• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/192

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

192 Cards in this Set

  • Front
  • Back
Acceptable Use Policy
Defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet, and specifies consequences for non-compliance.
Antivirus Software
Software designed to detect and often eliminate, computer viruses from an information system.
Application Controls
Specific controls unique to each computerized application that ensure that only authorized data are completely and accurately processed by that application.
Bio-metric Authentication
Technology for authenticating system users that compares a person's unique characteristics such as fingerprints, face, or retinal image, against a stored set profile of these characteristics.
Botnet
A group of computers that have been infected with bot malware without users' knowledge, enabling a hacker to use the amassed resources of the computers to launch distributed denial of service attacks, phishing campaigns or spam.
Bugs
Software program code defects.
Business Continuity Planning
Planning that focuses on how the company can restore business operations after a disaster strikers.
Computer Crime
The commission illegal acts through the use of a computer or against a computer system.
Computer Forensics
The scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.
Computer Virus
Rogue software program that attaches itself to other software programs or data files in order to be executed, often causing hardware and software malfunctions.
Controls
All of the methods, policies, and procedures that ensure protection of the organization's assets, accuracy and reliability of its records, and operational adherence to management standards.
Cybervandalism
Intentional disruption, defacement, or even destruction of a Web site or corporate information system.
Cyber Warfare
State-sponsored activity designed to cripple and defeat another state or nation by damaging or disrupting its computers or networks.
Deep Packet Inspection
Technology for managing network traffic by examining data packets, sorting out low-priority data from higher priority business-critical data, and sending packets in order of priority.
Deninal-Of-Service (DoS) Attack
Flooding a network server or Web server with false communications or requests for services in order to crash the network.
Digital Certificates
Attachments to an electronic message to verify the identity of the sender and to provide the receiver with the means to encode a reply.
Disaster Recovery Planning
Planning for the restoration of computer and communications services after they have been disrupted.
Distributed Denial-of-service
Uses numerous computers to inundate and overwhelm a network from numerous launch points.
Downtime
Period of time in which an information system is not operational.
Encryption
The coding and scrambling of messages to prevent their being read or accessed without authorization.
Evil Twin
Wireless networks that pretend to be legitimate Wi-Fi networks to entice participants to log on and reveal passwords or credit card numbers.
Fault Tolerant Computer Systems
Systems that contain extra hardware, software, and power supply components that can back a system up and keep it running to prevent system failure.
Firewall
Hardware and software placed between an organization's internal network and an external network to prevent outsiders from invading private networks.
General Controls
Overall control environment governing the design, security, and use of computer programs and the security of data files in general throughout the organization's information technology infrastructure.
Gramm-Leach-Bliley Act
Requires financial institutions to ensure the security and confidentiality of customer data.
Hacker
A person who gains unauthorized access to a computer network for profit, criminal mischief, or person pleasure.
High Availability Computing
Tools and technologies, including back-up hardware resources, to enable a system to recover quickly from a crash.
HIPPA
Law outlining medical security and privacy rules and procedures for simplifying the administration of healthcare data between healthcare providers, prayers, and plans.
Identity Management
Business Processes and software tools for identifying the valid users of a system and controlling their access to system resources.
Identity Theft
Theft of key pieces of personal information, such as credit card or social security numbers, in order to obtain merchandise and services in the name of the victim or to obtain false credentials.
Intrusion Detection Systems
Tools to monitor the most vulnerable points in a network to detect and deter unauthorized intruders.
Key Loggers
Spyware that records every keystroke made on a computer.
Malware
Malicious software programs such as computer viruses, worms, and Trojan horses.
Managed Security Service Providers
Companies that provide security management services for subscribing clients.
Online Transaction Processing
Transaction processing data in which transactions are entered directly into the computer system and processed immediately.
Patches
Small pieces of software that repair flaws in programs without disturbing the proper operation of the software.
Pharming
Phishing technique the redirect users to a bogus Web page, even when the individual types the correct Web page address into his or her browser.
Phishing
A form of spoofing involving setting up fake Web sites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data.
Public Key Encryption
Uses to keys one shared (or public) and one private.
Public Key Infrastructure
System for creating public and private keys using a certificate authority and digital certificates for authentication.
Recovery-Oriented Computing
Computer systems designed to recover rapidly when mishaps occur.
Risk Assessment
Determining the potential frequency of the occurrence of a problem and the potential damage if the problem were to occur. Used to determine the cost/benefit of a control.
Sarbanes-Oxley Act
Law passed in 2002 that imposes responsibility on companies and their management to protect investors by safeguarding the accuracy and integrity of financial information that is used internally and released externally.
Secure Hypertext Transfer Protocol (S-HTTP)
Protocol used for encrypting data flowing over the Internet; limited to individual messages.
Secure Sockets Layer (SSL)
Enables client and server computers to management encryption and decryption activities as they communicate with each other during a secure web session.
Security
Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
Security Policy
Statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals.
Smart Card
A credit-card size plastic card that stores digital information and that can be used for electronic payments in place of cash.
Sniffer
A type of eavesdropping program that monitors information traveling over a network.
Social Engineer
Tricking people into revealing their pass words by pretending to be legitimate users or members of a company in need of information.
Sppofing
Misrepresenting one's identity on the Internet or redirecting a Web link to an address different from the intended one, with the site masquerading as the intended destination.
Spyware
Technology that aids in gathering information about a person or organization without their knowledge.
SQL Injection Attack
Attacks against a Web site that take advantage of vulnerabilities in poorly coded SQL (a standard and common database software application) applications in order to introduce malicious program code into a company's systems and networks.
Token
Physical device, similar to an identification card, that is designed to prove the identity of a single user.
Trojan Horse
A software program that appears legitimate but contains a second hidden function that may cause a damage.
Unified Threat Management
Comprehensive security management tool that combines multiple security tools, including firewalls, virtual private networks, intrusion detection systems, and Web content filtering and anti-spam software.
War Driving
An eavesdropping technique in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic.
Worms
Independent Software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs.
Analytical CRM
Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance.
Bullwhip effect
Distortion of information about the demand for a product as it passes from one entity to the next across the supply chain.
Churn Rate
Measurement of the number of customers who stop using or purchasing products or services from a company. Used as an indicator of the growth or decline of a firm's customer base.
Cross-Selling
Marketing complementary products to customers.
Customer Lifetime Value
Difference between revenues produced by a specific customer and the expenses for acquiring and servicing that customer minus the cost of promotional marketing over the lifetime of the customer relationship, expressed in today's dollars.
Demand Planning
Determining how much product a business needs to make to satisfy all its customers' demands.
Employee Relationship Management
Software dealing with employee issues that are closely related to CRM, such as setting objectives, employee performance management, performance-based compensation, and employee training.
Enterprise Software
Set of integrated modules for applications such as sales and distribution, financial accounting, materials management, production planning, and human resources that allow data to be used by multiple functions and business processes.
Just-in-time-strategy
Scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line.
Operational CRM
Customer facing applications, such as sales force automation, call center and customer service support, and marketing automation.
Partner Relationship Management
Automation of the firm's relationships with its selling partners using consumer data and analytical tools to improve coordination and customer sales.
Pull-based Model
Supply chain driven by actual customer orders or purchases so that members of the supply chain produce and deliver only what customers have ordered.
Push-based Model
Supply chain driven by production master schedules based on forecasts or best guesses of demand for products, and products are "pushed" to customers.
Social CRM
Tools enabling a business to link customer conversations, data, and relationships from social networking sites to CRM processes.
Supply Chain
Network of organizations and business processes for procuring materials, transferring raw material into intermediate and finished products, and distributing the finished products, and distributing the finished products to customers.
Supply Chain Planning Systems
Systems that enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product.
Touch Point
Method of firm interaction with a customer, such as telephone, e-mail, customer service desk, conventional mail, or point-of-purchase.
Affiliate Revenue Model
An e-commerce revenue model in which Web sites are paid as "affiliates" for sending their visitors to other sites in return for a referral fee.
Behavioral Targeting
Tracking the click-streams (history of clicking behavior) of individuals across multiple Web sites for the purpose of understanding their interests and intentions, and exposing them to advertisements which are uniquely suited to their interests.
B2C E-commerce
Electronic retailing of products and services directly to individual consumers.
B2B E-commerce
Electronic sales of goods and services among businesses.
Co-Location
A kind of Web site hosting in which firms purchase or rent a physical server computer at a hosting company's location in order to operate a Web site.
Community Providers
A Web site business model that creates a digital online environment where people with similar interests can transact (buy & sell goods); share interests, photos, videos; communicate with like-minded people; receive interest-related information; and even play out fantasies by adopting online personalities called avatars.
C2C E-Commerce
Electronic commerce consumers selling goods and services electronically to other consumers.
Cost Transparency
The ability of consumers to discover the actual costs merchants pay for products.
Crowdsourcing
Using large Internet audiences for advice, market feedback, new ideas, and solutions to business problems. Related to the 'wisdom of crowds' theory.
Customization
The modification of a software package to meet an organization's unique requirements without destroying the package software's integrity.
Digital Goods
Goods that can be delivered over a digital network.
Disintermediation
The removal of organizations or business process layers responsible for certain intermediary steps in a value chain.
Dynamic Pricing
Pricing of items based on real time interactions between buyers and sellers that determine what a item is worth at any particular moment.
Electronic Data Interchange (EDI)
The direct computer-to-computer exchange between two organizations of standard business transactions, such as orders, shipment instructions, or payments.
E-tailer
Online retail stores from the giant Amazon to tiny local stores that have Web sites where retail goods are sold.
Exchanges
Third party Net marketplaces that are primarily transaction oriented and that connects many buyers and suppliers for spot purchasing.
Free/Premium Revenue Model
An e-commerce revenue model in which a firm offers basic services or content for free, while charging a premium for advanced or high value features.
Information Asymetry
Situation where the relative bargaining power of two parties in a transaction is determined by one party in the transaction possessing more information essential to the transaction than the other party.
Information Density
The total amount and quality of information available to all market participants, consumers, and merchants.
Intellectual Property
Intangible property created by individuals or corporations that is subject to protections under trade secret, copyright, and patent law.
Long Tail Marketing
Refers to the ability of firms to profitably market goods to very small online audiences, largely because of the lower costs of reaching very small market segments. (People who fall into the long tail end of a Bell curve.)
Market Creator
An e-commerce business model in which firms provide a digital online environment where buyers and sellers can meet, search for products, and engage in transactions.
Market Entry Costs
The cost merchants must pay simply to bring their goods to market.
Marketspace
A marketplace extended beyond traditional boundaries and removed from a temporal and geographic location.
Menu Costs
Merchants' costs of changing prices.
Micro-Payment
Payment for a very small sum of money, often less than $10.
Mobile Commerce
The use of wireless devices, such as cell phones or handheld digital information appliances, to conduct both B2C e-commerce and B2B e-commerce transactions over the Internet.
Net Marketplaces
Digital marketplaces based on Internet technology linking many buyers to many sellers.
Personalization
Ability of merchants to target their marketing messages to specific individuals by adjusting the message to a person's name, interests, and past purchases.
Podcasting
Method of publishing audio broadcasts via the Internet, allowing subscribing users to download audio files onto their personal computers or portable music players.
Prediction Market
An analysis of the portfolio of potential applications within a firm to determine the risks and benefits, and to select among alternatives for information systems.
Price Discrimination
Selling the same goods, or nearly the same goods, to different targeted groups at different prices.
Price Transparency
The ease with which consumers can find out the variety of prices in a market.
Private Exchange
Another term for a private industrial network.
Private Industrial Networks
Web-enabled networks linking systems of multiple firms in an industry for the coordination of trans-organizational business processes.
Revenue Model
A description of how a firm will earn revenue, generate profits, and produce a return on investment.
Richness
Measurement of the depth and detail of information that a business can supply to the customer as well as information the business collects about the customer.
Search Costs
The time and money spent locating a suitable product and determining the best price for that product.
Social Graph
Map of all significant online social relationships, comparable to a social network describing offline relationships.
Social Shopping
Use of Web sites featuring user-created Web pages to share knowledge about items of interest to other shoppers.
Transaction Fee Revenue Model
An online e-commerce revenue model where the firm receives a fee for enabling or executing transactions.
Wisdom of Crowds
The belief that large numbers of people can make better decisions about a wide range of topics or products than a single person or even a small committee of experts.
Artificial Intelligence
The effort to develop computer-based systems that can behave like humans, with the ability to learn languages, accomplish physical tasks, use a perceptual apparatus, and emulate human expertise and decision making.
Augmented Reality
Technology for enhancing visualization that provides a live view of a physical world environment whose elements are augmented by virtual computer-generated imagery.
Balanced Scorecard Method
Framework for operationalizing a firm's strategic plan by focusing on measurable financial, business process, customer, and learning and growth outcomes of firm performance.
Case Based Reasoning (CBR)
Artificial intelligence technology that represents knowledge as a database of cases and solutions.
Choice
Simon's third stage of decision making, when the individual selects among the various solution alternatives.
Data Visualization
Technology for helping users see patterns and relationships in large amounts of data by presenting the data in graphical form.
Design
Simon's second stage of decision making, when the individual conceives of possible alternative solutions to a problem.
Digital Asset Management Systems
Classify, store, and distribute digital objects such as photographs, graphic images, video, and audio content.
Drill Down
The ability to move from summary data to lower and lower levels of detail.
Enterprise Content Management Systems
Help organizations manage structured and semi-structured knowledge, providing corporate repositories of documents, reports, presentations, and best practices and capabilities for collecting and organizing e-mail and graphic objects.
Enterprise-Wide Knowledge Management Systems
General-purpose, firm-wide systems that collect, store, distribute, and apply digital content and knowledge.
Folksonomies
User-created taxonomies for classifying and sharing information.
Fuzzy Logic
Rule-based artificial intelligence that tolerates imprecision by using non-specific terms called membership functions to solve problems.
Genetic Algorithms
Problem Solving methods that promote the evolution of solutions to specified problems using he model of living organisms adapting to their environment.
Geographic Information Systems
Systems with software that can analyze and display data using digitized maps to enhance planning and decision-making.
Group Decision-Support
An interactive computer-based system to facilitate the solution to unstructured problems by a set of decision makers working together as a group.
Hacker
A person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure.
Implementation
Simon's final stage of decision making, when the individual puts the decision into effect and reports on the progress of the solution.
Intelligence
The first of Simon;s four stages of decision making, when the individual collects information to identify problems occurring in the organization.
Intelligent Techniques
Technologies that aid decision makers by capturing individual and collective knowledge, discovering patterns and behaviors in very large quantities of data, and generating solutions to problems that are too large and complex for human beings to solve on their own.
Inference Engine
The strategy used to search through the rule base in an expert system; can be forward or backward chaining.
Intelligent Agents
Software programs that use a built-in or learned knowledge base to carry out specific, repetitive, and predictable tasks.
Investment Workstations
Powerful desktop computers for financial specialists, which are optimized to access and manipulate massive amounts of financial data.
Key Performance Indicators (KPIs)
Measures proposed by senior management for understanding how well the firm is performing along specified dimensions.
Knowledge Base
Model of human knowledge that is used by expert systems.
Knowledge Management
The set of process developed in an organization to create, gather, store, maintain, and disseminate the firm's knowledge.
Knowledge Network System
Online directory for locating corporate experts in well-defined knowledge domains.
Knowledge Work Systems
Information systems that aid knowledge workers in the creation and integration of new knowledge in the organization.
Learning Management System
Tools for the management, delivery, tracking, and assessment of various types of employee learning.
Neural Networks
Hardware or software that attempts to emulate the processing patterns of biological brain.
Pivot Table
Spreadsheet tool for reorganizing and summarizing two or more dimensions of data in a tabular format.
Semi-Structured Decisions
Decisions in which only part of the problem has a clear-cut answer provided by an accepted procedure.
Sensitivity Analysis
Models that ask "what-if" questions repeatedly to determine the impact of changes in one or more factors on the outcomes.
Social Bookmarking
Capability for users to save their bookmarks to Web pages on a public Web sites and tag there bookmarks with keywords to organize documents and share information with others.
Structured Knowledge
Knowledge in the form of structured documents and reports.
Tacit Knowledge
Expertise and experience of organizational members that has not been formally documented.
Unstructured Decisions
Non-routine decisions in which the decision maker must provide judgement, evaluation, and insights into the problem definition; there is no agreed-upon procedure for making such decisions.
Virtual Reality Systems
Interactive Graphics software and hardware that create computer generated simulations that provide sensations that emulate real-world activities.
Virtual Reality Modeling Language (VRML)
A set of specifications for interactive 3-D modeling on the World Wide Web.
Accountability
The mechanisms for for assessing responsibility for decisions made and actions taken.
Carpal Tunnel Syndrome (CTS)
Type of repetitive stress injury in which pressure on the median nerve through the wrist's bony carpal tunnel structure produces pain.
Computer Abuse
The commission of acts involving a computer that may not be illegal but are considered unethical.
Computer Crime
The commission of illegal acts through the use of a computer or against a computer system.
Computer Vision Syndrome (CVS)
Eyestrain condition related to computer display screen use; symptoms include headaches, blurred vision, and dry and irritated eyes.
Cookies
Tiny file deposited on a computer hard drive when individual visits certain Web sites. Used to identify the visitor and track visits to the Web site.
Copywright
A statuary grant the protects creators of intellectual property against copying by others for any purpose during the life of the author plus an additional 70 years after the author's death.
Descartes' Rule of Change
A principle that states that if an action cannot be taken repeatedly, then it is not right to be taken at any time.
Digital Divide
Large disparities in access to computers and the internet among different social groups and different locations.
Digital Millennium Copyright Act (DMCA)
Adjusts copyright laws to the Age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copy-righted materials.
Due Process
A process in which laws are well known and understood and there is an ability to appeal to higher authorities to ensure that laws are applied correctly.
Ethical "no free lunch" rule
Assumption that all tangible and intangible objects are owned by someone else, unless there is a specific declaration otherwise, and that the creator wants compensations for this work.
Ethics
Principle of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behavior.
Fair Information Practices (FIP)
A set of principles originally set fourth in 1973 that governs the collection and use of information about individuals and form the basic of most U.S> and European privacy laws.
Immanuel Kant's Categorical Imperative
A principle that states that if an action is not right for everyone to take it is not right for anyone.
Information Rights
The rights that individuals and organizations have with respect to information that pertains to themselves.
Informed Consent
Consent given with knowledge of all the facets needed to make a rational decision.
Intellectual Property
Intangible property created by individuals or corporations that is subject to protection under trade secret, copyright, and patent law.
Liability
The existence of laws that permit individuals to recover the damages done to them by other actors, systems, or organizations.
Non-Obvious Relationship Awareness (NORA)
Technology that can find obscure hidden connections between people or other entities by analyzing information from many different sources to correlate relationships.
Opt-in
Model of informed consent permitting prohibiting an organization from collecting any personal information unless the individual specifically take s action to approve information collection and use.
Opt-out
Model of informed consent permitting the collection of personal information until the consumer specifically requests that the data not be collected.
P3P
Industry standard designed to give users more control over personal information gathered on Web sites they visit. Stand for Platform for Privacy Preferences Project.
Patent
A legal document that grants the owner an exclusive monopoly on the ideas behind an invention for 17 years; designed to ensure that inventors of new machines or methods are rewarded for their labor while making widespread use of their inventions.
Privacy
The claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state.
Profiling
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals.
Repetitive Stress Injury
Occupational disease that occurs when muscle groups are forced through repetitive actions with high-impact loads or thousands of repetitions with low-impact loads.
Responsibility
Accepting the potential costs, duties, and obligations for the decisions one makes.
Risk Aversion Principle
Principle that one should take the action that produces the least harm or incurs the least costs.
Safe Harbor
Private self-regulating policy and enforcement mechanism that meets the objectives of government regulations but does not involve government regulation or enforcement.
Spam
Unsolicited commercial e-mail.
Spyware
Technology that aids in gathering information about a person or organization without their knowledge.
Techno-stress
Stress induced by computer use; symptoms include aggravation, hostility toward humans, impatience, and enervation.
Trade Secrets
Any intellectual work or product used for a business purpose that can be classified as belonging to the business, provided it is not based on information in the public domain.
Utilitarian Principle
Principle that assumes one can put values in rank order and understand the consequences of various course of action.
Web Beacons
Tiny objects invisibly embedded in e-mail messages and Web pages that are designed to monitor the behavior of the user visiting a Web site or sending email.