Key Concepts in Information Systems and Data Management

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Infrastructure-as-a-Service (IaaS)

1 type of cloud computing service where users pay only for the computing capacity they use.

Microsoft SQL Server

A DBMS for midrange computers.

Value web

A collection of independent firms that use information technology to coordinate their value chains to collectively produce a product or service for a market.

NORA

A data analysis technology that finds hidden connections between data in disparate sources.

Liability

A feature of political systems that allows individuals to recover damages done to them by others.

Accountability

A feature of social institutions that means mechanisms are in place to determine responsibility for an action.

Primary key

A field identified in a table as holding the unique identifier of the table's records.

Digital firm

A firm where all significant business relationships and core business processes must be digitally enabled.

Record in a database

A group of related fields.

TPS

A major source of data for other systems.

Benchmarking

A method employed by a company to measure and compare its business processes to processes of other companies within the industry.

Total cost of ownership

A model used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations.

Value chain model

A model where support activities are related to the production and distribution of the firm's products and services.

Blurred boundaries

A primary drawback to the 'do anything anywhere' work environment; it blurs the traditional boundaries between work and family time.

Extranet

A private corporate network extended to authorized users outside the organization.

COPPA

A set of five principles developed by the FTC that most American and European privacy law is based on.

Service-oriented architecture

A set of self-contained services that communicate with each other to create a working software application.

Hardware and software acquisition costs

Account for about 20 percent of TCO.

Digital Millennium Copyright Act

Adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials.

Opt-out model

Allows an organization to collect personal information without the user's explicit consent.

Data mining purpose

Allows users to find hidden relationships in data.

Enterprise Resource Planning

Also known as enterprise systems.

Crowdsourcing

An application of social business.

Application server

An application server may reside on the same computer as a web server or on its own dedicated computer.

Data dictionary

An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security.

Network Advertising Initiative

An industry association that encourages self-regulation to develop a set of privacy guidelines for its members.

Keystone firm example

Apple and the mobile platform ecosystem.

Regulated common carriers

Are not held liable for the messages they transmit.

Industry level strategic advantage

Building industry-wide, IT-supported consortia and symposia.

Join operation

Combines relational tables to provide the user with more information than is otherwise available.

Data lake composition

Composed of unstructured and structured data that has not been analyzed.

IT infrastructure

Consists of only those physical computing devices and software required to operate the enterprise.

Data redundancy

Creates confusion that hampers the creation of information systems that integrate data from different sources.

Management Information Systems

Deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm.

Database record

Describes a database entity.

Computer software

Detailed, programmed instructions that control computer hardware components in an information system.

E-BUSINESS

Digital technology and the Internet are used to execute the major business processes in the enterprise.

Network standard for local area networks

ETHERNET

Verizon's digital dashboard

Enabled it to improve managerial decision making.

Key field in a file

Every record in a file should contain at least one key field.

Cross-functional business process

Fulfilling a customer order.

Value chain model

Highlights specific activities in the business where competitive strategies can best be applied.

Sociologists study information systems

How systems affect individuals, groups, and organizations.

Categorical imperative

If an action is not right for everyone to take, it is not right for anyone to take.

Data inconsistency

Illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name.

OPT-IN

In this model of informed consent, personal info can't be collected until the consumer agrees their data can be collected.

Internet's impact on customers

Increases the bargaining power of customers by making information available to everyone.

Operational Excellence

Information intended to support this business objective analyzes spending levels at stores and cross-references this data to popular clothing styles.

Forecasting in data mining

Involves using a series of existing values to determine what other future values will be.

Benefits of a blockchain database

It enables firms to create & verify translations on a network very rapidly.

Information technology's impact on business firms

It helps firms expand in size.

Example of open-source software

Linux

Amazon's strategy

Low-cost leadership.

Order fulfillment processes

Making customers aware of the product.

TPS for monitoring

Managers need this type of system to monitor the status of internal operations and the firm's relations with the external environment.

Legacy systems

Many firms continue to operate them because they meet a business need and would be costly to replace.

Server capacity

Most servers operate at 15-20% of capacity.

Google services usage

Nearly 80 percent of global Internet users use Google Search and other Google services such as YouTube.

Legal gray areas

New information systems can result in new situations that are not covered by old laws.

Computer Matching and Privacy Protection Act

Not a U.S. federal law affecting private institutions.

PANDORA

Not a file-sharing service.

Associations in data relationships

Occurrences linked to a single event.

Associations in data

Occurrences linked to multiple events.

IT-enabled products and services

Providing competitive advantage except: Nike's use of celebrities to market their products.

Quantum computing availability

Quantum computing is not yet available to the general public.

Characteristics of cloud computing

Reduced elasticity

Relocation control system

Reports summaries on the total moving, house hunting, and home financing costs for employees in all company divisions falls into the MIS category.

Human Resources function

Responsible for maintaining employee records.

Database administration functions

Responsible for physical database design & maintenance.

The Privacy Act

Restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information.

Business objective for compliance

SURVIVAL.

Data management technology

Software governing the organization of data on physical storage media.

Illegal sharing of music files

Some forms have declined as legitimate online music stores have expanded.

Technology standards

Specifications that establish the compatibility of products and the ability to communicate in a network.

Starbucks' website plans

Starbucks is planning to sell coffee, branded mugs, and espresso machines on its website.

Metcalfe's law

States that the value or power of a network grows exponentially as a function of the number of network members.

ESS

Supports long-range planning activities of senior management.

Enterprise applications

Systems designed to span functional areas, focus on executing business processes across the firm, and include all levels of management.

ESS

Systems expected to deliver data from external events and summarized information from internal MIS systems.

Decision support systems

Systems relied upon by managers for nonroutine decision making.

Cross-functional systems

Systems that are being phased out in favor of systems that support business processes within a single functional group.

KMS

Systems used to consolidate the relevant knowledge and experience in the firm and make it available to improve business processes and management decision making.

Components for organizational change

Tasks, technology, people, and structure.

Social complementary asset example

Technology and service firms in adjacent markets.

Hadoop

Technology used to analyze the social media data collected by a major online retailer.

Support activity in value chain

Technology.

Notice/Awareness

The FIP principle that states websites must disclose their information practices before collecting data.

Safe harbor

The GDPR created a framework in order to enable U.S. businesses to legally use personal data from EU countries.

Agency theory

The firm is viewed as a(n): 'nexus of contracts' among self-interested individuals.

Company culture

The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members.

Customer information in a table

The information about a single customer resides in a single ROW.

IT governance

The overall decision-making that guides the IT strategy of a firm.

Mass customization

The process of offering individually tailored products or services using the same resources as mass production.

TPS with MIS capabilities

The system that best meets the needs of handling and recording telephone, text, and Internet donations for a non-profit organization.

Web beacons

Tiny, invisible software programs hidden in email messages and web pages that are used to track and report a user's online behavior.

DSS

Types of information systems especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance.

Web usage mining

Used to find patterns in user interaction data recorded by a web server.

NoSQL technologies

Used to manage sets of data that require the flexibility of tables and relations.

Standard format for data exchange

XML

Main factors for IT infrastructure spending

Your firm's organizational culture


Ensembles d'études connexes

Audio Engineering II Study Guide 2

View Set

Solving Systems of Linear Inequalities

View Set

Week 4 Retention Quiz Chapters 3 & 11

View Set

Like-Kind Exchanges + Propery gains / losses

View Set

Materials of Manufacturing Exam Two

View Set