Commerce 2ka3: Final Exam
Commerce 2ka3: Final Exam
Commerce 2ka3: Final Exam
COMMERCE 2KA3
FINAL EXAM
STUDY GUIDE
find more resources at oneclass.com
Commerce 2KA3
Digital Firm: can be defined along several dimensions; it is one in which nearly all of the
organization’s significant business relationships with customers, suppliers, and employees
are digitally enabled and mediated. Core business process are accomplished through digital
networks spanning the entire organization or linking multiple organizations
Business Processes: refer to the set of logically related tasks and behaviours that
organizations develop over time to produce specific business results and the unique
manner in which theses activities are organized and coordinated
Key Corporate Assets: intellectual property, core competencies, and finical and human
assets- are managed through digital means.
Time shifting: refers to business being done continuously 24/7 rather than in a workday
Business Model: describes how a company produces, delivers, and sells a product or
service to create wealth
Competitive Advantage: when firms achieve one or more of these business objectives:
operational excellence, new products, services, and business models; customer/supplier
intimacy, and improved decision making- chances are they have achieved a competitive
advantage
Information Technology (IT): consist of all the hardware and software that a firm needs
to use in order to achieve its business objectives
Information: data that have been shaped into a firm that is meaningful and useful to
human beings
Data: are streams of raw facts representing events occurring in organizations or the
physical environment before they have been organized and arranged into a form that
people can understand and use
Input: captures or collects raw data from within the organization or from its external
environment
Output: transfers the process information to the people who will use it or to the activities
for which it will be used
Senior Management: makes long-range strategic decisions about products and services
and ensures the finical performance of the firm
Middle Management: carries out the programs and plans of senior management, and
operational management
Data workers: secretaries or clerks assist with the scheduling and communications at all
levels of the firm
Production or service workers: actually produce the product and deliver the service
Culture: each organization has its own unique culture or fundamental set of assumptions,
values, and ways of doing things, that has been accepted most of its members
Computer Hardware: is the physical equipment used for input, processing, and output
activities in an information system
Data management technology: consist of the software governing the organization of data
on physical storage media
Network: links two or more computers to share data or resources such as a printer
World wide web: is a service or information space provided on the internet that uses
universally accepted standards for storing, retrieving, formatting, and displaying
information in a page format on the internet
Complementary assets: are those assets required to derive value form a primary
investment
Commerce 2KA3
Business Processes: refer to the manner in which work is organized, coordinated and
focused to produce a valuable product or service. They are the collection of activities
required to produce a product or service. These activities are supported by flows of
materials, information, and knowledge among the participants in business processes.
sales
Business intelligence: a contemporary term for data and software tools for organizing,
analyzing, and providing access to data to help managers and other enterprise users make
more informed decisions
Decision-support system (DSS): focus on problems that are unique and rapidly changing
and for which the procedure for arriving at a solution may not be fully predefined in
advance. DSS uses internal info from TPS and MIS, they often bring in information from
external sources, such as current stock process or product process of competitors
Executive Support System (ESS): a system that focus on strategic issues and long-term
trends, both in the firm and in the external environment. Questions like: What will
employment levels be in five years? What ware the long-term industry cost trends? What
products should we be making in five years? ESS addresses non-routine decisions requiring
judgment, evaluation, and insight because there is no agreed-on procedure.
Portal: information is delivered to senior executives through this, uses a web interface to
present integrated personalized business content
Digital Dashboard: the information is displayed upon a singe screen, graphs and charts of
key performance indicators for managing a company.
Enterprise Applications: systems that span functional areas, focus on executing business
processes across the business firm, and include all levels of management. These
applications help businesses become more flexible and productive by coordinating their
business processes more closely
Enterprise Systems: also known as enterprise resource planning (ERP) systems, firms use
them to integrate business process in manufacturing and production, finance, and
accounting, sales and marketing, and human resources into a single software system
Supply Chain Management systems (SCM) Systems: used by firms to help manage
relationships with their suppliers. These systems help suppliers, purchasing firms,
distributors, and logistics companies share information about orders, production,
inventory levels, and delivery of products, and services, so they can source, produce, and
deliver goods and services efficiently
Interorganizational system: eg, SCM systems because they automate the flow of
information across organizational boundaries
Customer Relationship Management CRM Systems: firms use these to help manage their
relationships with their customers. CRM systems provide information to coordinate all of
the business processes that deal with customers in sales, marketing, and service to
optimize revenue, customer satisfaction, and customer retention.
Knowledge Management systems KMS: some firsm perform better than others because
they have better knowledge about how to create, produce, and deliver products and
services. KMS or knowledge management systems enable organizations to better manage
processes for capturing and applying knowledge and expertise. These systems collect all
relevant knowledge and experience in the firm and make it available whenever and
wherever
Electronic Business (e-business): refers to the use of digital technology and the internet
to execute the major business processes of an enterprise. E-business includes activities for
the internal management of the firm and for coordination with suppliers and other
business partners.
Electronic Commerce (e-commerce): is part of e-business that deals with the buying and
selling of goods and services over the internet. It also encompasses activities, supporting
those market transactions, such as advertising, marketing, customer support, security,
delivery, and payment
Teams: have a specific mission that someone in the business assigned them. Team
members need to collaborate on the accomplishment of specific task and collectively
achieve the team mission.
Collaboration and teamwork are important today more than ever for the following reasons
- Changing nature of work
- Growth of professional work
- Changing organization of the firm
- Changing scope of the firm
- Emphasis on innovation
- Changing culture of work and business
Social Business: the use of social networking platforms, like FB, twitter, etc, to engage
their employees, customers, and suppliers. These tools enable workers to set up profiles,
form groups, and follow each other. The goal of social business is to deepen interaction-
sharing, innovation, and decision making.
Cyberlocker: online file sharing services that allow users to upload files to secure online
storage sites from which the files can be shared with others
Programmers: are highly trained technical specialists who write the software instructions
for computers
System analyst: constitute the principal liaisons between the information systems group
and the rest of the organization
Chief Information Officer (CIO): a senior manager who overseas the use of information
technology n the firm. Todays CIOs are expected to have a strong business background as
well as information systems expertise and play a leadership role in integrating technology
into the firm’s business strategy
Chief Security Offices (CSO): is in charge of information systems security for the firm and
is responsible for enforcing the firm’s information security policy. Responsible for
educating and training uses and information systems specialists about security, keeping
management aware of security threats and breakdowns, and maintaining the tools and
polices chosen to implement security
Chief Privacy Officer (CPO) responsible for ensuring that the company complies with
existing data privacy laws
Chief Knowledge Officer (CKO): is responsible for the firms knowledge management
program The CKO helps design programs and systems to find new sources of knowledge or
to make better sue of existing knowledge in organizational and management processes
End Users: are representatives of department outside of the information systems group
for whom applications are developed. These users are playing an increasingly large role in
the design and development of info systems
IT governance: includes the strategy and polices for using information technology within
an organizations. It specifies the decisions rights and framework for accountability to
ensure that the use of information technology supports the organization’s strategies and
objectives
Commerce 2KA3
Routines: sometimes called standard operating procedures are precise rules, procedures,
and practices, that have been developed to cope with virtually all expected situations.
Disruptive Technologies: are substitute products that perform as well or better than
anything currently produced. Eg. Car substituted the horse drawn carriage
agents (employees) to perform work on his or her behalf. Agents need constant
management and supervision or they will pursue their own best interests instead of the
owners
Competitive Forces Model: provides a general view of the firm, its competitors, and the
firm’s environment. The strategic position of the firm and its strategies are determined not
only by competition, but also by four other forces in the industry’s environment: new
market entrants, substitute products, customers, and suppliers
Product Differentiation: a power a firm has over its consumers that prevents them from
easily switching to a competitors products or services. If product differentiation in a
market is low, competitors are forced to compete based on price alone
Mass customization: the ability to offer individually tailored products or series using the
same production resources as mass production
Switching Costs: the costs of switching from one product to a competing product
Value Chain Model: highlights specific activities in the business where competitive
strategies can best be applied and where information systems are most likely to have a
strategic impact
Primary activities: are most directly related to the production and distribution of the
firm’s products and services, which create value for the customer
Support Activities: make the delivery of the primary activities possible and consist of
organization infrastructure, human resources, technology, and procurement.
Network Economics: business model based on a network may help firms strategically.
Marginal costs of an additional participant to a network (internet of phone services) is
close to zero while marginal benefits of that same participant are much higher
Virtual Company: uses networks to link people, assets, and ideas, enabling, it to ally with
other companies to crate and distribute products and services without being limited by
traditional organization boundaries or physical locations
Business Ecosystem: another term for a loosely coupled but interdependent network of
suppliers, distributors, outsourcing firms, transportation service firms, and technology
manufactures
Commerce 2KA3
In today’s current legal environment, managers who violate the law and are convicted will
most likely spend time in prison. Although business firms would in the past often pay for
legal defence of their employees enmeshed in civil charges and criminal investigations,
firms are now encouraged to cooperate with prosecutes to reduce charges against the
entire firm for obstructing investigations
Property rights and obligations: How can traditional intellectual property rights be
protected in digital society in which tracing and accounting for ownership are difficult and
ignoring such property rights is so easy?
Accountability and Control: who can and will be held accountable for harm done to
individual and collective information and property rights?
System quality: what standards of data and system quality should we demand to protect
individual rights and the safety of society
Quality of Life: what values should be preserved in an information- and knowledge based
society? Which intuitions should we protect from violation/ Which cultural values and
practices are supported by the new information technology?
Profiling: the use of computers to combine data from multiple sources and create
electronic dossiers of detailed information on individuals
Nonobvious relationship Awareness (NORA): a new data analysis technology that has
given the government and the private sector even more powerful profiling capabilities.
NORA can take information about people form many disparate sources, such as
employment applications, telephone records, customer listings, and wanted lists, and
correlate relationships to find obscure hidden connections that might help identify
criminals or terrorists.
Advances in networking, including the Internet, promise to greatly reduce the costs of
moving and accessing large quantities of data and open the possibility of mining large pools
of data remotely using small desktop machines, permitting an invasion of privacy on a scale
and with precisions previously unimaginable.
Responsibility: means that you accept the potential costs, duties, and obligations for the
decisions you make.
Accountability: a feature of systems and social institutions; means that mechanisms are in
place to determine who took responsible action and who is responsible
Liability: the concept of responsibility further to the area of laws. Liability is a feature of
political systems in which a body of laws is in place that permits individuals to recover the
damages done to them by other actors, systems, or organizations
Due Process: a related feature of law-governed societies and is a process in which laws are
known and understood, and there is an ability to appeal to higher authorities to ensure that
the laws are applied correctly.
The above 4 basic concepts form the basis of an ethical analysis of information systems and
those who mange them. First information technologies are filtered through social
institutions, organizations, and individuals. The impacts of an information system are in
existence because of institutional, organizational and individual actions. Second
responsibility for the consequences of technology falls clearly on the institutions,
organizations, and individual managers who choose to use the technology. Third, in an
ethical, political society, individuals and others can recover damages done to them through
a set of laws characterized by due process.
Ethical Analysis
When confronted with a situation that seems to present ethical issues, it should be
analyzed using the following five-step process:
1. Identify and describe the facts clearly
2. Define the conflict or dilemma and identify the higher-order values involved
3. Identify the stakeholders
4. Identify the options that you can reasonably take
5. Identify the potential consequences of you options
Informed Consent: consent given with knowledge of all the facts needed to make a
rational decision
Safe Harbour: a private, self-regulating policy and enforcement mechanism that meets the
objectives of government regulators and legislation but does not involve government
regulation or enforcement.
Cookies: are small text files deposited on a computer hard drive when a user visits Web
sites. They identify visitors Web browser software and track visits to the web site.
Web Beacons : also called web bugs, are tiny software programs that keep a record of
users’ online clickstream and report this data back to whoever owns the tracking file
invisibly embedded in email messages and Web pages that are designed to monitor the
behaviour of the user visiting the a website or sending an email
Spyware: much like a web beacon, can be secretly installed on an internet users computer
by piggy backing on larger applications. Once installed, it calls out to websites to send
banner ads and other unsolicited material to the user, and it can report the users
movements on the internet to other computers.
Opt-in: The model that privacy advocates would rather see more use of, in which
businesses are prohibited from collecting any personal information unless the consumer
specifically takes action to approve collecting any personal information unless the
consumer specifically takes action to approve information collection and use
Trade Secrets: not based on information in the public domain, trade secrets have
arisen out of the broad duty of good faith and the principle of equity that whoever
has received information in confidence shall not take unfair advantage of it
Canada has stated that the test for whether there has been a breach of confidence
consist of three elements
1. The information conveyed must be confidential (not public knowledge)
2. The information must have been communicated in confidence
3. The information must have been misused by the part to whom it was
communicated
Patent: a patent grants the owner an exclusive monopoly on the ideas behind an
invention for between 17 and 20 years. The intent behind patent law is to ensure
that inventors of new machines, devices, or methods receive the full financial and
other rewards of their labours yet still make widespread use of the invention
possible by providing detailed diagrams fro those wishing to use the idea under
licence from the patent’s owner
Computer Crime: is the commission of illegal acts through the use of a computer or
against a computer system. Computers or computer systems can be the object of the crime,
as well as the instrument of a crime.
Computer Abuse: is the commission of acts involving a computer that may not be illegal
but that are considered unethical. The popularity of the Internet and email has turned one
form of computer abuse spamming into a serious problem fro both individuals and
businesses
Digital Divide: exists in both Canadian and US Schools, with schools in high poverty areas
less likely to have computers, high-quality educational technology programs, or Internet
access availability for their students
Repetitive Stress Injury (RSI): occurs when muscle groups are forced through receptive
actions often with high impact loads or tens of thousands of under low-impact loads. The
single largest source of RSI is computer keyboards.
Carpal tunnel Syndrome (CTS): the most common kind of computer-related RSI, in which
pressure on the median nerve through the wrists bony structure produces pain
Computer Vision Syndrome: refers to any eyestrain condition related to display screen
use in computers of all sorts. It symptoms include headaches, blurred vision, and dry
irritated eyes
Technostress: newest computer related malady, stress induced by computer use. Its
symptoms include aggravation, hostility towards humans, impatience, and fatigue.
Commerce 2KA3
Evolution of IT Infrastructure
Mainframe: 1959 to present, the introduction of the IBM 1401 and 7090 transistorized
machines in 1959 marked the beginning of widespread commercial use mainframe
computers. Mainframe computers became powerful enough to support thousands of online
remote terminals connected to the centralized mainframe using proprietary
communication protocols and proprietary data lines.
- Period of highly centralized computing under control of professional programmers
and system operators
Personal Computer Era (1981 to Present): PC’s were first widely adopted in business
use in 1981, at first DOS operating system, a text-based command language, and later the
Microsoft windows operating system, the Wintel PC computer became the standard
desktop personal computer.
Clietn/Server Era (1983 to Present): desktop or ;aptop computers called clients are
networked to powerful server computers, that provide the client computers with a variet of
services and capabilities
Commerce 2KA3
Computer systems organize data in a hierarchy starting with bits and bytes and progress to
fields, record, files, and databases.
Byte: a group of bits, represents a single character which can be a letter, a number, or
another symbol
Record: a group of related fields (such as the students name, courses taken, the date, the
grade received are a record
Entity: an entity is a person, place, thing, or event about which we store and maintain
information
Lack of flexibility: traditional file systems cannot deliver ad hoc reports or respond to
unanticipated information requirements in a timely fashion
Poor Security: there is little control or management of data, access to and dissemination of
information may be out of control. Management may have no way of knowing who is
accessing or even making changes to the organization’s data
Lack of Data Sharing and Availability: pieces of information in different files and
different parts of the organization cannot be related to one another, it is virtually
impossible for information to be shared or access in a timely manner.
Relational DBMS: represent data as two-dimensional tables (called relations). Tables may
be referred to as files, each table contains data on an entity and its attributes
Key Field: The field in a table that uniquely identifies each record so that the record
can be retrieved, updated, or sorted
Each table in a relational database has one field that is designated as its primary
key. This key field is the unique identifier for all the information in any row of the
table, and is this primary key cannot be duplicated
Foreign key: essentially a lookup field to look up data about another key
Non-relational Database management systems: are a more flexible data model and are
designed for managing large data sets across many distributed machines and for easily
scaling up or down. They are useful for accelerating simple queries against large volumes of
structured and unstructured data, including social media, web, graphics, and other forms of
data that are difficult to analyze with traditional SQL-based tools
Data Definition: capability to specify the structure of the content of the database, used to
create database tables and to define the characteristics of the fields
Data Dictionary: is an automated or manual file that stores definitions of data elements
and their characteristics
Data manipulation Language: most DBMS have a specialized language, which is used to
add, change, delete, and retrieve the data in the database
Structured Query Language (SQL): the most prominent data manipulation language
To create a database, you must understand the relationships among the data, the type of
data that will be maintained in the database, how the data will be used, and how the
organization will need to change to manage data from a company-wide perspective.
Normalization: the process of creating small, stable, yet flexible and adaptive structures
from complex groups of data
Referential integrity rules ensure that the relationships between coupled tables remain
consistent. When one table has a foreign key that points to another table, you many not add
a record to the table with the foreign key unless there is a corresponding record in the
linked table
Entity-relationship diagram: data designers document their data model with these. These
diagrams illustrate the relationships between the entities. Boxes represent entities, lines
connecting boxes represent relationships A line connecting two entities that ends with a
crows foot topped by a short mark indicates a one-to-many relationship.
Big Data: describes datasets with volumes so huge that they are beyond the ability of a
typical DBMS to capture, store, and analyze. Big data does not refer to any specific quantity
but usually refers to data in the petabyte and Exabyte range, billions and trillions of records
Data warehouse: is a database that stores current and historical data of potential interests
to decisions makers through the company. The data originate in many core operational
transaction work systems, such as systems for sales customer accounts, and manufacturing,
and may include data from Web transactions
Data Mart: a subset of a data warehouse in which a summarized or highly focused portion
of the organization’s data is placed in a separate database for a specific population.
Analytic Platforms: using both relational and non-relational technologies that are
optimized for analyzing large datasets.
Once data has been captured and organized using the business intelligence technologies we
have just described, they are available for further analysis using software for database
querying and reporting, multidimensional analysis (OLAP), and data mining.
Data Mining: is more discovery driven. Data mining provides insights into corporate data
that cannot be obtained with OLAP by finding hidden patterns and relationships in large
databases and inferring rules from them to predict future behaviour. The information
obtained with data mining include associations, sequences, classifications, clusters, and
forecasts
- Association: are occurrences linked to a single event (sales and their increase
when promotions are taking place)
- Sequences: are events that are linked over time (sales (of appliances) and how
they relate to the sale of a previous item (a home))
- Classification: recognizes patterns that describe the group to which an item
belongs by examining existing items that have been classified and by inferring a
set of rules (defining characteristics of customers who are likely to leave)
- Clustering: works in a manner similar to classification when no groups have yet
been defined (partitioning a database into groups of customers based on
demographics and types of personal investments)
- Forecasting: uses predictions in a different way. It uses a series of existing values
to forecast what other values will be
Text Mining: tools are now available to help businesses analyze data found in e-mail,
memos, call centre transcripts, survey responses, legal cases, patent descriptions, and
service reports. These tools are able to extract key elements from unstructured big data
sets, discover patterns and relationships, and summarize the information
Sentiment Analysis: software is able to mine text comments in an e-mail message, blog,
social media, conversation, or survey from to detect favourable and unfavourable opinions
about specific subjects
Web mining: businesses turn to this to help them understand customer behaviour,
evaluate the effectiveness of a particle web site, or quantify the success of a marketing
campaign. Web mining looks or patterns in data through content mining, structure mining,
and usage mining
Common Gateway Interface (CGI): a CGI script is a compact program using the CGI
specification for processing data on a web server
Information Policy: specify the organization’s rules for sharing, disseminating, acquiring,
standardizing, classifying, and inventorying information. Information policy lays out
specific procedures and accountabilities, identifying which users and organizational units
can share information
Data Administration: is responsible for the specific polices and procedures through which
data can be managed as an organizational resource. These responsibilities include
developing information policy, planning for data, overseeing logical database design and
data dictionary development, and monitoring how information systems users use data
Data Governance: used to describe many of these activities, deals with the polices and
processes for managing the availability, usability, integrity, and security of the data
employed in an enterprise, with special emphasis on promoting privacy, security, data
quality, and compliance with government regulations
Data Administration: in close coordination with users, the design group establishes the
physical database, the logical relations among elements, and access rules and security
procedures. The functions it perform are all part of database admin’
Inaccurate, untimely, and inconsistent data can all lead to incorrect decisions, product
recalls, and financial losses
Data Quality Audit: is a structured survey of the accuracy and level of completeness of the
data in an information system. Surveying entire data files, surveying samples from data
files, or surveying end users for their perceptions of data quality are methods of
performing data quality audits.
Data cleansing: aka data scrubbing, consist of activities for detecting and correcting data
in a database that are incorrect, incomplete, improperly formatted, or redundant. Data
cleansing not only corrects errors but also enforces consistency amount different sets of
data that originated in spate information systems
Commerce 2KA3
Enterprise Systems
Companies are becoming increasingly more connected both internally and with other
companies
Supply chain: is a network of organizations and business processes for procuring raw
materials, transforming these materials into intermediate and finished products, and
distributing the finished products to customers. It links suppliers, manufacturing plants,
distribution centres, retail outlets, and customers to supply goods and services from source
through consumption. Material, information, and payments flow through the supply chain
in both directions. Goods start through the supply chain, are transformed into intermediate
products, and finally, into finished products. The upstream portion of the supply chain
includes the company’s suppliers, the suppliers and the processes for managing
relationships with them. The downstream portion consists of the processes for
distributing and delivering products to the final customers.
Just-in-time strategy: If a manufacturer had perfect information about exactly how many
units of product customers wanted, when customers wanted them, and when they could be
produced, then this strategy would be implemented. It would arrive exactly at the moment
they were needed and finished goods would be shipped as they left the assembly line.
Uncertainties arise because events cannot be foreseen- uncertain product demand, late
shipments from suppliers, defective parts or raw materials.
Safety Stock: acts as a buffer for the lack of flexibility in the supply chain, although, excess
inventory is expensive, low fill rates are also costly because businesses may be lost from
cancelled orders.
Bullwhip Effects: information about the demand for a product gets distorted as it passes
from one entity to the next across the supply chain. A slight rise in demand for an item
might cause different members in the supply chain - distributors, manufactures, suppliers,
secondary suppliers, and tertiary suppliers – to stockpile inventory so each ahs enough just
in case. Bullwhip is tamed by reducing uncertainties about demand and supply when all
members of the supply chain have accurate and up-to-date information. If supply chain
members share dynamic information
Demand Planning: One of the most important – and complex – supply chain planning
functions. Determines how much product a business needs to make to satisfy all of its
customers’ demands.
Supply Chain Execution Systems: manage the flow of products through distribution
centres and warehouses to ensure that products are delivered to the right locations in the
most efficient manner. They track physical status of goods, the management of materials,
warehouse and transportation operations, and financial information involving all parties.
Push-based Model: production master schedules are based on forecasts or best guesses of
demand for products, and products are pushed to customers.
Pull-based Model: aka demand driven or build-to-order model, actual customers orders or
purchases trigger events in the supply chain. Transactions to produce and deliver only
what customers have ordered move up the supply chain from retailers to distributors to
manufacturers and eventually to suppliers.
Employee Relationship Management (ERM): software that deals with employee issues
that are closely related to CRM, such as setting objectives, employee performance
management, performance-based compensation and employee training.
Sales Force Automation (SFA): sales force automation modules in CRM systems help sales
staff increase their productivity by focusing sales efforts on the most profitable customers,
those who are good candidates for sales and service
Operational CRM: includes customers facing applications such as tools for sales force
automation, call centre and customer service support, and marketing information.
Customer Lifetime Value (CLTV): based on the relationship between the revenue
produced by a specific customer, the expenses incurred in acquiring and servicing that
customer and the expected life of the relationship between the customer and the company
Customer Churn Rate: measures the number of customers who stop using or purchasing
products or services from a company. It is an important indicator of the growth or decline
of a firm’s customer base
Social CRM: tools that enable a business to connect customer conversations and
relationships from social networking sites to CRM processes.
Commerce 2KA3
E-commerce refers to the use of the Internet and the Web to transact business. It is
digitally-enabled commercial transactions that occur over the Internet and the Web.
Commercial transactions involve the exchange of values across organizational or individual
boundaries in return for products and services. Began in 1995
E-commerce is ubiquitous, meaning that it is available just about everywhere, at all times.
Key Entry Costs: the cost merchants must pay simply to bring their goods to market
Search Costs: the effort required to find suitable products: universal standards reduce
search costs
Information Density: the total amount and quality of information available to all market
participants, consumers and merchants alike.
Price Transparency: refers to the ease with which consumers can find out the variety of
prices in a market
Cost Transparency: refers to the ability of consumers to discover the actual costs
merchants pay for products
Price Discrimination: selling the same goods, or nearly the same goods to different
targeted groups at different targeted groups at different prices.
Information Asymmetry: exists when one party in a transaction has more information
that is important for the transaction than the other party
Dynamic Pricing: the price of a product varies depending on the demand characteristics of
the customer or the supply situation of the seller
Digital Goods: are goods that can be delivered over digital networks
Mobile Commerce (m-commerce): the use of handheld wireless devices for purchasing
goods and services from any location
Intellectual Property: refers to all forms of human expression that can be put into a
tangible medium such as text, CDs, or DVDs, or stored on any digital media, including web.
Podcasting: is a method of publishing audio or video broadcasts via the Internet, allowing
subscribing users to download audio or video files onto their personal computers or
portable music players
Streaming: is a publishing method for music and video files that flows a continuous steam
of content to a user’s device without being stored locally on the device.
Market Creators: build a digital environment in which buyers and sellers can meet,
display products, search for products and establish prices
Community Providers: are sites that create a digital online environment where people
with similar interests can transact (buy and sell goods); share interests, photos, videos,;
communicate with like-minded people; receive interest-related information; and even play
out fantasies by adopting personalities called avatars.
Revenue Model: describes how the firm will earn revenue, generate profits, and produce a
superior return on investment.
Free/Freemium Revenue Model : firms offer basic services or content for free while
charging a premium for advanced or special features.
Transaction Fee Revenue Model: a company receives a fee for enabling or executing a
transaction (ebay makes money when people buy something on from someone else on
ebay)
Affiliate revenue Model: web(called affiliate web sites) sites send visitors to other
websites in return for a referral fee or percentage of the revenue from any resulting sales
Social Shopping: sites like Pinterest, Kaboodle, ThisNext, allow you to swap shopping
ideas with friends
Wisdom Crowds: creating sites where thousands, or millions of people can interact offers
businesses new ways to market and advertise to discover who likes or hates their products
Crowd Sourcing: firms can be actively helped in solving some business problems using
this method, a form of soliciting advice from the external environment
Social Graph: a mapping of all significant online social relationships. Synonymous with the
idea of a social network
Private Industrial Networks: aka private exchange: typically consist of a large firm using
a secure Web site to link to its suppliers and other key business partners. The network is
owned by the buyer, and it permits the firm and designated supplier, distributors, and
other business partners to share product design and development, marketing, production
scheduling, inventory management, and unstructured communication, including graphics
and email
Net Marketplace: sometimes called e-hubs, provider a single digital marketplace based on
Internet technology for many different buyers and sellers. They are industry owned or
operate as independent intermediaries between buyers and sellers> Generate revenues
from purchase and sale transactions and other services provided to clients
Direct Goods: goods used in production process, such as sheet metal for auto body
production
Indirect goods: are all other goods not directly involved in the production process, such as
office supplies or products for maintenance and repair
Exchanges: are independently owned third party net marketplaces that connect thousands
of supplies and buyers for spot purchasing
Geosocial Service: can tell you where your friends are meeting
Geoadvertising: can tell you where to find the nearest Italian restaurant
Geoinformation Services: tell you the price of a house that you are looking at or about
special exhibits at a museum you are passing
Co-Location Agreement: your firm purchases or leases a web server (and has total control
over its operation) but locates the server in a vendor’s physical facility
Commerce 2KA3
To turn data into information, a firm must expand resources to organize data into
categories of understanding, such as monthly, daily, regional, or store-based reports of
total sales.
Wisdom: the collective and individual experiences of applying knowledge to the solution of
problems. Involves, where, when, and how to apply knowledge
Tacit Knowledge: knowledge residing in the minds of employees that has not been
documented
Explicit Knowledge: knowledge that has been documented and that which is easy to share
and teach
Organizational Learning: organizations that learn adjust their behaviour to reflect that
learning by creating new business processes and by changing patterns of management
decision making
Knowledge Work Systems (KWS): are specialized systems with discovering and creating
new knowledge for a company
Intelligent techniques: data mining, expert systems, neural networks, fuzzy logic, genetic
algorithms, and intelligent agents
Digital Asset Management Systems: help companies classify, store, and distribute digital
objects
Knowledge Network Systems: address the problem that arises when the appropriate
knowledge is not in the form of a digital document but instead resides in the memory of
individual experts in the firm. Provide online directory of corporate experts and their
profiles, with details about their job experience, projects, publications, and educational
degrees
Social Bookmarking: make it easier to search for and share information by allowing users
to save their bookmarks to web pages on a public web sire and tag these bookmarks with
keywords
Folksonomies: User created taxonomies created for shared bookmarks, or a lists of tags
that can be shared with other people to help them find information of interest
Learning Management Systems (LMS): provides tools for the management, delivery,
tracking, and assessment of various types of employee learning and training.
Computer-Aided design (CAD): automates the creating and revision of designs, using
computers and sophisticated graphics software.
3-D printing: aka additive manufacturing, which uses machines to make solid objects,
layer by layer, from specifications in a digital file, #-D printing is currently being used to
produce prototypes and small items, such as jewellery and hip implants, as well as larger
ones such as aircraft parts
Virtual Reality Systems: have visualization, rendering, and simulation capabilities that go
far beyond those of conventional CAD systems. They use interactive graphics software to
create computer-generated simulations so close to reality that users almost believe they
are participating in a real-world simulation.
Virtual Reality Modeling Language (VRML): the standard for virtual applications
developed for the w Web use. It is a set of expectations for interactive, 3-D modelling on the
worldwide web that can organize multiple media types, including animation, images, and
audio to put users in a simulated real-world
Investment Workstations: Bloomberg terminals to leverage the knowledge and time of its
brokers, traders, and portfolio managers.
Intelligent Techniques
Knowledge Discovery: neural networks and data mining are using for that. They can
discover underlying patterns, categories, and behaviours in large data sets that could not
be discovered by managers alone or simply through experience.
Expert Systems: are an intelligent technique for capturing tacit knowledge in a very
specific and limited domain of human expertise
Inference engines: the strategy used to search through the knowledge base
Forward Chaining: the inference engine begins with the information entered by the
user and searches the rule base to arrive at a conclusion.
Backward Chaining: the strategy for searching the rule base starts with a
hypothesis and proceeds by asking the user questions about selected facts until the
hypothesis is either confirmed or disproved.
Fuzzy Logic: is a rule-based technology that can represent this type of imprecision by
creating rules that use approximate or subjective values. It can describe a particular
phenomenon or process linguistically and then represent that description in a small
number of flexible rules
Machine Learning: is the study of how computer programs can improve their
performance without explicit programming. A machine that leans is a machine that, like
humans, can recognize patterns in data can change its behaviours based on its recognition
of patterns, experiences, or prior learning’s.
Neural Networks: are used to solve complex, poorly understood problems for which large
amounts of data have been collected. They fund patterns and relationships in massive
amounts of data that would be too complicated and difficult for a human being to analyze
Genetic Algorithms: are useful for finding the optimal solution for a specific problem by
examining a very large number of possible solutions for that problem. They are based on
techniques inspired by evolutionary biology, such as inheritance, mutation, selection, and
recombination
Intelligent Agents: are software programs that work without direct human intervention to
carry to specific tasks for an individual user, business process, or software application.
Agents use a built in or learned knowledge base to accomplish tasks or make decisions on
the user’s behalf
Hybrid AI systems: genetic algorithms, fuzzy logic, neural networks, and expert systems
can be integrated into a single application to take advantage of the best features of these
technologies. These systems are being increasingly used un business.
Commerce 2KA3
Unstructured Decisions: are those in which the decisions maker must provide judgement,
evaluation, and unsought to solve the problem. These decisions are very important, and are
nonroutine, and there is no well-known or agreed-on procedure for making them. These
decisions are common in senior management positions.
Structured Decisions: are repetitive and routine, they involve a definite procedure for
handling them so that they do not have to be treated each time as if they were new.
Common in operational management and among individual employees and teams
Semistructured: where only party of the problem has a clear-cut answer provided by an
accepted procedure. IN general, structured decisions are more prevalent in lower
organizational levels, while unstructured problems are more common at higher levels of
the firm
Behavioural Models: State that the actual behaviour of managers appears to be less
systematic, more informal, less reflective, more reactive, and less well organized than the
classical model would have us believe. Managerial behaviour has 4 attributes that differ
greatly from the classical description. Managers perform a great deal of work at
unrelenting pace. Managerial activities are fragmented; most activities last for less than 9
minutes, and only 10% of activities exceed one hour in duration. 3rd managers prefer
current , specific, and ad hoc info. 4th they prefer oral forms of communication as it is more
flexible, requires less effort, and brings a faster response than written communication.
Managerial roles: are expectations of the activities that managers should perform in an
organization. Mintzberg developed this theory, he states that there are 10 managerial roles
which can be further classified into the following 3 categories of roles.
Interpersonal Roles: managers act as a figurehead for the organization when they
represent their companies to the outside world and perform symbolic duties such as
giving out employee awards
Informational Roles: act as the nerve centres of their organizations, receiving the
most concreter, up-to-date info and redistributing it to those who need it
Information Quality: high quality decisions require high quality information. Below is a
chart dictating the dimensions of what make information quality or not
Predictive Analytics: use statistical analysis, data mining, techniques, historical data, and
assumptions about future conditions to predict future trends and behaviour patterns.
Data Visualization: the presentation of data in visual forms and utilizing visual analytics
to help users see patterns and relationships in large amounts of data that would be difficult
to discern if the data were presented as traditional lists.
Geographic Information Systems (GIS): are a special category of tools for helping
decisions makers visualize problems requiring knowledge about the geographic
distribution of people or other resources
Sensitivity Analysis: models that ask what-if questions repeatedly to predict a rang eof
outcomes when one or more variables are changed multiple times. Backward sensitivity
analysis helps decision makers with goal seeking
Pivot Table: super users and analysts employ these multidimensional spreadsheets to
identify and understand patterns in business information that may be useful for
semistructured decisions making
Employee self service have significant drill-down capabilities if managers need more
detailed views of data?