WGU C724
Information Security Training
With the knowledge of potential risks and threats to privacy, citizens may help themselves understand the value of their information assets. This can help individuals guard against high-tech and low-tech methods of loss, including social engineering and malware.
Lightweight Directory Access Protocol (LDAP)
Created by the International Telecommunications Union; a standardized protocol that defines the organization of a set of directory records, such as groups, individual names, and attributes that are associated with them.
Advanced Networking
Creations of networks that connect widely disparate regions, peoples, and cultures allows for information sharing on a global scale, causing issues concerning the appropriateness and authority of those sharing it.
The Four Organizational Dimensions of the Balanced Scorecard
Financial, Business Process, Customer, and Learning and Growth.
Phishing
Often completed through email, this generic act of fraud is often in the form of an email requesting a response containing sensitive information, such as a username or password.
Simple Mail Transfer Protocol (SMTP)
One of several popular email protocols in use today (others include IMAP and POP3).
Community Provider
Online communities provide a space which individuals, families, and groups might meet and share content and communications. Examples of online community providers include Facebook, Google+, and LinkedIn.
Data
Symbols or signals that are input, stored, and processed by a computer for output as usable information.
Three Types of System Evaluation
System-oriented, function-oriented, and strategy-oriented.
Convergence
The ability for a telecommunication network to carry voice, data, and video.
Relationship with Business Strategy
The adoption or construction of an information system must be aligned with the organization's goals.
Evolution of Computers (Hardware)
The earliest commercially available electronic, digital computer occupied a 20 foot by 40 foot room and consisted of 18,000 vacuum tubes. Vacuum tubes were replaced by transistors that were replaced by integrated circuits. a) First Generation: Vacuum tubes (1940 - 1956) b) Second Generation Transistors (1956-1963) c) Third Generation Integrated Circuits (1964 - 1971) d) Fourth Generation: Microprocessor (1971-Present) e) Fifth Generation: Artificial Intelligence (Present and Beyond) are bringing us capabilities such as voice recognition
Governing Agencies
The government and quasi-government regulators that help to enact and enforce legislation, including the Federal Communications Commission (FCC) in the United States, that somewhat affect what is and is not acceptable on the Internet.
Self-Regulation of Industry
Along with several U.S. and EU laws that require the protection of privacy for their customers, each society provides an expectation for its businesses to establish their own protocols for protecting the interest of their many stakeholders.
Floating Operations Per Second (FLOPS)
Computing power is increasing as clock speeds get faster and more operations can be performed per second.
The Three Goals of Information Security for Data
Confidentiality, Integrity, and Availability
Cookie Management Software
Cookies are tidbits of information stored on your computer. They require a secure browser that uses industry security standards to encrypt your purchase information. Look for the padlock symbol to the left of the URL, along with the https: at the beginning of the URL.
SDLC - Strengths
Cost evaluation, capability, documentation, user input, ease of maintenance, and ability to survive IS staff changes.
Key Performance Indicators (KPI)
are used by executive and upper management to see how the organization is performing in certain areas.
Satellite Communications
are used to link telecommunications networks over long distances.
Object-Oriented Database Model
are used when media or other types of files are required because multimedia files and diagrams or blueprints such as those generated by computer aided design (CAD) are more complex and not easily sorted by columns and rows. This is a centralized database.
Semi-Structured Decisions
are used when only a portion of the problem can be solved via an established procedure. Middle managers more commonly make semi-structured decisions.
Health Analytics Tools
are usually apps created for smartphones or portable devices to keep track of the device owner's health and exercising stats, and they have limited capabilities.
Net Marketplaces
bring together potentially thousands of businesses in combined consortium networks for similar purposes: creating efficiencies and synergies between and among member businesses. Net marketplaces often, but not always, provide more of a focus on individual transactions versus lasting relationships.
Jitter
bufferboat can cause packet delay variation
Database Administrators (DBA)
build databases to store data to meet business needs and are responsible for all three functions including focusing on security and access requirements, designing, and performing testing to ensure performance.
Six Elements of Business Intelligence
business environment data, business intelligence infrastructure, business analytics tool set, managerial users and methods, delivery platform, and user interface.
The General Types of Business Models in E-Commerce
business-to-business (B2B), business-to-consumer (B2C), and consumer-to-consumer (C2C).
Entity-Relationship Diagrams (ERDs)
is a data modeling technique that helps graphically illustrate business processes and can also be used as the foundation for a relational database. The data components (known as entities) have various properties (known as attributes), and relate to each other in various ways (known as relationships).
Static Data
is a fixed data set that does not change after being recorded.
Prototyping
is a four step process that develops software module quickly and inexpensively for user evaluation.
Unified Modeling Language (UML)
is a general-purpose modeling language designed to provide a standard method to represent the design of a system.
The Principles of Business Owners who Collect Data
collect justly, maintain data for quality, collect transparently, keep data confidential, keep data secure, collect openly, provide for validation, are accountable.
Transaction processing systems (TPS)
collect, store, update, and retrieve transaction data within an organization and is used by middle management.
Textual Databases
contain text resources, such as social media messages and email, and are mined for sentiment analysis.
Market Creator
functions like a traditional bazaar or shopping mall, bringing together buyers and sellers through the Internet and collects a fee for helping to create the opportunity. Examples include Amazon's Marketplace and eBay.
The Three Primary Activities in Business Performance Management
goal selection, consolidation of information for the measurement of goal attainment, and management intervention for goal achievement and performance optimization.
Nation State
government focused and funded individuals or organizations interested in cyber-warfare against other nations and economic infrastructures.
Packet Switched Networks
group data in packets and are transmitted in multiple simultaneous communication sessions.
Knowledge Management
handles information and resources within an organization by capturing, distributing, and effectively using knowledge.
Data Inconsistnecy
happens when the same attribute has different values when the data is stored in more than one location.
The Five Components of Management Information Systems (MIS)
hardware, software, database, network, and people.
The Four Components of the Executive Support Systems (ESS)
hardware, software, user interface, and telecommunications.
Chief Technology Officer (CTO)
has the responsibility for implementing technology strategies.
Data Packets
have the destination IP address, the actual information to be sent, which can be parceled into many other packets, and error detection in case transmission fails.
Organizational Risk
hierarchies, policies, and procedures. These factors naturally allow organizations to operate as successful businesses, but also help to define categories risks, vulnerabilities, and threats, and create targets for criminals.
Structured Decisions
involve an established procedure, are repetitive and routine, and therefore can be handled in the same manner each time. Line-level managers and non-management employees typically make these types of decisions.
Risk Management
involves determining the vulnerability, assessing the impact that risk would have if event occurred, evaluating cost/benefit analysis to avoid or transfer the risk, and implementing the plan.
Risk Identification
involves determining which risk might affect the characteristics of the project and/or documents.
Acceptance Testing Process
involves end user evaluation and review of the system in order to demonstrate that the system is ready to be rolled out.
Planning
involves identifying and preparing for future needs in order to prepare and budget for future upgrades and modifications.
Qualitative Risk Analysis
involves performing an analysis of the risks and conditions in order to prioritize the effects on a project.
Risk Response Planning
involves the development of procedures and techniques that enhance opportunities and reduce threats to the project or system.
Entity Integrity
is a basic constraint of database relational model (abbreviated RM) that refers to the morphology of the primary key.
Work Breakdown Structure (WBS)
is a broken down list of all deliverables showing what the customer will get at the end of a project.
Computer Network
is a collection of interlinked computers that can exchange information over links in the form of digital packets.
Information Technology Infrastructure Library (ITIL)
is a common set of best practices widely used by businesses to give guidance to companies on how to use IT as a tool for implementing change.
Network Host
is a computer connected to a network and is also known as data terminal equipment in computer networking hardware and is a physical node with an IP address.
Network Bridge
is a computer networking device that creates a single aggregate network from multiple communication networks or network segments.
Network Management Application
is a computer software tool that gathers traffic data from the network to ensure network performance is optimized.
Smartphone
is a converged device that combines a cellular phone device with a mobile computer platform.
Data Preprocessing
is a data mining technique that involves transforming raw data into an understandable format.
Software Engineer
is a higher level computer programmer. Someone in this position not only writes the code but is responsible for designing a new application, developing specifications, overseeing the implementation, and supporting users after implementation.
Database Server
is a powerful computer that stores the databases and DBMS to access and administer the database.
Encryption
is a process by which data are encoded so that only persons with a decryption code may unlock and retrieve stored messages.
Predictive Analytics
is a process in data mining in which statistics, historical data, and data mining produce models and forecasts about potential customer behavior and future business trends.
Data Quality Audit
is a process to determine the reliability, completeness, and accuracy of the data in a database.
Uniform Resource Locator (URL)
is a protocol used by a client computer to request a website from a server via HTTP or HTTPS.
Virtual Private Network (VPN)
is a secure tunnel through the Internet using a public network infrastructure.
Near Field Communication (NFC)
is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm (1.6 in) of each other.
Referential Integrity
is a set of rules that prevent or limit incorrect data being entered int he database and establishes relationships between objects in different tables.
Network Protocol
is a set of rules, at different levels in the connection that communication devices use to ensure quality of signal transmission and reception.
Database
is a set or collection of data that is centrally located in an electronic format, organized in tables, and easily searchable.
Data Mart
is a smaller subset database from a data warehouse typically focused on a single area or function. Think of ASAP as a part of Epic
Firewall
is a software application or hardware appliance that filters and blocks malicious content from one network to another.
Mashups
is a software application that allows users to mix and match software components in order to create a customized application.
Database Management System (DBMS)
is a software program that allows an organization to organize, manage, and provide multiple users with access to data used to perform administrative tasks to databases.
Critical Path Method (CPM)
is a step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems.
Optical Character Recognition (OCR)
is a system that uses a scanner to read characters, automatically inputting them into the system in digital form.
Flat File
is a type of database model that resembles file cabinet functionality.
Hierarchical Database
is a type of database that connects tables in a master/slave, leader/follower, or primary/replica format and is a tree-like structure.
Wireless Communications
is a type of telecommunication network that uses radio waves to send and receive signals over the radio spectrum.
Telnet
is a very old and insecure method of accessing a remote network.
Rich Site Summary (RSS)
is a web feed format used by publishers for the periodic dissemination of information including news, blog entries, summaries, or full text of interest to subscribers.
Secondary Storage
is accessed only through a system's input/output bus and is generally several orders of magnitude slower than primary storage technologies.
Standard
is an accepted model from which independent parties or governing bodies agree as a basic concept from which to operate.
Intelligent Character Recognition (ICR)
is an advanced form of OCR that enables the computer to learn several different fonts and handwriting styles in order to improve accuracy and recognition.
Cost-Benefit Analysis (CBA)
is an analysis of the pros and cons of a given situation or course of action to determine how the downsides compare to the upsides.
Software-Defined Networking (SDN)
is an approach to computer networking that allows network administrators to programmatically initialize, control, change, and manage network behavior dynamically via open interfaces and abstraction of lower-level functionality.
802.3
is an ethernet standard and defines the LAN connections.
Hypervisor
is an expensive virtual machine monitoring application used by large organizations to improve computer network performance without having to physically change the network.
Scrum
is an incremental form of agile software development with emphasis on planning.
Next-Generation Firewall (NGFW)
is an integrated network platform that is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS).
Rapid Application Developement (RAD)
is an iterative alternative to the conventional waterfall model of software development. focuses on the development's process, with limited emphasis on the planning process.
Agile Model
is an iterative development model and encourages adaptive planning and development, fast delivery, continuous improvement, and flexibility in response to change. uses collaborative, self organized, and cross functional teams.
Protocol
is an official procedure that stems from the standard in question.
Online Transaction Processing (OLTP)
is an operational database and is used for browsing and manipulating business transaction activity to enable real time business analysis of records to help in business decision making.
Agile Software Development Methodology
is an operational method by which software developers iteratively gather requirements, plan, design, develop, test, and implement software.
File Transfer Protocol (FTP)
is an unsecure method used to transfer files from one computer to another.
Long-Tail Marketing
is collective use of social media sites for marketing.
Information Management
is concerned with collecting, managing, manipulating, organizing and reorganizing, and distributing information from a variety of sources to a variety of audiences in an organization.
Chief Security Officer (CSO)
is concerned with overall security functions for a business.
Data Governance
is concerned with the management of data, including maximizing quality through effective utilization, availability, integrity, and protection.
Information Technology Management
is concerned with the management of resources that facilitate access to information.
Open-Source Software
is developed not by single users or companies, but by communities of connected users and groups. Examples include the many forms of Linux, including Red Hat and Ubuntu and Android.
Bufferbloat
is high latency in packet-switched networks caused by excess buffering of packets.
Centralized Database
is located, stored, and maintained in a single location
Converged Network
is one in which voice, data, and video are all carried on the same network, with the business no longer using a traditional telephone network.
Disaster Recovery Plan (DRP)
is one that depicts the process involved with returning operations to their appropriate function in case an emergency or disaster halts them.
Handheld Scanner
is one that is moved by hand over the material being captured (barcode scanner).
End-User Development
is a largely informal method of solutions development by end users, made possible by the availability of fourth-generation languages that enable end users to develop systems and solutions with little or no assistance from professional technical specialists.
Denial-of-Service Attack
is a means to disrupt, interrupt, or suspend services of an Internet host computer (not a wireless network). These do not turn off the host, but instead overwhelm the host with queries, rendering the website unavailable.
Parallel Adoption
is a method of system transfer in which the old system continues to operate for a period of time while the new system is implemented.
Voice over Internet Protocol (VoIP)
is a modern telecommunications technology that offers convergence between voice and data networks.
Mesh Network
is a network topology in which each node relays data for the network.
Hub
is a networking device that connects computer devices together in a LAN, sending data traffic to all networked components.
Router
is a networking device used to pass packets to the next network node until the packets reach the ultimate destination.
Radio Frequency (RF) Site Survey
is a newer, more secure encryption protocol for wireless networks to ensure optimal performance.
Wi-Fi Protected Access (WPA)
is a newer, more secure encryption protocol for wireless networks.
Frame Relay
is a packet switching network protocol used to establish circuit switching for voice or video.
Schema
is a planned design structure of the database and involves creating the definitions behind the tables and data constraints.
Decision Tree
is a popular decision analysis tool that uses a tree-like graph to model decisions in order to identify the most appropriate strategy to reach a goal. Think of a Visio.
System-Oriented Evaluation
is the ability of an information system to discriminate between files or data that are relevant to a user query, and those which are not relevant. This enables management to make informed decisions about the future mission.
Scalability
is the ability to grow the user base and data services such as multimedia.
Expandability
is the ability to reach further or expand network coverage.
Input
is the act of capturing or collecting data from an organization or environment.
Sniffing
is the act of eavesdropping on network traffic in order to acquire traffic data packets and decoding. The information gathered can be used to hack into a network.
Wardriving
is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA).
Output
is the act of transferring processed information to the appropriate users.
Project Management
is the application of planning, organizing, time management, leadership, communication, and problem-solving skills to accomplish an objective and deliverable on time and on budget.
Platform as a Service (PaaS)
is the capability provided to the consumer to deploy onto the infrastructure consumer-related or acquired applications created using programming languages, libraries, services, and tools supported by the provider.
Infrastructure as a Service (IaaS)
is the capability provided to the consumer to provision processing, storage, networks, and other fundamental computing resources.
Software as a Service (SaaS)
is the capability provided to the consumer to use the provider's applications running on this kind of infrastructure.
Business Performance Management (BPM)
is the collection of analytic and management processes that enable organizational performance management in order to achieve goals or objectives.
Hypertext Transfer Protocol (HTTP)
is the communications protocol at the foundation of all communication of the world wide web.
Chief Information Officer (CIO)
is the company's top technology leader and focuses on the people and technology needed to run a company and serves as the technology infrastructure manager for the company and oversees information systems matters.
Strategic-Oriented Evaluation
is the determination of whether the information system outputs enable management to make strategic decisions that will help develop and achieve the future mission and vision of the organization.
Motherboard
is the device that contains the system bus and connects the various input and output devices that compose any given computer system.
Open System Interconnection (OSI)
is the foundation for data communication protocols and is an international standard that governs the development of data communication protocols (consists of seven layers).
Information
is the meaningful organization of data so that statements can be made about them.
Internet of Things (IoT)
is the network of products (or things) that can be connected through the internet, communicate with each other and with the environment, and transfer data over a network.
Multiplexing
is the process in which multiple signals are combined into one signal, which is then transmitted over a shared medium.
Decision Analysis
is the process of dividing a complicated decision into components, determining alternative solutions, and applying mathematical formulas to determine estimated payoffs for each alternative.
Telecommunication
is the process of exchanging information between various entities over electrical, electromagnetic, or digital networks.
Decision-Making Process
is the process of identifying and selecting an alternative based upon the values and preferences of the decision maker. And is one of the primary functions of management and is supported and reliant upon information technology.
Data Mining
is the process of identifying hidden patterns and relationships in large databases and applying rules to that data in order to predict future behavior.
Extraction, Transformation, and Loading (ETL)
is the process used to gather data from multiple sources (such as enterprise resource planning [ERP] systems, customer relationship management [CRM] systems, and line of business units [LOB]) and transforms the data to store in one data warehouse.
Supply Chain
is the sequence of processes involved in getting raw materials for a product all the way to the production and distribution of a product into the hands of the customer.
Transmission Control Protocol/Internet Protocol (TCP/IP)
is the standard communication rule of the Internet and governs Internet data network rules.
Privacy
is the state of being free or left alone and every individual has the right to privacy and to be left alone from individuals, organizations, and the state.
In-Memory Computing
is the storage of information in the main random access memory (RAM) of dedicated servers rather than in complicated relational databases operating on comparatively slow disk drives.
Business Intelligence
is the term used to describe the infrastructure, data, and software tools that help to analyze, organize, and control access to data in order to enable managers and others in the enterprise to make better and more informed decisions.
Public Switch Telephone Network (PSTN)
is the total circuit switch-based telephone network that uses technology invented by Alexander Graham Bell.
Computer-Aided Software Engineering (CASE)
is the use of computer methods to organize and manage software development in information systems.
Frequency
is the wavelength or position on the radio frequency spectrum in which the signals are exchanged and measured in cycles per second or hertz.
SRAM
is used as cache memory, to access the most frequently used instructions and data more quickly.
Balanced Scorecard
is used for strategic planning and management to help align business activities with organizational strategy. It helps improve communications and monitors performance.
Core Routers
is used to connect the enterprise to the Internet in the backbone in order to handle large amounts of data traffic.
Benchmarking
is used to evaluate business processes and performance by comparing them to industry standards and determining how well a company is performing.
Quality of Service (QoS)
is used to measure performance for specific types of data communications and ensure that communications are effectively transmitted.
Packet Analyzer or Network Sniffer
is used to monitor or log traffic on a network for troubleshooting or analysis. Can be used by hackers to hack a network.
Post Office Protocol (POP)
is used to retrieve email from a mail server.
Moderate-Level Risk
is very serious and would result in severe impairment, major damage, and would adversely impact the organization's operations.
Data Redundancy
is when the same piece of information is stored in more than one location.
Application Layer
is where applications create and communicate user data to other applications on the same or another host.
Bluetooth
is wireless technology used to exchange data over short distances, such as between a cell phone and an earpiece or a car stereo system.
Spoofing
is penetrating a network by disguising intruding data packets. This leads to more packet encapsulation information as the network responds by sending useful information back to the hacker, which enables the hacker to gain further access to the system by identifying network access information contained within the responses.
Feasibility Study
is performed to determine whether the proposed system is a good investment, whether the necessary technology is available, whether the user's information specialists can manage the system, and whether the organization can adapt to the changes introduced by the new system.
Chief Executive Officer (CEO)
is responsible for the success or failure of the company, creating the company culture, and setting strategy and vision.
Digital Packets
is simply a unit of data forwarded by a network.
Technological Pressures
response to these pressures by planning for improvements to reduce or manage complexity, creating faster and more accurate models to make better decisions, and innovating to sustain competitive advantages, to keep up with competitors, or to enter new markets.
Economic Pressures
response to these pressures by realizing the need to plan for or react to a changing workforce, powerful suppliers, customers, and/or competitors.
Proprietary Software
is software where the source-code and development are controlled by the developer or a licensee. Examples include Microsoft Windows, Apple's Mac OS X, and the many forms of UNIX. Open-source software, however, is software whose source-code is freely available to developers and users. Microsoft, Apple, Unix
Technological Risk
stem from computer systems, equipment, and wiring that allow employees to collaborate and produce goods and services. Risks that originate from these factors include obsolete, broken, misused, or inadequate technology or services that might cause an organization to lose money.
Object
such as forms, queries, and reports, allow the user to locate, display, and print data in different formats.
Leveraging Existing Resources
such as instruction manuals, white papers, and Internet forums, additional documentation and training can be developed with limited time and expense.
Lower CASE Tools
support development activities such as design, testing, debugging, and maintenance.
Upper CASE Tools
support system analysis and modeling
Enterprise Resource Planning (ERP)
systems tightly integrate functional areas such as accounting, finance, project management, inventory control, purchasing, human resources, customer retention, sales, and marketing into one single, comprehensive IT system to allow for more focused system wide decisions.
Porter's 5 Forces Model
that helps companies develop competitive strategies using Information Systems. Includes new entrants, substitute products or services, bargaining power of customers and suppliers, and competitive rivalry.
Direct Implementation
the old system is replaced by the new system without any rollout or overlap.
Circuit Switching
the path is decided before the transmission occurs. ideal for communications that require data to be transmitted in real-time; a constant connection is required before transmission begins. used for VoIP, video conferencing, video, and multimedia communications.
Hardware
the physical equipment and devices that make up a computer system and are connected by networks. Includes input, output, and storage devices.
Wide Area Network (WAN)
typically connects business campuses consisting of computer systems across large distances.
Local Area Network (LAN)
typically connects computer systems of an organization or a floor of a building.
Service Provider
where Amazon offers goods that are purchased and shipped, and digital services such as Amazon Web Services, where online storage space and processing power is rented, or paid as an ongoing subscription. Other examples include the many options and utilities provided by Google Apps.
Risk Mitigation Planning
where these are planned to be avoided, reduced, accepted, or transferred.
ITIL and COBIT
which deal with the management of an information technology infrastructure.
ISO 27001
which deals with information security management
ISO 9000
which deals with quality management
Electronic Data Interchange (EDI)
which is the electronic exchange of data and documents from one computer system to another through a standardized messaging format that does not require human intervention. This is most commonly used to exchange reports, purchase orders, or view invoices.
System Bus
which is the medium through which communications between the input, processor, storage, and output occur.
802.1
wireless communication protocol used to connect devices in a LAN environment.
Supply Chain Management (SCM) System
works to increase the efficiency of the process of getting materials developed into the products and pushed out to the customer.
High-Level Risk
would result in complete loss of capabilities, posing a catastrophic threat to the organization, including possible loss of life.
Customer Relationship Management (CRM) Systems
uses technology to merge marketing with business processes to strengthen customer relationships and organize customer information (likes, dislikes, and previous purchase history).
Data Retrieval
using queries, data is retrieved and combined.
Tertiary Storage
usually consists of an automated robotic mechanism to mount and dismount magnetic tape or optical discs. With the intention of storing unchanging data, regular and frequent snapshots or backups of data are placed on magnetic or optical media and then stored and/or removed from the automated system and archived.
E-Commerce
was born out of the connection and facilitation of the trade of goods and services between buyers and sellers via computer networks, or the Internet.
Code Division Multiple Access (CDMA)
was developed as the protocol during the second generation cellular networks.
Global System for Mobile (GSM)
was the protocol for the first generation of cellular networks.
Sentiment Analysis
(aka: Opinion Mining) is a software tool that businesses can use on the Internet to examine and obtain opinionated information collected from social media websites.
Data Administration
(including maintaining data integrity) recovering corrupted information, and managing users and group access to the data.
Waterfall Model
(is part of the SDLC) is the traditional systems development method, so named because each stage must be completed before moving on to the next stage. Uses the following steps: systems analysis, system design, programming, testing, conversion, and production and maintenance.
UNIVAC
(room sized) and lighter (15-ton) derivative descendent of ENIAC, this is the first commercially available mainframe
Advantages and Disadvantages of Information Technology Management
1. Brings order to chaos by providing structure, standards, policies, and protocols. 2. an organization can do a better job at competing within its markets, and effectively communicating with its stakeholders. 3. Once information technology (computers, peripherals, etc.) is implemented, support for these must be managed to minimize the risk of failure or obsolescence and to ensure that they are being properly used, managed, secured, and maintained by the people that know them.
In developing information systems, organizations generally accommodate non-domestic developers by changing the structure of operations in these different ways
1. Decentralized development, where developers in different locations develop their own solutions independently. 2. Duplicated systems development, where developers in the centralized location develop information systems and tools, which are then intended to be operated on similar systems at each of the international locations (Laudon & Laudon, 2012). 3. Networked development, where development and operations are planned, combined, and coordinated between international locations
Programming Languages
1. First Generation - Machine Languages (1GL) specific to manufacturer (switches, punch cards, etc.) 2. Second Generation - Assembly Languages (2GL) specific processor or environment 3. Third Generation - High-Level programming Languages (Fortran, Cobol, C, Java, C++, and C#) 4. Fourth Generation (4GL) - software tools that help reduce the amount of procedural knowledge (Perl, Python, Ruby, SQL, Crystal Reports, Peoplesoft, and mySAP ERP.
Challenges to Global Information Systems
1. Laws that limit information transfer, including trans border privacy and data transfer laws and other regulations. 2. Social and cultural norms. 3. Cultural particularism, which are societal norms instilled in populations that tie them emotionally to local brands or habits.
Strategies for Managing Project Risk
1. Risk Acceptance - Accepting that a risk will occur and doing nothing to avoid or prevent it. 2. Risk Avoidance - Developing an alternative plan for achieving objectives by avoiding a specific risk or risk category. 3. Risk Sharing - partnering with groups of individuals who have more experience and who will accept or absorb some of all of the risk involved. 4. Risk Reduction - Acting to reduce the potential for a risk to occur or affect damage to the project. 5. Risk Transference - Shifting risk to another party.
Major Reasons Firms Invest in Information Systems
1. achieve operational excellence 2. develop new products and services 3. attain customer intimacy and service 4. improve decision making 5. promote competitive advantage 6. ensure long-term survival 7. develop strong relationships with suppliers An information system can provide solutions to problems and economic value to a business.
Advantages and Disadvantages of Information Management
1. failures and problems can be spotted before they become too expensive to handle 2. more information can be sorted, summarized, analyzed, and digested for decision making by fewer people. 3. the use of accurate reports and analytical data, both time and money can be saved by better selecting or reworking projects so that they have the best chance for success. 4. organizations must rely on experienced and expensive human and technological resources to create them or on the companies that supply them. 5. integrations into the various sources of data, as well as the data themselves, must be accurate, reliable, and be able to be maintained.
ENIAC
30-ton 1,800 ft2 (sometimes called the "Great Brain"), the first general-purpose electronic, digital computer used to calculate artillery ranges
Categories of Generalized Ethical Issues in IT
Accessibility, accuracy, privacy, and property.
Table
A collection of related records. For example, a set of customer records would all be contained in one table.
Foreign Key (FK)
A common field that exists in multiple tables that is used to form a relationship. For example, a customer might be assigned a specific sales representative. The customer's record might contain a sales rep ID that would link to the Sales Rep table.
Primary Key (PK)
A field that uniquely identifies a record, such as customer ID or student ID.
Social E-Commerce
A form of electronic commerce which uses social networks to assist in the buying of selling of products. This type of commerce utilizes user ratings, referrals, online communities and social advertising to facilitate online shopping.
Grid Computing
A form of supercomputer constructed from many smaller systems that have been connected together.
Mainframe
A high-capacity, high-performance system built for large organizations and used to quickly process large volumes of data.
Pharming
A high-tech attack that is an act of using malicious code to redirect users to a website that mimics the appearance of an official page, but that merely collects sensitive information, such as names, addresses, phone numbers, usernames and passwords, and security questions and answers.
Tailgating
A low-tech attack that allows unauthorized personnel access to sensitive or restricted areas merely by overtly or covertly following an authorized employee through a controlled access entry point.
Shoulder Surfing
A low-tech attack that is as simple as watching someone type in their password, or obtaining sensitive information from a computer screen.
Baiting
A low-tech attack where an attacker depends on the victim's greed or curiosity to provide sensitive information. An example might be an intentionally dropped USB drive left openly in a busy parking lot.
Workstation
A more powerful system used by individuals in order to run more resource-intensive applications.
Business Ecosystems
A network of businesses, such as suppliers and distributors, that are involved in providing delivery of a service or product through cooperation.
Record
A set of related fields, also called a tuple, that describe one occurrence of an entity, such as a customer.
Virtual Computing
A software-based platform that allows multiple virtual servers, isolated from host computer, to operate on a single or, potentially, a fabric of many systems. Initially intended to more efficiently use expensive and underutilized hardware, virtualization has allowed for better fault tolerance and flexible, dynamic, and automated server operation and maintenance.
Field
An attribute of an entity, such as name, address, or student ID.
TELNET
An early and insecure remote access protocol used to allow a user to log on to a remote system.
Quid Pro Quo
An exchange of something of value for information.
Portals and Connections
Applications, protocols, and other technology that allow protected and unprotected connections from one computer to another.
Content Provider
As with traditional newspapers, cinemas, and video stores, online content providers rent or sell online access to digital content, such as music, news, video, and images. Examples include iTunes, Shutterstock, and Netflix.
E-Tailer
As with traditional retailers of goods, groceries, and other physical products, they provide access for the sale of physical goods, which are then shipped to their customers. Examples include pure-play firms such as Amazon, as well as traditional brick-and-mortar organizations such as Best Buy and Walmart.
Evolution of Software
Before the late 1940s, reprogramming a computer with different instructions consisted of changing manual switches (as in on or off switches), wiring, or using punched cards to reconfigure mechanical components within them. a) From the first numerically based computer languages, such as FORTRAN in the 1940s and 1950s. FORTRAN stands for Formula Translation/Translator and is used for math, engineering, and scientific calculations b) English-like programming languages, such as COBOL in the 1960s. COBOL stands for Common Business Oriented Language and was the first computer software language for business applications. c) Java and C++ are examples of contemporary programming languages, with Java enabling online game development. d) Integrated Development Environment (IDE) is a programming environment that provides tools, like compilers and debuggers, for developers to write code. e) Pseudocode is an informal high-level description of the operating principle of a computer program or other algorithm. It uses the structural conventions of a normal programming language, but is intended for human reading rather than machine reading. Pseudocode typically omits details that are essential for machine understanding of the algorithm, such as variable declarations, system-specific code and some subroutines.
Six Methods to Increase User Adoption
Benchmarking, usability testing, user communication, forming an internal user group, planning, and leveraging existing resources.
Direct Marketing
Both manufacturers and retailers may sell directly to their customers using a disintermediated online marketing strategy, perhaps in addition to others.
Localized and Personalized E-Commerce
Businesses that understand their customer patterns and desires, and can quickly provide them with what they need in the areas where they live, with a tolerable adjustment in quality, will help to gain their trust and respect. Leads to more sales.
SDLC - Disadvantages
Difficulty in responding to change, time intensity, limited iteration, and inability to easily return to an earlier stage.
Electronic Communication
Email, instant messaging, audio and video communications, and unified communications.
Point-to-Point Protocol (PPP)
Encryption is used to ensure the privacy of the content being communicated.
Moore's Law
First postulated by Intel co-founder Gordon Moore in 1965, Moore's Law says that computing power and storage capacity will continue to increase or double approximately every two years.
Dumpster Diving
Gathering sensitive or nonsensitive information from refuse. This sometimes illegal act is as simple as foraging through household or corporate garbage receptacles for information.
Digital Goods
Goods that may be purchased and downloaded, versus requiring physical delivery to acquire, or shipment from a retailer's physical or electronic storefront. Such goods have a delivery-on-demand nature, a miniscule inventory footprint, and a near zero cost per unit to produce more. Products with these characteristics include music, video, traditionally printed material (e.g. newspapers and magazines), and, given trends in 3D printing, eventually more tangible products, too.
Web Programming Languages
HTML - Hyper Text Markup Language - converts plain-text document into one optimized for viewing as a web page. HTML5 allows developers to better embed multimedia without special add-ons. XML - Extensible Markup Language - similar to HTML, but easier to exchange and interpret data between a variety of applications and systems. Web Design Tools - WYSIWYG (Dream Weaver, Visual studio). Graphic Tools - interactive multimedia are popular in web pages. Photoshop, flash, and premier. SEO - tools that allow webmasters to achieve better rankings.
Global Information Systems Business Strategies
Is any information system which attempts to deliver the totality of measurable data worldwide within a defined context.
Variable (referencing a data type)
In computer science and computer programming, a data type or simply type is a classification of data which tells the compiler or interpreter how the programmer intends to use the data. Most programming languages support various types of data, for example: real, integer or Boolean. A Data type provides a set of values from which an expression (i.e. variable, function...) may take its values. The type defines the operations that can be done on the data, the meaning of the data, and the way values of that type can be stored.
Entity
In the relational database model, a person, item, event, etc., for which an organization collects data.
Simple Network Management Protocol (SNMP)
Information concerning network status that is periodically passed between a network management server and routers on a network, for the purpose of monitoring network status.
Data Consistency
Inputting consistently by using the same descriptions, standards, units of measurement, and formats can mean the difference between success and failure.
Accessibility Issue
Issues created by barriers to access, implying that some should have access while others should not.
Property Issue
Issues created by the association of rights of property ownership to tangible and intangible goods and information.
Privacy Issue
Issues created by the collection, storage, distribution, or mere availability of potentially sensitive information.
Accuracy Issue
Issues created by the trustworthiness, accuracy, and legitimacy of information.
Software
Made up of programs and instructions to run your computer and network.
Secure File Transfer Protocol (SFTP)
Much like HTTPS, this uses secure technologies, this time Secure Shell (SSH), to secure the connection for transferring files from computer to computer.
Virtual Company Model
Networks of people and resources join together to provide a service or create a product without the traditional storefront boundaries.
Processes
Processes and procedures provide a structured sequence of activities to govern the use, operation, and maintenance of IS.
On premises
Services are provided in-house on servers or in a data center owned, managed, and administered by the organization.
Analytical Platforms
Purpose-built appliance systems that are designed to process and analyze enormous amounts of data quickly.
Web Page, File Storage, and Hosting
Repositories of information, storage for retrieval or archival of documents, programs, applications, and consumables such as audio and video.
The Ethics Rules of Behavior
Responsibility, accountability, and liability
The Operational and Functional Benefits of E-Commerce
Selling wares, improving its reputation and creating efficiencies.
Domain Name Service (DNS)
Server-based service that translates human language web address or URL into an IP address, which is used.
Technological Measures
Several software and hardware applications exist to aid individuals in protecting their privacy. From a defensive perspective, these include anti-malware applications and intrusion protection. From a proactive perspective, these include the encryption of email and sensitive web traffic, and implementation of devices to aid in identity and approved equipment verification. Additional options include privacy policies and automated settings that configure a web browser's security, which can then compare them to the privacy policy published on specifically configured websites.
The Four Types of Network Bridging
Simple bridging, multiport bridging, learning or transparent bridging, and source route bridging.
Personal Computers (PC)
Small systems are used on an individual basis (i.e., one-person use) and include traditional multi-component desktop systems (monitor, computer, keyboard, mouse) and integrated systems, such as laptops and tablet computers.
Mobile E-Commerce (mCommerce)
Smartphones and tablets are very popular communication devices, personal and professional organizers, and portable decision support systems. Businesses that actively market to their customers via these devices, either as a direct channel for doing business, through product or brand marketing through placement in the integrated applications, or in developing salable mobile applications, have an important avenue for gaining and keeping their customers.
Computer Programmers
Someone who writes code to instruct computers to perform certain tasks.
Standards Organizations
The organizations that help with continuity of communications, including the Internet Architecture Board (IAB), the International Electronics and Electrical Engineers (IEEE), Internet Corporation for Assigned Names and Numbers (ICANN), Internet Engineering Task Force (IETF), and World Wide Web Consortium (W3C).
Service Providers
The telecommunications companies that build networks to support their customers (e.g., Time Warner, Cox Cable, and CenturyLink).
End Users and Content Providers
The various users and organizations that ultimately pay for the Internet.
Utilitarian Approach
This approach assesses the consequences and/or outcomes of an action to determine the greatest good or least harm for the greatest number, regardless of the justice or fairness of or to the individual.
Fairness Approach
This approach values individual moral rationality—otherwise referred to as the Golden Rule, or "do unto others as you would have them do unto you"—asks society to reflect on the consistent treatment of others based on the desires of how an individual expects to be treated.
Rights Approach
This approach values rights specified by society, which may be largely based on the analysis of other ethical approaches, and allows individuals to weigh decision choices based on legal or legislative precedent.
Common Good Approach
This big picture approach values choices and motivations that perpetuate value for everyone, to sustain a positive whole-community benefit, despite individual income or position.
Big Data
This is a very large data set (structured or unstructured) that are too complex or voluminous for traditional data processing systems to manage and they can be mined or analyzed to find new trends or relationships for business intelligence. Three factors to consider: Volume, Variety, and Velocity.
Executive Information System (EIS)
This system supports senior executives by providing important data in the form of graphs and charts to analyze and identify long-term trends.
Supercomputer
This term merely implies the fastest category of computer available and are built to handle vast amounts of information very quickly.
Major Components of a Project
Time, Scope, Resources (cost), and Quality
Value Creation Through Technology Use
Today's computer technologies, such as wireless sensor networks and cloud computing, allow organizations to create added value in nearly every industry and profession. As a result, several industries have been created, along with many professions, jobs, and fortunes. Technology tools have evolved over the years to create value for business by facilitating calculations, documents creation, and graphs.
The Two Categories of Tools
Upper CASE and Lower CASE.
Geographic Information Systems (GIS)
Using connections to numerous databases containing data concerning locations, crimes, taxes, traffic, votes, and environmental and life science data, geospatial analysis can help government administrators to understand demographic trends, population density changes, attribute concentrations (e.g. poverty, crime, or disease outbreaks) and quite a number of other important and factual indicators. Part of Business Intelligence application.
Mobile Information Availability
With the increasing use of mobile computing platforms connected to the Internet, including smartphones and tablets, more information input and output is available to more people in more places.
Hadoop
a Java based open (i.e., non-proprietary) programming framework that supports big data collection, processing, and analytics of a distributed computing environment.
Black Hat
a computer hacker with criminal intent.
Grey Hat
a computer hacker with the skills and intent to help organizations protect their networks and systems from others, but whose services may come at a price, or can be sold to the highest bidder.
Data Warehouses
a large centralized collection of digital data gathered from one or more sources and organized by subject to support business analysis and decision making tasks. Think of Epic
Multidimensional Databases
are typically relational databases that store data in a cube, which contains aggregated data related to all dimensions and allow businesses to visualize data assets in multidimensions to see what is happening in real time.
Dynamic Host Configuration Protocol (DHCP)
a server or appropriately configured router automatically and temporarily assigns IP addresses to these enabled systems on the network.
Value Chain
a set of inputs used by a strategic information system and put into meaningful outputs to help a company gain a competitive advantage in the marketplace
Clickstream Applications
are those that track and analyze an application's activity, including how it is used and where a user clicks.
Network
a system of computers joined together so they can communicate and share resources.
Zero-Day Attack
a threat or attack that exploits known or unknown vulnerabilities in software.
Asynchronous Transfer Mode (ATM)
a virtual circuit protocol that was designed to provide quality of data of voice and video via circuit switching.
Primary Storage
are typically referred to as volatile flash memory, meaning that information storage is temporary and can only be stored until power is removed. Includes RAM, Cache Memory, and ROM, that is directly accessible to the CPU.
Major Business Functions Provided by Information Systems
accounting and finance Human Resources Production and Operations Sales and Marketing
Global Exporting
all services from the organization's home location means not changing the centralized structure and requiring all but production to stem from the centralized domestic location, including systems and data storage.
Network Interface Cards
allow computers to connect to networks.
Virtue Approach
allow us to act in aspirational ways, including compassion, trustworthiness, honesty, generosity, kindness, autonomy, courage, obedience, and many more.
Bridging
allows multiple different networks to communicate independently while remaining separate.
Creating Efficiencies
allows the customers to have a closer connection with the company through email or social media. Social media allows businesses to close the feedback loop.
User Communication
allows users to provide input through various communications methods, including meetings. This communication allows users to share best practices, experiences, and tips that may help other users.
White Hat
an authorized and ethical computer hacker*, one who helps organizations to protect their networks and systems from others, via penetration testing, or the design and implementation of policies.
Cyber Criminal
an individual or organization interested in exploiting computers and networks for the purpose of generating revenue. Note that organized crime has a very active presence in cybercrime.
Hacktivist
an individual or organization interested in vandalism, cyber-terrorism, or hacking for a stated cause or purpose.
Information Systems
an integrated network of components that provide managerial and operational support to businesses by collecting and processing data into useful information as well as providing for storage, retrieval, and security of data and the information it's transformed into.
Quantitative Risk Analysis
analysis involves the measurement of the probability and consequences of risks and estimating the implications for the project.
Online Analytical Processing (OLAP)
and are analytical, fixed databases that enable users to analyze data in order to make management decisions.
The Seven Layers of OSI
application, presentation, session, transport, network, data link, and physical.
Master Data
are business objects or values possessing a unique value and are shared across the entire enterprise. Can be used in all types of databases, are not sorted into tables, and are key to accurate business reporting analysis.
Analog Signals
are continuous electrical waveform signals.
Multinational franchising, licensing, joint venture, or foreign direct investment, or similarly branded, semi-independent organizations
are controlled locally but coordinated (perhaps loosely) through the centralized organizations' structure. Information systems and data storage in this model is typically decentralized at each foreign location, or at strategic location(s) in the local region.
Three Primary Components of Group Decision Support Systems (GDSS)
are hardware (including networking and display equipment), software (including web-based conferencing applications), and the people who are collaborating in the decision-making process.
Wireless Sensor Networks (WSN)
are location or spatially distributed sensors that emit wireless signals with specific information and are used to monitor physical or environmental conditions. And are able to transmit and receive signals via built-in antennas.
Low-Level Risk
are moderately serious and would have a noticeable impact on the organization, resulting in a negative outcome and possible damage.
Ethics
are moral principles and concepts, rules of behavior, and often the underpinning of codes of conduct based on accepted standards of right and wrong.
Relational Database Model
are one of the most common database models in use today and are based upon the relational model of data, which is a method of structuring data using relationships (or primary keys), in rows and columns. This is a centralized database.
Tuples
are ordered lists of values and are used for grouping and organizing data and can be used to represent related data that belong together, such as student records, and are used in database relational models.
Attributes
are properties of entities, such as the address or phone number of a person or business.
Web Developers
are responsible for creating and maintaining a company's website.
Information Security Analysts
are responsible for the security of a company's network, data, and information.
The Five Criteria for Providing Access to a File or System
are roles, groups, time, transaction type, and location.
People
are the information system professionals and users who use computers
Growth Strategy
can include adding new products or new enhancements to existing products and can also include acquisition, where one business purchases another.
Data Scrubbing
checks for data consistency; it will check, fix corrupted records, and remove bad records from the database.
The Two Models of Management in the Decision-Making Process
classical and behavioral models
SDLC - Advantages
clear project objectives, strict approval requirements, progress measurement, and requirement stability.
Environments
combine multiple tools or workbenches to support the complete software cycle.
Workbenches
combine several tools for software development to achieve a simple, consistent interface, and a seamless integration of data and control.
Forming an Internal User Group
consisting of users who support and resist the system can provide the implementation team and management with feedback that may help increase user adoption.
Business Intelligence (BI)
consists of databases, data warehouses, and analytical platforms that analyze a company's raw data and play a major role in strategic planning. enable managers and others in the enterprise to make better and more informed decisions.
Transmission Control Protocol (TCP Protocol)
consists of four abstraction layers: application, transport, Internet, and network access.
System-Level Security
consists of the architecture, policy, and processes that establish the security on computer systems.
Intelligence Phase
consists of the discovery, identification, and understanding of the problem. During this phase, a problem may be classified or broken down into subproblems.
Implementation Phase
consists of the execution of the alternative and continual performance monitoring. Because this frequently requires the introduction of change, resistance may occur, necessitating the importance of user adoption and management support.
Design Phase
consists of the identification and exploration of alternatives and solutions to the problem. Also includes the construction of a model of the problem and the evaluation of the alternatives for feasibility.
Choice Phase
consists of the selection of an appropriate solution from the available alternatives. Specific values may be assigned to the decision components during this phase.
Business Analytics (BA)
consists of tools and techniques used for the analysis and understanding of data. Includes: data mining, modeling, statistics, and OLAP
Central Processing Unit (CPU)
contains the circuitry necessary to interpret and execute program instructions that allow a computer to function.
Network-Based Strategies
create mutually beneficial partnerships between businesses.
Web Mining
creates databases which are mined to understand customer behavior and improve customer intimacy.
Pretexting
creating a believable scenario (whether innocuous or serious) for the purpose of obtaining information (email, etc.)
Advanced Data Analysis
data has been collected, stored, and made available for a wide array of analyses. These analyses may be general or specific, potentially very intricate, and may expose information or non obvious relationships and connections, leading to breaches of privacy and trust.
The Four Components of Decision-Support Systems (DSS)
data, model, knowledge, and user interface management.
Name the Steps in the Decision-Making Process
define the problem, identify any limiting factors, develop potential alternatives and solutions, analyze the alternatives, select the most desirable alternative, implement the decision.
Data Dictionary
defines and manages the data types and structures that dictate how the database is organized.
Behavioral Model of Management
focuses more on the individuals in the workplace, with less emphasis on the rules, procedures, and production. And supports worker satisfaction and positive working conditions.
Classical Model of Management
focuses on rules and procedures to maximize productivity. Social needs of employees are not considered; instead, the focus is on centralized decision making and profit maximization.
Digital Signals
discrete, binary, noncontinuous electrical waveforms.
Visual and Geographic Analyses
enable data to be analyzed based on patterns, relationships, or geographic data.
Big Data Analytics
enables a business to recommend products or services to customers based upon analysis of customer preferences, purchase history, and Internet search history.
Radio Frequency Identification (RFID)
enables a company to track merchandise or inventory by radio frequency signals (electronic tags placed on objects or smart labels).
Data Cleansing
ensuring data accuracy and integrity by correcting inaccurate information and deleting erroneous or duplicate data.
Function-Oriented Evaluation
examines the performance of data, hardware, software, networks, and human resources.
Analyze Risk
first determine the impact to the business should that risk occur and the likelihood that this risk will actually occur.
Decision-Support Systems (DSS)
focus on supporting all phases of specific decision-making processes and procedures for arriving at a solution.
Elements of Risk Management
identification, qualitative analysis, quantitative analysis, and response planning.
Gated-Access Approach
in which a member can only contact another member if the two members have an existing relationship, or are referred by a mutual contact.
Input Components
include devices that provide input into the processing unit. These include peripherals, such as the keyboard, mouse, microphone (audio input), sensors, and document or visual scanners.
Output Components
include internal storage devices or processes, as well as external peripherals such as monitor screens (visual output), speakers (audio output), and printers (physical output).
Storage Components
include primary temporary storage and secondary long-term storage devices. Random access memory (RAM) is temporary or short-term storage used by the processor. A hard drive is long-term storage that acts as a reserve aide for short-term storage or to store output data. Other storage includes peripheral devices such as external hard drives and removable media (floppy disks, optical discs, and flash drives).
Risk Management Strategies
include promoting project leadership skills, learning from previous projects and experience, sharing knowledge, and creating a project management culture within the IS organization.
Processing Components
include the central processing unit (CPU), which is the brain of the computer. Historically this unit included several components, such as a control unit, a processor, an arithmetic or logic unit, and memory components. Modern CPUs have merged these components into an integrated design. Today, multiple-core processors can be used in tandem for a single computer, tablet, or smartphone. Supercomputers exist today that have the equivalent of millions of processors.
Input Devices
included now-archaic punch cards or magnetic readers and contemporary input, such as analog audio (e.g., voice recognition), keyboard input, touch sensitive screens, biometric scanners (e.g., fingerprint, hand, or eye scanners), motion detection, optical character recognition (OCR) (e.g., from a document scanner), and image capture (e.g. from cameras or other imaging equipment).
Output Devices
includes document printers, audio output devices (i.e., speakers), visual output (e.g., monitors and televisions), and computer-aided design equipment.
SDLC - Weaknesses
increased development time and cost, necessity for upfront system definition, rigidity, difficulty of cost estimation, and occasional limited user input.
The Three Risk Factors that Contribute to Vulnerability of IS
information loss from the environment, organizational, and technological sources.
Network and Computer System Administrators
install and repair computer systems, as well as identify and fix network issues.
The Four Phases of the Decision-Making Process
intelligence, design, choice, and implementation.
What Areas is E-Commerce Expansion Going
localized and personalized, mobile, and social
The Three Levels of Risk for System Security
low, moderate, and high.
Server
manages network resources and services
Chief Financial Officer (CFO)
manages the company finances.
Distributed Database
may be stored in multiple computers
Dynamic Data
may change after it is recorded, and has to be continually updated.
Multinational Organization
means that organizational divisions would be headquartered in different locations, whether partially with an international organization or completely with a transnational organization.
Database Technical Specialist
must know how to capture and use the company's data.
Social Engineering
normally low tech attacks used to trick individuals into disclosing information, providing access, or changing their patterns.
Scope Creep
occurs when the project continues to grow in scope, or uncontrolled changes occur during the course of the project.
Peer-to-Peer Networks
offer a faster connection between nodes, because information is stored locally on each individual computer and not one central server.
Long-Term Evolution (LTE)
offer data transmission speeds of 5 to 12 Mbps in the UHF band.
Cloud Services
offer scalability, allowing users to store data and use software applications as needed at any given time. Infrastructure, platform, and software are the three categories of services provided.
Portal
online portal provides gateway access to information, entertainment, and business. With an enormous number of websites, storefronts, and encyclopedias, several portals exist and serve as the starting point for many on the Internet. Examples include Google, Yahoo, and Bing.
IT Managers, Project Managers, and Architects
organize, direct, coordinate, and plan IT-related activities, people, and projects within an organization.
Chief Operating Officer (COO)
oversees the daily operations in a business and communicates the organization's mission statement to employees.
Text Mining
performs big data analysis on unstructured data such as emails, survey questions, and memos to reveal consistent patterns and relationships.
The Six Analytical Functions used by Business Intelligence
production reports, parameterized reports, dashboards and scorecards, ad hoc report creation, drill down capabilities, forecasts, models, and scenarios.
Group Decision Support Systems (GDSS)
provide interactive collaboration support for multiple decision makers at multiple geographic locations through digital communication and the use of numerous resources and tools.
Strategic Information Systems
provide tools used by an organization to accomplish specific tasks in order to gain a competitive advantage in the marketplace.
Logical Model
provides an image or diagram of the users, inputs, outputs, and processes of the system
Internet Service Providers (ISPs)
provides internet connectivity.
Cloud Computing
provides shared resources and applications remotely as a shared service over the internet.
Computer Support Specialist
provides technical support to customers and employees through direct interaction or telecommunications. The support could be through training or troubleshooting technical issues.
Cultural Pressures
response is by using ethical business practices, building strong cultural ties with stake holders, socially responsible, enacting sustainable business policies and practices.
Political and Legal Pressures
response is to enact policies, complying to standards, and allying with experienced partners.
Social Media
refers to a collection of web-based applications that allow the creation and transfer of user-generated content over the Internet.
Omni-Channel
refers to e-commerce facilitated by e-business connections, dynamic variability, and inherent scalability. Warehouses filled with inventory become distribution centers, physical retail storefronts become hybrid warehouse, distribution, and direct customer interaction nodes focused on a seamless online/offline customer experience. As a result, inventory volume is reduced and operations become leaner and better able to react to changes in demand.
Web 2.0
refers to the Internet sites that emphasize usability, interoperability, and user-generated content.
Data Integrity
refers to the accuracy and consistency of the data stored in a DBMS. By assigning security permissions, you can limit the risks to destruction of the data by allowing users to add, but not delete, data from the customer database.
Information Technology
refers to the hardware and software required to manage and deliver information.
Management Information Systems (MIS)
represent a category of information systems that serve low or first level managers and are usually focused on short- to medium-term business decisions.
Unstructured Decisions
require the decision maker to provide the necessary insight, judgement, and evaluation to reach a decision. Individuals in senior management frequently make unstructured decisions.
Software Development Life Cycle (SDLC)
requirements obtained from stakeholders to develop their software. and includes analysis, design, implementation, and testing.
Usability Testing
requires a formal meeting with several users which includes an interview and observation or screen-sharing. Information obtained during this process will assist with the development of additional training or system customization.
DRAM
the most common type of RAM and is used as system memory, when large amounts of RAM are needed.
Business-to-Government (B2G)
the concept that businesses and government agencies can use central Web sites to exchange information and do business with each other more efficiently than they usually can off the Web.
Freemium
the core service might be free, but additional features and services may be available for a charge. Mobile phone apps and games are an example of this concept, where limited versions of software are available for free, but often charge a fee for full versions, additional features, or related digital goods.
Network Economics
the cost of adding another business participant to a business venture is small, the potential gain is great.
Data Management
the creation, update, and deletion of the data within the database.
Computer Systems Analyst
their job is to analyze a user's needs and determine the most efficient and effective solution and they combine their business knowledge with technical expertise.
Environmental Risk
these are inevitable such as weather, fire, flooding, etc.
Data Packet Switching
these are sent out and travel across the Internet in random order.
Database Normalization
they must go through this in the design process to simplify complexity where possible and remove redundancy between elements.
Private Industrial Networks
this means that a single organization controls the construction and maintenance of relationships for and between a relatively small numbers of other organizations. For example, Ford Motor Corp's private industrial network allows Ford, as well as a variety of other suppliers and distributors associated with Ford, to communicate, collaborate, and conduct business.
Product Differentiation Strategy
this strategy can include offering a higher quality product or service. a) A core competency is an activity for which a business is a marketplace leader. b) Synergy is the cooperation between several businesses to produce a better product or service than would be possible if each business worked independently. Companies must clearly understand their strengths and weaknesses and join forces with other companies to create positive synergy.
Dynamically Optimized Pricing
this tactic is used to set prices according to market pressures, including locality, demand level, competitors pricing, the time of the day, week, or year, and a customer's willingness to pay. E-commerce and the aid of modern big data analytical tools allow businesses to dial in for tighter control of their prices in order to gain improved profit margins.
Advertising
through direct marketing such as popup and email advertising, in application advertising, and affiliate advertising programs, helping a business to grow their customer base.
Digital Market
to sell goods and services, as well as the creation and sale of goods that were completely digital. The flexibility and efficiency provided by digital markets allow for diminished search costs, costs for changing prices, and a better ability to change prices for different types or categories of customers or sellers, or as market conditions change.
The Three Categories of CASE
tools, workbenches, and environments.
Edge (boundary) Router
transfers data packets between one or more LANs and an asynchronous transfer mode (ATM) network.
Energy Management Systems
transforms energy data into information so businesses can understand energy consumption and patterns.
Telecommunication Networks
transmit information in the form of data, voice, or video, and are carried by a medium such as light or electrical signals. The telephone and internet are two examples.
The Three Types of Decision-Making Process
unstructured, semi-structured, and structured.
Executive Support Systems (ESS)
use internal and external data to help executives make unstructured decisions.
Non-Relational Database
uses a flexible model in which data are distributed among several machines, often in a cloud-computing format. Least expensive option because no central server is required.
Hypertext Transfer Protocol Secure (HTTPS)
uses technologies such as Secure Socket Layer (SSL) and Transport Layer Security (TLS) to encrypt and decrypt data between the user and web server.
Knowledge Management Systems (KMS)
uses technology such as the Internet, collaboration software tools, and databases, to facilitate the capturing of corporate data and helps companies deal with personnel turnovers and rapid changes.
The Five Basic Steps in the Decision Analysis Process
• Create a model or diagram of the decision. • List all potential alternatives in the model. • Assign numerical or monetary values to the probability of each outcome. • Analyze the expected return for each outcome and combinations of outcomes. • Analyze the return in conjunction with outcome sensitivity, probable utility for the organization, and organizational or user risk tolerance.
Advantages of Decision Trees
• They are simple to understand and interpret. • They contain value with limited, detailed data. • Important insights can be generated based on the description of a situation, the alternatives, probabilities, and costs. • They enable the addition of new scenarios. • They help determine best, worst, and expected values for each scenario. • They can be combined with other decision analysis tools and techniques.
The Benefits Delivered by Social Media to Businesses and Organizations
• detailed marketing research • company-to-customer and user-generated communication • relationship development through customer • loyalty programs • increased use of e-commerce • targeted sales promotions • Long-tail marketing