Ch 3.1 Ebusiness
Ch 3.2 Web 2.0
Ch 4.1 Ethics
Ch 4.2 Information Security
Potpourri 2
100

A new way of doing things that initially does not meet the needs of existing customers.

What is Disruptive technology?

100

Proprietary software licensed under exclusive legal right of the copyright holder.

What is Closed source?

100

A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

What is Digital rights management (DRM)?

100

Someone who breaks into other people’s computer systems and may just look around or steal and destroy information.

What is a Black-hat hacker?

100

Support value activity that provides employees with training, hiring, and compensation.

What is Human resource management?

200

Occurs when a business sells directly to the customer online and cuts out the middle man.

What is Disintermediation?

200

Maps group contacts identifying who knows each other and who works together.

What is a Social networking analysis?

200

Unsolicited email that plagues employees at all levels and clogs email systems.

What is Spam?

200

Those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

What is a Cyberterrorist?

200

The suppliers’ ability to influence the prices they charge for supplies (including materials, labor, and services).

What is Supplier Power?

300

Allows users to access the WWW.

What is a Web browser?

300

A web format used to publish frequently updated works.

What is Real Simple Syndication (RSS)?

300

The electronic defacing of an existing website.

What is Cybervandalism?

300

The forging of the return address on an email so that the email message appears to come from someone other than the actual sender.

What is Spoofing?

300

A science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.

What is Cryptography?

400

Produces an improved product customers are eager to buy, such as a faster car or larger hard drive.

What is Sustaining technology?

400

The most common form of collective intelligence found inside the organization.

What is Knowledge management?

400

Occurs when someone registers purposely misspelled variations of well-known domain names.

What is Typosquatting?

400

A form of malicious software that infects your computer and asks for money.

What is ransomware?

400

A magazine published only in electronic form on a computer network.

What is Ezine?

500

This is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website.

What is Taxonomy?

500

An online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user’s experience in terms of its content, format, style, or placement.

What is Native advertising?

500

A government attempt to control Internet traffic, thus preventing some material from being viewed by a country’s citizens.

What is censorship?

500

The use of a false identity to artificially stimulate demand for a product, brand, or service.

What is sock puppet marketing?

500

Semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements.

What are managerial business processes?

M
e
n
u