MIS 3100 - Test 3 (Ch. 7-10)
***supply chain management (SCM)***
((inter-enterprise IS)) management of the flow of goods and services, involves moving raw materials, WIP inventory, or finished goods within a network
SM revenue models
1. ADS - used by most companies to earn revenue, use increases value (pay-per-click: advertisers pay for ads only when customers click on the ad) 2. FREEMIUM -offers basic service for free with paid upgrades (ad blocking software) - also: sale of apps & virtual goods, affiliate commissions, donations
cluster analysis (unsupervised data mining)
In ________, statistical techniques can identify groups of entities that have similar characteristics.
________ is a term that refers to the level of detail represented by the data.
Granularity
brute force attack
Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters.
REPORTING APP: RFM analysis
RECENCY, FREQUENCY, MONEY technique used to analyze and rank customers according to their purchase patterns considers: how recently a customer ordered, how frequently a customer ordered, and how much money the customer has spent a technique readily implemented with basic reporting operations
***SMIS Roles/Stakeholders***
THREE ROLES: * SM PROVIDERS - provide platforms that enable creation of social networks/relationships * USERS - individuals and organizations that use SM to build social relationships * COMMUNITIES - formed based on mutual interests and transcend geographical boundaries (second-tier users like classmates, coworkers, and friends of users)
social media
________ is the use of information technology to support the sharing of content among networks of users. The first step that any organization should take to manage the risk of employee communication is to develop and publicize a ________ policy.
conversion rate
________ measures the frequency that someone who clicks on an ad makes a purchase, "Likes" a site, or takes some other action desired by the advertiser.
user-generated content
________, which refers to the matter on a social media (SM) site that is contributed by users, is the essence of SM relationships.
malware
a broad category of software that includes viruses, spyware, and adware virus - computer program that replicates itself spyware - programs installed on a user's computer without knowledge or permission adware - installed without user's permission and resides in the background and observes user behavior
data marts
a data collection (smaller than data warehouse) that addresses the needs of a particular department or functional area of the business analogy: if warehouse is distributor in supply chain, mart is like a retail store in the chain
***enterprise resource planning (ERP)***
a suite of applications (modules), a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform primary purpose is integration!!!
enterprise application integration (EAI)
a suite of software applications that integrates existing systems by providing layers of software that connect applications together, enabling existing applications to communicate with each other and share data
sniffing
a technique for intercepting computer communications which requires a physical or wireless connection to the network
human errors
accidental problems caused by both employees and non-employees ex. misunderstanding of operating procedures, installing old databases on top of new ones
business process reengineering
activity of altering existing and designing new business processes to take advantage of new information systems difficult, slow, and expensive
***unsupervised data mining***
analysts do not create a model or hypothesis before running the analysis (experimental) they observe the results after analysts create a hypothesis after the analysis * CLUSTER ANALYSIS (statistical techniques can identify groups of entities that have similar characteristics; ex: Target identifies pregnant teen by matching purchases with other pregnant women)
data mining (knowledge discovery)
application of statistical techniques to find patterns and relationships among data for classification and prediction
hacking
breaking into computers, servers, or networks to steal proprietary and confidential data
Information systems improve process quality by ________.
controlling process flow
When an organization has inconsistent duplicated data, it is said to have a(n) ________.
data integrity problem
***supervised data mining***
data miners develop a model/hypothesis prior to the analysis and apply statistical techniques to data to estimate parameters of the model * REGRESSION ANALYSIS: measures the effect of a set of variables on another variable; EX: Cellphone/Weekend/Minutes
A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves.
data warehouse
crowdsourcing
dynamic social media process of employing users to participate in product design or redesign
The two dimensions of process quality are ________.
efficiency and effectiveness
workgroup processes
exists to enable workgroups to fulfill the charter, purpose, and goals of a particular group or department
data acquisition
first step in the BI process (by data warehouse) process of: obtain, cleanse, organize, relate, and catalog data OCORC
data warehouse
for larger orgs; a staff/group of people who manage an organization's business intelligence data functions: obtain, cleanse, organize, & catalog data
REPORTING APP: online analytical processing system (OLAP)
generic reporting application with the ability to sum, count, average, and perform simple arithmetic operations on groups of data DYNAMIC reports!!! measure: the data item of interest dimension: a characteristic of a measure
To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________.
industry-specific solutions
Business Intelligence Systems
information systems that process operational, social, and other data to identify patterns, relationships, and trends for use by business professionals and other knowledge workers
human safeguards
involve the people and procedure components of information systems result when authorized users follow appropriate procedures for system use and recovery (hiring/screening, termination, enforcement, defined job responsibilities)
A ________ is a string of bits used to encrypt data.
key
Success metrics are also known as ________.
key performance indicators (KPI)
In market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________.
lift
A data ________ is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business.
mart
***knowledge management (KM)***
process of creating, sharing, using, and managing the knowledge and information of an organization making the best use of organizational knowledge
enterprise processes
span an organization and support activities in multiple departments (EX: hospital discharge involves housekeeping, pharmacy, kitchen, nurses, etc.)
inter-enterprise processes
span two or more independent organizations (EX: buying a healthcare policy via a healthcare exchange involves many insurance co's and gov agencies; each org has activities to fulfill, with external influences like gov policies, laws, competition w other insurance co's) *** problem solutions affect multiple organizations
To an organization, the ________ is the likelihood that an entity in a relationship will do something that benefits the organization.
strength of the relationship
***customer relationship management (CRM)***
suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer from lead generation to customer service every contact and transaction with a customer is recorded in the system's database
In market-basket terminology, ________ describes the probability that two items will be purchased together.
support
enterprise information system
support one or more enterprise processes, typically have hundreds to thousands of users, procedures are formalized and extensively documented, eliminates data duplication; difficult to change ex. hospital
inter-enterprise information systems
support one or more inter-enterprise processes, involve thousands of users, solutions require cooperation among independent organizations ex. supply chain management
phishing (email spoofing)
technique for obtaining unauthorized data that uses pretexting via email phishers pretend to be legitimate companies requesting confidential data
social capital
the investment in social relations with the expectation of returns in the marketplace Number of Relationships × Relationship Strength × Entity's Resources
encryption
the process of transforming clear text into coded, unintelligible text for secure storage or communication
enterprise 2.0
use of emergent social software platforms within companies/use of enterprise social networks (blogs, updates, sharing, personal sites, etc)
According to Henk Flap, the ________ is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.
value of social capital
exists to support one or more processes within the workgroup; procedures are often formalized, somewhat difficult to change also called functional information systems ex. Doctor's office, medical practice (managing records, prescriptions, post-surgery, etc.)
workgroup (dept) information system
A ________ is a type of virus that self-propagates using the Internet or other computer network.
worm