Business Driven Technology Baltzan

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

benefits of business mobility

(1) enhances mobility (2) provides immediate data access wherever needed (3) increases location and monitoring capacity (for emergency services, tracking employees or equipment, monitoring remote equipment, etc.) (4) improves work flow (allows work processes constrained by paper or wired connections to be redesigned) (5) provides opportunities for business via mobile phone or tablet (6) provides alternative to wiring

common GIS uses

(1) finding what is nearby (2) routing information (3) sending information alerts (re: road closures, traffic congestion) (4) mapping densities (population or event densities based on a standard area unit (5) mapping quantities - determining how many things are within a given area (e.g. coffee shops, gas stations, or families with children)

challenges of business mobility

(1) protecting mobile devices against theft (2) protecting security of wireless connections (3) preventing viruses on mobile devices (4) addressing privacy concerns with RFID and LBS

In Sourcing

(in house development) uses the professional expertise within an organization to develop and maintain its information technology systems.

eBusiness Models

- Business-to-business (B2B) - Business-to-consumer (B2C) - Consumer-to-business (C2B) - Consumer-to-consumer (C2C)

Website Visitor Metrics

- Unidentified visitor - Unique visitor - Identified visitor

Reasons for growth of the WWW

-Microcomputer made it possible for the average person to own a computer -Advancements in networking hardware, software, and media made it possible for business computers to be connected to larger networks at a minimal cost -Browser software gave computer users an easy-to-use graphical interface to find, download, and display web pages -The speed, convenienve, and low cost of email have made it an incredibly popular tool for business and personal communications -Basic web pages are easy to create and extremely flexible

Ebusiness Advantages

-expanding global reach -opening new markets -reducing costs -improving operations -improving effectiveness

goods

-material items or products that customers will buy to satisfy a want or need -clothing, groceries, cell phones, and cares are all examples of goods that people buy to fulfill their needs

Customer Contact Points

-text message/instant message -voice mail/voice call -email/letter -web order/phone order -meeting or customer service call -twitter, facebook, blog

Ebusiness revenue models

1. Advertising fees; 2. License fees; 3. Subscription fees; 4. Transaction fees; 5. Value-added services fees

Four Common Extended ERP Components

1. Business Intelligence 2. Customer Relationship Management 3. Supply Chain Management 4. Ebusiness

factors driving outsourcing growth

1. Core Competencies 2. Financial Savings 3. Rapid Growth 4. The Internet 5. Globalization

Advantages of Using Wireless Networks

1. Enhances Mobility 2. Provides Immediate Data Access 3. Increases Location and Monitoring Capability 4. Provides Alternative to Wiring 5. Provides Mobile Business Opportunities 6. Improves Workflow

Four Technology Areas of Focus

1. IT Infrastructures 2. Security 3. Ebusiness 4. Integrations

Challenges of ebusiness

1. Identifying limited market segments; 2. Managing consumer trust; 3. Ensuring consumer protection; 4. Adhering to taxation rules.

Two primary components of CRM strategy

1. Operational CRM 2. Analytical CRM

XP Basic Phases

1. Planning 2. Designing 3. Coding 4. Testing

Challenges of Wireless Networks

1. Protecting Against Theft 2. Protecting Wireless Connections 3. Preventing Viruses on Mobile Devices 4. Addressing Privacy Concerns with RFID and LBS

Seven Principles of Supply Chain Management

1. Segment Customers by service needs, then tailor services to those segments. 2. Customize the logistics network and focus intensively on the service requirements and on the profitability of the pre-identified customer segments. 3. Listen to signals of market demand and plan accordingly. Planning must span the entire chain to detect signals of changing demand. 4. Differentiate products closer to the customer, since companies can no longer afford to hold inventory to compensate for poor demand forecasting. 5. Strategically manage sources of supply, by working with key suppliers to reduce overall costs of owning materials and services. 6. Develop a supply chain information technology strategy that supports different levels of decision making and provides a clear view (visibility) of the flow of products, services, and information. 7. Adopt performance evaluation measures that apply to every link in the supply chain and measure true profitability at every stage.

Managing a project includes

1. identifying requirements 2. establishing clear and achievable objectives 3. balancing the competing demands of quality, scope, time, and cost 4. adapting the specifications, plans, and approach to the different concerns and expectations of the various stakeholders

Operational CRM Technologies

1. marketing operational CRM technologies 2. sales operational CRM technologies 3. cutomer service operational CRM technologies

SCM keys to success

> Make the sale to the supplier > Support organizational goals > Change traditional business processes > Deploy in incremental phases and measure and communicate success

The components of an RFID system

> Tag :: A microchip holds data (in this case, an electronic product code), and an antenna to transmit data to a reader. > Reader :: Uses radio waves to read the tag and sends the EPC to computers in the supply chain > Computer network :: holds information such as dates made and shipped, price, and directions for use on each item. Also tracks the item location throughout the supply chain

wireless LAN (wLAN)

A LAN that uses radio signals to transmit and receive data over distances of a few hundred feet.

identity management

A broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity.

information security

A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

data artist

A business analytics specialist who uses visual tools to help people understand complex data.

Managerial Information Systems (MIS)

A business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making and problem solving

management information systems

A business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision-making and problem-solving

Management Information Systems (MIS)

A business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision-making and problem-solving. XXX is not technology XXX is a business function

data broker

A business that collects personal information about consumers and sells that information to other organizations.

neural network (artificial neural network)

A category of AI that attempts to emulate the way the human brain works.

repository

A central location in which data is stored and managed.

Big data

A collection of large complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools

big data

A collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.

System

A collection of parts that link to achieve a common purpose

secure hypertext transfer protocol (SHTTP or HTTPS)

A combination of HTTP and SSL to provide encryption and secure identification of an Internet server. Protects against interception of communications, transferring credit-card information safely & securely with special encryption techniques. When a user enters a web address with HTTPS, browser will encrypt message, but server must be configured to receive HTTPS messages.

Interoperability for Microwave Access (WiMAX)

A communications technology aimed at providing high-speed wireless data over metropolitan area networks

Worldwide Interoperability for Microwave Access (WiMAX)

A communications technology aimed at providing high-speed wireless data over metropolitan area networks (MANs)

competitive monitoring

A company keeps tabs of its competitor's activities on the web using software that automatically tracks all competitor website activities such as discounts and new products.

evaluate

A company must continually _____ all the business processes in its value chain.

drive-by hacking

A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

peer-to-peer (P2P)

A computer network that relies on the computing power and bandwidth of the participants in the network, rather than a centralized server

virtual reality

A computer-simulated environment that can be a simulation of the real world or an imaginary world.

Product realization

A cross functional business process that includes not only the way a product is developed but also the way it is marketed and serviced

Variable

A data characteristic that stands for a value that changes or varies over time

Variable

A data characteristic that stands for a value that changes or varies over time.

recommendation engine

A data-mining algorithm that analyzes a customer's purchases and actions on a website and then uses the data to recommend complementary products.

modem

A device that enables a computer to transmit and receive data

RFID Accelerometer

A device that measures the accelerations of an item and is used to track truck speeds or taxi cab speeds

Report

A document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information

Competitive Advantage

A feature of a product or service on which customers place a greater value than they do on similar offerings from competitors

Entry Barrier

A feature of a product or service that customers have come to expect and entering competitors must offer the same for survival

Entry barrier

A feature of a product or service that customers have come to expect and entering competitors must offer the same for survival

primary key

A field (or group of fields) that uniquely identifies a given entity in a table.

ransomware

A form of malicious software that infects your computer and asks for money.

Project Plan

A formal, approved document that manages and controls project execution

broadband

A high-speed Internet connection that is always connected. (Anything greater than 2 Mbps)

Child Online Protection Act (COPA)

A law that protects minors from accessing inappropriate material on the Internet.

Business strategy

A leadership plan that achieves a specific set of goals or objectives

Business Strategy

A leadership plan that achieves a specific set of goals or objectives such as increasing sales, decreasing costs, entering new markets, or developing new products or services

Business strategy

A leadership plan that achieves a specific set of goals or objectives; decreasing costs, attracting new customers, increasing customer loyalty, increasing sales, developing new products or services, or entering new markets

Wireless LAN

A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet

data warehouse

A logical collection of information—gathered from many different operational databases—that supports business analysis activities and decision-making tasks.

Balanced scorecard

A management system, in addition to a measurement system that enables organizations to clarify their vision and strategy and translate them into action; do use the organization from four perspectives: Learning and growth, internal business process, customer, financial

balanced scorecard

A management system, in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action.

Internet

A massive network that connects computers all over the world and allows them to communicate with one another.

algorithm

A mathematical formula placed in software that performs an analysis on a data set.

fuzzy logic

A mathematical method of handling imprecise or subjective information.

Wireless Fidelity (Wi-Fi)

A means of linking computers using infrared or radio signals

Customer Relationship Management (CRM)

A means of managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability.

information integrity

A measure of the quality of information.

streaming

A method of sending video and audio files over the Internet that allows users to hear/view the file while it's being transferred

measure

A metric is nothing more than a standard _____ to assess performance is a particular area.

WMAN

A metropolitan area network that uses radio signals to transmit and receive data

Wireless MAN

A metropolitan area network that uses radio signals to transmit and receive data

Porter's Five Forces Model

A model for analyzing the competitive forces within the environment in which a company operates, to assess the potential for profitability in an industry.

Prototyping

A modern design approach where the designers and system users use an iterative approach to building the system

Increased Focus on Integration Cont...

A new series of business success factors and challenges are emerging: Organization agility, Focus on core competencies and processes, Redefinition of the value chain, Instantaneous business response, Ability to scale resources and infrastructure across geographic boundaries.

Disruptive Technology

A new way of doing things that initially does not meet the needs of existing customers

Disruptive technology

A new way of doing things that initially does not meet the needs of existing customers. Tends to open new markets and destroy old ones. iPod/iPhone/iPad, online brokerage, personal computers, etc.

business process patent

A patent that protects a specific set of procedures for conducting a particular business activity.

Stakeholder

A person or group that has an interest or concern in an organization

eBusiness Model

A plan that details how a company creates, delivers, and generates revenues on the internet

ebusiness model

A plan that details how a company creates, delivers, and generates revenues on the internet. Four categories: 1. Business to Business (B2B) 2. Business to Consumer (B2C) 3. Consumer to Business (C2B) 4. Consumer to Consumer (C2C)

Business Model

A plan that details how a company creates, delivers, and generates revenues.

foreign key

A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

Benchmarking

A process of continuously measuring system results, comparing those results to optimal system performance, and identifying steps and procedures to improve the system performance.

extraction, transformation, and loading (ETL)

A process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse.

information cleansing or scrubbing

A process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information

information cleansing or scrubbing

A process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information.

Competitive advantage

A product or service that an organization's customers place a greater value on than similar offerings from a competitor

competitive advantage

A product or service that an organization's customers value more highly than similar offerings from a competitor

Dynamic Report

A report that changes automatically during creation

intranet

A restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, and collaboration

Global Positioning System

A satellite-based navigation system providing extremely accurate position, time and speed information

Global Positioning System (GPS)

A satellite-based navigation system providing extremely accurate position, time, and speed information

global positioning system (GPS)

A satellite-based navigation system providing extremely accurate position, time, and speed information. It was developed by the US Dept of Defense in the early 1970's, and later made available to the public.

Business Unit

A segment of a company (such as accounting, production, marketing) representing a specific business function

waterfall methodology

A sequence of phases in which the output of each phase becomes the input for the next

Waterfall Methodology

A sequences of phases in which the output of each phase becomes the input for the next

Methodology

A set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges

file transfer protocol (FTP)

A simple network protocol that allows transmission of files between two computers on the Internet

model

A simplified representation or abstraction of reality.

packet

A single unit of binary data routed through a network

Pop-Up AD

A small web page containing an advertisement

Prototype

A smaller-scale representation or working model of the users' requirements or a proposed design for an information system

satellite

A space station that orbits earth, sending and receiving signals from earth-based stations over a wide area

Satellite

A space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area

satellite

A space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area

spyware

A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

intelligent agent

A special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users.

executive information system (EIS)

A specialized DSS that supports senior-level executives within the organization.

transmission control protocol/Internet protocol (TCP/IP)

A standard Internet protocol that provides a technical foundation for the public Internet,as well as large numbers of private networks. TCP verifies the correct delivery of data. Ensures size of data packet is the same throughout its transmission

secure sockets layer (SSL)

A standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passing between them remains private

protocol

A standard that specifies the format of data, as well as the rules to be followed during transmission

Business process

A standardized set of activities that accomplish a specific task

Business process

A standardized set of activities that accomplish a specific task, such as a specific process

Business process

A standardized set of activities that accomplish a specific task; helps a manager to envision how the entire company operates Exp: processing a customers order

prediction

A statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover.

data lake

A storage repository that holds a vast amount of raw data in its native format until it is needed.

Technology development

A support value activity that applies to management information systems to processes to add value.

Firm infrastructure

A support value activity that includes the company format or departmental structures, environment, and systems.

Human resource

A support value activity type of management that provides employee training, hiring, and compensation

data map

A technique for establishing a match, or balance, between the source data and the target data warehouse.

Electronic Tagging

A technique for identifying and tracking assets and individuals.

Viral Marketing

A technique that induces websites or users to pass on a marketing message

cluster analysis

A technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible.

digital rights management

A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

Project

A temporary activitya company undertakes to create a unique product, service, or result

project

A temporary endeavor undertaken to create a unique product or service.

RFID Reader (RFID Interrogator)

A transmitter/receiver that reads the contents of RFID tags in the area

Wiki

A type of collaborative web page that allows users to add, remove, and change the content, which can easily be organized and reorganized as required.

relational database model

A type of database that stores information in the form of logically related two-dimensional tables.

IP address

A unique number that identifies where computers are located on the Internet. Consist of four numbers separated by periods.

Value chain analysis

A useful tool for determining how to create the greatest possible value for customers

traceroute

A utility application that monitors the network path of packet data sent to a remote computer

Snapshot

A view of data at a particular moment in time

System Thinking

A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part

Real Simple Syndication (RSS)

A web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format.

Mashup

A website or web application that uses content from more than one source to create a completely new product or service. Web version: mix map data, photos, video, news feeds, blog entries, and so on to create content with new purpose.

WWAN

A wide area network that uses radio signals to transmit and receive data

Wireless WAN

A wide area network that uses radio signals to transmit and receive data

Bluetooth

A wireless PAN (personal area network) technology that transmits signals over short distances among cell phones, computers, and other devices

Bluetooth

A wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices

multiple in/multiple out (MIMO) technology

A wireless access point (WAP) with multiple transmitters and receivers, allowing them to send greater amounts of data than traditional networking devices

wireless WAN

A wireless wide area network (WAN). It uses radio signals to transmit & receive data

Internet of Things (IoT)

A world where interconnected Internet-enabled devices or "things" have the ability to collect and share data without human intervention

metric

A(n) _____ is a standard measure to assess performance in a particular area.

system

A(n) __________ is a collection of parts that link to achieve a common purpose.

Effectiveness

According to Peter Drucker, what are managers who do the right things addressing?

Three Common Core ERP Components

Accounting & Finance Production & Materials Management Human Resources

Core ERP Components

Accounting and Finance, Production and materials management, human resources

Primary Users of ERP

Accounting, finance, logistics, production

Inbound logistics

Acquires raw materials and resources and distributes to manufacturing as required; primary value activity

Inbound logistics

Acquires raw materials and resources, and distributes

digital divide

Advantage for those having access to network technology

First mover

Advantage that occurs when a company can significantly increase its market share by being first with a new competitive advantage

Ebusiness revenue models

Advertising fees License fees Subscription fees Transaction fees Value-added service fees

Agile Methodology

Aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements

Web browsers

Allow access to WWW

dynamic host configuration protocol (DHCP)

Allows dynamic IP address allocation, so that users don't need a preconfigured IP address to use the network

Common Data Repository

Allows every department of a company to store and retrieve information in real-time allowing information to be more reliable and accessible.

Clickstream data

Allows organizations to observe the exact pattern of a consumer's navigation through a site. Length of stay, abandoned registrations, demographics of registered users, etc.

integration

Allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems.

Web Browser

Allows users to access the WWW

relational database management system

Allows users to create, read, update, and delete data in a relational database.

Social bookmarking

Allows users to share, organize, search, and manage bookmarks. Del.icio.us, StumpleUpon, etc.

Different Forms of System Testing

Alpha testing development testing integration testing system testing user acceptance testing (UAT) unit testing

Example of B2C

Amazon

Website success solely is measure by

Amount of traffic

Identified visitor

An ID is available that allows a user to be tracked across multiple visits to a website

Product differentiation

An advantage that occurs when a company develops unique differences in its products with the intent to influence demand.

Social Network

An application that connects people by matching profile information

data-driven decision management

An approach to business governance that values decisions that can be backed up with verifiable data.

dynamic catalog

An area of a website that stores information about products in a database.

genetic algorithm

An artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem.

Financial

An effectiveness metric that involves return on investment, cost benefit analysis, and break even analysis

SSL certificate

An electronic document that confirms the identity of a website or server, and verifies that a public key belongs to a trustworthy individual or company

RFID Tag

An electronic identification device that is made up of a chip and antenna

patent

An exclusive right to make, use, and sell an invention granted by a government to the inventor.

extranet

An extension of an organization's intranet that is available only to authorized outsiders

optimization analysis

An extension of goal-seeking analysis, finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints.

data point

An individual item on a graph or a chart.

data-driven website

An interactive website kept constantly updated and relevant to the needs of its customers through the use of a database.

Project Management Office (PMO)

An internal department that oversees all organizational projects

Institute of Electrical and Electronics Engineers (IEEE)

An organization that researches and institutes electrical standards for communication and other technologies

data set

An organized collection of data.

Back order

An unfilled customer order, demand against an item who's current stock level is insufficient to satisfy demand; a Supply Chain Management (SCM) metric

SDLC - Analysis

Analyze end-user business requirements and refines project goals into defined functions and operations of the intended system

Managerial decision-making challenges

Analyze large amounts of information, make decisions quickly, and apply sophisticated analysis techniques to make strategic decisions

Porters five forces model

Analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry; threat of substitute products or services, supplier power, rivalry among existing competitors, buyer power, and threat of new entrants

substitute

Analyzing and constructing primary value activities can help decrease the threat of _____ products for services.

entrants

Analyzing and constructing support value activities can help decrease the threat of new _____.

Business uses for instant messaging

Answer simple questions quickly and easily, eliminate long distance phone charges, quickly identify which employees are at their computers, resolve questions or problems immediately, transmit messages as fast as naturally flowing conversation, easily hold simultaneous IM sessions with multiple people

Project deliverable

Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project

Technology development

Applies MIS to processes to add value

Primary Information Security Areas

Authentication & Authorization Prevention & Resistance Detection & Response

The Benefits and and Magnitude of Change the Process Change Spectrum what would be th small change

Automate

Supply Chain Execution (SCE) software

Automates the different steps and stages of the supply chain.

Extended Ebusiness Models

B2B B2C B2G C2B C2C C2G G2B G2C G2G

Eprocurement

B2B purchase and sale of supplies and services over the internet

Benchmarks

Baseline values the system seeks to attain that managers must set

benchmark

Baseline values the system seeks to attain.

Telematics

Blending computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations.

Web conferencing (webinar)

Blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants

Banner AD

Box running across a web page that contains advertisements

Extreme programming (XP) methodology

Breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete

Extreme Programming (XP) Methodology

Breaks a project into tiny phases, and developers cannot continues on to the next phase until the first phase is complete

Three forms of B2C

Brick-and-mortar Click-and-mortar Pure-Play

Ebusiness Forms - Online Marketplaces

Bring together buyers and sellers of products and services Examples: Amazon.com; eBay.com

Online marketplaces (ebusiness form)

Brings together buyers ad sellers of products and services (amazon.com, priceline.com, etc)

Competitive Scope

Broad market and low cost, Broad market and high cost, Narrow market and low cost, Narrow market and high cost

Discovery Prototyping

Builds a small-scale representation or working model of the system to ensure it meets the user and business requirements

What is Business process?

Business concept

The plans and goals of the IT department must align with the plans and goals of the organization.

Business is always #1

health

Business leaders want to monitor key metrics in real time to actively track the _____ of their business.

Improving Communications

Business personnel must seek to increase their understanding of IT. IT personnel must seek to increase their understanding of the business.

A GAP BETWEEN BUSINESS PERSONNEL AND IT PERSONNEL

Business personnel possess expertise in functional areas such as marketing, accounting, and sales , it expertise in technology this causes

Customer-facing

Business processes that result in a product or service received by in organizations external customer; a.k.a. front-office process Exp: fulfilling orders, communicating with customers, sending out bills and marketing info

Core processes

Business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain.

Business to Consumer (B2C)

Business that sells its products or services to consumers over the internet. Brick and mortar (just storefront), click and mortar (storefront and website/virtual), pure play (just virtual)

Business to Business (B2B)

Businesses buying and selling to each other over the internet

reduced

Buyer power can be _____ by manipulating switching costs.

business goal

CRM is not just (Q1), but a (Q2), (Q3), and (Q4) that an organization must embrace on an enterprise-wide level (Q4)

strategy

CRM is not just (Q1), but a (Q2), (Q3), and (Q4) that an organization must embrace on an enterprisewide level (Q2)

process

CRM is not just (Q1), but a (Q2), (Q3), and (Q4) that an organization must embrace on an enterprisewide level (Q3)

technology

CRM is not just (Q1), but a (Q2), process, and business goal that an organization must embrace on an enterprisewide level (Q1)

Services

Cases closed same day, number of cases handled by agent, number of service calls, average number of service requests by type, average time to resolution, average number of service calls per day, percentage compliance with service level agreement, percentage of service renewals, and customer satisfaction levels are all _____ metrics.

smartphones

Cell phones with advanced computing capability

WWAN Categories

Cellular Communication Systems Satellite Communication Systems

Heart of ERP

Central database that collects information from and feeds information into all the ERP system's individual application components, supporting diverse business functions such as accounting, manufacturing, marketing, and human resources.

what-if analysis

Checks the impact of a change in an assumption on the proposed solution.

What does CEO stands for

Chief Executive officer

What does CFO stands for

Chief Financial Officer

What does CIO stands for

Chief Information Officer

Recent IT-related strategic positions:

Chief Information Officer (CIO Chief Technology Officer (CTO Chief Security Officer (CSO Chief Privacy Officer (CPO Chief Knowledge Officer (CKO

What does COO stands for

Chief Operation Officer

RFID

Chips or smart labels that can store unique identifiers and relay this information to electronic readers

Radio Frequency Identification (RFID)

Chips or smart labels that can store unique identifies and relay this information to electronic readers.

Education and Training

Cisco saved $133 million in 2002 by moving training sessions to the Internet, and the University of Phoenix on line college classes please investors.

Collective intelligence

Collaborating and tapping into the core knowledge of all employees, partners, and customers.

Back Office - Analytical CRM

Collaborative CRM system Data warehouse Data mining

Synchronus Communication

Communication in which messages occur in real time—when you speak or write, someone immediately responds to your message.

Asynchronous Communications

Communication such as email in which the message and the response do not occur at the same time

Synchronous Communication

Communications that occur at the same time such as IM chat (live)

comparative analysis

Compares two or more data sets to identify patterns and trends.

data dictionary

Compiles all of the metadata about the data elements in the data model.

edge matching (warping, rubber sheeting)

Component of GIS software that matches edges of map sections

expert system

Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems.

local area network (LAN)

Connects a group of computers in close proximity

wide area network (WAN)

Connects computers scattered over a wide area

Iterative Devlopment

Consists of a series of tiny projects

Supply chain

Consists of all parties involved, directly or indirectly, in obtaining raw materials or a product

Supply Chain

Consists of all parties involved, directly or indirectly, in the procurement of a product or raw materials.

Explicit Knowledge

Consists of anything that can be documented, achieved, and codified, often with the help of IT

Explicit Knowledge

Consists of anything that can be documented, archived and codified, often with the help of IT.

Digital Dashboard Analytical Capabilities

Consolidation, drill-down, slice-and-dice, pivot

Gate 3 of RUP

Construction

Consumer to Business (C2B)

Consumer that sells a product or service to a business over the internet. Priceline.com

Customer Service Operational CRM Technology

Contact center (call center) Web-based self-service system Call scripting system

data mart

Contains a subset of data warehouse information.

Source Code

Contains instructions written by a programmer specifying the actions to be performed by computer software

Technologies to prevent attacks

Content Filtering Encryption Firewalls

Ebusiness Forms

Content providers, infomediaries, online marketplaces, portals, service providers, transaction brokers

feedback

Continuously measuring M I S projects against benchmarks provides _____ so managers can know when things get out of line and control the system.

domain name system (DNS)

Converts IP addresses into domains (identifying labels instead of four numbers)

Podcasting

Converts an audio broadcast to a digital music player. Can increase marketing reach and build customer loyalty. Can be used to discuss corporate strategies, offer detailed product overviews, etc.

Switching costs

Costs that can make customers reluctant to switch to another product or service.

Switching costs

Costs that make customers reluctant to switch to another product or service

Issuses Affected by Technology Advance: intellectual property, Copyright, fair use doctrine, pirated software and counterfeit software of these which is the worst

Countefeit software

chief user experience officer

Create the optimal relationship between user and technology.

User-contributed (user-generated) content

Created and updated by many users for many users. Flickr, Wikipedia, YouTube

database management system (DBMS)

Creates, reads, updates, and deletes data in a database while controlling access and security

Accounting finance

Creating financial statements, paying of accounts payable, and collecting of accounts receivable are examples of business processes in the _____ and _____ departments.

Critical Success Factor (CSF)

Crucial steps companies perform to achieve their goals and objectives and implement their strategies.

CRM

Customer Relationship Management: involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability.

What would be the Greatest Benefits for Information Technology

Customer Service

Primary Users of SCM

Customers, resellers, partners, suppliers, distributors

variable

Data characteristic that stands for a value that changes or varies over time

Clickstream Data

Data collected about user behavior and browsing patterns by monitoring users' activities when they visit a Web site.

information

Data converted into a meaningful and useful context

Information

Data converted into a meaningful and useful context.

information

Data converted into meaningful and useful content: best-selling product, best customer, worst-selling product, worst customer

Machine-generated data

Data created by a machine without human intervention, includes sensor data, point-of-sale data, and web log data

Unstructured data

Data not defined and does not follow a specified format and is typically free-form text such as emails, Twitter tweets, and text messages. Unstructured data accounts for about 80 percent of the data that surrounds us.

Information

Data organized so that they have meaning and value to the recipient.

structured data

Data that has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address.

Structured data

Data that has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address. Data typically stored in a traditional system such as a relational database or spreadsheet and accounts for about 20 percent of the data that surrounds us.

Human-generated data

Data that humans, in interaction with computers, generate. Human-generated structured data includes input data, click-stream data, or gaming data.

unstructured data

Data that is not defined and does not follow a specified format and is typically free-form text such as emails, Twitter tweets, and text messages

Core Drivers of the information age

Data, information, business intelligence, knowledge

Finance

Deals with strategic financial issues including money, banking, credit, investments, and assets

business rule

Defines how a company performs a certain aspect of its business and typically results in either a yes/no or true/false answer.

War Driving

Deliberately searching for Wi-Fi signals from a vehicle

Semantic Web

Described by Tim Berners-Lee (one of WWW founders) as one of the components of Web 3.0 that describes things ina way that computers can understand.

Network effect

Describes how products in a network increase in value to users as the number of users increases

Social tagging

Describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search.

source document

Describes the original transaction record along with details such as its date, purpose, and amount spent and includes cash receipts, canceled checks, invoices, customer refunds, employee time sheet, etc.

Hotspots

Designated locations where Wi-Fi access points are publically available

hotspots

Designated locations where wi-fi access points are publicly available

metadata

Details about data.

estimation analysis

Determine values for an unknown continuous variable behavior or estimated future value.

chief automation officer

Determines if a person or business process can be replaced by a robot or software.

Break Even analysis

Determines the volume of business required to make a profit at the current prices charged for the products or services

virtual private network (VPN)

Direct, private network links (or private, secure Internet access) within the framework of the Internet, a sort of "private tunnel"

Internet protocol TV (IPTV)

Distributes digital video content using IP (Internet protocol) across the Internet and private IP networks

Outbound logistics

Distributes good and services to customers; primary value activity

Outbound logistics

Distributes goods and services to customers

Module Software Design

Divides the system into a set of functional units (named modules) that can be used independently or combined with other modules for increased business flexibility.

Passive RFID Tags

Do not have a power source

Swimlane Diagram

Documents the steps or activities of a workflow by grouping activities into swimlanes, which are horizontal or vertical columns containing all associated activities for that category or department.

Types of Feasibility Studies

Economic feasibility Operational feasibility Schedule feasibility Technical feasibility Political feasibility Legal feasibility

One of the greatest challenges today

Effective communication between business personnel and IT personnel

Efficiency vs. Effectiveness

Efficiency = throughput, transaction speed, system availability, etc Effectiveness = customer satisfaction, customer conversion rates, etc

Gate 2 of RUP

Elaboration

Data Item

Elementary description of things, events, activities and transactions that are recorded, classified and stored but are not organized to convey any specific meaning.

ebusiness tools for communicating

Email Instant Messaging Podcasting Videoconferencing Web Conferencing Content Management System

Rapid Application Development (RAD) Methodology

Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process

Rapid Application Development (RAD) Methodology

Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process

managerial level

Employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change.

operational level

Employees develop, control, and maintain core business activities required to run the day-to-day operations.

telecommuting (virtual workforce)

Employees working at home or remote location via the Internet

Wireless Access Point

Enables devices to connect to a wireless network to communicate with each other

wireless access point (WA{P)

Enables devices to connect to a wireless network to communicate with each other

business-critical integrity constraint

Enforces business rules vital to an organization's success and often requires more insight and knowledge than relational integrity constraints.

What is on the mind of the CEO

Enhance Customer Satisfaction

Advantages of Wireless Networks

Enhances Mobility Provides Immediate Data Access Increases Location and Monitoring Capability Improves Workflow Provides Mobile Business Opportunities Provides Alternatives to Wiring

What Concerns CIO;s the Most?

Enhancing customer satisfaction

dirty data

Erroneous or flawed data.

SDLC - Design

Establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation

Eshop

Estore/etailer. Online version of a retail store where customers can shop at any hour.

Differentiate between ethics and privacy

Ethics = the principles and standards that guide our behavior toward other people Privacy = the right to be left alone when you want to be, to have control over your own personal posessions, and to not be observed without your consent.

Example of C2C

Etsy

SWOT analysis

Evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies

market basket analysis

Evaluates such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services.

Effectiveness MIS metrics

Exp: customer satisfaction, customer conversion rates, financial

Efficiency MIS metrics

Exp: throughput, transaction speed, system availability, information accuracy, response time

hacker

Experts in technology who use their knowledge to break into computers and computer networks, either for profit or simply for the challenge. (https://gyazo.com/5c1008e4f78d100ea8270065fca8d152)

Extended ERP components

Extra components that meet the organizational needs not covered by the core components and primarily focus on external operations

Predictive Analytics

Extracts information from data and uses it to predict future trends and identify behavioral patterns

data scientist

Extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information.

Security Benefits

Fewer disruptions to organizational systems, Increased productivity of employees, Greater advances in administration, authorization, and authentication techniques.

goal-seeking analysis

Finds the inputs necessary to achieve a goal such as a desired level of output.

logical view of information

Focuses on how users logically access information to meet their particular business needs.

Supplier Relationship Management

Focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects, which optimizes supplier selection.

Partner Relationship Management

Focuses on keeping vendors satisfied by managing alliance partner and reseller relationships that provide customers with the optimal sales channel.

Increased Focus on Security

For business it is important to have the appropriate levels of: Authentication, Access Control, and Encryption to help ensure: 1. That only authorized individuals can gain access to the network. 2. That they have access to only those applications for which they are entitled. 3. That they cannot understand or later information while in transit.

Primary Business Benefits of ERP

Forecasting, planning, purchasing, material management, warehousing, inventory, distribution

support value activities

Found along the top of the value chain and includes business processes, such as firm infrastructure, human resource management, technology development, and procurement, that support the primary value activities.

primary value activities

Found at the bottom of the value chain, these include business processes that acquire raw materials and manufacture, deliver, market, sell, and provide after-sales services.

business process reengineering

Four strategic initiatives for competitive advantages are _____ _____ _____, supply chain management, customer relationship management, and enterprise resource planning.

supply chain management

Four strategic initiatives for competitive advantages are business process reengineering, _____ _____ _____, customer relationship management, and enterprise resource planning.

customer relationship management

Four strategic initiatives for competitive advantages are business process reengineering, supply chain management, _____ _____ _____, and enterprise resource planning.

enterprise resource planning

Four strategic initiatives for competitive advantages are business process reengineering, supply chain management, customer relationship management, and _____ _____ _____.

Example of Brick-and-Mortar

Full Circle Books

Ebusiness Forms - Content Providers

Generate revenue by providing digital content such as news, music, photos, or videos Example: Netflix.com

Demand planning software

Generates demand forecasts using statistical tools and forecasting techniques *Companies can respond faster and more effectively to consumer demands*

Content Providers (ebusiness form)

Generates revenue by providing digital content such as news, music, photos, or videos (netflix, itunes, etc.)

Pay-per-call

Generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call

Pay-per-conversion

Generates revenue each time a website visitor is converted to a customer

Porter's three generic strategies

Generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service.

Example of a Pure-Play

Google

information ethics

Governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies).

Productions and materials management ERP components

Handle various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control.

Active RFID Tags

Have their own transmitter and a power source

Content Management Systems (CMS)

Help companies manage the creation, storage, editing, and publication of their website content. Most include web-based publishing, search, navigation, and indexing to organize information; and they let users with little or no technical experience to make website changes.

CRM reporting technologies

Help organizations identify their customers across other applications

CRM predicting technologies

Help organizations make predictions regarding customer behavior such as which customers are at risk of leaving.

CRM analysis technologies

Help organizations segment their customers into categories such as best and worst customers.

SCM applications

Helps companies analyze vendors based on a number of key variables including strategy, business goals, prices, and markets.

Supply Chain Management (extended ERP component)

Helps organization plan, schedle, control, and optimize supply chain from its acquisition of raw materials to the receipt of finished goods by customers.

query-by-example (QBE) tool

Helps users graphically design the answer to a question against a database.

Industry clusters

High concentrations of companies in a sector such as semi conductors, cars, or textiles.

Rivalry among existing competitors

High when competition is fierce in a market and low when competitors are more complacent

Threat of New Entrants

High when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market

Threat of Substitute Products or Services

High when there are many alternatives to a product or service and low when there are few alternatives from which to choose

Threat of new entrants

High: when it is easy for new competitors to enter a market Low: when there are significant entry barriers to entering the market

Threat of substitute products or services

High: when there are many alternatives to a product or service Low: When there are few alternatives from which to choose

Human resources

Hiring employees, enrolling employees in healthcare, and tracking vacation and sick time are examples of business processes in the _____ _____ department.

Website Hit Metrics

Hits

Technology Areas of Focus

IT Infrastructure Security Ebusiness Integrations

a communications gap between the business personnel and IT personnel

IT personnel have the technological expertise This typically causes

Spatial Data

Identifies the geographic location of features and boundaries on Earth

spatial data (geospatial data or geographic information)

Identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. It's stored as coordinates and topology, and can be mapped.

source data

Identifies the primary location where data is collected.

Digital Darwinism

Implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.

geocoding

In spatial databases, it's a coding process that assigns a digital map feature to an attribute that serves as a unique ID (e.g., tract number or node number) or classification (e.g. soil type, zoning category). GIS professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data.

Upper right-hand corner

In the graph depicting the interrelationships between efficiency and effectiveness, where does an organization ideally want to operate?

Gate One Of RUP

Inception

standard packet formats

Include a packet header, packet body (containing the information), and packet footer

dynamic information

Includes data that change based on user actions.

Ebusiness

Includes ecommerce along with all activities related to internal and external business operations

Firm infrastructure

Includes the company format or departmental structures, environment, and systems

Wi-Fi Infrastructure

Includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal

Wi-Fi infrastructure

Includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal

Workflow

Includes the tasks, activities, and responsibilities required to execute each step in a business process

outsourcing benefits

Increased quality and efficiency of business processes Reduced operating expenses for head count and exposure to risk for large capital investments Access to outsourcing service provider's expertise, economies of scale, best practices, and advanced technologies Increased flexibility for faster response to market changes and less time to market for new products or services

Return on investment (ROI)

Indicates the earning power of a project and is measured by dividing the project by the investment

return on investment (ROI)

Indicates the earning power of a project.

Return on investment (ROI)

Indicates the earning power of a project; A common in ternal KPI; =profitability/costs

knowledge worker

Individual valued for their ability to interpret and analyze information

Project stakeholder

Individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion

Knowledge Workers

Individuals valued for their ability to interpret and analyze information

Knowledge Workers

Individuals valued for their ability to interpret and analyze information.

What is IT?

Information Technology (IT) is a field concerned with the use of technology and managing the processing information.

Business intelligence

Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trains, and relationships for strategic decision making

Business Intelligence (BI)

Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making

business intelligence (BI)

Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making

What are the 4 Organizatonal Informaion Cultures?

Information-Functional, Information-sharing , Information-inquiring, and Information-discovery

Transformation Process

Inputs Transformation Outputs Control

IEEE

Institute of Electrical & Electronics Engineers. An organization that researches and institutes electrical standards for communication and other technologies

intellectual property

Intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

E- INTELLECTUAL PROPERTY

Intangible creative work that is embodied in physical form.

Enterprise Resource Planning (ERP)

Integrates all departments and functions throughout an organization into a single system (or integrated set of MIS systems) so that employees can make decisions by viewing enterprisewide information on all business operations.

ERP

Integration is key

Hypertext transport protocol (HTTP)

Internet protocol web browsers use to request and display webpages using universal resource locators.

Business-facing processes

Invisible to the external customer but essential to the effective management of the business; they include goal setting, day-to-day planning, giving performance feedback and rewards, and resource allocation.

Sales Analytics

Involves gathering, classifying, comparing, and studying company sales data to analyze product cycles, sales pipelines, and competitive intelligence.

Customer analytics

Involves gathering, classifying, comparing, and studying customer data to identify buying trends, at-risk customers, and potential future opportunities.

Customer relationship management (CRM)

Involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability.

structured decisions

Involves situations where established processes offer potential solutions.

supply chain management (SCM)

Involves the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability.

Supply Chain Management (SCM)

Involves the management of information flows between and among stages in a supply chain to maximize total supply chain effectiveness and profitability.

Egovernment

Involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer and all branches of government (FirstGov.gov)

Feasibility

Is the measure of the tangible and intangible benefits of an information system.

Primary Component of CRM

Knowing when and why the customer is communicating with the company

workers

Knowledge __________ are individuals valued for their ability to interpret and analyze information.

Tacit Knowledge

Knowledge contained in people's heads

Tacit Knowledge

Knowledge contained in people's heads.

metropolitan area network (MAN)

Large computer network usually spanning a city

lattitude/longitude

Lattitude measures north/south position, while longitude measures degrees east/west

Customer Relationship Management Key Players

Lead, Account, Contact, Sales Opportunity (https://gyazo.com/7475f2b52240bda1ed0710f3824e3d40)

Manager - - ensuring the delivery of all IT projects, on time and within budget

Leader -ensures the strategic vision of IT is in line with the strategic vision of the organization Communicator - building and maintaining strong executive relationships

Outsourcing Challenges

Length of contract -Difficulties in getting out of a contract -Problems in foreseeing future needs -Problems in reforming an internal IT department after the contract is finished Threat to competitive advantage Loss of confidentiality

Retail

Less than 5 percent of retails sales occur online. eBay was on track in 2003 to become one of the nation's top 15 retailers, and Amazon.com will join the top 40. Wal-Mart's e-business strategy is forcing rivals to make heavy investments in technology.

Map Automation

Links business assets to a centralized system where they can be tacked and monitored over time

GIS map automation

Links business assets to a centralized system where they can be tracked and monitored over time

Marketing and operational CRM technology

List generator, campaign management, cross-selling and up-selling

packet header

Lists destination of packet, along with the length of the message. Also contains error-checking information

Website bookmark

Locally stored URL or the address of a file or Internet page saved as a shortcut

Support value activities

Located along the top of the value chain these support the primary value activities; includes firm infrastructure, human resource management, technology development, and procurement

data model

Logical data structures that detail the relationships among data elements using graphics or pictures.

attenuation

Loss of network signal strength (measured in decibels) as signal travels over increasingly longer distances

database

Maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).

Human resources

Maintains policies, plans, and procedures for the effective management of employees

Accounting and finance ERP components

Manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management. Credit-management feature.

chief intellectual property officer

Manage and defend intellectual property, copyrights, and patents.

What is the function of CIO?

Manage, leader, communicator

What is MIS?

Management Information Systems (MIS) is a business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making and problem solving.

strategic level

Managers develop overall business strategies, goals, and objectives as part of the company's strategic plan.

five forces

Managers use three common tools to analyze competitive intelligence and develop competitive advantages including; The _____ _____ model, the three generic strategies, value chain analysis

three generic

Managers use three common tools to analyze competitive intelligence and develop competitive advantages including; The five forces model, the _____ _____ strategies, value chain analysis

value chain

Managers use three common tools to analyze competitive intelligence and develop competitive advantages including; The five forces model, the three generic strategies, _____ _____ analysis

Operations management

Manages the process of converting or transforming resources into goods or services

Social networking analysis (SNA)

Maps group contacts (personal and professional) identifying who knows each other and who works together. It can also identify key experts with specific knowledge such as how to solve a complicated programming problem or launch a new product.

packet footer

Marks the end of the packet, and contains error-checking information

Goods

Material items or products that customers will buy to satisfy a want or need

Goods

Material items or products that customers will buy to satisfy a want or need. [Clothing, groceries, cell phones, and cars are all examples of goods that people buy to fulfill their needs.]

G I G O

Means Garbage In Garbage OUt

Inventory replenishment cycle time

Measure of the manufacturing cycle time plus the time included to deploy the product to the appropriate distribution center; a Supply Chain Management (SCM) metric

Effectiveness MIS metrics

Measure the impact MIS has on business processes and activities; focuses on how well a firm is achieving its goals and objectives; doing the right things; Setting the right goals and objectives and ensuring they are accomplished

Business Process Improvement

Measure what matters most to customers Monitor the performance of key business processes Assign accountability for process improvement

Customer satisfaction

Measured by satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer; an effectiveness metric

Metrics

Measurements of that evaluate results to determine whether a project is meeting it's in goals

metrics

Measurements that evaluate results to determine whether a project is meeting its goals.

Interactivity

Measures advertising effectiveness by counting

effectiveness MIS metric

Measures the impact MIS has on business processes and activities including customer satisfaction, conversion rates, and sell-through increases.

Information reach

Measures the number of people a firm can communicate with all over the world.

Efficiency MIS metrics

Measures the performance of MIS; focuses on how well a firm is achieving its goals and objectives; doing things right; getting the most from each resource

efficiency MIS metric

Measures the performance of the MIS system itself including throughput, speed, and availability.

New eBusiness Trends Include

Mobile Commerce, Telematics, Electronic Tagging, and Radio Frequency Identification (RFID).

decision support system (DSS)

Model information using OLAP, which provides assistance in evaluating and choosing among different courses of action.

security breach

Most information security breaches result from people misusing an organizaton's information either Intentionally or Inadvertently. misuse of passwords

Multiple-in/Multiple-out Technology

Multiple transmitters and receivers allow sending and receiving greater amounts of data than traditional networking devices

Financial Services

Nearly every public e-finance company remaining makes money, with online mortgage service LendingTree growing 70 percent a year. Processing online mortgage applications is now 40 percent cheaper for customers.

Example of Disruptive Technology

Netflix vs Blockbuster or USB Flash Drives vs. CDs

Increased Focus on Integration Cont...2

Never before have IT investments played such a critical role in business success. As business strategies continue to evolve, the distinction between "the business" and "IT" will virtually disappear.

Unidentified visitor

No information about the visitor is available

Marketing

Number of marketing campaigns, new customer retention rates, number of responses by marketing campaign, number of purchases by marketing campaign, revenue generated, cost for interaction, number of new customers acquired, customer retention rate, and number of new leads by product are all _____ metrics.

Sales

Number of prospective customers, number of new customers, number of retained customers, number of open leads, number of sales calls, number of sales calls per lead, amount of new revenue, amount of recurring revenue, and number of pro Pozo's given are all _____ metrics.

Inventory turns (turnover)

Number of times that a company inventory cycles per year; One of the most commonly used Supply Chain Management (SCM) metric

Unique visitors

Number of unique visitors to a site in a given time, used by Nielson/Net ratings to rank the most popular websites

Total hits

Number of visits to a website, many of which may be by the same visitor.

Payback method

Number of years to recoup the cost of an initiative based on projected annual net cash flow

semistructured decisions

Occurs in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision.

unstructured decisions

Occurs in situations in which no procedures or rules exist to guide decision makers toward the correct choice.

Disintermediation

Occurs when a business sells directly to the customer online and cuts out the intermediary

First-Mover Advantage

Occurs when a company can significantly increase its market share by being first with a new competitive advantage

Differentiation

Occurs when a company develops unique differences in its products or services with the intent to influence demand.

Personalization

Occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person

Personalization

Occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person. Ex: Amazon

Asset Tracking

Occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention

Paradigm shift

Occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave. Ebusiness created a paradigm shift.

First-mover advantage

Occurs when an organization can significantly impact its market share by being first to market with a competitive advantage

Bullwhip Effect

Occurs when distorted product demand information passes from one entity to the next throughout the supply chain.

information silo

Occurs when one business unit is unable to freely communicate with other business units making it difficult or impossible for organizations to work cross-functionally

Edge Matching

Occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match

regional service providers (RSP's)

Offer Internet service by connecting to NSP's, but can also connect directly to each other

threat of new entrants

One of Porter's five forces, high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market.

Rivalry among existing competitors

One of Porter's five forces; high when competition is fierce in a market and low when competitors are more complacent.

supplier power

One of Porter's five forces; measures the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services).

Reputation system

One of the most popular forms of user-generated content where buyers post feedback on sellers.

Unique visitor

One who can be recognized and counted only once within a given period of time

Blog (or web log)

Online journal that allows users to post their own comments, graphics, and video.

Outsourcing Models

Onshore Nearshore Offshore

Ebusiness Forms - Portals

Operate Central website for users to access specialized content and other services Example: Google.com

Portals (ebusiness form)

Operate central website for users to access specialized content and other services (google.com, yahoo.com, etc.)

departments

Operating cross-functionally means integrating the operations of all ________.

Two types of CRM

Optional and analytical

Operations management

Ordering inventory, creating production schedules, and manufacturing goods are examples of business processes in the _____ _____ department.

ORGANIZATIONAL STRUCTURES

Organizational employees must work closely together to develop strategic initiatives that create competitive advantages.

Protecting Intellectual Assets

Organizational information is intellectual capital - it must be protected .

Increased Focus on Integration

Overall, core business relationships and models are changing: Product-centricity to customer-centricity, Mass production to mass customization, The value in material things to the value of knowledge and intelligence.

Project Planning Diagrams

PERT GANTT

Out of th Relationship among People, Information, and Information Technology which one is the most important

People

Sales

Performs the function of selling goods or services

Wireless Communication Network Categories

Personal Area Network (PAN) Wireless Local Area Network (WLANs) Wireless Metropolitan Area Network (WMANs) Wireless Wide Area Network (WWANs)

The Five Basic Supply Chain Activities

Plan, Source, Make, Deliver, Return (https://gyazo.com/5bb784bbf8c6ba96a1b1bfa2050d21d1)

SDLC Life Cycle

Planning Analysis Design Development Testing Implementation Maintenance

leadership

Porter has identified three generic business strategies for entering a new market broad cost _____, broad differentiation, and focused strategy

differentiation

Porter has identified three generic business strategies for entering a new market; broad cost leadership, broad _____, and focused strategy

focused

Porter has identified three generic business strategies for entering a new market; broad cost leadership, broad differentiation, and _____ strategy

To remain successful, organizations must...

Porter's Five Forces, the three generic strategies, and value chain analysis to adopt new business strategies

To remain sucessful, and organizatios should use what?

Porters's Five Forces, the three generic strategies, and value chanin analysis to adopt new business strategies.

infographics (information graphics)

Present the results of data analysis, displaying the patterns, relationships, and trends in a graphical format.

Example of C2B

Priceline.com because consumers set prices and wait for seller to accept

national service providers (NSP's)

Private companies that own and maintain the worldwide backbone that supports the Internet

Transaction brokers (ebusiness form)

Process online sales transactions (etrade.com, fidelity.com, etc)

Ebusiness Forms - Transaction Brokers

Process online sales transations Example: Fidelity.com

distributed computing

Processes and manages algorithms across many machines in a computing environment.

Sustaining Technology

Produces an improved product customers are eager to buy

Sustaining technology

Produces an improved product customers are eager to buy, such as a faster car or larger hard drive. Tends to provide better, faster, and cheaper products in established markets.

Core Business Relationships and Models Are Changing

Product-Centricity to Customer-Centricity Mass production to mass customization The value in material things to the value of the knowledge and intelligence

PERT Chart

Program Evaluation and Review Technique; Depicts a project's tasks and relationship between them Rely on dependencies and critical path

Marketing and sales

Promotes, prices, and sells products to customers

Marketing and sales

Promotes, prices, and sells products to customers; primary value activity

Marketing sales

Promoting of discounts, communicating marketing campaigns, attracting customers, and processing sales are examples of business processes of the _____ & _____ departments.

high-speed Internet cable connections

Provide Internet access using a cable company's infrastructure and a special cable modem

Ebusiness Forms - Service Providers

Provide services such as photo sharing, video sharing, online backup and storage Example: Youtube.com

Ebusiness Forms - Infomediaries

Provide specialized information on behalf of producers of goods and services and their potential customers Examples: Zillow.com; Bloomberg.com

Rational Unified Process (RUP) Methodology

Provides a framework for breaking down the development of software into four gates

rational unified process (RUP) methodology

Provides a framework for breaking down the development of software into four gates Gate One: Inception Gate Two: Elaboration Gate Three: Construction Gate Four: Transition

World Wide Web (WWW)

Provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML

Personal Area Network

Provides communication for devices owned by a single user that work over a short distance

personal area network (PAN)

Provides communication for devices owned by a single user that work over a short distance

Service

Provides customer support

Service

Provides customer support after the sale of goods and services; primary value activity

Human resource management

Provides employee training, hiring, and compensation

digital subscriber line (DSL)

Provides high-speed digital transmission over standard telephone lines using broadband modem technology (allowing both Internet & phone service to work over same phone lines)

Service providers (ebusiness form)

Provides services such as photo sharing, video sharing, online backup, and storage (YouTube, Mapquest, etc.)

Infomediaries (ebusiness form)

Provides specialized information on behalf of producers of goods and services and their potential customers (bizrate.com, zillow.com, etc.)

Procurement

Purchases inputs such as raw materials, resources, equipment, and supplies

Key Performance Indicator (KPI)

Quantifiable metrics a company uses to evaluate progress toward critical success factors.

passive RFID tags

RFID tags that don't have their own power source

active RFID tags

RFID tags that have their own power source

semi-passive RFID tags

RFID tags that use a battery to run microchip circuitry, but communicate by drawing power from RFID reader

Wireless Business Applications

RFID, GPS, GIS

data

Raw facts that describe the characteristics of an event or object

data

Raw facts that describe the characteristics of an event or object: order date, amount sold, customer number, quantity ordered

Data

Raw facts that describe the characteristics of an event.

PRM applications

Real-time product information on availability, marketing materials, contracts, order details, and pricing, inventory, and shipping information.

repeater

Receives and repeats a signal to prevent attenuation of signal over longer distances

Organizations Must

Recognize the immense power of technology Carry out required organizational changes Learn to operate in an entirely different way

21st Organizations Must

Recognize the immense power of technology, Carry out required organizational changes, Learn to operate in an entirely different way.

Accounting

Records, measures, and reports monetary transactions

What information technology projects goals has the most value

Reducing Cost/Improve Productivity

downtime

Refers to a period of time when a system is unavailable.

Open source

Refers to any software whose source code is made available free for any third party to review and modify

Business Intelligence (BI)

Refers to applications and technologies that are used to gather, provide access to, and analyze data and information to support decision-making efforts.

machine-to-machine (M2M)

Refers to devices that connect directly to other devices

ediscovery

Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

Cybermediation

Refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank.

Information richness

Refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information

granularity

Refers to the level of detail in the model or the decision-making process.

Social Media

Refers to websites that rely on user participation and user-contributed content.

Static Report

Report that is created once based on data that does not change

Enterprise application integration (EAI) middleware

Represents a new approach to middleware by packaging together commonly used functionality, such as providing prebuilt links to popular enterprise applications, which reduces the time necessary to develop solutions that integrate applications from multiple vendors. *Active software, Vitria Technology, and Extricity

Project Milestone

Represents key dates when a certain group of activities must be performed

As-Is process models

Represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes.

Chief Information Officer (CIO)

Responsible for (1) overseeing all uses of information technology and (2) ensuring the strategic alignment of MIS with business goals and objectives.

chief knowledge officer (CKO)

Responsible for collecting, maintaining, and distributing company knowledge

Chief Knowledge Officer (CKO)

Responsible for collecting, maintaining, and distributing the organization's knowledge.

Chief Data Officer (CDO)

Responsible for determining the types of information the enterprise will capture, retain, analyze, and share.

Chief Privacy Officer (CPO)

Responsible for ensuring the ethical and legal use of information within an organization.

Chief Security Officer (CSO)

Responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers and viruses.

chief technology officer (CTO)

Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT

Chief Technology Officer (CTO)

Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology.

Customer-Facing Process

Results in a product or service that is received by an organization's external customer.

affinity grouping analysis

Reveals the relationship between variables along with the nature and frequency of the relationships.

Loyalty Programs

Reward customers based on their spending

Loyalty programs

Rewards customers based on their spending; can reduce buying power.

Backbone of eBusiness

SCM, CRM, ERP

Sales and operational CRM technology

Sales management, contact management, opportunity management

Customer Relationship Management (CRM)

Sales metrics, service metrics, and marketing metrics are all ____ ____ ____ metrics.

Friedman

Says around the year 2000 a flat world was created based off a global, web enabled platform for multiple forms of sharing knowledge and work, irrespective of time, distance, geography, and increasingly, language.

What is SSL?

Secure Sockets Layers: donted by th lock symbol in the lower right corner of a browser window and or he "s" in https; SSL is 128 bits. 128bit=2^128

Application Programming Interface (API)

Set of routines, protocols, and tools for building software applications.

Middleware

Several different types of software that sit between and provide connectivity for two or more software applications translates information between disparate systems

Middleware

Several different types of software that sit in the middle of and provide connectivity between two or more software applications. Middleware translates information between disparate systems.

To-Be process models

Shows the results of applying change improvement opportunities to the current (As-Is) process model.

Folksonomy

Similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system.

artificial intelligence (AI)

Simulates human intelligence such as the ability to reason and learn.

Consumer to Consumer (C2C)

Sites primarily offering goods and services to assist consumers interacting with each other over the internet. Ebay

knowledge

Skills, experience, and expertise coupled with information and intelligence that creates a person's intellectual resources

Knowledge

Skills, experience, and expertise coupled with information and intelligence that creates a person's intellectual resources.

Knowledge

Skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources

knowledge

Skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources: listing products that are about to expire first on the menu or creating them as a dialy special to move product

E- COUNTERFEIT SOFTWARE

Software that is manufactured to look like the real thing and sold as such.

counterfeit software

Software that is manufactured to look like the real thing and sold as such.

proxy

Software that prevents direct communication between a sending and receiving computer

shopping bot

Software that will search several retailer websites and provide a comparison of each retailer's offerings including price and availability.

adware

Software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

virus

Software written with malicious intent to cause annoyance or damage. (https://gyazo.com/36a5ef235c3507229f22d54d4cfb9a3e)

Geocoding

Spatial databases in a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID or classification

cable modem (broadband modem)

Special type of digital modem used with high-speed Internet cable service

SMART objectives

Specific Measurable Agreed Upon Realistic Time-bound

Tags

Specific keywords or phrases incorporate into website content for means of classification or taxonomy.

worm

Spreads itself not only from file to file but also from computer to computer.

Reintermediation

Steps are added to the value chain as new players find ways to add value to the business process.

Website Visit Metrics

Stickiness (visit duration time) Raw Visit depth (total web pages exposure per session) Visit Depth (total unique web pages per session)

entity

Stores information about a person, place, thing, transaction, or event.

Geographic Information System

Stores, views, and analyzes geographic data creating, multidimensional charts or maps

crossfunctionally

Successful companies operate _______, integrating the operations of all departments.

Current CRM trends

Supplier Relationship Management (SRM) Partner Relationship Management (PRM) Employee Relationship Management (ERM)

Procurement

Support value activity purchasing inputs such as raw materials, resources, equipment, and supplies.

Analytical CRM

Supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers.

Marketing

Supports sales by planning, pricing, and promoting goods or services

Knowledge Management System (KMS)

Supports the caturing, organization, and dissemination of knowledge throughout an organization.

Operational CRM

Supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers.

geographic information system (GIS)

System that stores, views, and analyzes geographic data, creating multidimensional charts or maps.

Elements of an RFID System

Tagged Products RFID Reader/Writer Network Computer System

forward integration

Takes information entered into a given system and sends it automatically to all downstream systems and processes.

backward integration

Takes information entered into a given system and sends it automatically to all upstream systems and processes.

Example of Click-and-Mortar

Target

Services

Tasks performed by people that customers will buy to satisfy a want or need.

Services

Tasks performed by people that customers will buy to satisfy a want or need. Waiting tables, teaching, and cutting hair are all examples of services that people pay for to fulfill their needs

Radio frequency identification (RFID)

Technologies use active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers.

Challenges of Business 2.0

Technology Dependence Information Vandalism Violations of Copyright and Plagiarism

Challenges of Business 2.0

Technology Dependency Information Vandalism Violations of Copyright and Plagiarism

broadband over power line (BPL)

Technology that makes high-speed Internet access possible over ordinary residential electrical lines

wireless fidelity (Wi-Fi)

Technology which allows portable devices to connect wirelessly to a local area network (LAN) using access points that send and receive data via radio waves

SCM, CRM, ERP AND BPR

The 4 strategic initiatives

Buyer power, supplier power, threat of substitute product o services, threat of new entrants, rivalry among existing competiors

The Five Forces Model

mass customization

The ability of an organization to tailor its products or services to the customers' specifications

Mass customization

The ability of an organization to tailor its products or services to the customers' specifications. Custom M&Ms, etc.

Buyer Power

The ability of buyers to affect the price they must pay for an item

Buyer power

The ability of buyers to affect the price they must pay for an item; one of porters five forces

Mobile business (mbusiness, mcommerce)

The ability to purchase goods and services through a wireless Internet-enabled device

Mobile Commerce

The ability to purchase goods and services through a wireless Internet-enabled device.

Mobile Business (mbusiness or mcommerce)

The ability to purchase goods and services through a wireless internet-enabled device.

Supply Chain Visibility

The ability to view all areas up and down the supply chain.

Business Process Model

The activity of creating a detailed flow chart or process map of a work process showing its inputs, tasks, and activities, in a structured sequence

business process modeling (or mapping)

The activity of creating a detailed flowchart or process map of a work process, showing its inputs, tasks, and activities in a structured sequence.

Universal Resource Locater (URL)

The address of a file or resource on the web

Throughput

The amount of information that can travel through a system at any point in time; an efficiency metric

Transaction speed

The amount of time a system takes to perform a transaction; an efficiency metric

Business process reengineering (BPR)

The analysis and redesign of work flow within and between enterprises

business process reengineering (BPR)

The analysis and redesign of workflow within and between enterprises.

Customer order promised cycle time

The anticipated or agreed-upon cycle time of a purchase order, a gap between the purchase order creation date and the requested delivery date; a Supply Chain Management (SCM) metric

fast data

The application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value.

confidentiality

The assurance that messages and information are available only to those who are authorized to view them.

BPR and ERP

The balanced scorecard was developed by Drs. Robert Kaplan of the Harvard Business School and David Norton. Which systems does the balanced scorecard measure?

transaction processing system (TPS)

The basic business system that serves the operational level (analysts) in an organization.

7

The best practice is no more than ___, + or - 2, metrics out of the hundreds possible should be used at any given management level

Effectiveness IT metrics

The best way to measure ebusiness success. Revenue generated by web traffic, number of new customers acquired by web traffic, and reductions in customer service calls resulting from web traffic.

online transaction processing (OLTP)

The capturing of transaction and event information using technology to (1) process the information according to defined business rules, (2) store the information, and (3) update existing information to reflect the new information.

data aggregation

The collection of data from various sources for the purpose of data processing.

cube

The common term for the representation of multidimensional information.

Cost benefit analysis

The comparison of projected revenues and costs including development, maintenance, fixed, and variable

combination

The competitive advantage decision for the firm is whether to target high value adding activities to further enhance their value, target low value adding activities to increase their value, or perform some _____ of the two.

Access Point

The computer or network device that serves as an interface between devices and the network

access point (AP)

The computer or network device that serves as an interface between devices and the network. Each computer connects to the access point, and then to other computers on the network

Fact

The confirmation or validation of an event or object.

fact

The confirmation or validation of an event or object; previously learned from books but now available within a click of a button.

Automobiles

The cost of producing vehicles is down because of SCM and Web based purchasing. eBay has become the leading U.S. used-car dealer, and most major car sites are profitable.

virtualization

The creation of a virtual (rather than actual) version of computing resources, such as an operating system, a server, a storage device, or network resources.

Order to delivery

The cross functional business process that focuses on the entire customer order process across functional departments (marketing, sales, op mgt, acc & fin, cust service).

attribute

The data elements associated with an entity.

Finance

The department, or functional area, that deals with strategic financial issues including money, banking, credit, investments, and assets; monetary data

Human resources

The department, or functional area, that maintains policies, plans, and procedures for the effective management of employees; employee data

Operations management

The department, or functional area, that manages the process of converting or transforming or resources into goods or services; productions data

Sales

The department, or functional area, that performs the function of selling goods or services; transactional data

Accounting

The department, or functional area, that records, measures, and reports monetary transactions; monetary data

Marketing

The department, or functional area, that supports sales by planning, pricing, and promoting goods or services; transactional data

MIS skills gap

The difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies.

information redundancy

The duplication of data, or the storage of the same data in multiple places.

Return on investment (ROI)

The earning power of an organization's assets

Usability

The ease with which people perform transactions and/or find information; an effectiveness metric

network convergence

The efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures

Information accuracy

The extent to which a system generates the correct results when executing the same transaction numerous times; an efficiency metric

Extended ERP Components

The extra components that meet the organizational needs not covered by the core components and primarily focus on external operations.

IT Infrastructure

The hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals.

Focus on Integration

The integration of business and technology has allowed organizations to increase their share of the global economy, transform the way they conduct business, and become more efficient and effective.

unified communications (UC)

The integration of communication channels into a single service

copyright

The legal protection afforded an expression of an idea, such as a song, book, or video game.

E- COPYRIGHT

The legal protection afforded an expression of an idea, such as a song, video games, and some types of proprietary documents.

Stickiness

The length of time a visitor spends on a website

Supply Chain Management (SCM)

The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and profitability

online analytical processing (OLAP)

The manipulation of information to create business intelligence in support of strategic decision making.

bandwidth

The maximum amount of data that can pass from one point to another in a unit of time (similar to water flowing through a hose)

Critical success factors (CSF)

The metric of crucial steps companies perform to achieve their goals and objectives's and implement their strategies (Exp: create high quality products, retain competitive advantages, reduce product costs, increase customer satisfaction, hire and retain the best business professionals); can have serval KFIs

Knowledge Management (KM)

The most common form of collective intelligence found inside an organization. Involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions.

Best practices

The most successful solutions or problem-solving methods that have been developed by a specific organization or industry

Entertainment

The music industry has kept Napster and others from operating, but $35 billion annual online downloads are wrecking the traditional music business. U.S. music unit sales are down 20 percent since 2000. The next big entertainment industry to feel the effects of e-business will be the $67 billion movie business.

IEEE 802.11n (Wireless-N)

The newest standard for wireless networking promulgated by IEEE. Offers faster speeds, more flexibility, and greater range

bit rate (data rate)

The number of bits transferred or received per unit of time

Conversion rates

The number of customers and organization "touches" for the first time and persuades to purchase its products or services. A popular metric for evaluating the effectiveness of banner, pop up, and pop under ads on the Internet; an effectiveness metric

System availability

The number of hours a system is available for users; an efficiency metric

Systems Development Life Cycle (SDLC)

The overall process for developing information systems from planning and analysis through implementation and maintenance

Executive sponsor

The person or group who provides the financial resources for the project

content creator

The person responsible for creating the original website content.

Process Owner

The person responsible for the end-to-end functioning of a business process.

content editor

The person responsible for updating and maintaining website content.

physical view of information

The physical storage of information on a storage device such as a hard disk.

Break even point

The point at which revenues equal costs; all sales over produce profits, any drop in sales below will produce losses

Social Networking

The practice of expanding your business and/or social contacts by constructing a personal network

Microblogging

The practice of sending brief posts (140-200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text message. Main advantage os microblogging is that posts can be submitted by a variety of means.

War Chalking

The practice of tagging pavement with codes displaying where Wi-Fi access is available

Information Age

The present time, during which infinite quantities of facts are widely available to anyone who can use a computer

data mining

The process of analyzing data to extract information not offered by the raw data alone.

data profiling

The process of collecting statistics and information about data in an existing source.

benchmarking

The process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance.

Competitive intelligence

The process of gathering information about the competitive environment to improve the company's ability to succeed

Competitive intelligence

The process of gathering information about the competitive environment, including competitors plans, activities, and products, to improve a companies ability to succeed

Competitive Intelligence

The process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed

anomoly detection

The process of identifying rare or unexpected items or events in a data set that do not conform to other items in the data set.

classification analysis

The process of organizing data into categories or groups for its most effective and efficient use.

data replication

The process of sharing information to ensure consistency between multiple data sources.

Production

The process where a business takes raw materials and processes them or converts them into a finished product for it's good for services

Production

The process where a business takes raw materials and processes them or converts them into a finished product for its goods or services

mutation

The process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome.

market share

The proportion of the market that a firm captures.

Market share

The proportion of the market that a firm captures; A common external KPI; =firms sales/total industry market sales

Key performance indicators (KPI)

The quantifiable metrics a company uses to evaluate progress toward critical success factors (Exp: turnover rates of employees, percentage of helpdesk calls answered in the first minute, number of product returns, number of new customers, average customer spending); more specific

Productivity

The rate at which good and services are produced based upon total output given total inputs.

Productivity

The rate at which goods and services are produced based upon total output given total imputs

Productivity

The rate at which goods and services are produced based upon total output given total inputs

Internal rate of return (IRR)

The rate at which the net present value of an investment equals zero

privacy

The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

relational integrity constraint

The rules that enforce basic and fundamental information-based constraints.

integrity constraint

The rules that help ensure the quality of information.

cartography

The science and art of making illustrated maps or charts

Analytics

The science of fact-based decision making

Taxonomy

The scientific classification of organisms into group based on similarities of structure or origin. A well planned taxonomy ensures search and navigation are easy and user-friendly.

Information Architecture

The set of ideas about how all information in a given context should be organized.

bit

The smallest element of data, which has a value of 1 or 0

data element (or data field)

The smallest or basic unit of information.

sensitivity analysis

The study of the impact on other variables when one variable is changed repeatedly.

Supplier power

The suppliers ability to influence the prices they charge for supplies by charging higher prices, limiting quality or services, or shifting costs to industry participants.

Supplier Power

The suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services)

New

The threat of _____ entrants is high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market

data latency

The time it takes for data to be stored or retrieved.

Response time

The time it takes to respond to user interactions such as a mouse click; an efficiency metric

pirated software

The unauthorized use, duplication, distribution, or sale of copyrighted software.

E- PIRATED SOFTWARE

The unauthorized use, duplication, distribution, or sales of copyrighted software.

augmented reality

The viewing of the physical world with computer-generated layers of information added to it.

Crowdsourcing

The wisdom of the crowd

Strategic Information Systems (SIS)

This provide a competitive advantage by helping an organization to implement its strategic goals and to increase its performance and productivity. For example, barcode scanning technology is MIS, but the use of the date collected by them is SIS.

Focused Strategy

This strategies concentrate on either cost leadership or differentiation

software

Thomas Friedman's top three forces that flattened the world are the fall of the Berlin Wall, Netscape IPO, work flow _____.

Netscape

Thomas Friedman's top three forces that flattened the world are the fall of the Berlin Wall, _____ IPO, work flow software.

Berlin

Thomas Friedman's top three forces that flattened the world are the fall of the _____ Wall, Netscape IPO, work flow software.

Substitute

Threat of _____ products or services is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose.

Porter's Five Forces Model

Threat of new entrant: A dog walking business Rivalry Among Existing Competitors: A coffee shop Threat of Substitute Products or services: Coffee from McDonalds buyer power: A single consumer buying milk supplier power: A company that makes pencils

Common Types of Efficiency Metrics

Throughput, Transaction Speed, System Availability, Information Accuracy, Response Time (https://gyazo.com/9ca7aab51fa1eb2f1f538d4d0647e484)

Triple Constraints of Project Management

Time Resources Scope

information age

Time when infinite quantities of facts are widely available to anyone who can use a computer; core drivers are data, information, business intelligence, and knowledge.

Visit depth

Total unique web pages exposure per session

Raw visit depth

Total web pages exposure per session

Human resources ERP components

Track employee information including payroll, benefits, compensation, and performance assessment, and assure compliance with the legal requirements of multiple jurisdictions and tax authorities.

business intelligence dashboard

Tracks corporate metrics such as critical success factors and key performance indicators and includes advanced capabilities such as interactive controls, allowing users to manipulate data for analysis.

digital dashboard

Tracks key performance indicators (KPIs) and critical success factors (CSFs) by compiling information from multiple sources and tailoring it to meet user needs.

Core ERP components

Traditional components included in most ERP systems and they primarily focus on internal operations

Business processes

Transforms a set of inputs into a set of outputs (goods/services) for another person or process by using people and tools

Operations

Transforms raw materials or inputs into goods and services

Operations

Transforms raw materials or inputs into goods or services; primary value activity

Gate 4 of RUP

Transition

Travel

Travel site Expedia.com is now the biggest leisure-travel agency, with higher profit margins than even American Express. Thirteen percent of traditional travel agencies closed in 2002 because of their inability to compete with online travel.

Industries that have changed due to technology

Travel, Entertainment, Electronics, Financial services, Retail, Automobiles, Education and training

21st Century Business Trends

Uncertainty in terms of future business scenarios and economic outlooks, Emphasis on strategic analysis for cost reduction and productivity enhancements, Focus on improved business resiliency via the applications of enhanced security.

alternative

Understanding business processes, workflow, customers expectations, and the competitive environment provides managers with the necessary ingredients to design and evaluate _____ business processes in order to maintain competitive advantages.

Common Types and Effectiveness Metrics

Usability, Customer Satisfaction, Conversion Rates, Financial (https://gyazo.com/86c7b01b9dd81c65d352e0fe7f3d89f9)

Semi-passive RFID Tags

Use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID readers

location-based services (LBS)

Use of GPS & GIS together to provide a service (navigation, vehicle location, weather information, etc.)

asset tracking

Use of RFID tags by a company on expensive products or equipment to gather data on their location (for supply chain management or theft reduction)

Chipless RFID Tags

Use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip

RFID accelerometer

Used in vehicles to measure acceleration

structured query language

Users write lines of code to answer questions against a database.

automatic vehicle location (AVL)

Uses GPS to track vehicles with a receiver in the car that links to a control center.

Automatic Vehicle Location

Uses GPS tracking to track vehicles

voice over IP (VoIP)

Uses IP (Internet protocol) technology to tansmit telephone calls

Static Process

Uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously

data-mining tool

Uses a variety of techniques to find patterns and relationships in large volumes of information and infer rules from them that predict future behavior and guide decision making.

Supply Chain Planning (SCP) software

Uses advanced mathematical algorithms to improve the flow and efficiency of the supply chain while reducing inventory.

radio-frequency identification (RFID)

Uses electronic tags and labels to identify objects wirelessly over short distances

chipless RFID

Uses plastic or conductive polymers instead of silicon microchips in RFID tags, allowing them to be washed or exposed to water

Scrum Methodology

Uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervles, to achieve an appointed goal

Electronics

Using the Internet to link suppliers and customers, Dell dictates industry profits. Its operating margins have risen from 7.3 percent in 2002 to 8 percent in 2003, even as it takes prices to levels where rivals cannot make money.

intelligent system

Various commercial applications of artificial intelligence.

Value chain analysis

Views a firm as a series of business processes that each add value to the product or service

value chain analysis

Views a firm as a series of business processes that each add value to the product or service

What factors drive supply chain management?

Visibility, Consumer Behavior, Competition, Speed

Website Metrics

Visitor metrics Visit metrics Hit metrics

SCM software enable an organizatin to generate efficiencies within steps by automating and improving the information flows

Wal-art and Procter&Gamble(P&G) implemented a tremedously successful SCM system. the system linked Wal-Mar's distribution centers directly to P&G manufacturing centers. Every time a Wal-Mart customer purchase a P&G product, the systm sends a message directly to the factory alerting P&G to restock the product. The SCM system saves time, reduces inventory, and decreases order processing costs for P&G. P&G passes on these savins to Wal-Mart i the form of discounted prices.

Software Development Methodologies

Waterfall Agile Rapid Application Development (RAD) Extreme Programming Rational Unified Process (RUP) Scrum

Page exposures

Website metric of average number of page exposures to an individual decision

Abandoned shopping carts

Website metric of number of visitors who create a shopping cart and start shopping and then abandon the activity before paying for the merchandise

Abandoned registrations

Website metric of number of visitors who start the process of completing a registration page and then abandon the activity

Conversion rate

Website metric of percentage of potential customers who visit a site and actually buy something

Click through rate

Website metric of the count of the number of people who visit a site, click on an ad, and are taking to the site of an advertiser

Cost per thousand (CPM)

Website metrics of sales dollars generated per dollar advertising, commonly used to make the case for spending money to appear on a search engine

Mashup Editors

What You See is What You Get tools (WYSIWYG). Drag and drop data points into web application.

Systems thinking

What is a way of monitoring an entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part?

Feedback

What is information that returns to its original transmitter and modifies the transmitter's actions?

Effectiveness IT metrics

What measures the impact IT has on business processes and activities including customer satisfaction, conversion rates, and sell-through increases?

CRM

What type of metrics includes number of marketing campaigns, new customer retention rates, and number of feedbacks by marketing campaign?

Efficiency MIS metrics

What type of metrics measure throughput, speed, and availability?

Effectiveness MIS metrics

What types of metrics measure customer satisfaction?

Primary value activities

Which part of the value chain acquires raw materials and manufactures, delivers, markets, sells, and provides after-sales services?

Business Process Improvement

Will double the gains of a project by streamlining outdated practices, enhancing efficiency, Promoting compliance and standardization, Making an organization more agile

wireless MAN (WMAN)

Wireless metropolitan area network. It uses radio signals to transmit and receive data

Effectiveness

_____ M I S metrics are determined according to and organizations goals, strategies, and objectives.

Efficiency incorrectly

_____ M I S metrics are far easier to measure so most managers tend to focus on them, often _____, to measure the success of M I S projects.

Management information

_____ _____ systems is a business function, like accounting or human resources, that moves information about people, products, and processes across the company to facilitate decision making and problem solving. AKA: information technology or information systems

Rilvalry

_____ among existing competitors is high when competition is fierce in a market and low when competitors are more complacent.

benchmarks

_____ are baseline values the system seeks to attain.

efficiency

_____ focuses on the extent to which an organization is using its resources in an optimal way.

Benchmarks

_____ help assess how an M I S project performs over time.

Management

_____ information systems adds value to both primary and support value activities.

Information Security

a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization

Click-and-Mortar Business

a business that operates in a physical store and on the internet

Brick-and-Mortar Business

a business that operates in a physical store without an internet presence

Pure-Play

a business that operates on the internet only without a physical store

big data

a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools

system

a collection of parts that link to achieve a common purpose

record

a collection of related data elements

Internet Service Provider (ISP)

a company that provides access to the inrernet for a monthly fee (AOL, AT&T, etc.)

Click-Through

a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser

variable

a data characteristic that stands for a value that changes or varies over time

report

a document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information

Peter Drucker

a famous management guru, once stated that if you cannot measure it, you cannot manage it

competitive advantage

a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors

Semistructured decisions

a few established processes help to evaluate potential situations, but not enough to lead to a definite recommended decision

primary key

a field (or group of fields) that uniquely identifies a given entity in a table

data model

a formal way to express data relationships to a database management system (DBMS)

Management Information System (MIS)

a general name for the business function and academic discipline covering the application of people, technologies, and procedures.

Help Desk

a group of people that respond to users' questions and support users.

business strategy

a leadership plan that achieves a specific set of goals or objectives such as increasing sales, decreasing costs, entering new markets, or developing new products or services

data warehouse

a logical collection of information --gathered from many different operational databases -- that supports business analysis activities and decision-making tasks

Dependency

a logical relationship that exists between the project tasks, or between a project task and a milestone

Internet

a massive network that connects computers all over the world and allows them to communicate with one another

information integrity

a measure of the quality of information

Executive Sponsor

a non IT executive of which is a person or group whom provides the financial resources for the project

stakeholder

a person or group that has an interest or concern in an organization

foreign key

a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables

Benchmarking

a process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifiying steps and procedures to improve syste performance.

extraction, transformation, and loading (ETL)

a process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse

information cleansing or scrubbing

a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information

loyalty program

a program to reward customers based on spending

static report

a report created once based on data that does not change

dynamic report

a report that changes automatically during creation

Collaboration System

a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information

Collaboration system

a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information.

Gantt Chart

a simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally

Model

a simplified representation/abstraction of reality; help to reduce risks and understand uncertainty

Executive information system (EIS)

a specialized DSS that supports senior level executives within the organization; granularity, visualization, and digital dashboard

Business process

a standardized set of activities that accomplish a specific task, such as processing a customer's order

electronic tagging

a technique for identifying and tracking assets and individuals

Project

a temporary activity a company undertakes to create a unique product, service, or result.

Kill Switch

a trigger that enables a project manager to close the project before completion.

relational database model

a type of database that stores information in the form logically related two-dimensional tables

Michael Porter

a university professor at Harvard Business School, identified four competitive forces that can hurt potential sales.

snapshot

a view of data at a particular moment in time

systems thinking

a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part

internet of things

a world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention

informing

accessing large amounts of data from different management information systems

Intermediaries

agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together.

supply chain

all parties involved, directly or indirectly, in obtaining raw materials or a product

integration

allows separate systems to communicate directly with each other

relational database management system

allows users to create, read, update, and delete data in relational database

first-mover advantage

an advantage that occurs when a company can significantly increase its market share by being first to market with a competitive advantage

product differentiation

an advantage that occurs when a company develops unique differences in its products with the intent to influence demand

dynamic catalog

an area of a website that stores information about products in a database

Outsourcing

an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house

data-driven website

an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database

Project Management Office (PMO)

an internal department that oversees all organizational projects

The Ugly Side of CRM

angry customers

Project Deliverable

any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.

Social Network

application that connects people by matching profile information

Business-to-consumer (B2C)

applies to any business that sells its products or services to consumers over the internet

Consumer-to-business (C2B)

applies to any consumer who sells a product or service to a business on the internet

Business-to-business (B2B)

applies to businesses buying from and selling to each other over the internet

Consumer-to-consumer (C2C)

applies to customers offering goods and services to each other on the internet

Value chain

approach views an organization as a series of processes, each of which adds value to the product or service for each customer.

Intermediaries

are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together

Switching costs

are costs that can make customers relcutant to switch to another product or service

Bugs

are defects in the code of an information system.

Intangible Benefits

are difficult to quantify or measure. ie. improved decision making, community service, goodwill, morale

Tangible Benefits

are easy to quantify and typically measured to determine the success or failure of a project. ie. decreased expenses, processing errors, response time, increased quantity or sales and quality.

Fourth generation languages (4GL)

are programming languages that look similar to human languages.

Data

are raw facts that describe the characteristics of an event/information knowledge/business intelligent and competative advantage

Key performance indicators (KPIs)

are the quantifiable metrics a comapny uses to evaluate progress toward critical success factors (more specific than CSFs)

Business Requirements

are the specific business requests the system must meet to be successful, so the analysis phase is critical because business requirements drive the entire systems development effort.

Alpha Testing

assess if the entire system meets the design requirements of the users.

Information Systems Audit Report

assesses a company's information system to determine necessary changes and to help ensure the information systems' availability, confidentiality, and integrity.

Pilot Implementation

assigns a small group of people to use the new system until it is verified that it works correctly, then the remaining users migrate to the new system

Pilot Implementation

assigns a small group of people to use the new system until it is verified that it works correctly; then the remaining users migrate to the new system.

Neural network

attempts to emulate the way the brain works; AI category

benchmarks

baseline values the system seeks to attain

Benchmarks

baseline values the system seesks to attain

Transaction processing system (TPS)

basic business system that serves the operational level (analysts) and assists in making structured decisions; ie payroll system or order-entry system; operational support system

Telematics

blending computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations

Business 2.0 Communication and Collaboration Tools

blog, wiki, mashup

SDLC Testing Phase

brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase

Testing Phase

brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase.

Online transaction processing (OLTP)

capturing transaction and event information using technology to process/store the information, and update to reflect new information; operational support system

attribute

characteristics or properties of an entry class

What-if analysis

checks the impact of a variable change/assumption on the model

Web 2.0 (Business 2.0)

collaboration, sharing, free. user participation and formation of communities that contribute to content.

Search engine optimization (SEO)

combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking

asynchronous communication

communication such as email in which the message and the response do not occur at the same time

data dictionary

compiles all of the metadata about the data elements in the data model

Virtual reality

computer-simulated environment; AI category

Expert system

computerized advisory programs that imitate reasoning processes of experts in solving difficult problems; AI category

Iterative Development

consists of a series of tiny projects

Supply Chain

consists of all parties involved, directly or indirectly, in obtaining raw materials or a product

Supply chain

consists of all parties involved, directly or indirectly, in the procurement of a poduct or raw materials

Open System

consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate with the system

Sign off

consists of the users' actual signatures indicating they approve all of the business requirements.

Executive information system (EIS) capabilities

consolidation, drill-down (enables users to view details), and slice-and-dice (ability to look at information from different perspectives)

Customer Relationship Management (extended ERP component)

contact centers, sales force automation, and marketing functions. Identifies a company's most (and least) valuable customers for better allocation of resources.

data mart

contains a subset of data warehouse information

Source Code

contains instructions written by a programmer specifying the actions to be performed by computer software

Characteristics of Business 2.0

content sharing through open sourcing, user-contributed content, collaboration inside the organization, collaboration outside the organization

nearshore outsourcing

contracting an outsourcing arrangement with a company in a nearby country

Nearshore Outsourcing

contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country.

Switching Costs

costs that make customers reluctant to switch to another product or service

switching costs

costs that make customers reluctant to switch to another product or service

chief user experience officer (CUEO)

create the optimal relationship between user and technology

User-contributed content

created and updated by many users for many users

Critical Success Factors (CSFs)

crucial steps companies perform to achieve their goals and objectives and implement their strategies

Information

data converted into a meaningful and useful context

machine-generated data

data created by a machine without human intervention

human generated data

data that humans, in interactions with computers, generate

Example of Tangible Benefits

decreased expenses decreased processing errors decreased response time increased quantity or sales increased quality

business rule

defines how a company performs a certain aspect of its business and typically results in either a yes/no or true/false answer

80/20 Rule

deliver 80% of benefit for 20% of cost. Finding which 20% of costs will give you 80% of benefits.

data visualization

describes technologies that allow users to "see" or visualize data to transform data information into a business perspective

Project Scope

describes the business need and the justification, requirements, and current boundaries for the project.

Test Conditions

detail the steps the system must perform along with the expected result of each step.

metadata

details about data

User Acceptance Testing (UAT)

determine if the system satisfies the user and business requirements.

chief automation officer (CAO)

determines if a person or business process can be replaced by a robot or software

machine to machine (M2M)

devices that connect directly to other devices

Intangible Benefits

difficult to quantify or measure

Plunge Implementation

discards the legacy system and immediately migrates all users to the new system

Plunge implementation

discards the legacy system and immediately migrates all users to the new system.

infographics (information graphics)

displays information graphically so it can be easily understood

Primary Features of eBusiness Components

eLogistics eProcurement

Longitude

east/west measurement of position

tangible benefits

easy to quantify and typically measured to determine the success or failure of a project

Ebusiness (extended ERP Component)

elogistics and eprocurement. Ebusiness ERP components allow businesses to establish a web presence and fulfill orders expeditiously. Problems can occur if business deploys web presence before integration of back-office systems or an ERP system -- overwhelmed.

Information Discovery (the BEST)

employees across departments are open to new insights about crises and radical changes and seek ways to create competitive advantages.

transactional information

encompasses all of the information contained within a single business process or unit of work, and its primary is to support he performing of daily operational tasks

analytical information

encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks

business-critical integrity constraint

enforces business rules vital to an organization's success and often requires more insight and knowledge than relational integrity constraints

Onshore outsourcing

engaging another company within the same country for services

Onshore Outsourcing

engaging another company within the same country for services.

Information Systems Control Report

ensures the reliability of information, consisting of policies and their physical implementation, access restrictions, or record keeping of actions and transactions.

SDLC - Planning

establishes a high-level plan of the intended project and determines project goals Planning is the first and most critical phase

Design Phase

establishes descriptions of the desired features and operations of the system, including screen layouts, business rules, end users and MIS specialists work together to gather the detailed business requirements for the proposed project from a logical point of view.

Planning Phase

establishes high-level plan of the intended project and determines project goals. Most important phase.

Critical Path

estimates the shortest path through the project ensuring all critical tasks are completed from start to finish

Critical Path

estimates the shortest path through the project ensuring all critical tasks are completed from start to finish.

SWOT analysis

evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies

Search engine ranking

evaluates variables that search engines use to determine where a URL appears on the list of search results.

predictive analytics

extracts information from data and uses it to predict future trends and identify behavioral patterns

Corporate Culture

fear where people do not report bad news to executives and this leaves to the project going south.

Goal-seeking analysis

finds the inputs necessary to achieve a goal (ie desired level of output); revers of what-if analysis

Optimization analysis

finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints; extension of goal-seeking analysis

logical view

focuses on how users logically access information to meet their particular business needs

Supplier Relationship Management

focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects

Partner relationship management (PRM)

focuses on keeping vendors satisfied by managing alliance partner and reseller relationships that provide customers with the optimal sales channel

Pay-per-click

generates revenue each time a user clicks on a link to a retailer's website

porter's three generic strategies

generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service

Object-oriented languages

group data and corresponding processes into objects.

Production and materials management ERP components

handle the various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control

query-by-example (QBE) tool

helps users graphically design the answer to a question against a database

User Documentation

highlights how to use the system and how to troubleshoot issues or problems.

Exception Reporting

highlights situations occurring outside of the normal operating range for a condition or standard. There internal reports include only exceptions and might highlight accounts that are unpaid or delinquent or identify items that are low in stock.

Challenges of Ebusiness

identifying limited market segments, managing consumer trust, ensuring consumer protection, adhering to taxation rules

Data Flow Diagram (DFD)

illustrates the movement of information between external entities and the processes and data stores within the system.

real-time information

immediate, up-to-date information

Digital Darwinism

implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction

Examples of Intangible Benefits

improved decision making, improved community service, improved goodwill, improved morale

entity

in the relational database model, a person, place, thing, transaction, or event about which information is stored

dynamic information

includes data that change based on user actions

static information

includes fixed data that are not capable of change in the event of a user action

Resources

includes people, equipments, material and other costs to complete the project.

return on investments (ROI)

indicates earning power of a project, calculated by dividing profitability by cost (profitability/ cost)

Project Stakeholder

individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion

business intellignce

information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making: lowest sales per week compared with the economic interest rates, best-selling product by month compared to sports season and city team wins

feedback

information that returns to its original transmitter (input, transform, or output) and modifies the transmitter's actions

phased implementation

installs the new system in phases (for example, by department) until it is verified that it works correctly

Phased Implementation

installs the new system in phases (for example, by department) until it is verified that it works correctly.

Enterprise resource planning (ERP)

integrates all departments and functins thoughout an organization into asingle IT system (or integrated set of IT systems) so that employees can ake decisions by viewing enterprisewide information on all businss operations.:is a software island of information yo have redunancy cause inconsistency.

Enterprise resource planning (ERP)

integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprise-wide information on all business operations

Process Modeling

involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment.

Supply chain management(SCM)

involves he management of information flows between and among stages in a a supply chain to maximize total supply chain effectiveness an profitability.

Customer Relationship management(CRM)

involves maaging all aspect of a customer's relationship with an organization to increase customer loalty and retention and organization's profitabilty. CRM allow an organization to gain insights into customers' shopping and buying beaviors ir order to developa dn implement enterprisewide strateges.

Customer relationship management (CRM)

involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability

Software Engineering

is a disciplined approach for constructing information systems through the use of common methods, techniques, or tools.

Information Technology (IT)

is a field concrned with te use of technology in managing and processing information.It consist of hardware, software and telecommunication

Project Plan

is a formal, approved document that manages and controls the entire project.

PERT Chart (Program Evaluation and Review Technique)

is a graphical network model that depicts project's tasks and the relationships between them.

Dependency

is a logical relationship that exists between the project tasks, or between a project task and a milestone.

Balanced scorecard

is a managemen system, in addition to a measurement system, that enable organization to clarify their vision and strateby and translate them into action.

balanced scorecards

is a management system in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action

Customer Relationship Management (CRM)

is a means of managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability.

Change Agent

is a person or event that is the catalyst for implementing major changes fora system to meet business changes.

Comptevive advantage

is a product or service that an organization's customer place a greater value on than similar offerings from a competitor.

Scripting Language

is a programming method that provides for interactive modules to a website.

Information technology

is a relatively new functional area, having only been around formally for around 40 years

Control Objects for Information and Related Technology (COBIT)

is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors.

Gantt Chart

is a simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally.

Business proess

is a standardized seet of activities that accomplish a specific task, such as processing a customer's order.

Business process

is a standardized set of activities that accoplish a specific task , such as processing a customer order.

Brainstorming

is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted.

project

is a temporary activity a company undertakes to create a unique product, service, or result

Outsourcing

is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in house.

Project Manager

is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget.

Legacy System

is an old system that is fast approaching or beyond the end of its useful life within an organization.

Buyer power

is assessed analyzing the ability of buyers to directly impact the price they are willing to pay for an item.

Supplier power

is assessed by th supplier's ability to directly impact the price they are charging for supplies(including materials,labor, and services)

Buyer power

is commonly reduced through the use of a loyalty program?

Informaton

is data converted into a meaninfgul and useful context.

Workshop Training

is held in a classroom environment and led by an instructor.

Rivalry among existing competitors

is high when competition is fierce in a market and low when competition is more complacent

Threat of new entrants

is high when it is easy for new cdompetitors to enter a market and low when there are significant entry barriers to entering market.

Threat of substitute products or services

is high when there are many alternatives to a product or service and low when there are few alternative from which to choose.

CIO

is responsable to ensure effective communication between business personnel and IT personnel

Chief information officer

is responsible for (1) overseeing all uses of informatin technology (2) ensuring the strategic alignment of IT with business goals and objectives. CIO often reports directly to the CEO

Chief knowldedge officer (CKO)

is responsible for collecting, maintaining, and distributing the organization's knowledge. data has base adminstrator

Chief privacy officer(CPO)

is responsible for ensuing the ethical and legal use of informatio within an organization. these are lawyers

Chief security officer (CSO)

is responsible for ensuring the security of IT system and developing strategies and IT safeguards against attacks fom hacker and viruses. He is call the Network Administrator

Chief technology offiicer(CTO)

is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization information.

Environmental scannig

is the acauisition and analysis of evenst and trends in the environment external to an organization.

Brusiness process reengineering (BPR)

is the analysis and redesign of workflow wthin and between enteprises. ex. NetFlix, Redbox

Project Management

is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.

Graphical User Interface (GUI)

is the interface to an information system. The ability to model the information system screens for an entire system using icons, buttons, menus, and submenus.

Systems Development Life Cycle (SLDC)

is the overall process for developing information systems, from planning and analysis through implementation and maintenance.

ETHICS

is the principles and standards that guide our behavior toward other people.

Requirements Management

is the process of managing changes to the business requirements throughout the project.

Conversion

is the process of transferring information from a legacy system to a new system.

E - FAIR USE DOCTRINE

it is legal to use copyrighted material. In certain situations,

Hypertext markup language (HTML)

links documents, allowing users to move from one to another simply by clicking on a hot spot or link.

Scope

list of specific project goals, deliverables, tasks, costs and deadlines

database

maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)

Preventative Maintenance

makes system changes to reduce the chance of future system failure.

Corrective Maintenance

makes system changes to repair design flaws, coding errors, or implementation issues.

accounting and finance ERP components

manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management

chief intellectual property officer (CIPO)

manage and defend intellectual property, copyrights, and patents

Elogistics

manages the transportation and storage of goods

eLogistics

manages the transportation and storage of goods

Online analytical processing (OLAP)

manipulation of information to create business intelligence in support of strategic decision making; managerial support system

Primary Business Benefits of SCM

market demand, resource and capacity constraints, real-time scheduling

ERP

materials planning, order entry, distribution, general ledger, accounting, shop floor control

Fuzzy logic

math method of handling imprecise/subjective information

Effeciveness IT metics

measure the impact IT has on business processes and activities includin customer satisfaction, conversion rates, and sell through increases.

Effectiveness MIS metrics

measure the impact MIS has on business process and activities, including customer satisfaction and customer conversion rates. focuses on how well a firm is achieving its goals and objectives

Efficiency It metrics

measure the performance of the IT system itself includngthroughput, speed, and availability.

metrics

measurements that evaluate results to determine whether a project is meeting its goal

Legal Feasibility

measures how well a solution can be implemented within existing legal and contractual obligations.

Operational Feasibility

measures how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities

Political Feasibility

measures how well the solution will be accepted in a given organization

Key performance indicators (KPIs)

measures that are tied to busines drivers Metrics such as GPA(grade point average)

Economic Feasibility

measures the cost-effectiveness of a project

Information reach

measures the number of people a firm can communicate with all over the world

Efficiency MIS metrics

measures the performance of MIS, such as throughput, transaction speed, and system availability. focuses on the extent to which a firm is using its resources in an optimal way

Technical Feasibility

measures the practicality of a technical solution and the availability of technical resources and expertise

Schedule Feasibility

measures the project time frame to ensure it can be completed on time.

Examples of B2B

medical billing service software sales virtual assistants

Generic algorithm

mimics the evolutionary process to generate increasingly better solutions to a problem; AI category

Decision support system (DSS)

models information using OLAP; provides assistance in evaluating/choosing among different courses of action; managerial support system

Software Customization

modifies software to meet specific user or business requirements.

Information security

mostly misuse by persons inside or outside an organization.

data visualization tools

moves beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, etc

Open System

nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or inter-operate with the system

Latitude

north/south measurement of position

Clickstream Data Metrics

number of page views pattern of websites visited length of stay on website dates and times of visits number of registrations filled out number of abandoned registrations Demographics of registered visitors Number of customers with shopping cars Number of abandoned shopping carts

Unstructured decisions

occurs in situations in which no procedures or rules exist to guide decision makers toward the correct choice

Disintermediary

occurs when a business sells directly to the customer online and cuts out the intermediary

First-mover advantage

occurs when an organization can significantl impact its marketshare by being first to market with a competitive advantage.

information inconsistency

occurs when the same data element has different values

Product differentiation

occusrs whn a company develops unique differences in its products with th intenet t influence demand

Threat of substitute products or services

one of porter's five forces; measures the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services)

Work Month

one person working one month, so 10 people working one month= 10 work months

Summary internal report

organizes and categorizes data for managerial persual. A report that summarizes total sales by product for each month is an example. The data for these reports are typically categorized and summarized to indicate trends and potential problems.

Chief Information Officer (CIO)

oversees all uses of IT and ensures the strategic alignment of IT with business goals and objectives The functions include: Manager, Leader, Communicator.

Enterprise Application Integration (EAI)

packages together commonly used functionality, such as prebuilt links to popular enterprise applications.

System Implementation Methods

parallel, plunge, pilot, phased

Scope Creep

piling up of small changes that by themselves are manageable, but in aggregate are significant.

market share

portion of the market that a firm captures

Post-Implementation Report

presents a formal report or audit of a project after it is up and running.

Internal Report

presents data that are distributed inside the organization and intended for employees within an organization. Support day to day operations monitoring that supports managerial decision making.

Detailed internal report

presents information with little or no filtering or restrictions of the data.

Requirements Definition Document

prioritizes all of the business requirements by order of importance to the company.

benchmarking

process of continuously measuring system results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance

ERP II

project management, knowledge management, workflow management, customer relationship management, human resource management, portal capability, integrated financials

Challenges of using wireless networks

protecting against theft protecting wireless connections preventing viruses on mobile devices addressing privacy concerns with RFID and LBS

Enterprise Resource Planning (ERP)

provide a foundation for collaboration between departments, enabling people in different business areas to communicate

Employee relationship management (ERM)

provides employees with a subset of CRM applications available through a web browser

real-time system

provides real-time information in response to query requests

data

raw facts that describe the characteristics of an event or object

Open Source

refers to any software whose source code is made available free for any third party to review and modify

Cybermediation

refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness

information richness

refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information

information granularity

refers to the extent of detail within the information (fine and detailed or "coarse" and abstract information)

data governance

refers to the overall management of the availability, usability, integrity, and security of company data

Crowdsourcing

refers to the wisdom of the crowd

Social Media

refers to websites that rely on user participation and user-contributed content

Project Milestone

represents key dates when a certain group of activities must be performed.

chief information officer (CIO)

responsible for 1) overseeing all uses of MIS and 2) ensuring that MIS strategically aligns with business goals and objectives

Chief Knowledge Officer (CKO

responsible for collecting, maintaining, and distributing the organization's knowledge.

chief data officer (CDO)

responsible for determining the types of information the enterprise will capture, retain, analyze, and share

Chief Privacy Officer (CPO )

responsible for ensuring the ethical and legal use of information

chief privacy officer (CPO)

responsible for ensuring the ethical and legal use of information within a company

Chief Security Officer (CSO)

responsible for ensuring the security of IT systems

chief security officer (CSO)

responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses

Chief Technology Officer (CTO)

responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT

Loyalty programs

reward customers based on th amount of business they do with a particuar organization.

Online Training

runs over the Internet or on a CD or DVD, and employees complete the training on their own time at their own pace.

Types of Organizational Projects

sales (new service to up-sell a product) marketing (new tv ad) finance (new report) accounting (new system functionality) MIS (upgrading a system)

Primary Business Benefit of CRM

sales forecasts, sales strategies, marketing campaigns

Front Office - Operational CRM

sales systems, marketing systems, customer service systems

Primary Users of CRM

sales, marketing, customer service

Extended ERP

scheduling, forecasting, capacity planning, ecommerce, warehousing, logistics

Artificial intelligence (AI)

simulates human intelligence; ie ability to reason and learn

Structured decisions

situations where established processes offer potential solutions

The leading cause of downtime

software failure and human error

Shopping bot

software that will search retailer sites and provide a comparison of each retailer's offering

database management system (DBMS)

software through which users and application programs interact with a database

Intelligent agent

special-purpose knowledge-based system that accomplishes specific tasks on behalf of its users; AI category

business process

standardized set of activities that accomplishes a specific task

Reintermediation

steps are added to the value chain as new players find ways to add value to the business process

Geographic Information System (GIS)

stores, views, and analyzes geographic data, creating multidimensional charts or maps

Decision making levels

strategic, managerial, operational

Sensitivity analysis

study the impact on other variables when one variable is changed repeatedly; special case of what-if analysis

The four basic component of supply chain management

supply chain strategy, suply chain partners, supply chain operation, supply chain logistics

Analytical CRM

supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers

Off the Shelf Application Software

supports general business processes and does not require any specific software customization to meet the organization's needs.

Operational CRM

supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers

SDLC Development Phase

takes all the detailed design documents from the design phase and transforms them into the actual system

Development Phase

takes all the detailed design documents from the design phase and transforms them into the actual system. The project transitions from preliminary designs to actual physical implementation.

forward integration

takes information entered into a given system and sends it automatically to all downstream systems and processes

backward integration

takes information entered into a given system and sends it automatically to all upstream systems and processes

Services

tasks performed by people that customers' will buy to satisfy a want or need

service

tasks that customers will buy to satisfy a want or need

Unit Testing

test individual units or pieces of code for a system.

Development Testing

test the system to ensure it is bug free

buyer power

the ability of buyers to affect the price they must pay for an item

mobile commerce

the ability to purchase using a mobile device

Transformation Process

the actual conversion of inputs to outputs

Business process reengineering (BPR)

the analysis and redesign of workflow within and between enterprises

eProcurement

the business-to-business (B2B) online purchase and sale of supplies and services over the internet

Ecommerce

the buying and selling of goods and services over the internet

cube

the common term for the representation of multidimensional information

fact

the confirmation or validation of an event or object

MIS skills gap

the difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies

information redundancy

the duplication of data, or the storage of the same data in multiple places

Time

the elapsed time of a project from beginning to end

Analysis Phase

the firm analyzes its end-user business requirements and refines project goals into defined functions and operations for the intended system.

IT infrastructure

the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals

Hypertext Transfer Protocol (HTTP)

the internet protocol web browsers use to request and display web pages using universal resource locators

Feasibility

the measure of the tangible and intangible benefits of an information system

Usability

the most Effectiveness IT Metrics. the ease with which people perform transactions and/or find informatin. A popular usability metric on the internet is degrees of feedom, which measures the number of clicks required to find desired infomation.

Usability

the most effective IT metrics. The was with which people perform transactions and/or find information. A popular usability metric on the internet is degrees of freedom, which measures the number of clicks required to find desired information.

Informantion accuracy

the most important type of Efficiency IT Metics; the extent to which a system generates the correct results when executing the same transaction numerous times.

Maintenance Phase

the organization performs changes, corrections, additions, and upgrades to ensure the system continues to meet business goals.

SDLC Implementation Phase

the organization places the system into production so users can begin to perform actual business operations with it

Implementation Phase

the organization places the system into production so users can begin to perform actual business operations with it.

Source document

the original transaction record; operational support system

Recovery Paradox Effect

the perception of the stakeholders is happier when you get the project back on track after hardship rather than if the project had just run smoothly from the start.

content creator

the person responsible for creating the original website content

content editor

the person responsible for updating and maintaining website content

physical view

the physical storage of information on a storage device such as a hard disk

Social Networking

the practice of expanding your business and/or social contacts by constructing a personal network

information age

the present time, during which infinite quantities of facts are widely available to anyone who can use a computer

System

the primary enabler of cross-functional operation

data mining

the process of analyzing data to extract information not offered by the raw data alone

competitive intelligence

the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed

production

the process where a business takes raw materials and processes them or converts them into a finished product for its goods or services

Production

the process where a business takes raw materials and processes them or converts them into a finished product for its goods or services.

Information security

the protection of information from accidental or intentional misuse by persons inside or outside an organization. Ebusiness automatically creates tremendous information security risks for organizations.

productivity

the rate at which goods and services are produced based upon total output given total inputs

relational integrity constraint

the rules that enforce basic and fundamental information-based constraints

integrity constraint

the rules that help ensure the quality of information

analytics

the science of fact-based decision making

data element (or data field)

the smallest or basic unit of information

Value Added

the term used to describe the difference between the cost of inputs and the value of price of outputs

Core ERP components

the traditional components included in most ERP systems and primarily focus on internal operations

Strategic decision making

to develop overall strategies, goals, and objectives

Operational decision making

to develop, control, and maintain core business activities required to run the day-to-day operations

Managerial decision making

to evaluate company operations to identify, adapt to, and leverage change

Computer Aided Software Engineering (CASE)

tools are software suites that automate systems analysis, design, and development.

Human Resources ERP Components

track employee information including payroll, benefits, compensation, and performance assessment and ensure compliance with all laws

business intelligence dashboard

tracks corporate metrics such as critical success factors and key performance indicators and includes advanced capabilities such as interactive controls, allowing users to manipulate data for analysis

Ethics and security are

two fundamental building blocks that organizations must base their businesses upon

Business intelligence (extended ERP component)

typically collect information used throughout the organization (including data used in many other ERP components), organize it, and apply analytical tools to assist managers with decisions.

structured query language

users write lines of code to answer questions against a database

Automatic Vehicle Location (AVL)

uses GPS tracking to track vehicles

data-mining tool

uses a variety of techniques to find patterns relationships in large volumes of information and infer rules from them that predict future behavior and guide decision making

Parallel Implementation

uses both the legacy system and new system until all users verify that the new system functions correctly

Parallel Implementation

uses both the legacy system and new system until all users verify that the new system functions correctly.

behavioral analytics

uses data about people's behaviors to understand intent and predict future actions

RFID (radio frequency identification)

uses electronic tags and labels to identify objects wirelessly over short distances

scrum methodology

uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervals, to achieve an appointed goal

In-sourcing

uses the professional expertise within an organization to develop and maintain its information technology systems

offshore outsourcing

using organizations from developing countries to write code and develop systems

Offshore Outsourcing

using organizations from developing countries to write code and develop systems. The country is geographically far away.

Intelligent systems

various commercial applications of AI

Integration Testing

verify that separate systems can work together, passing data back and forth correctly

System Testing

verify that the units or pieces of code function correctly when integrated

Value chain

views an organization as a series of processes, each of which adds value to the product of service for each customer.

DSS quantitative models

what-if, sensitivity, goal-seeking, and optimization

Double Deviations Effect

when nobody discusses or talks through the problem and then the problem becomes an even bigger problem when it is not solved.


Ensembles d'études connexes

MRI quiz 3 image contrast and weighting

View Set

Chapter 20: Viruses, Bacteria, and Archaea

View Set

Volume and Surface Area Problems

View Set

environmental science ch. 6 study guide

View Set

AP Psychology Coach Watson AP Exam Vocabulary Study Guide

View Set

Industrial Revolution: Internal Combustion Engine

View Set