Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
214 Cards in this Set
- Front
- Back
disruptive technology
|
a new way of doing things that initially does not meet the needs of existing customers
|
|
Digital Darwinism
|
implies that organizations which cannot adapt to the new demands placed on them for surviving in the info age are doomed to extinction
|
|
sustaining technology
|
produces an improved product customers are eager to buy
|
|
World Wide Web
|
a global hypertext system that uses the Internet as its transport mechanism
|
|
HTTP
|
the Internet standard that supports the exchange of information on the WWW.
|
|
digital divide
|
when those with access to technology have great advantages over those who don't.
|
|
Web 2.0
|
a set of economic, social, and technology trends that collectively form the basis for the next generation of the Internet
|
|
web mashup
|
a website or web application that uses content from more than one source to create a completely new service
|
|
API
|
a set of routines, protocols, and tools for building software applications.
|
|
mashup editors
|
provide a visual interface to build a mashup
|
|
semantic web
|
an evolving extension of the WWW in which web content can be expressed not only in natural language, but also in a format that can be read and used by software agents
|
|
SOA
|
a business-driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services
|
|
intranet
|
an internalized portion of the Internet, protected from outside access
|
|
extranet
|
an intranet that is available to strategic allies
|
|
portal
|
a website that offers a broad array of resources and services, such as email, online discussion groups, search engines, and online shopping malls
|
|
kiosk
|
a publicly accessible computer system that has been set up to allow interactive information browsing
|
|
ISP
|
a company that provides individuals and other companies access to the Internet along with additional related services, such as website building
|
|
WISP
|
an ISP that allows subscribers to connect to a server at designated hotspots or access points using a wireless connection
|
|
OSP (online service provider)
|
offers an extensive array of unique services such as its own version of a web browser
|
|
ASP (application service provider)
|
a company that offers an organization access over the Internet to systems and related services that would otherwise have to be located in personal or organizational computers
|
|
service level agreement (SLA)
|
defines the specific responsibilities of the service provider and set the customer expectations
|
|
Ecommerce
|
the buying and selling of goods and services over the internet
|
|
Ebusiness
|
the conducting of business on the Internet, not only buying and selling, but also serving customers and collaborating with business partners
|
|
ebusiness model
|
an approach to conducting electronic business on the Internet
|
|
Business-to-business (B2B)
|
businesses buying from and selling to each other over the Internet
|
|
Electronic marketplaces (emarketplaces)
|
interactive business communities providing a central market where multiple buyers and sellers can engage in ebusiness activities
|
|
Business-to-consumer (B2C)
|
applies to any business that sells its products or services to consumers over the Internet
|
|
eshop
|
a version of a retail store where customers can shop at any hour of the day without leaving their home or office
|
|
emall
|
a number of eshops; a gateway through which a visitor can access other eshops
|
|
Consumer-to-business (C2B)
|
applies to any consumer that sells a product or service to a business over the Internet
|
|
Consumer-to-consumer (C2C)
|
applies to sites primarily offering goods and services to assist consumers interacting with each other over the Internet
|
|
Brick-and-mortar business
|
a business that operates in a physical store without an Internet presence
|
|
Pure-play business
|
a business that operates on the Internet only without a physical store
|
|
Click-and-mortar business
|
a business that operates in a physical store and on the Internet
|
|
online ad
|
a box running across a web page that is often used to contain advertisements
|
|
pop-up ad
|
a small web page containing an advertisement that appears on the web page outside of the current website loaded in the browser
|
|
pop-under ad
|
a form of a pop-up that users to not see until they close the current web browser screen
|
|
Associate programs
|
allow businesses to generate commissions or royalties from an Internet site
|
|
Viral marketing
|
a technique that induces websites or users to pass on a marketing message to other websites or users
|
|
Mass customization
|
the ability of an organization to give its customers the opportunity to tailor its products or services to the customers' specifications
|
|
Personalization
|
occurs when a website can know enough about a person's likes and dislikes that it can fashion offers that are more likely to appeal to that person
|
|
blog
|
a website in which items are posted on a regular basis and displayed in reverse chronological order
|
|
Real simple syndications (RSS)
|
a family of web feed formats used for web syndication of programs and content
|
|
Podcasting
|
the distribution of audio or video files, such as radio programs or music videos, over the Internet to play on mobile devices and personal computers
|
|
Search engine optimization (SEO)
|
a set of methods aimed at improving the ranking of a website in search engine listings
|
|
Electronic data interchange (EDI)
|
a standard format for exchanging business data
|
|
value-added network (VAN)
|
a private network, provided by a third party, for exchanging information through a high-capacity connection
|
|
Financial EDI
|
a standard electronic process for B2B market purchase payments
|
|
Maintenance, repair, and operations (MRO) materials, aka indirect materials
|
necessary for running an organization, but do not relate to the company's primary business activities
|
|
Eprocurement
|
the B2B purchase and sale of supplies and services over the Internet
|
|
electronic catalog
|
presents customers with information about goods and services offered for sale, bid, or auction over the Internet
|
|
Intermediaries
|
agents, software, or businesses that bring buyers and sellers together that provide a trading infrastructure to enhance ebusiness
|
|
Encryption
|
scrambles information into an alternative form that requires a key or password to decrypt the information
|
|
secure socket layer (SSL)
|
creates a secure and private connection between a client and server computer, encrypts the info, and sends the info over the Internet
|
|
secure electronic transaction (SET)
|
a transmission security method that ensures transactions are secure and legitimate
|
|
Reintermediation
|
using the Internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways
|
|
Interactivity
|
measures the visitor interactions with the target ad
|
|
clickstream data
|
data about the exact pattern of a consumer's navigation through a site
|
|
cookie
|
a small file deposited on a hard drive by a website containing information about customers and their web activities
|
|
click-through
|
a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser
|
|
banner ad
|
advertises the products and services of another business, usually another dot-com business
|
|
Egovernment
|
involves the use of strategies and technologies to transform governments by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government
|
|
Mobile commerce (mcommerce)
|
the ability to purchase goods and services through a wireless Internet-enabled device
|
|
ethics
|
the principles and standards that guide our behavior toward other people
|
|
intellectual property
|
intangible creative work that is embodied in physical form
|
|
copyright
|
the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents
|
|
fair use doctrine
|
in certain situations, it is legal to use copyrighted material
|
|
pirated software
|
the unauthorized use, duplication, distribution, or sale of copyrighted software
|
|
counterfeit software
|
software that is manufactured to look like the real thing and sold as such
|
|
privacy
|
the right to be left alone when you want to be...
|
|
confidentiality
|
the assurance that messages and information are available only to those who are authorized to view them.
|
|
Epolicies
|
policies and procedures that address the ethical use of computers and Internet usage in the business environment
|
|
ethical computer use policy
|
contains general principles to guide computer user behavior
|
|
information privacy policy
|
contains general principles regarding information privacy
|
|
acceptable use policy (AUP)
|
a policy that a user must agree to follow in order to be provided access to a network or to the Internet
|
|
Nonrepudiation
|
a contractual stipulation to ensure that ebusiness participants do not deny their online actions
|
|
mail bomb
|
sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
|
|
email privacy policy
|
details the extent to which email messages may be read by others
|
|
Internet use policy
|
contains general principles to guide the proper use of the Internet
|
|
Spam
|
unsolicited email
|
|
anti-spam policy
|
states that email users will not send unsolicited emails
|
|
Information technology monitoring
|
tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed
|
|
key logger
|
a program that, when installed on a computer, records every keystroke and mouse click
|
|
hardware key logger
|
a hardware device that captures keystrokes on their journey from the keyboard to the motherboard
|
|
cookie
|
a small file deposited on a hard drive by a website containing information about customers and their web activities
|
|
adware
|
software that generates ads that install themselves on a computer when a person downloads some other program from the Internet
|
|
spyware
|
software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about
|
|
web log
|
consists of one line of information for every visitor to a website and is usually stored on a web server
|
|
clickstream
|
records information about a customer during a web surfing session such as what websites were visited, how long the visit was, what ads were viewed, and what was purchased
|
|
Information security
|
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
|
|
insiders
|
legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
|
|
Social engineering
|
using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
|
|
information security policies
|
identify the rules required to maintain information security
|
|
information security plan
|
details how an organization will implement the information security policies
|
|
authentication
|
a method for confirming users' identities
|
|
authorization
|
the process of giving someone permission to do or have something
|
|
identity theft
|
forging someone's identity for the purpose of fraud
|
|
phishing
|
a technique to gain personal information for the purpose of identity theft
|
|
tokens
|
small electronic devices that change user passwords automatically
|
|
smart card
|
a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing
|
|
Biometrics
|
the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
|
|
content filtering
|
when organizations use software that filters content to prevent the transmission of unauthorized information
|
|
encryption
|
scrambles information into an alternative form that requires a key or password to decrypt the info
|
|
public key encryption (PKE)
|
an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient
|
|
firewall
|
hardware and/or software that guards a private network by analyzing the information leaving and entering that network
|
|
white-hat hackers
|
work at the request of the system owners to find system vulnerabilities and plug the holes
|
|
black-hat hackers
|
break into other people's computer systems and may just look around or may steal and destroy information
|
|
hactivists
|
have philosophical and political reasons for breaking into systems and will often deface the website as a protest
|
|
script kiddies/ script bunnies
|
find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses
|
|
cracker
|
a hacker with criminal intent
|
|
cyberterrorists
|
seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction
|
|
worm
|
a type of virus that spreads itself, not only from file to file, but also from computer to computer. Does not need to attach to anything to spread
|
|
denial-of-service attack (DoS)
|
floods a website with so many requests for service that it slows down or crashes the site
|
|
distributed denial-of-service attack (DDoS)
|
attacks from multiple computers that flood a website with so many requests for service that it slows down or crashes
|
|
trojan-horse virus
|
hides inside other software, usually as an attachment or a downloadable file
|
|
backdoor programs
|
viruses that open a way into the network for future attacks
|
|
polymorphic viruses and worms
|
change their form as they propogate
|
|
elevation of privilege
|
a process by which a user misleads a system into granting unauthorized rights
|
|
hoaxes
|
attack computer systems by transmitting a virus hoax, with a real virus attached
|
|
malicious code
|
includes a variety of threats such as viruses, worms, and Trojan horses
|
|
spoofing
|
the forging of the return address on an email so that the message appears to come from someone other than the actual sender
|
|
spyware
|
software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about
|
|
sniffer
|
a program or device that can monitor data traveling over a network
|
|
packet tampering
|
altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network
|
|
Enterprise architectures (EA)
|
include the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets
|
|
enterprise architect
|
a person grounded in technology, fluent in business, and provides the important bridge between IT and the business
|
|
Information architecture
|
identifies where and how important information, such as customer records, is maintained and secured
|
|
Infrastructure architecture
|
includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals
|
|
application architecture
|
determines how applications integrate and relate to each other
|
|
backup
|
an exact copy of a system's information
|
|
recovery
|
the ability to get a system up and running in the event of a system crash or failure
|
|
fault tolerance
|
a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service
|
|
failover
|
a backup in which the functions of a computer component are assumed by secondary system components when the primary component becomes unavailable
|
|
disaster recovery plan
|
a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood
|
|
hot site
|
a separate and fully equipped facility where the company can move immediately after a disaster and resume business
|
|
cold site
|
a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster
|
|
disaster recovery cost curve
|
charts the cost to the organization of the unavailability of information and technology and the cost to the organization of recovering from a disaster over time
|
|
business continuity planning (BCP)
|
a plan for how an organization will recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption
|
|
capacity planning
|
determines the future IT infrastructure requirements for new equipment and additional network capacity
|
|
reliability
|
ensures all systems are functioning correctly and providing accurate information
|
|
availability
|
addresses when systems can be accessed by users
|
|
high availability
|
refers to a system or component that is continuously operational for a desirably long length of time
|
|
performance
|
measures how quickly a system performs a certain process or transaction
|
|
web services
|
contain a repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
|
|
interoperability
|
the capability of two ore more computer systems to share data and resources, even though they are made by different manufacturers
|
|
open system
|
a broad, general term that described nonproprietary IT hardware and software mad available by the standards and procedures by which their products work, making it easier to integrate them
|
|
open source
|
refers to any program whose source code is made available for use or modification as users or other developers see fit
|
|
services
|
a business task
|
|
loose coupling
|
the capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional components
|
|
Extensible Markup Language (XML)
|
a markup language for documents containing structured information
|
|
virtualization
|
a framework of dividing the resources of a computer into multiple execution environments
|
|
system virtualization
|
the ability to present the resources of a single computer as if it is a collection of separate computers each with its own virtual CPUs, network interfaces, storage, and OS
|
|
grid computing
|
an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data
|
|
CRM
|
involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability
|
|
CRM reporting technologies
|
help organizations identify their customers across other applications
|
|
CRM analysis technologies
|
help organizations segment their customers into categories such as best and worst customers
|
|
CRM predicting technologies
|
help organizations make prediction regarding customer behavior such a which customers are at risk of leaving
|
|
Operational CRM
|
supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers
|
|
Analytical CRM
|
supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers
|
|
list generators
|
compile customer information from a variety of sources and segment the information for different marketing campaigns
|
|
campaign management systems
|
guide users through marketing campaigns performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis
|
|
cross-selling
|
selling additional products or services to a customer
|
|
up-selling
|
increasing the value of the sale
|
|
sales force automation (SFA)
|
a system that automatically tracks all of the steps in the sales process
|
|
sales management CRM systems
|
automate each phase of the sales process, helping individual sales representatives coordinate and organize all of their accounts
|
|
contact management CRM system
|
maintains customer contact information and identifies prospective customers for future sales
|
|
opportunity management CRM system
|
targets sales opportunities by finding new customers or companies for future sales
|
|
contact center (call center)
|
where customer service representatives (CSRs) answer customer inquiries and respond to problems through a number of different customer touchpoints
|
|
click-to-talk
|
allow customers to click on a button and talk with a CSR via the Internet
|
|
Call scripting systems
|
access organizational databases that track similar issues or questions and automatically generate the details for the CSR who can than relay them to the customer
|
|
personalization
|
occurs when a website can know enough about a person's likes and dislikes to fashion offers that are more likely to appeal to that person
|
|
supplier relationship management (SRM)
|
focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects, which optimizes supplier selection
|
|
partner relationship management (PRM)
|
focuses on keeping vendors satisfied by managing alliance partner and reseller relationships that provide customers with the optimal sales channel
|
|
employee relationship management (ERM)
|
provides employees with a subset of CRM applications available through a web browser
|
|
Business intelligence (BI)
|
refers to applications and technologies that are used to gather, provide access to, and analyze data and information to support decision making efforts
|
|
data latency
|
the time duration to make data ready for analysis and loading the data into the database
|
|
analysis latency
|
the time from which data are made available to the time when analysis is complete
|
|
decision latency
|
the time it takes a human to comprehend the analytic result and determine an appropriate action
|
|
data mining
|
the process of analyzing data to extract information not offerd by the raw data alone
|
|
data mining tools
|
use a variety of techniques to find patterns and relationships in large volumes of information and infer rules from them that predict future behavior and guide decision making
|
|
classification
|
assign records to one of a predefined set of classes
|
|
estimation
|
determine values for an unknown continuous variable behavior or estimated future value
|
|
affinity grouping
|
determine which things go together
|
|
clustering
|
segment a heterogeneous population of records into a number of more homogeneous subgroups
|
|
cluster analysis
|
a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible
|
|
market basket analysis
|
analyzes such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services
|
|
statistical analysis
|
performs such functions as information correlations, distributions, calculations, and variance analysis
|
|
forecasts
|
predictions made on the basis of time-series information
|
|
time-series information
|
time-stamped information collected at a particular frequency
|
|
workflow
|
defines all the steps or business rules, from beginning to end, required for a business process
|
|
workflow management system
|
facilitates the automation and management of business processes and controls the movement of work throughout the business process
|
|
knowledge management
|
involves capturing, classifying, evaluating, sharing information in a way that provides context for effective decisions and actions
|
|
knowledge management system
|
supports the capturing and use of an org's "knowhow"
|
|
core competency
|
an organization's key strength, a business function that it does better than any of its competitors
|
|
core competency strategy
|
a strategy in which an organization chooses to focus specifically on what it does best
|
|
information partnership
|
when two or more organizations cooperate by integrating their IT systems, thereby providing customers with the best of what each can offer
|
|
collaboration system
|
an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information
|
|
unstructured collaboration
|
includes document exchange, shared whiteboards, discussion forums, and email
|
|
structured collaboration
|
involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules
|
|
explicit knowledge
|
consists of anything that can be documented, archived, and codified
|
|
tacit knowledge
|
the knowledge contained in people's heads
|
|
social networking analysis
|
a process of mapping a group's contacts to identify who knows whom and who works with whom
|
|
content management system
|
provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment
|
|
wikis
|
web-based tools that make it easy for users to add, remove, and change online content
|
|
business wikis
|
collaborative web pages that allow users to edit documents, share ideas, or monitor the status of a project
|
|
document management system (DMS)
|
supports the electronic capturing, storage, distribution, archiving, and accessing of documents
|
|
digital asset management system (DAM)
|
generally works with binary rather than text files
|
|
web content management system (WCM)
|
enables publishing content both to intranets and to public websites
|
|
messaging based workflow systems
|
send work assignments through an email system
|
|
database-based workflow systems
|
store documents in a central location and automatically ask the team members to access the document when it is their turn to edit it
|
|
groupware
|
software that supports team interaction and dynamics including calendaring, scheduling, and videoconferencing
|
|
videoconference
|
set of interactive telecommunication technologies that allow two or more locations to interact via two-way video and audio transmissions simultaneously
|
|
web conferencing
|
blends audio, video, and document-sharing technology to create virtual meeting rooms where people gather at a password-protected website
|
|
instant messaging
|
a type of communications service that enables someone to create a kind of private chat room with another individual in order to communicate in real-time over the Internet
|