Lesson 5 - Concepts Flashcards
Analysis and design
Analysis of system and design for creation of a system.
Analysis for digital systems
Using analytical techniques to capture and summarize business and user requirements
Activity-based process definition methods
Analysis tools used to identify the relationship between tasks within a business process
Process
Part of a system that has a clearly defined purpose or objective and clearly defined inputs and outputs
Process mapping
Identification of location and responsibilities for processes within an organization
Task analysis
Identification of different tasks, their sequence and how they are broken down
Workflow management ( WFM)
The automation of information flows; provides tools for processing the information according to a set of procedural rules.
Entity
A grouping of related data, such as customer entity, implemented as a table
Database table
Each database comprises several tables
Attribute
A property or characteristic of an entity, implemented as a field
Field
Attributes of products, such as date of birth
Record
A collection of fields for one instance of an entity, such as Customer Smith
Social sign-in
Users or members of sites can sign-in with their social network accounts such as Google+, Facebook or LinkedIn through use of APIs exchanging data between different web services.
Relationship
Describes ow different tables are linked
Primary key
The field that uniquely identifies each record in a table
Secondary key
A field that is used to link tables, by linking to a primary key in another table
Big Data
Within marketing, this concept describes the opportunity to harness customer data from different touchpoints, including as point-of-sale transactions, desktop and mobile sites and apps, and social media.
System design
Defines how an information system will operate
Client-server model
A system architecture in which end-user machines such as PCs, known as ‘clients’, run applications while accessing data and possibly programs from a server.
Three-tier client-server
The first tier is the client that handles display, second is application logic and business rules. third is database storage
Thin client
An end-user access device ( terminal) where computing requirements such as processing and storage ( and so cost), are minimized.
User-centered design(UX)
Design based on optimising the user experience according to all factors, including the user interface, which affect this.
Customer experience management ( CXM)
User experience improvements are broadened to consider the context of use to different physical locations or customer touchpoints across different digital platforms including desktop, mobile sites, apps, social networks and email marketing. Context of use includes device type, location and interactions with customer service.
Conversion Rate Optimization ( CRO)
Improving the commercial returns from a transactional site through increasing conversion to key goals such as sales, quotes, bookings, or leads. CRO combines customer and competitor research with evaluation of customer behaviour using web analytics and AB multivariate testing.
Online customer experience
The combination of rational and emotional factors of using a company’s online services that influences customer’s perceptions of a brand online.
Usability
An approach to website design intended to enable completion of user tasks.
Expert review
An analysis of an existing site or prototype, by an experienced usability expert who will identify deficiencies and improvements to a site based on their knowledge of web design principles and best practice.
Usability/user-testing
Representative users are observed performing representative tasks using a system
Eyetracking
A usability testing technique that provides a visual overlay of where visitors most commonly look at on the screen ( heatmaps) and individual common paths ( gaze trails).
Use-case modelling
A user-centred approach to modelling system requirements
Unified Modelling Language ( UML)
A language used to specify visualize and document the artefacts of an object0oriented system
Web design personas
A summary of the characteristics, needs, motivations, and environment of typical website users.
Customer scenarios ( user journeys)
Alternative tasks or outcomes required by a visitor to a website. Typically accomplished in a series of stages of different tasks.
Primary persona
A representation of the typical site user, who is strategically important to the effectiveness of the site, but one whose needs are challienging to fulfill.
Actors
People, software or other devices that interface/interact with a system
Use-case
The sequence of transactions between an actor and a system that supports the activities of the actor
Talk-through
A user verbally describes the required actions
Walk-through
A user executes their actions through using a system or mock-up
Scenario
A particular path or flow of events or activities within a use-case
Information architecture
The combination of organization, labelling and navigation schemes composing an information system
Site map
A graphical or text depiction of the relationship between different groups of content on a website
Card sorting or web classification
The process of arranging a way of organizing objects on the website in a consistent manner
Blueprints
Show the relationships between pages and other content components
Wireframe
Also known as ‘ schematics’, a way of illustrating the layout of an individual web page
Storyboarding
The use of static drawings or screenshots of the different parts of a website to review the design concept with user groups
Page template
A standard page layout format which is applied to each page of a website. Typically defined for different page categories ( e.g. category page, product page, search page)
Cascading Style Sheets ( CSS)
A simple mechanism for adding style ( Eg. fonts, colours, spacing) to web socuments. CSS enables different style elements to be controlled across an entire site or section of site.
Customer Orientation
Developing site content and services to appear to different customer segments or other members of the audience
Marketing-led site design
Site design elements are developed to achieve customer acquisition, retention and communication of marketing messages
Persuasion Marketing
Using design elements such as layout , copy and typography together with promotional messages to encourage site users to follow particular paths and specific actions rather than giving them complete choice in their navigation
Information organization schemes
The structure chosen to group and categorize information
Site navigation scheme
Tools provided to the user to move between different information on a website
Flow
Flow describes how easy it is for users of a site to move between the different pages of content of the site
Narrow and deep navigation
Fewer choices, more clicks to reach required content
Broad and shallow navigation
More choices, fewer click to reach required content
Deep linking
Jakob Nielsen’s term for a user arriving at a site deep within its structure
Responsive design
Layout and formatting of website content is modified at the point of rendering to suit different screen resolutions and capabilities to produce a better experience to users of a range of desktop, tablet and smartphone devices using web development methods like CSS and image scaling.
Media Queries
A styling approach within Cascading Style Sheets ( CSS3) enabling the layout to change based on the type of device at its scale
Adaptive mobile web design
Generally a more sophisticated approach than Responsive web design that involves delivering an experience optimized for the handsets targeted and splits the code and processing to render on different devices between the client and the server
Accessibility
An approach to site design intended to accommodate site usage using different browsers and settings particularly required by the visually impaired.
Accessibility legislation
Legislation intended to protect users of website with disabilities, including those with visual disability
ALT tags
Alt tags ( alternative tags ) appear after an image tag and contain a phrase associated with that image
Malware
Malicious software or toolbars, typically downloaded via the Internet, which acts as a ‘Trojan horse’ by executing unwanted activities such as keylogging of user passwords or viruses which may collect email addresses.
Firewall
A specialized software application mounted on a server at the point where the company is connected to the internet to prevent unauthorized access.
Information Security Management System
An organisational process to protect information assets
Information security policy
A definition of the organizational approaches to information security and the responsibilities of employee in protecting information
Information Asset register ( IAR)
A repository for the types, value, and ownership of all information within an organization
Business continuity management or disaster recovery
Measures taken to ensure that information can be restored and accessed if the original information and access method are destroyed
Computer virus
A program capable of self-replication, allowing it to spread from one machine to another. It may be malicious and delete data, or benign.
Boot-sector virus
Occupies boot record of hard and floppy disks and is activated during computer start-up
worm
A small program that self-replicates and transfers across a network from machine to machine. A form of virus.
Trojan
A virus that masquerades as a bona fide application
Anti-virus software
Software to detect and eliminate viruses
managed email service
Receipt and transmission of emails is managed by a third party
Phishing
Obtaining personal details online through sites and emails masquerading as legitimate businesses
Employee communications monitoring
Companies monitor staff emails and websites they access
Acceptable-use policy
Statement of employee activities involving use of networked computers that are not considered acceptable by management
Scanning software
Identifies email or web-page access that breaches company guidelines or acceptable-use policies
Filtering software
Software that blocks specified content or activities
Impact assessment
An assessment of the employee monitoring process in the workplace to identify improvement to minimize infringement of employee privacy
covert monitoring
Monitoring which the employer undertakes without notification of staff
Spam
Unsolicited email ( usually bulk-mailed and untargeted)
Botnet
Independent computers, connected to the Internet, are used together, typically for malicious purposes through controlling software. For example, they may be used to send out spam or for denial-of-service attack
Email filter
Software used to identify spam according to its characteristics such as keuwords.
Blacklist
A compilation of known sources of spam that are used to block email
Whitelist
A compilation of trusted sources of email that is permitted to enter an inbox
Hacking
The process of gaining unauthorized access to computer systems, typically across a network
Social engineering
Exploiting human behaviour to gain access to computer security information from employees and individuals
Ethical hacker
Hacker employed legitimately to test the quality of system security
Digital certificates ( keys)
Consist of keys made up of large numbers that are used to uniquely identify individuals
Symmetric encryption
Both parties to a transaction use the same key to encode and decode messages
Assymetric encryption
Both parties use a related but different key to encode and decode messages
Digital signatures
A method of identifying individuals or companies using public-key encryption
Certificate and certificate authorities ( CAs)
A certificate is a valid copy of a public key of an individuals or organization together with identification information. It is issued by a trusted third party ( TTP) or certificate authority ( CA).
Virtual Private network ( VPN)
Private network created using the public network infrastructure of the Internet.
Security Sockets Layer ( SSL)
A commonly used encryption technique for scrambling data as it is passed across the Internet from a customer’s web browser to a merchant’s web server.