Exam 3 Flashcards

(93 cards)

1
Q

social media enables people

A

to form communities of practice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is SMIS

A

Social media information systems

that support of sharing of content among network users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SMIS Roles

A

Social Media providers
Users
Communities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Social media providers

A

enable the creation of social networks

ex. Facebook, google+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a viral hook

A

an inducement or prize for passing communication along through the tiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SMIS components

A
Hardware
Software
Data
Procedures
People
(Look at figure 8-4 for examples)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is content data

A

data and responses to data that are contributed by users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Connection data

A

data about relationships ex. liking a particular organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is social CRM

A

it is CRM but with social networking; gives more power to the customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

crowd sourcing

A

social media process of employing users to participate in product design or product redesign.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

human capital

A

investment in human knowledge and skills for future profit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

social capital

A

investment in is social relations with the expectations of returns in the marketplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

according to Lin, how does social capital add value

A
  1. information
  2. influence
  3. social credentials
  4. personal reinforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how to determine the value of social capital

A

by the number of relationships in a social network
by the strength of those relationships,
the resources controlled by those related.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

social capital is a

A

multiplicative between
number of relationships
relationship strength
entity resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how do social media companies earn revenue

A

advertising

freemium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

how does SM make money off advertising?

A

pay-per-click

use increases value (more people who use the site the more valuable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is freemium

A

basic service is free but charges a premium for upgrades or advances features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

conversion rate

A

measures the frequency that someone who clicks on an ad makes a purchase, “likes” a site or takes some action desired by the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

how to develop effective SMIS

A

(steps)

  1. Define your goals
  2. Identify success Metrics
  3. Identify target audience
  4. Define your value
  5. Make personal connections
  6. Gather and analyze data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Key Performance indicators

A

KPI or success metrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are vanity metrics

A

metrics that don’t improve your decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Enterprise Social Network

A

ESN- it is a software platform that uses social media to facilitate cooperative work of people within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Web 2.0

A

aka enterprise 2.0

the use of enterprise social networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Intel's rules for social media
Disclose (transparent, truthful) protect (no secrets, don't over share, don's slam competition) Use common Sense
26
UGC
User generated content | content on you SM site that is contributed by users
27
What are BI systems?
IS that process operational, social, and other data to identify patterns
28
Business intelligence
are patterns, relationships, trends, and predictions
29
tasks BI can be used for
Informing Deciding Problem Solving Project Management
30
BI can be used in
``` identifying changes in purchasing patterns Entertainment (ex Netflix, amazon, spotify) Predictive Policing (ex. preventing crime) ```
31
BI analysis
process of creating business intelligence
32
categories of BI analysis
reporting, data mining, BigData, and Knowledge management
33
publish results
the process of delivering business intelligence to the knowledge workers who need it
34
Push Publishing
delivers business intelligence to users without any request from the user
35
Pull publishing
user requests BI results
36
functions of a data warehouse
obtain data cleanse data organize and relate data catalog data
37
granularity
the level of detail represented by data (too fine or too coarse)
38
data mart
a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business.
39
basic reporting operations
``` sorting filtering grouping calculating formatting ```
40
RFM analysis
a technique readily implemented with basic reporting operations is used to analyze and rank customers according to their purchase patterns
41
RFM stands for
Recently Frequently Money
42
OLAP
Online Analytical Processing | provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data
43
what is data mining?
stat techniques to find patterns and relationships among data for classification and prediction
44
types of data mining
unsupervised and supervised
45
unsupervised hypothesis is
where analysts do not create a model or hypothesis before running the analysis (hypothesis is created after the analysis)
46
cluster analysis is
(unsupervised technique) statistical techniques identify groups of entities that have similar characteristics ex find groups of similar customers from customer order and demographic data
47
what is supervised data mining?
developing a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model (uses regression analysis)
48
Neural networks
supervised data mining application used to predict values and make classifications such as good prospect or bad prospect
49
market-basket analysis
an unsupervised data mining technique for determining sales patterns (what customers tend to buy together aka cross selling)
50
(in market-basket terminology) | support is
the probability that two items will be purchased together
51
confidence is
if you buy fins then what is the probability you will buy the mask
52
lift is
the ratio of confidence to base probablity
53
MapReduce
is a technique for harnessing the power of thousands of computers working in parallel.
54
Hadoop is
an open source program supported by the Apache Foundation
55
Knowledge Management (KM)
is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need that capital
56
how does KM benefit organizations?
improve process quality | increase team strength
57
Expert systems are
the are rule-based systems that encode human knowledge in the form of If/then rules
58
Content management systems (CMS)
are information systems that support the management and delivery of documents including reports, web pages, and other expressions of employee knowledge
59
Content management application alternatives
in-house custom off-the-shelf Public Search engine
60
what is hyper-social knowledge management?
it is the application of social media and related applications for the management and delivery of organizational knowledge resources.
61
Rich Directory is
an employee directory that includes not only the standard name, email etc but also organizational structure and expertise
62
static reports
are BI documents that are fixed at the time of creation and do not change
63
dynamic reports
are BI document that are updated at the time they are requested
64
BI server
is a web server application that is purpose built for the publishing of business intelligence
65
functions of BI servers
management and delivery
66
Definition of threats
a person or organization that seeks to obtain or alter data or other IS assets illegally.
67
What are the sources of threats?
Human Error Computer Crime Natural Events and Disasters
68
What types of security loss exist?
``` unauthorized data disclosure, incorrect data modification, faulty service, denial of service, and loss of infrastructure. ```
69
what is pretexting
it occurs when someone deceives by pretending to be someone else. aka spoofing
70
what is phising
technique used for obtaining unauthorized data that use pretexting email
71
what is Usurpation
occurs when computer criminals invade computer systems and replace legitimate programs with their own, unauthorized ones that shut down legitimate applications and sub their own to steal or manipulate data.
72
DoS
Denial of Service
73
what is APT
Advanced Persistent Threat | to engage in cyberwarefare and cyber-espionage
74
the bottom line of the ponemon study is
average cost of computer crime is increasing malicious insiders are an increasing security threat data loss is the principle loss of computer crime mobile device data is a significant security threat security safeguards work
75
IS security goal is
to find an effective trade-off between the risk of loss and the cost of safeguards
76
IDS
Intrusion detection system | a computer program that senses when another computer is attempting to scan or access a computer or network
77
what are the senior management security functions
security policy and risk management
78
technical safeguards
they are involved with hardware and software components of the information system.
79
identification and authentication
the username identifies the user and the password authenticates the user
80
smart cards are
they have microchips
81
Biometric authentication
uses personal characteristics such as fingerprints, facial features, and retinal scans to authenticate users.
82
symmetric encryption
the same key is used to encode and decode
83
asymmetric encryption
two keys are used to encrypt and decrypt
84
firewall
computing device that prevents unauthorized network access
85
perimeter firewall
sits outside the organizational network
86
internal firewalls
these are inside the organizational network
87
packet-filtering firewall
this firewall examines each part of a message and determines whether to let that part pass
88
malware is
a broad category of software that includes viruses,spyware, and adware
89
data administration
this refers to an organization wide function that is in charge of developing data policies and enforcing data standards
90
database administration
refers to a function that pertains to a particular database | ex ERP CRM MRP
91
what is hardening
it is an important safeguard against public users and it means taking extraordinary measures to reduce a systems vulnerability.
92
what are honeypots?
false targets for computer criminals to attack | to intruders they look like a particularly vulnerable resource
93
how should organizations respond to security incidents
have a plan in place centralized reporting specific responces including speed, preparation pays and not making the problem worse practice