Jargon Flashcards
Digital divide
The gap between those who have access to information and communication technology and those that don’t. This may be an economic issue but also a geographic one.
ERP
Enterprise Resource Planning systems tightly integrate the functional area information systems via a common database
Value Chain Secondary (Support) activities
Value Chain Secondary (Support) activities do not add value directly to a firm’s products and services, but support the primary activities. Support activities include accounting, finance, management, HR management, product and technology development (R&D) and procurement.
The 3 Es
Economy of inputs
Efficiency of operations
Effectiveness of outputs
Data aggregators
Companies that collect public data (e.g. real estate records, telephone numbers) and non-public data (e.g. social security numbers, financial data, police records, motor vehicle records) and integrate them to produce digital dossiers.
Weblog
A blog (weblog) is an informal, personal journal that is frequently updated and intended for general public reading.
Unmanaged devices
Unmanaged devices are those outside the control of the IT department. Examples include devices in hotel business enters, customer computers, computers in restaurants such as McDonald’s, Starbucks etc.
Groupware
Groupware refers to software products that support groups of people who share a common task or goal and who collaborate to accomplish it.
Social engineering
Social engineering is an attack where the attacker uses social skills to trick a legitimate employee into providing confidential company information such as passwords.
Logic Bomb
A logic bomb is a segment of computer code that is embedded within an organisation’s existing computer programs and is designed to activate and perform a destructive action at a certain date and time.
Phishing
Phishing uses deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.
Screen scraper
Screen scrapers record a continuous “movie” of what you do on a screen.
Alien Software
Alien software is a clandestine software that is installed on your computer through duplicitous methods. It is typically not as malicious as viruses, worms or Trojan horses, but it does use up valuable system resources. In addition, it can report on your web surfing habits and other personal behaviour.
Spamware and spam
Spamware is alien software that is designed to use your computer as a launchpad for spammers. Spam is an unsolicited email.
Authentication - Give examples of:
1) Something the user is
2) Something the user has
3) Something the user does
4) Something the user knows
1) Also known as biometrics, these access controls examine a user’s innate physical characteristics.
2) These access controls include regular ID cards, smart cards and tokens.
3) These access controls include voice and signature recognition.
4) These access controls include passwords and passphrase. A password is a private combination of characters only the user should know. A passphrase is a series of characters longer than a password but can be easily memorised.
Whitelisting
Whitelisting is a process in which a company identifies the software that it will allow to run and does not try to recognise malware.
Digital Certificate
A digital certificate is an electronic document attached to a file certifying that the file is from the organisation that it claims to be from and has not been modified from its original format.
Virtual Private Network (VPN)
A Virtual Private Network is a private network that uses a public network (usually the Internet) to connect the users.
Data redundancy
Data isolation
Data inconsistency
Data redundancy - the same data is stored in any places.
Data isolation - applications cannot access data associated with other applications.
Data inconsistency - various copies of the data do not agree.
Data warehouse
Data cube
A data warehouse is a repository of historical data organised by subject to support decision makers in the organisation.
The data cube has 3 dimensions: customer, product and time.
Knowledge
Knowledge management
Intellectual capital
Knowledge that is contextual, relevant and actionable.
Knowledge management is a process that helps organisations manipulate important knowledge that is part of the organisation’s memory, usually in an unstructured format.
Intellectual capital is another term often used for knowledge.
Explicit vs Tacit Knowledge
Explicit knowledge: objective, rational, technical knowledge that has been documented. e.g. policies, procedural guidelines, reports, products, strategies, goals, core competencies
Tacit knowledge: cumulative store of subjective or experiential learning. e.g. experiences, insights, expertise, know-how, trade secrets, understanding, skill sets, learning
Affinity portal
Affinity portals support communities such as a hobby group or a political party.
Telepresence systems
Telepresence systems enable participants to seamlessly share data, voice, images, graphics, video and animation electronically.
Tagging
A tag is a keyword or term hat describes a piece of information (e.g. blog, picture, article, video clip)
RSS
Really Simple Syndication (RSS) allows users to receive or customise the information they receive when they want it without having to surf thousands of websites.
Metasearch engines
Metasearch engines search several engines at once and integrate the findings of the various search engines to answer queries posted by users.
Aggreggators vs Mash-ups
Aggregators provide a collection of content from the web (e.g. Technorati, Digg, Simple thread).
Mash-ups: a website that takes content from a number of other websites and mixes them together to create a new kind of content (e.g. SkiBonk, Healthmap, ChicagoCrime).