CMIS 342 Exam 1 Study Guide

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Nice strategies for competitive advantage include:

1. Cost leadership 2. Differentiation 3. Innovation 4. Operational effectiveness 5. Customer-orientation

2 types of Privacy Codes and Policies

1. Opt-Out(company can collect personal info until requested otherwise) 2. Opt-In(company is prohibited from collecting unless requested otherwise)

Types of Security controls

1. Physical 2. Access 3. Communications(Network)

4 ethical issues related to Information

1. Privacy(collection) 2. Accuracy 3. Property(copying) 4. Accessibility (confidentiality)

What are the two categories of security threats?

1. Unintentional acts 2. Deliberate acts

4 approaches to ethical issues include:

1. Utilitarian 2. Rights 3. Fairness 4. Common Good

What are the three characteristics of big data?

1. Volume 2. Velocity 3. Variety Think three V's

An information system's ____ is the likelihood of incurring harm when a threat occurs. A. Vulnerability B. Risk C. Control D. Danger E. Compromise

A

Which of the following is NOT a role that information systems play in businesses processes? A. Establish Standards B. Execute the process C. Capture and store process data D. Monitor process performance E. Detect problems with the process

A

What are the five areas of business?

Accounting and Finance Sales and Marketing, HR, Production or Operations, IS

An ongoing collection of related activities that produce a product or service of value to the organization, its business partners, and/or its customers

Business process

Information is:

Data organized so that they have meaning and value to the recipient

Information Security is?

Defending information from unauthorized access, use, disclosure, disruption, modification or destruction

Support activities do what?

Do not add value directly to a firm's products and services, but support the primary activities.

What is Explicit Knowledge?

Documented, distributed knowledge. Think about a solution page that has been created to solve a problem. Ex. How to process a claim

Types of Information Systems:

Functional Area(FAIS), Enterprise Resource Planning(ERP),Transaction processing(TPS), Inter-organizational(IOS)

IT refers to:

Hardware/software

What is Big Data?

High volume data that requires new forms of processing to enable decision-making and discovery. Ex. social data, images from camera phones, medical scanners, security cams

IT Infrastructure consists of:

IT Platform and all of its components. Also IT services

IT may cause employees to experience a loss of?

Identity

Why do we care about big data?

It can reveal valuable patterns and information. It can spot trends to lead to better decisions and forecasting.

What is a business continuity plan? (Disaster recovery plan)

Keeps business operating when compromised. Can involve hot site, warm site, cold site, off-site data storage

Three external business pressures:

Market, Technology, Societal

IT may reduce the number of?

Middle Managers

Two ethical reference points in business environment:

Organizations's code of ethics Profession's code of ethics

What is tacit knowledge?

Personal, unstructured knowledge Think about how you would handle a situation with a customer. Ex. How to work effectively with a long-time customer

What are Transborder data flows?

Problems that stem from the absence of consistent standards for privacy and security among different countries Ex. EU has a stricter data-protection policy compared to that of the US

What are the steps of Risk management?

Risk analysis Risk mitigation controls evaluation

Define ethics:

Standards for judging what is right and wrong

What is unstructured data?

Think data that isn't all accounted for

What is a Knowledge Management System(KMS)?

a type of IS that moves beyond managing only the organization's explicit knowledge. Captures tacit knowledge from individual employees, to make available to other employees.

Competitive advantage:

an advantage over competitors(Costs,speed,quality) leads to control of a market and to larger-than-average profits

Common Good ethical approach is:

choice that maintains respect and compassion for all others

Utilitarian ethical approach is:

choice that provides the most good or least harm.

What is a threat?

danger to which information may be exposed

knowledge is:

data and/or information organized and processed to convey understanding, experience, accumulated learning and expertise as they apply to current problem or activity

Data is:

elementary description of things, events, activities and transactions that are recorded, classified and stored but are not organized to convey any specific meaning

What is exposure?

harm, loss or damage that can result

What is a risk?

likelihood that a threat will occur

What is vulnerability?

likelihood that the harm will occur if the threat happens

Unintentional acts of security threats are:

no malicious intent, human errors, environmental hazards

Information Systems involves:

people, process, and technology.

IT will provide managers with what kind of information? What effect does this have?

real-time or near-real-time information, meaning managers will have less time to make decisions

IT Services:

the use of IT components (the IT platform) by personnel to develop information systems, oversee security, and manage data. (Think People and processes)

Deliberate acts of security threats are:

theft, espionage or trespass, information extortion, sabotage or vandalism, identity theft, compromises to intellectual property, software attacks

Primary activities do what?

value for which customers are willing to pay

What are types of software attacks?

virus, worm, phishing attacks, Denial of service(DOS), Trojans, logic bomb, back door

IT Platform:

Consists of the IT Components: 1. Hardware 2. Software 3. Networks 4. Databases

Rights ethical approach is:

Chocie that best protects and respects rights of affected parties

Fairness ethical approach is:

Choice that best treats humans equally


Set pelajaran terkait

Geri NCLEX Questions from Presentations

View Set

Mod 9 Week 32 Quiz Review (Bible)

View Set

APHG Chapter 11 Test, APHG Unit 5 Test, Unit 6 APHG, Unit 7 APHG Political Geography

View Set

Quinto Grado: Ciencia Tabla Periódica

View Set

Unit 2: Quiz 3 - Completing The Square

View Set