Business Driven Technology Baltzan
benefits of business mobility
(1) enhances mobility (2) provides immediate data access wherever needed (3) increases location and monitoring capacity (for emergency services, tracking employees or equipment, monitoring remote equipment, etc.) (4) improves work flow (allows work processes constrained by paper or wired connections to be redesigned) (5) provides opportunities for business via mobile phone or tablet (6) provides alternative to wiring
common GIS uses
(1) finding what is nearby (2) routing information (3) sending information alerts (re: road closures, traffic congestion) (4) mapping densities (population or event densities based on a standard area unit (5) mapping quantities - determining how many things are within a given area (e.g. coffee shops, gas stations, or families with children)
challenges of business mobility
(1) protecting mobile devices against theft (2) protecting security of wireless connections (3) preventing viruses on mobile devices (4) addressing privacy concerns with RFID and LBS
In Sourcing
(in house development) uses the professional expertise within an organization to develop and maintain its information technology systems.
eBusiness Models
- Business-to-business (B2B) - Business-to-consumer (B2C) - Consumer-to-business (C2B) - Consumer-to-consumer (C2C)
Website Visitor Metrics
- Unidentified visitor - Unique visitor - Identified visitor
Reasons for growth of the WWW
-Microcomputer made it possible for the average person to own a computer -Advancements in networking hardware, software, and media made it possible for business computers to be connected to larger networks at a minimal cost -Browser software gave computer users an easy-to-use graphical interface to find, download, and display web pages -The speed, convenienve, and low cost of email have made it an incredibly popular tool for business and personal communications -Basic web pages are easy to create and extremely flexible
Ebusiness Advantages
-expanding global reach -opening new markets -reducing costs -improving operations -improving effectiveness
goods
-material items or products that customers will buy to satisfy a want or need -clothing, groceries, cell phones, and cares are all examples of goods that people buy to fulfill their needs
Customer Contact Points
-text message/instant message -voice mail/voice call -email/letter -web order/phone order -meeting or customer service call -twitter, facebook, blog
Ebusiness revenue models
1. Advertising fees; 2. License fees; 3. Subscription fees; 4. Transaction fees; 5. Value-added services fees
Four Common Extended ERP Components
1. Business Intelligence 2. Customer Relationship Management 3. Supply Chain Management 4. Ebusiness
factors driving outsourcing growth
1. Core Competencies 2. Financial Savings 3. Rapid Growth 4. The Internet 5. Globalization
Advantages of Using Wireless Networks
1. Enhances Mobility 2. Provides Immediate Data Access 3. Increases Location and Monitoring Capability 4. Provides Alternative to Wiring 5. Provides Mobile Business Opportunities 6. Improves Workflow
Four Technology Areas of Focus
1. IT Infrastructures 2. Security 3. Ebusiness 4. Integrations
Challenges of ebusiness
1. Identifying limited market segments; 2. Managing consumer trust; 3. Ensuring consumer protection; 4. Adhering to taxation rules.
Two primary components of CRM strategy
1. Operational CRM 2. Analytical CRM
XP Basic Phases
1. Planning 2. Designing 3. Coding 4. Testing
Challenges of Wireless Networks
1. Protecting Against Theft 2. Protecting Wireless Connections 3. Preventing Viruses on Mobile Devices 4. Addressing Privacy Concerns with RFID and LBS
Seven Principles of Supply Chain Management
1. Segment Customers by service needs, then tailor services to those segments. 2. Customize the logistics network and focus intensively on the service requirements and on the profitability of the pre-identified customer segments. 3. Listen to signals of market demand and plan accordingly. Planning must span the entire chain to detect signals of changing demand. 4. Differentiate products closer to the customer, since companies can no longer afford to hold inventory to compensate for poor demand forecasting. 5. Strategically manage sources of supply, by working with key suppliers to reduce overall costs of owning materials and services. 6. Develop a supply chain information technology strategy that supports different levels of decision making and provides a clear view (visibility) of the flow of products, services, and information. 7. Adopt performance evaluation measures that apply to every link in the supply chain and measure true profitability at every stage.
Managing a project includes
1. identifying requirements 2. establishing clear and achievable objectives 3. balancing the competing demands of quality, scope, time, and cost 4. adapting the specifications, plans, and approach to the different concerns and expectations of the various stakeholders
Operational CRM Technologies
1. marketing operational CRM technologies 2. sales operational CRM technologies 3. cutomer service operational CRM technologies
SCM keys to success
> Make the sale to the supplier > Support organizational goals > Change traditional business processes > Deploy in incremental phases and measure and communicate success
The components of an RFID system
> Tag :: A microchip holds data (in this case, an electronic product code), and an antenna to transmit data to a reader. > Reader :: Uses radio waves to read the tag and sends the EPC to computers in the supply chain > Computer network :: holds information such as dates made and shipped, price, and directions for use on each item. Also tracks the item location throughout the supply chain
wireless LAN (wLAN)
A LAN that uses radio signals to transmit and receive data over distances of a few hundred feet.
identity management
A broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity.
information security
A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
data artist
A business analytics specialist who uses visual tools to help people understand complex data.
Managerial Information Systems (MIS)
A business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making and problem solving
management information systems
A business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision-making and problem-solving
Management Information Systems (MIS)
A business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision-making and problem-solving. XXX is not technology XXX is a business function
data broker
A business that collects personal information about consumers and sells that information to other organizations.
neural network (artificial neural network)
A category of AI that attempts to emulate the way the human brain works.
repository
A central location in which data is stored and managed.
Big data
A collection of large complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools
big data
A collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.
System
A collection of parts that link to achieve a common purpose
secure hypertext transfer protocol (SHTTP or HTTPS)
A combination of HTTP and SSL to provide encryption and secure identification of an Internet server. Protects against interception of communications, transferring credit-card information safely & securely with special encryption techniques. When a user enters a web address with HTTPS, browser will encrypt message, but server must be configured to receive HTTPS messages.
Interoperability for Microwave Access (WiMAX)
A communications technology aimed at providing high-speed wireless data over metropolitan area networks
Worldwide Interoperability for Microwave Access (WiMAX)
A communications technology aimed at providing high-speed wireless data over metropolitan area networks (MANs)
competitive monitoring
A company keeps tabs of its competitor's activities on the web using software that automatically tracks all competitor website activities such as discounts and new products.
evaluate
A company must continually _____ all the business processes in its value chain.
drive-by hacking
A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
peer-to-peer (P2P)
A computer network that relies on the computing power and bandwidth of the participants in the network, rather than a centralized server
virtual reality
A computer-simulated environment that can be a simulation of the real world or an imaginary world.
Product realization
A cross functional business process that includes not only the way a product is developed but also the way it is marketed and serviced
Variable
A data characteristic that stands for a value that changes or varies over time
Variable
A data characteristic that stands for a value that changes or varies over time.
recommendation engine
A data-mining algorithm that analyzes a customer's purchases and actions on a website and then uses the data to recommend complementary products.
modem
A device that enables a computer to transmit and receive data
RFID Accelerometer
A device that measures the accelerations of an item and is used to track truck speeds or taxi cab speeds
Report
A document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information
Competitive Advantage
A feature of a product or service on which customers place a greater value than they do on similar offerings from competitors
Entry Barrier
A feature of a product or service that customers have come to expect and entering competitors must offer the same for survival
Entry barrier
A feature of a product or service that customers have come to expect and entering competitors must offer the same for survival
primary key
A field (or group of fields) that uniquely identifies a given entity in a table.
ransomware
A form of malicious software that infects your computer and asks for money.
Project Plan
A formal, approved document that manages and controls project execution
broadband
A high-speed Internet connection that is always connected. (Anything greater than 2 Mbps)
Child Online Protection Act (COPA)
A law that protects minors from accessing inappropriate material on the Internet.
Business strategy
A leadership plan that achieves a specific set of goals or objectives
Business Strategy
A leadership plan that achieves a specific set of goals or objectives such as increasing sales, decreasing costs, entering new markets, or developing new products or services
Business strategy
A leadership plan that achieves a specific set of goals or objectives; decreasing costs, attracting new customers, increasing customer loyalty, increasing sales, developing new products or services, or entering new markets
Wireless LAN
A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet
data warehouse
A logical collection of information—gathered from many different operational databases—that supports business analysis activities and decision-making tasks.
Balanced scorecard
A management system, in addition to a measurement system that enables organizations to clarify their vision and strategy and translate them into action; do use the organization from four perspectives: Learning and growth, internal business process, customer, financial
balanced scorecard
A management system, in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action.
Internet
A massive network that connects computers all over the world and allows them to communicate with one another.
algorithm
A mathematical formula placed in software that performs an analysis on a data set.
fuzzy logic
A mathematical method of handling imprecise or subjective information.
Wireless Fidelity (Wi-Fi)
A means of linking computers using infrared or radio signals
Customer Relationship Management (CRM)
A means of managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability.
information integrity
A measure of the quality of information.
streaming
A method of sending video and audio files over the Internet that allows users to hear/view the file while it's being transferred
measure
A metric is nothing more than a standard _____ to assess performance is a particular area.
WMAN
A metropolitan area network that uses radio signals to transmit and receive data
Wireless MAN
A metropolitan area network that uses radio signals to transmit and receive data
Porter's Five Forces Model
A model for analyzing the competitive forces within the environment in which a company operates, to assess the potential for profitability in an industry.
Prototyping
A modern design approach where the designers and system users use an iterative approach to building the system
Increased Focus on Integration Cont...
A new series of business success factors and challenges are emerging: Organization agility, Focus on core competencies and processes, Redefinition of the value chain, Instantaneous business response, Ability to scale resources and infrastructure across geographic boundaries.
Disruptive Technology
A new way of doing things that initially does not meet the needs of existing customers
Disruptive technology
A new way of doing things that initially does not meet the needs of existing customers. Tends to open new markets and destroy old ones. iPod/iPhone/iPad, online brokerage, personal computers, etc.
business process patent
A patent that protects a specific set of procedures for conducting a particular business activity.
Stakeholder
A person or group that has an interest or concern in an organization
eBusiness Model
A plan that details how a company creates, delivers, and generates revenues on the internet
ebusiness model
A plan that details how a company creates, delivers, and generates revenues on the internet. Four categories: 1. Business to Business (B2B) 2. Business to Consumer (B2C) 3. Consumer to Business (C2B) 4. Consumer to Consumer (C2C)
Business Model
A plan that details how a company creates, delivers, and generates revenues.
foreign key
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
Benchmarking
A process of continuously measuring system results, comparing those results to optimal system performance, and identifying steps and procedures to improve the system performance.
extraction, transformation, and loading (ETL)
A process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse.
information cleansing or scrubbing
A process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information
information cleansing or scrubbing
A process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information.
Competitive advantage
A product or service that an organization's customers place a greater value on than similar offerings from a competitor
competitive advantage
A product or service that an organization's customers value more highly than similar offerings from a competitor
Dynamic Report
A report that changes automatically during creation
intranet
A restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, and collaboration
Global Positioning System
A satellite-based navigation system providing extremely accurate position, time and speed information
Global Positioning System (GPS)
A satellite-based navigation system providing extremely accurate position, time, and speed information
global positioning system (GPS)
A satellite-based navigation system providing extremely accurate position, time, and speed information. It was developed by the US Dept of Defense in the early 1970's, and later made available to the public.
Business Unit
A segment of a company (such as accounting, production, marketing) representing a specific business function
waterfall methodology
A sequence of phases in which the output of each phase becomes the input for the next
Waterfall Methodology
A sequences of phases in which the output of each phase becomes the input for the next
Methodology
A set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges
file transfer protocol (FTP)
A simple network protocol that allows transmission of files between two computers on the Internet
model
A simplified representation or abstraction of reality.
packet
A single unit of binary data routed through a network
Pop-Up AD
A small web page containing an advertisement
Prototype
A smaller-scale representation or working model of the users' requirements or a proposed design for an information system
satellite
A space station that orbits earth, sending and receiving signals from earth-based stations over a wide area
Satellite
A space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area
satellite
A space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area
spyware
A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
intelligent agent
A special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users.
executive information system (EIS)
A specialized DSS that supports senior-level executives within the organization.
transmission control protocol/Internet protocol (TCP/IP)
A standard Internet protocol that provides a technical foundation for the public Internet,as well as large numbers of private networks. TCP verifies the correct delivery of data. Ensures size of data packet is the same throughout its transmission
secure sockets layer (SSL)
A standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passing between them remains private
protocol
A standard that specifies the format of data, as well as the rules to be followed during transmission
Business process
A standardized set of activities that accomplish a specific task
Business process
A standardized set of activities that accomplish a specific task, such as a specific process
Business process
A standardized set of activities that accomplish a specific task; helps a manager to envision how the entire company operates Exp: processing a customers order
prediction
A statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover.
data lake
A storage repository that holds a vast amount of raw data in its native format until it is needed.
Technology development
A support value activity that applies to management information systems to processes to add value.
Firm infrastructure
A support value activity that includes the company format or departmental structures, environment, and systems.
Human resource
A support value activity type of management that provides employee training, hiring, and compensation
data map
A technique for establishing a match, or balance, between the source data and the target data warehouse.
Electronic Tagging
A technique for identifying and tracking assets and individuals.
Viral Marketing
A technique that induces websites or users to pass on a marketing message
cluster analysis
A technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible.
digital rights management
A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Project
A temporary activitya company undertakes to create a unique product, service, or result
project
A temporary endeavor undertaken to create a unique product or service.
RFID Reader (RFID Interrogator)
A transmitter/receiver that reads the contents of RFID tags in the area
Wiki
A type of collaborative web page that allows users to add, remove, and change the content, which can easily be organized and reorganized as required.
relational database model
A type of database that stores information in the form of logically related two-dimensional tables.
IP address
A unique number that identifies where computers are located on the Internet. Consist of four numbers separated by periods.
Value chain analysis
A useful tool for determining how to create the greatest possible value for customers
traceroute
A utility application that monitors the network path of packet data sent to a remote computer
Snapshot
A view of data at a particular moment in time
System Thinking
A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part
Real Simple Syndication (RSS)
A web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format.
Mashup
A website or web application that uses content from more than one source to create a completely new product or service. Web version: mix map data, photos, video, news feeds, blog entries, and so on to create content with new purpose.
WWAN
A wide area network that uses radio signals to transmit and receive data
Wireless WAN
A wide area network that uses radio signals to transmit and receive data
Bluetooth
A wireless PAN (personal area network) technology that transmits signals over short distances among cell phones, computers, and other devices
Bluetooth
A wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices
multiple in/multiple out (MIMO) technology
A wireless access point (WAP) with multiple transmitters and receivers, allowing them to send greater amounts of data than traditional networking devices
wireless WAN
A wireless wide area network (WAN). It uses radio signals to transmit & receive data
Internet of Things (IoT)
A world where interconnected Internet-enabled devices or "things" have the ability to collect and share data without human intervention
metric
A(n) _____ is a standard measure to assess performance in a particular area.
system
A(n) __________ is a collection of parts that link to achieve a common purpose.
Effectiveness
According to Peter Drucker, what are managers who do the right things addressing?
Three Common Core ERP Components
Accounting & Finance Production & Materials Management Human Resources
Core ERP Components
Accounting and Finance, Production and materials management, human resources
Primary Users of ERP
Accounting, finance, logistics, production
Inbound logistics
Acquires raw materials and resources and distributes to manufacturing as required; primary value activity
Inbound logistics
Acquires raw materials and resources, and distributes
digital divide
Advantage for those having access to network technology
First mover
Advantage that occurs when a company can significantly increase its market share by being first with a new competitive advantage
Ebusiness revenue models
Advertising fees License fees Subscription fees Transaction fees Value-added service fees
Agile Methodology
Aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements
Web browsers
Allow access to WWW
dynamic host configuration protocol (DHCP)
Allows dynamic IP address allocation, so that users don't need a preconfigured IP address to use the network
Common Data Repository
Allows every department of a company to store and retrieve information in real-time allowing information to be more reliable and accessible.
Clickstream data
Allows organizations to observe the exact pattern of a consumer's navigation through a site. Length of stay, abandoned registrations, demographics of registered users, etc.
integration
Allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems.
Web Browser
Allows users to access the WWW
relational database management system
Allows users to create, read, update, and delete data in a relational database.
Social bookmarking
Allows users to share, organize, search, and manage bookmarks. Del.icio.us, StumpleUpon, etc.
Different Forms of System Testing
Alpha testing development testing integration testing system testing user acceptance testing (UAT) unit testing
Example of B2C
Amazon
Website success solely is measure by
Amount of traffic
Identified visitor
An ID is available that allows a user to be tracked across multiple visits to a website
Product differentiation
An advantage that occurs when a company develops unique differences in its products with the intent to influence demand.
Social Network
An application that connects people by matching profile information
data-driven decision management
An approach to business governance that values decisions that can be backed up with verifiable data.
dynamic catalog
An area of a website that stores information about products in a database.
genetic algorithm
An artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem.
Financial
An effectiveness metric that involves return on investment, cost benefit analysis, and break even analysis
SSL certificate
An electronic document that confirms the identity of a website or server, and verifies that a public key belongs to a trustworthy individual or company
RFID Tag
An electronic identification device that is made up of a chip and antenna
patent
An exclusive right to make, use, and sell an invention granted by a government to the inventor.
extranet
An extension of an organization's intranet that is available only to authorized outsiders
optimization analysis
An extension of goal-seeking analysis, finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints.
data point
An individual item on a graph or a chart.
data-driven website
An interactive website kept constantly updated and relevant to the needs of its customers through the use of a database.
Project Management Office (PMO)
An internal department that oversees all organizational projects
Institute of Electrical and Electronics Engineers (IEEE)
An organization that researches and institutes electrical standards for communication and other technologies
data set
An organized collection of data.
Back order
An unfilled customer order, demand against an item who's current stock level is insufficient to satisfy demand; a Supply Chain Management (SCM) metric
SDLC - Analysis
Analyze end-user business requirements and refines project goals into defined functions and operations of the intended system
Managerial decision-making challenges
Analyze large amounts of information, make decisions quickly, and apply sophisticated analysis techniques to make strategic decisions
Porters five forces model
Analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry; threat of substitute products or services, supplier power, rivalry among existing competitors, buyer power, and threat of new entrants
substitute
Analyzing and constructing primary value activities can help decrease the threat of _____ products for services.
entrants
Analyzing and constructing support value activities can help decrease the threat of new _____.
Business uses for instant messaging
Answer simple questions quickly and easily, eliminate long distance phone charges, quickly identify which employees are at their computers, resolve questions or problems immediately, transmit messages as fast as naturally flowing conversation, easily hold simultaneous IM sessions with multiple people
Project deliverable
Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project
Technology development
Applies MIS to processes to add value
Primary Information Security Areas
Authentication & Authorization Prevention & Resistance Detection & Response
The Benefits and and Magnitude of Change the Process Change Spectrum what would be th small change
Automate
Supply Chain Execution (SCE) software
Automates the different steps and stages of the supply chain.
Extended Ebusiness Models
B2B B2C B2G C2B C2C C2G G2B G2C G2G
Eprocurement
B2B purchase and sale of supplies and services over the internet
Benchmarks
Baseline values the system seeks to attain that managers must set
benchmark
Baseline values the system seeks to attain.
Telematics
Blending computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations.
Web conferencing (webinar)
Blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants
Banner AD
Box running across a web page that contains advertisements
Extreme programming (XP) methodology
Breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete
Extreme Programming (XP) Methodology
Breaks a project into tiny phases, and developers cannot continues on to the next phase until the first phase is complete
Three forms of B2C
Brick-and-mortar Click-and-mortar Pure-Play
Ebusiness Forms - Online Marketplaces
Bring together buyers and sellers of products and services Examples: Amazon.com; eBay.com
Online marketplaces (ebusiness form)
Brings together buyers ad sellers of products and services (amazon.com, priceline.com, etc)
Competitive Scope
Broad market and low cost, Broad market and high cost, Narrow market and low cost, Narrow market and high cost
Discovery Prototyping
Builds a small-scale representation or working model of the system to ensure it meets the user and business requirements
What is Business process?
Business concept
The plans and goals of the IT department must align with the plans and goals of the organization.
Business is always #1
health
Business leaders want to monitor key metrics in real time to actively track the _____ of their business.
Improving Communications
Business personnel must seek to increase their understanding of IT. IT personnel must seek to increase their understanding of the business.
A GAP BETWEEN BUSINESS PERSONNEL AND IT PERSONNEL
Business personnel possess expertise in functional areas such as marketing, accounting, and sales , it expertise in technology this causes
Customer-facing
Business processes that result in a product or service received by in organizations external customer; a.k.a. front-office process Exp: fulfilling orders, communicating with customers, sending out bills and marketing info
Core processes
Business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain.
Business to Consumer (B2C)
Business that sells its products or services to consumers over the internet. Brick and mortar (just storefront), click and mortar (storefront and website/virtual), pure play (just virtual)
Business to Business (B2B)
Businesses buying and selling to each other over the internet
reduced
Buyer power can be _____ by manipulating switching costs.
business goal
CRM is not just (Q1), but a (Q2), (Q3), and (Q4) that an organization must embrace on an enterprise-wide level (Q4)
strategy
CRM is not just (Q1), but a (Q2), (Q3), and (Q4) that an organization must embrace on an enterprisewide level (Q2)
process
CRM is not just (Q1), but a (Q2), (Q3), and (Q4) that an organization must embrace on an enterprisewide level (Q3)
technology
CRM is not just (Q1), but a (Q2), process, and business goal that an organization must embrace on an enterprisewide level (Q1)
Services
Cases closed same day, number of cases handled by agent, number of service calls, average number of service requests by type, average time to resolution, average number of service calls per day, percentage compliance with service level agreement, percentage of service renewals, and customer satisfaction levels are all _____ metrics.
smartphones
Cell phones with advanced computing capability
WWAN Categories
Cellular Communication Systems Satellite Communication Systems
Heart of ERP
Central database that collects information from and feeds information into all the ERP system's individual application components, supporting diverse business functions such as accounting, manufacturing, marketing, and human resources.
what-if analysis
Checks the impact of a change in an assumption on the proposed solution.
What does CEO stands for
Chief Executive officer
What does CFO stands for
Chief Financial Officer
What does CIO stands for
Chief Information Officer
Recent IT-related strategic positions:
Chief Information Officer (CIO Chief Technology Officer (CTO Chief Security Officer (CSO Chief Privacy Officer (CPO Chief Knowledge Officer (CKO
What does COO stands for
Chief Operation Officer
RFID
Chips or smart labels that can store unique identifiers and relay this information to electronic readers
Radio Frequency Identification (RFID)
Chips or smart labels that can store unique identifies and relay this information to electronic readers.
Education and Training
Cisco saved $133 million in 2002 by moving training sessions to the Internet, and the University of Phoenix on line college classes please investors.
Collective intelligence
Collaborating and tapping into the core knowledge of all employees, partners, and customers.
Back Office - Analytical CRM
Collaborative CRM system Data warehouse Data mining
Synchronus Communication
Communication in which messages occur in real time—when you speak or write, someone immediately responds to your message.
Asynchronous Communications
Communication such as email in which the message and the response do not occur at the same time
Synchronous Communication
Communications that occur at the same time such as IM chat (live)
comparative analysis
Compares two or more data sets to identify patterns and trends.
data dictionary
Compiles all of the metadata about the data elements in the data model.
edge matching (warping, rubber sheeting)
Component of GIS software that matches edges of map sections
expert system
Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems.
local area network (LAN)
Connects a group of computers in close proximity
wide area network (WAN)
Connects computers scattered over a wide area
Iterative Devlopment
Consists of a series of tiny projects
Supply chain
Consists of all parties involved, directly or indirectly, in obtaining raw materials or a product
Supply Chain
Consists of all parties involved, directly or indirectly, in the procurement of a product or raw materials.
Explicit Knowledge
Consists of anything that can be documented, achieved, and codified, often with the help of IT
Explicit Knowledge
Consists of anything that can be documented, archived and codified, often with the help of IT.
Digital Dashboard Analytical Capabilities
Consolidation, drill-down, slice-and-dice, pivot
Gate 3 of RUP
Construction
Consumer to Business (C2B)
Consumer that sells a product or service to a business over the internet. Priceline.com
Customer Service Operational CRM Technology
Contact center (call center) Web-based self-service system Call scripting system
data mart
Contains a subset of data warehouse information.
Source Code
Contains instructions written by a programmer specifying the actions to be performed by computer software
Technologies to prevent attacks
Content Filtering Encryption Firewalls
Ebusiness Forms
Content providers, infomediaries, online marketplaces, portals, service providers, transaction brokers
feedback
Continuously measuring M I S projects against benchmarks provides _____ so managers can know when things get out of line and control the system.
domain name system (DNS)
Converts IP addresses into domains (identifying labels instead of four numbers)
Podcasting
Converts an audio broadcast to a digital music player. Can increase marketing reach and build customer loyalty. Can be used to discuss corporate strategies, offer detailed product overviews, etc.
Switching costs
Costs that can make customers reluctant to switch to another product or service.
Switching costs
Costs that make customers reluctant to switch to another product or service
Issuses Affected by Technology Advance: intellectual property, Copyright, fair use doctrine, pirated software and counterfeit software of these which is the worst
Countefeit software
chief user experience officer
Create the optimal relationship between user and technology.
User-contributed (user-generated) content
Created and updated by many users for many users. Flickr, Wikipedia, YouTube
database management system (DBMS)
Creates, reads, updates, and deletes data in a database while controlling access and security
Accounting finance
Creating financial statements, paying of accounts payable, and collecting of accounts receivable are examples of business processes in the _____ and _____ departments.
Critical Success Factor (CSF)
Crucial steps companies perform to achieve their goals and objectives and implement their strategies.
CRM
Customer Relationship Management: involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability.
What would be the Greatest Benefits for Information Technology
Customer Service
Primary Users of SCM
Customers, resellers, partners, suppliers, distributors
variable
Data characteristic that stands for a value that changes or varies over time
Clickstream Data
Data collected about user behavior and browsing patterns by monitoring users' activities when they visit a Web site.
information
Data converted into a meaningful and useful context
Information
Data converted into a meaningful and useful context.
information
Data converted into meaningful and useful content: best-selling product, best customer, worst-selling product, worst customer
Machine-generated data
Data created by a machine without human intervention, includes sensor data, point-of-sale data, and web log data
Unstructured data
Data not defined and does not follow a specified format and is typically free-form text such as emails, Twitter tweets, and text messages. Unstructured data accounts for about 80 percent of the data that surrounds us.
Information
Data organized so that they have meaning and value to the recipient.
structured data
Data that has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address.
Structured data
Data that has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address. Data typically stored in a traditional system such as a relational database or spreadsheet and accounts for about 20 percent of the data that surrounds us.
Human-generated data
Data that humans, in interaction with computers, generate. Human-generated structured data includes input data, click-stream data, or gaming data.
unstructured data
Data that is not defined and does not follow a specified format and is typically free-form text such as emails, Twitter tweets, and text messages
Core Drivers of the information age
Data, information, business intelligence, knowledge
Finance
Deals with strategic financial issues including money, banking, credit, investments, and assets
business rule
Defines how a company performs a certain aspect of its business and typically results in either a yes/no or true/false answer.
War Driving
Deliberately searching for Wi-Fi signals from a vehicle
Semantic Web
Described by Tim Berners-Lee (one of WWW founders) as one of the components of Web 3.0 that describes things ina way that computers can understand.
Network effect
Describes how products in a network increase in value to users as the number of users increases
Social tagging
Describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search.
source document
Describes the original transaction record along with details such as its date, purpose, and amount spent and includes cash receipts, canceled checks, invoices, customer refunds, employee time sheet, etc.
Hotspots
Designated locations where Wi-Fi access points are publically available
hotspots
Designated locations where wi-fi access points are publicly available
metadata
Details about data.
estimation analysis
Determine values for an unknown continuous variable behavior or estimated future value.
chief automation officer
Determines if a person or business process can be replaced by a robot or software.
Break Even analysis
Determines the volume of business required to make a profit at the current prices charged for the products or services
virtual private network (VPN)
Direct, private network links (or private, secure Internet access) within the framework of the Internet, a sort of "private tunnel"
Internet protocol TV (IPTV)
Distributes digital video content using IP (Internet protocol) across the Internet and private IP networks
Outbound logistics
Distributes good and services to customers; primary value activity
Outbound logistics
Distributes goods and services to customers
Module Software Design
Divides the system into a set of functional units (named modules) that can be used independently or combined with other modules for increased business flexibility.
Passive RFID Tags
Do not have a power source
Swimlane Diagram
Documents the steps or activities of a workflow by grouping activities into swimlanes, which are horizontal or vertical columns containing all associated activities for that category or department.
Types of Feasibility Studies
Economic feasibility Operational feasibility Schedule feasibility Technical feasibility Political feasibility Legal feasibility
One of the greatest challenges today
Effective communication between business personnel and IT personnel
Efficiency vs. Effectiveness
Efficiency = throughput, transaction speed, system availability, etc Effectiveness = customer satisfaction, customer conversion rates, etc
Gate 2 of RUP
Elaboration
Data Item
Elementary description of things, events, activities and transactions that are recorded, classified and stored but are not organized to convey any specific meaning.
ebusiness tools for communicating
Email Instant Messaging Podcasting Videoconferencing Web Conferencing Content Management System
Rapid Application Development (RAD) Methodology
Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process
Rapid Application Development (RAD) Methodology
Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process
managerial level
Employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change.
operational level
Employees develop, control, and maintain core business activities required to run the day-to-day operations.
telecommuting (virtual workforce)
Employees working at home or remote location via the Internet
Wireless Access Point
Enables devices to connect to a wireless network to communicate with each other
wireless access point (WA{P)
Enables devices to connect to a wireless network to communicate with each other
business-critical integrity constraint
Enforces business rules vital to an organization's success and often requires more insight and knowledge than relational integrity constraints.
What is on the mind of the CEO
Enhance Customer Satisfaction
Advantages of Wireless Networks
Enhances Mobility Provides Immediate Data Access Increases Location and Monitoring Capability Improves Workflow Provides Mobile Business Opportunities Provides Alternatives to Wiring
What Concerns CIO;s the Most?
Enhancing customer satisfaction
dirty data
Erroneous or flawed data.
SDLC - Design
Establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation
Eshop
Estore/etailer. Online version of a retail store where customers can shop at any hour.
Differentiate between ethics and privacy
Ethics = the principles and standards that guide our behavior toward other people Privacy = the right to be left alone when you want to be, to have control over your own personal posessions, and to not be observed without your consent.
Example of C2C
Etsy
SWOT analysis
Evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies
market basket analysis
Evaluates such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services.
Effectiveness MIS metrics
Exp: customer satisfaction, customer conversion rates, financial
Efficiency MIS metrics
Exp: throughput, transaction speed, system availability, information accuracy, response time
hacker
Experts in technology who use their knowledge to break into computers and computer networks, either for profit or simply for the challenge. (https://gyazo.com/5c1008e4f78d100ea8270065fca8d152)
Extended ERP components
Extra components that meet the organizational needs not covered by the core components and primarily focus on external operations
Predictive Analytics
Extracts information from data and uses it to predict future trends and identify behavioral patterns
data scientist
Extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information.
Security Benefits
Fewer disruptions to organizational systems, Increased productivity of employees, Greater advances in administration, authorization, and authentication techniques.
goal-seeking analysis
Finds the inputs necessary to achieve a goal such as a desired level of output.
logical view of information
Focuses on how users logically access information to meet their particular business needs.
Supplier Relationship Management
Focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects, which optimizes supplier selection.
Partner Relationship Management
Focuses on keeping vendors satisfied by managing alliance partner and reseller relationships that provide customers with the optimal sales channel.
Increased Focus on Security
For business it is important to have the appropriate levels of: Authentication, Access Control, and Encryption to help ensure: 1. That only authorized individuals can gain access to the network. 2. That they have access to only those applications for which they are entitled. 3. That they cannot understand or later information while in transit.
Primary Business Benefits of ERP
Forecasting, planning, purchasing, material management, warehousing, inventory, distribution
support value activities
Found along the top of the value chain and includes business processes, such as firm infrastructure, human resource management, technology development, and procurement, that support the primary value activities.
primary value activities
Found at the bottom of the value chain, these include business processes that acquire raw materials and manufacture, deliver, market, sell, and provide after-sales services.
business process reengineering
Four strategic initiatives for competitive advantages are _____ _____ _____, supply chain management, customer relationship management, and enterprise resource planning.
supply chain management
Four strategic initiatives for competitive advantages are business process reengineering, _____ _____ _____, customer relationship management, and enterprise resource planning.
customer relationship management
Four strategic initiatives for competitive advantages are business process reengineering, supply chain management, _____ _____ _____, and enterprise resource planning.
enterprise resource planning
Four strategic initiatives for competitive advantages are business process reengineering, supply chain management, customer relationship management, and _____ _____ _____.
Example of Brick-and-Mortar
Full Circle Books
Ebusiness Forms - Content Providers
Generate revenue by providing digital content such as news, music, photos, or videos Example: Netflix.com
Demand planning software
Generates demand forecasts using statistical tools and forecasting techniques *Companies can respond faster and more effectively to consumer demands*
Content Providers (ebusiness form)
Generates revenue by providing digital content such as news, music, photos, or videos (netflix, itunes, etc.)
Pay-per-call
Generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call
Pay-per-conversion
Generates revenue each time a website visitor is converted to a customer
Porter's three generic strategies
Generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service.
Example of a Pure-Play
information ethics
Governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies).
Productions and materials management ERP components
Handle various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control.
Active RFID Tags
Have their own transmitter and a power source
Content Management Systems (CMS)
Help companies manage the creation, storage, editing, and publication of their website content. Most include web-based publishing, search, navigation, and indexing to organize information; and they let users with little or no technical experience to make website changes.
CRM reporting technologies
Help organizations identify their customers across other applications
CRM predicting technologies
Help organizations make predictions regarding customer behavior such as which customers are at risk of leaving.
CRM analysis technologies
Help organizations segment their customers into categories such as best and worst customers.
SCM applications
Helps companies analyze vendors based on a number of key variables including strategy, business goals, prices, and markets.
Supply Chain Management (extended ERP component)
Helps organization plan, schedle, control, and optimize supply chain from its acquisition of raw materials to the receipt of finished goods by customers.
query-by-example (QBE) tool
Helps users graphically design the answer to a question against a database.
Industry clusters
High concentrations of companies in a sector such as semi conductors, cars, or textiles.
Rivalry among existing competitors
High when competition is fierce in a market and low when competitors are more complacent
Threat of New Entrants
High when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market
Threat of Substitute Products or Services
High when there are many alternatives to a product or service and low when there are few alternatives from which to choose
Threat of new entrants
High: when it is easy for new competitors to enter a market Low: when there are significant entry barriers to entering the market
Threat of substitute products or services
High: when there are many alternatives to a product or service Low: When there are few alternatives from which to choose
Human resources
Hiring employees, enrolling employees in healthcare, and tracking vacation and sick time are examples of business processes in the _____ _____ department.
Website Hit Metrics
Hits
Technology Areas of Focus
IT Infrastructure Security Ebusiness Integrations
a communications gap between the business personnel and IT personnel
IT personnel have the technological expertise This typically causes
Spatial Data
Identifies the geographic location of features and boundaries on Earth
spatial data (geospatial data or geographic information)
Identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. It's stored as coordinates and topology, and can be mapped.
source data
Identifies the primary location where data is collected.
Digital Darwinism
Implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.
geocoding
In spatial databases, it's a coding process that assigns a digital map feature to an attribute that serves as a unique ID (e.g., tract number or node number) or classification (e.g. soil type, zoning category). GIS professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data.
Upper right-hand corner
In the graph depicting the interrelationships between efficiency and effectiveness, where does an organization ideally want to operate?
Gate One Of RUP
Inception
standard packet formats
Include a packet header, packet body (containing the information), and packet footer
dynamic information
Includes data that change based on user actions.
Ebusiness
Includes ecommerce along with all activities related to internal and external business operations
Firm infrastructure
Includes the company format or departmental structures, environment, and systems
Wi-Fi Infrastructure
Includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal
Wi-Fi infrastructure
Includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal
Workflow
Includes the tasks, activities, and responsibilities required to execute each step in a business process
outsourcing benefits
Increased quality and efficiency of business processes Reduced operating expenses for head count and exposure to risk for large capital investments Access to outsourcing service provider's expertise, economies of scale, best practices, and advanced technologies Increased flexibility for faster response to market changes and less time to market for new products or services
Return on investment (ROI)
Indicates the earning power of a project and is measured by dividing the project by the investment
return on investment (ROI)
Indicates the earning power of a project.
Return on investment (ROI)
Indicates the earning power of a project; A common in ternal KPI; =profitability/costs
knowledge worker
Individual valued for their ability to interpret and analyze information
Project stakeholder
Individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion
Knowledge Workers
Individuals valued for their ability to interpret and analyze information
Knowledge Workers
Individuals valued for their ability to interpret and analyze information.
What is IT?
Information Technology (IT) is a field concerned with the use of technology and managing the processing information.
Business intelligence
Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trains, and relationships for strategic decision making
Business Intelligence (BI)
Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making
business intelligence (BI)
Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making
What are the 4 Organizatonal Informaion Cultures?
Information-Functional, Information-sharing , Information-inquiring, and Information-discovery
Transformation Process
Inputs Transformation Outputs Control
IEEE
Institute of Electrical & Electronics Engineers. An organization that researches and institutes electrical standards for communication and other technologies
intellectual property
Intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
E- INTELLECTUAL PROPERTY
Intangible creative work that is embodied in physical form.
Enterprise Resource Planning (ERP)
Integrates all departments and functions throughout an organization into a single system (or integrated set of MIS systems) so that employees can make decisions by viewing enterprisewide information on all business operations.
ERP
Integration is key
Hypertext transport protocol (HTTP)
Internet protocol web browsers use to request and display webpages using universal resource locators.
Business-facing processes
Invisible to the external customer but essential to the effective management of the business; they include goal setting, day-to-day planning, giving performance feedback and rewards, and resource allocation.
Sales Analytics
Involves gathering, classifying, comparing, and studying company sales data to analyze product cycles, sales pipelines, and competitive intelligence.
Customer analytics
Involves gathering, classifying, comparing, and studying customer data to identify buying trends, at-risk customers, and potential future opportunities.
Customer relationship management (CRM)
Involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability.
structured decisions
Involves situations where established processes offer potential solutions.
supply chain management (SCM)
Involves the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability.
Supply Chain Management (SCM)
Involves the management of information flows between and among stages in a supply chain to maximize total supply chain effectiveness and profitability.
Egovernment
Involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer and all branches of government (FirstGov.gov)
Feasibility
Is the measure of the tangible and intangible benefits of an information system.
Primary Component of CRM
Knowing when and why the customer is communicating with the company
workers
Knowledge __________ are individuals valued for their ability to interpret and analyze information.
Tacit Knowledge
Knowledge contained in people's heads
Tacit Knowledge
Knowledge contained in people's heads.
metropolitan area network (MAN)
Large computer network usually spanning a city
lattitude/longitude
Lattitude measures north/south position, while longitude measures degrees east/west
Customer Relationship Management Key Players
Lead, Account, Contact, Sales Opportunity (https://gyazo.com/7475f2b52240bda1ed0710f3824e3d40)
Manager - - ensuring the delivery of all IT projects, on time and within budget
Leader -ensures the strategic vision of IT is in line with the strategic vision of the organization Communicator - building and maintaining strong executive relationships
Outsourcing Challenges
Length of contract -Difficulties in getting out of a contract -Problems in foreseeing future needs -Problems in reforming an internal IT department after the contract is finished Threat to competitive advantage Loss of confidentiality
Retail
Less than 5 percent of retails sales occur online. eBay was on track in 2003 to become one of the nation's top 15 retailers, and Amazon.com will join the top 40. Wal-Mart's e-business strategy is forcing rivals to make heavy investments in technology.
Map Automation
Links business assets to a centralized system where they can be tacked and monitored over time
GIS map automation
Links business assets to a centralized system where they can be tracked and monitored over time
Marketing and operational CRM technology
List generator, campaign management, cross-selling and up-selling
packet header
Lists destination of packet, along with the length of the message. Also contains error-checking information
Website bookmark
Locally stored URL or the address of a file or Internet page saved as a shortcut
Support value activities
Located along the top of the value chain these support the primary value activities; includes firm infrastructure, human resource management, technology development, and procurement
data model
Logical data structures that detail the relationships among data elements using graphics or pictures.
attenuation
Loss of network signal strength (measured in decibels) as signal travels over increasingly longer distances
database
Maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).
Human resources
Maintains policies, plans, and procedures for the effective management of employees
Accounting and finance ERP components
Manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management. Credit-management feature.
chief intellectual property officer
Manage and defend intellectual property, copyrights, and patents.
What is the function of CIO?
Manage, leader, communicator
What is MIS?
Management Information Systems (MIS) is a business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making and problem solving.
strategic level
Managers develop overall business strategies, goals, and objectives as part of the company's strategic plan.
five forces
Managers use three common tools to analyze competitive intelligence and develop competitive advantages including; The _____ _____ model, the three generic strategies, value chain analysis
three generic
Managers use three common tools to analyze competitive intelligence and develop competitive advantages including; The five forces model, the _____ _____ strategies, value chain analysis
value chain
Managers use three common tools to analyze competitive intelligence and develop competitive advantages including; The five forces model, the three generic strategies, _____ _____ analysis
Operations management
Manages the process of converting or transforming resources into goods or services
Social networking analysis (SNA)
Maps group contacts (personal and professional) identifying who knows each other and who works together. It can also identify key experts with specific knowledge such as how to solve a complicated programming problem or launch a new product.
packet footer
Marks the end of the packet, and contains error-checking information
Goods
Material items or products that customers will buy to satisfy a want or need
Goods
Material items or products that customers will buy to satisfy a want or need. [Clothing, groceries, cell phones, and cars are all examples of goods that people buy to fulfill their needs.]
G I G O
Means Garbage In Garbage OUt
Inventory replenishment cycle time
Measure of the manufacturing cycle time plus the time included to deploy the product to the appropriate distribution center; a Supply Chain Management (SCM) metric
Effectiveness MIS metrics
Measure the impact MIS has on business processes and activities; focuses on how well a firm is achieving its goals and objectives; doing the right things; Setting the right goals and objectives and ensuring they are accomplished
Business Process Improvement
Measure what matters most to customers Monitor the performance of key business processes Assign accountability for process improvement
Customer satisfaction
Measured by satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer; an effectiveness metric
Metrics
Measurements of that evaluate results to determine whether a project is meeting it's in goals
metrics
Measurements that evaluate results to determine whether a project is meeting its goals.
Interactivity
Measures advertising effectiveness by counting
effectiveness MIS metric
Measures the impact MIS has on business processes and activities including customer satisfaction, conversion rates, and sell-through increases.
Information reach
Measures the number of people a firm can communicate with all over the world.
Efficiency MIS metrics
Measures the performance of MIS; focuses on how well a firm is achieving its goals and objectives; doing things right; getting the most from each resource
efficiency MIS metric
Measures the performance of the MIS system itself including throughput, speed, and availability.
New eBusiness Trends Include
Mobile Commerce, Telematics, Electronic Tagging, and Radio Frequency Identification (RFID).
decision support system (DSS)
Model information using OLAP, which provides assistance in evaluating and choosing among different courses of action.
security breach
Most information security breaches result from people misusing an organizaton's information either Intentionally or Inadvertently. misuse of passwords
Multiple-in/Multiple-out Technology
Multiple transmitters and receivers allow sending and receiving greater amounts of data than traditional networking devices
Financial Services
Nearly every public e-finance company remaining makes money, with online mortgage service LendingTree growing 70 percent a year. Processing online mortgage applications is now 40 percent cheaper for customers.
Example of Disruptive Technology
Netflix vs Blockbuster or USB Flash Drives vs. CDs
Increased Focus on Integration Cont...2
Never before have IT investments played such a critical role in business success. As business strategies continue to evolve, the distinction between "the business" and "IT" will virtually disappear.
Unidentified visitor
No information about the visitor is available
Marketing
Number of marketing campaigns, new customer retention rates, number of responses by marketing campaign, number of purchases by marketing campaign, revenue generated, cost for interaction, number of new customers acquired, customer retention rate, and number of new leads by product are all _____ metrics.
Sales
Number of prospective customers, number of new customers, number of retained customers, number of open leads, number of sales calls, number of sales calls per lead, amount of new revenue, amount of recurring revenue, and number of pro Pozo's given are all _____ metrics.
Inventory turns (turnover)
Number of times that a company inventory cycles per year; One of the most commonly used Supply Chain Management (SCM) metric
Unique visitors
Number of unique visitors to a site in a given time, used by Nielson/Net ratings to rank the most popular websites
Total hits
Number of visits to a website, many of which may be by the same visitor.
Payback method
Number of years to recoup the cost of an initiative based on projected annual net cash flow
semistructured decisions
Occurs in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision.
unstructured decisions
Occurs in situations in which no procedures or rules exist to guide decision makers toward the correct choice.
Disintermediation
Occurs when a business sells directly to the customer online and cuts out the intermediary
First-Mover Advantage
Occurs when a company can significantly increase its market share by being first with a new competitive advantage
Differentiation
Occurs when a company develops unique differences in its products or services with the intent to influence demand.
Personalization
Occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person
Personalization
Occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person. Ex: Amazon
Asset Tracking
Occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention
Paradigm shift
Occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave. Ebusiness created a paradigm shift.
First-mover advantage
Occurs when an organization can significantly impact its market share by being first to market with a competitive advantage
Bullwhip Effect
Occurs when distorted product demand information passes from one entity to the next throughout the supply chain.
information silo
Occurs when one business unit is unable to freely communicate with other business units making it difficult or impossible for organizations to work cross-functionally
Edge Matching
Occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match
regional service providers (RSP's)
Offer Internet service by connecting to NSP's, but can also connect directly to each other
threat of new entrants
One of Porter's five forces, high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market.
Rivalry among existing competitors
One of Porter's five forces; high when competition is fierce in a market and low when competitors are more complacent.
supplier power
One of Porter's five forces; measures the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services).
Reputation system
One of the most popular forms of user-generated content where buyers post feedback on sellers.
Unique visitor
One who can be recognized and counted only once within a given period of time
Blog (or web log)
Online journal that allows users to post their own comments, graphics, and video.
Outsourcing Models
Onshore Nearshore Offshore
Ebusiness Forms - Portals
Operate Central website for users to access specialized content and other services Example: Google.com
Portals (ebusiness form)
Operate central website for users to access specialized content and other services (google.com, yahoo.com, etc.)
departments
Operating cross-functionally means integrating the operations of all ________.
Two types of CRM
Optional and analytical
Operations management
Ordering inventory, creating production schedules, and manufacturing goods are examples of business processes in the _____ _____ department.
ORGANIZATIONAL STRUCTURES
Organizational employees must work closely together to develop strategic initiatives that create competitive advantages.
Protecting Intellectual Assets
Organizational information is intellectual capital - it must be protected .
Increased Focus on Integration
Overall, core business relationships and models are changing: Product-centricity to customer-centricity, Mass production to mass customization, The value in material things to the value of knowledge and intelligence.
Project Planning Diagrams
PERT GANTT
Out of th Relationship among People, Information, and Information Technology which one is the most important
People
Sales
Performs the function of selling goods or services
Wireless Communication Network Categories
Personal Area Network (PAN) Wireless Local Area Network (WLANs) Wireless Metropolitan Area Network (WMANs) Wireless Wide Area Network (WWANs)
The Five Basic Supply Chain Activities
Plan, Source, Make, Deliver, Return (https://gyazo.com/5bb784bbf8c6ba96a1b1bfa2050d21d1)
SDLC Life Cycle
Planning Analysis Design Development Testing Implementation Maintenance
leadership
Porter has identified three generic business strategies for entering a new market broad cost _____, broad differentiation, and focused strategy
differentiation
Porter has identified three generic business strategies for entering a new market; broad cost leadership, broad _____, and focused strategy
focused
Porter has identified three generic business strategies for entering a new market; broad cost leadership, broad differentiation, and _____ strategy
To remain successful, organizations must...
Porter's Five Forces, the three generic strategies, and value chain analysis to adopt new business strategies
To remain sucessful, and organizatios should use what?
Porters's Five Forces, the three generic strategies, and value chanin analysis to adopt new business strategies.
infographics (information graphics)
Present the results of data analysis, displaying the patterns, relationships, and trends in a graphical format.
Example of C2B
Priceline.com because consumers set prices and wait for seller to accept
national service providers (NSP's)
Private companies that own and maintain the worldwide backbone that supports the Internet
Transaction brokers (ebusiness form)
Process online sales transactions (etrade.com, fidelity.com, etc)
Ebusiness Forms - Transaction Brokers
Process online sales transations Example: Fidelity.com
distributed computing
Processes and manages algorithms across many machines in a computing environment.
Sustaining Technology
Produces an improved product customers are eager to buy
Sustaining technology
Produces an improved product customers are eager to buy, such as a faster car or larger hard drive. Tends to provide better, faster, and cheaper products in established markets.
Core Business Relationships and Models Are Changing
Product-Centricity to Customer-Centricity Mass production to mass customization The value in material things to the value of the knowledge and intelligence
PERT Chart
Program Evaluation and Review Technique; Depicts a project's tasks and relationship between them Rely on dependencies and critical path
Marketing and sales
Promotes, prices, and sells products to customers
Marketing and sales
Promotes, prices, and sells products to customers; primary value activity
Marketing sales
Promoting of discounts, communicating marketing campaigns, attracting customers, and processing sales are examples of business processes of the _____ & _____ departments.
high-speed Internet cable connections
Provide Internet access using a cable company's infrastructure and a special cable modem
Ebusiness Forms - Service Providers
Provide services such as photo sharing, video sharing, online backup and storage Example: Youtube.com
Ebusiness Forms - Infomediaries
Provide specialized information on behalf of producers of goods and services and their potential customers Examples: Zillow.com; Bloomberg.com
Rational Unified Process (RUP) Methodology
Provides a framework for breaking down the development of software into four gates
rational unified process (RUP) methodology
Provides a framework for breaking down the development of software into four gates Gate One: Inception Gate Two: Elaboration Gate Three: Construction Gate Four: Transition
World Wide Web (WWW)
Provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML
Personal Area Network
Provides communication for devices owned by a single user that work over a short distance
personal area network (PAN)
Provides communication for devices owned by a single user that work over a short distance
Service
Provides customer support
Service
Provides customer support after the sale of goods and services; primary value activity
Human resource management
Provides employee training, hiring, and compensation
digital subscriber line (DSL)
Provides high-speed digital transmission over standard telephone lines using broadband modem technology (allowing both Internet & phone service to work over same phone lines)
Service providers (ebusiness form)
Provides services such as photo sharing, video sharing, online backup, and storage (YouTube, Mapquest, etc.)
Infomediaries (ebusiness form)
Provides specialized information on behalf of producers of goods and services and their potential customers (bizrate.com, zillow.com, etc.)
Procurement
Purchases inputs such as raw materials, resources, equipment, and supplies
Key Performance Indicator (KPI)
Quantifiable metrics a company uses to evaluate progress toward critical success factors.
passive RFID tags
RFID tags that don't have their own power source
active RFID tags
RFID tags that have their own power source
semi-passive RFID tags
RFID tags that use a battery to run microchip circuitry, but communicate by drawing power from RFID reader
Wireless Business Applications
RFID, GPS, GIS
data
Raw facts that describe the characteristics of an event or object
data
Raw facts that describe the characteristics of an event or object: order date, amount sold, customer number, quantity ordered
Data
Raw facts that describe the characteristics of an event.
PRM applications
Real-time product information on availability, marketing materials, contracts, order details, and pricing, inventory, and shipping information.
repeater
Receives and repeats a signal to prevent attenuation of signal over longer distances
Organizations Must
Recognize the immense power of technology Carry out required organizational changes Learn to operate in an entirely different way
21st Organizations Must
Recognize the immense power of technology, Carry out required organizational changes, Learn to operate in an entirely different way.
Accounting
Records, measures, and reports monetary transactions
What information technology projects goals has the most value
Reducing Cost/Improve Productivity
downtime
Refers to a period of time when a system is unavailable.
Open source
Refers to any software whose source code is made available free for any third party to review and modify
Business Intelligence (BI)
Refers to applications and technologies that are used to gather, provide access to, and analyze data and information to support decision-making efforts.
machine-to-machine (M2M)
Refers to devices that connect directly to other devices
ediscovery
Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
Cybermediation
Refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank.
Information richness
Refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information
granularity
Refers to the level of detail in the model or the decision-making process.
Social Media
Refers to websites that rely on user participation and user-contributed content.
Static Report
Report that is created once based on data that does not change
Enterprise application integration (EAI) middleware
Represents a new approach to middleware by packaging together commonly used functionality, such as providing prebuilt links to popular enterprise applications, which reduces the time necessary to develop solutions that integrate applications from multiple vendors. *Active software, Vitria Technology, and Extricity
Project Milestone
Represents key dates when a certain group of activities must be performed
As-Is process models
Represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes.
Chief Information Officer (CIO)
Responsible for (1) overseeing all uses of information technology and (2) ensuring the strategic alignment of MIS with business goals and objectives.
chief knowledge officer (CKO)
Responsible for collecting, maintaining, and distributing company knowledge
Chief Knowledge Officer (CKO)
Responsible for collecting, maintaining, and distributing the organization's knowledge.
Chief Data Officer (CDO)
Responsible for determining the types of information the enterprise will capture, retain, analyze, and share.
Chief Privacy Officer (CPO)
Responsible for ensuring the ethical and legal use of information within an organization.
Chief Security Officer (CSO)
Responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers and viruses.
chief technology officer (CTO)
Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT
Chief Technology Officer (CTO)
Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology.
Customer-Facing Process
Results in a product or service that is received by an organization's external customer.
affinity grouping analysis
Reveals the relationship between variables along with the nature and frequency of the relationships.
Loyalty Programs
Reward customers based on their spending
Loyalty programs
Rewards customers based on their spending; can reduce buying power.
Backbone of eBusiness
SCM, CRM, ERP
Sales and operational CRM technology
Sales management, contact management, opportunity management
Customer Relationship Management (CRM)
Sales metrics, service metrics, and marketing metrics are all ____ ____ ____ metrics.
Friedman
Says around the year 2000 a flat world was created based off a global, web enabled platform for multiple forms of sharing knowledge and work, irrespective of time, distance, geography, and increasingly, language.
What is SSL?
Secure Sockets Layers: donted by th lock symbol in the lower right corner of a browser window and or he "s" in https; SSL is 128 bits. 128bit=2^128
Application Programming Interface (API)
Set of routines, protocols, and tools for building software applications.
Middleware
Several different types of software that sit between and provide connectivity for two or more software applications translates information between disparate systems
Middleware
Several different types of software that sit in the middle of and provide connectivity between two or more software applications. Middleware translates information between disparate systems.
To-Be process models
Shows the results of applying change improvement opportunities to the current (As-Is) process model.
Folksonomy
Similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system.
artificial intelligence (AI)
Simulates human intelligence such as the ability to reason and learn.
Consumer to Consumer (C2C)
Sites primarily offering goods and services to assist consumers interacting with each other over the internet. Ebay
knowledge
Skills, experience, and expertise coupled with information and intelligence that creates a person's intellectual resources
Knowledge
Skills, experience, and expertise coupled with information and intelligence that creates a person's intellectual resources.
Knowledge
Skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources
knowledge
Skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources: listing products that are about to expire first on the menu or creating them as a dialy special to move product
E- COUNTERFEIT SOFTWARE
Software that is manufactured to look like the real thing and sold as such.
counterfeit software
Software that is manufactured to look like the real thing and sold as such.
proxy
Software that prevents direct communication between a sending and receiving computer
shopping bot
Software that will search several retailer websites and provide a comparison of each retailer's offerings including price and availability.
adware
Software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.
virus
Software written with malicious intent to cause annoyance or damage. (https://gyazo.com/36a5ef235c3507229f22d54d4cfb9a3e)
Geocoding
Spatial databases in a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID or classification
cable modem (broadband modem)
Special type of digital modem used with high-speed Internet cable service
SMART objectives
Specific Measurable Agreed Upon Realistic Time-bound
Tags
Specific keywords or phrases incorporate into website content for means of classification or taxonomy.
worm
Spreads itself not only from file to file but also from computer to computer.
Reintermediation
Steps are added to the value chain as new players find ways to add value to the business process.
Website Visit Metrics
Stickiness (visit duration time) Raw Visit depth (total web pages exposure per session) Visit Depth (total unique web pages per session)
entity
Stores information about a person, place, thing, transaction, or event.
Geographic Information System
Stores, views, and analyzes geographic data creating, multidimensional charts or maps
crossfunctionally
Successful companies operate _______, integrating the operations of all departments.
Current CRM trends
Supplier Relationship Management (SRM) Partner Relationship Management (PRM) Employee Relationship Management (ERM)
Procurement
Support value activity purchasing inputs such as raw materials, resources, equipment, and supplies.
Analytical CRM
Supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers.
Marketing
Supports sales by planning, pricing, and promoting goods or services
Knowledge Management System (KMS)
Supports the caturing, organization, and dissemination of knowledge throughout an organization.
Operational CRM
Supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers.
geographic information system (GIS)
System that stores, views, and analyzes geographic data, creating multidimensional charts or maps.
Elements of an RFID System
Tagged Products RFID Reader/Writer Network Computer System
forward integration
Takes information entered into a given system and sends it automatically to all downstream systems and processes.
backward integration
Takes information entered into a given system and sends it automatically to all upstream systems and processes.
Example of Click-and-Mortar
Target
Services
Tasks performed by people that customers will buy to satisfy a want or need.
Services
Tasks performed by people that customers will buy to satisfy a want or need. Waiting tables, teaching, and cutting hair are all examples of services that people pay for to fulfill their needs
Radio frequency identification (RFID)
Technologies use active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers.
Challenges of Business 2.0
Technology Dependence Information Vandalism Violations of Copyright and Plagiarism
Challenges of Business 2.0
Technology Dependency Information Vandalism Violations of Copyright and Plagiarism
broadband over power line (BPL)
Technology that makes high-speed Internet access possible over ordinary residential electrical lines
wireless fidelity (Wi-Fi)
Technology which allows portable devices to connect wirelessly to a local area network (LAN) using access points that send and receive data via radio waves
SCM, CRM, ERP AND BPR
The 4 strategic initiatives
Buyer power, supplier power, threat of substitute product o services, threat of new entrants, rivalry among existing competiors
The Five Forces Model
mass customization
The ability of an organization to tailor its products or services to the customers' specifications
Mass customization
The ability of an organization to tailor its products or services to the customers' specifications. Custom M&Ms, etc.
Buyer Power
The ability of buyers to affect the price they must pay for an item
Buyer power
The ability of buyers to affect the price they must pay for an item; one of porters five forces
Mobile business (mbusiness, mcommerce)
The ability to purchase goods and services through a wireless Internet-enabled device
Mobile Commerce
The ability to purchase goods and services through a wireless Internet-enabled device.
Mobile Business (mbusiness or mcommerce)
The ability to purchase goods and services through a wireless internet-enabled device.
Supply Chain Visibility
The ability to view all areas up and down the supply chain.
Business Process Model
The activity of creating a detailed flow chart or process map of a work process showing its inputs, tasks, and activities, in a structured sequence
business process modeling (or mapping)
The activity of creating a detailed flowchart or process map of a work process, showing its inputs, tasks, and activities in a structured sequence.
Universal Resource Locater (URL)
The address of a file or resource on the web
Throughput
The amount of information that can travel through a system at any point in time; an efficiency metric
Transaction speed
The amount of time a system takes to perform a transaction; an efficiency metric
Business process reengineering (BPR)
The analysis and redesign of work flow within and between enterprises
business process reengineering (BPR)
The analysis and redesign of workflow within and between enterprises.
Customer order promised cycle time
The anticipated or agreed-upon cycle time of a purchase order, a gap between the purchase order creation date and the requested delivery date; a Supply Chain Management (SCM) metric
fast data
The application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value.
confidentiality
The assurance that messages and information are available only to those who are authorized to view them.
BPR and ERP
The balanced scorecard was developed by Drs. Robert Kaplan of the Harvard Business School and David Norton. Which systems does the balanced scorecard measure?
transaction processing system (TPS)
The basic business system that serves the operational level (analysts) in an organization.
7
The best practice is no more than ___, + or - 2, metrics out of the hundreds possible should be used at any given management level
Effectiveness IT metrics
The best way to measure ebusiness success. Revenue generated by web traffic, number of new customers acquired by web traffic, and reductions in customer service calls resulting from web traffic.
online transaction processing (OLTP)
The capturing of transaction and event information using technology to (1) process the information according to defined business rules, (2) store the information, and (3) update existing information to reflect the new information.
data aggregation
The collection of data from various sources for the purpose of data processing.
cube
The common term for the representation of multidimensional information.
Cost benefit analysis
The comparison of projected revenues and costs including development, maintenance, fixed, and variable
combination
The competitive advantage decision for the firm is whether to target high value adding activities to further enhance their value, target low value adding activities to increase their value, or perform some _____ of the two.
Access Point
The computer or network device that serves as an interface between devices and the network
access point (AP)
The computer or network device that serves as an interface between devices and the network. Each computer connects to the access point, and then to other computers on the network
Fact
The confirmation or validation of an event or object.
fact
The confirmation or validation of an event or object; previously learned from books but now available within a click of a button.
Automobiles
The cost of producing vehicles is down because of SCM and Web based purchasing. eBay has become the leading U.S. used-car dealer, and most major car sites are profitable.
virtualization
The creation of a virtual (rather than actual) version of computing resources, such as an operating system, a server, a storage device, or network resources.
Order to delivery
The cross functional business process that focuses on the entire customer order process across functional departments (marketing, sales, op mgt, acc & fin, cust service).
attribute
The data elements associated with an entity.
Finance
The department, or functional area, that deals with strategic financial issues including money, banking, credit, investments, and assets; monetary data
Human resources
The department, or functional area, that maintains policies, plans, and procedures for the effective management of employees; employee data
Operations management
The department, or functional area, that manages the process of converting or transforming or resources into goods or services; productions data
Sales
The department, or functional area, that performs the function of selling goods or services; transactional data
Accounting
The department, or functional area, that records, measures, and reports monetary transactions; monetary data
Marketing
The department, or functional area, that supports sales by planning, pricing, and promoting goods or services; transactional data
MIS skills gap
The difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies.
information redundancy
The duplication of data, or the storage of the same data in multiple places.
Return on investment (ROI)
The earning power of an organization's assets
Usability
The ease with which people perform transactions and/or find information; an effectiveness metric
network convergence
The efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures
Information accuracy
The extent to which a system generates the correct results when executing the same transaction numerous times; an efficiency metric
Extended ERP Components
The extra components that meet the organizational needs not covered by the core components and primarily focus on external operations.
IT Infrastructure
The hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals.
Focus on Integration
The integration of business and technology has allowed organizations to increase their share of the global economy, transform the way they conduct business, and become more efficient and effective.
unified communications (UC)
The integration of communication channels into a single service
copyright
The legal protection afforded an expression of an idea, such as a song, book, or video game.
E- COPYRIGHT
The legal protection afforded an expression of an idea, such as a song, video games, and some types of proprietary documents.
Stickiness
The length of time a visitor spends on a website
Supply Chain Management (SCM)
The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and profitability
online analytical processing (OLAP)
The manipulation of information to create business intelligence in support of strategic decision making.
bandwidth
The maximum amount of data that can pass from one point to another in a unit of time (similar to water flowing through a hose)
Critical success factors (CSF)
The metric of crucial steps companies perform to achieve their goals and objectives's and implement their strategies (Exp: create high quality products, retain competitive advantages, reduce product costs, increase customer satisfaction, hire and retain the best business professionals); can have serval KFIs
Knowledge Management (KM)
The most common form of collective intelligence found inside an organization. Involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions.
Best practices
The most successful solutions or problem-solving methods that have been developed by a specific organization or industry
Entertainment
The music industry has kept Napster and others from operating, but $35 billion annual online downloads are wrecking the traditional music business. U.S. music unit sales are down 20 percent since 2000. The next big entertainment industry to feel the effects of e-business will be the $67 billion movie business.
IEEE 802.11n (Wireless-N)
The newest standard for wireless networking promulgated by IEEE. Offers faster speeds, more flexibility, and greater range
bit rate (data rate)
The number of bits transferred or received per unit of time
Conversion rates
The number of customers and organization "touches" for the first time and persuades to purchase its products or services. A popular metric for evaluating the effectiveness of banner, pop up, and pop under ads on the Internet; an effectiveness metric
System availability
The number of hours a system is available for users; an efficiency metric
Systems Development Life Cycle (SDLC)
The overall process for developing information systems from planning and analysis through implementation and maintenance
Executive sponsor
The person or group who provides the financial resources for the project
content creator
The person responsible for creating the original website content.
Process Owner
The person responsible for the end-to-end functioning of a business process.
content editor
The person responsible for updating and maintaining website content.
physical view of information
The physical storage of information on a storage device such as a hard disk.
Break even point
The point at which revenues equal costs; all sales over produce profits, any drop in sales below will produce losses
Social Networking
The practice of expanding your business and/or social contacts by constructing a personal network
Microblogging
The practice of sending brief posts (140-200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text message. Main advantage os microblogging is that posts can be submitted by a variety of means.
War Chalking
The practice of tagging pavement with codes displaying where Wi-Fi access is available
Information Age
The present time, during which infinite quantities of facts are widely available to anyone who can use a computer
data mining
The process of analyzing data to extract information not offered by the raw data alone.
data profiling
The process of collecting statistics and information about data in an existing source.
benchmarking
The process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance.
Competitive intelligence
The process of gathering information about the competitive environment to improve the company's ability to succeed
Competitive intelligence
The process of gathering information about the competitive environment, including competitors plans, activities, and products, to improve a companies ability to succeed
Competitive Intelligence
The process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed
anomoly detection
The process of identifying rare or unexpected items or events in a data set that do not conform to other items in the data set.
classification analysis
The process of organizing data into categories or groups for its most effective and efficient use.
data replication
The process of sharing information to ensure consistency between multiple data sources.
Production
The process where a business takes raw materials and processes them or converts them into a finished product for it's good for services
Production
The process where a business takes raw materials and processes them or converts them into a finished product for its goods or services
mutation
The process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome.
market share
The proportion of the market that a firm captures.
Market share
The proportion of the market that a firm captures; A common external KPI; =firms sales/total industry market sales
Key performance indicators (KPI)
The quantifiable metrics a company uses to evaluate progress toward critical success factors (Exp: turnover rates of employees, percentage of helpdesk calls answered in the first minute, number of product returns, number of new customers, average customer spending); more specific
Productivity
The rate at which good and services are produced based upon total output given total inputs.
Productivity
The rate at which goods and services are produced based upon total output given total imputs
Productivity
The rate at which goods and services are produced based upon total output given total inputs
Internal rate of return (IRR)
The rate at which the net present value of an investment equals zero
privacy
The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
relational integrity constraint
The rules that enforce basic and fundamental information-based constraints.
integrity constraint
The rules that help ensure the quality of information.
cartography
The science and art of making illustrated maps or charts
Analytics
The science of fact-based decision making
Taxonomy
The scientific classification of organisms into group based on similarities of structure or origin. A well planned taxonomy ensures search and navigation are easy and user-friendly.
Information Architecture
The set of ideas about how all information in a given context should be organized.
bit
The smallest element of data, which has a value of 1 or 0
data element (or data field)
The smallest or basic unit of information.
sensitivity analysis
The study of the impact on other variables when one variable is changed repeatedly.
Supplier power
The suppliers ability to influence the prices they charge for supplies by charging higher prices, limiting quality or services, or shifting costs to industry participants.
Supplier Power
The suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services)
New
The threat of _____ entrants is high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market
data latency
The time it takes for data to be stored or retrieved.
Response time
The time it takes to respond to user interactions such as a mouse click; an efficiency metric
pirated software
The unauthorized use, duplication, distribution, or sale of copyrighted software.
E- PIRATED SOFTWARE
The unauthorized use, duplication, distribution, or sales of copyrighted software.
augmented reality
The viewing of the physical world with computer-generated layers of information added to it.
Crowdsourcing
The wisdom of the crowd
Strategic Information Systems (SIS)
This provide a competitive advantage by helping an organization to implement its strategic goals and to increase its performance and productivity. For example, barcode scanning technology is MIS, but the use of the date collected by them is SIS.
Focused Strategy
This strategies concentrate on either cost leadership or differentiation
software
Thomas Friedman's top three forces that flattened the world are the fall of the Berlin Wall, Netscape IPO, work flow _____.
Netscape
Thomas Friedman's top three forces that flattened the world are the fall of the Berlin Wall, _____ IPO, work flow software.
Berlin
Thomas Friedman's top three forces that flattened the world are the fall of the _____ Wall, Netscape IPO, work flow software.
Substitute
Threat of _____ products or services is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose.
Porter's Five Forces Model
Threat of new entrant: A dog walking business Rivalry Among Existing Competitors: A coffee shop Threat of Substitute Products or services: Coffee from McDonalds buyer power: A single consumer buying milk supplier power: A company that makes pencils
Common Types of Efficiency Metrics
Throughput, Transaction Speed, System Availability, Information Accuracy, Response Time (https://gyazo.com/9ca7aab51fa1eb2f1f538d4d0647e484)
Triple Constraints of Project Management
Time Resources Scope
information age
Time when infinite quantities of facts are widely available to anyone who can use a computer; core drivers are data, information, business intelligence, and knowledge.
Visit depth
Total unique web pages exposure per session
Raw visit depth
Total web pages exposure per session
Human resources ERP components
Track employee information including payroll, benefits, compensation, and performance assessment, and assure compliance with the legal requirements of multiple jurisdictions and tax authorities.
business intelligence dashboard
Tracks corporate metrics such as critical success factors and key performance indicators and includes advanced capabilities such as interactive controls, allowing users to manipulate data for analysis.
digital dashboard
Tracks key performance indicators (KPIs) and critical success factors (CSFs) by compiling information from multiple sources and tailoring it to meet user needs.
Core ERP components
Traditional components included in most ERP systems and they primarily focus on internal operations
Business processes
Transforms a set of inputs into a set of outputs (goods/services) for another person or process by using people and tools
Operations
Transforms raw materials or inputs into goods and services
Operations
Transforms raw materials or inputs into goods or services; primary value activity
Gate 4 of RUP
Transition
Travel
Travel site Expedia.com is now the biggest leisure-travel agency, with higher profit margins than even American Express. Thirteen percent of traditional travel agencies closed in 2002 because of their inability to compete with online travel.
Industries that have changed due to technology
Travel, Entertainment, Electronics, Financial services, Retail, Automobiles, Education and training
21st Century Business Trends
Uncertainty in terms of future business scenarios and economic outlooks, Emphasis on strategic analysis for cost reduction and productivity enhancements, Focus on improved business resiliency via the applications of enhanced security.
alternative
Understanding business processes, workflow, customers expectations, and the competitive environment provides managers with the necessary ingredients to design and evaluate _____ business processes in order to maintain competitive advantages.
Common Types and Effectiveness Metrics
Usability, Customer Satisfaction, Conversion Rates, Financial (https://gyazo.com/86c7b01b9dd81c65d352e0fe7f3d89f9)
Semi-passive RFID Tags
Use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID readers
location-based services (LBS)
Use of GPS & GIS together to provide a service (navigation, vehicle location, weather information, etc.)
asset tracking
Use of RFID tags by a company on expensive products or equipment to gather data on their location (for supply chain management or theft reduction)
Chipless RFID Tags
Use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip
RFID accelerometer
Used in vehicles to measure acceleration
structured query language
Users write lines of code to answer questions against a database.
automatic vehicle location (AVL)
Uses GPS to track vehicles with a receiver in the car that links to a control center.
Automatic Vehicle Location
Uses GPS tracking to track vehicles
voice over IP (VoIP)
Uses IP (Internet protocol) technology to tansmit telephone calls
Static Process
Uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously
data-mining tool
Uses a variety of techniques to find patterns and relationships in large volumes of information and infer rules from them that predict future behavior and guide decision making.
Supply Chain Planning (SCP) software
Uses advanced mathematical algorithms to improve the flow and efficiency of the supply chain while reducing inventory.
radio-frequency identification (RFID)
Uses electronic tags and labels to identify objects wirelessly over short distances
chipless RFID
Uses plastic or conductive polymers instead of silicon microchips in RFID tags, allowing them to be washed or exposed to water
Scrum Methodology
Uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervles, to achieve an appointed goal
Electronics
Using the Internet to link suppliers and customers, Dell dictates industry profits. Its operating margins have risen from 7.3 percent in 2002 to 8 percent in 2003, even as it takes prices to levels where rivals cannot make money.
intelligent system
Various commercial applications of artificial intelligence.
Value chain analysis
Views a firm as a series of business processes that each add value to the product or service
value chain analysis
Views a firm as a series of business processes that each add value to the product or service
What factors drive supply chain management?
Visibility, Consumer Behavior, Competition, Speed
Website Metrics
Visitor metrics Visit metrics Hit metrics
SCM software enable an organizatin to generate efficiencies within steps by automating and improving the information flows
Wal-art and Procter&Gamble(P&G) implemented a tremedously successful SCM system. the system linked Wal-Mar's distribution centers directly to P&G manufacturing centers. Every time a Wal-Mart customer purchase a P&G product, the systm sends a message directly to the factory alerting P&G to restock the product. The SCM system saves time, reduces inventory, and decreases order processing costs for P&G. P&G passes on these savins to Wal-Mart i the form of discounted prices.
Software Development Methodologies
Waterfall Agile Rapid Application Development (RAD) Extreme Programming Rational Unified Process (RUP) Scrum
Page exposures
Website metric of average number of page exposures to an individual decision
Abandoned shopping carts
Website metric of number of visitors who create a shopping cart and start shopping and then abandon the activity before paying for the merchandise
Abandoned registrations
Website metric of number of visitors who start the process of completing a registration page and then abandon the activity
Conversion rate
Website metric of percentage of potential customers who visit a site and actually buy something
Click through rate
Website metric of the count of the number of people who visit a site, click on an ad, and are taking to the site of an advertiser
Cost per thousand (CPM)
Website metrics of sales dollars generated per dollar advertising, commonly used to make the case for spending money to appear on a search engine
Mashup Editors
What You See is What You Get tools (WYSIWYG). Drag and drop data points into web application.
Systems thinking
What is a way of monitoring an entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part?
Feedback
What is information that returns to its original transmitter and modifies the transmitter's actions?
Effectiveness IT metrics
What measures the impact IT has on business processes and activities including customer satisfaction, conversion rates, and sell-through increases?
CRM
What type of metrics includes number of marketing campaigns, new customer retention rates, and number of feedbacks by marketing campaign?
Efficiency MIS metrics
What type of metrics measure throughput, speed, and availability?
Effectiveness MIS metrics
What types of metrics measure customer satisfaction?
Primary value activities
Which part of the value chain acquires raw materials and manufactures, delivers, markets, sells, and provides after-sales services?
Business Process Improvement
Will double the gains of a project by streamlining outdated practices, enhancing efficiency, Promoting compliance and standardization, Making an organization more agile
wireless MAN (WMAN)
Wireless metropolitan area network. It uses radio signals to transmit and receive data
Effectiveness
_____ M I S metrics are determined according to and organizations goals, strategies, and objectives.
Efficiency incorrectly
_____ M I S metrics are far easier to measure so most managers tend to focus on them, often _____, to measure the success of M I S projects.
Management information
_____ _____ systems is a business function, like accounting or human resources, that moves information about people, products, and processes across the company to facilitate decision making and problem solving. AKA: information technology or information systems
Rilvalry
_____ among existing competitors is high when competition is fierce in a market and low when competitors are more complacent.
benchmarks
_____ are baseline values the system seeks to attain.
efficiency
_____ focuses on the extent to which an organization is using its resources in an optimal way.
Benchmarks
_____ help assess how an M I S project performs over time.
Management
_____ information systems adds value to both primary and support value activities.
Information Security
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
Click-and-Mortar Business
a business that operates in a physical store and on the internet
Brick-and-Mortar Business
a business that operates in a physical store without an internet presence
Pure-Play
a business that operates on the internet only without a physical store
big data
a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools
system
a collection of parts that link to achieve a common purpose
record
a collection of related data elements
Internet Service Provider (ISP)
a company that provides access to the inrernet for a monthly fee (AOL, AT&T, etc.)
Click-Through
a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser
variable
a data characteristic that stands for a value that changes or varies over time
report
a document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information
Peter Drucker
a famous management guru, once stated that if you cannot measure it, you cannot manage it
competitive advantage
a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors
Semistructured decisions
a few established processes help to evaluate potential situations, but not enough to lead to a definite recommended decision
primary key
a field (or group of fields) that uniquely identifies a given entity in a table
data model
a formal way to express data relationships to a database management system (DBMS)
Management Information System (MIS)
a general name for the business function and academic discipline covering the application of people, technologies, and procedures.
Help Desk
a group of people that respond to users' questions and support users.
business strategy
a leadership plan that achieves a specific set of goals or objectives such as increasing sales, decreasing costs, entering new markets, or developing new products or services
data warehouse
a logical collection of information --gathered from many different operational databases -- that supports business analysis activities and decision-making tasks
Dependency
a logical relationship that exists between the project tasks, or between a project task and a milestone
Internet
a massive network that connects computers all over the world and allows them to communicate with one another
information integrity
a measure of the quality of information
Executive Sponsor
a non IT executive of which is a person or group whom provides the financial resources for the project
stakeholder
a person or group that has an interest or concern in an organization
foreign key
a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables
Benchmarking
a process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifiying steps and procedures to improve syste performance.
extraction, transformation, and loading (ETL)
a process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse
information cleansing or scrubbing
a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information
loyalty program
a program to reward customers based on spending
static report
a report created once based on data that does not change
dynamic report
a report that changes automatically during creation
Collaboration System
a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information
Collaboration system
a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information.
Gantt Chart
a simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally
Model
a simplified representation/abstraction of reality; help to reduce risks and understand uncertainty
Executive information system (EIS)
a specialized DSS that supports senior level executives within the organization; granularity, visualization, and digital dashboard
Business process
a standardized set of activities that accomplish a specific task, such as processing a customer's order
electronic tagging
a technique for identifying and tracking assets and individuals
Project
a temporary activity a company undertakes to create a unique product, service, or result.
Kill Switch
a trigger that enables a project manager to close the project before completion.
relational database model
a type of database that stores information in the form logically related two-dimensional tables
Michael Porter
a university professor at Harvard Business School, identified four competitive forces that can hurt potential sales.
snapshot
a view of data at a particular moment in time
systems thinking
a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part
internet of things
a world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention
informing
accessing large amounts of data from different management information systems
Intermediaries
agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together.
supply chain
all parties involved, directly or indirectly, in obtaining raw materials or a product
integration
allows separate systems to communicate directly with each other
relational database management system
allows users to create, read, update, and delete data in relational database
first-mover advantage
an advantage that occurs when a company can significantly increase its market share by being first to market with a competitive advantage
product differentiation
an advantage that occurs when a company develops unique differences in its products with the intent to influence demand
dynamic catalog
an area of a website that stores information about products in a database
Outsourcing
an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house
data-driven website
an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database
Project Management Office (PMO)
an internal department that oversees all organizational projects
The Ugly Side of CRM
angry customers
Project Deliverable
any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.
Social Network
application that connects people by matching profile information
Business-to-consumer (B2C)
applies to any business that sells its products or services to consumers over the internet
Consumer-to-business (C2B)
applies to any consumer who sells a product or service to a business on the internet
Business-to-business (B2B)
applies to businesses buying from and selling to each other over the internet
Consumer-to-consumer (C2C)
applies to customers offering goods and services to each other on the internet
Value chain
approach views an organization as a series of processes, each of which adds value to the product or service for each customer.
Intermediaries
are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together
Switching costs
are costs that can make customers relcutant to switch to another product or service
Bugs
are defects in the code of an information system.
Intangible Benefits
are difficult to quantify or measure. ie. improved decision making, community service, goodwill, morale
Tangible Benefits
are easy to quantify and typically measured to determine the success or failure of a project. ie. decreased expenses, processing errors, response time, increased quantity or sales and quality.
Fourth generation languages (4GL)
are programming languages that look similar to human languages.
Data
are raw facts that describe the characteristics of an event/information knowledge/business intelligent and competative advantage
Key performance indicators (KPIs)
are the quantifiable metrics a comapny uses to evaluate progress toward critical success factors (more specific than CSFs)
Business Requirements
are the specific business requests the system must meet to be successful, so the analysis phase is critical because business requirements drive the entire systems development effort.
Alpha Testing
assess if the entire system meets the design requirements of the users.
Information Systems Audit Report
assesses a company's information system to determine necessary changes and to help ensure the information systems' availability, confidentiality, and integrity.
Pilot Implementation
assigns a small group of people to use the new system until it is verified that it works correctly, then the remaining users migrate to the new system
Pilot Implementation
assigns a small group of people to use the new system until it is verified that it works correctly; then the remaining users migrate to the new system.
Neural network
attempts to emulate the way the brain works; AI category
benchmarks
baseline values the system seeks to attain
Benchmarks
baseline values the system seesks to attain
Transaction processing system (TPS)
basic business system that serves the operational level (analysts) and assists in making structured decisions; ie payroll system or order-entry system; operational support system
Telematics
blending computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations
Business 2.0 Communication and Collaboration Tools
blog, wiki, mashup
SDLC Testing Phase
brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase
Testing Phase
brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase.
Online transaction processing (OLTP)
capturing transaction and event information using technology to process/store the information, and update to reflect new information; operational support system
attribute
characteristics or properties of an entry class
What-if analysis
checks the impact of a variable change/assumption on the model
Web 2.0 (Business 2.0)
collaboration, sharing, free. user participation and formation of communities that contribute to content.
Search engine optimization (SEO)
combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking
asynchronous communication
communication such as email in which the message and the response do not occur at the same time
data dictionary
compiles all of the metadata about the data elements in the data model
Virtual reality
computer-simulated environment; AI category
Expert system
computerized advisory programs that imitate reasoning processes of experts in solving difficult problems; AI category
Iterative Development
consists of a series of tiny projects
Supply Chain
consists of all parties involved, directly or indirectly, in obtaining raw materials or a product
Supply chain
consists of all parties involved, directly or indirectly, in the procurement of a poduct or raw materials
Open System
consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate with the system
Sign off
consists of the users' actual signatures indicating they approve all of the business requirements.
Executive information system (EIS) capabilities
consolidation, drill-down (enables users to view details), and slice-and-dice (ability to look at information from different perspectives)
Customer Relationship Management (extended ERP component)
contact centers, sales force automation, and marketing functions. Identifies a company's most (and least) valuable customers for better allocation of resources.
data mart
contains a subset of data warehouse information
Source Code
contains instructions written by a programmer specifying the actions to be performed by computer software
Characteristics of Business 2.0
content sharing through open sourcing, user-contributed content, collaboration inside the organization, collaboration outside the organization
nearshore outsourcing
contracting an outsourcing arrangement with a company in a nearby country
Nearshore Outsourcing
contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country.
Switching Costs
costs that make customers reluctant to switch to another product or service
switching costs
costs that make customers reluctant to switch to another product or service
chief user experience officer (CUEO)
create the optimal relationship between user and technology
User-contributed content
created and updated by many users for many users
Critical Success Factors (CSFs)
crucial steps companies perform to achieve their goals and objectives and implement their strategies
Information
data converted into a meaningful and useful context
machine-generated data
data created by a machine without human intervention
human generated data
data that humans, in interactions with computers, generate
Example of Tangible Benefits
decreased expenses decreased processing errors decreased response time increased quantity or sales increased quality
business rule
defines how a company performs a certain aspect of its business and typically results in either a yes/no or true/false answer
80/20 Rule
deliver 80% of benefit for 20% of cost. Finding which 20% of costs will give you 80% of benefits.
data visualization
describes technologies that allow users to "see" or visualize data to transform data information into a business perspective
Project Scope
describes the business need and the justification, requirements, and current boundaries for the project.
Test Conditions
detail the steps the system must perform along with the expected result of each step.
metadata
details about data
User Acceptance Testing (UAT)
determine if the system satisfies the user and business requirements.
chief automation officer (CAO)
determines if a person or business process can be replaced by a robot or software
machine to machine (M2M)
devices that connect directly to other devices
Intangible Benefits
difficult to quantify or measure
Plunge Implementation
discards the legacy system and immediately migrates all users to the new system
Plunge implementation
discards the legacy system and immediately migrates all users to the new system.
infographics (information graphics)
displays information graphically so it can be easily understood
Primary Features of eBusiness Components
eLogistics eProcurement
Longitude
east/west measurement of position
tangible benefits
easy to quantify and typically measured to determine the success or failure of a project
Ebusiness (extended ERP Component)
elogistics and eprocurement. Ebusiness ERP components allow businesses to establish a web presence and fulfill orders expeditiously. Problems can occur if business deploys web presence before integration of back-office systems or an ERP system -- overwhelmed.
Information Discovery (the BEST)
employees across departments are open to new insights about crises and radical changes and seek ways to create competitive advantages.
transactional information
encompasses all of the information contained within a single business process or unit of work, and its primary is to support he performing of daily operational tasks
analytical information
encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks
business-critical integrity constraint
enforces business rules vital to an organization's success and often requires more insight and knowledge than relational integrity constraints
Onshore outsourcing
engaging another company within the same country for services
Onshore Outsourcing
engaging another company within the same country for services.
Information Systems Control Report
ensures the reliability of information, consisting of policies and their physical implementation, access restrictions, or record keeping of actions and transactions.
SDLC - Planning
establishes a high-level plan of the intended project and determines project goals Planning is the first and most critical phase
Design Phase
establishes descriptions of the desired features and operations of the system, including screen layouts, business rules, end users and MIS specialists work together to gather the detailed business requirements for the proposed project from a logical point of view.
Planning Phase
establishes high-level plan of the intended project and determines project goals. Most important phase.
Critical Path
estimates the shortest path through the project ensuring all critical tasks are completed from start to finish
Critical Path
estimates the shortest path through the project ensuring all critical tasks are completed from start to finish.
SWOT analysis
evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies
Search engine ranking
evaluates variables that search engines use to determine where a URL appears on the list of search results.
predictive analytics
extracts information from data and uses it to predict future trends and identify behavioral patterns
Corporate Culture
fear where people do not report bad news to executives and this leaves to the project going south.
Goal-seeking analysis
finds the inputs necessary to achieve a goal (ie desired level of output); revers of what-if analysis
Optimization analysis
finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints; extension of goal-seeking analysis
logical view
focuses on how users logically access information to meet their particular business needs
Supplier Relationship Management
focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects
Partner relationship management (PRM)
focuses on keeping vendors satisfied by managing alliance partner and reseller relationships that provide customers with the optimal sales channel
Pay-per-click
generates revenue each time a user clicks on a link to a retailer's website
porter's three generic strategies
generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service
Object-oriented languages
group data and corresponding processes into objects.
Production and materials management ERP components
handle the various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control
query-by-example (QBE) tool
helps users graphically design the answer to a question against a database
User Documentation
highlights how to use the system and how to troubleshoot issues or problems.
Exception Reporting
highlights situations occurring outside of the normal operating range for a condition or standard. There internal reports include only exceptions and might highlight accounts that are unpaid or delinquent or identify items that are low in stock.
Challenges of Ebusiness
identifying limited market segments, managing consumer trust, ensuring consumer protection, adhering to taxation rules
Data Flow Diagram (DFD)
illustrates the movement of information between external entities and the processes and data stores within the system.
real-time information
immediate, up-to-date information
Digital Darwinism
implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction
Examples of Intangible Benefits
improved decision making, improved community service, improved goodwill, improved morale
entity
in the relational database model, a person, place, thing, transaction, or event about which information is stored
dynamic information
includes data that change based on user actions
static information
includes fixed data that are not capable of change in the event of a user action
Resources
includes people, equipments, material and other costs to complete the project.
return on investments (ROI)
indicates earning power of a project, calculated by dividing profitability by cost (profitability/ cost)
Project Stakeholder
individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion
business intellignce
information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making: lowest sales per week compared with the economic interest rates, best-selling product by month compared to sports season and city team wins
feedback
information that returns to its original transmitter (input, transform, or output) and modifies the transmitter's actions
phased implementation
installs the new system in phases (for example, by department) until it is verified that it works correctly
Phased Implementation
installs the new system in phases (for example, by department) until it is verified that it works correctly.
Enterprise resource planning (ERP)
integrates all departments and functins thoughout an organization into asingle IT system (or integrated set of IT systems) so that employees can ake decisions by viewing enterprisewide information on all businss operations.:is a software island of information yo have redunancy cause inconsistency.
Enterprise resource planning (ERP)
integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprise-wide information on all business operations
Process Modeling
involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment.
Supply chain management(SCM)
involves he management of information flows between and among stages in a a supply chain to maximize total supply chain effectiveness an profitability.
Customer Relationship management(CRM)
involves maaging all aspect of a customer's relationship with an organization to increase customer loalty and retention and organization's profitabilty. CRM allow an organization to gain insights into customers' shopping and buying beaviors ir order to developa dn implement enterprisewide strateges.
Customer relationship management (CRM)
involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability
Software Engineering
is a disciplined approach for constructing information systems through the use of common methods, techniques, or tools.
Information Technology (IT)
is a field concrned with te use of technology in managing and processing information.It consist of hardware, software and telecommunication
Project Plan
is a formal, approved document that manages and controls the entire project.
PERT Chart (Program Evaluation and Review Technique)
is a graphical network model that depicts project's tasks and the relationships between them.
Dependency
is a logical relationship that exists between the project tasks, or between a project task and a milestone.
Balanced scorecard
is a managemen system, in addition to a measurement system, that enable organization to clarify their vision and strateby and translate them into action.
balanced scorecards
is a management system in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action
Customer Relationship Management (CRM)
is a means of managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability.
Change Agent
is a person or event that is the catalyst for implementing major changes fora system to meet business changes.
Comptevive advantage
is a product or service that an organization's customer place a greater value on than similar offerings from a competitor.
Scripting Language
is a programming method that provides for interactive modules to a website.
Information technology
is a relatively new functional area, having only been around formally for around 40 years
Control Objects for Information and Related Technology (COBIT)
is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors.
Gantt Chart
is a simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally.
Business proess
is a standardized seet of activities that accomplish a specific task, such as processing a customer's order.
Business process
is a standardized set of activities that accoplish a specific task , such as processing a customer order.
Brainstorming
is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted.
project
is a temporary activity a company undertakes to create a unique product, service, or result
Outsourcing
is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in house.
Project Manager
is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget.
Legacy System
is an old system that is fast approaching or beyond the end of its useful life within an organization.
Buyer power
is assessed analyzing the ability of buyers to directly impact the price they are willing to pay for an item.
Supplier power
is assessed by th supplier's ability to directly impact the price they are charging for supplies(including materials,labor, and services)
Buyer power
is commonly reduced through the use of a loyalty program?
Informaton
is data converted into a meaninfgul and useful context.
Workshop Training
is held in a classroom environment and led by an instructor.
Rivalry among existing competitors
is high when competition is fierce in a market and low when competition is more complacent
Threat of new entrants
is high when it is easy for new cdompetitors to enter a market and low when there are significant entry barriers to entering market.
Threat of substitute products or services
is high when there are many alternatives to a product or service and low when there are few alternative from which to choose.
CIO
is responsable to ensure effective communication between business personnel and IT personnel
Chief information officer
is responsible for (1) overseeing all uses of informatin technology (2) ensuring the strategic alignment of IT with business goals and objectives. CIO often reports directly to the CEO
Chief knowldedge officer (CKO)
is responsible for collecting, maintaining, and distributing the organization's knowledge. data has base adminstrator
Chief privacy officer(CPO)
is responsible for ensuing the ethical and legal use of informatio within an organization. these are lawyers
Chief security officer (CSO)
is responsible for ensuring the security of IT system and developing strategies and IT safeguards against attacks fom hacker and viruses. He is call the Network Administrator
Chief technology offiicer(CTO)
is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization information.
Environmental scannig
is the acauisition and analysis of evenst and trends in the environment external to an organization.
Brusiness process reengineering (BPR)
is the analysis and redesign of workflow wthin and between enteprises. ex. NetFlix, Redbox
Project Management
is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.
Graphical User Interface (GUI)
is the interface to an information system. The ability to model the information system screens for an entire system using icons, buttons, menus, and submenus.
Systems Development Life Cycle (SLDC)
is the overall process for developing information systems, from planning and analysis through implementation and maintenance.
ETHICS
is the principles and standards that guide our behavior toward other people.
Requirements Management
is the process of managing changes to the business requirements throughout the project.
Conversion
is the process of transferring information from a legacy system to a new system.
E - FAIR USE DOCTRINE
it is legal to use copyrighted material. In certain situations,
Hypertext markup language (HTML)
links documents, allowing users to move from one to another simply by clicking on a hot spot or link.
Scope
list of specific project goals, deliverables, tasks, costs and deadlines
database
maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)
Preventative Maintenance
makes system changes to reduce the chance of future system failure.
Corrective Maintenance
makes system changes to repair design flaws, coding errors, or implementation issues.
accounting and finance ERP components
manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management
chief intellectual property officer (CIPO)
manage and defend intellectual property, copyrights, and patents
Elogistics
manages the transportation and storage of goods
eLogistics
manages the transportation and storage of goods
Online analytical processing (OLAP)
manipulation of information to create business intelligence in support of strategic decision making; managerial support system
Primary Business Benefits of SCM
market demand, resource and capacity constraints, real-time scheduling
ERP
materials planning, order entry, distribution, general ledger, accounting, shop floor control
Fuzzy logic
math method of handling imprecise/subjective information
Effeciveness IT metics
measure the impact IT has on business processes and activities includin customer satisfaction, conversion rates, and sell through increases.
Effectiveness MIS metrics
measure the impact MIS has on business process and activities, including customer satisfaction and customer conversion rates. focuses on how well a firm is achieving its goals and objectives
Efficiency It metrics
measure the performance of the IT system itself includngthroughput, speed, and availability.
metrics
measurements that evaluate results to determine whether a project is meeting its goal
Legal Feasibility
measures how well a solution can be implemented within existing legal and contractual obligations.
Operational Feasibility
measures how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities
Political Feasibility
measures how well the solution will be accepted in a given organization
Key performance indicators (KPIs)
measures that are tied to busines drivers Metrics such as GPA(grade point average)
Economic Feasibility
measures the cost-effectiveness of a project
Information reach
measures the number of people a firm can communicate with all over the world
Efficiency MIS metrics
measures the performance of MIS, such as throughput, transaction speed, and system availability. focuses on the extent to which a firm is using its resources in an optimal way
Technical Feasibility
measures the practicality of a technical solution and the availability of technical resources and expertise
Schedule Feasibility
measures the project time frame to ensure it can be completed on time.
Examples of B2B
medical billing service software sales virtual assistants
Generic algorithm
mimics the evolutionary process to generate increasingly better solutions to a problem; AI category
Decision support system (DSS)
models information using OLAP; provides assistance in evaluating/choosing among different courses of action; managerial support system
Software Customization
modifies software to meet specific user or business requirements.
Information security
mostly misuse by persons inside or outside an organization.
data visualization tools
moves beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, etc
Open System
nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or inter-operate with the system
Latitude
north/south measurement of position
Clickstream Data Metrics
number of page views pattern of websites visited length of stay on website dates and times of visits number of registrations filled out number of abandoned registrations Demographics of registered visitors Number of customers with shopping cars Number of abandoned shopping carts
Unstructured decisions
occurs in situations in which no procedures or rules exist to guide decision makers toward the correct choice
Disintermediary
occurs when a business sells directly to the customer online and cuts out the intermediary
First-mover advantage
occurs when an organization can significantl impact its marketshare by being first to market with a competitive advantage.
information inconsistency
occurs when the same data element has different values
Product differentiation
occusrs whn a company develops unique differences in its products with th intenet t influence demand
Threat of substitute products or services
one of porter's five forces; measures the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services)
Work Month
one person working one month, so 10 people working one month= 10 work months
Summary internal report
organizes and categorizes data for managerial persual. A report that summarizes total sales by product for each month is an example. The data for these reports are typically categorized and summarized to indicate trends and potential problems.
Chief Information Officer (CIO)
oversees all uses of IT and ensures the strategic alignment of IT with business goals and objectives The functions include: Manager, Leader, Communicator.
Enterprise Application Integration (EAI)
packages together commonly used functionality, such as prebuilt links to popular enterprise applications.
System Implementation Methods
parallel, plunge, pilot, phased
Scope Creep
piling up of small changes that by themselves are manageable, but in aggregate are significant.
market share
portion of the market that a firm captures
Post-Implementation Report
presents a formal report or audit of a project after it is up and running.
Internal Report
presents data that are distributed inside the organization and intended for employees within an organization. Support day to day operations monitoring that supports managerial decision making.
Detailed internal report
presents information with little or no filtering or restrictions of the data.
Requirements Definition Document
prioritizes all of the business requirements by order of importance to the company.
benchmarking
process of continuously measuring system results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance
ERP II
project management, knowledge management, workflow management, customer relationship management, human resource management, portal capability, integrated financials
Challenges of using wireless networks
protecting against theft protecting wireless connections preventing viruses on mobile devices addressing privacy concerns with RFID and LBS
Enterprise Resource Planning (ERP)
provide a foundation for collaboration between departments, enabling people in different business areas to communicate
Employee relationship management (ERM)
provides employees with a subset of CRM applications available through a web browser
real-time system
provides real-time information in response to query requests
data
raw facts that describe the characteristics of an event or object
Open Source
refers to any software whose source code is made available free for any third party to review and modify
Cybermediation
refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness
information richness
refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information
information granularity
refers to the extent of detail within the information (fine and detailed or "coarse" and abstract information)
data governance
refers to the overall management of the availability, usability, integrity, and security of company data
Crowdsourcing
refers to the wisdom of the crowd
Social Media
refers to websites that rely on user participation and user-contributed content
Project Milestone
represents key dates when a certain group of activities must be performed.
chief information officer (CIO)
responsible for 1) overseeing all uses of MIS and 2) ensuring that MIS strategically aligns with business goals and objectives
Chief Knowledge Officer (CKO
responsible for collecting, maintaining, and distributing the organization's knowledge.
chief data officer (CDO)
responsible for determining the types of information the enterprise will capture, retain, analyze, and share
Chief Privacy Officer (CPO )
responsible for ensuring the ethical and legal use of information
chief privacy officer (CPO)
responsible for ensuring the ethical and legal use of information within a company
Chief Security Officer (CSO)
responsible for ensuring the security of IT systems
chief security officer (CSO)
responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses
Chief Technology Officer (CTO)
responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT
Loyalty programs
reward customers based on th amount of business they do with a particuar organization.
Online Training
runs over the Internet or on a CD or DVD, and employees complete the training on their own time at their own pace.
Types of Organizational Projects
sales (new service to up-sell a product) marketing (new tv ad) finance (new report) accounting (new system functionality) MIS (upgrading a system)
Primary Business Benefit of CRM
sales forecasts, sales strategies, marketing campaigns
Front Office - Operational CRM
sales systems, marketing systems, customer service systems
Primary Users of CRM
sales, marketing, customer service
Extended ERP
scheduling, forecasting, capacity planning, ecommerce, warehousing, logistics
Artificial intelligence (AI)
simulates human intelligence; ie ability to reason and learn
Structured decisions
situations where established processes offer potential solutions
The leading cause of downtime
software failure and human error
Shopping bot
software that will search retailer sites and provide a comparison of each retailer's offering
database management system (DBMS)
software through which users and application programs interact with a database
Intelligent agent
special-purpose knowledge-based system that accomplishes specific tasks on behalf of its users; AI category
business process
standardized set of activities that accomplishes a specific task
Reintermediation
steps are added to the value chain as new players find ways to add value to the business process
Geographic Information System (GIS)
stores, views, and analyzes geographic data, creating multidimensional charts or maps
Decision making levels
strategic, managerial, operational
Sensitivity analysis
study the impact on other variables when one variable is changed repeatedly; special case of what-if analysis
The four basic component of supply chain management
supply chain strategy, suply chain partners, supply chain operation, supply chain logistics
Analytical CRM
supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers
Off the Shelf Application Software
supports general business processes and does not require any specific software customization to meet the organization's needs.
Operational CRM
supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers
SDLC Development Phase
takes all the detailed design documents from the design phase and transforms them into the actual system
Development Phase
takes all the detailed design documents from the design phase and transforms them into the actual system. The project transitions from preliminary designs to actual physical implementation.
forward integration
takes information entered into a given system and sends it automatically to all downstream systems and processes
backward integration
takes information entered into a given system and sends it automatically to all upstream systems and processes
Services
tasks performed by people that customers' will buy to satisfy a want or need
service
tasks that customers will buy to satisfy a want or need
Unit Testing
test individual units or pieces of code for a system.
Development Testing
test the system to ensure it is bug free
buyer power
the ability of buyers to affect the price they must pay for an item
mobile commerce
the ability to purchase using a mobile device
Transformation Process
the actual conversion of inputs to outputs
Business process reengineering (BPR)
the analysis and redesign of workflow within and between enterprises
eProcurement
the business-to-business (B2B) online purchase and sale of supplies and services over the internet
Ecommerce
the buying and selling of goods and services over the internet
cube
the common term for the representation of multidimensional information
fact
the confirmation or validation of an event or object
MIS skills gap
the difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies
information redundancy
the duplication of data, or the storage of the same data in multiple places
Time
the elapsed time of a project from beginning to end
Analysis Phase
the firm analyzes its end-user business requirements and refines project goals into defined functions and operations for the intended system.
IT infrastructure
the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals
Hypertext Transfer Protocol (HTTP)
the internet protocol web browsers use to request and display web pages using universal resource locators
Feasibility
the measure of the tangible and intangible benefits of an information system
Usability
the most Effectiveness IT Metrics. the ease with which people perform transactions and/or find informatin. A popular usability metric on the internet is degrees of feedom, which measures the number of clicks required to find desired infomation.
Usability
the most effective IT metrics. The was with which people perform transactions and/or find information. A popular usability metric on the internet is degrees of freedom, which measures the number of clicks required to find desired information.
Informantion accuracy
the most important type of Efficiency IT Metics; the extent to which a system generates the correct results when executing the same transaction numerous times.
Maintenance Phase
the organization performs changes, corrections, additions, and upgrades to ensure the system continues to meet business goals.
SDLC Implementation Phase
the organization places the system into production so users can begin to perform actual business operations with it
Implementation Phase
the organization places the system into production so users can begin to perform actual business operations with it.
Source document
the original transaction record; operational support system
Recovery Paradox Effect
the perception of the stakeholders is happier when you get the project back on track after hardship rather than if the project had just run smoothly from the start.
content creator
the person responsible for creating the original website content
content editor
the person responsible for updating and maintaining website content
physical view
the physical storage of information on a storage device such as a hard disk
Social Networking
the practice of expanding your business and/or social contacts by constructing a personal network
information age
the present time, during which infinite quantities of facts are widely available to anyone who can use a computer
System
the primary enabler of cross-functional operation
data mining
the process of analyzing data to extract information not offered by the raw data alone
competitive intelligence
the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed
production
the process where a business takes raw materials and processes them or converts them into a finished product for its goods or services
Production
the process where a business takes raw materials and processes them or converts them into a finished product for its goods or services.
Information security
the protection of information from accidental or intentional misuse by persons inside or outside an organization. Ebusiness automatically creates tremendous information security risks for organizations.
productivity
the rate at which goods and services are produced based upon total output given total inputs
relational integrity constraint
the rules that enforce basic and fundamental information-based constraints
integrity constraint
the rules that help ensure the quality of information
analytics
the science of fact-based decision making
data element (or data field)
the smallest or basic unit of information
Value Added
the term used to describe the difference between the cost of inputs and the value of price of outputs
Core ERP components
the traditional components included in most ERP systems and primarily focus on internal operations
Strategic decision making
to develop overall strategies, goals, and objectives
Operational decision making
to develop, control, and maintain core business activities required to run the day-to-day operations
Managerial decision making
to evaluate company operations to identify, adapt to, and leverage change
Computer Aided Software Engineering (CASE)
tools are software suites that automate systems analysis, design, and development.
Human Resources ERP Components
track employee information including payroll, benefits, compensation, and performance assessment and ensure compliance with all laws
business intelligence dashboard
tracks corporate metrics such as critical success factors and key performance indicators and includes advanced capabilities such as interactive controls, allowing users to manipulate data for analysis
Ethics and security are
two fundamental building blocks that organizations must base their businesses upon
Business intelligence (extended ERP component)
typically collect information used throughout the organization (including data used in many other ERP components), organize it, and apply analytical tools to assist managers with decisions.
structured query language
users write lines of code to answer questions against a database
Automatic Vehicle Location (AVL)
uses GPS tracking to track vehicles
data-mining tool
uses a variety of techniques to find patterns relationships in large volumes of information and infer rules from them that predict future behavior and guide decision making
Parallel Implementation
uses both the legacy system and new system until all users verify that the new system functions correctly
Parallel Implementation
uses both the legacy system and new system until all users verify that the new system functions correctly.
behavioral analytics
uses data about people's behaviors to understand intent and predict future actions
RFID (radio frequency identification)
uses electronic tags and labels to identify objects wirelessly over short distances
scrum methodology
uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervals, to achieve an appointed goal
In-sourcing
uses the professional expertise within an organization to develop and maintain its information technology systems
offshore outsourcing
using organizations from developing countries to write code and develop systems
Offshore Outsourcing
using organizations from developing countries to write code and develop systems. The country is geographically far away.
Intelligent systems
various commercial applications of AI
Integration Testing
verify that separate systems can work together, passing data back and forth correctly
System Testing
verify that the units or pieces of code function correctly when integrated
Value chain
views an organization as a series of processes, each of which adds value to the product of service for each customer.
DSS quantitative models
what-if, sensitivity, goal-seeking, and optimization
Double Deviations Effect
when nobody discusses or talks through the problem and then the problem becomes an even bigger problem when it is not solved.