C724 (Information Systems Management) - (EDITED)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Open System Interconnection (OSI) Model

- International standard that governs or guides the development of data communication protocols. - Data is broken down into packets - Methodology for sending data packets - 7 layers are: application, presentation, session, transport, network, data link, and physical.

Wireless networks

1) Satellite •Global Positioning System •Satellite radio •Provides geolocation and time information to a GPS receiver anywhere on earth 2) Connection to the Internet -Wireless (WiFi) •Wi-Fiprovides high-speed access to the internet. •Lets you connect one device to another without the cables. •Separate from theInternet. •IEEE802.11 protocol, WPA (Wi-Fi Protected Access) 2 next generation Wi-Fi security 3) Bluetooth Network •Used to connect devices without using cables. •Wireless technology standard used to exchange data over short distances-30 feet 4) Radio Frequency Identification Device RFID •Electromagnetic fields, tiny radio transporter, RFID reader devise

The Three Norms in Normalization

1NF, 2NF, 3NF

3G Networks

384 kbps speed

Environments

A CASE software that combines tools and workbenches to support the entire system development life cycle (SDLC); the most common CASE tool.

Digital Millennium Copyright Act (DMCA)

A United States copyright law created to prosecute the production and dissemination of technology, devices, or services that control access to copyrighted works.

Black Hat

A black hat hacker is a hacker who violates computer security for personal gain or maliciousness. Ex: •Hacktivist •Cyber criminal

Analytics as a Service (AaaS)

A cloud software service

Object-Oriented Database

A database that is designed to store mixed media, as opposed to tables in relational databases.

Data Integration Service

A depository of extracted business environment data.

Intrusion Detection System (IDS)

A device or software application that monitors a network or systems for malicious activity or policy violations.

Unified Modeling Language (UML)

A general-purpose modeling language that helps visualize systems through diagrams.

Data Manipulation Language

A language that allows users to easily modify the data in a database.

Classical Management Model

A management practice that focuses on productivity; focuses on more systematic and predictable issues.

Behavioral Management Model

A management practice that focuses on the employees' human needs; focuses on less systematic and predictable issues.

Hertz

A measurement of frequency

System on a Chip (SoC)

A modern microprocessor that contain the CPU, memory, and peripheral interfaces; a miniature computer; an example is the Raspberry Pi.

Core Router

A more powerful router that is used to optimize high volume transmissions; aggregate data from business and transmit the data directly to the Internet backbone.

Bus network

A network in which all network devices are connected to a common backbone that serves as a shared communications medium. Inexpensive but can have excess traffic.

Passive Tags

A passive tag is an RFID tag that does not contain a battery; the power is supplied by the reader.

Workstation

A powerful computer system that can handle intensive mathematical operations; often used by engineers.

Mainframe Computer

A powerful computer that can perform quick processing.

Private Industrial Network

A single organization that controls the construction and maintenance of relationships for a relatively small number of other organizations.

Information system

A system of people and computers that processes information. Comprised of: Hardware: Physical IT devices Software People Network: exchange data and information (telecommunications) Data Processes: (taking orders, computer maintenance schedule)

Executive information system

A system that facilitates and supports senior managers to make decisions to meet the strategic goals of the organization. Also known as Executive Support Systems (ESS). Data includes internal data from enterprise applications, external data from financial, industry, and trade databases, and drill-down capabilities that enable the user to obtain additional, specific information. Potentially digital dashboard.

Post Office Protocol (POP)

A telecommunication protocol that is used to retrieve email from a mail server.

Dumb Terminal/Thin Client

A terminal that depends on the host computer for its processing power

Next-generation firewall (NGFW)

A traditional firewall typically provides stateful inspection of incoming and outgoing network traffic, a next-generation firewall includes additional features like application awareness and control, integrated intrusion prevention, and cloud-delivered threat intelligence.

Wi-Fi Protected Access (WPA)

A wireless (tunneling) encryption protocol that provides secure data transmission over an insecure network.

Java

An open-standard software language used for client-server internal applications.

Elements of Decision Theory

Acts, events, outcomes, and payoffs.

Database provided as-a-service (Cloud Database)

Advantages: More flexible, available and scalable. Data can be stored in multiple locations. Disadvantages: More expensive, security. Larger organizations maintain their own cloud-based database.

Network Address Translation (NAT)

Allows private users to redefine network addresses to assign their own addresses.

4G Networks

Also called long-term evolution (LTE), these networks offer speeds of 100,000 kpbs in the Ultra High Frequency band; offers voice, data, and video.

White Hat

An authorized and ethical computer hacker

Electronic Data Interchange (EDI)

An automatic electronic exchange of data and documents from one computer system to another through a standardized messaging format that does not require human intervention.

Scrum software development methodology

An incremental form of agile software development that recognizes that customer needs and wants can change throughout the project. Unexpected changes and challenges can be quickly addressed. Team members are often located within the end user's facility, regularly communicating with team members and the customer.

File Transfer Protocol (FTP)

An insecure method used to transfer files from one computer to another.

UNIX

An operating system designed to code computer instructions in a mainframe environment.

System Development Life Cycle (SDLC)

Analysis Phase 1. Identify problems, root cause, opportunities, and objectives 2. Determining information requirements (most important) 3. Analyzing system needs and develop a solution Design Phase 4. Designing the recommended system 5. Developing and documenting software Implementation Phase 6. Testing and maintaining the system 7. Implementing and evaluating the system

Low-Level Programming Language

Basic programming languages that used machine language instruction; they are specific to the hardware and lack portability.

Methods for Increasing User Adoption and Reducing Costs

Benchmarking, usability testing, user communication, internal user groups, planning, and leveraging existing resources; six in total.

Bridges

Bridges in network topologies are used to connect or link separate networks together, but bridges do not have data switching capability. Example: a LAN network in which some PCs are connected via Ethernet, while others are connected via wireless routers.

System-Level Security

Consists of the architecture (layers), policy, and process levels.

Hybrid clouds

Cloud operations that have elements of both public and private clouds. Cloud computing relies on shared resources to achieve economies of scale among users through the concept of shared services and a converged infrastructure.

Development methodologies that allow for the reuse of objects

Component-based development and object-oriented development

Gray Hat

Computer hacker with the skills and intent to help organizations protect their networks and systems from others, but whose services may come at a price

Hypervisor (or virtual machine monitor, VMM, virtualizer)

Computer software, firmware or hardware that creates and runs virtual machines.

Business Intelligence

Consists of databases, data warehouses, and analytics; helps business gain a competitive advantage; common functionalities include measurements, analytics, reporting, collaboration, and knowledge management; provides real-time, relevant, and user-customized information that is easily shared.

Virtual Network

Create peer-to-peer connections between computers.

Analytics Services

Creates analytical databases.

hypervisor

Creates and runs virtual machines. A computer on which a hypervisor runs one or more virtual machines is called a host machine, and each virtual machine is called a guest machine. User can perform any task on a virtual machine, scalable.

Entity

Data components have various properties (known as attributes), and relate to each other in various ways (known as relationships )

Data in Motion

Data is in the RAM.

Associations

Data that are linked to a specific event, such as how frequently customers purchase jelly when they purchase peanut butter.

Direct Move

Data that does not need to be transformed being transferred to a data warehouse.

Data at rest.

Data that is stored.

Star network

Each computer connected to central router/hub. Single point of failure.

Hierarchical database

Early database style , inflexible data relationships, treelike structure.

Decision support systems (DSS)

Enable business performance management (BPM) by translating organizational strategies into operational targets.

Software-defined networking (SDN)

Enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring, making it more like cloud computing than traditional network management. Meant to address the fact that the static architecture of traditional networks is decentralized and complex while current networks require more flexibility and easy troubleshooting.

Government Regulations on Security

Enact and enforce security; manage and retain documentation.

Gramm-Leach-Bliley Act of 1999

Enacted procedures to store or transfer financial information; also known as the Financial Services Modernization Act

Separation of Duties

Ensures that personnel's responsibilities and duties are separated from their access.

Types of risk analysis

Environmental Organizational Technology

Vertical Application

Software that designed for a specific business need.

Extraction, transformation, and loading (ETL)

Extract > Transform > Load > Validate. Process in which data is extracted from a computer, transformed (or cleansed) into a format appropriate for the data warehouse, and then transferred to the data warehouse.

Object Oriented Languages

Fields that contain data in the form of procedures, methods, routines, strings, lists

Mintzberg's Ten Manager Roles

Figurehead, leader, Liaison, Monitor, Disseminator, Spokesman, Entrepreneur, Disturbance Handler, Resource Allocator, and Negotiator.

Rapid application development (RAD)

Focuses on the development's process, with limited emphasis on the planning process. Emphasizes the need to adjust project requirements as the project progresses. Frequently uses prototypes in lieu of predetermined specifications. Allows adaptability because specifications are developed during the process, instead of at the beginning. Well suited for software development that is driven by user interface requirements.

Pharming

Fraudulent practice of directing Internet users to a bogus website in order to obtain personal information such as passwords, account numbers, etc.

Phishing

Fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Core routers

Gather, link, or route data from a business campus and aggregate it to optimize high bandwidth transmission. All routers have the ability to connect to the Internet. Core routers are more powerful and are used to optimize high volume data transmission. Core routers have enough processing power to handle multiple protocols. Only required if a high volume of traffic should go right into the Internet backbone.

Types of Information Systems Controls

General and Application

Group Decision Support System (GDSS)

Group decision support systems (GDSS) provide interactive collaboration support for multiple decision makers at multiple geographic locations through digital communication and the use of numerous resources and tools. Find solutions to problems that are unstructured.

2G Networks

Has a 64 kbps speed

Node

Has a unique network address •Data Link Control (DLC) •Media Access Control (MAC) address

HIPAA

Health Insurance Portability and Accountability Act of 1996 Medical -modernize the flow of healthcare information

Text mining

High-quality information is typically derived through the devising of patterns and trends through means such as statistical pattern learning.

Voice over Internet Protocol (VoIP)

IP packets of voice and multimedia (text, audio, images, video and interactive content) and transferred over the internet. Example of a packet-switched network.

Technology risk analysis

Identifies, evaluates, and ranks technology risks security of day to day business operation.

Entity-Relationship Diagram (ERD)

Illustrates the relationships among all of the tables in a database. Zero to many (optional) -0•Advisor and Instructor •One or more (mandatory) -I•Student one or more courses •One and only one (mandatory) -II•Student has one advisor, course has one instructor

Elements of Analytics

Includes data mining, process mining, business process modeling, complex event processing, predictive analysis, and prescriptive analysis.

Structured decisions

Involve an established procedure, are repetitive and routine, and therefore can be handled in the same manner each time. Line-level managers and non-management employees typically make structured decisions.

data warehouse

Large repository of data. Contains transactional (real time), analytical (archived transactional data), and external data.

Platform as a Service (PaaS)

Like IaaS except provider also provides the operating system and databases. Your organization is still responsible for applications, functions, and data. Example: Amazon Web Services

Fountain Model (SDLC)

Like the waterfall model, but this one allows for going back to previous steps.

Principle of Least Privilege

Limits access to only authorized users based upon job requirements.

Qualitative Risk Analysis

Looking at conditions that can affect the project; looks at the consequences of risk and estimates the impact of those risks on the organization.

Calculating loss

Lost resources -System is down, need backup system support that will prevent lost data and lost productivity, ex: data center Lost revenue -Determined by estimating the lost gross revenue /sales due to an event, ex: website sales Lost personnel -today's growing mobile workforce; time theft is big issue for employers today, talent demands mobility

Assembly language

Low level programming language (Machine code instructions)

system bus

Medium through which communications between the input, processor (CPU), motherboard, storage, and output occur.

Packet Switching

Mode of data transmission in which a message is broken into a number of discrete, parsed parts that are sent independently in encapsulated packets, over whatever route is optimum for each packet, and reassembled at the destination; what is used when accessing the Internet; •Digital signal signifies discrete signal; Carries binary data and has discrete values. •Packet-switched networks ; breaks communication into packets •Sends packets through the network independently of one another (they don't take the same route)

Moore's Law

Moore's Law says that computing power and storage capacity will continue to increase or double approximately every two years.

TCP/IP

Most common protocol which establishes a computers connection to the internet, and data packet quality transmission. The first two bytes are assigned by the Internet Service Provider (ISP), and the last two bytes are assigned by the client.

Business ecosystems

Network of businesses involved in delivering a product through mutual cooperation.

Master Data

Objects shared across the enterprise; it is key to accurate business reporting and analysis

Mashup

Occurs when software is mixed and matched to develop a customized application

Cold sites

Offsite office space awaiting occupancy, equipment, personnel, and utility service, allowing recovery within days.

Hot sites

Offsite office space with available and up-to-date systems and service connections, requiring only adequate or prioritized staffing, allowing recovery within minutes to hours.

Warm sites

Offsite office space with available systems and service connections, requiring staffing and updates allowing recovery within hours to days.

Types of relationships in a relational database model

One-to-One, One-to-Many, and Many-to-Many

New system barriers to success

Organizational resistance to change Position description changes Roles and responsibilities changes Required user skill set changes Organizational process and structural changes Changes in the nature of existing managerial activities Competition for limited organizational resources Competing stakeholder interests Competing project initiatives

Private clouds

Owned and run by, or merely dedicated to, the organization whose data resides on the equipment.

SDLC Anronym

PADDTIM Planning Analysis Design Development Testing Implementation Maintenance

Front end languages

PHP, HTML, XML, GUI

Proprietary software

Pay a license fee to use , cannot modify code

Data Administrator

Person who is responsible for securing access, privacy, security, retention of data within the database.

Knowledge authentication (something you know)

Personal identification number (PIN), passwords, patterns, and performances (e.g. signatures)

Identity authentication (something you are)

Photo identification, biometrics (e.g. fingerprints, voice patterns, hand/palm prints, and retina or iris topology)

Database server

Powerful computer that stores the databases and DBMS to access and administer the database.

Decision Tree Analysis Tool

Presents a visual flowchart representation of the decision and outcomes, but it does not include roots in the model.

Fair Information Practices (FIP)

Principles that govern the collection and use of information about individuals.

Multiplexing

Process in which multiple signals are combined into one signal, which is then transmitted over a shared medium.

Telecommunications Network

Process of exchanging information between various entities over electrical, electromagnetic, or digital networks.

Organizational features that can change the company direction

Processes, politics, culture, and environment

General Data Protection Regulation (GDPR)

Proposed set of regulations adopted by the European Union to protect Internet users from clandestine tracking and unauthorized personal data usage.

Infrastructure as a Service (IaaS)

Provider owns and manages the hardware upon which your software stack runs. IT team manages operating systems, databases, applications, functions, and all of your organization's data. Example: Windows Azure or Rackspace.

Wi-Fi Protected Access 2 (WPA2)

Provides even stronger security than the original.

Logical Data Model

Provides foundation for designing a database

Sarbanes-Oxley (SOX) Act of 2002

Public Accounting Reform and Investor Protection Act -oversee financial reporting to ensure the accuracy, integrity, and security of financial information through creation and storage of financial statements. The act covers public accounting oversight auditor independence, corporate responsibility.

Classifications of Cloud Computing

Public, Private, and Hybrid

Digital goods

Purchased and downloaded •Software •Music •Pictures / movies •Magazines / newspapers •Near-zero cost per unit sold

Intelligent Character Recognition (ICR)

Reads handwritten text; more advanced form of optical character recognition (OCR).

optical character recognition (OCR)

Reads machine printed text; used for time cards.

Shoulder surfing

Refers to the act of obtaining personal or private information through direct observation

Repeaters

Repeaters strengthen or amplify signals for long transmissions, but do not serve a broadcast function in a network and do not store data.

Information Policy Administrator

Responsible for acquiring, organizing, and distributing organizational information internally.

Database Administrator

Responsible for the creation, management, and integrity of the database. Monitors performance front-end users. Maps out the conceptual design for a planned database.

Static Random-Access Memory (SRAM)

Retains memory for as long as power is being supplied; does not need to be constantly refreshed; used to access the most frequently used data, as it is faster.

Developing Internet Search Strategy

Review information requirements, use proper search techniques, evaluate results, and determine copyright fees and the accuracy of data.

Organizational risk analysis

Risk at the top level of an organization, core competency strategic, reputational, regulatory, legal, security and operational risks.

Organizational risk factors

Risks that stem from hierarchies, policies, and procedures. These factors naturally allow organizations to operate as successful businesses, but also help to define categories risks, vulnerabilities, and threats, and create targets for criminals

Possession authentication (something you have)

Security keys, rolling code devices, RFID tokens, and other official unique token-like artifacts (e.g. cell phones and badges)

RFID

Similar to barcode reader. Can be operated in close proximity of the readers (not line of sight). Fast, but not reliable.

Central Processing Unit (CPU)

Since 1940. The brain/microprocessor of the computer. •Today, multiple-core processors can be used in tandem for a single computer, tablet, or smartphone. •Supercomputers exist today that have the equivalent of millions of processors.

Software as a Service (SaaS)

Software licensed and hosted on centralized or distributed servers that belong to a service provider. Users access this software using a connection to the Internet and a web browser. Example: Salesforce, DropBox

Database Management System (DBMS)

Software program that organizes, manages, and accesses data / enables users to create, manage, retrieve, and update data in a database.

Horizontal Application

Software that provides solutions based upon the common needs of many businesses.

Data Auditor

Someone who audits users' level of access and security

War driver

Someone who drives around looking for unprotected wireless access points (AP) and uses them to connect to the Internet.

open source software

Source code available for modification

Data Dictionary

Stores and manages all of the information about the database, or the metadata.

Flat File Database

Stores data in plain text, holding one record; cannot contain multiple tables like a relational database.

Server side languages

Structure Query Language: database access C, C++, JAVA -back end programming, most commonly used

Lower CASE Tools

Support development activities, such as design, testing, debugging, and maintenance.

Upper CASE Tools

Support software modeling and analysis

Types of software

System: Operating System (Windows, macOS, Unix) Utility: Spyware, antivirus Application: does one large or small thing

Referential Integrity

Table relationships must always be consistent; for an entity or object to exist in a table, an equal value must exist in the referenced table; the primary and foreign keys must be equal.

FERPA

The Family Educational Rights and Privacy Act of 1974 governs the access to educational information and records by public entities.

Spoofing

The creation of Internet Protocol (IP) packets with a false source IP address, for the purpose of hiding the identity of the sender or impersonating another computing system; elicits a response from the network.

Public Switch Telephone Network (PSTN)

The entire interconnected voice telephone network around the world. It is switched based.

1G Networks

The first cellular mobile networks; could only transmit analog signals on radio frequency.

COBOL (Common Business Oriented Language)

The first computer language used for business applications; developed in the 1950s; still used today.

IPv6

The latest IP iteration, it was developed to increase the number of unique IP addresses, as each device that connects to the Internet needs its own IP address and there were not enough to accommodate future devices.

Dynamic Random-Access Memory (DRAM)

The main memory of a computer system; requires constant refreshing.

Information management

The management of organizational processes and systems; helps the organization reduce costs and adds value to products; helps the organization make better managerial decisions; stores and processes data.

Packet Switched Data Networks (PSDN)

The standard for current telecommunication networks.

Information Security Analyst

Their goal is to ensure that data and systems are secure to prevent breaches.

Decision support systems and components

There are four systems used to provide decision support: MIS, DSS, ESS, and GDSS

Processed-Centered Environments

These environments can specify analysis and design; very resourceful.

Knowledge Management System (KMS)

These systems provide tools to help manage organizational knowledge and create value to meet business requirements and strategic goals. Vital for firms that use suppliers.

Clickstream applications

Track and analyze an application's activity, including how it is used and where a user clicks. This information is recorded in log files, which, if exported into a database, may be mined for usage patterns for redevelopment of the application, or perhaps for analysis for targeted marketing.

Second Generation of computers (1956-1963)

Transistors •Replaced large vacuum tubes, smaller, faster, cheaper, ASSEMBLY LANGUAGE •Software Cobol (Business) and Fortran (Math formulas)

Public clouds

Typically owned and run by service providers, such as Amazon, Google, or IO, often in colocation facilities (e.g. multiple tenants in a datacenter).

Radio Frequency Survey

Used to determine wireless access point locations based upon signal strength.

Simple Mail Transfer Protocol (SMTP)

Used to manage and monitor emails that we receive.

Firewalls

Used to prevent intrusion into a network and are not related to data communication protocols. A firewall can be hardware with software, or is just software embedded in a network at strategic access locations to prevent intrusion.

Pointers

Used to show the relationship between data fields and tables.

Object databases

Used when multi-media , computer aided design are required, not easily sorted by columns and rows.

Prototyping Software Development Method

User basic requirements, development of prototype, using prototype, and revising prototype

Business Performance Management (BPM)

Uses business intelligence analytics and process change to enable organizational performance; includes goal selection, attainment measurement, and achievement intervention.

Geographic Information Systems (GIS)

Using connections to numerous databases containing data concerning locations, crimes, taxes, traffic, votes, and environmental and life science data, geospatial analysis can help government administrators to understand demographic trends, population density changes, attribute concentrations

First Generation of computers (1940-1956)

Vacuum tubes •CPU (Central processing unit) ,very expensive, only large organizations could afford it •Batch processing, punch cads, magnetic tape, machine code , a lot of heat, MACHINE LANGUAGE.

Three V's of Big Data

Volume, Variety, and Velocity; Volume refers to the amount of data, variety refers to the number of types of data, and velocity refers to the speed of data processing (real-time analytics).

Web 2.0

Websites that emphasize user-generated content, usability (ease of use, even by non-experts), and interoperability (this means that a website can work well with other products, systems, and devices) for end users; enables collaboration and interaction among users.

Semi-structured decisions

When only a portion of the problem can be solved via an established procedure. Middle managers more commonly make semi-structured decisions.

Omnichannel Model

Where physical retail storefronts now become hybrid warehouses, whereby allowing for the reduction of inventory, leaner operations, and faster reactions to change in demand.

chief information officer (CIO)

a business leader who analyzes internal business processes such as payroll and billing, reshapes the physical infrastructure and network purchases to meet business goals, and leads the workforce to implement critical IT internal projects; responsible for information systems strategic thinking and planning.

Transnational

a commercial enterprise that operates substantial facilities, does business in more than one country and does not consider any particular country its national home.

denial of service attack

a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources

Variable

a data type or simply type is a classification of data which tells the compiler or interpreter how the programmer intends to use the data; can become incompatible with data warehouse design.

Modular Design

a design approach that subdivides a system into smaller parts called modules or skids, that can be independently created and then used in different systems.

Bridge

a device that connects and passes packets between two network segments that use the same communications protocol; can be used to boost Wi-Fi strength in areas of low signal quality.

Evil Twin

a fraudulent Wi-Fi access point that appears to be legitimate

Conceptual Data Model

a map of concepts and their relationships used for databases.

Freemium

a pricing strategy by which a product or service (typically a digital offering or an application such as software, media, games or web services) is provided free of charge, but money (premium) is charged for additional features, services, or virtual goods.

Physical Data Model

a representation of a data design as implemented, or intended to be implemented, in a database management system

Digital Signal

a signal that is being used to represent data as a sequence of discrete values

Data Warehousing

a system used for reporting and data analysis, and is considered a core component of business intelligence; data is stored in one place.

Rich Site Summary (RSS)

a type of web feed which allows users to access updates to online content in a standardized, computer-readable format.

Workbench

a unified CASE visual tool for database architects, developers, and database administrators. Microsoft Visual Basic is an example.

Wireless Sensor Networks (WSNs)

a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions

Secondary storage

accessed only through a system's input/output bus and is generally several orders of magnitude slower than primary storage technologies Includes hard disk drive (internal) or removable media, such as magnetic floppy disks, optical discs (CDs & DVDs), and USB flash drives

growth (business strategy)

adding new products or new enhancements to existing products

Internet of Things (IoT)

all devices—including appliances, cars, networks, and systems—will be connected to the Internet, which will facilitate servicing automation and e-commerce.

Tailgating

also known as "piggybacking," involves an attacker seeking entry to a restricted area which lacks the proper authentication

ARPANET

an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.

Pseudocode

an informal high-level description of the operating principle of a computer program or other algorithm. Used for human reading, rather than machine reading, and it can be used to translate into any programming language.

Extranet

an intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the Internet securely.

Multinational

an organization that owns or controls production of goods or services in one or more countries other than their home country.

work breakdown structure (WBS)

broken down list of all deliverables showing what the customer will get at the end of a project.

Clustering

classifies events or entities when no known group exists for the data.

Information Technology Infrastructure Library (ITIL)

common set of best practices widely used by businesses to give guidance to companies on how to use IT as a tool for implementing change

Porters 5 competitive forces

competitive rivalry bargaining power of customers bargaining power of suppliers threat of new entrants threat of substitutes

Tertiary storage

consists of an automated robotic mechanism to mount and dismount magnetic tape or optical discs.

data-flow model

describes how data moves and is processed by the proposed system under development.

database analyst

design, implement and sustain organizational database needs

four phases of the decision-making process

intelligence, design, choice, and implementation

function-oriented (system evaluation)

determine of the success of the information system in examining he performance of data, hardware, software, networks, and human resources

ring network

each computer connected to the next computer; cheaper to install; less effiecient.

Sniffing

eavesdropping on network traffic in order to acquire traffic data packets and decoding. The information gathered can be used to hack into a network; the most common attack, as signals travel through the air

primary storage

flash memory chips plugged into memory slots on the motherboard.

Media Access Control (MAC)

given to a network adapter when it is manufactured. It is hardwired or hard-coded onto your computer's network interface card (NIC) and is unique to it; an access point can be configured to allow only this specific address.

chief technology officer (CTO)

has ultimate responsibility for all technology implementation, maintaining technology compliance regulations, and identifying technology risks for the company.

Third generation computer languages (3GLs)

high-level programming languages such as FORTRAN, COBOL, C, Java, C++, and C#

Circuit Switching

ideal for communications that require data to be transmitted in real-time; a constant connection is required before transmission begins. •Analog signal signifies a continuous signal. The entire message is sent. •Public switch telephone network (PSTN) •Land Line •Dedicated communication link

chief security officer (CSO)

is the highest level executive concerned with the overall security functions and policies of a business.

Dumpster diving

is the process of searching trash to obtain useful information about a person/business that can later be used for the hacking purpose.

Classifications

look for patterns that indicate customer or entity behavior in order to target marketing efforts.

mesh network

network topology in which each node relays data for the network (they are all connected to one another and therefore have redundancy)

network host

node/computer connected with an IP address

Social engineering

normally low tech attacks used to trick individuals into disclosing information, providing access, or changing their patterns. Examples include phishing, spear-phishing (i.e. targeted phishing), dumpster diving, baiting, tailgating, and quid pro quo.

Product differentiation (business strategy)

offering a higher quality product to differentiate from others in the market

asynchronous communication

one way communication, such as email and global overnight mail

Web Mining

process of identifying hidden patterns and relationships in non-structured databases, such as the Internet, and applying rules to that data in order to predict future behavior.

Unstructured decisions

require the decision maker to provide the necessary insight, judgement, and evaluation to reach a decision. Individuals in senior management frequently make unstructured decisions.

Spiral Model (SDLC)

risk-driven process model generator for software projects. Based on the unique risk patterns of a given project, the spiral model guides a team to adopt elements of one or more process models, such as incremental, waterfall, or evolutionary prototyping.

data mart

smaller subset database from a data warehouse typically focused on a single area or function.

Fourth generation computer languages (4GL)

software tools that help reduce the amount of procedural knowledge that is needed about how computers operate and lets end users create programs as needed; SQL is a 4GL.

critical path method (CPM)

step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems.

Convergence

the ability for a telecommunication network to carry voice, data, and video

Prescriptive Analytics

the area of business analytics (BA) dedicated to finding the best course of action for a given situation.

Strategy-Oriented (system evaluation)

the determination of whether the information system outputs enable management to execute the plan.

information technology management

the management of hardware, software, data, networks, and people that facilitate access to information and allow the organization to achieve business objectives.

Build and fix model (SDLC)

the simplest SDLC model allowing for code to be incrementally modified and implemented until successful.

Structured English

the use of the English language with the syntax of structured programming to communicate the design of a computer program to non-technical users by breaking it down into logical steps using straightforward English words; uses modular design and data terminology.

synchronous communication

two way communications, such as audio/video teleconference and instant messaging

relational database

type of database in which multiple information files are combined into one database in one location, where data are stored in two-dimensional tables known as relations and contain multiple entities and attributes. Most common based upon the relational model of data, relationships between tables in rows and columns.

router

used to connect multiple networks together and forward data packets between those separate networks to the destination host.

First and second-generation computer languages

were specific to the computer manufacturer (1GL) or to a specific processor or environment (2GL).

system-oriented (system evaluation)

which is the ability of an information system to discriminate between files or data that are relevant to a user query, and those which are not relevant.

Cloud computing

•Allows application software to be stored in one or more locations and accessed and operated using Internet-enabled devices. •Clouds are classified as public, private, and hybrid, each indicating an organization's ownership in equipment in their own cloud. •Cloud computing enables users to lease hardware and software, thereby reducing capital expenditures, implementation times, and operating costs, while increasing deployment speed, flexibility, and profitability. •One of the benefits of cloud computing is the ability to share or reuse software.

Motherboard

•Backplane of a system •Device that contains the system bus •Connects the various input and output devices that compose any given computer system

Data Warehouse

•Collection of business data from multiple systems •Used for data analysis and mining •Structured data , deliberate, intentional

Implementation methods

•Direct (plunge) •Parallel •Prototyping •Phased

Feasibility areas of study

•Economic: Total cost of ownership(TCO) takes into account the total costs over time, including hardware, software, labor, lease fees, and licensing. •Technical: To determine the technical feasibility of a system, technology and providers need to be compared and limitations identified. •Operational: The assessment of operational feasibility provides an insight into whether or not the proposed system(s) are compatible with the existing or proposed operations of the organization •Schedule: Determines whether the project will be viable once completed. This assessment is very important for projects that have long implementation timeframes. •Legal: Determines the legal aspects and repercussions of the project. This consideration may be important for organizations that do business with government agencies, foreign governments, or who manage or maintain sensitive or confidential data. •Political: Considers how potential stakeholders will respond to the changes resulting from the proposed system(s). Stakeholders who do not support or feel threatened by the system may oppose or disrupt implementation.

prototyping model (SDLC)

•Experimental system is quickly inexpensively built. •Provided to end users for evaluation. •Refined based upon user feedback. •The four steps of prototyping include: 1.Identifying the user's basic requirements 2.Developing the initial prototype 3.Using the prototype 4.Revising and enhancing the prototype.

The omni-channel.

•Facilitated by e-business connections , warehouses filled with inventory become distribution centers, physical retail storefronts become hybrid warehouse.

Data normalization

•Flowcharting during the design phase to avoid inconsistencies in the database. •Databases must go through normalization in the design process to simplify complexity. •Removes redundant or unnecessary duplication -two common database design problems. •Correctly defining keys, tables, columns, and relationships.

End-user development (SDLC)

•Informal method of solutions development by end users. •Made possible by the availability of fourth-generation languages. •Enable end users to develop systems and solutions with little or no assistance from professional technical specialists. •Example Structured query language SQL -Data queries

Localized and personalized e-commerce

•Knowledge of and intimacy with their customers are more likely to see those customers return.

Healthcare/Medical breaches

•Medical electronic healthcare records •Personal information and financial details

Partnership

•Much like sole proprietorships •Two or more individuals who may then personally and individually share in the rewards and liabilities

Management information system (MIS)

•Operational and middle managers traditionally use management information systems (MIS) with data from transaction processing systems (TPS) to obtain routine production and exception reports, in order to make structured decisions.

Types of computers

•Personal computers (PC): smaller systems like tablet computer. •Laptops: well suited for mobile use because they are powered by rechargeable batteries •Traditional PC's -require an electrical connection •Smart Phone -mobile phones are growing for day-to-day business •Server -A system used to provide services to other systems. •Mainframe -A high-capacity, high-performance system built for large organizations and used to quickly process large volumes of data. •Supercomputer—This term merely implies the fastest category of computer available. Supercomputers are purpose built to handle vast amounts of information very quickly.

Data Governance

•Policies and procedures are established that define the data governance program, such as who has access, who has update capabilities •Having clean data starts when the database is created by including database field (column) controls called validity checks •Data mapping comes to the rescue in the data management process. They are extra notes about the definition of a field, its data, and its use. •Segmenting data is also an important aspect of the data management process.

Banking/Credit/Financial breaches

•Prime target -attackers want most! •Money and personal information.

Data mining

•Process of identifying hidden patterns and relationships in large databases (data warehouse) and applying rules to that data in order to predict future behavior. Can identify associations, classifications, clustering, forecasting, and sequences.

ISP

•Provides internet connectivity to users! •Provides wireless router -connects to the ISP -then connects to the internet! •Provides dynamic IP address for security, wireless router. •Provides connection to Domain Server that translates domain names into IP addresses

E-business plan

•Purpose of the e-business •Revenue models •Target audience •Marketplace structure •Global reach requirements •Support structure •CRM (Customer Relationship Management )

RAM

•Random Access Memory •Volatile, support the CPU

•Government and military breaches

•Security breaches tend to be high-profile foreign powers trying to spy •Hacktivists -make a political statement •Cybercriminals in federal, state, and local databases.

Digital Market

•Sell direct to consumer •Low overhead •Direct delivery (not through dealer/store)

Corporation

•Separate legal entities created to •Represent the capital investments and somewhat or completely encapsulate the risks, liabilities, and debts of a single owner or many shareholders. •A disadvantage to incorporating includes double taxation

Mobile e-commerce (mCommerce).

•Smartphones and Tablets. Businesses that actively market to their customers via mobile devices

Social e-commerce

•Social media can provide a constant connection with customers regarding customer preferences

Systems Analyst

•Specializes in the analysis, design, and implementation of information systems. •Seldom are involved in the development of hardware and software. •Serves and interacts with the users to understand their needs and requirements. •CONSULTANT: interacts with the users to understand their needs and requirements. •SUPPORTING EXPERT: requires them to be knowledgeable in a variety of operating systems, programming languages, and hardware. •CHANGE AGENT: identification of the desired organizational improvements, designing systems that will implement those changes, and training and motivating users to operate and access the new system. •PROBLEM SOLVER: converting processes and procedures into system components and troubleshooting errors or delays that may occur. •GOOD COMMUNICATOR: capable of interacting with internal users and customers to identify and document requirements.. •ARBITRATOR: resolve conflict by addressing user concerns and problems that may occur between conflicting parties.

waterfall model (traditional SDLC model)

•Stages completed in order, cannot go back. •Most appropriate when system requirements are clear, well-documented, and unlikely to change. •Technology is understood and not dynamic. •Sufficient resources and expertise are available to support the process.

Online transaction processing (OLTP)

•Stands for "online transaction processing" and is a database design used for browsing and manipulating business transaction activity. •Used to gather transactional or operational data in real time.

Sole proprietorship or sole trader

•The simplest form of business •Enjoy all of the profits and benefits of doing business •Personally accountable for all liabilities, risks, and debts from business operations.

Online Analytical processing (OLAP)

•Tool that enables users to analyze data in order to make management decisions. A business intelligence tool that is useful for management reporting, budgeting, and forecasting. Multi-dimensional •A disadvantage of OLAP is that processing the data during ETL can be complex, leading to lengthy loading and updating. •Stands for "online analytical processing" and are analytical, fixed databases containing data that are used for making decisions.

Big Data

•Unstructured (sometimes Semi-structured ) •Three V's: •Variety -texts, emails, web-mining •Volume -great amount of transaction data •Velocity -batch, streaming (for marketers)

•Educational institutions breaches

•Valuable intellectual property from campus research, U of M -Business •Student and employee personal information

Enterprise Resource Planning (ERP)

•Very complex resource planning system that spans the entire business. •Combines main (core) business systems and applications into one comprehensive system •Typically a suite of integrated applications than an organization can use to collect, store ,manage and interpret data •Often in real time •The focus for ERP is more internally focused on the business functions.

Feasibility Analysis

•Whether the solution is financially, technologically, or organizationally feasible. •Whether the proposed system is a good investment. •Whether the necessary technology is available. •Whether the user's information specialists can manage the system •Whether the organization can adapt to the changes introduced by the new system.

Types of network connectionss

•Wire: connects point to point networks; ethernet, coaxial cable, fiber-optics (glass -speed of light) •Wireless network uses a radio frequency signal instead of wires to connect your devices over the radio spectrum (radio waves). •Satellite communications are used to link telecommunications networks over long distances. Satellite radio, Identify Locations, GIS, GPS.

Agile development (SDLC)

•encourages adaptive planning and development, fast delivery, continuous improvement, and flexibility in response to change.


Kaugnay na mga set ng pag-aaral

CRC3 chapter 10 Rollovers between and distributions from qualified plans and IRAs

View Set

Nutrition Chapter 1, NUTRITION CHAPTER 2, NUTRITION CHAPTER 3, Nutrition chapter 4, Diet and Nutrition Ch.7, Diet and Nutrition Ch. 8, Diet and Nutrition Ch 9, Diet and Nutrition Ch. 10, Diet and Nutrition Ch 11, Diet and Nutrition Ch. 12, Diet and N...

View Set