OMIS CH 17 Week 8

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/94

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

95 Terms

1
New cards

Big Data, BI, Analytics, ML 

knowt flashcard image
2
New cards

Benefits from Data Mastery

knowt flashcard image
3
New cards

What did Disney do with Broadway?

  1. Introduced dynamic pricing

  2. Set ticket prices for Broadway production of the musical The Lion King

  3. It was the only show to see revenue grow exponentially

4
New cards

What is dynamic pricing? What are the pros vs cons?

When a firm sets prices in real or near-real time in order to maximize sales and profits

  1. Pros is that is works where supply is constrained and subject to demand spikes

  2. Cons is that i can leaving consumers feeling taken advantage of:

    1. Consumers make repeated purchases are away of past prices

    2. Consumers have alternative choices, like grocery or department store shopping

5
New cards

What companies use Dynamic Pricing? 

  1. Uber

  2. Lyft

  3. Professional Sports Teams

6
New cards

Airbnb Smart Pricing

Feature that uses machine learning to tweak accuracy of models that suggest the perfect rate and all sorts of data that can influence price 

7
New cards

Information Hierarchy

knowt flashcard image
8
New cards

Core drivers of the information age

Data, Information, Business Intelligence, Knowledge

<p>Data, Information, Business Intelligence, Knowledge </p>
9
New cards

Role of Information Systems

knowt flashcard image
10
New cards

Types of Data

  1. Human generated: Data that is generated through human interaction with computers

  2. Machine-generated: Create by machine without human intervention 

  3. Structured: Stored in a traditional system such as a relational database or spreadsheet 

  4. Unstructured: Not defined and does not follow a specified format eg. images, videos, audio 

  5. Big Data: Data high in volume, variety, and velocity but low in veracity

    1. requires advanced storage and analytics for processing 

11
New cards

Data Hierarchy

<p></p><p></p>
12
New cards

Database, DBMS, SQL, DBA

knowt flashcard image
13
New cards

Uses of Multiple Database Application (rewrite this)

knowt flashcard image
14
New cards

Key terms associated with database systems are:

knowt flashcard image
15
New cards

Entity, Attribute, Primary Key VS Foreign Key, Simple vs Composite Key

  1. Entity: A table that stores information about a person, place, thing, transaction, or event

  2. Attribute: Data elements associated with an entity

  3. Primary Key: Unique Identifiers

  4. Foreign Key: Identifiers that enable a dependent relation to refer to its parent relation 

  5. Simple Key: Single Field

  6. Composite Key: More than one field 

16
New cards

Transaction processing systems, transaction, loyalty program

knowt flashcard image
17
New cards

How do companies gather data on its consumers?

CRM: Empower employees to track and record data at nearly every point of customer contact

Surveys: Firms supplement operational data with additional input from surveys….direct survey can give better info than a cash register

External Sources: Organizations can have their products sold by partners and can rely on heavily on data collected by others

18
New cards

Data Aggregators

knowt flashcard image
19
New cards

Legacy Systems

Older information systems that are incompatible with other systems, technologies, and way of conducting business

20
New cards

Operational Data cannot always be queried to:

  1. Most transactional databases are not set up to be simultaneously accessed for reporting and analysis

  2. Database analysis requires significant processing 

21
New cards

Online Transaction Processing (OLTP) vs. Online Analytical Processing (OLAP)

OLTP Data Models

Built to enhance transaction speed

  1. Highly normalized - low redundancy 

OLAP data models built to enhance dimensional analysis speed

  1. Not normalized — high redundancy (start schema)

  2. Organized based on analysis business logic 

  3. Star schema is the basic design

<p><u>OLTP Data Models</u></p><p>Built to enhance transaction speed </p><ol><li><p>Highly normalized - low redundancy&nbsp;</p></li></ol><p></p><p><u>OLAP data models built to enhance dimensional analysis speed</u></p><ol><li><p>Not normalized — high redundancy (start schema)</p></li><li><p>Organized based on analysis business logic&nbsp;</p></li><li><p>Star schema is the basic design</p></li></ol><p></p>
22
New cards

OLTP vs OLAP systems

knowt flashcard image
23
New cards

Data Warehouse, Data Mart, OLAP

knowt flashcard image
24
New cards

Big Data

A collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools

25
New cards

The Four V’s of Big Data

  1. Volume

    1. Scale of Data

  2. Velocity

    1. Analysis of Streaming Data

  3. Veracity

    1. Uncertainty of Data

  4. Variety

    1. Different Forms of Data

26
New cards

Big Data: From Data to Decisions

  1. Data Creation

  2. Data Acquisition

  3. Info Processing

  4. Business Process 

27
New cards

Data Lake

A catch-all term for storage and access technologies used in big data

28
New cards

Data Warehouse, Data Mart, OLAP

knowt flashcard image
29
New cards

Flow of Operational Systems to Data Analysis

knowt flashcard image
30
New cards

Hadoop and Data Cloud

knowt flashcard image
31
New cards

Four primary advantages when using Big Data

knowt flashcard image
32
New cards

ETL

knowt flashcard image
33
New cards

What is Analytics?

Analytics is any mathematical or scientific method that augments data with the intent of providing new insight.

Insight creates competitive advantage when used to inform actions and decisions

Data is becoming the world’s new natural resource, and learning how to use that resource is a game changer.

Through the use of analytics, insights from data can be created to augment the gut feelings and intuition that many decisions are based on today.

34
New cards

Query tools, Python, R. Graphical Query Tools

knowt flashcard image
35
New cards

Canned & Ad hoc reporting tools, dashboards, data visualization

knowt flashcard image
36
New cards

Data Mining & Machine Learning

knowt flashcard image
37
New cards

Data Mining: Key Areas of Leverage

<p></p><p></p>
38
New cards

Over-engineer

Build a model with so many variables that the solution arrived at might only work on the subset of data used to create it.

39
New cards

Machine Learning: Supervised vs Unsupervised learning vs Reinforcement Learning

•In reinforcement learning, the system is trained to maximize a reward based on input data, going through a trial-and-error process until it arrives at the best possible outcome.

•Example learn how to play games or research (e.g., autonomous robots navigating new environments)

•More advanced ML that can be considered AI

<p><span><span>•In reinforcement learning, the system is trained to maximize a reward based on input data, going through a trial-and-error process until it arrives at the best possible outcome.</span></span></p><p><span><span>•Example learn how to play games or research (e.g., autonomous robots navigating new environments)</span></span></p><p><span><span>•More advanced ML that can be considered AI</span></span></p>
40
New cards

Narrow, General, Super

  1. •Artificial narrow intelligence (ANI) refers to intelligent systems designed or trained to carry out specific tasks or solve particular problems.

  2. •Artificial general intelligence (AGI), is still a hypothetical concept as it involves a machine understanding and autonomously performing vastly different tasks based on accumulated experience. This type of intelligence is more on the level of human intellect, as AGI systems would be able to reason and think more like people do.

  3. •Artificial superintelligence (ASI) would be a machine intelligence that surpasses all forms of human intelligence and outperforms humans in every function

41
New cards

Neural network, input layer, hidden layers, output layer

knowt flashcard image
42
New cards

Feed forward neural networks, perceptron, neuron weights, bias term, activations function

knowt flashcard image
43
New cards

AI Winter, Generative AI

knowt flashcard image
44
New cards

How LLMs Used in Generative AI Are Created

45
New cards

Parameters & Corpus

knowt flashcard image
46
New cards

Prompt, Prompt Engineering, Hallucination, AGI

knowt flashcard image
47
New cards

Turing Test, Expert Systems, Genetic Algorithms

knowt flashcard image
48
New cards

Supervised Learning, Self-Supervised Learning

knowt flashcard image
49
New cards

Semi-supervised learning, Reinforcement learning from human feedback & Constitutional AI

knowt flashcard image
50
New cards

Pair Programming

•where two coders work side-by-side on the same product at the same time, looking at the same screen and sharing their combined insight.

51
New cards

Canva vs Adobe genai work

•Canva

•Baked generative AI image tools into its cloud-based graphic design platform.

•Built these by leveraging tools from various providers:

•OpenAI

•Google

•Stable Diffusion

•Provides options for text-to-image and text-to-video generation.

•Provides tools to help generate ad copy, brainstorm ideas and suggest designs, translate documents to different languages, and change a product from one format to another.

Adobe

•Includes Photoshop and Illustrator

•Developed its own underlying generative AI technology—products introduced under the name Adobe Firefly

•GenAI tools in Photoshop can be used to create new images or add and enhance an existing image.

•Also allow AI to add all sorts of graphic effects to manipulate text

•In Illustrator, AI will create line-based vector images that scale without jagged edges.

•Will incorporate these and additional tools into other products, including video-focused GenAI for Adobe’s Premiere Pro video editing tool.

52
New cards

CAPTCHA & OCR

knowt flashcard image
53
New cards

Understanding AI Risks: Prompt injection, Data Poisoning

knowt flashcard image
54
New cards

Deepfakes

•Sophisticated media (audio, image, video) created by AI that attempts to look or sound like a real person or event.

•Presenting generative AI outputs as your own work.

55
New cards

Benefits of AI in education

knowt flashcard image
56
New cards

Seed Round

The initial round of capital provided to a startup.

57
New cards

What if we cant understand how i thinks?

•The “black box” nature of AI based on deep learning, with multilayered statistical weights, makes it especially difficult to break apart and demonstrate how these systems make their decisions.

•Heighten the possibility of unintended consequences like software that crosses ethical boundaries

•Obscure impact and risk

•Eventually contributed to a global recession-causing crisis

•Just because it can be done using AI doesn’t mean it will be legal

•Even firms that believe their technology is “behaving ethically” may be asked to provide extraordinarily difficult-to-prove evidence that laws are not being broken.

58
New cards

Change management

Refers to techniques to facilitate organization change, including preparing individuals for change and offering training and support during and after implementation.

59
New cards

Issues of ai that concerned citizens and managers should know about

knowt flashcard image
60
New cards

Steps in developing and deploying more ethical, less risk-prone systems (hiring)

<p></p>
61
New cards

Steps in developing and deploying more ethical, less risk-prone systems (Auditing)

Gather and act on input regarding flaws. If a user encounters a troubling flaw while using the system, there should be a clear, extremely easy way to submit feedback so that it can be addressed.

Provide a means for remediation. A study led by technology and audit firms found that only 43 percent of organizations have clear procedures for overriding AI results that are suspicious or questionable.

Test and audit. Firms deploying risky technology, or technology that might endanger others should be sure that these technologies are thoroughly tested.

•“Red Teaming: Where a group unaffiliated with developers deliberately tries to undermine safety procedures in a system, hack the technology, and raise any additional concerns that should be addressed before deployment.

Continually evaluate best practices and incorporate proven techniques. Firms should incorporate new tools as they are developed.

ITIL: IT Infrastructure Library, which covers best practices for delivering IT services.

COBIT: (Control Objectives for Information and Related Technologies) A continually-evolving best-practices framework for IT governance that includes guidance on implementation, monitoring, and improving IT systems and organizations.

Roll out technology gradually. Many firms choose to roll out technologies gradually to see how their post-test offerings work on smaller populations before releasing them more widely.

<p><span><span>•</span><strong><span>Gather and act on input regarding flaws.</span></strong><span> If a user encounters a troubling flaw while using the system, there should be a clear, extremely easy way to submit feedback so that it can be addressed.</span></span></p><p><span><span>•</span><strong><span>Provide a means for remediation. </span></strong><span>A study led by technology and audit firms found that only 43 percent of organizations have clear procedures for overriding AI results that are suspicious or questionable.</span></span></p><p><span><span>•</span><strong><span>Test and audit. </span></strong><span>Firms deploying risky technology, or technology that might endanger others should be sure that these technologies are thoroughly tested.</span></span></p><p><span><span>•“</span><strong><span>Red Teaming</span></strong><span>”</span><strong><span>:</span></strong><span> Where a group unaffiliated with developers deliberately tries to undermine safety procedures in a system, hack the technology, and raise any additional concerns that should be addressed before deployment.</span></span></p><p></p><p><span><span>•</span><strong><span>Continually evaluate best practices and incorporate proven techniques. </span></strong><span>Firms should incorporate new tools as they are developed.</span></span></p><p><span><span>•</span><strong><span>ITIL: </span></strong><span>IT Infrastructure Library, which covers best practices for delivering IT services.</span></span></p><p><span><span>•</span><strong><span>COBIT: </span></strong><span>(Control Objectives for Information and Related Technologies) A continually-evolving best-practices framework for IT governance that includes guidance on implementation, monitoring, and improving IT systems and organizations.</span></span></p><p><span><span>•</span><strong><span>Roll out technology gradually. </span></strong><span>Many firms choose to roll out technologies gradually to see how their post-test offerings work on smaller populations before releasing them more widely.</span></span></p>
62
New cards

Four Ethical Issues of the Information Age

63
New cards

5 things the tech giant does with your data

knowt flashcard image
64
New cards

How Cookies identify web visitors

65
New cards

Nonobvious Relationship Awareness

66
New cards

Display ads, rich media ads, interstitials 

knowt flashcard image
67
New cards

Interactive Advertising Bureau, Cost-per-click, CPM, Cost-per-action, affiliate program

68
New cards

Zero-party data, first-party data, second-party data, third-party data

69
New cards

Cookie

70
New cards

First party cookies vs third party cookies

71
New cards

Tracking pixels and & retargeting

72
New cards

IDFA ATT

knowt flashcard image
73
New cards

Tracking URL

74
New cards

Geotargeting, geofencing, IP Address, MAC address

knowt flashcard image
75
New cards

Proxy servers, virtual private network (VPN)

76
New cards

GPS & Line-of-sight

77
New cards

ACR & DAI

78
New cards

Three normative theories of business ethics

knowt flashcard image
79
New cards

Factors that can amplify a firm vulnerability of a security beach

•Personnel issues

•Technology problems

•Procedural factors

•Operational issues

80
New cards

Constant vigilance regarding security needs to be

•Part of one’s individual skill set.

•A key component in an organization’s culture.

81
New cards

Data harvesters, cash-out fraudsters, botnets, distributed denial of service DDos attack

knowt flashcard image
82
New cards

Ransomware Attacks

83
New cards

Cyberwarfare

•has also become an increasingly used tool among both spy agencies and military organizations, and the fallout can spread far beyond the borders of the nations in conflict.

84
New cards

Hacktivists

85
New cards

hacker, hack, white hat hackers, black hat hackers, red team, blue team

86
New cards

Bad apples, social engineering, phishing

knowt flashcard image
87
New cards

Spoofed

knowt flashcard image
88
New cards

Deepfakes, Script kiddies

knowt flashcard image
89
New cards

How to build a better password:

knowt flashcard image
90
New cards

Public-key cryptography and drawbacks to passkey system

91
New cards

Malware and its goals

•Goals of malware (continued)

Spyware: Monitors user actions, network traffic, or scans for files.

Keylogger: Records user keystrokes.

Screen capture: Records pixels that appear on a user’s screen to identify proprietary information.

Card skimmer: Captures data from a card’s magnetic strip.

RAM scraping or storage scanning software: Malicious code that scans for sensitive data.

Ransomware: Malware that encrypts user’s files with demands that a user pay to regain control of their data and/or device.

Blended threats: Attacks combining multiple malware or hacking exploits.

<p><span><span>•Goals of malware (continued)</span></span></p><p><span><span>•</span><em><span>Spyware</span></em><span>: Monitors user actions, network traffic, or scans for files.</span></span></p><p><span><span>•</span><em><span>Keylogger</span></em><span>: Records user keystrokes.</span></span></p><p><span><span>•</span><em><span>Screen capture</span></em><span>: Records pixels that appear on a user’s screen to identify proprietary information.</span></span></p><p><span><span>•</span><em><span>Card skimmer</span></em><span>: Captures data from a card’s magnetic strip.</span></span></p><p><span><span>•</span><em><span>RAM scraping or storage scanning software</span></em><span>: Malicious code that scans for sensitive data.</span></span></p><p><span><span>•</span><em><span>Ransomware</span></em><span>: Malware that encrypts user’s files with demands that a user pay to regain control of their data and/or device.</span></span></p><p><span><span>•</span><em><span>Blended threats</span></em><span>: Attacks combining multiple malware or hacking exploits.</span></span></p>
92
New cards

Physical hacking threats

knowt flashcard image
93
New cards

Encryption, key, brute-force attacks

94
New cards

What needs to be protected and how much is enough?

95
New cards

Patches, Lockdown hardware, Lockdown networks

blacklists: Deny the entry of specific IP addresses and other entities.

whitelists: Permit communication only with approved entities or in an approved manner.