Jargon Flashcards
Digital divide
The gap between those who have access to information and communication technology and those that don’t. This may be an economic issue but also a geographic one.
ERP
Enterprise Resource Planning systems tightly integrate the functional area information systems via a common database
Value Chain Secondary (Support) activities
Value Chain Secondary (Support) activities do not add value directly to a firm’s products and services, but support the primary activities. Support activities include accounting, finance, management, HR management, product and technology development (R&D) and procurement.
The 3 Es
Economy of inputs
Efficiency of operations
Effectiveness of outputs
Data aggregators
Companies that collect public data (e.g. real estate records, telephone numbers) and non-public data (e.g. social security numbers, financial data, police records, motor vehicle records) and integrate them to produce digital dossiers.
Weblog
A blog (weblog) is an informal, personal journal that is frequently updated and intended for general public reading.
Unmanaged devices
Unmanaged devices are those outside the control of the IT department. Examples include devices in hotel business enters, customer computers, computers in restaurants such as McDonald’s, Starbucks etc.
Groupware
Groupware refers to software products that support groups of people who share a common task or goal and who collaborate to accomplish it.
Social engineering
Social engineering is an attack where the attacker uses social skills to trick a legitimate employee into providing confidential company information such as passwords.
Logic Bomb
A logic bomb is a segment of computer code that is embedded within an organisation’s existing computer programs and is designed to activate and perform a destructive action at a certain date and time.
Phishing
Phishing uses deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.
Screen scraper
Screen scrapers record a continuous “movie” of what you do on a screen.
Alien Software
Alien software is a clandestine software that is installed on your computer through duplicitous methods. It is typically not as malicious as viruses, worms or Trojan horses, but it does use up valuable system resources. In addition, it can report on your web surfing habits and other personal behaviour.
Spamware and spam
Spamware is alien software that is designed to use your computer as a launchpad for spammers. Spam is an unsolicited email.
Authentication - Give examples of:
1) Something the user is
2) Something the user has
3) Something the user does
4) Something the user knows
1) Also known as biometrics, these access controls examine a user’s innate physical characteristics.
2) These access controls include regular ID cards, smart cards and tokens.
3) These access controls include voice and signature recognition.
4) These access controls include passwords and passphrase. A password is a private combination of characters only the user should know. A passphrase is a series of characters longer than a password but can be easily memorised.
Whitelisting
Whitelisting is a process in which a company identifies the software that it will allow to run and does not try to recognise malware.
Digital Certificate
A digital certificate is an electronic document attached to a file certifying that the file is from the organisation that it claims to be from and has not been modified from its original format.
Virtual Private Network (VPN)
A Virtual Private Network is a private network that uses a public network (usually the Internet) to connect the users.
Data redundancy
Data isolation
Data inconsistency
Data redundancy - the same data is stored in any places.
Data isolation - applications cannot access data associated with other applications.
Data inconsistency - various copies of the data do not agree.
Data warehouse
Data cube
A data warehouse is a repository of historical data organised by subject to support decision makers in the organisation.
The data cube has 3 dimensions: customer, product and time.
Knowledge
Knowledge management
Intellectual capital
Knowledge that is contextual, relevant and actionable.
Knowledge management is a process that helps organisations manipulate important knowledge that is part of the organisation’s memory, usually in an unstructured format.
Intellectual capital is another term often used for knowledge.
Explicit vs Tacit Knowledge
Explicit knowledge: objective, rational, technical knowledge that has been documented. e.g. policies, procedural guidelines, reports, products, strategies, goals, core competencies
Tacit knowledge: cumulative store of subjective or experiential learning. e.g. experiences, insights, expertise, know-how, trade secrets, understanding, skill sets, learning
Affinity portal
Affinity portals support communities such as a hobby group or a political party.
Telepresence systems
Telepresence systems enable participants to seamlessly share data, voice, images, graphics, video and animation electronically.
Tagging
A tag is a keyword or term hat describes a piece of information (e.g. blog, picture, article, video clip)
RSS
Really Simple Syndication (RSS) allows users to receive or customise the information they receive when they want it without having to surf thousands of websites.
Metasearch engines
Metasearch engines search several engines at once and integrate the findings of the various search engines to answer queries posted by users.
Aggreggators vs Mash-ups
Aggregators provide a collection of content from the web (e.g. Technorati, Digg, Simple thread).
Mash-ups: a website that takes content from a number of other websites and mixes them together to create a new kind of content (e.g. SkiBonk, Healthmap, ChicagoCrime).
Pure vs Partial EC
Pure vs Partial E-commerce:
- Product can be physical or digital
- Process can be physical or digital
- Delivery agent can be physical or digital.
Click-and-mortar
Click-and-mortar organisations are those that conduct some e-commerce activities, yet their business is primarily done in the physical world i.e. partial E-commerce
Virtual organisations
Virtual organisations are companies that are engaged only in E-commerce. Also called pure play.
B2E
Business-to-employee: An organisation uses e-commerce internally to provide information and services to its employees. Companies allow employees to manage their benefits, take training classes electronically as well as buy discounted insurance, travel packages and event tickets.
Affiliate marketing
Vendors ask partners to place logos or banners on partner’s site. If customers click on logo, go to the vendor’s site and buy, then the vendor pays commission to the partners.
Viral marketing
Receivers send information about your product to their friends.
Group purchasing
Small buyers aggregate demand to get a large volume, then the group conducts tendering or negotiates a lower price.
Product customisation
Customers use the Internet to self-configure products or services. Sellers then price them and fulfil them quickly.
Reverse auctions
In reverse auctions, one buyer, usually an organisation, wants to buy a product or service. The buyer posts a request for quotation (RFQ) on its own or a third-party website. The RFQ contains detailed information on the desired purchase. Suppliers study the RFQ and submit bids, and the lowest bid wins the auction.
Electronic malls
Collections of individual shops under a single internet address.
Disintermeditation
Intermediaries or middlemen provide information and/or value-added services. When the function(s) of these intermediaries can be automated or eliminated, this process is called disintermeditation.
The Long Tail
Rarely sold items. E-tailer with no need for dispersed high street shops can stock these items.
Permission marketing
Permission marketing asks consumers to give their permission to voluntarily accept online advertising and email.
Cybersquatting
The practice of registering domain names solely for the purpose of selling them later at a higher price.
GEO
Geostationary satellites orbit 22,300 miles directly above the equator and maintains a relatively fixed position in relation to a dish on earth; excellent for TV signals.
MEO
Medium-Eath-Orbit satellites are located 6,000 miles above the Earth’s surface and move, used for the GPS system.
LEO
Low-Earth-Orbit satellites are 400-700 miles above the surface, so they move much faster with respect to a point on the Earth’s surface; require many to cover the Earth. Used mainly for telecommunications.
Infrared
Infrared light is red light that is not commonly visible to human eyes; common uses are in remote control units for TVs, DVDs and CD players.
Bluetooth
Can link up to eight devices within a 30ft area and transmit up to 2.1 megabits per second
RFID vs RuBee
Radio frequency identification (RFID) technology allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals.
RuBee is a wireless networking protocol that relies on magnetic rather than electrical energy. RuBee signals go through metals and liquids, where RFID signals will not.
Information silos
Many information systems were developed for specific functional areas and did not communicate with systems in other functional areas. Therefore, these systems are referred to as information silos.
ERP systems integrate the planning, management and use of all resources of the organisation. They are thus designed to break down the information silos of an organisation.
Crowdsourcing
Outsourcing a task to an undefined, generally large group of people in the form of an open call.
WAP
Wireless Application Protocol is the standard that enables wireless devices to access web-based information and services.
Microbrowsers
WAP-compliant devices contain microbrowsers, which are Internet browsers with a small file size that can work within the confines of small screen sizes on wireless devices and the relatively low bandwidths of wireless networks.
The Internet of Things (IOT)
Equipping billions of objects in the world with a minuscule identifying device (eg RFID) so that interaction could take place. It could be used in stock control but the possibilities go far beyond that.
Li-Fi
Light-Fidelity refers to wireless systems using LEDs instead of traditional radio frequencies for WiFi. LiFi is cheaper than WiFi and can be used on aircraft without causing interference. It can’t penetrate walls.
Bitcoin
Bitcoin is a peer-to-peer payment system. Bitcoin is a cryptocurrency to make the system secure. Transactions transfer bitcoins between bitcoin addresses using cryptographic public keys. To spend a bitcoin, a user must broadcast a payment message digitally signed with private key.
Dashboards
A special form of IS that support all managers of the organisation, by providing rapid access to timely information and direct access to structured information in the form of reports.
Knowledge workers
Professional employees such as financial and marketing analysts, engineers, lawyers and accountants, who are experts in a particular subject area and create information and knowledge, which they integrate into the business.
Transaction Processing System
Transaction Processing System (TPS) supports the monitoring, collection, storage and processing of data from the organisation’s basic business transactions, each of which generates data.
Ransom Spam
An email with an attachment that looks legitimate but is malware that encrypts computer files. If the attachment is opened, a displayed countdown timer demands a ransom to decrypt the files.
Small to medium businesses seem to be the target and National Crime Agency says there is significant risk.
The malware installs a piece of “ransomware” called Cryptolocker on computers running the Windows OS.
The ransom demands that the user pays two Bitcoins, a virtual currency, that would be worth £536 to release the decryption key.
-BBC Nov 2013
Adware
Alien software designed to help pop-up advertisements appear on your screen.
Ajax
A web development technique that allows portions of Web pages to reload with fresh data rather than requiring the entire page to reload.
Cold site
A back-up location that provides only rudimentary services and facilities.
Expert systems
Expert systems attempt to duplicate the work of human experts by applying reasoning capabilities, knowledge and expertise within a specific domain.
Mass customisation
A production process in which items are produced in large quantities but are customised to fit the desires of each customer.
Clickstream data
Data collected about user behaviour and browsing pattern by monitoring users’ activities when they visit a website.
Cloud computing
A technology in which tasks are performed by computers physically removed from the user and accessed by a network, in particular the Internet.
Collaborative CRM system
A CRM system where communications between organisations and its customers are integrated across all aspects of marketing, sales and customer support processes.
Neural network
A system of programs and data structures that stimulates the underlying concepts of the human brain.
Distributed Denial-of-Service Attack (DDoS)
A denial of service attack that sends a flood of data packets from many compromised computers simultaneously.
E-wallets
Software components in which a user stores personal and credit card information for one-click reuse.