Exam 3 Flashcards
social media enables people
to form communities of practice
what is SMIS
Social media information systems
that support of sharing of content among network users
SMIS Roles
Social Media providers
Users
Communities
Social media providers
enable the creation of social networks
ex. Facebook, google+
what is a viral hook
an inducement or prize for passing communication along through the tiers.
SMIS components
Hardware Software Data Procedures People (Look at figure 8-4 for examples)
what is content data
data and responses to data that are contributed by users
Connection data
data about relationships ex. liking a particular organization
what is social CRM
it is CRM but with social networking; gives more power to the customer
crowd sourcing
social media process of employing users to participate in product design or product redesign.
human capital
investment in human knowledge and skills for future profit
social capital
investment in is social relations with the expectations of returns in the marketplace
according to Lin, how does social capital add value
- information
- influence
- social credentials
- personal reinforcement
how to determine the value of social capital
by the number of relationships in a social network
by the strength of those relationships,
the resources controlled by those related.
social capital is a
multiplicative between
number of relationships
relationship strength
entity resources
how do social media companies earn revenue
advertising
freemium
how does SM make money off advertising?
pay-per-click
use increases value (more people who use the site the more valuable)
what is freemium
basic service is free but charges a premium for upgrades or advances features
conversion rate
measures the frequency that someone who clicks on an ad makes a purchase, “likes” a site or takes some action desired by the site.
how to develop effective SMIS
(steps)
- Define your goals
- Identify success Metrics
- Identify target audience
- Define your value
- Make personal connections
- Gather and analyze data
Key Performance indicators
KPI or success metrics
what are vanity metrics
metrics that don’t improve your decision making
Enterprise Social Network
ESN- it is a software platform that uses social media to facilitate cooperative work of people within an organization
Web 2.0
aka enterprise 2.0
the use of enterprise social networks
Intel’s rules for social media
Disclose (transparent, truthful)
protect (no secrets, don’t over share, don’s slam competition)
Use common Sense
UGC
User generated content
content on you SM site that is contributed by users
What are BI systems?
IS that process operational, social, and other data to identify patterns
Business intelligence
are patterns, relationships, trends, and predictions
tasks BI can be used for
Informing
Deciding
Problem Solving
Project Management
BI can be used in
identifying changes in purchasing patterns Entertainment (ex Netflix, amazon, spotify) Predictive Policing (ex. preventing crime)
BI analysis
process of creating business intelligence
categories of BI analysis
reporting, data mining, BigData, and Knowledge management
publish results
the process of delivering business intelligence to the knowledge workers who need it
Push Publishing
delivers business intelligence to users without any request from the user
Pull publishing
user requests BI results
functions of a data warehouse
obtain data
cleanse data
organize and relate data
catalog data
granularity
the level of detail represented by data (too fine or too coarse)
data mart
a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business.
basic reporting operations
sorting filtering grouping calculating formatting
RFM analysis
a technique readily implemented with basic reporting operations is used to analyze and rank customers according to their purchase patterns
RFM stands for
Recently
Frequently
Money
OLAP
Online Analytical Processing
provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data
what is data mining?
stat techniques to find patterns and relationships among data for classification and prediction
types of data mining
unsupervised and supervised
unsupervised hypothesis is
where analysts do not create a model or hypothesis before running the analysis (hypothesis is created after the analysis)
cluster analysis is
(unsupervised technique)
statistical techniques identify groups of entities that have similar characteristics
ex find groups of similar customers from customer order and demographic data
what is supervised data mining?
developing a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model (uses regression analysis)
Neural networks
supervised data mining application used to predict values and make classifications such as good prospect or bad prospect
market-basket analysis
an unsupervised data mining technique for determining sales patterns
(what customers tend to buy together aka cross selling)
(in market-basket terminology)
support is
the probability that two items will be purchased together
confidence is
if you buy fins then what is the probability you will buy the mask
lift is
the ratio of confidence to base probablity
MapReduce
is a technique for harnessing the power of thousands of computers working in parallel.
Hadoop is
an open source program supported by the Apache Foundation
Knowledge Management (KM)
is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need that capital
how does KM benefit organizations?
improve process quality
increase team strength
Expert systems are
the are rule-based systems that encode human knowledge in the form of If/then rules
Content management systems (CMS)
are information systems that support the management and delivery of documents including reports, web pages, and other expressions of employee knowledge
Content management application alternatives
in-house custom
off-the-shelf
Public Search engine
what is hyper-social knowledge management?
it is the application of social media and related applications for the management and delivery of organizational knowledge resources.
Rich Directory is
an employee directory that includes not only the standard name, email etc but also organizational structure and expertise
static reports
are BI documents that are fixed at the time of creation and do not change
dynamic reports
are BI document that are updated at the time they are requested
BI server
is a web server application that is purpose built for the publishing of business intelligence
functions of BI servers
management and delivery
Definition of threats
a person or organization that seeks to obtain or alter data or other IS assets illegally.
What are the sources of threats?
Human Error
Computer Crime
Natural Events and Disasters
What types of security loss exist?
unauthorized data disclosure, incorrect data modification, faulty service, denial of service, and loss of infrastructure.
what is pretexting
it occurs when someone deceives by pretending to be someone else. aka spoofing
what is phising
technique used for obtaining unauthorized data that use pretexting email
what is Usurpation
occurs when computer criminals invade computer systems and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications and sub their own to steal or manipulate data.
DoS
Denial of Service
what is APT
Advanced Persistent Threat
to engage in cyberwarefare and cyber-espionage
the bottom line of the ponemon study is
average cost of computer crime is increasing
malicious insiders are an increasing security threat
data loss is the principle loss of computer crime
mobile device data is a significant security threat
security safeguards work
IS security goal is
to find an effective trade-off between the risk of loss and the cost of safeguards
IDS
Intrusion detection system
a computer program that senses when another computer is attempting to scan or access a computer or network
what are the senior management security functions
security policy and risk management
technical safeguards
they are involved with hardware and software components of the information system.
identification and authentication
the username identifies the user and the password authenticates the user
smart cards are
they have microchips
Biometric authentication
uses personal characteristics such as fingerprints, facial features, and retinal scans to authenticate users.
symmetric encryption
the same key is used to encode and decode
asymmetric encryption
two keys are used to encrypt and decrypt
firewall
computing device that prevents unauthorized network access
perimeter firewall
sits outside the organizational network
internal firewalls
these are inside the organizational network
packet-filtering firewall
this firewall examines each part of a message and determines whether to let that part pass
malware is
a broad category of software that includes viruses,spyware, and adware
data administration
this refers to an organization wide function that is in charge of developing data policies and enforcing data standards
database administration
refers to a function that pertains to a particular database
ex ERP CRM MRP
what is hardening
it is an important safeguard against public users and it means taking extraordinary measures to reduce a systems vulnerability.
what are honeypots?
false targets for computer criminals to attack
to intruders they look like a particularly vulnerable resource
how should organizations respond to security incidents
have a plan in place
centralized reporting
specific responces including speed, preparation pays and not making the problem worse
practice