Professional Documents
Culture Documents
➔ Value Chain: views a firm as a series of business processes that each add value to the
product or service and is useful to find the best value for customers
➔ Value Chain(Primary): bottom of the value chain, these include business processes
that acquire raw materials and manufacture, deliver, market, sell and provide after-sale
services
➔ Value Chain(Support):found along the top of the value chain and includes business
processes, such as firm infrastructure, human resource management, technology
development, and procurement, that support the primary value activities
➔ Data: Raw facts that describe the characteristics of an event or object
➔ Information: Data converted into a meaningful and useful context
➔ Internet of Things: A world where interconnected, internet-enabled devices or things
can collect and share data without human intervention
➔ Business Intelligence(BI): Information collected from multiple sources that analyzes
patterns, trends, and relationships for strategic decision making
➔ Analytics/Business Analytics: the science of fact-based decision making by turning
data into insights for decision making
➔ Knowledge: the skills, experience, and expertise, coupled with information that creates
a person’s intellectual resources
➔ System: a collection of parts that link to achieve a common purpose
➔ Systems Thinking: A system is a collection of parts that link to achieve a common
purpose
➔ Porter’s Five Forces Model(way to discern comp. landscape): A model for analyzing
the competitive forces within the environment in which a company operates, to assess
the potential for profitability in an industry
➔ Big Data: a collection of large, complex data sets, including structured and
unstructured data, which cannot be analyzed using tradition database methods and
tools
➔ SWOT analysis: evaluates an organization strengths and weaknesses, opportunities
and threats to identify influences that work for or against business strategies
➔ Information Silo Add: Occurs when one business unit is unable to freely communicate
with other business units, making it difficult or impossible for organizations to work
cross-functionally
➔ Algorithms: mathematical formulas placed in software that performs an analysis on a
data set
Chapter 2 Terms
➔ Disruptive technology: A new way of doing things that initially does not meet
the needs of existing customers
➔ Web (Business) 1.0: Refers to the World Wide Web during its first few years of
operation between 1991 and 2003
➔ Clickstream Data Analytics: the process of collecting, analyzing, and reporting
aggregate data about which pages a website visitor visits, and in what order
➔ Semantic Web: A component of Web 3.0 that describes things in a way that
computers can understand
➔ User-contributed Content: content created and updated by many users for
many users(youtube)
➔ Source Code: contains instructions written by a programmer specifying the
actions to be performed by computer software
➔ Sustaining technology: Produces an improved product customers are eager to
buy, such as a faster car or larger hard drive
➔ Ecommerce: The buy and selling of goods and services over the internet
➔ Disintermediation: Occurs when a business sells direct to the customer online
and cuts out the intermediary
➔ Internet of Things (IoT): A world in which interconnected, Internet-enabled
devices or things can collect and share data without human intervention.
➔ Web (Business) 3.0: based on intelligent web applications using natural
language processing, machine based learning/reasoning and intelligent
applications. A way for people to describe info so computers can understand
the relationship among concepts and topics
➔ Open Source: refers to any software whose source code is made free for any
third party to review and modify
➔ Internet: A massive network that connects computers all over the world and
allows them to communicate with one another
➔ Ebusiness: includes e-commerce along with all activities related to internal
and external business operations such as servicing customer accounts,
collaborating with partners, and exchanging real-time information
➔ Clickstream Data : Exact pattern of a consumer’s navigation through a site
➔ Search Engine Optimization (SEO) : combines art along with science to
determine how to make URLs more attractive to search engines, resulting in
higher search engine ranking
➔ Web (Business) 2.0: the next generation of internet use, a more mature,
distinctive communication platform characterized by new qualities such as
collaboration, sharing, and free
➔ Closed Source: any proprietary software licensed under exclusive legal right of
the copyright holder
Chapter 4 Terms
➔ Spoofing: the forging of the return address on an email so the messages appear to
come from someone other than the actual sender. this is not a virus but rather a way by
which virus authors conceal their identities as they send out viruses
➔ Malicious Code: includes a variety of threats such as viruses, worms, and trojan horses
➔ Packet Tampering: consists of altering the content of packets as they travel over the
internet or altering data on computer disks after penetrating a network
➔ Hacker: experts in technology who use their knowledge to break into computers and
computer networks, either for profit or motivated by the challenge
➔ Information Security: a broad term encompassing the protection of information from
accidental or intentional misuse by persons inside or outside an organization
➔ Network behavior analysis: gathers an organization’s computer network traffic
patterns to identify unusual or suspicious operations
➔ Cybersecurity: involves prevention, detection, and response to cyberattacks that can
have wide-ranging effects on the individual, organizations, community, and at the
national level
➔ Cyberattacks: Malicious attempts to access or damage a computer system
➔ Worm: spreads itself not only from file to file but also computer to computer
➔ Trojan Horse Remove: hides inside other software, usually as an attachment or a
downloadable file
➔ Denial of Service: floods a website with so many requests for service that the site
slows down or crashes
➔ Ransomware: a form of malicious software that infects your computer and asks for
money
Deloitte Article:
➔ The three principles that can help think of AI ethical issues
◆ Impact
● The moral quality of a technology depends on its consequences. Risks
and benefits must be weighted
○ Non-maleficence: Avoid Harm
○ Beneficence: advance the flourishing of people and societies
◆ Justice
● People should be treated fairly
○ Procedural fairness: promote fair treatment
○ distributive fairness: promote equitable outcomes
◆ Autonomy
● People should be able to make their own choice, free of manipulation
forces
○ Comprehension: Explain how to use and when to trust AI
○ Control: allow people to modify or override AI when appropriate
Sustainable vs Disruptive Technologies
➔ Sustainable technology: seeks to improve a current product
➔ Disruptive technology: reinvent/invent a new product that meets consumer requests