WGU C724

¡Supera tus tareas y exámenes ahora con Quizwiz!

Information Security Training

With the knowledge of potential risks and threats to privacy, citizens may help themselves understand the value of their information assets. This can help individuals guard against high-tech and low-tech methods of loss, including social engineering and malware.

Lightweight Directory Access Protocol (LDAP)

Created by the International Telecommunications Union; a standardized protocol that defines the organization of a set of directory records, such as groups, individual names, and attributes that are associated with them.

Advanced Networking

Creations of networks that connect widely disparate regions, peoples, and cultures allows for information sharing on a global scale, causing issues concerning the appropriateness and authority of those sharing it.

The Four Organizational Dimensions of the Balanced Scorecard

Financial, Business Process, Customer, and Learning and Growth.

Phishing

Often completed through email, this generic act of fraud is often in the form of an email requesting a response containing sensitive information, such as a username or password.

Simple Mail Transfer Protocol (SMTP)

One of several popular email protocols in use today (others include IMAP and POP3).

Community Provider

Online communities provide a space which individuals, families, and groups might meet and share content and communications. Examples of online community providers include Facebook, Google+, and LinkedIn.

Data

Symbols or signals that are input, stored, and processed by a computer for output as usable information.

Three Types of System Evaluation

System-oriented, function-oriented, and strategy-oriented.

Convergence

The ability for a telecommunication network to carry voice, data, and video.

Relationship with Business Strategy

The adoption or construction of an information system must be aligned with the organization's goals.

Evolution of Computers (Hardware)

The earliest commercially available electronic, digital computer occupied a 20 foot by 40 foot room and consisted of 18,000 vacuum tubes. Vacuum tubes were replaced by transistors that were replaced by integrated circuits. a) First Generation: Vacuum tubes (1940 - 1956) b) Second Generation Transistors (1956-1963) c) Third Generation Integrated Circuits (1964 - 1971) d) Fourth Generation: Microprocessor (1971-Present) e) Fifth Generation: Artificial Intelligence (Present and Beyond) are bringing us capabilities such as voice recognition

Governing Agencies

The government and quasi-government regulators that help to enact and enforce legislation, including the Federal Communications Commission (FCC) in the United States, that somewhat affect what is and is not acceptable on the Internet.

Self-Regulation of Industry

Along with several U.S. and EU laws that require the protection of privacy for their customers, each society provides an expectation for its businesses to establish their own protocols for protecting the interest of their many stakeholders.

Floating Operations Per Second (FLOPS)

Computing power is increasing as clock speeds get faster and more operations can be performed per second.

The Three Goals of Information Security for Data

Confidentiality, Integrity, and Availability

Cookie Management Software

Cookies are tidbits of information stored on your computer. They require a secure browser that uses industry security standards to encrypt your purchase information. Look for the padlock symbol to the left of the URL, along with the https: at the beginning of the URL.

SDLC - Strengths

Cost evaluation, capability, documentation, user input, ease of maintenance, and ability to survive IS staff changes.

Key Performance Indicators (KPI)

are used by executive and upper management to see how the organization is performing in certain areas.

Satellite Communications

are used to link telecommunications networks over long distances.

Object-Oriented Database Model

are used when media or other types of files are required because multimedia files and diagrams or blueprints such as those generated by computer aided design (CAD) are more complex and not easily sorted by columns and rows. This is a centralized database.

Semi-Structured Decisions

are used when only a portion of the problem can be solved via an established procedure. Middle managers more commonly make semi-structured decisions.

Health Analytics Tools

are usually apps created for smartphones or portable devices to keep track of the device owner's health and exercising stats, and they have limited capabilities.

Net Marketplaces

bring together potentially thousands of businesses in combined consortium networks for similar purposes: creating efficiencies and synergies between and among member businesses. Net marketplaces often, but not always, provide more of a focus on individual transactions versus lasting relationships.

Jitter

bufferboat can cause packet delay variation

Database Administrators (DBA)

build databases to store data to meet business needs and are responsible for all three functions including focusing on security and access requirements, designing, and performing testing to ensure performance.

Six Elements of Business Intelligence

business environment data, business intelligence infrastructure, business analytics tool set, managerial users and methods, delivery platform, and user interface.

The General Types of Business Models in E-Commerce

business-to-business (B2B), business-to-consumer (B2C), and consumer-to-consumer (C2C).

Entity-Relationship Diagrams (ERDs)

is a data modeling technique that helps graphically illustrate business processes and can also be used as the foundation for a relational database. The data components (known as entities) have various properties (known as attributes), and relate to each other in various ways (known as relationships).

Static Data

is a fixed data set that does not change after being recorded.

Prototyping

is a four step process that develops software module quickly and inexpensively for user evaluation.

Unified Modeling Language (UML)

is a general-purpose modeling language designed to provide a standard method to represent the design of a system.

The Principles of Business Owners who Collect Data

collect justly, maintain data for quality, collect transparently, keep data confidential, keep data secure, collect openly, provide for validation, are accountable.

Transaction processing systems (TPS)

collect, store, update, and retrieve transaction data within an organization and is used by middle management.

Textual Databases

contain text resources, such as social media messages and email, and are mined for sentiment analysis.

Market Creator

functions like a traditional bazaar or shopping mall, bringing together buyers and sellers through the Internet and collects a fee for helping to create the opportunity. Examples include Amazon's Marketplace and eBay.

The Three Primary Activities in Business Performance Management

goal selection, consolidation of information for the measurement of goal attainment, and management intervention for goal achievement and performance optimization.

Nation State

government focused and funded individuals or organizations interested in cyber-warfare against other nations and economic infrastructures.

Packet Switched Networks

group data in packets and are transmitted in multiple simultaneous communication sessions.

Knowledge Management

handles information and resources within an organization by capturing, distributing, and effectively using knowledge.

Data Inconsistnecy

happens when the same attribute has different values when the data is stored in more than one location.

The Five Components of Management Information Systems (MIS)

hardware, software, database, network, and people.

The Four Components of the Executive Support Systems (ESS)

hardware, software, user interface, and telecommunications.

Chief Technology Officer (CTO)

has the responsibility for implementing technology strategies.

Data Packets

have the destination IP address, the actual information to be sent, which can be parceled into many other packets, and error detection in case transmission fails.

Organizational Risk

hierarchies, policies, and procedures. These factors naturally allow organizations to operate as successful businesses, but also help to define categories risks, vulnerabilities, and threats, and create targets for criminals.

Structured Decisions

involve an established procedure, are repetitive and routine, and therefore can be handled in the same manner each time. Line-level managers and non-management employees typically make these types of decisions.

Risk Management

involves determining the vulnerability, assessing the impact that risk would have if event occurred, evaluating cost/benefit analysis to avoid or transfer the risk, and implementing the plan.

Risk Identification

involves determining which risk might affect the characteristics of the project and/or documents.

Acceptance Testing Process

involves end user evaluation and review of the system in order to demonstrate that the system is ready to be rolled out.

Planning

involves identifying and preparing for future needs in order to prepare and budget for future upgrades and modifications.

Qualitative Risk Analysis

involves performing an analysis of the risks and conditions in order to prioritize the effects on a project.

Risk Response Planning

involves the development of procedures and techniques that enhance opportunities and reduce threats to the project or system.

Entity Integrity

is a basic constraint of database relational model (abbreviated RM) that refers to the morphology of the primary key.

Work Breakdown Structure (WBS)

is a broken down list of all deliverables showing what the customer will get at the end of a project.

Computer Network

is a collection of interlinked computers that can exchange information over links in the form of digital packets.

Information Technology Infrastructure Library (ITIL)

is a common set of best practices widely used by businesses to give guidance to companies on how to use IT as a tool for implementing change.

Network Host

is a computer connected to a network and is also known as data terminal equipment in computer networking hardware and is a physical node with an IP address.

Network Bridge

is a computer networking device that creates a single aggregate network from multiple communication networks or network segments.

Network Management Application

is a computer software tool that gathers traffic data from the network to ensure network performance is optimized.

Smartphone

is a converged device that combines a cellular phone device with a mobile computer platform.

Data Preprocessing

is a data mining technique that involves transforming raw data into an understandable format.

Software Engineer

is a higher level computer programmer. Someone in this position not only writes the code but is responsible for designing a new application, developing specifications, overseeing the implementation, and supporting users after implementation.

Database Server

is a powerful computer that stores the databases and DBMS to access and administer the database.

Encryption

is a process by which data are encoded so that only persons with a decryption code may unlock and retrieve stored messages.

Predictive Analytics

is a process in data mining in which statistics, historical data, and data mining produce models and forecasts about potential customer behavior and future business trends.

Data Quality Audit

is a process to determine the reliability, completeness, and accuracy of the data in a database.

Uniform Resource Locator (URL)

is a protocol used by a client computer to request a website from a server via HTTP or HTTPS.

Virtual Private Network (VPN)

is a secure tunnel through the Internet using a public network infrastructure.

Near Field Communication (NFC)

is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm (1.6 in) of each other.

Referential Integrity

is a set of rules that prevent or limit incorrect data being entered int he database and establishes relationships between objects in different tables.

Network Protocol

is a set of rules, at different levels in the connection that communication devices use to ensure quality of signal transmission and reception.

Database

is a set or collection of data that is centrally located in an electronic format, organized in tables, and easily searchable.

Data Mart

is a smaller subset database from a data warehouse typically focused on a single area or function. Think of ASAP as a part of Epic

Firewall

is a software application or hardware appliance that filters and blocks malicious content from one network to another.

Mashups

is a software application that allows users to mix and match software components in order to create a customized application.

Database Management System (DBMS)

is a software program that allows an organization to organize, manage, and provide multiple users with access to data used to perform administrative tasks to databases.

Critical Path Method (CPM)

is a step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems.

Optical Character Recognition (OCR)

is a system that uses a scanner to read characters, automatically inputting them into the system in digital form.

Flat File

is a type of database model that resembles file cabinet functionality.

Hierarchical Database

is a type of database that connects tables in a master/slave, leader/follower, or primary/replica format and is a tree-like structure.

Wireless Communications

is a type of telecommunication network that uses radio waves to send and receive signals over the radio spectrum.

Telnet

is a very old and insecure method of accessing a remote network.

Rich Site Summary (RSS)

is a web feed format used by publishers for the periodic dissemination of information including news, blog entries, summaries, or full text of interest to subscribers.

Secondary Storage

is accessed only through a system's input/output bus and is generally several orders of magnitude slower than primary storage technologies.

Standard

is an accepted model from which independent parties or governing bodies agree as a basic concept from which to operate.

Intelligent Character Recognition (ICR)

is an advanced form of OCR that enables the computer to learn several different fonts and handwriting styles in order to improve accuracy and recognition.

Cost-Benefit Analysis (CBA)

is an analysis of the pros and cons of a given situation or course of action to determine how the downsides compare to the upsides.

Software-Defined Networking (SDN)

is an approach to computer networking that allows network administrators to programmatically initialize, control, change, and manage network behavior dynamically via open interfaces and abstraction of lower-level functionality.

802.3

is an ethernet standard and defines the LAN connections.

Hypervisor

is an expensive virtual machine monitoring application used by large organizations to improve computer network performance without having to physically change the network.

Scrum

is an incremental form of agile software development with emphasis on planning.

Next-Generation Firewall (NGFW)

is an integrated network platform that is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS).

Rapid Application Developement (RAD)

is an iterative alternative to the conventional waterfall model of software development. focuses on the development's process, with limited emphasis on the planning process.

Agile Model

is an iterative development model and encourages adaptive planning and development, fast delivery, continuous improvement, and flexibility in response to change. uses collaborative, self organized, and cross functional teams.

Protocol

is an official procedure that stems from the standard in question.

Online Transaction Processing (OLTP)

is an operational database and is used for browsing and manipulating business transaction activity to enable real time business analysis of records to help in business decision making.

Agile Software Development Methodology

is an operational method by which software developers iteratively gather requirements, plan, design, develop, test, and implement software.

File Transfer Protocol (FTP)

is an unsecure method used to transfer files from one computer to another.

Long-Tail Marketing

is collective use of social media sites for marketing.

Information Management

is concerned with collecting, managing, manipulating, organizing and reorganizing, and distributing information from a variety of sources to a variety of audiences in an organization.

Chief Security Officer (CSO)

is concerned with overall security functions for a business.

Data Governance

is concerned with the management of data, including maximizing quality through effective utilization, availability, integrity, and protection.

Information Technology Management

is concerned with the management of resources that facilitate access to information.

Open-Source Software

is developed not by single users or companies, but by communities of connected users and groups. Examples include the many forms of Linux, including Red Hat and Ubuntu and Android.

Bufferbloat

is high latency in packet-switched networks caused by excess buffering of packets.

Centralized Database

is located, stored, and maintained in a single location

Converged Network

is one in which voice, data, and video are all carried on the same network, with the business no longer using a traditional telephone network.

Disaster Recovery Plan (DRP)

is one that depicts the process involved with returning operations to their appropriate function in case an emergency or disaster halts them.

Handheld Scanner

is one that is moved by hand over the material being captured (barcode scanner).

End-User Development

is a largely informal method of solutions development by end users, made possible by the availability of fourth-generation languages that enable end users to develop systems and solutions with little or no assistance from professional technical specialists.

Denial-of-Service Attack

is a means to disrupt, interrupt, or suspend services of an Internet host computer (not a wireless network). These do not turn off the host, but instead overwhelm the host with queries, rendering the website unavailable.

Parallel Adoption

is a method of system transfer in which the old system continues to operate for a period of time while the new system is implemented.

Voice over Internet Protocol (VoIP)

is a modern telecommunications technology that offers convergence between voice and data networks.

Mesh Network

is a network topology in which each node relays data for the network.

Hub

is a networking device that connects computer devices together in a LAN, sending data traffic to all networked components.

Router

is a networking device used to pass packets to the next network node until the packets reach the ultimate destination.

Radio Frequency (RF) Site Survey

is a newer, more secure encryption protocol for wireless networks to ensure optimal performance.

Wi-Fi Protected Access (WPA)

is a newer, more secure encryption protocol for wireless networks.

Frame Relay

is a packet switching network protocol used to establish circuit switching for voice or video.

Schema

is a planned design structure of the database and involves creating the definitions behind the tables and data constraints.

Decision Tree

is a popular decision analysis tool that uses a tree-like graph to model decisions in order to identify the most appropriate strategy to reach a goal. Think of a Visio.

System-Oriented Evaluation

is the ability of an information system to discriminate between files or data that are relevant to a user query, and those which are not relevant. This enables management to make informed decisions about the future mission.

Scalability

is the ability to grow the user base and data services such as multimedia.

Expandability

is the ability to reach further or expand network coverage.

Input

is the act of capturing or collecting data from an organization or environment.

Sniffing

is the act of eavesdropping on network traffic in order to acquire traffic data packets and decoding. The information gathered can be used to hack into a network.

Wardriving

is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA).

Output

is the act of transferring processed information to the appropriate users.

Project Management

is the application of planning, organizing, time management, leadership, communication, and problem-solving skills to accomplish an objective and deliverable on time and on budget.

Platform as a Service (PaaS)

is the capability provided to the consumer to deploy onto the infrastructure consumer-related or acquired applications created using programming languages, libraries, services, and tools supported by the provider.

Infrastructure as a Service (IaaS)

is the capability provided to the consumer to provision processing, storage, networks, and other fundamental computing resources.

Software as a Service (SaaS)

is the capability provided to the consumer to use the provider's applications running on this kind of infrastructure.

Business Performance Management (BPM)

is the collection of analytic and management processes that enable organizational performance management in order to achieve goals or objectives.

Hypertext Transfer Protocol (HTTP)

is the communications protocol at the foundation of all communication of the world wide web.

Chief Information Officer (CIO)

is the company's top technology leader and focuses on the people and technology needed to run a company and serves as the technology infrastructure manager for the company and oversees information systems matters.

Strategic-Oriented Evaluation

is the determination of whether the information system outputs enable management to make strategic decisions that will help develop and achieve the future mission and vision of the organization.

Motherboard

is the device that contains the system bus and connects the various input and output devices that compose any given computer system.

Open System Interconnection (OSI)

is the foundation for data communication protocols and is an international standard that governs the development of data communication protocols (consists of seven layers).

Information

is the meaningful organization of data so that statements can be made about them.

Internet of Things (IoT)

is the network of products (or things) that can be connected through the internet, communicate with each other and with the environment, and transfer data over a network.

Multiplexing

is the process in which multiple signals are combined into one signal, which is then transmitted over a shared medium.

Decision Analysis

is the process of dividing a complicated decision into components, determining alternative solutions, and applying mathematical formulas to determine estimated payoffs for each alternative.

Telecommunication

is the process of exchanging information between various entities over electrical, electromagnetic, or digital networks.

Decision-Making Process

is the process of identifying and selecting an alternative based upon the values and preferences of the decision maker. And is one of the primary functions of management and is supported and reliant upon information technology.

Data Mining

is the process of identifying hidden patterns and relationships in large databases and applying rules to that data in order to predict future behavior.

Extraction, Transformation, and Loading (ETL)

is the process used to gather data from multiple sources (such as enterprise resource planning [ERP] systems, customer relationship management [CRM] systems, and line of business units [LOB]) and transforms the data to store in one data warehouse.

Supply Chain

is the sequence of processes involved in getting raw materials for a product all the way to the production and distribution of a product into the hands of the customer.

Transmission Control Protocol/Internet Protocol (TCP/IP)

is the standard communication rule of the Internet and governs Internet data network rules.

Privacy

is the state of being free or left alone and every individual has the right to privacy and to be left alone from individuals, organizations, and the state.

In-Memory Computing

is the storage of information in the main random access memory (RAM) of dedicated servers rather than in complicated relational databases operating on comparatively slow disk drives.

Business Intelligence

is the term used to describe the infrastructure, data, and software tools that help to analyze, organize, and control access to data in order to enable managers and others in the enterprise to make better and more informed decisions.

Public Switch Telephone Network (PSTN)

is the total circuit switch-based telephone network that uses technology invented by Alexander Graham Bell.

Computer-Aided Software Engineering (CASE)

is the use of computer methods to organize and manage software development in information systems.

Frequency

is the wavelength or position on the radio frequency spectrum in which the signals are exchanged and measured in cycles per second or hertz.

SRAM

is used as cache memory, to access the most frequently used instructions and data more quickly.

Balanced Scorecard

is used for strategic planning and management to help align business activities with organizational strategy. It helps improve communications and monitors performance.

Core Routers

is used to connect the enterprise to the Internet in the backbone in order to handle large amounts of data traffic.

Benchmarking

is used to evaluate business processes and performance by comparing them to industry standards and determining how well a company is performing.

Quality of Service (QoS)

is used to measure performance for specific types of data communications and ensure that communications are effectively transmitted.

Packet Analyzer or Network Sniffer

is used to monitor or log traffic on a network for troubleshooting or analysis. Can be used by hackers to hack a network.

Post Office Protocol (POP)

is used to retrieve email from a mail server.

Moderate-Level Risk

is very serious and would result in severe impairment, major damage, and would adversely impact the organization's operations.

Data Redundancy

is when the same piece of information is stored in more than one location.

Application Layer

is where applications create and communicate user data to other applications on the same or another host.

Bluetooth

is wireless technology used to exchange data over short distances, such as between a cell phone and an earpiece or a car stereo system.

Spoofing

is penetrating a network by disguising intruding data packets. This leads to more packet encapsulation information as the network responds by sending useful information back to the hacker, which enables the hacker to gain further access to the system by identifying network access information contained within the responses.

Feasibility Study

is performed to determine whether the proposed system is a good investment, whether the necessary technology is available, whether the user's information specialists can manage the system, and whether the organization can adapt to the changes introduced by the new system.

Chief Executive Officer (CEO)

is responsible for the success or failure of the company, creating the company culture, and setting strategy and vision.

Digital Packets

is simply a unit of data forwarded by a network.

Technological Pressures

response to these pressures by planning for improvements to reduce or manage complexity, creating faster and more accurate models to make better decisions, and innovating to sustain competitive advantages, to keep up with competitors, or to enter new markets.

Economic Pressures

response to these pressures by realizing the need to plan for or react to a changing workforce, powerful suppliers, customers, and/or competitors.

Proprietary Software

is software where the source-code and development are controlled by the developer or a licensee. Examples include Microsoft Windows, Apple's Mac OS X, and the many forms of UNIX. Open-source software, however, is software whose source-code is freely available to developers and users. Microsoft, Apple, Unix

Technological Risk

stem from computer systems, equipment, and wiring that allow employees to collaborate and produce goods and services. Risks that originate from these factors include obsolete, broken, misused, or inadequate technology or services that might cause an organization to lose money.

Object

such as forms, queries, and reports, allow the user to locate, display, and print data in different formats.

Leveraging Existing Resources

such as instruction manuals, white papers, and Internet forums, additional documentation and training can be developed with limited time and expense.

Lower CASE Tools

support development activities such as design, testing, debugging, and maintenance.

Upper CASE Tools

support system analysis and modeling

Enterprise Resource Planning (ERP)

systems tightly integrate functional areas such as accounting, finance, project management, inventory control, purchasing, human resources, customer retention, sales, and marketing into one single, comprehensive IT system to allow for more focused system wide decisions.

Porter's 5 Forces Model

that helps companies develop competitive strategies using Information Systems. Includes new entrants, substitute products or services, bargaining power of customers and suppliers, and competitive rivalry.

Direct Implementation

the old system is replaced by the new system without any rollout or overlap.

Circuit Switching

the path is decided before the transmission occurs. ideal for communications that require data to be transmitted in real-time; a constant connection is required before transmission begins. used for VoIP, video conferencing, video, and multimedia communications.

Hardware

the physical equipment and devices that make up a computer system and are connected by networks. Includes input, output, and storage devices.

Wide Area Network (WAN)

typically connects business campuses consisting of computer systems across large distances.

Local Area Network (LAN)

typically connects computer systems of an organization or a floor of a building.

Service Provider

where Amazon offers goods that are purchased and shipped, and digital services such as Amazon Web Services, where online storage space and processing power is rented, or paid as an ongoing subscription. Other examples include the many options and utilities provided by Google Apps.

Risk Mitigation Planning

where these are planned to be avoided, reduced, accepted, or transferred.

ITIL and COBIT

which deal with the management of an information technology infrastructure.

ISO 27001

which deals with information security management

ISO 9000

which deals with quality management

Electronic Data Interchange (EDI)

which is the electronic exchange of data and documents from one computer system to another through a standardized messaging format that does not require human intervention. This is most commonly used to exchange reports, purchase orders, or view invoices.

System Bus

which is the medium through which communications between the input, processor, storage, and output occur.

802.1

wireless communication protocol used to connect devices in a LAN environment.

Supply Chain Management (SCM) System

works to increase the efficiency of the process of getting materials developed into the products and pushed out to the customer.

High-Level Risk

would result in complete loss of capabilities, posing a catastrophic threat to the organization, including possible loss of life.

Customer Relationship Management (CRM) Systems

uses technology to merge marketing with business processes to strengthen customer relationships and organize customer information (likes, dislikes, and previous purchase history).

Data Retrieval

using queries, data is retrieved and combined.

Tertiary Storage

usually consists of an automated robotic mechanism to mount and dismount magnetic tape or optical discs. With the intention of storing unchanging data, regular and frequent snapshots or backups of data are placed on magnetic or optical media and then stored and/or removed from the automated system and archived.

E-Commerce

was born out of the connection and facilitation of the trade of goods and services between buyers and sellers via computer networks, or the Internet.

Code Division Multiple Access (CDMA)

was developed as the protocol during the second generation cellular networks.

Global System for Mobile (GSM)

was the protocol for the first generation of cellular networks.

Sentiment Analysis

(aka: Opinion Mining) is a software tool that businesses can use on the Internet to examine and obtain opinionated information collected from social media websites.

Data Administration

(including maintaining data integrity) recovering corrupted information, and managing users and group access to the data.

Waterfall Model

(is part of the SDLC) is the traditional systems development method, so named because each stage must be completed before moving on to the next stage. Uses the following steps: systems analysis, system design, programming, testing, conversion, and production and maintenance.

UNIVAC

(room sized) and lighter (15-ton) derivative descendent of ENIAC, this is the first commercially available mainframe

Advantages and Disadvantages of Information Technology Management

1. Brings order to chaos by providing structure, standards, policies, and protocols. 2. an organization can do a better job at competing within its markets, and effectively communicating with its stakeholders. 3. Once information technology (computers, peripherals, etc.) is implemented, support for these must be managed to minimize the risk of failure or obsolescence and to ensure that they are being properly used, managed, secured, and maintained by the people that know them.

In developing information systems, organizations generally accommodate non-domestic developers by changing the structure of operations in these different ways

1. Decentralized development, where developers in different locations develop their own solutions independently. 2. Duplicated systems development, where developers in the centralized location develop information systems and tools, which are then intended to be operated on similar systems at each of the international locations (Laudon & Laudon, 2012). 3. Networked development, where development and operations are planned, combined, and coordinated between international locations

Programming Languages

1. First Generation - Machine Languages (1GL) specific to manufacturer (switches, punch cards, etc.) 2. Second Generation - Assembly Languages (2GL) specific processor or environment 3. Third Generation - High-Level programming Languages (Fortran, Cobol, C, Java, C++, and C#) 4. Fourth Generation (4GL) - software tools that help reduce the amount of procedural knowledge (Perl, Python, Ruby, SQL, Crystal Reports, Peoplesoft, and mySAP ERP.

Challenges to Global Information Systems

1. Laws that limit information transfer, including trans border privacy and data transfer laws and other regulations. 2. Social and cultural norms. 3. Cultural particularism, which are societal norms instilled in populations that tie them emotionally to local brands or habits.

Strategies for Managing Project Risk

1. Risk Acceptance - Accepting that a risk will occur and doing nothing to avoid or prevent it. 2. Risk Avoidance - Developing an alternative plan for achieving objectives by avoiding a specific risk or risk category. 3. Risk Sharing - partnering with groups of individuals who have more experience and who will accept or absorb some of all of the risk involved. 4. Risk Reduction - Acting to reduce the potential for a risk to occur or affect damage to the project. 5. Risk Transference - Shifting risk to another party.

Major Reasons Firms Invest in Information Systems

1. achieve operational excellence 2. develop new products and services 3. attain customer intimacy and service 4. improve decision making 5. promote competitive advantage 6. ensure long-term survival 7. develop strong relationships with suppliers An information system can provide solutions to problems and economic value to a business.

Advantages and Disadvantages of Information Management

1. failures and problems can be spotted before they become too expensive to handle 2. more information can be sorted, summarized, analyzed, and digested for decision making by fewer people. 3. the use of accurate reports and analytical data, both time and money can be saved by better selecting or reworking projects so that they have the best chance for success. 4. organizations must rely on experienced and expensive human and technological resources to create them or on the companies that supply them. 5. integrations into the various sources of data, as well as the data themselves, must be accurate, reliable, and be able to be maintained.

ENIAC

30-ton 1,800 ft2 (sometimes called the "Great Brain"), the first general-purpose electronic, digital computer used to calculate artillery ranges

Categories of Generalized Ethical Issues in IT

Accessibility, accuracy, privacy, and property.

Table

A collection of related records. For example, a set of customer records would all be contained in one table.

Foreign Key (FK)

A common field that exists in multiple tables that is used to form a relationship. For example, a customer might be assigned a specific sales representative. The customer's record might contain a sales rep ID that would link to the Sales Rep table.

Primary Key (PK)

A field that uniquely identifies a record, such as customer ID or student ID.

Social E-Commerce

A form of electronic commerce which uses social networks to assist in the buying of selling of products. This type of commerce utilizes user ratings, referrals, online communities and social advertising to facilitate online shopping.

Grid Computing

A form of supercomputer constructed from many smaller systems that have been connected together.

Mainframe

A high-capacity, high-performance system built for large organizations and used to quickly process large volumes of data.

Pharming

A high-tech attack that is an act of using malicious code to redirect users to a website that mimics the appearance of an official page, but that merely collects sensitive information, such as names, addresses, phone numbers, usernames and passwords, and security questions and answers.

Tailgating

A low-tech attack that allows unauthorized personnel access to sensitive or restricted areas merely by overtly or covertly following an authorized employee through a controlled access entry point.

Shoulder Surfing

A low-tech attack that is as simple as watching someone type in their password, or obtaining sensitive information from a computer screen.

Baiting

A low-tech attack where an attacker depends on the victim's greed or curiosity to provide sensitive information. An example might be an intentionally dropped USB drive left openly in a busy parking lot.

Workstation

A more powerful system used by individuals in order to run more resource-intensive applications.

Business Ecosystems

A network of businesses, such as suppliers and distributors, that are involved in providing delivery of a service or product through cooperation.

Record

A set of related fields, also called a tuple, that describe one occurrence of an entity, such as a customer.

Virtual Computing

A software-based platform that allows multiple virtual servers, isolated from host computer, to operate on a single or, potentially, a fabric of many systems. Initially intended to more efficiently use expensive and underutilized hardware, virtualization has allowed for better fault tolerance and flexible, dynamic, and automated server operation and maintenance.

Field

An attribute of an entity, such as name, address, or student ID.

TELNET

An early and insecure remote access protocol used to allow a user to log on to a remote system.

Quid Pro Quo

An exchange of something of value for information.

Portals and Connections

Applications, protocols, and other technology that allow protected and unprotected connections from one computer to another.

Content Provider

As with traditional newspapers, cinemas, and video stores, online content providers rent or sell online access to digital content, such as music, news, video, and images. Examples include iTunes, Shutterstock, and Netflix.

E-Tailer

As with traditional retailers of goods, groceries, and other physical products, they provide access for the sale of physical goods, which are then shipped to their customers. Examples include pure-play firms such as Amazon, as well as traditional brick-and-mortar organizations such as Best Buy and Walmart.

Evolution of Software

Before the late 1940s, reprogramming a computer with different instructions consisted of changing manual switches (as in on or off switches), wiring, or using punched cards to reconfigure mechanical components within them. a) From the first numerically based computer languages, such as FORTRAN in the 1940s and 1950s. FORTRAN stands for Formula Translation/Translator and is used for math, engineering, and scientific calculations b) English-like programming languages, such as COBOL in the 1960s. COBOL stands for Common Business Oriented Language and was the first computer software language for business applications. c) Java and C++ are examples of contemporary programming languages, with Java enabling online game development. d) Integrated Development Environment (IDE) is a programming environment that provides tools, like compilers and debuggers, for developers to write code. e) Pseudocode is an informal high-level description of the operating principle of a computer program or other algorithm. It uses the structural conventions of a normal programming language, but is intended for human reading rather than machine reading. Pseudocode typically omits details that are essential for machine understanding of the algorithm, such as variable declarations, system-specific code and some subroutines.

Six Methods to Increase User Adoption

Benchmarking, usability testing, user communication, forming an internal user group, planning, and leveraging existing resources.

Direct Marketing

Both manufacturers and retailers may sell directly to their customers using a disintermediated online marketing strategy, perhaps in addition to others.

Localized and Personalized E-Commerce

Businesses that understand their customer patterns and desires, and can quickly provide them with what they need in the areas where they live, with a tolerable adjustment in quality, will help to gain their trust and respect. Leads to more sales.

SDLC - Disadvantages

Difficulty in responding to change, time intensity, limited iteration, and inability to easily return to an earlier stage.

Electronic Communication

Email, instant messaging, audio and video communications, and unified communications.

Point-to-Point Protocol (PPP)

Encryption is used to ensure the privacy of the content being communicated.

Moore's Law

First postulated by Intel co-founder Gordon Moore in 1965, Moore's Law says that computing power and storage capacity will continue to increase or double approximately every two years.

Dumpster Diving

Gathering sensitive or nonsensitive information from refuse. This sometimes illegal act is as simple as foraging through household or corporate garbage receptacles for information.

Digital Goods

Goods that may be purchased and downloaded, versus requiring physical delivery to acquire, or shipment from a retailer's physical or electronic storefront. Such goods have a delivery-on-demand nature, a miniscule inventory footprint, and a near zero cost per unit to produce more. Products with these characteristics include music, video, traditionally printed material (e.g. newspapers and magazines), and, given trends in 3D printing, eventually more tangible products, too.

Web Programming Languages

HTML - Hyper Text Markup Language - converts plain-text document into one optimized for viewing as a web page. HTML5 allows developers to better embed multimedia without special add-ons. XML - Extensible Markup Language - similar to HTML, but easier to exchange and interpret data between a variety of applications and systems. Web Design Tools - WYSIWYG (Dream Weaver, Visual studio). Graphic Tools - interactive multimedia are popular in web pages. Photoshop, flash, and premier. SEO - tools that allow webmasters to achieve better rankings.

Global Information Systems Business Strategies

Is any information system which attempts to deliver the totality of measurable data worldwide within a defined context.

Variable (referencing a data type)

In computer science and computer programming, a data type or simply type is a classification of data which tells the compiler or interpreter how the programmer intends to use the data. Most programming languages support various types of data, for example: real, integer or Boolean. A Data type provides a set of values from which an expression (i.e. variable, function...) may take its values. The type defines the operations that can be done on the data, the meaning of the data, and the way values of that type can be stored.

Entity

In the relational database model, a person, item, event, etc., for which an organization collects data.

Simple Network Management Protocol (SNMP)

Information concerning network status that is periodically passed between a network management server and routers on a network, for the purpose of monitoring network status.

Data Consistency

Inputting consistently by using the same descriptions, standards, units of measurement, and formats can mean the difference between success and failure.

Accessibility Issue

Issues created by barriers to access, implying that some should have access while others should not.

Property Issue

Issues created by the association of rights of property ownership to tangible and intangible goods and information.

Privacy Issue

Issues created by the collection, storage, distribution, or mere availability of potentially sensitive information.

Accuracy Issue

Issues created by the trustworthiness, accuracy, and legitimacy of information.

Software

Made up of programs and instructions to run your computer and network.

Secure File Transfer Protocol (SFTP)

Much like HTTPS, this uses secure technologies, this time Secure Shell (SSH), to secure the connection for transferring files from computer to computer.

Virtual Company Model

Networks of people and resources join together to provide a service or create a product without the traditional storefront boundaries.

Processes

Processes and procedures provide a structured sequence of activities to govern the use, operation, and maintenance of IS.

On premises

Services are provided in-house on servers or in a data center owned, managed, and administered by the organization.

Analytical Platforms

Purpose-built appliance systems that are designed to process and analyze enormous amounts of data quickly.

Web Page, File Storage, and Hosting

Repositories of information, storage for retrieval or archival of documents, programs, applications, and consumables such as audio and video.

The Ethics Rules of Behavior

Responsibility, accountability, and liability

The Operational and Functional Benefits of E-Commerce

Selling wares, improving its reputation and creating efficiencies.

Domain Name Service (DNS)

Server-based service that translates human language web address or URL into an IP address, which is used.

Technological Measures

Several software and hardware applications exist to aid individuals in protecting their privacy. From a defensive perspective, these include anti-malware applications and intrusion protection. From a proactive perspective, these include the encryption of email and sensitive web traffic, and implementation of devices to aid in identity and approved equipment verification. Additional options include privacy policies and automated settings that configure a web browser's security, which can then compare them to the privacy policy published on specifically configured websites.

The Four Types of Network Bridging

Simple bridging, multiport bridging, learning or transparent bridging, and source route bridging.

Personal Computers (PC)

Small systems are used on an individual basis (i.e., one-person use) and include traditional multi-component desktop systems (monitor, computer, keyboard, mouse) and integrated systems, such as laptops and tablet computers.

Mobile E-Commerce (mCommerce)

Smartphones and tablets are very popular communication devices, personal and professional organizers, and portable decision support systems. Businesses that actively market to their customers via these devices, either as a direct channel for doing business, through product or brand marketing through placement in the integrated applications, or in developing salable mobile applications, have an important avenue for gaining and keeping their customers.

Computer Programmers

Someone who writes code to instruct computers to perform certain tasks.

Standards Organizations

The organizations that help with continuity of communications, including the Internet Architecture Board (IAB), the International Electronics and Electrical Engineers (IEEE), Internet Corporation for Assigned Names and Numbers (ICANN), Internet Engineering Task Force (IETF), and World Wide Web Consortium (W3C).

Service Providers

The telecommunications companies that build networks to support their customers (e.g., Time Warner, Cox Cable, and CenturyLink).

End Users and Content Providers

The various users and organizations that ultimately pay for the Internet.

Utilitarian Approach

This approach assesses the consequences and/or outcomes of an action to determine the greatest good or least harm for the greatest number, regardless of the justice or fairness of or to the individual.

Fairness Approach

This approach values individual moral rationality—otherwise referred to as the Golden Rule, or "do unto others as you would have them do unto you"—asks society to reflect on the consistent treatment of others based on the desires of how an individual expects to be treated.

Rights Approach

This approach values rights specified by society, which may be largely based on the analysis of other ethical approaches, and allows individuals to weigh decision choices based on legal or legislative precedent.

Common Good Approach

This big picture approach values choices and motivations that perpetuate value for everyone, to sustain a positive whole-community benefit, despite individual income or position.

Big Data

This is a very large data set (structured or unstructured) that are too complex or voluminous for traditional data processing systems to manage and they can be mined or analyzed to find new trends or relationships for business intelligence. Three factors to consider: Volume, Variety, and Velocity.

Executive Information System (EIS)

This system supports senior executives by providing important data in the form of graphs and charts to analyze and identify long-term trends.

Supercomputer

This term merely implies the fastest category of computer available and are built to handle vast amounts of information very quickly.

Major Components of a Project

Time, Scope, Resources (cost), and Quality

Value Creation Through Technology Use

Today's computer technologies, such as wireless sensor networks and cloud computing, allow organizations to create added value in nearly every industry and profession. As a result, several industries have been created, along with many professions, jobs, and fortunes. Technology tools have evolved over the years to create value for business by facilitating calculations, documents creation, and graphs.

The Two Categories of Tools

Upper CASE and Lower CASE.

Geographic Information Systems (GIS)

Using connections to numerous databases containing data concerning locations, crimes, taxes, traffic, votes, and environmental and life science data, geospatial analysis can help government administrators to understand demographic trends, population density changes, attribute concentrations (e.g. poverty, crime, or disease outbreaks) and quite a number of other important and factual indicators. Part of Business Intelligence application.

Mobile Information Availability

With the increasing use of mobile computing platforms connected to the Internet, including smartphones and tablets, more information input and output is available to more people in more places.

Hadoop

a Java based open (i.e., non-proprietary) programming framework that supports big data collection, processing, and analytics of a distributed computing environment.

Black Hat

a computer hacker with criminal intent.

Grey Hat

a computer hacker with the skills and intent to help organizations protect their networks and systems from others, but whose services may come at a price, or can be sold to the highest bidder.

Data Warehouses

a large centralized collection of digital data gathered from one or more sources and organized by subject to support business analysis and decision making tasks. Think of Epic

Multidimensional Databases

are typically relational databases that store data in a cube, which contains aggregated data related to all dimensions and allow businesses to visualize data assets in multidimensions to see what is happening in real time.

Dynamic Host Configuration Protocol (DHCP)

a server or appropriately configured router automatically and temporarily assigns IP addresses to these enabled systems on the network.

Value Chain

a set of inputs used by a strategic information system and put into meaningful outputs to help a company gain a competitive advantage in the marketplace

Clickstream Applications

are those that track and analyze an application's activity, including how it is used and where a user clicks.

Network

a system of computers joined together so they can communicate and share resources.

Zero-Day Attack

a threat or attack that exploits known or unknown vulnerabilities in software.

Asynchronous Transfer Mode (ATM)

a virtual circuit protocol that was designed to provide quality of data of voice and video via circuit switching.

Primary Storage

are typically referred to as volatile flash memory, meaning that information storage is temporary and can only be stored until power is removed. Includes RAM, Cache Memory, and ROM, that is directly accessible to the CPU.

Major Business Functions Provided by Information Systems

accounting and finance Human Resources Production and Operations Sales and Marketing

Global Exporting

all services from the organization's home location means not changing the centralized structure and requiring all but production to stem from the centralized domestic location, including systems and data storage.

Network Interface Cards

allow computers to connect to networks.

Virtue Approach

allow us to act in aspirational ways, including compassion, trustworthiness, honesty, generosity, kindness, autonomy, courage, obedience, and many more.

Bridging

allows multiple different networks to communicate independently while remaining separate.

Creating Efficiencies

allows the customers to have a closer connection with the company through email or social media. Social media allows businesses to close the feedback loop.

User Communication

allows users to provide input through various communications methods, including meetings. This communication allows users to share best practices, experiences, and tips that may help other users.

White Hat

an authorized and ethical computer hacker*, one who helps organizations to protect their networks and systems from others, via penetration testing, or the design and implementation of policies.

Cyber Criminal

an individual or organization interested in exploiting computers and networks for the purpose of generating revenue. Note that organized crime has a very active presence in cybercrime.

Hacktivist

an individual or organization interested in vandalism, cyber-terrorism, or hacking for a stated cause or purpose.

Information Systems

an integrated network of components that provide managerial and operational support to businesses by collecting and processing data into useful information as well as providing for storage, retrieval, and security of data and the information it's transformed into.

Quantitative Risk Analysis

analysis involves the measurement of the probability and consequences of risks and estimating the implications for the project.

Online Analytical Processing (OLAP)

and are analytical, fixed databases that enable users to analyze data in order to make management decisions.

The Seven Layers of OSI

application, presentation, session, transport, network, data link, and physical.

Master Data

are business objects or values possessing a unique value and are shared across the entire enterprise. Can be used in all types of databases, are not sorted into tables, and are key to accurate business reporting analysis.

Analog Signals

are continuous electrical waveform signals.

Multinational franchising, licensing, joint venture, or foreign direct investment, or similarly branded, semi-independent organizations

are controlled locally but coordinated (perhaps loosely) through the centralized organizations' structure. Information systems and data storage in this model is typically decentralized at each foreign location, or at strategic location(s) in the local region.

Three Primary Components of Group Decision Support Systems (GDSS)

are hardware (including networking and display equipment), software (including web-based conferencing applications), and the people who are collaborating in the decision-making process.

Wireless Sensor Networks (WSN)

are location or spatially distributed sensors that emit wireless signals with specific information and are used to monitor physical or environmental conditions. And are able to transmit and receive signals via built-in antennas.

Low-Level Risk

are moderately serious and would have a noticeable impact on the organization, resulting in a negative outcome and possible damage.

Ethics

are moral principles and concepts, rules of behavior, and often the underpinning of codes of conduct based on accepted standards of right and wrong.

Relational Database Model

are one of the most common database models in use today and are based upon the relational model of data, which is a method of structuring data using relationships (or primary keys), in rows and columns. This is a centralized database.

Tuples

are ordered lists of values and are used for grouping and organizing data and can be used to represent related data that belong together, such as student records, and are used in database relational models.

Attributes

are properties of entities, such as the address or phone number of a person or business.

Web Developers

are responsible for creating and maintaining a company's website.

Information Security Analysts

are responsible for the security of a company's network, data, and information.

The Five Criteria for Providing Access to a File or System

are roles, groups, time, transaction type, and location.

People

are the information system professionals and users who use computers

Growth Strategy

can include adding new products or new enhancements to existing products and can also include acquisition, where one business purchases another.

Data Scrubbing

checks for data consistency; it will check, fix corrupted records, and remove bad records from the database.

The Two Models of Management in the Decision-Making Process

classical and behavioral models

SDLC - Advantages

clear project objectives, strict approval requirements, progress measurement, and requirement stability.

Environments

combine multiple tools or workbenches to support the complete software cycle.

Workbenches

combine several tools for software development to achieve a simple, consistent interface, and a seamless integration of data and control.

Forming an Internal User Group

consisting of users who support and resist the system can provide the implementation team and management with feedback that may help increase user adoption.

Business Intelligence (BI)

consists of databases, data warehouses, and analytical platforms that analyze a company's raw data and play a major role in strategic planning. enable managers and others in the enterprise to make better and more informed decisions.

Transmission Control Protocol (TCP Protocol)

consists of four abstraction layers: application, transport, Internet, and network access.

System-Level Security

consists of the architecture, policy, and processes that establish the security on computer systems.

Intelligence Phase

consists of the discovery, identification, and understanding of the problem. During this phase, a problem may be classified or broken down into subproblems.

Implementation Phase

consists of the execution of the alternative and continual performance monitoring. Because this frequently requires the introduction of change, resistance may occur, necessitating the importance of user adoption and management support.

Design Phase

consists of the identification and exploration of alternatives and solutions to the problem. Also includes the construction of a model of the problem and the evaluation of the alternatives for feasibility.

Choice Phase

consists of the selection of an appropriate solution from the available alternatives. Specific values may be assigned to the decision components during this phase.

Business Analytics (BA)

consists of tools and techniques used for the analysis and understanding of data. Includes: data mining, modeling, statistics, and OLAP

Central Processing Unit (CPU)

contains the circuitry necessary to interpret and execute program instructions that allow a computer to function.

Network-Based Strategies

create mutually beneficial partnerships between businesses.

Web Mining

creates databases which are mined to understand customer behavior and improve customer intimacy.

Pretexting

creating a believable scenario (whether innocuous or serious) for the purpose of obtaining information (email, etc.)

Advanced Data Analysis

data has been collected, stored, and made available for a wide array of analyses. These analyses may be general or specific, potentially very intricate, and may expose information or non obvious relationships and connections, leading to breaches of privacy and trust.

The Four Components of Decision-Support Systems (DSS)

data, model, knowledge, and user interface management.

Name the Steps in the Decision-Making Process

define the problem, identify any limiting factors, develop potential alternatives and solutions, analyze the alternatives, select the most desirable alternative, implement the decision.

Data Dictionary

defines and manages the data types and structures that dictate how the database is organized.

Behavioral Model of Management

focuses more on the individuals in the workplace, with less emphasis on the rules, procedures, and production. And supports worker satisfaction and positive working conditions.

Classical Model of Management

focuses on rules and procedures to maximize productivity. Social needs of employees are not considered; instead, the focus is on centralized decision making and profit maximization.

Digital Signals

discrete, binary, noncontinuous electrical waveforms.

Visual and Geographic Analyses

enable data to be analyzed based on patterns, relationships, or geographic data.

Big Data Analytics

enables a business to recommend products or services to customers based upon analysis of customer preferences, purchase history, and Internet search history.

Radio Frequency Identification (RFID)

enables a company to track merchandise or inventory by radio frequency signals (electronic tags placed on objects or smart labels).

Data Cleansing

ensuring data accuracy and integrity by correcting inaccurate information and deleting erroneous or duplicate data.

Function-Oriented Evaluation

examines the performance of data, hardware, software, networks, and human resources.

Analyze Risk

first determine the impact to the business should that risk occur and the likelihood that this risk will actually occur.

Decision-Support Systems (DSS)

focus on supporting all phases of specific decision-making processes and procedures for arriving at a solution.

Elements of Risk Management

identification, qualitative analysis, quantitative analysis, and response planning.

Gated-Access Approach

in which a member can only contact another member if the two members have an existing relationship, or are referred by a mutual contact.

Input Components

include devices that provide input into the processing unit. These include peripherals, such as the keyboard, mouse, microphone (audio input), sensors, and document or visual scanners.

Output Components

include internal storage devices or processes, as well as external peripherals such as monitor screens (visual output), speakers (audio output), and printers (physical output).

Storage Components

include primary temporary storage and secondary long-term storage devices. Random access memory (RAM) is temporary or short-term storage used by the processor. A hard drive is long-term storage that acts as a reserve aide for short-term storage or to store output data. Other storage includes peripheral devices such as external hard drives and removable media (floppy disks, optical discs, and flash drives).

Risk Management Strategies

include promoting project leadership skills, learning from previous projects and experience, sharing knowledge, and creating a project management culture within the IS organization.

Processing Components

include the central processing unit (CPU), which is the brain of the computer. Historically this unit included several components, such as a control unit, a processor, an arithmetic or logic unit, and memory components. Modern CPUs have merged these components into an integrated design. Today, multiple-core processors can be used in tandem for a single computer, tablet, or smartphone. Supercomputers exist today that have the equivalent of millions of processors.

Input Devices

included now-archaic punch cards or magnetic readers and contemporary input, such as analog audio (e.g., voice recognition), keyboard input, touch sensitive screens, biometric scanners (e.g., fingerprint, hand, or eye scanners), motion detection, optical character recognition (OCR) (e.g., from a document scanner), and image capture (e.g. from cameras or other imaging equipment).

Output Devices

includes document printers, audio output devices (i.e., speakers), visual output (e.g., monitors and televisions), and computer-aided design equipment.

SDLC - Weaknesses

increased development time and cost, necessity for upfront system definition, rigidity, difficulty of cost estimation, and occasional limited user input.

The Three Risk Factors that Contribute to Vulnerability of IS

information loss from the environment, organizational, and technological sources.

Network and Computer System Administrators

install and repair computer systems, as well as identify and fix network issues.

The Four Phases of the Decision-Making Process

intelligence, design, choice, and implementation.

What Areas is E-Commerce Expansion Going

localized and personalized, mobile, and social

The Three Levels of Risk for System Security

low, moderate, and high.

Server

manages network resources and services

Chief Financial Officer (CFO)

manages the company finances.

Distributed Database

may be stored in multiple computers

Dynamic Data

may change after it is recorded, and has to be continually updated.

Multinational Organization

means that organizational divisions would be headquartered in different locations, whether partially with an international organization or completely with a transnational organization.

Database Technical Specialist

must know how to capture and use the company's data.

Social Engineering

normally low tech attacks used to trick individuals into disclosing information, providing access, or changing their patterns.

Scope Creep

occurs when the project continues to grow in scope, or uncontrolled changes occur during the course of the project.

Peer-to-Peer Networks

offer a faster connection between nodes, because information is stored locally on each individual computer and not one central server.

Long-Term Evolution (LTE)

offer data transmission speeds of 5 to 12 Mbps in the UHF band.

Cloud Services

offer scalability, allowing users to store data and use software applications as needed at any given time. Infrastructure, platform, and software are the three categories of services provided.

Portal

online portal provides gateway access to information, entertainment, and business. With an enormous number of websites, storefronts, and encyclopedias, several portals exist and serve as the starting point for many on the Internet. Examples include Google, Yahoo, and Bing.

IT Managers, Project Managers, and Architects

organize, direct, coordinate, and plan IT-related activities, people, and projects within an organization.

Chief Operating Officer (COO)

oversees the daily operations in a business and communicates the organization's mission statement to employees.

Text Mining

performs big data analysis on unstructured data such as emails, survey questions, and memos to reveal consistent patterns and relationships.

The Six Analytical Functions used by Business Intelligence

production reports, parameterized reports, dashboards and scorecards, ad hoc report creation, drill down capabilities, forecasts, models, and scenarios.

Group Decision Support Systems (GDSS)

provide interactive collaboration support for multiple decision makers at multiple geographic locations through digital communication and the use of numerous resources and tools.

Strategic Information Systems

provide tools used by an organization to accomplish specific tasks in order to gain a competitive advantage in the marketplace.

Logical Model

provides an image or diagram of the users, inputs, outputs, and processes of the system

Internet Service Providers (ISPs)

provides internet connectivity.

Cloud Computing

provides shared resources and applications remotely as a shared service over the internet.

Computer Support Specialist

provides technical support to customers and employees through direct interaction or telecommunications. The support could be through training or troubleshooting technical issues.

Cultural Pressures

response is by using ethical business practices, building strong cultural ties with stake holders, socially responsible, enacting sustainable business policies and practices.

Political and Legal Pressures

response is to enact policies, complying to standards, and allying with experienced partners.

Social Media

refers to a collection of web-based applications that allow the creation and transfer of user-generated content over the Internet.

Omni-Channel

refers to e-commerce facilitated by e-business connections, dynamic variability, and inherent scalability. Warehouses filled with inventory become distribution centers, physical retail storefronts become hybrid warehouse, distribution, and direct customer interaction nodes focused on a seamless online/offline customer experience. As a result, inventory volume is reduced and operations become leaner and better able to react to changes in demand.

Web 2.0

refers to the Internet sites that emphasize usability, interoperability, and user-generated content.

Data Integrity

refers to the accuracy and consistency of the data stored in a DBMS. By assigning security permissions, you can limit the risks to destruction of the data by allowing users to add, but not delete, data from the customer database.

Information Technology

refers to the hardware and software required to manage and deliver information.

Management Information Systems (MIS)

represent a category of information systems that serve low or first level managers and are usually focused on short- to medium-term business decisions.

Unstructured Decisions

require the decision maker to provide the necessary insight, judgement, and evaluation to reach a decision. Individuals in senior management frequently make unstructured decisions.

Software Development Life Cycle (SDLC)

requirements obtained from stakeholders to develop their software. and includes analysis, design, implementation, and testing.

Usability Testing

requires a formal meeting with several users which includes an interview and observation or screen-sharing. Information obtained during this process will assist with the development of additional training or system customization.

DRAM

the most common type of RAM and is used as system memory, when large amounts of RAM are needed.

Business-to-Government (B2G)

the concept that businesses and government agencies can use central Web sites to exchange information and do business with each other more efficiently than they usually can off the Web.

Freemium

the core service might be free, but additional features and services may be available for a charge. Mobile phone apps and games are an example of this concept, where limited versions of software are available for free, but often charge a fee for full versions, additional features, or related digital goods.

Network Economics

the cost of adding another business participant to a business venture is small, the potential gain is great.

Data Management

the creation, update, and deletion of the data within the database.

Computer Systems Analyst

their job is to analyze a user's needs and determine the most efficient and effective solution and they combine their business knowledge with technical expertise.

Environmental Risk

these are inevitable such as weather, fire, flooding, etc.

Data Packet Switching

these are sent out and travel across the Internet in random order.

Database Normalization

they must go through this in the design process to simplify complexity where possible and remove redundancy between elements.

Private Industrial Networks

this means that a single organization controls the construction and maintenance of relationships for and between a relatively small numbers of other organizations. For example, Ford Motor Corp's private industrial network allows Ford, as well as a variety of other suppliers and distributors associated with Ford, to communicate, collaborate, and conduct business.

Product Differentiation Strategy

this strategy can include offering a higher quality product or service. a) A core competency is an activity for which a business is a marketplace leader. b) Synergy is the cooperation between several businesses to produce a better product or service than would be possible if each business worked independently. Companies must clearly understand their strengths and weaknesses and join forces with other companies to create positive synergy.

Dynamically Optimized Pricing

this tactic is used to set prices according to market pressures, including locality, demand level, competitors pricing, the time of the day, week, or year, and a customer's willingness to pay. E-commerce and the aid of modern big data analytical tools allow businesses to dial in for tighter control of their prices in order to gain improved profit margins.

Advertising

through direct marketing such as popup and email advertising, in application advertising, and affiliate advertising programs, helping a business to grow their customer base.

Digital Market

to sell goods and services, as well as the creation and sale of goods that were completely digital. The flexibility and efficiency provided by digital markets allow for diminished search costs, costs for changing prices, and a better ability to change prices for different types or categories of customers or sellers, or as market conditions change.

The Three Categories of CASE

tools, workbenches, and environments.

Edge (boundary) Router

transfers data packets between one or more LANs and an asynchronous transfer mode (ATM) network.

Energy Management Systems

transforms energy data into information so businesses can understand energy consumption and patterns.

Telecommunication Networks

transmit information in the form of data, voice, or video, and are carried by a medium such as light or electrical signals. The telephone and internet are two examples.

The Three Types of Decision-Making Process

unstructured, semi-structured, and structured.

Executive Support Systems (ESS)

use internal and external data to help executives make unstructured decisions.

Non-Relational Database

uses a flexible model in which data are distributed among several machines, often in a cloud-computing format. Least expensive option because no central server is required.

Hypertext Transfer Protocol Secure (HTTPS)

uses technologies such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to encrypt and decrypt data between the user and web server.

Knowledge Management Systems (KMS)

uses technology such as the Internet, collaboration software tools, and databases, to facilitate the capturing of corporate data and helps companies deal with personnel turnovers and rapid changes.

The Five Basic Steps in the Decision Analysis Process

• Create a model or diagram of the decision. • List all potential alternatives in the model. • Assign numerical or monetary values to the probability of each outcome. • Analyze the expected return for each outcome and combinations of outcomes. • Analyze the return in conjunction with outcome sensitivity, probable utility for the organization, and organizational or user risk tolerance.

Advantages of Decision Trees

• They are simple to understand and interpret. • They contain value with limited, detailed data. • Important insights can be generated based on the description of a situation, the alternatives, probabilities, and costs. • They enable the addition of new scenarios. • They help determine best, worst, and expected values for each scenario. • They can be combined with other decision analysis tools and techniques.

The Benefits Delivered by Social Media to Businesses and Organizations

• detailed marketing research • company-to-customer and user-generated communication • relationship development through customer • loyalty programs • increased use of e-commerce • targeted sales promotions • Long-tail marketing


Conjuntos de estudio relacionados

Chapter 16: Short-Term Financial Planning

View Set

Practical Activities for Stimulating Infant Development

View Set

Finance 450: Exam 1- Chapter 2 Book Questions

View Set

Financial Management Final Multiple Choice

View Set