Organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.
2
New cards
Disruptive Technology
A new way of doing things that initially does not meet the needs of existing customers
3
New cards
sustaining technology
Produces an improved product customers are eager to buy (faster car)
4
New cards
Disintermediation
occurs when a business sells directly to the customer online and cuts out the intermediary
5
New cards
Reintermediation
steps are added to the chain as new players find ways to add value to the business process
6
New cards
Cybermediation
refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness (comparison sites)
7
New cards
clickstream data
exact pattern of a consumer's navigation through a site
8
New cards
Web 2.0
The next generation of Internet use - a more mature, distinctive communications platform characterized by three qualities
* Collaboration * Sharing * Free
9
New cards
Business 2.0
encourages business participation and the formation of communities that contribute to the content. Technical skills are no longer required to use and publish information to the WWW, eliminating entry barriers for online businesses.
10
New cards
open system
consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or inter-operate with the system
11
New cards
source code
contains instructions written by a programmer specifying the actions to be performed by computer software
12
New cards
closed source
any proprietary software licensed under exclusive legal right of the copyright holder
13
New cards
Open Source
Software that is created for free use by everyone to review or modify
14
New cards
User-contributed content
Created and updated by many users for many users. Websites such as Wikipedia, and YouTube, for example.
consists of anything that can be documented, archived, and codified, often with the help of IT (patents)
17
New cards
tacit knowledge
Knowledge contained in people's heads
18
New cards
Crowdsourcing
refers to the wisdom of the crowd (collective intelligence is \> than the sum of its individual parts)
19
New cards
Crowdfunding
sources capital for a project by raising many small amounts from a large number of individuals, typically via the internet (gofundme)
20
New cards
asynchronous communication
communication such as an email in which the message and the response do not occur at the same time
21
New cards
synchronous communication
communications that occur at the same time such as IM or chat
22
New cards
Challenges of Business 2.0
1. technology dependence 2. information vandalism 3. violations of copyright and plagiarism
23
New cards
perimeter network defense
Perimeter defense is one level of defending your network from attacks, and it works wonderfully to protect as a firewall from external attacks.
24
New cards
data security
process of protecting data from unauthorized access and data corruption throughout its lifecycle.
25
New cards
Application Security
measures taken to improve the security of an application often by finding, fixing, and preventing security vulnerabilities.
26
New cards
Copyright
the legal protection afforded an expression of an idea, such as a song, book, or video game
27
New cards
intellectual property
intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents
28
New cards
patent
exclusive right to make, use, or sell an invention and is granted by the gov.
29
New cards
ethics
the principles of right and wrong that guide an individual in making decisions
30
New cards
privacy
The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
31
New cards
Confidentiality
the assurance that messages and information are available only to those who are authorized to view them
32
New cards
information ethics
Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself
33
New cards
pirated software
the unauthorized use, duplication, distribution, or sale of copyrighted software
34
New cards
counterfeit software
software that is manufactured to look like the real thing and sold as such
35
New cards
Digital Rights Management
a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
36
New cards
Information Management
examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively
37
New cards
Alternate Fact
fact is something that actually exists—what we would call "reality" or "truth." An alternative is one of a choice between two or more options, like when actor Maurice Chevalier said "Old age isn't so bad when you consider the alternative," the alternative here of course being death. So to talk about alternative facts is to talk about the opposite of reality (which is delusion), or the opposite of truth (which is untruth).
38
New cards
Astroturfing
the deceptive tactic of simulating grassroots support for a product, cause, etc., undertaken by people or organizations with an interest in shaping public opinion.
39
New cards
bias
prejudice in favor or against one thing, person, or group compared with another, usually in a way considered unfair.
40
New cards
fact
piece of information presented as having objective reality.
41
New cards
fake news
Misleading news designed to promote a narrative.
42
New cards
filter bubble
A filter bubble is the intellectual isolation that can occur when websites make use of algorithms to selectively assume the information a user would want to see, and then give information to the user according to this assumption. Websites make decisions based on the information related to the user, such as former click behavior, browsing history, search history and location. For that reason, the websites are more likely to present only information that will abide by the user's past activity. A filter bubble, therefore, can cause users to get significantly less contact with contradicting viewpoints, causing the user to become intellectually isolated.
Search results from Google and news streams from Facebook are two perfect examples of this phenomenon.
43
New cards
echo chamber
describes a situation where certain ideas, beliefs or data points are reinforced through repetition of a closed system that does not allow for the free movement of alternative or competing ideas or concepts. In an echo chamber, there is the implication that certain ideas or outcomes win out because of an inherent unfairness in how input is gathered.
44
New cards
information secrecy
the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
45
New cards
Information Governance
a method or system of government for information management or control
46
New cards
information compliance
the act of conforming, acquiescing, or yielding information
47
New cards
information property
ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged
48
New cards
Information Security
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
49
New cards
Hackers
Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
50
New cards
white hat hackers
work at the request of the system owners to find system vulnerabilities and plug the holes
51
New cards
drive-by hacking
A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
52
New cards
virus
software written with malicious intent to cause annoyance or damage
53
New cards
worm
spreads itself not only from file to file but also from computer to computer
54
New cards
adware
software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
55
New cards
spyware
a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
56
New cards
Ransomware
a form of malicious software that infects your computer and asks for money
57
New cards
Social Engineering
hackers use their social skills to trick people into revealing access credentials or other valuable information
58
New cards
dumpster diving
Looking through people's trash, another way hackers obtain information.
59
New cards
Pretexting
a form of social engineering in which one individual lies to obtain confidential data about another individual
60
New cards
Distributed Denial of Service (DDoS)
Attacks from multiple computers that flood a website with so many requests it slows down or crashes (ex- ping of death)
61
New cards
Phishing
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail
62
New cards
spear phishing
a phishing expedition in which the emails are carefully designed to target a particular person or organization
63
New cards
Vishing
a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information (voice phishing)
64
New cards
Pharming
Reroutes requests for legitimate websites to false websites
65
New cards
Zombie
a program that secretly takes over another computer for the purpose of launching attacks on other computers
66
New cards
Authentication
A method for confirming users' identities
67
New cards
Authorization
the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space
68
New cards
biometrics
the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
69
New cards
encryption
scrambles information into an alternative form that requires a key or password to decrypt
70
New cards
Public key encryption
uses two keys: a public key that everyone can have and a private key for only the recipient
71
New cards
Firewall
hardware and/or software the guards a private network by analyzing incoming and outgoing information for the correct markings
72
New cards
Intrusion Detection System (IDS)
features full-time monitoring tools that search for patterns in network traffic to identify intruders
73
New cards
digital certificate
a data file that identifies individuals or organizations online and is comparable to a digital signature
74
New cards
Sources of Unplanned Downtime
\-Burst pipe, plane crash
\-Chemical spill, electrical shortage
\-Ice storm, earthquake, tornado
\-Hacker, theft
\-Equipment failure, corrupted data
75
New cards
asymmetric key encryption
encryption method that uses two encryption keys: a public key and a private key: public key is shared with everybody to encrypt a message and private for decryption that only one person/computer has
76
New cards
symmetric key
This type of encryption uses the same key to encrypt and decrypt
77
New cards
Encryption
scrambles information into an alternative form that requires a key or password to decrypt