MIS Final
A major benefit of implementing an enterprise system is that most vendors have perfected the implementation process to such a degree that the total costs and time needed are known upfront.
False
A unique aspect of social media information systems is that they do not have the same five components as other information systems.
False
In general, it is better to have data that is too course than data that is too fine for your needs
False
Which of the following is NOT listed as one of the three primary activities of the business intelligence process?
Implement findings
While data are being collected everywhere, getting the data into a useable format can be quite challenging
True
Trojan Horse
a virus that masquerades as a useful program or file
Worm
a virus that self-propagates using the internet or other computer networks (spreads beyond the host computer)
Life of an association rule
confidence of the rule / support of the right-hand items
What is Enterprise Application Integration and why would a company do this?
- It enables existing applications to communicate and share data - It provides integrated information - It leverages existing systems -It enables a gradual move to ERP
What are the three types of enterprise applications that have emerged?
- Customer Relationship Management (CRM): a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service - Enterprise Resource Planning (ERP): a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent computing platform. - Enterprise Application Integration (EAI): a suite of software applications that integrates existing systems by providing layers of software that connect applications together.
What are the three role types of SMIS (Social Media Information Systems)?
- Social Media Providers - Users -Communities
Which of the following is true regarding a Data Mart?
A data mart allows a data analyst within a specific department to work with data relating to a specific business function
Which of the following is true regarding operational data and a data warehouse?
A data warehouse allows analysts to interact with data without the risk of negatively impacting the operations of the company
Which of the following is NOT a defining characteristic of Big Data
A. Huge Volume B. Sufficient Validity C. Rapid Velocity D. Great Variety answer is B
Which of the following is NOT one of the three possible responses by an organization when problematic social media content is found
A. Respond to it B. Leave it C. Delete it D. None of the above (meaning they are all options)
Which of the following is NOT an internal risk from social media?
A. Threats to information security B. Sexual harassment liability C. Increased organizational liability D. None of the above (meaning they are all risks)
Which of the following is a possible problem with source data?
A. Wrong granularity B. Missing values C. Too much data D. All of the above answer is D
Deep Learning
AI function that imitates the workings of a human brain in processing data and creating patterns for use in decision making
What are three ways social media sites can make money?
Advertising, charging for premium services (freemiums), by making users the product
How do organizations plan the use of IS?
Align IS with organizational strategy Communicate IS issues to the executive group develop/enforce IS priorities within the IS department Sponsor steering committee
What is a personal information system?
An information system used by a single individual
What does diseconomies of scale mean in the context of systems development?
Brook's Law: adding more people to a late project makes the project later When you add members, veteran members must rain new staff and lose productivity while training
Social media data can fall into which two categories?
Content and connection data
Why is systems development so risky (5 reasons)?
Difficulty of determining requirements Changes in requirements Difficulties involving scheduling and budgeting Changing technology Diseconomies of scale
What is structured data?
Data that is in the form of rows and columns
Dirty data generally refers to what?
Data that is not yet ready to be used for business intelligence purposes
What is the difference between a data warehouse and a data mart? What are potential issues with operational data?
Data warehouse is a distributor in a supply chain, data mart is like the retail store in a supply chain Smaller than data warehouse - addresses the needs of a particular department or functional area Problems - Dirty Data, missing values, inconsistent data, wrong granularity, too much data
What are your options when there is a significant change in technology while a system is being developed? What are the drawbacks of each option?
Do you stop development to switch to the new technology? It will become very expensive Do you finish developing according to the existing plan? You will be making an out of date system
What is the difference between Enterprise Resource Planning and Customer Relationship Management?
ERP and CRM systems use different approaches to increase profitability. ERP focuses on reducing overheads and cutting costs. By making business processes more efficient, ERP reduces the amount of capital spent on those processes. CRM works to increase profits by producing greater sales volume.
Which of the following is not one of the four phases of the customer life cycle?
Employee training
Which of the following statements is NOT true?
Employees are generally excited to receive upgraded systems and processes
What are elements of Agile Methodologies?
Expects, even welcomes, changes in requirements Frequently deliver working version of the product Work closely with the customer for the duration Design as you go Test as you go Team knows best how it's doing / how to change Can be used for applications, information systems, and business process development
What is the goal of IS Security?
Find an appropriate trade-off between the risk of loss and the cost of implementing safeguards
Point of Association Rule
Generally used with transactional data to find items that occur frequently together, helps identify useful and actionable patterns in the data Goal: to come up with actionable ru;es that provide clear and useful insight
What are four elements of an effective organizational incident response plan?
Have a plan in place Centralized reporting Specific responses (speed, preparation pays, don't make problem worse), snd practice
What are the three sources of information security threats?
Human error: accidental problems caused by both employees and nonemployees Computer crime: employees and former employees who intentionally destroy data or other system components Includes hackers and terrorists Natural disasters: fires, floods, hurricanes, earthquakes, avalanches, etc.
When the same data is stored in multiple locations, which of the following is an issue that often arises?
Increase costs Data integrity problems Inefficiency D. All of the above
What is the term used to describe when data are isolated in separated information systems?
Information silo
What does business intelligence do?
Information systems that process operational and other data to analyze past performance and to make predictions. Identifying Changes in Purchasing Patterns Business Intelligence for Entertainment Just-in-Time Medical Reporting
How do you eliminate information silos?
Integrate the data into a single database and revise applications to use that database. The business process.
What is Social Capital?
Investment in social relations with the expectation of returns in the marketplace
Which of the following statements is true regarding enterprise resource planning systems?
It includes the functions of a customer relationship management system as well as additional functionality
What are three potential responses to problematic content on social media. When would that response be a good idea?
Leave it - if content represents reasonable criticism of the organization's products or services. Respond to it (dangerous) - best reserved for the the problematic content has caused the organization to do something positive as a result Delete it - reserved for contributions that are inappropriate because they are contributed by crackpots, have nothing to do with the site, or contain obscene content.
Which of the following statements regarding enterprise systems is true?
Many were not feasible until network, data communication, and database technologies reached a sufficient level of capability in the late 80s and 90s
Why is it called a waterfall methodology?
Like a waterfall, the process is supposed to operate in a sequence of nonrepetitive phases
Be able to explain the 3 risks of outsourcing IT
Loss of control: vendor's in control, technology direction, potential loss of intellectual capital, product fixes/enhancements in wrong priority, vendor management-direction- or identity changes, CIO superfluous Benefits outweighed by long-term costs: high unit cost forever, paying for someone else's mismanagement, in time outsource vendor is de facto sole source, may not get what you pay for but don't know it No easy exit: critical knowledge in minds of vendors, not employees; expensive and risky to change vendors
Be able to explain the 3 benefits of outsourcing IT
Management advantages: obtain expertise, avoid management problems, free management time Cost reduction: obtain part-time services, gain economies of scale Risk reduction: cap financial exposure, improve quality, reduce implementation risk
Why should a company have a social media policy?
Manager the risk of inappropriate content
Why is it difficult to determine an accurate schedule and budget?
Many people will have an opinion on what needs to happen and when it needs to happen by; there are also many cases where you can't just name a date that something will be done by or how much it will all cost because it is hard to determine
What are the four phases of the customer life cycle?
Marketing, customer acquisition, relationship management, and loss/churn
Which of the following is not one of the three organizational units of a social media information system?
Moderator
What is SQL injection?
Occurs when users enter a SQL statement into a form in which they were supposed to enter a name or other data
Which of the following statements is NOT true?
One challenge with online ads is the inability to track the effectiveness of an individual ad
What are the three ways you can authenticate on a system?
Passwords, smart cards, and biometric authentication
What are the 4 methods you can use to implement the new system? What are the pros/cons of each method?
Pilot: organization implements the entire system on a limited portion of the business Pro: if the system fails, failure is contained within limited boundary; reduces exposure and protects new systems from developing a negative rep Phased: new system is installed in phases across the organization; once one piece works, the next is installed Cons: some systems are so tightly integrated that they cannot be phased Parallel: new system runs in parallel with old one until new system is tested and fully operational Cons: expensive, users work double time to run both, and considerable work is needed to determine if new system is consistent with old Pros: provides easy fallback if new system fails Plunge: organization shuts off old system and starts new one Cons: if new fails, company is in trouble
What are major functions of the IS Department?
Plan the use of IS to accomplish organizational goals and strategies Manage outsourcing relationships Protect information assets Develop, operate, and maintain the organization's computing infrastructure Develop, operate, and maintain applications
Business intelligence systems are used to do what?
Process data to analyze past performance and make predictions
Spyware
Programs installed on user's computer without their knowledge and observes user's actions
What does it mean if a variable has a significant effect on another variable? What doesn't this mean?
R-squared tells you how much of the observed variance in Y is explained by the model. If you are using this model to predict values (as opposed to hypothesis testing), you want a high R-squared value. If you have not included that contribute to the value of Y.
What are three types of BI Analysis
Reporting Analysis - process of sorting, grouping, summing, filtering, and formatting structured data (relational database or spreadsheet data) Goal: create information about past performance Data Mining analysis - application of statistical techniques to find patterns and relationships among data for classification and prediction, comes from convergence or disciplines (AI and Machine Learning) Goal: classify and predict Big Data - data collections that are characterized by huge volume, rapid velocity, and great variety Goal: find patterns and relationships in big data
What does Changes in Requirements mean?
Requirements change as the system is developed, and the bigger the system and longer the project, the more the requirements change
Phishing
Sending emails (usually to a large number of 'random targets') trying to trick people to click links or visit fake websites
Which of the following is NOT a primary component of a customer relationship management system?
Specialized hardware
What makes for a good rule?
Support is high. The best rules are not blatantly obvious, but upon reflection, they likely represent a broad and reasonable relationship between the two itemsets
What is the difference between symmetric and asymmetric encryption?
Symmetric: the same key is used to encode and decode Asymmetric: two keys are use (one for encoding and one for decoding)
What are the 5 phases of the Systems Development Lifecycle?
System definition Requirements analysis Component design Implementation Maintenance
What is Business Process Reengineering and how might you describe the process?
The activity of altering existing and designing new business processes to take advantage of new information systems. Difficult, slow, and exceedingly expensive.
Which of the following statements is NOT true regarding social media use?
The growth of social media has slowed considerably in the last few years
Why is it difficult to determine system requirements?
There tends to be questions that people fail to ask or know the answer to
Why do natural disasters pose information security threats?
They can result in the initial loss of capability and service as well as losses stemming from actions to recover from initial problem
Which of the following statements is true regarding an enterprise information system?
They span an organization and support activities of people in multiple departments
What are four internal risks created by social media?
Threats to informations security, increased organizational liability, decreased employee productivity Seemingly innocuous comments inadvertently leak information used to secure access to organizational resources - Bad idea to tell everyone it's your birthday because your DOB can be used to steal your identity, posting pictures with keys visible can be replicated Employees may inadvertently increase corporate liability when they use social media - Sexual harassment liability, Leak confidential information Reduced employee productivity - 64% of employees visit non-work related web sites each day, Tumblr (57%), Facebook (52%), Twitter (17%), Instagram (11%), and Snapchat (4%)
Seemingly innocent social media posts may be used by cyber criminals to gain unauthorized access to your online accounts
True
What are the five different types of loss relating to information security?
Unauthorized data disclosure: when a threat obtains data that is supposed to be protected Incorrect data modification Faulty service Denial of service: result from human error in following procedures or a lack of procedures Loss of infrastructure
Understand what Incorrect Data Modification means, what could cause them, what an example would be
Usually caused by human error; ex- employee follows procedure wrong, placing incorrect information on website, etc.
What is an information silo and what are problems that result from them?
When data is stored in isolated systems. Problems: data duplicated (integrity problem), data inconsistency, disjointed processes, data integration problems, Inefficiency: decisions made in isolation, increased cost for organization
Are SMIS consistent with the 5 Component Framework of IS?
Yes, hardware, software, data, procedures, and people
Malware
a broad category of software that has malicious intent
Data mart
a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business
Data warehouse
a facility for managing an organization's BI data
Threat
a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge
Virus
a program that replicates itself
Vulnerability
an opportunity for threats to gain access to individual or organizational assets
IP Spoofing
changing the IP address of information you send out
Wardriving
driving through areas searching for unsecure wifi networks to sniff the network traffic
Support for an itemset or association rule
how many times all items appear / how many records there are total
Confidence for the association rule
how many times all the items appear together / times the left hand side items appear.
Need for Machine Learning
large amounts of data to 'train' on. The training data often requires data to be labeled. Also need powerful computers to create and run the mathematical models.
Operational data
one type of strategic data, which includes internal control and operational environment information such as data on the company's workforce, direct competitors, creditors, suppliers and information on customers.
Understand what Faulty Service means, what could cause it?
problems that result from incorrect system operation
What does Denial of Service mean? How can it happen on accident?
result from human error in following procedures or a lack of procedures; can get messed up by worms or natural disasters
Ransomware
software that blocks access to a system or data until money is paid
Safeguard
some measure that individuals or organizations take to block the threat from obtaining the asset
What does Loss of Infrastructure mean? What can cause it?
tend to result from human accidents; ex- natural disasters, floor buffer crashing into routers
Sniffing
the act of intercepting and viewing network traffic
Target
the asset that is desired by the threat
Hacking
the general term for unauthorized entry to networks or systems, generally by finding vulnerabilities in code
Pretexting
the general term used when you pretend to be someone else
Artificial Intelligence
the use of computer programming in such a way as to Imitate intelligent behavior
Turing Test
whether a human can interact with a machine and not realize it is a machine