Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
192 Cards in this Set
- Front
- Back
Acceptable Use Policy
|
Defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet, and specifies consequences for non-compliance.
|
|
Antivirus Software
|
Software designed to detect and often eliminate, computer viruses from an information system.
|
|
Application Controls
|
Specific controls unique to each computerized application that ensure that only authorized data are completely and accurately processed by that application.
|
|
Bio-metric Authentication
|
Technology for authenticating system users that compares a person's unique characteristics such as fingerprints, face, or retinal image, against a stored set profile of these characteristics.
|
|
Botnet
|
A group of computers that have been infected with bot malware without users' knowledge, enabling a hacker to use the amassed resources of the computers to launch distributed denial of service attacks, phishing campaigns or spam.
|
|
Bugs
|
Software program code defects.
|
|
Business Continuity Planning
|
Planning that focuses on how the company can restore business operations after a disaster strikers.
|
|
Computer Crime
|
The commission illegal acts through the use of a computer or against a computer system.
|
|
Computer Forensics
|
The scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.
|
|
Computer Virus
|
Rogue software program that attaches itself to other software programs or data files in order to be executed, often causing hardware and software malfunctions.
|
|
Controls
|
All of the methods, policies, and procedures that ensure protection of the organization's assets, accuracy and reliability of its records, and operational adherence to management standards.
|
|
Cybervandalism
|
Intentional disruption, defacement, or even destruction of a Web site or corporate information system.
|
|
Cyber Warfare
|
State-sponsored activity designed to cripple and defeat another state or nation by damaging or disrupting its computers or networks.
|
|
Deep Packet Inspection
|
Technology for managing network traffic by examining data packets, sorting out low-priority data from higher priority business-critical data, and sending packets in order of priority.
|
|
Deninal-Of-Service (DoS) Attack
|
Flooding a network server or Web server with false communications or requests for services in order to crash the network.
|
|
Digital Certificates
|
Attachments to an electronic message to verify the identity of the sender and to provide the receiver with the means to encode a reply.
|
|
Disaster Recovery Planning
|
Planning for the restoration of computer and communications services after they have been disrupted.
|
|
Distributed Denial-of-service
|
Uses numerous computers to inundate and overwhelm a network from numerous launch points.
|
|
Downtime
|
Period of time in which an information system is not operational.
|
|
Encryption
|
The coding and scrambling of messages to prevent their being read or accessed without authorization.
|
|
Evil Twin
|
Wireless networks that pretend to be legitimate Wi-Fi networks to entice participants to log on and reveal passwords or credit card numbers.
|
|
Fault Tolerant Computer Systems
|
Systems that contain extra hardware, software, and power supply components that can back a system up and keep it running to prevent system failure.
|
|
Firewall
|
Hardware and software placed between an organization's internal network and an external network to prevent outsiders from invading private networks.
|
|
General Controls
|
Overall control environment governing the design, security, and use of computer programs and the security of data files in general throughout the organization's information technology infrastructure.
|
|
Gramm-Leach-Bliley Act
|
Requires financial institutions to ensure the security and confidentiality of customer data.
|
|
Hacker
|
A person who gains unauthorized access to a computer network for profit, criminal mischief, or person pleasure.
|
|
High Availability Computing
|
Tools and technologies, including back-up hardware resources, to enable a system to recover quickly from a crash.
|
|
HIPPA
|
Law outlining medical security and privacy rules and procedures for simplifying the administration of healthcare data between healthcare providers, prayers, and plans.
|
|
Identity Management
|
Business Processes and software tools for identifying the valid users of a system and controlling their access to system resources.
|
|
Identity Theft
|
Theft of key pieces of personal information, such as credit card or social security numbers, in order to obtain merchandise and services in the name of the victim or to obtain false credentials.
|
|
Intrusion Detection Systems
|
Tools to monitor the most vulnerable points in a network to detect and deter unauthorized intruders.
|
|
Key Loggers
|
Spyware that records every keystroke made on a computer.
|
|
Malware
|
Malicious software programs such as computer viruses, worms, and Trojan horses.
|
|
Managed Security Service Providers
|
Companies that provide security management services for subscribing clients.
|
|
Online Transaction Processing
|
Transaction processing data in which transactions are entered directly into the computer system and processed immediately.
|
|
Patches
|
Small pieces of software that repair flaws in programs without disturbing the proper operation of the software.
|
|
Pharming
|
Phishing technique the redirect users to a bogus Web page, even when the individual types the correct Web page address into his or her browser.
|
|
Phishing
|
A form of spoofing involving setting up fake Web sites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data.
|
|
Public Key Encryption
|
Uses to keys one shared (or public) and one private.
|
|
Public Key Infrastructure
|
System for creating public and private keys using a certificate authority and digital certificates for authentication.
|
|
Recovery-Oriented Computing
|
Computer systems designed to recover rapidly when mishaps occur.
|
|
Risk Assessment
|
Determining the potential frequency of the occurrence of a problem and the potential damage if the problem were to occur. Used to determine the cost/benefit of a control.
|
|
Sarbanes-Oxley Act
|
Law passed in 2002 that imposes responsibility on companies and their management to protect investors by safeguarding the accuracy and integrity of financial information that is used internally and released externally.
|
|
Secure Hypertext Transfer Protocol (S-HTTP)
|
Protocol used for encrypting data flowing over the Internet; limited to individual messages.
|
|
Secure Sockets Layer (SSL)
|
Enables client and server computers to management encryption and decryption activities as they communicate with each other during a secure web session.
|
|
Security
|
Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
|
|
Security Policy
|
Statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals.
|
|
Smart Card
|
A credit-card size plastic card that stores digital information and that can be used for electronic payments in place of cash.
|
|
Sniffer
|
A type of eavesdropping program that monitors information traveling over a network.
|
|
Social Engineer
|
Tricking people into revealing their pass words by pretending to be legitimate users or members of a company in need of information.
|
|
Sppofing
|
Misrepresenting one's identity on the Internet or redirecting a Web link to an address different from the intended one, with the site masquerading as the intended destination.
|
|
Spyware
|
Technology that aids in gathering information about a person or organization without their knowledge.
|
|
SQL Injection Attack
|
Attacks against a Web site that take advantage of vulnerabilities in poorly coded SQL (a standard and common database software application) applications in order to introduce malicious program code into a company's systems and networks.
|
|
Token
|
Physical device, similar to an identification card, that is designed to prove the identity of a single user.
|
|
Trojan Horse
|
A software program that appears legitimate but contains a second hidden function that may cause a damage.
|
|
Unified Threat Management
|
Comprehensive security management tool that combines multiple security tools, including firewalls, virtual private networks, intrusion detection systems, and Web content filtering and anti-spam software.
|
|
War Driving
|
An eavesdropping technique in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic.
|
|
Worms
|
Independent Software programs that propagate themselves to disrupt the operation of computer networks or destroy data and other programs.
|
|
Analytical CRM
|
Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance.
|
|
Bullwhip effect
|
Distortion of information about the demand for a product as it passes from one entity to the next across the supply chain.
|
|
Churn Rate
|
Measurement of the number of customers who stop using or purchasing products or services from a company. Used as an indicator of the growth or decline of a firm's customer base.
|
|
Cross-Selling
|
Marketing complementary products to customers.
|
|
Customer Lifetime Value
|
Difference between revenues produced by a specific customer and the expenses for acquiring and servicing that customer minus the cost of promotional marketing over the lifetime of the customer relationship, expressed in today's dollars.
|
|
Demand Planning
|
Determining how much product a business needs to make to satisfy all its customers' demands.
|
|
Employee Relationship Management
|
Software dealing with employee issues that are closely related to CRM, such as setting objectives, employee performance management, performance-based compensation, and employee training.
|
|
Enterprise Software
|
Set of integrated modules for applications such as sales and distribution, financial accounting, materials management, production planning, and human resources that allow data to be used by multiple functions and business processes.
|
|
Just-in-time-strategy
|
Scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as they leave the assembly line.
|
|
Operational CRM
|
Customer facing applications, such as sales force automation, call center and customer service support, and marketing automation.
|
|
Partner Relationship Management
|
Automation of the firm's relationships with its selling partners using consumer data and analytical tools to improve coordination and customer sales.
|
|
Pull-based Model
|
Supply chain driven by actual customer orders or purchases so that members of the supply chain produce and deliver only what customers have ordered.
|
|
Push-based Model
|
Supply chain driven by production master schedules based on forecasts or best guesses of demand for products, and products are "pushed" to customers.
|
|
Social CRM
|
Tools enabling a business to link customer conversations, data, and relationships from social networking sites to CRM processes.
|
|
Supply Chain
|
Network of organizations and business processes for procuring materials, transferring raw material into intermediate and finished products, and distributing the finished products, and distributing the finished products to customers.
|
|
Supply Chain Planning Systems
|
Systems that enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product.
|
|
Touch Point
|
Method of firm interaction with a customer, such as telephone, e-mail, customer service desk, conventional mail, or point-of-purchase.
|
|
Affiliate Revenue Model
|
An e-commerce revenue model in which Web sites are paid as "affiliates" for sending their visitors to other sites in return for a referral fee.
|
|
Behavioral Targeting
|
Tracking the click-streams (history of clicking behavior) of individuals across multiple Web sites for the purpose of understanding their interests and intentions, and exposing them to advertisements which are uniquely suited to their interests.
|
|
B2C E-commerce
|
Electronic retailing of products and services directly to individual consumers.
|
|
B2B E-commerce
|
Electronic sales of goods and services among businesses.
|
|
Co-Location
|
A kind of Web site hosting in which firms purchase or rent a physical server computer at a hosting company's location in order to operate a Web site.
|
|
Community Providers
|
A Web site business model that creates a digital online environment where people with similar interests can transact (buy & sell goods); share interests, photos, videos; communicate with like-minded people; receive interest-related information; and even play out fantasies by adopting online personalities called avatars.
|
|
C2C E-Commerce
|
Electronic commerce consumers selling goods and services electronically to other consumers.
|
|
Cost Transparency
|
The ability of consumers to discover the actual costs merchants pay for products.
|
|
Crowdsourcing
|
Using large Internet audiences for advice, market feedback, new ideas, and solutions to business problems. Related to the 'wisdom of crowds' theory.
|
|
Customization
|
The modification of a software package to meet an organization's unique requirements without destroying the package software's integrity.
|
|
Digital Goods
|
Goods that can be delivered over a digital network.
|
|
Disintermediation
|
The removal of organizations or business process layers responsible for certain intermediary steps in a value chain.
|
|
Dynamic Pricing
|
Pricing of items based on real time interactions between buyers and sellers that determine what a item is worth at any particular moment.
|
|
Electronic Data Interchange (EDI)
|
The direct computer-to-computer exchange between two organizations of standard business transactions, such as orders, shipment instructions, or payments.
|
|
E-tailer
|
Online retail stores from the giant Amazon to tiny local stores that have Web sites where retail goods are sold.
|
|
Exchanges
|
Third party Net marketplaces that are primarily transaction oriented and that connects many buyers and suppliers for spot purchasing.
|
|
Free/Premium Revenue Model
|
An e-commerce revenue model in which a firm offers basic services or content for free, while charging a premium for advanced or high value features.
|
|
Information Asymetry
|
Situation where the relative bargaining power of two parties in a transaction is determined by one party in the transaction possessing more information essential to the transaction than the other party.
|
|
Information Density
|
The total amount and quality of information available to all market participants, consumers, and merchants.
|
|
Intellectual Property
|
Intangible property created by individuals or corporations that is subject to protections under trade secret, copyright, and patent law.
|
|
Long Tail Marketing
|
Refers to the ability of firms to profitably market goods to very small online audiences, largely because of the lower costs of reaching very small market segments. (People who fall into the long tail end of a Bell curve.)
|
|
Market Creator
|
An e-commerce business model in which firms provide a digital online environment where buyers and sellers can meet, search for products, and engage in transactions.
|
|
Market Entry Costs
|
The cost merchants must pay simply to bring their goods to market.
|
|
Marketspace
|
A marketplace extended beyond traditional boundaries and removed from a temporal and geographic location.
|
|
Menu Costs
|
Merchants' costs of changing prices.
|
|
Micro-Payment
|
Payment for a very small sum of money, often less than $10.
|
|
Mobile Commerce
|
The use of wireless devices, such as cell phones or handheld digital information appliances, to conduct both B2C e-commerce and B2B e-commerce transactions over the Internet.
|
|
Net Marketplaces
|
Digital marketplaces based on Internet technology linking many buyers to many sellers.
|
|
Personalization
|
Ability of merchants to target their marketing messages to specific individuals by adjusting the message to a person's name, interests, and past purchases.
|
|
Podcasting
|
Method of publishing audio broadcasts via the Internet, allowing subscribing users to download audio files onto their personal computers or portable music players.
|
|
Prediction Market
|
An analysis of the portfolio of potential applications within a firm to determine the risks and benefits, and to select among alternatives for information systems.
|
|
Price Discrimination
|
Selling the same goods, or nearly the same goods, to different targeted groups at different prices.
|
|
Price Transparency
|
The ease with which consumers can find out the variety of prices in a market.
|
|
Private Exchange
|
Another term for a private industrial network.
|
|
Private Industrial Networks
|
Web-enabled networks linking systems of multiple firms in an industry for the coordination of trans-organizational business processes.
|
|
Revenue Model
|
A description of how a firm will earn revenue, generate profits, and produce a return on investment.
|
|
Richness
|
Measurement of the depth and detail of information that a business can supply to the customer as well as information the business collects about the customer.
|
|
Search Costs
|
The time and money spent locating a suitable product and determining the best price for that product.
|
|
Social Graph
|
Map of all significant online social relationships, comparable to a social network describing offline relationships.
|
|
Social Shopping
|
Use of Web sites featuring user-created Web pages to share knowledge about items of interest to other shoppers.
|
|
Transaction Fee Revenue Model
|
An online e-commerce revenue model where the firm receives a fee for enabling or executing transactions.
|
|
Wisdom of Crowds
|
The belief that large numbers of people can make better decisions about a wide range of topics or products than a single person or even a small committee of experts.
|
|
Artificial Intelligence
|
The effort to develop computer-based systems that can behave like humans, with the ability to learn languages, accomplish physical tasks, use a perceptual apparatus, and emulate human expertise and decision making.
|
|
Augmented Reality
|
Technology for enhancing visualization that provides a live view of a physical world environment whose elements are augmented by virtual computer-generated imagery.
|
|
Balanced Scorecard Method
|
Framework for operationalizing a firm's strategic plan by focusing on measurable financial, business process, customer, and learning and growth outcomes of firm performance.
|
|
Case Based Reasoning (CBR)
|
Artificial intelligence technology that represents knowledge as a database of cases and solutions.
|
|
Choice
|
Simon's third stage of decision making, when the individual selects among the various solution alternatives.
|
|
Data Visualization
|
Technology for helping users see patterns and relationships in large amounts of data by presenting the data in graphical form.
|
|
Design
|
Simon's second stage of decision making, when the individual conceives of possible alternative solutions to a problem.
|
|
Digital Asset Management Systems
|
Classify, store, and distribute digital objects such as photographs, graphic images, video, and audio content.
|
|
Drill Down
|
The ability to move from summary data to lower and lower levels of detail.
|
|
Enterprise Content Management Systems
|
Help organizations manage structured and semi-structured knowledge, providing corporate repositories of documents, reports, presentations, and best practices and capabilities for collecting and organizing e-mail and graphic objects.
|
|
Enterprise-Wide Knowledge Management Systems
|
General-purpose, firm-wide systems that collect, store, distribute, and apply digital content and knowledge.
|
|
Folksonomies
|
User-created taxonomies for classifying and sharing information.
|
|
Fuzzy Logic
|
Rule-based artificial intelligence that tolerates imprecision by using non-specific terms called membership functions to solve problems.
|
|
Genetic Algorithms
|
Problem Solving methods that promote the evolution of solutions to specified problems using he model of living organisms adapting to their environment.
|
|
Geographic Information Systems
|
Systems with software that can analyze and display data using digitized maps to enhance planning and decision-making.
|
|
Group Decision-Support
|
An interactive computer-based system to facilitate the solution to unstructured problems by a set of decision makers working together as a group.
|
|
Hacker
|
A person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure.
|
|
Implementation
|
Simon's final stage of decision making, when the individual puts the decision into effect and reports on the progress of the solution.
|
|
Intelligence
|
The first of Simon;s four stages of decision making, when the individual collects information to identify problems occurring in the organization.
|
|
Intelligent Techniques
|
Technologies that aid decision makers by capturing individual and collective knowledge, discovering patterns and behaviors in very large quantities of data, and generating solutions to problems that are too large and complex for human beings to solve on their own.
|
|
Inference Engine
|
The strategy used to search through the rule base in an expert system; can be forward or backward chaining.
|
|
Intelligent Agents
|
Software programs that use a built-in or learned knowledge base to carry out specific, repetitive, and predictable tasks.
|
|
Investment Workstations
|
Powerful desktop computers for financial specialists, which are optimized to access and manipulate massive amounts of financial data.
|
|
Key Performance Indicators (KPIs)
|
Measures proposed by senior management for understanding how well the firm is performing along specified dimensions.
|
|
Knowledge Base
|
Model of human knowledge that is used by expert systems.
|
|
Knowledge Management
|
The set of process developed in an organization to create, gather, store, maintain, and disseminate the firm's knowledge.
|
|
Knowledge Network System
|
Online directory for locating corporate experts in well-defined knowledge domains.
|
|
Knowledge Work Systems
|
Information systems that aid knowledge workers in the creation and integration of new knowledge in the organization.
|
|
Learning Management System
|
Tools for the management, delivery, tracking, and assessment of various types of employee learning.
|
|
Neural Networks
|
Hardware or software that attempts to emulate the processing patterns of biological brain.
|
|
Pivot Table
|
Spreadsheet tool for reorganizing and summarizing two or more dimensions of data in a tabular format.
|
|
Semi-Structured Decisions
|
Decisions in which only part of the problem has a clear-cut answer provided by an accepted procedure.
|
|
Sensitivity Analysis
|
Models that ask "what-if" questions repeatedly to determine the impact of changes in one or more factors on the outcomes.
|
|
Social Bookmarking
|
Capability for users to save their bookmarks to Web pages on a public Web sites and tag there bookmarks with keywords to organize documents and share information with others.
|
|
Structured Knowledge
|
Knowledge in the form of structured documents and reports.
|
|
Tacit Knowledge
|
Expertise and experience of organizational members that has not been formally documented.
|
|
Unstructured Decisions
|
Non-routine decisions in which the decision maker must provide judgement, evaluation, and insights into the problem definition; there is no agreed-upon procedure for making such decisions.
|
|
Virtual Reality Systems
|
Interactive Graphics software and hardware that create computer generated simulations that provide sensations that emulate real-world activities.
|
|
Virtual Reality Modeling Language (VRML)
|
A set of specifications for interactive 3-D modeling on the World Wide Web.
|
|
Accountability
|
The mechanisms for for assessing responsibility for decisions made and actions taken.
|
|
Carpal Tunnel Syndrome (CTS)
|
Type of repetitive stress injury in which pressure on the median nerve through the wrist's bony carpal tunnel structure produces pain.
|
|
Computer Abuse
|
The commission of acts involving a computer that may not be illegal but are considered unethical.
|
|
Computer Crime
|
The commission of illegal acts through the use of a computer or against a computer system.
|
|
Computer Vision Syndrome (CVS)
|
Eyestrain condition related to computer display screen use; symptoms include headaches, blurred vision, and dry and irritated eyes.
|
|
Cookies
|
Tiny file deposited on a computer hard drive when individual visits certain Web sites. Used to identify the visitor and track visits to the Web site.
|
|
Copywright
|
A statuary grant the protects creators of intellectual property against copying by others for any purpose during the life of the author plus an additional 70 years after the author's death.
|
|
Descartes' Rule of Change
|
A principle that states that if an action cannot be taken repeatedly, then it is not right to be taken at any time.
|
|
Digital Divide
|
Large disparities in access to computers and the internet among different social groups and different locations.
|
|
Digital Millennium Copyright Act (DMCA)
|
Adjusts copyright laws to the Age by making it illegal to make, distribute, or use devices that circumvent technology-based protections of copy-righted materials.
|
|
Due Process
|
A process in which laws are well known and understood and there is an ability to appeal to higher authorities to ensure that laws are applied correctly.
|
|
Ethical "no free lunch" rule
|
Assumption that all tangible and intangible objects are owned by someone else, unless there is a specific declaration otherwise, and that the creator wants compensations for this work.
|
|
Ethics
|
Principle of right and wrong that can be used by individuals acting as free moral agents to make choices to guide their behavior.
|
|
Fair Information Practices (FIP)
|
A set of principles originally set fourth in 1973 that governs the collection and use of information about individuals and form the basic of most U.S> and European privacy laws.
|
|
Immanuel Kant's Categorical Imperative
|
A principle that states that if an action is not right for everyone to take it is not right for anyone.
|
|
Information Rights
|
The rights that individuals and organizations have with respect to information that pertains to themselves.
|
|
Informed Consent
|
Consent given with knowledge of all the facets needed to make a rational decision.
|
|
Intellectual Property
|
Intangible property created by individuals or corporations that is subject to protection under trade secret, copyright, and patent law.
|
|
Liability
|
The existence of laws that permit individuals to recover the damages done to them by other actors, systems, or organizations.
|
|
Non-Obvious Relationship Awareness (NORA)
|
Technology that can find obscure hidden connections between people or other entities by analyzing information from many different sources to correlate relationships.
|
|
Opt-in
|
Model of informed consent permitting prohibiting an organization from collecting any personal information unless the individual specifically take s action to approve information collection and use.
|
|
Opt-out
|
Model of informed consent permitting the collection of personal information until the consumer specifically requests that the data not be collected.
|
|
P3P
|
Industry standard designed to give users more control over personal information gathered on Web sites they visit. Stand for Platform for Privacy Preferences Project.
|
|
Patent
|
A legal document that grants the owner an exclusive monopoly on the ideas behind an invention for 17 years; designed to ensure that inventors of new machines or methods are rewarded for their labor while making widespread use of their inventions.
|
|
Privacy
|
The claim of individuals to be left alone, free from surveillance or interference from other individuals, organizations, or the state.
|
|
Profiling
|
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals.
|
|
Repetitive Stress Injury
|
Occupational disease that occurs when muscle groups are forced through repetitive actions with high-impact loads or thousands of repetitions with low-impact loads.
|
|
Responsibility
|
Accepting the potential costs, duties, and obligations for the decisions one makes.
|
|
Risk Aversion Principle
|
Principle that one should take the action that produces the least harm or incurs the least costs.
|
|
Safe Harbor
|
Private self-regulating policy and enforcement mechanism that meets the objectives of government regulations but does not involve government regulation or enforcement.
|
|
Spam
|
Unsolicited commercial e-mail.
|
|
Spyware
|
Technology that aids in gathering information about a person or organization without their knowledge.
|
|
Techno-stress
|
Stress induced by computer use; symptoms include aggravation, hostility toward humans, impatience, and enervation.
|
|
Trade Secrets
|
Any intellectual work or product used for a business purpose that can be classified as belonging to the business, provided it is not based on information in the public domain.
|
|
Utilitarian Principle
|
Principle that assumes one can put values in rank order and understand the consequences of various course of action.
|
|
Web Beacons
|
Tiny objects invisibly embedded in e-mail messages and Web pages that are designed to monitor the behavior of the user visiting a Web site or sending email.
|