Final BTMA Flashcards

(119 cards)

1
Q

What is a network

A

a system of inter-connected nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s a Node

A

Nodes can be people, companies, Places, Or things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are platform-mediated Networks

A

subset of components and rules employed by users in most
of their transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are components

A

hardware, software, services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are “Rules”

A

technical standards, protocols for information exchange, policies, and contracts that govern transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Platforms are extpected to provide? (4)

A

connectivity
variety
matching needs with suitable transaction to partners
price-setting service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is connectivity in a platform

A

facilitating the transfer of goods or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Variety in a platform

A

eliciting offers from supply-side users that vary in value by demand-side users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are price-setting service in a platform

A

users disclose prices at which they are willing to exchange for goods and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a network effect

A

a network effect is the effect that one user of a good or service has on the value, of that product to other people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are cross sided effects

A

The value or utility of a platform for one user group depends on the size or activity of another distinct user group.

EX: (like marketplaces, social networks, and payment systems) because they drive growth and engagement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are same sided effects

A

The value of a platform to a user increases as more users from the same group join.

EX: The more players on ranked = Shorter wait times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is willingness to pay(WTP)

A

equals the maximum amount that an individual would pay for a
product or service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The more a systems get better

A

more people use them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the different types of Networks

A

one-sided
Two-sided
Three-sided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a one-sided Network

A

Transaction partners alternate roles,

e.g., e-mailers send & receive, traders buy & sell

users who all perform same functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a two-sided Network

A

Users are permanent members of one distinct group
— a “side” — which transacts with a second group, e.g.Job seekers + recruiters
* Cardholders + merchants
* Uber, Airbnb, Amazon, eBay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is three-sided network

A

YouTube, for example, link three sets of network users: content consumers, third party content providers and advertisers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network Market is more likely to be Served by a single platform when:

A

The platform is a natural monopoly

  • OR…
  • Multi-homing costs are high and
  • Network effects are positive and strong
  • Demand for differentiated features is weak

Or a dominant platform can offer such features selectively to users willing to pay premium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Business analytics (BA)

A

Developing actionable decisions or recommendations
* Examines data, formulates analytical models, communicates to decision makers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the three basic rolls of managers

A
  • Interpersonal
  • Informational
  • Decisional
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Decision making is difficult due to

A
  • Number of alternatives is constantly increasing
  • Most decisions must be made under time pressure
  • Increased uncertainty in the decision environment, making decisions more complex
  • Often necessary to rapidly access remote information, consult with experts, or conduct a group decision-making session
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The Three specific analytics targets that represent different levels of enterprise-side change are?

A
  • The development of one or a few related analytical applications
  • The development of infrastructure to support enterprise-wide analytics
  • Support for organizational transformation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is Descriptive analytics

A

summarizes what has happened in the past and enables decision makers to learn from past behaviours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what is Predictive analytics
Predictive analytics: examines recent and historical data to detect patterns and predict future outcomes and trends
26
What are Prescriptive analytics
goes beyond descriptive and predictive models by recommending one or more courses of action and identifying the likely outcome of each decision
27
What are the 3 tools used in Prescriptive Analytics
* optimization * simulation * decision trees
28
Dashboards provide
easy access to timely information and direct access to management reports
29
Geographic Information Technology (GIS) is
Provide computer-based systems for capturing, manipulating, and displaying data using digitized maps
30
what are the 6 capabilities of dashboards
Drill down Critical success factors (CSFs) Key performance indicators (KPIs) Status access Trend analysis Exception reporting
31
What is Drill down in a dashboard
The ability to explore data in more detail by navigating from a high-level summary to more granular levels of information.
32
What are Critical success factors in a dashboard
The factors most critical for the success of business. These can be organizational, industry, departmental, or for individual workers
33
What are Key performance indicators (Kpis)
The specific measures of CSFs.
34
What are Statues access in a dashboard
The latest data available on a KPI or some other metric, often in real time
35
What is trend analysis in a dashboard
Short-, medium-, and long-term trends of KPIs or metrics, which are projected using forecasting methods.
36
What is Exceptional reporting in a dashboard
Reports highlight deviations larger than defined thresholds. Reports may include only deviations.
37
What are Neural Networks
a set of virtual neurons, or nodes, that work in parallel to simulate the way the human brain works, although in a greatly simplified form.
38
What are some problems with Expert Systems (ES)
Transferring domain expertise from human experts to the expert system can be difficult because people cannot always explain what they know Even if the domain experts can explain their entire reasoning process, automating that process may not be possible In some contexts, there is a potential liability from the use of expert systems
39
What are the 4 types of classifications
* Binary classification * Multi-class classification * Multi-label classification * Imbalanced classification
40
What are Recurrent Neural Networks used for (RNNs)
A type of artificial neural network designed to process sequential data (e.g., time series, text, speech) by maintaining a "memory" of previous inputs.
41
What are Convolutional neural networks used for (CNN)
CNNs break down images into parts to spot edges, curves, and colors, then combine this info to classify or predict what’s in the image." Examples: facial recognition, natural language processing
42
What are Generative adversarial networks (GANs) used for
Neural networks compete with each other to segregate real data from synthetic data. Example: deep-space photography for inpainting
43
What is binary classification
where the goal is to categorize instances into one of two classes. Examples include spam detection (spam or not spam), medical testing (disease or no disease)
44
What is Multi-class Classification
The goal is to categorize instances into one of three or more classes. Each instance is assigned to only one class. Examples include handwritten digit recognition (where the classes are the digits 0-9)
45
What is multi-label classification
a generalization of multi-class classification where each instance can be assigned to multiple classes (or labels) simultaneously. For example, in a document classification task, a single document might be relevant to several topics, such as both "politics" and "economics".
46
what is imbalanced Classifications
the distribution of examples across the classes is not equal. Typically, one class (the majority class) has a significantly larger number of instances than the other class or classes (the minority class).
47
What are the 3 fundamental tenets of ethics
Responsibility Accountability Liability
48
What are the 4 general categories of ethical issues for IT
Privacy Accuracy Property Accessibility
49
What are the two general rules for privacy
The right of privacy is not absolute, and privacy must be balanced against the needs of society The public’s right to know supersedes the individual’s right of privacy
50
What are the three major phases in OCM (Organizational change management)
Preparation, implementation, and follow-through.
51
what are the 10 principles in PIPIDA
1. accountability, 2. identifying purposes, 3. consent, 4. limiting collection, 5. limiting use, disclosure, and retention, 6. accuracy, 7. safeguards, 8. openness, 9. individual access, and 10. challenging compliance.
52
What are some of the 5 widely used ethical framework approaches
* Utilitarian approach * Rights approach * Fairness approach * Common good approach * Deontology approach
53
what are Methods of informed consent
* Opt-out model * Opt-in model
54
what are Benefits of High-quality Information Privacy
* To protect the organization’s public image or brand images * To maintain or enhance trust and promote continued consumer confidence in the organization and promote goodwill * To achieve a competitive advantage in the marketplace by maintaining high quality, accurate customer information * To meet legal requirements of industry associations or organizations * To efficiently manage personal information, reducing administration or data handling costs and avoiding additional financial costs
55
What are the 5 aspects Give voice of Values Approach to solving ethical issues
1. Identify an ethical issue - What are the different issues that give rise to this ethical issue? 2. Purpose and choice - What personal choices do you have in reacting to this ethical issue? 3. Stakeholder analysis - Who is affected by the ethical issue? 4. Powerful response - What types of things could I say to provide a response to the ethical issue? 5. Scripting and coaching - How would I approach my audience to provide the best opportunity for discussing the ethical issue?
56
What are the Five factors contributing to vulnerability of organizational information resources
1 Today’s interconnected, interdependent, wirelessly networked business environment * 2 Smaller, faster, cheaper computers and storage devices * 3 Decreasing skills necessary to be a computer hacker * 4 International organized crime taking over cybercrime * 5 Lack of management support
57
What are some of the 8 Common Human Errors
* Carelessness with computing devices * Opening questionable e-mail * Careless Internet surfing * Poor password selection and use * Carelessness, with one’s office, using unmanaged devices, and discarded equipment * Careless monitoring of environmental hazards
58
What is Social engineering
An attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords
59
What are two types of areas that pose a great threat for Human error
* Human resources * Information systems
60
What are the 3 things Organizations Do to Protect Information Resources
* Risk management * Risk analysis * Risk mitigation
61
What is Business Continuity Planning (BCP) purpose
* Provide continuous availability * Be able to recover in the event of a hardware or software failure or attack (e.g., due to ransomware) * Ensure that critical systems are available and operating
62
What are the three ways in risk mitigation
Risk acceptance Risk transference Risk limitation
63
What are the 6 types of Software attacks that require User action
Viruses Polymorphic virus Worm Phishing attack Spear phishing attack Vishing attack
64
What are the 2 types of Software attacks that don't need user action
Denial-of-service attack Distributed denial-of-service attack
65
What are the 3 types of Software attacks that Attack by a Programmer Developing a System
Trojan Horse Back door Logic bomb
66
What are the three levels of control
Control environment General controls Application control
67
What are physical controls
Prevent unauthorized individuals from gaining access to a company’s facilities ex: gate, door, lock
68
What are the 2 logic controls
Logical controls (implemented by software) help to provide controls such as: * Authentication * Authorization
69
what is a Control Environment
Encompasses management attitudes toward controls, as evidenced by management actions, as well as by stated policies that address: * Ethical issues * Quality of supervision
70
What are Application controls
Controls that apply to individual applications
71
How do passwords need to be controlled by each control level
1.Control environment: Policies that enforce the proper management of user codes and passwords 2.General control: A security system that requires a user ID and password to “log on” 3.Functional application control: Separate passwords for sensitive functions, e.g., employee raises or write off of customer accounts
72
What are the 7 Communication Controls
* Firewalls * Anti-malware systems * Whitelisting and blacklisting * Encryption * Virtual private networking * Transport layer security (TLS) * Employee monitoring systems
73
What is OCM? (Organizational change management)
The method of leveraging change to bring about a successful resolution
74
What are the three major phases in OCM (Organizational change management)
Preparation, implementation, and follow-through.
75
What Drives Organizational Change?
* The implementation of new technology, or major changes in existing technology * The adoption of new business models, which could be driven by Mergers & acquisitions, dispositions etc * Shifts in the organizational division, department, and/or team structure * Changes in leadership of the company or within departments
76
What are the Types of Organizational Change?
Adaptive change Transformational change
77
What is Project Management?
the use of specific knowledge, skills, tools and techniques to deliver something of value to people
78
What is a Project?
* Temporary effort to create value * Have a beginning and an end * Have a team, a budget, a schedule * Have a set of expectations * Each is unique and differs from day-to-day operations * They reach a conclusion once the goal is achieved
79
What is Transformational change in OC?
* Large scale and scope * Can be a shift in mission, strategy, company/team structure, people, or business processes * Substantial time, resources and energy to enact * Often driven by external forces, competitors as an example
80
What is Adaptive change in OC?
* Small, incremental changes evolving over time * Minor adjustments or modifications that can be fine-tuned and implemented to execute on business strategies
81
Why is OCM Important?
Organizational change is necessary for companies to succeed and grow Without effective OC company transitions can be rocky and expensive in terms of both time and resources A lack of effective change management can lead the organization to fail
82
What are the 6 steps in Organizational change
Define - organizational change, understand it Create - roadmap that clearly articulates and measures success Ensure - process plan aligns with business goals Outline - the implementation and sustainability Know - what challenges may arise Be sure - to celebrate small victories along the way
83
What does a PERT chart do (Program Evaluation and Review Technique)
Project tasks, relationships and dependencies
84
What does a GANTT chart do
Project tasks against the project timeline
85
What does a Project plan do
Activities, schedule, time estimates, cost estimates, risk factors, resources, assignments, responsibilities
86
What does a Project charter do
* Concise written description of the intended work
87
Why would someone outsource?
Core competencies, financial savings, rapid growth /speed to market, globalization
88
What are the three types of outsourcing
* Onshore * Nearshore * Offshore
89
In-sourcing is?
Use internal expertise to develop & maintain
90
What are examples of Alienware?
* Adware * Spyware * Spamware * Tracking cookies
91
Risk Acceptance is?
Accept the potential risk, continue operating with no controls, and absorb any damages that occur
92
Risk Transference is?
Transfer the risk by using other means to compensate for the loss, such as by purchasing insurance.
93
Risk mitigation is?
Limit the risk by implementing controls that minimize the impact of the threat.
94
What does CRM stand for
Customer Relationship Management
95
Analytical CRM systems do?
analyze customer data for a variety of purposes, including: * Designing and executing targeted marketing campaigns * Increasing customer acquisition, cross-selling, and upselling * Providing input into decisions relating to products and services (e.g., pricing and product development) * Providing financial forecasting and customer profitability analysis
96
Data Consolidation enables?
360-degree view of a customer -Enhanced relationship. Understanding of the customer “DNA” - Collaborative CRM * Interactive communication with the customer across entire organization -Customer identity management * Understanding of the customer “DNA”
97
The two types of Operational CRM Systems are
Customer-facing applications Customer-touching applications
98
Examples Customer-facing applications are
Customer service and support (CIC) and call centres Sales force automation (SFA) Marketing Campaign management
99
What are Analytical CRM Systems and what are some of the purposes of it
Analyze customer data for a variety of purposes, including: * Designing and executing targeted marketing campaigns * Increasing customer acquisition, cross-selling, and upselling * Providing input into decisions relating to products and services (e.g., pricing and product development) * Providing financial forecasting and customer profitability analysis
100
What are the 5 basic concepts of SCM (Supply chain management)
* Plan * Source * Make * Deliver * Return
101
What are the Other Types of CRM Systems
* On-demand CRM systems (i.e., utility computing or SaaS) * Mobile CRM systems * Open-source CRM systems * Social CRM systems - Use of social media. * Real-time CRM -Always-on, always-connected
102
What are the 5 basic concepts of SCM (Supply chain management)
* Plan * Source * Make * Deliver * Return
103
What is the Push Model verses the Pull Model
* Push model * Make-to-stock * Forecast, production, sells to consumers * Often difficult to forecast, excess or insufficient inventory Pull model * Make-to-order * Customer order, make only what is ordered * Dell Computer is an example
104
What are the Two main sources of problems along the supply chain
* Uncertainties (e.g., the demand forecast, delivery times) - The need to coordinate multiple activities, internal units, and business partners * Bullwhip effect - Erratic shifts of orders up and down the supply chain
105
What are Solutions to Supply Chain Problems (3)
* Vertical integration * A company purchases its upstream suppliers * Using inventories to solve supply chain problems * Building inventories * Just-in-time (JIT) inventory system * Information sharing * Vendor-managed inventory (VMI) * The supplier manages the entire inventory process (Walmart and P&G)
106
What are Two basic types of corporate portals
Procurement portals (i.e., sourcing portals): for a single buyer and multiple suppliers Distribution portals: for multiple buyers with a single supplier
107
What is E-commerce
The process of buying, selling, transferring, or exchanging products, services, or information via computer networks, including the Internet
108
What is E-business
A broader concept than e-commerce that also includes servicing customers, collaborating with business partners, and performing electronic transactions within an organization
109
What are the 3 other Types of organizations and their degree of digitization
* Brick-and-mortar: purely physical organizations, no EC * Virtual organizations: pure-play, digital-only organizations, only EC * Clicks-and-mortar organizations: partial EC with a primary physical presence
110
What are some of the benefits of E-Commerce
* National and international markets are more accessible * Lowers costs of processing, distributing, and retrieving information * Provides access to a vast number of products and services 24/7 * Deliver information, services, and products to people in cities, rural areas, and developing countries
111
What are the Limitations to E-commerce
* Lack of universally accepted security standards * In less-developed countries telecommunications bandwidth is often insufficient, and Web access is expensive * Perceptions that e-commerce is insecure
112
What are the Three basic types of public exchanges
* Vertical exchanges * Horizontal exchanges * Functional exchanges
113
Networked Market is More Likely to be Served by a Single Platform When
* The platform is a natural monopoly * OR... * Multi-homing costs are high and * Network effects are positive and strong * Demand for differentiated features is weak * Or a dominant platform can offer such features selectively to users willing to pay premium
114
What is Vulnerability
Is the possibility that a threat will harm that resource
115
What is Risk
the probability that a threat will impact an information resource
116
What is a Threat
Any danger to which a system may be exposed
117
What is Security
A degree of protection against criminal activity, danger, damage, or loss
118
What is Exposure
Exposure of an information resource is the harm, loss, or damage that can result if a threat compromises that resource
119
What are the 4 phases in Decision making
Intelligence Design Choice Implementation