click below
click below
Normal Size Small Size show me how
MIS 140
Question | Answer |
---|---|
business over the internet | e-commerce |
formal business plan | path-to-profitability |
business with a presence in the real world too | click-and-mortar |
business with only a presence in the virtual world | click-and-order |
the ability of an organization to give its customers a tailored product or service | mass customization |
combination of purchase requests from multiple buyers to get a larger supplier discount | demand aggregation |
materials used in production or retail | direct materials |
buyer posts specifications and recieves bids from sellers | reverse auction |
place where multiple buyers and sellers can engage in e-commerce | e-marketplace |
set of marketing tools used by a business to achieve its marketing goals | marketing mix |
encourages users to encourage friends to participate as well | viral marketing |
arrangement between two e-commerce sites that directs viewers from one site to the other | affiliate program |
count of the number of people who click on an ad to be taken to that site | click-through |
percentage of potential customers who visit your site and actually buy something | conversion rate |
internet company that makes payment online easier | financial cybermediary |
scrambiling the contents of a file so that you can't read it without having a key | encryption |
businesses come to you via technology | push technologies |
in-house specialists develop IT systems | insourcing |
development of IT systems by the end user or knowledge worker | selfsourcing |
delegation of work to a third party | outsourcing |
structured step-by-step approach to developing information systems | systems development life cycle |
building a model that demonstrates the features of a proposed product, service, or system | prototyping |
simple model of a proposed product, service, or system | prototype |
formal document that describes in detail the requirements for a proposed system that will be submitted for bids for development | request for proposal |
creating a solid plan for developing your information system | planning |
gathering, understanding, and documenting the business requirements | analysis |
building a technical blueprint of how the proposed system will work | design |
taking all the design documents and transforming them into an actual system | development |
verifying that the system works and meets all requirements | testing |
distributing and using the new system | implementation |
monitoring and supporting the new system | maintenance |
systematic process for finding new IT systems | systems planning |
factors that can be monetarily quantified | tangible cost |
factors that cannot be monetarily quantified | intangible cost |
possibility that a system will not achieve the predicted benefits | IT systems risk |
calculates a measure of IT systems value | capital investment analysis |
principles and standards that guide our behavior toward other people | ethics |
intangible creative work that is embodied in physical form | intellectual property |
legal protection of intellectual property | copyright |
says you may use copyrighted material in certain situations | fair use doctrine |
unauthorized use of copyrighted software | pirated software |
software that tracks every keystroke or mouse click | key logger software |
forging someones identity for fraud | identity theft |
gaining personal information for the purpose of identity theft, usually by email | phishing |
rerouting of your request to an illigitimate website made to look like the real one | pharming |
small file containing info about you and your website activities | cookie |
unsolicited junk email | spam |
software that generates ads that install on your computer when you download some other program | adware |
software you don't want hidden inside software you do want | trojan horse software |
malicious software that collects information about you and reports it to someone without your permission | spyware |
records one line for every visitor to a website | web log |
records information during a web surfing session | clickstream |
software written to cause damage | virus |
virus that spreads itself from computer to computer | worm |
use of physiological characteristics to provide identification | biometrics |
converts URLs to IP addresses | domain name server |
connection of 2 or more IT components | network |
electronic movement of information | telecomminications |
degree to which you can increase or decrease capacity of a network | scalability |
an organization's private internet | intranet |
security software that protects against outside access | firewall |
the paths over which info travels | communications media |
the range of frequencies available on a communications medium | bandwidth |
collection, authentication, preservation, and examination of electronic information for presentation in court | computer forensics |
exact copy of an electronic medium | forensic image copy |
unique number that is based on the contents of the medium | MD5 hashvalue |