โจทย์ จงตอบคำถำมต่ อไปนีล้ งในสมุดคำตอบ 1 ข้อมูล (data) และ สารสนเทศ (information) มีความแตกต่างกันอย่างไร? (3 คะแนน) 2 ระบบ interorganizational system คืออะไร จงอธิบาย? (3 คะแนน) 3 ระบบ enterprise information system คืออะไร จงอธิบาย? (3 คะแนน) 4 Internet คืออะไร จงอธิบาย? (3 คะแนน) 5 Indexing agents คืออะไร จงอธิบาย? (3 คะแนน) 6 Intranet คืออะไร จงอธิบาย? (3 คะแนน) 7 E-learning คืออะไร จงอธิบาย? (3 คะแนน) 8 Cybermalls คืออะไร จงอธิ บาย? (3 คะแนน) 9 Viral marketing คืออะไร จงอธิบาย? (3 คะแนน) 10 Hotspot zone คืออะไร จงอธิบาย? (3 คะแนน) 11 Voice portals คืออะไร จงอธิบาย? (3 คะแนน) 12 Product life cycle management คืออะไร จงอธิบาย? (5 คะแนน) 13 ฟังก์ชนั และประโยชน์ของ SCM คืออะไร จงอธิบาย? (5 คะแนน) 14 ERP คืออะไร จงอธิบาย? (3 คะแนน) 15 ความแตกต่างระหว่าง tacit knowledge กับ explicit knowledge คืออะไร จงอธิบาย (5 คะแนน) 16 Clickstream data คืออะไร จงอธิบาย? (3 คะแนน) 17 Semantic Web คืออะไร จงอธิบาย? (3 คะแนน) 18 จงอธิ บายถึงขั้นตอนทั้งสี่ ที่ใช้วางแผน IT (5 คะแนน) 19 จงอธิบายถึงแนวทางของ Total Cost of Ownership (3 คะแนน) 20 อะไรคือความแตกต่างระหว่าง vulnerability และ exposure (5 คะแนน) พนม เพชรจตุพร เฉลย 1. What is the difference between data and information? Is there a difference? Data items refer to an elementary description of things, events, activities, and transactions that are recorded, classified and stored, but not organized to convey any specific meaning. Information is data that have been organized so that they have meaning and value to the recipient. 2. What are interorganizational systems? Some information systems connect two or more organizations. They are referred to as interorganizational information systems (IOSs). For example, the worldwide airline reservation system is composed of several systems belonging to different airlines. Of these, American Airlines’ SABRE system is the largest; thousands of travel agents and hundreds of airlines are connected to it. Such systems are common among business partners. Those that support international or global operations may be especially complex. Interorganizational information systems play a major role in ecommerce, as well as in supply chain management support. 3. What are enterprise information systems? While a departmental information system is usually related to a functional area, other information systems serve several departments or the entire enterprise. These information systems together with the departmental applications comprise the enterprisewide information system (EIS). One of the most popular enterprise applications is enterprise resources planning (ERP), which enables companies to plan and manage the resources of an entire enterprise. ERP systems present a relatively new model of enterprisewide computing. 4. What is the Internet? Internet is a global network of computer networks. It links the computing resources of business, government and educational institutions using a common computer communication protocol, (TCP/IP). 5. What are Indexing agents? Indexing agents can carry out a massive autonomous search of the web on behalf of a user or, more commonly of a search engine like Google, Hotbot or AltaVista. 6. What is an Intranet? An Intranet (internal Web) is a secure Web based network designed to serve the internal informational needs of a company. 7. What is e-learning? E-learning refers to learning supported by the Web. It can be done inside classrooms; it can be done as a support to conventional teaching, such as when students work on the Web at home or in the classroom. It also can be done in virtual classrooms, in which the entire coursework is done online and classes do not meet face-to-face, and then it is a part of distance learning. 8. What are cybermalls? An electronic mall, also known as a cybermall or emall, is a collection of individual shops under one Internet address. The basic idea of an electronic mall is the same as that of a regular shopping mall—to provide a one-stop shopping place that offers many products and services 9. What is viral marketing? Viral marketing refers to online word-of-mouth marketing. The main idea in viral marketing is to have people forward messages to friends, asking them, for example, to “check this out.” For example, a marketer can distribute a small game program, which comes embedded with a sponsor’s e-mail. By releasing a few thousand copies, vendors hope to reach many more thousands. Word-of-mouth marketing has been used for generations, but its speed and reach are multiplied many-fold by the Internet. Viral marketing is one of the new models being used to build brand awareness at a minimal cost (e.g., see alladvantage.com). It has long been a favorite strategy of online advertisers pushing youth-oriented products. 10. What is a hotspot zone? A wireless access point provides service to a number of users within a small geographical perimeter (up to a couple hundred feet), known as a “hot spot” or hotspot zone. Such hotspot zones are found at airports, hotels, restaurants, and in stores. For instance, StarBucks has hotspot zones in many of its locations. Panera Bread Company has added hotspots in many of its restaurants in St. Louis, Missouri, where Panera is headquartered. The addition of hotspots is a marketing tactic aimed at attracting customers. 11. What are voice portals? A voice portal is a Web site with an audio interface. Voice portals are not really Web sites in the normal sense because they are accessed through a standard or a cell telephone. A certain phone number connects you to a participating Web site where you can request information verbally. The system finds the information, translates it into a computer-generated voice reply, and tells you what you want to know. Several of these new sites are in operation. 12. What is product life cycle management? Product lifecycle management (PLM) is a business strategy that enables manufacturers to control and share product-related data as part of product design and development efforts and in support of supply chain operations. In PLM, Webbased and other new technologies are applied to product development to automate its collaborative aspects, which even within a given organization can prove tedious and time-consuming. 13. What are the functions of the SCM and benefits? The function of Supply chain Management (SCM) is to plan, organize, and coordinate all the supply chain’s activities. Today the concept of SCM refers to a total systems approach to managing the entire supply chain. The goals of modern SCM are to reduce uncertainty and risks in the supply chain, thereby positively affecting inventory levels, cycle time, business processes, and customer service. All these benefits contribute to increased profitability and competitiveness. The benefits of supply chain management have long been recognized both in business and in the military. 14. What is ERP? Enterprise Resource Planning (ERP) is a process of planning and managing all resources and their use in the entire enterprise. It promises benefits ranging from increased efficiency to improved quality, productivity, and profitability. 15. What is the difference between tacit and explicit knowledge? Explicit knowledge deals with more objective, rational, and technical knowledge (data, policies, procedures, software, documents, etc.). Tacit knowledge is usually in the domain of subjective, cognitive, and experiential learning; it is highly personal and difficult to formalize. Explicit knowledge is the policies, procedural guides, white papers, reports, designs, products, strategies, goals, mission, and core competencies of the enterprise and the information technology infrastructure. It is the knowledge that has been codified (documented) in a form that can be distributed to others or transformed into a process or strategy without requiring interpersonal interaction. For example, a description of how to process a job application would be documented in a firm’s human resources policy manual. Explicit knowledge has also been called leaky knowledge because of the ease with which it can leave an individual, document, or the organization, after it has been documented. Moreover, there is a simple relationship between the codification of knowledge and the costs of its transfer: the more than knowledge is made explicit, the more economically it can be transferred. Tacit knowledge is the cumulative store of the experiences, mental maps, insights, acumen, expertise, know-how, trade secrets, skill sets, understanding, and learning that an organization has, as well as the organizational culture that has embedded in it the past and present experiences of the organization’s people, processes, and values. Tacit knowledge, also referred to as embedded knowledge, is usually either localized within the brain of an individual or embedded in the group interactions within a department or a branch office. Tacit knowledge typically involves expertise or high skill levels. It is generally slow and costly to transfer and can be plagued by ambiguity. 16. What is Clickstream data? Clickstream data are those that occur inside the Web environment, when customers visit a Web site. They provide a trail of the users’ activities in the Web site, including user behavior and browsing patterns. By looking at clickstream data, an etailer can find out such things as which promotions are effective and which population segments are interested in specific products. According to Inmon (2001), clickstream data can reveal information to answer questions such as the following: What goods has the customer looked at or purchased? What items did the customer buy in conjunction with other items? What ads and promotion were effective? Which were ineffective? Are certain products too hard to find? Are certain products too expensive? Is there a substitute product that the customers find first? 17. What is a semantic Web? One of the major problems of the Web is the information overload, which is growing rapidly with time. Software and search agents are helpful, but they cannot understand today words that have multiple meanings. Meaning depends on content, context, graphics and even positioning on a Web page. The proposed solution is known as the semantic Web. It is an extension of the current Web, in which information is given a well-defined meaning, better enabling computers and people to work in cooperation. The technology behind the semantic Web is based in part on NLP, on XML presentation, and new technologies such as resource description framework (RDF). The semantic Web is expected to facilitate search, interoperability, and the composition of complex applications. It is an attempt to make the Web more homogenous, more data-like, and more amenable to computer understanding. If Web pages contained their own semantics, then software agents could conduct smarter searches. 18 Describe the four stages involved in IT planning. Strategic IT planning establishes the relationship between the overall organizational plan and the IT plan. Information requirements analysis identifies broad, organizational information requirements to establish a strategic information architecture that can be used to direct specific application development. Resource allocation, allocates both IT application development resources and operational resources. Project planning, develops a plan that outlines schedules and resource requirements for specific information systems projects. 19. Discuss the Total Cost of Ownership approach. An interesting approach for IT cost evaluation is the total cost of ownership (TCO). TCO is a formula for calculating the cost of owning, operating, and controlling an IT system, even one as simple as a PC. The cost includes acquisition cost (hardware and software), operations cost (maintenance, training, operations, evaluation, technical support, installation, downtime, auditing, viruses damage, and power consumption), and control cost (standardization, security, central services). 20 What is the distinction between vulnerability and exposure? A universal vulnerability is a state in a computing system (or set of systems) which either: allows an attacker to execute commands as another user; allows an attacker to access data that is contrary to the specified access restrictions for that data; allows an attacker to pose as another entity; or allows an attacker to conduct a denial of service. An exposure is a state in a computing system (or set of systems) which is not a universal vulnerability, but either: allows an attacker to conduct information gathering activities; allows an attacker to hide activities; includes a capability that behaves as expected, but can be easily compromised; is a primary point of entry that an attacker may attempt to use to gain access to the system or data; and is considered a problem according to some reasonable security policy.