The flashcards below were created by user
Anonymous
on FreezingBlue Flashcards.
-
Business-to-business EC
- Electronic
- commerce between business partners, such as suppliers and intermediaries
-
Business-to-consumer EC
- Electronic
- commerce between businesses and consumers
-
Business-to-employee EC
Electronic commerce between businesses and their employees
-
Mass customization
- Customizing products and services to meet particular needs of individual customers on a
- large scale
-
Reintermediation
- The design of
- business models that reintroduce
- middlemen in order to reduce the chaos brought on by disintermediation
-
Disintermediation
- The phenomenon
- of cutting out the
- “middleman” in transactions and reaching customers more directly and
- efficiently
-
Brick-and-mortar business strategy
- A business
- approach exclusively utilizing physical locations, such as department stores, business offices,
- and manufacturing plants, without an online presence
-
Brick-and-clicks business strategy
- A business
- approach utilizing both physical
- locations and virtual
- locations
-
Revenue model
- Part of a business
- model that describes how the organization will earn revenue, generate profits, and produce a superior return on
- invested capital
-
Value proposition
- What a business provides to a customer and
- what that customer is willing to pay for that product or service
-
Global information dissemination
- The use of the Internet as an
- inexpensive means for distributing
- an organization’s information
-
Affiliate marketing
- A type of
- marketing that allows individual Web site owners to earn revenue by posting
- other companies’ ads on their Web pages
-
Viral marketing
- Type of
- marketing that resembles offline word-of-mouth communication in which
- advertising messages are spread similar to how real viruses are transmitted
- through offline social networks
-
Subscription marketing
- A business
- model where a customer must pay a subscription price to have access to the
- product/service
-
Supply chain
- The collection
- of companies and processes involved in moving a product from the suppliers of
- raw materials, to the suppliers of intermediate components, to final
- production, and to customer
-
Extranet
- A private web
- site used by firms and companies for business-to-business interactions
-
Intranet
- An internal,
- private network using Web technologies to facilitate the secured transmission
- of proprietary information within an organization, thereby limiting access to
- authorized users within the organization
-
Reverse pricing system
- A pricing
- system in which customers specify the product they are looking for and how much
- they are willing to pay; this information is routed to appropriate companies
- who either accept or reject this offer
-
Web analytics
- The analysis of
- Web surfers’ behavior in order to improve a site’s performance
-
Pay-per-click model
- A payment model
- used in online advertising where the advertiser pays the web site owner a fee
- for visitors visiting a certain link
-
Click-through rate
- The
- ratio of surfers who click on an ad divided by the number of times it was
- displayed
-
Shill bidding
- The act of
- bidding on your own auction against other bidders in order to raise the price
- at which your item will eventually sell
-
Bid luring
- Luring bidders
- to leave a legitimate auction to buy the same item at a lower price outside the
- auction space, where return policies and byer protection do not apply
-
Clustering
- Data mining
- technique grouping related records on the basis of having similar attributes
-
Data mart
- A data
- warehouse that is limited in scope and customized for the decision support
- applications of a particular end-user group
-
Data warehouse
- An integration
- of multiple, large databases and other information sources into a single
- repository or access point that is suitable for direct querying, analysis, or
- processing
-
Date mining
- A method used by
- companies to discover “hidden” predictive relationships in data to better
- understand their customers, products, markets, or any other phase of their
- business for which data has been captured
-
Drill-down report
- Report that
- provides details behind the summary values on a key-indicator or exception
- report
-
Entity-Relationship Diagram (ERD)
- A diagram used
- to display the structure of data and show associations between entities
-
Hard data
- Facts and
- numbers that are typically generated by transaction processing systems and
- management information systems
-
Facts and
numbers that are typically generated by transaction processing systems and
management information systems
- Used primarily
- to extract information from existing data
-
Key-indicator reports
- Report that
- provides a summary of critical information on a recurring schedule
-
Metadata
- Data about
- data, describing data in terms of who, where, when , why, and so on
-
Master data
- The data that
- is deemed most important in the operation of a business
-
Normalization
- A technique for
- making complex databases more efficient and more easily handled by a database
- management system
-
Online analytical processing
- The process of
- quickly conducting complex analyses of data stored in a database, typically
- using graphical software tools
-
-
Visualization
- The display of
- complex data relationships using a variety of graphical methods
-
Business process management
- A systematic,
- structured improvement approach by all or part of an organization including a
- critical examination and redesign of business processes in order to achieve
- dramatic improvements in one or more performance measures such as quality,
- cycle time, or cost
-
Core business processes
- order-to-cash,
- procure-to-pay, make-to-stock, make-to-order
-
Custom software
- Software
- programs that are designed and developed for a company’s specific needs as
- opposed to being bought off the shelf
-
Enterprise-wide systems
- An information
- system that spans the entire organization and can be used to integrate business
- processes, activities, and information across all functional areas of a firm
-
ERP extended components
- The components
- of an ERP that support the primary external activities of an organization for
- dealing with suppliers and customers
-
Enterprise resource planning (ERP)
- An information
- system that integrates business activities across departmental boundaries,
- including planning, manufacturing, sales, marketing, and so on
-
ERP core components
- The components
- of an ERP that support the internal activities of an organization for producing
- products and services
-
Human resource activities
- Involves the
- business activities associated with employee management, such as hiring,
- interview scheduling, payroll, and benefits management
-
Inbound logistics
- Involves business
- activities associated with receiving and stocking raw materials, parts, and
- products
-
Make-to-Stock
- The processes
- associated with producing goods based on demand forecasts
-
Make-to-Order
- The processes
- associated with producing goods based on sales order
-
Outbound logistics
- Involves business
- activities associated with the receipt of raw materials, parts, and products.
-
Order-to-Cash strategy
- The processes
- associated with selling a product or service
-
Packaged software
- Applications written
- by third-party vendors for the needs of many different users and organizations
-
Procure-to-Pay
- The processes
- associated with procuring goods from external vendors
-
Stand-alone applications
- A system that
- focuses on the specific needs of an individual department and is not designed
- to communicate with other systems in the organization
-
Bullwhip effect
- Large fluctuations
- in suppliers’ forecasts caused by small fluctuations in demand for the end
- product and the need to create safety buffers
-
Demand planning and forecasting module
- Examine historical
- data to develop the most accurate forecasts possible
-
Distribution planning module
- Focuses on
- delivering products or services to consumers as well as warehousing,
- delivering, invoicing, and payment collection
-
Just-in-Time strategies
- A method to
- optimize ordering quantities such that parts or raw material arrive just when
- they are needed for production
-
Product flow
Movement of goods from Supplier -> distribution -> consumer
-
Product recall
- A request to
- return to the maker a batch or an entire production run of a product, usually
- due to the discovery of safety issues or a product defect
-
RFID tags
- The use of the
- electromagnetic energy to transmit information between a reader (transceiver)
- and a processing device, used to replace bar codes and bar code readers
-
Supply chain visibility
- The ability to
- track products as they move through the supply chain and to foresee external
- events
-
Supply chain analytics
- The use of key
- performance indicators to monitor performance of the entire supply chain
- including sourcing, planning, production, and distribution
-
Vendor-managed inventory
- A business
- model in which the suppliers to a manufacturer (or retailer) manage the
- manufacturer’s (or retailer’s) inventory levels based on preestablished service
- levels
-
Alpha testing
- Testing performed
- by the development organization to assess whether the entire system meets the
- design requirements of the users
-
Break-even analysis
- A type of
- cost-benefit analysis to identify at what point (if ever) tangible benefits
- equal tangible costs
-
Beta testing
- testing
- performed by actual system users with actual data in their work environment
-
Intangible cost
- The cost of
- using a particular system or technology that is difficult to quantify
-
Intangible benefit
- A benefit of
- using a particular system or technology that is difficult to quantify
-
Off-the-shelf software
- Software designed
- and used to support general business processes that does not require any
- specific tailoring to meet an organization’s needs
-
Prototyping
- An iterative
- systems development process in which requirements are converted into a working
- system that is continually revised through close work between analysts and
- users
-
Requirement collection
- The process of
- gathering and organizing information from users, managers, customers, business
- processes, and documents to understand how a proposed information system should
- function
-
System efficiency
- The extent to
- which a system enables people and/or a firm to do things faster, at lower cost,
- or with relatively little time and effort
-
Tangible cost
- A cost of using
- a particular system of technology that is quantifiable
-
Tangible benefit
- A benefit of
- using a particular system or technology that is quantifiable
-
Total cost of ownership of a system
- The cost of
- owning and operating a system, including the total cost of acquisition, as well
- as all costs associated with its ongoing use and maintenance
-
Weighted multicriteria analysis
- Method for
- deciding among different information systems investments or alternative designs
- for a given system in which requirements and constraints are weighted on the
- basis of their importance
-
-
Botnet
- Collection of
- zombie computers used for destructive activities or spamming
-
Crackers
- An individual
- who breaks into computer systems with the intention of doing damage or
- committing a crime
-
Cookie
- A message
- passed by a Web server to a Web browser to be stored on a user’s computer; this
- message is then sent back to the server each time the user’s browser requests a
- page from that server
-
Cyberterrorism
- The use of
- computer and networking technologies against persons or property to intimidate
- or coerce governments, individuals, or any segment of society to attain
- political, religious , or ideological goals
-
Firewall
- Hardware or
- software designed to keep unauthorized users out of network systems
-
Hacktivists
- Cybercriminal pursuing
- political, religious, or ideological goals
-
Honeypot
- A computer,
- data, or network site that is designed to be enticing to crackers so as to
- detect, deflect, or counteract illegal activity
-
Identity theft
- Stealing another
- person’s SSN, credit card number, and other personal information for the
- purpose of using the victim’s credit rating to borrow money, buy merchandise,
- and run up debts that are never repaid
-
Information systems security
- Precautions taken
- to keep all aspects of information systems safe from unauthorized use or access
-
Phishing
- Attempts to
- trick financial account and credit card holders into giving away their authorization
- information, usually by sending spam messages to literally millions of e-mail
- accounts. Also known as “spoofing”
-
Spyware
- Software that
- covertly gathers information about a user through an internet connection
- without the user’s knowledge
-
-
The computer fraud and abuse act
- Reduce cracking
- of computer systems and to address federal computer-related offenses.
-
The electronic communications privacy act
- Government
- restrictions on wire taps from telephone calls to include transmissions of
- electronic data by computer
-
The USA Patriot act
- Significantly reduced restrictions in law enforcement
- agencies' gathering of intelligence within the United States
-
Trojan horse
- Destructive computer
- code whose instructions remain hidden to the user because the computer appears
- to function normally, but, in fact, is performing underlying functions dictated
- by the intrusive code
-
Unauthorized
Unauthorized
-
Virus
- Destructive program
- that disrupts the normal functioning of computer systems
|
|