CMIS 342 Exam 1 Study Guide
Nice strategies for competitive advantage include:
1. Cost leadership 2. Differentiation 3. Innovation 4. Operational effectiveness 5. Customer-orientation
2 types of Privacy Codes and Policies
1. Opt-Out(company can collect personal info until requested otherwise) 2. Opt-In(company is prohibited from collecting unless requested otherwise)
Types of Security controls
1. Physical 2. Access 3. Communications(Network)
4 ethical issues related to Information
1. Privacy(collection) 2. Accuracy 3. Property(copying) 4. Accessibility (confidentiality)
What are the two categories of security threats?
1. Unintentional acts 2. Deliberate acts
4 approaches to ethical issues include:
1. Utilitarian 2. Rights 3. Fairness 4. Common Good
What are the three characteristics of big data?
1. Volume 2. Velocity 3. Variety Think three V's
An information system's ____ is the likelihood of incurring harm when a threat occurs. A. Vulnerability B. Risk C. Control D. Danger E. Compromise
A
Which of the following is NOT a role that information systems play in businesses processes? A. Establish Standards B. Execute the process C. Capture and store process data D. Monitor process performance E. Detect problems with the process
A
What are the five areas of business?
Accounting and Finance Sales and Marketing, HR, Production or Operations, IS
An ongoing collection of related activities that produce a product or service of value to the organization, its business partners, and/or its customers
Business process
Information is:
Data organized so that they have meaning and value to the recipient
Information Security is?
Defending information from unauthorized access, use, disclosure, disruption, modification or destruction
Support activities do what?
Do not add value directly to a firm's products and services, but support the primary activities.
What is Explicit Knowledge?
Documented, distributed knowledge. Think about a solution page that has been created to solve a problem. Ex. How to process a claim
Types of Information Systems:
Functional Area(FAIS), Enterprise Resource Planning(ERP),Transaction processing(TPS), Inter-organizational(IOS)
IT refers to:
Hardware/software
What is Big Data?
High volume data that requires new forms of processing to enable decision-making and discovery. Ex. social data, images from camera phones, medical scanners, security cams
IT Infrastructure consists of:
IT Platform and all of its components. Also IT services
IT may cause employees to experience a loss of?
Identity
Why do we care about big data?
It can reveal valuable patterns and information. It can spot trends to lead to better decisions and forecasting.
What is a business continuity plan? (Disaster recovery plan)
Keeps business operating when compromised. Can involve hot site, warm site, cold site, off-site data storage
Three external business pressures:
Market, Technology, Societal
IT may reduce the number of?
Middle Managers
Two ethical reference points in business environment:
Organizations's code of ethics Profession's code of ethics
What is tacit knowledge?
Personal, unstructured knowledge Think about how you would handle a situation with a customer. Ex. How to work effectively with a long-time customer
What are Transborder data flows?
Problems that stem from the absence of consistent standards for privacy and security among different countries Ex. EU has a stricter data-protection policy compared to that of the US
What are the steps of Risk management?
Risk analysis Risk mitigation controls evaluation
Define ethics:
Standards for judging what is right and wrong
What is unstructured data?
Think data that isn't all accounted for
What is a Knowledge Management System(KMS)?
a type of IS that moves beyond managing only the organization's explicit knowledge. Captures tacit knowledge from individual employees, to make available to other employees.
Competitive advantage:
an advantage over competitors(Costs,speed,quality) leads to control of a market and to larger-than-average profits
Common Good ethical approach is:
choice that maintains respect and compassion for all others
Utilitarian ethical approach is:
choice that provides the most good or least harm.
What is a threat?
danger to which information may be exposed
knowledge is:
data and/or information organized and processed to convey understanding, experience, accumulated learning and expertise as they apply to current problem or activity
Data is:
elementary description of things, events, activities and transactions that are recorded, classified and stored but are not organized to convey any specific meaning
What is exposure?
harm, loss or damage that can result
What is a risk?
likelihood that a threat will occur
What is vulnerability?
likelihood that the harm will occur if the threat happens
Unintentional acts of security threats are:
no malicious intent, human errors, environmental hazards
Information Systems involves:
people, process, and technology.
IT will provide managers with what kind of information? What effect does this have?
real-time or near-real-time information, meaning managers will have less time to make decisions
IT Services:
the use of IT components (the IT platform) by personnel to develop information systems, oversee security, and manage data. (Think People and processes)
Deliberate acts of security threats are:
theft, espionage or trespass, information extortion, sabotage or vandalism, identity theft, compromises to intellectual property, software attacks
Primary activities do what?
value for which customers are willing to pay
What are types of software attacks?
virus, worm, phishing attacks, Denial of service(DOS), Trojans, logic bomb, back door
IT Platform:
Consists of the IT Components: 1. Hardware 2. Software 3. Networks 4. Databases
Rights ethical approach is:
Chocie that best protects and respects rights of affected parties
Fairness ethical approach is:
Choice that best treats humans equally