Final Terms
Waterfall
A sequence of phases in which the output of each phase becomes the input for the next. Waterfall is one of the oldest software development methods and has been around for over 30 years. Success rate is only 10 percent, or 1 in 10 with this approach.
Waterfall Methodology
A sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
Joint Application Development (JAD)
A session where employees meet, sometimes for several days, to define or review the business requirements for the system.
cookie
A small file on a hard drive by a website, containing info about customers and their browsing activities
Supply chain event management (SCEM)
enables an organization to react quickly to resolve supply chain issues; SCEM software increases real-time info sharing among partners and decreases their response time to unplanned events
site user license
enables any qualified users within the organization to install the software, regardless of whether the computer is on a network. Some employees might install the software on a home computer for working remotely.
network user license
enables anyone on the network to install and use the software.
Wireless Access Point (WAP)
enables devices to connect to a wireless network to communicate with each other
Drill-down
enables users to view details , and details of details, of information. The reverse of consolidation. Lets managers view monthly/weekly/daily/hourly info
Transactional information
encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks. airline ticket sales receipt packing slip
Analytical Information
encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks. product statistics sales projection future growth trends
Spatial data (geospatial data or geographic information)
identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, GIS accesses, manipulates, and analyzes spatial data
random access memory (RAM)
is the computer's primary working memory, in which program instructions and data are stored so that they can be accessed directly by the CPU via the processor's high-speed external data bus.
virtualization
is the creation of a virtual (rather than actual) version of computing resources, such as an operating system, a server, a storage device, or network resources
information redundancy
is the duplication of data, or the storage of the same data in multiple places.
Machine vision resolution
is the extent to which a machine can differentiate between objects.
timely
is the information current with respect to business need ex; is information update weekly, daily, or hourly
copyright
is the legal protection afforded an expression of an idea, such as a song, book, or video game.
Supply Chain Management (SCM)
is the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability. -SCM systems manage and enhance these relationships with the primary goal of creating a fast, efficient, and low-cost network of business relationships that take products from concept to market-->Links infor -Think Walmart adn P&G
anomaly detection
is the process of identifying rare or unexpected items or events in a data set that do not conform to other items in the data set.
classification analysis
is the process of organizing data into categories or groups for its most effective and efficient use.
conversion
is the process of transferring information from a legacy system to a new system.
production
is the process where a business takes raw materials and processes them or converts them into a finished product for its goods or services
productivity
is the rate at which goods and services are produced base upon total output given total inputs
privacy
is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.
analytics
is the science of fact-based decision making
software
is the set of instructions the hardware executes to carry out specific tasks. Software, such as Microsoft Excel, and various hardware devices, such as a keyboard and a monitor, interact to create a spreadsheet or a graph
data element or data field
is the smallest or basic unit of information
data latency
is the time t takes for data to be stored or retrieved
pirated software
is the unauthorized use, duplication, distribution, or sale of copyrighted software.
Cyberterrorism
is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals.
stylus
is used as a pen-like device that taps the screen to enter commands.
where is the business now?
looking at the current business situation allows managers to take effective action to solve issues before they grow out of control
first generation
machine language difficult for people to understand
database
maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).
human resources
maintains policies, plans, and procedures for the effective management of employees
Operationalized analytics
makes analytics part of a business process.
preventive maintenance
makes system changes to reduce the chance of future system failure
Corrective Maintenance
makes system changes to repair design flaws, coding errors, or implementation issues
accounting and finance ERP components
manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management
At the strategic level (structures decisions),
managers develop overall business strategies, goals, and objects as part of the company's strategic plan.
lack of data standards
managers need to perform cross-functional analysis using data from all departments, which differed in granularities, formats, and levels
RAM is Volatile
meaning it must have constant power to function; its contents are lost when the computer's electric supply fails.
RFID tag
microchip holds data, a set of numbers unique to an item. The rest of the tag is an antenna that transmits data to a reader
Reasons for information cleansing
missing records or attributes redundant records missing keys or other required data erroneous relationships or references inaccurate data
Cloud ERP
model for enabling ubiquitous, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction
Decision support systems (DDS)
model info using OLAP, provides assistance in evaluating and choosing among different courses of action - a system to diagnose and treat patients by inputting symptoms - a system that identifies risk for insurance companies
software customization
modifies existing software according to the business's or user's requirements
Workflow control systems
monitor processes to ensure tasks, activities, and responsibilities are executed as specified
Ineffective Direct Data Access
most data stored in operational databases did not allow users direct access; users had to wait to have their queries or questions answered by MIS professionals who could code SQL
Data warehouse integration and data conversions
moving data from an old system into the new ERP system
Unstructured decisions
occurring in situations in which no procedures/rules exist to guide decision makers toward the correct choice. Ex: entering a new market or industry
safe mode
occurs if the system is failing and will load only the most essential parts of the operating system and will not run many of the background operating utilities.
Disintermediation
occurs when a business sells directly to the customer online and cuts out the intermediary
data visualization tools
what moves beyond Excel graphing and charts into sophisticated analysis techniques such as pie carts, controls, instruments , maps , time-series graphics and more
Competitive monitoring
when a company keeps tabs of its competitor's activities on the web using software that automatically tracks all competitor website activities such as discounts and new products
confidentiality
which is the assurance that messages and information remain available only to those authorized to view them.
reflects a database
while a database has only one physical view, it can easily support multiple logical views that provide for flexibility
Chief User Experience Officer (CUEO)
will create the optimal relationship between user and technology
Chief Intellectual Property Officer (CIPO)
will manage and defend intellectual property, copyrights, and patents
white - hat hacker
work at the request of the system owner to fine system venerability
system clock
works like a wristwatch and uses a battery mounted on the motherboard to provide power when the computer is turned off.
The second type of authentication
Tokens and smart cards are two primary forms of this more effective way to identify individuals
Fair Information Practices
a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy
Pharming
reroutes requests for legitimate websites to false websites. For example: if you were to type in the URL to your bank, pharming could redirect you to a fake site that collects your information.
Encryption
scrambles information into an alternative form that requires a key or password to decrypt. If there were a security breach and the stolen information were encrypted, the thief would be unable to read it. ___ can switch the order of characters, replace characters, insert or remove, or use a mathematical formula to convert the information into a code.
Password Protection Policy
Set computer passwords to expire every 90 days.
anti-spam policy
Simply states that email users will not send unsolicited emails (or spam)
competitive click-fraud
a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
hardware key logger
a hardware device that captures keystrokes on their journey from the keyboard to the motherboard
typosquatting
a problem that occurs when someone registers purposely misspelled variations of well-known domain names
cookie
a small file deposited on a hard drive by a website containing information about customers and their web activities
The third kind of authentication
something that is part of the user, is by far the best and most effective way to manage authentication
employee monitoring policy
stating explicitly how, when, and where the company monitors its employees
Dick Faris CTO Primavera
"Agile programming is very different and new. It is a different feel to the way programming happens. Instead of mindlessly cranking out code, the process is one of team dialogue, negotiation around priorities and time and talents. The entire company commits to a 30-day sprint and delivery of finished, tested software. Maybe it is just one specific piece of functionality but it's the real thing, including delivery and client review against needs and requirements. Those needs and requirements, by the way, change. That is the strength we saw in the Scrum process."
The network industry refers to. most types of networks as...
"area networks"
Attributes
(also called columns or fields) are the data elements associated with an entity. columns fileds attributes
Biometrics
(narrowly defined) is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or hand-writing.
Broad market and low cost
*COST LEADERSHIP Walmart competes by offering a broad range of products at low prices. Its business strategy is to be the low-cost provider of goods for the cost-conscious consumer.
3 common customer relationship management metrics
- number of sales calls - number of marketing campaigns - number of new customers.
type of system software
- operating system software -utility software
financial performance
- revenue recognition - cash flow -payment guarantees -credit rating -stack price
Exapmples of Functional thinking business processes
-Accounting and Finance -Marketing and Sales -Operations Management -Human Resources
CRM Enables org to:
-Identify types of customers -Design individual customer marketing campaigns -Treat each customer as an individual -Understand customer buying behaviors
primary reasons projects fail
-unclear or missing business requirements -skipped SDLC phases -changing technology -the cost of finding errors -balance of the triple constraints
4 basic options offered by BYOD
-unlimited access for personal devices -access only to nonsensitive systems and data -access, but with MIS control over personal devices, apps, and stored data -access, but preventing local storage of data on personal devices
Network operating systems are divided into two categories:
1. Client-server 2. Peer-to-peer
The most popular network protocols include:
1. Ethernet- used by 85% of world's LAN connected PCs and workstations 2. Transmission ControlProtocol/Internet Protocol (TCP/IP)- most common telecommunication protocol
Features in a digital dashboard for a manufacturing team
1. List of KPIs 2. List of outstanding alerts 3. Graph of stock market prices.
There're two primary types of network architectures:
1. Peer-to-peer (P2P) network 2. Client/server (C/S) network
4 thing included in a Network
1. Protocol- a set of communication rules to make sure that everyone speaks the same language 2. Network interface card (NIC) 3. Cable 4. Hub(switch or router)
The 3 components of RFID System
1. Tag 2. Reader 3. Computer network
Ways to reduce buyer power
1.Manipulating switching costs 2.Loyalty Programs
Quantum
3.5 inch disks
Semantic Web
A component of Web 3.0 that describes things in a way that computers can understand
Web 1.0
A term to refer to the WWW during its first few years of operation between 1991 and 2003
Web Browser
Allows users to access the WWW
Outsourcing
An arrangement by which one organization provides a service or services for another organization that choose not to perform them in-house.
Airlines
Analyze popular vacation locations with current flight listings.
Project deliverable
Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project. Examples of project deliverables include design documents, testing scripts, and requirements documents.
Information systems audit report
Assesses a company's information system to determine necessary changes and to help ensure the information system's availability, confidentiality, and integrity.
The NOS is the...
BRAIN of the entire network
Supply Chain Metrics
Back order Inventory cycle time Customer order cycle time Inventory turnover
Accessing web sites is done through the use of...
Client software Ex: a browser- Google
Collective Intelligence
Collaborating and tapping into the core knowledge of all employees, partners, and customers
Agile (Iterative Development)
Consists of a series of tiny projects.
Customer Service Operational CRM Technology
Contact center, Web-based self-service, call scripting
Ebusiness Forms
Content providers, infomediaries, online marketplaces, portals, service providers, transaction brokers
Cross-selling and up-selling
Cross-selling - selling additional products or services Up-selling - increasing the value of the sale
Information Granularities
Detail, summary, aggregate
information formats
Document, presentation, spreadsheet, database
ebusiness tools
Email Instant messaging Podcasting Videoconferencing Web conferencing Content management system
Business Understanding Phase
Gain a clear understanding of the business problem that must be solved and how it impacts the company
Hybrid Topology
Groups of star-configured workstations are connected to a linear bus backbone cable, combining the characteristics of the bus and star topologies
Social Engineering
Hackers use their social skills to trick people into revealing access credentials or other valuable information
CRM Reporting Technologies
Help organizations identify their customers across other applications -->Customer ID-aSKING WHAT AHPPENED -What is the total rev by cistomer? -How many units did we make? -What were the total sales by teh product?
Financial Savings (A reason for outsourcing.)
It is far cheaper to hire people in China and India than pay the required salaries for similar labor in the United States.
Digital Signature Acceptance Policy
Keep filing cabinets locked at all times, and if feasible keep them behind locked doors. Keep keys locked in a single location with limited access.
tacit knowledge
Knowledge contained in people's heads
Tier 1
Large Enterprise-Sap, Oracle, Microsoft
Operating System Software
Linux, Mac OS X. Android Operating System, Microsoft Windows, MS-DOS, UNIX Definitions on Pg. 394
social media policy
Outlines the corporate guidelines or principles governing employee online communications
Rational Unified Process (RUP)
Owned by IBM, provides a framework for breaking down the development of software into four gates. Gate One: Inception, Gate Two: Elaboration, Gate Three: Construction, Gate Four: Transition
Three Areas of Information Security
People: Authentication and Authorization Data: Prevention and Resistance Attacks: Detection and Response
ERP (Enterprise Application)
Primary Users- Accounting, Finance, Logistics, Production. Primary Business Benefits-Forecasting, Planning, Purchasing, Material management, Warehousing, Inventory, Distribution.
SCM
Primary Users- Customers, Resellers, Partners, Suppliers, Distributors Primary Business Benefit - Market demand, Resource and capacity constraints, real-time scheduling
sustaining technology
Produces an improved product customers are eager to buy
Dependency
Relates to a PERT chart. A logical relationship that exists between the project tasks, or between a project task and a milestone.
Critical Path
Relates to a PERT chart. Estimates the shortest path through the project ensuring all critical tasks are completed from start to finish.
Megabyte (MB or M or Meg)
Roughly 1 million bytes
ERP Process Flow
Sales -->Warehouse-->Accounting-->Receiving
Wide Area Network (WAN)
Spans a large geographic area such as a state, province, or country
Intelligent agent
Special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users
Tags
Specific keywords or phrases incorporated into website content for means of classification or taxonomy
Information security line of defense
The First Line of Defense-People The Second Line of Defense-Technology The top 20 percent of their customers usually produce 80 percent of the revenues.
Hypertext Transport Protocol
The Internet protocol Web browsers use to request and display Web pages using URL - universal resource locator
Advanced encryption standard (AES)
The National Institute of Standards and Technology (NIST) introduced __________ designed to keep government information secure.
Pattern Recognition Analysis
The classification or labeling of an identified pattern in the machine learning process.
Fact
The confirmation or validation of an event or object
Dark web
The portion of the internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser.
War Chalking
The practice of tagging pavement with codes displaying where Wi-Fi access is available
2. Supplier Power
The suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services). -When its high, buyers lose revenue because they cannot pass on the raw material price increase to their customers
Gate one: inception
This phase ensures all stakeholders have a shared understanding of the proposed system and what it will do.
The Triple Constraint
Time, cost and scope. If any one changes, at least one other is likely to be affected.
Economic Feasibility
Type of feasibility. Measures the cost-effectiveness of a project.
Technical Feasibility
Type of feasibility. Measures the practicality of a technical solution and the availability of technical resources and expertise.
Tough Questions BI can answer
Why are sales below target? Because we sold less in the Western region Why did we sell less in the Western region? Because sales of product X dropped Why did sales of product X drop? Because customer complaints increased Why did customer complaints increase? Because late deliveries went up 60%
Software Engineering
a disciplined approach for constructing information systems through the use of common methods, techniques, or tools
Entry barrier
a feature of a product or service that customers have come to expect and entering competitors must offer the same for survival. -For example, a new bank must offer its customers an array of MIS-enabled services, including ATMs, online bill paying, and online account monitoring
Uplift modeling
a form of predictive analytics for marketing campaigns that attempts to identify target markets or people who could be convinced to buy products
Business Process model
a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint.
Inbound Logistics
acquires raw materials and resources and distributes to manufacturing as required.
Materials Management
activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing
native advertising
an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement
eshop
an online version of a retail store where customers can shop at any hour
goods
are material items or products that customers will buy to satisfy a want or need
algorthms
are mathematical formulas placed in software that performs an analysis on a data set.
data
are raw facts that describe the characteristics of an event or an object
relational integrity constraints
are rules that enforce basic and fundamental information-based constraints.
integrity constraints
are rules that help ensure the quality of information.
synchronous communication
communications that occur at the same time such as IM or chat
data mart
contains a subset of data warehouse information
User-contributed content
created and updated by many users for many users
Critical Success Factors (CSFs)
crucial steps companies perform to achieve their goals and objectives and implement their strategies
damaged reputation
customers, suppliers, financial markets, banks, business partners
Hotspots
designated locations where Wi-Fi access points are publicly available
Solution generation
detail every solution possible, including ideas that seem farfetched
test conditions
detail the steps the system must perform along with the expected result of each step
email privacy policy
details the extent to which email messages may be read by others
Telecommunication systems
enable the transmission of data over public or private networks
System restore
enables a user to return to the previous operating system.
dirty data
erroneous or flawed data
Intrusion Detection Software (IDS)
features full time monitoring tools that search for patterns in network traffic to identify intruders. Protects against suspicious network traffic and attempts to access files and data.
Streamlining
improves business process efficiencies by simplifying or eliminating unnecessary steps
dynamic inforation
includes data that change based on user actions.
Process modeling
involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment
identity management
is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to Page 110 resources within that system by associating user rights and restrictions with the established identity.
information security
is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization. Information security is perhaps the most fundamental and critical of all the technologies/disciplines an organization must have squarely in place to execute its business strategy.
foreign key
is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
Elevation of privilege
is a process by which a user misleads a system into granting unathorized tight usually for the purpose of compromising or destroying the system.
Deep learning
is a process that employees specialized algorithms to model and study complex datasets; the method is also used to establish relationships among data and datasets.
magnetic medium
is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnetically sensitive materials.
Hard drive
is a secondary storage medium that uses several rigid disks coated with a magnetically sensitive material and housed together with the recording heads in a hermetically sealed mechanism.
magnetic tape
is an older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium.
content creator
is the person responsible for creating the original website content.
content editor
is the person responsible for updating and maintaining website content.
read-only memory (ROM)
is the portion of a computer's primary storage that does not lose its contents when one switches off the power.
data profiling
is the process of collecting statistics and information about data in an existing source.
Elogistics
manages the transportation and storage of goods
Bottlenecks
occur when resources reach full capacity and cannot handle any additional demands; they limit throughput and impede operations
contact management CRM system
opmaintains customer contact information and identifies prospective customers for future sales, using tools such as organizational charts, detailed customer notes, and supplemental sales information
dynamic catalog
or an area of a website that stores information about products in a database.
Summary internal report
organizes and categorizes data for managerial perusal
transaction brokers
process online sales transactions; ex. Etrade.com, Charlesschwab.com
Components of SCM
procurement, logistics, materials management
Customer-facing processes (fRONT OFFICE PROCESSES)
r esult in a product or service received by an organization's external customer. -fulfilling orders, -communicating with customers, -sending out bills and marketing information -Processing
accounting
records, measures, and reports monetary transactions
file and data recovery
retrieves accidental deletion of photos or documents
affinity grouping analysis
reveals the relationship between variables along with the nature and frequency of the relationships
deep web
sometimes called the invisible web, is the large part of the Internet that is inaccessible to conventional search engines. Content includes email messages, chat messages, private content on social media sites, electronic bank statements, and electronic health records.
Planning and control supply chain integration examples
supply chain planning, collaborative product development, integrated demand and supply management
Analytical CRM
supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers
IT consumerization
the blending of personal and business use of technology devices and applications
maintenance phase
the organization performs changes, corrections, additions, and upgrades to ensure the system continues to meet business goals.
Primary purpose of a data warehouse
to aggregate information throughout an organization into a single repository for decision-making purposes
Radio Frequency Identification (RFID)
uses electronic tags and labels to identify objects wirelessly over short distances
RFID
uses electronic tags and labels to identify objects wirelessly over short distances -supports logistics
RFID reader
uses radio waves to read the tag and sends the EPC to computers in the supply chain
haptic interface
uses technology allowing humans to interact with a computer through bodily sensations and movements
web log
consists of one line of information for every visitor to a website and is usually stored on a web server
ethical computer use policy
contains general principles to guide computer user behavior
What does a employee monitoring policy contain?
1. Always enforce the policy the same for everyone 2. State the consequences of violating the policy
nonrepudiation
A contractual stipulation to ensure that ebusiness participants do not deny their online actions
Opt in
A user can opt in to receive emails by choosing to allow permissions to incoming emails
Disaster Recovery Plan Policy
All networked computers must be accessed via a firewall.
Horizontal privilege escalation
Attackers grant themselves the same access levels they already have but assume the identity of another user. For example, someone gaining access to another person's online banking account would constitute horizontal privilege escalation.
Authentication and authorization techniques fall into 3 categories:
The most secure procedures combine all 3: 1. Something the user knows, such as User ID and password 2. Something the user has, such as a smart card or token 3. Something that is part of the user, such as a fingerprint or voice signature
social media manager
a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand
key logger software
a program that records every keystroke and mouse click
Information security plan
details how an organization will implement the information security policies. The best way a company can safeguard itself from people is by implementing and communicating its information security plan.
Information secrecy
is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
Identity theft
is the forging of someone's identity for the purpose of fraud. The fraud is often financial, because thieves apply for and use credit cards or loans in the victim's name.
Cryptography
is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.
Single-factor authentication
is the traditional security process, which requires a username and password.
Content filtering
occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information.
Click-fraud
the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser
social media monitoring
the process of monitoring and responding to what is being said about a company, individual, product, or brand
Public key encryption (PKE)
uses two keys: a public key that everyone can have and a private key for only the recipient. The organization provides the public key to all customers, whether end customers or other businesses, who use that key to encrypt their information and send it via the Internet. When it arrives at its destination, the organization uses the private key to unscramble it.
Data Understanding Phase
Analysis of all current data along with identifying any data quality issues
Marketing
Analyze customer demographics.
Social Media Analysis
Analyzes text flowing across the Internet, including unstructured text from blogs and messages.
Web Analysis
Analyzes unstructured data associated with websites to identify consumer behavior and website navigation.
text Analysis
Analyzes unstructured data to find trends and patterns in words and sentences.
handheld (ultra portable,pockect computer )
Computer portable enough to fit in a purse or pocket and has its own power source
laptop
Computer portable enough to fit on a lap or in a bag and has its own power source or battery. Laptops come equipped with all of the technology that a personal desktop computer has, yet weigh as little as two pounds
tablet computer
Computer with a flat screen that uses a mouse or fingertip for input instead of a keyboard. Similar to PDAs, tablet PCs use a writing pen or stylus to write notes on the screen and touch the screen to perform functions such as clicking on a link while visiting a website.
CAD/CAM
Computer-Aided Design/Computer-Aided Manufacturing; systems used to create the digital designs and then manufacture the products
Information
Data converted into a meaningful and useful context- its value is only as good as the people who use it -depending on how they interpret or analyze the information
Problem facing organizations today
Data rich, information poor. Many organizations find themselves in the position of being data rich and information poor. Even in today's electronic world, managers struggle with the challenge of turning their business data into business intelligence.
Oracle
Database software
Finacne
Deals with strategic financial issues including money, banking, credit, investments, and assets
Information system control report
Ensures the reliability of information, consisting of policies and their physical implementation, access restrictions, or record keeping of actions and transactions
design phase
Establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation
Standardizing Customer name from Operational Systems
Example of extracting customer name from multiple databases and uploading most likely name onto customer information database
3 Primary types of MIS decision-making systems
Executive info systems, decision support systems, transaction processing system
third generation
High-level programming languages, such as C+ and Java
exception reporting
Highlights situations occurring outside of the normal operating range for a condition or standard
Exploratory Data Analysis
Identifies patterns in data, including outliers, uncovering the underlying structure to understand relationships between the variables.
Benefits of business process
Improvement varies, but a rough rule of thumb is that it will, at minimum, double the gains of a project by streamlining outdated practices, enhancing efficiency, promoting compliance and standardization, and making an organization more agile
Knwoledge
Includes the skills, expertise, and experience, coupled with information and intelligence that creates persons intellectual resources
Workflow
Includes the tasks, activities and responsibilities required toe execute each step in a business process-->must understand these things to create alternative business processes/ competitive advantage
Project stakeholder
Individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion
Knowledge Workers
Individuals valued for their ability to interpret and analyze information -Use BI along with personal experience to make decision based on info and intuition
ERP Intergration Data Flow
Info flowing between purchasing, accounting and finance, human resources, inventory, manufacturing, and marketing and sales
SCM Business Process 2
Materials are transformed into semifinished and finished products-the organization's own production processes.
SCM Business Process 1
Materials flow from suppliers and their upstream suppliers at all levels.
Reasons for growth of the WWW
Microcomputer revolution Advancements in networking Easy browser software Speed, convenience, and low cost of email Web pages easy to create and flexible
World Wide Web
Provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML
Service
Provides customer support after the sale of goods and services.
Intuit
QuickBooks software; TurboTax; Quicken software
System Development Life Cycle (SDLC)
The overall process for developing information systems from planning and analysis through implementation and maintenance
Services
Tasks performed by people that customers will buy to satisfy a want or a need-INTANGIBLE
Internet protocol version 6 (IPv6)
The "next generation" protocol designed to replace the current version Internet protocol, IP version 4 (IPv4).
Executive sponsor
The person or group who provides the financial resources for the project
The Internet and Globalization (A reason for outsourcing.)
The pervasive nature of the Internet has made more people comfortable with outsourcing abroad.
Microblogging
The practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages.
Information age
The present time, during which infinite quantities of facts are widely available to anyone who can use a computer
Difference Between XP and Waterfall
The primary difference between the waterfall and XP methodologies is that XP divides its phases into iterations with user feedback.
Feasibility
The measure of tangible and intangible benefits of an information system.
System
a collection of parts that link to achieve a common purpose -->primary enabler of cross-functional operations -Think of car
Operational Feasibility
Type of feasibility. Measures how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities.
client
a device that is designed to request information from a server
client/server network
a model for applications in which the BULK of the back-end processing takes place on a server, while the front-end processing is handled by the clients
Prototyping
a modern design approach where the designers and system users use an iterative approach to building the system
Firewall
a part of a computer system or network that is designed to BLOCK unauthorized access while PERMITTING outward communication.
Selfie
a self-photograph placed on a social media website
Domain name hosting (web hosting)
a service that allows the owner of a domain name to maintain a simple website and provide email capacity
Enterprise Resource Planning (ERP)
a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform
BPMN activity
a task in a business process, any work that is being performed in a process, represented by a rounded-corner rectangle.
data map
a technique for establishing a match, or balance, between the source data and the target data warehouse
client-server network
a versatile, message based, and modular infrastructure intended to improve usability, flexibility, interoperability, and scalability as compared to centralized, mainframe computing
Google Glass
a wearable computer with an optical head mounted display
Real Simple Syndication (RSS)
a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format
Wi-Fi Protected Access (WPA)
a wireless security protocol to protect Wi-Fi networks
virtual workplace
a work environment that is not located in any one physical space
Internet of Things (IoT)
a world where interconnected Internet-enabled devices of things have the ability to collect and share data without human intervention
3 common website metrics
abandoned shopping carts unique visitors page exposures
Inbound logistics
acquires raw materials and resources and distributes to manufacturing as required
Intermediaries
agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together
Affiliate programs
allow a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website
Supply Chain Management components
allow a firm to monitor and control all stages in the supply chain from the acquisition of raw materials to the receipt of finished goods by customers
click-to-talk functions
allow customers to click on a button and talk with a representative via the Internet
Web-based self-service systems
allow customers to use the web to find answers to their questions or solutions to their problems
Multitasking
allows more than one piece of software to be used at a time.
Router
an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination
data-drive website
an interactive website kept constantly updated and relevant to the needs of its customers using a database
legacy system
an old system that is fast approaching or beyond the end of its useful life within an organization
compact disk read-only memory (CD-ROM)
an optical drive designed to read the data encoded on CD-ROMs and to transfer this data to a computer
Compact disk-read-write CD-RW) drive
an optical drive that enables users to erase existing data and to write new data repeatedly to a CD-RW
Back order
an unfilled customer order for a product that is out of stock
Drones
an unmanned aircraft that can fly autonomously, or without a human -supports logistics
Data models
are logical data structures that detail the relationships among data elements using graphics or pictures.
best practices
are the most successful solutions or problem-solving methods that have been developed by a specific organization or industry.
ethics and security
are the two fundamental blocks on which organization base their businesses
Intelligent systems
are various commercial applications of artificial intelligence
Structured decisions
arise in situations where established processes offer potential solutions. - Made often and repetitive, affect short-term business strategies. Ex: reordering inventory, creating employee staffing schedules, creating weekly production schedules.
second generation
assembly language difficult for people to understand
Alpha testing
assess if the entire system meets the design requirements of the users
Business process improvement
attempts to understand and measure the current process and make performance improvements accordingly
sales management CRM systems
automate each phase of the sales process, helping individual sales representatives coordinate and organize all their accounts
SOA service
being simply a business task, such as checking a potential customer's credit rating when opening a new account.
webconferencing (webinar)
blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants
Business 2.0 Communication and Collaboration Tools
blog, wiki, mashup
black - hat hacker
break into people computer system may look around or still information
Forms of B2C Operations
brick-and-mortar click-and-mortar pure play
online marketplaces
bring together buyers and sellers of products and services; ex. Amazon.com, eBay.com
testing phase
brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase
discovery prototyping
builds a small-scale representation or working model of the system to ensure it meets the user and business requirements
Most hubs and all concentrators and switches have...
built-in signal. repairing capability to perform signal repair and retransmission
coaxial cable
cable that can carry a wide range of frequencies with low signal loss. It consists of a metallic shield with a single wire placed along the center of a shield and isolated from the shield by an insulator.
Uninstaller
can remove software that is no longer needed
polymorphic virus and worms
change their form as they propagate
dynamic report
changes automatically during creation
What-if analysis
checks the impact of a change in a variable/assmuption on the model.
External Databases
competitor information, industry information, mailing lists, stock market analysis
List Generator
compiles customer information from a variety of sources and segments it for different marketing campaigns
Expert systems
computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems
Local Area Network (LAN)
connects network devices over a relatively short distance like an office building or a home
packet tampering
consist of altering the content of packets as the travel over the internet or altering data on computer disks after penetrating a network
spoofing
consist of raging the return address on a email so that the message appears to form someone other than the actual sender. this is not a virus but rather a way by which virus authors conceal their identities as they send out virus
explicit knowledge
consists of anything that can be documented, archived, and codified, often with the help of IT
Memory card
contain high-capacity storage that holds data such as captured images, music, or text files. Memory cards are removable; when one is full the user can insert an additional card.
course management software
contains course information such as a syllabus and assignments and offers drop boxes for quizzes and homework along with a grade book.
source code
contains instructions written by a programmer specifying the actions to be performed by computer software
Mashup
content from more than one source to create a new product or service
Snackable content
content that is designed to be easy for readers to consume and to share. Captures website visitors' attention by offering small consumable pieces of information that can be quickly read and understood.
Reports, Documents, Forms
customization to reports, documents, and forms can consist of simple layout or design changes or complex logic programming rules for specific business requirements
finance
deals with strategic financial issues including money, banking, credit, investments, and assets
physical view of information
deals with the physical storage of information on a storage device.
Responsibility matrix
defines all project roles and indicates what responsibilities are associated with each role
Software as a Service (SaaS)
delivers applications over the cloud using a pay-per-use revenue model
Deployment Phase
deploy the discoveries to the organization for work in everyday business
Organizational data
difficult to access, contains structured data in database, contains unstructured data such as voice mail, phone calls, text messages, and video clips
Interactive Voice Response (IVR)
directs customers to use touch-tone phones or keywords to navigate or provide information
Plunge Implementation
discards the legacy system and immediately migrates all users to the new system
Partner relationship management (PRM)
discovers optimal sales channels by selecting the right partners and identifying mutual customers
BPMN flows
displays the path in which the process flows represented by an arrow
outbound logistics
distributes goods and services to customers
Outbound Logistics
distributes goods and services to customers.
system restore
enables a user to return to the previous operating system.
supply chain execution systems
ensure supply chain cohesion by automating the different activities of the supply chain (ex. electronically routing orders from manufacturer to supplier using EDI)
HIPAA Security Rule
ensures national standards for securing patient data that is stored or transferred electronically.
search engine ranking
evaluates variables that search engines use to determine where a URL appears on the list of search results
Inconsistent Data Definitions
every department had its own method for recording data so when trying to share information, data did not match and users did not get the data they really needed
clickstream data
exact pattern of a consumer's navigation through a site
information management
examines the organization resource of information and regulate it definition uses value and distribution ensuring that it has the type of data information requires fo function and for effectively
predictive analytics
extracts information from data and uses it to predict future trends and identify behavioral patterns
data scientist
extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information.
Project assumption
factors considered to be true, real, or certain without proof or demonstration. Examples include hours in a workweek or time of year the work will be performed.
Goal-seeking analysis
finds the input necessary to achieve a goal such as a desired level of output. -Reverse of what-if & sensitivity analysis. Sets a target value for a variable and repeatedly changes others until target is reached.
denial of service attack (DoS)
floods a website with so many requests for service that it slows down or crashes
Monetray Data
focus on managing the company's resources and maintain monetary data -Fiancne and Accoutning
Transactional Data
focus on moving goods or services into the hands of consumers -Sales and Marketing
Robotics
focuses on creating artificial intelligence devices that can move and react to sensory input -supports materials management
Employee Data
focuses on manufacturing and maintains production data HR
Data collection
gather problem-related data, including who, what, where, when, why, and how. Be sure to gather facts, not rumors or opinions about the problem
call scripting systems
gather product details and issue resolution information that can be automatically generated into a script for the representative to read to the customer
Network behavior analysis
gathers an organization's computer network traffic patterns to identify unusual or suspicious operations.
Routers
generally used to connect networks that use similar protocols
Pay-per-call
generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call
pay-per-click
generates revenue each time a user clicks on a link to a retailer's website
pay-per-conversion
generates revenue each time a website visitor is converted to a customer
Information ethics
govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies).
object-oriented languages
group data and corresponding processes into objects.
Value Chain
groups a firm's activities into two categories, primary value activities upport value activities
Hub (switch or router)
hardware to perform traffic control
structured data
has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address
customer service system
has the "product user" customer contact information
hacker
have criminal intent when hacking
multiple-in/multiple-out (MIMO) technology
have multiple transmitters and receivers, allowing them to send and receive greater amounts of data than traditional networking devices
activist
have philosophy and political reason for breaking in to system
active RFID tags
have their own transmitter and a power source (typically a battery)
workshop training
held in a classroom environment and led by an instructor
CRM Prdeicting Technologies
help organizations predict customer behavior, such as which customers are at risk of leaving. -Asking what will happen -What cistomers are at risk of leaving? Which products will our customers buy? How will we reach our customers?
CRM Analysis Technologies
help organizations segment their customers into categories such as best and worst customers -Asking why it happened -Why did sales not meet forecasts? -Why was production low? -WHo are out customers?
Content Management System (CMS)
helps companies manage the creation, storage, editing, and publication of their website content
Collaborative demand planning
helps organizations reduce their investment in inventory, while improving customer satisfaction through product availability
crash-proof
helps save information if a computer crashes
query-by-example (QBE) tool
helps user graphically design the answer to a question against a database? that helps users graphically design the answer to a question against a database.
Trojan Horse Virus
hides inside other software, usually as an attachment or a downloadable file
5. Rivalry Among existing COmpetitiors
high when competition is fierce in a market and low when competitors are more complacent
Customization
if the software package does not meet all of the company's needs, customizing the software may be required
data flow diagram (DFD)
illustrates the movement of information between external entities and the processes and data stores within the system
Digital Darwansim
implies that that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction
On-premise systems
include a server at a physical location using an internal network for internal access and firewalls for remote users' access
dynamic information
includes data that change based on user actions.
static information
includes fixed data incapable of change in the event of a user action.
Cyber-espionage
includes governments that are after some form of information about other governments.
Firm Infrastructure
includes the company format or departmental structures, environment, and systems.
what occurs when a system produces incorrect, in consisted or duplicated data
information integrity issue
Feedback
information that returns to its original transmitter(input, transform, or output) and modifies the transmitter's actions .-->Feedback helps the system maintain stability example...a car's system continuously monitors the fuel level and turns on a warning light if the gas level is too low
Sensitive PII
information transmitted with encryption and, when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm. Sensitive PII includes biometric information, financial information, medical information, and unique identifiers such as passport or Social Security numbers.
The Four Primary Traits of the Value of Information
information type information timeliness information quality inforation governance
phased implementation
installs the new system in phases (for example, by department) until it is verified that it works correctly
Business process management (BPM)
integrates all of an organization's business process to make individual processes more efficient. BPM can be used to solve a single glitch or to create one unifying system to consolidate a myriad of processes.
Metropolitan Area Network (MAN)
interconnects users in geographic area or region larger than a local area network, but smaller than a wide area network
control unit
interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions
Information integration examples
inventory visibility, performance metrics, event monitoring, business intelligence, scorecards, dashboards
data artist
is a business analytics specialist who uses visual tools to help people understand complex data.
virus
is software written wit malicious intent to cause annoyance or damage.
Application software
is used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others.
application software
is used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others.
embedded operating system
is used in computer appliances and special-purpose applications, such as an automobile or ATM and are used for a single purpose.
A signal travels through transmission medium...
it encounters resistance and gradually becomes weaker and distorted so. the repeater. receives. the network signal and retransmits it at its original transmission strength
primary key
key id a field (or group fields) that uniquely identifies a given record in a table
swim lane
layout arranges the steps of a business process into a set of rows depicting the various elements
Reduced instruction set computer (RISC) chip
limit the number of instructions the CPU can execute to increase processing speed.
GIS map automation
links business assets to a centralized system where they can be tracked and monitored over time
Project scope statement
links the project to the organization's overall business goals. It describes the business need and the justification, requirements, and current boundaries for the project. It defines the work that must be completed to deliver the product with the specified features and functions, and it includes constraints, assumptions, and requirements-all components necessary for developing accurate cost estimates.
Mobile Banking
manage accounts, pay bills, receive alerts and transfer funds
operations management
manages the process of converting or transforming resources into goods or services
Online analytical processing (OLAP)
manipulation of information to create business intelligence in support of strategic decision making
Social Networking Analysis (SNA)
maps group contacts (personal and professional) identifying who knows each other and who works together
Data Warehouses include
marketing, inventory, sales, billing, competitor, industry, mailing list information, and stock market analysis
ERP
materials planning, order entry, distribution, general ledger, accounting, shop floor control
ROM is nonvolatile
meaning it does not require constant power to function.
Interactivity
measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement
Information reach
measures the number of people a firm can communicate with all over the world
B2B examples
medical billing service, software sales and licensing, virtual assistant business
asychronous communication
message and response do not occur at the same time
Wireless (Unguided) Media
natural parts of the Earth's environment that can. be used as physical paths to carry electrical signals Ex: radio waves, microwaves, infrared light waves
topology
networks are assembled according to certain rules. A topology refers to the physical arrangement of the computers and other network devices in a network
Internet Corporation for Assigned Names and Numbers (ICANN)
nonprofit org that has assumed the responsibility for Internet Protocol (IP) address space allocation, protocol parameter assignment, domain name system management, and root server system management functions previously performed under the U.S. gov't contract
word length
number of bits (0s and 1s) that can be processed by the CPU at any one time. Computers work in terms of bits and bytes using electrical pulses that have two states: on and off.
Payback Method
number of years to regain the cost of an initiative based on projected annual net cash flow
software update ( software patch)
occur when the software vendor releases updates to software to fix problems or enhance features
Real-time communication
occurs when a system updates information at the same rate it receives it
website personalization
occurs when a website has stored enough data about a person's likes and dislikes to fashion offers more likely to appeal to that person
Bullwhip effect
occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain
information silo
occurs when one business unit is unable to freely communicate with other business units making it difficult or impossible for organizations to work cross-functionally
Edge matching (warping, rubber sheeting)
occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match
information inconsistency
occurs when the same data element has different values.
software upgrade
occurs when the software vendor releases a new version of the software, making significant changes to the program.
Dial-up access
on demand access using a modem and regular telephone line (POT).
backdoor program
open a ways into the network for future attacks
portals
operate central website for users to access specialized content and other services; ex. Google.com, Yahoo.com
disk optimization
organizes information on a hard disk in the most efficient way
Enterprise Application Integration (EAI)
packages together commonly used functionality, such as prebuilt links to popular enterprise applications.
analysis paralysis
paralysis occurs when the user goes into an emotional state of over-analysis ( or overhanging ) a situation so that a decision is never taken in effect paralyzing the outcome
Mobile payments
pay for goods and services including in-store purchases, home delivery, vending machines, taxis, gas, and so on.
sales
performs the function of selling goods or services
Status report
periodic reviews of actual performance versus expected performance
Two means of stealing an identity are
phishing and pharming
the SDLC and its Associated Activities
planning, analysis, design, development, testing, implementation, maintenance
E-policies
policies and procedures that address information management along with the ethical use of computers and the internet in the business environment
Bring Your Own Device (BYOD)
policy allows employees to use their personal mobile devices and computers to access enterprise data and applications
Post-implementation report
presents a formal report or audit of a project after it is up and running
detailed internal report
presents information with little or no filtering or restrictions of the data
infographics (information graphics)
presents the results of data analysis, displaying the patterns, relationships, and trends in a graphical format
Gate four: transition
primary questions answered in this phase address ownership of the system and training of key personnel
Requirements definition document
prioritizes all of the business requirements by order of importance to the company
requirement definition document
prioritizes all of the business requirements by order of importance to the company
distributed computing
processes and manages algorithms across many machines in a computing environment
Logistics
processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain
Visualization
produces graphical displays of patterns and complex relationships in large amounts of data
fifth generation
programming languages for artificial intelligence and neural networks
Fourth Generation
programming languages that look similar to human languages
fourth generation languages(4GL)
programming languages that look similar to human languages
Project management institute (PMI)
project : as a temporary activity a company undertakes to create a unique product, service, or result
utility software
provides additional functionality to the operating system. Utility software includes antivirus software, screen savers, and anti-spam software.
Personal Area Network (PAN)
provides communication for devices owned by a single user that work over a short distance
metadata
provides details about data
HR Management
provides employee training, hiring, and compensation.
Employee relationship management (ERM)
provides employees with a subset of CRM applications available through a web browzer
cradle to grave
provides logistics support throughout the entire system or life of the product
Hypertext Markup Language (HTML)
publishes hypertext on the WWW, which allows users to move from one document to another simply by clicking a hot spot or link
mobile ticketing
purchase tickets for entertainment, transportation, and parking including the ability to automatically feed parking meters.
Procurement
purchases inputs such as raw materials, resources, equipment, and supplies.
activities for which transactional information is created
purchasing stocks withdrawing cash from an ATM making airline reservation
Software Costs
purchasing the software can cost millions of dollars for a large enterprise
Information richness
refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information
Granularity
refers to the level of detail in the model or the decision-making process
data governance
refers to the overall management of the availability, usability, integrity, and security of company data
Fiber-optic (optical fiber)
refers to the technology associated with the transmission of information as light impulses along a glass wire or fiber
Chief Information Officer (CIO)
responsible for 1. overseeing all uses of MIS and 2. ensuring that MIS strategically aligns with business goals and objectives
Chief Privacy Officer
responsible for ensuring the ethical and legal use of information within a company
Pivot
rotates data to display alternative presentations of the data
Automatic call distribution
routes inbound calls to available agents
online training
runs over the Internet or on a CD or DVD, and employees complete the training on their own time at their own pace
Extended ERp
scheduling, forecasting, capacity planning, ecommerce, warehousing, logistics
managerial business processes
semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements
mail bomb
sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning
where is the business going?
setting strategic direction is critical for planning and creating solid business strategies
Companys strategic vision
should provide guidance on which business processes are core, that is, which are directly linked to the firm's critical success factors
To-be process model
show the results of applying change improvement opportunities to the current (As-Is) process model. This approach ensures that the process is fully and clearly understood before the details of a process solution are decided. The To-Be process model shows how the what is to be realized.
Folksonomy
similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system
spyware
software that comes hidden in free downloadable software and tracks online movements
adware
software that generates ads that install themselves on a computer when a person downloads some other program from the internet
Crowdfunding
sources capital for a project by raising many small amounts from a large number of individuals, typically via the internet
Cable
special cable modem and cable line required
application service provider license
specialty software paid for on a license basis or per-use basis or usage-based licensing.
worm
spreads itself not only from file to file but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread
Business process
standardized set of activities that accomplish a specific task, such as processing a customer's order. Business processes transform a set of inputs into a set of outputs (goods or services) for another person or process by using people and tools.
development phase
takes all the detailed design documents from the design phase and transforms them into the actual system
forward integration
takes information entered into a given system and sends it automatically to all downstream systems and processes.
backward integration
takes information entered into a given system and sends it automatically to all upstream systems and processes
physical security
tangible protection such as alarms, guards, fireproof doors, fences, and vaults
opportunity management CRM systems
target sales opportunities by finding new customers or companies for future sales
Mobile
technology can travel with the user
other expenses
temporary employees, equipment rentals, overtime costs, extra shipping charges, travel expenses, legal obligations
access point (AP)
the computer or network device that serves as an interface between devices and the network
fact
the confirmation or validation of an event or object
Open technologies
the design of websites and other software so they can be easily integrated and work together
system availability
the number of hours a system is available for users
data mining
the process of analyzing data to extract information not offered by the raw data alone
Procurement
the purchasing of goods and services to meet the needs of the supply chain
clock speed
the speed of the internal clock of a CPU that sets the pace at which operations proceed within the computer's internal processing circuitry.
Long tail
the tail of a typical sales curve
Gate Three: Construction
this phase includes building and developing the product
Digital Line Subscriber (DSL)
this technology uses the unused digital portion of a regular copper telephone line to transmit and receive information. A special modem and adapter card are required.
forecasting model
time series information is time-stamped information collected at a particular frequency. Forecasts are predictions based on time-series information allowing users to manipulate the time series for forecasting activities
Goal of VCA
to identify processes in which the firm can add value for the customer and create a competitive advantage for itself, with a cost advantage or product differentiation.
computer-aided software engineering (CASE)
tools are software suites that automate systems analysis, design, and development.
Raw Visit Depth
total number of pages a visitor is exposed to during a single visit to a website
business intelligence dashboard
track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls, allowing users to manipulate data for analysis.
Human resource erp components
track employee information including payroll, benefits, compensation, and performance assessment and ensure compliance with all laws
Digital dashboard
tracks key performance indicators (KPIs) and critical success factors (CSFs) by compiling information from multiple sources and tailoring it to meet user needs
Workplace MIS monitoring
tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed
Core ERM components
traditional components included in most ERP systems and they primarily focus on internal operations
system testing
verify that the units or pieces of code function correctly when integrated
Child Online Protection act (COPA)
was passed to protect minors from accessing inappropriate material on the Internet
records
what is a collection of related data elements
information age
when infinite quantities of facts are widely available to anyone who can use a computer
reputation system
where buyers post feedback on sellers
Contact Center
where customer service representatives answer customer inquiries and solve problems, usually by email, chat, or phone
information privacy policy
which contains general principles regarding information privacy
Control Panel
which is a Windows feature that provides options that set default values for the Windows operating system.
Complex instruction set computer (CISC) chips
which is a type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly.
What does an Internet policy do?
1. Describes the Internet services available to users 2. Defines the organization's positions on the purpose of Internet access and restrictions 3. Describes user responsibility for citing sources 4. States the ramifications if the policy is violated
6 Epolicies
1. ethical computer use policy 2. information privacy policy 3. acceptable use policy 4. email privacy policy 5. social media policy 6. workplace monitoring policy
3 items typically found in an acceptable use policy
1. not using the service as part of violating any law 2. not performing any nonrepudiation 3.not attempting to break the security of any computer network or user
Clean Desk Policy
All employees should be required to adhere to a ______ ______, _____ ______ policy. When they leave their work computer, they should sign off to prevent an unauthorized user from accessing. You can set up a password protected screensaver that will activate after 10 minutes in case the employee forgets to sign out. In addition ensure that employees do not leave sensitive printed information on their desks unattended.
Vertical privilege escalation
Attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data.
Security Response Plan Policy
Client confidential information is defined as proprietary and confidential information received from customers. An example of this type of information is customer bank account info. This information type is restricted to management approved internal access only.
Acceptable Encryption Policy
On-premise network servers must be encrypted and kept behind locked doors at a minimum. Limit employee access to servers.
Decrypt
To ___ information is to decode it and is the opposite of encrypt
What do users need to do with ethical computer use policy?
Users should be informed of the rules and, by agreeing to use the system on that basis, consent to abide by them.
There are two kinds of privilege escalation:
Vertical and Horizontal privilege escalation
clickstream
records information about a customer during a web surfing session such as what websites were visited, how long the visit was, what ads were viewed, and what was purchased
Multi-factor authentication
requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (bio-metric verification). The goal is to make it difficult for an unauthorized person to gain access to a system.
Two-factor authentication
requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).
What has the most widespread unintentional information reuse?
social security number
website name stealing
the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
spam
unsolicited email
Internet use policy
contains general principles to guide the proper use of the internet
Opt out
a user can opt out of receiving emails by choosing to deny permission to incoming emails
What does a social media policy contain?
employee, corporate, and personal social network policies
Authentication
is a method for confirming users' identities. Once a system determines the authentication of a user, it can then determine the access privileges for that user
internet censorship
government attempts to control internet traffic, thus preventing some material from being viewed by a country's citizens
Authentication and Authorization technologies can prevent
identity theft, phishing, and pharming scams
cyberbullying
includes threats, negative remarks, or defamatory comments transmitted through the Internet or posted on the website
Phishing
is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as thought they came from legitimate businesses. The messages appear to be genuine, with official-looking formats and logos, and typically ask for verification of important information such as passwords and account numbers, ostensibly for accounting or auditing purposes. Up to one in five recipients responds and become a victim of identity theft.
Pharming attack
uses a zombie farm, often by an organized crime association, to launch a massive phishing attack.
Examples of Info
-Best/worst selling product -Best/ worst customer
3 examples of analytical information
1. market projections 2. future growth projections 3. sales trends
Service
A business task
Supply chain management metrics
Back order: an unfulfilled customer order due to insufficient stock level Customer order promised cycle time: anticipated/agreed upon cycle time of a purchase order Customer order actual cycle time: the avg time it takes to actually deliver order Inventory replenishment cycle time: measure the manufacturing cycle time + time to deploy product to distribution center Inventory turnover: # of times a company's inventory cycles or turns over per year
Web 3.0
Based on "intelligent" Web applications using natural language processing, machine-based learning and reasoning, and intelligence applications
Contact Information in Operational Systems
Billing, customer service, marketing, sales
Banner ad
Box running across a web page that contains advertisements
Extreme Programming (XP)
Breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete.
The World Wide Web (www) is a...
Client Server environment
Source documents
Describes the original transaction record along with details such as its date, purpose, and amount spent and includes cash receipts, canceled checks, invoices, customer refunds, employee time sheet, etc.
Mainframe computer
Designed to meet the computing needs of hundreds of people in a large business environment. Mainframe computers are a step up in size, power, capability, and cost from minicomputers.
Minicomputer (server)
Designed to meet the computing needs of several people simultaneously in a small to medium-size business environment. A common type of minicomputer is a server and is used for managing internal company applications, networks, and websites.
Correlation Analysis
Determines a statistical relationship between variables, often for the purpose of identifying predictive factors among the variables.
Wireless Topology
Devices are connected by a receiver/transmitter to a special network interface card that transmits signals between a computer and a server, all within an acceptable transmission range
Intangible Benefits
Difficult to quantify/measure. Ex: Improved decision making, improved community service, improved morale, and improved goodwill
Tangible Benefits
Easy to quantify and typically measured to determine the success or failure of a project. Ex: Decreased expenses, decreased response time, increased quality, Decreased processing errors, and Increased quantity or sales.
Disadvantages of Outsourcing
Length of contract (difficult to break, forecasting is difficult, re-creating an internal MIS department is difficult). Threat to competitive advantage (outsourcer could share a company's trade secrets). Loss of confidentiality (potential risks and costs of a breach)
3 primary operational CRM technologies
List generator, campaign management, cross-selling and up-selling
Marketing and operational CRM technology
List generator, campaign management, cross-selling and up-selling
Intel
Low-end microprocessors
HR
Maintains policies, plans, and procedures for the effective management of employees
Cross Functional/ departmental
Most processes, such as ordering a product, that span throuhout the entire organization -"Order to delivery"--> focuses on the entire customer order process across functional departments -"product realization," -->which includes not only the way a product is developed, but also the way it is marketed and serviced
Primavera Systems, Inc.
Moved from waterfall to agile. Scrum's insistence on delivering complete increments of business value in 30-day learning cycles helped the teams learn rapidly. Scrum forced teams to test and integrate experiments and encouraged them to release them into production.
wireless media
Natural parts of the Earth's environment that can be used as physical paths to carry electrical signals
Satellite
Newer versions have two-way satellite access, removing need for phone line.
Unidentified visitor
No information about the visitor is available
Two types of PII
Nonsensitive PII Sensitive PII
Factors used to appraise supplier power
Number of suppliers, size of suppliers, uniqueness of services, availability of substitute products
Semistructured Decisions
Occurs in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision.
Personalization
Occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person
asset tracking
Occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention
redundancy
Occurs when a task or activity is unnecessarily repeated
Packet-switching
Occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer
Smartphones
Offer more advanced computing ability and connectivity than basic cell phones
Arithmetic Logic Unit (ALU)
Performs all arithmetic operations (for example, addition and subtraction) and all logic operations (such as sorting and comparing numbers)
Sales
Performs the function of selling goods or services
Automated Input devices
Pg. 390
Manual Input devices
Pg. 390
Monitors and Printers (Common output devices
Pg. 391
Insurance
Predict claim amounts and medical coverage costs.
Technology
Predict hardware failures.
Retail
Predict sales, inventory levels, and distribution.
RFID in the Retail Supply Chain
RFID tags are added to every product and shipping box. At every step of an item's journey, a reader scans one of the tags and updates the information on the server. Manufacturer, distribution center, store, home
RUP
RUP is an iterative methodology, the user can reject the product and force the developers to go back to gate one. Approximately 500,000 developers have used RUP in software projects of varying sizes in the 20 years it's been available, according to IBM. RUP helps developers avoid reinventing the wheel and focuses on rapidly adding or removing reusable chunks of processes addressing common problems.
Accounting
Records, measures, and reports monetary transactions.
network topology
Refers to the geometric arrangement of the actual physical organization of the computers and other network devices) in a network
Latitude
Represents a north/south measurement of position
Longitude
Represents an east/west measurement of position
SMART
Specific, Measurable, Agreed Upon, Realistic, Time Frame
Strong AI
Strong refers to the field of artificial intelligence that works toward providing brain like powers to AI machines; in effect, it works to make machines as intelligent as humans.
Financial
Such as return on investment (the earning power of an organization's assets), cost-benefit analysis (the comparison of projected revenues and costs including development, maintenance, fixed, and variable), and break-even analysis (the point at which constant revenues equal ongoing costs).
Marketing
Supports sales by planning, pricing, and promoting goods or services.
Blog example
Sweet Leaf Tea, Stoneyfield Farm
Competitive Intelligence
The process of gathering info about the competitive environment, including competitors plans, activities, adn products to improve a companys ability to succeed -understanding and learning as much as possible as soon as possible about what is occurring outside the company to remain competitive
Production
The process where a busniess takes raw materials and processes them or converts them into a sinished product for its goods or services *INPUTS *PROCESS *OUTPUTS
Key performance indicators (KPIs)
The quantifiable metrics a company uses to evaluate progress toward critical success factors. - More specific than CSFs. - Focuses on internal & external measurements. a common external is market share
Data
The raw facts that describe the characteristics of an event or object - successful managers compile, analyze, and comprehend massive amounts of data daily, which helps them make more successful business decisions
Project Management
The science of making intelligent trade-offs between time, cost, and scope. Provides a controlled way to respond to changing market conditions, to foster global communications, and to provide key metrics to enable managerial decision making.
Estimated time of arrival (ETA)
The time of day of an expected arrival at a certain destination and is typically used for navigation applications
Estimated time enroute (ETE)
The time remaining before reaching a destination using the present speed and is typically used for navigation applications
Gate Two: Elaboration
This phase expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it.
Law Enforcement
Track crime patterns, locations, and criminal behavior.
BPMN gateway
Used to control the flow of a process. Handles the forking, merging and joining of paths within a process. Represented by a diamond shape in a business process model.
Voice over IP (VoIP)
Uses IP technology to transmit voice calls over long-distance telephone lines
Wiki examples
Wikipedia, LexisNexis
Bluetooth
Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices
Mashup examples
Zillow, Infopedia, Trendsmap
digital video disc (DVD)
a CD-ROM format capable of storing up to a maximum of 17 GB of data; enough for a full-length feature movie.
inforation integrity
is a measure of the quality of information
Tech Development
applies MIS to processes to add value
mass customization
The ability of an organization to tailor its products or services to the customers' specifications
1. Buyer Power
The ability of buyers to affect the price they must pay for an item. -->If buyer power is high, customers can force a company and its competitors to compete on price, which typically drives prices down.
Mobile Business
The ability to purchase goods and services through a wireless Internet-enabled device
integration of legacy devices
The ability to use current devices such as Iphones, laptops, and so on, as credit cards, tickets and reservations tools
Business Process Reeingineering (BPR)
The analysis and redesign of workflow within and between enterprises -must continue to evaluate processes in its value chain to improve efficiency adn effectivemenss -focus on those core processes that are critical to performance *Creating value for the customer is the leading reason for instituting BPR
Project Management
The application of knowledge, skills, tools, and techniques to project activities to meet project requirements
Waterfall Methodology (Problems)
The biggest problem with the waterfall methodology is that it assumes users can specify all business requirements in advance. It also assumes that business requirements do not change over time. If you find yourself on a software development project using the waterfall methodology you should do everything you can to change the methodology.
Data Marts long description
The data warehouse modeled in the figure compiles information from internal databases or transactional/operational databases and external databases through ETL. It then sends subsets of information to the data marts through the ETL process.
poor data quality
The data, if available, were often incorrect or incomplete. Therefore, users could not rely on the data to make decisions
Supercomputer
The fastest, most powerful, and most expensive type of computer. Organizations such as NASA that are heavily involved in research and number crunching employ supercomputers because of the speed with which they can process information. Other large, customer-oriented businesses such as General Motors and AT&T employ supercomputers just to handle customer information and transaction processing.
Cable
The medium to connect all of the computers.
selling chain management
applies technology to the activities in the order life cycle from inquiry to sale
Legal Feasibility
Type of feasibility. Measures how well a solution can be implemented within existing legal and contractual obligations.
Political Feasibility
Type of feasibility. Measures how well the solution will be accepted in a given organization.
Schedule Feasibility
Type of feasibility. Measures the project's time frame to ensure it can be completed on time.
Banking
Understand customer credit card usage and nonpayment rates.
Website traffic analytics
Uses clickstream data to determine the efficiency of the site for users and operates at the server level. Traffic analytics tracks data on how many pages are served to the user, how long it takes each page to load, how often the user hits the browser's back or stop button, and how much data is transmitted before the user moves on.
Business-to-consumer (B2C)
applies to any business that sells its products or services to consumers over the internet; ex. amazon.com, Carfax
Business Process Model and Notation (BPMN)
a graphical notation that depicts the steps in a business process
help desk
a group of people who respond to users' questions
hashtag
a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#).
ezine
a magazine published only in electronic form on a computer network
Balanced Scorecard
a management system, in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action
Internet
a massive network that connects computers all over the world and allows them to communicate with one another
Customer Relationship Management (CRM)
a means of managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability
information integrity
a measure of the quality of information
information governance
a method system of government for information management or control
Customer service and support (CSS)
a part of operational CRM that automates service requests, complaints, product returns, and information requests
change agent
a person or event that is the catalyst for implementing major changes for a system to meet business changes
Ethernet
a physical and data layer technology for LAN networking
Business Model
a plan that details how a company creates, delivers, and generates revenues
sniffer
a program or device that can monitor data traveling over a network. sniffers can show all the data being transmitted over a network including password and sensitive information . tend to have favorite weapon in the hacker arsenal
applet
a program that runs within another application such as a website
scripting language
a programming method that provides for interactive modules to a website
critical path analysis
a project diagramming method used to predict total project duration.
Instant messaging
a service that enables instant or real-time communication between people
Methodology
a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges
Application Programming Interface (API)
a set of routines, protocols, and tools for building software applications
Collaboration system
a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information
Model
a simplified representation or abstraction of reality
pop-up ad
a small web page containing an advertisement that appears outside of the current website loaded in the browser
shopping bot
a software that will search several retailer websites ad provide a comparison of each offering including price and availability.
Sensitivity analysis
a special case of what-if analysis. The study of the impact on other variables when one variable is changed repeatedly.
Digital video disk-read/write (DVD-RW)
a standard for DVD discs and player/recorder mechanisms that enables users to record in the DVD format
Electronic Data Interchange (EDI)
a standard format for the electronic exchange of information between supply chain participants
data lake
a storage repository that holds a vast amount of raw data in its original format until the business needs it
Consumer-to-business (C2B)
applies to any consumer who sells a product or service to a business on the internet; ex. Priceline
Business-to-business (B2B)
applies to businesses buying from and selling to each other over the internet
1990's
Executives became less concerned with the day-to-day business operations and more concerned with overall business functions
Data Warehouses
Extend the transformation of data into information. Provide the ability to support decision making without disrupting the day-to-day operations.
Extended ERP components
Extra components that meet the organizational needs not covered by the core components and primarily focus on external operations
Consumer-to-consumer (C2C)
applies to sites primarily offering goods and services to assist consumers interacting with each other over the internet; ex. Ebay, forward auctions
Data Modeling Phase
apply mathematical techniques to identify trends and patterns in the data
Mashup Editors
are WYSIWYG, or what you see is what you get tools. They provide a visual interface to build a mashup, often allowing the user to drag and drop data points into a web application
Time bombs
are computer viruses that wait for a specific date before executing their instructions.
Bugs
are defects in the code of an information system
hacker
are experts in technology who use their knowledge to break into computers and computer networks, either for profit or simply for the challenge.
slogs (spam blogs)
are fake blogs created solely to raise the search engine rank of affiliated website. even blogs that are kegitiament are plagued by spam with spammers taking advantage of the comments features of most blogs to moment with link to spam sites
knowledge workers
are individuals valued for their ability to interpret and analyze information
adaptive computer device
are input devices designed for special applications for use by people with different types of special needs.
Busienss Facing Processes (Back office Processes)
are invisible to the external customer but essential to the effective management of the business; -goal setting, -day-to-day planning, -giving performance feedback and rewards, -allocating resources
services
are tasks performed by people that customers will buy to satisfy a want or need
Pilot Implementation
assigns a small group of people to use the new system until it is verified that it works correctly, then the remaining users migrate to the new system
hoaxes
attack computer system by transmitting a virus hoax with a real virus attached. by masking the attack in a semingliy legitimate message unsuspecting users more readily distribute the message and send the attack on to their co-worker s and friend infecting many user along the way
Distributed Denial of Service (DDoS)
attack from multiple computers that flood a website with so many request for service that it slows down or crashes. a common type is Ping of death, which thousand of computer try to access a website at the same time overloading it and shutting it down
Continuous improvement model
attempts to understand and measure the current process, and make performance improvements accordingly
predictive dialing
automatically dials outbound calls and when someone answers, the call is forwarded to an available agent
Sales Force Automation (SFA)
automatically tracks all the steps in the sales process
Benchmarks
baseline values the system seeks to attain
Transaction processing system (TPS)
basic business system that serves the operational level (analysts) and assists in making structured decisions.
Business Process Integration examples
collaborative logistics, commerce websites, vendor-managed inventory, private exchanges
Business Intelligent components
collect info used throughout the org, organize it, and apply analytical tools to assist managers with decisions -ex. data warehouse
customer segmentation
divides a market into categories that share similar attributes such as age, location, gender, habits, and so on
passive RFID tags
do not have a power source
mobile entertainment
downloads for music, videos, games, voting, ring tones, as well as text-based messaging services.
Strategic business processes
dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions
defines the relationship between entities and attributes in a relational database
each attribute of an entity occupies a separate column of a table
Computer Network
each computer in the supply chain recognizes the EPC and pulls up info related to the item, such as dates made and shipped, price, and directions for use, from a server maintained by the manufacturer. The computers track the item's location throughout the supply chain
Ebusiness components
elogistics and eprocurement
At the managerial level (semistructured decisions),
employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to and leverage change
At the operational level (unstructured decisions),
employees develop, control, maintain core business activities required to run the daily operations
3. Threat of Substitute Products or Services
high when there are many alternatives to a product or service and low when there are few alternatives from which to choose
user documentation
highlights how to use the system and how to troubleshoot issues or problems
Consulting fees
hiring external experts to help implement the system correctly can cost millions of dollars
Where has the business been?
historical perspective offers important variables for determining trends and patterns
communication device
is equipment used to send information and receive it from one location to another.
Business Intelligence (BI)
is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decisions making
intellectual property
is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
unstructured data
is not defined and does not follow a specific format and is typically free-form text such as emails, Twitter tweets, and text messages o accounts for 80% of the data that surrounds us
spyware
is software that comes hidden in free downloads software and tracks online movement, mines the information stored on a computer, or used a computers CPU and storage for some task the user knows about.
counterfeit software
is software that is manufactured to look like the real thing and sold as such.
adware
is software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
Machine Vision
is the ability of a computer to "see" by digitizing an image, processing the data it contains, and taking some kind of action.
Machine vision sensitivity
is the ability of a machine to see in dim light or to detect weak impulses as invisible wavelengths.
Central Processing Unit (CPU) or (Microprocessor)
is the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together.
Consolidation
is the aggregation of data from simple roll-ups to complex groupings of interrelated information.
fast data
is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value.
information secrecy
is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
cube
is the common term for the representation of multidimensional information.
Primary Storage
is the computer's main memory, which consists of the random access memory (RAM), cache memory, and read-only memory (ROM) that is directly accessible to the CPU.
Crowdsourcing
refers to the wisdom of the crowd
Disk image for data recovery
relieves the burden of reinstalling applications if a hard drive crashes or becomes irretrievably corrupted
Mobile Device Management (MDM)
remotely controls smart phones and tablets, ensuring data security
As-is process model
represent the current state of the operation that has been mapped, without any specific improvements or changes to existing processes.
Social graph
represents the interconnection of relationships in a social network
Institute of Electrical and Electronics Engineers (IEEE)
researches and institutes electrical standards for communication and other technologies
Chief Data Officer (CDO)
responsible for determining the types of information the enterprise will capture, retain, analyze, and share
data steward
responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business
single user license
restricts the use of the software to one user at a time.
big data
s a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.
Antivirus Software
scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware. Must be Frequently updated to protect against newly created viruses.
cyberterrorist
seek to cause harm to people or to destroy critical system or us weapon
Slack
the amount of time an activity may be delayed without delaying a succeeding activity or the project finish date.
Business Process Reengineering (BPR)
the analysis and redesign of workflow within and between enterprises
Business process reengineering (BPR)
the analysis and redesign of workflow within and between enterprises. BPR relies on a different school of thought than continuous process improvement. In the extreme, BPR assumes the current process is irrelevant, does not work, or is broken and must be overhauled from scratch. Such a clean slate enables business process designers to disassociate themselves from today's process and focus on a new process.
Eprocurement
the business-to-business (B2B) online purchase and sale of supplies and services over the Internet
Ecommerce
the buying and selling of goods and services over the internet
loose coupling
the capability of services to be joined on demand to create composite services or disassembled just as easily into their functional components
Interoperability
the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
data aggregation
the collection of data from various sources for the purpose of data processing
HTML 5
the current version of HTML delivers everything from animation to graphics and music to movies; it can also be used to build complicated web applications and works across platforms, including a PC, tablet, smartphone, or smart TV
MIS skills gap
the difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies
chip line width
the distance between transistors on a chip. The shorter the chip line width the faster the chip since more transistors can be placed on a chip and the data and instructions travel short distances during processing.
Usability
the ease with which people perform transactions and/or find information
cybervandalism
the electronic defacing of an existing website
information granularity
the extent of details within the information
information accuracy
the extent to which a system generates the correct results when executing the same transaction numerous times
Analysis Phase
the firm analyzes its end-user business requirements and refines project goals into defined functions and operations of the intended system
Inventory turnover
the frequency of inventory replacement
Network Adapter
the hardware installed in computers that enables them to communicate on a network
Stickiness (visit duration time)
the length of time a visitor spends on a website
data stewardship
the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner
Online analytical processing
the manipulation of info to create business intelligence in support of strategic decision making.
Network Interface Card (NIC)
the most common network adapter that is designed to be installed directly into a standard expansion slot inside a PC
Code Modifications
the most expensive customization occurs when application code is changed and should only be done if the code changes provide specific competitive advantages
IEEE 802.11n (or Wireless-N)
the newest standard for wireless networking
Conversion rate
the number of customers an organization "touches" for the first time and persuades to purchase its products or services Useful for evaluating pop-ups, banners.
implementation phase
the organization places the system into production so users can begin to perform actual business operations with it
Transmission Media (Medium)
the physical path that is used carry a signal between a signal transmitter and a signal receiver
Astroturfing
the practice of artificially stimulating online conversation and positive reviews about a product, service, or brand.
Social Networking
the practice of expanding your business and/or social contacts by constructing a personal network
master data management (MDM)
the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems
Website ebusiness analytics
uses clickstream data to determine the effectiveness of the site as a channel-to-market. Website ebusiness analytics tracks what pages the shopper lingers on, what the shopper puts in or takes out of a shopping cart, what items the shopper purchases, whether or not the shopper belongs to a loyalty program and uses a coupon code, and the shopper's preferred method of payment.
supply chain planning systems
use advanced mathematical algorithms to improve the flow and efficiency of the supply chain while reducing inventory
chipless RFID tags
use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip
Bridges and Gateways
used to connect networks that use dissimilar protocols
Business process management tools
used to create an application that is helpful in designing business process models and helpful in simulating, optimizing, monitoring, and maintaining various processes that occur within an organization. Many tasks are involved in achieving a goal, and these tasks are done either manually or with the help of software systems.
Repeaters
used to increase the distance over which a network signal can be transmitted
inadequate data usefulness
users could not get the data they needed; what was collected was not always useful for intended purposes
Automatic vehicle location (AVL)
uses GPS tracking to track vehicles
data mining tool
uses a variety of techniques to find patterns and relationships in large volumes of information and infers rules that predict future behavior and guide decision making
parallel implementation
uses both the legacy system and new system until all users verify that the new system functions correctly
behavioral analytics
uses data about people's behaviors to understand intent and predict future actions
scrum methodology
uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervals, to achieve an appointed goal
data offer increased inflation security
various security features of database ensure that individuals have only certain types of access to certain types of information
Integration testing
verify that separate systems can work together passing data back and forth correctly
PERT (Program Evaluation and Review Technique) chart
A diagram used in project planning. A graphical network model that depicts a project's tasks and the relationship between them.
Rapid Application Development (RAD) Methodology
Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process.
Gantt chart
A diagram used in project planning. A simple bar chart that lists project tasks vertically against the project's time frame, which is listed horizontally. Useful when it comes to representing the project's schedule. Shows actual progress.
Global Positioning System (GPS)
A satellite-based navigation system providing extremely accurate position, time, and speed information
Benefits of the SRM solution include:
-A single consolidated view of all suppliers. -Consistent, detailed management information allowing multiple views for every executive. -Elimination of duplication suppliers.
data mining uncovers patterns and trends for business analysis such as:
-Analyzing customer buying patterns to predict future marketing and promotion campaigns. -Building budgets and other financial information. -Detecting fraud by identifying deceptive spending patterns. -Finding the bet customers who spend the most money. -Keeping customers from leaving or migrating to competitors. -promoting and hiring employees to ensure success for both the company and the individual.
Value Chain Analysis—Executing Business Strategies
-Business Process -Value Chain Analysis
Transaction fees benefits
-Can be directly tied to savings(both process and price savings) -Important revenue source when high level of liquidity(transaction volume) is reached
License fee benefits
-Creates incentive to do many transactions -Customization and back-end integration lead to lock-in of participants.
Subscription fees benefits
-Creates incentives to do trans actions -Price can be differentiated -Possibility to build additional revenue from new user group
Value-added service fees challenges
-Cumbersome process for customers to continually evaluate new services.
Broad Market and high cost
-DIFFERENTIATION Neiman Marcus competes by offering a broad range of differentiated products at high prices. Its business strategy offers a variety of specialty and upscale products to affluent consumers.
Effective/ efficient SCM Systems allow orgs to:
-Decrease Buyer Power -Decrease threat of substitute products or services by increasing switching costs Decrease threat of new entrants by creating barriers -Increase its own supplier power. -Increase efficiencies while seeking a competitive advantage through cost leadership
Dirty data examples
-Duplicate data -Misleading data -Incorrect data -Non-formatted data -Violates business rules data -Non-integrated data -Inaccurate data
Process models purpose
-Expose process detail gradually and in a controlled manner. -Encourage conciseness and accuracy in describing the process model. -Focus attention on the process model interfaces. -Provide a powerful process analysis and consistent design vocabulary.
Narrow Market and low cost
-FOCUSED Payless competes by offering a specific product, shoes, at low prices. Its business strategy is to be the low-cost provider of shoes. Payless competes with Walmart, which also sells low-cost shoes, by offering a far bigger selection of sizes and styles.
Narrow market and high cost
-FOCUSED Tiffany & Co. competes by offering a differentiated product, jewelry, at high prices. Its business strategy allows it to be a high-cost provider of premier designer jewelry to affluent consumers.
Subscription fees challenges
-Fixed fee is a barrier to entry for participants
Understand and govern PII by:
-Identifying all sources of created, received, maintained, or transmitted PII. -Evaluating all external sources of PII. -Identifying all human, natural, and environmental threats to PII.
Transaction fees challenges
-If process savings are not completely visible, use of the system is discouraged(incentive to move transactions offline) -Transaction fees likely to decrease with time
Methods for gathering business requirements
-JAD -Interview individuals to determine current operations and current issues. -Compile questionnaires to survey employees to discover issues. -Make observations to determine how current operations are performed. -Review business documents to discover reports, policies, and how information is used throughout the organization.
Advertising fees challenges
-Limited revenue potential -Overdone or poorly targeted advertisements can be disturbing elements of the website.
Examples of data
-Order date -amount sold -Customer number -Quantity ordered -Profit
The production planning process
-Sales forecasting -operations planning -detailed scheduling to production -OR materials requirement planning to purchasing
Value-added service fees benefits
-Service offering can be differentiated -Price can be differentiated -Possibility to build additional revenue from establishing and new users groups(third parties)
1G 2G 3G 4G 5G
-The original analog cell phone network (14.4Kbps) -Digital cell phone service (10Kbps-144Kbps) -Broadband Internet services over cellular networks, added MMS or picture message services(144Kbps- 4Mbps) -High-speed access, anywhere, anytime, to anything digital-audio, video, text and improved video transmissions(100 Mbps) -Superior data communication rate and expected to provide artificial intelligence capabilities on wearable devices(1.5Gbps over a distance of 90 meters)
Business process characteristics
-The processes have internal and external users -A process is cross-departmental -The processes occur across organizations -The processes are based on how work is done in the organization -Every process should be documented and fully understood by everyone participating in the process -Processes should be modeled to promote complete understanding
License fee challenges
-Up-front fee is a barrier to entry for participants. -Price differentiation is complicated.
Decreasing Supplier Power
-Using MIS to find alternative products-->use internet to find alternative -use MIS to form groups or collaborate with other buyers, increasing the size of the buyer group and reducing supplier power
Advertising fees benefits
-Well targeted advertisements can be perceived as value-added content by trading participants. -Easy to implement.
Ways that companies duplicate competitive advantages
-acquiring the new technology -copying the business operations -hiring away key employees
hardware
-central process unit (CPU) -brain -input devices -Keyboard; mouse; scanner -output device -Monitor; printer; headphones -storage device- DVD; memory stick; hard drive -communication device- Modem; wireless card -connection device- Cables; USB port
revenue
-direct loss -compensatory payments -loss future revenue -billing losses -investment losses -lost productivity
advantages of future ERP systems
-drive cost efficiencies -faster time to market -better enable mobile workforce -better leverage data to provide insights -new product development
Benefits of PRM
-expanded market coverage -offerings of specialized products and services -broadened range of offerings and a more complete solution
Ebusiness advantages
-expanding global reach -opening new markets -reducing costs -improving effectiveness
Support Value Activities
-firm infrastructure, -human resource management, -technology development, -procurement
Ethernet Popularity reasons:
-is easy to implement, manage, and maintain. -Allows low-cost network implementations. -Provides extensive flexibility for network installation. -Guarantees interoperability of standards-compliant products, regardless of manufacturer.
Factors used to assess buyer power
-number of customers, -their sensitivity to price, -size of orders, -differences between competitors, -availability of substitute products
Reducing threat of Substitutes
-offering additional value through wider product distribution ex.Soft-drink manufacturers distribute their products through vending machines, gas stations, and convenience stores, increasing the availability of soft drinks relative to other beverages -Companies can also offer various add-on services, making the substitute product less of a threat.
Hybrid erp
-owns components of hardware/software -host components of hardware and software with cloud vendor
Key Performance Indicators examples
-turnover rates of employees -percentage of help desk calls answered in the first minute -number of product returns -number of new customers -average customer spending
type of application software (perform specific information processing needs)
-word processing software -spreadsheet software
Gigabyte (GB)
1 billion bytes
Terabyte (TB)
1 trillion bytes
terabyte (TB)
1 trillion bytes
3 laws of robotics
1. A robot may not injure a human being or, through inaction, allow a human being to come to harm. 2. A robot must obey orders given it by human beings except where such orders would conflict with the First Law. 3. A robot must protect its own existence as long as such protection does not conflict with the First or Second Law.
3 most common core ERP components
1. Accounting and finance 2. Production and materials management 3. Human resource
TCP/IP's four-layer reference model
1. Application Layer- serves as the window for users and application processes to access network services. 2. Transport Layer-handles end-to-end packet transportation. 3. Internet Layer- formats the data into packets, adds a header containing the packet sequence and the address of the receiving device, and specifies the services required from the network. 4. Network Interface Layer-Places data packets on the network for transmission.
Networks are differentiated by the following:
1. Architecture - peer-to-peer, client/server 2. Topology - bus, star, ring, hybrid, wireless (Pg. 420) 3. Protocols - Ethernet, Transmission Control Protocol/Internet Protocol (TCP/IP) 4. Media - coaxial, twisted-pair, fiber-optic, wireless
There are FIVE principal Topologies used in LANs:
1. Bus 2. Star 3. Ring 4. Hybrid 5. Wireless
4 most common extended ERP components
1. Business Intelligence 2. Customer Relationship Management 3. Supply Chain Management 4. Ebusiness
Strategic initiatives for competitive advantage
1. Business Process Re engineering 2.Supply Chain Management 3.Customer Relationship Management 4.Enterprise Resource Planning
Porters Five Forces
1. Buyer power (power of cust to driv edown prices) 2. Supplier Power (Power of suppliers to drive up prices of materials) 3. Threat of Substitute products or services (The power of customers to purchase alternatives) 4. Threat of New Entrants (The power of comp. to enter a market) 5. Rivalry Among Exisiting Competitors (The power of comps)
Digital Dashboard Analytical Capabilities
1. Consolidation 2. Drill-down 3. Slice-and-Dice 4. Pivot
Characteristics of Business 2.0
1. Content sharing through open sourcing 2. User-contributed content 3. Collaboration inside the organization 4. Collaboration outside the organization
3 features of a neural network
1. Coping w/ huge volumes of info w/ many dependent variables 2. Lending themselves to massive parallel processing 3. Learning and adjusting to new circumstances on their own
Core drivers of the information age
1. Data 2. Information 3. Business Intelligence 4. Knowledge
TCP/IP Applications
1. File transfer protocol (FTP) 2. Simple mail transfer protocol (SMTP) 3. Hypertext transfer protocol (HTTP) 4. Simple network management Protocol (SNMP) Definitions Pg. 448
Chapter 3 Learning Outcomes
3.1. Identify how an organization can use business process reengineering to improve its business. 3.2. Explain supply chain management and its role in business. 3.3. Explain customer relationship management systems and how they can help organizations understand their customers. 3.4. Summarize the importance of enterprise resource planning systems.
Transmitting and Receiving Devices include:
1. Network adapters 2. Modems 3. Repeaters 4. Wiring concentrators, hubs, and switches 5. Routers, Bridges, and Gateways
three common tools to analyze competitive intelligence
1. The Five Forces Model (for evaluating industry attractiveness). 2. The three generic strategies (for choosing a business focus). 3. Value chain analysis (for executing business strategies).
A network provides two principle benefits:
1. The ability to communicate 2. The ability to share/collaborate
Three most common types of wired media:
1. Twisted-pair wiring 2. Coaxial Cable 3. Fiber optic Cable
Four Common Characteristics of Big Data
1. Variety -Difference forms of structured and unstructured data -Data from spreadsheets and databases as well as from email, videos, photos, and PDFs, all of which must be analyzed 2. Veracity - the uncertainty of data, including biases, noise, abnormalities -Uncertainty or trustworthiness of data -Data must be meaningful to the problem being analyzed -Must keep data clean and implement processes to keep dirty data from accumulating in systems. 3. Volume - the scale of data -Includes enormous volumes of data generated daily -Massive volume created by machines and networks. -Big data tools necessary to analyze zettabytes and brontobytes. 4. Velocity - analysis of streaming data as it travels the internets -Analysis necessary of social media messages spreading globally.
Two types of Media
1. Wired (Guided) 2. Wireless. (Unguided)
challenges facing ebusiness
1. identifying limited market segments 2. managing consumer trust 3. ensuring consumer protection 4. adhering to taxation rules
Steps to Business Process improvements
1. measure what matters to most customers 2. monitor the performance of key business processes 3. assign accountability for process improvement
3 Characteristics of online transactional processing
1. processes the information according to defined business rules 2. updates existing information to reflect the new information 3. stores the info
Challenges of Business 2.0
1. technology dependence 2. information vandalism 3. violations of copyright and plagiarism
Activities that create transactional info
1. withdrawing cash from ATM 2. purchasing stocks 3. making airline reservations
3 Conditions of a business process change
1.) There has been a pronounced shift in the market the process was designed to serve. 2.) The company is markedly below industry benchmarks on its core processes. 3.) To regain competitive advantage, the company must leapfrog competition on key dimensions.
5 Basic Suply Chain Activities
1.Plan 2.Source 3.Make 4.Deliver 5.Return
Three Phases of crm
1.reporting 2.Analyzing 3.Prediting
The Evolution of ERP
1990's: ERP 2000's: Extended ERP 2010'S: ERP-II
Learning Outcomes
2.1. Explain why competitive advantages are temporary. 2.2. Describe Porter's Five Forces Model and explain each of the five forces. 2.3. Compare Porter's three generic strategies. 2.4. Demonstrate how a company can add value by using Porter's value chain analysis.
RFID accelerometer
A device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
802.11a 802.11b 802.11g 802.11n
54Mbs 11Mbs 54Mbs 140Mbs
accurat
>is there an incorrect in the information ? >example : is the name spelled correctly ? is the dollar amount recorded properly ?
Geocache
A GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find
proxy server
A computer system that functions as a relay between CLIENT and SERVER. It helps prevent an attacker from invading a private network and is one of several tools used to build a firewall. A proxy server acts on behalf of the user
Server
A computer that is dedicated to providing information in response to external requests
Virtual reality
A computer-simulated environment that can be a simulation of the real world or an imaginary world
Variable
A data characteristic that stands for the value that changes or varies overtime -ex. Price or quantity ordered-both can vary -MANIPULATING variables to look at hypothetical scenerios/ SEE HOW CERTAIN SCENERIOS EFFECT OUTCOMES
Modem
A device that enables a computer to transmit data over telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone or cable lines is transmitted in the form of analog waves. A modem converts between these two forms
Competittive Advantage
A feature of a product or service on which customers place a greater value than they do similar offerings from competitiors -provide the same product or service either at a lower price or with additional value that can fetch premium prices **TYPICALLY TEMPORARY- Competitiors often quickly seek new ways to duplicate them
Agile Methodology
A form of XP, aims for customer satisfaction through early and continuous delivery of useful software components.
Project Plan
A formal, approved document that manages and controls project execution
Project Plan
A formal, approved document that manages and controls project execution. Includes: a description of the project scope, list of activities, schedule, time estimates, cost estimates, risk factors, resources, assignments, responsibilities, contingency plans, review and communication strategies, and a kill switch.
Agile Alliance
A group of software developers whose mission is to improve software development processes and includes: Satisfy the customer through early and continuous delivery of valuable software, Welcome changing requirements, even late in development, Business people and developers must work together daily throughout the project, Build projects around motivated individuals, The best architectures, requirements, and designs emerge from self-organizing teams, At regular intervals, the team reflects on how to become more effective, then tunes and adjusts its behavior accordingly.
Business Strategy
A leadership plan that achieves a specific set of goals or objectives -Developing new products or services -Entering new markets -Increasing customer loyalty -Attracting new customers -Increasing sales **business strategies build in buffers or slack, allowing the company the ability to ride out any storm and defend against competitive or environmental threats-->consider internal and external environments **Busniess stragegies should match core competencies
Wireless LAN (WLAN)
A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet
Website bookmark
A locally stored URL or the address of a file or Internet page saved as a shortcut
data warehouse
A logical collection of information - gathered from many different operational databases - that supports business analysis activities and decision-making tasks
Wireless Fidelity (Wi-Fi)
A means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves
Streaming
A method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.
Wireless MAN (WMAN)
A metropolitan area network that uses radio signals to transmit and receive data
Disruptive technology
A new way of doing things that initially does not meet the needs of existing customers
ebusiness model
A plan that details how a company creates, delivers, and generates revenues on the internet
benchmarking
A process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance
3D printing
A process that builds—layer by layer in an additive process—a three-dimensional solid object from a digital model. -supports procurement
Extraction, transformation, and loading (ETL)
A process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse
Information cleansing or scrubbing
A process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information
Hits
A request for a file made by web browsers and search engines. Each element of a requested page is recorded by the website's server log file
Geocoin
A round coin-sized object uniquely numbered and hidden in geocache
Personal digital assistant (PDA)
A small handheld computer that performs simple tasks such as taking notes, scheduling appointments, and maintaining an address book and a calendar. The PDA screen is touch-sensitive, allowing a user to write directly on the screen, capturing what is written.
RAD (Prototype)
A smaller-scale representation or working model of the users' requirements or a proposed design for an information system. The prototype is an essential part of the analysis phase when using a RAD methodology.
Geocoding
A spatial databases coding process that assigns a digital map feature an attribute that serves as a unique ID or classification
Executive information system
A specialized DSS that supports senior level executives within the organization
protocol
A standard that specifies the format of data as well as the rules to be followed during transmission
Business Process
A standardized set of activities that accomplish a specific task, such as processing a customers order -Transform a set of inputs into a set of outputs-goods or services-for another person or process by using PEOPLE AND TOOLS -Must understand business process to envision how the entire company operates
Business Process
A standardized set of activities that accomplish a specific task, such as processing customers orders -->Once a firm identifies the industry it wants to enter and the generic strategy it will focus on, it must then choose the business processes required to create its products or services **ensure the processes add value and create competitive advantages
regression model
A statistical process for estimating the relationships among variables. Regression models include many techniques for modeling and analyzing several variables when the focus is on the relationship between a dependent variable and one or more independent variables.
optimization model
A statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste.
viral marketing
A technique that induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect
Project
A temporary activity a company undertakes to create a unique product, service, or result
project
A temporary activity a company undertakes to create a unique product, service, or result
RFID reader (RFID interrogator)
A transmitter/receiver that reads the contents of RFID tags in the area
Kill Switch
A trigger that enables a project manager to close the project before completion.
Heat map
A two-dimensional representation of data in which values are represented by colors.
Machine learning
A type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn.
Nearshore Outsourcing
A type of outsourcing. Contacting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country.
Onshore Outsourcing
A type of outsourcing. Engaging another company within the same country for services.
Offshore Outsourcing
A type of outsourcing. Using organizations from developing countries to write code and develop systems. Geographically far away.
Graphical User Interface (GUI)
A visual display on a computer's screen that allows you to interact with your computer more easily by clicking graphical elements.
Systems Thinking
A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part -provides an end-to-end view of how operations work together to create a product or service
Core Competencies (A reason for outsourcing.)
A way to acquire best-practices and the business process expertise of highly skilled technical resources for a low cost. Technology is advancing too quickly for certain companies to keep up on their own.
Wireless WAN (WWAN)
A wide area network that uses radio signals to transmit and receive data
Neural networks
AKA artificial neural network, a category of AI that attempts to emulate the way the brain works.
Wireless (LMCS)
Access is gained by connection to a high-speed cellular-like local multipoint communications system (LMCS) network via wireless transmitter/receiver.
cloud computing advantages
Accessibility Cost Saving Flexibility Reliability Portability Capacity on Demand Backup/Recovery Scalability Availability
Ebusiness revenue models
Advertising fees License fees Subscription fees Transaction fees Value-added service fees
mobile sales/marketing
Advertising, campaigns, discounts, promotions and coupons
Extreme Programming (XP) Methodology
Breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete.
Agile
Aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements.
Bus Topology
All devices are connected to a central cable, called the bus or backbone. Bus networks are relatively inexpensive and easy to install for small networks
Star Topology
All devices are connected to a single central device, called a hub. Star networks are relatively. easy to install and manage, but bottlenecks can occur because all. data must pass through the hub
Ring Topology
All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it. Ring topologies are relatively expensive and difficult to install but they offer high bandwidth and can span large distances
Rapid Growth (A reason for outsourcing.)
Allows an organization to acquire the resources required to speed up operations or scale to new demand levels.
coupling the power of the information age with traditional business methods
Amazon Netflix Zappos
Project Objectives
Among the most important areas to define because they are essentially the major elements of the project. Must include metrics so the project's success can be measured (cost, schedule, quality). Criteria: Specific Measurable Agreed upon Realistic Time frame
identified visitor
An ID is available that allows a user to be tracked across multiple visits to a website
project manager
An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget
Project management office (PMO)
An internal department that oversees all organizational projects. This group must formalize and professionalize project management expertise and leadership. One of the primary initiatives of the PMO is to educate the organization on techniques and procedures necessary to run successful projects.
World Wide Web Consortium (W3C)
An international community that develops open standards for the Web.
The Five Forces Model -evaluating industry attractiveness
Analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry. -Its purpose is to combat these competitive forces by identifying opportunities, competitive advantages, and competitive intelligence. --> If the forces are strong, they increase competition; if the forces are weak, they decrease competition
Business Intelligence (BI)
Enables business users to receive data for analysis that is: Reliable Consistent Understandable Easily manipulated
Types of Application Software
Browser, Data management, Desktop publishing, Email, Groupware, Presentation graphics, Programming, Spreadsheet, Word processing Definitions found on Pg. 396
Solution for organizations today
Business Intelligence. Improving the quality of business decisions has a direct impact on costs and revenue.
The Three Generic Strategies—Choosing a Business Focus
Business strategies for entering a new market (1) broad cost leadership, (2) broad differentiation, (3) focused strategy -->Broad strategies reach a large market segment, while focused strategies target a niche or unique market with either cost leadership or differentiation **ADOPT ON 1 OF 3
Analyzing Airline industry using 5 forces
Buyer power: Buyer power is high because customers have many airlines to choose from and typically make purchases based on price, not carrier. Supplier power: Supplier power is high since there are limited plane and engine manufacturers to choose from, and unionized workforces (suppliers of labor) restrict airline profits. Threat of substitute products or services: The threat of substitute products is high from many transportation alternatives including automobiles, trains, and boats, and from transportation substitutes such as videoconferencing and virtual meetings. Threat of new entrants: The threat of new entrants is high because new airlines are continuously entering the market, including sky taxies offering low-cost on-demand air taxi service. Rivalry among existing competitors: Rivalry in the airline industry is high, and websites such as Travelocity.com force them to compete on price (see Figure 2.5).11
Network adapters are manufactured for...
CONNECTION, including: twisted-pair, coaxial cable, fiber-optic and wireless
If supplier power is high, the supplier can influence the industry by
Charging higher prices. Limiting quality or services. Shifting costs to industry participants. ex.Pharma industry
What an organization must do to maintain high-quality data in the data warehouse
Cleanse and scrub information
Wiki
Collaborative Web site that allows users to create, add, remove, and change content
Search Engine Optimization (SEO)
Combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking
Challenge- DEPRATMENTAL COMPANIES
Companies typically are organized in diff departments such as accounting, finacne, HR, Marketing, OM and Sales
Health care
Compare the demographics of patients with critical illnesses
Personal computer (microcomputer
Computer that is operated by a single user who can customize the functions to match personal preferences.
Desktop computer
Computer that sits on, next to, or under a user's desk and is too large to carry around. The computer box is where the CPU, RAM, and storage devices are held with a monitor on top, or a vertical system box (called a tower) usually placed on the floor within a work area.
Transactional information
Encompasses all information contained within a single business process/unit of work and its primary purpose is to support the performance of daily operational/structured decisions
RAD
Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process.
advantage of a data-drive website
Easy to manage content: Website owners can make changes without relying on MIS professionals; users can update a data-driven website with little or no training. Easy to store large amounts of data: Data-driven websites can keep large volumes of information organized. Website owners can use templates to implement changes for layouts, navigation, or website structure. This improves website reliability, scalability, and performance. Easy to eliminate human errors: Data-driven websites trap data-entry errors, eliminating inconsistencies while ensuring all information is entered correctly.
three advantages of a data-driven website
Easy to manage content: Website owners can make changes without relying on MIS professionals; users can update a data-driven website with little or no training. Easy to store large amounts of data: Data-driven websites can keep large volumes of information organized. Website owners can use templates to implement changes for layouts, navigation, or website structure. This improves website reliability, scalability, and performance. Easy to eliminate human errors: Data-driven websites trap data-entry errors, eliminating inconsistencies while ensuring all information is entered correctly.
**EVRY DEPATMENT SSTILL RELYS ON OTHER/ AN UNDERRTANDING OF OTHER DATA TO ANALKYZE OWN NEEDS
For the firm to be successful, all departments must work together as a single unit sharing common information and not operate independently or in a silo
RAD Fundamentals
Fundamentals of RAD include: Focus initially on creating a prototype that looks and acts like the desired system, Actively involve system users in the analysis, design, and development phases, Accelerate collecting the business requirements through an interactive and iterative construction approach.
Data Preparation Phase
Gather and organize the data in the correct formats and structures for analysis
Content provider
Generates revenues by providing digital content such as news, music, photos, or videos; Netflix.com, iTunes.com, CNN.com
Cyber-vigilantes
Include individuals who seek notoriety or want to make a social or political point such as WikiLeaks.
Supply Chain
Includes all parties involved, directly or indirectly, in obtaining raw materials or a products -companies are turning to systems that provide demand forecasting, inventory control, and information flows between suppliers and customers. *Today's supply chain is an intricate network of business partners linked through communication channels and relationships.
Ebusiness
Includes ecommerce along with all activities related to internal and external business operations
Advantages of Outsourcing
Increased quality/efficiency of business processes Reduced operating expenses for head count and exposure to risk for large capital investments Access to outsourcer's expertise, economies of scale, best practices, and advanced technologies Increased flexibility for faster response to market changes and less time to market for new products/services
Business Intelligence (BI)
Information collected from multiple sources such as suppliers, customers, competitors, partners and industries that analyzes patters, trends and relationships for strategic decision making -manipulates multiple variables and in some cases even hundreds of variables including such items as interest rates, weather conditions, and even gas prices -Used to anyalze internal and external data -->ex.BI can predict inventory requirements for Tony's business for the week before the Super Bowl if, say, the home team is playing, average temperature is above 80 degrees, and the stock market is performing well.
Nonsensitive PII
Information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc. Nonsensitive PII includes information that does not harm an individual such as an address.
Microsoft
Internet-based computing; operating system software; SQL and Access database software
Knowledge Management (KM)
Involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions
Customer Relationship Management (CRM)
Involves managing all aspects of a customers relationship with an organization to increase customer loyalty and retention and an organizations profitability -allows an organization to gain insights into customers' shopping and buying behaviors in order to develop and implement enterprise wide strategies ex. Kaiser Permanente
Egovernment
Involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government
consistent
Is aggregate or summary information in agreement with detailed information?
The SOlution
Management Information Sytems
Operations Management
Manages the process of converting or transforming or resources into goods or services.
Data Mart Examples
Marketing data mart, Inventory data mart, Exploring and mining
Internal databases
Marketing, sales, inventory, and billing
Goods
Material items or products that customers will buy to satusfy a want or need-TANGIBLE
Efficiency MIS Metrics
Measure the performance of MIS itself, such as throughput, transaction speed, and system availability. 1. Travel throughput 2. Transaction speed 3. System availability 4. Information accuracy 5. Response Time
Customer Satisfaction
Measured by satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer
Effectiveness MIS metrics
Measures the impact MIS has on business processes and activities, including customer satisfaction and customer conversation rates 1. Usability 2. Customer Satisfaction 3. Conversion Rates 4. Financial
Hewlett-Packard
Microprocessor-based computers; ink-jet printers
Tier 2
Midsize Business-Infor, Lawson, Epicor, Sage
IBM
Minicomputers; personal computers
gigahertz
One billion cycles per second
only one
One primary goal of a database is to eliminate information redundancy by recording each piece of information in only one place in the database.
unique visitor
One who can be recognized and counted only once within a given period of time
Charles Schwab
Online brokerage
The four primary reasons for low-quality information are:
Online customers intentionally enter inaccurate information to protect their privacy. Different systems have different information entry standards and formats. Data-entry personnel enter abbreviated information to save time or erroneous information by accident. Third-party and external information contains inconsistencies, inaccuracies, and errors.
Blog
Online journal that allows users to post their own comments, graphics, and video
Internal report
Presents data that are distributed inside the organization and intended for employees within an organization. Internal reports typically support day-to-day operations monitoring that supports managerial decision making.
CRM
Primary Users-Sales, Marketing, Customer Service. Primary Business Benefit-Sales forecast, sales strategies, marketing campaigns.
SCM Business Process 3
Products are distributed to customers and their downstream customers at all levels.
Web 2.0 (Business 2.0)
The next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free.
Project milestone
Represents key dates when a certain group of activities must be performed. For example, completing the planning phase might be a project milestone, If a project milestone is missed, then chances are the project is experiencing problems.
Chief Security Officer (CSO)
Responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers/viruses
Chief Technology Officer (CTO)
Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT
Loyalty Programs
Reward customers based on their spending. , for instance. Because of the rewards they receive (they are more likely to be loyal to or give most of their business to a single company -MIS keeps track of this -The airline industry is famous for its frequent-flyer programs
Sales and operational CRM technology
Sales management, contact management, opportunity management
Middleware
Several different types of software that sit between and provide connectivity for two or more software applications
Workstation computer
Similar to a desktop but has more powerful mathematical and graphics processing capabilities and can perform more complicated tasks in less time. Typically used for software development, web development, engineering, and ebusiness tools.
Tier 3
Small Business-Exact Globe, Syspro, NetSuite, Consona
Computer Categories
Smartphone/Personal digital assistant (PDA) Handheld/Ultra-Portable/Pocket Computer Laptop/Notebook/Portable Computer/Netbook Tablet Computer Personal/Desktop Computer Workstation /Minicomputer Mainframe computer Supercomputer Definitions found of Pg. 393
Worldwide database
The ability for databases to be distributed and accessed from anywhere
Business Intelligence (BI) Long description
The process is initiated by analyzing a global report, say of sales per quarter. Every answer is followed by a new question, and users can drill deep down into a report to get to fundamental causes.
Speech Analysis
The process of analyzing recorded calls to gather information; brings structure to customer interactions and exposes information buried in customer contact center interactions with an enterprise.
Project Planning
The process of detailed planning that generates answers to common operational questions. Ex: Who is responsible for performing tasks? How much does each task cost? How are issues being tracked? What risks are associated with each task?
visit depth
The total number of unique pages a visitor is exposed to during a single visit to a website.
URL shortening
The translation of a long URL into an abbreviated alternative that redirects to the longer URL.
Value Chain Analysis
To ID competitive advantages-which views a firm as a series of business processes that each add value to the product or service.
Sony
Transistor-based consumer electronics
In-sourcing (in-house development)
Uses professional expertise within an organization to develop a maintain its information technology systems. Helps create a viable supply of IT professionals and creating a better quality workforce by combining technical and business skills.
Scrum
Uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal. Under this methodology, each day ends or begins with a stand-up meeting to monitor and control the development effort.
behavioral analysis
Using data about people's behaviors to understand intent and predict future actions
Software Development Methodologies
Waterfall, Rapid Application Development (RAD), Extreme Programming (XP), Agile, Rational Unified Process (RUP), and Scrum.
Weak AI
Weak AI machines can still make their own decisions based on reasoning and past sets of data. Most of the AI systems in market today are weak AI.
Computers and Web sites on the Internet are linked through documents called...
Web pages written in HTML
Information is managed through Web sites on computers called...
Web servers
search engine
Website software that finds other pages based on keyword matching similar to Google
Social Media
Websites that rely on user participation and user-contributed content
Materials management can help a company answer the following concerns
What are our current inventory levels? What items are running low in the warehouse? What items are at risk of spoiling in the warehouse? How do we dispose of spoiled items? What laws need to be followed for storing hazardous materials? Which items must be refrigerated when being stored and transported? What are the requirements to store or transport fragile items?
Logistics can help a company answer the following questions:
What is the quickest way to deliver products to our customers? What is the optimal way to place items in the warehouse for picking and packing? What is the optimal path to an item in the warehouse? What path should the vehicles follow when delivering the goods? What areas or regions are the trucks covering?
Procurement can help a company answer the following questions:
What quantity of raw materials should we purchase to minimize spoilage? How can we guarantee that our raw materials meet production needs? At what price can we purchase materials to guarantee profitability? Can purchasing all products from a single vendor provide additional discounts?
data broker
a business that collects personal information about consumers and sells that information to other organizations
Click-and-Mortar Business
a business that operates in a physical store and on the Internet EX: Barnes & Noble
Brick-and-mortar business
a business that operates in a physical store without an internet presence; TJ Maxx
Pure-Play (Virtual) Business
a business that operates on the internet only without a physical store; ex. Google
Service-oriented architecture (SOA)
a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services
repository
a central location in which data is stored and managed.
Worldwide Interoperability for Microwave Access (WiMAX)
a communication technology aimed at providing high-speed wireless data over metropolitan area networks
Makerspaces
a community center that provides technology, manufacturing equipment, and educational opportunities to the public that would otherwise be inaccessible or unaffordable
Internet Service Provider (ISP)
a company that provides access to the internet for a monthly fee
Competitive click-fraud
a computer crime in which a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking the advertiser's link
Click-through
a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser
Primary Value Activities
acquire raw materials and manufacture, deliver, market, sell, and provide after-sales services. -Inbound logistics -Operations -Outbound logistics -Marketing and sales -Service:
mobile application management (MAM)
administers and delivers applications to corporate and personal smart phones and tablets
associate (affiliate) program
allows a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website
Collaborative engineering
allows an organization to reduce the cost and time required during the design process of a product
Voice over LTE (VoLTE)
allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls
Videoconference
allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards
integration
allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems.
relational database management system
allows users to create, read, update, and delete data in a relational database.
Social bookmarking
allows users to share, organize, search, and manage bookmarks
User-Interface Changes
an ERP system can be customized to ensure that each user has the most efficient and effective view of the application
solid state drive
an all-electric storage device that is an alternative to a hard disk and are faster than hard disks because there is zero latency(no read/write head to move).
data-driven decision management
an approach to business governance that values decisions that can be backed up with verifiable data
Genetic algorithm
an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem
RFID tag
an electronic identification device that is made up of a chip and antenna
Wired Equivalent Privacy (WEP)
an encryption algorithm designed to protect wireless transmission data
information properties
an ethical that focus on who owns information about individual and how information can be sold and exchanged
Optimization analysis
an extension of goal-seeking, finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints.
data point
an individual item on a graph or a chart
cyborg anthropologist
an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives.
Network Operating System (NOS)
an operating system that includes special functions for connecting computers and devices into a local area network
Evaluation Phase
analyze the trends and patterns to assess the potential for solving the business problem.
market basket analysis
analyzes such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services
Personally Identifiable Information (PII)
any data that can be used to identify, locate, or contact an individual
Peer-to-Peer Network (P2P)
any network without a central file server and in which all devices on the network have access to resources located on all other devices. Primarily used for sharing resources
Closed Source
any proprietary software licensed under exclusive legal right of the copyright holder
open source
any software whose source code is made available free for any third party to review and modify
Wireless
any type of operation accomplished without the use of a hard-wired connection
BPMN event
anything that happens during the course of a business process represented by a circle.
Social Network
application that connects people by matching profile information
Location-based services
applications that use location information to provide a service
data dictionary
compiles all of the metadata about the data elements in the data model
Secondary Storage
consists of equipment designed to store large volumes of data for long-term storage
Open System
consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate with the system
hardware
consists of the physical devices associated with a computer system.
system software
controls how the various technology tools work together along with the application software
operating system software
controls the application software and manages how the hardware devices work together.
Podcasting
converts an audio broadcast to a digital music player
Switching costs
costs that make customers reluctant to switch to another product or service. -->Switching costs include financial as well as intangible values -MIS, however, patients can store their medical records on DVDs or thumb drives, allowing easy transferability.
select four functions that a database management system can perform on data in a database?
create data update data read data delete data
Information technology's primary role in SCM
create integrations or tight process and information linkages between functions within a firm and between firms
Hitbots
create the illusion that a large number of potential customers are clicking the advertiser's links when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser.
critical success factors
crucial steps companies perform to achieve their goals and objectives and implement their strategies 1. create high quality products 2. retain competitive advantages 3. reduce product costs 4. increase customer satisfaction 5. hire and retain the best business professionals.
Integrations
data integration is key for business process support that spans functional areas and legacy systems
Quality management cost of Accurate and complete information
data points are information x-axis is information accuracy ranging from 0 to 100% y-axis is information completeness ranging from 0 to 100% cost of information has a positive, linear slope of 1
Problem Identification
define the problem as clearly and precisely as possible
business rules
defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer.
Communication plan
defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations
Network Effect
describes how products in a network increase in value to users as the number of users increases
data visualization
describes technologies that allow users to see or visualize data to transform information into a business perspective
project scope
describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project
Social Tagging
describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search
User Acceptance Testing (UAT)
determine if the system satisfies the user and business requirements
Supply chain design
determines how to structure a supply chain including the product, selection of partners, the location and capacity of warehouses, transportation methods, and supporting management information systems
Chief Automation Officer (CAO)
determines if a person or business process can be replaced by a robot/software
Break-even analysis
determines the volume of business required to make a profit at the current prices charged for the products or services
estimation analysis
determines values for an unknown continuous variable behavior or estimated future value
business-critical integrity constraints
enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints
business-critical integrity constraints
enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints.
Integration
ensuring that all software products, including disparate systems not part o the ERP system, are working together or are integrated.
brainstorming
establishes a high-level plan of the intended project and determines project goals
planning-phase
establishes a high-level plan of the intended project and determines project goals
Solution test
evaluate solutions in terms of feasibility (can it be completed?), suitability (is it a permanent or temporary fix?), and acceptability (can all participants form a consensus?)
script kiddies or script bunnies
find hacking code on the internet and clicking and point into system that damage there system
logical view of information
focuses on how individual users logically access information to meet their own particular business needs
Supplier Relationship Management (SRM)
focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects
Production Data
focuses on manufacturing and maintains production data -OM
Campaign Management systems
guide users through marketing campaigns by performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis
Production and materials management ERP components
handle the various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control
Personal information management (PIM) software
handles contact information, appointments, task lists, and email.
Materials management focuses on
handling all materials, safely, efficiently, and in compliance with regulatory requirements and disposal requirements
Firewall
hardware and/or software that guards a private network by analyzing incoming and outgoing information for the correct markings. If they are missing, the ___ prevents the information from entering the network. ___ can even detect computers communicating with the Internet without approval. ___ do not guarantee complete protection, and users should enlist additional security technologies such as antivirus software and anti spyware software.
Billing system
has "accounts payable" customer contact information
marketing and sales system
has "decision maker" customer contact information
4. Threat of New Entrants
high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market
wifi infrastructure
includes the inner workings of a wifi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a wifi signal
Workflow
includes the tasks, activities, and responsibilities required to execute each step in a business process
Data validation
includes the tests and evaluations used to determine compliance with data governance polices to ensure correctness of data.
malicious code
incluse a variety of threats such as viruses, worms and trojan horse
advantage of a Relational database
increased flexibility increase scalability and performance reduced information redundancy increase information integrity increase information security
Return on Investment (ROI)
indicates the earning power of a project
information levels
individual, department, enterprise
Enterprise Resource Planning (ERP)
integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make decisions by viewing enterprisewide information on all business operations. If one department implements new system, Correlating this data would be difficult, and the inconsistencies would cause numerous reporting errors from an enterprisewide perspective. **takes data from across the enterprise, consolidates and correlates the data, and generates enterprisewide organizational reports
management information systems (MIS)
is a business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making and problem solving
Management Information Systems (MIS)
is a business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making and problem solving. -incorporates systems thinking to help companies operate cross-functionally -If one part of the company is experiencing problems, however, then, the entire system fails *Does not equal or represent bsuiness success
big data
is a collection of large complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools
system
is a collection of parts that link to achieve a common purpose
network
is a communications, data exchange and resource sharing system created by linking two or more devices and establishing standards so they can all work together
Drive by hacking
is a computer attack by which an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
appliance
is a computer dedicated to a single function, such as a calculator or computer game.
Maker Movement
is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things.
variable
is a data characteristic that stands for a value that changes or varies over time
outlier
is a data value that is numerically distant from most of the other data points in a set of data
recommendation engin
is a data-mining algorithm that analyzes a customer's purchases and actions on a website and then uses the data to recommend complementary products
report
is a document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information
ransomware
is a form of malicious software that infects your computer and asks for money.
Fuzzy logic
is a mathematical method of handling imprecise or subjective information. Basic approach is to assign values b/w 0 and 1 to vague info. Zero represents info non included, 1 represents inclusion/membership. Ex: washing machines that determine how much water to use/how long to wash.
business unit
is a segment of a company (such as accounting, production, marketing) representing a specific business function
Control Object for Information and Related Technology (COBIT)
is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors.
cache memory
is a small unit of ultra-fast memory that is used to store recently accessed or frequently accessed data so that the CPU does not have to retrieve this data from slower memory circuits such as RAM.
satellite
is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area
Spyware
is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission. Spyware programs collect specific data about the user, ranging from general demographics such as name, address, and browsing habits to credit card numbers, Social Security numbers, and user names and passwords.
Flash memory
is a special type of rewritable read-only memory (ROM) that is compact and portable.
prediction
is a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover.
cluster analysis
is a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible.
Digital right management
is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
complete
is a value missing from the information ? is the address complete including street, city, state, and zip code ?
snapshot
is a view of data at a particular moment in time
systems thinking
is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part
computer
is an electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data.
patent
is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.
Web Real-Time Communications (WebRTC)
is an open source project that seeks to embed real-time voice, text, and video communications capabilities in web browsers.
Cyberwar
is an organized attempt by a country's military to disrupt or destroy information and communication systems for another country.
machine-generated data
is created by a machine without human intervention o includes sensor data, point-of-sale data, and web log data
information
is data converted into a meaning and useful context
human-generated data
is data that humans, in interaction with computers, generate o includes input data, click-stream data, or gaming data
War Driving
is deliberately searching for Wi-Fi signals while driving by in a vehicle
unique
is each transaction and event represented only once in the information ? ex; are there any duplicate customers?
input device
is equipment used to capture information and commands. A keyboard is used to type in information, and a mouse is used to point and click on buttons and icons.
output device
is equipment used to see, hear, or otherwise accept the results of information processing requests.
First-Mover advantage
occurs when a company can significantly increase its market share by being first with a new competitive advantage ex.FedEx created a first-mover advantage by developing its customer self-service software, which allows people to request parcel pickups, print mailing slips, and track parcels online
Product Differentiation
occurs when a company develops unique differences in its products or services with the intent to influence demand. -Companies can use differentiation to reduce rivalry
data gap analysis
occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where missing data might exist
paradigm shift
occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave
ERP-II
project management, knowledge management, workflow management, customer relationship management, human resource management, portal capability, integrated financials
RFID's Electronic Product Code (RFID EPC)
promotes serialization or the ability to track individual items by using the unique serial number associated with each RFID tag
Marketing and Sales
promotes, prices, and sells products to customers.
Encrypt data
protects confidential information from unauthorized eyes
Concentrators, hubs, and switches
provide a common physical connection point for computing devices
Customer Relationship management components
provide an integrated view of customer data and interactions allowing organizations to work effectively with customers and be more responsive to their needs -ex. contact centers, sales force automation, and marketing functions
Memory sticks
provide nonvolatile memory for a range of portable devices including computers, digital cameras, cell phones, and PDAs.
real-time system
provide real-time information in response to requests.
real-time system
provide real-time information in response to requests. Many organizations use real-time systems to uncover key corporate transactional information.
service providers
provide services such as photo sharing, video sharing, online backup and storage; ex. Youtube.com, Flickr.com
infomediaries
provide specialized information on behalf of producers of goods and services and their potential customers; ex. Edmunds.com, BizRate.com, Zillow.com
dual boot
provide the user with the option of choosing the operating system when the computer is turned on.
Transmission Control Protocol/Internet Protocol (TCP/IP)
provides the technical foundation for the public internet as well as for large numbers of private networks
Project Objectives
quantifiable criteria that must be met for the project to be considered a success
Process rework
redefine processes to ensure that the company is using the most efficient and effective processes
Volatility
refers to a device's ability to function with or without power
Downtime
refers to a period of time when a system is unavailable
twisted-pair cable
refers to a type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath
Programming language
refers to a unique set of keywords(words that it understands) along with a special syntax for organizing program instructions that execute computer comands.
Machine-to-machine (M2M)
refers to devices that connect directly to other devices
Ediscovery or electronic discovery
refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
cybermediation
refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness
Network transmission media
refers to the various types of media used to carry the signal between computers
Business Processes or Workflows
software can be customized to support the needs of business process workflows unique to each business or department
Project constraint
specific factors that can limit options, including budget, delivery dates, available skilled resources, and organizational policies
Hybrid Erp
splits the ERP functions between an on-premises ERP system and one or more functions handled as Software as a Service (SaaS) in the cloud
Operational business processes
static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes
Reintermediation
steps are added to the value chain as new players find ways to add value to the business process
Artificial intelligence
stimulates human thinking and behavior, such as the ability to reason and learn
entity
store information about a person, place, thing, transaction, or event.
relational database model
stores information in the form of logically related two-dimensional tables.
Cloud Computing
stores, manages, and processes data and applications over the internet rather than on a personal computer or server
Geographic Information System (GIS)
stores, views, and analyzes geographic data, creating multidimensional charts or maps
Supply chain design results in
superior supply chain capabilities and profits
Off-the-shelf application software
supports general business processes and does not require any specific software customization to meet the organization's needs
marketing
supports sales by planning, pricing, and promoting goods or services
Knowledge management system (KMS)
supports the capturing, organization, and dissemination of knowledge throughout an organization
Operational CRM
supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers
CRM and customer communication
system tracks every communication between the customer and the organization and provides access to CRM information within different systems from accounting to order fulfillment. -Understanding all customer communications allows the organization to communicate effectively with each customer.
Business-critical integrity constraints
tends to mirror the very rules by which an organization machines success
Unit Testing
test individual units or pieces of code for a system
Development testing
test the system to ensure it is bug-free
Testing
testing that all functionality works correctly along with testing all integrations
strutted query language (SQL)
that asks users to write lines of code to answer questions against a database.
Slice-and-Dice
the ability to look at information from different perspectives. - Open slice of info could display all product sales during a given promo, another could display a single product's sales for all promos.
supply chain visibility
the ability to view all areas up and down the supply chain in real time
Click fraud
the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser
information compliance
the act of confirming , acquiescing o yield information
Business process modeling (or mapping)
the activity of creating a detailed flowchart or process map of a work process, showing its inputs, tasks, and activities in a structured sequence.
Universal Resource Locator (URL)
the address of a file or resource on the web such as www.apple.com
Customer order cycle time
the agreed upon time between the purchase of a product and the delivery of the product
Throughput
the amount of info that can travel through a system at any point in time
Transaction speed
the amount of time a system takes to perform a transaction
Clickstream analytics
the process of collecting, analyzing, and reporting aggregate data about which pages a website visitor visits-and in what order.
requirements management
the process of managing changes to the business requirements throughout the project
data replication
the process of sharing information to ensure consistency between multiple data sources
Mutation
the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome
Market share
the proportion of the market that a firm captures
Open ID
the provision of an online identity that can be easily carried to a variety of devices (cell phones, PCs) allowing for easy authentication across different websites
Productivity
the rate at which goods and services are produced based upon total output given total inputs
Internal Rate of Return (IRR)
the rate at which the net present value of an investment equals zero
Cartography
the science and art of making an illustrated map or chart
Taxonomy
the scientific classification of organisms into groups based on similarities of structure or origin
Information Architecture
the set of ideas about how all information in a given context should be organized
bus width
the size of the internal electrical pathway along which signals are sent from one part of the computer to another. A wider bus can move more data, hence faster processing.
Business requirements
the specific business requests the system must meet to be successful
inventory cycle time
the time it takes to manufacture a product and deliver it to the retailer
response time
the time it takes to respond to user interactions such as a mouse click
Cycle time
the time required to process an order, is a common KPI for operations management
Sock puppet marketing
the use of a false identity to artificially stimulate demand for a product, brand, or service.
Intelligent applications
the use of agents, machine learning, and semantic web concepts to complete intelligent tasks for users
Robotic Process Automation (RPA)
the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks previously required a human to perform.
sign-off
the users' actual signatures indicating they approve all of the business requirements
Augmented reality
the viewing of the physical world with computer-generated layers of information added to it
Training
training all new users and creating the training user manuals
Operations
transforms raw materials or inputs into goods and services.
Wire media
transmission material manufactured so that signals will be confined to a narrow path and will behave predictably
Wired (Guided) Media
transmission material manufactured so that signals will be confined to a narrow path and will behave predictably
Databases today scale to exceptional levels, allowing all types of users and programs to perform information-processing and information-searching tasks.
true
Erp systems in the future will focus on
usability, ubiquity, accessibility, and mobility drawing
semi-passive RFID tags
use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader
A few details managers should consider surrounding people and information security policies include defining the best practices for:
-Applications allowed to be placed on the corporate network, especially various file sharing applications, IM software, and entertainment or freeware created by unknown sources -Corporate computer equipment used for personal reason on personal networks -Password creation and maintenance including minimum password length, characters to be included, and frequency for password changes -Personal computer equipment allowed to connect to the corporate network -Virus protection including how often the system should be scanned and how frequently the software should be updated.
3 reasons why organizations should develop written epolicies
-establish employee guidelines -establish organizational rules -establish employee procedures
Password Construction Guidelines
Require all employees to use password authentication to access their computers, the corporate network, and email.
Acceptable Use Policy (AUP)
Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet
Teergrubing
an anti-spamming approach by which the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam
threat
an act or object that poses a danger to assets
Insiders
are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business affecting incident. EX) Many individuals freely give up their passwords or write them on sticky notes next to their computers, leaving the door wide open for hackers.
Destructive agents
are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.
Tokens
are small electronic devices that change user passwords automatically. The user enters his or her user ID and token-displayed password to gain access to the network.
Information security policies
identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days EX) Acceptable Encryption Policy Clean Desk Policy Disaster Recovery Plan Policy Digital Signature Acceptance Policy Password Protection Policy Password Construction Guidelines Security Response Plan Policy
Digital Certificate
is a data file that identifies individuals or organizations online and is comparable to a digital signature.
Smart card
is a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing. ___ ___ can act as identification instruments, a form of digital cash, or a data storage device with the ability to store an entire medical record.
Pretexting
is a form of social engineering in which one individual lies to obtain confidential data about another individual
Zombie farm
is a group of computers on which a hacker has planted zombie programs.
Phishing expedition
is a masquerading attack that combines spam with spoofing. The perpetrator sends millions of spam emails that appear to be from a respectable company. The email contains a link to a website that is designed to look exactly like the company's website. The victim is encouraged to enter username, password, and sometimes credit card information.
Privilege escalation
is a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications.
Spear phishing
is a phishing expedition in which the emails are carefully designed to target a particular person or organization.
Vishing (voice phishing)
is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
Zombie
is a program that secretly takes over another computer for the purpose of launching attacks on other computers. ___ attacks are almost impossible to trace back to the attacker.
Voiceprint
is a set of measurable characteristics of a human voice that uniquely identifies an individual. These characteristics, which are based on the physical configuration bio-metric authentication such as voice prints can be costly and intrusive.
Password
is a string of alphanumeric characters used to authenticate a user and provide access to a system. The first type of authentication, usually something the user knows, is the most common way to identify individual users and typically consists of a unique user ID and password. However, this is actually one of the most ineffective ways for determining authentication because passwords are not secure. All it typically takes to crack one is enough time. More than 50 percent of help desk calls are password related, which can cost an organization significant money, and a social engineer can coax a password from almost anybody
Certificate Authority
is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates
Authorization
is the process of providing a user with permission including access levels and abilities such as file access, hours of access and amount of allocated storage space.
Dumpster Diving
or looking through people's trash, is another way hackers obtain information