Key Terms Ch.5-8 - Brett Fieser CIS-461 Key Terms Test 2...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Brett Fieser CIS-461 Key Terms Test 2 3/26/2012 1. Acceptable use policy — defines acceptable uses of the firm’s information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet, and specifies consequences for noncompliance. 2. Advertising revenue model — A business model designed to focus around advertising. 3. Affiliate revenue model— seeks to drive a high volume of traffic to one site 4. Agent-based modeling — applications that have been designed to follow simple rules for interaction. 5. Analytical CRM — customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance. 6. Antivirus software — software designed to detect, and often eliminate, computer viruses from an information system. 7. Application Controls - specific activities that control a part of an application. 8. Artificial intelligence (AI) — the effort to develop computer-based systems that can behave like humans, with the ability to learn languages, accomplish physical tasks, use a perceptual apparatus, and emulate human expertise and decision making. 9. Augmented reality— live, direct or indirect, view of a physical, real-world environment whose elements are augmented by computer-generated sensory. 10. Authentication — the ability of each party in a transaction to ascertain the identity of the other party. 11. Backward chaining — a strategy for searching the rule base in an expert system that acts like a problem solver by beginning with the hypothesis and seeking out more information until the hypothesis is either proved or disproved. 12. Behavioral marketing— technologies and techniques used by online website publishers and advertisers which allows them to increase the effectiveness of their campaigns. 13. Biometric authentication — technology for authenticating system users that compares a person’s unique characteristics, such as fingerprints, face, or retinal image, against a stored set profile of these characteristics.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
14. Botnet — a group of computers that have been infected with bot malware without users’ knowledge, enabling a hacker to use the amassed resources of the computers to launch distributed denial-of-service attacks, phishing campaigns, or spam. 15. Bugs — A mistake or flaw in an application or game. 16. Bullwhip effect — distortion of information about the demand for a product as it passes form one entity to the next across the supply chain. 17. Business continuity planning — an organization's exposure to internal and external threats and synthesizes hard and soft assets to provide effective prevention and recovery for the organization. 18.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/30/2012 for the course CIS 461 taught by Professor Barrier during the Spring '10 term at Missouri State University-Springfield.

Page1 / 11

Key Terms Ch.5-8 - Brett Fieser CIS-461 Key Terms Test 2...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online