eBusiness
eBusiness 2
Ethics
Random
Security
100
Digital Darwinism
Implies that organization that can not adapt to the new demands placed on them for surviving in the information age are doomed to extinction
100
these are the Internet's impact on information

What are

Easy to compile

Increased richness

Increased reach

Improved content


100
information ethics

What is Govern the ethical and moral issues arising from the development and use of information technologies?

100
small file deposited on a hard drive by a website that contains information about customers and their Web activities
what is a cookie?
100

The most secure type of authentication involves these three things

Something the user knows

Something the user has

Something that is part of the user


200
steamboats, transistor radios and Intel's 8088 processor are all examples of this kind of technology.
What is disruptive technology?
200
the definition of disintermediation
what is getting rid of the middle man when bring buyers and sellers together?
200
the difference between privacy and confidentiality.
the right to have control over your own possessions/information versus assurance that information is only available to those that authorize to use them
200
the difference between a worm and virus
The worm does not need to be attached to anything and spread while a virus has to attach itself to something
200
difference between authentication and authorization
a method for confirming users' identities versus the process of giving someone permission to do something
300
uses html to create files that can be viewed using the Internet.
What is the World Wide Web (www)?
300
An example of this is when Amazon is able to create your own listing of recommended items based on your previous purchasing history
What is Personalization?
300
unsolicited email
what is spam?
300
these are four quadrants of information ethics

legal and ethical

illegal but ethical

legal but unethical

illegal and unethical

300

Content filtering

Prevents emails containing sensitive information from transmitting and stops spam and viruses from spreading


400
the difference between eCommerce and eBusiness
eCommerce deals with the buying and purchasing online while eBusiness also deals with conducting business process online
400
Some examples are visitor metrics, exposure metrics, visit metrics, hit metrics.

What are website metrics to improve effectiveness?


400
the tools to prevent information misuse

information management

information governance

information compliance

information secrecy

information property

400

This is by far the best and most effective way to manage authentication


biometrics
400
type of prevention and resistance where information is encrypted
public key encryption
500
this is the difference between Web 1.0, Web 2.0 and Web 3.0

Web 1.0 is static and only allows users to read

Web 2.0 is interactive and allows users to change content

Web 3.0 uses intelligence applications, machine based learning.

500
the four ebusiness models

B2B, B2C, C2B, C2C

500
the six e-policies an organization should implement to protect themselves

ethical computer use

information privacy

acceptable use

email privacy

social media

workplace monitoring

500

the most ineffective form of authentication

a user ID and a password

500

Features full-time monitoring tools that search for patterns in network traffic to identify intruders


Intrusion detection software