CIS 2010 Exam 2 GSU Unit 2

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/84

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

85 Terms

1
New cards

Digital Darwinism

Organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.

2
New cards

Disruptive Technology

A new way of doing things that initially does not meet the needs of existing customers

3
New cards

sustaining technology

Produces an improved product customers are eager to buy (faster car)

4
New cards

paradigm shift

occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave

5
New cards

information richness

refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information

6
New cards

Information reach

measures the number of people a firm can communicate with all over the world

7
New cards

mass customization

The ability of an organization to tailor its products or services to the customers' specifications

8
New cards

personlization

occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely appeal to that person, say by tailoring its website to a group based on profile information, demographics, or prior transactions.

9
New cards

long tail

referring to the tail of a typical sales curve. This strategy demonstrates how niche products can have viable and profitable business models when selling via ebusiness

10
New cards

intermediary

agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together

11
New cards

Disintermediation

occurs when a business sells directly to the customer online and cuts out the intermediary

12
New cards

Reintermediation

steps are added to the chain as new players find ways to add value to the business process

13
New cards

Cybermediation

refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness (comparison sites)

14
New cards

clickstream data

exact pattern of a consumer's navigation through a site

15
New cards

Web 2.0

The next generation of Internet use - a more mature, distinctive communications platform characterized by three qualities
Collaboration
Sharing
Free

16
New cards

Business 2.0

encourages business participation and the formation of communities that contribute to the content. Technical skills are no longer required to use and publish information to the WWW, eliminating entry barriers for online businesses.

17
New cards

open system

consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or inter-operate with the system

18
New cards

source code

contains instructions written by a programmer specifying the actions to be performed by computer software

19
New cards

closed source

any proprietary software licensed under exclusive legal right of the copyright holder

20
New cards

Open Source

Software that is created for free use by everyone to review or modify

21
New cards

User-contributed content

Created and updated by many users for many users. Websites such as Wikipedia, and YouTube, for example.

22
New cards

Challenges of Ebusiness

  1. identifying limited market segments
  2. managing consumer trust
  3. ensuring consumer protection
  4. adhering to taxation rules
23
New cards

explicit knowledge

consists of anything that can be documented, archived, and codified, often with the help of IT (patents)

24
New cards

tacit knowledge

Knowledge contained in people's heads

25
New cards

Crowdsourcing

refers to the wisdom of the crowd (collective intelligence is > than the sum of its individual parts)

26
New cards

Crowdfunding

sources capital for a project by raising many small amounts from a large number of individuals, typically via the internet (gofundme)

27
New cards

asynchronous communication

communication such as an email in which the message and the response do not occur at the same time

28
New cards

synchronous communication

communications that occur at the same time such as IM or chat

29
New cards

Challenges of Business 2.0

  1. technology dependence
  2. information vandalism
  3. violations of copyright and plagiarism
30
New cards

perimeter network defense

Perimeter defense is one level of defending your network from attacks, and it works wonderfully to protect as a firewall from external attacks.

31
New cards

data security

process of protecting data from unauthorized access and data corruption throughout its lifecycle.

32
New cards

Application Security

measures taken to improve the security of an application often by finding, fixing, and preventing security vulnerabilities.

33
New cards

Copyright

the legal protection afforded an expression of an idea, such as a song, book, or video game

34
New cards

intellectual property

intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents

35
New cards

patent

exclusive right to make, use, or sell an invention and is granted by the gov.

36
New cards

ethics

the principles of right and wrong that guide an individual in making decisions

37
New cards

privacy

The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent

38
New cards

Confidentiality

the assurance that messages and information are available only to those who are authorized to view them

39
New cards

information ethics

Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself

40
New cards

pirated software

the unauthorized use, duplication, distribution, or sale of copyrighted software

41
New cards

counterfeit software

software that is manufactured to look like the real thing and sold as such

42
New cards

Digital Rights Management

a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

43
New cards

Information Management

examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively

44
New cards

Alternate Fact

fact is something that actually exists—what we would call "reality" or "truth." An alternative is one of a choice between two or more options, like when actor Maurice Chevalier said "Old age isn't so bad when you consider the alternative," the alternative here of course being death. So to talk about alternative facts is to talk about the opposite of reality (which is delusion), or the opposite of truth (which is untruth).

45
New cards

Astroturfing

the deceptive tactic of simulating grassroots support for a product, cause, etc., undertaken by people or organizations with an interest in shaping public opinion.

46
New cards

bias

prejudice in favor or against one thing, person, or group compared with another, usually in a way considered unfair.

47
New cards

fact

piece of information presented as having objective reality.

48
New cards

fake news

Misleading news designed to promote a narrative.

49
New cards

filter bubble

A filter bubble is the intellectual isolation that can occur when websites make use of algorithms to selectively assume the information a user would want to see, and then give information to the user according to this assumption. Websites make decisions based on the information related to the user, such as former click behavior, browsing history, search history and location. For that reason, the websites are more likely to present only information that will abide by the user's past activity. A filter bubble, therefore, can cause users to get significantly less contact with contradicting viewpoints, causing the user to become intellectually isolated.
Search results from Google and news streams from Facebook are two perfect examples of this phenomenon.

50
New cards

echo chamber

describes a situation where certain ideas, beliefs or data points are reinforced through repetition of a closed system that does not allow for the free movement of alternative or competing ideas or concepts. In an echo chamber, there is the implication that certain ideas or outcomes win out because of an inherent unfairness in how input is gathered.

51
New cards

information secrecy

the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity

52
New cards

Information Governance

a method or system of government for information management or control

53
New cards

information compliance

the act of conforming, acquiescing, or yielding information

54
New cards

information property

ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged

55
New cards

Information Security

a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization

56
New cards

Hackers

Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge

57
New cards

white hat hackers

work at the request of the system owners to find system vulnerabilities and plug the holes

58
New cards

drive-by hacking

A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

59
New cards

virus

software written with malicious intent to cause annoyance or damage

60
New cards

worm

spreads itself not only from file to file but also from computer to computer

61
New cards

adware

software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user

62
New cards

spyware

a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

63
New cards

Ransomware

a form of malicious software that infects your computer and asks for money

64
New cards

Social Engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

65
New cards

dumpster diving

Looking through people's trash, another way hackers obtain information.

66
New cards

Pretexting

a form of social engineering in which one individual lies to obtain confidential data about another individual

67
New cards

Distributed Denial of Service (DDoS)

Attacks from multiple computers that flood a website with so many requests it slows down or crashes (ex- ping of death)

68
New cards

Phishing

a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail

69
New cards

spear phishing

a phishing expedition in which the emails are carefully designed to target a particular person or organization

70
New cards

Vishing

a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information (voice phishing)

71
New cards

Pharming

Reroutes requests for legitimate websites to false websites

72
New cards

Zombie

a program that secretly takes over another computer for the purpose of launching attacks on other computers

73
New cards

Authentication

A method for confirming users' identities

74
New cards

Authorization

the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space

75
New cards

biometrics

the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting

76
New cards

encryption

scrambles information into an alternative form that requires a key or password to decrypt

77
New cards

Public key encryption

uses two keys: a public key that everyone can have and a private key for only the recipient

78
New cards

Firewall

hardware and/or software the guards a private network by analyzing incoming and outgoing information for the correct markings

79
New cards

Intrusion Detection System (IDS)

features full-time monitoring tools that search for patterns in network traffic to identify intruders

80
New cards

digital certificate

a data file that identifies individuals or organizations online and is comparable to a digital signature

81
New cards

Sources of Unplanned Downtime

-Burst pipe, plane crash
-Chemical spill, electrical shortage
-Ice storm, earthquake, tornado
-Hacker, theft
-Equipment failure, corrupted data

82
New cards

asymmetric key encryption

encryption method that uses two encryption keys: a public key and a private key: public key is shared with everybody to encrypt a message and private for decryption that only one person/computer has

83
New cards

symmetric key

This type of encryption uses the same key to encrypt and decrypt

84
New cards

Encryption

scrambles information into an alternative form that requires a key or password to decrypt

85
New cards

Decryption

Unscrambling a message to make it readable