Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
183 Cards in this Set
- Front
- Back
Electronic Commerence (e-commerce)
|
commerce, but it is commerce accelerated and enhanced by IT, in particular the Internet
|
|
Path-to-Profitability (P2P)
|
a formal business plan that outiline key business issues such as customer targets (by demopgraphic, industry,, etc.), marketing strategies, operations strategies (ex: production, transportation, and logistics), and projected targets for income-statement and balence-sheet items
|
|
Business to Buesiness (B2B) e-commerce
|
when a business sells producets and services to customers who are primarily other businesses
|
|
Ad-supported
|
derives revenue by selling advertising space, much like the conscep of an affiliate program
|
|
Affiliate program
|
an arrangement made between two e-commerce sites tha directs viewers from one site to the other
|
|
Business to Consumer (B2C) e-commerce
|
when a business sells products and servicesto customers who are primarily individuals
|
|
Business to Government (B2G) e-commerce
|
occurs when a business sells products and services to a government entity
|
|
Click-and-motar
|
refers to those organizations that have a presence in the physical world such as a building you can visits and also a presence in the virtual wordls of the Internet
|
|
Click-and-order (Pure Play)
|
an organization that has a presence in the virtual world but no presence in the physical world
|
|
Click-through
|
a count of the number of people who visit one site. click on an ad, and are taken to the site of the advertiser
|
|
Consumer to Business (C2B) e-commerce
|
when an individual sells products and services to a business
|
|
Consumer to Consumer (C2C) e-commerce
|
When an individual sell products and services to other individuals
|
|
Consumer to Government (C2G) e-ecommerce
|
when an individual sells products and services to a government entity
|
|
Conversion rate
|
the percentage of potential customers who visit your site who actually buy something
|
|
Demand aggregation
|
the combining of purchase request from multiple buyers into a single larer order, which justifies a discount from the business
|
|
Digital immigrant
|
people who were born and raised in a time prior to the digital society in which we now live
|
|
Digital native
|
generation of oepole ushered into this world in the midst of the digital revolution
|
|
Digital wallet
|
both software and information- the software provides security for the transaction and the information includes payment information (ex: the credit card number and expriration date) and delivery information
|
|
Direct Materials
|
materials that are used in production in a manufactuing company or are placed on the shelf for sale in a retail environment
|
|
Electronic Bill Presentment and Payment (EBPP)
|
a system that sends bills (usually to end consumers ) over the Internet and provides an easy-to-use mechanism (sucah as clicking on a button) to pay them if the amount looks correct
|
|
Electronic check
|
a mechanism for sending money from your checking or savings account to antoher person or organization
|
|
Electronic commerce (e-commerce)
|
commerce, but it sis accelerated and enhavnce by IT, in particular the Internet
|
|
Electronic data interchange (EDI)
|
direct computer-to-computer transfer of transaction information contained in starndard business documents, sucha s invoiuces and pruchase orders, in a standard format
|
|
Electronic government (e-government)
|
use of digital technonlogies to transform government operations in order to improve efficiency, effectiveness, and service delivery
|
|
Encryption
|
scrambles the contents of a file so that you can NOT read it without having the right decryption key
|
|
Financial cyermediary
|
Interntet-based company that makes it easy for one person to pay another person or organziation over the internet
|
|
Financial EDI (financial electronic data interchange)
|
an electronic jprocess used primarily within the Business to Business e-commerece model for the payment of purchases
|
|
Government to Business (G2B) e-commerce
|
when a government entity sells products and sercices to businesses
|
|
Government to Consumer (G2C) e-commerce
|
the electronic commerce activities performed between a governement and its citizens or consuemrs including paying taxes, registering vehicles, and providing inforamtion and services
|
|
Government to Government (G2G) e-commerce
|
either (1) the electronic commerence activites performed within a single nation's government or (2) the electonic commerece activites performed between two or more nations' governments including providing foreign aid
|
|
Horizontal e-marketplace
|
an electonic marketplace that connects buyers and sellers across may industries, primarily for MRO materials commerce
|
|
Horizontal government integration
|
electronic intergation or agencies, activities, and processes across a specific level of government
|
|
Long Tail
|
refers to the tail of a sales curve-first offered by Chris Anderson, editor-in-chief of Wired Magazine, as a way of explaining e-commerce profitability
|
|
M-Commerce (Wireless e-commerce)
|
term used to describe electronic commerce conducted over a wireless decice such as a cell phone, PRA, or notebook
|
|
Maintenance, Repair, and Operations (MRO) materials (indirect materials)
|
materials that are necessary for running a modern corporation, but do not relate to the company's primary business activities
|
|
Marketing mix
|
set of marketing tools that your organization will use to pursue its marketing objectives in reaching and attracting potential customers
|
|
Mass Customization
|
ability of an organization to give its customers the opportunity to tailor its product or service to the customer's specifications
|
|
Mobile Computing
|
broad general term describing your ability to use technology to wirelessly connect to and use centrally located information and/or application software
|
|
Online Ad (banner ad)
|
small advertisement that appears on other sites
|
|
Path-to-profitability (p2p)
|
a formal business plan that outlines key business issues such as customer targets (by demographics, industry, etc.), marketing strategies, operations, strategies (eg: production, transportations, and logistics), and projected targets for income-statement and balance-sheet items.
|
|
Pop-under ad
|
a form of a pop-up that you do not see until you close your current browser window.
|
|
Pop-up ad
|
small Web page containing an advertisement that appears on your screen outside the current Web site loaded into your browser
|
|
Public key encryption (PKE)
|
an encryption system that uses two keys; a public key that everyone can have a private key for only the recipient
|
|
Push Technology
|
an environment in which businesses and organizations come to you via technology with information, services, and product offerings based on your profile
|
|
Reverse auction
|
the process in which a buyer posts its interest in buying a certain quantity of items with notations concerning quality, specification, and delivery timing, and sellers compete for the business by submitting successively lower bids until there is only one seller left.
|
|
Screenager
|
the term applied to the current generation of young people because they spend so much time in front of a screen
|
|
Secure Electronic Transaction (SET)
|
a transmission security method that ensures transaction are legitimate as well as secure
|
|
Secure Sockets Layer (SSL)
|
creates a secure and private connections between a Web client computer and a Web server computer, encrypts the information, and ten sends the information over the Internet
|
|
Smart Card
|
a plastic card the size of a credit card that contains an embedded chip on which digital information can be stored and updated
|
|
Vertical e-marketplace
|
an electronic marketplace that connects users an sellers in a given industry (eg: oil and gas, textiles, and retail)
|
|
Vertical government integration
|
electronic integration of agencies, activities, and processes up and down federal, state, and local government levels
|
|
Viral marketing
|
encourages users of a product or service supplied by a B2C e-commerce business to encourage friends to join in as well
|
|
Agile Methodology
|
form of extreme programming that aims for customer satisfaction through early and continuous delivery of useful software components.
|
|
Analysis phase
|
of the system development life cycle involves end users and IT specialists working together to gather, understand, and document the business requirements for the proposed system
|
|
Business requirements
|
a detailed set of knowledge worker requests that the system must meet to be successful
|
|
Component-based development (CBD)
|
a general approach to systems development that focuses on building small self-contained blocks of code (components) that can be reused across a variety of applications within an organization
|
|
Critical success factor (CSF)
|
a factor simply critical to your organization's success
|
|
Design phase
|
of the systems development life cycle builds a technical blueprint of how the proposed system will work
|
|
Development phase
|
of the systems development life cycle takes all your detailed design documents from the design phase and transforms them into an actual system
|
|
Extreme programming (XP) methodology
|
breaks a project into tiny phases and developers cannot continue on to the next phase until the first phase is complete
|
|
Feature Creep
|
occurs when developers add extra features that were not part of the initial requirements
|
|
Help Desk
|
a group of people who respond to knowledge workers' questions
|
|
Implementation phase
|
of the systems development life cycle distributes the system to all the knowledge workers and they begin using the system to perform their everyday jobs
|
|
In sourcing
|
Using IT specialists within your organization to develop the system
|
|
Integration testing
|
verifies that separate systems can work together
|
|
Invisible backlog
|
the list of all systems that an organization needs to develop but-because of the prioritization of systems development needs- never get funded because of the lack of organizational resources
|
|
Joint application development (JAD)
|
occurs when knowledge workers and IT specialist meet, sometimes for several days, to define and review the business requirements for the system
|
|
Maintenance phase
|
of the systems development life cycle monitors and supports the new system to ensure it continues to meet the business requirements
|
|
Near shore outsourcing
|
contracting an outsourcing arrangement with a company in a nearby country
|
|
Offshore outsourcing
|
contracting with a company that is geographically far away.
|
|
Online training
|
runs over the Internet or off a CD or DVD
|
|
Onshore outsourcing
|
the process of engaging another company in the same country for services
|
|
Outsourcing
|
the delegation of specific work to a third party for a specified length of time, at a specified cost, and at a specified level of service
|
|
Parallel implementation
|
using both the old and new system until you're sure that the new system performs correctly
|
|
Phased implementation
|
implementing the new system in phases (eg: accounts receivables, then accounts payable) until you're sure it works correctly and then implementing the remaining phases of the new system
|
|
Pilot implementation
|
having only a small group of people us the new system until you know it works correctly and then adding the remaining people to the system
|
|
Planning phase
|
of the systems development life cycle, in which you create a solid plan for developing your information system
|
|
Plunge implementation
|
discarding the old system completely and immediately using the new system
|
|
Project manager
|
an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure all key project milestones are completed on time
|
|
Project milestone
|
represents a key date by which you need a certain group of activities performed
|
|
Project plan
|
defines the what, when, and who questions of systems development including all activities to be performed, the individuals, or resources, who will perform the activities, and the tie required to complete each activity.
|
|
Project scope document
|
a written definition of the project scope, usually non longer than a paragraph.
|
|
Proof-of- concept prototype
|
a prototype you use to prove the usually no longer than a paragraph
|
|
Prototype
|
a smaller-scale representation or working model of the user's requirements or a proposed design for an information system
|
|
Prototyping
|
the process of building a model that demonstrates the features of a proposed product, service, or system
|
|
Rapid application development (RAD) (rapid prototyping) methodology
|
emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the system development process
|
|
Request for proposal (RFP)
|
formal document that describes in detail your logical requirements for a proposed system ad invites outsourcing organization (or "vendors") to submit bids for its development
|
|
Requirements definition document
|
defines all the business requirements and prioritizes them in order of business importance
|
|
Scope creep
|
occurs when the scope of the project increases beyond its original intentions
|
|
Selfscourcing (end-user development)
|
the development and support of IT system by end users (knowledge workers) with little or no help form IT specialist
|
|
Selling prototype
|
prototype you use to convince people of the worth of a proposed system
|
|
Service level agreement (SLA)
|
formal contractually obligated agreement between two parties; within different environment, an SLA takes on different meanings
|
|
Service level objective (SLO)
|
supporting document to a service level agreement that clearly defines key metrics fro success regarding the SLA
|
|
service level specification (SLS)
|
same as SLO
|
|
Service-oriented architecture (SOA or SoA)
|
a software architecture perspective that focuses on the development, use, and reuse of small self-contained blocks of code (called services) to meet all the application software needs of an organization
|
|
Sign-off
|
knowledge workers' actually signatures indicating they approve all the business requirements
|
|
System development life cycle (SDLC)
|
a structured step-by-step approach for developing information systems
|
|
System testing
|
verifies that the units or pieces of code written for a system function correctly when integrated into the total system
|
|
Technical architecture
|
defines the hardware, software, and telecommunications equipment required to run the system
|
|
Test condition
|
detailed steps the system must perform along with the expected results of each step
|
|
Testing phase
|
of the systems development life cycle verifies that the system works and meets all the business requirements defined in the analysis phase
|
|
Unit testing
|
test individual units or pieces of code for a system
|
|
User acceptance testing (UAT)
|
determines if the system satisfies the business requirements and enables knowledge workers to perform their jobs correctly
|
|
User documentation
|
highlights how to use the system
|
|
Waterfall methodology
|
a sequential, activity-based process in which one phase in the SDLC is followed by another from planning through implementation
|
|
Workshop training
|
held in a classroom environment and is led by an instructor
|
|
1-tier infrastructure
|
most basic setup because it involves a single tier on a single machine
|
|
2-tier infrastructure
|
basic client/server relationship
|
|
3-tier infrastructure
|
most common approach used for Web applications today
|
|
abandon rate
|
the percentage of callers who hang up while waiting for their call to be answered
|
|
abandon registration
|
number of visitors who start the process of completing a registration page and then abandon the activity.
|
|
abandon shopping cart
|
number of visitors who create a shipping cart and start the process of completing a registration page and then abandon the activity
|
|
accuracy
|
usually measured inversely as error rate, or the number of errors per thousand (or millions) that a system generates
|
|
application service provider (ASP)
|
supplies software applications (and often related services such as maintenance , technical support, and the like) over the Internet that would otherwise reside on its customers' in-house computers.
|
|
average speed to answer (ASA)
|
average time, usually in seconds, that it takes for a call to be answered by an actual person
|
|
benchmark
|
a process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance.
|
|
benchmarks (other one is benchmarking)
|
baseline values a system seeks to attain
|
|
business continuity plan (BCP)
|
step-by-step guideline defining how the organization will recover from a disaster or extended disruption of its business processes
|
|
call center metric
|
measure the success of call center efforts
|
|
centralized infrastructure
|
involves sharing of information systems in one central area or one central mainframe
|
|
click-through
|
a count of the number of people who visit one site, click on an ad, and are taken to the site of the advertiser
|
|
client/server infrastructure (client/server network)
|
network in which one or more computers are servers and provide service tot he other computers, call clients
|
|
cold site
|
separate facility that does not have any computer equipment but is a place where the knowledge workers can more after the disaster
|
|
collocation facility
|
available to a company that rents space and telecommunications equipment from another company
|
|
conversion rate
|
the percentage of potential customers who visit your site who actually buy something.
|
|
cost-per-thousand (CPM)
|
sales dollars generated per dollar of advertising, commonly used to make the case for spending money to appear on a search engine
|
|
decentralized infrastructure
|
involves little or no sharing of information systems
|
|
disaster recovery cost curve
|
charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering form a disaster over time
|
|
disaster recovery path
|
detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood
|
|
distributed infrastructure
|
involves distributing the information and processing power of IT systems via a network
|
|
effectiveness
|
refers to doing the right thing
|
|
efficiency
|
doing something right (ex: in the least time, at the lowest cost, which the fewest errors, etc)
|
|
first call resolution (FCR)
|
the percentage of calls that can be resolved without having to call back
|
|
hot site
|
a separate and fully equipped facility where the company can move immediately after the disaster and resume
|
|
infrastructure
|
relative term meaning " the structure beneath a structure"
|
|
Infrastructure-centric metric
|
typically a measure of the efficiency, speed, and/or capacity of technology
|
|
interoperability
|
capability of two or more computing components to share information and other resources, even if they are made by different manufactures
|
|
n-tier infrastructure
|
balances the work of the network over several different servers
|
|
page exposures
|
average number of page exposures to an individual visitor
|
|
requirement recovery document
|
formal document that describes in detail your logical requirements for a proposed system and invites outsourcing organization (or "vendors") to submit bids for its development
|
|
response time
|
average time to respond to a user-generated event, such as a request for a report, a mouse click, and so on
|
|
risk assessment
|
process of evaluating IT assets, their importance to the organization, an their susceptibility to threats to measure the risk exposure of these assets
|
|
Scalability
|
refers to how well your system can adapt to increased demands
|
|
service level agreement (SLA)
|
a formal contractually obligated agreement between two parties; within different environment, an SLA takes on different meanings
|
|
service level objective ( SLO)
|
supporting document to a service level agreement that clearly defines key metrics for success regarding the SLA
|
|
service level specification (SLS)
|
supporting document to a service level agreement that clearly defines key metrics for success regarding the SLA
|
|
Service -oriented architecture (SoA or SOA)
|
a software architecture perspective that focuses on the development, use, and reuse of small self-contained blocks of code (called services) to meet all the application software needs of an organization
|
|
System availability
|
usually measured inversely as downtown, or the average amount of time a system is down and unavailable to end users and customers
|
|
throughput
|
amount of information that can pass through a system in a given amount of time
|
|
Tiered infrastructure (layer infrastructure)
|
IT system is partitioned into tiers (or layers) where each tier (or layer) performs a specific type of functionality
|
|
time service factor (TSF)
|
percentage of calls answered within a specific time frame, such as 30 or 90 seconds
|
|
total hits
|
number of visits to your Web site, many of which may be by the same visitor
|
|
transaction speed
|
speed at which a system can process a transaction
|
|
unique visitors
|
number of unique visitors to your sites in a given time
|
|
web-centric metric
|
a measure of the success of your Web and e-business initiatives.
|
|
Adware
|
software to generate ads that installs itself on your computer when you download some other (usually free) programs from the Web
|
|
Anonymous Web browsing (AWB)
|
hides your identity from the Web sites you visit
|
|
Anti-virus software
|
detects and removes or quarantines computer viruses
|
|
Biometrics
|
use of physiological characteristics-such as you fingerprint, the blood vessels in the iris of your eye, the sound of your voice, or perhaps even your breathe-to provide identification
|
|
Clickstream
|
stored record about your Web surfing sessions, such as which Web sites you visited, how long you were there, what ads you looked at, and what you bought
|
|
Computer virus (virus)
|
software that is written with malicious intent to cause annoyance or damage
|
|
Cookie
|
small record deposited on your hard disk by a Website containing information about you
|
|
Copyright
|
legal protection afforded an expression of an idea, such as a song, video game,and some types of proprietary
|
|
Denial-of-service attack (DoS)
|
floods a server or network with so many request for service that it slows down or crashes
|
|
Encryption
|
scrambles the contents of a file so that you can't read it without having the right decryption key
|
|
Ethics
|
principles and standards that guide our behavior toward other people
|
|
Fair Use Doctrine
|
allows you to use copyrighted material in certain situations
|
|
Firewall
|
software and/or hardware that protects a computer or network form intruders
|
|
Hacker
|
knowledgeable computer user who use his or her knowledge to invade other people's computers
|
|
Hardware key logger
|
hardware device that captures keystrokes on their journey from the keyboard tot he motherboard
|
|
Identity theft
|
forgoing of someone's identity for the purpose of fraud
|
|
Intellectual property
|
intangible creative work that is embodied in physical form
|
|
Key logger software (key trapper software)
|
program that, when installed on a computer, records every keystroke and mouse click
|
|
Pharming
|
rerouting of your request for a legitimate website, that is, you type in the correct address for your bank and are redirected to a fake site that collects information from you.
|
|
Phishing (carding or brand spoofing
|
technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail
|
|
Pirated software
|
unauthorized use, duplication, distribution or sale of copyrighted software
|
|
Privacy
|
right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
|
|
Public key encryption (PKE)
|
encryption system that uses to keys; a public key that everyone can have and a private key for only the recipient
|
|
Spam
|
unsolicited e-mail (electronic junk mail) from businesses that advertises good and services
|
|
Spyware (sneakware or stealthware)
|
malicious software that collects information about you and your computer and reports it to someone else without your permission
|
|
Trojan horse software
|
software you do NOT want hidden inside software you do want
|
|
Web log
|
consists of one line of information for every visitor to a website and is usually stored on a web server
|
|
Worm
|
type of virus that replicates and spreads itself, not just from file to file, but form computer to computer via e-mail and other internet traffic
|