale, bid, or auction over the Internet
Intermediaries
agents, software, or businesses that bring buyers and sellers together that provide a trading infrastructure to enhance ebusiness
Encryption
scrambles information into an alternative form that requires a key or password to decrypt the information
secure socket layer (SSL)
creates a secure and private connection between a client and server computer, encrypts the info, and sends the info over the Internet
secure electronic transaction (SET)
a transmission security method that ensures transactions are secure and legitimate
Reintermediation
using the Internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways
Interactivity
measures the visitor interactions with the target ad
clickstream data
data about the exact pattern of a consumer's navigation through a site
cookie
a small file deposited on a hard drive by a website containing information about customers and their web activities
click-through
a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser
banner ad
advertises the products and services of another business, usually another dot-com business
Egovernment
involves the use of strategies and technologies to transform governments by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government
Mobile commerce (mcommerce)
the ability to purchase goods and services through a wireless Internet-enabled device
ethics
the principles and standards that guide our behavior toward other people
intellectual property
intangible creative work that is embodied in physical form
copyright
the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents
fair use doctrine
in certain situations, it is legal to use copyrighted material
pirated software
the unauthorized use, duplication, distribution, or sale of copyrighted software
counterfeit software
software that is manufactured to look like the real thing and sold as such
privacy
the right to be left alone when you want to be...
confidentiality
the assurance that messages and information are available only to those who are authorized to view them.
Epolicies
policies and procedures that address the ethical use of computers and Internet usage in the business environment
ethical computer use policy
contains general principles to guide computer user behavior
information privacy policy
contains general principles regarding information privacy
acceptable use policy (AUP)
a policy that a user must agree to follow in order to be provided access to a network or to the Internet
Nonrepudiation
a contractual stipulation to ensure that ebusiness participants do not deny their online actions
mail bomb
sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
email privacy policy
details the extent to which email messages may be read by others
Internet use policy
contains general principles to guide the proper use of the Internet
Spam
unsolicited email
anti-spam policy
states that email users will not send unsolicited emails
Information technology monitoring
tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed
key logger
a program that, when installed on a computer, records every keystroke and mouse click
hardware key logger
a hardware device that captures keystrokes on their journey from the keyboard to the motherboard
cookie
a small file deposited on a hard drive by a website containing information about customers and their web activities
adware
software that generates ads that install themselves on a computer when a person downloads some other program from the Internet
spyware
software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about
web log
consists of one line of information for every visitor to a website and is usually stored on a web server
clickstream
records information about a customer during a web surfing session such as what websites were visited, how long the visit was, what ads were viewed, and what was purchased
Information security
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
insiders
legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
Social engineering
using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
information security policies
identify the rules required to maintain information security
information security plan
details how an organization will implement the information security policies
authentication
a method for confirming users' identities
authorization
the process of giving someone permission to do or have something
identity theft
forging someone's identity for the purpose of fraud
phishing
a technique to gain personal information for the purpose of identity theft
tokens
small electronic devices that change user passwords automatically
smart card
a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing
Biometrics
the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
content filtering
when organizations use software that filters content to prevent the transmission of unauthorized information
encryption
scrambles information into an alternative form that requires a key or password to decrypt the info
public key encryption (PKE)
an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient
firewall
hardware and/or software that guards a private network by analyzing the information leaving and entering that network
white-hat hackers
work at the request of the system owners to find system vulnerabilities and plug the holes
black-hat hackers
break into other people's computer systems and may just look around or may steal and destroy information
hactivists
have philosophical and political reasons for breaking into systems and will often deface the website as a protest
script kiddies/ script bunnies
find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses
cracker
a hacker with criminal intent
cyberterrorists
seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction
worm
a type of virus that spreads itself, not only from file to file, but also from computer to computer. Does not need to attach to anything to spread
denial-of-service attack (DoS)
floods a website with so many requests for service that it slows down or crashes the site
distributed denial-of-service attack (DDoS)
attacks from multiple computers that flood a website with so many requests for service that it slows down or crashes
trojan-horse virus
hides inside other software, usually as an attachment or a downloadable file
backdoor programs
viruses that open a way into the network for future attacks
polymorphic viruses and worms
change their form as they propogate
elevation of privilege
a process by which a user misleads a system into granting unauthorized rights
hoaxes
attack computer systems by transmitting a virus hoax, with a real virus attached
malicious code
includes a variety of threats such as viruses, worms, and Trojan horses
spoofing
the forging of the return address on an email so that the message appears to come from someone other than the actual sender
spyware
software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about
sniffer
a program or device that can monitor data traveling over a network
packet tampering
altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network
Enterprise architectures (EA)
include the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets
enterprise architect
a person grounded in technology, fluent in business, and provides the important bridge between IT and the business
Information architecture
identifies where and how important information, such as customer records, is maintained and secured
Infrastructure architecture
includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals
application architecture
determines how applications integrate and relate to each other
backup
an exact copy of a system's information
recovery
the ability to get a system up and running in the event of a system crash or failure
fault tolerance
a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
failover
a backup in which the functions of a computer component are assumed by secondary system components when the primary component becomes unavailable
disaster recovery plan
a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood
hot site
a separate and fully equipped facility where the company can move immediately after a disaster and resume business
cold site
a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster
disaster recovery cost curve
charts the cost to the organization of the unavailability of information and technology and the cost to the organization of recovering from a disaster over time
business continuity planning (BCP)
a plan for how an organization will recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption
capacity planning
determines the future IT infrastructure requirements for new equipment and additional network capacity
reliability
ensures all systems are functioning correctly and providing accurate information
availability
addresses when systems can be accessed by users
high availability
refers to a system or component that is continuously operational for a desirably long length of time
performance
measures how quickly a system performs a certain process or transaction
web services
contain a repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
interoperability
the capability of two ore more computer systems to share data and resources, even though they are made by different manufacturers
open system
a broad, general term that described nonproprietary IT hardware and software mad available by the standards and procedures by which their products work, making it easier to integrate them
open source
refers to any program whose source code is made available for use or modification as users or other developers see fit
services
a business task
loose coupling
the capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional components
Extensible Markup Language (XML)
a markup language for documents containing structured information
virtualization
a framework of dividing the resources of a computer into multiple execution environments
system virtualization
the ability to present the resources of a single computer as if it is a collection of separate computers each with its own virtual CPUs, network interfaces, storage, and OS
grid computing
an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data
CRM
involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability
CRM reporting technologies
help organizations identify their customers across other applications
CRM analysis technologies
help organizations segment their customers into categories such as best and worst customers
CRM predicting technologies
help organizations make prediction regarding customer behavior such a which customers are at risk of leaving
Operational CRM
supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers
Analytical CRM
supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers
list generators
compile customer information from a variety of sources and segment the information for different marketing campaigns
campaign management systems
guide users through marketing campaigns performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis
cross-selling
selling additional products or services to a customer
up-selling
increasing the value of the sale
sales force automation (SFA)
a system that automatically tracks all of the steps in the sales process
sales management CRM systems
automate each phase of the sales process, helping individual sales representatives coordinate and organize all of their accounts
contact management CRM system
maintains customer contact information and identifies prospective customers for future sales
opportunity management CRM system
targets sales opportunities by finding new customers or companies for future sales
contact center (call center)
where customer service representatives (CSRs) answer customer inquiries and respond to problems through a number of different customer touchpoints
click-to-talk
allow customers to click on a button and talk with a CSR via the Internet
Call scripting systems
access organizational databases that track similar issues or questions and automatically generate the details for the CSR who can than relay them to the customer
personalization
occurs when a website can know enough about a person's likes and dislikes to fashion offers that are more likely to appeal to that person
supplier relationship management (SRM)
focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects, which optimizes supplier selection
partner relationship management (PRM)
focuses on keeping vendors satisfied by managing alliance partner and reseller relationships that provide customers with the optimal sales channel
employee relationship management (ERM)
provides employees with a subset of CRM applications available through a web browser
Business intelligence (BI)
refers to applications and technologies that are used to gather, provide access to, and analyze data and information to support decision making efforts
data latency
the time duration to make data ready for analysis and loading the data into the database
analysis latency
the time from which data are made available to the time when analysis is complete
decision latency
the time it takes a human to comprehend the analytic result and determine an appropriate action
data mining
the process of analyzing data to extract information not offerd by the raw data alone
data mining tools
use a variety of techniques to find patterns and relationships in large volumes of information and infer rules from them that predict future behavior and guide decision making
classification
assign records to one of a predefined set of classes
estimation
determine values for an unknown continuous variable behavior or estimated future value
affinity grouping
determine which things go together
clustering
segment a heterogeneous population of records into a number of more homogeneous subgroups
cluster analysis
a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible
market basket analysis
analyzes such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services
statistical analysis
performs such functions as information correlations, distributions, calculations, and variance analysis
forecasts
predictions made on the basis of time-series information
time-series information
time-stamped information collected at a particular frequency
workflow
defines all the steps or business rules, from beginning to end, required for a business process
workflow management system
facilitates the automation and management of business processes and controls the movement of work throughout the business process
knowledge management
involves capturing, classifying, evaluating, sharing information in a way that provides context for effective decisions and actions
knowledge management system
supports the capturing and use of an org's "knowhow"
core competency
an organization's key strength, a business function that it does better than any of its competitors
core competency strategy
a strategy in which an organization chooses to focus specifically on what it does best
information partnership
when two or more organizations cooperate by integrating their IT systems, thereby providing customers with the best of what each can offer
collaboration system
an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information
unstructured collaboration
includes document exchange, shared whiteboards, discussion forums, and email
structured collaboration
involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules
explicit knowledge
consists of anything that can be documented, archived, and codified
tacit knowledge
the knowledge contained in people's heads
social networking analysis
a process of mapping a group's contacts to identify who knows whom and who works with whom
content management system
provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment
wikis
web-based tools that make it easy for users to add, remove, and change online content
business wikis
collaborative web pages that allow users to edit documents, share ideas, or monitor the status of a project
document management system (DMS)
supports the electronic capturing, storage, distribution, archiving, and accessing of documents
digital asset management system (DAM)
generally works with binary rather than text files
web content management system (WCM)
enables publishing content both to intranets and to public websites
messaging based workflow systems
send work assignments through an email system
database-based workflow systems
store documents in a central location and automatically ask the team members to access the document when it is their turn to edit it
groupware
software that supports team interaction and dynamics including calendaring, scheduling, and videoconferencing
videoconference
set of interactive telecommunication technologies that allow two or more locations to interact via two-way video and audio transmissions simultaneously
web conferencing
blends audio, video, and document-sharing technology to create virtual meeting rooms where people gather at a password-protected website
instant messaging
a type of communications service that enables someone to create a kind of private chat room with another individual in order to communicate in real-time over the Internet