Untitled Studyset

Created by Ashley Culin

Chapter 3

1/130

TermDefinition
Chapter 3
What is disruptive technology: A new way of doing things that initially does not meet the needs of existing customers
What is sustaining technology: Produces an improved product customers are eager to buy.
What is the difference between the two
The internet is ultimate disrupter
Ecommerce- Buying and selling of goods and services over the internet.
Ebusiness- Includes ecommerce along with all activities related to internal and external business operations.
Difference between the two?
Paradigm shift- Occurs when a new,
radical form of business enters the market
that reshapes the way companies and
organizations behave
Internet helps us improve effectiveness
Clickstream analytics- what is it and what are the data metrics
- Web traffic
- Website ebusiness
Opening new markets
- Personalization
- Mass customization
- Tries to overcome the long tail theory- internet helped overcome it
Ebusiness success:
How the internet helps it be successful
Marketing:
Banner ad
Pop-up ad
Ebusiness models : 4 Types
B2B
B2C
C2C
C2B
Web 2.0 system- The next
generation of internet
use—a more mature,
distinctive communications
platform characterized by
three qualities
What is open systems: Consists of nonproprietary hardware
and software based on publicly known standards that
allow third parties to create add-on products to plug
into or interoperate with the system
What is content sharing:
What is user contributed content: Created and updated by many
users for many users.
Collaboration systems: Tools that
support the work of teams or groups by
facilitating the sharing and flow of
information
Collective intelligence: Collaborating
and tapping into the core knowledge of
all employees, partners, and customers
Chapter 4: Internet security and the legal problem
What are the legal and ethical issues
Important problems:
Counterfeit softwear
Pirated softwear
How to protect digital info
Companies have to create lots of policies: Know definitions and how they work and help the company
Ethical computer use policy: Contains general principles to guide computer user behavior
Internet use policy: Contains general principles to guide the proper use of the internet
Email privacy policy: Details the extent to which email messages may be read by others
Social media policy: Outlines the corporate guidelines or principles governing employee online communications
Acceptable use policy: Requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet
Employee monitoring policy: Explicitly state how, when, and where the company monitors its employees
Internet monitoring technology
Key logger (hardware and software)
Cookie
Web log
What is the cost of downtime
Hackers: Know what each do
Cracker
Black hat hacker
White hat hacker
Hacktivist
Cyber terrorist
Types of viruses: What is a virus
Worms
Trojan Horses
Back doors
Polymorphic
Denial of service
Insider
Dumpster diver
Social engineering
Identity theft
Fishing email
Farming
Information security plan:
Authentication and authorization
Prevention and resistance software system
Detection and response system