eBusiness
eBusiness 2
Ethics
Random
Security
100
Digital Darwinism
Implies that organization that can not adapt to the new demands placed on them for surviving in the information age are doomed to extinction
100
these are the Internet's impact on information

Easy to compile

Increased richness

Increased reach

Improved content


100
information ethics

What is Govern the ethical and moral issues arising from the development and use of information technologies?

100

what is a cookie?

small file deposited on a hard drive by a website that contains information about customers and their Web activities

100

The most secure type of authentication involves these three things

Something the user knows

Something the user has

Something that is part of the user


200

What is disruptive technology and three examples?


A new way of doing things that initially does not meet the needs of existing customers

Examples: steamboats, transistor radios and Intel's 8088 processor are all examples of this kind of technology.

200
the definition of disintermediation
what is getting rid of the middle man when bring buyers and sellers together?
200
the difference between privacy and confidentiality.
the right to have control over your own possessions/information versus assurance that information is only available to those that authorize to use them
200
the difference between a worm and virus
The worm does not need to be attached to anything and spread while a virus has to attach itself to something
200
difference between authentication and authorization
a method for confirming users' identities versus the process of giving someone permission to do something
300

What is the World Wide Web (www)? 

uses html to create files that can be viewed using the Internet.

300

What is Personalization and an example? 

Occurs when a company knows enough about a customer’s likes and dislikes that it can fashion offers more likely to appeal to that person

An example of this is when Amazon is able to create your own listing of recommended items based on your previous purchasing history

300
unsolicited email
what is spam?
300
these are four quadrants of information ethics

legal and ethical

illegal but ethical

legal but unethical

illegal and unethical

300

Content filtering

Prevents emails containing sensitive information from transmitting and stops spam and viruses from spreading


400
the difference between eCommerce and eBusiness
eCommerce deals with the buying and purchasing online while eBusiness also deals with conducting business process online
400

What are the 4 website metrics to improve effectiveness? visitor metrics, exposure metrics, visit metrics, hit metrics.

visitor metrics, exposure metrics, visit metrics, hit metrics.

400
the tools to prevent information misuse

information management

information governance

information compliance

information secrecy

information property

400

Biometrics


The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting, VERY COSTLY.

This is by far the best and most effective way to manage authentication

400

public key encryption (PKE)

type of prevention and resistance where information is encrypted

500
this is the difference between Web 1.0, Web 2.0 and Web 3.0

Web 1.0 is static and only allows users to read

Web 2.0 is interactive and allows users to change content

Web 3.0 uses intelligence applications, machine based learning.

500
the four ebusiness models

B2B, B2C, C2B, C2C

500
the six e-policies an organization should implement to protect themselves

ethical computer use

information privacy

acceptable use

email privacy

social media

workplace monitoring

500

the most ineffective form of authentication

a user ID and a password

500

Intrusion detection software 


Features full-time monitoring tools that search for patterns in network traffic to identify intruders


M
e
n
u