Save
ERROR: domain sstk.biz is blocked. Contact your network admin
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

MSYS121

Test 2

QuestionAnswer
What does ICT stand for? Information and Computing Technology
What are the three converging areas of ICT in ubiquitous technology? Computing devices, Communications, and User Interfaces
What computing devices are being used for ubiquitous computing? Many different forms and sizes, from handheld units to nearly invisible devices set into objects such as appliances, furniture and clothing
What specific aspect of user interfaces are being developed for ubiquitous computing? So that they can sense information about users and the environment and supply this in various forms to the user
What are some of the future uses of UC? Monitoring of pets, houseplants, appliances, books, bicycles, etc
What is 'pervasive computing'? The trend towards increasingly ubiquitous connected computing devices in the environment
What is bringing about the trend for pervasive computing? Advanced electronics, wireless technologies and the Internet
What does pervasive computing do? It spreads intelligence and connectivity to more or less everything
What are the four principles of pervasive computing? Decentralization, diversification, connectivity and simplicity
What is 'context-aware computing? Application’s ability to detect and react to a set of environmental variables that is described as context
What are some uses of pervasive computing in homes? Controlling lighting, energy management, water, security and communication, entertainment, smart appliance
What is RFID? A short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers
What is a sensor network? A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes
A short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers is called what? RFID technology
What is INRIX? A traffic application that shows users the volume of traffic on roads around them
What is a 'mainframe'? Where many people share a computer
What is the common device:person ratio of UC? One person, many computers
What are some applications available through UC for people to use? Cars will use the Internet to find an open parking space, or the nearest vegetarian restaurant for their owners, remote computers will monitor our health statistics, smart clothes etc
Smart clothes are composed of what? Silk organza with copper foil wrapped around horizontal threads
What does MEMS stand for? Micro Electro Mechanical Systems
How are MEMS composed? Integrate items such as sensors, computers, data storage and transmission systems onto a single computer chip
What do MEMS do? They measure a wide range of physical phenomena e.g. acceleration, inertia and vibration
What can MEMS be used for? They can be analytical instruments to measure biological or physical states and can also be active response systems
What can bots do? Can automatically sort data based on set preferences, keep track of dynamic data, maintain schedules and calendars, and track movement of things and people.
How do bots work? Work together without human initiative or knowledge to automate routine activities
What will bots have to do with the internet by 2025? By 2025 the Internet will have evolved into a bot-coordinated, bot-directed “information grid” that connects billions of devices, nodes, and sensors to each other.
Define 'swarm technology' The network command-and-control system architecture that will understand and manage the collective movements, reactions, and interactions of masses of interconnected items.
What do swarms do? Swarm technology – decentralised arrays of agents or programs interacting with one another and with their surroundings, thus carrying out “intelligent” large-scale behaviour – much like a swarm of bees, school of fish etc.
What percentage of the world's population has a mobile phone? 70%
What is m-commerce? Any e-commerce done in a wireless environment, especially via the Internet
M-commerce is a ___________ of e-commerce Subset
How is M-Commerce different from normal EC? The underlying technology is different as m-commerce is limited to mobile telecommunications networks accessed through wireless devices such as mobile phones, hand-held computers and tablets
What are the key attributes associated with m-commerce? Ubiquity, convenience, interactivity, personalization, and localization
What are the key drivers of m-commerce? Widespread availability, handset culture, the service economy, vendors push, mobile workforce, mobility, price and performance, increasing bandwidth
What are the benefits of m-commerce for organizations? Increased sales – order from anywhere, anytime Location-based commerce Additional channel for advertising Better productivity and time utilization for employees
What are the benefits of m-commerce for individuals? Internet commerce – anywhere, anytime Choice of mobile devices for same transactions Expedites communications More affordable than desktops or laptops
Ubiquity, localization, personalization, convenience and interactivity are all attributes of what? m-commerce
What are the three most important drivers of m-commerce? Bandwidth, availability, price & performance
What are the downsides to m-commerce for individuals? ⁃ Health ⁃ Less face-to-face interaction - bad social skills ⁃ Those without a mobile device (digital divide) ⁃ Advertising and spam ⁃ Addictions ⁃ Privacy breaches
What are the downsides to m-commerce for organizations? ⁃ Expectation -> Cost ⁃ Disintermediation (i.e. bank teller) ⁃ Small Businesses - used to try on products ⁃ Change in shopping habits
What are some common mobile devices? Smartphone, tablet, PDA, camera, laptop, etc
What are five examples of microbrowsers? Android, iOS, Symbian, Microsoft, Palm
What does OS stand for? Operating system
What is 'bluetooth'? A chip technology and WPAN standard that enables voice and data communications between wireless devices over short-wave radio frequency
Why is it challenging to develop software for mobile devices? ⁃ Apps must be customized for each devices ⁃ Must adapt to match the requirements of the device ⁃ All software must deal with the technology challenges that are common on most mobile devices
What does application middleware do? Mediates backend with front end/operating system
What is a microbrowser? A wireless web app
What is a native app? An app you download
WHAT ARE SOME ADVANTAGES AND DISADVANTAGES OF NATIVE APPS? Native: Downloaded… takes up memory… easier to use… doesn’t require zooming in… some restriction of content… easier to log in i.e. FaceBook and IB
What does SMS stand for? Short message service
What does MMS stand for? Multimedia Message Service
What does EMS do that is different from SMS? Has small provider allowing formatting [italics, bold, underline]
What are four types of wireless transition media in MC infrastructure? ⁃ Microwave ⁃ Satellites ⁃ Radio ⁃ Infrared ⁃ Cellular radio technology
What is a type of wireless system in MC infrastructure? ⁃ Automatic Retailing Refueling System
What are personal area networks? • Device to Device communication over a short distance
What is an example of a personal area network? Bluetooth
What are some attributes of Bluetooth? ⁃ Works for up to 20m ⁃ 2.45GHz radio spectrum (similar to baby monitors garage door opener, etc.) ⁃ Doesn’t require a line of sight (unlike infrared) ⁃ Can connect up to eight devices simultaneously
What is a problem with personal area networks? ⁃ Interference and security can be an issue
What are Wireless Local Area Networks (WLAN) and WIFI? Shortrange connections to the internet or other networks (wireless fidelity is the most common standard)
Wha happens at a wireless access point? ⁃ An antenae connects to a mobile device to a wired LAN
What IS a wireless hotspot? ⁃ An area or point where a wireless device can make a connection to a wireless LAN (using WiFi)
What are some problems with WIFI? ⁃ Neighborhood wifi interference ⁃ Household electronics ⁃ Humans (70% water… duh) ⁃ Building materials
How do Wireless Wide Area Networks (WWAN) function? Over a cellular network
How many primary generations of WWAN communication bandwidths? Four (1G, 2G, 3G, 4G)
WHAT ARE SOME MOBILE FINANCIAL APPLICATIONS? • Mobile banking ⁃ Mobile access to finical and account information ⁃ Ability to access funds etc • Electronic payment system • Wireless Bill Payments • Wireless Shopping • Mobile and Targeted advertising
What are some m-commerce applications that the University of Waikato could use to assist its patrons? ⁃ Mobile Library Chat - like the online one but mobile ⁃ Improve online enrollments ⁃ Mobile app for MyWeb ⁃ Assignment Reminders ⁃ Timetable ⁃ E-Bookstore - secondhand bookstore ⁃ Database - car park locator
What is the most common type of WIFI? 802.11b
What is wifi technically know as? IEEE 8.02.1
The delivery of m-commerce transactions to individuals in a specific location, at a specific time is called what? Location-based m-commerce
What are the five key factors to l-commerce? Navigation, timing, mapping, tracking, location
What does the location factor do in l-commerce? Determines the basic position of a person or thing
What does the navigation factor do in l-commerce? Plots a route from one location to another
What does the tracking factor do in l-commerce? Monitoring movement of a person or a thing
What does the mapping factor do in l-commerce? Creates maps of specific geographical locations
What does the timing factor do in l-commerce? Determines the precise time at a specific location
What are the five key pieces of infrastructure in location-based m-commerce? Mobile Devices Communication Network Positioning Component Service or application provider Data or content provider
What is geolocation? The process of automatically identifying a Web user’s physical location without that user having to provide any information
What are the two systems for geolocation? Network-based positioning and terminal based positioning
How does network-based positioning work for geolocation? Relies on base stations to find the location of a mobile device sending a signal or sensed by the network
How does terminal-based positioning work for geolocation? Calculates the location of a mobile device from signals sent by the device to base stations
What does GPS allow users to do? Enable users to determine exact positions anywhere in the world, based on a world wide tracking system
What does GIS stand for? Geographical information system
What is a GIS capable of doing? Integrating, storing, editing, analyzing, sharing and displaying geographically-referenced information.
Visualization technology which integrates GPS data into digitized maps is a ...? GIS
What is a location-based service? Information service available via your mobile device utilizing the ability to use the geographic position of the device to receive information about relevant services.
What are five barriers to location-based MC? Lack of GPS in mobile phones Accuracy of devices The cost–benefit justification Limited network bandwidth Invasion of privacy
What are some possible examples of L-based MC? • Farms - crop rotation info of nearby fields, fertilizing history, content of feed storage, livestock locations, data of the cooling system, etc • TRACKING CHILDREN LOL
What are some of the top 10 trends for mobile apps in 2013? Application security and threats will become important Android fragmentation will be a major challenge Tablets will appear in every home and will need tablet applications The number of active users - more important than the number of downloads... etc
What are some examples of location-based services? ⁃ Recommending social events in a city ⁃ Finding ATM or restaurant ⁃ Providing navigation ⁃ Locating people ⁃ Delivering alerts - sale or traffic jam ⁃ Asset recovery
What are three major aspects of social commerce? • Web 2.0 • Social Networking • Social Commerce
Who first proposed Web 2.0? Darcy diNucci (1999) - is closely associated with Tim O’Reilly
What are four important factors of Web 2.0? • Participation • Wikis • RSS • AJAX
what is the difference between Web 1.0 and Web 2.0? • 1.0: Webmaster is the only contributor • 2.0: Internet surfers contribute as well as view content
What does Web 2.0 allow users to do? 1. tap into collective intelligence of users; 2. new types of data available; 3. web programming tools mean everyone can be a developer; 4. virtual elimination of software-upgrade cycles; 5. social network focus; 6. Users own, but don’t host data...
What is a 'beta'? Test format
What are two DIRECT revenue approaches? Subscriptions and advertising
What are five INDIRECT revenue approaches? • Strategic acquisition • Maintaining control of hard to recreate data sources • Building attention trust • Turning applications into platforms • Fully automated online customer self-service
What can users share via social media? ⁃ Photos ⁃ Music ⁃ Insights ⁃ Perceptions ⁃ Text ⁃ Images ⁃ Audio ⁃ Video clips...
Define social media. The online tools which people use to share opinions and experiences
What are the 'social media ground rules'? • Communication = conversation, not monologue ⁃ Two-way contact • Participants - people not organizations • Honesty and transparency are core values • It about pull not push • Distribution not centralization
What is a 'virtual community'? A group of people with similar interests who interact with each other using the internet
What are five classifications of virtual communities? ⁃ Traders ⁃ Players ⁃ Just friends ⁃ Enthusiasts ⁃ Friends in need
What are several types of virtual community? ⁃ General ⁃ Practice ⁃ Jobs and careers ⁃ Interest ⁃ Sports, animals, etc ⁃ Affinity ⁃ i.e. gays or pregnant women etc ⁃ Sponsored ⁃ i.e. provided by a business to provide info and conversation on their product
What are nodes in social networks? ⁃ The individual actors within networks
What are ties in social networks? ⁃ The relationships between the actors
What are benefits of social networking for businesses? • Low cost • Credibility & trust - connecting with prospects on a personal basis building trust and credibility • Contacts - you might normally not make (friends of friends)
What are some risks of social networking? • Data theft • Viruses • Online predators • Individuals who claim to be someone that they are not • Social impacts
What are some ways businesses can implement social networking in their advertising strategy? • Consumer feedback ⁃ Blogs, wikis online forums, chatrooms, social networking sites, CR • Viral marketing ⁃ Resultant increased web traffic ⁃ Increased sales ⁃ Dishonest techniques
What are four social commerce concepts? • Social Media • Social Marketing • Social Capital • Social Media Marketing (SMM)
What does SMM stand for? Social media marketing
What are the benefits of social media marketing to customers? ⁃ Low prices (e.g. group purchasing) ⁃ faster communication ⁃ Unhappy customers can quickly spread the message ⁃ Relationship building with retailers ⁃ Assist other customers
What are the benefits of social media marketing to retailers? ⁃ Free ⁃ Don’t have to design a website ⁃ Traffic
What is social shopping? “A method of e-commerce where shoppers friends become involved in the shopping experience. Social shopping attempts to mimic the social interactions found in physical malls and stores”
Communal shopping is where...? Others can provide input
What are some social shopping models? • Social recommendations, rating and reviews, comparisons and conversations • Group buying • Deal purchases, daily deals • Shopping communities and clubs • Peer-to-peer models • Location-based shopping • F-Commerce • Shopping with Twitter
What is crowd-sourcing? The act of taking a job traditionally performed by an employee and outsourcing it to an undefined, generally large group of people in the form of an open call
What are four factors related to crowdsourcing? ⁃ Collective intelligence ⁃ Crowd creation ⁃ Crowd voting ⁃ Crowd supporting and funding
What are six examples of EC security breaches or irritations? • Scams • Fraud • Phishing • Cyber bullying • Piracy • Spam
What are four drivers of EC security problems? • The Internet’s vulnerability - encryption • The shift to profit-induced crimes • The internet underground economy (i.e. credit card) • The dynamic nature of EC systems and the role of insiders
What factors have contributed to the rise in cyber attacks? ⁃ Many systems have a weak point ⁃ Security and ease of use are antithetical to one another ⁃ Security takes a back seat to market pressures ⁃ Only as strong as the weakest link ⁃ Common applications - ie Microsoft
What are some common mistakes in managing security risks? ⁃ Undervalued information ⁃ Narrowly defined security boundary ⁃ Reactive security management ⁃ Dated security management process ⁃ Lack of communication about security responsibilities
What are three types of EC security threats? Intentional attacks and crimes, unintentional threats, hackers/crackers/script buddies
What do script buddies do? Download virus and hacking scripts, but generally don't know what they're doing
What is a 'cracker'? A criminal hacker - stealing, damage, take down company/system
A hacker ______ do damage. Doesn't
What does authorization do? ⁃ Checks that person has right to access certain resources
What does authentication do? ⁃ Checks credentials to check identity
What collects info about attempts to access resources/privileges/security actions? An audit
When applied to data in EC security, what is integrity? Protects from alteration/destruction by accident or unauthorized persons
What is nonrepudiation? The ability to limit parties from reputing that a legitimate action did not happen (i.e. trademe buyer claiming product didn’t arrive)
What is 'social engineering'? Preying on weaknesses of people - getting info from people they aren’t allowed to provide
What are seven types of biometric controls? • Fingerprints • Retina scan • Voice recognition • Voice recognition • Signature • Facial recognition • Keystrokes
Identity theft normally occurs through ______________ breaches non-technical
Coding of clear text using a mathematical algorithm and a secret key to produce cipher text is called..? Encryption
A cipher text is...? an unintelligible string of characters
A Public key is know to _______ user(s) all
A Private key known to _______ user(s) one
Different keys produce ___________ cipher text when used with the same algorithm different
Private key encryption is _______ secure than public less
Private key encryption is _______________? symmetric
What is a symmetric key? When the same key used to encrypt and decrypt
What is an asymmetric key? When there are two different, but mathematically related, keys used to encrypt and decrypt
Public key encryption is _________________. asymmetric
Actual business ethics have _____________ since 1950’s but our expectations have ____________ improved / risen
What does EPM stand for? Electronic performance monitoring
What is EPM? Electronic monitoring and recording of employee behavior
What is one form of EPM software? Silent Watch
What are reasons for employees to monitor their internet access? ⁃ Efficiency ⁃ Maintain employee performance ⁃ Concern that company’s resources are being misused for personal activities ⁃ Protect company against legal liability for illegal activities ⁃ Moral habits ⁃ Ensuring company security
What are the possible negative effects of EPM on employees? ⁃ Negative effect on employee morale ⁃ Encouraging negative management styles ⁃ Economic loss ⁃ Maybe unethical if employees are not informed
What is privacy? • The right to be left alone and the right to be free of unreasonable personal intrusions
What are two rules regarding privacy that are often used in the US? ⁃ The right of privacy is not absolute. Privacy must be balanced against the needs of society ⁃ The public’s right to know is superior to the individual’s right to privacy
What are two statistic regarding website questionnaires? ⁃ 50% of people will disclose personal information on website if they have the chance to win something ⁃ 40% falsify details
What is 'notice/awareness' in regard to privacy? (you want to know what will happen to your info after you hit submit button)
What is 'choice/consent' in regard to privacy? (having a button to check, rather than uncheck)
What is 'access/participation' in regard to privacy? you should be able to access all info you have given company
What is 'integrity/security' in regard to privacy? (details you submit should not change)
What is 'enforcement/redress' in regard to privacy? (force company to do what they stated they would do)
What governs enforcement/redress in NZ? The Privacy Act
What are three major legal issues in regard to EC • Many challenges in terms of EC law • Multiple national, state, regional laws • The jurisdiction under which EC falls is not clear
What are four issues with jurisdiction in EC? ⁃ Where is the company based? ⁃ Where the website is hosted? ⁃ Where are customers/suppliers based? ⁃ Where a possible crime might have taken place?
What is cybersquatting? When somebody holds your trademark hostage as a domain name
What protects companies against cybersquatting? Anti-Cybersquatting Consumer Protection Act ⁃ Can sue to get your domain name
What is an EC Strategy? an organization’s strategy for use of e-commerce or e-business
What are four common EC strategies? Click-and-mortar companies that use many EC applications; Click-and-mortar companies that use only one or two applications; Click-and-mortar companies that use one EC application - fundamentally changes all of their business; Pure play EC companies
What type of EC business strategy does Kmart have? Strategy 2: Click-and-mortar companies that use only one or two applications
What type of EC business strategy does Seek Recruitment have? Strategy 4: Pure play EC
What type of EC business strategy does Air NZ have? Strategy 3: Click-and-mortar companies that use one EC application that fundamentally changes all of their business
Why do companies need EC strategy? • Fast changes in business and technology that opportunities and threats can change in a minute • Company must consider EC strategy with contingency plans
What is initiation in terms of strategy? The initial phase of e-strategy in which an organization prepares information about its vision, mission, purpose, and the contribution that EC would make
What is a 'business case' in EC? Written document that is used by managers to acquire funding for specific applications or projects by providing justification and reasons
What are some factors that contribute to failure in EC Strategy? • Lack of funding • Incorrect revenue model • Revenue growth too slow • Need to move to new business model • Channel conflict • Poor planning
What does Peter Drucker advise companies to do when applying strategy to EC? ⁃ Analyze the opportunities ⁃ Go out to look ⁃ Keep it focused ⁃ Start small ⁃ Aim at market leadership
What are the most successful EC strategies? • Most successful: Brick & mortar companies add online channels ⁃ Low risk - offline business to fall back on • Mergers and acquisition
What is the major advantage in EC of going global? Ability to do business any time, anywhere, rapidly at a reasonable cost
What are some global barriers? • Cultural issues • Culture and language translation • Administrative issues • Geographic issues and localization • Economic issues
What are some solutions to global barriers? • Be strategic • Know your audience • Localize (many different products/websites/etc.) • Think globally, act consistently • Value the human touch • Clarify, document, explain • Offer services that reduce barriers
Created by: ginamaye
Popular Business sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards