Digital Business: Key Concepts

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following best describes the 'Innovator's Dilemma' in the context of e-business?

  • The need for companies to choose between investing in sustaining technologies versus disruptive technologies.
  • The difficulty established companies face when trying to capitalize on disruptive technologies without negatively affecting their current relationships with customers and partners. (correct)
  • The challenge of creating entirely new markets with innovative products that disrupt existing business models.
  • The ethical considerations companies face when implementing new technologies that may displace workers or create new forms of inequality.

What is the primary function of 'Hypertext Transport Protocol (HTTP)' within the infrastructure of the World Wide Web?

  • To standardize the formatting and display of documents on the web.
  • To enable web browsers to request and display web pages using URLs. (correct)
  • To provide a globally unique address for resources on the internet.
  • To allow users to navigate the internet using graphical interfaces.

How does 'disintermediation', facilitated by e-business, primarily benefit businesses and consumers?

  • By providing a platform for intermediaries to offer value-added services such as product aggregation and comparison.
  • By increasing the number of intermediaries involved in a transaction to ensure quality and reliability.
  • By creating new opportunities for agents and brokers to connect buyers and sellers in the digital marketplace.
  • By enabling businesses to sell directly to customers online, cutting out traditional middlemen and potentially reducing costs. (correct)

Which of the following best illustrates the concept of 'mass customization' in the context of e-business?

<p>A car manufacturer allows customers to configure their vehicles online with a variety of options and features before ordering. (C)</p> Signup and view all the answers

What is the primary role of 'clickstream analytics' in analyzing website data for e-business?

<p>Collecting, analyzing, and reporting on the sequence of pages a visitor navigates on a website. (D)</p> Signup and view all the answers

How does 'viral marketing' typically leverage network effects to amplify a marketing message?

<p>By encouraging users to share the message with their networks, creating exponential growth in visibility. (A)</p> Signup and view all the answers

What distinguishes a 'pure-play' e-business model from a 'click and mortar' business model?

<p>A pure-play business operates solely online, while a click and mortar business maintains both a physical storefront and an online presence. (A)</p> Signup and view all the answers

What is the primary intent behind 'search engine optimization (SEO)'?

<p>To make URLs more attractive to search engines, thereby achieving higher search engine rankings. (A)</p> Signup and view all the answers

How does click fraud negatively impact businesses that rely on online advertising?

<p>It artificially inflates traffic statistics for online ads, leading to wasted advertising expenditures. (D)</p> Signup and view all the answers

Which of the following best captures the essence of 'Web 2.0' compared to the earlier stages of the internet?

<p>Greater emphasis on user-generated content, collaboration, and interactivity. (A)</p> Signup and view all the answers

What is the key distinction between 'open source' and 'closed source' software?

<p>Open source software allows third parties to review and modify the source code, while closed source software does not. (C)</p> Signup and view all the answers

How does 'native advertising' attempt to gain a user's attention in online marketing?

<p>By providing content that aligns with the user's experience in terms of content, format, style, or placement. (A)</p> Signup and view all the answers

What is the primary goal of a 'knowledge management system' within an organization?

<p>To capture, organize, and disseminate knowledge throughout the organization. (C)</p> Signup and view all the answers

What is the key difference between 'synchronous' and 'asynchronous' communication?

<p>Synchronous communication occurs in real time, such as instant messaging, whereas asynchronous communication involves a delay, such as email. (A)</p> Signup and view all the answers

What is the primary purpose of 'social networking analysis' in a business context?

<p>To map group contacts, identifying who knows each other and who works together within an organization. (A)</p> Signup and view all the answers

How do 'disinformation' and 'misinformation' differ in their intent?

<p>Disinformation is false information presented as fact with the intent to deceive, while misinformation is false information presented as fact without deceitful intent. (D)</p> Signup and view all the answers

What is the 'dark web', and how does it differ from the 'deep web'?

<p>The dark web is a subset of the deep web that is intentionally hidden and requires special software to access, while the deep web includes all parts of the internet not indexed by standard search engines. (B)</p> Signup and view all the answers

How does 'analytical data' differ from 'transactional data' in its primary purpose?

<p>Analytical data encompasses all organizational data used for managerial analysis, while transactional data supports daily operations. (C)</p> Signup and view all the answers

What are the key characteristics that define high-quality data?

<p>Accuracy, Completeness, Consistency, Timeliness, and Uniqueness. (A)</p> Signup and view all the answers

What risks can result from low-quality data within an organization?

<p>Inability to accurately track customers, difficulty identifying valuable customers, and marketing to nonexistent customers. (C)</p> Signup and view all the answers

What is the role of a 'data steward' in data governance?

<p>To implement data policies and procedures across an organization. (A)</p> Signup and view all the answers

What is the primary objective of 'master data management'?

<p>To gather data and ensure it is uniform, accurate, consistent, and complete across an organization. (B)</p> Signup and view all the answers

What is the purpose of 'data validation' in the context of data governance?

<p>To test and evaluate data for compliance with data governance policies to ensure correctness. (B)</p> Signup and view all the answers

What is the role of a 'database management system (DBMS)'?

<p>To allow users to create, read, update, and delete data in a relational database. (A)</p> Signup and view all the answers

How do 'primary keys' and 'foreign keys' work together to establish relationships between tables in a database?

<p>Primary keys uniquely identify records within a table, while foreign keys provide a logical link to records in another table. (A)</p> Signup and view all the answers

Why is 'increased flexibility' considered an advantage of using databases from a business perspective?

<p>Databases use well-designed databases that handle changes quickly and easily, providing users with different views. (C)</p> Signup and view all the answers

What is the difference between 'scalability' and 'performance' in the context of database management?

<p>Scalability refers to how well a system can adapt to increased demands, while performance refers to how quickly a system performs a certain process. (D)</p> Signup and view all the answers

What is the purpose of an 'integrity constraint' in a database?

<p>To help ensure the quality of data by enforcing rules. (D)</p> Signup and view all the answers

How do databases contribute to 'increased data security'?

<p>Databases offer several security features, such as passwords and access controls. (D)</p> Signup and view all the answers

In business intelligence, what is the negative impact of 'data redundancy'?

<p>It makes it difficult to ensure data consistency across different systems. (A)</p> Signup and view all the answers

Why do organizations often struggle to turn their business data into business intelligence?

<p>Organizational data is often difficult to access, unstructured, and inconsistent. (C)</p> Signup and view all the answers

What does 'data aggregation' achieve in business intelligence?

<p>It enables business users to receive data for analysis that is reliable, consistent, understandable, and easily manipulated. (C)</p> Signup and view all the answers

Why is extracting business analysis directly from operational systems often difficult?

<p>Operational systems are designed for high-volume transaction processing, not for complex analysis. (A)</p> Signup and view all the answers

What role does 'Extraction, Transformation, and Loading (ETL)' play in data warehousing?

<p>It extracts data from various sources, transforms it into a common format, and loads it into the data warehouse. (A)</p> Signup and view all the answers

What is the primary purpose of a 'data mart'?

<p>To provide a subset of data warehouse data for a specific business unit or purpose. (D)</p> Signup and view all the answers

What is a 'data cube' in data analysis?

<p>A term for the representation of multidimensional data. (B)</p> Signup and view all the answers

What is the role of 'data cleansing' (or scrubbing)?

<p>To weed out and fix or discard inconsistent, incorrect, or incomplete data. (D)</p> Signup and view all the answers

What is the purpose of 'data visualization' in business?

<p>To allow users to see or visualize data to transform data into a business perspective. (D)</p> Signup and view all the answers

How does blockchain technology ensure data immutability?

<p>By linking together blocks of data with cryptographic hashes, creating a tamper-proof record. (C)</p> Signup and view all the answers

What is the purpose of 'proof of work' in blockchain technology?

<p>To require an intensive calculation creating new blocks on the blockchain and to avoid double-spending. (A)</p> Signup and view all the answers

Flashcards

Digital Darwinism

Organizations that cannot adapt to new demands in the information age are doomed.

Disruptive Technology

A new way of doing things that doesn't initially meet the needs of existing customers.

Sustaining Technology

Technology that produces improved products that customers are eager to buy.

Innovator's Dilemma

How established companies can adopt disruptive technologies without damaging existing relationships.

Signup and view all the flashcards

Internet

A network that connects computers worldwide.

Signup and view all the flashcards

WWW (World Wide Web)

Provides access to internet information through documents using HTML.

Signup and view all the flashcards

HTML

Language for formatting documents on the web.

Signup and view all the flashcards

Web Browser

Software allowing users to access the WWW.

Signup and view all the flashcards

Hypertext Transport Protocol

Internet protocol used by web browsers to request & display pages.

Signup and view all the flashcards

URL

Address of a resource on the internet.

Signup and view all the flashcards

E-Business

Encompasses all activities related to internal/external business operations.

Signup and view all the flashcards

Ecommerce

Buying and selling goods and services over the internet.

Signup and view all the flashcards

Paradigm Shift

A new business form that reshapes how companies behave.

Signup and view all the flashcards

Mass Customization

Ability of a firm to tailor its products to customer specifications.

Signup and view all the flashcards

Personalization

Offering more appealing offers based on customer likes and dislikes.

Signup and view all the flashcards

Disintermediation

Business sells directly to customers online, cutting out intermediaries.

Signup and view all the flashcards

Intermediaries

Agents, software, or businesses providing trading infrastructure.

Signup and view all the flashcards

Heat Map

2D data representation that expresses values as colors.

Signup and view all the flashcards

Viral Marketing

Technique inducing websites or users to pass on a marketing message.

Signup and view all the flashcards

Clickstream

Exact path a visitor takes through a website.

Signup and view all the flashcards

Clickstream Analytics

Collecting/analyzing data about a website visitor's page visits and order.

Signup and view all the flashcards

E-Business Model

Plan that details how a company creates, delivers, and generates revenue on the internet.

Signup and view all the flashcards

Brick and Mortar Business

Business with physical presence only.

Signup and view all the flashcards

Click and Mortar Business

Business with both physical and online presence.

Signup and view all the flashcards

Pure-Play (Virtual) Business

Business with purely online presence.

Signup and view all the flashcards

Click Fraud

Artificially inflating traffic statistics for online ads.

Signup and view all the flashcards

Web 2.0

Next generation of internet use with collaboration, sharing, and being free.

Signup and view all the flashcards

Disinformation

False information presented as fact with intent to deceive and mislead.

Signup and view all the flashcards

Deep Web

Large part of the internet not accessible to conventional search engines.

Signup and view all the flashcards

Dark Web

Intentionally hidden from search engines and uses masked IP addresses.

Signup and view all the flashcards

Transactional Data

Data from a single business process to support daily operations.

Signup and view all the flashcards

Analytical Data

Organizational data to support managerial analysis tasks.

Signup and view all the flashcards

Accurate Data

Ensures correctness and absence of errors

Signup and view all the flashcards

Master Data Management

A practice that gathers data and ensures it's uniform, accurate, consistent, and complete across systems.

Signup and view all the flashcards

Data Validation

Includes tests and evaluations ensuring correctness of data.

Signup and view all the flashcards

Database Management System (DBMS)

Allows users to create, read, update, and delete data in a relational database.

Signup and view all the flashcards

Data Element

Smallest or basic unit of data.

Signup and view all the flashcards

Metadata

Details about data.

Signup and view all the flashcards

Primary Key

A field that uniquely identifies a given entity in a table.

Signup and view all the flashcards

Data Warehouse

Extends transformation of data into information.

Signup and view all the flashcards

Extractions, Transformation, and Loading (ETL)

The process that extracts data from internal and external databases.

Signup and view all the flashcards

Study Notes

Digital Business Concepts

  • Digital Darwinism means organizations that cannot adapt to new demands in the information age are doomed.
  • Disruptive technology introduces new ways of doing things that initially don't meet existing customer needs.
  • Sustaining technology involves improved products eager customers are willing to buy.
  • The innovator's dilemma refers to how incumbents use disruptive technologies without damaging relationships with existing customers, partners, and stakeholders.

Internet and WWW

  • The internet is a network connecting computers globally.
  • It requires organizations to adapt to changing markets, economic environments, and technologies.
  • Initially, the Internet was developed for emergency military communication by the Department of Defense.
  • The World Wide Web (WWW) provides access to internet information through documents, graphics, audio, and video files using HTML.
  • HTML (hypertext markup language) is the special formatting language for these files.
  • A web browser allows users to access the WWW.
  • Hypertext transport protocol is the internet protocol browsers use with URLs to request and display web pages.
  • URL stands for universal resource locator.
  • Growth of the WWW was due to the microcomputer revolution, networking advancements, easy-to-use browser software, speed, convenience, low email costs, and flexible web pages.
  • Web 1.0 acted as a catalyst for e-business during the WWW's early years of operation (1991-2003).
  • E-business encompasses e-commerce and all activities related to internal/external business operations.
  • E-commerce involves buying and selling goods and services online.
  • Paradigm Shift describes a new, transformative form of business that reshapes company and organizational behavior.

E-Business Advantages

  • Expanding global reach grows the number of people a firm communicates with worldwide.
  • Information richness is the depth and breadth of detail in communicated information.
  • Opening new markets involves mass customization through tailoring products to customer specifications.
  • Personalization involves crafting offers based on customer likes and dislikes.
  • Disintermediation sells directly to customers online, cutting out intermediaries.
  • Intermediaries are agents, software, or businesses facilitating transactions between buyers and sellers.
  • A heat map is a 2D data representation expressing values as colors.
  • Interactivity measures advertising effectiveness by interactions, including time spent, pages viewed, and repeat visits.
  • Stickiness refers to the amount of time spent on a site or app.
  • Viral marketing induces users to pass marketing messages to grow the message's visibility.
  • Clickstream is the exact path a visitor takes through a website.
  • Clickstream analytics collects, analyzes, and reports aggregate data on website visitor behavior.
  • Website traffic analytics uses clickstream data to assess site efficiency at the operational level.
  • Website e-business analytics uses clickstream data to determine the effectiveness of the site as a channel-to-market.
  • Showrooming occurs when customers browse in physical stores but buy the product online for less.
  • An e-business model details how a company creates, delivers, and generates internet revenues.
  • Brick-and-mortar businesses operate with physical presence only.
  • Click-and-mortar businesses operate with both physical and online presences.
  • Pure-play (virtual) businesses operate purely online.
  • Search engine ranking evaluates variables used to determine where a URL appears in search results.
  • Optimization improves URL attractiveness to search engines for higher ranking.
  • Organic search results are unpaid entries based on content.
  • Paid search results are links a company paid to display.
  • An affiliate program allows businesses to generate commissions or referral fees when a customer clicks a link to anothers web page.
  • Click fraud artificially inflates traffic statistics for online ads.
  • Hitbots create the illusion of high link clicks without generating real profit.

Web 2.0

  • Web 2.0 is the next generation of internet use with more mature, distinct communications characterized by collaboration, sharing, and content being free.
  • Direct-to-consumer model where companies build, market, sell, and ship their own products.
  • Advantages for customer experience, data collection, and reduced costs.
  • An open system consists of nonproprietary hardware and software based on known standards.
  • Third parties use open systems to create add-on products that can be integrated.
  • Source code involves instructions written by a programmer for computer software.
  • Open-source software has source code available for third parties to review and modify.
  • Closed-source software is proprietary software licensed under exclusive copyright.
  • Native advertising attempts to gain attention by providing content in the user's experience.
  • A reputation system allows buyers to post feedback on sellers.
  • Knowledge management systems capture, organize, and disseminate knowledge, which falls into explicit or tacit categories.
  • Explicit knowledge is documented and codified, while tacit knowledge resides in people's heads.
  • Crowdsourcing harnesses the wisdom of the crowd.
  • Crowdfunding raises money through small contributions from many people.
  • Asynchronous communication is when messages and responses do not occur at the same time.
  • Synchronous communication occurs in real-time.
  • Business 2.0 is all about social networking, connecting people by profile information.
  • Social networking involves expanding business contacts through a personal network.
  • Social networking analysis maps group contacts to identify who knows each other and who works together.
  • Misinformation is false information presented as fact without deceitful intent, while disinformation is false information presented intentionally to deceive.
  • Fake news stories are widely shared to promote or discredit a public figure, political movement, or company.

Web 3.0

  • The deep web is a large part of the internet not accessible to conventional search engines.
  • The dark web is intentionally hidden from search engines, masking IP addresses and requiring a special web browser.

Data, Information, and Business Intelligence

  • Data has levels, formats, and granularities.
  • Transactional data facilitates daily operations
  • Analytical data supports managerial tasks.
  • Timeliness of data is situation-dependent.
  • Real-time data is immediate and up-to-date.
  • Data inconsistency results when the same element has different values.
  • Data integrity issues occur when systems produce incorrect, inconsistent, or duplicate data.
  • Data quality characteristics include accuracy, completeness, consistency, timeliness, and uniqueness.
  • Low-quality data comes from customers intentionally entering inaccurate information, differing entry standards, operational errors, and third party inaccuracies.
  • Businesses can be affected by low quality data through an inability to accurately track customers and poor marketing.
  • Good data improves decision-making and may impact an organization's bottom line.
  • A data steward ensures data policies and procedures are implemented.
  • Governance refers to the overall management of data security.
  • Master data management gathers data, ensuring uniformity, accuracy, consistency, and completeness.
  • Data validation includes tests evaluating compliance with data governance policies.
  • Storing data is done in databases, which maintain data about inventory, transactions, people, and warehouses.
  • Database management systems (DBMS) create, read, update, and delete relational database data.
  • A data element is the smallest or basic unit of data
  • A data model is logical data structures that detail the relationships among data
  • Metadata are details of the data
  • A data dictionary compiles metadata about data elements in the data model.
  • An entity is a person place thing transaction or event about which data are stored
  • An attribute (field, column) is a data element associated with an entity.
  • A record is a collection of related data elements.
  • Keys identify entities (tables).
  • A primary key uniquely identifies a given entity in a table.
  • A foreign key is a primary key from one table that appears as an attribute in another table to act as a logical relationship between tables.
  • Increased flexibility, scalability, performance, data integrity, and data security are the advantages of using databases.
  • Data integrity measures data quality.
  • Integrity constraints are rules ensuring data quality.
  • Access levels determine who has data access, whereas access control determines the type of user access.
  • Data redundancy is the duplication of data in multiple places.

Business Intelligence

  • Access to organizational data can be difficult if the data is unstructured and there is too much information and not enough insights.
  • Business intelligence enables users to receive reliable, consistent, understandable, and easily manipulated data.
  • Data warehouses extend data transformation into information and support decision-making.
  • Data warehouses aggregate data throughout an organization for decision-making purposes.
  • Extracting, transformation, and loading (ETL) is the process that extracts, transforms, and loads data into a data warehouse.
  • A data mart contains a subset of data warehouse data.
  • A data cube represents multi-dimensional data.
  • A data lake is a storage repository holding raw data until needed.
  • Data cleansing weeds out and fixes inconsistent, incorrect, or incomplete data.
  • Cleansing or scrubbing fixes dirty, erroneous, or flawed data.
  • Data visualization technologies allow users to "see" or visualize in order to transform data into a business perspective.
  • Data Visualization tools move beyond excel graphs and charts to support analytical techniques.
  • Business intelligence dashboards track corporate metrics and include controls to manipulate data for analysis.
  • Distributed computing processes and manages algorithms across many machines.
  • A ledger records classified and summarized transactional data.
  • Blockchain consists of permanent and tamper-proof blocks of data.
  • Proof of work defines a resource intensive calculation, called mining, that needs to be performed in order to create a distributed ledger or blockchain.
  • The primary goals are to verify the legitimacy of a transaction while avoiding the so-called double spending and to create new digital currencies by rewarding miners for doing the previous task.
  • A blockchain is formed by linking blocks containing a hash, previous hash, and data.
  • The genesis block is the first block created in the blockchain.
  • A hash is a function converting letters and numbers into an encrypted output of a fixed length.
  • Proof of stake validates transactions without computing power.
  • Immutability and digital trust are blockchain advantages.

MIS Infrastructures

  • MIS infrastructure includes plans to build, deploy, use, and share data, processes, and MIS assets.
  • MIS infrastructure contains hardware, software, networks, clients, and servers and supports operations.
  • A backup is the exact copy of a system's information
  • Recovery is the ability to restore a system.
  • A disaster recovery plan recovers information or IT systems after catastrophes.
  • A business continuity plan recovers and restores interrupted critical functions after disasters.

Agile MIS Infrastructure

  • Emergency Preparedness ensures a company is ready to respond.
  • A business impact analysis identifies critical business functions.
  • Hot sites and cold sites are different types of recovery locations.
  • Agile MIS infrastructure supports change.
  • Characteristics of Agile MIS infrastructure: Accessibility, availability, maintainability, portability, reliability, vulnerability, and scalability.
  • Scalability is how well a system adapts to increased demands.
  • Performance is how fast a system performs.
  • Capacity planning determines environmental infrastructure requirements.
  • Usability refers to how easy a system is to learn and use.
  • Serviceability refers to how quickly a 3rd party can change a system.
  • Sustainable MIS Infrastructure supports the environment.
  • Moore's Law states computer chip doubled every 18 months.
  • Expansion of business tech leads to increased e-waste and energy consumption.
  • A grid computing collection uses computers to solve common problems.
  • Virtualized computing allows for creating multiple virtual machines on one computer.
  • Data centers house virtualized MIS.
  • Sustainable data centers chose geographical locations, reduces carbon emissions, and reduce required floor space.

Cloud Computing

  • In cloud computing, multi-tenancy is a system instance serving multiple customers.
  • Single Tenancy refers to each tenant having to maintain an individual system.
  • A cloud fabric is a software that enables cloud computing.
  • Broad network access allows all devices to access data and applications.
  • Rapid elasticity quickly increases or decreases computing capacity.
  • Private, public, and hybrid are the various cloud types.

Network Basics

  • A telecommunication system transmits data over networks.
  • Networks are created linking multiple devices.
  • Local, metropolitan and wide area networks are the the three types of networks.
  • Networks are differentiated by architecture, which includes peer to peer/ client service.
  • Clients request information from servers in order to respond to other requests.
  • A network operating system steers information between computer, and manages security.
  • Packet switching occurs when a computer sends a message that is divided into smaller parts, called packets.
  • A router examines each packet and decides how to send the packet.
  • Topology refers to the configuration of network components.
  • Wireless is a type of media.
  • Protocols are standards specifying data formats and transmission rules.
  • The OSI Model enables diverse communication models to converse using standard protocols.
  • Transmission control Protocol/Internet protocol (TCP/IP) provides technical foundation for the public internet as well as for large numbers of private network.
  • Voice Over Internet Protocol (VOIP) uses TCP/IP tech to transmit voice calls.
  • Wired and wireless are the two media that can be used to transmit network signals.
  • E-business networks provide for the transparent exchange of information with transparency, reliability, secure exchange, and scalability.
  • They also act as integrators for digital and traditional businesses.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser