Podcast
Questions and Answers
Which of the following best describes the 'Innovator's Dilemma' in the context of e-business?
Which of the following best describes the 'Innovator's Dilemma' in the context of e-business?
- The need for companies to choose between investing in sustaining technologies versus disruptive technologies.
- The difficulty established companies face when trying to capitalize on disruptive technologies without negatively affecting their current relationships with customers and partners. (correct)
- The challenge of creating entirely new markets with innovative products that disrupt existing business models.
- The ethical considerations companies face when implementing new technologies that may displace workers or create new forms of inequality.
What is the primary function of 'Hypertext Transport Protocol (HTTP)' within the infrastructure of the World Wide Web?
What is the primary function of 'Hypertext Transport Protocol (HTTP)' within the infrastructure of the World Wide Web?
- To standardize the formatting and display of documents on the web.
- To enable web browsers to request and display web pages using URLs. (correct)
- To provide a globally unique address for resources on the internet.
- To allow users to navigate the internet using graphical interfaces.
How does 'disintermediation', facilitated by e-business, primarily benefit businesses and consumers?
How does 'disintermediation', facilitated by e-business, primarily benefit businesses and consumers?
- By providing a platform for intermediaries to offer value-added services such as product aggregation and comparison.
- By increasing the number of intermediaries involved in a transaction to ensure quality and reliability.
- By creating new opportunities for agents and brokers to connect buyers and sellers in the digital marketplace.
- By enabling businesses to sell directly to customers online, cutting out traditional middlemen and potentially reducing costs. (correct)
Which of the following best illustrates the concept of 'mass customization' in the context of e-business?
Which of the following best illustrates the concept of 'mass customization' in the context of e-business?
What is the primary role of 'clickstream analytics' in analyzing website data for e-business?
What is the primary role of 'clickstream analytics' in analyzing website data for e-business?
How does 'viral marketing' typically leverage network effects to amplify a marketing message?
How does 'viral marketing' typically leverage network effects to amplify a marketing message?
What distinguishes a 'pure-play' e-business model from a 'click and mortar' business model?
What distinguishes a 'pure-play' e-business model from a 'click and mortar' business model?
What is the primary intent behind 'search engine optimization (SEO)'?
What is the primary intent behind 'search engine optimization (SEO)'?
How does click fraud negatively impact businesses that rely on online advertising?
How does click fraud negatively impact businesses that rely on online advertising?
Which of the following best captures the essence of 'Web 2.0' compared to the earlier stages of the internet?
Which of the following best captures the essence of 'Web 2.0' compared to the earlier stages of the internet?
What is the key distinction between 'open source' and 'closed source' software?
What is the key distinction between 'open source' and 'closed source' software?
How does 'native advertising' attempt to gain a user's attention in online marketing?
How does 'native advertising' attempt to gain a user's attention in online marketing?
What is the primary goal of a 'knowledge management system' within an organization?
What is the primary goal of a 'knowledge management system' within an organization?
What is the key difference between 'synchronous' and 'asynchronous' communication?
What is the key difference between 'synchronous' and 'asynchronous' communication?
What is the primary purpose of 'social networking analysis' in a business context?
What is the primary purpose of 'social networking analysis' in a business context?
How do 'disinformation' and 'misinformation' differ in their intent?
How do 'disinformation' and 'misinformation' differ in their intent?
What is the 'dark web', and how does it differ from the 'deep web'?
What is the 'dark web', and how does it differ from the 'deep web'?
How does 'analytical data' differ from 'transactional data' in its primary purpose?
How does 'analytical data' differ from 'transactional data' in its primary purpose?
What are the key characteristics that define high-quality data?
What are the key characteristics that define high-quality data?
What risks can result from low-quality data within an organization?
What risks can result from low-quality data within an organization?
What is the role of a 'data steward' in data governance?
What is the role of a 'data steward' in data governance?
What is the primary objective of 'master data management'?
What is the primary objective of 'master data management'?
What is the purpose of 'data validation' in the context of data governance?
What is the purpose of 'data validation' in the context of data governance?
What is the role of a 'database management system (DBMS)'?
What is the role of a 'database management system (DBMS)'?
How do 'primary keys' and 'foreign keys' work together to establish relationships between tables in a database?
How do 'primary keys' and 'foreign keys' work together to establish relationships between tables in a database?
Why is 'increased flexibility' considered an advantage of using databases from a business perspective?
Why is 'increased flexibility' considered an advantage of using databases from a business perspective?
What is the difference between 'scalability' and 'performance' in the context of database management?
What is the difference between 'scalability' and 'performance' in the context of database management?
What is the purpose of an 'integrity constraint' in a database?
What is the purpose of an 'integrity constraint' in a database?
How do databases contribute to 'increased data security'?
How do databases contribute to 'increased data security'?
In business intelligence, what is the negative impact of 'data redundancy'?
In business intelligence, what is the negative impact of 'data redundancy'?
Why do organizations often struggle to turn their business data into business intelligence?
Why do organizations often struggle to turn their business data into business intelligence?
What does 'data aggregation' achieve in business intelligence?
What does 'data aggregation' achieve in business intelligence?
Why is extracting business analysis directly from operational systems often difficult?
Why is extracting business analysis directly from operational systems often difficult?
What role does 'Extraction, Transformation, and Loading (ETL)' play in data warehousing?
What role does 'Extraction, Transformation, and Loading (ETL)' play in data warehousing?
What is the primary purpose of a 'data mart'?
What is the primary purpose of a 'data mart'?
What is a 'data cube' in data analysis?
What is a 'data cube' in data analysis?
What is the role of 'data cleansing' (or scrubbing)?
What is the role of 'data cleansing' (or scrubbing)?
What is the purpose of 'data visualization' in business?
What is the purpose of 'data visualization' in business?
How does blockchain technology ensure data immutability?
How does blockchain technology ensure data immutability?
What is the purpose of 'proof of work' in blockchain technology?
What is the purpose of 'proof of work' in blockchain technology?
Flashcards
Digital Darwinism
Digital Darwinism
Organizations that cannot adapt to new demands in the information age are doomed.
Disruptive Technology
Disruptive Technology
A new way of doing things that doesn't initially meet the needs of existing customers.
Sustaining Technology
Sustaining Technology
Technology that produces improved products that customers are eager to buy.
Innovator's Dilemma
Innovator's Dilemma
Signup and view all the flashcards
Internet
Internet
Signup and view all the flashcards
WWW (World Wide Web)
WWW (World Wide Web)
Signup and view all the flashcards
HTML
HTML
Signup and view all the flashcards
Web Browser
Web Browser
Signup and view all the flashcards
Hypertext Transport Protocol
Hypertext Transport Protocol
Signup and view all the flashcards
URL
URL
Signup and view all the flashcards
E-Business
E-Business
Signup and view all the flashcards
Ecommerce
Ecommerce
Signup and view all the flashcards
Paradigm Shift
Paradigm Shift
Signup and view all the flashcards
Mass Customization
Mass Customization
Signup and view all the flashcards
Personalization
Personalization
Signup and view all the flashcards
Disintermediation
Disintermediation
Signup and view all the flashcards
Intermediaries
Intermediaries
Signup and view all the flashcards
Heat Map
Heat Map
Signup and view all the flashcards
Viral Marketing
Viral Marketing
Signup and view all the flashcards
Clickstream
Clickstream
Signup and view all the flashcards
Clickstream Analytics
Clickstream Analytics
Signup and view all the flashcards
E-Business Model
E-Business Model
Signup and view all the flashcards
Brick and Mortar Business
Brick and Mortar Business
Signup and view all the flashcards
Click and Mortar Business
Click and Mortar Business
Signup and view all the flashcards
Pure-Play (Virtual) Business
Pure-Play (Virtual) Business
Signup and view all the flashcards
Click Fraud
Click Fraud
Signup and view all the flashcards
Web 2.0
Web 2.0
Signup and view all the flashcards
Disinformation
Disinformation
Signup and view all the flashcards
Deep Web
Deep Web
Signup and view all the flashcards
Dark Web
Dark Web
Signup and view all the flashcards
Transactional Data
Transactional Data
Signup and view all the flashcards
Analytical Data
Analytical Data
Signup and view all the flashcards
Accurate Data
Accurate Data
Signup and view all the flashcards
Master Data Management
Master Data Management
Signup and view all the flashcards
Data Validation
Data Validation
Signup and view all the flashcards
Database Management System (DBMS)
Database Management System (DBMS)
Signup and view all the flashcards
Data Element
Data Element
Signup and view all the flashcards
Metadata
Metadata
Signup and view all the flashcards
Primary Key
Primary Key
Signup and view all the flashcards
Data Warehouse
Data Warehouse
Signup and view all the flashcards
Extractions, Transformation, and Loading (ETL)
Extractions, Transformation, and Loading (ETL)
Signup and view all the flashcards
Study Notes
Digital Business Concepts
- Digital Darwinism means organizations that cannot adapt to new demands in the information age are doomed.
- Disruptive technology introduces new ways of doing things that initially don't meet existing customer needs.
- Sustaining technology involves improved products eager customers are willing to buy.
- The innovator's dilemma refers to how incumbents use disruptive technologies without damaging relationships with existing customers, partners, and stakeholders.
Internet and WWW
- The internet is a network connecting computers globally.
- It requires organizations to adapt to changing markets, economic environments, and technologies.
- Initially, the Internet was developed for emergency military communication by the Department of Defense.
- The World Wide Web (WWW) provides access to internet information through documents, graphics, audio, and video files using HTML.
- HTML (hypertext markup language) is the special formatting language for these files.
- A web browser allows users to access the WWW.
- Hypertext transport protocol is the internet protocol browsers use with URLs to request and display web pages.
- URL stands for universal resource locator.
- Growth of the WWW was due to the microcomputer revolution, networking advancements, easy-to-use browser software, speed, convenience, low email costs, and flexible web pages.
- Web 1.0 acted as a catalyst for e-business during the WWW's early years of operation (1991-2003).
- E-business encompasses e-commerce and all activities related to internal/external business operations.
- E-commerce involves buying and selling goods and services online.
- Paradigm Shift describes a new, transformative form of business that reshapes company and organizational behavior.
E-Business Advantages
- Expanding global reach grows the number of people a firm communicates with worldwide.
- Information richness is the depth and breadth of detail in communicated information.
- Opening new markets involves mass customization through tailoring products to customer specifications.
- Personalization involves crafting offers based on customer likes and dislikes.
- Disintermediation sells directly to customers online, cutting out intermediaries.
- Intermediaries are agents, software, or businesses facilitating transactions between buyers and sellers.
- A heat map is a 2D data representation expressing values as colors.
- Interactivity measures advertising effectiveness by interactions, including time spent, pages viewed, and repeat visits.
- Stickiness refers to the amount of time spent on a site or app.
- Viral marketing induces users to pass marketing messages to grow the message's visibility.
- Clickstream is the exact path a visitor takes through a website.
- Clickstream analytics collects, analyzes, and reports aggregate data on website visitor behavior.
- Website traffic analytics uses clickstream data to assess site efficiency at the operational level.
- Website e-business analytics uses clickstream data to determine the effectiveness of the site as a channel-to-market.
- Showrooming occurs when customers browse in physical stores but buy the product online for less.
- An e-business model details how a company creates, delivers, and generates internet revenues.
- Brick-and-mortar businesses operate with physical presence only.
- Click-and-mortar businesses operate with both physical and online presences.
- Pure-play (virtual) businesses operate purely online.
- Search engine ranking evaluates variables used to determine where a URL appears in search results.
- Optimization improves URL attractiveness to search engines for higher ranking.
- Organic search results are unpaid entries based on content.
- Paid search results are links a company paid to display.
- An affiliate program allows businesses to generate commissions or referral fees when a customer clicks a link to anothers web page.
- Click fraud artificially inflates traffic statistics for online ads.
- Hitbots create the illusion of high link clicks without generating real profit.
Web 2.0
- Web 2.0 is the next generation of internet use with more mature, distinct communications characterized by collaboration, sharing, and content being free.
- Direct-to-consumer model where companies build, market, sell, and ship their own products.
- Advantages for customer experience, data collection, and reduced costs.
- An open system consists of nonproprietary hardware and software based on known standards.
- Third parties use open systems to create add-on products that can be integrated.
- Source code involves instructions written by a programmer for computer software.
- Open-source software has source code available for third parties to review and modify.
- Closed-source software is proprietary software licensed under exclusive copyright.
- Native advertising attempts to gain attention by providing content in the user's experience.
- A reputation system allows buyers to post feedback on sellers.
- Knowledge management systems capture, organize, and disseminate knowledge, which falls into explicit or tacit categories.
- Explicit knowledge is documented and codified, while tacit knowledge resides in people's heads.
- Crowdsourcing harnesses the wisdom of the crowd.
- Crowdfunding raises money through small contributions from many people.
- Asynchronous communication is when messages and responses do not occur at the same time.
- Synchronous communication occurs in real-time.
- Business 2.0 is all about social networking, connecting people by profile information.
- Social networking involves expanding business contacts through a personal network.
- Social networking analysis maps group contacts to identify who knows each other and who works together.
- Misinformation is false information presented as fact without deceitful intent, while disinformation is false information presented intentionally to deceive.
- Fake news stories are widely shared to promote or discredit a public figure, political movement, or company.
Web 3.0
- The deep web is a large part of the internet not accessible to conventional search engines.
- The dark web is intentionally hidden from search engines, masking IP addresses and requiring a special web browser.
Data, Information, and Business Intelligence
- Data has levels, formats, and granularities.
- Transactional data facilitates daily operations
- Analytical data supports managerial tasks.
- Timeliness of data is situation-dependent.
- Real-time data is immediate and up-to-date.
- Data inconsistency results when the same element has different values.
- Data integrity issues occur when systems produce incorrect, inconsistent, or duplicate data.
- Data quality characteristics include accuracy, completeness, consistency, timeliness, and uniqueness.
- Low-quality data comes from customers intentionally entering inaccurate information, differing entry standards, operational errors, and third party inaccuracies.
- Businesses can be affected by low quality data through an inability to accurately track customers and poor marketing.
- Good data improves decision-making and may impact an organization's bottom line.
- A data steward ensures data policies and procedures are implemented.
- Governance refers to the overall management of data security.
- Master data management gathers data, ensuring uniformity, accuracy, consistency, and completeness.
- Data validation includes tests evaluating compliance with data governance policies.
- Storing data is done in databases, which maintain data about inventory, transactions, people, and warehouses.
- Database management systems (DBMS) create, read, update, and delete relational database data.
- A data element is the smallest or basic unit of data
- A data model is logical data structures that detail the relationships among data
- Metadata are details of the data
- A data dictionary compiles metadata about data elements in the data model.
- An entity is a person place thing transaction or event about which data are stored
- An attribute (field, column) is a data element associated with an entity.
- A record is a collection of related data elements.
- Keys identify entities (tables).
- A primary key uniquely identifies a given entity in a table.
- A foreign key is a primary key from one table that appears as an attribute in another table to act as a logical relationship between tables.
- Increased flexibility, scalability, performance, data integrity, and data security are the advantages of using databases.
- Data integrity measures data quality.
- Integrity constraints are rules ensuring data quality.
- Access levels determine who has data access, whereas access control determines the type of user access.
- Data redundancy is the duplication of data in multiple places.
Business Intelligence
- Access to organizational data can be difficult if the data is unstructured and there is too much information and not enough insights.
- Business intelligence enables users to receive reliable, consistent, understandable, and easily manipulated data.
- Data warehouses extend data transformation into information and support decision-making.
- Data warehouses aggregate data throughout an organization for decision-making purposes.
- Extracting, transformation, and loading (ETL) is the process that extracts, transforms, and loads data into a data warehouse.
- A data mart contains a subset of data warehouse data.
- A data cube represents multi-dimensional data.
- A data lake is a storage repository holding raw data until needed.
- Data cleansing weeds out and fixes inconsistent, incorrect, or incomplete data.
- Cleansing or scrubbing fixes dirty, erroneous, or flawed data.
- Data visualization technologies allow users to "see" or visualize in order to transform data into a business perspective.
- Data Visualization tools move beyond excel graphs and charts to support analytical techniques.
- Business intelligence dashboards track corporate metrics and include controls to manipulate data for analysis.
- Distributed computing processes and manages algorithms across many machines.
- A ledger records classified and summarized transactional data.
- Blockchain consists of permanent and tamper-proof blocks of data.
- Proof of work defines a resource intensive calculation, called mining, that needs to be performed in order to create a distributed ledger or blockchain.
- The primary goals are to verify the legitimacy of a transaction while avoiding the so-called double spending and to create new digital currencies by rewarding miners for doing the previous task.
- A blockchain is formed by linking blocks containing a hash, previous hash, and data.
- The genesis block is the first block created in the blockchain.
- A hash is a function converting letters and numbers into an encrypted output of a fixed length.
- Proof of stake validates transactions without computing power.
- Immutability and digital trust are blockchain advantages.
MIS Infrastructures
- MIS infrastructure includes plans to build, deploy, use, and share data, processes, and MIS assets.
- MIS infrastructure contains hardware, software, networks, clients, and servers and supports operations.
- A backup is the exact copy of a system's information
- Recovery is the ability to restore a system.
- A disaster recovery plan recovers information or IT systems after catastrophes.
- A business continuity plan recovers and restores interrupted critical functions after disasters.
Agile MIS Infrastructure
- Emergency Preparedness ensures a company is ready to respond.
- A business impact analysis identifies critical business functions.
- Hot sites and cold sites are different types of recovery locations.
- Agile MIS infrastructure supports change.
- Characteristics of Agile MIS infrastructure: Accessibility, availability, maintainability, portability, reliability, vulnerability, and scalability.
- Scalability is how well a system adapts to increased demands.
- Performance is how fast a system performs.
- Capacity planning determines environmental infrastructure requirements.
- Usability refers to how easy a system is to learn and use.
- Serviceability refers to how quickly a 3rd party can change a system.
- Sustainable MIS Infrastructure supports the environment.
- Moore's Law states computer chip doubled every 18 months.
- Expansion of business tech leads to increased e-waste and energy consumption.
- A grid computing collection uses computers to solve common problems.
- Virtualized computing allows for creating multiple virtual machines on one computer.
- Data centers house virtualized MIS.
- Sustainable data centers chose geographical locations, reduces carbon emissions, and reduce required floor space.
Cloud Computing
- In cloud computing, multi-tenancy is a system instance serving multiple customers.
- Single Tenancy refers to each tenant having to maintain an individual system.
- A cloud fabric is a software that enables cloud computing.
- Broad network access allows all devices to access data and applications.
- Rapid elasticity quickly increases or decreases computing capacity.
- Private, public, and hybrid are the various cloud types.
Network Basics
- A telecommunication system transmits data over networks.
- Networks are created linking multiple devices.
- Local, metropolitan and wide area networks are the the three types of networks.
- Networks are differentiated by architecture, which includes peer to peer/ client service.
- Clients request information from servers in order to respond to other requests.
- A network operating system steers information between computer, and manages security.
- Packet switching occurs when a computer sends a message that is divided into smaller parts, called packets.
- A router examines each packet and decides how to send the packet.
- Topology refers to the configuration of network components.
- Wireless is a type of media.
- Protocols are standards specifying data formats and transmission rules.
- The OSI Model enables diverse communication models to converse using standard protocols.
- Transmission control Protocol/Internet protocol (TCP/IP) provides technical foundation for the public internet as well as for large numbers of private network.
- Voice Over Internet Protocol (VOIP) uses TCP/IP tech to transmit voice calls.
- Wired and wireless are the two media that can be used to transmit network signals.
- E-business networks provide for the transparent exchange of information with transparency, reliability, secure exchange, and scalability.
- They also act as integrators for digital and traditional businesses.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.