ITM100 extra notes
ITM100 extra notes
ITM100 extra notes
Chapter 6
Components:
Steps:
Business Value:
Supply Chain: Network of organizations and processes to procure, transform, and distribute
products.
Upstream: Refers to the activities, processes, and entities involved before the product
reaches the company.
Downstream: Refers to the activities, processes, and entities involved after the product
leaves the company.
● Includes distribution, delivery, and reaching the end consumer.The same shoe
company’s downstream includes warehouses, retail stores, and customers.
Challenges:
Strategies: Just-in-Time: Deliver components as needed and Safety Stock: Buffer for
supply chain inflexibility.
1. Planning Systems:
○ Demand forecasting, sourcing, inventory optimization.
2. Execution Systems:
○ Manage product flows through warehouses and distribution.
Business Value:
Customer Relationship Management (CRM): Systems that centralize and manage customer data
across an organization.
● Features:
○ Integrates customer data from all departments.
○ Provides a single enterprise view of customers.
1. Sales Force Automation (SFA): Tracks prospects, contacts, and generates sales
quotes.
2. Customer Service: Manages service requests and provides web-based self-service.
3. Marketing: Tracks campaigns, cross-sells, and collects customer data.
CRM Types:
1. Operational CRM:
○ Customer-facing processes like sales, service, and marketing automation.
2. Analytical CRM:
○ Uses data warehouses, OLAP, and data mining for analysis.
Business Value:
1. Enterprise Suites:
○ Web-enabled, flexible, integrated across platforms.
○ Cloud-based versions for mobile platforms and small businesses.
2. Social CRM:
○ Monitors social media activity, manages campaigns, and uses analytics.
3. Business Intelligence (BI):
○ Includes reporting, dashboards, AI, and machine learning for insights.
Chapter 7
Involves:
The Internet
● The largest client/server network.
● Packet Switching:
Breaks data into smaller packets sent independently across the network and
reassembled at the destination.
● TCP/IP Protocol Suite:
○ Protocols: Rules for transmitting information.
○ Four Layers:
1. Application
2. Transport
3. Internet
4. Network Interface
Communications Networks
● Physical Media: Fiber optics, twisted pair wires (CAT5), coaxial cable.
● Wireless Media: Satellites, cellular systems.
● Bandwidth: Difference between highest and lowest transmittable frequencies.
● Pattern: 1010010101
● Transmission Time: 10 ms
Radio Frequency Identification (RFID): Tiny tags with microchips transmit radio
signals.
● Common Uses:
○ Automated toll collection
○ Supply chain tracking
● Cost reduction in tags makes RFID feasible for widespread adoption.
Chapter 8
Digital Goods
● Statistics:
○ U.S. B2B trade (2020): $14.5 trillion.
○ U.S. B2B e-commerce: $6.7 trillion.
● Technologies:
○ Electronic Data Interchange (EDI): Standardized computer-to-computer
transactions.
○ Private Industrial Networks: Secure web links for partners.
○ Net Marketplaces (E-hubs): Unified buyer-seller platforms.
Chapter 9
Vulnerabilities in Systems
1. Hardware Issues:
○ Failures, misconfigurations, or criminal tampering.
2. Software Issues:
○ Bugs, unauthorized modifications, or installation errors.
3. Physical Threats:
○ Damage to infrastructure from accidents or malicious acts.
4. Internet and Wireless Weaknesses:
○ Common methods of exploitation:
■ Sniffing, spoofing, war-driving.
○ Challenges:
■ Eavesdropping on unsecured VOIP or P2P communications.
5. Internal Threats:
○ Employee negligence, poor security practices, and insider knowledge.
1. Malicious Software (Malware):
○ Includes viruses, worms, trojans, and spyware.
○ Often delivered through email attachments, web downloads, or infected
media.
2. SQL Injection Attacks:
○ Exploit web form vulnerabilities to manipulate databases.
3. Denial of Service (DoS) and Distributed DoS (DDoS):
○ Overwhelm servers to disrupt operations.
4. Identity Theft & Social Engineering:
○ Tactics like phishing, pharming, or tricking employees into sharing sensitive
information.
1. Authentication:
○ Passwords, biometrics, tokens, and two-factor authentication.
2. Encryption:
○ Use ciphers and keys to ensure secure communication.
3. Firewalls and Intrusion Detection Systems:
○ Prevent unauthorized access and monitor suspicious activity.
4. Antivirus and Antispyware Software:
○ Regular updates are critical for staying protected.
5. Identity Management Systems:
○ Automate and streamline user authentication and access control.
1. Create strong, unique passwords with a mix of uppercase/lowercase letters,
numbers, and symbols.
2. Avoid using personal details or common words.
3. Update passwords and avoid reusing them across platforms.
1. Proactive Measures: Conduct regular system audits, vulnerability scans, and
employee training.
2. Continuous Updates: Apply software patches promptly and use updated antivirus
tools.
3. Incident Response Plan: Have a clear strategy for managing breaches to minimize
damage.
Chapter 10
Chapter 11
● Four Strategies:
1. Low-Cost Leadership:
■ Achieve cost efficiency using technology.
■ Example: Walmart’s efficient inventory system.
2. Product Differentiation:
■ Use IT to create unique products or enhance customer experience.
■ Example: Nike using design software for customized shoes.
3. Focus on Market Niche:
■ Use IT to target specialized markets.
■ Example: Hilton’s OnQ system for customer preferences.
4. Strengthening Customer and Supplier Intimacy:
■ Enhance loyalty and reduce switching costs.
■ Example: Amazon’s personalized recommendations.
● Threats:
○ Low barriers for new entrants.
○ Intensified rivalry due to universal standards.
● Opportunities:
○ Build global brands and loyal customer bases.
○ Enhance customer engagement using interactive platforms.
5. Business Value Chain Model: Framework to analyze a firm’s activities for value
creation.
Internet Trends
● IPv6: New IP addressing scheme.
● Internet2: High-speed testing network.
● Web Generations:
○ Web 2.0: Real-time interaction, social content.
○ Web 3.0: IoT, mobile connectivity, intelligent tools.
● Search Engines:
○ Semantic Search: Predicts user intent.
○ Shopping Bots: Compare prices, negotiate
Chapter 12
● Big Data refers to large datasets analyzed to reveal patterns, trends, and
associations, especially relating to human behavior.
● Challenges:
○ Predictive policing and insurance rates pose ethical concerns.
○ Lack of legal frameworks complicates responsible data usage.
● Solutions:
○ Develop privacy policies, strategies, and tools for predictive modeling and
analytics.
● Ethics: Principles of right and wrong guiding individuals' behaviors as free moral
agents.
● Key Issues:
○ Technological advances challenge traditional power, rights, and obligations.
○ New crimes emerge, such as data theft and identity fraud.
○ Cookies: Small files identifying users and tracking their website visits.
○ Spyware: Software installed without consent to monitor users.
● Ethical Concerns:
○ Tracking mobile devices without user consent.
○ Behavioral targeting by organizations like Google.
● Privacy: The right to control information about oneself and be free from surveillance.
● Models of Consent:
○ Opt-out: Allows collection unless explicitly declined.
○ Opt-in: Requires user consent for data collection.
● Fair Information Practices:
○ Guidelines for transparency, consent, security, and enforcement in data
collection.
● Protection Methods:
○ Trade Secrets: Confidential business information.
○ Copyright: Protects creators for their lifetime + 70 years.
○ Patents: Grants 20 years of monopoly over inventions.
● System Quality: Flawless software is not feasible; bugs, hardware failures, and poor
data are common issues.
● Liability: Determines responsibility for harm caused by system errors (e.g., software
failures).
● Negative Impacts:
○ Dependency on technology/ Loss of personal boundaries between work,
family, and leisure.
● Health Risks:
○ RSI (Repetitive Stress Injury): Physical strain from repetitive motions.
○ CTS (Carpal Tunnel Syndrome): Nerve damage in wrists.
○ Technostress: Psychological stress from technology use.