Exam 3 Flashcards

1
Q

social media enables people

A

to form communities of practice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is SMIS

A

Social media information systems

that support of sharing of content among network users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SMIS Roles

A

Social Media providers
Users
Communities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Social media providers

A

enable the creation of social networks

ex. Facebook, google+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a viral hook

A

an inducement or prize for passing communication along through the tiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SMIS components

A
Hardware
Software
Data
Procedures
People
(Look at figure 8-4 for examples)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is content data

A

data and responses to data that are contributed by users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Connection data

A

data about relationships ex. liking a particular organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is social CRM

A

it is CRM but with social networking; gives more power to the customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

crowd sourcing

A

social media process of employing users to participate in product design or product redesign.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

human capital

A

investment in human knowledge and skills for future profit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

social capital

A

investment in is social relations with the expectations of returns in the marketplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

according to Lin, how does social capital add value

A
  1. information
  2. influence
  3. social credentials
  4. personal reinforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how to determine the value of social capital

A

by the number of relationships in a social network
by the strength of those relationships,
the resources controlled by those related.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

social capital is a

A

multiplicative between
number of relationships
relationship strength
entity resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how do social media companies earn revenue

A

advertising

freemium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

how does SM make money off advertising?

A

pay-per-click

use increases value (more people who use the site the more valuable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is freemium

A

basic service is free but charges a premium for upgrades or advances features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

conversion rate

A

measures the frequency that someone who clicks on an ad makes a purchase, “likes” a site or takes some action desired by the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

how to develop effective SMIS

A

(steps)

  1. Define your goals
  2. Identify success Metrics
  3. Identify target audience
  4. Define your value
  5. Make personal connections
  6. Gather and analyze data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Key Performance indicators

A

KPI or success metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are vanity metrics

A

metrics that don’t improve your decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Enterprise Social Network

A

ESN- it is a software platform that uses social media to facilitate cooperative work of people within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Web 2.0

A

aka enterprise 2.0

the use of enterprise social networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Intel’s rules for social media

A

Disclose (transparent, truthful)
protect (no secrets, don’t over share, don’s slam competition)
Use common Sense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

UGC

A

User generated content

content on you SM site that is contributed by users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are BI systems?

A

IS that process operational, social, and other data to identify patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Business intelligence

A

are patterns, relationships, trends, and predictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

tasks BI can be used for

A

Informing
Deciding
Problem Solving
Project Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

BI can be used in

A
identifying changes in purchasing patterns
Entertainment (ex Netflix, amazon, spotify)
Predictive Policing (ex. preventing crime)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

BI analysis

A

process of creating business intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

categories of BI analysis

A

reporting, data mining, BigData, and Knowledge management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

publish results

A

the process of delivering business intelligence to the knowledge workers who need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Push Publishing

A

delivers business intelligence to users without any request from the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Pull publishing

A

user requests BI results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

functions of a data warehouse

A

obtain data
cleanse data
organize and relate data
catalog data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

granularity

A

the level of detail represented by data (too fine or too coarse)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

data mart

A

a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business.

39
Q

basic reporting operations

A
sorting
filtering
grouping
calculating
formatting
40
Q

RFM analysis

A

a technique readily implemented with basic reporting operations is used to analyze and rank customers according to their purchase patterns

41
Q

RFM stands for

A

Recently
Frequently
Money

42
Q

OLAP

A

Online Analytical Processing

provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data

43
Q

what is data mining?

A

stat techniques to find patterns and relationships among data for classification and prediction

44
Q

types of data mining

A

unsupervised and supervised

45
Q

unsupervised hypothesis is

A

where analysts do not create a model or hypothesis before running the analysis (hypothesis is created after the analysis)

46
Q

cluster analysis is

A

(unsupervised technique)
statistical techniques identify groups of entities that have similar characteristics
ex find groups of similar customers from customer order and demographic data

47
Q

what is supervised data mining?

A

developing a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model (uses regression analysis)

48
Q

Neural networks

A

supervised data mining application used to predict values and make classifications such as good prospect or bad prospect

49
Q

market-basket analysis

A

an unsupervised data mining technique for determining sales patterns
(what customers tend to buy together aka cross selling)

50
Q

(in market-basket terminology)

support is

A

the probability that two items will be purchased together

51
Q

confidence is

A

if you buy fins then what is the probability you will buy the mask

52
Q

lift is

A

the ratio of confidence to base probablity

53
Q

MapReduce

A

is a technique for harnessing the power of thousands of computers working in parallel.

54
Q

Hadoop is

A

an open source program supported by the Apache Foundation

55
Q

Knowledge Management (KM)

A

is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need that capital

56
Q

how does KM benefit organizations?

A

improve process quality

increase team strength

57
Q

Expert systems are

A

the are rule-based systems that encode human knowledge in the form of If/then rules

58
Q

Content management systems (CMS)

A

are information systems that support the management and delivery of documents including reports, web pages, and other expressions of employee knowledge

59
Q

Content management application alternatives

A

in-house custom
off-the-shelf
Public Search engine

60
Q

what is hyper-social knowledge management?

A

it is the application of social media and related applications for the management and delivery of organizational knowledge resources.

61
Q

Rich Directory is

A

an employee directory that includes not only the standard name, email etc but also organizational structure and expertise

62
Q

static reports

A

are BI documents that are fixed at the time of creation and do not change

63
Q

dynamic reports

A

are BI document that are updated at the time they are requested

64
Q

BI server

A

is a web server application that is purpose built for the publishing of business intelligence

65
Q

functions of BI servers

A

management and delivery

66
Q

Definition of threats

A

a person or organization that seeks to obtain or alter data or other IS assets illegally.

67
Q

What are the sources of threats?

A

Human Error
Computer Crime
Natural Events and Disasters

68
Q

What types of security loss exist?

A
unauthorized data disclosure, 
incorrect data modification, 
faulty service,
denial of service, and 
loss of infrastructure.
69
Q

what is pretexting

A

it occurs when someone deceives by pretending to be someone else. aka spoofing

70
Q

what is phising

A

technique used for obtaining unauthorized data that use pretexting email

71
Q

what is Usurpation

A

occurs when computer criminals invade computer systems and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications and sub their own to steal or manipulate data.

72
Q

DoS

A

Denial of Service

73
Q

what is APT

A

Advanced Persistent Threat

to engage in cyberwarefare and cyber-espionage

74
Q

the bottom line of the ponemon study is

A

average cost of computer crime is increasing
malicious insiders are an increasing security threat
data loss is the principle loss of computer crime
mobile device data is a significant security threat
security safeguards work

75
Q

IS security goal is

A

to find an effective trade-off between the risk of loss and the cost of safeguards

76
Q

IDS

A

Intrusion detection system

a computer program that senses when another computer is attempting to scan or access a computer or network

77
Q

what are the senior management security functions

A

security policy and risk management

78
Q

technical safeguards

A

they are involved with hardware and software components of the information system.

79
Q

identification and authentication

A

the username identifies the user and the password authenticates the user

80
Q

smart cards are

A

they have microchips

81
Q

Biometric authentication

A

uses personal characteristics such as fingerprints, facial features, and retinal scans to authenticate users.

82
Q

symmetric encryption

A

the same key is used to encode and decode

83
Q

asymmetric encryption

A

two keys are used to encrypt and decrypt

84
Q

firewall

A

computing device that prevents unauthorized network access

85
Q

perimeter firewall

A

sits outside the organizational network

86
Q

internal firewalls

A

these are inside the organizational network

87
Q

packet-filtering firewall

A

this firewall examines each part of a message and determines whether to let that part pass

88
Q

malware is

A

a broad category of software that includes viruses,spyware, and adware

89
Q

data administration

A

this refers to an organization wide function that is in charge of developing data policies and enforcing data standards

90
Q

database administration

A

refers to a function that pertains to a particular database

ex ERP CRM MRP

91
Q

what is hardening

A

it is an important safeguard against public users and it means taking extraordinary measures to reduce a systems vulnerability.

92
Q

what are honeypots?

A

false targets for computer criminals to attack

to intruders they look like a particularly vulnerable resource

93
Q

how should organizations respond to security incidents

A

have a plan in place
centralized reporting
specific responces including speed, preparation pays and not making the problem worse
practice