MIS Chapter 4 vocab

Digital Certificate
a data file that identifies individuals or organizations online and is comparable to a digital signature
Typosquatting
a problem that occurs when someone registers purposely misspelled variations of well-known domain names. These variants sometimes lure consumers who make typographical errors when entering a URL.
Dumpster Diving
Is a form of social engineering when a hacker looks through people’s trash to find personal information.
Cyberterrorists
Seeks to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
Managers should consider including virus protection in the information security policy, which includes how often the system should be scanned and how frequently the software should be
Updated
Social media monitoring
is the process of monitoring and responding to what is being said about a company, individual, product, or brand.
Intellectual property is ______________creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
Intangible
What is the type of authentication that requires a user name and password?
single-factor authentication
Black-hat hacker
is a hacker who breaks into other people’s computer systems and may just look around or steal and destroy information
information privacy policy
A policy that contains general principles regarding information privacy.
Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.
return
Digital rights management
is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. You have just been a victim of _________ identity theft.
pharming
The _________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
Child
The policy that ensures users know how to behave at work and the published standard an organization has regarding computer user behavior is called the __________ computer use policy.
ethical
drive-by hacking
is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
What is unsolicited email that plagues employees at all levels and clogs email systems?
spam
What is a destructive agent?
malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between what is ________ and ________.
legal and ethical
Internet ____________ is a government attempt to control Internet traffic, thus preventing some material from being viewed by a country’s citizens.
censorship
What type of Internet monitoring technique records information about a customer during a web surfing session, such as what websites were visited and how long the visit was, or what ads were viewed and what was purchased?
clickstream
Spyware
is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.
What is the electronic defacing of an existing website?
cybervandalism
A(n) __________ clause is typically contained in an acceptable use policy.
nonrepudiation
What are the first two lines of defense a company should take when addressing security risks?
people first, technology second
To find out your company policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ____________ policy.
social media
Digital Darwinism
implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.
Disruptive technology
is a new way of doing things that initially does not meet the needs of existing customers.
How do sustaining technologies lead to future growth from existing investments?
They produce improved products in an established market.
What is the current version of HTML that delivers everything from animation to graphics and music to movies?
HTML 5
What allows users to access the WWW?
web browser
What is the Internet protocol web browsers use to request and display web pages using universal resource locators?
hypertext transport protocol
Information reach
measures the number of people a firm can communicate with all over the world.
Cybermediation
is a type of mediation that refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness.
What is the difference between a business model and an ebusiness model?
A business model details how a company creates, delivers, and generates revenue; an ebusiness model does all of the same except on the Internet.
Adwords
are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages.
Podcasting
converts an audio broadcast to a digital music player
Taxonomy
is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website.
Open system
is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.
Closed source
is any proprietary software licensed under exclusive legal right of the copyright holder.
Crowdfunding
sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet.
What is the primary way that social networks work?
connecting people by matching profile information
Many social media websites use _________, or specific keywords or phrases incorporated into website content, for means of classification or taxonomy.
tags
What is a locally stored URL, or the address of a file or Internet page saved as a shortcut?
website bookmark
Twitter is an example of a __________ website.
microblogging
Network effect
describes how products in a network increase in value to users as the number of users increases.
What does API stand for?
Application Programming Interface
Which of the following best describes Web 1.0?
static text-based information websites
Which of the following best describes Web 2.0?
user-contributed content
Semantic web
is a component of Web 3.0 that describes things in a way that computers can understand.
Which of the following represents the three different levels of a company pyramid from the top to the bottom?
strategic – managerial – operational
Todd Haitz works at a retail store selling sports equipment. His daily tasks include opening the store, creating
the work schedules, processing payroll, overseeing sales and inventory, and training employees. At what level of the organizational pyramid would you categorize Todd?
managerial
Metrics
are measurements that evaluate results to determine whether a project is meeting its goals.
What types of metrics measure customer satisfaction?
effectiveness MIS metrics
Customer satisfaction
is measured by such benchmarks as satisfaction surveys, percentage of existing customers
Analytical information
encompasses all organizational information and its primary purpose is to support the
performance of managerial analysis or semistructured decisions.
What-if analysis
is the DSS analysis that checks the impact of a change in a variable or assumption on the
model.
Which of the following is considered the output in the systems thinking example of a DSS?
Selected Answer:
Correct forecast
forecast
What is consolidation?
involves the aggregation of information and features simple roll-ups to complex groupings of
interrelated information
Neural network
is a category of AI that attempts to emulate the way the human brain works.
Which type of AI system assigns values of 0 and 1 to vague or ambiguous information?
fuzzy logic
What is the process of learning from ecosystems and adapting their characteristics to human and organizational
situations?
biomimicry
Haptic interface
uses technology allowing humans to interact with a computer through bodily sensations and
movements-for example, a cell phone vibrating in your pocket.
Static process
uses a systematic approach in an attempt to improve business effectiveness and efficiency
continuously.
Which of the following are examples of static processes?
creating financial statements
BPMN event
displays the path in which the process flows.
BPMN activity
is a task in a business process.
What is the primary goal of the As-Is process model?
to simplify, eliminate, and improve the To-Be process

to analyze the To-Be process elements

Workflow
includes the tasks, activities, and responsibilities required to execute each step in a business
process.
Automation
is the process of computerizing manual tasks, making them more efficient and effective and
dramatically lowering operational costs.
What are managerial business processes?
semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy,
or manufacturing process improvements
Streamlining
improves managerial level business processes.
Business process reengineering (BPR)
is/are the analysis and redesign of workflow within and between enterprises.
Review the following list of key terms and determine which one typically occurs during strategic business
process improvement.
reengineering
What is the first phase in the business process reengineering model?
set project scope
Internet of Things
is a world where interconnected, Internet-enabled devices or “things” can collect and share data without human intervention.
Fact
is the confirmation or validation of an event or object.
Netflix
is not a technology company but used technology to revamp the business process of renting videos.
What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making?
business intelligence
To be successful in the information age, the text recommends that a company operate in a specific way. What way does the text recommend a company operate?
interdependently between departments
Which department manages the process of converting or transforming resources into goods or services?
Operations management sales
Which data types are typically found in the marketing department?
promotion data, sales data, advertising data.
Which data types are typically found in the human resources department?
employee data, promotion data, vacation data
Goods
are material items or products that customer’s will buy to satisfy a want or need.
Productivity
is the rate at which goods and services are produced based upon total output given total inputs.
Chief Security Office (CSO)
is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses.
If you were thinking about a washing machine as a system, which of the following represents the outputs?
the clean clothes
Identifying competitive advantages can be difficult and explains why they are typically
temporary
Which group of stakeholders’ primary interests include adhering to regulations/laws, increasing employment, and ethical taxation reporting?
government
___________ advantage features a product or service on which customers place a greater value than they do on similar offerings from competitors.
Competitive
_______________ strategy evaluates a project’s position.
SWOT analysis
___________ executes the business strategy.
Value chain analysis
Which of the following statements is correct when considering a SWOT analysis?
Opportunities and threats originate outside an organization.
Strengths would be categorized as ___________ in a typical SWOT analysis.
internal, helpful
___________ are costs that make customers reluctant to switch to another product or service.
Switching costs
Which of the following describes how a company can reduce the threat of substitute products or services?
offer additional value through wider product distribution
___________ consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.
Supply chain
___________ is the suppliers’ ability to influence the prices they charge for supplies (including materials, labor, and services).
Supplier power
___________ is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose.
Threat of substitute products or services
___________ is a standardized set of activities that accomplishes a specific task.
Business process
___________ analyzes a company’s business processes and is useful for determining how to create the greatest possible value for customers.
Value chain analysis
When evaluating the value chain, all of the following are included in the primary value activities except___________.
MIS development