Jargon Flashcards

1
Q

Digital divide

A

The gap between those who have access to information and communication technology and those that don’t. This may be an economic issue but also a geographic one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ERP

A

Enterprise Resource Planning systems tightly integrate the functional area information systems via a common database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Value Chain Secondary (Support) activities

A

Value Chain Secondary (Support) activities do not add value directly to a firm’s products and services, but support the primary activities. Support activities include accounting, finance, management, HR management, product and technology development (R&D) and procurement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The 3 Es

A

Economy of inputs
Efficiency of operations
Effectiveness of outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data aggregators

A

Companies that collect public data (e.g. real estate records, telephone numbers) and non-public data (e.g. social security numbers, financial data, police records, motor vehicle records) and integrate them to produce digital dossiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Weblog

A

A blog (weblog) is an informal, personal journal that is frequently updated and intended for general public reading.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unmanaged devices

A

Unmanaged devices are those outside the control of the IT department. Examples include devices in hotel business enters, customer computers, computers in restaurants such as McDonald’s, Starbucks etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Groupware

A

Groupware refers to software products that support groups of people who share a common task or goal and who collaborate to accomplish it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social engineering

A

Social engineering is an attack where the attacker uses social skills to trick a legitimate employee into providing confidential company information such as passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logic Bomb

A

A logic bomb is a segment of computer code that is embedded within an organisation’s existing computer programs and is designed to activate and perform a destructive action at a certain date and time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing

A

Phishing uses deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Screen scraper

A

Screen scrapers record a continuous “movie” of what you do on a screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Alien Software

A

Alien software is a clandestine software that is installed on your computer through duplicitous methods. It is typically not as malicious as viruses, worms or Trojan horses, but it does use up valuable system resources. In addition, it can report on your web surfing habits and other personal behaviour.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spamware and spam

A

Spamware is alien software that is designed to use your computer as a launchpad for spammers. Spam is an unsolicited email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authentication - Give examples of:

1) Something the user is
2) Something the user has
3) Something the user does
4) Something the user knows

A

1) Also known as biometrics, these access controls examine a user’s innate physical characteristics.
2) These access controls include regular ID cards, smart cards and tokens.
3) These access controls include voice and signature recognition.
4) These access controls include passwords and passphrase. A password is a private combination of characters only the user should know. A passphrase is a series of characters longer than a password but can be easily memorised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Whitelisting

A

Whitelisting is a process in which a company identifies the software that it will allow to run and does not try to recognise malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Digital Certificate

A

A digital certificate is an electronic document attached to a file certifying that the file is from the organisation that it claims to be from and has not been modified from its original format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Virtual Private Network (VPN)

A

A Virtual Private Network is a private network that uses a public network (usually the Internet) to connect the users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data redundancy
Data isolation
Data inconsistency

A

Data redundancy - the same data is stored in any places.
Data isolation - applications cannot access data associated with other applications.
Data inconsistency - various copies of the data do not agree.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data warehouse

Data cube

A

A data warehouse is a repository of historical data organised by subject to support decision makers in the organisation.
The data cube has 3 dimensions: customer, product and time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Knowledge
Knowledge management
Intellectual capital

A

Knowledge that is contextual, relevant and actionable.
Knowledge management is a process that helps organisations manipulate important knowledge that is part of the organisation’s memory, usually in an unstructured format.
Intellectual capital is another term often used for knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Explicit vs Tacit Knowledge

A

Explicit knowledge: objective, rational, technical knowledge that has been documented. e.g. policies, procedural guidelines, reports, products, strategies, goals, core competencies
Tacit knowledge: cumulative store of subjective or experiential learning. e.g. experiences, insights, expertise, know-how, trade secrets, understanding, skill sets, learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Affinity portal

A

Affinity portals support communities such as a hobby group or a political party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Telepresence systems

A

Telepresence systems enable participants to seamlessly share data, voice, images, graphics, video and animation electronically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Tagging

A

A tag is a keyword or term hat describes a piece of information (e.g. blog, picture, article, video clip)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

RSS

A

Really Simple Syndication (RSS) allows users to receive or customise the information they receive when they want it without having to surf thousands of websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Metasearch engines

A

Metasearch engines search several engines at once and integrate the findings of the various search engines to answer queries posted by users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Aggreggators vs Mash-ups

A

Aggregators provide a collection of content from the web (e.g. Technorati, Digg, Simple thread).
Mash-ups: a website that takes content from a number of other websites and mixes them together to create a new kind of content (e.g. SkiBonk, Healthmap, ChicagoCrime).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Pure vs Partial EC

A

Pure vs Partial E-commerce:

  • Product can be physical or digital
  • Process can be physical or digital
  • Delivery agent can be physical or digital.
30
Q

Click-and-mortar

A

Click-and-mortar organisations are those that conduct some e-commerce activities, yet their business is primarily done in the physical world i.e. partial E-commerce

31
Q

Virtual organisations

A

Virtual organisations are companies that are engaged only in E-commerce. Also called pure play.

32
Q

B2E

A

Business-to-employee: An organisation uses e-commerce internally to provide information and services to its employees. Companies allow employees to manage their benefits, take training classes electronically as well as buy discounted insurance, travel packages and event tickets.

33
Q

Affiliate marketing

A

Vendors ask partners to place logos or banners on partner’s site. If customers click on logo, go to the vendor’s site and buy, then the vendor pays commission to the partners.

34
Q

Viral marketing

A

Receivers send information about your product to their friends.

35
Q

Group purchasing

A

Small buyers aggregate demand to get a large volume, then the group conducts tendering or negotiates a lower price.

36
Q

Product customisation

A

Customers use the Internet to self-configure products or services. Sellers then price them and fulfil them quickly.

37
Q

Reverse auctions

A

In reverse auctions, one buyer, usually an organisation, wants to buy a product or service. The buyer posts a request for quotation (RFQ) on its own or a third-party website. The RFQ contains detailed information on the desired purchase. Suppliers study the RFQ and submit bids, and the lowest bid wins the auction.

38
Q

Electronic malls

A

Collections of individual shops under a single internet address.

39
Q

Disintermeditation

A

Intermediaries or middlemen provide information and/or value-added services. When the function(s) of these intermediaries can be automated or eliminated, this process is called disintermeditation.

40
Q

The Long Tail

A

Rarely sold items. E-tailer with no need for dispersed high street shops can stock these items.

41
Q

Permission marketing

A

Permission marketing asks consumers to give their permission to voluntarily accept online advertising and email.

42
Q

Cybersquatting

A

The practice of registering domain names solely for the purpose of selling them later at a higher price.

43
Q

GEO

A

Geostationary satellites orbit 22,300 miles directly above the equator and maintains a relatively fixed position in relation to a dish on earth; excellent for TV signals.

44
Q

MEO

A

Medium-Eath-Orbit satellites are located 6,000 miles above the Earth’s surface and move, used for the GPS system.

45
Q

LEO

A

Low-Earth-Orbit satellites are 400-700 miles above the surface, so they move much faster with respect to a point on the Earth’s surface; require many to cover the Earth. Used mainly for telecommunications.

46
Q

Infrared

A

Infrared light is red light that is not commonly visible to human eyes; common uses are in remote control units for TVs, DVDs and CD players.

47
Q

Bluetooth

A

Can link up to eight devices within a 30ft area and transmit up to 2.1 megabits per second

48
Q

RFID vs RuBee

A

Radio frequency identification (RFID) technology allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals.

RuBee is a wireless networking protocol that relies on magnetic rather than electrical energy. RuBee signals go through metals and liquids, where RFID signals will not.

49
Q

Information silos

A

Many information systems were developed for specific functional areas and did not communicate with systems in other functional areas. Therefore, these systems are referred to as information silos.

ERP systems integrate the planning, management and use of all resources of the organisation. They are thus designed to break down the information silos of an organisation.

50
Q

Crowdsourcing

A

Outsourcing a task to an undefined, generally large group of people in the form of an open call.

51
Q

WAP

A

Wireless Application Protocol is the standard that enables wireless devices to access web-based information and services.

52
Q

Microbrowsers

A

WAP-compliant devices contain microbrowsers, which are Internet browsers with a small file size that can work within the confines of small screen sizes on wireless devices and the relatively low bandwidths of wireless networks.

53
Q

The Internet of Things (IOT)

A

Equipping billions of objects in the world with a minuscule identifying device (eg RFID) so that interaction could take place. It could be used in stock control but the possibilities go far beyond that.

54
Q

Li-Fi

A

Light-Fidelity refers to wireless systems using LEDs instead of traditional radio frequencies for WiFi. LiFi is cheaper than WiFi and can be used on aircraft without causing interference. It can’t penetrate walls.

55
Q

Bitcoin

A

Bitcoin is a peer-to-peer payment system. Bitcoin is a cryptocurrency to make the system secure. Transactions transfer bitcoins between bitcoin addresses using cryptographic public keys. To spend a bitcoin, a user must broadcast a payment message digitally signed with private key.

56
Q

Dashboards

A

A special form of IS that support all managers of the organisation, by providing rapid access to timely information and direct access to structured information in the form of reports.

57
Q

Knowledge workers

A

Professional employees such as financial and marketing analysts, engineers, lawyers and accountants, who are experts in a particular subject area and create information and knowledge, which they integrate into the business.

58
Q

Transaction Processing System

A

Transaction Processing System (TPS) supports the monitoring, collection, storage and processing of data from the organisation’s basic business transactions, each of which generates data.

59
Q

Ransom Spam

A

An email with an attachment that looks legitimate but is malware that encrypts computer files. If the attachment is opened, a displayed countdown timer demands a ransom to decrypt the files.

Small to medium businesses seem to be the target and National Crime Agency says there is significant risk.

The malware installs a piece of “ransomware” called Cryptolocker on computers running the Windows OS.

The ransom demands that the user pays two Bitcoins, a virtual currency, that would be worth £536 to release the decryption key.

-BBC Nov 2013

60
Q

Adware

A

Alien software designed to help pop-up advertisements appear on your screen.

61
Q

Ajax

A

A web development technique that allows portions of Web pages to reload with fresh data rather than requiring the entire page to reload.

62
Q

Cold site

A

A back-up location that provides only rudimentary services and facilities.

63
Q

Expert systems

A

Expert systems attempt to duplicate the work of human experts by applying reasoning capabilities, knowledge and expertise within a specific domain.

64
Q

Mass customisation

A

A production process in which items are produced in large quantities but are customised to fit the desires of each customer.

65
Q

Clickstream data

A

Data collected about user behaviour and browsing pattern by monitoring users’ activities when they visit a website.

66
Q

Cloud computing

A

A technology in which tasks are performed by computers physically removed from the user and accessed by a network, in particular the Internet.

67
Q

Collaborative CRM system

A

A CRM system where communications between organisations and its customers are integrated across all aspects of marketing, sales and customer support processes.

68
Q

Neural network

A

A system of programs and data structures that stimulates the underlying concepts of the human brain.

69
Q

Distributed Denial-of-Service Attack (DDoS)

A

A denial of service attack that sends a flood of data packets from many compromised computers simultaneously.

70
Q

E-wallets

A

Software components in which a user stores personal and credit card information for one-click reuse.