31 terms

ITGS Chapter 9 - Business (Traditional)

Key terms for the ITGS specific scenario 'Business'. These terms relate to traditional, offline businesses, covered in chapter 9 of the textbook (www.itgstextbook.com).
STUDY
PLAY
acceptable use policy
Policy that sets out what users are and are not allowed to do with IT systems.
chip and pin
Systems designed to reduce credit card fraud by requiring the user to authenticate themselves at the point of sale.
collaborative software
Application software to let users work together on projects even if they are geographically remote.
deskilling
Reduction in the skill needed to do a job, due to technology
EFT
Transfer of money from one account to another using computer systems and networks.
Electronic Funds Transfer
Transfer of money from one account to another using computer systems and networks.
email monitoring
Technology to monitor emails sent and received, usually by employees.
employee monitoring
Technology used to monitor the work of employees using a computer system.
extranet
Content on a LAN which is available to authorised third parties.
filtering
Process of preventing access to some resources, usually web pages.
follow-the-sun working
System of moving working to different offices around the globe as the day progresses, ending work in each location as the end of the day approaches, and moving it to a new office elsewhere where the day is just beginning.
Internet monitoring
Technology to monitor Internet data sent and received, usually by employees.
intranet
Content on a LAN which is only available to members of an organisation.
key logger
Software or hardware which records all key strokes on a computer system.
keystroke monitoring
Software or hardware which records all key strokes on a computer system.
loyalty card
Card used to identify repeat customers, to allow them to accumulate reward points, and to gather data about their shopping habits for marketing purposes
macro
In application software, a set of actions which are recorded so they can be played back later.
macro viruses
Virus that takes advantage of the macro programming languages built into some software.
mail merge
The process of automatically customising a standard letter with individual names and addresses from a database.
online banking
Use of the Internet to perform tasks such as bill payment, money transfers and other banking tasks.
Point of Sale
Checkout system in a shop, usually connected to a store database and EFT system.
POS
Checkout system in a shop, usually connected to a store database and EFT system.
re-skilling
When a de-skilled user retrains, often in a technology related discipline.
remote desktop
Ability to connect to a computer, over a network, as though you were physically present at the keyboard.
reward card
Card used to identify repeat customers, to allow them to accumulate reward points, and to gather data about their shopping habits for marketing purposes
RFID
System of tags which contain data that can be read from a distance using radio waves.
self checkout
Supermarket technology that lets users scan and pay for their own goods without staff assistance.
smart shopping trolley
Shopping trolley with RFID technology to offer enhanced functionality.
targeted advertising
Use of data about customers to determine which adverts they are most likely to find useful.
telecommuting
Working away from an organisation's main office or base, using portable computers.
teleworking
Working away from an organisation's main office or base, using portable computers.