Mock Exam Themen - still unfinished Flashcards
What exactly is Value Proposition?
- unique benefit or solution that a company offers to its customers through the use of digital technology
- development of new products and services
- e.g. customer can directly order on the app and does not have to wait (value: comfort, time)
What exactly is Value Creation?
- what is the value for e.g. the company (value: less personnell required when customer orders per app)?
- improvement of internal processes
- digitalisation of business processes, e.g.
What exactly is customer interaction?
- imporved interface to the customer
- e.g. new communication channel between customer and company
- digital communication
- e.g. internet banking, university providing online support 24/7 through chats, forum or email
What are the four challenges of digital transformation?
- IT (handling data, latest trends and enablers)
- organisation (alignment of IT and Orga, silo-thinking of companies & disconnected management)
- value added (earning money with dig. trans.?)
-compliance (legal problems that arised: data privacy, ethical issues)
What are bits and bytes used for and is it 1000 or 1024?
- 8 bits = 1 byte
Bit: Bandwith, i.e. capacity for sending data
Byte: size of files and storage
What are the Epochs of IT?
-1
0
1
2
3
4
5
-1: First Ideas
0: On the way to the computer
1: Mainframe- and Minicomputer (start of commercial usage of mainframes, all components offered by ONE company; using mini-computer, IT could be decentralized)
2: Personal Computer (no stand alone, connected to internet
3: Client Server (several clients connected to one server through LAN/ internet - companies can distribute computing services on several small servers / today: multi-layered client-server architecture)
4: Internet Computing (increasing networks, that are interconnected, distribution of TCP/IP standarts - global internet; company wide networks -> company wide software, integrated functions also now supported)
5: Cloud Computing (data no longer stored on local hardware, storage and processing services offered through internet, scalable and flexible cloud-services, services executed wihtin company can now be taken from internet)
Why is E-Commerce so successful?
- ubiquity /omnipresence
- 24/7
- global coverage: no borders
- universal standards: same performance all over the world
- richness and desnity
- personalization of marketing
- social networking
- ## customization of products
Five forces of Porter
- supply power (supplier can bypass retailer and sell products directly to customer)
- buyer power (easier research on prices, not regional)
- threat of new entry (entry barriers become smaller)
- threat of subsitution (e.g. e-books)
- competitive rivalry (e.g. markets get bigger, more rivalry)
What are the steps of the conversion funnel?
- awareness
- interest
- consideration
- purchase
- loyalty
What are…
1. impressions?
2. clicks?
3. conversions?
- how often is a page or an ad requiested and shown
- how often is a page clicked/ an ad (Clicks= CTR*Impressions)
- how often is a service bought/ does the customer what you want him to (conversions=CR*Clicks)
What is the…
1. CTR?
2. CR?
1.click-through-rate / relation between clicks and impressions = Clicks:impressions
2. conversion rate / relation between conversion and clicks = conversions:clicks
Which damage can occur from IT attacks?
1.
2.
3.
4.
- computer (software changes, damage, manipulation, deletion)
- data (theft, deletion, manipulation, …loss of confidentality and integrity)
- embedded systems - devices with embedded IT (demolition of infrastructure)
- loss of common reality (society has to agree on reality, otherwise it is in danger)
Motivations of Attackers
1.
2.
3.
4.
- professional hackers
- terrorism
- cyberwar
- non-commercial hacker (robin-hood- mentality)
What are the most important goals of data security
- confidentality (no one allowed to see, protection against unauthorized data)
- integrity (must not be anipulated or changed)
- availability (authorized people should be able to access data from anywhere)
- accountability (creation or change can be assigned to a person, e.g. who is the author of a blog)
Root causes for Data Security
- technical reasons (there is no fault free software (bigger, more complex, internet based on standard for communicating -> easy for hackers to analyze protocols… only try to limit)
- organisational reasons (in need of rules and competent people, huge grey are in terms of data security/ privacy = CAN be changed!)
- human reasons (stupid, naive, ignorant, comfort, e.g. not reading terms and conditions; would have to change mindset)