BIS Nelson Final
Attributes
(also called columns or fields) are the data elements associated with an entity
Entity
(also referred to as a table) stores information about a person, place, thing, transaction, or event
Managerial Level
(semi-structured decisions) employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change
Operational Level
(structured decisions) employees develop, control, and maintain core business activities required to run the day-to-day operations
Strategic Level
(unstructured decisions) managers develop overall business strategies, goals, and objectives as part of the company's strategic plan
Primary Reason Projects Fail
-Unclear or missing business requirements. -Skipped SDLC phases. -Changing technology. -The cost of finding errors. -Balance of the triple constraints.
Areas of Support Provided by Information Infrastructure
-backup and recovery plan -disaster recovery plan -business continuity plan
Web 2.0 Characteristics
-content sharing through open sourcing -user-contributed content -collaboration inside the organization -collaboration outside the organization
Ebusiness Tools
-email -instant messaging -contact management system -web conferencing -podcasting -videoconferencing
Challenges Facing Ebusiness
-identifying limited market segments -ensuring customer protection -managing customer trust -adhering to taxation rules
Ethical Guidelines for Information Management
-information secrecy -information governance -information compliance -information management -information property
Challenges of Business 2.0
-technology dependence -information vandalism -violations of copyright and plagiarism
Disruptive Business Technologies
1) 3D Printing 2) RFID 3) Drones 4) Robotics
Five Common Characteristics of High-Quality Information
1) Accurate 2) Complete 3) Consistent 4) Timely 5) Unique
Four Common Extended ERP Components
1) Business intelligence. 2) Customer relationship management. 3) Supply chain management. 4) Ebusiness.
Three Pressures Driving Sustainable MIS Infrastructures (Increases as a result of technological advances)
1) Carbon Emissions 2) Energy Consumption 3) Ewaste
Common Reasons Companies Outsource
1) Core Competencies 2) Financial Savings 3) Rapid Growth 4) The Internet and Globalization
Three Core Concepts of Data Warehousing
1) Data Mart 2) Data Mining 3) Information Cleansing or Scrubbing
Three Organizational Methods for Analyzing Big Data
1) Data Mining 2) Big Data Analytics 3) Data Visualization
Types of Feasibility Studies
1) Economic Feasibility 2) Operational Feasibility 3) Schedule Feasibility 4) Technical Feasibility 5) Political Feasibility 6) Legal Feasibility
Sustainable MIS Infrastructure Components
1) Grid Computing 2) Virtualization 3) Cloud computing
The Four Primary Traits of the Value of Information
1) Information Type 2) Information Timeliness 3) Information Quality 4) Information Governance
Cloud Service Delivery Models
1) Infrastructure as a Service 2) Software as a Service 3) Platform as a Service
Outsourcing Challenges: Length of Contract
1) It can be difficult to break the contract. 2) Forecasting business needs for the next several years is challenging and the contract might not meet future business needs. 3) Recreating an internal MIS department if the outsource provider fails is costly and challenging.
Outsourcing Challenges
1) Length of Contract 2) Threat to Competitive Advantage 3) Loss of Confidentiality
A Typical Supply Chain
1) Materials flow from suppliers and their upstream suppliers at all levels. 2) Materials are transformed into semifinished and finished products—the organization's own production processes. 3) Products are distributed to customers and their downstream customers at all levels.
Four Primary Reasons For Low-Quality Information
1) Online customers intentionally enter inaccurate information to protect their privacy. 2) Different systems have different information entry standards and formats. 3) Data-entry personnel enter abbreviated information to save time or erroneous information by accident. 4) Third-party and external information contains inconsistencies, inaccuracies, and errors.
Outsourcing Models
1) Onshore Outsourcing 2) Nearshore Outsourcing 3) Offshore Outsourcing
The Five Basic Supply Chain Activities
1) Plan 2) Source 3) Make 4) Deliver 5) Return
Cloud Computing Environments
1) Private Cloud 2) Public Cloud 3) Hybrid Cloud 2) Community Cloud
The Three Business Areas of Supply Chain Management
1) Procurement 2) Logistics 3) Materials Management
The Three Primary Enterprise Systems
1) Supply Chain Management 2) Customer Relationship Management 3) Enterprise Resource Planning
RFID Components
1) Tag 2) Reader 3) Computer Network
Four Common Characteristics of Big Data
1) Variety 2) Veracity 3) Volume 4) Velocity
Ebusiness Models
1. B2B 2. B2C 3. C2B 4. C2C
Managerial Decision-Making Challenges
1. Managers need to analyze large amounts of information 2. Managers must make decisions quickly 3. Managers must apply sophisticated analysis techniques, such as Porter's strategies or forecasting, to make strategic decisions
Three Areas of Information Security
1. People- Authentication and Authorization 2. Data- Prevention and Resistance 3. Attacks-Detection and Response
The Six-Step Decision-Making Process
1. Problem Identification 2. Data Collection 3. Solution Generation 4. Solution Test 5. Solution Selection 6. Solution Implementation
Backup and Recovery
Backup: Provides an exact copy of a system's information Recovery: able to get a system up and running after a crash
Example of Low-Quality Information
Completeness- numbers 1 and 2 and 6 Consistency- number 3 Accuracy- numbers 4 and 5
Core drivers of the information age
Data, Information, Business Intelligence, Knowledge
Key Areas of Technology Recovery Strategies
Hardware- servers, computers, wireless devices Software- applications such as email, payroll, Instant messaging Data Center- climate control, power supply, security Networking- wireless, LAN, fiber, cable
Business Intelligence
Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making
Outsourcing Challenges: Loss of Confidentiality
Information on pricing, products, sales, and customers can be a competitive asset and often critical for business success. Outsourcing could place confidential information in the wrong hands. Although confidentiality clauses contained in the contracts are supposed to protect the company, the potential risk and costs of a breach must be analyzed.
Outsourcing Challenges: Threat to Competitive Advantage
Many businesses view MIS as a competitive advantage and view outsourcing as a threat because the outsourcer could share the company's trade secrets.
Advanced Encryption Standard (AES)
National Institute of Standards and Technology (NIST) introduced this to keep government information secure
Information Type
Transactional: encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks Analytical: encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis tasks
Information Security
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
Data Artist
a business analytics specialist who uses visual tools to help people understand complex data
Management Information Systems (MIS)
a business function, like accounting and human resource, which moves information about people, products, and processes across the company to facilitate decision making and problem solving
Neural Network
a category of AI that attempts to emulate the way the human brain works. Neural networks analyze large quantities of information to establish patterns and characteristics when the logic or rules are unknown
Grid Computing
a collection of computers, often geographically dispersed, that are coordinated to solve a problem. A problem is broken down into pieces and distributed to many machines
Big Data
a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools
System
a collection of parts linked to achieve a common purpose
Record
a collection of related data elements
Market Share
a common external KPI, the proportion of the market that a firm captures
Network
a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate
Makerspaces
a community center that provides technology, manufacturing equipment, and educational opportunities to the public that would otherwise be inaccessible or unaffordable
Semantic Web
a component of Web 3.0 that describes things in a way that computers can understand, not about links between web pages; rather it describes the relationships between things (such as A is a part of B and Y is a member of Z) and the properties of things (size, weight, age, price)
Drive-By Hacking
a computer attack by which an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network
Competitive Click-Fraud
a computer crime in which a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking the advertiser's link
Server
a computer dedicated to providing information in response to requests
Client
a computer designed to request information from a server
Virtual Reality
a computer-simulated environment that can be a simulation of the real world or an imaginary world
Nonrepudiation
a contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions
Maker Movement
a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things
Variable
a data characteristic that stands for a value that changes or varies over time
Digital Certificate
a data file that identifies individuals or organizations online and is comparable to a digital signature
Structured Data
a defined length, type, and format and includes numbers, dates, or strings such as Customer Address.
Smart Card
a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing
Data Center
a facility used to house management information systems and associated components, such as telecommunications and storage systems
Competitive Advantage
a feature of a product or service on which customers place greater value than they do on similar offerings from competitors (ex: lower price), temporary because they can be duplicated
Entry Barriers
a feature of a product or service that customers have come to expect, and entering competitors must offer the same for survival
Primary Key
a field (or group of fields) that uniquely identifies a given record in a table
Ransomware
a form of malicious software that infects your computer and asks for money
Uplift Modeling
a form of predictive analytics for marketing campaigns that attempts to identify target markets or people who could be convinced to buy products
Pretexting
a form of social engineering in which one individual lies to obtain confidential data about another individual
Business Process Model
a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint
PERT (Program Evaluation and Review Technique) Chart
a graphical network model that depicts a project's tasks and the relationships between them
Business Process Model and Notation (BPMN)
a graphical notation that depicts the steps in a business process, provides businesses with a graphical view of the end-to-end flow of their business processes
Zombie Farm
a group of computers on which a hacker has planted zombie programs
Hashtag
a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#)
Business Strategy
a leadership plan that achieves a specific set of goals or objectives such as increasing sales, decreasing costs, entering new markets, or developing new products or services
Data Warehouse
a logical collection of information, gathered from many operational databases, that supports business analysis activities and decision-making tasks, standardizes information
Dependency
a logical relationship that exists between the project tasks, or between a project task and a milestone. PERT charts define dependency between project tasks before those tasks are scheduled
Ezine
a magazine published only in electronic form on a computer network
Balanced Scorecard
a management system, as well as a measurement system, that a firm uses to translate business strategies into executable tasks Uses- 1) The learning and growth perspective. 2) The internal business process perspective. 3) The customer perspective. 4) The financial perspective
Phishing Expedition
a masquerading attack that combines spam with spoofing
Internet
a massive network that connects computers all over the world and allows them to communicate with one another
Fuzzy Logic
a mathematical method of handling imprecise or subjective information. The basic approach is to assign values between 0 and 1 to vague or ambiguous information. Zero represents information not included, whereas 1 represents inclusion or membership.
Customer Relationship Management (CRM)
a means of managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability
Information Integrity
a measure of the quality of information
Authentication
a method for confirming users' identities
Disruptive Technology
a new way of doing things that initially does not meet the needs of existing customers, tend to open new markets and destroy old ones
Customer Service and Support (CSS)
a part of operational CRM that automates service requests, complaints, product returns, and information requests
Business Process Patent
a patent that protects a specific set of procedures for conducting a particular business activity
Enterprise Architect
a person grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business, employed to manage change and dynamically update MIS infrastructure
Stakeholder
a person or group that has an interest or concern in an organization, drive business strategies
Social Media Manager
a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand
Spear Phishing
a phishing expedition in which the emails are carefully designed to target a particular person or organization
Vishing (Voice Phishing)
a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information
Business Model
a plan that details how a company creates, delivers, and generates revenues
Foreign Key
a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables
Typosquatting
a problem that occurs when someone registers purposely misspelled variations of well-known domain names
Extraction, Transformation, and Loading (ETL)
a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse
Information Cleansing or Scrubbing
a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information
Zombie
a program that secretly takes over another computer for the purpose of launching attacks on other computers
Selfie
a self-photograph placed on a social media website
Hot Site
a separate and fully equipped facility where the company can move immediately after a disaster and resume business
Cold Site
a separate facility that does not have any computer equipment but is a place where employees can move after a disaster
Warm Site
a separate facility with computer equipment that requires installation and configuration
Instant Messaging (IMing)
a service that enables instant or real-time communication between people
Voiceprint
a set of measurable characteristics of a human voice that uniquely identifies an individual
Model
a simplified representation or abstraction of reality. Models help managers calculate risks, understand uncertainty, change variables, and manipulate time to make decisions
Spyware
a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
Intelligent Agent
a special-purpose, knowledge-based information system that accomplishes specific tasks on behalf of its users
Electronic Data Interchange (EDI)
a standard format for the electronic exchange of information between supply chain participants
Business Process
a standardized set of activities that accomplish a specific task, such as processing a customers order
Clean Computing
a subset of sustainable MIS, refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment focused on the production of environmental waste)
Unavailable
a system that is not operating and cannot be used
Vulnerability
a system weakness, such as a password that is never changed or a system left on while an employee goes to lunch, that can be exploited by a threat
Entity-Relationship Diagram (ERD)
a technique for documenting the entities and relationships in a database environment
Phishing
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
Digital Rights Management
a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
Project
a temporary activity a company undertakes to create a unique product, service, or result
Kill Switch
a trigger that enables a project manager to close the project before completion
Certificate Authority
a trusted third party, such as VeriSign, that validates user identities by means of digital certificates
Wiki
a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required
Systems Thinking
a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs with continuously gathering feedback on each part
Google Glass
a wearable computer with an optical head-mounted display (OHMD)
Real Simple Syndication (RSS)
a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format
Mashup
a website or web application that uses content from more than one source to create a completely new product or service
Virtual Workplace
a work environment that is not located in any one physical space. It is usually in a network of several places, connected through the Internet, without regard to geographic borders
The Internet of Things (IoT)
a world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention
Disaster Recovery
able to recover information or systems in the event of a catastrophic disaster such as a fire or flood
Primary Value Activities
acquires raw materials and manufacture, deliver, market, sell, and provide after-sales services
Inbound Logistics
acquires raw materials and resources and distributes them to manufacturing as required
PVA: Inbound Logistics
acquires raw materials and resources and distributes to manufacturing as required
Click-to-Talk
allow customers to click and talk with a representative via the Internet
Web-Based Self-Service Systems
allow customers to use the web to find answers to their questions or solutions to their problems
Integrations
allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems
Two-Tier ERP Architecture
allows an organization to have an on-premises ERP system along with ERP applications
Videoconference
allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards
Relational Database Management System
allows users to create, read, update, and delete data in a relational database
Hypertext Markup Language (HTML)
allows users to move from one document to another simply by clicking a hot spot or link
Social Bookmarking
allows users to share, organize, search, and manage bookmarks
Threat
an act or object that poses a danger to assets
Teergrubing
an anti-spamming approach by which the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam
Social Network
an application that connects people by matching profile information
Dynamic Catalog
an area of a website that stores information about products in a database
Outsourcing
an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house
Genetic Algorithm
an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem
Patent
an exclusive right to make, use, and sell an invention and is granted by a government to the inventor
Cloud Fabric Controller
an individual who monitors and provisions cloud resources, similar to a server administrator at an individual company
Emergency Notification Service
an infrastructure built for notifying people in the event of an emergency
Data-Driven Website
an interactive website kept constantly updated and relevant to the needs of its customers using a database
World Wide Web Consortium (WC3)
an international community that develops open standards to ensure the long-term growth of the Web
Blog (Web Log)
an online journal that allows users to post their own comments, graphics, and video
Native Advertising
an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement
Cyberwar
an organized attempt by a country's military to disrupt or destroy information and communication systems for another country
Back Order
an unfilled customer order for a product that is out of stock
Drone
an unmanned aircraft that can fly autonomously, or without a human
Porter's Five Forces Model
analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry
BPMN: Event
anything that happens during the course of a business process, circle
SVA: Technology Development
applies MIS to processes to add value
Business-to-Consumer (B2C)
applies to any business that sells its products or services directly to consumers online ex: brick-and-mortar, click-and-mortar, and pure play
Business-to-Business (B2B)
applies to businesses buying from and selling to each other over the Internet ex: medical billing service, software sales and licensing, and virtual assistant businesses
Cusumer-to Consumer (C2C)
applies to customers offering goods and services to each other on the Internet ex: eBay
Social Networking Analysis (SNA)
aps group contacts (personal and professional) identifying who knows each other and who works together
Mashup Editors
are WYSIWYG, or what you see is what you get tools. They provide a visual interface to build a mashup, often allowing the user to drag and drop data points into a web application
Intermediaries
are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together
Time Bombs
are computer viruses that wait for a specific date before executing their instructions
Expert Systems
are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems
Insiders
are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
Structured Decisions
arise when established processes offer potential solutions, frequent and repetitive, affect short-term business
Structured Query Language (SQL)
asks users to write lines of code to answer questions against a database
Information Timeliness
aspect of information that depends on the situation
Null-Valued Attribute
assigned to an attribute when no other value applies or when a value is unknown
Business Process Improvement
attempts to understand and measure the current process and make performance improvements accordingly
Sales Management CRM Systems
automate each phase of the sales process, helping individual sales representatives coordinate and organize all their accounts
Sales Force Automation (SFA)
automatically tracks all the steps in the sales process
Web 3.0
based on intelligent web applications using natural language processing, machine-based learning and reasoning, and intelligent applications, the next step in the evolution of the Internet and web applications
Benchmarks
baseline values the system seeks to attain
Example of Information
best selling product, best customer, worst selling product, worst customer
One-To-Many Relationship (1:M)
between two entities in which an instance of one entity can be related to many instances of a related entity
One-To-One Relationship (1:1)
between two entities in which an instance of one entity can be related to only one instance of a related entity
Many-To-Many Relationship (M:N)
between two entities in which an instance of one entity is related to many instances of another and one instance of the other can be related to many instances of the first entity
Web Conferencing (Webinar)
blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants
The Innovators Dilemma
book that discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders
Web Accessibility Initiative (WAI)
brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities, including auditory, cognitive, neurological, physical, speech, and visual disabilities
3D Printing (additive manufacturing)
builds-layer by layer-a three dimensional solid object from a digital model
Green Personal Computer (Green PC)
built using environment-friendly materials and designed to save energy
Core Processes
business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain
Porter's Three Generic Strategies
business strategies that are neither organization nor industry specific 1) broad cost leadership; low cost broad market (ex: walmart) 2) broad differentiation; high cost, broad market (ex: Neiman Marcus) 3) focused strategy; low or high cost, narrow market (ex: payless shoes, tiffany & co)
Reputation System
buyers post feedback on sellers
Composite Attribute
can be divided into smaller components, which represent more basic attributes that have their own meanings
Simple Attribute
cannot be broken down into a smaller component Ex: first and last name
Disaster Recovery Cost Curve
charts (1) the cost to the company of the unavailability of information and technology and (2) the cost to the company of recovering from a disaster over time
Example of Knowledge
choosing not to fire a sales representative who is under performing knowing that person is experiencing family problems, listing product that are about to expire first on the menu or creating them as a daily special to move the product
Opt In
choosing to allow permissions to incoming emails
Opt Out
choosing to deny permission to incoming emails
Collective Intelligence
collaborating and tapping into the core knowledge of all employees, partners, and customers
Search Engine Optimization (SEO)
combines art with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking
Storage Virtualization
combines multiple network storage devices so they appear to be a single storage device
Network Virtualization
combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device
Server Virtualization
combines the physical resources, such as servers, processors, and operating systems, from the applications. (This is the most common form and typically when you hear the term virtualization
Return on Investment (ROI)
common internal KPI, indicates the earning power of a producr
Information Cube
common term for the representation of multidimensional information
Asynchronous Communications
communication in which the message and the response do not occur at the same time ex: email
Synchronous Communications
communication that occurs at the same time ex: IM or chat
Corporate Social Responsibility
companies' acknowledged responsibility to society
Internet Service Provider (ISP)
company that provides access to the Internet for a monthly fee
List Generator
compile customer information from a variety of sources and segment it for different marketing campaigns
Data Dictionary
compiles all of the metadata about the data elements in the data model
Table
composed of rows and columns that represent an entity
enterprise Application Integration (EAI)
connects the plans, methods, and tools aimed at integrating separate enterprise systems
Supply Chain
consists of all parties involved, directly or indirectly in obtaining raw materials or a product
Supply Chain
consists of all parties involved, directly or indirectly, in obtaining raw materials or a product
Explicit Knowledge
consists of anything that can be documented, archived, and codified, often with the help of MIS ex: patents, trademarks, business plans, marketing research, and customer lists
Identity Theft
consists of forging someone's identity for the purpose of fraud
Open System
consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate with the system
Hardware
consists of the physical devices associated with a computer system
Data Mart
contains a subset of data warehouse information. To distinguish between data warehouses and data marts, think of data warehouses as having a more organizational focus and data marts as having a functional focus
Incident Record
contains all of the details of an incident
Information Privacy Policy
contains general principles regarding information privacy
Internet Use Policy
contains general principles to guide the proper use of the Internet
Source Code
contains instructions written by a programmer specifying the actions to be performed by computer software
User-Contributed Content
content created and updated by many users for many users ex: Wikipedia, YouTube
Dynamic Process
continuously changing and provides business solutions to ever-changing business operations
Nearshore Outsourcing
contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country.
Podcasting
converts an audio broadcast to a digital music player
Switching Costs
costs that make customers reluctant to switch to another product or service, reduces buyer power (ex: doctor)
Machine-Generated Data
created by a machine without human intervention. Includes sensor data, point-of-sale data, and web log (blog) data.
Business Continuity Plan (BCP)
creates a way for a company to recover and recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption
Virtualization
creates multiple virtual machines on a single computing device Ex: printer- is also a fax, scanner, and copier
Database Management System (DBMS)
creates, reads, updates, and deletes data in a database while controlling access and security. Managers send requests here, and the it performs the actual manipulation of the data in the database
Critical Success Factors (CSF)
crucial steps companies perform to achieve their goals and objectives and implement their strategies -create high-quality products -retain competitive advantages -reduce product costs -increase customer satisfaction -hire and retain the best business professionals
HTML 5
current version of HTML
Information
data converted into a meaning and useful context
Human-Generated Data
data that humans, in interaction with computers, generate. Includes input data, click-stream data, or gaming data.
Physical View of Information
deals with the physical storage of information on a storage device
Business Rule
defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer
Software as a Service (SaaS)
delivers applications over the cloud using a pay-per-use revenue model
Smart Grid
delivers electricity using two-way digital technology. Adds the ability to monitor, analyze, and control the transmission of power remotely.
Infrastructure as a Service (IaaS)
delivers hardware networking capabilities, including the use of servers, networking, and storage, over the cloud using a pay-per-use revenue model
Network Effect
describes how products in a network increase in value to users as the number of users increases. The more users and content managers on a wiki, the greater the network effect because more users attract more contributors, whose work attracts more users, and so on
Scalability
describes how well a system can scale up, or adapt to the increased demands of growth
Data Visualization
describes technologies that allow users to see or visualize data to transform information into a business perspective
Sustainable, or Green, MIS
describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment (environmental impact as a whole)
Information Security Plan
details how an organization will implement the information security policies
Email Privacy Policy
details the extent to which email messages may be read by others
Capacity Planning
determines future environmental infrastructure requirements to ensure high-quality system performance
Data Quality Audits
determines the accuracy and completeness of its data
Intangible Benefits
difficult to quantify or measure
Partner Relationship Management (PRM)
discovers optimal sales channels by selecting the right partners and identifying mutual customers
Disasters can...
disrupt communications, damage physical infrastructures, halt transportation, block utilities
Outbound Logistics
distributes goods and services to customers
PVA: Outbound Logistics
distributes goods and services to customers
Customer Segmentation
divides a market into categories that share similar attributes such as age, location, gender, habits, etc.
Strategic Business Processes
dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions.
Single-Tenancy
each customer or tenant must purchase and maintain an individual system
Tangible Benefits
easy to quantify and typically measured to determine the success or failure of a project
Human Resource Data in a System
employee data, promotion data, vacation data
Analytic Information
encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions. Analytical information includes transactional information along with other information such as market and industry information
Transactional Information
encompasses all the information contained within a single business process or unit of work, and its primary purpose is to support the performance of daily operational or structured decisions
Business-Critical Integrity
enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints
Onshore Outsourcing
engaging another company within the same country for services
Supply Chain Execution Systems
ensure supply chain cohesion by automating the different activities of the supply chain
Emergency Preparedness
ensures that a company is ready to respond to an emergency in an organized, timely, and effective manner
Reliability (Accuracy)
ensures that a system is functioning correctly and providing accurate information
Composite Entities
entities that exist to represent the relationship between two other entities
Dirty Data
erroneous or flawed data
SWOT analysis
evaluates an organization's, Strengths, Weaknesses, Opportunities, and Threats to identify significant influences that for for or against business strategies
Search Engine Ranking
evaluates variables that search engines use to determine where a URL appears on the list of search results
Hackers
experts in technology who use their knowledge to break into computers and computer networks, either for profit or simply for the challenge
Cardinality
expresses the specific number of instances in an entity
Predictive Analytics
extracts information from data and uses it to predict future trends and identify behavioral patterend
Data Scientist
extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information
Intrusion Detection Software (IDS)
features full-time monitoring tools that search for patterns in network traffic to identify intruders
Technology Recovery Strategies
focus specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements. details the order of importance for recovering hardware, software, data centers, and networking (or connectivity)
Robotics
focuses on creating artificial intelligence devices that can move and react to sensory input
Advanced Analytics
focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization
Logical View of Information
focuses on how individual users logically access information to meet their own particular business needs
Supplier Relationship Management (SRM)
focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects
Call Scripting Systems
gather product details and issue resolution information that can be automatically generated into a script for the representative to read to the customer
Fair Information Practices
general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy
Pay-Per-Call
generates revenue each time a user clicks a link that takes the user directly to an online agent waiting for a call
Pay-Per-Click
generates revenue each time a user clicks a link to a retailer's website.
Pay-Per-Conversation
generates revenue each time a website visitor is converted to a customer
Information Ethics
govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies)
Internet Censorship
government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens
Campaign Management System
guide users through marketing campaigns by performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis
Social Engineering
hackers use their social skills to trick people into revealing access credentials or other valuable information
Production and Materials Management ERP Components
handle production planning and execution tasks
Firewall
hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings
Content Management Systems (CMS)
help companies manage the creation, storage, editing, and publication of their website content
CRM Reporting Technologies
help organizations identify their customer across other applications
CRM Predicting Technologies
help organizations predict customer behavior
CRM Analysis Technologies
help organizations segment their customers into categories such as best and worst customers
Query-By-Example (QBE) Tool
helps users graphically design the answer to a question against a database
Serviceability
how quickly a third party can change a system to ensure it meets user needs and the terms of any contracts, including agreed levels of reliability, maintainability, or availability
Business Impact Analysis
identifies all critical business functions and the effect that a specific disaster may have on them. A business impact analysis is primarily used to ensure that a company has made the right decisions about the order of recovery priorities and strategies
Supporting the Environment: Sustainable MIS Infrastructure
identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption. Grid computing, cloud computing, and virtualization
Supporting Operations: Information MIS Infrastructure
identifies where and how important information, such as customer records, is maintained and secured. Backup, recovery, disaster recovery, and business continuity planning
Information Security Policies
identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days
Real-Time Information
immediate, up-to-date information
Digital Darwinism
implies that organizations cannot adapt to the new demands placed on them for surviving in the information age and are doomed to extinction ex: Polaroid
Streamlining
improves business process efficiencies by simplifying or eliminating unnecessary steps
Support Value Activities
include firm infrastructure, human resource management, technology development, and procurement
Materials Management
includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping. transport, distribution, and warehousing
Dynamic Information
includes data that change based on user actions
Ebusiness
includes ecommerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real-time information
Static Information
includes fixed data incapable of change in the event of a user action
Carbon Emissions
includes the carbon dioxide and carbon monoxide produced by business processes and systems
SVA: Firm Infrastructure
includes the company format or departmental structure, environment, and systems
Supporting Change: Agile MIS Infrastructure
includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals. Accessibility, availability, maintainability, potability, reliability, scalability, and usability
MIS Infrastructure
includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets. A solid one can reduce costs, improve productivity, optimize business operations, generate growth, and increase profitability
Logistics
includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain
Workflow
includes the tasks, activities, and responsibilities required to execute each step in a business process
Cyberbullying
includes threats, negative remarks, or defamatory comments transmitted through the Internet or posted on the website
Hybrid Cloud
includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability
Up-Selling
increasing the value of the sale
Knowledge Workers
individuals valued for their ability to interpret and analyze information
Decrypt
information is to decode it and is the opposite of encrypt
Intellectual Property
intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents
Enterprise Resource Planning (ERP)
integrates all departments and functions throughout an organization into a single IT system so employees can make decisions by viewing enterprisewide info about all business operations
Finance Data in a System
investment data, monetary data, reporting data
Business-Facing Processes
invisible to the external customer but essential to the effective management of the business; they include goal setting, day-to-day planning, giving performance feedback and rewards, and allocating resources
Knowledge Management (KM)
involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions
Egovernment
involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer and all branches of government
Executive Information Systems (EIS)
is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation, and insight. These decisions do not have a right or wrong answer, only efficient and effective answers
Closed Source
is any proprietary software licensed under exclusive legal right of the copyright holder
Transactional Processing System (TPS)
is the basic business system that serves the operational level (analysts) and assists in making structured decisions
Online Transaction Processing (OLTP)
is the capture of transaction and event information using technology to (1) process the information according to defined business rules, (2) store the information, and (3) update existing information to reflect the new information
Online Analytical Processing (OLAP)
is the manipulation of information to create business intelligence in support of strategic decision making
Web 2.0 (Business 2.0)
is the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free
Incident Management
is the process responsible for managing how incidents are identified and corrected
Cryptography
is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them
Adwords
keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages
Swim Lane
layout arranges the steps of a business process into a set of rows depicting the various elements
Copyright
legal protection afforded an expression of an idea, such as a song, book, or video game
Website Bookmark
locally stored URL or the address of a file or Internet page saved as a shortcut
Data Models
logical data structures that detail the relationships among data elements by using graphics or pictures
Dumpster Diving
looking through people's trash
Example of Business Intelligence
lowest sales per week compared with the economic interest rates, best selling product by month compared to sports season and city team wins and loses
Contact Management CRM System
maintains customer contact information and identifies prospective customers for future sales, using tools such as organizational charts, detailed customer notes, and supplemental sales information
Database
maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)
Human Resource Tasks Individually
maintains policies, plans, and procedures for the effective management of employees
Destructive Agents
malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
Accounting and Finance ERP Components
manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management
Operations Management Tasks Individually
manages the process of converting or transforming resources into goods or services
Elogistics
manages the transportation and storage of goods
Operations Management Data in a System
manufacturing data, distribution data, production data
Goods
material items or products that customers will buy to satisfy a want or need
Single-Valued Attribute
means having only a single value of each attribute of an entity. Ex: age
Multivalued Attribute
means having the potential to contain more than one value for an attribute Ex: education, a person can have more than one degree
Web Accessibility
means that people with disabilities, can use the web
Dynamic Scaling
means that the MIS infrastructure can be automatically scaled up or down based on requirements
Effectiveness MIS Metrics
measure the impact MIS has on business processes and activities, including customer satisfaction and customer conversion rates, focuses on how well a firm is achieving its goals and objectives
Efficiency MIS Metrics
measure the performance of MIS itself, such as throughput, transaction speed, and system availability, focuses on the extent to which a firm is using its resources in an optimal way
Metrics
measurements that evaluate results to determine whether a project is meeting its goals. Two core metrics are critical success factors and key performance indicators
Interactivity
measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement
Performance
measures how quickly a system performs a process or transaction, a key component of scalability as systems that can't scale suffer from performance issues
Information Reach
measures the number of people a firm can communicate with all over the world
Decision Support Systems (DSSs)
model information using OLAP, which provides assistance in evaluating and choosing among different courses of action
Software Customization
modifies existing software according to the business's or user's requirements
Workflow Control Systems
monitor processes to ensure tasks, activities, and responsibilities are executed as specified
Data Visualization Tools
move beyond Excel graphs and charts into sophisticated analysis techniques such as controls, instruments, maps, time-series graphs, and more
Unstructured
not defined, does not follow a specified format, and is typically free-form text such as emails, Twitter tweets, and text messages (80%)
Semi-structured Decisions
occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead a definite recommended decision
Unstructured Decisions
occur in situations in which no procedures or rules exist to guide decision makers toward the correct choice, infrequent, extremely important, long-term
Information Integrity Issues
occur when a system produces incorrect, inconsistent, or duplicate data
Bottlenecks
occur when resources reach full capacity and cannot handle any additional demands; they limit throughput and impede operations
Disintermediation
occurs when a business sells directly to the customer online and cuts out the intermediary
First-mover Advantage
occurs when a company can significantly increase its market share by being first with a new competitive advantage (ex: FedEx self service software)
Product Differentiation
occurs when a company develops unique differences in its products or services with the intent to influence demand
Personalization
occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions
Paradigm Shift
occurs when a new, radical form of business enters the market that reshapes the way companies and organizations behave
High Availability
occurs when a system is continuously operational at all times
Real-Time Communication
occurs when a system updates information at the same rate it receives it
Redundancy
occurs when a task or activity is unnecessarily repeated, for example, if both the sales department and the accounting department check customer credit
Website Personalization
occurs when a website has stored enough data about a person's likes and dislikes to fashion offers more likely to appeal to that person
Bullwhip Effect
occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain
Content Filtering
occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information
Technology Failure
occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage
Failback
occurs when the primary machine recovers and resumes operations, taking over from the secondary server
Information Inconsistency
occurs when the same data element has different values
Analysis Paralysis
occurs when the user goes into an emotional state of over-analysis (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome
Utility Computing
offers a pay-per-use revenue model similar to a metered service such as gas or electricity
Disaster Recovery as a Service (DRaaS)
offers backup services that use cloud resources to protect applications and data from disruption caused by disaster
Ethical Computer Use Policy
ontains general principles to guide computer user behavior
Pure-Play
operates on the internet only ex: Google
SWOT: O
opportunities; helpful, external -identify all significant trends along with how the organization can benefit from each, including new markets, additional customer groups, legal changes, innovative technologies, population changes, competitor issues, and so on.
Example of Data
order date, amount sold, customer number, quantity sold
Social Media Policy
outlines the corporate guidelines or principles governing employee online communications
The Child Online Protection Act (COPA)
passed to protect minors from accessing inappropriate material on the Internet
BPMN: Flow
path, dotted is between swim lanes, solid is in the same swim lane, arrow
Sales Tasks Individually
performs the function of selling goods or services
Click-and-Mortar
physical store and on the internet ex: Barnes &Noble
Brick-and-Mortar
physical store only, no internet presence ex: TJ Maxx
Ebusiness Model
plan that details how a company creates, delivers, and generates revenues on the Internet
Epolicies
policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment
Bring Your Own Device (BYOD)
policy allows employees to use their personal mobile devices and computers to access enterprise data and applications
Sales Data in a System
potential customer data, sales report data, commission data, customer support data
Infographics
present the results of data analysis, displaying the patterns, relationships, and trends in a graphical format
Distributed Computing
processes and manages algorithms across many machines in a computing environment
Sustaining Technology
produces an improved product customers are eager to buy, provide us with better, faster, and cheaper product in established markets ex: faster car, larger hard drive
Visualization
produces graphical displays of patterns and complex relationships in large amounts of data
Public Cloud
promotes massive, global, and industry-wide applications offered to the general public
RFID's Electronic Product Code (RFID EPC)
promotes serialization or the ability to track individual items by using the unique serial number associated with each RFID tag
PVA: Marketing and Sales
promotes, prices, and sells products to customers
Marketing Data in a System
promotion data, sales data, advertising data
Enterprise Systems
provide enterprise support and data access for a firm's operations and business processes
World Wide Web
provides access to internet information through documents, including text, graphics, and audit, and video files that use a special formatting language called HTML
PVA: Service
provides customer support after the sale of goods and services
Metadata
provides details about data ex: for an image could include its size, resolution, and date created
SVA: Human Resource Management
provides employee training, hiring, and compensation
Cradle to Grave
provides logistics support throughout the entire system or life of the product
Real-Time Systems
provides real-time information in response to requests
Employee Relationship Management (ERM)
provides web-based self-service tools that streamline and automate the human resources department
SVA: Procurement
purchases inputs such as raw materials, resources, equipment, and supplies
Key Performance Indicators (KPI)
quantifiable metrics a company uses to evaluate progress toward critical success factors (more specific than CSFs) -turnover rates of employees -percentage of help desk calls answered in the first minute -number of product returns -number of new customers -average customer spending
Workplace MIS Monitoring
racks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed
Data
raw facts that describe the characteristics of an event or object
Accounting Tasks Individually
records, measures, and reports monetary transactions
Long Tail
referring to the tail of a typical sales curve. This strategy demonstrates how niche products can have viable and profitable business models when selling via ebusiness
Downtime
refers to a period of time when a system is unavailable
Open Source
refers to any software whose source code is made available free (not on a fee or licensing basis as in ebusiness) for any third party to review and modify
Machine to Machine (M2M)
refers to devices that connect directly to other devices
Ewaste
refers to discarded, obsolete, or broken electronic devices
Maintainability
refers to how quickly a system can transform to support environmental changes, helps to measure how quickly and effectively a system can be changed or repaired after a failure.
Portability
refers to the ability of an application to operate on different devices or software platforms, such as different operating systems
Cybermediation
refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites
Information Richness
refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information
Information Granularity
refers to the extent of detail within the information (fine and detailed or coarse and abstract)
Granularity
refers to the level of detail in the model or the decision-making process
Data Governance
refers to the overall management of the availability, usability, integrity, and security of company data
Sustainable MIS Disposal
refers to the safe disposal of MIS assets at the end of their life cycle, ensures that ewaste does not end up in landfills
Availability
refers to the time frames when the system is operational
Accessibility
refers to the varying levels that define what a user can access, view, or perform when operating a system
Social Media
refers to websites that rely on user participation and user-contributed content ex: Facebook, YouTube, and Digg
As-Is Process Models
represent the current state of the operation that has been mapped, without any specific improvements or changes to existing processes
Capacity
represents the maximum throughput a system can deliver; for example, the capacity of a hard drive represents its size or volume
Acceptable Use Policy (AUP)
requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet
Multifactor Authentication
requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)
Two-Factor Authentication
requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)
Pharming
reroutes requests for legitimate websites to false websites
Chief Information Officer (CIO)
responsible for 1) overseeing all uses of MIS and 2) ensuring that MIS strategically aligns with business goals and objectives
Chief Knowledge Officer (CKO)
responsible for collecting, maintaining, and distributing company knowledge
Chief Privacy Officer (CPO)
responsible for ensuring the ethical and legal use of information within a company
Chief Security Officer (CSO)
responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses
Chief Technology Officer (CTO)
responsible for ensuring the speed, accuracy, availability, and reliability of the MIS
Customer-Facing Processes
result in a product or service received by an organization's external customer. They include fulfilling orders, communicating with customers, and sending out bills and marketing information
Upcycle
reuses or refurbishes ewaste and creates a new product
Loyalty Programs
reward customers based on their spending, reduce buyer power
Relational Integrity Constraints
rules that enforce basic and fundamental information-based constraints
Integrity Constraints
rules that help ensure the quality of information
Antivirus Software
scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware
Taxonomy
scientific classification of organisms into groups based on similarities of structure or origin
Encryption
scrambles information into an alternative form that requires a key or password to decrypt
Cross-Selling
selling additional products or services to an existing customer
Managerial Business Processes
semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements
Mail Bomb
sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning
Forward Integration
sends information entered into a given system automatically to all downstream systems and processes
Backward Integration
sends information entered into a given system automatically to all upstream systems and processes
Community Cloud
serves a specific community with common business models, security requirements, and compliance considerations
Private Cloud
serves only one customer or organization and can be located on the customer's premises or off the customer's premises
Application Programming Interface (API)
set of routines, protocols, and tools for building software applications
Collaboration System
set of tools that supports the work of teams or groups by facilitating the sharing and flow of information
Middleware
several types of software that sit between and provide connectivity for two or more software applications
To-Be Process Models
show the results of applying change improvement opportunities to the current (As-Is) process model
Folksonomy
similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system
Gantt Chart
simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally. A Gantt chart works well for representing the project schedule. It also shows actual progress of tasks against the planned duration.
Anti-Spam Policy
simply states that email users will not send unsolicited emails (or spam)
Artificial Intelligence (AI)
simulates human thinking and behavior, such as the ability to reason and learn. Its ultimate goal is to build a system that can mimic human intelligence
Multi-Tenancy
single instance of a system serves multiple customers (in the cloud)
Tokens
small electronic devices that change user passwords automatically
Counterfeit Software
software that is manufactured to look like the real thing and sold as such
Shopping Bot
software that will search several retailer websites and provide a comparison of each retailer's offerings, including price and availability
Adware
software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
Virus
software written with malicious intent to cause annoyance or damage
Crowdfunding
sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet
Tags
specific keywords or phrases incorporated into website content for means of classification or taxonomy
Failover
specific type of fault tolerance, occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to the secondary server or backup server. This is a high-speed and high-cost method of backup and recovery
Worm
spreads itself not only from file to file but also from computer to computer
Operational Business Processes
static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes
Employee Monitoring Policy
stating explicitly how, when, and where the company monitors its employees
Reintermediation
steps are added to the value chain as new players find ways to add value to the business process
Relational Database Model
stores information in the form of logically related two-dimensional tables
Cloud Computing
stores, manages, and processes data and applications over the Internet rather than on a personal computer or server
Common Company Structure
strategic managerial operational
SWOT: S
strengths; helpful, internal -identify all key strengths associated with the competitive advantage including cost advantages, new and/or innovative services, special expertise and/or experience, proven market leader, improved marketing campaigns, and so on.
Emergency
sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property
Typical Supply Chain
suppliers---> company ---> customers
Analytical CRM
supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers
Marketing Tasks Individually
supports sales by planning, pricing, and promoting goods or services
Knowledge Management System (KMS)
supports the capture, organization, and dissemination of knowledge (i.e., know-how) throughout an organization
Platform as a Service (PaaS)
supports the deployment of entire systems, including hardware, networking, and applications, using a pay-per-use revenue model
Operational CRM
supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers
Enterprise Application Integration (EAI) Middleware
takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors
Physical Security
tangible protection such as alarms, guards, fireproof doors, fences, and vaults
Opportunity Management CRM Systems
target sales opportunities by finding new customers or companies for future sales
BPMN: Activity
task in a business process where any work that is being performed in a process takes place, rectangle
Services
tasks people perform that customers will buy to satisfy a want or need
Web 1.0 (Business 1.0)
term to refer to the World Wide Web during its first few years of operation between 1991 and 2003
Fault Tolerance
the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service
Ediscovery
the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
Mass Customization
the ability of an organization to tailor its products or services to the customers' specifications ex: M&M's that say "Marry Me"
Mobile Business
the ability to purchase goods and services through a wireless Internet-enabled device
Supply Chain Visibility
the ability to view all areas up and down the supply chain in real time
Click-Fraud
the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser
Business Process Modeling (Mapping)
the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence
Universal Resource Locator (URL)
the address of a file or resource on the web
Customer Order Cycle Time
the agreed upon time between the purchase of a product and the delivery of the product
Energy Consumption
the amount of energy consumed by business processes and systems
Business Process Reengineering (BPR)
the analysis and redesign of workflow within and between enterprises
Confidentiality
the assurance that messages and information remain available only to those authorized to view them
Eprocurement
the business-to-business (B2B) online purchase and sale of supplies and services
Ecommerce
the buying and selling of goods and services over the Internet
Social Tagging
the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search
Fact
the confirmation or validation of an event or object
Usability
the degree to which a system is easy to learn and efficient and satisfying to use
Information Redundancy
the duplication of data, or the storage of the same data in multiple places
Cybervandalism
the electronic defacing of an existing website
Clickstream Data
the exact pattern of a consumer's navigation through a site
Extended ERP Components
the extra components that meet organizational needs not covered by the core components and primarily focus on external operations
Inventory Turnover
the frequency of inventory replacement
Biometrics
the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
Feedback
the information that returns to its original transmitter and modifies the transmitter's actions
Application Integration
the integration of a company's existing management information systems
Data Integration
the integration of data from multiple sources, which provides a unified view of all data
Hypertext Transport Protocol (HTTP)
the internet protocol web browsers use to request and display web pages using universal resource locators (URL)
Tacit Knowledge
the knowledge contained in people's heads
Supply Chain Management (SCM)
the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability
Feasibility
the measure of the tangible and intangible benefits of an information system
Best Practices
the most successful solutions or problem-solving methods that have been developed by a specific organization or industry
Source Documents
the original transaction record. Source documents for a payroll system can include time sheets, wage rates, and employee benefit reports
Content Creator
the person responsible for creating the original website content
Content Editor
the person responsible for updating and maintaining website content
5-forces: Threat of New Entrants
the power of competitors to enter a market, high- easy to enter market, low- significant entry barriers
5-forces: Rivalry among Existing Competition
the power of competitors, high- competition is fierce, low- complacent competitors
5-forces: Buyer Power
the power of customers to drive down prices (number of customers, sensitivity to price, size of orders, differences between competitors, and availability of substitutes)
5-forces: Threat of Substitute Products or Services
the power of customers to purchase alternatives, high- many alternatives, low- few alternatives
5-forces: Supplier Power
the power of suppliers to drive up prices of materials (number of suppliers, size of suppliers, uniqueness of services, and availability of substitute products)
Social Networking
the practice of expanding your business and/or social contacts by constructing a personal network
Master Data Management (MDM)
the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems
Microblogging
the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages ex: Twitter
Ethics
the principles and standards that guide our behavior toward other people
Production
the process by which a business processes raw materials or converts them into a finished product for its goods or services
Data Mining
the process of analyzing data to extract information not offered by the raw data alone
Automation
the process of computerizing manual tasks, making them more efficient and effective, and dramatically lowering operational cost
Benchmarking
the process of continuously measuring system result, comparing those results to optimal system performance, and identifying steps and procedures to improve system performance
Competitive Intelligence
the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed
Social Media Monitoring
the process of monitoring and responding to what is being said about a company, individual, product, or brand
Authorization
the process of providing a user with permission, including access levels and abilities such as file access, hours of access, and amount of allocated storage space
Procurement
the purchasing of goods and services to meet the needs of the supply chain
Productivity
the rate at which goods and services are produced based on total output given total inputs
Privacy
the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent
Analytics
the science of fact-based decision making
Critical Path
the sequence of activities that determine the earliest date by which the project can be completed
Software
the set of instructions the hardware executes to carry out specific tasks
Knowledge
the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources
Data Element (Data Field)
the smallest or basic unit of information. Can include a customer's name, address, email, discount rate, preferred shipping method, product name, quantity ordered, and so on.
Cloud Fabric
the software that makes possible the benefits of cloud computing, such as multi-tenancy
Website Name Stealing
the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
Inventory Cycle Time
the time it takes to manufacture a product and deliver it to the retailer
Cycle TIme
the time required to process an order, is a common KPI for operations management
Core ERP Components
the traditional components included in most ERP systems and primarily focus on internal operations
Single-Factor Authentication
the traditional security process, which requires a user name and password
Pirated Software
the unauthorized use, duplication, distribution, or sale of copyrighted software
Cyberterrorism
the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals
Eintegration
the use of the Internet to provide customers with the ability to gain personalized information by querying corporate databases and their information sources
Augmented Reality
the viewing of the physical world with computer-generated layers of information added to it
SWOT: T
threats; harmful, external -identify all threats or risks detrimental to your organization, including new market entrants, substitute products, employee turnover, differentiating products, shrinking markets, adverse changes in regulations, economic shifts, and so on.
Business Intelligence Dashboards
track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls, allowing users to manipulate data for analysis
Human Resources ERP Components
track employee information, including payroll, benefits, compensation, and performance assessment
Digital Dashboard
tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs
Finance Tasks Individually
tracks strategic financial issues, including money, banking, credit, investments and assets
Accounting Data in a System
transactional data, purchasing data, payroll data, tax data
PVA: Operations
transforms raw materials or inputs into goods and services
Incidents
unplanned interruption of a service
Administrator Access
unrestricted access to the entire system, can perform functions such as resetting passwords, deleting accounts, and shutting down entire systems
Spam
unsolicited email
Data-Mining Tools
use a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making
Supply Chain Planning Systems
use advanced mathematical algorithms to improve the flow and efficiency of the supply chain while reducing inventory
BPMN: Gateway
used to control the flow of a process, joining paths, diamond
Computer-Aided Design/Computer-Aided Manufacturing (CAD/CAM)
used to create the digital designs and then manufacture the products
Static Process
uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously.
Pharming Attack
uses a zombie farm, often by an organized crime association, to launch a massive phishing attack
Radio-Frequency Identification (RFID)
uses electronic tags and labels to identify objects wirelessly over short distances
Haptic Interface
uses technology allowing humans to interact with a computer through bodily sensations and movements—for example, a cell phone vibrating in your pocket
In-Sourcing (in-house development)
uses the professional expertise within an organization to develop and maintain its information technology systems
Public Key Encryption (PKE)
uses two keys: a public key that everyone can have and a private key for only the recipient
Offshore Outsourcing
using organizations from developing countries to write code and develop systems. In this type of outsourcing the country is geographically far away.
Intelligent Systems
various commercial applications of artificial intelligence. They include sensors, software, and devices that emulate and enhance human capabilities, learn or understand from experience, make sense of ambiguous or contradictory information, and even use reasoning to solve problems and make decisions effectively
Value Chain Analysis
views a firm as a series of business processes, each of which adds value to the product or service
Dot-com
was the original term for a company operating on the Internet
SWOT: W
weaknesses; harmful, internal -identify all key areas that require improvement. Weaknesses focus on the absence of certain strengths, including absence of an Internet marketing plan, damaged reputation, problem areas for service, outdated technology, employee issues, and so on
Search Engine
website software that finds other pages based on keyword matching similar to Google
Cloud Bursting
when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for peak load requirements, ensuring that a sudden spike in usage does not result in poor performance or system crashes
Information Age
when infinite quantities of facts are widely available to anyone who can use a computer
Contact Center (call center)
where customer service representatives answer customer inquires and solve problems, usually by email, chat, or phone
Moore's Law
which refers to the computer chip performance per dollar doubling every 18 months, MIS equipment can be bought at higher amounts at lower costs
Crowdsourcing
wisdom of the crowd