Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
99 Cards in this Set
- Front
- Back
1. Is the Internet and Web the same?
|
No
|
|
2. An intranet is built using Web technologies, but an extranet is not.
|
False
|
|
3. Secured intranet or extranet applications usually require the use of a virtual private network (VPN)
|
True
|
|
4. What is an assigned address for each computer on the Internet called?
|
Uniform Resource Locator (URL)
|
|
5. What is the standard page description language for Web pages?
|
d) Hypertext Markup Language (HTML)
|
|
6. What is the markup language used within a Web page to describe and transfer data between Web service applications?
|
c) Extensible Markup Language (XML)
|
|
7. With what technology, phone calls and fax transmissions can be routed over the same network that is used for data?
|
a) Voice over IP (VoIP)
|
|
8. A centralized governing body controls the Internet.
|
b) False
|
|
1. The ___ market is considerably larger and is growing more rapidly than the ___ market.
|
a) B2B, B2C
|
|
2. One of the major challenges of e-commerce is to define an effective e-commerce model and strategy.
|
a) True
|
|
3. Copyright law protects authored works such as books, film, images, music, and software from unauthorized copying.
|
a) True
|
|
4. The fact that residents in cities have access to broadband Internet while those living in rural areas don’t is an example of ___
|
b) Digital divide
|
|
5. ___ entails sending bogus messages purportedly from a legitimate institution to pry personal information from customers by convincing them to go to a “spoofed” Web site.
|
c) Phishing
|
|
6. E-commerce requires merchants to always host their own Web sites.
|
b) False
|
|
7. ___ parses HTTP request, validates user identity and authorization, processes request, and return the result back to the browser.
|
d) Web server
|
|
8. ___ is the communications protocol used to keep credit card numbers and banking information secure.
|
b) Secure Sockets Layer (SSL)
|
|
1. What type of processing method waits until a number of transactions are accumulated before entering them into the computer system?
|
b) Batch processing
|
|
2. ERP systems operate via an integrated database, using one set of data to support all business functions.
|
a) True
|
|
3. A network of business entities, relationships, and processes needed to design, build, and sell a product makes up a(n)
|
c) Supply chain
|
|
4. Information for customer relationship management (CRM) is captured from all customer touch-points, such as telephone, fax, e-mail, the company's website, retail stores, and personal contact.
|
a) True
|
|
5. The target market for the hosted software model is primarily large companies.
|
False
|
|
1. What kind of decision model finds the best solution?
|
b) Optimization
|
|
2. What MISs support management in their efforts to develop, promote, and sell new products?
|
d) Marketing MISs
|
|
3. What DSS analysis sets a target value for a variable and then repeatedly changes other variables until the target value is achieved?
|
c) Goal-seeking
|
|
4. What component of a DSS is used to house models used in different functional areas?
|
b) Model base
|
|
5. A GSS contains all the components of a DSS.
|
a) True
|
|
Internet:
|
a collection of interconnected networks, all freely exchanging information
|
|
How the Internet Works
|
Internet transmits data from one computer (called a host) to another
Data is passed in chunks called packets |
|
Transmission Control Protocol (TCP):
|
widely used transport layer protocol that is used in combination with IP by most Internet applications
|
|
Internet Protocol (IP):
|
communication standard that enables traffic to be routed from one network to another as needed
|
|
Uniform Resource Locator (URL):
|
assigned address on the Internet for each computer
|
|
Several Ways to Access the Internet
|
Connect via LAN server
Connect via Serial Line Internet Protocol (SLIP)/Point-to-Point Protocol (PPP) Connect via an online service Other ways to connect cell phones, PDAs, and home appliances: e.g., wireless application protocol (WAP) for cell phones |
|
The World Wide Web
|
Also called the Web, WWW, or W3
Menu-based system that uses the client/server model Organizes Internet resources throughout the world into a series of menu pages, or screens, that appear on your computer |
|
Hypertext Markup Language (HTML):
|
standard page description language for Web pages
|
|
HTML tags:
|
let the browser know how to format text on a Web page and whether images, sound, and other elements should be inserted
|
|
Extensible Markup Language (XML):
|
markup language for Web documents containing structured information, including words, pictures, and other elements
|
|
Web browser:
|
software that creates a unique, hypermedia-based menu on a computer screen, providing a graphical interface to the Web
Menu consists of graphics, titles, and text with hypertext links |
|
Popular Web browsers:
|
Microsoft Internet Explorer, Netscape Navigator, Mozilla Firefox, Apple Computer’s Safari
|
|
Applet:
|
small program embedded in Web pages
|
|
Web browser plug-in:
|
external program that is executed by a Web browser when it is needed
|
|
Web programming language- Java
|
Object-oriented programming language from Sun Microsystems based on C++
Allows small programs (applets) to be embedded within an HTML document |
|
Web services:
|
standards and tools that streamline and simplify communication among Web sites for business and personal purposes
|
|
Internet and Web applications
|
e-mail, instant messaging, Internet cell phones, newsgroups, Web shopping
Internet phone and videoconferencing blog, vlog, podcast Content streaming Social networking Wiki … |
|
Net Issues
|
Management issues
Preventing attacks Squatting Service and speed issues Keeping up with Internet traffic and traffic on company intranets Privacy Fraud Security Unauthorized Internet sites |
|
Business-to-Business e-commerce (B2B)
|
All the participants are organizations
Focus on organizational needs and purchasing processes Useful tool for connecting business partners in a virtual supply chain to cut resupply times and reduce costs |
|
Business-to-Consumer e-commerce (B2C)
|
Customers deal directly with an organization and avoid intermediaries
Squeezes costs and inefficiencies out of supply chain Can lead to higher profits Can lead to lower prices for consumers Focus on understanding consumer behavior when using online channels |
|
Consumer-to-Consumer e-commerce (C2C)
|
Consumers selling directly to other consumers
Focus on facilitating exchange of information and goods among consumers |
|
Types of E-commerce
|
B2B
B2C C2C |
|
Multi-Stage Model for E-commerce
|
1- Search and Identification
2- Selection and Negotiation 3- Purchasing 4- Product and Service Delivery 5- After Sales service |
|
Technology Needed for Mobile Commerce
|
Improved interface between the wireless device and its user
Improved network speed Security Encryption, digital certificates Web applications that are accessible for handheld users |
|
Mobile Commerce in Perspective
|
Only 12 to 14 percent of the world’s 1.8 billion mobile phone users have ever used the Web from their phones
Obstacles of adoption? Internet Corporation for Assigned Names and Numbers (ICANN) created a .mobi domain to help attract mobile users to the Web Market for m-commerce in North America is maturing much later than in Western Europe and Japan |
|
Advantages of Electronic and Mobile Commerce
|
Improves customer service:
Increases speed and accuracy Reduces costs: Global reach: helps reduce gap between rich and poor countries |
|
Global reach:
|
helps reduce gap between rich and poor countries
|
|
Reduces costs:
|
Costs of search, collecting and processing product information, negotiating costs
|
|
Increases speed and accuracy
|
Speeds the flow of goods and information
Eliminates human data-entry error |
|
Improves customer service:
|
Information about delivery status and ability to meet customer demand
Offer creative ways of product bundling and versioning that were not possible before Unbundling of information flow from the flow of physical goods through the value chain |
|
Threats of E-commerce
|
Security
Theft of intellectual property Fraud Invasion of privacy Lack of Internet access Return on investment: difficult to forecast project costs and benefits Legal jurisdiction Taxation |
|
Theft of Intellectual Property
|
Digital Rights Management (DRM):
|
|
Fraud
|
Phishing:
Click fraud: |
|
Invasion of Consumer Privacy
|
Online profiling:
Clickstream data |
|
Lack of Internet Access
|
Digital divide
|
|
Key Technology Infrastructure Components
|
-Network, Internet
-Connection -E-commerce Software -Server Software -Server Operating System -Web server hardware |
|
Web Server Hardware
|
Storage capacity and computing power required of the Web server
|
|
Web Server Software
|
Security and identification
Retrieving and sending Web pages Web site tracking Web site development |
|
Electronic Payment Systems
|
A primary concern is the need to use identification and encryption techniques to safeguard business transactions
Digital certificate: Secure Sockets Layer (SSL): |
|
Digital certificate:
|
attachment to an e-mail message or data embedded in a Web page that verifies the identity of a sender or a Web site
|
|
Secure Sockets Layer (SSL):
|
communications protocol used to secure sensitive data
|
|
Traditional Transaction Processing Methods
|
Batch processing system
Online transaction processing (OLTP) |
|
Batch processing system
|
Computerized processing in which business transactions are accumulated over a period of time and prepared for processing as a single unit or batch
|
|
Online transaction processing (OLTP)
|
Computerized processing in which each transaction is processed immediately
|
|
Traditional Transaction Processing Applications
|
Order Processing
Purchasing Accounting |
|
Legacy System Approach
|
Separate Information storage files for different business applications
|
|
Enterprise Systems Approach
|
Consolidated Information Storage
|
|
Enterprise system:
|
ensures information can be shared across all business functions and all levels of management to support the running and managing of a business
|
|
Enterprise resource planning (ERP):
|
set of integrated programs that manage a company’s vital business operations for an entire multisite, global organization
|
|
Benefits of ERP
|
Improved access to data for operational decision making
Elimination of costly, inflexible legacy systems Improvement of work processes based on best practices Upgrade of technology infrastructure |
|
Challenges of ERP
|
Requires huge investments of cost and time
A very complex process of implementation Redesigning business processes and training employees is challenging (change is hard) Converting data from legacy systems takes time Difficulty integrating with other systems Risks in using one vendor Risks of failure are large |
|
Costs of ERP
|
Re engineering
Data Conversions Training and Change Management Software Hardware |
|
Causes of ERP Failures
|
Underestimating complexity, costs, and time for implementing ERP
Use of software suite and implementation plan used elsewhere without adapting Failure to involve employees affected by ERP Over reliance on ERP software vendor claims |
|
Supply Chain Management (SCM)
|
A cross-functional interenterprise system that uses information technology to help support and manage the links between some of a company’s key business processes and those of its suppliers, customers, and business partners
|
|
SCM Functions
|
Planning
Execution |
|
SCM Benefits
|
Faster, more accurate order processing
Reductions in inventory levels Quicker times to market Lower transaction and material costs Strategic relationship with suppliers |
|
Customer relationship management (CRM) system
|
Integrates and automates all aspects of customer encounters
|
|
Benefits of CRM
|
Identify and target best customers
Real time customization and personalization of products and services Tracking of customers and their needs, regardless of points of contact Provide consistent experience and superior service to customers |
|
Hosted software
|
No need to make a major financial investment
No need to employ a full-time IT person Reduced hardware costs and costs associated with maintaining an appropriate computer environment Some large companies are also experimenting with hosted software Provides common systems platform and business processes for transition to global centers |
|
Functional Aspects of the MIS
|
Supply Chain and Business Transactions
ERP Systems |
|
Management information system (MIS)
|
Providing the right information to the right people in the right format and at the right time
Provides managers with information that supports effective decision making and provides feedback on daily operations |
|
MIS Inputs
|
Internal data sources
TPSs and ERP systems and related databases Data warehouses and data marts Specific functional areas throughout the firm External data sources Customers, suppliers, competitors, and stockholders whose data is not already captured by the TPS Internet Extranets |
|
MIS Outputs
|
Reports
|
|
Different Decisions
|
Top Management- Unstructured, Strategic
Middle Mgmt- Semi-structured, Tactic Lower Mgmt- Structured, Operational |
|
Three Decision making models
|
Optimization model:
Satisficing model: Heuristics: |
|
Optimization model:
|
find the best solution, usually the one that will best help the organization meet its goals
|
|
Satisficing model:
|
find a good—but not necessarily the best—problem solution
|
|
Heuristics:
|
commonly accepted guidelines or procedures that usually find a good solution
|
|
Focus of a DSS is on...
|
decision-making effectiveness regarding unstructured or semistructured business problems
|
|
Components of a Decision Support System
|
Database
Model base Dialogue manager: user interface that allows decision makers to: Easily access and manipulate the DSS Use common business terms and phrases Access to the Internet, networks, and other computer-based systems |
|
Basic Types of DSS Analysis
|
What-if Analysis
Sensitivity Analysis Goal Seeking Optimization |
|
What-if Analysis –
|
end user makes changes to variables, or relationships among variables, and observes the resulting changes in the values of other variables
|
|
Sensitivity Analysis –
|
value of only one variable is changed repeatedly and the resulting changes in other variables are observed
|