Ethics and Information Security
Networks: Mobile Business
Porter
E-Business
Business Communications
100

This policy details the extent to which email messages may be read by others.

What is the purpose of an Email Privacy Policy?

100

WLAN. 

What is wireless local area network? 

100

The creator of the 5 Forces Model. 

Who is Michael Porter?

100
Business to Business, Business to Consumer, Consumer to Business, and Consumer to Consumer. 

What are the four e-business models?

100

The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability. 

What is supply chain management? 

200

Phishing is a technique to gain personal information for the purpose of identity theft, usually by the means of fraudulent emails that look as though they came form legitimate businesses. 

What is phishing?

200

The maximum amount of data that can pass from one point to another in a unit of time. 

What is bandwidth? 
200

The ability of buyers to affect the price they must pay for an item. 

What is buyer power?

200

A new way of doing things that initially does not meet the needs of existing customers. 

What is disruptive technology? 

200

Supply Chain Management, Customer Relationship Management, and Enterprise Resource Planning. 

What are the three primary enterprise systems? 

300

An organized attempt by a country's military to disrupt or destroy information and communications systems of another country. 

What is a cyber war?

300

PAN, WLAN, WMAN, WAN. 

What are the different wireless network categories? 

300

This model of Porter is high when competition of a market is fierce. 

What is rivalry among existing competitors?

300

These two caused business disruption by allowing people to communicate and collaborate in ways that were not possible before the information age. They disrupted the way businesses operate, employees communicate, and products are developed and sold. 

How did the Internet and WWW cause business disruptions? 

300
Accounting and Finance, Production and Materials Management, and Human Resources. 

What are the three core ERP components? 

400

Authentication and Authorization, Prevention and Resistance, Detection and Response. 

What are the three primary information security areas?

400

GPS, GIS, and LBS. 

What are the different wireless business applications? 

400

Broad Cost Leadership, Broad Differentiation, and Focused Strategy. 

What are Porter's Three Generic Strategies? 

400
Challenges include identifying limited market segments, managing consumer trust, ensuring consumer protection, and adhering to taxation rules. 

What are the four challenges associated with e-business. 

400

Improved visibility across the supply chain and increased profitability for the firm are the primary business benefits. 

What is supply chain management's impact on business? 

500

Ethical Computer Use Policy, Information Privacy Policy, Acceptable Use Policy, Email Privacy Policy, Social Media Policy, Employee Monitoring Policy. 

What are the 6 e-policies organizations should implement to protect themselves?

500

Network categories, network providers, network access technologies, network protocols, and network convergence. 

What are the five networking elements creating a connected world? 

500

Buyer Power, Supplier Power, Threat of Substitute Products or Services, Threat of New Entrants, Rivalry Among Existing Competitors. 

What is Porter's Five Forces Model? 

500

The next step in the evolution of the Internet and web applications. This offers a way for people to describe information in ways that enable computers to understand the relationships among concepts and topics. 

How does Web 3.0 affect the next generation of online business? 

500

The goal is to integrate all of the organizational systems into one fully functioning, high-performance system that is capable of meeting all business needs and user requirements. 

What are the current technologies organizations are integrating in enterprise resource planning systems?

M
e
n
u