Latest Update
Worms malware computer program that spreads itself not only from file to file but also
from computer to computer
Viruses software written with malicious intent to cause annoyance or damage
Authentication Factors three mechanisms that provide authentication based on something
a supplicant knows, something a supplicant has, and something a supplicant is
Encryption scrambles information into an alternative form that requires a key or password
to decrypt
Public Key Encryption uses two keys: a public key that everyone can have and a private
key for only the recipient
4 Ebusiness Models B2B, B2C, C2B, C2C
Disruptive Technology A new way of doing things that initially does not meet the needs of
existing customers
Ebusiness Tools Email, IM, Podcasting, Videoconferencing, Web conferencing, Content
Management System
, Business 2.0 the next generation of internet use. A more mature, distinctive
communications platform characterized by new qualities such as collaboration and sharing, and
being free.
open source refers nito any software whose source code is made available free for any
third party to review and modify
knowledge management Involves capturing, classifying, evaluating, retrieving, and
sharing information assets in a way that provides context for effective decisions and actions
Project Management The application of knowledge, skills, tools, and techniques to project
activities to meet project requirements
System Development Life Cycle (SDLC) syThe overall process for developing
information systems from planning and analysis through implementation and maintenance
Outsourcing an arrmisangement by which one organization provides a service or services
for another organization that chooses not to perform them in-house
MIS infrastructure includes the plans for how a firm will build, deploy, use, and share its
data, processes, and MIS assets