Term
Organizations typically operate by |
|
Definition
functional areas or functional silos |
|
|
Term
Functional Areas/Silos are..and include... |
|
Definition
-independent -Sales, Accounting, HR, Logistics, and Operations and operate with marketing |
|
|
Term
Porter’s Five Forces Model determines ... |
|
Definition
- the relative attractiveness of an industry Feed into Rivalry Among Competitors -Threats of Substitute -Threats of new entrants Feed with Rivalry Among Cometitors -Supplier power -and Buying Power (of channel members and end users) |
|
|
Term
The Value Chain support value activities |
|
Definition
Firm Infrastructure 3% HR Management 7% Technology Development 4% Procurement 27% |
|
|
Term
Value Chain Primary Value Activities |
|
Definition
Receive and store Raw Materials 5% Make product 40% Deliver Product 6% Market and sell product 4% Service after sale 2% |
|
|
Term
|
Definition
A broad, general term that describes nonproprietary IT hardware and software made availa6{'~y 'the standards and procedures by which their products work, making it easier to integrate them |
|
|
Term
Which information culture has employees who trust each other to use information about problems to improve performance? |
|
Definition
|
|
Term
In Porter's fi ve forces model, whi ch of the fo llowing forces i~ when competition is ~erce -in a market? |
|
Definition
rivalry among existing competitors |
|
|
Term
Consider Porter's three generic strategies, which is most appropriate when the ~ ~cope of the market is narrow and the cost strategy is low? |
|
Definition
|
|
Term
According to Peter Drucker, what are managers who "get the most from each resource," addressing? |
|
Definition
|
|
Term
Which part of the value chain consists of human resources management and Research & develoment? |
|
Definition
|
|
Term
The number of customers an organization "touches" for the first time and persuades to purchase its products is an effectiveness IT metric referred to as: |
|
Definition
|
|
Term
The officer responsible for developing strategies and IT safeguards against attacks from hackers and viruses is: |
|
Definition
|
|
Term
The amount of time a system takes to cOl}lPlete a financial exchange/interaction with a customer is what type of Efliciency IT Metric? |
|
Definition
|
|
Term
Who is the author of the New York Times Best Seller, "The World is FIatT |
|
Definition
|
|
Term
According to the author or the New York Times Best Seller, "The World is Flat," what is the major thesis that supports the notion or a " nat" world? |
|
Definition
information teehnolog\' has reduced ba rrie rs for doing business across the globe. |
|
|
Term
What is the study of the impact that changes in one (or more) parts of the model have on other parts of the model? |
|
Definition
|
|
Term
|
Definition
Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information. |
|
|
Term
What integrates information from multiple components and presents it in a unified display? |
|
Definition
|
|
Term
What is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users? |
|
Definition
|
|
Term
Which type of model represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes? |
|
Definition
|
|
Term
Which of the following is an example of analytical information? |
|
Definition
A) Trend projection B) Sales projection C) Product statistics all |
|
|
Term
Invisible to the external customer but essential to the effective management of the business and include goal setting, day-to-day planning, performance feedback, rewards, and resource allocation |
|
Definition
a business facing process |
|
|
Term
What factor significantly contributed to people’s needs to use information systems to make decisions? |
|
Definition
The amount of information people must understand to make good decisions is increasing exponentially |
|
|
Term
The ability to look at information from different perspectives |
|
Definition
is slice-and-dice capability |
|
|
Term
What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem? |
|
Definition
|
|
Term
Which company has “The Wall of Shaygan”, which is a digital dashboard that tracks 100-plus IT systems on a single screen? |
|
Definition
|
|
Term
Which company used BPR to change its industry by implementing a mobile claims process? |
|
Definition
|
|
Term
Budget forecasting is a.... |
|
Definition
is a business facing process |
|
|
Term
What integrates all of an organization’s business process to make individual processes more efficient? |
|
Definition
Business process management |
|
|
Term
What is a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint? |
|
Definition
Business process model -As-is-order fulfillment process (customer, sales, billing, inventory, shipping) -To-be process model... |
|
|
Term
The real world vs. the Model World |
|
Definition
Real World - includes problem statement and solution through formulation reach the.. -Model World which includes assumptions and model structures..analysis..Results and conclusions. -Then through interpretation (translation, communication) the Solution in the real world is reached. |
|
|
Term
an approach to conducting electronic business on the Internet |
|
Definition
|
|
Term
E-business model includes what channels? |
|
Definition
|
|
Term
the ability to purchase goods and services through a wireless Internet-enabled device |
|
Definition
|
|
Term
Wireless Devices connect to |
|
Definition
wireless provider to the internet to M-Commerce marketplaces (e-mail, news, stocks, etc.) |
|
|
Term
What is a glohal hypertext system that uses the Internet as its transport mechanism? |
|
Definition
|
|
Term
What is information richness? |
|
Definition
refers to the depth and breadth of information transferred between customers and businesses |
|
|
Term
What is a business that operates on the Internet only without a physical store? |
|
Definition
|
|
Term
Which of the following offers an extensive array of unique services such as its own version of a web browser? |
|
Definition
Online service provider (aSP) |
|
|
Term
What is a family of web feed formats used for web syndication of programs and content |
|
Definition
|
|
Term
What is disruptive technology? |
|
Definition
new way of doing things that initially does not meet the needs of existing customers |
|
|
Term
What is an internalized portion of the Internet, protected from outside access, that allows an organization to provide access to information and application software to only its employees? |
|
Definition
|
|
Term
Which of the following is not an online business payment method? |
|
Definition
ARE -Fin. EDI -EDI are NOT -Electronic Check -BBPP -Digital Wallet -Financial Cybermediary (consumer methods) |
|
|
Term
count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser? |
|
Definition
|
|
Term
Which of the following represents any consumer that sells a product or service to a business over the Internet? |
|
Definition
|
|
Term
downtime affects 4 areas of business |
|
Definition
-financial performance (revenue recognition, cash flow, payment guarentees, credit rating, stick price.) -Revenue (direct loss, compensatory payments, lost future revenue, billing losses, investment losses, productivity losses) -Damaged Reputation (customers, suppliers, financial markets, banks, business partners) -other expenses (temp. employees, equipment rentals, overtime cost, chipping charges, travel expense, legal obligations) |
|
|
Term
|
Definition
details the extent to which email messages may be read by others -1.should compliment ethical computer use policy. 2.defines who are legitimate email users 3.identifies backup procedures 4.explains legitimate grounds for reading user email 5.informs email control 6.explans ramifications of leaving 7.asks employees to be careful when posting organizational info. |
|
|
Term
"information has no ethics" |
|
Definition
-information doesn't care how it's used -information will not stop itself from sending spam or viruses -information can't delete or preserve itself. |
|
|
Term
|
Definition
court system ruled microsoft (netscape) monopoly |
|
|
Term
|
Definition
youtube clip of viral marketing with woman and fake baby |
|
|
Term
|
Definition
Bernie Madoff $50 bil ponzie scheme |
|
|
Term
downtime severity and frequency |
|
Definition
-s: how much you loose -f: how often you loose -probability distribution tells how much reserves are needed |
|
|
Term
first line of security defense? |
|
Definition
|
|
Term
Five steps to creating an information security plan |
|
Definition
Develop the information security policies Communicate the information security policies Identify critical information assets and risks Test and reevaluate risks Obtain stakeholder support |
|
|
Term
second line of security defense? |
|
Definition
technology -authentication (password), authorization (level of access) -prevention (filtering, encryption ), resistance (firewalls) -detection (antivirus), response (antivirus quarantines) |
|
|
Term
Hacker Tpyes (update definitions) |
|
Definition
-White Hat -Black Hat -Hactivist -Script Kiddies/bunnies -Cracker -Cyberterrorist |
|
|
Term
Security Threats to businesses include |
|
Definition
-elevation of privilege, hoaxes, malicious code, spoofing, spyware, sniffer, packet tampering |
|
|
Term
Types of Virus' (update definitions) |
|
Definition
Worm, DoS, DDoS, Trojan Horse Virus, Backdoor program, Polymorphic virus and worm |
|
|
Term
|
Definition
FERPA Homeland Security Act Patriot Act Freedom of Information Act Sarbanes Oxley |
|
|
Term
What states that you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes? |
|
Definition
|
|
Term
the following is considered an ePolicy |
|
Definition
A) Acceptable use policy B) Internet use policy C) Ethical computer use policy |
|
|
Term
The Freedom of Information Act allows |
|
Definition
any person to examine government records unless it causes an invasion of privacy. |
|
|
Term
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident? |
|
Definition
|
|
Term
three primary information security areas? |
|
Definition
A) Authentication and authorization B) Prevention and response C) Detection and response |
|
|
Term
What is a method for confirming users' identities? |
|
Definition
|
|
Term
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information? |
|
Definition
|
|
Term
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender? |
|
Definition
|
|
Term
What is the legal protection afforded to an expression of an idea, such as a song, video game, and some types of proprietary documents? |
|
Definition
|
|
Term
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions? |
|
Definition
Ethical computer use policy |
|
|
Term
Which of the following is part of the acceptable use policy stipulations? |
|
Definition
A) Not using the service as part of violating any law
B) Not attempting to break the security of any computer network or user
C) Not posting commercial messages to groups without prior permission |
|
|
Term
What is a program, when installed on a computer, records every keystroke and mouse click? |
|
Definition
|
|
Term
Which of the following represents the estimated percentage that spam accounts for in an organizations’ email traffic? |
|
Definition
|
|
Term
Using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker |
|
Definition
|
|