computers in business
examples of MIS
-TPS -DSS -ESS
data analyst
-acquires info through use of databases -interprets the info -creates reports for senior management
IDS terms
-alert -halt -honeypot -block
ESS (Executive Support Systems)
-allow senior management to drill-down into all areas of a business's sales, inventories, production, marketing, and operational databases
remote desktop software
-allows user to control or display any computer on network -allows administrator to provide computer assistance from central location -allows for individual computer activity monitoring in cases of suspected network abuse -common feature of large business computer networks
information systems (IS) technician
-also known as IT -installs, maintains, repairs, and replaces IS hardware and software
information systems (IS) program manager
-also known as IT program manager -directs IS technicians -works with developers and senior management to procure and implement IS processes -develops training plans and policies for IS
Information Systems (IS) security manager
-also known as an IT or upper-security manager -creates and implements IS security measures -keeps sensitive info and networks (including WIFI) secure
ERP (Enterprise Rescue Planning)
-business management software that encompasses nearly all business activities in a corporation -covers supply purchasing, production or service levels, marketing, sales, shipping, human resource management, and finance and accounting -gives corporation leaders tools to manage everything within the organization
SCMS (Supply Chain Management Software)
-combines records keeping of TPS with the forecasting capabilities of DSS to help businesses manage inventories efficiently -focuses on inventory management efficiency and effectiveness
failure of ethical employee computer behavior can lead to
-decreased individual performance -decreased network speed -security breaches -loss of data -charges of harassment
DBA (Database Administrator)
-develops and maintains the database itself -establishes user privileges for database to help protect data -monitor's database's performance
AUP (Acceptable Use Policy)
-established by businesses to provide guidance for how its network should be used -restrict the way networks may be used -attempt to minimize the risk of having to take legal action
disadvantages of employee monitoring software
-impractical for large businesses -easily misused
DSS (Decision Support System)
-provide mid-level and upper-level management with tools to assist them in managing their organizations
TPS (Transaction Processing System)
-tracks sales and inventories for an organization -compiles the gathered info into a database where it can be analyzed or used for decision making or by decision support system software
advantages of employee monitoring software
-useful for small businesses -administrator can physically see each computer's activity
employee monitoring software
allows network administrator to view all computer activity from central location
block
closes the access point used by the hacker
in accounting
computer systems are critical to maintaining records and creating necessary reports
in research and development
computing power is essential
early wire-wire scam version
criminals pretended to be executives from suppliers who told customers to change the account
in operations
decision making software helps ensure best practices
honeypot
easily hacked portion of a network used to catch intruders
wire-wire scams
email fraud where criminal changes the account where money is being transferred/wired
data corruption
errors in data occurring while entering, reading, processing, storing, or transmitting
later wire-wire scam version
malware intercepts outgoing email and changes the recipient's routing and account numbers
top level managers such as executives, presidents, and vice-presidents use IS to
monitor overall business performance and forecast future opportunities and threats
in marketing
online sales and advertising, including the use of social media and techniques such as search engine optimization, have become critical
middle managers use IS to
record and report business performance and to implement the policies set forth from upper management
first level managers such as supervisors use IS to
schedule routine operations and for monitoring employee performance
MIS (Management Information Systems)
software that assists managers by improving efficiency and effectiveness
data theft
stealing confidential materials such as copyrighted material, confidential info, or company emails from a network
halt
stops hacker's activities
in finance
up-to-the-second information can make or break investors and investment decisions
alert
warns network administrators that an intruder has been detected