BIS Nelson Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Attributes

(also called columns or fields) are the data elements associated with an entity

Entity

(also referred to as a table) stores information about a person, place, thing, transaction, or event

Managerial Level

(semi-structured decisions) employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change

Operational Level

(structured decisions) employees develop, control, and maintain core business activities required to run the day-to-day operations

Strategic Level

(unstructured decisions) managers develop overall business strategies, goals, and objectives as part of the company's strategic plan

Primary Reason Projects Fail

-Unclear or missing business requirements. -Skipped SDLC phases. -Changing technology. -The cost of finding errors. -Balance of the triple constraints.

Areas of Support Provided by Information Infrastructure

-backup and recovery plan -disaster recovery plan -business continuity plan

Web 2.0 Characteristics

-content sharing through open sourcing -user-contributed content -collaboration inside the organization -collaboration outside the organization

Ebusiness Tools

-email -instant messaging -contact management system -web conferencing -podcasting -videoconferencing

Challenges Facing Ebusiness

-identifying limited market segments -ensuring customer protection -managing customer trust -adhering to taxation rules

Ethical Guidelines for Information Management

-information secrecy -information governance -information compliance -information management -information property

Challenges of Business 2.0

-technology dependence -information vandalism -violations of copyright and plagiarism

Disruptive Business Technologies

1) 3D Printing 2) RFID 3) Drones 4) Robotics

Five Common Characteristics of High-Quality Information

1) Accurate 2) Complete 3) Consistent 4) Timely 5) Unique

Four Common Extended ERP Components

1) Business intelligence. 2) Customer relationship management. 3) Supply chain management. 4) Ebusiness.

Three Pressures Driving Sustainable MIS Infrastructures (Increases as a result of technological advances)

1) Carbon Emissions 2) Energy Consumption 3) Ewaste

Common Reasons Companies Outsource

1) Core Competencies 2) Financial Savings 3) Rapid Growth 4) The Internet and Globalization

Three Core Concepts of Data Warehousing

1) Data Mart 2) Data Mining 3) Information Cleansing or Scrubbing

Three Organizational Methods for Analyzing Big Data

1) Data Mining 2) Big Data Analytics 3) Data Visualization

Types of Feasibility Studies

1) Economic Feasibility 2) Operational Feasibility 3) Schedule Feasibility 4) Technical Feasibility 5) Political Feasibility 6) Legal Feasibility

Sustainable MIS Infrastructure Components

1) Grid Computing 2) Virtualization 3) Cloud computing

The Four Primary Traits of the Value of Information

1) Information Type 2) Information Timeliness 3) Information Quality 4) Information Governance

Cloud Service Delivery Models

1) Infrastructure as a Service 2) Software as a Service 3) Platform as a Service

Outsourcing Challenges: Length of Contract

1) It can be difficult to break the contract. 2) Forecasting business needs for the next several years is challenging and the contract might not meet future business needs. 3) Recreating an internal MIS department if the outsource provider fails is costly and challenging.

Outsourcing Challenges

1) Length of Contract 2) Threat to Competitive Advantage 3) Loss of Confidentiality

A Typical Supply Chain

1) Materials flow from suppliers and their upstream suppliers at all levels. 2) Materials are transformed into semifinished and finished products—the organization's own production processes. 3) Products are distributed to customers and their downstream customers at all levels.

Four Primary Reasons For Low-Quality Information

1) Online customers intentionally enter inaccurate information to protect their privacy. 2) Different systems have different information entry standards and formats. 3) Data-entry personnel enter abbreviated information to save time or erroneous information by accident. 4) Third-party and external information contains inconsistencies, inaccuracies, and errors.

Outsourcing Models

1) Onshore Outsourcing 2) Nearshore Outsourcing 3) Offshore Outsourcing

The Five Basic Supply Chain Activities

1) Plan 2) Source 3) Make 4) Deliver 5) Return

Cloud Computing Environments

1) Private Cloud 2) Public Cloud 3) Hybrid Cloud 2) Community Cloud

The Three Business Areas of Supply Chain Management

1) Procurement 2) Logistics 3) Materials Management

The Three Primary Enterprise Systems

1) Supply Chain Management 2) Customer Relationship Management 3) Enterprise Resource Planning

RFID Components

1) Tag 2) Reader 3) Computer Network

Four Common Characteristics of Big Data

1) Variety 2) Veracity 3) Volume 4) Velocity

Ebusiness Models

1. B2B 2. B2C 3. C2B 4. C2C

Managerial Decision-Making Challenges

1. Managers need to analyze large amounts of information 2. Managers must make decisions quickly 3. Managers must apply sophisticated analysis techniques, such as Porter's strategies or forecasting, to make strategic decisions

Three Areas of Information Security

1. People- Authentication and Authorization 2. Data- Prevention and Resistance 3. Attacks-Detection and Response

The Six-Step Decision-Making Process

1. Problem Identification 2. Data Collection 3. Solution Generation 4. Solution Test 5. Solution Selection 6. Solution Implementation

Backup and Recovery

Backup: Provides an exact copy of a system's information Recovery: able to get a system up and running after a crash

Example of Low-Quality Information

Completeness- numbers 1 and 2 and 6 Consistency- number 3 Accuracy- numbers 4 and 5

Core drivers of the information age

Data, Information, Business Intelligence, Knowledge

Key Areas of Technology Recovery Strategies

Hardware- servers, computers, wireless devices Software- applications such as email, payroll, Instant messaging Data Center- climate control, power supply, security Networking- wireless, LAN, fiber, cable

Business Intelligence

Information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making

Outsourcing Challenges: Loss of Confidentiality

Information on pricing, products, sales, and customers can be a competitive asset and often critical for business success. Outsourcing could place confidential information in the wrong hands. Although confidentiality clauses contained in the contracts are supposed to protect the company, the potential risk and costs of a breach must be analyzed.

Outsourcing Challenges: Threat to Competitive Advantage

Many businesses view MIS as a competitive advantage and view outsourcing as a threat because the outsourcer could share the company's trade secrets.

Advanced Encryption Standard (AES)

National Institute of Standards and Technology (NIST) introduced this to keep government information secure

Information Type

Transactional: encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks Analytical: encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis tasks

Information Security

a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization

Data Artist

a business analytics specialist who uses visual tools to help people understand complex data

Management Information Systems (MIS)

a business function, like accounting and human resource, which moves information about people, products, and processes across the company to facilitate decision making and problem solving

Neural Network

a category of AI that attempts to emulate the way the human brain works. Neural networks analyze large quantities of information to establish patterns and characteristics when the logic or rules are unknown

Grid Computing

a collection of computers, often geographically dispersed, that are coordinated to solve a problem. A problem is broken down into pieces and distributed to many machines

Big Data

a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools

System

a collection of parts linked to achieve a common purpose

Record

a collection of related data elements

Market Share

a common external KPI, the proportion of the market that a firm captures

Network

a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate

Makerspaces

a community center that provides technology, manufacturing equipment, and educational opportunities to the public that would otherwise be inaccessible or unaffordable

Semantic Web

a component of Web 3.0 that describes things in a way that computers can understand, not about links between web pages; rather it describes the relationships between things (such as A is a part of B and Y is a member of Z) and the properties of things (size, weight, age, price)

Drive-By Hacking

a computer attack by which an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network

Competitive Click-Fraud

a computer crime in which a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking the advertiser's link

Server

a computer dedicated to providing information in response to requests

Client

a computer designed to request information from a server

Virtual Reality

a computer-simulated environment that can be a simulation of the real world or an imaginary world

Nonrepudiation

a contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions

Maker Movement

a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things

Variable

a data characteristic that stands for a value that changes or varies over time

Digital Certificate

a data file that identifies individuals or organizations online and is comparable to a digital signature

Structured Data

a defined length, type, and format and includes numbers, dates, or strings such as Customer Address.

Smart Card

a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing

Data Center

a facility used to house management information systems and associated components, such as telecommunications and storage systems

Competitive Advantage

a feature of a product or service on which customers place greater value than they do on similar offerings from competitors (ex: lower price), temporary because they can be duplicated

Entry Barriers

a feature of a product or service that customers have come to expect, and entering competitors must offer the same for survival

Primary Key

a field (or group of fields) that uniquely identifies a given record in a table

Ransomware

a form of malicious software that infects your computer and asks for money

Uplift Modeling

a form of predictive analytics for marketing campaigns that attempts to identify target markets or people who could be convinced to buy products

Pretexting

a form of social engineering in which one individual lies to obtain confidential data about another individual

Business Process Model

a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint

PERT (Program Evaluation and Review Technique) Chart

a graphical network model that depicts a project's tasks and the relationships between them

Business Process Model and Notation (BPMN)

a graphical notation that depicts the steps in a business process, provides businesses with a graphical view of the end-to-end flow of their business processes

Zombie Farm

a group of computers on which a hacker has planted zombie programs

Hashtag

a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#)

Business Strategy

a leadership plan that achieves a specific set of goals or objectives such as increasing sales, decreasing costs, entering new markets, or developing new products or services

Data Warehouse

a logical collection of information, gathered from many operational databases, that supports business analysis activities and decision-making tasks, standardizes information

Dependency

a logical relationship that exists between the project tasks, or between a project task and a milestone. PERT charts define dependency between project tasks before those tasks are scheduled

Ezine

a magazine published only in electronic form on a computer network

Balanced Scorecard

a management system, as well as a measurement system, that a firm uses to translate business strategies into executable tasks Uses- 1) The learning and growth perspective. 2) The internal business process perspective. 3) The customer perspective. 4) The financial perspective

Phishing Expedition

a masquerading attack that combines spam with spoofing

Internet

a massive network that connects computers all over the world and allows them to communicate with one another

Fuzzy Logic

a mathematical method of handling imprecise or subjective information. The basic approach is to assign values between 0 and 1 to vague or ambiguous information. Zero represents information not included, whereas 1 represents inclusion or membership.

Customer Relationship Management (CRM)

a means of managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability

Information Integrity

a measure of the quality of information

Authentication

a method for confirming users' identities

Disruptive Technology

a new way of doing things that initially does not meet the needs of existing customers, tend to open new markets and destroy old ones

Customer Service and Support (CSS)

a part of operational CRM that automates service requests, complaints, product returns, and information requests

Business Process Patent

a patent that protects a specific set of procedures for conducting a particular business activity

Enterprise Architect

a person grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business, employed to manage change and dynamically update MIS infrastructure

Stakeholder

a person or group that has an interest or concern in an organization, drive business strategies

Social Media Manager

a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand

Spear Phishing

a phishing expedition in which the emails are carefully designed to target a particular person or organization

Vishing (Voice Phishing)

a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information

Business Model

a plan that details how a company creates, delivers, and generates revenues

Foreign Key

a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables

Typosquatting

a problem that occurs when someone registers purposely misspelled variations of well-known domain names

Extraction, Transformation, and Loading (ETL)

a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse

Information Cleansing or Scrubbing

a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information

Zombie

a program that secretly takes over another computer for the purpose of launching attacks on other computers

Selfie

a self-photograph placed on a social media website

Hot Site

a separate and fully equipped facility where the company can move immediately after a disaster and resume business

Cold Site

a separate facility that does not have any computer equipment but is a place where employees can move after a disaster

Warm Site

a separate facility with computer equipment that requires installation and configuration

Instant Messaging (IMing)

a service that enables instant or real-time communication between people

Voiceprint

a set of measurable characteristics of a human voice that uniquely identifies an individual

Model

a simplified representation or abstraction of reality. Models help managers calculate risks, understand uncertainty, change variables, and manipulate time to make decisions

Spyware

a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

Intelligent Agent

a special-purpose, knowledge-based information system that accomplishes specific tasks on behalf of its users

Electronic Data Interchange (EDI)

a standard format for the electronic exchange of information between supply chain participants

Business Process

a standardized set of activities that accomplish a specific task, such as processing a customers order

Clean Computing

a subset of sustainable MIS, refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment focused on the production of environmental waste)

Unavailable

a system that is not operating and cannot be used

Vulnerability

a system weakness, such as a password that is never changed or a system left on while an employee goes to lunch, that can be exploited by a threat

Entity-Relationship Diagram (ERD)

a technique for documenting the entities and relationships in a database environment

Phishing

a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses

Digital Rights Management

a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

Project

a temporary activity a company undertakes to create a unique product, service, or result

Kill Switch

a trigger that enables a project manager to close the project before completion

Certificate Authority

a trusted third party, such as VeriSign, that validates user identities by means of digital certificates

Wiki

a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required

Systems Thinking

a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs with continuously gathering feedback on each part

Google Glass

a wearable computer with an optical head-mounted display (OHMD)

Real Simple Syndication (RSS)

a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format

Mashup

a website or web application that uses content from more than one source to create a completely new product or service

Virtual Workplace

a work environment that is not located in any one physical space. It is usually in a network of several places, connected through the Internet, without regard to geographic borders

The Internet of Things (IoT)

a world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention

Disaster Recovery

able to recover information or systems in the event of a catastrophic disaster such as a fire or flood

Primary Value Activities

acquires raw materials and manufacture, deliver, market, sell, and provide after-sales services

Inbound Logistics

acquires raw materials and resources and distributes them to manufacturing as required

PVA: Inbound Logistics

acquires raw materials and resources and distributes to manufacturing as required

Click-to-Talk

allow customers to click and talk with a representative via the Internet

Web-Based Self-Service Systems

allow customers to use the web to find answers to their questions or solutions to their problems

Integrations

allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems

Two-Tier ERP Architecture

allows an organization to have an on-premises ERP system along with ERP applications

Videoconference

allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards

Relational Database Management System

allows users to create, read, update, and delete data in a relational database

Hypertext Markup Language (HTML)

allows users to move from one document to another simply by clicking a hot spot or link

Social Bookmarking

allows users to share, organize, search, and manage bookmarks

Threat

an act or object that poses a danger to assets

Teergrubing

an anti-spamming approach by which the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

Social Network

an application that connects people by matching profile information

Dynamic Catalog

an area of a website that stores information about products in a database

Outsourcing

an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house

Genetic Algorithm

an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem

Patent

an exclusive right to make, use, and sell an invention and is granted by a government to the inventor

Cloud Fabric Controller

an individual who monitors and provisions cloud resources, similar to a server administrator at an individual company

Emergency Notification Service

an infrastructure built for notifying people in the event of an emergency

Data-Driven Website

an interactive website kept constantly updated and relevant to the needs of its customers using a database

World Wide Web Consortium (WC3)

an international community that develops open standards to ensure the long-term growth of the Web

Blog (Web Log)

an online journal that allows users to post their own comments, graphics, and video

Native Advertising

an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement

Cyberwar

an organized attempt by a country's military to disrupt or destroy information and communication systems for another country

Back Order

an unfilled customer order for a product that is out of stock

Drone

an unmanned aircraft that can fly autonomously, or without a human

Porter's Five Forces Model

analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry

BPMN: Event

anything that happens during the course of a business process, circle

SVA: Technology Development

applies MIS to processes to add value

Business-to-Consumer (B2C)

applies to any business that sells its products or services directly to consumers online ex: brick-and-mortar, click-and-mortar, and pure play

Business-to-Business (B2B)

applies to businesses buying from and selling to each other over the Internet ex: medical billing service, software sales and licensing, and virtual assistant businesses

Cusumer-to Consumer (C2C)

applies to customers offering goods and services to each other on the Internet ex: eBay

Social Networking Analysis (SNA)

aps group contacts (personal and professional) identifying who knows each other and who works together

Mashup Editors

are WYSIWYG, or what you see is what you get tools. They provide a visual interface to build a mashup, often allowing the user to drag and drop data points into a web application

Intermediaries

are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together

Time Bombs

are computer viruses that wait for a specific date before executing their instructions

Expert Systems

are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems

Insiders

are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident

Structured Decisions

arise when established processes offer potential solutions, frequent and repetitive, affect short-term business

Structured Query Language (SQL)

asks users to write lines of code to answer questions against a database

Information Timeliness

aspect of information that depends on the situation

Null-Valued Attribute

assigned to an attribute when no other value applies or when a value is unknown

Business Process Improvement

attempts to understand and measure the current process and make performance improvements accordingly

Sales Management CRM Systems

automate each phase of the sales process, helping individual sales representatives coordinate and organize all their accounts

Sales Force Automation (SFA)

automatically tracks all the steps in the sales process

Web 3.0

based on intelligent web applications using natural language processing, machine-based learning and reasoning, and intelligent applications, the next step in the evolution of the Internet and web applications

Benchmarks

baseline values the system seeks to attain

Example of Information

best selling product, best customer, worst selling product, worst customer

One-To-Many Relationship (1:M)

between two entities in which an instance of one entity can be related to many instances of a related entity

One-To-One Relationship (1:1)

between two entities in which an instance of one entity can be related to only one instance of a related entity

Many-To-Many Relationship (M:N)

between two entities in which an instance of one entity is related to many instances of another and one instance of the other can be related to many instances of the first entity

Web Conferencing (Webinar)

blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants

The Innovators Dilemma

book that discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders

Web Accessibility Initiative (WAI)

brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities, including auditory, cognitive, neurological, physical, speech, and visual disabilities

3D Printing (additive manufacturing)

builds-layer by layer-a three dimensional solid object from a digital model

Green Personal Computer (Green PC)

built using environment-friendly materials and designed to save energy

Core Processes

business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain

Porter's Three Generic Strategies

business strategies that are neither organization nor industry specific 1) broad cost leadership; low cost broad market (ex: walmart) 2) broad differentiation; high cost, broad market (ex: Neiman Marcus) 3) focused strategy; low or high cost, narrow market (ex: payless shoes, tiffany & co)

Reputation System

buyers post feedback on sellers

Composite Attribute

can be divided into smaller components, which represent more basic attributes that have their own meanings

Simple Attribute

cannot be broken down into a smaller component Ex: first and last name

Disaster Recovery Cost Curve

charts (1) the cost to the company of the unavailability of information and technology and (2) the cost to the company of recovering from a disaster over time

Example of Knowledge

choosing not to fire a sales representative who is under performing knowing that person is experiencing family problems, listing product that are about to expire first on the menu or creating them as a daily special to move the product

Opt In

choosing to allow permissions to incoming emails

Opt Out

choosing to deny permission to incoming emails

Collective Intelligence

collaborating and tapping into the core knowledge of all employees, partners, and customers

Search Engine Optimization (SEO)

combines art with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking

Storage Virtualization

combines multiple network storage devices so they appear to be a single storage device

Network Virtualization

combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device

Server Virtualization

combines the physical resources, such as servers, processors, and operating systems, from the applications. (This is the most common form and typically when you hear the term virtualization

Return on Investment (ROI)

common internal KPI, indicates the earning power of a producr

Information Cube

common term for the representation of multidimensional information

Asynchronous Communications

communication in which the message and the response do not occur at the same time ex: email

Synchronous Communications

communication that occurs at the same time ex: IM or chat

Corporate Social Responsibility

companies' acknowledged responsibility to society

Internet Service Provider (ISP)

company that provides access to the Internet for a monthly fee

List Generator

compile customer information from a variety of sources and segment it for different marketing campaigns

Data Dictionary

compiles all of the metadata about the data elements in the data model

Table

composed of rows and columns that represent an entity

enterprise Application Integration (EAI)

connects the plans, methods, and tools aimed at integrating separate enterprise systems

Supply Chain

consists of all parties involved, directly or indirectly in obtaining raw materials or a product

Supply Chain

consists of all parties involved, directly or indirectly, in obtaining raw materials or a product

Explicit Knowledge

consists of anything that can be documented, archived, and codified, often with the help of MIS ex: patents, trademarks, business plans, marketing research, and customer lists

Identity Theft

consists of forging someone's identity for the purpose of fraud

Open System

consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate with the system

Hardware

consists of the physical devices associated with a computer system

Data Mart

contains a subset of data warehouse information. To distinguish between data warehouses and data marts, think of data warehouses as having a more organizational focus and data marts as having a functional focus

Incident Record

contains all of the details of an incident

Information Privacy Policy

contains general principles regarding information privacy

Internet Use Policy

contains general principles to guide the proper use of the Internet

Source Code

contains instructions written by a programmer specifying the actions to be performed by computer software

User-Contributed Content

content created and updated by many users for many users ex: Wikipedia, YouTube

Dynamic Process

continuously changing and provides business solutions to ever-changing business operations

Nearshore Outsourcing

contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country.

Podcasting

converts an audio broadcast to a digital music player

Switching Costs

costs that make customers reluctant to switch to another product or service, reduces buyer power (ex: doctor)

Machine-Generated Data

created by a machine without human intervention. Includes sensor data, point-of-sale data, and web log (blog) data.

Business Continuity Plan (BCP)

creates a way for a company to recover and recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption

Virtualization

creates multiple virtual machines on a single computing device Ex: printer- is also a fax, scanner, and copier

Database Management System (DBMS)

creates, reads, updates, and deletes data in a database while controlling access and security. Managers send requests here, and the it performs the actual manipulation of the data in the database

Critical Success Factors (CSF)

crucial steps companies perform to achieve their goals and objectives and implement their strategies -create high-quality products -retain competitive advantages -reduce product costs -increase customer satisfaction -hire and retain the best business professionals

HTML 5

current version of HTML

Information

data converted into a meaning and useful context

Human-Generated Data

data that humans, in interaction with computers, generate. Includes input data, click-stream data, or gaming data.

Physical View of Information

deals with the physical storage of information on a storage device

Business Rule

defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer

Software as a Service (SaaS)

delivers applications over the cloud using a pay-per-use revenue model

Smart Grid

delivers electricity using two-way digital technology. Adds the ability to monitor, analyze, and control the transmission of power remotely.

Infrastructure as a Service (IaaS)

delivers hardware networking capabilities, including the use of servers, networking, and storage, over the cloud using a pay-per-use revenue model

Network Effect

describes how products in a network increase in value to users as the number of users increases. The more users and content managers on a wiki, the greater the network effect because more users attract more contributors, whose work attracts more users, and so on

Scalability

describes how well a system can scale up, or adapt to the increased demands of growth

Data Visualization

describes technologies that allow users to see or visualize data to transform information into a business perspective

Sustainable, or Green, MIS

describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment (environmental impact as a whole)

Information Security Plan

details how an organization will implement the information security policies

Email Privacy Policy

details the extent to which email messages may be read by others

Capacity Planning

determines future environmental infrastructure requirements to ensure high-quality system performance

Data Quality Audits

determines the accuracy and completeness of its data

Intangible Benefits

difficult to quantify or measure

Partner Relationship Management (PRM)

discovers optimal sales channels by selecting the right partners and identifying mutual customers

Disasters can...

disrupt communications, damage physical infrastructures, halt transportation, block utilities

Outbound Logistics

distributes goods and services to customers

PVA: Outbound Logistics

distributes goods and services to customers

Customer Segmentation

divides a market into categories that share similar attributes such as age, location, gender, habits, etc.

Strategic Business Processes

dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions.

Single-Tenancy

each customer or tenant must purchase and maintain an individual system

Tangible Benefits

easy to quantify and typically measured to determine the success or failure of a project

Human Resource Data in a System

employee data, promotion data, vacation data

Analytic Information

encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions. Analytical information includes transactional information along with other information such as market and industry information

Transactional Information

encompasses all the information contained within a single business process or unit of work, and its primary purpose is to support the performance of daily operational or structured decisions

Business-Critical Integrity

enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints

Onshore Outsourcing

engaging another company within the same country for services

Supply Chain Execution Systems

ensure supply chain cohesion by automating the different activities of the supply chain

Emergency Preparedness

ensures that a company is ready to respond to an emergency in an organized, timely, and effective manner

Reliability (Accuracy)

ensures that a system is functioning correctly and providing accurate information

Composite Entities

entities that exist to represent the relationship between two other entities

Dirty Data

erroneous or flawed data

SWOT analysis

evaluates an organization's, Strengths, Weaknesses, Opportunities, and Threats to identify significant influences that for for or against business strategies

Search Engine Ranking

evaluates variables that search engines use to determine where a URL appears on the list of search results

Hackers

experts in technology who use their knowledge to break into computers and computer networks, either for profit or simply for the challenge

Cardinality

expresses the specific number of instances in an entity

Predictive Analytics

extracts information from data and uses it to predict future trends and identify behavioral patterend

Data Scientist

extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information

Intrusion Detection Software (IDS)

features full-time monitoring tools that search for patterns in network traffic to identify intruders

Technology Recovery Strategies

focus specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements. details the order of importance for recovering hardware, software, data centers, and networking (or connectivity)

Robotics

focuses on creating artificial intelligence devices that can move and react to sensory input

Advanced Analytics

focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization

Logical View of Information

focuses on how individual users logically access information to meet their own particular business needs

Supplier Relationship Management (SRM)

focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects

Call Scripting Systems

gather product details and issue resolution information that can be automatically generated into a script for the representative to read to the customer

Fair Information Practices

general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy

Pay-Per-Call

generates revenue each time a user clicks a link that takes the user directly to an online agent waiting for a call

Pay-Per-Click

generates revenue each time a user clicks a link to a retailer's website.

Pay-Per-Conversation

generates revenue each time a website visitor is converted to a customer

Information Ethics

govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies)

Internet Censorship

government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens

Campaign Management System

guide users through marketing campaigns by performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis

Social Engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

Production and Materials Management ERP Components

handle production planning and execution tasks

Firewall

hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings

Content Management Systems (CMS)

help companies manage the creation, storage, editing, and publication of their website content

CRM Reporting Technologies

help organizations identify their customer across other applications

CRM Predicting Technologies

help organizations predict customer behavior

CRM Analysis Technologies

help organizations segment their customers into categories such as best and worst customers

Query-By-Example (QBE) Tool

helps users graphically design the answer to a question against a database

Serviceability

how quickly a third party can change a system to ensure it meets user needs and the terms of any contracts, including agreed levels of reliability, maintainability, or availability

Business Impact Analysis

identifies all critical business functions and the effect that a specific disaster may have on them. A business impact analysis is primarily used to ensure that a company has made the right decisions about the order of recovery priorities and strategies

Supporting the Environment: Sustainable MIS Infrastructure

identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption. Grid computing, cloud computing, and virtualization

Supporting Operations: Information MIS Infrastructure

identifies where and how important information, such as customer records, is maintained and secured. Backup, recovery, disaster recovery, and business continuity planning

Information Security Policies

identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days

Real-Time Information

immediate, up-to-date information

Digital Darwinism

implies that organizations cannot adapt to the new demands placed on them for surviving in the information age and are doomed to extinction ex: Polaroid

Streamlining

improves business process efficiencies by simplifying or eliminating unnecessary steps

Support Value Activities

include firm infrastructure, human resource management, technology development, and procurement

Materials Management

includes activities that govern the flow of tangible, physical materials through the supply chain such as shipping. transport, distribution, and warehousing

Dynamic Information

includes data that change based on user actions

Ebusiness

includes ecommerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real-time information

Static Information

includes fixed data incapable of change in the event of a user action

Carbon Emissions

includes the carbon dioxide and carbon monoxide produced by business processes and systems

SVA: Firm Infrastructure

includes the company format or departmental structure, environment, and systems

Supporting Change: Agile MIS Infrastructure

includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals. Accessibility, availability, maintainability, potability, reliability, scalability, and usability

MIS Infrastructure

includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets. A solid one can reduce costs, improve productivity, optimize business operations, generate growth, and increase profitability

Logistics

includes the processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain

Workflow

includes the tasks, activities, and responsibilities required to execute each step in a business process

Cyberbullying

includes threats, negative remarks, or defamatory comments transmitted through the Internet or posted on the website

Hybrid Cloud

includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability

Up-Selling

increasing the value of the sale

Knowledge Workers

individuals valued for their ability to interpret and analyze information

Decrypt

information is to decode it and is the opposite of encrypt

Intellectual Property

intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents

Enterprise Resource Planning (ERP)

integrates all departments and functions throughout an organization into a single IT system so employees can make decisions by viewing enterprisewide info about all business operations

Finance Data in a System

investment data, monetary data, reporting data

Business-Facing Processes

invisible to the external customer but essential to the effective management of the business; they include goal setting, day-to-day planning, giving performance feedback and rewards, and allocating resources

Knowledge Management (KM)

involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions

Egovernment

involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer and all branches of government

Executive Information Systems (EIS)

is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation, and insight. These decisions do not have a right or wrong answer, only efficient and effective answers

Closed Source

is any proprietary software licensed under exclusive legal right of the copyright holder

Transactional Processing System (TPS)

is the basic business system that serves the operational level (analysts) and assists in making structured decisions

Online Transaction Processing (OLTP)

is the capture of transaction and event information using technology to (1) process the information according to defined business rules, (2) store the information, and (3) update existing information to reflect the new information

Online Analytical Processing (OLAP)

is the manipulation of information to create business intelligence in support of strategic decision making

Web 2.0 (Business 2.0)

is the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free

Incident Management

is the process responsible for managing how incidents are identified and corrected

Cryptography

is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them

Adwords

keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages

Swim Lane

layout arranges the steps of a business process into a set of rows depicting the various elements

Copyright

legal protection afforded an expression of an idea, such as a song, book, or video game

Website Bookmark

locally stored URL or the address of a file or Internet page saved as a shortcut

Data Models

logical data structures that detail the relationships among data elements by using graphics or pictures

Dumpster Diving

looking through people's trash

Example of Business Intelligence

lowest sales per week compared with the economic interest rates, best selling product by month compared to sports season and city team wins and loses

Contact Management CRM System

maintains customer contact information and identifies prospective customers for future sales, using tools such as organizational charts, detailed customer notes, and supplemental sales information

Database

maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)

Human Resource Tasks Individually

maintains policies, plans, and procedures for the effective management of employees

Destructive Agents

malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

Accounting and Finance ERP Components

manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management

Operations Management Tasks Individually

manages the process of converting or transforming resources into goods or services

Elogistics

manages the transportation and storage of goods

Operations Management Data in a System

manufacturing data, distribution data, production data

Goods

material items or products that customers will buy to satisfy a want or need

Single-Valued Attribute

means having only a single value of each attribute of an entity. Ex: age

Multivalued Attribute

means having the potential to contain more than one value for an attribute Ex: education, a person can have more than one degree

Web Accessibility

means that people with disabilities, can use the web

Dynamic Scaling

means that the MIS infrastructure can be automatically scaled up or down based on requirements

Effectiveness MIS Metrics

measure the impact MIS has on business processes and activities, including customer satisfaction and customer conversion rates, focuses on how well a firm is achieving its goals and objectives

Efficiency MIS Metrics

measure the performance of MIS itself, such as throughput, transaction speed, and system availability, focuses on the extent to which a firm is using its resources in an optimal way

Metrics

measurements that evaluate results to determine whether a project is meeting its goals. Two core metrics are critical success factors and key performance indicators

Interactivity

measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement

Performance

measures how quickly a system performs a process or transaction, a key component of scalability as systems that can't scale suffer from performance issues

Information Reach

measures the number of people a firm can communicate with all over the world

Decision Support Systems (DSSs)

model information using OLAP, which provides assistance in evaluating and choosing among different courses of action

Software Customization

modifies existing software according to the business's or user's requirements

Workflow Control Systems

monitor processes to ensure tasks, activities, and responsibilities are executed as specified

Data Visualization Tools

move beyond Excel graphs and charts into sophisticated analysis techniques such as controls, instruments, maps, time-series graphs, and more

Unstructured

not defined, does not follow a specified format, and is typically free-form text such as emails, Twitter tweets, and text messages (80%)

Semi-structured Decisions

occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead a definite recommended decision

Unstructured Decisions

occur in situations in which no procedures or rules exist to guide decision makers toward the correct choice, infrequent, extremely important, long-term

Information Integrity Issues

occur when a system produces incorrect, inconsistent, or duplicate data

Bottlenecks

occur when resources reach full capacity and cannot handle any additional demands; they limit throughput and impede operations

Disintermediation

occurs when a business sells directly to the customer online and cuts out the intermediary

First-mover Advantage

occurs when a company can significantly increase its market share by being first with a new competitive advantage (ex: FedEx self service software)

Product Differentiation

occurs when a company develops unique differences in its products or services with the intent to influence demand

Personalization

occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions

Paradigm Shift

occurs when a new, radical form of business enters the market that reshapes the way companies and organizations behave

High Availability

occurs when a system is continuously operational at all times

Real-Time Communication

occurs when a system updates information at the same rate it receives it

Redundancy

occurs when a task or activity is unnecessarily repeated, for example, if both the sales department and the accounting department check customer credit

Website Personalization

occurs when a website has stored enough data about a person's likes and dislikes to fashion offers more likely to appeal to that person

Bullwhip Effect

occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain

Content Filtering

occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information

Technology Failure

occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage

Failback

occurs when the primary machine recovers and resumes operations, taking over from the secondary server

Information Inconsistency

occurs when the same data element has different values

Analysis Paralysis

occurs when the user goes into an emotional state of over-analysis (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome

Utility Computing

offers a pay-per-use revenue model similar to a metered service such as gas or electricity

Disaster Recovery as a Service (DRaaS)

offers backup services that use cloud resources to protect applications and data from disruption caused by disaster

Ethical Computer Use Policy

ontains general principles to guide computer user behavior

Pure-Play

operates on the internet only ex: Google

SWOT: O

opportunities; helpful, external -identify all significant trends along with how the organization can benefit from each, including new markets, additional customer groups, legal changes, innovative technologies, population changes, competitor issues, and so on.

Example of Data

order date, amount sold, customer number, quantity sold

Social Media Policy

outlines the corporate guidelines or principles governing employee online communications

The Child Online Protection Act (COPA)

passed to protect minors from accessing inappropriate material on the Internet

BPMN: Flow

path, dotted is between swim lanes, solid is in the same swim lane, arrow

Sales Tasks Individually

performs the function of selling goods or services

Click-and-Mortar

physical store and on the internet ex: Barnes &Noble

Brick-and-Mortar

physical store only, no internet presence ex: TJ Maxx

Ebusiness Model

plan that details how a company creates, delivers, and generates revenues on the Internet

Epolicies

policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment

Bring Your Own Device (BYOD)

policy allows employees to use their personal mobile devices and computers to access enterprise data and applications

Sales Data in a System

potential customer data, sales report data, commission data, customer support data

Infographics

present the results of data analysis, displaying the patterns, relationships, and trends in a graphical format

Distributed Computing

processes and manages algorithms across many machines in a computing environment

Sustaining Technology

produces an improved product customers are eager to buy, provide us with better, faster, and cheaper product in established markets ex: faster car, larger hard drive

Visualization

produces graphical displays of patterns and complex relationships in large amounts of data

Public Cloud

promotes massive, global, and industry-wide applications offered to the general public

RFID's Electronic Product Code (RFID EPC)

promotes serialization or the ability to track individual items by using the unique serial number associated with each RFID tag

PVA: Marketing and Sales

promotes, prices, and sells products to customers

Marketing Data in a System

promotion data, sales data, advertising data

Enterprise Systems

provide enterprise support and data access for a firm's operations and business processes

World Wide Web

provides access to internet information through documents, including text, graphics, and audit, and video files that use a special formatting language called HTML

PVA: Service

provides customer support after the sale of goods and services

Metadata

provides details about data ex: for an image could include its size, resolution, and date created

SVA: Human Resource Management

provides employee training, hiring, and compensation

Cradle to Grave

provides logistics support throughout the entire system or life of the product

Real-Time Systems

provides real-time information in response to requests

Employee Relationship Management (ERM)

provides web-based self-service tools that streamline and automate the human resources department

SVA: Procurement

purchases inputs such as raw materials, resources, equipment, and supplies

Key Performance Indicators (KPI)

quantifiable metrics a company uses to evaluate progress toward critical success factors (more specific than CSFs) -turnover rates of employees -percentage of help desk calls answered in the first minute -number of product returns -number of new customers -average customer spending

Workplace MIS Monitoring

racks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed

Data

raw facts that describe the characteristics of an event or object

Accounting Tasks Individually

records, measures, and reports monetary transactions

Long Tail

referring to the tail of a typical sales curve. This strategy demonstrates how niche products can have viable and profitable business models when selling via ebusiness

Downtime

refers to a period of time when a system is unavailable

Open Source

refers to any software whose source code is made available free (not on a fee or licensing basis as in ebusiness) for any third party to review and modify

Machine to Machine (M2M)

refers to devices that connect directly to other devices

Ewaste

refers to discarded, obsolete, or broken electronic devices

Maintainability

refers to how quickly a system can transform to support environmental changes, helps to measure how quickly and effectively a system can be changed or repaired after a failure.

Portability

refers to the ability of an application to operate on different devices or software platforms, such as different operating systems

Cybermediation

refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites

Information Richness

refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information

Information Granularity

refers to the extent of detail within the information (fine and detailed or coarse and abstract)

Granularity

refers to the level of detail in the model or the decision-making process

Data Governance

refers to the overall management of the availability, usability, integrity, and security of company data

Sustainable MIS Disposal

refers to the safe disposal of MIS assets at the end of their life cycle, ensures that ewaste does not end up in landfills

Availability

refers to the time frames when the system is operational

Accessibility

refers to the varying levels that define what a user can access, view, or perform when operating a system

Social Media

refers to websites that rely on user participation and user-contributed content ex: Facebook, YouTube, and Digg

As-Is Process Models

represent the current state of the operation that has been mapped, without any specific improvements or changes to existing processes

Capacity

represents the maximum throughput a system can deliver; for example, the capacity of a hard drive represents its size or volume

Acceptable Use Policy (AUP)

requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet

Multifactor Authentication

requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)

Two-Factor Authentication

requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)

Pharming

reroutes requests for legitimate websites to false websites

Chief Information Officer (CIO)

responsible for 1) overseeing all uses of MIS and 2) ensuring that MIS strategically aligns with business goals and objectives

Chief Knowledge Officer (CKO)

responsible for collecting, maintaining, and distributing company knowledge

Chief Privacy Officer (CPO)

responsible for ensuring the ethical and legal use of information within a company

Chief Security Officer (CSO)

responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses

Chief Technology Officer (CTO)

responsible for ensuring the speed, accuracy, availability, and reliability of the MIS

Customer-Facing Processes

result in a product or service received by an organization's external customer. They include fulfilling orders, communicating with customers, and sending out bills and marketing information

Upcycle

reuses or refurbishes ewaste and creates a new product

Loyalty Programs

reward customers based on their spending, reduce buyer power

Relational Integrity Constraints

rules that enforce basic and fundamental information-based constraints

Integrity Constraints

rules that help ensure the quality of information

Antivirus Software

scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware

Taxonomy

scientific classification of organisms into groups based on similarities of structure or origin

Encryption

scrambles information into an alternative form that requires a key or password to decrypt

Cross-Selling

selling additional products or services to an existing customer

Managerial Business Processes

semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements

Mail Bomb

sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning

Forward Integration

sends information entered into a given system automatically to all downstream systems and processes

Backward Integration

sends information entered into a given system automatically to all upstream systems and processes

Community Cloud

serves a specific community with common business models, security requirements, and compliance considerations

Private Cloud

serves only one customer or organization and can be located on the customer's premises or off the customer's premises

Application Programming Interface (API)

set of routines, protocols, and tools for building software applications

Collaboration System

set of tools that supports the work of teams or groups by facilitating the sharing and flow of information

Middleware

several types of software that sit between and provide connectivity for two or more software applications

To-Be Process Models

show the results of applying change improvement opportunities to the current (As-Is) process model

Folksonomy

similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system

Gantt Chart

simple bar chart that lists project tasks vertically against the project's time frame, listed horizontally. A Gantt chart works well for representing the project schedule. It also shows actual progress of tasks against the planned duration.

Anti-Spam Policy

simply states that email users will not send unsolicited emails (or spam)

Artificial Intelligence (AI)

simulates human thinking and behavior, such as the ability to reason and learn. Its ultimate goal is to build a system that can mimic human intelligence

Multi-Tenancy

single instance of a system serves multiple customers (in the cloud)

Tokens

small electronic devices that change user passwords automatically

Counterfeit Software

software that is manufactured to look like the real thing and sold as such

Shopping Bot

software that will search several retailer websites and provide a comparison of each retailer's offerings, including price and availability

Adware

software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user

Virus

software written with malicious intent to cause annoyance or damage

Crowdfunding

sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet

Tags

specific keywords or phrases incorporated into website content for means of classification or taxonomy

Failover

specific type of fault tolerance, occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to the secondary server or backup server. This is a high-speed and high-cost method of backup and recovery

Worm

spreads itself not only from file to file but also from computer to computer

Operational Business Processes

static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes

Employee Monitoring Policy

stating explicitly how, when, and where the company monitors its employees

Reintermediation

steps are added to the value chain as new players find ways to add value to the business process

Relational Database Model

stores information in the form of logically related two-dimensional tables

Cloud Computing

stores, manages, and processes data and applications over the Internet rather than on a personal computer or server

Common Company Structure

strategic managerial operational

SWOT: S

strengths; helpful, internal -identify all key strengths associated with the competitive advantage including cost advantages, new and/or innovative services, special expertise and/or experience, proven market leader, improved marketing campaigns, and so on.

Emergency

sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property

Typical Supply Chain

suppliers---> company ---> customers

Analytical CRM

supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers

Marketing Tasks Individually

supports sales by planning, pricing, and promoting goods or services

Knowledge Management System (KMS)

supports the capture, organization, and dissemination of knowledge (i.e., know-how) throughout an organization

Platform as a Service (PaaS)

supports the deployment of entire systems, including hardware, networking, and applications, using a pay-per-use revenue model

Operational CRM

supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers

Enterprise Application Integration (EAI) Middleware

takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors

Physical Security

tangible protection such as alarms, guards, fireproof doors, fences, and vaults

Opportunity Management CRM Systems

target sales opportunities by finding new customers or companies for future sales

BPMN: Activity

task in a business process where any work that is being performed in a process takes place, rectangle

Services

tasks people perform that customers will buy to satisfy a want or need

Web 1.0 (Business 1.0)

term to refer to the World Wide Web during its first few years of operation between 1991 and 2003

Fault Tolerance

the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service

Ediscovery

the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry

Mass Customization

the ability of an organization to tailor its products or services to the customers' specifications ex: M&M's that say "Marry Me"

Mobile Business

the ability to purchase goods and services through a wireless Internet-enabled device

Supply Chain Visibility

the ability to view all areas up and down the supply chain in real time

Click-Fraud

the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser

Business Process Modeling (Mapping)

the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence

Universal Resource Locator (URL)

the address of a file or resource on the web

Customer Order Cycle Time

the agreed upon time between the purchase of a product and the delivery of the product

Energy Consumption

the amount of energy consumed by business processes and systems

Business Process Reengineering (BPR)

the analysis and redesign of workflow within and between enterprises

Confidentiality

the assurance that messages and information remain available only to those authorized to view them

Eprocurement

the business-to-business (B2B) online purchase and sale of supplies and services

Ecommerce

the buying and selling of goods and services over the Internet

Social Tagging

the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search

Fact

the confirmation or validation of an event or object

Usability

the degree to which a system is easy to learn and efficient and satisfying to use

Information Redundancy

the duplication of data, or the storage of the same data in multiple places

Cybervandalism

the electronic defacing of an existing website

Clickstream Data

the exact pattern of a consumer's navigation through a site

Extended ERP Components

the extra components that meet organizational needs not covered by the core components and primarily focus on external operations

Inventory Turnover

the frequency of inventory replacement

Biometrics

the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting

Feedback

the information that returns to its original transmitter and modifies the transmitter's actions

Application Integration

the integration of a company's existing management information systems

Data Integration

the integration of data from multiple sources, which provides a unified view of all data

Hypertext Transport Protocol (HTTP)

the internet protocol web browsers use to request and display web pages using universal resource locators (URL)

Tacit Knowledge

the knowledge contained in people's heads

Supply Chain Management (SCM)

the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability

Feasibility

the measure of the tangible and intangible benefits of an information system

Best Practices

the most successful solutions or problem-solving methods that have been developed by a specific organization or industry

Source Documents

the original transaction record. Source documents for a payroll system can include time sheets, wage rates, and employee benefit reports

Content Creator

the person responsible for creating the original website content

Content Editor

the person responsible for updating and maintaining website content

5-forces: Threat of New Entrants

the power of competitors to enter a market, high- easy to enter market, low- significant entry barriers

5-forces: Rivalry among Existing Competition

the power of competitors, high- competition is fierce, low- complacent competitors

5-forces: Buyer Power

the power of customers to drive down prices (number of customers, sensitivity to price, size of orders, differences between competitors, and availability of substitutes)

5-forces: Threat of Substitute Products or Services

the power of customers to purchase alternatives, high- many alternatives, low- few alternatives

5-forces: Supplier Power

the power of suppliers to drive up prices of materials (number of suppliers, size of suppliers, uniqueness of services, and availability of substitute products)

Social Networking

the practice of expanding your business and/or social contacts by constructing a personal network

Master Data Management (MDM)

the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems

Microblogging

the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages ex: Twitter

Ethics

the principles and standards that guide our behavior toward other people

Production

the process by which a business processes raw materials or converts them into a finished product for its goods or services

Data Mining

the process of analyzing data to extract information not offered by the raw data alone

Automation

the process of computerizing manual tasks, making them more efficient and effective, and dramatically lowering operational cost

Benchmarking

the process of continuously measuring system result, comparing those results to optimal system performance, and identifying steps and procedures to improve system performance

Competitive Intelligence

the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed

Social Media Monitoring

the process of monitoring and responding to what is being said about a company, individual, product, or brand

Authorization

the process of providing a user with permission, including access levels and abilities such as file access, hours of access, and amount of allocated storage space

Procurement

the purchasing of goods and services to meet the needs of the supply chain

Productivity

the rate at which goods and services are produced based on total output given total inputs

Privacy

the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent

Analytics

the science of fact-based decision making

Critical Path

the sequence of activities that determine the earliest date by which the project can be completed

Software

the set of instructions the hardware executes to carry out specific tasks

Knowledge

the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources

Data Element (Data Field)

the smallest or basic unit of information. Can include a customer's name, address, email, discount rate, preferred shipping method, product name, quantity ordered, and so on.

Cloud Fabric

the software that makes possible the benefits of cloud computing, such as multi-tenancy

Website Name Stealing

the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner

Inventory Cycle Time

the time it takes to manufacture a product and deliver it to the retailer

Cycle TIme

the time required to process an order, is a common KPI for operations management

Core ERP Components

the traditional components included in most ERP systems and primarily focus on internal operations

Single-Factor Authentication

the traditional security process, which requires a user name and password

Pirated Software

the unauthorized use, duplication, distribution, or sale of copyrighted software

Cyberterrorism

the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals

Eintegration

the use of the Internet to provide customers with the ability to gain personalized information by querying corporate databases and their information sources

Augmented Reality

the viewing of the physical world with computer-generated layers of information added to it

SWOT: T

threats; harmful, external -identify all threats or risks detrimental to your organization, including new market entrants, substitute products, employee turnover, differentiating products, shrinking markets, adverse changes in regulations, economic shifts, and so on.

Business Intelligence Dashboards

track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls, allowing users to manipulate data for analysis

Human Resources ERP Components

track employee information, including payroll, benefits, compensation, and performance assessment

Digital Dashboard

tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs

Finance Tasks Individually

tracks strategic financial issues, including money, banking, credit, investments and assets

Accounting Data in a System

transactional data, purchasing data, payroll data, tax data

PVA: Operations

transforms raw materials or inputs into goods and services

Incidents

unplanned interruption of a service

Administrator Access

unrestricted access to the entire system, can perform functions such as resetting passwords, deleting accounts, and shutting down entire systems

Spam

unsolicited email

Data-Mining Tools

use a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making

Supply Chain Planning Systems

use advanced mathematical algorithms to improve the flow and efficiency of the supply chain while reducing inventory

BPMN: Gateway

used to control the flow of a process, joining paths, diamond

Computer-Aided Design/Computer-Aided Manufacturing (CAD/CAM)

used to create the digital designs and then manufacture the products

Static Process

uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously.

Pharming Attack

uses a zombie farm, often by an organized crime association, to launch a massive phishing attack

Radio-Frequency Identification (RFID)

uses electronic tags and labels to identify objects wirelessly over short distances

Haptic Interface

uses technology allowing humans to interact with a computer through bodily sensations and movements—for example, a cell phone vibrating in your pocket

In-Sourcing (in-house development)

uses the professional expertise within an organization to develop and maintain its information technology systems

Public Key Encryption (PKE)

uses two keys: a public key that everyone can have and a private key for only the recipient

Offshore Outsourcing

using organizations from developing countries to write code and develop systems. In this type of outsourcing the country is geographically far away.

Intelligent Systems

various commercial applications of artificial intelligence. They include sensors, software, and devices that emulate and enhance human capabilities, learn or understand from experience, make sense of ambiguous or contradictory information, and even use reasoning to solve problems and make decisions effectively

Value Chain Analysis

views a firm as a series of business processes, each of which adds value to the product or service

Dot-com

was the original term for a company operating on the Internet

SWOT: W

weaknesses; harmful, internal -identify all key areas that require improvement. Weaknesses focus on the absence of certain strengths, including absence of an Internet marketing plan, damaged reputation, problem areas for service, outdated technology, employee issues, and so on

Search Engine

website software that finds other pages based on keyword matching similar to Google

Cloud Bursting

when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for peak load requirements, ensuring that a sudden spike in usage does not result in poor performance or system crashes

Information Age

when infinite quantities of facts are widely available to anyone who can use a computer

Contact Center (call center)

where customer service representatives answer customer inquires and solve problems, usually by email, chat, or phone

Moore's Law

which refers to the computer chip performance per dollar doubling every 18 months, MIS equipment can be bought at higher amounts at lower costs

Crowdsourcing

wisdom of the crowd


संबंधित स्टडी सेट्स

Week 3 Understanding Design Sprints

View Set

Computer Forensics Cengage Final Test

View Set

Ch 11 Anger, Hostility, and Aggression

View Set

The Kite Runner, Chapters 1-5 (pp. 1-47)

View Set

Chapter 1-7 Labor Relations Management

View Set

II. Understanding Products and Their Risks

View Set