Final BTMA Flashcards
What is a network
a system of inter-connected nodes
Nodes can be people, companies, Places, Or things
what are platform-mediated Networks
subset of components and rules employed by users in most
of their transactions
What are components
hardware, software, services
What are “Rules”
technical standards, protocols for information exchange, policies, and contracts that govern transactions
Platforms are extpected to provide?
connectivity
variety
matching heterogeneous needs with suitable transaction partners
price-setting service
What is connectivity in a platform
facilitating the transfer of goods or information
What is Variety in a platform
eliciting offers from supply-side users that vary along dimensions
valued by demand-side users
What are price-setting service in a platform
users disclose prices at which they are willing to
exchange goods
what is a network effect
In economics and business, a network effect is the effect that one user of a good or service has on the value of that product to other people
what is willingness to pay
equals the maximum amount that an individual would pay for a
product or service
The more a systems get better
more people use them
What are the different types of Networks
one-sided
Two-sided
Three-sided
What is a one-sided Network
Transaction partners alternate roles, e.g., e-mailers
send & receive, traders buy & sell
users who all perform same functions
What is a two-sided
Users are permanent members of one distinct group
— a “side” — which transacts with a second group, e.g.Job seekers + recruiters
* Cardholders + merchants
* Uber, Airbnb, Amazon, eBay
What is three-sided network
YouTube, for example, link three sets of network users: content
consumers, third party content providers and advertisers. Members of each group
exhibit a strong preference regarding number of members in other groups (cross sided
network effects) as well as in their own group (same sided network effects)
Network Market is more likely to be Served by a single platform when:
The platform is a natural monopoly
* OR…
* Multi-homing costs are high and
* Network effects are positive and strong
* Demand for differentiated features is weak
* Or a dominant platform can offer such features selectively to users willing to pay premium
What is Business analytics (BA)
Developing actionable decisions or recommendations
* Examines data, formulates analytical models, communicates to decision makers
What are the three basic rolls of managers
- Interpersonal
- Informational
- Decisional
Decision making is difficult due
- Number of alternatives is constantly increasing
- Most decisions must be made under time pressure
- Increased uncertainty in the decision environment, making decisions more
complex - Often necessary to rapidly access remote information, consult with experts, or
conduct a group decision-making session
The Three specific analytics targets that represent different levels of
enterprise-side change are?
- The development of one or a few related analytics applications
- The development of infrastructure to support enterprise-wide analytics
- Support for organizational transformation
what is Descriptive analytics
summarizes what has happened in the past and enables decision makers to learn from past behaviours
what is Predictive analytics
Predictive analytics: examines recent and historical data to detect patterns and predict future outcomes and trends
Dashboards provide
easy access to timely information and direct access to management reports
Geographic Information Technology
(GIS) is
systems provide computer-based systems for capturing, manipulating, and displaying data using digitized maps
what are the capabilities of dashboards
Drill down
Critical success factors (CSFs)
Key performance indicators (KPIs)
Status access
Trend analysis
Exception reporting
What is Drill down in a dashboard
The ability to go to details, at several levels; it can be done by a series of menus or by clicking on a drillable portion of the screen
What are Critical success factors in a dashboard
The factors most critical for the success of business. These can be organizational, industry, departmental, or for individual workers
What are Key performance indicators (Kpis)
The specific measures of CSFs.
What are Statues access in a dashboard
The latest data available on a KPI or some other metric, often in real time
What is trend analysis in a dashboard
Short-, medium-, and long-term trends of KPIs or metrics, which are projected
using forecasting methods.
What is Exceptional reporting in a dashboard
Reports highlight deviations larger than defined thresholds. Reports may include only deviations.
What are Neural Networks
a set of virtual neurons, or nodes, that work in parallel to simulate the way the human brain works, although in a greatly simplified form.
What are some problems with Expert Systems (ES)
Difficulties of using expert systems
Transferring domain expertise from human experts to the expert
system can be difficult because people cannot always explain what they know
Even if the domain experts can explain their entire reasoning
process, automating that process may not be possible
In some contexts, there is a potential liability from the use of
expert systems
What are the 4 types of classifications
- Binary classification
- Multi-class classification
- Multi-label classification
- Imbalanced classification
What are Recurrent Neural Networks used for (RNNs)
Designed to access previous data such as sequential or time series data during input iterations.
Examples: moving a robotic arm, predicting time series
What are Convolutional neural networks used for
Designed to separate areas of image inputs by extracting features to identify edges, curves and colour density and then recombine these inputs for classification and prediction.
Examples: facial recognition, natural language processing
What are Generative adversarial networks (GANs) used for
wo neural networks compete with each other in a zero-sum game to segregate real data from synthetic data.
Generator: learns to generate plausible data.
Discriminator: learns to distinguish the generator’s fake data from the real data.
Example: deep-space photography for inpainting
What is binary classification
where the goal is to categorize instances into one of two classes.
Examples include spam detection (spam or not spam), medical testing (disease or no disease)
What is Multi-class Classification
he goal is to categorize instances into one of three or more classes. Each instance is assigned to one and only one class.
Examples include handwritten digit recognition (where the classes are the digits 0-9)
What is multi-label classification
a generalization of multi-class classification where each instance can be assigned to multiple classes (or labels) simultaneously.
For example, in a document classification task, a single document might be relevant to several topics, such as both “politics” and “economics”.
what is imbalanced Classifications
the distribution of examples across the classes is not equal. Typically, one class (the majority class) has a significantly larger number of instances than the other class or classes (the minority class).
What are the fundamental tenets of ethics
Responsibility
Accountability
Liability
What are the 4 general categories of ethical issues for IT
Privacy
Accuracy
Property
Accessibility
What are the two general rules for privacy
The right of privacy is not absolute, and privacy must be balanced against the
needs of society
The public’s right to know supersedes the individual’s right of privacy
What are the three major phases in OCM (Organizational change management)
Preparation, implementation, and follow-through.
what are the 10 principles in PIPIDA
- accountability,
- identifying purposes,
- consent,
- limiting collection,
- limiting use, disclosure, and retention,
- accuracy,
- safeguards,
- openness,
- individual access, and
- challenging compliance.
What are some of the widely used ethical framework approaches
- Utilitarian approach
- Rights approach
- Fairness approach
- Common good approach
- Deontology approach
what are Methods of informed consent
- Opt-out model
- Opt-in model
what are Benefits of High-quality Information Privacy
- To protect the organization’s public image or brand images
- To maintain or enhance trust and promote continued consumer
confidence in the organization and promote goodwill - To achieve a competitive advantage in the marketplace by maintaining
high quality, accurate customer information - To meet legal requirements of industry associations or organizations
- To efficiently manage personal information, reducing administration or
data handling costs and avoiding additional financial costs
What is the Give voice of Values Approach to solving ethical issues
- Identify an ethical issue - What are the different issues that give rise to this ethical issue?
- Purpose and choice - What personal choices do you have in reacting to this ethical issue?
- Stakeholder analysis - Who is affected by the ethical issue?
- Powerful response - What types of things could I say to provide a response to the ethical issue?
- Scripting and coaching - How would I approach my audience to provide the best opportunity for discussing the ethical issue?
What are the Five factors contributing to vulnerability of organizational information resources
1 Today’s interconnected, interdependent, wirelessly networked business environment
* 2 Smaller, faster, cheaper computers and storage devices
* 3 Decreasing skills necessary to be a computer hacker
* 4 International organized crime taking over cybercrime
* 5 Lack of management support
What are someCommon Human Errors
- Carelessness with computing devices
- Opening questionable e-mail
- Careless Internet surfing
- Poor password selection and use
- Carelessness with one’s office
- Carelessness using unmanaged devices
- Carelessness with discarded equipment
- Careless monitoring of environmental hazards
What is Social engineering
An attack in which the perpetrator uses social skills to trick or manipulate
legitimate employees into providing confidential company information such as passwords
What are two types of areas that pose a great threat for Human error
- Human resources
- Information systems
What do Organizations Do to Protect
Information Resources
- Risk: the probability that a threat will impact an information resource
- Risk management
- Risk analysis
- Risk mitigation
What is Business Continuity Planning (BCP) purpose
- Provide continuous availability
- Be able to recover in the event of
a hardware or software failure or
attack (e.g., due to ransomware) - Ensure that critical systems are
available and operating
What are the three ways in risk mitigation
Risk acceptance
Risk transference
Risk limitation
What are the types of Software attacks that require User action
Viruses
Polymorphic virus
Worm
Phishing attack
Spear phishing attack
Vishing attack
What are the types of Software attacks that don’t need user action
Denial-of-service attack
Distributed denial-of-service attack
What are the types of Software attacks that Attack by a Programmer Developing a System
Trojan Horse
Back door
Logic bomb
What are the three levels of control
Control environment
General controls
Application control
What are physical controls
Prevent unauthorized individuals from gaining access to a company’s
facilities
ex: gate, door, lock
What are logic controls
Logical controls (implemented by software) help to provide controls such
as:
* Authentication
* Authorization
what is a Control Environment
Encompasses management
attitudes toward controls, as
evidenced by management
actions, as well as by stated
policies that address:
* Ethical issues
* Quality of supervision
What are Application controls
Controls that apply to individual
applications
How do passwords need to be controlled by each control level
1.Control environment: Policies that enforce the proper management of
user codes and passwords
2.General control: A security system that requires a user ID and password
to “log on”
3.Functional application control: Separate passwords for sensitive
functions, e.g., employee raises or write-off of customer accounts
What are some Communication Controls
- Firewalls
- Anti-malware systems
- Whitelisting and blacklisting
- Encryption
- Virtual private networking
- Transport layer security (TLS)
- Employee monitoring systems
What is OCM? (Organizational change management)
The method of leveraging change
to bring about a successful resolution
What are the three major phases in OCM (Organizational change management)
Preparation, implementation, and follow-through.
What Drives Organizational Change?
- The implementation of new technology, or major changes in existing technology
- The adoption of new business models, which could be driven by Mergers & acquisitions, dispositions etc
- Shifts in the organizational division, department, and/or team structure
- Changes in leadership of the company or within departments
What are the Types of Organizational Change?
Adaptive change
Transformational change
What is Project Management?
the use of specific knowledge, skills, tools and techniques to deliver something of value to people
What is a Project?
- Temporary effort to create value
- Have a beginning and an end
- Have a team, a budget, a schedule
- Have a set of expectations
- Each is unique and differs from day-to-day operations
- They reach a conclusion once the goal is achieved
What is Transformational change in OC?
- Large scale and scope
- Can be a shift in mission, strategy, company/team structure, people, or business processes
- Substantial time, resources and energy to enact
- Often driven by external forces, competitors as an example
What is Adaptive change in OC?
- Small, incremental changes evolving over time
- Minor adjustments or modifications that can be fine-tuned and implemented to execute on business strategies
Why is OCM Important?
Organizational change is necessary for companies to succeed and grow
Without effective OC company transitions can be rocky and expensive in terms of both time and resources
A lack of effective change management can lead the organization to fail
What are the 6 steps in changing Organizational change
Define - organizational change, understand it
Create - roadmap that clearly articulates and measures success
Ensure - process plan aligns with business goals
Outline - the implementation and sustainability
Know - what challenges may arise
Be sure - to celebrate small victories along the way
What does a PERT chart do
(Program Evaluation and Review Technique)
Project tasks, relationships and dependencies
What does a GANTT chart do
Project tasks against the project timeline
What does a Project plan do
Activities, schedule, time estimates, cost estimates, risk factors, resources, assignments, responsibilities
What does a Project charter do
- Concise written description of the intended work
Why would someone outsource?
Core competencies, financial savings, rapid growth /speed to market,
globalization
What are the three types of outsourcing
- Onshore
- Nearshore
- Offshore
In-sourcing is?
Use internal expertise to develop & maintain
What are examples of Alienware?
- Adware
- Spyware
- Spamware
- Tracking cookies
Risk Acceptance is?
Accept the potential risk, continue operating with no controls, and absorb any damages that occur
Risk Transference is?
Transfer the risk by using other means to compensate for the loss, such as by purchasing insurance.
Risk mitigation is?
Limit the risk by implementing controls that minimize the impact of the threat.
What does CRM stand for
Customer Relationship Management
Analytical CRM systems do?
analyze customer data for a variety of purposes, including:
- Designing and executing targeted marketing campaigns
- Increasing customer acquisition, cross-selling, and upselling
- Providing input into decisions relating to products and services (e.g., pricing and product development)
- Providing financial forecasting and customer profitability analysis
Data Consolidation enables?
360-degree view of a customer
-Enhanced relationship.
Understanding of the customer “DNA”
- Collaborative CRM
- Interactive communication with the customer across entire organization
-Customer identity management
* Understanding of the customer “DNA”
The two types of Operational CRM Systems are
Customer-facing applications
Customer-touching applications
Examples Customer-facing applications are
Customer service and support (CIC) and call centres
Sales force automation (SFA)
Marketing
Campaign management
What are Analytical CRM Systems and what are some of the purposes of it
Analyze customer data for a variety of purposes, including:
* Designing and executing targeted marketing campaigns
- Increasing customer acquisition, cross-selling, and upselling
- Providing input into decisions relating to products and services (e.g., pricing and product development)
- Providing financial forecasting and customer profitability analysis
What are the 5 basic concepts of SCM (Supply chain management)
- Plan
- Source
- Make
- Deliver
- Return
What are the Other Types of CRM Systems
- On-demand CRM systems (i.e., utility computing or SaaS)
- Mobile CRM systems
- Open-source CRM systems
- Social CRM systems
- Use of social media.
- Real-time CRM
-Always-on, always-connected
What are the 5 basic concepts of SCM (Supply chain management)
- Plan
- Source
- Make
- Deliver
- Return
What is the Push Model verses the Pull Model
- Push model
- Make-to-stock
- Forecast, production, sells to consumers
- Often difficult to forecast, excess or insufficient inventory
Pull model
* Make-to-order
* Customer order, make only what is ordered
* Dell Computer is an example
What are the Two main sources of problems along the supply chain
- Uncertainties (e.g., the demand
forecast, delivery times) - The need to coordinate multiple
activities, internal units, and business
partners - Bullwhip effect
- Erratic shifts of orders up and down
the supply chain
What are Solutions to Supply Chain Problems (3)
- Vertical integration
- A company purchases its upstream suppliers
- Using inventories to solve supply chain problems
- Building inventories
- Just-in-time (JIT) inventory system
- Information sharing
- Vendor-managed inventory (VMI)
- The supplier manages the entire inventory process (Walmart and P&G)
What are Two basic types of corporate portals
Procurement portals (i.e., sourcing portals): for a single buyer and multiple
suppliers
Distribution portals: for multiple buyers with a single supplier
What is E-commerce
The process of buying, selling, transferring, or exchanging products, services, or information via computer networks, including the Internet
What is E-business
A broader concept than e-commerce that also includes servicing customers,
collaborating with business partners, and performing electronic transactions
within an organization
What are the 3 other Types of organizations and their degree of digitization
- Brick-and-mortar: purely physical organizations, no EC
- Virtual organizations: pure-play, digital-only organizations, only EC
- Clicks-and-mortar organizations: partial EC with a primary physical
presence
What are some of the benefits of E-Commerce
- National and international markets are more accessible
- Lowers costs of processing,
distributing, and retrieving information - Provides access to a vast number of
products and services 24/7 - Deliver information, services, and
products to people in cities, rural
areas, and developing countries
What are the Limitations to E-commerce
- Lack of universally accepted security
standards - In less-developed countries
telecommunications bandwidth is
often insufficient, and Web access is
expensive - Perceptions that e-commerce is
insecure
What are the Three basic types of public exchanges
- Vertical exchanges
- Horizontal exchanges
- Functional exchanges