Professional Documents
Culture Documents
COMMERCE 2KA3
MIDTERM EXAM
STUDY GUIDE
find more resources at oneclass.com
Commerce 2KA3
Digital Firm: can be defined along several dimensions; it is one in which nearly all of the
organization’s significant business relationships with customers, suppliers, and employees
are digitally enabled and mediated. Core business process are accomplished through digital
networks spanning the entire organization or linking multiple organizations
Business Processes: refer to the set of logically related tasks and behaviours that
organizations develop over time to produce specific business results and the unique
manner in which theses activities are organized and coordinated
Key Corporate Assets: intellectual property, core competencies, and finical and human
assets- are managed through digital means.
Time shifting: refers to business being done continuously 24/7 rather than in a workday
Business Model: describes how a company produces, delivers, and sells a product or
service to create wealth
Competitive Advantage: when firms achieve one or more of these business objectives:
operational excellence, new products, services, and business models; customer/supplier
intimacy, and improved decision making- chances are they have achieved a competitive
advantage
Information Technology (IT): consist of all the hardware and software that a firm needs
to use in order to achieve its business objectives
Information: data that have been shaped into a firm that is meaningful and useful to
human beings
Data: are streams of raw facts representing events occurring in organizations or the
physical environment before they have been organized and arranged into a form that
people can understand and use
Input: captures or collects raw data from within the organization or from its external
environment
Output: transfers the process information to the people who will use it or to the activities
for which it will be used
Senior Management: makes long-range strategic decisions about products and services
and ensures the finical performance of the firm
Middle Management: carries out the programs and plans of senior management, and
operational management
Data workers: secretaries or clerks assist with the scheduling and communications at all
levels of the firm
Production or service workers: actually produce the product and deliver the service
Culture: each organization has its own unique culture or fundamental set of assumptions,
values, and ways of doing things, that has been accepted most of its members
Computer Hardware: is the physical equipment used for input, processing, and output
activities in an information system
Data management technology: consist of the software governing the organization of data
on physical storage media
Network: links two or more computers to share data or resources such as a printer
World wide web: is a service or information space provided on the internet that uses
universally accepted standards for storing, retrieving, formatting, and displaying
information in a page format on the internet
Complementary assets: are those assets required to derive value form a primary
investment
Commerce 2KA3
Business Processes: refer to the manner in which work is organized, coordinated and
focused to produce a valuable product or service. They are the collection of activities
required to produce a product or service. These activities are supported by flows of
materials, information, and knowledge among the participants in business processes.
sales
Business intelligence: a contemporary term for data and software tools for organizing,
analyzing, and providing access to data to help managers and other enterprise users make
more informed decisions
Decision-support system (DSS): focus on problems that are unique and rapidly changing
and for which the procedure for arriving at a solution may not be fully predefined in
advance. DSS uses internal info from TPS and MIS, they often bring in information from
external sources, such as current stock process or product process of competitors
Executive Support System (ESS): a system that focus on strategic issues and long-term
trends, both in the firm and in the external environment. Questions like: What will
employment levels be in five years? What ware the long-term industry cost trends? What
products should we be making in five years? ESS addresses non-routine decisions requiring
judgment, evaluation, and insight because there is no agreed-on procedure.
Portal: information is delivered to senior executives through this, uses a web interface to
present integrated personalized business content
Digital Dashboard: the information is displayed upon a singe screen, graphs and charts of
key performance indicators for managing a company.
Enterprise Applications: systems that span functional areas, focus on executing business
processes across the business firm, and include all levels of management. These
applications help businesses become more flexible and productive by coordinating their
business processes more closely
Enterprise Systems: also known as enterprise resource planning (ERP) systems, firms use
them to integrate business process in manufacturing and production, finance, and
accounting, sales and marketing, and human resources into a single software system
Supply Chain Management systems (SCM) Systems: used by firms to help manage
relationships with their suppliers. These systems help suppliers, purchasing firms,
distributors, and logistics companies share information about orders, production,
inventory levels, and delivery of products, and services, so they can source, produce, and
deliver goods and services efficiently
Interorganizational system: eg, SCM systems because they automate the flow of
information across organizational boundaries
Customer Relationship Management CRM Systems: firms use these to help manage their
relationships with their customers. CRM systems provide information to coordinate all of
the business processes that deal with customers in sales, marketing, and service to
optimize revenue, customer satisfaction, and customer retention.
Knowledge Management systems KMS: some firsm perform better than others because
they have better knowledge about how to create, produce, and deliver products and
services. KMS or knowledge management systems enable organizations to better manage
processes for capturing and applying knowledge and expertise. These systems collect all
relevant knowledge and experience in the firm and make it available whenever and
wherever
Electronic Business (e-business): refers to the use of digital technology and the internet
to execute the major business processes of an enterprise. E-business includes activities for
the internal management of the firm and for coordination with suppliers and other
business partners.
Electronic Commerce (e-commerce): is part of e-business that deals with the buying and
selling of goods and services over the internet. It also encompasses activities, supporting
those market transactions, such as advertising, marketing, customer support, security,
delivery, and payment
Teams: have a specific mission that someone in the business assigned them. Team
members need to collaborate on the accomplishment of specific task and collectively
achieve the team mission.
Collaboration and teamwork are important today more than ever for the following reasons
- Changing nature of work
- Growth of professional work
- Changing organization of the firm
- Changing scope of the firm
- Emphasis on innovation
- Changing culture of work and business
Social Business: the use of social networking platforms, like FB, twitter, etc, to engage
their employees, customers, and suppliers. These tools enable workers to set up profiles,
form groups, and follow each other. The goal of social business is to deepen interaction-
sharing, innovation, and decision making.
Cyberlocker: online file sharing services that allow users to upload files to secure online
storage sites from which the files can be shared with others
Programmers: are highly trained technical specialists who write the software instructions
for computers
System analyst: constitute the principal liaisons between the information systems group
and the rest of the organization
Chief Information Officer (CIO): a senior manager who overseas the use of information
technology n the firm. Todays CIOs are expected to have a strong business background as
well as information systems expertise and play a leadership role in integrating technology
into the firm’s business strategy
Chief Security Offices (CSO): is in charge of information systems security for the firm and
is responsible for enforcing the firm’s information security policy. Responsible for
educating and training uses and information systems specialists about security, keeping
management aware of security threats and breakdowns, and maintaining the tools and
polices chosen to implement security
Chief Privacy Officer (CPO) responsible for ensuring that the company complies with
existing data privacy laws
Chief Knowledge Officer (CKO): is responsible for the firms knowledge management
program The CKO helps design programs and systems to find new sources of knowledge or
to make better sue of existing knowledge in organizational and management processes
End Users: are representatives of department outside of the information systems group
for whom applications are developed. These users are playing an increasingly large role in
the design and development of info systems
IT governance: includes the strategy and polices for using information technology within
an organizations. It specifies the decisions rights and framework for accountability to
ensure that the use of information technology supports the organization’s strategies and
objectives
Commerce 2KA3
Routines: sometimes called standard operating procedures are precise rules, procedures,
and practices, that have been developed to cope with virtually all expected situations.
Disruptive Technologies: are substitute products that perform as well or better than
anything currently produced. Eg. Car substituted the horse drawn carriage
agents (employees) to perform work on his or her behalf. Agents need constant
management and supervision or they will pursue their own best interests instead of the
owners
Competitive Forces Model: provides a general view of the firm, its competitors, and the
firm’s environment. The strategic position of the firm and its strategies are determined not
only by competition, but also by four other forces in the industry’s environment: new
market entrants, substitute products, customers, and suppliers
Product Differentiation: a power a firm has over its consumers that prevents them from
easily switching to a competitors products or services. If product differentiation in a
market is low, competitors are forced to compete based on price alone
Mass customization: the ability to offer individually tailored products or series using the
same production resources as mass production
Switching Costs: the costs of switching from one product to a competing product
Value Chain Model: highlights specific activities in the business where competitive
strategies can best be applied and where information systems are most likely to have a
strategic impact
Primary activities: are most directly related to the production and distribution of the
firm’s products and services, which create value for the customer
Support Activities: make the delivery of the primary activities possible and consist of
organization infrastructure, human resources, technology, and procurement.
Network Economics: business model based on a network may help firms strategically.
Marginal costs of an additional participant to a network (internet of phone services) is
close to zero while marginal benefits of that same participant are much higher
Virtual Company: uses networks to link people, assets, and ideas, enabling, it to ally with
other companies to crate and distribute products and services without being limited by
traditional organization boundaries or physical locations
Business Ecosystem: another term for a loosely coupled but interdependent network of
suppliers, distributors, outsourcing firms, transportation service firms, and technology
manufactures
Commerce 2KA3
In today’s current legal environment, managers who violate the law and are convicted will
most likely spend time in prison. Although business firms would in the past often pay for
legal defence of their employees enmeshed in civil charges and criminal investigations,
firms are now encouraged to cooperate with prosecutes to reduce charges against the
entire firm for obstructing investigations
Property rights and obligations: How can traditional intellectual property rights be
protected in digital society in which tracing and accounting for ownership are difficult and
ignoring such property rights is so easy?
Accountability and Control: who can and will be held accountable for harm done to
individual and collective information and property rights?
System quality: what standards of data and system quality should we demand to protect
individual rights and the safety of society
Quality of Life: what values should be preserved in an information- and knowledge based
society? Which intuitions should we protect from violation/ Which cultural values and
practices are supported by the new information technology?
Profiling: the use of computers to combine data from multiple sources and create
electronic dossiers of detailed information on individuals
Nonobvious relationship Awareness (NORA): a new data analysis technology that has
given the government and the private sector even more powerful profiling capabilities.
NORA can take information about people form many disparate sources, such as
employment applications, telephone records, customer listings, and wanted lists, and
correlate relationships to find obscure hidden connections that might help identify
criminals or terrorists.
Advances in networking, including the Internet, promise to greatly reduce the costs of
moving and accessing large quantities of data and open the possibility of mining large pools
of data remotely using small desktop machines, permitting an invasion of privacy on a scale
and with precisions previously unimaginable.
Responsibility: means that you accept the potential costs, duties, and obligations for the
decisions you make.
Accountability: a feature of systems and social institutions; means that mechanisms are in
place to determine who took responsible action and who is responsible
Liability: the concept of responsibility further to the area of laws. Liability is a feature of
political systems in which a body of laws is in place that permits individuals to recover the
damages done to them by other actors, systems, or organizations
Due Process: a related feature of law-governed societies and is a process in which laws are
known and understood, and there is an ability to appeal to higher authorities to ensure that
the laws are applied correctly.
The above 4 basic concepts form the basis of an ethical analysis of information systems and
those who mange them. First information technologies are filtered through social
institutions, organizations, and individuals. The impacts of an information system are in
existence because of institutional, organizational and individual actions. Second
responsibility for the consequences of technology falls clearly on the institutions,
organizations, and individual managers who choose to use the technology. Third, in an
ethical, political society, individuals and others can recover damages done to them through
a set of laws characterized by due process.
Ethical Analysis
When confronted with a situation that seems to present ethical issues, it should be
analyzed using the following five-step process:
1. Identify and describe the facts clearly
2. Define the conflict or dilemma and identify the higher-order values involved
3. Identify the stakeholders
4. Identify the options that you can reasonably take
5. Identify the potential consequences of you options
Informed Consent: consent given with knowledge of all the facts needed to make a
rational decision
Safe Harbour: a private, self-regulating policy and enforcement mechanism that meets the
objectives of government regulators and legislation but does not involve government
regulation or enforcement.
Cookies: are small text files deposited on a computer hard drive when a user visits Web
sites. They identify visitors Web browser software and track visits to the web site.
Web Beacons : also called web bugs, are tiny software programs that keep a record of
users’ online clickstream and report this data back to whoever owns the tracking file
invisibly embedded in email messages and Web pages that are designed to monitor the
behaviour of the user visiting the a website or sending an email
Spyware: much like a web beacon, can be secretly installed on an internet users computer
by piggy backing on larger applications. Once installed, it calls out to websites to send
banner ads and other unsolicited material to the user, and it can report the users
movements on the internet to other computers.
Opt-in: The model that privacy advocates would rather see more use of, in which
businesses are prohibited from collecting any personal information unless the consumer
specifically takes action to approve collecting any personal information unless the
consumer specifically takes action to approve information collection and use
Trade Secrets: not based on information in the public domain, trade secrets have
arisen out of the broad duty of good faith and the principle of equity that whoever
has received information in confidence shall not take unfair advantage of it
Canada has stated that the test for whether there has been a breach of confidence
consist of three elements
1. The information conveyed must be confidential (not public knowledge)
2. The information must have been communicated in confidence
3. The information must have been misused by the part to whom it was
communicated
Patent: a patent grants the owner an exclusive monopoly on the ideas behind an
invention for between 17 and 20 years. The intent behind patent law is to ensure
that inventors of new machines, devices, or methods receive the full financial and
other rewards of their labours yet still make widespread use of the invention
possible by providing detailed diagrams fro those wishing to use the idea under
licence from the patent’s owner
Computer Crime: is the commission of illegal acts through the use of a computer or
against a computer system. Computers or computer systems can be the object of the crime,
as well as the instrument of a crime.
Computer Abuse: is the commission of acts involving a computer that may not be illegal
but that are considered unethical. The popularity of the Internet and email has turned one
form of computer abuse spamming into a serious problem fro both individuals and
businesses
Digital Divide: exists in both Canadian and US Schools, with schools in high poverty areas
less likely to have computers, high-quality educational technology programs, or Internet
access availability for their students
Repetitive Stress Injury (RSI): occurs when muscle groups are forced through receptive
actions often with high impact loads or tens of thousands of under low-impact loads. The
single largest source of RSI is computer keyboards.
Carpal tunnel Syndrome (CTS): the most common kind of computer-related RSI, in which
pressure on the median nerve through the wrists bony structure produces pain
Computer Vision Syndrome: refers to any eyestrain condition related to display screen
use in computers of all sorts. It symptoms include headaches, blurred vision, and dry
irritated eyes
Technostress: newest computer related malady, stress induced by computer use. Its
symptoms include aggravation, hostility towards humans, impatience, and fatigue.
Commerce 2KA3
Enterprise Systems
Companies are becoming increasingly more connected both internally and with other
companies
Supply chain: is a network of organizations and business processes for procuring raw
materials, transforming these materials into intermediate and finished products, and
distributing the finished products to customers. It links suppliers, manufacturing plants,
distribution centres, retail outlets, and customers to supply goods and services from source
through consumption. Material, information, and payments flow through the supply chain
in both directions. Goods start through the supply chain, are transformed into intermediate
products, and finally, into finished products. The upstream portion of the supply chain
includes the company’s suppliers, the suppliers and the processes for managing
relationships with them. The downstream portion consists of the processes for
distributing and delivering products to the final customers.
Just-in-time strategy: If a manufacturer had perfect information about exactly how many
units of product customers wanted, when customers wanted them, and when they could be
produced, then this strategy would be implemented. It would arrive exactly at the moment
they were needed and finished goods would be shipped as they left the assembly line.
Uncertainties arise because events cannot be foreseen- uncertain product demand, late
shipments from suppliers, defective parts or raw materials.
Safety Stock: acts as a buffer for the lack of flexibility in the supply chain, although, excess
inventory is expensive, low fill rates are also costly because businesses may be lost from
cancelled orders.
Bullwhip Effects: information about the demand for a product gets distorted as it passes
from one entity to the next across the supply chain. A slight rise in demand for an item
might cause different members in the supply chain - distributors, manufactures, suppliers,
secondary suppliers, and tertiary suppliers – to stockpile inventory so each ahs enough just
in case. Bullwhip is tamed by reducing uncertainties about demand and supply when all
members of the supply chain have accurate and up-to-date information. If supply chain
members share dynamic information
Demand Planning: One of the most important – and complex – supply chain planning
functions. Determines how much product a business needs to make to satisfy all of its
customers’ demands.
Supply Chain Execution Systems: manage the flow of products through distribution
centres and warehouses to ensure that products are delivered to the right locations in the
most efficient manner. They track physical status of goods, the management of materials,
warehouse and transportation operations, and financial information involving all parties.
Push-based Model: production master schedules are based on forecasts or best guesses of
demand for products, and products are pushed to customers.
Pull-based Model: aka demand driven or build-to-order model, actual customers orders or
purchases trigger events in the supply chain. Transactions to produce and deliver only
what customers have ordered move up the supply chain from retailers to distributors to
manufacturers and eventually to suppliers.
Employee Relationship Management (ERM): software that deals with employee issues
that are closely related to CRM, such as setting objectives, employee performance
management, performance-based compensation and employee training.
Sales Force Automation (SFA): sales force automation modules in CRM systems help sales
staff increase their productivity by focusing sales efforts on the most profitable customers,
those who are good candidates for sales and service
Operational CRM: includes customers facing applications such as tools for sales force
automation, call centre and customer service support, and marketing information.
Customer Lifetime Value (CLTV): based on the relationship between the revenue
produced by a specific customer, the expenses incurred in acquiring and servicing that
customer and the expected life of the relationship between the customer and the company
Customer Churn Rate: measures the number of customers who stop using or purchasing
products or services from a company. It is an important indicator of the growth or decline
of a firm’s customer base
Social CRM: tools that enable a business to connect customer conversations and
relationships from social networking sites to CRM processes.
Commerce 2KA3
E-commerce refers to the use of the Internet and the Web to transact business. It is
digitally-enabled commercial transactions that occur over the Internet and the Web.
Commercial transactions involve the exchange of values across organizational or individual
boundaries in return for products and services. Began in 1995
E-commerce is ubiquitous, meaning that it is available just about everywhere, at all times.
Key Entry Costs: the cost merchants must pay simply to bring their goods to market
Search Costs: the effort required to find suitable products: universal standards reduce
search costs
Information Density: the total amount and quality of information available to all market
participants, consumers and merchants alike.
Price Transparency: refers to the ease with which consumers can find out the variety of
prices in a market
Cost Transparency: refers to the ability of consumers to discover the actual costs
merchants pay for products
Price Discrimination: selling the same goods, or nearly the same goods to different
targeted groups at different targeted groups at different prices.
Information Asymmetry: exists when one party in a transaction has more information
that is important for the transaction than the other party
Dynamic Pricing: the price of a product varies depending on the demand characteristics of
the customer or the supply situation of the seller
Digital Goods: are goods that can be delivered over digital networks
Mobile Commerce (m-commerce): the use of handheld wireless devices for purchasing
goods and services from any location
Intellectual Property: refers to all forms of human expression that can be put into a
tangible medium such as text, CDs, or DVDs, or stored on any digital media, including web.
Podcasting: is a method of publishing audio or video broadcasts via the Internet, allowing
subscribing users to download audio or video files onto their personal computers or
portable music players
Streaming: is a publishing method for music and video files that flows a continuous steam
of content to a user’s device without being stored locally on the device.
Market Creators: build a digital environment in which buyers and sellers can meet,
display products, search for products and establish prices
Community Providers: are sites that create a digital online environment where people
with similar interests can transact (buy and sell goods); share interests, photos, videos,;
communicate with like-minded people; receive interest-related information; and even play
out fantasies by adopting personalities called avatars.
Revenue Model: describes how the firm will earn revenue, generate profits, and produce a
superior return on investment.
Free/Freemium Revenue Model : firms offer basic services or content for free while
charging a premium for advanced or special features.
Transaction Fee Revenue Model: a company receives a fee for enabling or executing a
transaction (ebay makes money when people buy something on from someone else on
ebay)
Affiliate revenue Model: web(called affiliate web sites) sites send visitors to other
websites in return for a referral fee or percentage of the revenue from any resulting sales
Social Shopping: sites like Pinterest, Kaboodle, ThisNext, allow you to swap shopping
ideas with friends
Wisdom Crowds: creating sites where thousands, or millions of people can interact offers
businesses new ways to market and advertise to discover who likes or hates their products
Crowd Sourcing: firms can be actively helped in solving some business problems using
this method, a form of soliciting advice from the external environment
Social Graph: a mapping of all significant online social relationships. Synonymous with the
idea of a social network
Private Industrial Networks: aka private exchange: typically consist of a large firm using
a secure Web site to link to its suppliers and other key business partners. The network is
owned by the buyer, and it permits the firm and designated supplier, distributors, and
other business partners to share product design and development, marketing, production
scheduling, inventory management, and unstructured communication, including graphics
and email
Net Marketplace: sometimes called e-hubs, provider a single digital marketplace based on
Internet technology for many different buyers and sellers. They are industry owned or
operate as independent intermediaries between buyers and sellers> Generate revenues
from purchase and sale transactions and other services provided to clients
Direct Goods: goods used in production process, such as sheet metal for auto body
production
Indirect goods: are all other goods not directly involved in the production process, such as
office supplies or products for maintenance and repair
Exchanges: are independently owned third party net marketplaces that connect thousands
of supplies and buyers for spot purchasing
Geosocial Service: can tell you where your friends are meeting
Geoadvertising: can tell you where to find the nearest Italian restaurant
Geoinformation Services: tell you the price of a house that you are looking at or about
special exhibits at a museum you are passing
Co-Location Agreement: your firm purchases or leases a web server (and has total control
over its operation) but locates the server in a vendor’s physical facility