Term
| Organizations typically operate by |
|
Definition
| functional areas or functional silos |
|
|
Term
| Functional Areas/Silos are..and include... |
|
Definition
-independent -Sales, Accounting, HR, Logistics, and Operations and operate with marketing |
|
|
Term
| Porter’s Five Forces Model determines ... |
|
Definition
- the relative attractiveness of an industry Feed into Rivalry Among Competitors -Threats of Substitute -Threats of new entrants Feed with Rivalry Among Cometitors -Supplier power -and Buying Power (of channel members and end users) |
|
|
Term
| The Value Chain support value activities |
|
Definition
Firm Infrastructure 3% HR Management 7% Technology Development 4% Procurement 27% |
|
|
Term
| Value Chain Primary Value Activities |
|
Definition
Receive and store Raw Materials 5% Make product 40% Deliver Product 6% Market and sell product 4% Service after sale 2% |
|
|
Term
|
Definition
A broad, general term that describes nonproprietary IT hardware and software made availa6{'~y 'the standards and procedures by which their products work, making it easier to integrate them |
|
|
Term
Which information culture has employees who trust each other to use information about problems to improve performance? |
|
Definition
|
|
Term
In Porter's fi ve forces model, whi ch of the fo llowing forces i~ when competition is ~erce -in a market? |
|
Definition
| rivalry among existing competitors |
|
|
Term
Consider Porter's three generic strategies, which is most appropriate when the ~ ~cope of the market is narrow and the cost strategy is low? |
|
Definition
|
|
Term
According to Peter Drucker, what are managers who "get the most from each resource," addressing? |
|
Definition
|
|
Term
| Which part of the value chain consists of human resources management and Research & develoment? |
|
Definition
|
|
Term
The number of customers an organization "touches" for the first time and persuades to purchase its products is an effectiveness IT metric referred to as: |
|
Definition
|
|
Term
The officer responsible for developing strategies and IT safeguards against attacks from hackers and viruses is: |
|
Definition
|
|
Term
The amount of time a system takes to cOl}lPlete a financial exchange/interaction with a customer is what type of Efliciency IT Metric? |
|
Definition
|
|
Term
| Who is the author of the New York Times Best Seller, "The World is FIatT |
|
Definition
|
|
Term
According to the author or the New York Times Best Seller, "The World is Flat," what is the major thesis that supports the notion or a " nat" world? |
|
Definition
| information teehnolog\' has reduced ba rrie rs for doing business across the globe. |
|
|
Term
| What is the study of the impact that changes in one (or more) parts of the model have on other parts of the model? |
|
Definition
|
|
Term
|
Definition
| Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information. |
|
|
Term
| What integrates information from multiple components and presents it in a unified display? |
|
Definition
|
|
Term
| What is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users? |
|
Definition
|
|
Term
| Which type of model represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes? |
|
Definition
|
|
Term
| Which of the following is an example of analytical information? |
|
Definition
A) Trend projection B) Sales projection C) Product statistics all |
|
|
Term
| Invisible to the external customer but essential to the effective management of the business and include goal setting, day-to-day planning, performance feedback, rewards, and resource allocation |
|
Definition
| a business facing process |
|
|
Term
| What factor significantly contributed to people’s needs to use information systems to make decisions? |
|
Definition
| The amount of information people must understand to make good decisions is increasing exponentially |
|
|
Term
| The ability to look at information from different perspectives |
|
Definition
| is slice-and-dice capability |
|
|
Term
| What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem? |
|
Definition
|
|
Term
| Which company has “The Wall of Shaygan”, which is a digital dashboard that tracks 100-plus IT systems on a single screen? |
|
Definition
|
|
Term
| Which company used BPR to change its industry by implementing a mobile claims process? |
|
Definition
|
|
Term
Budget forecasting is a.... |
|
Definition
| is a business facing process |
|
|
Term
| What integrates all of an organization’s business process to make individual processes more efficient? |
|
Definition
| Business process management |
|
|
Term
| What is a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint? |
|
Definition
Business process model -As-is-order fulfillment process (customer, sales, billing, inventory, shipping) -To-be process model... |
|
|
Term
| The real world vs. the Model World |
|
Definition
Real World - includes problem statement and solution through formulation reach the.. -Model World which includes assumptions and model structures..analysis..Results and conclusions. -Then through interpretation (translation, communication) the Solution in the real world is reached. |
|
|
Term
| an approach to conducting electronic business on the Internet |
|
Definition
|
|
Term
| E-business model includes what channels? |
|
Definition
|
|
Term
| the ability to purchase goods and services through a wireless Internet-enabled device |
|
Definition
|
|
Term
| Wireless Devices connect to |
|
Definition
| wireless provider to the internet to M-Commerce marketplaces (e-mail, news, stocks, etc.) |
|
|
Term
| What is a glohal hypertext system that uses the Internet as its transport mechanism? |
|
Definition
|
|
Term
| What is information richness? |
|
Definition
refers to the depth and breadth of information transferred between customers and businesses |
|
|
Term
| What is a business that operates on the Internet only without a physical store? |
|
Definition
|
|
Term
Which of the following offers an extensive array of unique services such as its own version of a web browser? |
|
Definition
| Online service provider (aSP) |
|
|
Term
| What is a family of web feed formats used for web syndication of programs and content |
|
Definition
|
|
Term
| What is disruptive technology? |
|
Definition
new way of doing things that initially does not meet the needs of existing customers |
|
|
Term
What is an internalized portion of the Internet, protected from outside access, that allows an organization to provide access to information and application software to only its employees? |
|
Definition
|
|
Term
| Which of the following is not an online business payment method? |
|
Definition
ARE -Fin. EDI -EDI are NOT -Electronic Check -BBPP -Digital Wallet -Financial Cybermediary (consumer methods) |
|
|
Term
| count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser? |
|
Definition
|
|
Term
| Which of the following represents any consumer that sells a product or service to a business over the Internet? |
|
Definition
|
|
Term
| downtime affects 4 areas of business |
|
Definition
-financial performance (revenue recognition, cash flow, payment guarentees, credit rating, stick price.) -Revenue (direct loss, compensatory payments, lost future revenue, billing losses, investment losses, productivity losses) -Damaged Reputation (customers, suppliers, financial markets, banks, business partners) -other expenses (temp. employees, equipment rentals, overtime cost, chipping charges, travel expense, legal obligations) |
|
|
Term
|
Definition
details the extent to which email messages may be read by others -1.should compliment ethical computer use policy. 2.defines who are legitimate email users 3.identifies backup procedures 4.explains legitimate grounds for reading user email 5.informs email control 6.explans ramifications of leaving 7.asks employees to be careful when posting organizational info. |
|
|
Term
| "information has no ethics" |
|
Definition
-information doesn't care how it's used -information will not stop itself from sending spam or viruses -information can't delete or preserve itself. |
|
|
Term
|
Definition
| court system ruled microsoft (netscape) monopoly |
|
|
Term
|
Definition
| youtube clip of viral marketing with woman and fake baby |
|
|
Term
|
Definition
| Bernie Madoff $50 bil ponzie scheme |
|
|
Term
| downtime severity and frequency |
|
Definition
-s: how much you loose -f: how often you loose -probability distribution tells how much reserves are needed |
|
|
Term
| first line of security defense? |
|
Definition
|
|
Term
| Five steps to creating an information security plan |
|
Definition
Develop the information security policies Communicate the information security policies Identify critical information assets and risks Test and reevaluate risks Obtain stakeholder support |
|
|
Term
| second line of security defense? |
|
Definition
technology -authentication (password), authorization (level of access) -prevention (filtering, encryption ), resistance (firewalls) -detection (antivirus), response (antivirus quarantines) |
|
|
Term
Hacker Tpyes (update definitions) |
|
Definition
-White Hat -Black Hat -Hactivist -Script Kiddies/bunnies -Cracker -Cyberterrorist |
|
|
Term
| Security Threats to businesses include |
|
Definition
| -elevation of privilege, hoaxes, malicious code, spoofing, spyware, sniffer, packet tampering |
|
|
Term
Types of Virus' (update definitions) |
|
Definition
| Worm, DoS, DDoS, Trojan Horse Virus, Backdoor program, Polymorphic virus and worm |
|
|
Term
|
Definition
FERPA Homeland Security Act Patriot Act Freedom of Information Act Sarbanes Oxley |
|
|
Term
| What states that you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes? |
|
Definition
|
|
Term
| the following is considered an ePolicy |
|
Definition
A) Acceptable use policy B) Internet use policy C) Ethical computer use policy |
|
|
Term
| The Freedom of Information Act allows |
|
Definition
| any person to examine government records unless it causes an invasion of privacy. |
|
|
Term
| Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident? |
|
Definition
|
|
Term
| three primary information security areas? |
|
Definition
A) Authentication and authorization B) Prevention and response C) Detection and response |
|
|
Term
| What is a method for confirming users' identities? |
|
Definition
|
|
Term
| What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information? |
|
Definition
|
|
Term
| What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender? |
|
Definition
|
|
Term
| What is the legal protection afforded to an expression of an idea, such as a song, video game, and some types of proprietary documents? |
|
Definition
|
|
Term
| Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions? |
|
Definition
| Ethical computer use policy |
|
|
Term
| Which of the following is part of the acceptable use policy stipulations? |
|
Definition
A) Not using the service as part of violating any law
B) Not attempting to break the security of any computer network or user
C) Not posting commercial messages to groups without prior permission |
|
|
Term
| What is a program, when installed on a computer, records every keystroke and mouse click? |
|
Definition
|
|
Term
| Which of the following represents the estimated percentage that spam accounts for in an organizations’ email traffic? |
|
Definition
|
|
Term
| Using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker |
|
Definition
|
|