MIS Test

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Database Management System (DBMS)

-computer program that is used to create, process, and administer a database - most organizations do not develop their own DBMS - use DBMSs created by software vendors including Oracle, Microsoft, and IBM.

How a virus works

1. virus arrives- via email attachment, file download, or infected website 2. virus activation- action like running or opening the file activates virus leading it to copy to other files and locations 3. virus spreads- spreads to other computers via infected emails and files 4. virus payload released- payload or component of virus that executes malicious activity hits the computer and other infected devices

1st and 3rd Party cookies

1st Party - created by website you visit and keep track of your personal preferences and the current web browsing session 3rd Party- created by a website other than the one you are currently visiting and tracks your surfing habits; considered an invasion of privacy

E-commerce Personalization/Customization

Personalization: ability of organizations to craft marketing messages directed and product/service offerings toward specific target markets (creates marketing message that contains the individuals name, interests, and past purchase or interaction behavior) Customization: adjustment of an organization's product or service offerings based on an individual's preferences or past buying behavior E-commerce allows organizations to collect and analyze data about consumer's past purchases and engagement behavior to create personalized and customized offerings that are directly targeted to individual

White Hat Hackers

non-malicious computer security experts who test the security measures of an organization's information systems to ensure they are protected against malicious intrusions these ethical hackers execute tasks designed to test the security of an organization's IT infrastructure; often hired to expose weaknesses in network's firewalls tasks: penetration testing and testing in-place security systems (testing current systems and processes in place against security threats)

After cybersecurity risk assessment conducted ...

once a cybersecurity risk assessment has been conducted and various questions have been answered, an organization will be able to decide what to protect - means IT security controls can be investigated and developed and then data security strategies to mitigate risk can be employed - Questions answered before IT security control development occurs: What is the risk I am reducing? Is this the highest priority security risk? Am I reducing the risk in the most cost-efficient way?

E-commerce Timeline

organizations that wish to develop an e-commerce presence should execute an analysis of the phases needed; can be beneficial to visualize steps needed to create presence in e-commerce landscape 1. planning: determine vision for web presence 2. web development: build site 3. implementation: SEO strategy, keywords, sponsors 4. media plan: research best social media for target audience 5. social media implementation: create social media presence 6. mobile platform and planning implementation: plan deploy content and activities via mobile platforms

Customer Relationship Management Software

system seeks to manage a firm's interactions with customers using analytics and data analysis to identify the most valuable customers and target future customers - by tracking consumer behavior, it strives to focus on the customer experience to attract and retain customers, with the goal of increasing sales, market share, and profit

Supply Chain Management System Software

systems provide the software needed to ensure the efficient flow of goods and services from the initial extraction of raw materials all the way to customer distribution and receipt of payment - SCM assists managers in anticipating issues, such as increased demand or production slowdowns, so they can quickly institute accommodations

5 principles of ethical decision making

when facing an ethical dilemma, particularly regarding. information technology and individual privacy or intellectual property rights, having a practical knowledge of the five basic principles of ethical decision making can be beneficial - the principle of moral rights, the principle of virtue, the principle of distributive justice, the universalist principle, the utilitarian principle

5 dimensions of ethical behavior

- Information Privacy Rights: this category of ethical dilemmas involves the rights of individuals and organizations to privacy - Intellectual Privacy Rights: refers to creative works such as artwork, literary works, inventions, music, and images using patents (for inventions), trademarks (logos?), and copyrights (original works of authorship) to protect intellectual property - Control and Accountability: examines how individuals or corporations can be held accountable in case of violations of privacy or intellectual property rights - Establishing Quality Standards: refers to determining what constitutes proper levels of protection of digital information - Quality of Life: as it relates to the digital age refers to ensuring that technological advancements do not detract from one's quality of life(right of freedom or expression or not harmed by others)

How Do DBMS Solve File Management Issues?

- Reduction of data redundancy (duplication of data) data redundancy = higher storage fees + efficient access times -Decrease data inconsistency -Increase data security easier to secure data and information creates access constraints so only authorized users can access what they are supposed to protects from identity theft, data leaks, and misuse of data

Rootkit defending steps (3)

- do not ignore software updates - be aware of phishing emails - watch out for drive-by downloads (auto download)

Executive Information System Software

- executive information system (EIS), sometimes referred to as an executive support system (ESS), is a version of decision support system (DSS), or business intelligence (BI) software designed to expressly meet the needs of senior corporate executives of larger companies or corporations - key element of any EIS is a highly intuitive user interface, often referred to as the dashboard

Functions of Customer Relationship Management Software

- marketing: incorporates the acquisition of potential marketing leads, segmenting the market, and targeting promotions, such as advertisements, to create a lasting relationship with customers - sales: involves pricing, managing marketing lead contacts, and organizing sales activities - customer service: encompasses responding to customers' questions, managing returns, and managing customer contacts to improve customer relationships

The Impact of AI on Decision Support Systems

- model of a decision support system (DSS), or business intelligence (BI) system, typically adapts its processes based on the degree of accuracy of each prior decision - most DSSs can be considered to have a type of artificial intelligence

Cyberattack Examples

- pharming and phishing - spamming and spoofing - trojans and viruses - identity theft - DoS and DDoS attacks

AI Chatbot Ethics

- transparency: Covers the consequences of interacting with the software, including information privacy and security, data collection, data usage, and site ownership. Includes providing information to the user that informs them that they are interacting with a chatbot. - chatbot Identity and Persona: traditionally, female identities have been used for chatbots that fill assistant-type roles. This fashion could negatively reinforce gender stereotypes. - proper communication: how the software handles abusive language and generates controversial content should be considered. How the chatbot is designed to respond to instances where there are mental health issues should be addressed. - accurate data representation: users of AI chatbots should take precautions to ensure that the data and information that is returned are accurate

Human Approach to Decision Making

Cognitive systems use a decision-making approach like that used by humans to analyze large data sets to make decisions. systems use natural language processing (NLP) to read and process text like a human - NLP is the study and application of programming techniques that allow computers to understand spoken words and text that are inputted by humans - breaks down statements and sentences by analyzing them for grammar, structure, and relationships within the words - using algorithms and linguistic models, the eventual outcome is the comprehension of the intent of the language, which can be used to draw inferences - through process, cognitive computing systems continually learn and adapt, allowing them to increase their analytical abilities

Data Mining Information

Data mining is a means of analyzing data that can help organizations find patterns and relationships within data sets. Key Ideas about Data Mining 1. data mining does not replace the need to have an intimate knowledge of the organization, the data that is produced, and analytical methods employed to turn data into information 2. data mining assists businesses in uncovering information that maybe hidden in data sets 3. predictive information and relationships that are produced from data mining are not causal relationships 4. data mining yields probabilities, not exact answers

Encouraging Ethical Information Technology Behavior in the Workplace

Ethical, visible managers that lead by example are of paramount importance. Once appropriate standards have been established, business owners and network administrators must publish the standards, provide employee appropriate computer usage instruction, monitor employee computer behavior and periodically review the policies to ensure their continued viability

Types of E-commerce Transactions

E-commerce is any transaction that occurs online via theInternet - consumer-to-consumer(C2C): online marketplaces where one consumer sells to another consumer like eBay - consumer-to-business(C2B): consumers are able to provide service to businesses often through a bidding or auction type of system - consumer-to-administration(C2A): allows consumers to interact with government or authoritative bodies for activities such as paying taxes, securing building permits, or paying tuition at a university

Elements of Executive Information System Software

EIS should be oriented to meet the specific needs of the executive and will vary based upon the executive's department or area of responsibility. - Traditionally, EIS software has been designed to focus on operations, finance, marketing, and human resources management. - Another element of an EIS is the ability to communicate throughout the executive's department or area of responsibility. - The final element of any EIS is the software infrastructure supporting the system. while many firms have moved this software to the Cloud using a SaaS type platform, some organizations prefer to keep the software in-house using the firm's servers and network

Management and Types of Cookies

In the settings area of each browser you should consider deleting cookies, blocking and customizing your cookie settings, and deciding from which sites you want to allow cookies - Session cookies are small text files that are stored in temporary memory such as RAM or cache; lost when web browser is closed - Persistent cookies are stored on the hard drive and are not lost when the web browser is closed; only lost if designed with an expiration date

Types of cybersecurity breaches

a breach occurs when a hacker gains unauthorized access to an organizations systems, data, and information - viruses: software that infects computers and is created using computer code - spyware: collects information about a person's Internet surfing habits and behaviors - impersonation: social engineering tool in which a hacker plays the role of someone the target trusts ,thereby fooling them into sharing important information - DDoS - cyberattack making a service unaccessible to users

What is a cookie?

a small text file of information created by websites you visit that your web browser stores on your hard disk when you revisit a website that uses cookies your browser will send the cookie to the Web server that uses this information to customize and optimize your experience

Measures Taken by Cybersecurity Personnel to Assess Risks and Protect Data

according to NIST (National Institute of StandardsTechnology), cybersecurity personnel can take steps to ensure data and systems are protected - first thing to take place is cybersecurity risk assessment (about understanding, managing, controlling, and mitigating cyber risk across the organization) - this is a crucial part of any orgs. risk management strategy and data protection efforts - purpose of this is to help inform decision makers and support proper risk responses - assessment also provides an executive summary to help executives and directors to make informed decisions about security Risk = Threat x Vulnerability x Asset

Data Scrubbing

aka data cleansing; includes the detection of errors in data sets and the removal/correction of these mistakes to ensure an organization's data are valid ex of problems being resolved: elimination of duplicate database records, correct misspellings, correcting incorrect names and addresses, and fix syntax issues specialized data scrubbing software is commonly used to conduct automatic surveys of data files and data sets

Distributed Denial-of-Service Attack (DDoS)

attack on network designed to interrupt and stop network traffic by flooding it with too many requests; launches a virus on a computer - DoS is carried out by one computer while DDoS uses multiple computers

Referential Integrity

means accuracy and consistency of data within the table(tables linked by relationships) creation of relationships achieved using primary key(unique to each item in each row in a database) and foreign key(field related to another tables' primary key field)

How do firewalls protect data?

can be configured to prevent unauthorized access to networks from outside the org. and to prevent employees from sending or transmitting sensitive data - typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system -large orgs. utilize a system of complex firewalls to protect their networks

Elements of Supply Chain Management Software

components of a supply chain management (SCM)system depend on the product provided. -Complex organizations, such as major retail outlets or automobile manufacturing and distribution, require comprehensive SCM systems with a significant number of elements, whereas a doughnut shop may not require an SCM system for anything other than its local suppliers

AI Chabots

computer program that incorporates artificial intelligence (AI) and natural language processing(NLP) to interpret user-provided questions and provide automated responses, thus simulating human conversation - these programs use deep learning to enable more accurate responses over time - many of the AI chatbots in use today utilize natural language understanding (NLU) to understand the users' needs better. - once the need is determined, they use AI to identify what the user is trying to accomplish. This methodology allows the software to develop a granular knowledge base that increases accuracy in provided responses. - popular AI Chatbots include: ChatGPT, Caktus AI, AI-Powered Bing

Risks and Management of cookies

cookies pose many potential privacy risks - can collect information about surfing habits and sell that information to a variety of third-parties. - track your surfing behavior and use this information to create specific user profiles - corporate and government entities can use cookies to monitor your surfing behavior managing cookies is an important part of safe and efficient web browsing - determine what cookie settings are appropriate for your browser use and privacy protection - be aware that cookie settings must be adjusted in each browser you use

Data Integrity

means database is reliable, accurate, and aligned to the goals of the organization - data centralization(stored in 1 place) is critical in increasing data integrity multiple data sources maintained means decreased data integrity

Differences Between a Database and a DBMS

database = collection of tables, relationships, and metadata DMBS = software program designed to organize and administer database

Cyberattacks

deliberate misuse of computers and networks via the Internet; uses malicious code to modify normal operations of computer or network 2 type: - aims to disable target computer or prevent it from accessing network or Internet - designed to gain access to data stored on a device or gain administrative privileges to a device

Ethical Concerns with the Internet

each day 400,00 yrs of videos are watched and 1 billion google searches are conducted - unfortunately, this technological explosion also created techniques such as Deepfake (synthetic media that have been digitally manipulated to replace one person's likeness convincingly with that of another) and encourages extremely insular information streams - this often makes it difficult to distinguish between basic fact and fiction - also, with so much financial and personal data available online, the incidences of identity theft and frauds such as wire-wire and ransomware attacks have also proliferated

How Dos attacks are launched

happens when hacker gains unauthorized access and control of computers connected to the Internet hacker does this by using a software to infect digital devices turning each into a zombie (bot); a group of computers is called a botnet when botnet established, hacker can direct each device via remote access

Firewall

hardware or software used to keep a computer secure from outside threats such as viruses or hackers - allow or block Internet traffic in and out of a network or computer(most ideal consists of both hardware and software) -personal software firewalls are typically included with OS and are configured based on user preference -hardware based firewalls can be purchased as a stand-alone product but also often included in broadband routers

Protecting your Privacy Steps

impossible to safeguard all information privacy - steps to reduce risks 1. exercise good password habits 2. incorporate anti-virus protection 3. practice safe browsing and safe online purchasing 4. monitor credit report and place restrictions or stops on credit card

Penetration Testing

involves activities where white hat hackers are paid to hack into private networks and applications goal is to find gaps in network security and test security defenses after, reports are submitted that identify weaknesses and remediation uses the same tools and techniques as illegitimate hackers

Antivirus Software Protection

is used to scan files to identify and remove computer viruses and other malicious programs 2 common ones are signature-based detection and heuristic-based detection - signature-based capitalizes on the fact that viruses are created with a specific set of data and instruction that constitute its signature; look for these signatures and remove virus - heuristic-based attempts to detect new malware by examining files for suspicious characteristics without an exact signature match - other techniques include behavioral detection and Cloud-based detection

General Data Protection Regulation (GDPR)

law regulates how companies protect the personal data of citizens of the European Union (EU) law includes several key privacy and data protection requirements with which organizations must comply. requirements include: - requiring the consent of subjects for data processing - anonymizing collected data to protect privacy - providing notifications of data breaches - safe handling of data across country borders - requiring that certain companies appoint a data protection officer to oversee GDPR compliance

Ransomware

malware that makes a computer's data inaccessible until a ransom is paid how it works: encryption of victim's files with a message, payment made with Bitcoin, after payment it may or may not be reopened methods of attack: phishing is commonly executed through email messages. Illegitimate file attachments are included in what appears to be a legitimate email message. Built-in social engineering software that tricks a user into allowing administrative access to crucial data.

Relational Databases

organizes data into tables based on structured data groupings; use links called relationships between tables - tables = hold information about the objects to be represented in the database - records/objects = information in tables is stored in rows - fields = information in tables stored in columns - a common field that is included in both tables is used to create the relationship; these relationships define how the data in the tables are related - rows among multiple tables can be made related using foreign keys - data can be accessed in many ways without reorganizing the database tables themselves

Trojan (Trojan Horse)

program that appears legitimate but executes unwanted activity when activated; found attached to free downloads and apps - similar to viruses but they do not replicate; "backdoor method" - used to install key loggers or packet sniffers that find passwords, destroy data, or bypass firewalls

Opt-in and Opt-out

refers to common method of gaining consumer permission to access information or track behavior; some take advantage - Terms of Use may permit site owner to track browsing and share with 3rd parties - ex: checkbox asks if you want to receive news (if box is already checked then it is opt-out)

Privacy

right to control what happens with personal information about you Internet privacy concerns storing, distributing and displaying information concerning oneself via Internet - managers must protect the online privacy of employees etc.

Adware

software that collects user's web browsing history functions: surfaces advertisements on device, forward search history and requests to advertising and social media sites, collect variety of marketing and online behavioral data about you

Passwords with Privacy

strong password is usually your first line of defense in safeguarding your digital privacy - the best way to keep your Internet logins safe is to use a strong password and to never use the same password twice - this would be very difficult to do on your own, so experts suggest using password management software to keep your passwords safe - a typical password manager installs as a browser plug-in to handle password seizure and repeat - when you log in to a secure site, the password management software offers to save your identification - when you return to that site, it will automatically complete the login using your saved information, but will regenerate a new password for the next login

Artificial Intelligence(AI)

study and application of processes that combine computer and date science to enable computer-assisted or automated problem-solving; subfields of AI are machine and deep learning

Cybersecurity Exploits

the means through which a system vulnerability can be used by a hacker to execute a malicious activity on a system - includes specific code, command sequences, and open-source exploit kits that are designed to take advantage of software vulnerability or a flaw in system security - allows for an intruder to remotely access a network to gain unwarranted privileges to move deeper into the organization's network

AI Detection Software

the rise of ChatGPT and other AI chatbots, educators and business professionals are faced with ensuring that submitted work is unique, authentic, and not generated by AI. To counter the risk of plagiarism several AI content detector software tools are being released - AI Text Classifier by OpenAI: Developed by company that created ChatGPT. It examines whether a human or computer made text - GPTZero: Designed to analyze written text and determine the probability that AI may have generated all or part of the text - Turnitin AI Writing Detection Model: Plagiarism detection software used in many learning management systems (LMS), including Canvas. In addition to plagiarism detection, it also features AI detection

Data Visualization

tools used to convey a variety of data and information in a meaningful and efficient way graphical and structured representation of data, makes it easier to see results and conclusions ascertained from data analysis ways to ensure effective development and interpretation of data visualizations: define the purpose, design visualization for target audience, include all data, format data visualizations, use color

Rootkit

type of malicious computer program that is designed to operate secretly in a device and allow unauthorized access to cybercriminals, enabling them to remotely control a computer designed to bypass security software, but mostly it catches it and disables when rootkit installed. if not detected for a long time, need to uninstall OS and reload

Structured Query Language (SQL)

used for human interface and communications with relational databases and considered the standard database language -uses user-generated lines of code (statements) to answer questions against the database - most relational databases use SQL, but most also have proprietary extensions that allow for customized interactivity

Machine Learning

uses data and algorithms to emulate the way humans learn - systems improve their accuracy gradually through a continual process of learning - relies on human interaction and input to assist increating learning - AI can learn from machine learning models created by inputs and analysis of anticipated outputs

5 Major Categories of Executive Information System Software

usually tailored to meet the needs of the specific organization and the executive's role in the firm operations management, finance management, marketing, human resources management, and supply chain management


Kaugnay na mga set ng pag-aaral

930 Unit 6 Part 2 Module 16 Lesson 1-3 Review

View Set

04.07 ¿A qué jugabas en tu niñez?

View Set

Life Insurance - Section 1 - General Insurance

View Set

Chapter 9: Physical and Chemical Control of Microbes

View Set

Strategic Management: Chapter 13

View Set

CHAPTER 48 Management of Patients with Intestinal and Rectal Disorders QUIZ

View Set