Final BTMA Flashcards

1
Q

What is a network

A

a system of inter-connected nodes
Nodes can be people, companies, Places, Or things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are platform-mediated Networks

A

subset of components and rules employed by users in most
of their transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are components

A

hardware, software, services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are “Rules”

A

technical standards, protocols for information exchange, policies, and contracts that govern transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Platforms are extpected to provide?

A

connectivity
variety
matching heterogeneous needs with suitable transaction partners
price-setting service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is connectivity in a platform

A

facilitating the transfer of goods or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Variety in a platform

A

eliciting offers from supply-side users that vary along dimensions
valued by demand-side users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are price-setting service in a platform

A

users disclose prices at which they are willing to
exchange goods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a network effect

A

In economics and business, a network effect is the effect that one user of a good or service has on the value of that product to other people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is willingness to pay

A

equals the maximum amount that an individual would pay for a
product or service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The more a systems get better

A

more people use them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the different types of Networks

A

one-sided
Two-sided
Three-sided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a one-sided Network

A

Transaction partners alternate roles, e.g., e-mailers
send & receive, traders buy & sell
users who all perform same functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a two-sided

A

Users are permanent members of one distinct group
— a “side” — which transacts with a second group, e.g.Job seekers + recruiters
* Cardholders + merchants
* Uber, Airbnb, Amazon, eBay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is three-sided network

A

YouTube, for example, link three sets of network users: content
consumers, third party content providers and advertisers. Members of each group
exhibit a strong preference regarding number of members in other groups (cross sided
network effects) as well as in their own group (same sided network effects)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network Market is more likely to be Served by a single platform when:

A

The platform is a natural monopoly
* OR…
* Multi-homing costs are high and
* Network effects are positive and strong
* Demand for differentiated features is weak
* Or a dominant platform can offer such features selectively to users willing to pay premium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Business analytics (BA)

A

Developing actionable decisions or recommendations
* Examines data, formulates analytical models, communicates to decision makers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the three basic rolls of managers

A
  • Interpersonal
  • Informational
  • Decisional
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Decision making is difficult due

A
  • Number of alternatives is constantly increasing
  • Most decisions must be made under time pressure
  • Increased uncertainty in the decision environment, making decisions more
    complex
  • Often necessary to rapidly access remote information, consult with experts, or
    conduct a group decision-making session
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The Three specific analytics targets that represent different levels of
enterprise-side change are?

A
  • The development of one or a few related analytics applications
  • The development of infrastructure to support enterprise-wide analytics
  • Support for organizational transformation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is Descriptive analytics

A

summarizes what has happened in the past and enables decision makers to learn from past behaviours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is Predictive analytics

A

Predictive analytics: examines recent and historical data to detect patterns and predict future outcomes and trends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Dashboards provide

A

easy access to timely information and direct access to management reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Geographic Information Technology
(GIS) is

A

systems provide computer-based systems for capturing, manipulating, and displaying data using digitized maps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what are the capabilities of dashboards

A

Drill down
Critical success factors (CSFs)
Key performance indicators (KPIs)
Status access
Trend analysis
Exception reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is Drill down in a dashboard

A

The ability to go to details, at several levels; it can be done by a series of menus or by clicking on a drillable portion of the screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are Critical success factors in a dashboard

A

The factors most critical for the success of business. These can be organizational, industry, departmental, or for individual workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are Key performance indicators (Kpis)

A

The specific measures of CSFs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are Statues access in a dashboard

A

The latest data available on a KPI or some other metric, often in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is trend analysis in a dashboard

A

Short-, medium-, and long-term trends of KPIs or metrics, which are projected
using forecasting methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is Exceptional reporting in a dashboard

A

Reports highlight deviations larger than defined thresholds. Reports may include only deviations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are Neural Networks

A

a set of virtual neurons, or nodes, that work in parallel to simulate the way the human brain works, although in a greatly simplified form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are some problems with Expert Systems (ES)

A

Difficulties of using expert systems
Transferring domain expertise from human experts to the expert
system can be difficult because people cannot always explain what they know

Even if the domain experts can explain their entire reasoning
process, automating that process may not be possible

In some contexts, there is a potential liability from the use of
expert systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are the 4 types of classifications

A
  • Binary classification
  • Multi-class classification
  • Multi-label classification
  • Imbalanced classification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are Recurrent Neural Networks used for (RNNs)

A

Designed to access previous data such as sequential or time series data during input iterations.

Examples: moving a robotic arm, predicting time series

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are Convolutional neural networks used for

A

Designed to separate areas of image inputs by extracting features to identify edges, curves and colour density and then recombine these inputs for classification and prediction.
Examples: facial recognition, natural language processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are Generative adversarial networks (GANs) used for

A

wo neural networks compete with each other in a zero-sum game to segregate real data from synthetic data.

Generator: learns to generate plausible data.

Discriminator: learns to distinguish the generator’s fake data from the real data.

Example: deep-space photography for inpainting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is binary classification

A

where the goal is to categorize instances into one of two classes.
Examples include spam detection (spam or not spam), medical testing (disease or no disease)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is Multi-class Classification

A

he goal is to categorize instances into one of three or more classes. Each instance is assigned to one and only one class.
Examples include handwritten digit recognition (where the classes are the digits 0-9)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is multi-label classification

A

a generalization of multi-class classification where each instance can be assigned to multiple classes (or labels) simultaneously.
For example, in a document classification task, a single document might be relevant to several topics, such as both “politics” and “economics”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

what is imbalanced Classifications

A

the distribution of examples across the classes is not equal. Typically, one class (the majority class) has a significantly larger number of instances than the other class or classes (the minority class).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the fundamental tenets of ethics

A

Responsibility
Accountability
Liability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are the 4 general categories of ethical issues for IT

A

Privacy
Accuracy
Property
Accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are the two general rules for privacy

A

The right of privacy is not absolute, and privacy must be balanced against the
needs of society

The public’s right to know supersedes the individual’s right of privacy

45
Q

What are the three major phases in OCM (Organizational change management)

A

Preparation, implementation, and follow-through.

46
Q

what are the 10 principles in PIPIDA

A
  1. accountability,
  2. identifying purposes,
  3. consent,
  4. limiting collection,
  5. limiting use, disclosure, and retention,
  6. accuracy,
  7. safeguards,
  8. openness,
  9. individual access, and
  10. challenging compliance.
47
Q

What are some of the widely used ethical framework approaches

A
  • Utilitarian approach
  • Rights approach
  • Fairness approach
  • Common good approach
  • Deontology approach
48
Q

what are Methods of informed consent

A
  • Opt-out model
  • Opt-in model
49
Q

what are Benefits of High-quality Information Privacy

A
  • To protect the organization’s public image or brand images
  • To maintain or enhance trust and promote continued consumer
    confidence in the organization and promote goodwill
  • To achieve a competitive advantage in the marketplace by maintaining
    high quality, accurate customer information
  • To meet legal requirements of industry associations or organizations
  • To efficiently manage personal information, reducing administration or
    data handling costs and avoiding additional financial costs
50
Q

What is the Give voice of Values Approach to solving ethical issues

A
  1. Identify an ethical issue - What are the different issues that give rise to this ethical issue?
  2. Purpose and choice - What personal choices do you have in reacting to this ethical issue?
  3. Stakeholder analysis - Who is affected by the ethical issue?
  4. Powerful response - What types of things could I say to provide a response to the ethical issue?
  5. Scripting and coaching - How would I approach my audience to provide the best opportunity for discussing the ethical issue?
51
Q

What are the Five factors contributing to vulnerability of organizational information resources

A

1 Today’s interconnected, interdependent, wirelessly networked business environment
* 2 Smaller, faster, cheaper computers and storage devices
* 3 Decreasing skills necessary to be a computer hacker
* 4 International organized crime taking over cybercrime
* 5 Lack of management support

52
Q

What are someCommon Human Errors

A
  • Carelessness with computing devices
  • Opening questionable e-mail
  • Careless Internet surfing
  • Poor password selection and use
  • Carelessness with one’s office
  • Carelessness using unmanaged devices
  • Carelessness with discarded equipment
  • Careless monitoring of environmental hazards
53
Q

What is Social engineering

A

An attack in which the perpetrator uses social skills to trick or manipulate
legitimate employees into providing confidential company information such as passwords

54
Q

What are two types of areas that pose a great threat for Human error

A
  • Human resources
  • Information systems
55
Q

What do Organizations Do to Protect
Information Resources

A
  • Risk: the probability that a threat will impact an information resource
  • Risk management
  • Risk analysis
  • Risk mitigation
56
Q

What is Business Continuity Planning (BCP) purpose

A
  • Provide continuous availability
  • Be able to recover in the event of
    a hardware or software failure or
    attack (e.g., due to ransomware)
  • Ensure that critical systems are
    available and operating
57
Q

What are the three ways in risk mitigation

A

Risk acceptance
Risk transference
Risk limitation

58
Q

What are the types of Software attacks that require User action

A

Viruses
Polymorphic virus
Worm
Phishing attack
Spear phishing attack
Vishing attack

59
Q

What are the types of Software attacks that don’t need user action

A

Denial-of-service attack
Distributed denial-of-service attack

60
Q

What are the types of Software attacks that Attack by a Programmer Developing a System

A

Trojan Horse
Back door
Logic bomb

61
Q

What are the three levels of control

A

Control environment
General controls
Application control

62
Q

What are physical controls

A

Prevent unauthorized individuals from gaining access to a company’s
facilities
ex: gate, door, lock

63
Q

What are logic controls

A

Logical controls (implemented by software) help to provide controls such
as:
* Authentication
* Authorization

64
Q

what is a Control Environment

A

Encompasses management
attitudes toward controls, as
evidenced by management
actions, as well as by stated
policies that address:
* Ethical issues
* Quality of supervision

65
Q

What are Application controls

A

Controls that apply to individual
applications

65
Q

How do passwords need to be controlled by each control level

A

1.Control environment: Policies that enforce the proper management of
user codes and passwords

2.General control: A security system that requires a user ID and password
to “log on”

3.Functional application control: Separate passwords for sensitive
functions, e.g., employee raises or write-off of customer accounts

66
Q

What are some Communication Controls

A
  • Firewalls
  • Anti-malware systems
  • Whitelisting and blacklisting
  • Encryption
  • Virtual private networking
  • Transport layer security (TLS)
  • Employee monitoring systems
67
Q

What is OCM? (Organizational change management)

A

The method of leveraging change
to bring about a successful resolution

68
Q

What are the three major phases in OCM (Organizational change management)

A

Preparation, implementation, and follow-through.

69
Q

What Drives Organizational Change?

A
  • The implementation of new technology, or major changes in existing technology
  • The adoption of new business models, which could be driven by Mergers & acquisitions, dispositions etc
  • Shifts in the organizational division, department, and/or team structure
  • Changes in leadership of the company or within departments
70
Q

What are the Types of Organizational Change?

A

Adaptive change
Transformational change

71
Q

What is Project Management?

A

the use of specific knowledge, skills, tools and techniques to deliver something of value to people

72
Q

What is a Project?

A
  • Temporary effort to create value
  • Have a beginning and an end
  • Have a team, a budget, a schedule
  • Have a set of expectations
  • Each is unique and differs from day-to-day operations
  • They reach a conclusion once the goal is achieved
73
Q

What is Transformational change in OC?

A
  • Large scale and scope
  • Can be a shift in mission, strategy, company/team structure, people, or business processes
  • Substantial time, resources and energy to enact
  • Often driven by external forces, competitors as an example
74
Q

What is Adaptive change in OC?

A
  • Small, incremental changes evolving over time
  • Minor adjustments or modifications that can be fine-tuned and implemented to execute on business strategies
75
Q

Why is OCM Important?

A

Organizational change is necessary for companies to succeed and grow

Without effective OC company transitions can be rocky and expensive in terms of both time and resources

A lack of effective change management can lead the organization to fail

76
Q

What are the 6 steps in changing Organizational change

A

Define - organizational change, understand it
Create - roadmap that clearly articulates and measures success
Ensure - process plan aligns with business goals
Outline - the implementation and sustainability
Know - what challenges may arise
Be sure - to celebrate small victories along the way

77
Q

What does a PERT chart do
(Program Evaluation and Review Technique)

A

Project tasks, relationships and dependencies

78
Q

What does a GANTT chart do

A

Project tasks against the project timeline

79
Q

What does a Project plan do

A

Activities, schedule, time estimates, cost estimates, risk factors, resources, assignments, responsibilities

80
Q

What does a Project charter do

A
  • Concise written description of the intended work
81
Q

Why would someone outsource?

A

Core competencies, financial savings, rapid growth /speed to market,
globalization

82
Q

What are the three types of outsourcing

A
  • Onshore
  • Nearshore
  • Offshore
83
Q

In-sourcing is?

A

Use internal expertise to develop & maintain

84
Q

What are examples of Alienware?

A
  • Adware
  • Spyware
  • Spamware
  • Tracking cookies
85
Q

Risk Acceptance is?

A

Accept the potential risk, continue operating with no controls, and absorb any damages that occur

86
Q

Risk Transference is?

A

Transfer the risk by using other means to compensate for the loss, such as by purchasing insurance.

87
Q

Risk mitigation is?

A

Limit the risk by implementing controls that minimize the impact of the threat.

88
Q

What does CRM stand for

A

Customer Relationship Management

89
Q

Analytical CRM systems do?

A

analyze customer data for a variety of purposes, including:

  • Designing and executing targeted marketing campaigns
  • Increasing customer acquisition, cross-selling, and upselling
  • Providing input into decisions relating to products and services (e.g., pricing and product development)
  • Providing financial forecasting and customer profitability analysis
90
Q

Data Consolidation enables?

A

360-degree view of a customer
-Enhanced relationship.
Understanding of the customer “DNA”

  • Collaborative CRM
  • Interactive communication with the customer across entire organization

-Customer identity management
* Understanding of the customer “DNA”

91
Q

The two types of Operational CRM Systems are

A

Customer-facing applications
Customer-touching applications

92
Q

Examples Customer-facing applications are

A

Customer service and support (CIC) and call centres
Sales force automation (SFA)
Marketing
Campaign management

93
Q

What are Analytical CRM Systems and what are some of the purposes of it

A

Analyze customer data for a variety of purposes, including:
* Designing and executing targeted marketing campaigns

  • Increasing customer acquisition, cross-selling, and upselling
  • Providing input into decisions relating to products and services (e.g., pricing and product development)
  • Providing financial forecasting and customer profitability analysis
94
Q

What are the 5 basic concepts of SCM (Supply chain management)

A
  • Plan
  • Source
  • Make
  • Deliver
  • Return
96
Q

What are the Other Types of CRM Systems

A
  • On-demand CRM systems (i.e., utility computing or SaaS)
  • Mobile CRM systems
  • Open-source CRM systems
  • Social CRM systems
  • Use of social media.
  • Real-time CRM
    -Always-on, always-connected
97
Q

What are the 5 basic concepts of SCM (Supply chain management)

A
  • Plan
  • Source
  • Make
  • Deliver
  • Return
98
Q

What is the Push Model verses the Pull Model

A
  • Push model
  • Make-to-stock
  • Forecast, production, sells to consumers
  • Often difficult to forecast, excess or insufficient inventory

Pull model
* Make-to-order
* Customer order, make only what is ordered
* Dell Computer is an example

99
Q

What are the Two main sources of problems along the supply chain

A
  • Uncertainties (e.g., the demand
    forecast, delivery times)
  • The need to coordinate multiple
    activities, internal units, and business
    partners
  • Bullwhip effect
  • Erratic shifts of orders up and down
    the supply chain
100
Q

What are Solutions to Supply Chain Problems (3)

A
  • Vertical integration
  • A company purchases its upstream suppliers
  • Using inventories to solve supply chain problems
  • Building inventories
  • Just-in-time (JIT) inventory system
  • Information sharing
  • Vendor-managed inventory (VMI)
  • The supplier manages the entire inventory process (Walmart and P&G)
101
Q

What are Two basic types of corporate portals

A

Procurement portals (i.e., sourcing portals): for a single buyer and multiple
suppliers

Distribution portals: for multiple buyers with a single supplier

102
Q

What is E-commerce

A

The process of buying, selling, transferring, or exchanging products, services, or information via computer networks, including the Internet

103
Q

What is E-business

A

A broader concept than e-commerce that also includes servicing customers,
collaborating with business partners, and performing electronic transactions
within an organization

104
Q

What are the 3 other Types of organizations and their degree of digitization

A
  • Brick-and-mortar: purely physical organizations, no EC
  • Virtual organizations: pure-play, digital-only organizations, only EC
  • Clicks-and-mortar organizations: partial EC with a primary physical
    presence
105
Q

What are some of the benefits of E-Commerce

A
  • National and international markets are more accessible
  • Lowers costs of processing,
    distributing, and retrieving information
  • Provides access to a vast number of
    products and services 24/7
  • Deliver information, services, and
    products to people in cities, rural
    areas, and developing countries
106
Q

What are the Limitations to E-commerce

A
  • Lack of universally accepted security
    standards
  • In less-developed countries
    telecommunications bandwidth is
    often insufficient, and Web access is
    expensive
  • Perceptions that e-commerce is
    insecure
107
Q

What are the Three basic types of public exchanges

A
  • Vertical exchanges
  • Horizontal exchanges
  • Functional exchanges