click below
click below
Normal Size Small Size show me how
MSYS121
Test 2
| Question | Answer |
|---|---|
| What does ICT stand for? | Information and Computing Technology |
| What are the three converging areas of ICT in ubiquitous technology? | Computing devices, Communications, and User Interfaces |
| What computing devices are being used for ubiquitous computing? | Many different forms and sizes, from handheld units to nearly invisible devices set into objects such as appliances, furniture and clothing |
| What specific aspect of user interfaces are being developed for ubiquitous computing? | So that they can sense information about users and the environment and supply this in various forms to the user |
| What are some of the future uses of UC? | Monitoring of pets, houseplants, appliances, books, bicycles, etc |
| What is 'pervasive computing'? | The trend towards increasingly ubiquitous connected computing devices in the environment |
| What is bringing about the trend for pervasive computing? | Advanced electronics, wireless technologies and the Internet |
| What does pervasive computing do? | It spreads intelligence and connectivity to more or less everything |
| What are the four principles of pervasive computing? | Decentralization, diversification, connectivity and simplicity |
| What is 'context-aware computing? | Application’s ability to detect and react to a set of environmental variables that is described as context |
| What are some uses of pervasive computing in homes? | Controlling lighting, energy management, water, security and communication, entertainment, smart appliance |
| What is RFID? | A short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers |
| What is a sensor network? | A collection of nodes capable of environmental sensing, local computation, and communication with its peers or with other higher performance nodes |
| A short-range radio frequency communication technology for remotely storing and retrieving data using devices called RFID tags and RFID readers is called what? | RFID technology |
| What is INRIX? | A traffic application that shows users the volume of traffic on roads around them |
| What is a 'mainframe'? | Where many people share a computer |
| What is the common device:person ratio of UC? | One person, many computers |
| What are some applications available through UC for people to use? | Cars will use the Internet to find an open parking space, or the nearest vegetarian restaurant for their owners, remote computers will monitor our health statistics, smart clothes etc |
| Smart clothes are composed of what? | Silk organza with copper foil wrapped around horizontal threads |
| What does MEMS stand for? | Micro Electro Mechanical Systems |
| How are MEMS composed? | Integrate items such as sensors, computers, data storage and transmission systems onto a single computer chip |
| What do MEMS do? | They measure a wide range of physical phenomena e.g. acceleration, inertia and vibration |
| What can MEMS be used for? | They can be analytical instruments to measure biological or physical states and can also be active response systems |
| What can bots do? | Can automatically sort data based on set preferences, keep track of dynamic data, maintain schedules and calendars, and track movement of things and people. |
| How do bots work? | Work together without human initiative or knowledge to automate routine activities |
| What will bots have to do with the internet by 2025? | By 2025 the Internet will have evolved into a bot-coordinated, bot-directed “information grid” that connects billions of devices, nodes, and sensors to each other. |
| Define 'swarm technology' | The network command-and-control system architecture that will understand and manage the collective movements, reactions, and interactions of masses of interconnected items. |
| What do swarms do? | Swarm technology – decentralised arrays of agents or programs interacting with one another and with their surroundings, thus carrying out “intelligent” large-scale behaviour – much like a swarm of bees, school of fish etc. |
| What percentage of the world's population has a mobile phone? | 70% |
| What is m-commerce? | Any e-commerce done in a wireless environment, especially via the Internet |
| M-commerce is a ___________ of e-commerce | Subset |
| How is M-Commerce different from normal EC? | The underlying technology is different as m-commerce is limited to mobile telecommunications networks accessed through wireless devices such as mobile phones, hand-held computers and tablets |
| What are the key attributes associated with m-commerce? | Ubiquity, convenience, interactivity, personalization, and localization |
| What are the key drivers of m-commerce? | Widespread availability, handset culture, the service economy, vendors push, mobile workforce, mobility, price and performance, increasing bandwidth |
| What are the benefits of m-commerce for organizations? | Increased sales – order from anywhere, anytime Location-based commerce Additional channel for advertising Better productivity and time utilization for employees |
| What are the benefits of m-commerce for individuals? | Internet commerce – anywhere, anytime Choice of mobile devices for same transactions Expedites communications More affordable than desktops or laptops |
| Ubiquity, localization, personalization, convenience and interactivity are all attributes of what? | m-commerce |
| What are the three most important drivers of m-commerce? | Bandwidth, availability, price & performance |
| What are the downsides to m-commerce for individuals? | ⁃ Health ⁃ Less face-to-face interaction - bad social skills ⁃ Those without a mobile device (digital divide) ⁃ Advertising and spam ⁃ Addictions ⁃ Privacy breaches |
| What are the downsides to m-commerce for organizations? | ⁃ Expectation -> Cost ⁃ Disintermediation (i.e. bank teller) ⁃ Small Businesses - used to try on products ⁃ Change in shopping habits |
| What are some common mobile devices? | Smartphone, tablet, PDA, camera, laptop, etc |
| What are five examples of microbrowsers? | Android, iOS, Symbian, Microsoft, Palm |
| What does OS stand for? | Operating system |
| What is 'bluetooth'? | A chip technology and WPAN standard that enables voice and data communications between wireless devices over short-wave radio frequency |
| Why is it challenging to develop software for mobile devices? | ⁃ Apps must be customized for each devices ⁃ Must adapt to match the requirements of the device ⁃ All software must deal with the technology challenges that are common on most mobile devices |
| What does application middleware do? | Mediates backend with front end/operating system |
| What is a microbrowser? | A wireless web app |
| What is a native app? | An app you download |
| WHAT ARE SOME ADVANTAGES AND DISADVANTAGES OF NATIVE APPS? | Native: Downloaded… takes up memory… easier to use… doesn’t require zooming in… some restriction of content… easier to log in i.e. FaceBook and IB |
| What does SMS stand for? | Short message service |
| What does MMS stand for? | Multimedia Message Service |
| What does EMS do that is different from SMS? | Has small provider allowing formatting [italics, bold, underline] |
| What are four types of wireless transition media in MC infrastructure? | ⁃ Microwave ⁃ Satellites ⁃ Radio ⁃ Infrared ⁃ Cellular radio technology |
| What is a type of wireless system in MC infrastructure? | ⁃ Automatic Retailing Refueling System |
| What are personal area networks? | • Device to Device communication over a short distance |
| What is an example of a personal area network? | Bluetooth |
| What are some attributes of Bluetooth? | ⁃ Works for up to 20m ⁃ 2.45GHz radio spectrum (similar to baby monitors garage door opener, etc.) ⁃ Doesn’t require a line of sight (unlike infrared) ⁃ Can connect up to eight devices simultaneously |
| What is a problem with personal area networks? | ⁃ Interference and security can be an issue |
| What are Wireless Local Area Networks (WLAN) and WIFI? | Shortrange connections to the internet or other networks (wireless fidelity is the most common standard) |
| Wha happens at a wireless access point? | ⁃ An antenae connects to a mobile device to a wired LAN |
| What IS a wireless hotspot? | ⁃ An area or point where a wireless device can make a connection to a wireless LAN (using WiFi) |
| What are some problems with WIFI? | ⁃ Neighborhood wifi interference ⁃ Household electronics ⁃ Humans (70% water… duh) ⁃ Building materials |
| How do Wireless Wide Area Networks (WWAN) function? | Over a cellular network |
| How many primary generations of WWAN communication bandwidths? | Four (1G, 2G, 3G, 4G) |
| WHAT ARE SOME MOBILE FINANCIAL APPLICATIONS? | • Mobile banking ⁃ Mobile access to finical and account information ⁃ Ability to access funds etc • Electronic payment system • Wireless Bill Payments • Wireless Shopping • Mobile and Targeted advertising |
| What are some m-commerce applications that the University of Waikato could use to assist its patrons? | ⁃ Mobile Library Chat - like the online one but mobile ⁃ Improve online enrollments ⁃ Mobile app for MyWeb ⁃ Assignment Reminders ⁃ Timetable ⁃ E-Bookstore - secondhand bookstore ⁃ Database - car park locator |
| What is the most common type of WIFI? | 802.11b |
| What is wifi technically know as? | IEEE 8.02.1 |
| The delivery of m-commerce transactions to individuals in a specific location, at a specific time is called what? | Location-based m-commerce |
| What are the five key factors to l-commerce? | Navigation, timing, mapping, tracking, location |
| What does the location factor do in l-commerce? | Determines the basic position of a person or thing |
| What does the navigation factor do in l-commerce? | Plots a route from one location to another |
| What does the tracking factor do in l-commerce? | Monitoring movement of a person or a thing |
| What does the mapping factor do in l-commerce? | Creates maps of specific geographical locations |
| What does the timing factor do in l-commerce? | Determines the precise time at a specific location |
| What are the five key pieces of infrastructure in location-based m-commerce? | Mobile Devices Communication Network Positioning Component Service or application provider Data or content provider |
| What is geolocation? | The process of automatically identifying a Web user’s physical location without that user having to provide any information |
| What are the two systems for geolocation? | Network-based positioning and terminal based positioning |
| How does network-based positioning work for geolocation? | Relies on base stations to find the location of a mobile device sending a signal or sensed by the network |
| How does terminal-based positioning work for geolocation? | Calculates the location of a mobile device from signals sent by the device to base stations |
| What does GPS allow users to do? | Enable users to determine exact positions anywhere in the world, based on a world wide tracking system |
| What does GIS stand for? | Geographical information system |
| What is a GIS capable of doing? | Integrating, storing, editing, analyzing, sharing and displaying geographically-referenced information. |
| Visualization technology which integrates GPS data into digitized maps is a ...? | GIS |
| What is a location-based service? | Information service available via your mobile device utilizing the ability to use the geographic position of the device to receive information about relevant services. |
| What are five barriers to location-based MC? | Lack of GPS in mobile phones Accuracy of devices The cost–benefit justification Limited network bandwidth Invasion of privacy |
| What are some possible examples of L-based MC? | • Farms - crop rotation info of nearby fields, fertilizing history, content of feed storage, livestock locations, data of the cooling system, etc • TRACKING CHILDREN LOL |
| What are some of the top 10 trends for mobile apps in 2013? | Application security and threats will become important Android fragmentation will be a major challenge Tablets will appear in every home and will need tablet applications The number of active users - more important than the number of downloads... etc |
| What are some examples of location-based services? | ⁃ Recommending social events in a city ⁃ Finding ATM or restaurant ⁃ Providing navigation ⁃ Locating people ⁃ Delivering alerts - sale or traffic jam ⁃ Asset recovery |
| What are three major aspects of social commerce? | • Web 2.0 • Social Networking • Social Commerce |
| Who first proposed Web 2.0? | Darcy diNucci (1999) - is closely associated with Tim O’Reilly |
| What are four important factors of Web 2.0? | • Participation • Wikis • RSS • AJAX |
| what is the difference between Web 1.0 and Web 2.0? | • 1.0: Webmaster is the only contributor • 2.0: Internet surfers contribute as well as view content |
| What does Web 2.0 allow users to do? | 1. tap into collective intelligence of users; 2. new types of data available; 3. web programming tools mean everyone can be a developer; 4. virtual elimination of software-upgrade cycles; 5. social network focus; 6. Users own, but don’t host data... |
| What is a 'beta'? | Test format |
| What are two DIRECT revenue approaches? | Subscriptions and advertising |
| What are five INDIRECT revenue approaches? | • Strategic acquisition • Maintaining control of hard to recreate data sources • Building attention trust • Turning applications into platforms • Fully automated online customer self-service |
| What can users share via social media? | ⁃ Photos ⁃ Music ⁃ Insights ⁃ Perceptions ⁃ Text ⁃ Images ⁃ Audio ⁃ Video clips... |
| Define social media. | The online tools which people use to share opinions and experiences |
| What are the 'social media ground rules'? | • Communication = conversation, not monologue ⁃ Two-way contact • Participants - people not organizations • Honesty and transparency are core values • It about pull not push • Distribution not centralization |
| What is a 'virtual community'? | A group of people with similar interests who interact with each other using the internet |
| What are five classifications of virtual communities? | ⁃ Traders ⁃ Players ⁃ Just friends ⁃ Enthusiasts ⁃ Friends in need |
| What are several types of virtual community? | ⁃ General ⁃ Practice ⁃ Jobs and careers ⁃ Interest ⁃ Sports, animals, etc ⁃ Affinity ⁃ i.e. gays or pregnant women etc ⁃ Sponsored ⁃ i.e. provided by a business to provide info and conversation on their product |
| What are nodes in social networks? | ⁃ The individual actors within networks |
| What are ties in social networks? | ⁃ The relationships between the actors |
| What are benefits of social networking for businesses? | • Low cost • Credibility & trust - connecting with prospects on a personal basis building trust and credibility • Contacts - you might normally not make (friends of friends) |
| What are some risks of social networking? | • Data theft • Viruses • Online predators • Individuals who claim to be someone that they are not • Social impacts |
| What are some ways businesses can implement social networking in their advertising strategy? | • Consumer feedback ⁃ Blogs, wikis online forums, chatrooms, social networking sites, CR • Viral marketing ⁃ Resultant increased web traffic ⁃ Increased sales ⁃ Dishonest techniques |
| What are four social commerce concepts? | • Social Media • Social Marketing • Social Capital • Social Media Marketing (SMM) |
| What does SMM stand for? | Social media marketing |
| What are the benefits of social media marketing to customers? | ⁃ Low prices (e.g. group purchasing) ⁃ faster communication ⁃ Unhappy customers can quickly spread the message ⁃ Relationship building with retailers ⁃ Assist other customers |
| What are the benefits of social media marketing to retailers? | ⁃ Free ⁃ Don’t have to design a website ⁃ Traffic |
| What is social shopping? | “A method of e-commerce where shoppers friends become involved in the shopping experience. Social shopping attempts to mimic the social interactions found in physical malls and stores” |
| Communal shopping is where...? | Others can provide input |
| What are some social shopping models? | • Social recommendations, rating and reviews, comparisons and conversations • Group buying • Deal purchases, daily deals • Shopping communities and clubs • Peer-to-peer models • Location-based shopping • F-Commerce • Shopping with Twitter |
| What is crowd-sourcing? | The act of taking a job traditionally performed by an employee and outsourcing it to an undefined, generally large group of people in the form of an open call |
| What are four factors related to crowdsourcing? | ⁃ Collective intelligence ⁃ Crowd creation ⁃ Crowd voting ⁃ Crowd supporting and funding |
| What are six examples of EC security breaches or irritations? | • Scams • Fraud • Phishing • Cyber bullying • Piracy • Spam |
| What are four drivers of EC security problems? | • The Internet’s vulnerability - encryption • The shift to profit-induced crimes • The internet underground economy (i.e. credit card) • The dynamic nature of EC systems and the role of insiders |
| What factors have contributed to the rise in cyber attacks? | ⁃ Many systems have a weak point ⁃ Security and ease of use are antithetical to one another ⁃ Security takes a back seat to market pressures ⁃ Only as strong as the weakest link ⁃ Common applications - ie Microsoft |
| What are some common mistakes in managing security risks? | ⁃ Undervalued information ⁃ Narrowly defined security boundary ⁃ Reactive security management ⁃ Dated security management process ⁃ Lack of communication about security responsibilities |
| What are three types of EC security threats? | Intentional attacks and crimes, unintentional threats, hackers/crackers/script buddies |
| What do script buddies do? | Download virus and hacking scripts, but generally don't know what they're doing |
| What is a 'cracker'? | A criminal hacker - stealing, damage, take down company/system |
| A hacker ______ do damage. | Doesn't |
| What does authorization do? | ⁃ Checks that person has right to access certain resources |
| What does authentication do? | ⁃ Checks credentials to check identity |
| What collects info about attempts to access resources/privileges/security actions? | An audit |
| When applied to data in EC security, what is integrity? | Protects from alteration/destruction by accident or unauthorized persons |
| What is nonrepudiation? | The ability to limit parties from reputing that a legitimate action did not happen (i.e. trademe buyer claiming product didn’t arrive) |
| What is 'social engineering'? | Preying on weaknesses of people - getting info from people they aren’t allowed to provide |
| What are seven types of biometric controls? | • Fingerprints • Retina scan • Voice recognition • Voice recognition • Signature • Facial recognition • Keystrokes |
| Identity theft normally occurs through ______________ breaches | non-technical |
| Coding of clear text using a mathematical algorithm and a secret key to produce cipher text is called..? | Encryption |
| A cipher text is...? | an unintelligible string of characters |
| A Public key is know to _______ user(s) | all |
| A Private key known to _______ user(s) | one |
| Different keys produce ___________ cipher text when used with the same algorithm | different |
| Private key encryption is _______ secure than public | less |
| Private key encryption is _______________? | symmetric |
| What is a symmetric key? | When the same key used to encrypt and decrypt |
| What is an asymmetric key? | When there are two different, but mathematically related, keys used to encrypt and decrypt |
| Public key encryption is _________________. | asymmetric |
| Actual business ethics have _____________ since 1950’s but our expectations have ____________ | improved / risen |
| What does EPM stand for? | Electronic performance monitoring |
| What is EPM? | Electronic monitoring and recording of employee behavior |
| What is one form of EPM software? | Silent Watch |
| What are reasons for employees to monitor their internet access? | ⁃ Efficiency ⁃ Maintain employee performance ⁃ Concern that company’s resources are being misused for personal activities ⁃ Protect company against legal liability for illegal activities ⁃ Moral habits ⁃ Ensuring company security |
| What are the possible negative effects of EPM on employees? | ⁃ Negative effect on employee morale ⁃ Encouraging negative management styles ⁃ Economic loss ⁃ Maybe unethical if employees are not informed |
| What is privacy? | • The right to be left alone and the right to be free of unreasonable personal intrusions |
| What are two rules regarding privacy that are often used in the US? | ⁃ The right of privacy is not absolute. Privacy must be balanced against the needs of society ⁃ The public’s right to know is superior to the individual’s right to privacy |
| What are two statistic regarding website questionnaires? | ⁃ 50% of people will disclose personal information on website if they have the chance to win something ⁃ 40% falsify details |
| What is 'notice/awareness' in regard to privacy? | (you want to know what will happen to your info after you hit submit button) |
| What is 'choice/consent' in regard to privacy? | (having a button to check, rather than uncheck) |
| What is 'access/participation' in regard to privacy? | you should be able to access all info you have given company |
| What is 'integrity/security' in regard to privacy? | (details you submit should not change) |
| What is 'enforcement/redress' in regard to privacy? | (force company to do what they stated they would do) |
| What governs enforcement/redress in NZ? | The Privacy Act |
| What are three major legal issues in regard to EC | • Many challenges in terms of EC law • Multiple national, state, regional laws • The jurisdiction under which EC falls is not clear |
| What are four issues with jurisdiction in EC? | ⁃ Where is the company based? ⁃ Where the website is hosted? ⁃ Where are customers/suppliers based? ⁃ Where a possible crime might have taken place? |
| What is cybersquatting? | When somebody holds your trademark hostage as a domain name |
| What protects companies against cybersquatting? | Anti-Cybersquatting Consumer Protection Act ⁃ Can sue to get your domain name |
| What is an EC Strategy? | an organization’s strategy for use of e-commerce or e-business |
| What are four common EC strategies? | Click-and-mortar companies that use many EC applications; Click-and-mortar companies that use only one or two applications; Click-and-mortar companies that use one EC application - fundamentally changes all of their business; Pure play EC companies |
| What type of EC business strategy does Kmart have? | Strategy 2: Click-and-mortar companies that use only one or two applications |
| What type of EC business strategy does Seek Recruitment have? | Strategy 4: Pure play EC |
| What type of EC business strategy does Air NZ have? | Strategy 3: Click-and-mortar companies that use one EC application that fundamentally changes all of their business |
| Why do companies need EC strategy? | • Fast changes in business and technology that opportunities and threats can change in a minute • Company must consider EC strategy with contingency plans |
| What is initiation in terms of strategy? | The initial phase of e-strategy in which an organization prepares information about its vision, mission, purpose, and the contribution that EC would make |
| What is a 'business case' in EC? | Written document that is used by managers to acquire funding for specific applications or projects by providing justification and reasons |
| What are some factors that contribute to failure in EC Strategy? | • Lack of funding • Incorrect revenue model • Revenue growth too slow • Need to move to new business model • Channel conflict • Poor planning |
| What does Peter Drucker advise companies to do when applying strategy to EC? | ⁃ Analyze the opportunities ⁃ Go out to look ⁃ Keep it focused ⁃ Start small ⁃ Aim at market leadership |
| What are the most successful EC strategies? | • Most successful: Brick & mortar companies add online channels ⁃ Low risk - offline business to fall back on • Mergers and acquisition |
| What is the major advantage in EC of going global? | Ability to do business any time, anywhere, rapidly at a reasonable cost |
| What are some global barriers? | • Cultural issues • Culture and language translation • Administrative issues • Geographic issues and localization • Economic issues |
| What are some solutions to global barriers? | • Be strategic • Know your audience • Localize (many different products/websites/etc.) • Think globally, act consistently • Value the human touch • Clarify, document, explain • Offer services that reduce barriers |