








Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
COB 204 Hartt Test 2 Study Guide Exam Questions and Answers (Solved Papers)
Typology: Exams
1 / 14
This page cannot be seen from the preview
Don't miss anything!
Big Data - Correct Answers ✅Techniques and technologies that make it economical to deal with very large data sets at the extreme end of the scale. Very large data repositories often found in environments where volumes of information are generated at a high velocity. Usually unstructured. Business analytics - Correct Answers ✅The systematic use of factual data in proprietary models. Business intelligence - Correct Answers ✅The set of technologies and processes that use data to understand and analyze business performance. Chief Analytics Officer - Correct Answers ✅(CAO) Individual at the helm of the analytics activities of an organization. 5 different levels: Reporting Analyzing Descriptive Predictive Prescriptive
Combination - Correct Answers ✅From explicit knowledge to explicit knowledge Data - Correct Answers ✅Specific, objective facts or observations, such as "distributor ABC bought 600 of our sweaters." Key features of data are that it can be easily captured, transmitted, and stored electronically. Data-driven culture - Correct Answers ✅An environment that supports and requires analytics, is a critical factor for success. Requires aligning IS strategy and organization with business strategy. Data mining - Correct Answers ✅Process of analyzing data warehouses and other sources for "gems" that can be used in management decision making. Typically refers to the process of combing through massive amounts of customer data to understand buying habits and to identify new products, features, and enhancements. Data Scientist - Correct Answers ✅A professional who has the skills to use the right analytics with the right data at the right time for the right business problem.
Folksonomy - Correct Answers ✅Creates an ad hoc codification system Information - Correct Answers ✅Defined by Peter Drucker as "data endowed with relevance and purpose". Intellectual capital - Correct Answers ✅Knowledge that has been identified, captured, and leveraged to produce higher-value goods or services or some other competitive advantage for a firm. Intellectual property - Correct Answers ✅Used to describe these creative and innovative information-based outputs. It is nonexclusive to the extent that when one person uses it, another person can use it without degradation or loss of quality. Internalization - Correct Answers ✅Explicit knowledge to tactic knowledge. Internet of Things - Correct Answers ✅Also creates massive amounts of data. Knowledge - Correct Answers ✅
Knowledge capture - Correct Answers ✅Involves continuous processes of scanning, organizing, and packaging knowledge after it has been generated. Knowledge codification - Correct Answers ✅Is the representation of knowledge in a manner that can be easily accessed and transferred. Knowledge generation - Correct Answers ✅Includes all activities that discover "new" knowledge, whether such knowledge is new to an individual, a firm, or an entire discipline. Knowledge management - Correct Answers ✅Includes the processes necessary to generate, capture, codify, integrate, and transfer knowledge across the organization to achieve competitive advantage. Knowledge transfer - Correct Answers ✅Involves transmitting knowledge from one person or group to another, and the absorption of that knowledge.
Tactic knowledge - Correct Answers ✅Knowing how to identify the key issues necessary to solve a problem. Applying similar experiences from past situations. Estimating work required based on intuition and experience. Deciding on an appropriate course of action. Tagging - Correct Answers ✅Where users themselves list key words that codify the information or document at hand. Accountability - Correct Answers ✅A tenet of ethics that refers to determining who is responsible for actions that were taken. Code of ethics - Correct Answers ✅A collection of principles intended to guide decision making by members of an organization Digital dossier - Correct Answers ✅An electronic description of an individual and his or her habits. Electronic surveillance - Correct Answers ✅Tracking people's activities with the aid of computers.
Ethics - Correct Answers ✅The principles of right and wrong that individuals use to make choices to guide their behaviors. Information privacy - Correct Answers ✅The right to determine when, and to what extent, personal information can be gathered by and/or communicated to others. Liability - Correct Answers ✅A legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. Opt-in model - Correct Answers ✅A model of informed consent in which a business is prohibited from collecting any personal information unless the customer specifically authorizes it. Opt-out model - Correct Answers ✅A model of informed consent that permits a company to collect personal information until the customer specifically requests that the data not to be collected. Privacy - Correct Answers ✅The right to be left alone and to be free of unreasonable personal intrusions.
Cross-selling - Correct Answers ✅The practice of marketing additional related products to customers based on a previous purchase. Customer-facing CRM applications - Correct Answers ✅Areas where customers directly interact with the organization, including customer service and support, sales force automation, marketing,and campaign management. Customer interaction center (CIC) - Correct Answers ✅A CRM operation where organizational respresentatives use multiple communication channels to interact with customers in functions such as inbound teleservice and outbound telesales. Customer relationship management (CRM) - Correct Answers ✅A customer-focused and customer-driven organizational strategy that concentrates on addressing customers' requirements for products and services, and then providing high-quality, responsive services. Customer touch point - Correct Answers ✅Any interaction between a customer and an organization.
Front-office processes - Correct Answers ✅Those processes that directly interact with customers; that is, sales, marketing, and service. Campaign management applications - Correct Answers ✅CRM applications that help organizations plan marketing campaigns that send the right messages to the people through the right channels. Collaborative CRM system - Correct Answers ✅A CRM system where communications between the organization and its customers are integrated across all aspects of marketing, sales, and customer support processes. Loyalty program - Correct Answers ✅Programs that offer rewards to customers to influence future behavior. Mobile CRM system - Correct Answers ✅An interactive CRM system where communications related to sales, marketing, and customers service activities are conducted through a mobile medium for the purpose of building and maintaining customer relationships between an organization and its customers.
in place of, or along with, the customers's initial product or service selection. 5 key factors increasing vulnerablility - Correct Answers ✅Today's interconnected, interdependent, wirelessly networked business environment. Smaller, faster, cheaper computers and storage devices. Decreasing skills necessary to be a computer hacker. International organized crime taking over cybercrime. Lack of management support. Unintentional threats to IS - Correct Answers ✅Human errors. Social engineering. Human errors - Correct Answers ✅Higher employee levels= higher levels of security risk. Most dangerous employees. Human mistakes. Two organizational areas pose the greatest risk. - Correct Answers ✅Human resources. Information systems.
Human Mistakes - Correct Answers ✅Carelessness with laptops. Carelessness with computing devices. Opening questionable e-mails. Careless internet surfing. Poor password selection and use. Carelessness with one's office. Carelessness using unmanaged devices. Carelessness with discarded equipment. Careless monitoring of environmental hazards. Social Engineering - Correct Answers ✅An attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.