0% found this document useful (0 votes)
4 views16 pages

ITM100 extra notes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 16

1. What is the primary purpose of an information system?

A. Replace manual tasks


B. Process and manage data for decision-making
C. Ensure security of data
D. Increase software sales
Answer: B
2. Which of the following is NOT a strategic business objective of information
systems?
A. Operational excellence
B. Creating new products
C. Increasing manual processes
D. Enhancing customer intimacy
Answer: C
3. What is an example of a digital firm?
A. A company that only operates in physical stores
B. A company that uses IT for core processes like customer service
C. A company with no online presence
D. A company that doesn’t rely on data
Answer: B
4. Which system supports routine operations like payroll processing?
A. Decision Support System
B. Transaction Processing System
C. Executive Support System
D. Knowledge Management System
Answer: B
5. What is a benefit of collaboration tools like Slack?
A. Slower decision-making
B. Increased miscommunication
C. Improved teamwork and faster decisions
D. Elimination of face-to-face meetings
Answer: C
6. What feature of the internet has enabled global businesses to reduce
operational costs?
A. Inconsistent communication standards
B. Real-time connectivity
C. Restrictive data laws
D. Increased complexity
Answer: B
8. Which of the following is a key moral dimension of the information age?
A. Data redundancy
B. Liability
C. Fast internet speeds
D. Ethical cost analysis
Answer: B
9. What is the main challenge posed by cookies?
A. They crash systems
B. They create unstructured data
C. They track user behavior and pose privacy risks
D. They block website functionality
Answer: C
10. Which is NOT a component of IT infrastructure?
A. Hardware
B. Cloud platforms
C. Marketing strategy
D. Networking
Answer: C
11. What does Moore’s Law predict?
A. Decrease in data storage costs
B. Doubling of computing power every 18 months
C. Increase in internet speed every 10 years
D. Computers will replace humans
Answer: B
12. What is the main advantage of a relational database?
A. Supports unstructured data only
B. Allows easy access and organization of data through relationships
C. Requires less hardware
D. No need for a database administrator
Answer: B
13. Which technology is commonly used for analyzing Big Data?
A. Blockchain
B. Hadoop
C. HTTP
D. JavaScript
Answer: B
14. What is the role of a firewall in networking?
A. Increase internet speed
B. Prevent unauthorized access to a network
C. Compress data for storage
D. Replace encryption
Answer: B
15. Which is a benefit of using RFID technology?
A. Enhanced customer experience through web personalization
B. Real-time tracking of inventory or assets
C. Eliminating the need for database systems
D. Replacing telecommunications
Answer: B
16. What is the primary goal of encryption?
A. Speed up data processing
B. Hide user identities
C. Protect data by converting it into unreadable formats
D. Enhance software functionality
Answer: C
17. What is a common internal security threat?
A. Hackers
B. Phishing attacks
C. Careless employees
D. Spyware
Answer: C
18. Which term refers to malicious software designed to disrupt or damage
systems?
A. Firewall
B. Virus
C. Proxy
D. Encryption
Answer: B
19. What is the main goal of an Enterprise Resource Planning (ERP) system?
A. Manage customer relationships
B. Integrate all business processes into a single system
C. Focus only on financial data management
D. Perform market analysis
Answer: B
20. What is a key benefit of a Supply Chain Management (SCM) system?
A. Reduces inventory levels through just-in-time strategies
B. Focuses on customer satisfaction
C. Enhances employee engagement
D. Provides advanced encryption tools
Answer: A
21. What does a Customer Relationship Management (CRM) system do?
A. Integrates supply chain logistics
B. Automates customer service, sales, and marketing
C. Optimizes manufacturing processes
D. Manages financial records
Answer: B
22. What makes e-commerce unique compared to traditional commerce?
A. It relies entirely on face-to-face interactions
B. It uses digital technologies for transactions
C. It is limited to local markets
D. It only sells physical goods
Answer: B
23. What is an example of a pull-based supply chain model in e-commerce?
A. Producing based on forecasts
B. Producing after receiving customer orders
C. Stocking goods in warehouses ahead of time
D. Manufacturing without considering demand
Answer: B
25. What is an example of Artificial Intelligence in business?
A. Manual payroll processing
B. Predictive analytics for customer behavior
C. Filing physical documents
D. Creating traditional advertisements
Answer: B
26. What is a neural network designed to do?
A. Mimic human brain functions for pattern recognition
B. Store data in a centralized location
C. Transmit data securely
D. Replace cloud storage
Answer: A
28. What is an example of an unstructured decision?
A. Processing payroll
B. Deciding on market expansion strategies
C. Monitoring inventory levels
D. Generating monthly reports
Answer: B
29. Which tool is used in business intelligence for data visualization?
A. Tableau
B. SQL
C. Linux
D. Blockchain
Answer: A
30. What does Operational CRM focus on?
A. Analyzing customer data for insights
B. Automating customer-facing processes
C. Managing supply chain logistics
D. Tracking marketing budgets
Answer: B
31. What is the first phase of the Systems Development Life Cycle (SDLC)?
A. Implementation
B. Systems analysis
C. Systems design
D. Maintenance
Answer: B
32. What is Agile development?
A. A method focused on rapid and iterative system delivery
B. A technique for minimizing system risks
C. A process for managing database systems
D. A strategy for hardware upgrades
Answer: A
33. What is the goal of prototyping in system development?
A. Finalizing the entire system design
B. Building a working model to refine system requirements
C. Eliminating user feedback
D. Replacing traditional testing
Answer: B
34. Which is a common reason for project failure?
A. Excessive user involvement
B. Poorly defined project goals
C. Overuse of agile methods
D. Using project management tools
Answer: B
35. What is the purpose of a Gantt chart in project management?
A. Track budget expenses
B. Show project timelines and dependencies
C. Replace risk management tools
D. Analyze system architecture
Answer: B
36. What does risk management in IT projects involve?
A. Ignoring potential technical problems
B. Identifying and mitigating factors that could impact project success
C. Only focusing on financial risks
D. Avoiding change management strategies
Answer: B
37. What is a key challenge of managing global systems?
A. Low hardware costs
B. Language and cultural differences
C. Limited access to the internet
D. Excessive standardization
Answer: B
38. What does software localization involve?
A. Translating software into multiple languages
B. Centralizing databases
C. Upgrading hardware globally
D. Building global marketing strategies
Answer: A

Chapter 6

Enterprise Systems (ERP Systems): Integrated software modules and a common


central database that support firm-wide business activities.
○ Collects and shares data across divisions.
○ Information entered in one area is available for others.

Components:

1. Finance and accounting


2. Human resources
3. Manufacturing and production
4. Sales and marketing

Steps:

● Select system functions.


● Map business processes to software processes.
● Customize using configuration tables.

Business Value:

● Efficiency: Improves operational processes.


● Information Access: Provides data for decision-making.
● Customer Service: Rapid responses to requests.
● Analytics: Evaluate and improve performance.

Supply Chain: Network of organizations and processes to procure, transform, and distribute
products.

Upstream: Refers to the activities, processes, and entities involved before the product
reaches the company.

● Includes sourcing raw materials, suppliers, and initial production inputs.


● E.g: A shoe company’s upstream involves leather suppliers, rubber manufacturers,
and textile providers.

Downstream: Refers to the activities, processes, and entities involved after the product
leaves the company.

● Includes distribution, delivery, and reaching the end consumer.The same shoe
company’s downstream includes warehouses, retail stores, and customers.

Challenges:

● Inefficiencies: Can waste up to 25% of operating costs.


● Bullwhip Effect: Demand information distortion across the supply chain.

Strategies: Just-in-Time: Deliver components as needed and Safety Stock: Buffer for
supply chain inflexibility.

Supply Chain Management (SCM) Software:

1. Planning Systems:
○ Demand forecasting, sourcing, inventory optimization.
2. Execution Systems:
○ Manage product flows through warehouses and distribution.

Global Supply Chains and the Internet:


● Handles complexities like geographical distances and varied standards.
● Tools: Warehouse, transportation, and logistics management.
● Push (Build-to-Stock): Based on demand forecasts.
● Pull (Demand-Driven): Customer orders trigger supply chain activities.

Business Value:

● Matches supply with demand.


● Reduces inventory and delivery times.
● Lowers costs, increases sales.

Customer Relationship Management (CRM): Systems that centralize and manage customer data
across an organization.

● Features:
○ Integrates customer data from all departments.
○ Provides a single enterprise view of customers.

CRM Software Modules:

1. Sales Force Automation (SFA): Tracks prospects, contacts, and generates sales
quotes.
2. Customer Service: Manages service requests and provides web-based self-service.
3. Marketing: Tracks campaigns, cross-sells, and collects customer data.

CRM Types:

1. Operational CRM:
○ Customer-facing processes like sales, service, and marketing automation.
2. Analytical CRM:
○ Uses data warehouses, OLAP, and data mining for analysis.

Business Value:

● Increased customer satisfaction and sales.


● Reduced marketing and customer acquisition costs.
● Helps manage churn rate (customers leaving).

Enterprise Application Challenges

● High Costs: Purchase, implementation, and maintenance.


● Long Development Times: Delays and cost overruns are common.
● Organizational Change: Requires new processes and learning.
● Data Standardization: Needs extensive cleaning and management.

Next-Generation Enterprise Applications

1. Enterprise Suites:
○ Web-enabled, flexible, integrated across platforms.
○ Cloud-based versions for mobile platforms and small businesses.
2. Social CRM:
○ Monitors social media activity, manages campaigns, and uses analytics.
3. Business Intelligence (BI):
○ Includes reporting, dashboards, AI, and machine learning for insights.
Chapter 7

Telecommunications: The transmission of information (words, sounds, images) over long


distances using electromagnetic signals.

Involves:

● Networks (e.g., telephone, TV, computer)

Networking and Communication Trends

● Convergence: Telephone and computer networks merging into a single digital


network using Internet standards.
● Broadband: High-speed Internet; >74% of U.S. users have access.
● Broadband Wireless: Increasing use for voice and data communications.

What Is a Computer Network?

A connection of two or more computers.

Major Components in a Simple Network:

1. Client and server computers


2. Network Interfaces (NICs)
3. Connection medium
4. Network Operating System (NOS)
5. Hubs, switches, routers
6. Software-defined networking (SDN): Centralized management of routers and
switches.

Networks in Large Companies

● Hundreds of Local Area Networks (LANs) connected to a corporate network.


● Components include:
○ Website, intranet, extranet
○ Mobile wireless LANs (Wi-Fi)
○ Videoconferencing systems

Corporate Network Infrastructure:

● Distributed Computing Model: Clients communicate via a server.


● Server provides addresses and communication rules.

The Internet
● The largest client/server network.
● Packet Switching:
Breaks data into smaller packets sent independently across the network and
reassembled at the destination.
● TCP/IP Protocol Suite:
○ Protocols: Rules for transmitting information.
○ Four Layers:
1. Application
2. Transport
3. Internet
4. Network Interface

Communications Networks

● Signals: Digital vs. analog.


● Types of Networks:
○ LAN (Local Area Network)
○ WAN (Wide Area Network)
○ CAN (Campus Area Network)
○ MAN (Metropolitan Area Network)

Transmission Media and Speed:

● Physical Media: Fiber optics, twisted pair wires (CAT5), coaxial cable.
● Wireless Media: Satellites, cellular systems.
● Bandwidth: Difference between highest and lowest transmittable frequencies.

Bitrate Example Calculation:

● Pattern: 1010010101
● Transmission Time: 10 ms

Internet Addressing and Architecture

● IP Address: Unique 32-bit identifier (e.g., 207.46.250.119).


● Domain Name System (DNS): Converts IP addresses to user-friendly domain
names.

Internet Services and Communication Tools

○ E-mail, chatting, VoIP, newsgroups, file transfer (FTP).


○ Voice over IP (VoIP): Digital voice communication via packet switching.
● Virtual Private Network (VPN):
Secure, encrypted private network over the Internet.
● Web 2.0: Focus on interactivity, user-generated content, and social sharing.
● Web 3.0:
○ Internet of Things (IoT): Smart, interconnected devices.
○ Semantic web for better search and data integration.

Wireless Networking Technologies

● Bluetooth: Short-range wireless communication.


● Wi-Fi: High-speed Internet access via hotspots.
● WiMax: Long-range wireless Internet.
● Wireless Sensor Networks (WSNs): Monitor environmental or security data and
contribute to IoT.

Radio Frequency Identification (RFID): Tiny tags with microchips transmit radio
signals.

● Common Uses:
○ Automated toll collection
○ Supply chain tracking
● Cost reduction in tags makes RFID feasible for widespread adoption.
Chapter 8

● E commerce- Use of the Internet and web to transact business.


○ Began in 1995, grew exponentially, remained stable even during recessions.
○ Transitioned from desktops to mobile with the rise of smartphones.
○ By 2018:
■ Online consumer sales > $700 billion.
■ 223M Americans accessed the Internet via smartphones.
○ B2B e-commerce exceeded $7 trillion.
1. Ubiquity: Accessible anywhere, anytime.
2. Global Reach: Crosses cultural and national boundaries.
3. Universal Standards: One set of Internet technology standards.
4. Richness: Supports multimedia communication.
5. Interactivity: Real-time engagement (e.g., chat support).
6. Information Density: Increases quality and availability of information.
7. Personalization/Customization: Tailored messaging and products.
8. Social Technology: User-generated content (e.g., YouTube).
● Reduced Information Asymmetry: Equal access to information for buyers and
sellers.
● Lower Costs:
○ Menu costs: Easier price adjustments.
○ Search costs: Simplified product discovery.
○ Transaction costs: Streamlined participation in markets.
● Dynamic Pricing: Flexible, real-time price adjustments.
● Disintermediation: Direct transactions between producers and consumers,
bypassing intermediaries.

Digital Goods

● Definition: Goods delivered via digital networks.


● Characteristics:
○ High initial production cost; low delivery cost.
○ Pricing is highly variable.
○ Examples: E-books, music, software.
1. B2C (Business-to-Consumer): Amazon, Dell.
2. B2B (Business-to-Business): IBM, GE.
3. C2C (Consumer-to-Consumer): eBay, Kijiji.

E-commerce Business Models

1. Portal: Gateway for information (Google).


2. E-tailer: Online retail (Amazon).
3. Content Provider: Information and media (YouTube).
4. Transaction Broker: Simplifies transactions (Expedia).
5. Market Creator: Platforms for buyers/sellers (eBay).
6. Service Provider: Services (Dropbox).
7. Community Provider: Social networks (Facebook).
● Revenue Models:
1. Advertising: Google ads.
2. Sales: Amazon.
3. Subscription: Netflix.
4. Freemium: Spotify.
5. Transaction Fee: PayPal.
6. Affiliate: Commissions via referrals.
● Tools:
○ Behavioral targeting (online activity tracking).
○ Programmatic advertising (automated ad purchasing).
○ Native advertising (embedded, non-intrusive).
● Social E-commerce:
○ Leverages influence within social networks.
○ Platforms like Facebook's "Like" button, Pinterest.
● Crowdsourcing: Wisdom of crowds for better decision-making.

Impact on B2B Transactions

● Statistics:
○ U.S. B2B trade (2020): $14.5 trillion.
○ U.S. B2B e-commerce: $6.7 trillion.
● Technologies:
○ Electronic Data Interchange (EDI): Standardized computer-to-computer
transactions.
○ Private Industrial Networks: Secure web links for partners.
○ Net Marketplaces (E-hubs): Unified buyer-seller platforms.

M-commerce (Mobile Commerce)

● Growth: Fastest-growing segment; 45% of all e-commerce (2020).


● Applications:
○ Retail (Amazon, eBay).
○ Digital content (music, video).
○ In-app sales.
● Location-based Services:
○ Geosocial (friends nearby).
○ Geoadvertising (nearby shops).
○ Geoinformation (local data like home prices).
1. Key Challenges:
○ Understanding business objectives.
○ Choosing appropriate technology.
2. E-commerce Presence Map:
○ Four channels: Websites, email, social media, offline media.
3. Timeline:
○ Break project into phases (milestones for development and execution).

Chapter 9

1. TJX Security Breach (2006):


○ Impact: 94 million customers affected, with losses exceeding $400 million.
○ Method: War-driving, packet sniffing, and exploiting weak wireless networks.
○ Key Lesson: Wireless networks require robust security protocols and
continuous monitoring to prevent unauthorized access.
2. Heartland Payment Systems Breach (2008):
○ Impact: 134 million credit cards exposed.
○ Method: SQL injection vulnerability.
○ Key Lesson: Address well-known vulnerabilities proactively, such as those
related to SQL injections, to minimize exposure.

Vulnerabilities in Systems

1. Hardware Issues:
○ Failures, misconfigurations, or criminal tampering.
2. Software Issues:
○ Bugs, unauthorized modifications, or installation errors.
3. Physical Threats:
○ Damage to infrastructure from accidents or malicious acts.
4. Internet and Wireless Weaknesses:
○ Common methods of exploitation:
■ Sniffing, spoofing, war-driving.
○ Challenges:
■ Eavesdropping on unsecured VOIP or P2P communications.
5. Internal Threats:
○ Employee negligence, poor security practices, and insider knowledge.
1. Malicious Software (Malware):
○ Includes viruses, worms, trojans, and spyware.
○ Often delivered through email attachments, web downloads, or infected
media.
2. SQL Injection Attacks:
○ Exploit web form vulnerabilities to manipulate databases.
3. Denial of Service (DoS) and Distributed DoS (DDoS):
○ Overwhelm servers to disrupt operations.
4. Identity Theft & Social Engineering:
○ Tactics like phishing, pharming, or tricking employees into sharing sensitive
information.

Security Strategies and Technologies

1. Authentication:
○ Passwords, biometrics, tokens, and two-factor authentication.
2. Encryption:
○ Use ciphers and keys to ensure secure communication.
3. Firewalls and Intrusion Detection Systems:
○ Prevent unauthorized access and monitor suspicious activity.
4. Antivirus and Antispyware Software:
○ Regular updates are critical for staying protected.
5. Identity Management Systems:
○ Automate and streamline user authentication and access control.
1. Create strong, unique passwords with a mix of uppercase/lowercase letters,
numbers, and symbols.
2. Avoid using personal details or common words.
3. Update passwords and avoid reusing them across platforms.
1. Proactive Measures: Conduct regular system audits, vulnerability scans, and
employee training.
2. Continuous Updates: Apply software patches promptly and use updated antivirus
tools.
3. Incident Response Plan: Have a clear strategy for managing breaches to minimize
damage.

Chapter 10

1. TJX Co. Breach (2006)


○ Impact: Affected 94 million customers.
○ Hacker: Albert Gonzalez sentenced to 20 years (2010).
○ Financial Loss: Potential loss exceeded $400 million (calculated at
$500/card).
○ Methods:
■ War driving: Explored poorly protected wireless networks.
■ Packet Sniffer: Installed to capture real-time transaction data.
■ Stolen data: 43.8 million card numbers found on servers in Latvia and
Ukraine.
2. Heartland Payment Systems (2008)
○ Impact: 134 million credit cards exposed.
○ Hacker: Gonzalez and Russian accomplices indicted in 2009.
○ Vulnerability: SQL injection flaw, despite security warnings.
1. General Factors:
○ Hardware issues: Breakdowns, configuration errors, and damage.
○ Software issues: Bugs, installation errors, and unauthorized changes.
○ External device misuse: Using networks outside organizational control.
2. Specific Vulnerabilities:
○ Malware: Includes viruses, worms, Trojan horses, and spyware.
○ Internet Risks: Open networks, fixed IP addresses, and unencrypted
communication.
○ Wireless Risks:
■ War driving: Hackers exploit service set identifiers (SSIDs).
■ Intruders gain access to networked drives.
3. Internal Threats:
○ Employees’ inside knowledge and poor security habits.
○ Social Engineering: Tricking employees into divulging sensitive information.
1. Malicious Software (Malware):
○ Viruses: Attach to other programs, deliver payloads, and replicate.
○ Worms: Self-replicating over networks without needing a host.
○ Trojan Horses: Appear benign but deliver malicious payloads.
○ SQL Injection: Manipulates databases using rogue queries.
○ Spyware: Tracks user activities, logs keystrokes, or redirects search results.
2. Hacking Techniques:
○ Spoofing: Pretending to be someone else to gain access.
○ Sniffing: Monitoring network traffic to steal sensitive data.
○ DoS/DDoS Attacks: Overloading servers to crash systems (botnets amplify
these).
3. Identity Theft Methods:
○ Phishing: Fake websites/emails to obtain sensitive data.
○ Pharming: Redirecting users to fraudulent websites.
4. Advanced Threats:
○ Backdoors: Hidden access points for unauthorized users.
○ Cyberterrorism: System exploitation for political or terroristic aims.
1. Preventing Unauthorized Access:
○ Strong password policies: Complex, unique, and secure storage.
○ Two-factor authentication (e.g., biometric + password).
○ Use of firewalls and intrusion detection systems.
2. Software Protections:
○ Antivirus/Antispyware: Continually updated to address new malware.
○ Patches: Repair flaws but may lag behind exploit development.
3. Encryption (Cryptography):
○ Converts plaintext to ciphertext.
○ Public-Key Cryptography:
■ Two keys: Public (freely shared) and Private (kept secret).
■ Sender encrypts data with recipient's public key; only the recipient can
decrypt it.
4. Wireless Network Security:
○ Use WPA2 instead of outdated WEP encryption.
○ Virtual Private Networks (VPNs) for additional security layers.
5. Cloud Security:
○ Ensure data segregation, legal compliance, and provider audits.
○ Establish strong Service Level Agreements (SLAs).
1. Risk Assessment:
○ Evaluate threats based on:
■ Probability of occurrence.
■ Potential loss range.
○ Aim to minimize vulnerabilities with highest risks.
Disaster Recovery & Business Continuity Plans:
○ Identify critical systems and prioritize their restoration.
○ Conduct business impact analysis to gauge outage effects.

Auditing and Controls


1. Security Audits:
○ Examine technologies, procedures, and responses.
○ Identify weaknesses and their financial impact.
2. Information Systems Controls:
○ General Controls: Secure data files, computer operations, and administrative
policies.
○ Application Controls: Input, processing, and output mechanisms unique to
applications.
3. Security Policy:
○ Drives acceptable use policy (AUP) and identity management.
○ Establishes risk rankings and goals.

CIA Triad of Information Security

1. Confidentiality: Prevent unauthorized data access.


2. Integrity: Protect data from unauthorized modification.
3. Availability: Ensure legitimate access for authorized users.

Chapter 11

● Definition: A framework to analyze an industry’s competitive forces and determine


profitability.
● Five Forces:
1. Traditional Competitors: Existing firms compete by innovating and
improving efficiency.
2. New Market Entrants: Firms entering with newer technologies, lower costs,
and no brand recognition.
3. Substitute Products: Alternative solutions that may replace existing
products, e.g., iTunes for CDs.
4. Customers: Influence based on their ability to switch or demand lower prices.
5. Suppliers: Power to affect input costs if resources are limited or specialized.

2. Information System Strategies for Competitive Forces

● Four Strategies:
1. Low-Cost Leadership:
■ Achieve cost efficiency using technology.
■ Example: Walmart’s efficient inventory system.
2. Product Differentiation:
■ Use IT to create unique products or enhance customer experience.
■ Example: Nike using design software for customized shoes.
3. Focus on Market Niche:
■ Use IT to target specialized markets.
■ Example: Hilton’s OnQ system for customer preferences.
4. Strengthening Customer and Supplier Intimacy:
■ Enhance loyalty and reduce switching costs.
■ Example: Amazon’s personalized recommendations.

3. Internet’s Impact on Competitive Advantage

● Threats:
○ Low barriers for new entrants.
○ Intensified rivalry due to universal standards.
● Opportunities:
○ Build global brands and loyal customer bases.
○ Enhance customer engagement using interactive platforms.

4. Smart Products and Internet of Things (IoT)

● Definition: Devices integrated with sensors and connectivity to enhance


functionality.
● Examples:
○ Fitness trackers, smart appliances.
● Strategic Benefits:
○ Differentiate products/ Increase switching costs and customer dependence.

5. Business Value Chain Model: Framework to analyze a firm’s activities for value
creation.

1. Primary Activities: Directly contribute to creating a product/service (e.g.,


manufacturing).
2. Support Activities: Enable primary activities (e.g., HR, technology).
● Value Web: Interconnected value chains of multiple firms, driven by IT.
● Definitions:
○ Network Economics: Value grows with community size, e.g., Facebook.
○ Virtual Company Model: Alliances formed using networks for shared
production, e.g., Li & Fung.
○ Business Ecosystems: Industry collaborations providing complementary
products/services, e.g., Microsoft.

7. Challenges of Strategic Information Systems

● Sustaining Competitive Advantage:


○ Innovations can be copied by competitors.
● Alignment with Business Objectives:
○ Requires thorough industry analysis and integration with firm goals.
● Mobile Digital Platform: Smartphones, tablets, netbooks, e-book readers, wearable
devices.
● Wearable Devices: Revolutionize fitness, healthcare, and infotainment.
● Consumerization of IT & BYOD:
○ Tech spreads from consumer markets to businesses.
○ BYOD challenges IT to manage equipment/services.
● Virtualization:
○ Enables single resources to act as multiple.
○ Reduces costs and centralizes hardware.
● Cloud Computing:
○ Remote data processing with pay-per-use model.
○ IaaS: Infrastructure for running info systems.
○ PaaS: Tools for app development.
○ SaaS: Cloud-hosted apps (e.g., Google Apps).
○ Concerns: Security, availability, dependency on providers.
● Green Computing: Energy-efficient practices for IT hardware.
● Quantum Computing: Processes data as 0, 1, or both; speeds up complex problem-
solving.

Software Platform Trends


● Open Source Software: Free, user-modifiable software (e.g., Linux).
● Web Development:
○ HTML: Defines web page structure.
○ CSS: Styles HTML content.
○ HTML5: Latest web standard.
○ XML: Describes document meaning.
○ XSL: Transforms XML for output.
● Apps: Small programs delivered via the Internet.
● Mashups: Combine apps (e.g., Google Maps + local data).
● Service-Oriented Architecture (SOA): Self-contained services creating
applications.

Internet Trends
● IPv6: New IP addressing scheme.
● Internet2: High-speed testing network.
● Web Generations:
○ Web 2.0: Real-time interaction, social content.
○ Web 3.0: IoT, mobile connectivity, intelligent tools.
● Search Engines:
○ Semantic Search: Predicts user intent.
○ Shopping Bots: Compare prices, negotiate

Chapter 12
● Big Data refers to large datasets analyzed to reveal patterns, trends, and
associations, especially relating to human behavior.
● Challenges:
○ Predictive policing and insurance rates pose ethical concerns.
○ Lack of legal frameworks complicates responsible data usage.
● Solutions:
○ Develop privacy policies, strategies, and tools for predictive modeling and
analytics.
● Ethics: Principles of right and wrong guiding individuals' behaviors as free moral
agents.
● Key Issues:
○ Technological advances challenge traditional power, rights, and obligations.
○ New crimes emerge, such as data theft and identity fraud.

3. Technology Trends Raising Ethical Issues

○ Cookies: Small files identifying users and tracking their website visits.
○ Spyware: Software installed without consent to monitor users.
● Ethical Concerns:
○ Tracking mobile devices without user consent.
○ Behavioral targeting by organizations like Google.

4. Privacy and Information Rights

● Privacy: The right to control information about oneself and be free from surveillance.
● Models of Consent:
○ Opt-out: Allows collection unless explicitly declined.
○ Opt-in: Requires user consent for data collection.
● Fair Information Practices:
○ Guidelines for transparency, consent, security, and enforcement in data
collection.

5. Advances in Data Analysis

● Profiling: Combining data to create detailed individual profiles.


● NORA (Nonobvious Relationship Awareness):
○ Identifies hidden relationships, aiding in criminal and terrorist identification.
1. Golden Rule: Treat others as you want to be treated.
2. Utilitarian Principle: Maximize benefits, minimize harm.
3. No Free Lunch Rule: Assume all resources are owned unless stated
otherwise.
● Ethical Analysis Process:
1. Describe the facts.
2. Define the conflict and values involved.
3. Identify stakeholders.
4. Explore reasonable options.
5. Assess consequences.

7. Intellectual Property Rights: Rights protecting creations of the mind, such as


inventions, designs, and works.

● Protection Methods:
○ Trade Secrets: Confidential business information.
○ Copyright: Protects creators for their lifetime + 70 years.
○ Patents: Grants 20 years of monopoly over inventions.
● System Quality: Flawless software is not feasible; bugs, hardware failures, and poor
data are common issues.
● Liability: Determines responsibility for harm caused by system errors (e.g., software
failures).

9. Quality of Life Issues

● Negative Impacts:
○ Dependency on technology/ Loss of personal boundaries between work,
family, and leisure.
● Health Risks:
○ RSI (Repetitive Stress Injury): Physical strain from repetitive motions.
○ CTS (Carpal Tunnel Syndrome): Nerve damage in wrists.
○ Technostress: Psychological stress from technology use.

You might also like