click below
click below
Normal Size Small Size show me how
MSYS121
Test 2
Question | Answer |
---|---|
What does ICT stand for? | Information and Computing Technology |
What are the three converging areas of ICT in ubiquitous technology? | Computing devices, Communications, and User Interfaces |
What computing devices are being used for ubiquitous computing? | Many different forms and sizes, from handheld units to nearly invisible devices set into objects such as appliances, furniture and clothing |
What specific aspect of user interfaces are being developed for ubiquitous computing? | So that they can sense information about users and the environment and supply this in various forms to the user |
What are some of the future uses of UC? | Monitoring of pets, houseplants, appliances, books, bicycles, etc |
What is 'pervasive computing'? | The trend towards increasingly ubiquitous connected computing devices in the environment |
What is bringing about the trend for pervasive computing? | Advanced electronics, wireless technologies and the Internet |
What does pervasive computing do? | It spreads intelligence and connectivity to more or less everything |
What are the four principles of pervasive computing? | Decentralization, diversification, connectivity and simplicity |
What is 'context-aware computing? | Application’s ability to detect and react to a set of environmental variables that is described as context |
What are some uses of pervasive computing in homes? | Controlling lighting, energy management, water, security and communication, entertainment, smart appliance |
What is RFID? | A short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers |
What is a sensor network? | A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes |
A short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers is called what? | RFID technology |
What is INRIX? | A traffic application that shows users the volume of traffic on roads around them |
What is a 'mainframe'? | Where many people share a computer |
What is the common device:person ratio of UC? | One person, many computers |
What are some applications available through UC for people to use? | Cars will use the Internet to find an open parking space, or the nearest vegetarian restaurant for their owners, remote computers will monitor our health statistics, smart clothes etc |
Smart clothes are composed of what? | Silk organza with copper foil wrapped around horizontal threads |
What does MEMS stand for? | Micro Electro Mechanical Systems |
How are MEMS composed? | Integrate items such as sensors, computers, data storage and transmission systems onto a single computer chip |
What do MEMS do? | They measure a wide range of physical phenomena e.g. acceleration, inertia and vibration |
What can MEMS be used for? | They can be analytical instruments to measure biological or physical states and can also be active response systems |
What can bots do? | Can automatically sort data based on set preferences, keep track of dynamic data, maintain schedules and calendars, and track movement of things and people. |
How do bots work? | Work together without human initiative or knowledge to automate routine activities |
What will bots have to do with the internet by 2025? | By 2025 the Internet will have evolved into a bot-coordinated, bot-directed “information grid” that connects billions of devices, nodes, and sensors to each other. |
Define 'swarm technology' | The network command-and-control system architecture that will understand and manage the collective movements, reactions, and interactions of masses of interconnected items. |
What do swarms do? | Swarm technology – decentralised arrays of agents or programs interacting with one another and with their surroundings, thus carrying out “intelligent” large-scale behaviour – much like a swarm of bees, school of fish etc. |
What percentage of the world's population has a mobile phone? | 70% |
What is m-commerce? | Any e-commerce done in a wireless environment, especially via the Internet |
M-commerce is a ___________ of e-commerce | Subset |
How is M-Commerce different from normal EC? | The underlying technology is different as m-commerce is limited to mobile telecommunications networks accessed through wireless devices such as mobile phones, hand-held computers and tablets |
What are the key attributes associated with m-commerce? | Ubiquity, convenience, interactivity, personalization, and localization |
What are the key drivers of m-commerce? | Widespread availability, handset culture, the service economy, vendors push, mobile workforce, mobility, price and performance, increasing bandwidth |
What are the benefits of m-commerce for organizations? | Increased sales – order from anywhere, anytime Location-based commerce Additional channel for advertising Better productivity and time utilization for employees |
What are the benefits of m-commerce for individuals? | Internet commerce – anywhere, anytime Choice of mobile devices for same transactions Expedites communications More affordable than desktops or laptops |
Ubiquity, localization, personalization, convenience and interactivity are all attributes of what? | m-commerce |
What are the three most important drivers of m-commerce? | Bandwidth, availability, price & performance |
What are the downsides to m-commerce for individuals? | ⁃ Health ⁃ Less face-to-face interaction - bad social skills ⁃ Those without a mobile device (digital divide) ⁃ Advertising and spam ⁃ Addictions ⁃ Privacy breaches |
What are the downsides to m-commerce for organizations? | ⁃ Expectation -> Cost ⁃ Disintermediation (i.e. bank teller) ⁃ Small Businesses - used to try on products ⁃ Change in shopping habits |
What are some common mobile devices? | Smartphone, tablet, PDA, camera, laptop, etc |
What are five examples of microbrowsers? | Android, iOS, Symbian, Microsoft, Palm |
What does OS stand for? | Operating system |
What is 'bluetooth'? | A chip technology and WPAN standard that enables voice and data communications between wireless devices over short-wave radio frequency |
Why is it challenging to develop software for mobile devices? | ⁃ Apps must be customized for each devices ⁃ Must adapt to match the requirements of the device ⁃ All software must deal with the technology challenges that are common on most mobile devices |
What does application middleware do? | Mediates backend with front end/operating system |
What is a microbrowser? | A wireless web app |
What is a native app? | An app you download |
WHAT ARE SOME ADVANTAGES AND DISADVANTAGES OF NATIVE APPS? | Native: Downloaded… takes up memory… easier to use… doesn’t require zooming in… some restriction of content… easier to log in i.e. FaceBook and IB |
What does SMS stand for? | Short message service |
What does MMS stand for? | Multimedia Message Service |
What does EMS do that is different from SMS? | Has small provider allowing formatting [italics, bold, underline] |
What are four types of wireless transition media in MC infrastructure? | ⁃ Microwave ⁃ Satellites ⁃ Radio ⁃ Infrared ⁃ Cellular radio technology |
What is a type of wireless system in MC infrastructure? | ⁃ Automatic Retailing Refueling System |
What are personal area networks? | • Device to Device communication over a short distance |
What is an example of a personal area network? | Bluetooth |
What are some attributes of Bluetooth? | ⁃ Works for up to 20m ⁃ 2.45GHz radio spectrum (similar to baby monitors garage door opener, etc.) ⁃ Doesn’t require a line of sight (unlike infrared) ⁃ Can connect up to eight devices simultaneously |
What is a problem with personal area networks? | ⁃ Interference and security can be an issue |
What are Wireless Local Area Networks (WLAN) and WIFI? | Shortrange connections to the internet or other networks (wireless fidelity is the most common standard) |
Wha happens at a wireless access point? | ⁃ An antenae connects to a mobile device to a wired LAN |
What IS a wireless hotspot? | ⁃ An area or point where a wireless device can make a connection to a wireless LAN (using WiFi) |
What are some problems with WIFI? | ⁃ Neighborhood wifi interference ⁃ Household electronics ⁃ Humans (70% water… duh) ⁃ Building materials |
How do Wireless Wide Area Networks (WWAN) function? | Over a cellular network |
How many primary generations of WWAN communication bandwidths? | Four (1G, 2G, 3G, 4G) |
WHAT ARE SOME MOBILE FINANCIAL APPLICATIONS? | • Mobile banking ⁃ Mobile access to finical and account information ⁃ Ability to access funds etc • Electronic payment system • Wireless Bill Payments • Wireless Shopping • Mobile and Targeted advertising |
What are some m-commerce applications that the University of Waikato could use to assist its patrons? | ⁃ Mobile Library Chat - like the online one but mobile ⁃ Improve online enrollments ⁃ Mobile app for MyWeb ⁃ Assignment Reminders ⁃ Timetable ⁃ E-Bookstore - secondhand bookstore ⁃ Database - car park locator |
What is the most common type of WIFI? | 802.11b |
What is wifi technically know as? | IEEE 8.02.1 |
The delivery of m-commerce transactions to individuals in a specific location, at a specific time is called what? | Location-based m-commerce |
What are the five key factors to l-commerce? | Navigation, timing, mapping, tracking, location |
What does the location factor do in l-commerce? | Determines the basic position of a person or thing |
What does the navigation factor do in l-commerce? | Plots a route from one location to another |
What does the tracking factor do in l-commerce? | Monitoring movement of a person or a thing |
What does the mapping factor do in l-commerce? | Creates maps of specific geographical locations |
What does the timing factor do in l-commerce? | Determines the precise time at a specific location |
What are the five key pieces of infrastructure in location-based m-commerce? | Mobile Devices Communication Network Positioning Component Service or application provider Data or content provider |
What is geolocation? | The process of automatically identifying a Web user’s physical location without that user having to provide any information |
What are the two systems for geolocation? | Network-based positioning and terminal based positioning |
How does network-based positioning work for geolocation? | Relies on base stations to find the location of a mobile device sending a signal or sensed by the network |
How does terminal-based positioning work for geolocation? | Calculates the location of a mobile device from signals sent by the device to base stations |
What does GPS allow users to do? | Enable users to determine exact positions anywhere in the world, based on a world wide tracking system |
What does GIS stand for? | Geographical information system |
What is a GIS capable of doing? | Integrating, storing, editing, analyzing, sharing and displaying geographically-referenced information. |
Visualization technology which integrates GPS data into digitized maps is a ...? | GIS |
What is a location-based service? | Information service available via your mobile device utilizing the ability to use the geographic position of the device to receive information about relevant services. |
What are five barriers to location-based MC? | Lack of GPS in mobile phones Accuracy of devices The cost–benefit justification Limited network bandwidth Invasion of privacy |
What are some possible examples of L-based MC? | • Farms - crop rotation info of nearby fields, fertilizing history, content of feed storage, livestock locations, data of the cooling system, etc • TRACKING CHILDREN LOL |
What are some of the top 10 trends for mobile apps in 2013? | Application security and threats will become important Android fragmentation will be a major challenge Tablets will appear in every home and will need tablet applications The number of active users - more important than the number of downloads... etc |
What are some examples of location-based services? | ⁃ Recommending social events in a city ⁃ Finding ATM or restaurant ⁃ Providing navigation ⁃ Locating people ⁃ Delivering alerts - sale or traffic jam ⁃ Asset recovery |
What are three major aspects of social commerce? | • Web 2.0 • Social Networking • Social Commerce |
Who first proposed Web 2.0? | Darcy diNucci (1999) - is closely associated with Tim O’Reilly |
What are four important factors of Web 2.0? | • Participation • Wikis • RSS • AJAX |
what is the difference between Web 1.0 and Web 2.0? | • 1.0: Webmaster is the only contributor • 2.0: Internet surfers contribute as well as view content |
What does Web 2.0 allow users to do? | 1. tap into collective intelligence of users; 2. new types of data available; 3. web programming tools mean everyone can be a developer; 4. virtual elimination of software-upgrade cycles; 5. social network focus; 6. Users own, but don’t host data... |
What is a 'beta'? | Test format |
What are two DIRECT revenue approaches? | Subscriptions and advertising |
What are five INDIRECT revenue approaches? | • Strategic acquisition • Maintaining control of hard to recreate data sources • Building attention trust • Turning applications into platforms • Fully automated online customer self-service |
What can users share via social media? | ⁃ Photos ⁃ Music ⁃ Insights ⁃ Perceptions ⁃ Text ⁃ Images ⁃ Audio ⁃ Video clips... |
Define social media. | The online tools which people use to share opinions and experiences |
What are the 'social media ground rules'? | • Communication = conversation, not monologue ⁃ Two-way contact • Participants - people not organizations • Honesty and transparency are core values • It about pull not push • Distribution not centralization |
What is a 'virtual community'? | A group of people with similar interests who interact with each other using the internet |
What are five classifications of virtual communities? | ⁃ Traders ⁃ Players ⁃ Just friends ⁃ Enthusiasts ⁃ Friends in need |
What are several types of virtual community? | ⁃ General ⁃ Practice ⁃ Jobs and careers ⁃ Interest ⁃ Sports, animals, etc ⁃ Affinity ⁃ i.e. gays or pregnant women etc ⁃ Sponsored ⁃ i.e. provided by a business to provide info and conversation on their product |
What are nodes in social networks? | ⁃ The individual actors within networks |
What are ties in social networks? | ⁃ The relationships between the actors |
What are benefits of social networking for businesses? | • Low cost • Credibility & trust - connecting with prospects on a personal basis building trust and credibility • Contacts - you might normally not make (friends of friends) |
What are some risks of social networking? | • Data theft • Viruses • Online predators • Individuals who claim to be someone that they are not • Social impacts |
What are some ways businesses can implement social networking in their advertising strategy? | • Consumer feedback ⁃ Blogs, wikis online forums, chatrooms, social networking sites, CR • Viral marketing ⁃ Resultant increased web traffic ⁃ Increased sales ⁃ Dishonest techniques |
What are four social commerce concepts? | • Social Media • Social Marketing • Social Capital • Social Media Marketing (SMM) |
What does SMM stand for? | Social media marketing |
What are the benefits of social media marketing to customers? | ⁃ Low prices (e.g. group purchasing) ⁃ faster communication ⁃ Unhappy customers can quickly spread the message ⁃ Relationship building with retailers ⁃ Assist other customers |
What are the benefits of social media marketing to retailers? | ⁃ Free ⁃ Don’t have to design a website ⁃ Traffic |
What is social shopping? | “A method of e-commerce where shoppers friends become involved in the shopping experience. Social shopping attempts to mimic the social interactions found in physical malls and stores” |
Communal shopping is where...? | Others can provide input |
What are some social shopping models? | • Social recommendations, rating and reviews, comparisons and conversations • Group buying • Deal purchases, daily deals • Shopping communities and clubs • Peer-to-peer models • Location-based shopping • F-Commerce • Shopping with Twitter |
What is crowd-sourcing? | The act of taking a job traditionally performed by an employee and outsourcing it to an undefined, generally large group of people in the form of an open call |
What are four factors related to crowdsourcing? | ⁃ Collective intelligence ⁃ Crowd creation ⁃ Crowd voting ⁃ Crowd supporting and funding |
What are six examples of EC security breaches or irritations? | • Scams • Fraud • Phishing • Cyber bullying • Piracy • Spam |
What are four drivers of EC security problems? | • The Internet’s vulnerability - encryption • The shift to profit-induced crimes • The internet underground economy (i.e. credit card) • The dynamic nature of EC systems and the role of insiders |
What factors have contributed to the rise in cyber attacks? | ⁃ Many systems have a weak point ⁃ Security and ease of use are antithetical to one another ⁃ Security takes a back seat to market pressures ⁃ Only as strong as the weakest link ⁃ Common applications - ie Microsoft |
What are some common mistakes in managing security risks? | ⁃ Undervalued information ⁃ Narrowly defined security boundary ⁃ Reactive security management ⁃ Dated security management process ⁃ Lack of communication about security responsibilities |
What are three types of EC security threats? | Intentional attacks and crimes, unintentional threats, hackers/crackers/script buddies |
What do script buddies do? | Download virus and hacking scripts, but generally don't know what they're doing |
What is a 'cracker'? | A criminal hacker - stealing, damage, take down company/system |
A hacker ______ do damage. | Doesn't |
What does authorization do? | ⁃ Checks that person has right to access certain resources |
What does authentication do? | ⁃ Checks credentials to check identity |
What collects info about attempts to access resources/privileges/security actions? | An audit |
When applied to data in EC security, what is integrity? | Protects from alteration/destruction by accident or unauthorized persons |
What is nonrepudiation? | The ability to limit parties from reputing that a legitimate action did not happen (i.e. trademe buyer claiming product didn’t arrive) |
What is 'social engineering'? | Preying on weaknesses of people - getting info from people they aren’t allowed to provide |
What are seven types of biometric controls? | • Fingerprints • Retina scan • Voice recognition • Voice recognition • Signature • Facial recognition • Keystrokes |
Identity theft normally occurs through ______________ breaches | non-technical |
Coding of clear text using a mathematical algorithm and a secret key to produce cipher text is called..? | Encryption |
A cipher text is...? | an unintelligible string of characters |
A Public key is know to _______ user(s) | all |
A Private key known to _______ user(s) | one |
Different keys produce ___________ cipher text when used with the same algorithm | different |
Private key encryption is _______ secure than public | less |
Private key encryption is _______________? | symmetric |
What is a symmetric key? | When the same key used to encrypt and decrypt |
What is an asymmetric key? | When there are two different, but mathematically related, keys used to encrypt and decrypt |
Public key encryption is _________________. | asymmetric |
Actual business ethics have _____________ since 1950’s but our expectations have ____________ | improved / risen |
What does EPM stand for? | Electronic performance monitoring |
What is EPM? | Electronic monitoring and recording of employee behavior |
What is one form of EPM software? | Silent Watch |
What are reasons for employees to monitor their internet access? | ⁃ Efficiency ⁃ Maintain employee performance ⁃ Concern that company’s resources are being misused for personal activities ⁃ Protect company against legal liability for illegal activities ⁃ Moral habits ⁃ Ensuring company security |
What are the possible negative effects of EPM on employees? | ⁃ Negative effect on employee morale ⁃ Encouraging negative management styles ⁃ Economic loss ⁃ Maybe unethical if employees are not informed |
What is privacy? | • The right to be left alone and the right to be free of unreasonable personal intrusions |
What are two rules regarding privacy that are often used in the US? | ⁃ The right of privacy is not absolute. Privacy must be balanced against the needs of society ⁃ The public’s right to know is superior to the individual’s right to privacy |
What are two statistic regarding website questionnaires? | ⁃ 50% of people will disclose personal information on website if they have the chance to win something ⁃ 40% falsify details |
What is 'notice/awareness' in regard to privacy? | (you want to know what will happen to your info after you hit submit button) |
What is 'choice/consent' in regard to privacy? | (having a button to check, rather than uncheck) |
What is 'access/participation' in regard to privacy? | you should be able to access all info you have given company |
What is 'integrity/security' in regard to privacy? | (details you submit should not change) |
What is 'enforcement/redress' in regard to privacy? | (force company to do what they stated they would do) |
What governs enforcement/redress in NZ? | The Privacy Act |
What are three major legal issues in regard to EC | • Many challenges in terms of EC law • Multiple national, state, regional laws • The jurisdiction under which EC falls is not clear |
What are four issues with jurisdiction in EC? | ⁃ Where is the company based? ⁃ Where the website is hosted? ⁃ Where are customers/suppliers based? ⁃ Where a possible crime might have taken place? |
What is cybersquatting? | When somebody holds your trademark hostage as a domain name |
What protects companies against cybersquatting? | Anti-Cybersquatting Consumer Protection Act ⁃ Can sue to get your domain name |
What is an EC Strategy? | an organization’s strategy for use of e-commerce or e-business |
What are four common EC strategies? | Click-and-mortar companies that use many EC applications; Click-and-mortar companies that use only one or two applications; Click-and-mortar companies that use one EC application - fundamentally changes all of their business; Pure play EC companies |
What type of EC business strategy does Kmart have? | Strategy 2: Click-and-mortar companies that use only one or two applications |
What type of EC business strategy does Seek Recruitment have? | Strategy 4: Pure play EC |
What type of EC business strategy does Air NZ have? | Strategy 3: Click-and-mortar companies that use one EC application that fundamentally changes all of their business |
Why do companies need EC strategy? | • Fast changes in business and technology that opportunities and threats can change in a minute • Company must consider EC strategy with contingency plans |
What is initiation in terms of strategy? | The initial phase of e-strategy in which an organization prepares information about its vision, mission, purpose, and the contribution that EC would make |
What is a 'business case' in EC? | Written document that is used by managers to acquire funding for specific applications or projects by providing justification and reasons |
What are some factors that contribute to failure in EC Strategy? | • Lack of funding • Incorrect revenue model • Revenue growth too slow • Need to move to new business model • Channel conflict • Poor planning |
What does Peter Drucker advise companies to do when applying strategy to EC? | ⁃ Analyze the opportunities ⁃ Go out to look ⁃ Keep it focused ⁃ Start small ⁃ Aim at market leadership |
What are the most successful EC strategies? | • Most successful: Brick & mortar companies add online channels ⁃ Low risk - offline business to fall back on • Mergers and acquisition |
What is the major advantage in EC of going global? | Ability to do business any time, anywhere, rapidly at a reasonable cost |
What are some global barriers? | • Cultural issues • Culture and language translation • Administrative issues • Geographic issues and localization • Economic issues |
What are some solutions to global barriers? | • Be strategic • Know your audience • Localize (many different products/websites/etc.) • Think globally, act consistently • Value the human touch • Clarify, document, explain • Offer services that reduce barriers |