Term
What are Friedman's four flatteners? |
|
Definition
Operating System-made computers more user friendly Network-make internet more "non-geek" friendly Software-created data standards Uploading-connecting users together |
|
|
Term
What are the era's of globalization? |
|
Definition
Globalization 1.0=1400s-1800s (countries)
Gloablization 2.0=1800s-2000s (companies)
Globalization 3.0=2000s-present (individuals) |
|
|
Term
What are the four criteria for evaluating a business |
|
Definition
Valuable
Rare
Inimitable
Non-Subsitutable |
|
|
Term
Describe two ways of how Zara Demonstrates IT Competency in their Supply Chain |
|
Definition
Point of Sales Systems-cash registers that are linked to HQ
Personal Digital Assistant-handheld computers that store-managers carry around to record data |
|
|
Term
Name the Processes in a Value Chain |
|
Definition
1. Inbound Logistics
2. Operations
3. Outbound Logistics
4. Marketing and Sales
5. Service |
|
|
Term
What are 3 ways the VA hospital used IT? |
|
Definition
automate-bar codes
informate-electronic charts
transform-preventive care |
|
|
Term
What are the three steps India took to become the "King of Outsourcing?" |
|
Definition
1. Y2K-US companies hired Indian workers to help with software changes
2. dot com bust-Indian workers return to India but remain in contact with US companies
3. These engineers hire local work to conduct help |
|
|
Term
Four reasons US chose to work with India |
|
Definition
1. They speak English
2. Cultural Similarities
3. Strong education System
4. Abundance of Cheap workers |
|
|
Term
Name 6 strategies businesses can employ where network effects exist |
|
Definition
1. Move Early
2. Subsidize Product Adoption
3. Encourage Complimentary Goods
4.For newcomers, don't go it alone
5. For incumbents constantly innovate
6. Leverage Distribution channels |
|
|
Term
What are two downsides of using IT in the VA hospitals? |
|
Definition
Data Loss
Privacy Infringement |
|
|
Term
What two things determine ad placement |
|
Definition
Cost per click
Search Performance |
|
|
Term
What are the four changes in security cause by the technology? |
|
Definition
1. Changes in technical environment
2. Changes in business environment
3. Changes (lack there of) in legal environment
4. Changes in threat environment |
|
|
Term
What are the three Processes of the Gold Standard of Security? |
|
Definition
1. Authentication-verifying who is accessing the system
2. Authorization-checking what they are allowed to do
3. Audit-recording what they did |
|
|
Term
What conditions are needed for "Wisdoms of Crowds" |
|
Definition
1. Diversity of Opinions
2. Independence
3. Decentralization
4. Aggregation |
|
|
Term
What are the 4 aspects of centrality of a network |
|
Definition
1. Degree-numbers of ties to you
2. Betweenness-ability to connect others
3. Closeness-relative location to others
4. Eigenvector-the importance of who you know |
|
|
Term
What are 4 ways Social Media can impact your business? |
|
Definition
1. Marketing-can create interactive relationship with customer
2. Monitoring-keeping track of what people say about your business
3. Management-how can it improve employee efficiency
4. Operations-what can we learn by monitor social media feed |
|
|