COM 331

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is data subject to?

Data rot - physical problems with the media on which the data is stored on

Why does IT matter?

Most businesses cannot operate without it It provides strategic opportunities and advantages

What are Electronic Commerce (e-commerce) systems?

A type of interorganizational information system which enable organizations to conduct transactions

What is Online Analytical Processing (OLAP) or Multidimensional Data Analysis?

A type of software to conduct data mining by manipulating and analyzing large volumes of data along multiple dimensions or perspectives

What does every device on the Internet have?

A unique 128 bit numeric IP address A Domain Name System (DNS) which converts IP addresses to English-like domain names

What is an audit

An examination of information systems, their inputs, outputs, and processing

What do entity instances have?

An identifier (primary key)

What is a computer-based information system (CBIS)?

An information system that uses computer technology to perform some or all of its intended tasks Ex. automated teller machine

Who creates the top level domain names?

An international committee (ICAN)

What is customer relationship management (CRM)?

An organization-wide effort towards maximizing the customer experience

What is a Transaction Processing System (TPS)?

A system to support the monitoring, collection, storage, and processing of data for a particular functional area

What type of data is stored in the warehouse?

Data of adequate quality to satisfy users' needs. If it is not, the data will not be trusted and ultimately will not be used

What are 6 problems that can be minimized by using the database approach?

Data redundancy Data isolation Data inconsistency Data security Data integrity Data independence

What is Information?

Data that have been organized so that they have meaning and value Ex. a GPA by itself is data, but a student's name couples with his or her GPA is information

How can IT systems be an enabler of response activities to counter business pressures?

Organizations respond to pressures by implementing IT systems: strategic systems - provide organizations with advantages that enable them to increase market share or profits, to better negotiate with suppliers, and to prevent competitors from entering their markets customer focus - providing exceptional customer service can make the difference between attracting and keeping customers and losing them to competitors made-to-order - strategy of producing customized products and services (costly) mass customization - company produces a large quantity of items, but customizes them to fit the needs and preferences of individual customers e-business - process of buying, selling, transferring, or exchanging products, services, or information via computer networks, including the Internet (e-commerce) - e-business also refers to servicing customers, collaborating with business partners, and performing electronic transactions within an organization

What type of organization are Enterprise Resource Planning (ERP) systems not useful for?

Organizations that find the process of converting from their existing system too difficult, time consuming, or expensive

What do public key systems show?

That a message is authentic as the private key user has electronically "signed-off" on it

How is data managed?

The Database Management System (DBMS)

What allows internet users to access information located in databases around the world?

The Internet's discovery capabilities through its search engine

What is the relationship between Porter`s competitive forces model and the value chain model?

The Value chain model shows the primary activities (activities relate to production and distribution of the firm's products and services - create value for which customers are willing to pay) sequentially add value to the profit margin. It also shows that the support activities (activities that do not add value DIRECTLY to the firm's products or services - contribute to competitive advantage by supporting primary activities) adds competitive advantage to an organization

What is a data dictionary?

The appropriate format for entering data into the database

How does public-key encryption work?

Two keys are made. Data is encrypted with one key and is decrypted by the other key. The encrypting key, the private key, is kept a secret where as the decrypting key is known as the public key

What is an Extranet and what does it require?

Two or more intranets connected and it requires a log-in which is created by the owner of the extranet

What is the difference between the Internet and the World Wide Web?

• The Internet is a global network of computer networks, using common communications protocol - TCP/IP which functions as a transport mechanism The World Wide Web is a system that stores, retrieves, formats, and displays information accessible through a browser, an applications that uses the transport functions of the internet

What are the different types of webs?

• Web: static, site-visit oriented • Web 2.0: interactive • Web 3.0: user-generated content, crowd-sourcing, tagging, semantic and location services • Siri

What makes data invalid?

The change in modes of how data is stored

Is there a central agency to manage the internet?

No

What is Bandwidth?

The transmission capacity of a network

What are some disadvantages to Enterprise Resource Planning (ERP) systems?

"Best practices" can be blessing or curse - may not be "best" for all organizations o Standardization o Organizational change o Legacy applications Complex implementation - affects every part of organization Extremely expensive and time-consuming

What is PIPEDA?

"Personal Information Protection and Electronic Documents Act"

What is Scareware/FakeAV?

#1 threat today and can be done through: Fake anti-virus Fake anti-spyware System "optimizers"

How was the web impacted the buying power of customers?

(CON for company) Web provides customers with variety of choices for products, as well as information about these choices - web increases buyer power (PRO for company) Companies can implement loyalty programs where they use the web to monitor the activities of millions of customers - web reduces buyer power

How was the web impacted the bargaining power of suppliers?

(CON for suppliers) Web allows buyers to find alternative suppliers and to compare prices, reducing suppliers' bargaining power (PRO for suppliers) As companies use web to integrate supply chains, participating suppliers can lock in customers, thereby increasing suppliers' bargaining power

What is normalization?

A method for reducing redundancy and maximizing data integrity

When is IT useful?

When businesses know how to use it

How was the web impacted the threat of substitutes?

(CON for existing companies) New technologies create substitute products rapidly, and web makes info about these products available almost instantly. As a result, industries are in danger of substitutes (Ex. music, books, newspapers, magazines, software) (PRO for existing companies) Web can enable a company to build in switching costs - will cost customers time and/or money to switch from that company to a competitor

What could happen if IT governance did not exist?

1. IS might not meet business objectives 2.Systems could be error prone, over budget, or hard to use 3.Data could be easily hacked if there was poor security

What is the Giving Voice to Values (GVV) Approach to ethical issues?

1. Identify an ethical issue 2. Purpose and choice 3. Stakeholder analysis 4. Powerful response 5. Scripting and coaching

What are the 5 primary activities of a value chain?

1. Inbound logistics (inputs) 2. Operations (manufacturing and testing) 3. Outbound logistics (storage and distribution) 4. Marking and sales 5. Services (Customer service)

What are the 3 critical network technologies?

1. Packet switching - a mode of data transmission in which a message is broken into a number of parts that are sent independently, over whatever route is optimum for each packet, and reassembled at the destination. 2. TCP/IP - Transmission Control Protocol / Internet Protocol. A set of rules and procedures for communicating through multiple "layers" to control various aspects of communication by adoption common protocol, different devices can communicate over single network despite hardware or software differences 3. Client-server model - server and printer are connected to switch on one side, client PC's are connected to switch on the opposite side

What is the traditional approach to ethical issues?

1. Recognize an ethical issue 2. Get the facts 3. Evaluate alternative actions 4. Make a decision and test it

What are the 4 support activities of a value chain?

1. The firm's administration and management 2. Human resources management 3. Product and technology development (R&D) 4. Procurement of resources

What 2 rules do court decisions follow in most countries in regards to privacy?

1. The right to privacy is not absolute, it must be balanced against the needs of society 2.The public's right to know overrules the individual's right to privacy

What 5 steps make up the procurement process?

1. material needs are recognized by a purchase requisition 2.A purchase order is made based on the purchase requisition 3.The materials are shipped once the vendor receives the purchase order 4.An invoice is sent by the vendor to the company 5.Payment is sent by the company to the vendor

What is the role of a Transaction Processing System in an organization?

1. people or sensors collect the data, which are entered into the computer via an input device 2. the system processes the data

What are the 3 reasons why business-information technology alignment does not occur?

1.Business managers and IT managers have different objectives 2.The business and IT departments are ignorant of the other group's expertise 3.There is a lack of communication

What are 6 measurements of competitive performance?

1.Customer satisfaction 2.Cost reduction 3.Cycle and Fulfillment time 4.Quality 5.Differentation 6.Productivity

What are 4 examples of IT helping organizations' efforts to go green?

1.Facilities Design and Management - creating green facilities 2.Carbon Management - tracking carbon in an organization 3. International and Canadian Environmental Laws - creating cradle to grave strategies for IT equipment 4.Energy Management - understanding organization's energy needs

What 5 key factors are contributing to the increasing vulnerability of organization resources?

1.The interconnectedness brought by the wirelessly networked environment 2.Smaller, cheaper, faster computers and storage devices 3.Decreasing hacking skills necessary 4.Cyber-crime 5.Lack of management support

How do transaction processing systems manage data?

1.The transaction occurs 2.It is entered in the TPS which produces reports 3.It is also in the Organization Database where FAIS can access the data

What kind of question can IT help solve when faced with a problem? (Wii example)

1: Should we produce a Wii-like console? 2: How should we organize the Wii workforce to increase production? 3: How many Wii consoles should we produce this week?

How big is big?

8 bits = byte 1000 bytes = kilobyte 1000 kilo = mega... 1000 mega = giga 1000 giga = tera... 1000 tera = peta... 1000 peta = exa... 1000 exa = zetta... 1000 zetta = yetta... 1000 yetta = bronto 1000 bronto = geop...

What is the relationship between a TPS and a FAIS?

A business event or transaction is processed by the TPS system and then stored in the organization's database. Inside the database is the functional area information system (FAIS). FAIS provides support for the various functional areas in an organization by increasing each area's internal efficiency and effectiveness.

What is a code of ethics?

A collection of principles intended to guide decision making of an organization

What is the relationship between a company's databases and its data warehouse?

A common source for the data in data warehouses is the company's operational databases, which can be relational databases. Databases keep track of transactions.

What is the collection of application systems in a single department known as?

A departmental Information System or a Functional Area Information System

What is the collection of application systems in a single department is referred to as?

A departmental information system (also known as a functional area information system)

What is a data model?

A diagram to represent the entities in the database and the relationships among them

What are entity classes?

A given group of entities

What is the Internet?

A global WAN

What is IT governance?

A structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise's goals by adding value while balancing risk versus return over IT and its processes

What is Business Process Management (BMI)?

A management technique to support the design, analysis, implementation, management, and optimization of business processes

What is a portal?

A web-based personalized gateway to information and knowledge that provides relevant information from different IT systems and the Internet using advanced search and indexing techniques

What do hardware devises do when used together?

Accept, process, and display data and information

What are 4 risk mitigation responses?

Acceptance - no prevention, but recovery Limitation - controls Transference - insurance Recovery strategies

With all of the information overload occurring, what must managers be able to do?

Access, navigate, and use these vast stores of data, information, and knowledge

What activities do FAIS support?

Accounting: Payroll, Accounts Payable and Receivable, Auditing, Budgeting, and Profitability Planning Finance: Cash, Financial Transactions, and Investment Management and Financial Planning Human Resources: Employee Record Keeping, Benefits Administration, Performance Evaluation, Employment Planning, and Outsourcing Production/Operations: Order Fulfillment, Order Processing, Quality Control, Inventory Management and Product Life Cycle Management Marketing: Set Pricing, Customer Profiling, Customer Relations, Sales Force Automation, Sales Forecasting, and Advertising Planning

What is an app?

Acomputer program designed to support a specific task or business process Ex. a payroll cheque payment system

What do privacy policies do?

Address issues of data collection, data accuracy, data confidentiality can help organizations avoid legal problems)

What are some threats to privacy?

Advances in information technologies, electronic surveillance, personal information in databases, internet bulletin boards, newsgroups, and social networking sites

What are some advantages and disadvantages of relational databases?

Advantages: Enable people to compare information quickly by row or by column Users can retrieve items by finding the point of intersection of a particular row and column Disadvantages: Large-scale relational databases can be composed of interrelated tables, making overall design complex, with slow search and access times

What is a secondary key?

All other fields that have some identifying information but typically do not identify the file with complete accuracy

What is end user computing?

Almost all employees use Information Technology in their work either to do data entry, reporting and inquiry or create usable data systems like spreadsheets, programs, or other development tools

What does every computer on the Internet have?

An Internet protocol (IP) address that distinguishes it from all other computers

What is Information Technology (IT)?

Any computer-based tool that people use to work with information and to support the information and information -processing needs of an organization Ex. Word processing or spreadsheet software

What is the information system's definition of a transaction?

Anything that changes a firm's database

What questions can be asked to determine if an organization's security measures are sufficient?

Are all controls installed as intended? Are the controls effective? Has any breach of security occurred? If so, what actions are required to prevent future breaches?

What do Virtual Private Networks need to connect external hosts securely?

Authorization and Encryption

What is source data automation?

Automated TPS data entry used when there are large volumes of data

What are some issues with risk assessment?

Average loss not always easy to predict Dollar loss not always most important fact Rare, but high, losses: how to treat these?

What kind of organizations does IT and IS connect together?

B2Bs (Suppliers - materials and Businesses - products) B2C (Customers - products)

What are two ways of processing transactions?

Batch - collect transaction data, store temporarily then process in bundle periodically Ex. time sheets Online transaction processing (OLTP) aka Real-time - every transaction processed as it occurs Ex: order filling

Why cant an Information System by itself provide a sustainable competitive advantage?

Because IT is widely used among organizations, firm's need to implement strategies that differentiates them from one another first which determines how a company will use its information systems.

Why do second movers have the advantage when adapting to new IT systems?

Because everything is sorted out by the first mover and customers have time to react to the new system

Why are TPSs considered critical to the success of any enterprise?

Because they support core operations by collecting data continuously in real time

Where is the Intranet server placed in a Virtual Private Network?

Behind the firewall

What is the difference between being grey listed and black listed?

Being greylisted means your emails are considered spam and any uploads you choose to send are denied whereas being blacklisted means none of your messages make it pass the firewall and to the recipient

Where is firewall placed?

Between the internet and the intranet

What is the Data Hierarchy?

Bit Byte Field Record File Database

What can data warehousing can improve?

Business knowledge, provide competitive advantage, enhance customer service and satisfaction, facilitate decision making, and streamline business processes

Why is business process re-engineering helpful?

Business people are now able to better understand the information systems therefore making better use of the data collected

What are cross-functional business processes?

Business processes that cross over multiple functional areas so that no single functional area is responsible for their execution

How is data separated in Data marts?

By attributes

What is business process re-engineering?

Changing the business processes to better fit the companies goals and strategy first and then matching the right data to these processes

Who is the CIO?

Chief Information Officer Works with the CEO and the CFO in an organization's strategy planning process

What is Data Integration?

Data is extracted, transformed, and loaded from source systems into a data mart or a warehouse

What does an Information System (IS) do?

Collects, processes, stores, analyzes and disperses information for a specific reason Ex. Online point of sale systems

Who uses private networks?

Companies who want to be really secured and not connected to the internet

What are Business Intelligence (BI) systems?

Computer-based support systems for complex, non-routine decisions

How are computers connected to the Internet to allow people to access data in other organizations and to communicate, collaborate, and exchange information easily around the world (quickly and inexpensively)?

Computers are connected to one another by data communication lines of different speeds

What does OLAP do?

Confirms data relations and explains why they are true

What are internet-specific challenges to privacy?

Cookies Spam Web bugs Spyware/viruses/Trojan horses Hacking/cracking

How is Master data treated?

Core data that spans the enterprise Ex. Customer profile, product data, employee profile Low volume of change, consistent across transactions

What are the 5 strategies organizations can use to overcome Porter`s 5 Forces?

Cost leadership strategy - produce products and/or services at the lowest cost in the industry (cost leadership) Differentiation strategy - order different products, services, or product features (differentiation) Innovation strategy - introduce new products and services, put new features in existing products and services, or develop new ways to produce them (differentiation) Operational effectiveness strategy - improve new products and services, put new features in existing products and services, or develop new ways to produce them (cost leadership) Operational-orientation strategy - concentrate on making customers happy (niche)

What plays fundamental roles in determining what type and how IT infrastructure is used it businesses?

Culture Expectations

How are current, historic, historic and limited data stored?

Current: operational data bases Historic: data warehouses Historic and limited: data marts

How is Transaction Data treated?

Data generated and captured by business activities Ex. Customer order, purchase requisition, time card

What does IT applications require?

Data

What is metadata?

Data about data

What is Knowledge?

Data and/or information that have been organized and processed to convey understanding, experience, accumulated learning, and expertise as they apply to a current business problem Ex. A company recruiting at a school has found over time that students with GPAs over 3.0 have enjoyed the greatest success in its management program. Based on this accumulated knowledge, that company may decide to interview only those students with GPAs over 3.0.

Distinguish between data warehouses and data marts

Data warehouses are expensive so they are used primarily by large companies A data mart a low-cost, scaled down version of a data warehouse - designed for smaller businesses or a department in a large company Data marts can be implemented more quickly than data warehouses, often in less than 90 days Data marts support local rather than central control by conferring power on the using group Groups that require a single or a few BI applications require only a data mart rather than a data warehouse

What does catched mean?

Data was stored and indexed but it may not be the most up to date. It allows people to work offline

What is Business Intelligence?

Decision making to respond to the data and patterns

What are the technology trends that are raising ethical issues?

Declining costs of data storage Computing power doubles every 18 months Networking advances & the Internet Growth of social media Advances in data analysis, datamining, profiling

What are Interorganizational Information Systems (IOSs)?

Information systems that connect two or more organizations together

What is the most common methods for connecting to the internet?

Dial-up, DSL, cable modem, satellite, wireless, and fibre to the home

What are two types of business continuity?

Disaster recovery - recover as quickly as possible, in event of system failure but downtime will occur Fault-tolerant system - designed to prevent total system failure and provide continuous, uninterrupted service

What are 3 Internet network applications?

Discovery Communication Collaboration

How do companies ensure orders are not being double recorded or missed?

Each department does certain tasks

Who uses application programs in a business?

Each functional area or department can uses many application programs grouped into application systems

Since TPS must be able to handle high volumes and large variations in volumes of data, what must they be?

Efficient Error-free Private and secure

Who is the world's largest IT integrator?

Electronic Data Systems which spun off of General Motors

What is increasing with the rapid increase of new technologies?

Electronic surveillance

What is Data?

Elementary description of things, events, activities, and transactions that are recorded, classified, and stored, but are not organized to convey any specific meaning Ex. numbers (3.11, 2.96, 3.95, 1.99, 2.08) and characters (B, A, C, A, B, D, F, C)

What are some approaches to information privacy ethics?

Embedded in culture Legislation (Canada, EU, limited in US) Regulation (Canada, EU, US) Voluntary codes (Professional, trade)

What are some advantages to Enterprise Resource Planning (ERP) systems?

Enables information to flow seamlessly across functional areas of organization Organizational flexibility and agility o make organizations more flexible, agile, and adaptive - organizations can therefore react quickly to changing business conditions as well as capitalize on new business opportunities Decision support o provide essential information on business performance across functional areas - information improves managers' ability to make better decisions Quality and efficiency o Integrate and improve an organization's business processes, resulting in significant improvements in the quality of customer service, production, and distribution

What is Ransomware?

Encrypts documents or blocks screen/mouse/keyboard access then demands money to unlock (SMS, e-currency, prepaid cards)

What are the benefits of data warehousing to end users?

End users can access needed data quickly and easily via web browsers because these data are located in one place End users can conduct extensive analysis with data in ways that may not have been possible before End users can obtain a consolidated view of organizational data

Why would supply chain management systems use Extranets?

Enhanced collaboration Greater efficiency Cost reduction Improved communication

What is an alternative to Enterprise Resource Planning (ERP) systems?

Enterprise application integration system is an alternative (EAI) - allows existing applications to communicate and share data, enabling organizations to sue applications while eliminating problems caused by ERP systems

What is the relationship model based on?

Entities/instances (subjects/records) ex.students are entities but each individual student is an instance Attributes (characteristics) ex. used to describe students Relationships ex. connect students to certain data

What are deliberate threats to an organization's security and databases?

Espionage / trespass - unauthorized access to organizational data Information extortion - Stolen information Sabotage / vandalism - acts that damage a company's image Theft of equipment or information Identity theft - taking someone's identity to gain access Compromises to intellectual property (privacy) - violations of patents, copyrights, and trade secrets Malware - software attacks Supervisory control and data acquisition - access to computer controlled equipment

Describe the IT Architecture

Everything is placed on the IT Platform: The IT components The IT Infrastructure is composed of: The IT components, the IT personnel, and the IT services The Transaction Processing System is placed on top of the IT Infrastructure and supports the Enterprise Resource Processing Systems The Enterprise Resource Processing Systems consist of: Accounting IS, Financial IS, Production/Operations Management IS, Marketing IS, and Human Resource IS The Business Intelligence Systems Dashboard is placed on top of the Enterprise Resource Processing Systems.

What are information Silos?

FAIS working independently of one another, making the company less efficient

What were each of the three globalizations focused on?

Globalization 1.0: Countries Globalization 2.0: Companies Globalization 3.0: Individuals and groups

What is Data Governance?

Formal business processes regarding how to handle, maintain and protect data

What are the basic components of a computer-based information system?

Hardware: consists of devices such as the processor, monitor, keyboard, and printer Software: a program or collection of programs that enable the hardware to process data Database: a collection of related files or tables containing data Network: a connecting system (wireline or wireless) that permits different computers to share resources Procedures: the instructions for combining the above components in order to process information and generate the desired output

What do most companies strive for?

Highest productivity with the lowest spending

What are 3 business continuity strategies?

Hot-site: fully configured computing facility which duplicates computing resources, communication links, and physical plant operations Warm-site: Provides similar services as a hot-site but does not have the actual applications the company needs Cold-site: Provides only the basic services and facilities, nothing more Off-site data storage: stores valuable data in a secure location geographically distant from the company's data center

What is a management challenge with Risk Management?

How much control should exist

What are some unintentional threats to organizations?

Human error Social engineering

What do IP addresses consist of?

IP address consists of numbers, in four parts, separated by dots: IP addresses are assigned to a host name IP addresses must be unique so that computers on the Internet know where to find one another Names are derived from a system called the domain name system (DNS) Domain names consist of multiple parts that are red from right to left, separated by dots (Ex. software.ibm.com)

Who do Business Intelligence users entail?

IT developers, front-line workers, analysts, information workers, managers and executives, suppliers, customers, and regulators

What is important to maintain alignment of the organization?

IT governance

How is the relationship database model stored?

In a two-dimensional table that contains records which are listed in rows and attributes which are listed in columns

How was the web impacted the rivalry among firms in the industry?

In the past, proprietary information systems provided strategic advantage for firms in highly competitive industries. Visibility of Internet applications on the web makes proprietary systems more difficult to keep secret - web makes strategic advantage more short-lived

Who uses the hardware and software, interface with it, or use its output provided by computer-based information system?

Individuals in different departments at a business organization

What do Organizations have a duty to protect?

Information Privacy Accuracy Property (also known as "fiduciary duty") Accessiblity

What has made the move of many labour intensive industries to countries with lower labour costs easier?

Information Technology

What is an IT response to Technology Pressures?

Information overload - search engines and business intelligence applications enable managers to access, navigate, and use vast amounts of information

What is the most commonly performed database operation?

Information requests

How are data relationships built?

Instances are related to attributes

What do Enterprise Resource Planning (ERP) system do?

Integrates TPS and FAIS applications through single data entry and integrated reporting

What is Business-information technology alignment?

Integration of IT functions with an organization's strategy, mission and goals

What is an intranet?

Internal corporate network that can only accessible by employees. The Virtual private network - secure access over public networks, is protected by firewalls

How does IT and IS connect organizations together?

It facilitates: Information Gathering Online Orders Payment Digital Products

How can BMI create a competitive advantage?

It improves organizational flexibility

How does TPS manage the complexities of transaction data?

It prevents data from errors due to updates It prevents inconsistencies when more then one computer is involved The transaction is reversible if an error does occur An audit trail is preserved

How does IT impact the quality of life?

It provides employees with flexibility to significantly improve the quality of leisure time even if it does not increase the amount of leisure time

How has IT changed mangers' jobs?

It provides them with real-time information, meaning they have less time to make decisions

What is a Wide Area Network (WAN)?

Larger geographic area Connects multiple LANS together Often owned by phone/cable companies, though large businesses may have their own Fibre optic, satellite, microwave

What do portals do?

Limit access and help simply and organize data

What is a Local Area Network (LAN)?

Limited area (<1/2 km) Based on TCP/IP Each device has network interface card Typically ethernet or WiFi-based

Why are internet bulletin boards, newsgroups, and social networking sites threats to privacy?

Many unknown people may be able to view your personal information that is posted

What are some Business Pressures?

Market Pressures Global economy and increasing competitions Demand for response in real time Increasingly informed and powerful customers Social/legal/political pressures Social responsibility Government regulations Ethical issues Security (data, equipment, people) Technology Pressures Innovation and obsolescence Proliferation of data Integration of technology into existing processes

What is one form of implementing data governance?

Master Data intelligence - stores, maintains, exchanges, and synchronizes consistent, accurate, and timely single versions of the truth

What is the difference between master data and transaction data?

Master data hardly changes while transaction data changes with every interaction but is stored and updates the master data

What are some Fair Information Practices?

No secret personal records Individuals can access, amend information about them No use of personal information for other uses without prior consent Managers accountable and liable for damage done by systems Governments can intervene to ensure compliance or deal with non-compliance

Is every business equally as good at using IT?

No. It depends on how well informed a company's employee is in regards to IS and IT

What type of processing does data warehouses use?

On-line analytical processing (OLAP) - involves the analysis of accumulated data by end users

What type of processing does databases use?

On-line analytical processing (OLTP) - business transactions are processed on-line as soon as they occur

What are 3 ways of storing data in a multidimensional model?

One central enterprise data warehouse data in warehouse are accessed by all users (single version of the truth) Independent data marts - store data for a single or few applications, such as in marketing or finance Hub and spoke - stores data in a central data warehouse while simultaneously maintaining dependent data marts that obtain their data from the central repository (single version of the truth)

What are 3 types of entity relationships?

One-to-one: single entity instance is related to another single entity instance One-to-many: single entity instance related to multiple entity instances Many-to-many: a single entity instance can have multiple entity instances which also have multiple entity instances relationships

What are the basic characteristics of data warehouses and data marts?

Organized by business dimension or subject (Ex. customer, vendor, product, price level, region) Use on-line analytical processing (OLAP) - involves analysis of accumulated data by end users, designed to support decision makers Integrated - data are collected from multiple systems and are integrated around subjects Time Variant - maintain historical data - useful to detect trends, deviations from trends, long-term relationships Nonvolatile - only IT professionals can change or update the data Multidimensional - data bases and data marts store data in a multidimensional structure, which consists of more than two dimensions (Ex. data cube) Data is organized by business dimensions (product, geographic area, time period) Users can view and analyze data from perspective of business dimensions

What does a Functional Area Information System support in a business?

Particular functions within an organization

What must be done first if management wants to manage by exception?

Performance standards must be created

What are two types of protection controls?

Physical Controls - Gates, Guards, ID Systems Access Controls - Authentication, Passwords Communication controls - Secure data moving across networks, Anti-malware software/systems, Intrusion detection systems, Alarms but primarily analysis of data, Encryption, Virtual private networks

What is an IT response to Market Pressures?

Powerful customers - customer relationship management is an effective IT response that helps companies achieve customer intimacy

How are entities identified?

Primary key - unique to every instance of the entity Secondary key- identifying but not unique

What are four categories of ethical issues related to information technology?

Privacy - collecting, storing, and dispersing information Accuracy - authenticity, fidelity, and accuracy of information Property (including intellectual property) - the ownership and value of information Access to information - who should have access to information

What are the elements of PIPEDA?

Privacy Commissioner Due Process requires that rules exist that clearly define how information about individuals will be used Based on Fair Information Practices (FIP) Conforms to EU Requirements Complemented by provincial laws (Quebec's is strictest)

What is risk assessment?

Probability x loss = expected annual loss

What ethical problems are arising from the improvements in IT?

Problems concerning the appropriate collection and use of customer information, personal privacy, and the protection of intellectual property

What do Transaction processing systems do?

Provides the collected, monitored, processed, and stored data generated by transactions to the operational databases Ex. recording of sales when items are purchased

What makes data management challenging?

Rapid increase in amount and source of data - both historic and current Data dispersed throughout company Multiple sources and multiple formats Internal, external, clickstream Unstructured data Value declines over time Data errors increase over time Evolving technology makes for more and cheaper data

What are the fundamental tenets of ethics?

Responsibility - accepting the consequences of your decisions and actions Accountability - determining who is responsible for actions that were taken Liability - a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems

How are resources defended?

Risk Management Can NEVER completely eliminate threats Strategies to eliminate stress: • Risk analysis - determining what the risks are • Risk mitigation - implementing responses: o Acceptance - no prevention, but recovery o Limitation - controls o Transference - insurance o Recovery strategies

What are 3 types of reporting?

Routine (regularly scheduled) - Ex. inventory balances, orders received, etc. Exception (only when certain events occur) - Ex. identify only those cases where sales fell outside an established threshold (only those that are more than 20 percent short of the quota) Ad-hoc (on-demand) - chief financial officer might want to monitor cash flow and cash on hand o Drill down (more detail) o Key indicator (routine, but specific critical success factors) - Ex. fuel utilization, occupancy rates o Comparative

What do companies install to ensure their information systems work properly?

Security controls

Is security a technical issue, a business issue or both?

Security is both a technical issue and a business issue. The five factors contribute to the increasing vulnerability of organizational information resources, making it difficult to secure them. Inefficient technology and information systems are vulnerable to many potential hazards and threats. Human error is another threat to security (unintentional threat). The higher the level of employee, the greater the threat he/she poses to information security - higher level employees have greater access to corporate data and enjoy greater privileges. Employees in human resources and information systems (IS) pose significant threats. HR employees generally have access to sensitive personal info about all employees. IS employees not only have access to sensitive organizational data, but often control the means to create, store, transmit, and modify data. Other employees include contract labour, consultants, and janitors and security guards. Employees can also make unintentional mistakes as a result of actions by an attacker - attackers employ social engineering to induce individuals to make unintentional mistakes and disclose sensitive information.

What can risk management be supplemented with?

Security policies o Documents acceptable uses and penalties o Includes authority for various activities

What are bots?

Sleeping agents stored in your computer which hackers can employ when they chose

What increases companies unethical practices risk?

Social media sites

What is an IT response to Societal/Political/Legal Pressures?

Social responsibility (the state of the physical environment) - Green IT is one response that is intended to improve the environment

What are some types of access protection?

Something you are - biometrics Something you have - cards, ID Something you do - say, sign Something you know - passwords

What are Dashboards?

Special forms of IS that support all managers of an organization by providing rapid access to timely information and direct access to structured information in the form of reports

What do data-integration software makes it easy to do?

Specify appropriate tables & attributes in the source systems, to map and schedule the movement of the data to the target (e.g. data mart or data warehouse), to make the required transformations, and ultimately to load the data

What do Data Warehouses do?

Stores clean, current, and historical data Consolidated across entire enterprise Supports data mining, queries, ad hoc reports

Why might it be difficult to justify a strategic information system?

Strategic information systems are costly Porters five forces are inevitable - every organization is driven by these forces and they can not be changed by the web Threat of entry of new competitors (entrants) - web increases the threat that new competitors will enter the market because it reduces traditional barriers to entry, such as the need for a sales force or a physical store front Bargaining power of suppliers - web enables buyers to find alternative suppliers and to compare prices more easily, reducing suppliers' bargaining power Bargaining power of buyers - buyer power is high when buyers have many choices from whom to buy Threat of substitute products or service - new technologies can create products rapidly - if there are many alternatives to an organization's products/services, then the threat of substitutes is high Rivalry among existing firms in the industry - In the past, proprietary information systems (systems that belong exclusively to an organization) have provided strategic advantage to firms in highly competitive industries - visibility of Internet applications on the web makes proprietary systems more difficult to keep secret

What challenges does IT create?

Systems built for internal use but different functional areas and divisions create their own systems which use different technology

What are Expert Systems (ES)?

Systems which attempt to duplicate the work of human experts by applying reasoning capacities, knowledge, and expertise within a specific domain

What is forcing companies to keep up with customer demands?

Technology obsolescence

Why IT is a business pressure?

The business environment is a combination of social, legal, economic, physical, and political factors in which business operate. Changes in any of these factors, due to rapidly evolving IT, create business pressures on organizations.

What is Collaboration?

The efforts by 2 or more entities who work together to perform certain tasks

Why can't most businesses operate without IT?

The environment is so competitive that it is needed to be effective and therefore competitve

What is Ethics?

The principles of right and wrong that individuals use to make choices that guide their behaviour

What approach allows a user to define constantly changing relationships of interest?

The relationship model

What is privacy?

The right to be left alone and to be free of unreasonable personal intrusions

What are Porter's 5 Forces?

The threat of entry of new competitors (entrants) The bargaining power of new suppliers The bargaining power of customers (buyers) The threat of substitute products or services The rivalry among existing firms in the industry

What are 4 approaches to developing ethical standards?

The utilitarian approach: an ethical decision is one that provides the most good or does the least harm The rights approach: an ethical decision is the one that protects and respects the moral rights of the affected parties The fairness approach: an ethical decision treats all human beings equally or unequally, then fairly, based on some defensible stand The common good approach: an ethical decision is built on respect and compassion for all

What would not exist without IT infrastructure?

The various organizational information systems such as accounting IS, finance IS, production/operations management IS, marketing IS, human resources IS

How was the web impacted the threat of new entrants?

The web increases threat that new competitors will enter the market by reducing traditional barriers to entry as competitors only need a website to enter the market Web can also increase barriers to entry, as when customers come to expect a nontrivial (important) capability from their suppliers

Why is managing information systems so difficult?

Their data has strong strategic value that firms cannot function without it They are very expensive to maintain Management Information Systems are constantly evolving

What do knowledge workers do?

They are experts in a particular subject area and create information and knowledge to be integrated into the business

How does a company seek a competitive advantage in an industry?

Through its competitive strategy

What are the objectives of database approach?

To Minimize: Redundancy Isolation Inconsistency And Maximize: Security Integrity Independence

Why do organizations use packet switching?

To achieve reliable end-to-end message transmission over unreliable networks

What are Enterprise Resource Planning (ERP) systems created?

To correct a lack of communication among the functional areas of IS which are often developed as a stand-alone system

What does IT personnel use the IT components for?

To develop information systems, oversee security and risk, and manage data

What do all employees have the responsibility for?

To encourage ethical uses of information and information technology

What is the intent of Enterprise Resource Planning (ERP) systems?

To improve efficiency, accuracy and effectiveness through lower costs and flexibility

Why is data stored in hierarchies?

To make data more understandable and useful as databases have vast amounts of data

What is the purpose of controls?

To safeguard assets

What is Data mining?

Tools for analyzing large pools of data to find hidden patterns and infer rules to predict trends

What is the database approach?

Tools to add, delete, access, analyze data stored in one location to allow shared access to data items

How are databases designed?

Using a entity-relationship model

How does google tailor its searches to the user?

Using a users previous history to search the indexes quicker

What 3 different functional areas does procurement occur in?

Warehouse Purchasing Accounting

What questions are asked in Data Governance?

Who is responsible for security? Who enters data? Who can see specific data? What is valid? When do we back up? Where? How?

Could IT decrease jobs?

Yes because it makes managers more productive and increases the number of employees who can report to a single manager

Do companies working in Canada must conform to PIPEDA rules?

Yes but Canadian companies hiring out of country workers become exempt

Is it legal to monitor employee web use?

Yes but its only ethical to tell them that you are

Is IT a major capital investment?

Yes, it is very expensive to acquire, operate, and maintain

Do business processes cross functional areas in an organization?

Yes.

What are some types of communication technologies?

e-mail, call centers, chat rooms, and voice

What is the underlying basis for an organization's competitive performance?

executing excellent business processes

What are some top level domain names?

o com commercial sites o edu educational sites o mil military government sites o gov civilian government sites o org organizations

What are Office Automation Systems (OAS)?

systems to support employees of an organization to help them develop documents, schedule resources, and communicate

What can the Management Information System's functional area in a business be referred to?

the MIS Department the Information Systems Department the Information Technology Department the Information Services Department

Break down uvic.ca/gustavson/BCom/admit.html

uvic.ca - domain Gustavson - folder on the domain site BCom - subfolder within the folder on the domain site Admit - document on the domain site stored in a folder


Conjuntos de estudio relacionados

Chapter 03: Market Demand and Supply

View Set

Project Scope Management (7) (CAPM Basics: Set 4)

View Set

2-2-1 Introduction to Test Instruments

View Set

Study Guide Unit 1 - Geology 1114

View Set