C724 (Information Systems Management) - (EDITED)
Open System Interconnection (OSI) Model
- International standard that governs or guides the development of data communication protocols. - Data is broken down into packets - Methodology for sending data packets - 7 layers are: application, presentation, session, transport, network, data link, and physical.
Wireless networks
1) Satellite •Global Positioning System •Satellite radio •Provides geolocation and time information to a GPS receiver anywhere on earth 2) Connection to the Internet -Wireless (WiFi) •Wi-Fiprovides high-speed access to the internet. •Lets you connect one device to another without the cables. •Separate from theInternet. •IEEE802.11 protocol, WPA (Wi-Fi Protected Access) 2 next generation Wi-Fi security 3) Bluetooth Network •Used to connect devices without using cables. •Wireless technology standard used to exchange data over short distances-30 feet 4) Radio Frequency Identification Device RFID •Electromagnetic fields, tiny radio transporter, RFID reader devise
The Three Norms in Normalization
1NF, 2NF, 3NF
3G Networks
384 kbps speed
Environments
A CASE software that combines tools and workbenches to support the entire system development life cycle (SDLC); the most common CASE tool.
Digital Millennium Copyright Act (DMCA)
A United States copyright law created to prosecute the production and dissemination of technology, devices, or services that control access to copyrighted works.
Black Hat
A black hat hacker is a hacker who violates computer security for personal gain or maliciousness. Ex: •Hacktivist •Cyber criminal
Analytics as a Service (AaaS)
A cloud software service
Object-Oriented Database
A database that is designed to store mixed media, as opposed to tables in relational databases.
Data Integration Service
A depository of extracted business environment data.
Intrusion Detection System (IDS)
A device or software application that monitors a network or systems for malicious activity or policy violations.
Unified Modeling Language (UML)
A general-purpose modeling language that helps visualize systems through diagrams.
Data Manipulation Language
A language that allows users to easily modify the data in a database.
Classical Management Model
A management practice that focuses on productivity; focuses on more systematic and predictable issues.
Behavioral Management Model
A management practice that focuses on the employees' human needs; focuses on less systematic and predictable issues.
Hertz
A measurement of frequency
System on a Chip (SoC)
A modern microprocessor that contain the CPU, memory, and peripheral interfaces; a miniature computer; an example is the Raspberry Pi.
Core Router
A more powerful router that is used to optimize high volume transmissions; aggregate data from business and transmit the data directly to the Internet backbone.
Bus network
A network in which all network devices are connected to a common backbone that serves as a shared communications medium. Inexpensive but can have excess traffic.
Passive Tags
A passive tag is an RFID tag that does not contain a battery; the power is supplied by the reader.
Workstation
A powerful computer system that can handle intensive mathematical operations; often used by engineers.
Mainframe Computer
A powerful computer that can perform quick processing.
Private Industrial Network
A single organization that controls the construction and maintenance of relationships for a relatively small number of other organizations.
Information system
A system of people and computers that processes information. Comprised of: Hardware: Physical IT devices Software People Network: exchange data and information (telecommunications) Data Processes: (taking orders, computer maintenance schedule)
Executive information system
A system that facilitates and supports senior managers to make decisions to meet the strategic goals of the organization. Also known as Executive Support Systems (ESS). Data includes internal data from enterprise applications, external data from financial, industry, and trade databases, and drill-down capabilities that enable the user to obtain additional, specific information. Potentially digital dashboard.
Post Office Protocol (POP)
A telecommunication protocol that is used to retrieve email from a mail server.
Dumb Terminal/Thin Client
A terminal that depends on the host computer for its processing power
Next-generation firewall (NGFW)
A traditional firewall typically provides stateful inspection of incoming and outgoing network traffic, a next-generation firewall includes additional features like application awareness and control, integrated intrusion prevention, and cloud-delivered threat intelligence.
Wi-Fi Protected Access (WPA)
A wireless (tunneling) encryption protocol that provides secure data transmission over an insecure network.
Java
An open-standard software language used for client-server internal applications.
Elements of Decision Theory
Acts, events, outcomes, and payoffs.
Database provided as-a-service (Cloud Database)
Advantages: More flexible, available and scalable. Data can be stored in multiple locations. Disadvantages: More expensive, security. Larger organizations maintain their own cloud-based database.
Network Address Translation (NAT)
Allows private users to redefine network addresses to assign their own addresses.
4G Networks
Also called long-term evolution (LTE), these networks offer speeds of 100,000 kpbs in the Ultra High Frequency band; offers voice, data, and video.
White Hat
An authorized and ethical computer hacker
Electronic Data Interchange (EDI)
An automatic electronic exchange of data and documents from one computer system to another through a standardized messaging format that does not require human intervention.
Scrum software development methodology
An incremental form of agile software development that recognizes that customer needs and wants can change throughout the project. Unexpected changes and challenges can be quickly addressed. Team members are often located within the end user's facility, regularly communicating with team members and the customer.
File Transfer Protocol (FTP)
An insecure method used to transfer files from one computer to another.
UNIX
An operating system designed to code computer instructions in a mainframe environment.
System Development Life Cycle (SDLC)
Analysis Phase 1. Identify problems, root cause, opportunities, and objectives 2. Determining information requirements (most important) 3. Analyzing system needs and develop a solution Design Phase 4. Designing the recommended system 5. Developing and documenting software Implementation Phase 6. Testing and maintaining the system 7. Implementing and evaluating the system
Low-Level Programming Language
Basic programming languages that used machine language instruction; they are specific to the hardware and lack portability.
Methods for Increasing User Adoption and Reducing Costs
Benchmarking, usability testing, user communication, internal user groups, planning, and leveraging existing resources; six in total.
Bridges
Bridges in network topologies are used to connect or link separate networks together, but bridges do not have data switching capability. Example: a LAN network in which some PCs are connected via Ethernet, while others are connected via wireless routers.
System-Level Security
Consists of the architecture (layers), policy, and process levels.
Hybrid clouds
Cloud operations that have elements of both public and private clouds. Cloud computing relies on shared resources to achieve economies of scale among users through the concept of shared services and a converged infrastructure.
Development methodologies that allow for the reuse of objects
Component-based development and object-oriented development
Gray Hat
Computer hacker with the skills and intent to help organizations protect their networks and systems from others, but whose services may come at a price
Hypervisor (or virtual machine monitor, VMM, virtualizer)
Computer software, firmware or hardware that creates and runs virtual machines.
Business Intelligence
Consists of databases, data warehouses, and analytics; helps business gain a competitive advantage; common functionalities include measurements, analytics, reporting, collaboration, and knowledge management; provides real-time, relevant, and user-customized information that is easily shared.
Virtual Network
Create peer-to-peer connections between computers.
Analytics Services
Creates analytical databases.
hypervisor
Creates and runs virtual machines. A computer on which a hypervisor runs one or more virtual machines is called a host machine, and each virtual machine is called a guest machine. User can perform any task on a virtual machine, scalable.
Entity
Data components have various properties (known as attributes), and relate to each other in various ways (known as relationships )
Data in Motion
Data is in the RAM.
Associations
Data that are linked to a specific event, such as how frequently customers purchase jelly when they purchase peanut butter.
Direct Move
Data that does not need to be transformed being transferred to a data warehouse.
Data at rest.
Data that is stored.
Star network
Each computer connected to central router/hub. Single point of failure.
Hierarchical database
Early database style , inflexible data relationships, treelike structure.
Decision support systems (DSS)
Enable business performance management (BPM) by translating organizational strategies into operational targets.
Software-defined networking (SDN)
Enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring, making it more like cloud computing than traditional network management. Meant to address the fact that the static architecture of traditional networks is decentralized and complex while current networks require more flexibility and easy troubleshooting.
Government Regulations on Security
Enact and enforce security; manage and retain documentation.
Gramm-Leach-Bliley Act of 1999
Enacted procedures to store or transfer financial information; also known as the Financial Services Modernization Act
Separation of Duties
Ensures that personnel's responsibilities and duties are separated from their access.
Types of risk analysis
Environmental Organizational Technology
Vertical Application
Software that designed for a specific business need.
Extraction, transformation, and loading (ETL)
Extract > Transform > Load > Validate. Process in which data is extracted from a computer, transformed (or cleansed) into a format appropriate for the data warehouse, and then transferred to the data warehouse.
Object Oriented Languages
Fields that contain data in the form of procedures, methods, routines, strings, lists
Mintzberg's Ten Manager Roles
Figurehead, leader, Liaison, Monitor, Disseminator, Spokesman, Entrepreneur, Disturbance Handler, Resource Allocator, and Negotiator.
Rapid application development (RAD)
Focuses on the development's process, with limited emphasis on the planning process. Emphasizes the need to adjust project requirements as the project progresses. Frequently uses prototypes in lieu of predetermined specifications. Allows adaptability because specifications are developed during the process, instead of at the beginning. Well suited for software development that is driven by user interface requirements.
Pharming
Fraudulent practice of directing Internet users to a bogus website in order to obtain personal information such as passwords, account numbers, etc.
Phishing
Fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Core routers
Gather, link, or route data from a business campus and aggregate it to optimize high bandwidth transmission. All routers have the ability to connect to the Internet. Core routers are more powerful and are used to optimize high volume data transmission. Core routers have enough processing power to handle multiple protocols. Only required if a high volume of traffic should go right into the Internet backbone.
Types of Information Systems Controls
General and Application
Group Decision Support System (GDSS)
Group decision support systems (GDSS) provide interactive collaboration support for multiple decision makers at multiple geographic locations through digital communication and the use of numerous resources and tools. Find solutions to problems that are unstructured.
2G Networks
Has a 64 kbps speed
Node
Has a unique network address •Data Link Control (DLC) •Media Access Control (MAC) address
HIPAA
Health Insurance Portability and Accountability Act of 1996 Medical -modernize the flow of healthcare information
Text mining
High-quality information is typically derived through the devising of patterns and trends through means such as statistical pattern learning.
Voice over Internet Protocol (VoIP)
IP packets of voice and multimedia (text, audio, images, video and interactive content) and transferred over the internet. Example of a packet-switched network.
Technology risk analysis
Identifies, evaluates, and ranks technology risks security of day to day business operation.
Entity-Relationship Diagram (ERD)
Illustrates the relationships among all of the tables in a database. Zero to many (optional) -0•Advisor and Instructor •One or more (mandatory) -I•Student one or more courses •One and only one (mandatory) -II•Student has one advisor, course has one instructor
Elements of Analytics
Includes data mining, process mining, business process modeling, complex event processing, predictive analysis, and prescriptive analysis.
Structured decisions
Involve an established procedure, are repetitive and routine, and therefore can be handled in the same manner each time. Line-level managers and non-management employees typically make structured decisions.
data warehouse
Large repository of data. Contains transactional (real time), analytical (archived transactional data), and external data.
Platform as a Service (PaaS)
Like IaaS except provider also provides the operating system and databases. Your organization is still responsible for applications, functions, and data. Example: Amazon Web Services
Fountain Model (SDLC)
Like the waterfall model, but this one allows for going back to previous steps.
Principle of Least Privilege
Limits access to only authorized users based upon job requirements.
Qualitative Risk Analysis
Looking at conditions that can affect the project; looks at the consequences of risk and estimates the impact of those risks on the organization.
Calculating loss
Lost resources -System is down, need backup system support that will prevent lost data and lost productivity, ex: data center Lost revenue -Determined by estimating the lost gross revenue /sales due to an event, ex: website sales Lost personnel -today's growing mobile workforce; time theft is big issue for employers today, talent demands mobility
Assembly language
Low level programming language (Machine code instructions)
system bus
Medium through which communications between the input, processor (CPU), motherboard, storage, and output occur.
Packet Switching
Mode of data transmission in which a message is broken into a number of discrete, parsed parts that are sent independently in encapsulated packets, over whatever route is optimum for each packet, and reassembled at the destination; what is used when accessing the Internet; •Digital signal signifies discrete signal; Carries binary data and has discrete values. •Packet-switched networks ; breaks communication into packets •Sends packets through the network independently of one another (they don't take the same route)
Moore's Law
Moore's Law says that computing power and storage capacity will continue to increase or double approximately every two years.
TCP/IP
Most common protocol which establishes a computers connection to the internet, and data packet quality transmission. The first two bytes are assigned by the Internet Service Provider (ISP), and the last two bytes are assigned by the client.
Business ecosystems
Network of businesses involved in delivering a product through mutual cooperation.
Master Data
Objects shared across the enterprise; it is key to accurate business reporting and analysis
Mashup
Occurs when software is mixed and matched to develop a customized application
Cold sites
Offsite office space awaiting occupancy, equipment, personnel, and utility service, allowing recovery within days.
Hot sites
Offsite office space with available and up-to-date systems and service connections, requiring only adequate or prioritized staffing, allowing recovery within minutes to hours.
Warm sites
Offsite office space with available systems and service connections, requiring staffing and updates allowing recovery within hours to days.
Types of relationships in a relational database model
One-to-One, One-to-Many, and Many-to-Many
New system barriers to success
Organizational resistance to change Position description changes Roles and responsibilities changes Required user skill set changes Organizational process and structural changes Changes in the nature of existing managerial activities Competition for limited organizational resources Competing stakeholder interests Competing project initiatives
Private clouds
Owned and run by, or merely dedicated to, the organization whose data resides on the equipment.
SDLC Anronym
PADDTIM Planning Analysis Design Development Testing Implementation Maintenance
Front end languages
PHP, HTML, XML, GUI
Proprietary software
Pay a license fee to use , cannot modify code
Data Administrator
Person who is responsible for securing access, privacy, security, retention of data within the database.
Knowledge authentication (something you know)
Personal identification number (PIN), passwords, patterns, and performances (e.g. signatures)
Identity authentication (something you are)
Photo identification, biometrics (e.g. fingerprints, voice patterns, hand/palm prints, and retina or iris topology)
Database server
Powerful computer that stores the databases and DBMS to access and administer the database.
Decision Tree Analysis Tool
Presents a visual flowchart representation of the decision and outcomes, but it does not include roots in the model.
Fair Information Practices (FIP)
Principles that govern the collection and use of information about individuals.
Multiplexing
Process in which multiple signals are combined into one signal, which is then transmitted over a shared medium.
Telecommunications Network
Process of exchanging information between various entities over electrical, electromagnetic, or digital networks.
Organizational features that can change the company direction
Processes, politics, culture, and environment
General Data Protection Regulation (GDPR)
Proposed set of regulations adopted by the European Union to protect Internet users from clandestine tracking and unauthorized personal data usage.
Infrastructure as a Service (IaaS)
Provider owns and manages the hardware upon which your software stack runs. IT team manages operating systems, databases, applications, functions, and all of your organization's data. Example: Windows Azure or Rackspace.
Wi-Fi Protected Access 2 (WPA2)
Provides even stronger security than the original.
Logical Data Model
Provides foundation for designing a database
Sarbanes-Oxley (SOX) Act of 2002
Public Accounting Reform and Investor Protection Act -oversee financial reporting to ensure the accuracy, integrity, and security of financial information through creation and storage of financial statements. The act covers public accounting oversight auditor independence, corporate responsibility.
Classifications of Cloud Computing
Public, Private, and Hybrid
Digital goods
Purchased and downloaded •Software •Music •Pictures / movies •Magazines / newspapers •Near-zero cost per unit sold
Intelligent Character Recognition (ICR)
Reads handwritten text; more advanced form of optical character recognition (OCR).
optical character recognition (OCR)
Reads machine printed text; used for time cards.
Shoulder surfing
Refers to the act of obtaining personal or private information through direct observation
Repeaters
Repeaters strengthen or amplify signals for long transmissions, but do not serve a broadcast function in a network and do not store data.
Information Policy Administrator
Responsible for acquiring, organizing, and distributing organizational information internally.
Database Administrator
Responsible for the creation, management, and integrity of the database. Monitors performance front-end users. Maps out the conceptual design for a planned database.
Static Random-Access Memory (SRAM)
Retains memory for as long as power is being supplied; does not need to be constantly refreshed; used to access the most frequently used data, as it is faster.
Developing Internet Search Strategy
Review information requirements, use proper search techniques, evaluate results, and determine copyright fees and the accuracy of data.
Organizational risk analysis
Risk at the top level of an organization, core competency strategic, reputational, regulatory, legal, security and operational risks.
Organizational risk factors
Risks that stem from hierarchies, policies, and procedures. These factors naturally allow organizations to operate as successful businesses, but also help to define categories risks, vulnerabilities, and threats, and create targets for criminals
Possession authentication (something you have)
Security keys, rolling code devices, RFID tokens, and other official unique token-like artifacts (e.g. cell phones and badges)
RFID
Similar to barcode reader. Can be operated in close proximity of the readers (not line of sight). Fast, but not reliable.
Central Processing Unit (CPU)
Since 1940. The brain/microprocessor of the computer. •Today, multiple-core processors can be used in tandem for a single computer, tablet, or smartphone. •Supercomputers exist today that have the equivalent of millions of processors.
Software as a Service (SaaS)
Software licensed and hosted on centralized or distributed servers that belong to a service provider. Users access this software using a connection to the Internet and a web browser. Example: Salesforce, DropBox
Database Management System (DBMS)
Software program that organizes, manages, and accesses data / enables users to create, manage, retrieve, and update data in a database.
Horizontal Application
Software that provides solutions based upon the common needs of many businesses.
Data Auditor
Someone who audits users' level of access and security
War driver
Someone who drives around looking for unprotected wireless access points (AP) and uses them to connect to the Internet.
open source software
Source code available for modification
Data Dictionary
Stores and manages all of the information about the database, or the metadata.
Flat File Database
Stores data in plain text, holding one record; cannot contain multiple tables like a relational database.
Server side languages
Structure Query Language: database access C, C++, JAVA -back end programming, most commonly used
Lower CASE Tools
Support development activities, such as design, testing, debugging, and maintenance.
Upper CASE Tools
Support software modeling and analysis
Types of software
System: Operating System (Windows, macOS, Unix) Utility: Spyware, antivirus Application: does one large or small thing
Referential Integrity
Table relationships must always be consistent; for an entity or object to exist in a table, an equal value must exist in the referenced table; the primary and foreign keys must be equal.
FERPA
The Family Educational Rights and Privacy Act of 1974 governs the access to educational information and records by public entities.
Spoofing
The creation of Internet Protocol (IP) packets with a false source IP address, for the purpose of hiding the identity of the sender or impersonating another computing system; elicits a response from the network.
Public Switch Telephone Network (PSTN)
The entire interconnected voice telephone network around the world. It is switched based.
1G Networks
The first cellular mobile networks; could only transmit analog signals on radio frequency.
COBOL (Common Business Oriented Language)
The first computer language used for business applications; developed in the 1950s; still used today.
IPv6
The latest IP iteration, it was developed to increase the number of unique IP addresses, as each device that connects to the Internet needs its own IP address and there were not enough to accommodate future devices.
Dynamic Random-Access Memory (DRAM)
The main memory of a computer system; requires constant refreshing.
Information management
The management of organizational processes and systems; helps the organization reduce costs and adds value to products; helps the organization make better managerial decisions; stores and processes data.
Packet Switched Data Networks (PSDN)
The standard for current telecommunication networks.
Information Security Analyst
Their goal is to ensure that data and systems are secure to prevent breaches.
Decision support systems and components
There are four systems used to provide decision support: MIS, DSS, ESS, and GDSS
Processed-Centered Environments
These environments can specify analysis and design; very resourceful.
Knowledge Management System (KMS)
These systems provide tools to help manage organizational knowledge and create value to meet business requirements and strategic goals. Vital for firms that use suppliers.
Clickstream applications
Track and analyze an application's activity, including how it is used and where a user clicks. This information is recorded in log files, which, if exported into a database, may be mined for usage patterns for redevelopment of the application, or perhaps for analysis for targeted marketing.
Second Generation of computers (1956-1963)
Transistors •Replaced large vacuum tubes, smaller, faster, cheaper, ASSEMBLY LANGUAGE •Software Cobol (Business) and Fortran (Math formulas)
Public clouds
Typically owned and run by service providers, such as Amazon, Google, or IO, often in colocation facilities (e.g. multiple tenants in a datacenter).
Radio Frequency Survey
Used to determine wireless access point locations based upon signal strength.
Simple Mail Transfer Protocol (SMTP)
Used to manage and monitor emails that we receive.
Firewalls
Used to prevent intrusion into a network and are not related to data communication protocols. A firewall can be hardware with software, or is just software embedded in a network at strategic access locations to prevent intrusion.
Pointers
Used to show the relationship between data fields and tables.
Object databases
Used when multi-media , computer aided design are required, not easily sorted by columns and rows.
Prototyping Software Development Method
User basic requirements, development of prototype, using prototype, and revising prototype
Business Performance Management (BPM)
Uses business intelligence analytics and process change to enable organizational performance; includes goal selection, attainment measurement, and achievement intervention.
Geographic Information Systems (GIS)
Using connections to numerous databases containing data concerning locations, crimes, taxes, traffic, votes, and environmental and life science data, geospatial analysis can help government administrators to understand demographic trends, population density changes, attribute concentrations
First Generation of computers (1940-1956)
Vacuum tubes •CPU (Central processing unit) ,very expensive, only large organizations could afford it •Batch processing, punch cads, magnetic tape, machine code , a lot of heat, MACHINE LANGUAGE.
Three V's of Big Data
Volume, Variety, and Velocity; Volume refers to the amount of data, variety refers to the number of types of data, and velocity refers to the speed of data processing (real-time analytics).
Web 2.0
Websites that emphasize user-generated content, usability (ease of use, even by non-experts), and interoperability (this means that a website can work well with other products, systems, and devices) for end users; enables collaboration and interaction among users.
Semi-structured decisions
When only a portion of the problem can be solved via an established procedure. Middle managers more commonly make semi-structured decisions.
Omnichannel Model
Where physical retail storefronts now become hybrid warehouses, whereby allowing for the reduction of inventory, leaner operations, and faster reactions to change in demand.
chief information officer (CIO)
a business leader who analyzes internal business processes such as payroll and billing, reshapes the physical infrastructure and network purchases to meet business goals, and leads the workforce to implement critical IT internal projects; responsible for information systems strategic thinking and planning.
Transnational
a commercial enterprise that operates substantial facilities, does business in more than one country and does not consider any particular country its national home.
denial of service attack
a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources
Variable
a data type or simply type is a classification of data which tells the compiler or interpreter how the programmer intends to use the data; can become incompatible with data warehouse design.
Modular Design
a design approach that subdivides a system into smaller parts called modules or skids, that can be independently created and then used in different systems.
Bridge
a device that connects and passes packets between two network segments that use the same communications protocol; can be used to boost Wi-Fi strength in areas of low signal quality.
Evil Twin
a fraudulent Wi-Fi access point that appears to be legitimate
Conceptual Data Model
a map of concepts and their relationships used for databases.
Freemium
a pricing strategy by which a product or service (typically a digital offering or an application such as software, media, games or web services) is provided free of charge, but money (premium) is charged for additional features, services, or virtual goods.
Physical Data Model
a representation of a data design as implemented, or intended to be implemented, in a database management system
Digital Signal
a signal that is being used to represent data as a sequence of discrete values
Data Warehousing
a system used for reporting and data analysis, and is considered a core component of business intelligence; data is stored in one place.
Rich Site Summary (RSS)
a type of web feed which allows users to access updates to online content in a standardized, computer-readable format.
Workbench
a unified CASE visual tool for database architects, developers, and database administrators. Microsoft Visual Basic is an example.
Wireless Sensor Networks (WSNs)
a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions
Secondary storage
accessed only through a system's input/output bus and is generally several orders of magnitude slower than primary storage technologies Includes hard disk drive (internal) or removable media, such as magnetic floppy disks, optical discs (CDs & DVDs), and USB flash drives
growth (business strategy)
adding new products or new enhancements to existing products
Internet of Things (IoT)
all devices—including appliances, cars, networks, and systems—will be connected to the Internet, which will facilitate servicing automation and e-commerce.
Tailgating
also known as "piggybacking," involves an attacker seeking entry to a restricted area which lacks the proper authentication
ARPANET
an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.
Pseudocode
an informal high-level description of the operating principle of a computer program or other algorithm. Used for human reading, rather than machine reading, and it can be used to translate into any programming language.
Extranet
an intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the Internet securely.
Multinational
an organization that owns or controls production of goods or services in one or more countries other than their home country.
work breakdown structure (WBS)
broken down list of all deliverables showing what the customer will get at the end of a project.
Clustering
classifies events or entities when no known group exists for the data.
Information Technology Infrastructure Library (ITIL)
common set of best practices widely used by businesses to give guidance to companies on how to use IT as a tool for implementing change
Porters 5 competitive forces
competitive rivalry bargaining power of customers bargaining power of suppliers threat of new entrants threat of substitutes
Tertiary storage
consists of an automated robotic mechanism to mount and dismount magnetic tape or optical discs.
data-flow model
describes how data moves and is processed by the proposed system under development.
database analyst
design, implement and sustain organizational database needs
four phases of the decision-making process
intelligence, design, choice, and implementation
function-oriented (system evaluation)
determine of the success of the information system in examining he performance of data, hardware, software, networks, and human resources
ring network
each computer connected to the next computer; cheaper to install; less effiecient.
Sniffing
eavesdropping on network traffic in order to acquire traffic data packets and decoding. The information gathered can be used to hack into a network; the most common attack, as signals travel through the air
primary storage
flash memory chips plugged into memory slots on the motherboard.
Media Access Control (MAC)
given to a network adapter when it is manufactured. It is hardwired or hard-coded onto your computer's network interface card (NIC) and is unique to it; an access point can be configured to allow only this specific address.
chief technology officer (CTO)
has ultimate responsibility for all technology implementation, maintaining technology compliance regulations, and identifying technology risks for the company.
Third generation computer languages (3GLs)
high-level programming languages such as FORTRAN, COBOL, C, Java, C++, and C#
Circuit Switching
ideal for communications that require data to be transmitted in real-time; a constant connection is required before transmission begins. •Analog signal signifies a continuous signal. The entire message is sent. •Public switch telephone network (PSTN) •Land Line •Dedicated communication link
chief security officer (CSO)
is the highest level executive concerned with the overall security functions and policies of a business.
Dumpster diving
is the process of searching trash to obtain useful information about a person/business that can later be used for the hacking purpose.
Classifications
look for patterns that indicate customer or entity behavior in order to target marketing efforts.
mesh network
network topology in which each node relays data for the network (they are all connected to one another and therefore have redundancy)
network host
node/computer connected with an IP address
Social engineering
normally low tech attacks used to trick individuals into disclosing information, providing access, or changing their patterns. Examples include phishing, spear-phishing (i.e. targeted phishing), dumpster diving, baiting, tailgating, and quid pro quo.
Product differentiation (business strategy)
offering a higher quality product to differentiate from others in the market
asynchronous communication
one way communication, such as email and global overnight mail
Web Mining
process of identifying hidden patterns and relationships in non-structured databases, such as the Internet, and applying rules to that data in order to predict future behavior.
Unstructured decisions
require the decision maker to provide the necessary insight, judgement, and evaluation to reach a decision. Individuals in senior management frequently make unstructured decisions.
Spiral Model (SDLC)
risk-driven process model generator for software projects. Based on the unique risk patterns of a given project, the spiral model guides a team to adopt elements of one or more process models, such as incremental, waterfall, or evolutionary prototyping.
data mart
smaller subset database from a data warehouse typically focused on a single area or function.
Fourth generation computer languages (4GL)
software tools that help reduce the amount of procedural knowledge that is needed about how computers operate and lets end users create programs as needed; SQL is a 4GL.
critical path method (CPM)
step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems.
Convergence
the ability for a telecommunication network to carry voice, data, and video
Prescriptive Analytics
the area of business analytics (BA) dedicated to finding the best course of action for a given situation.
Strategy-Oriented (system evaluation)
the determination of whether the information system outputs enable management to execute the plan.
information technology management
the management of hardware, software, data, networks, and people that facilitate access to information and allow the organization to achieve business objectives.
Build and fix model (SDLC)
the simplest SDLC model allowing for code to be incrementally modified and implemented until successful.
Structured English
the use of the English language with the syntax of structured programming to communicate the design of a computer program to non-technical users by breaking it down into logical steps using straightforward English words; uses modular design and data terminology.
synchronous communication
two way communications, such as audio/video teleconference and instant messaging
relational database
type of database in which multiple information files are combined into one database in one location, where data are stored in two-dimensional tables known as relations and contain multiple entities and attributes. Most common based upon the relational model of data, relationships between tables in rows and columns.
router
used to connect multiple networks together and forward data packets between those separate networks to the destination host.
First and second-generation computer languages
were specific to the computer manufacturer (1GL) or to a specific processor or environment (2GL).
system-oriented (system evaluation)
which is the ability of an information system to discriminate between files or data that are relevant to a user query, and those which are not relevant.
Cloud computing
•Allows application software to be stored in one or more locations and accessed and operated using Internet-enabled devices. •Clouds are classified as public, private, and hybrid, each indicating an organization's ownership in equipment in their own cloud. •Cloud computing enables users to lease hardware and software, thereby reducing capital expenditures, implementation times, and operating costs, while increasing deployment speed, flexibility, and profitability. •One of the benefits of cloud computing is the ability to share or reuse software.
Motherboard
•Backplane of a system •Device that contains the system bus •Connects the various input and output devices that compose any given computer system
Data Warehouse
•Collection of business data from multiple systems •Used for data analysis and mining •Structured data , deliberate, intentional
Implementation methods
•Direct (plunge) •Parallel •Prototyping •Phased
Feasibility areas of study
•Economic: Total cost of ownership(TCO) takes into account the total costs over time, including hardware, software, labor, lease fees, and licensing. •Technical: To determine the technical feasibility of a system, technology and providers need to be compared and limitations identified. •Operational: The assessment of operational feasibility provides an insight into whether or not the proposed system(s) are compatible with the existing or proposed operations of the organization •Schedule: Determines whether the project will be viable once completed. This assessment is very important for projects that have long implementation timeframes. •Legal: Determines the legal aspects and repercussions of the project. This consideration may be important for organizations that do business with government agencies, foreign governments, or who manage or maintain sensitive or confidential data. •Political: Considers how potential stakeholders will respond to the changes resulting from the proposed system(s). Stakeholders who do not support or feel threatened by the system may oppose or disrupt implementation.
prototyping model (SDLC)
•Experimental system is quickly inexpensively built. •Provided to end users for evaluation. •Refined based upon user feedback. •The four steps of prototyping include: 1.Identifying the user's basic requirements 2.Developing the initial prototype 3.Using the prototype 4.Revising and enhancing the prototype.
The omni-channel.
•Facilitated by e-business connections , warehouses filled with inventory become distribution centers, physical retail storefronts become hybrid warehouse.
Data normalization
•Flowcharting during the design phase to avoid inconsistencies in the database. •Databases must go through normalization in the design process to simplify complexity. •Removes redundant or unnecessary duplication -two common database design problems. •Correctly defining keys, tables, columns, and relationships.
End-user development (SDLC)
•Informal method of solutions development by end users. •Made possible by the availability of fourth-generation languages. •Enable end users to develop systems and solutions with little or no assistance from professional technical specialists. •Example Structured query language SQL -Data queries
Localized and personalized e-commerce
•Knowledge of and intimacy with their customers are more likely to see those customers return.
Healthcare/Medical breaches
•Medical electronic healthcare records •Personal information and financial details
Partnership
•Much like sole proprietorships •Two or more individuals who may then personally and individually share in the rewards and liabilities
Management information system (MIS)
•Operational and middle managers traditionally use management information systems (MIS) with data from transaction processing systems (TPS) to obtain routine production and exception reports, in order to make structured decisions.
Types of computers
•Personal computers (PC): smaller systems like tablet computer. •Laptops: well suited for mobile use because they are powered by rechargeable batteries •Traditional PC's -require an electrical connection •Smart Phone -mobile phones are growing for day-to-day business •Server -A system used to provide services to other systems. •Mainframe -A high-capacity, high-performance system built for large organizations and used to quickly process large volumes of data. •Supercomputer—This term merely implies the fastest category of computer available. Supercomputers are purpose built to handle vast amounts of information very quickly.
Data Governance
•Policies and procedures are established that define the data governance program, such as who has access, who has update capabilities •Having clean data starts when the database is created by including database field (column) controls called validity checks •Data mapping comes to the rescue in the data management process. They are extra notes about the definition of a field, its data, and its use. •Segmenting data is also an important aspect of the data management process.
Banking/Credit/Financial breaches
•Prime target -attackers want most! •Money and personal information.
Data mining
•Process of identifying hidden patterns and relationships in large databases (data warehouse) and applying rules to that data in order to predict future behavior. Can identify associations, classifications, clustering, forecasting, and sequences.
ISP
•Provides internet connectivity to users! •Provides wireless router -connects to the ISP -then connects to the internet! •Provides dynamic IP address for security, wireless router. •Provides connection to Domain Server that translates domain names into IP addresses
E-business plan
•Purpose of the e-business •Revenue models •Target audience •Marketplace structure •Global reach requirements •Support structure •CRM (Customer Relationship Management )
RAM
•Random Access Memory •Volatile, support the CPU
•Government and military breaches
•Security breaches tend to be high-profile foreign powers trying to spy •Hacktivists -make a political statement •Cybercriminals in federal, state, and local databases.
Digital Market
•Sell direct to consumer •Low overhead •Direct delivery (not through dealer/store)
Corporation
•Separate legal entities created to •Represent the capital investments and somewhat or completely encapsulate the risks, liabilities, and debts of a single owner or many shareholders. •A disadvantage to incorporating includes double taxation
Mobile e-commerce (mCommerce).
•Smartphones and Tablets. Businesses that actively market to their customers via mobile devices
Social e-commerce
•Social media can provide a constant connection with customers regarding customer preferences
Systems Analyst
•Specializes in the analysis, design, and implementation of information systems. •Seldom are involved in the development of hardware and software. •Serves and interacts with the users to understand their needs and requirements. •CONSULTANT: interacts with the users to understand their needs and requirements. •SUPPORTING EXPERT: requires them to be knowledgeable in a variety of operating systems, programming languages, and hardware. •CHANGE AGENT: identification of the desired organizational improvements, designing systems that will implement those changes, and training and motivating users to operate and access the new system. •PROBLEM SOLVER: converting processes and procedures into system components and troubleshooting errors or delays that may occur. •GOOD COMMUNICATOR: capable of interacting with internal users and customers to identify and document requirements.. •ARBITRATOR: resolve conflict by addressing user concerns and problems that may occur between conflicting parties.
waterfall model (traditional SDLC model)
•Stages completed in order, cannot go back. •Most appropriate when system requirements are clear, well-documented, and unlikely to change. •Technology is understood and not dynamic. •Sufficient resources and expertise are available to support the process.
Online transaction processing (OLTP)
•Stands for "online transaction processing" and is a database design used for browsing and manipulating business transaction activity. •Used to gather transactional or operational data in real time.
Sole proprietorship or sole trader
•The simplest form of business •Enjoy all of the profits and benefits of doing business •Personally accountable for all liabilities, risks, and debts from business operations.
Online Analytical processing (OLAP)
•Tool that enables users to analyze data in order to make management decisions. A business intelligence tool that is useful for management reporting, budgeting, and forecasting. Multi-dimensional •A disadvantage of OLAP is that processing the data during ETL can be complex, leading to lengthy loading and updating. •Stands for "online analytical processing" and are analytical, fixed databases containing data that are used for making decisions.
Big Data
•Unstructured (sometimes Semi-structured ) •Three V's: •Variety -texts, emails, web-mining •Volume -great amount of transaction data •Velocity -batch, streaming (for marketers)
•Educational institutions breaches
•Valuable intellectual property from campus research, U of M -Business •Student and employee personal information
Enterprise Resource Planning (ERP)
•Very complex resource planning system that spans the entire business. •Combines main (core) business systems and applications into one comprehensive system •Typically a suite of integrated applications than an organization can use to collect, store ,manage and interpret data •Often in real time •The focus for ERP is more internally focused on the business functions.
Feasibility Analysis
•Whether the solution is financially, technologically, or organizationally feasible. •Whether the proposed system is a good investment. •Whether the necessary technology is available. •Whether the user's information specialists can manage the system •Whether the organization can adapt to the changes introduced by the new system.
Types of network connectionss
•Wire: connects point to point networks; ethernet, coaxial cable, fiber-optics (glass -speed of light) •Wireless network uses a radio frequency signal instead of wires to connect your devices over the radio spectrum (radio waves). •Satellite communications are used to link telecommunications networks over long distances. Satellite radio, Identify Locations, GIS, GPS.
Agile development (SDLC)
•encourages adaptive planning and development, fast delivery, continuous improvement, and flexibility in response to change.