ISA 235 Final Exam - Concepts

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Next Generation MIS Decision Systems: AI

- AI: Simulates human intelligence such as ability to reason and learn - AI can do things faster and with a higher accuracy - Intelligent System: Various commercial applications of AI - Genetic Algorithm: AI System that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions > Businesses use this to help decide which combination of projects to invest in, taking tax complications into account - Machine Learning, Neural networks, and VR are 3 primary areas of AI - Automation: AI building robots that can operate similar to humans - Complex Analytics: Humans need help analyzing large amounts of data to find patterns

Characteristics of Quality Data

- Accurate: Data should not be incorrect - Complete: There should be no missing values - Consistent: Data should be consistent across the table - Timely: Data should be recent- Unique: Each record/attribute should be unique - Low Quality data can lead to erroneous decisions costing time, money, reputations, and jobs - Low Quality Data Effects: Inability to track customers, difficulty identifying most valuable customer, inability to identify selling opportunities, Lost revenue opportunities, undeliverable mail, and inability to build strong relationships with customers

Bias in Machine Learning

- Affinity Bias: Tendency to connect with, hire, and promote those with similar interests, backgrounds, and experiences - Conformity Bias: Acting similarly, or conforming those around you, regardless of your own views - Confirmation Bias: Actively looking for evidence that backs up preconceived ideas about someone - Name Bias: Prefer certain types of names - Sample Bias: Problem with using incorrect training data to train the machine > Training a car for all seasons, when you trained it on 85 sunny days in the summer - Prejudice Bias: Training data that is influenced by stereotypes > Primary Issue: Training data decisions can reflect stereotypes (Men work v Women stay at home - Measurement Bias: When there is a problem with the data that skews it in one direction > Algorithm trained on image data that doesn't represent reality - Variance Bias: Mathematical property of an algorithm > Models with high variance can fit but are sensitive to noise, low variance is more rigid and less sensitive

Business Process Modeling

- BPM: Activity of creating a detailed flowchart or process map of a work process that shows inputs, tasks, and activities in a structured sequence - Can help find and remove bottlenecks, and recognize and smooth running process - Expose Process gradually and Controlled - Encourage conciseness and accuracy - Focus attention on process model interface - Provide powerful process analysis and consistent design - BPMN is a graphical notation > Event: Anything that happens during the process > Activity: Task in a process > Gateway: Control the flow of a process > Flow: Path where process flows As-Is Process > Represent the current state of the operation that has been mapped, without any specific improvements or changes to the existing process To-Be Process > Shows the results of applying change improvement opportunities to the current As-Is model (simplified)

Managing Business Processes

- Business Process: Standardized set of activities that accomplish a specific task, such as processing a customer's order - Transform inputs to outputs- Expand Value chain, look at all the inputs and outputs Business-Facing Process > Invisible to external customer but essential to the effective management of the business > Goal setting, Day-to-Day planning, giving performance feedback and rewards, and allocating resources Customer-Facing Process > Result in a product/service received by an organization's external customer > Fulfilling orders, communicating with customers, sending bills and marketing info - Systems thinking helps differentiate between static and dynamic processes > Static Process: Systematic approach in an attempt to improve business effectiveness and efficiency * Running Payroll, Calculating Taxes > Dynamic Process: Continuously changing and provides business solutions to ever changing business operations * Managing layoffs, canceling business travel due to weather

Management Information System (MIS)

- Business function which moves info about people, products, and processes across the company to facilitate decision making and problem solving - Hardware and software, people and procedures used to make business processes more efficient and effective - organizational function (like accounting or HR) used to implement them - Underlying infrastructure performing activities and helps companies remain competitive - Incorporates systems thinking to help companies work cross-functionally

Metrics: How CSFs, KPIs, Efficiency, and Effectiveness Metrics are Used in Business

- CSFs are crucial steps companies perform to achieve their goals and objectives, and implement their strategies > Create high-quality products, Retain Competitive advantage, Reduce product cost, Increase customer satisfaction, Hire and retain best professionals - KPIs are quantifiable metrics a company uses to evaluate progress toward critical success factors > Turnover rates of employees, % of help desk calls unanswered, Number of returns, Number of new customers, Average customer spending - Digital Dashboard tracks KPI and CSF by compiling info from multiple sources and tailoring it to meet user's needs - Efficiency MIS Metrics: Measure performance of MIS itself > Throughput, Transaction Speed, System Availability - Effectiveness MIS Metrics: Measure the impact MIS has on business processes and activities > Customer Satisfaction, Customer Conversion Rates - Interrelationship between efficiency and effectiveness should be high in both

The Cloud

- Cloud allows for access over the Internet, for all devices connected to it - Offers storage, access, process, and analysis - Hard drives, software and processing power located in the cloud - Information is still safe if a device crashes or gets lost - Hosts multiple customer's applications and data - Offers higher availability, greater reliability, and improved accessibility all with affordable high-speed access - You can buy a license like Microsoft Office at a way cheaper price than upgrading the software on a computer (pay to access cloud) - No hardware, software or networking expenses as it's already in the cloud (just need a license to access) - purchase more licenses as the business grows and more employees join the cloud - Private, Public, Hybrid, and Community Clouds - IaaS: Computer hardware and networking pay-per-use basis - IaaS helps MIS Infrastructure automatically scale up or down based on reqs as well as backup services - Saas: Applications pay-per-use basis - SaaS helps facilitate accessibility of critical data in a timely and affordable manner, provides security and unified comms - PaaS: Hardware, apps, and networking pay-per-use basis - PaaS helps companies minimize operational costs and increase productivity by providing increased security, Anytime access, Centralized info management, Easy collaboration, and increased speed to market

Business Intelligence

- Collecting data, Discerning patterns and meaning in the data, responding to the resultant data - Sifting through large amounts of data, extracting info, and turning the info into actionable knowledge 1. Identify Data Sources (collect) 2. Ask the Right Questions (Analyze) 3. Influence and Persuade (Communicate) 4. Craft your Data Story (Visualize)- Comparative Analysis: Compares two+ datasets to identify patterns and trends - Use competitive monitoring to keep tabs on comp activities - Keep asking why to drill deeper into the problem - Changes in tech allow those with no tech background to work with analytics tools

Business Value of a Wireless World

- Connectivity to real time data is readily available and easily accessible and has caused a major disruption in markets and tech Three Biggest Wireless Business Applications: - Geographic Information Systems (GIS): Captures, stores, checks, views, displays, and analyzes geographical data, creating multidimensional charts or maps - Radio Frequency Identification (RFID): Process of using a tag (Tiny radio receiver and transmitter) attached to objects that is scanned by a device that creates an electromagnetic field to identify and track objects - Asset Tracking: Company places active/Semi-active RFID tags on expensive products or assets to gather data on the item's location with little or no manual intervention -Global Positioning System (GPS): Satellite-based navigation system providing extremely accurate position, time, and speed info - The "Domino" Effect: Companies have to continuously come up with new innovation, and creativity in tech, marketing, and business strategy (utilize tech in new, innovative ways)

Marketing Via eBusiness

- Content providers, Infomediaries, Online Marketplaces, Portals, Service Providers, Transaction Brokers - Associate Program. - Banner Ad. - Click-Through. - Cookie. - Pop-Up Ad. - Viral Marketing. - Search Engine Optimization and Ranking

Database Management System (DBMS)

- Creates, reads, updates, and deletes data in a database while controlling access and security - DBMS gets sent requests and preforms actual manipulation of the data in a database - Help managers answer operational questions - SQL and QBE (Query by example) tools for retrieving data - Relationships in the relational database model helps managers extract data - Primary Keys, fields, etc - Advantages of Relational Database: Increased Flexibility, Scalability and Performance, Data Integrity, Data Security, and Reduced Data Redundancy

Drivers of the Information Age

- Data (raw facts) v Information (Data converted to have meaning) - Business Intelligence (Info collected) v Knowledge (Intellectual Resources) - Present time, during which infinite quantities of facts are widely available to anyone who can use a computer - Big data and the 4 Vs (Variety, Veracity, volume, velocity)

Understanding the Digital Divide

- Digital Divide: Worldwide gap giving advantage to those with access to technology - Only a fraction of the world's population has Internet access - Some people lost Internet due to environmental changes like unemployment or poverty - Giving those who don't have access will help level the playing field and get rid of the digital divide. - Economic Consequences: Developing countries lack digital access which hurts their economic growth and slows development - Technological Impacts: Not having access to tech and info holds some areas back as it limits the skill in the workforce (Hard to find and retain skilled workers and leverage digital tech) - Social Consequences: Hard to access servers, Could be missing potential market, barriers for job opportunities (Higher levels of unemployment) - Strategies for Bridging the Divide: Infrastructure Investment (PCs for People), Digital Literacy Programs, Inclusive Business Models, & Public-Private Partnerships

Blockchain

- Distributed Computing: Processes and manages algorithms across many machines in a computing environment - Key Component: Distributed computing environment that shares resources ranging from memory to network storage - Safely store and transfer digital assets (disruptive tech) - Banking, Counterfeit and Fraud Detection, Payments, Health Care, Legal and Smart Contracts, Supply Chain, Voting - Blockchain: Type of distributed ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data - Each block can contain transactional data that transfers digital assets between the blocks or parties - Proof of Work: verifies legitimacy and creates new digital currencies - Transactions are bundled together into a block, miners verify the transaction (solve a proof-of-work problem, Reward (Bitcoins) is given to first miner to solve puzzle, and verified transactions are stored in public blockchain - Hashing process makes the chain unbreakable - Essentially a ledger of facts at a specific point in time - Immutability: Ability for a blockchain ledger to remain a permanent, indelible, and unalterable history of transactions - Immutability has potential to transform auditing process into a quick, efficient, and cost effective procedure, and to bring more trust and integrity to the data businesses use and share every day - Only Create and Read options are allowed (Impossible to update or delete options) -Digital Trust and IoT integration

How ERPs facilitate integration

- ERP: integrates all departments and functions throughout an organization into a single system so that employees can make decisions by viewing enterprise wide information on all business operations - Integrates various business functions into one complete system to streamline business processes and information across the entire organization - Common data repository - Share data supporting business processes within and across departments - Synchronized reporting and automation - Central database that collects information from and feeds information to all ERP modules - Enterprise Integration

Sustainable Infrastructure: Supporting Sustainability

- Identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption - Grid Computing: Collection of computers, geographically dispersed, that are coordinated to solve a common problem - Grid computing makes better use of MIS resources, allowing for greater scalability as systems can easily grow to handle peaks and valleys in demand, become more cost efficient, and solve problems impossible to solve with a single computer - Computers use 25% of processing power, the other 75% is available for other tasks - Virtualization: Creates multiple "virtual" machines on a single computing device (Analogy: computer printer) - Virtualization allows for computers to run multiple operating systems along with multiple applications at all times - Virtualization reduces power consumption and requires less equipment to be maintained - Easy to port virtual machine to another machine if disaster happens - 4 Types of virtualization (Network, Server, Storage, & System) - Cloud Computing: Stores, manages, and processes data and apps over the Internet rather than on a personal computer - Cloud computing is like storing all data in the cloud for any device that's connected to it can access - Cloud computing allows for access of shared resources that can be rapidly provisioned and released with minimal management - Cloud Computing Benefits: On-Demand Self Service, Broad Network Access, Multi-tenancy, Rapid Elasticity, and Measured Service - Cloud Computing Challenges: Security and Privacy Risks, Data Loss, Vulnerabilities - Utility Computing: Pay-per-use revenue model similar to gas - Utility Computing contains IaaS, PaaS, and SaaS (Makes up cloud computing infrastructure)

Information Infrastructure: Supporting Operations

- Identifies where and how important information, such as customer records, is maintained and secured - Backup and Recovery Plans help to minimize the damage of a system crash or failure - Fault Tolerance: Ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service (Failover & Failback) - Disaster Recovery Plan helps get files and systems to another location (geographically dispersed: Hot-Cold Sites) in case of disaster - Business Continuity Plan include factors like identifying critical systems, business processes, departments, and the maximum amount of time the business can continue to operate without functioning systems (contains many plans) - Business Impact Analysis identifies all the critical business functions and the effect that a specific disaster may have on them - Technology Recovery Strategy details the order of importance for recovering hardware, software, data centers, and networking (helps keep cross-functional business processes functioning)

Agile Infrastructure: Supporting Change

- Includes hardware, software, and telecommunications equipment that, when combines, provides the underlying foundation to support the organization's goals - The 7 -ilities: Accessibility, Availability, usability, maintainability (flexibility), portability, reliability, scalability - -Ilities help businesses meet the needs of everyone involved in a business process, and helps it run smoothly - Infrastructure must be able to handle growth even in exponential amounts - The web should always be accessible for all people - Professionals may not be able to perform specific job functions if systems are unavailable - Systems need to be flexible enough to meet all company, environmental, or business changes - Applications should be able to be portable across all devices and softwares - Reliability is key for keeping inaccurate info - Systems need to scale up/adapt to increased demands/capacity - No one should ever have a hard time using a device/software

Data Visualization

- Infographics - Data Artist: Business analytics specialist who uses visual tools to help people understand complex data - Analysis Paralysis: User goes into an emotional state of overthinking a situation so that a decision or action is never taken - Data Visualization: Tech that allows users to see or visualize data to transform information into a business perspective - Business Intelligence Dashboards: Track corporate metrics such as CSFs and KPIs and include advanced capabilities such as interactive controls, allowing users to manipulate data for analysis

Current Information Ethics

- Information ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies) - Ethics: Principles and standards that guide behavior toward people - Legal and Ethics are not always the same thing - Information doesn't have ethics, people do

Why Integrations are Important (Silo Problem)

- Integration: Allow separate systems to communicate directly with each other, eliminating need for manual entry into multiple systems - Dramatically increases quality - Send info to upstream or downstream systems and processes - Most invest in forward integration - Integration builds a central repository for types of information - Enterprise systems help to manage customer information

Maintaining the MIS Infrastructure

- MIS Infrastructure: Includes plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets - Dynamic, always changing as the business needs change - Information, Agile, and Sustainable MIS Infrastructures - Shows in detail how the hardware, software, and network connectivity support the firms processes - Can be a few connected computers or a multinational company with thousands of devices interconnected - Enterprise Architects help manage change and dynamically update MIS Infrastructure - Pressures: Increased Ewaste, Energy Consumption and Carbon Emissions

Using MIS to Make Business Decisions

- MIS can help to make business decisions through developing Critical Success factors and Key Performance Indicators - Three main groupings from top to bottom are Executive Information Systems (EIS), Decision Support Systems (DSS), and Transaction Processing Systems (TPS). - EIS: Specialized DSS that supports executives and unstructured, long-term decisions requiring judgement, evaluation, and insight - DSS: Using OLAP, which provides assistance in evaluating and choosing among different courses of action - TPS: Basic business function system at operational level (analysts) and assists in structured decisions

The First Line of Defense: People

- Organizations must enable employees, customers, and partners to access info electronically - Biggest issue surrounding info security is a people issue > Insiders > Social Engineering: Pretexting, Dumpster Diving - First line of defense an organization should follow is to develop info security policies and a plan

EBusiness Revenue Models

- Pay-per-click, pay-per-call, pay-per-conversion - AdWords - Advertising Fees - Subscription Fees - Transaction Fees - Data Sharing

The Second Line of Defense: Technology

- People: Authentication and Authorization > Phishing: technique to gain personal info for the purpose of identity theft, usually through fraud emails that look like they are legit > Pharming: Reroutes requests for legit sites to false ones > Authentication: Method for confirming user's identity (single, two factor and multi-factor) * Something the User knows, has, is part of the user > Authorization: Providing user with permission including access levels for files, time, and storage - Data: Prevention and Resistance > Privilege Escalation: Network intrusion attack that grants the attacker permissions to access info > Encryption: Scrambles information into an alternative form that requires a key or password to decrypt > Personally Identifiable Information (PII): Any data that could potentially identify a specific individual > Firewall: Guards a private network by analyzing incoming and outgoing info for the correct markings - Attacks: Detection and Response > Network behavior Analysis: Gathers an organizations computer network traffic patterns to identify unusual or suspicious activity > Cyberterrorist> Intrusion Detection Software (IDS): Full-time monitoring tools that search for patterns in network traffic to identify intruders

Wireless Fidelity (Wi-Fi)

- Portable devices can connect wirelessly to a local area network (LAN), using access points that send and receive data via radio waves - Allows computers and other devices to connect and exchange information with one another (Creating a network) - Max range of 1000 ft- Inner workings consist of Signal Transmitters, Towers, or Poles and additional equipment required to send out a Wi-Fi signal - Allows for portable, smaller devices

Strategy

- Porter's Five Forces, SWOT Analysis - Business plan that achieves a specific set of goals/objectives - Develop strategy based on competitive advantage Three Generic Strategies 1. Broad Cost Leadership (Walmart: Low Cost, Broad Market) 2. Broad Differentiation (Men's Warehouse: High Cost, Broad Market) 3. Focused Strategy (Payless Shoes: Low Cost, Narrow Market) (Tiffany & Co: High Cost, Narrow Market) Value Chain Analysis = Primary and Support Value Activities = Identify processes firm can add value in

Supply Chain Management

- Procurement: Purchasing of goods/services to meet the needs of the supply chain - Logistics: Processes that control the distribution, maintenance, and replacement of materials and personnel to support the support chain - Materials Management: Activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing - Optimizing the supply chain is critical for a successful organization - Use of disruptive technologies (RDIF, drones, robotics, etc) to gain competitive advantage - Prime target for advanced applications of blockchain

Data Warehousing

- Raw data needs selective extraction, organization, and analysis and formatting for presentation - Data Aggregation: Collection of data from various sources for the purpose of data processing - Support Business Analysis and Decision-Making - Relational databases are excellent for supporting the business rules and processes required to run the different functional areas of the business - Extraction, Transformation, and Loading (ETL): Process that extracts data from internal and external databased, transforms it using a common set of enterprise definitions, and loads it into a data warehouse - Reasons Business Analysis is Difficult from Operational Databases: Inconsistent Data Definitions, Lack of Data Standards, Poor Data Quality, Inadequate Data Usefulness, and Ineffective Direct Data Access - Primary Purpose: Combine data, specifically, strategic data, throughout an org into a single repository in such a way that the people who need that data can make decisions and undertake business analysis - Collect data from multiple systems in a common location that uses a universal querying tool - Standardize data

Protocols

- Standard that specifies the format of data as well as the rules to be followed during communication on the network - Dictates how communication is expected to happen - TCP/IP Protocol: Allows computers receiving the signal to verify all data has been received and if not, a resend function occurs - Secure Hypertext Transfer Protocol (HTTPS): encryption and secure identification of an Internet Server (Protection) - Wi-Fi Protected Access (WPA): More sophisticated data encryption and user authentication

Business Processes

- Standardized set of activities that accomplish a specific task, such as processing a customers order - Value chain is a set of business processes meant to show how value can be added, and you can analyze and construct the activities to add value to them

Supply Chain

- The connected chain of all of the business entities, both internal and external to the company, that perform or support the logistics function - Supplier Power can affect this (Porter's Five Forces)

MIS and Business Process Improvement: Automation, Streamlining, and Reegineering

- Workflow: Includes tasks, activities, and responsibilities required to execute each step of in the process > Allows for managers to evaluate areas of improvement Operational Business Processes > Automation: process of computerizing manual tasks, making them more efficient and effective, and lowering operational costs > Improvement: Attempts to understand and measure the current process and make performance improve > Operational Business processes: Static, routine processes like stocking inventory, opening process > RPA: Ability to be aware and adapt to changeManagerial Business Processes > Semi-dynamic, semi-routine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements > Streamlining: Improves efficiencies by simplifying or eliminating unnecessary steps > Removes bottlenecks, redundancy Strategic Business Processes > Dynamic, non-routine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions > Reengineering: Analysis and redesign of workflow within and between enterprises - Automation and Streamlining happen departmentally - Systems thinking plays a big role in BPR as its a company wide event > Creating value for the customer

Business Decision Making Process

1. Problem Identification: Define the problem 2. Data Collection: Gather the problem related data (Facts) (5 H's) 3. Solution Generation: Detail every solution possible 4. Solution Test: Evaluate solutions in terms of if it can be completed, sustainability, and acceptability 5. Solution Selection: Solution that best solves the problem and meets needs of business 6. Solution Implementation: Make sure solution solves problem, restart process if fails Strategic Decision-Making Essentials - Managers develop overall strategies, goals, and objectives - Unstructured Decisions: No procedures or rules exist to guide decision makers toward a correct choice - Higher-Level issues concerned with overall direction of the organization, Define goals and future aspirations Managerial Decision-Making Essentials -Employees evaluate company operations to identify, adapt to, and leverage change - Semistructured Decisions: Few established processes help to evaluate potential solutions, not enough to lead to a definite recommended solution - Concern how the organization should achieve goals and objectives set by its strategy, Mid-level Operational Decision -Making Essentials- Employees develop, control, and maintain core business activities required to run operations DtD - Structured Decisions: established processes offer potential solutions - Affect how a firm is run DtD, domain for operations managers who are closest to customer - Example: BPMN Model

Benefits and Challenges of a Connected World

Benefits: - Sharing Data is second nature now (physical task back then) - VPN: encrypted connection for a device on the Internet - Increased innovation: Flood of new, improved tech - Virtual Workforce: All team members can be in a system no matter location - Reduced Travel: Videoconferencing helps reduce need to travel - Leveling Playing Field: Startups can compete with larger companies - Networking is a lot more affordable (no wired connections, setup, etc) Challenges: - Threats of power loss and security risks - Firewalls keep attackers out of a network - Issue of too many devices connected to a network - Hard to protect against theft, protect wireless connections, prevent viruses on mobile devices, and privacy concerns - Mobile Device Management (MDM): Tech that can lock down, control, encrypt, and enforce policies on mobile devices (IT basically has complete control of company devices) - Mobile App Management (MAM): Tech allowing corporations to lock down, control, encrypt, and enforce policies on mobile applications

Functions and Strategic Importance of CRM Systems

CRM: Involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability - Gain insights into customer's shopping and buying behaviors to implement enterprise wide strategies - Find new profitable customers, exceed current customer expectations, eliminate competition - Tracks every communication between the customer and the organization and provides access to cohesive customer information for all business areas - Allows company to operate more efficiently and effectively - Can identify most valuable customer - Can use CRM data for analysis - Gives more power to the customer - Operational: Deal with customers - Analytical: Deal with back-office

Security Threats Caused by Hackers and Viruses

Common Types of Hackers - Black-Hat Hackers: Break into other people's computer systems and may look around or may steal and destroy info - Crackers: Have criminal intent when hacking - Hacktivists: Philosophical and political reasons for breaking into systems, will often deface a website as protest - Script Kiddies/Bunnies: Find hacking code on the the internet and click and point their way into systems to cause damage or spread viruses - White-Hat Hackers: Work at request of the owner to find vulnerabilities and plug holes Common Types of Viruses - Backdoor Programs: opens a way into a network for future attacks - Denial-of-Service Attack: floods a site with so many service requests that the site slows down or crashes - Distributed Denial-of-Service Attack: multiple computers floods a site with so many service requests that the site slows down or crashes - Polymorphic Worms/Viruses: Change shape as they propagate - Trojan Horse Virus: Hides inside other software, usually as an attachment or downloadable file - Worm: Spreads itself computer to computer, file to file - Malware: Software intended to damage or disable computers and systems

Disruptive v Sustaining Technologies

Disruptive Technology - New way of doing things things initially doesn't meet the needs of existing customers - Xerox, IBM, Sears are examples: too much emphasis on customer needs - Internet was originally a military device for communication, then for scientists, and eventually came to business > Internet is the connection and flow of info, network of people around the world > Not allowing WWW on company computers as protection Sustaining Technology- Produces an improved product customers are eager to buy

The Internet v the Web

Internet - Massive network that connects computers all over the world and allows them to communicate with each other - Computers talk to each other, visiting a website is connecting to another computers IP address The Web - One part of the internet, with a primary use of correlating and spreading info - Provides access to internet info though text, graphics, audio, etc using the markup language HTML - Companies may use the Internet, but do not use the Web to keep data safe

Value Chain Analysis

Support Value Activities - Firm Infrastructure, HR Management, TechDevelopment, Procurement - Top of the food chain Primary Value Activities - Receive and Store raw materials, Make product, Deliver product, Market and sell product, Service after sale - Views firm as a series of business processes that each adds value to the product/service Competitive Advantage Decision for a Firm 1. Target high value-adding activities to further enhance their value 2. Target low value-adding activities to increase their value 3. Perform a combination of both - MIS adds value for both activities - Analyze and Construct value chain in terms of Porter's Five Forces > Can decrease threat of new entrants with support values, and decrease threat of substitutes with primary values - Organizations will achieve the most success by expending resources on improving business processes in value chain activities that provide the best value, according to organizational strategy

Transactional v Analytical Data

Transactional Data - Encompasses all of the data contained within a single business process or unit of work - Primary purpose is to support the performing of daily operational tasks Analytical Data - Encompasses all organizational data - Primary purpose is to support the performing of managerial analysis tasks Organizational Data - Levels: Individual (Knowledge, goals, strategy), Department (Goals, revenue, expenses, processes, strategies), Enterprise (Revenues, expenses, processes, strategies) - Formats: Document, Presentation, Spreadsheet, Database (Letters, emails, product, process, Sales, Financial, employee, order, supplier, etc) - Granularity: Detail (fine), Summary, Aggregate (coarse) (Reports for: each salesperson, product, part, sales personnel, departments, orgs, and companies)

Decisions Making by Organizational Level, and Relation to MIS

Types of MIS Systems for Decision Making - Operational: Structured Decisions (TransactionProcessing System) > Online Transaction Processing (OLTP), TPS, Source Documents, Transactional - Managerial: Semistructured Decisions (Decision Support Systems) > DSS, Online Analytical Processing (OLAP),Analytical - Strategic: Unstructured Decisions (Executive information Systems) > Granularity, Visualization, Digital DashboardInformation Levels throughout an organization (Strategic -> Managerial -> Operational) - Granularity grows from fine to coarse > Fine: less details > Coarse: More meaningful detail - Processing grows from OLTP to OLAP > OLTP: Process Information according to defined business rules, stores info, & update existing info to reflect new info. Must capture every detail > OLAP: Manipulation of info to create Business Intelligence in support of strategic decision making - Processes grow from Transactional to Analytical > Transactional: all info within a single business process, to support performance of structured decisions > Analytical: All organizational info, to support managerial analysis of semistructured decisions

eCommerce v eBusiness

eCommerce - Buying and selling goods and services over the internet eBusiness - Includes eCommerce along with all activities related to internal and external business operations B2B - Applies to any businesses buying from and selling its products or services to each other over the internet B2C - Applies to any businesses that sells its products and services to consumers over the internet -eBusiness took off with Amazon - Advantages: Expand global reach, Open new markets, Reduce costs, improve effectiveness - More info richness and reach due to online business


Ensembles d'études connexes

Life and Health Insurance Midterm

View Set

Finance Chapter 8- Stock Evaluation

View Set

Chapter 41: Fluid, Electrolyte, and Acid-Base Balance (Course Point +)

View Set

Ch. 01 Group 1 Mastering Microbiology

View Set

COB 241: Ch 2 - Accounting for Accruals and Deferrals

View Set

PrepUs for Pediatrics Chapter 30

View Set

MLA Format Guidelines (Mrs. Minoso)

View Set