Chapter 3
1/130
| Term | Definition |
|---|---|
Chapter 3 | |
What is disruptive technology: A new way of doing things that initially does not meet the needs of existing customers | |
What is sustaining technology: Produces an improved product customers are eager to buy. | |
What is the difference between the two | |
The internet is ultimate disrupter | |
Ecommerce- Buying and selling of goods and services over the internet. | |
Ebusiness- Includes ecommerce along with all activities related to internal and external business operations. | |
Difference between the two? | |
Paradigm shift- Occurs when a new, | |
radical form of business enters the market | |
that reshapes the way companies and | |
organizations behave | |
Internet helps us improve effectiveness | |
Clickstream analytics- what is it and what are the data metrics | |
- Web traffic | |
- Website ebusiness | |
Opening new markets | |
- Personalization | |
- Mass customization | |
- Tries to overcome the long tail theory- internet helped overcome it | |
Ebusiness success: | |
How the internet helps it be successful | |
Marketing: | |
Banner ad | |
Pop-up ad | |
Ebusiness models : 4 Types | |
B2B | |
B2C | |
C2C | |
C2B | |
Web 2.0 system- The next | |
generation of internet | |
use—a more mature, | |
distinctive communications | |
platform characterized by | |
three qualities | |
What is open systems: Consists of nonproprietary hardware | |
and software based on publicly known standards that | |
allow third parties to create add-on products to plug | |
into or interoperate with the system | |
What is content sharing: | |
What is user contributed content: Created and updated by many | |
users for many users. | |
Collaboration systems: Tools that | |
support the work of teams or groups by | |
facilitating the sharing and flow of | |
information | |
Collective intelligence: Collaborating | |
and tapping into the core knowledge of | |
all employees, partners, and customers | |
Chapter 4: Internet security and the legal problem | |
What are the legal and ethical issues | |
Important problems: | |
Counterfeit softwear | |
Pirated softwear | |
How to protect digital info | |
Companies have to create lots of policies: Know definitions and how they work and help the company | |
Ethical computer use policy: Contains general principles to guide computer user behavior | |
Internet use policy: Contains general principles to guide the proper use of the internet | |
Email privacy policy: Details the extent to which email messages may be read by others | |
Social media policy: Outlines the corporate guidelines or principles governing employee online communications | |
Acceptable use policy: Requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet | |
Employee monitoring policy: Explicitly state how, when, and where the company monitors its employees | |
Internet monitoring technology | |
Key logger (hardware and software) | |
Cookie | |
Web log | |
What is the cost of downtime | |
Hackers: Know what each do | |
Cracker | |
Black hat hacker | |
White hat hacker | |
Hacktivist | |
Cyber terrorist | |
Types of viruses: What is a virus | |
Worms | |
Trojan Horses | |
Back doors | |
Polymorphic | |
Denial of service | |
Insider | |
Dumpster diver | |
Social engineering | |
Identity theft | |
Fishing email | |
Farming | |
Information security plan: | |
Authentication and authorization | |
Prevention and resistance software system | |
Detection and response system | |