1/18
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Social Engineering
Manipulative tactics used to trick individuals into revealing confidential information.
Digital Transformation
The process of using digital technologies to fundamentally change how operations and services are delivered.
Data vs. Information vs. Knowledge
Data are raw facts, information is processed data, and knowledge is insights derived from information.
BPI (Business Process Improvement)
A methodology for improving existing processes.
BPR (Business Process Reengineering)
A radical rethinking of business processes to achieve dramatic improvements.
BPM (Business Process Management)
A systematic approach to managing and improving business processes.
Phases of BPI
Market Pressures
Competitive forces requiring businesses to adapt.
Porter's Competitive Forces Model
An analytical framework describing competitive pressures that influence a business's strategic activities.
Cost Leadership
A strategy of offering products at the lowest cost.
Differentiation
A strategy of offering unique product features to stand out in the market.
Utilitarian Approach
An ethical standard focusing on outcomes and maximizing overall happiness.
Privacy Issues
Concerns related to data collection and user consent.
Information Security Controls
Measures like authentication and authorization used to protect information systems.
Firewalls
Devices that monitor and control incoming and outgoing network traffic.
VPNs
Virtual Private Networks that create secure connections over public infrastructure.
Risk Management
The goal of protecting organizational assets while managing risks.
Open Source Software
Software that is available for use and modification by anyone.
DevOps
A combined approach of development and operations that improves product delivery speed.