Final Terms

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Waterfall

A sequence of phases in which the output of each phase becomes the input for the next. Waterfall is one of the oldest software development methods and has been around for over 30 years. Success rate is only 10 percent, or 1 in 10 with this approach.

Waterfall Methodology

A sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.

Joint Application Development (JAD)

A session where employees meet, sometimes for several days, to define or review the business requirements for the system.

mobile ticketing

purchase tickets for entertainment, transportation, and parking including the ability to automatically feed parking meters.

activities for which transactional information is created

purchasing stocks withdrawing cash from an ATM making airline reservation

data steward

responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business

single user license

restricts the use of the software to one user at a time.

file and data recovery

retrieves accidental deletion of photos or documents

affinity grouping analysis

reveals the relationship between variables along with the nature and frequency of the relationships

Pivot

rotates data to display alternative presentations of the data

online training

runs over the Internet or on a CD or DVD, and employees complete the training on their own time at their own pace

Extended ERp

scheduling, forecasting, capacity planning, ecommerce, warehousing, logistics

inadequate data usefulness

users could not get the data they needed; what was collected was not always useful for intended purposes

Automatic vehicle location (AVL)

uses GPS tracking to track vehicles

information privacy policy

which contains general principles regarding information privacy

Control Panel

which is a Windows feature that provides options that set default values for the Windows operating system.

client/server network

a model for applications in which the BULK of the back-end processing takes place on a server, while the front-end processing is handled by the clients

cookie

a small file deposited on a hard drive by a website containing information about customers and their web activities

Digital video disk-read/write (DVD-RW)

a standard for DVD discs and player/recorder mechanisms that enables users to record in the DVD format

Electronic Data Interchange (EDI)

a standard format for the electronic exchange of information between supply chain participants

integration

allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems.

relational database management system

allows users to create, read, update, and delete data in a relational database.

Social bookmarking

allows users to share, organize, search, and manage bookmarks

Ambient User Experience

ambient digital experience

User-Interface Changes

an ERP system can be customized to ensure that each user has the most efficient and effective view of the application

threat

an act or object that poses a danger to assets

solid state drive

an all-electric storage device that is an alternative to a hard disk and are faster than hard disks because there is zero latency(no read/write head to move).

Teergrubing

an anti-spamming approach by which the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

data-driven decision management

an approach to business governance that values decisions that can be backed up with verifiable data

Genetic algorithm

an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem

RFID tag

an electronic identification device that is made up of a chip and antenna

Wired Equivalent Privacy (WEP)

an encryption algorithm designed to protect wireless transmission data

cyborg anthropologist

an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives.

Router

an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination

data-drive website

an interactive website kept constantly updated and relevant to the needs of its customers using a database

SOA service

being simply a business task, such as checking a potential customer's credit rating when opening a new account.

Business 2.0 Communication and Collaboration Tools

blog, wiki, mashup

discovery prototyping

builds a small-scale representation or working model of the system to ensure it meets the user and business requirements

Information technology's primary role in SCM

create integrations or tight process and information linkages between functions within a firm and between firms

Critical Success Factors (CSFs)

crucial steps companies perform to achieve their goals and objectives and implement their strategies

data visualization

describes technologies that allow users to see or visualize data to transform information into a business perspective

project scope

describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project

Hotspots

designated locations where Wi-Fi access points are publicly available

Solution generation

detail every solution possible, including ideas that seem farfetched

test conditions

detail the steps the system must perform along with the expected result of each step

Information security plan

details how an organization will implement the information security policies. The best way a company can safeguard itself from people is by implementing and communicating its information security plan.

User Acceptance Testing (UAT)

determine if the system satisfies the user and business requirements

Business impact of population increase

food/agriculture, longer careers, increased immigration limits in developed nations

Global impacts

foreign language training, less cost of doing business, small companies competing with big ones

timely

is the information current with respect to business need ex; is information update weekly, daily, or hourly

copyright

is the legal protection afforded an expression of an idea, such as a song, book, or video game.

content creator

is the person responsible for creating the original website content.

data profiling

is the process of collecting statistics and information about data in an existing source.

anomaly detection

is the process of identifying rare or unexpected items or events in a data set that do not conform to other items in the data set.

primary key

key id a field (or group fields) that uniquely identifies a given record in a table

swim lane

layout arranges the steps of a business process into a set of rows depicting the various elements

Large org in 2020 vs 1990

less than half of management levels and 1/3 of managers

Reduced instruction set computer (RISC) chip

limit the number of instructions the CPU can execute to increase processing speed.

GIS map automation

links business assets to a centralized system where they can be tracked and monitored over time

multiple-in/multiple-out (MIMO) technology

have multiple transmitters and receivers, allowing them to send and receive greater amounts of data than traditional networking devices

activist

have philosophy and political reason for breaking in to system

active RFID tags

have their own transmitter and a power source (typically a battery)

On-premise systems

include a server at a physical location using an internal network for internal access and firewalls for remote users' access

dynamic inforation

includes data that change based on user actions.

Workflow

includes the tasks, activities, and responsibilities required to execute each step in a business process

Data validation

includes the tests and evaluations used to determine compliance with data governance polices to ensure correctness of data.

first generation

machine language difficult for people to understand

database

maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).

human resources

maintains policies, plans, and procedures for the effective management of employees

Operationalized analytics

makes analytics part of a business process.

preventive maintenance

makes system changes to reduce the chance of future system failure

Corrective Maintenance

makes system changes to repair design flaws, coding errors, or implementation issues

accounting and finance ERP components

manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management

Mobile Banking

manage accounts, pay bills, receive alerts and transfer funds

Maker Movement

is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things.

variable

is a data characteristic that stands for a value that changes or varies over time

Digital Certificate

is a data file that identifies individuals or organizations online and is comparable to a digital signature.

outlier

is a data value that is numerically distant from most of the other data points in a set of data

recommendation engin

is a data-mining algorithm that analyzes a customer's purchases and actions on a website and then uses the data to recommend complementary products

Smart card

is a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing. ___ ___ can act as identification instruments, a form of digital cash, or a data storage device with the ability to store an entire medical record.

report

is a document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information

Authentication

is a method for confirming users' identities. Once a system determines the authentication of a user, it can then determine the access privileges for that user

operations management

manages the process of converting or transforming resources into goods or services

Elogistics

manages the transportation and storage of goods

Online analytical processing (OLAP)

manipulation of information to create business intelligence in support of strategic decision making

B2B examples

medical billing service, software sales and licensing, virtual assistant business

asychronous communication

message and response do not occur at the same time

RFID tag

microchip holds data, a set of numbers unique to an item. The rest of the tag is an antenna that transmits data to a reader

Reasons for information cleansing

missing records or attributes redundant records missing keys or other required data erroneous relationships or references inaccurate data

fast data

is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value.

cube

is the common term for the representation of multidimensional information.

website personalization

occurs when a website has stored enough data about a person's likes and dislikes to fashion offers more likely to appeal to that person

Bullwhip effect

occurs when distorted product-demand information ripples from one partner to the next throughout the supply chain

information silo

occurs when one business unit is unable to freely communicate with other business units making it difficult or impossible for organizations to work cross-functionally

Dial-up access

on demand access using a modem and regular telephone line (POT).

Customer-facing processes (fRONT OFFICE PROCESSES)

r esult in a product or service received by an organization's external customer. -fulfilling orders, -communicating with customers, -sending out bills and marketing information -Processing

E-policies

policies and procedures that address information management along with the ethical use of computers and the internet in the business environment

Bring Your Own Device (BYOD)

policy allows employees to use their personal mobile devices and computers to access enterprise data and applications

Post-implementation report

presents a formal report or audit of a project after it is up and running

detailed internal report

presents information with little or no filtering or restrictions of the data

fifth generation

programming languages for artificial intelligence and neural networks

Fourth Generation

programming languages that look similar to human languages

fourth generation languages(4GL)

programming languages that look similar to human languages

RFID's Electronic Product Code (RFID EPC)

promotes serialization or the ability to track individual items by using the unique serial number associated with each RFID tag

Marketing and Sales

promotes, prices, and sells products to customers.

Encrypt data

protects confidential information from unauthorized eyes

Concentrators, hubs, and switches

provide a common physical connection point for computing devices

service providers

provide services such as photo sharing, video sharing, online backup and storage; ex. Youtube.com, Flickr.com

dual boot

provide the user with the option of choosing the operating system when the computer is turned on.

cradle to grave

provides logistics support throughout the entire system or life of the product

Transmission Control Protocol/Internet Protocol (TCP/IP)

provides the technical foundation for the public internet as well as for large numbers of private networks

white - hat hacker

work at the request of the system owner to fine system venerability

system clock

works like a wristwatch and uses a battery mounted on the motherboard to provide power when the computer is turned off.

Feasibility

The measure of tangible and intangible benefits of an information system.

Sales Force Automation (SFA)

automatically tracks all the steps in the sales process

select four functions that a database management system can perform on data in a database?

create data update data read data delete data

Business-critical integrity constraints

tends to mirror the very rules by which an organization machines success

Unit Testing

test individual units or pieces of code for a system

% of American management personnel are knowledge workers

90%

accurat

>is there an incorrect in the information ? >example : is the name spelled correctly ? is the dollar amount recorded properly ?

Information Architecture

the set of ideas about how all information in a given context should be organized

Network adapters are manufactured for...

CONNECTION, including: twisted-pair, coaxial cable, fiber-optic and wireless

Raw Visit Depth

total number of pages a visitor is exposed to during a single visit to a website

Cross-selling and up-selling

Cross-selling - selling additional products or services Up-selling - increasing the value of the sale

**EVRY DEPATMENT SSTILL RELYS ON OTHER/ AN UNDERRTANDING OF OTHER DATA TO ANALKYZE OWN NEEDS

For the firm to be successful, all departments must work together as a single unit sharing common information and not operate independently or in a silo

Cable

The medium to connect all of the computers.

Authentication and authorization techniques fall into 3 categories:

The most secure procedures combine all 3: 1. Something the user knows, such as User ID and password 2. Something the user has, such as a smart card or token 3. Something that is part of the user, such as a fingerprint or voice signature

CRM Reporting Technologies

Help organizations identify their customers across other applications -->Customer ID-aSKING WHAT AHPPENED -What is the total rev by cistomer? -How many units did we make? -What were the total sales by teh product?

third generation

High-level programming languages, such as C+ and Java

exception reporting

Highlights situations occurring outside of the normal operating range for a condition or standard

Estimated time of arrival (ETA)

The time of day of an expected arrival at a certain destination and is typically used for navigation applications

Estimated time enroute (ETE)

The time remaining before reaching a destination using the present speed and is typically used for navigation applications

visit depth

The total number of unique pages a visitor is exposed to during a single visit to a website.

URL shortening

The translation of a long URL into an abbreviated alternative that redirects to the longer URL.

Financial Savings (A reason for outsourcing.)

It is far cheaper to hire people in China and India than pay the required salaries for similar labor in the United States.

tacit knowledge

Knowledge contained in people's heads

Tier 1

Large Enterprise-Sap, Oracle, Microsoft

Broad market and low cost

*COST LEADERSHIP Walmart competes by offering a broad range of products at low prices. Its business strategy is to be the low-cost provider of goods for the cost-conscious consumer.

Dick Faris CTO Primavera

"Agile programming is very different and new. It is a different feel to the way programming happens. Instead of mindlessly cranking out code, the process is one of team dialogue, negotiation around priorities and time and talents. The entire company commits to a 30-day sprint and delivery of finished, tested software. Maybe it is just one specific piece of functionality but it's the real thing, including delivery and client review against needs and requirements. Those needs and requirements, by the way, change. That is the strength we saw in the Scrum process."

The network industry refers to. most types of networks as...

"area networks"

type of system software

- operating system software -utility software

All of today's technical knowledge will represent only __________ percent of the knowledge that will be available in 2050.

1

Gigabyte (GB)

1 billion bytes

Terabyte (TB)

1 trillion bytes

terabyte (TB)

1 trillion bytes

3 laws of robotics

1. A robot may not injure a human being or, through inaction, allow a human being to come to harm. 2. A robot must obey orders given it by human beings except where such orders would conflict with the First Law. 3. A robot must protect its own existence as long as such protection does not conflict with the First or Second Law.

3 most common core ERP components

1. Accounting and finance 2. Production and materials management 3. Human resource

What does a employee monitoring policy contain?

1. Always enforce the policy the same for everyone 2. State the consequences of violating the policy

Networks are differentiated by the following:

1. Architecture - peer-to-peer, client/server 2. Topology - bus, star, ring, hybrid, wireless (Pg. 420) 3. Protocols - Ethernet, Transmission Control Protocol/Internet Protocol (TCP/IP) 4. Media - coaxial, twisted-pair, fiber-optic, wireless

Two types of Media

1. Wired (Guided) 2. Wireless. (Unguided)

Bluetooth

Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices

Geocache

A GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find

Service

A business task

Semantic Web

A component of Web 3.0 that describes things in a way that computers can understand

proxy server

A computer system that functions as a relay between CLIENT and SERVER. It helps prevent an attacker from invading a private network and is one of several tools used to build a firewall. A proxy server acts on behalf of the user

Server

A computer that is dedicated to providing information in response to external requests

PERT (Program Evaluation and Review Technique) chart

A diagram used in project planning. A graphical network model that depicts a project's tasks and the relationship between them.

Gantt chart

A diagram used in project planning. A simple bar chart that lists project tasks vertically against the project's time frame, which is listed horizontally. Useful when it comes to representing the project's schedule. Shows actual progress.

Competittive Advantage

A feature of a product or service on which customers place a greater value than they do similar offerings from competitiors -provide the same product or service either at a lower price or with additional value that can fetch premium prices **TYPICALLY TEMPORARY- Competitiors often quickly seek new ways to duplicate them

Agile Methodology

A form of XP, aims for customer satisfaction through early and continuous delivery of useful software components.

Project Plan

A formal, approved document that manages and controls project execution

Project Plan

A formal, approved document that manages and controls project execution. Includes: a description of the project scope, list of activities, schedule, time estimates, cost estimates, risk factors, resources, assignments, responsibilities, contingency plans, review and communication strategies, and a kill switch.

Agile Alliance

A group of software developers whose mission is to improve software development processes and includes: Satisfy the customer through early and continuous delivery of valuable software, Welcome changing requirements, even late in development, Business people and developers must work together daily throughout the project, Build projects around motivated individuals, The best architectures, requirements, and designs emerge from self-organizing teams, At regular intervals, the team reflects on how to become more effective, then tunes and adjusts its behavior accordingly.

Wireless Fidelity (Wi-Fi)

A means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves

Wireless LAN (WLAN)

A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet

Website bookmark

A locally stored URL or the address of a file or Internet page saved as a shortcut

Streaming

A method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.

Wireless MAN (WMAN)

A metropolitan area network that uses radio signals to transmit and receive data

Disruptive technology

A new way of doing things that initially does not meet the needs of existing customers

ebusiness model

A plan that details how a company creates, delivers, and generates revenues on the internet

benchmarking

A process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance

3D printing

A process that builds—layer by layer in an additive process—a three-dimensional solid object from a digital model. -supports procurement

Extraction, transformation, and loading (ETL)

A process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse

Information cleansing or scrubbing

A process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information

Hits

A request for a file made by web browsers and search engines. Each element of a requested page is recorded by the website's server log file

Geocoin

A round coin-sized object uniquely numbered and hidden in geocache

Global Positioning System (GPS)

A satellite-based navigation system providing extremely accurate position, time, and speed information

RAD (Prototype)

A smaller-scale representation or working model of the users' requirements or a proposed design for an information system. The prototype is an essential part of the analysis phase when using a RAD methodology.

regression model

A statistical process for estimating the relationships among variables. Regression models include many techniques for modeling and analyzing several variables when the focus is on the relationship between a dependent variable and one or more independent variables.

optimization model

A statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste.

viral marketing

A technique that induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect

Project

A temporary activity a company undertakes to create a unique product, service, or result

RFID reader (RFID interrogator)

A transmitter/receiver that reads the contents of RFID tags in the area

Kill Switch

A trigger that enables a project manager to close the project before completion.

Heat map

A two-dimensional representation of data in which values are represented by colors.

Machine learning

A type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn.

Nearshore Outsourcing

A type of outsourcing. Contacting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country.

Onshore Outsourcing

A type of outsourcing. Engaging another company within the same country for services.

Offshore Outsourcing

A type of outsourcing. Using organizations from developing countries to write code and develop systems. Geographically far away.

Opt in

A user can opt in to receive emails by choosing to allow permissions to incoming emails

Systems Thinking

A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part -provides an end-to-end view of how operations work together to create a product or service

Core Competencies (A reason for outsourcing.)

A way to acquire best-practices and the business process expertise of highly skilled technical resources for a low cost. Technology is advancing too quickly for certain companies to keep up on their own.

Wireless WAN (WWAN)

A wide area network that uses radio signals to transmit and receive data

Neural networks

AKA artificial neural network, a category of AI that attempts to emulate the way the brain works.

Wireless (LMCS)

Access is gained by connection to a high-speed cellular-like local multipoint communications system (LMCS) network via wireless transmitter/receiver.

cloud computing advantages

Accessibility Cost Saving Flexibility Reliability Portability Capacity on Demand Backup/Recovery Scalability Availability

mobile sales/marketing

Advertising, campaigns, discounts, promotions and coupons

Model

a simplified representation or abstraction of reality

coupling the power of the information age with traditional business methods

Amazon Netflix Zappos

identified visitor

An ID is available that allows a user to be tracked across multiple visits to a website

Outsourcing

An arrangement by which one organization provides a service or services for another organization that choose not to perform them in-house.

project manager

An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget

Data Understanding Phase

Analysis of all current data along with identifying any data quality issues

Marketing

Analyze customer demographics.

Airlines

Analyze popular vacation locations with current flight listings.

Social Media Analysis

Analyzes text flowing across the Internet, including unstructured text from blogs and messages.

Web Analysis

Analyzes unstructured data associated with websites to identify consumer behavior and website navigation.

Information systems audit report

Assesses a company's information system to determine necessary changes and to help ensure the information system's availability, confidentiality, and integrity.

Vertical privilege escalation

Attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data.

Horizontal privilege escalation

Attackers grant themselves the same access levels they already have but assume the identity of another user. For example, someone gaining access to another person's online banking account would constitute horizontal privilege escalation.

Solution for organizations today

Business Intelligence. Improving the quality of business decisions has a direct impact on costs and revenue.

If supplier power is high, the supplier can influence the industry by

Charging higher prices. Limiting quality or services. Shifting costs to industry participants. ex.Pharma industry

What an organization must do to maintain high-quality data in the data warehouse

Cleanse and scrub information

The World Wide Web (www) is a...

Client Server environment

Accessing web sites is done through the use of...

Client software Ex: a browser- Google

Wireless Topology

Devices are connected by a receiver/transmitter to a special network interface card that transmits signals between a computer and a server, all within an acceptable transmission range

Collective Intelligence

Collaborating and tapping into the core knowledge of all employees, partners, and customers

Wiki

Collaborative Web site that allows users to create, add, remove, and change content

Search Engine Optimization (SEO)

Combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking

Personal computer (microcomputer

Computer that is operated by a single user who can customize the functions to match personal preferences.

Desktop computer

Computer that sits on, next to, or under a user's desk and is too large to carry around. The computer box is where the CPU, RAM, and storage devices are held with a monitor on top, or a vertical system box (called a tower) usually placed on the floor within a work area.

tablet computer

Computer with a flat screen that uses a mouse or fingertip for input instead of a keyboard. Similar to PDAs, tablet PCs use a writing pen or stylus to write notes on the screen and touch the screen to perform functions such as clicking on a link while visiting a website.

CAD/CAM

Computer-Aided Design/Computer-Aided Manufacturing; systems used to create the digital designs and then manufacture the products

Information

Data converted into a meaningful and useful context- its value is only as good as the people who use it -depending on how they interpret or analyze the information

Problem facing organizations today

Data rich, information poor. Many organizations find themselves in the position of being data rich and information poor. Even in today's electronic world, managers struggle with the challenge of turning their business data into business intelligence.

Oracle

Database software

Finacne

Deals with strategic financial issues including money, banking, credit, investments, and assets

Source documents

Describes the original transaction record along with details such as its date, purpose, and amount spent and includes cash receipts, canceled checks, invoices, customer refunds, employee time sheet, etc.

Mainframe computer

Designed to meet the computing needs of hundreds of people in a large business environment. Mainframe computers are a step up in size, power, capability, and cost from minicomputers.

Minicomputer (server)

Designed to meet the computing needs of several people simultaneously in a small to medium-size business environment. A common type of minicomputer is a server and is used for managing internal company applications, networks, and websites.

Intangible Benefits

Difficult to quantify/measure. Ex: Improved decision making, improved community service, improved morale, and improved goodwill

information formats

Document, presentation, spreadsheet, database

advantage of a data-drive website

Easy to manage content: Website owners can make changes without relying on MIS professionals; users can update a data-driven website with little or no training. Easy to store large amounts of data: Data-driven websites can keep large volumes of information organized. Website owners can use templates to implement changes for layouts, navigation, or website structure. This improves website reliability, scalability, and performance. Easy to eliminate human errors: Data-driven websites trap data-entry errors, eliminating inconsistencies while ensuring all information is entered correctly.

design phase

Establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation

Standardizing Customer name from Operational Systems

Example of extracting customer name from multiple databases and uploading most likely name onto customer information database

3 Primary types of MIS decision-making systems

Executive info systems, decision support systems, transaction processing system

1990's

Executives became less concerned with the day-to-day business operations and more concerned with overall business functions

Data Warehouses

Extend the transformation of data into information. Provide the ability to support decision making without disrupting the day-to-day operations.

Hybrid Topology

Groups of star-configured workstations are connected to a linear bus backbone cable, combining the characteristics of the bus and star topologies

Social Engineering

Hackers use their social skills to trick people into revealing access credentials or other valuable information

Exploratory Data Analysis

Identifies patterns in data, including outliers, uncovering the underlying structure to understand relationships between the variables.

Knowledge Workers

Individuals valued for their ability to interpret and analyze information -Use BI along with personal experience to make decision based on info and intuition

Benefits of business process

Improvement varies, but a rough rule of thumb is that it will, at minimum, double the gains of a project by streamlining outdated practices, enhancing efficiency, promoting compliance and standardization, and making an organization more agile

Cyber-vigilantes

Include individuals who seek notoriety or want to make a social or political point such as WikiLeaks.

ERP Intergration Data Flow

Info flowing between purchasing, accounting and finance, human resources, inventory, manufacturing, and marketing and sales

Nonsensitive PII

Information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc. Nonsensitive PII includes information that does not harm an individual such as an address.

Microsoft

Internet-based computing; operating system software; SQL and Access database software

Knowledge Management (KM)

Involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions

Customer Relationship Management (CRM)

Involves managing all aspects of a customers relationship with an organization to increase customer loyalty and retention and an organizations profitability -allows an organization to gain insights into customers' shopping and buying behaviors in order to develop and implement enterprise wide strategies ex. Kaiser Permanente

consistent

Is aggregate or summary information in agreement with detailed information?

Operating System Software

Linux, Mac OS X. Android Operating System, Microsoft Windows, MS-DOS, UNIX Definitions on Pg. 394

Intel

Low-end microprocessors

HR

Maintains policies, plans, and procedures for the effective management of employees

The SOlution

Management Information Sytems

Operations Management

Manages the process of converting or transforming or resources into goods or services.

Data Mart Examples

Marketing data mart, Inventory data mart, Exploring and mining

Internal databases

Marketing, sales, inventory, and billing

Goods

Material items or products that customers will buy to satusfy a want or need-TANGIBLE

Efficiency MIS Metrics

Measure the performance of MIS itself, such as throughput, transaction speed, and system availability. 1. Travel throughput 2. Transaction speed 3. System availability 4. Information accuracy 5. Response Time

Customer Satisfaction

Measured by satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer

Tier 2

Midsize Business-Infor, Lawson, Epicor, Sage

Cross Functional/ departmental

Most processes, such as ordering a product, that span throuhout the entire organization -"Order to delivery"--> focuses on the entire customer order process across functional departments -"product realization," -->which includes not only the way a product is developed, but also the way it is marketed and serviced

Primavera Systems, Inc.

Moved from waterfall to agile. Scrum's insistence on delivering complete increments of business value in 30-day learning cycles helped the teams learn rapidly. Scrum forced teams to test and integrate experiments and encouraged them to release them into production.

wireless media

Natural parts of the Earth's environment that can be used as physical paths to carry electrical signals

redundancy

Occurs when a task or activity is unnecessarily repeated

only one

One primary goal of a database is to eliminate information redundancy by recording each piece of information in only one place in the database.

unique visitor

One who can be recognized and counted only once within a given period of time

Charles Schwab

Online brokerage

Blog

Online journal that allows users to post their own comments, graphics, and video

Sales

Performs the function of selling goods or services

Automated Input devices

Pg. 390

Manual Input devices

Pg. 390

Monitors and Printers (Common output devices

Pg. 391

Insurance

Predict claim amounts and medical coverage costs.

World Wide Web

Provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML

Service

Provides customer support after the sale of goods and services.

Intuit

QuickBooks software; TurboTax; Quicken software

RFID in the Retail Supply Chain

RFID tags are added to every product and shipping box. At every step of an item's journey, a reader scans one of the tags and updates the information on the server. Manufacturer, distribution center, store, home

RUP

RUP is an iterative methodology, the user can reject the product and force the developers to go back to gate one. Approximately 500,000 developers have used RUP in software projects of varying sizes in the 20 years it's been available, according to IBM. RUP helps developers avoid reinventing the wheel and focuses on rapidly adding or removing reusable chunks of processes addressing common problems.

Accounting

Records, measures, and reports monetary transactions.

network topology

Refers to the geometric arrangement of the actual physical organization of the computers and other network devices) in a network

Dependency

Relates to a PERT chart. A logical relationship that exists between the project tasks, or between a project task and a milestone.

Critical Path

Relates to a PERT chart. Estimates the shortest path through the project ensuring all critical tasks are completed from start to finish.

Latitude

Represents a north/south measurement of position

Longitude

Represents an east/west measurement of position

Project milestone

Represents key dates when a certain group of activities must be performed. For example, completing the planning phase might be a project milestone, If a project milestone is missed, then chances are the project is experiencing problems.

ERP Process Flow

Sales -->Warehouse-->Accounting-->Receiving

Wide Area Network (WAN)

Spans a large geographic area such as a state, province, or country

Intelligent agent

Special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users

Tags

Specific keywords or phrases incorporated into website content for means of classification or taxonomy

Strong AI

Strong refers to the field of artificial intelligence that works toward providing brain like powers to AI machines; in effect, it works to make machines as intelligent as humans.

Marketing

Supports sales by planning, pricing, and promoting goods or services.

Worldwide database

The ability for databases to be distributed and accessed from anywhere

mass customization

The ability of an organization to tailor its products or services to the customers' specifications

1. Buyer Power

The ability of buyers to affect the price they must pay for an item. -->If buyer power is high, customers can force a company and its competitors to compete on price, which typically drives prices down.

Mobile Business

The ability to purchase goods and services through a wireless Internet-enabled device

integration of legacy devices

The ability to use current devices such as Iphones, laptops, and so on, as credit cards, tickets and reservations tools

Business Process Reeingineering (BPR)

The analysis and redesign of workflow within and between enterprises -must continue to evaluate processes in its value chain to improve efficiency adn effectivemenss -focus on those core processes that are critical to performance *Creating value for the customer is the leading reason for instituting BPR

Waterfall Methodology (Problems)

The biggest problem with the waterfall methodology is that it assumes users can specify all business requirements in advance. It also assumes that business requirements do not change over time. If you find yourself on a software development project using the waterfall methodology you should do everything you can to change the methodology.

Pattern Recognition Analysis

The classification or labeling of an identified pattern in the machine learning process.

Fact

The confirmation or validation of an event or object

Executive sponsor

The person or group who provides the financial resources for the project

Sony

Transistor-based consumer electronics

The second type of authentication

Tokens and smart cards are two primary forms of this more effective way to identify individuals

Law Enforcement

Track crime patterns, locations, and criminal behavior.

Economic Feasibility

Type of feasibility. Measures the cost-effectiveness of a project.

Banking

Understand customer credit card usage and nonpayment rates.

There are two kinds of privilege escalation:

Vertical and Horizontal privilege escalation

Software Development Methodologies

Waterfall, Rapid Application Development (RAD), Extreme Programming (XP), Agile, Rational Unified Process (RUP), and Scrum.

Weak AI

Weak AI machines can still make their own decisions based on reasoning and past sets of data. Most of the AI systems in market today are weak AI.

Computers and Web sites on the Internet are linked through documents called...

Web pages written in HTML

Information is managed through Web sites on computers called...

Web servers

search engine

Website software that finds other pages based on keyword matching similar to Google

Social Media

Websites that rely on user participation and user-contributed content

Materials management can help a company answer the following concerns

What are our current inventory levels? What items are running low in the warehouse? What items are at risk of spoiling in the warehouse? How do we dispose of spoiled items? What laws need to be followed for storing hazardous materials? Which items must be refrigerated when being stored and transported? What are the requirements to store or transport fragile items?

information governance

a method system of government for information management or control

Tough Questions BI can answer

Why are sales below target? Because we sold less in the Western region Why did we sell less in the Western region? Because sales of product X dropped Why did sales of product X drop? Because customer complaints increased Why did customer complaints increase? Because late deliveries went up 60%

Wiki examples

Wikipedia, LexisNexis

Mashup examples

Zillow, Infopedia, Trendsmap

digital video disc (DVD)

a CD-ROM format capable of storing up to a maximum of 17 GB of data; enough for a full-length feature movie.

data broker

a business that collects personal information about consumers and sells that information to other organizations

Click-and-Mortar Business

a business that operates in a physical store and on the Internet EX: Barnes & Noble

Brick-and-mortar business

a business that operates in a physical store without an internet presence; TJ Maxx

Pure-Play (Virtual) Business

a business that operates on the internet only without a physical store; ex. Google

Service-oriented architecture (SOA)

a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services

repository

a central location in which data is stored and managed.

Prototyping

a modern design approach where the designers and system users use an iterative approach to building the system

Firewall

a part of a computer system or network that is designed to BLOCK unauthorized access while PERMITTING outward communication.

Customer service and support (CSS)

a part of operational CRM that automates service requests, complaints, product returns, and information requests

change agent

a person or event that is the catalyst for implementing major changes for a system to meet business changes

social media manager

a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand

Ethernet

a physical and data layer technology for LAN networking

Business Model

a plan that details how a company creates, delivers, and generates revenues

3 common website metrics

abandoned shopping carts unique visitors page exposures

List Generator

compiles customer information from a variety of sources and segments it for different marketing campaigns

coaxial cable

cable that can carry a wide range of frequencies with low signal loss. It consists of a metallic shield with a single wire placed along the center of a shield and isolated from the shield by an insulator.

Uninstaller

can remove software that is no longer needed

polymorphic virus and worms

change their form as they propagate

dynamic report

changes automatically during creation

What-if analysis

checks the impact of a change in a variable/assmuption on the model.

Business Process Integration examples

collaborative logistics, commerce websites, vendor-managed inventory, private exchanges

Business Intelligent components

collect info used throughout the org, organize it, and apply analytical tools to assist managers with decisions -ex. data warehouse

synchronous communication

communications that occur at the same time such as IM or chat

Supply chain design

determines how to structure a supply chain including the product, selection of partners, the location and capacity of warehouses, transportation methods, and supporting management information systems

Chief Automation Officer (CAO)

determines if a person or business process can be replaced by a robot/software

Break-even analysis

determines the volume of business required to make a profit at the current prices charged for the products or services

estimation analysis

determines values for an unknown continuous variable behavior or estimated future value

Organizational data

difficult to access, contains structured data in database, contains unstructured data such as voice mail, phone calls, text messages, and video clips

Interactive Voice Response (IVR)

directs customers to use touch-tone phones or keywords to navigate or provide information

Plunge Implementation

discards the legacy system and immediately migrates all users to the new system

BPMN flows

displays the path in which the process flows represented by an arrow

Hub (switch or router)

hardware to perform traffic control

backdoor program

open a ways into the network for future attacks

portals

operate central website for users to access specialized content and other services; ex. Google.com, Yahoo.com

contact management CRM system

opmaintains customer contact information and identifies prospective customers for future sales, using tools such as organizational charts, detailed customer notes, and supplemental sales information

dynamic catalog

or an area of a website that stores information about products in a database.

Dumpster Diving

or looking through people's trash, is another way hackers obtain information

Summary internal report

organizes and categorizes data for managerial perusal

disk optimization

organizes information on a hard disk in the most efficient way

sales

performs the function of selling goods or services

The third kind of authentication

something that is part of the user, is by far the best and most effective way to manage authentication

deep web

sometimes called the invisible web, is the large part of the Internet that is inaccessible to conventional search engines. Content includes email messages, chat messages, private content on social media sites, electronic bank statements, and electronic health records.

Crowdfunding

sources capital for a project by raising many small amounts from a large number of individuals, typically via the internet

Cable

special cable modem and cable line required

application service provider license

specialty software paid for on a license basis or per-use basis or usage-based licensing.

Project constraint

specific factors that can limit options, including budget, delivery dates, available skilled resources, and organizational policies

Hybrid Erp

splits the ERP functions between an on-premises ERP system and one or more functions handled as Software as a Service (SaaS) in the cloud

employee monitoring policy

stating explicitly how, when, and where the company monitors its employees

Supply chain design results in

superior supply chain capabilities and profits

supply chain visibility

the ability to view all areas up and down the supply chain in real time

Usability

the ease with which people perform transactions and/or find information

maintenance phase

the organization performs changes, corrections, additions, and upgrades to ensure the system continues to meet business goals.

Business requirements

the specific business requests the system must meet to be successful

Pharming attack

uses a zombie farm, often by an organized crime association, to launch a massive phishing attack.

Core drivers of the information age

1. Data 2. Information 3. Business Intelligence 4. Knowledge

What does an Internet policy do?

1. Describes the Internet services available to users 2. Defines the organization's positions on the purpose of Internet access and restrictions 3. Describes user responsibility for citing sources 4. States the ramifications if the policy is violated

Data Preparation Phase

Gather and organize the data in the correct formats and structures for analysis

Content provider

Generates revenues by providing digital content such as news, music, photos, or videos; Netflix.com, iTunes.com, CNN.com

Smartphones

Offer more advanced computing ability and connectivity than basic cell phones

Satellite

Newer versions have two-way satellite access, removing need for phone line.

Unidentified visitor

No information about the visitor is available

Two types of PII

Nonsensitive PII Sensitive PII

Project Management

The application of knowledge, skills, tools, and techniques to project activities to meet project requirements

The Internet and Globalization (A reason for outsourcing.)

The pervasive nature of the Internet has made more people comfortable with outsourcing abroad.

Dark web

The portion of the internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser.

Microblogging

The practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages.

War Chalking

The practice of tagging pavement with codes displaying where Wi-Fi access is available

Information age

The present time, during which infinite quantities of facts are widely available to anyone who can use a computer

Difference Between XP and Waterfall

The primary difference between the waterfall and XP methodologies is that XP divides its phases into iterations with user feedback.

Business Intelligence (BI) Long description

The process is initiated by analyzing a global report, say of sales per quarter. Every answer is followed by a new question, and users can drill deep down into a report to get to fundamental causes.

Speech Analysis

The process of analyzing recorded calls to gather information; brings structure to customer interactions and exposes information buried in customer contact center interactions with an enterprise.

Project Planning

The process of detailed planning that generates answers to common operational questions. Ex: Who is responsible for performing tasks? How much does each task cost? How are issues being tracked? What risks are associated with each task?

Competitive Intelligence

The process of gathering info about the competitive environment, including competitors plans, activities, adn products to improve a companys ability to succeed -understanding and learning as much as possible as soon as possible about what is occurring outside the company to remain competitive

Production

The process where a busniess takes raw materials and processes them or converts them into a sinished product for its goods or services *INPUTS *PROCESS *OUTPUTS

Key performance indicators (KPIs)

The quantifiable metrics a company uses to evaluate progress toward critical success factors. - More specific than CSFs. - Focuses on internal & external measurements. a common external is market share

The 3 components of RFID System

1. Tag 2. Reader 3. Computer network

three common tools to analyze competitive intelligence

1. The Five Forces Model (for evaluating industry attractiveness). 2. The three generic strategies (for choosing a business focus). 3. Value chain analysis (for executing business strategies).

A network provides two principle benefits:

1. The ability to communicate 2. The ability to share/collaborate

challenges facing ebusiness

1. identifying limited market segments 2. managing consumer trust 3. ensuring consumer protection 4. adhering to taxation rules

3 examples of analytical information

1. market projections 2. future growth projections 3. sales trends

Steps to Business Process improvements

1. measure what matters to most customers 2. monitor the performance of key business processes 3. assign accountability for process improvement

Partner relationship management (PRM)

discovers optimal sales channels by selecting the right partners and identifying mutual customers

Business Strategy

A leadership plan that achieves a specific set of goals or objectives -Developing new products or services -Entering new markets -Increasing customer loyalty -Attracting new customers -Increasing sales **business strategies build in buffers or slack, allowing the company the ability to ride out any storm and defend against competitive or environmental threats-->consider internal and external environments **Busniess stragegies should match core competencies

data warehouse

A logical collection of information - gathered from many different operational databases - that supports business analysis activities and decision-making tasks

Transactional information

encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks. airline ticket sales receipt packing slip

Analytical Information

encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks. product statistics sales projection future growth trends

business-critical integrity constraints

enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints

business-critical integrity constraints

enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints.

supply chain execution systems

ensure supply chain cohesion by automating the different activities of the supply chain (ex. electronically routing orders from manufacturer to supplier using EDI)

HIPAA Security Rule

ensures national standards for securing patient data that is stored or transferred electronically.

Integration

ensuring that all software products, including disparate systems not part o the ERP system, are working together or are integrated.

dirty data

erroneous or flawed data

brainstorming

establishes a high-level plan of the intended project and determines project goals

planning-phase

establishes a high-level plan of the intended project and determines project goals

Solution test

evaluate solutions in terms of feasibility (can it be completed?), suitability (is it a permanent or temporary fix?), and acceptability (can all participants form a consensus?)

search engine ranking

evaluates variables that search engines use to determine where a URL appears on the list of search results

Inconsistent Data Definitions

every department had its own method for recording data so when trying to share information, data did not match and users did not get the data they really needed

clickstream data

exact pattern of a consumer's navigation through a site

information management

examines the organization resource of information and regulate it definition uses value and distribution ensuring that it has the type of data information requires fo function and for effectively

predictive analytics

extracts information from data and uses it to predict future trends and identify behavioral patterns

data scientist

extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information.

Project assumption

factors considered to be true, real, or certain without proof or demonstration. Examples include hours in a workweek or time of year the work will be performed.

Intrusion Detection Software (IDS)

features full time monitoring tools that search for patterns in network traffic to identify intruders. Protects against suspicious network traffic and attempts to access files and data.

script kiddies or script bunnies

find hacking code on the internet and clicking and point into system that damage there system

Goal-seeking analysis

finds the input necessary to achieve a goal such as a desired level of output. -Reverse of what-if & sensitivity analysis. Sets a target value for a variable and repeatedly changes others until target is reached.

denial of service attack (DoS)

floods a website with so many requests for service that it slows down or crashes

Monetray Data

focus on managing the company's resources and maintain monetary data -Fiancne and Accoutning

Transactional Data

focus on moving goods or services into the hands of consumers -Sales and Marketing

Robotics

focuses on creating artificial intelligence devices that can move and react to sensory input -supports materials management

logical view of information

focuses on how individual users logically access information to meet their own particular business needs

Supplier Relationship Management (SRM)

focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects

Production Data

focuses on manufacturing and maintains production data -OM

Employee Data

focuses on manufacturing and maintains production data HR

Enterprise Application Integration (EAI)

packages together commonly used functionality, such as prebuilt links to popular enterprise applications.

analysis paralysis

paralysis occurs when the user goes into an emotional state of over-analysis ( or overhanging ) a situation so that a decision is never taken in effect paralyzing the outcome

Mobile payments

pay for goods and services including in-store purchases, home delivery, vending machines, taxis, gas, and so on.

Status report

periodic reviews of actual performance versus expected performance

Rapid Growth (A reason for outsourcing.)

Allows an organization to acquire the resources required to speed up operations or scale to new demand levels.

Web Browser

Allows users to access the WWW

Agile (Iterative Development)

Consists of a series of tiny projects.

Customer Service Operational CRM Technology

Contact center, Web-based self-service, call scripting

Ebusiness Forms

Content providers, infomediaries, online marketplaces, portals, service providers, transaction brokers

Information Granularities

Detail, summary, aggregate

Correlation Analysis

Determines a statistical relationship between variables, often for the purpose of identifying predictive factors among the variables.

ebusiness tools

Email Instant messaging Podcasting Videoconferencing Web conferencing Content management system

RAD

Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process.

Rapid Application Development (RAD) Methodology

Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process.

Business Intelligence (BI)

Enables business users to receive data for analysis that is: Reliable Consistent Understandable Easily manipulated

Transactional information

Encompasses all information contained within a single business process/unit of work and its primary purpose is to support the performance of daily operational/structured decisions

Supply Chain

Includes all parties involved, directly or indirectly, in obtaining raw materials or a products -companies are turning to systems that provide demand forecasting, inventory control, and information flows between suppliers and customers. *Today's supply chain is an intricate network of business partners linked through communication channels and relationships.

Ebusiness

Includes ecommerce along with all activities related to internal and external business operations

Knwoledge

Includes the skills, expertise, and experience, coupled with information and intelligence that creates persons intellectual resources

Workflow

Includes the tasks, activities and responsibilities required toe execute each step in a business process-->must understand these things to create alternative business processes/ competitive advantage

Advantages of Outsourcing

Increased quality/efficiency of business processes Reduced operating expenses for head count and exposure to risk for large capital investments Access to outsourcer's expertise, economies of scale, best practices, and advanced technologies Increased flexibility for faster response to market changes and less time to market for new products/services

Project stakeholder

Individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion

Egovernment

Involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government

3 primary operational CRM technologies

List generator, campaign management, cross-selling and up-selling

Marketing and operational CRM technology

List generator, campaign management, cross-selling and up-selling

Semistructured Decisions

Occurs in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision.

Personalization

Occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person

asset tracking

Occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention

Packet-switching

Occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer

Three Areas of Information Security

People: Authentication and Authorization Data: Prevention and Resistance Attacks: Detection and Response

Internal report

Presents data that are distributed inside the organization and intended for employees within an organization. Internal reports typically support day-to-day operations monitoring that supports managerial decision making.

ERP (Enterprise Application)

Primary Users- Accounting, Finance, Logistics, Production. Primary Business Benefits-Forecasting, Planning, Purchasing, Material management, Warehousing, Inventory, Distribution.

SCM

Primary Users- Customers, Resellers, Partners, Suppliers, Distributors Primary Business Benefit - Market demand, Resource and capacity constraints, real-time scheduling

CRM

Primary Users-Sales, Marketing, Customer Service. Primary Business Benefit-Sales forecast, sales strategies, marketing campaigns.

sustaining technology

Produces an improved product customers are eager to buy

Loyalty Programs

Reward customers based on their spending. , for instance. Because of the rewards they receive (they are more likely to be loyal to or give most of their business to a single company -MIS keeps track of this -The airline industry is famous for its frequent-flyer programs

Workstation computer

Similar to a desktop but has more powerful mathematical and graphics processing capabilities and can perform more complicated tasks in less time. Typically used for software development, web development, engineering, and ebusiness tools.

Data

The raw facts that describe the characteristics of an event or object - successful managers compile, analyze, and comprehend massive amounts of data daily, which helps them make more successful business decisions

Project management office (PMO)

An internal department that oversees all organizational projects. This group must formalize and professionalize project management expertise and leadership. One of the primary initiatives of the PMO is to educate the organization on techniques and procedures necessary to run successful projects.

World Wide Web Consortium (W3C)

An international community that develops open standards for the Web.

The Five Forces Model -evaluating industry attractiveness

Analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry. -Its purpose is to combat these competitive forces by identifying opportunities, competitive advantages, and competitive intelligence. --> If the forces are strong, they increase competition; if the forces are weak, they decrease competition

text Analysis

Analyzes unstructured data to find trends and patterns in words and sentences.

2. Supplier Power

The suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services). -When its high, buyers lose revenue because they cannot pass on the raw material price increase to their customers

Extended ERP components

Extra components that meet the organizational needs not covered by the core components and primarily focus on external operations

Megabyte (MB or M or Meg)

Roughly 1 million bytes

the new IT reality

adaptive security architecture, advanced system architecture (autonomic computing)

mobile application management (MAM)

administers and delivers applications to corporate and personal smart phones and tablets

Intermediaries

agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together

Affiliate programs

allow a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website

Supply Chain Management components

allow a firm to monitor and control all stages in the supply chain from the acquisition of raw materials to the receipt of finished goods by customers

click-to-talk functions

allow customers to click on a button and talk with a representative via the Internet

Web-based self-service systems

allow customers to use the web to find answers to their questions or solutions to their problems

associate (affiliate) program

allows a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website

Collaborative engineering

allows an organization to reduce the cost and time required during the design process of a product

Voice over LTE (VoLTE)

allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls

Multitasking

allows more than one piece of software to be used at a time.

Data collection

gather problem-related data, including who, what, where, when, why, and how. Be sure to gather facts, not rumors or opinions about the problem

call scripting systems

gather product details and issue resolution information that can be automatically generated into a script for the representative to read to the customer

Network behavior analysis

gathers an organization's computer network traffic patterns to identify unusual or suspicious operations.

Routers

generally used to connect networks that use similar protocols

Top reasons to study trends

generate ideas and identify opportunities identify early warning signals gain confidence beat the competition understand a trend balance strategic goals understand the future of specific industries prepare for the future (Definitions on Pg. 503)

Pay-per-call

generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call

pay-per-click

generates revenue each time a user clicks on a link to a retailer's website

pay-per-conversion

generates revenue each time a website visitor is converted to a customer

Information ethics

govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies).

internet censorship

government attempts to control internet traffic, thus preventing some material from being viewed by a country's citizens

object-oriented languages

group data and corresponding processes into objects.

Value Chain

groups a firm's activities into two categories, primary value activities upport value activities

Campaign Management systems

guide users through marketing campaigns by performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis

Production and materials management ERP components

handle the various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control

Personal information management (PIM) software

handles contact information, appointments, task lists, and email.

Materials management focuses on

handling all materials, safely, efficiently, and in compliance with regulatory requirements and disposal requirements

dynamic information

includes data that change based on user actions.

static information

includes fixed data incapable of change in the event of a user action.

Cyber-espionage

includes governments that are after some form of information about other governments.

Firm Infrastructure

includes the company format or departmental structures, environment, and systems.

wifi infrastructure

includes the inner workings of a wifi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a wifi signal

malicious code

incluse a variety of threats such as viruses, worms and trojan horse

advantage of a Relational database

increased flexibility increase scalability and performance reduced information redundancy increase information integrity increase information security

High pressured environment is

increasing the need for any product or service that saves time or simplifies life

Return on Investment (ROI)

indicates the earning power of a project

information levels

individual, department, enterprise

what occurs when a system produces incorrect, in consisted or duplicated data

information integrity issue

smart machines

information of everything, advanced machine learning, autonomous agents and things

Feedback

information that returns to its original transmitter(input, transform, or output) and modifies the transmitter's actions .-->Feedback helps the system maintain stability example...a car's system continuously monitors the fuel level and turns on a warning light if the gas level is too low

Sensitive PII

information transmitted with encryption and, when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm. Sensitive PII includes biometric information, financial information, medical information, and unique identifiers such as passport or Social Security numbers.

The Four Primary Traits of the Value of Information

information type information timeliness information quality inforation governance

phased implementation

installs the new system in phases (for example, by department) until it is verified that it works correctly

network

is a communications, data exchange and resource sharing system created by linking two or more devices and establishing standards so they can all work together

Drive by hacking

is a computer attack by which an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

appliance

is a computer dedicated to a single function, such as a calculator or computer game.

ransomware

is a form of malicious software that infects your computer and asks for money.

Pretexting

is a form of social engineering in which one individual lies to obtain confidential data about another individual

Zombie farm

is a group of computers on which a hacker has planted zombie programs.

Fuzzy logic

is a mathematical method of handling imprecise or subjective information. Basic approach is to assign values b/w 0 and 1 to vague info. Zero represents info non included, 1 represents inclusion/membership. Ex: washing machines that determine how much water to use/how long to wash.

inforation integrity

is a measure of the quality of information

Privilege escalation

is a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications.

Spear phishing

is a phishing expedition in which the emails are carefully designed to target a particular person or organization.

Vishing (voice phishing)

is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.

foreign key

is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

Elevation of privilege

is a process by which a user misleads a system into granting unathorized tight usually for the purpose of compromising or destroying the system.

Deep learning

is a process that employees specialized algorithms to model and study complex datasets; the method is also used to establish relationships among data and datasets.

Zombie

is a program that secretly takes over another computer for the purpose of launching attacks on other computers. ___ attacks are almost impossible to trace back to the attacker.

magnetic medium

is a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnetically sensitive materials.

Hard drive

is a secondary storage medium that uses several rigid disks coated with a magnetically sensitive material and housed together with the recording heads in a hermetically sealed mechanism.

business unit

is a segment of a company (such as accounting, production, marketing) representing a specific business function

Control Object for Information and Related Technology (COBIT)

is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors.

Voiceprint

is a set of measurable characteristics of a human voice that uniquely identifies an individual. These characteristics, which are based on the physical configuration bio-metric authentication such as voice prints can be costly and intrusive.

cache memory

is a small unit of ultra-fast memory that is used to store recently accessed or frequently accessed data so that the CPU does not have to retrieve this data from slower memory circuits such as RAM.

satellite

is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area

Spyware

is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission. Spyware programs collect specific data about the user, ranging from general demographics such as name, address, and browsing habits to credit card numbers, Social Security numbers, and user names and passwords.

Flash memory

is a special type of rewritable read-only memory (ROM) that is compact and portable.

prediction

is a statement about what will happen or might happen in the future, for example, predicting future sales or employee turnover.

Password

is a string of alphanumeric characters used to authenticate a user and provide access to a system. The first type of authentication, usually something the user knows, is the most common way to identify individual users and typically consists of a unique user ID and password. However, this is actually one of the most ineffective ways for determining authentication because passwords are not secure. All it typically takes to crack one is enough time. More than 50 percent of help desk calls are password related, which can cost an organization significant money, and a social engineer can coax a password from almost anybody

Repeaters

used to increase the distance over which a network signal can be transmitted

data mining tool

uses a variety of techniques to find patterns and relationships in large volumes of information and infers rules that predict future behavior and guide decision making

parallel implementation

uses both the legacy system and new system until all users verify that the new system functions correctly

Website ebusiness analytics

uses clickstream data to determine the effectiveness of the site as a channel-to-market. Website ebusiness analytics tracks what pages the shopper lingers on, what the shopper puts in or takes out of a shopping cart, what items the shopper purchases, whether or not the shopper belongs to a loyalty program and uses a coupon code, and the shopper's preferred method of payment.

behavioral analytics

uses data about people's behaviors to understand intent and predict future actions

Radio Frequency Identification (RFID)

uses electronic tags and labels to identify objects wirelessly over short distances

RFID

uses electronic tags and labels to identify objects wirelessly over short distances -supports logistics

RFID reader

uses radio waves to read the tag and sends the EPC to computers in the supply chain

scrum methodology

uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervals, to achieve an appointed goal

haptic interface

uses technology allowing humans to interact with a computer through bodily sensations and movements

Public key encryption (PKE)

uses two keys: a public key that everyone can have and a private key for only the recipient. The organization provides the public key to all customers, whether end customers or other businesses, who use that key to encrypt their information and send it via the Internet. When it arrives at its destination, the organization uses the private key to unscramble it.

data offer increased inflation security

various security features of database ensure that individuals have only certain types of access to certain types of information

Integration testing

verify that separate systems can work together passing data back and forth correctly

system testing

verify that the units or pieces of code function correctly when integrated

autonomous agents and things

virtual assistant, autonomous agent

Device Mesh

vr, ar

Child Online Protection act (COPA)

was passed to protect minors from accessing inappropriate material on the Internet

records

what is a collection of related data elements

data visualization tools

what moves beyond Excel graphing and charts into sophisticated analysis techniques such as pie carts, controls, instruments , maps , time-series graphics and more

Competitive monitoring

when a company keeps tabs of its competitor's activities on the web using software that automatically tracks all competitor website activities such as discounts and new products

information age

when infinite quantities of facts are widely available to anyone who can use a computer

reputation system

where buyers post feedback on sellers

Contact Center

where customer service representatives answer customer inquiries and solve problems, usually by email, chat, or phone

Complex instruction set computer (CISC) chips

which is a type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly.

confidentiality

which is the assurance that messages and information remain available only to those authorized to view them.

reflects a database

while a database has only one physical view, it can easily support multiple logical views that provide for flexibility

Chief User Experience Officer (CUEO)

will create the optimal relationship between user and technology

Chief Intellectual Property Officer (CIPO)

will manage and defend intellectual property, copyrights, and patents

Website traffic analytics

Uses clickstream data to determine the efficiency of the site for users and operates at the server level. Traffic analytics tracks data on how many pages are served to the user, how long it takes each page to load, how often the user hits the browser's back or stop button, and how much data is transmitted before the user moves on.

In-sourcing (in-house development)

Uses professional expertise within an organization to develop a maintain its information technology systems. Helps create a viable supply of IT professionals and creating a better quality workforce by combining technical and business skills.

Scrum

Uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal. Under this methodology, each day ends or begins with a stand-up meeting to monitor and control the development effort.

behavioral analysis

Using data about people's behaviors to understand intent and predict future actions

Logistics can help a company answer the following questions:

What is the quickest way to deliver products to our customers? What is the optimal way to place items in the warehouse for picking and packing? What is the optimal path to an item in the warehouse? What path should the vehicles follow when delivering the goods? What areas or regions are the trucks covering?

Procurement can help a company answer the following questions:

What quantity of raw materials should we purchase to minimize spoilage? How can we guarantee that our raw materials meet production needs? At what price can we purchase materials to guarantee profitability? Can purchasing all products from a single vendor provide additional discounts?

trend projection

When numerical data are available, a trend can be plotted to display changes through time and into the future.

System

a collection of parts that link to achieve a common purpose -->primary enabler of cross-functional operations -Think of car

Worldwide Interoperability for Microwave Access (WiMAX)

a communication technology aimed at providing high-speed wireless data over metropolitan area networks

Makerspaces

a community center that provides technology, manufacturing equipment, and educational opportunities to the public that would otherwise be inaccessible or unaffordable

Internet Service Provider (ISP)

a company that provides access to the internet for a monthly fee

Competitive click-fraud

a computer crime in which a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking the advertiser's link

competitive click-fraud

a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link

Click-through

a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser

client

a device that is designed to request information from a server

Software Engineering

a disciplined approach for constructing information systems through the use of common methods, techniques, or tools

Entry barrier

a feature of a product or service that customers have come to expect and entering competitors must offer the same for survival. -For example, a new bank must offer its customers an array of MIS-enabled services, including ATMs, online bill paying, and online account monitoring

Uplift modeling

a form of predictive analytics for marketing campaigns that attempts to identify target markets or people who could be convinced to buy products

Fair Information Practices

a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy

Business Process model

a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint.

Business Process Model and Notation (BPMN)

a graphical notation that depicts the steps in a business process

help desk

a group of people who respond to users' questions

hardware key logger

a hardware device that captures keystrokes on their journey from the keyboard to the motherboard

hashtag

a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#).

ezine

a magazine published only in electronic form on a computer network

Balanced Scorecard

a management system, in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action

Internet

a massive network that connects computers all over the world and allows them to communicate with one another

Customer Relationship Management (CRM)

a means of managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability

information integrity

a measure of the quality of information

sniffer

a program or device that can monitor data traveling over a network. sniffers can show all the data being transmitted over a network including password and sensitive information . tend to have favorite weapon in the hacker arsenal

applet

a program that runs within another application such as a website

scripting language

a programming method that provides for interactive modules to a website

critical path analysis

a project diagramming method used to predict total project duration.

Selfie

a self-photograph placed on a social media website

Domain name hosting (web hosting)

a service that allows the owner of a domain name to maintain a simple website and provide email capacity

Instant messaging

a service that enables instant or real-time communication between people

Methodology

a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges

Application Programming Interface (API)

a set of routines, protocols, and tools for building software applications

Collaboration system

a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information

pop-up ad

a small web page containing an advertisement that appears outside of the current website loaded in the browser

shopping bot

a software that will search several retailer websites ad provide a comparison of each offering including price and availability.

Sensitivity analysis

a special case of what-if analysis. The study of the impact on other variables when one variable is changed repeatedly.

data lake

a storage repository that holds a vast amount of raw data in its original format until the business needs it

Enterprise Resource Planning (ERP)

a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform

BPMN activity

a task in a business process, any work that is being performed in a process, represented by a rounded-corner rectangle.

data map

a technique for establishing a match, or balance, between the source data and the target data warehouse

Opt out

a user can opt out of receiving emails by choosing to deny permission to incoming emails

client-server network

a versatile, message based, and modular infrastructure intended to improve usability, flexibility, interoperability, and scalability as compared to centralized, mainframe computing

Google Glass

a wearable computer with an optical head mounted display

Real Simple Syndication (RSS)

a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format

Wi-Fi Protected Access (WPA)

a wireless security protocol to protect Wi-Fi networks

virtual workplace

a work environment that is not located in any one physical space

Internet of Things (IoT)

a world where interconnected Internet-enabled devices of things have the ability to collect and share data without human intervention

Videoconference

allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards

information properties

an ethical that focus on who owns information about individual and how information can be sold and exchanged

Optimization analysis

an extension of goal-seeking, finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints.

data point

an individual item on a graph or a chart

legacy system

an old system that is fast approaching or beyond the end of its useful life within an organization

native advertising

an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement

eshop

an online version of a retail store where customers can shop at any hour

Network Operating System (NOS)

an operating system that includes special functions for connecting computers and devices into a local area network

compact disk read-only memory (CD-ROM)

an optical drive designed to read the data encoded on CD-ROMs and to transfer this data to a computer

Compact disk-read-write CD-RW) drive

an optical drive that enables users to erase existing data and to write new data repeatedly to a CD-RW

Back order

an unfilled customer order for a product that is out of stock

Drones

an unmanned aircraft that can fly autonomously, or without a human -supports logistics

Evaluation Phase

analyze the trends and patterns to assess the potential for solving the business problem.

market basket analysis

analyzes such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services

Personally Identifiable Information (PII)

any data that can be used to identify, locate, or contact an individual

Peer-to-Peer Network (P2P)

any network without a central file server and in which all devices on the network have access to resources located on all other devices. Primarily used for sharing resources

Closed Source

any proprietary software licensed under exclusive legal right of the copyright holder

open source

any software whose source code is made available free for any third party to review and modify

Wireless

any type of operation accomplished without the use of a hard-wired connection

BPMN event

anything that happens during the course of a business process represented by a circle.

Social Network

application that connects people by matching profile information

Location-based services

applications that use location information to provide a service

Tech Development

applies MIS to processes to add value

selling chain management

applies technology to the activities in the order life cycle from inquiry to sale

Business-to-consumer (B2C)

applies to any business that sells its products or services to consumers over the internet; ex. amazon.com, Carfax

Consumer-to-business (C2B)

applies to any consumer who sells a product or service to a business on the internet; ex. Priceline

Business-to-business (B2B)

applies to businesses buying from and selling to each other over the internet

Consumer-to-consumer (C2C)

applies to sites primarily offering goods and services to assist consumers interacting with each other over the internet; ex. Ebay, forward auctions

Data Modeling Phase

apply mathematical techniques to identify trends and patterns in the data

Pilot Implementation

assigns a small group of people to use the new system until it is verified that it works correctly, then the remaining users migrate to the new system

hoaxes

attack computer system by transmitting a virus hoax with a real virus attached. by masking the attack in a semingliy legitimate message unsuspecting users more readily distribute the message and send the attack on to their co-worker s and friend infecting many user along the way

Distributed Denial of Service (DDoS)

attack from multiple computers that flood a website with so many request for service that it slows down or crashes. a common type is Ping of death, which thousand of computer try to access a website at the same time overloading it and shutting it down

Business process improvement

attempts to understand and measure the current process and make performance improvements accordingly

Continuous improvement model

attempts to understand and measure the current process, and make performance improvements accordingly

sales management CRM systems

automate each phase of the sales process, helping individual sales representatives coordinate and organize all their accounts

predictive dialing

automatically dials outbound calls and when someone answers, the call is forwarded to an available agent

External Databases

competitor information, industry information, mailing lists, stock market analysis

data dictionary

compiles all of the metadata about the data elements in the data model

Expert systems

computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems

Local Area Network (LAN)

connects network devices over a relatively short distance like an office building or a home

packet tampering

consist of altering the content of packets as the travel over the internet or altering data on computer disks after penetrating a network

spoofing

consist of raging the return address on a email so that the message appears to form someone other than the actual sender. this is not a virus but rather a way by which virus authors conceal their identities as they send out virus

explicit knowledge

consists of anything that can be documented, archived, and codified, often with the help of IT

Secondary Storage

consists of equipment designed to store large volumes of data for long-term storage

Open System

consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate with the system

web log

consists of one line of information for every visitor to a website and is usually stored on a web server

hardware

consists of the physical devices associated with a computer system.

Memory card

contain high-capacity storage that holds data such as captured images, music, or text files. Memory cards are removable; when one is full the user can insert an additional card.

data mart

contains a subset of data warehouse information

course management software

contains course information such as a syllabus and assignments and offers drop boxes for quizzes and homework along with a grade book.

source code

contains instructions written by a programmer specifying the actions to be performed by computer software

Mashup

content from more than one source to create a new product or service

Problem Identification

define the problem as clearly and precisely as possible

Responsibility matrix

defines all project roles and indicates what responsibilities are associated with each role

business rules

defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer.

Communication plan

defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations

Software as a Service (SaaS)

delivers applications over the cloud using a pay-per-use revenue model

Deployment Phase

deploy the discoveries to the organization for work in everyday business

Network Effect

describes how products in a network increase in value to users as the number of users increases

Social Tagging

describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search

Central Processing Unit (CPU) or (Microprocessor)

is the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together.

Consolidation

is the aggregation of data from simple roll-ups to complex groupings of interrelated information.

information secrecy

is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

Primary Storage

is the computer's main memory, which consists of the random access memory (RAM), cache memory, and read-only memory (ROM) that is directly accessible to the CPU.

random access memory (RAM)

is the computer's primary working memory, in which program instructions and data are stored so that they can be accessed directly by the CPU via the processor's high-speed external data bus.

virtualization

is the creation of a virtual (rather than actual) version of computing resources, such as an operating system, a server, a storage device, or network resources

information redundancy

is the duplication of data, or the storage of the same data in multiple places.

Machine vision resolution

is the extent to which a machine can differentiate between objects.

Identity theft

is the forging of someone's identity for the purpose of fraud. The fraud is often financial, because thieves apply for and use credit cards or loans in the victim's name.

Supply Chain Management (SCM)

is the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability. -SCM systems manage and enhance these relationships with the primary goal of creating a fast, efficient, and low-cost network of business relationships that take products from concept to market-->Links infor -Think Walmart adn P&G

content editor

is the person responsible for updating and maintaining website content.

read-only memory (ROM)

is the portion of a computer's primary storage that does not lose its contents when one switches off the power.

classification analysis

is the process of organizing data into categories or groups for its most effective and efficient use.

Authorization

is the process of providing a user with permission including access levels and abilities such as file access, hours of access and amount of allocated storage space.

conversion

is the process of transferring information from a legacy system to a new system.

production

is the process where a business takes raw materials and processes them or converts them into a finished product for its goods or services

productivity

is the rate at which goods and services are produced base upon total output given total inputs

privacy

is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.

analytics

is the science of fact-based decision making

Cryptography

is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.

software

is the set of instructions the hardware executes to carry out specific tasks. Software, such as Microsoft Excel, and various hardware devices, such as a keyboard and a monitor, interact to create a spreadsheet or a graph

data element or data field

is the smallest or basic unit of information

data latency

is the time t takes for data to be stored or retrieved

Single-factor authentication

is the traditional security process, which requires a username and password.

pirated software

is the unauthorized use, duplication, distribution, or sale of copyrighted software.

Cyberterrorism

is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals.

stylus

is used as a pen-like device that taps the screen to enter commands.

Application software

is used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others.

application software

is used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others.

embedded operating system

is used in computer appliances and special-purpose applications, such as an automobile or ATM and are used for a single purpose.

A signal travels through transmission medium...

it encounters resistance and gradually becomes weaker and distorted so. the repeater. receives. the network signal and retransmits it at its original transmission strength

Benefits of the SRM solution include:

-A single consolidated view of all suppliers. -Consistent, detailed management information allowing multiple views for every executive. -Elimination of duplication suppliers.

Exapmples of Functional thinking business processes

-Accounting and Finance -Marketing and Sales -Operations Management -Human Resources

Support Value Activities

-firm infrastructure, -human resource management, -technology development, -procurement

Ethernet Popularity reasons:

-is easy to implement, manage, and maintain. -Allows low-cost network implementations. -Provides extensive flexibility for network installation. -Guarantees interoperability of standards-compliant products, regardless of manufacturer.

Factors used to assess buyer power

-number of customers, -their sensitivity to price, -size of orders, -differences between competitors, -availability of substitute products

Reducing threat of Substitutes

-offering additional value through wider product distribution ex.Soft-drink manufacturers distribute their products through vending machines, gas stations, and convenience stores, increasing the availability of soft drinks relative to other beverages -Companies can also offer various add-on services, making the substitute product less of a threat.

Hybrid erp

-owns components of hardware/software -host components of hardware and software with cloud vendor

Key Performance Indicators examples

-turnover rates of employees -percentage of help desk calls answered in the first minute -number of product returns -number of new customers -average customer spending

primary reasons projects fail

-unclear or missing business requirements -skipped SDLC phases -changing technology -the cost of finding errors -balance of the triple constraints

type of application software (perform specific information processing needs)

-word processing software -spreadsheet software

Project scope statement

links the project to the organization's overall business goals. It describes the business need and the justification, requirements, and current boundaries for the project. It defines the work that must be completed to deliver the product with the specified features and functions, and it includes constraints, assumptions, and requirements-all components necessary for developing accurate cost estimates.

where is the business now?

looking at the current business situation allows managers to take effective action to solve issues before they grow out of control

At the strategic level (structures decisions),

managers develop overall business strategies, goals, and objects as part of the company's strategic plan.

lack of data standards

managers need to perform cross-functional analysis using data from all departments, which differed in granularities, formats, and levels

Social Networking Analysis (SNA)

maps group contacts (personal and professional) identifying who knows each other and who works together

Data Warehouses include

marketing, inventory, sales, billing, competitor, industry, mailing list information, and stock market analysis

ERP

materials planning, order entry, distribution, general ledger, accounting, shop floor control

ROM is nonvolatile

meaning it does not require constant power to function.

RAM is Volatile

meaning it must have constant power to function; its contents are lost when the computer's electric supply fails.

Interactivity

measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement

Information reach

measures the number of people a firm can communicate with all over the world

Cloud ERP

model for enabling ubiquitous, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction

Decision support systems (DDS)

model info using OLAP, provides assistance in evaluating and choosing among different courses of action - a system to diagnose and treat patients by inputting symptoms - a system that identifies risk for insurance companies

software customization

modifies existing software according to the business's or user's requirements

Two means of stealing an identity are

phishing and pharming

the SDLC and its Associated Activities

planning, analysis, design, development, testing, implementation, maintenance

infographics (information graphics)

presents the results of data analysis, displaying the patterns, relationships, and trends in a graphical format

Gate four: transition

primary questions answered in this phase address ownership of the system and training of key personnel

Requirements definition document

prioritizes all of the business requirements by order of importance to the company

requirement definition document

prioritizes all of the business requirements by order of importance to the company

transaction brokers

process online sales transactions; ex. Etrade.com, Charlesschwab.com

distributed computing

processes and manages algorithms across many machines in a computing environment

Logistics

processes that control the distribution, maintenance, and replacement of materials and personnel to support the supply chain

Components of SCM

procurement, logistics, materials management

Visualization

produces graphical displays of patterns and complex relationships in large amounts of data

Project management institute (PMI)

project : as a temporary activity a company undertakes to create a unique product, service, or result

ERP-II

project management, knowledge management, workflow management, customer relationship management, human resource management, portal capability, integrated financials

accounting

records, measures, and reports monetary transactions

Process rework

redefine processes to ensure that the company is using the most efficient and effective processes

Volatility

refers to a device's ability to function with or without power

Downtime

refers to a period of time when a system is unavailable

twisted-pair cable

refers to a type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath

Programming language

refers to a unique set of keywords(words that it understands) along with a special syntax for organizing program instructions that execute computer comands.

Machine-to-machine (M2M)

refers to devices that connect directly to other devices

Ediscovery or electronic discovery

refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry

cybermediation

refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness

Information richness

refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information

Granularity

refers to the level of detail in the model or the decision-making process

data governance

refers to the overall management of the availability, usability, integrity, and security of company data

Fiber-optic (optical fiber)

refers to the technology associated with the transmission of information as light impulses along a glass wire or fiber

Network transmission media

refers to the various types of media used to carry the signal between computers

Crowdsourcing

refers to the wisdom of the crowd

3 items typically found in an acceptable use policy

1. not using the service as part of violating any law 2. not performing any nonrepudiation 3.not attempting to break the security of any computer network or user

3 Characteristics of online transactional processing

1. processes the information according to defined business rules 2. updates existing information to reflect the new information 3. stores the info

Challenges of Business 2.0

1. technology dependence 2. information vandalism 3. violations of copyright and plagiarism

Activities that create transactional info

1. withdrawing cash from ATM 2. purchasing stocks 3. making airline reservations

3 Conditions of a business process change

1.) There has been a pronounced shift in the market the process was designed to serve. 2.) The company is markedly below industry benchmarks on its core processes. 3.) To regain competitive advantage, the company must leapfrog competition on key dimensions.

Ways to reduce buyer power

1.Manipulating switching costs 2.Loyalty Programs

5 Basic Suply Chain Activities

1.Plan 2.Source 3.Make 4.Deliver 5.Return

Three Phases of crm

1.reporting 2.Analyzing 3.Prediting

The Evolution of ERP

1990's: ERP 2000's: Extended ERP 2010'S: ERP-II

Chapter 3 Learning Outcomes

3.1. Identify how an organization can use business process reengineering to improve its business. 3.2. Explain supply chain management and its role in business. 3.3. Explain customer relationship management systems and how they can help organizations understand their customers. 3.4. Summarize the importance of enterprise resource planning systems.

Quantum

3.5 inch disks

Virtual reality

A computer-simulated environment that can be a simulation of the real world or an imaginary world

protocol

A standard that specifies the format of data as well as the rules to be followed during transmission

Business Process

A standardized set of activities that accomplish a specific task, such as processing a customers order -Transform a set of inputs into a set of outputs-goods or services-for another person or process by using PEOPLE AND TOOLS -Must understand business process to envision how the entire company operates

Business Process

A standardized set of activities that accomplish a specific task, such as processing customers orders -->Once a firm identifies the industry it wants to enter and the generic strategy it will focus on, it must then choose the business processes required to create its products or services **ensure the processes add value and create competitive advantages

Graphical User Interface (GUI)

A visual display on a computer's screen that allows you to interact with your computer more easily by clicking graphical elements.

Agile

Aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements.

Bus Topology

All devices are connected to a central cable, called the bus or backbone. Bus networks are relatively inexpensive and easy to install for small networks

Star Topology

All devices are connected to a single central device, called a hub. Star networks are relatively. easy to install and manage, but bottlenecks can occur because all. data must pass through the hub

Ring Topology

All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it. Ring topologies are relatively expensive and difficult to install but they offer high bandwidth and can span large distances

Clean Desk Policy

All employees should be required to adhere to a ______ ______, _____ ______ policy. When they leave their work computer, they should sign off to prevent an unauthorized user from accessing. You can set up a password protected screensaver that will activate after 10 minutes in case the employee forgets to sign out. In addition ensure that employees do not leave sensitive printed information on their desks unattended.

Disaster Recovery Plan Policy

All networked computers must be accessed via a firewall.

Disk image for data recovery

relieves the burden of reinstalling applications if a hard drive crashes or becomes irretrievably corrupted

Mobile Device Management (MDM)

remotely controls smart phones and tablets, ensuring data security

As-is process model

represent the current state of the operation that has been mapped, without any specific improvements or changes to existing processes.

Social graph

represents the interconnection of relationships in a social network

Multi-factor authentication

requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (bio-metric verification). The goal is to make it difficult for an unauthorized person to gain access to a system.

Two-factor authentication

requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).

Pharming

reroutes requests for legitimate websites to false websites. For example: if you were to type in the URL to your bank, pharming could redirect you to a fake site that collects your information.

Institute of Electrical and Electronics Engineers (IEEE)

researches and institutes electrical standards for communication and other technologies

Chief Information Officer (CIO)

responsible for 1. overseeing all uses of MIS and 2. ensuring that MIS strategically aligns with business goals and objectives

Chief Data Officer (CDO)

responsible for determining the types of information the enterprise will capture, retain, analyze, and share

Chief Privacy Officer

responsible for ensuring the ethical and legal use of information within a company

Automatic call distribution

routes inbound calls to available agents

big data

s a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.

Antivirus Software

scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware. Must be Frequently updated to protect against newly created viruses.

Encryption

scrambles information into an alternative form that requires a key or password to decrypt. If there were a security breach and the stolen information were encrypted, the thief would be unable to read it. ___ can switch the order of characters, replace characters, insert or remove, or use a mathematical formula to convert the information into a code.

cyberterrorist

seek to cause harm to people or to destroy critical system or us weapon

managerial business processes

semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements

mail bomb

sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning

where is the business going?

setting strategic direction is critical for planning and creating solid business strategies

Companys strategic vision

should provide guidance on which business processes are core, that is, which are directly linked to the firm's critical success factors

To-be process model

show the results of applying change improvement opportunities to the current (As-Is) process model. This approach ensures that the process is fully and clearly understood before the details of a process solution are decided. The To-Be process model shows how the what is to be realized.

Folksonomy

similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system

What has the most widespread unintentional information reuse?

social security number

Business Processes or Workflows

software can be customized to support the needs of business process workflows unique to each business or department

spyware

software that comes hidden in free downloadable software and tracks online movements

adware

software that generates ads that install themselves on a computer when a person downloads some other program from the internet

worm

spreads itself not only from file to file but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread

Business process

standardized set of activities that accomplish a specific task, such as processing a customer's order. Business processes transform a set of inputs into a set of outputs (goods or services) for another person or process by using people and tools.

Business process modeling (or mapping)

the activity of creating a detailed flowchart or process map of a work process, showing its inputs, tasks, and activities in a structured sequence.

Universal Resource Locator (URL)

the address of a file or resource on the web such as www.apple.com

Customer order cycle time

the agreed upon time between the purchase of a product and the delivery of the product

Throughput

the amount of info that can travel through a system at any point in time

Transaction speed

the amount of time a system takes to perform a transaction

Slack

the amount of time an activity may be delayed without delaying a succeeding activity or the project finish date.

Attributes

(also called columns or fields) are the data elements associated with an entity. columns fileds attributes

Biometrics

(narrowly defined) is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or hand-writing.

3 common customer relationship management metrics

- number of sales calls - number of marketing campaigns - number of new customers.

financial performance

- revenue recognition - cash flow -payment guarantees -credit rating -stack price

data mining uncovers patterns and trends for business analysis such as:

-Analyzing customer buying patterns to predict future marketing and promotion campaigns. -Building budgets and other financial information. -Detecting fraud by identifying deceptive spending patterns. -Finding the bet customers who spend the most money. -Keeping customers from leaving or migrating to competitors. -promoting and hiring employees to ensure success for both the company and the individual.

Examples of Info

-Best/worst selling product -Best/ worst customer

Value Chain Analysis—Executing Business Strategies

-Business Process -Value Chain Analysis

Transaction fees benefits

-Can be directly tied to savings(both process and price savings) -Important revenue source when high level of liquidity(transaction volume) is reached

License fee benefits

-Creates incentive to do many transactions -Customization and back-end integration lead to lock-in of participants.

Subscription fees benefits

-Creates incentives to do trans actions -Price can be differentiated -Possibility to build additional revenue from new user group

Value-added service fees challenges

-Cumbersome process for customers to continually evaluate new services.

Broad Market and high cost

-DIFFERENTIATION Neiman Marcus competes by offering a broad range of differentiated products at high prices. Its business strategy offers a variety of specialty and upscale products to affluent consumers.

Effective/ efficient SCM Systems allow orgs to:

-Decrease Buyer Power -Decrease threat of substitute products or services by increasing switching costs Decrease threat of new entrants by creating barriers -Increase its own supplier power. -Increase efficiencies while seeking a competitive advantage through cost leadership

Dirty data examples

-Duplicate data -Misleading data -Incorrect data -Non-formatted data -Violates business rules data -Non-integrated data -Inaccurate data

Process models purpose

-Expose process detail gradually and in a controlled manner. -Encourage conciseness and accuracy in describing the process model. -Focus attention on the process model interfaces. -Provide a powerful process analysis and consistent design vocabulary.

Narrow Market and low cost

-FOCUSED Payless competes by offering a specific product, shoes, at low prices. Its business strategy is to be the low-cost provider of shoes. Payless competes with Walmart, which also sells low-cost shoes, by offering a far bigger selection of sizes and styles.

Narrow market and high cost

-FOCUSED Tiffany & Co. competes by offering a differentiated product, jewelry, at high prices. Its business strategy allows it to be a high-cost provider of premier designer jewelry to affluent consumers.

Subscription fees challenges

-Fixed fee is a barrier to entry for participants

CRM Enables org to:

-Identify types of customers -Design individual customer marketing campaigns -Treat each customer as an individual -Understand customer buying behaviors

Understand and govern PII by:

-Identifying all sources of created, received, maintained, or transmitted PII. -Evaluating all external sources of PII. -Identifying all human, natural, and environmental threats to PII.

Transaction fees challenges

-If process savings are not completely visible, use of the system is discouraged(incentive to move transactions offline) -Transaction fees likely to decrease with time

Methods for gathering business requirements

-JAD -Interview individuals to determine current operations and current issues. -Compile questionnaires to survey employees to discover issues. -Make observations to determine how current operations are performed. -Review business documents to discover reports, policies, and how information is used throughout the organization.

Advertising fees challenges

-Limited revenue potential -Overdone or poorly targeted advertisements can be disturbing elements of the website.

Examples of data

-Order date -amount sold -Customer number -Quantity ordered -Profit

The production planning process

-Sales forecasting -operations planning -detailed scheduling to production -OR materials requirement planning to purchasing

Business Process Reengineering (BPR)

the analysis and redesign of workflow within and between enterprises

Value-added service fees benefits

-Service offering can be differentiated -Price can be differentiated -Possibility to build additional revenue from establishing and new users groups(third parties)

1G 2G 3G 4G 5G

-The original analog cell phone network (14.4Kbps) -Digital cell phone service (10Kbps-144Kbps) -Broadband Internet services over cellular networks, added MMS or picture message services(144Kbps- 4Mbps) -High-speed access, anywhere, anytime, to anything digital-audio, video, text and improved video transmissions(100 Mbps) -Superior data communication rate and expected to provide artificial intelligence capabilities on wearable devices(1.5Gbps over a distance of 90 meters)

Business process characteristics

-The processes have internal and external users -A process is cross-departmental -The processes occur across organizations -The processes are based on how work is done in the organization -Every process should be documented and fully understood by everyone participating in the process -Processes should be modeled to promote complete understanding

License fee challenges

-Up-front fee is a barrier to entry for participants. -Price differentiation is complicated.

Decreasing Supplier Power

-Using MIS to find alternative products-->use internet to find alternative -use MIS to form groups or collaborate with other buyers, increasing the size of the buyer group and reducing supplier power

Advertising fees benefits

-Well targeted advertisements can be perceived as value-added content by trading participants. -Easy to implement.

Ways that companies duplicate competitive advantages

-acquiring the new technology -copying the business operations -hiring away key employees

hardware

-central process unit (CPU) -brain -input devices -Keyboard; mouse; scanner -output device -Monitor; printer; headphones -storage device- DVD; memory stick; hard drive -communication device- Modem; wireless card -connection device- Cables; USB port

revenue

-direct loss -compensatory payments -loss future revenue -billing losses -investment losses -lost productivity

advantages of future ERP systems

-drive cost efficiencies -faster time to market -better enable mobile workforce -better leverage data to provide insights -new product development

Benefits of PRM

-expanded market coverage -offerings of specialized products and services -broadened range of offerings and a more complete solution

Ebusiness advantages

-expanding global reach -opening new markets -reducing costs -improving effectiveness

TCP/IP's four-layer reference model

1. Application Layer- serves as the window for users and application processes to access network services. 2. Transport Layer-handles end-to-end packet transportation. 3. Internet Layer- formats the data into packets, adds a header containing the packet sequence and the address of the receiving device, and specifies the services required from the network. 4. Network Interface Layer-Places data packets on the network for transmission.

There are FIVE principal Topologies used in LANs:

1. Bus 2. Star 3. Ring 4. Hybrid 5. Wireless

4 most common extended ERP components

1. Business Intelligence 2. Customer Relationship Management 3. Supply Chain Management 4. Ebusiness

Strategic initiatives for competitive advantage

1. Business Process Re engineering 2.Supply Chain Management 3.Customer Relationship Management 4.Enterprise Resource Planning

Porters Five Forces

1. Buyer power (power of cust to driv edown prices) 2. Supplier Power (Power of suppliers to drive up prices of materials) 3. Threat of Substitute products or services (The power of customers to purchase alternatives) 4. Threat of New Entrants (The power of comp. to enter a market) 5. Rivalry Among Exisiting Competitors (The power of comps)

Network operating systems are divided into two categories:

1. Client-server 2. Peer-to-peer

Digital Dashboard Analytical Capabilities

1. Consolidation 2. Drill-down 3. Slice-and-Dice 4. Pivot

Characteristics of Business 2.0

1. Content sharing through open sourcing 2. User-contributed content 3. Collaboration inside the organization 4. Collaboration outside the organization

3 features of a neural network

1. Coping w/ huge volumes of info w/ many dependent variables 2. Lending themselves to massive parallel processing 3. Learning and adjusting to new circumstances on their own

The most popular network protocols include:

1. Ethernet- used by 85% of world's LAN connected PCs and workstations 2. Transmission ControlProtocol/Internet Protocol (TCP/IP)- most common telecommunication protocol

TCP/IP Applications

1. File transfer protocol (FTP) 2. Simple mail transfer protocol (SMTP) 3. Hypertext transfer protocol (HTTP) 4. Simple network management Protocol (SNMP) Definitions Pg. 448

Features in a digital dashboard for a manufacturing team

1. List of KPIs 2. List of outstanding alerts 3. Graph of stock market prices.

Variable

A data characteristic that stands for the value that changes or varies overtime -ex. Price or quantity ordered-both can vary -MANIPULATING variables to look at hypothetical scenerios/ SEE HOW CERTAIN SCENERIOS EFFECT OUTCOMES

Transmitting and Receiving Devices include:

1. Network adapters 2. Modems 3. Repeaters 4. Wiring concentrators, hubs, and switches 5. Routers, Bridges, and Gateways

There're two primary types of network architectures:

1. Peer-to-peer (P2P) network 2. Client/server (C/S) network

4 thing included in a Network

1. Protocol- a set of communication rules to make sure that everyone speaks the same language 2. Network interface card (NIC) 3. Cable 4. Hub(switch or router)

Three most common types of wired media:

1. Twisted-pair wiring 2. Coaxial Cable 3. Fiber optic Cable

Four Common Characteristics of Big Data

1. Variety -Difference forms of structured and unstructured data -Data from spreadsheets and databases as well as from email, videos, photos, and PDFs, all of which must be analyzed 2. Veracity - the uncertainty of data, including biases, noise, abnormalities -Uncertainty or trustworthiness of data -Data must be meaningful to the problem being analyzed -Must keep data clean and implement processes to keep dirty data from accumulating in systems. 3. Volume - the scale of data -Includes enormous volumes of data generated daily -Massive volume created by machines and networks. -Big data tools necessary to analyze zettabytes and brontobytes. 4. Velocity - analysis of streaming data as it travels the internets -Analysis necessary of social media messages spreading globally.

Learning Outcomes

2.1. Explain why competitive advantages are temporary. 2.2. Describe Porter's Five Forces Model and explain each of the five forces. 2.3. Compare Porter's three generic strategies. 2.4. Demonstrate how a company can add value by using Porter's value chain analysis.

What freshmen learn is

50% obsolete, revised or taken for granted by senior year

802.11a 802.11b 802.11g 802.11n

54Mbs 11Mbs 54Mbs 140Mbs

Modem

A device that enables a computer to transmit data over telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone or cable lines is transmitted in the form of analog waves. A modem converts between these two forms

RFID accelerometer

A device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds

cookie

A small file on a hard drive by a website, containing info about customers and their browsing activities

Personal digital assistant (PDA)

A small handheld computer that performs simple tasks such as taking notes, scheduling appointments, and maintaining an address book and a calendar. The PDA screen is touch-sensitive, allowing a user to write directly on the screen, capturing what is written.

Geocoding

A spatial databases coding process that assigns a digital map feature an attribute that serves as a unique ID or classification

Executive information system

A specialized DSS that supports senior level executives within the organization

project

A temporary activity a company undertakes to create a unique product, service, or result

Web 1.0

A term to refer to the WWW during its first few years of operation between 1991 and 2003

Online analytical processing

the manipulation of info to create business intelligence in support of strategic decision making.

Ebusiness revenue models

Advertising fees License fees Subscription fees Transaction fees Value-added service fees

Project Objectives

Among the most important areas to define because they are essentially the major elements of the project. Must include metrics so the project's success can be measured (cost, schedule, quality). Criteria: Specific Measurable Agreed upon Realistic Time frame

Project deliverable

Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project. Examples of project deliverables include design documents, testing scripts, and requirements documents.

The NOS is the...

BRAIN of the entire network

Supply Chain Metrics

Back order Inventory cycle time Customer order cycle time Inventory turnover

Supply chain management metrics

Back order: an unfulfilled customer order due to insufficient stock level Customer order promised cycle time: anticipated/agreed upon cycle time of a purchase order Customer order actual cycle time: the avg time it takes to actually deliver order Inventory replenishment cycle time: measure the manufacturing cycle time + time to deploy product to distribution center Inventory turnover: # of times a company's inventory cycles or turns over per year

Web 3.0

Based on "intelligent" Web applications using natural language processing, machine-based learning and reasoning, and intelligence applications

Contact Information in Operational Systems

Billing, customer service, marketing, sales

3-D printing materials

Biological 3-Dprining

Types of Application Software

Browser, Data management, Desktop publishing, Email, Groupware, Presentation graphics, Programming, Spreadsheet, Word processing Definitions found on Pg. 396

Banner ad

Box running across a web page that contains advertisements

Extreme Programming (XP)

Breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete.

Extreme Programming (XP) Methodology

Breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete.

The Three Generic Strategies—Choosing a Business Focus

Business strategies for entering a new market (1) broad cost leadership, (2) broad differentiation, (3) focused strategy -->Broad strategies reach a large market segment, while focused strategies target a niche or unique market with either cost leadership or differentiation **ADOPT ON 1 OF 3

Analyzing Airline industry using 5 forces

Buyer power: Buyer power is high because customers have many airlines to choose from and typically make purchases based on price, not carrier. Supplier power: Supplier power is high since there are limited plane and engine manufacturers to choose from, and unionized workforces (suppliers of labor) restrict airline profits. Threat of substitute products or services: The threat of substitute products is high from many transportation alternatives including automobiles, trains, and boats, and from transportation substitutes such as videoconferencing and virtual meetings. Threat of new entrants: The threat of new entrants is high because new airlines are continuously entering the market, including sky taxies offering low-cost on-demand air taxi service. Rivalry among existing competitors: Rivalry in the airline industry is high, and websites such as Travelocity.com force them to compete on price (see Figure 2.5).11

Challenge- DEPRATMENTAL COMPANIES

Companies typically are organized in diff departments such as accounting, finacne, HR, Marketing, OM and Sales

Health care

Compare the demographics of patients with critical illnesses

handheld (ultra portable,pockect computer )

Computer portable enough to fit in a purse or pocket and has its own power source

laptop

Computer portable enough to fit on a lap or in a bag and has its own power source or battery. Laptops come equipped with all of the technology that a personal desktop computer has, yet weigh as little as two pounds

three advantages of a data-driven website

Easy to manage content: Website owners can make changes without relying on MIS professionals; users can update a data-driven website with little or no training. Easy to store large amounts of data: Data-driven websites can keep large volumes of information organized. Website owners can use templates to implement changes for layouts, navigation, or website structure. This improves website reliability, scalability, and performance. Easy to eliminate human errors: Data-driven websites trap data-entry errors, eliminating inconsistencies while ensuring all information is entered correctly.

Tangible Benefits

Easy to quantify and typically measured to determine the success or failure of a project. Ex: Decreased expenses, decreased response time, increased quality, Decreased processing errors, and Increased quantity or sales.

Information system control report

Ensures the reliability of information, consisting of policies and their physical implementation, access restrictions, or record keeping of actions and transactions

Business Understanding Phase

Gain a clear understanding of the business problem that must be solved and how it impacts the company

RAD Fundamentals

Fundamentals of RAD include: Focus initially on creating a prototype that looks and acts like the desired system, Actively involve system users in the analysis, design, and development phases, Accelerate collecting the business requirements through an interactive and iterative construction approach.

Business Intelligence (BI)

Information collected from multiple sources such as suppliers, customers, competitors, partners and industries that analyzes patters, trends and relationships for strategic decision making -manipulates multiple variables and in some cases even hundreds of variables including such items as interest rates, weather conditions, and even gas prices -Used to anyalze internal and external data -->ex.BI can predict inventory requirements for Tony's business for the week before the Super Bowl if, say, the home team is playing, average temperature is above 80 degrees, and the stock market is performing well.

Disadvantages of Outsourcing

Length of contract (difficult to break, forecasting is difficult, re-creating an internal MIS department is difficult). Threat to competitive advantage (outsourcer could share a company's trade secrets). Loss of confidentiality (potential risks and costs of a breach)

SCM Business Process 2

Materials are transformed into semifinished and finished products-the organization's own production processes.

SCM Business Process 1

Materials flow from suppliers and their upstream suppliers at all levels.

Effectiveness MIS metrics

Measures the impact MIS has on business processes and activities, including customer satisfaction and customer conversation rates 1. Usability 2. Customer Satisfaction 3. Conversion Rates 4. Financial

Reasons for growth of the WWW

Microcomputer revolution Advancements in networking Easy browser software Speed, convenience, and low cost of email Web pages easy to create and flexible

Hewlett-Packard

Microprocessor-based computers; ink-jet printers

IBM

Minicomputers; personal computers

Factors used to appraise supplier power

Number of suppliers, size of suppliers, uniqueness of services, availability of substitute products

gigahertz

One billion cycles per second

The four primary reasons for low-quality information are:

Online customers intentionally enter inaccurate information to protect their privacy. Different systems have different information entry standards and formats. Data-entry personnel enter abbreviated information to save time or erroneous information by accident. Third-party and external information contains inconsistencies, inaccuracies, and errors.

Rational Unified Process (RUP)

Owned by IBM, provides a framework for breaking down the development of software into four gates. Gate One: Inception, Gate Two: Elaboration, Gate Three: Construction, Gate Four: Transition

Arithmetic Logic Unit (ALU)

Performs all arithmetic operations (for example, addition and subtraction) and all logic operations (such as sorting and comparing numbers)

Technology

Predict hardware failures.

Retail

Predict sales, inventory levels, and distribution.

SCM Business Process 3

Products are distributed to customers and their downstream customers at all levels.

Services

Tasks performed by people that customers will buy to satisfy a want or a need-INTANGIBLE

Password Construction Guidelines

Require all employees to use password authentication to access their computers, the corporate network, and email.

Acceptable Use Policy (AUP)

Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet

Chief Security Officer (CSO)

Responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers/viruses

Chief Technology Officer (CTO)

Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT

Sales and operational CRM technology

Sales management, contact management, opportunity management

Password Protection Policy

Set computer passwords to expire every 90 days.

Middleware

Several different types of software that sit between and provide connectivity for two or more software applications

Tier 3

Small Business-Exact Globe, Syspro, NetSuite, Consona

Computer Categories

Smartphone/Personal digital assistant (PDA) Handheld/Ultra-Portable/Pocket Computer Laptop/Notebook/Portable Computer/Netbook Tablet Computer Personal/Desktop Computer Workstation /Minicomputer Mainframe computer Supercomputer Definitions found of Pg. 393

SMART

Specific, Measurable, Agreed Upon, Realistic, Time Frame

Financial

Such as return on investment (the earning power of an organization's assets), cost-benefit analysis (the comparison of projected revenues and costs including development, maintenance, fixed, and variable), and break-even analysis (the point at which constant revenues equal ongoing costs).

Blog example

Sweet Leaf Tea, Stoneyfield Farm

Internet protocol version 6 (IPv6)

The "next generation" protocol designed to replace the current version Internet protocol, IP version 4 (IPv4).

The Digital Mesh

The Device Mesh, Ambient User Experience, 3-D printing materials

Information security line of defense

The First Line of Defense-People The Second Line of Defense-Technology The top 20 percent of their customers usually produce 80 percent of the revenues.

Hypertext Transport Protocol

The Internet protocol Web browsers use to request and display Web pages using URL - universal resource locator

Advanced encryption standard (AES)

The National Institute of Standards and Technology (NIST) introduced __________ designed to keep government information secure.

Data Marts long description

The data warehouse modeled in the figure compiles information from internal databases or transactional/operational databases and external databases through ETL. It then sends subsets of information to the data marts through the ETL process.

poor data quality

The data, if available, were often incorrect or incomplete. Therefore, users could not rely on the data to make decisions

Technologies with the potential to change the world

The digital mesh, Smart machines, the new IT reality,

Supercomputer

The fastest, most powerful, and most expensive type of computer. Organizations such as NASA that are heavily involved in research and number crunching employ supercomputers because of the speed with which they can process information. Other large, customer-oriented businesses such as General Motors and AT&T employ supercomputers just to handle customer information and transaction processing.

Web 2.0 (Business 2.0)

The next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free.

System Development Life Cycle (SDLC)

The overall process for developing information systems from planning and analysis through implementation and maintenance

Project Management

The science of making intelligent trade-offs between time, cost, and scope. Provides a controlled way to respond to changing market conditions, to foster global communications, and to provide key metrics to enable managerial decision making.

Gate one: inception

This phase ensures all stakeholders have a shared understanding of the proposed system and what it will do.

Gate Two: Elaboration

This phase expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it.

The Triple Constraint

Time, cost and scope. If any one changes, at least one other is likely to be affected.

Value Chain Analysis

To ID competitive advantages-which views a firm as a series of business processes that each add value to the product or service.

Decrypt

To ___ information is to decode it and is the opposite of encrypt

Reasons to watch trends

Trend analysis, trending monitoring, trend projection, computer simulation, historical analysis

trend monitoring

Trends viewed as particularly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers.

Legal Feasibility

Type of feasibility. Measures how well a solution can be implemented within existing legal and contractual obligations.

Operational Feasibility

Type of feasibility. Measures how well a solution meets the identified system requirements to solve the problems and take advantage of opportunities.

Political Feasibility

Type of feasibility. Measures how well the solution will be accepted in a given organization.

Technical Feasibility

Type of feasibility. Measures the practicality of a technical solution and the availability of technical resources and expertise.

Schedule Feasibility

Type of feasibility. Measures the project's time frame to ensure it can be completed on time.

Longer life expectancy in

U.S., U.K., Germany, France, Italy, Canada, Japan

BPMN gateway

Used to control the flow of a process. Handles the forking, merging and joining of paths within a process. Represented by a diamond shape in a business process model.

What do users need to do with ethical computer use policy?

Users should be informed of the rules and, by agreeing to use the system on that basis, consent to abide by them.

Voice over IP (VoIP)

Uses IP technology to transmit voice calls over long-distance telephone lines

Primary Value Activities

acquire raw materials and manufacture, deliver, market, sell, and provide after-sales services. -Inbound logistics -Operations -Outbound logistics -Marketing and sales -Service:

Inbound logistics

acquires raw materials and resources and distributes to manufacturing as required

Inbound Logistics

acquires raw materials and resources and distributes to manufacturing as required.

Materials Management

activities that govern the flow of tangible, physical materials through the supply chain such as shipping, transport, distribution, and warehousing

Mashup Editors

are WYSIWYG, or what you see is what you get tools. They provide a visual interface to build a mashup, often allowing the user to drag and drop data points into a web application

Time bombs

are computer viruses that wait for a specific date before executing their instructions.

Bugs

are defects in the code of an information system

hacker

are experts in technology who use their knowledge to break into computers and computer networks, either for profit or simply for the challenge.

slogs (spam blogs)

are fake blogs created solely to raise the search engine rank of affiliated website. even blogs that are kegitiament are plagued by spam with spammers taking advantage of the comments features of most blogs to moment with link to spam sites

knowledge workers

are individuals valued for their ability to interpret and analyze information

adaptive computer device

are input devices designed for special applications for use by people with different types of special needs.

Busienss Facing Processes (Back office Processes)

are invisible to the external customer but essential to the effective management of the business; -goal setting, -day-to-day planning, -giving performance feedback and rewards, -allocating resources

Data models

are logical data structures that detail the relationships among data elements using graphics or pictures.

goods

are material items or products that customers will buy to satisfy a want or need

algorthms

are mathematical formulas placed in software that performs an analysis on a data set.

data

are raw facts that describe the characteristics of an event or an object

relational integrity constraints

are rules that enforce basic and fundamental information-based constraints.

integrity constraints

are rules that help ensure the quality of information.

Tokens

are small electronic devices that change user passwords automatically. The user enters his or her user ID and token-displayed password to gain access to the network.

services

are tasks performed by people that customers will buy to satisfy a want or need

best practices

are the most successful solutions or problem-solving methods that have been developed by a specific organization or industry.

ethics and security

are the two fundamental blocks on which organization base their businesses

Intelligent systems

are various commercial applications of artificial intelligence

Structured decisions

arise in situations where established processes offer potential solutions. - Made often and repetitive, affect short-term business strategies. Ex: reordering inventory, creating employee staffing schedules, creating weekly production schedules.

second generation

assembly language difficult for people to understand

Alpha testing

assess if the entire system meets the design requirements of the users

Benchmarks

baseline values the system seeks to attain

Transaction processing system (TPS)

basic business system that serves the operational level (analysts) and assists in making structured decisions.

webconferencing (webinar)

blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants

black - hat hacker

break into people computer system may look around or still information

Forms of B2C Operations

brick-and-mortar click-and-mortar pure play

online marketplaces

bring together buyers and sellers of products and services; ex. Amazon.com, eBay.com

testing phase

brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase

Most hubs and all concentrators and switches have...

built-in signal. repairing capability to perform signal repair and retransmission

Snackable content

content that is designed to be easy for readers to consume and to share. Captures website visitors' attention by offering small consumable pieces of information that can be quickly read and understood.

system software

controls how the various technology tools work together along with the application software

operating system software

controls the application software and manages how the hardware devices work together.

Podcasting

converts an audio broadcast to a digital music player

Switching costs

costs that make customers reluctant to switch to another product or service. -->Switching costs include financial as well as intangible values -MIS, however, patients can store their medical records on DVDs or thumb drives, allowing easy transferability.

Hitbots

create the illusion that a large number of potential customers are clicking the advertiser's links when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser.

User-contributed content

created and updated by many users for many users

critical success factors

crucial steps companies perform to achieve their goals and objectives and implement their strategies 1. create high quality products 2. retain competitive advantages 3. reduce product costs 4. increase customer satisfaction 5. hire and retain the best business professionals.

damaged reputation

customers, suppliers, financial markets, banks, business partners

Reports, Documents, Forms

customization to reports, documents, and forms can consist of simple layout or design changes or complex logic programming rules for specific business requirements

Automation could

cut costs of products and still increase profits

Integrations

data integration is key for business process support that spans functional areas and legacy systems

Quality management cost of Accurate and complete information

data points are information x-axis is information accuracy ranging from 0 to 100% y-axis is information completeness ranging from 0 to 100% cost of information has a positive, linear slope of 1

finance

deals with strategic financial issues including money, banking, credit, investments, and assets

physical view of information

deals with the physical storage of information on a storage device.

outbound logistics

distributes goods and services to customers

Outbound Logistics

distributes goods and services to customers.

customer segmentation

divides a market into categories that share similar attributes such as age, location, gender, habits, and so on

passive RFID tags

do not have a power source

Medical knowledge

doubles every 8 years

mobile entertainment

downloads for music, videos, games, voting, ring tones, as well as text-based messaging services.

Strategic business processes

dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions

defines the relationship between entities and attributes in a relational database

each attribute of an entity occupies a separate column of a table

Computer Network

each computer in the supply chain recognizes the EPC and pulls up info related to the item, such as dates made and shipped, price, and directions for use, from a server maintained by the manufacturer. The computers track the item's location throughout the supply chain

Ebusiness components

elogistics and eprocurement

What does a social media policy contain?

employee, corporate, and personal social network policies

At the managerial level (semistructured decisions),

employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to and leverage change

At the operational level (unstructured decisions),

employees develop, control, maintain core business activities required to run the daily operations

Telecommunication systems

enable the transmission of data over public or private networks

System restore

enables a user to return to the previous operating system.

system restore

enables a user to return to the previous operating system.

Supply chain event management (SCEM)

enables an organization to react quickly to resolve supply chain issues; SCEM software increases real-time info sharing among partners and decreases their response time to unplanned events

site user license

enables any qualified users within the organization to install the software, regardless of whether the computer is on a network. Some employees might install the software on a home computer for working remotely.

network user license

enables anyone on the network to install and use the software.

Wireless Access Point (WAP)

enables devices to connect to a wireless network to communicate with each other

Drill-down

enables users to view details , and details of details, of information. The reverse of consolidation. Lets managers view monthly/weekly/daily/hourly info

Firewall

hardware and/or software that guards a private network by analyzing incoming and outgoing information for the correct markings. If they are missing, the ___ prevents the information from entering the network. ___ can even detect computers communicating with the Internet without approval. ___ do not guarantee complete protection, and users should enlist additional security technologies such as antivirus software and anti spyware software.

Billing system

has "accounts payable" customer contact information

marketing and sales system

has "decision maker" customer contact information

structured data

has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address

customer service system

has the "product user" customer contact information

hacker

have criminal intent when hacking

workshop training

held in a classroom environment and led by an instructor

CRM Prdeicting Technologies

help organizations predict customer behavior, such as which customers are at risk of leaving. -Asking what will happen -What cistomers are at risk of leaving? Which products will our customers buy? How will we reach our customers?

CRM Analysis Technologies

help organizations segment their customers into categories such as best and worst customers -Asking why it happened -Why did sales not meet forecasts? -Why was production low? -WHo are out customers?

Content Management System (CMS)

helps companies manage the creation, storage, editing, and publication of their website content

Collaborative demand planning

helps organizations reduce their investment in inventory, while improving customer satisfaction through product availability

crash-proof

helps save information if a computer crashes

query-by-example (QBE) tool

helps user graphically design the answer to a question against a database? that helps users graphically design the answer to a question against a database.

Trojan Horse Virus

hides inside other software, usually as an attachment or a downloadable file

5. Rivalry Among existing COmpetitiors

high when competition is fierce in a market and low when competitors are more complacent

4. Threat of New Entrants

high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market

3. Threat of Substitute Products or Services

high when there are many alternatives to a product or service and low when there are few alternatives from which to choose

user documentation

highlights how to use the system and how to troubleshoot issues or problems

Consulting fees

hiring external experts to help implement the system correctly can cost millions of dollars

historical anaylsis

historical events are studied to anticipate the outcome of current developments

Where has the business been?

historical perspective offers important variables for determining trends and patterns

software upgrade

occurs when the software vendor releases a new version of the software, making significant changes to the program.

Spatial data (geospatial data or geographic information)

identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, GIS accesses, manipulates, and analyzes spatial data

Authentication and Authorization technologies can prevent

identity theft, phishing, and pharming scams

Customization

if the software package does not meet all of the company's needs, customizing the software may be required

data flow diagram (DFD)

illustrates the movement of information between external entities and the processes and data stores within the system

Digital Darwansim

implies that that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction

Streamlining

improves business process efficiencies by simplifying or eliminating unnecessary steps

Enterprise Resource Planning (ERP)

integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make decisions by viewing enterprisewide information on all business operations. If one department implements new system, Correlating this data would be difficult, and the inconsistencies would cause numerous reporting errors from an enterprisewide perspective. **takes data from across the enterprise, consolidates and correlates the data, and generates enterprisewide organizational reports

Business process management (BPM)

integrates all of an organization's business process to make individual processes more efficient. BPM can be used to solve a single glitch or to create one unifying system to consolidate a myriad of processes.

Metropolitan Area Network (MAN)

interconnects users in geographic area or region larger than a local area network, but smaller than a wide area network

control unit

interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions

Information integration examples

inventory visibility, performance metrics, event monitoring, business intelligence, scorecards, dashboards

Process modeling

involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment

identity management

is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to Page 110 resources within that system by associating user rights and restrictions with the established identity.

information security

is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization. Information security is perhaps the most fundamental and critical of all the technologies/disciplines an organization must have squarely in place to execute its business strategy.

data artist

is a business analytics specialist who uses visual tools to help people understand complex data.

management information systems (MIS)

is a business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making and problem solving

Management Information Systems (MIS)

is a business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making and problem solving. -incorporates systems thinking to help companies operate cross-functionally -If one part of the company is experiencing problems, however, then, the entire system fails *Does not equal or represent bsuiness success

big data

is a collection of large complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools

system

is a collection of parts that link to achieve a common purpose

cluster analysis

is a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible.

Digital right management

is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

Certificate Authority

is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates

complete

is a value missing from the information ? is the address complete including street, city, state, and zip code ?

snapshot

is a view of data at a particular moment in time

systems thinking

is a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part

computer

is an electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data.

patent

is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

magnetic tape

is an older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium.

Web Real-Time Communications (WebRTC)

is an open source project that seeks to embed real-time voice, text, and video communications capabilities in web browsers.

Cyberwar

is an organized attempt by a country's military to disrupt or destroy information and communication systems for another country.

machine-generated data

is created by a machine without human intervention o includes sensor data, point-of-sale data, and web log data

information

is data converted into a meaning and useful context

human-generated data

is data that humans, in interaction with computers, generate o includes input data, click-stream data, or gaming data

War Driving

is deliberately searching for Wi-Fi signals while driving by in a vehicle

unique

is each transaction and event represented only once in the information ? ex; are there any duplicate customers?

input device

is equipment used to capture information and commands. A keyboard is used to type in information, and a mouse is used to point and click on buttons and icons.

output device

is equipment used to see, hear, or otherwise accept the results of information processing requests.

communication device

is equipment used to send information and receive it from one location to another.

Business Intelligence (BI)

is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decisions making

intellectual property

is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

unstructured data

is not defined and does not follow a specific format and is typically free-form text such as emails, Twitter tweets, and text messages o accounts for 80% of the data that surrounds us

spyware

is software that comes hidden in free downloads software and tracks online movement, mines the information stored on a computer, or used a computers CPU and storage for some task the user knows about.

counterfeit software

is software that is manufactured to look like the real thing and sold as such.

adware

is software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user

virus

is software written wit malicious intent to cause annoyance or damage.

Machine Vision

is the ability of a computer to "see" by digitizing an image, processing the data it contains, and taking some kind of action.

Machine vision sensitivity

is the ability of a machine to see in dim light or to detect weak impulses as invisible wavelengths.

Workflow control systems

monitor processes to ensure tasks, activities, and responsibilities are executed as specified

Ineffective Direct Data Access

most data stored in operational databases did not allow users direct access; users had to wait to have their queries or questions answered by MIS professionals who could code SQL

Data warehouse integration and data conversions

moving data from an old system into the new ERP system

Wireless (Unguided) Media

natural parts of the Earth's environment that can. be used as physical paths to carry electrical signals Ex: radio waves, microwaves, infrared light waves

topology

networks are assembled according to certain rules. A topology refers to the physical arrangement of the computers and other network devices in a network

Internet Corporation for Assigned Names and Numbers (ICANN)

nonprofit org that has assumed the responsibility for Internet Protocol (IP) address space allocation, protocol parameter assignment, domain name system management, and root server system management functions previously performed under the U.S. gov't contract

word length

number of bits (0s and 1s) that can be processed by the CPU at any one time. Computers work in terms of bits and bytes using electrical pulses that have two states: on and off.

Payback Method

number of years to regain the cost of an initiative based on projected annual net cash flow

Bottlenecks

occur when resources reach full capacity and cannot handle any additional demands; they limit throughput and impede operations

software update ( software patch)

occur when the software vendor releases updates to software to fix problems or enhance features

Unstructured decisions

occurring in situations in which no procedures/rules exist to guide decision makers toward the correct choice. Ex: entering a new market or industry

safe mode

occurs if the system is failing and will load only the most essential parts of the operating system and will not run many of the background operating utilities.

Disintermediation

occurs when a business sells directly to the customer online and cuts out the intermediary

First-Mover advantage

occurs when a company can significantly increase its market share by being first with a new competitive advantage ex.FedEx created a first-mover advantage by developing its customer self-service software, which allows people to request parcel pickups, print mailing slips, and track parcels online

Product Differentiation

occurs when a company develops unique differences in its products or services with the intent to influence demand. -Companies can use differentiation to reduce rivalry

data gap analysis

occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where missing data might exist

paradigm shift

occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave

Real-time communication

occurs when a system updates information at the same rate it receives it

Content filtering

occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information.

Edge matching (warping, rubber sheeting)

occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match

information inconsistency

occurs when the same data element has different values.

Customer Relationship management components

provide an integrated view of customer data and interactions allowing organizations to work effectively with customers and be more responsive to their needs -ex. contact centers, sales force automation, and marketing functions

Memory sticks

provide nonvolatile memory for a range of portable devices including computers, digital cameras, cell phones, and PDAs.

real-time system

provide real-time information in response to requests.

real-time system

provide real-time information in response to requests. Many organizations use real-time systems to uncover key corporate transactional information.

infomediaries

provide specialized information on behalf of producers of goods and services and their potential customers; ex. Edmunds.com, BizRate.com, Zillow.com

utility software

provides additional functionality to the operating system. Utility software includes antivirus software, screen savers, and anti-spam software.

Personal Area Network (PAN)

provides communication for devices owned by a single user that work over a short distance

metadata

provides details about data

HR Management

provides employee training, hiring, and compensation.

Employee relationship management (ERM)

provides employees with a subset of CRM applications available through a web browzer

Hypertext Markup Language (HTML)

publishes hypertext on the WWW, which allows users to move from one document to another simply by clicking a hot spot or link

Procurement

purchases inputs such as raw materials, resources, equipment, and supplies.

Software Costs

purchasing the software can cost millions of dollars for a large enterprise

Project Objectives

quantifiable criteria that must be met for the project to be considered a success

Operational business processes

static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes

Reintermediation

steps are added to the value chain as new players find ways to add value to the business process

Artificial intelligence

stimulates human thinking and behavior, such as the ability to reason and learn

entity

store information about a person, place, thing, transaction, or event.

relational database model

stores information in the form of logically related two-dimensional tables.

Cloud Computing

stores, manages, and processes data and applications over the internet rather than on a personal computer or server

Geographic Information System (GIS)

stores, views, and analyzes geographic data, creating multidimensional charts or maps

Planning and control supply chain integration examples

supply chain planning, collaborative product development, integrated demand and supply management

Analytical CRM

supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers

Off-the-shelf application software

supports general business processes and does not require any specific software customization to meet the organization's needs

marketing

supports sales by planning, pricing, and promoting goods or services

Knowledge management system (KMS)

supports the capturing, organization, and dissemination of knowledge throughout an organization

Operational CRM

supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers

CRM and customer communication

system tracks every communication between the customer and the organization and provides access to CRM information within different systems from accounting to order fulfillment. -Understanding all customer communications allows the organization to communicate effectively with each customer.

development phase

takes all the detailed design documents from the design phase and transforms them into the actual system

forward integration

takes information entered into a given system and sends it automatically to all downstream systems and processes.

backward integration

takes information entered into a given system and sends it automatically to all upstream systems and processes

physical security

tangible protection such as alarms, guards, fireproof doors, fences, and vaults

opportunity management CRM systems

target sales opportunities by finding new customers or companies for future sales

Mobile

technology can travel with the user

other expenses

temporary employees, equipment rentals, overtime costs, extra shipping charges, travel expenses, legal obligations

Development testing

test the system to ensure it is bug-free

Testing

testing that all functionality works correctly along with testing all integrations

strutted query language (SQL)

that asks users to write lines of code to answer questions against a database.

Slice-and-Dice

the ability to look at information from different perspectives. - Open slice of info could display all product sales during a given promo, another could display a single product's sales for all promos.

Click fraud

the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser

information compliance

the act of confirming , acquiescing o yield information

Business process reengineering (BPR)

the analysis and redesign of workflow within and between enterprises. BPR relies on a different school of thought than continuous process improvement. In the extreme, BPR assumes the current process is irrelevant, does not work, or is broken and must be overhauled from scratch. Such a clean slate enables business process designers to disassociate themselves from today's process and focus on a new process.

IT consumerization

the blending of personal and business use of technology devices and applications

Eprocurement

the business-to-business (B2B) online purchase and sale of supplies and services over the Internet

Ecommerce

the buying and selling of goods and services over the internet

loose coupling

the capability of services to be joined on demand to create composite services or disassembled just as easily into their functional components

Interoperability

the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers

data aggregation

the collection of data from various sources for the purpose of data processing

access point (AP)

the computer or network device that serves as an interface between devices and the network

fact

the confirmation or validation of an event or object

HTML 5

the current version of HTML delivers everything from animation to graphics and music to movies; it can also be used to build complicated web applications and works across platforms, including a PC, tablet, smartphone, or smart TV

Open technologies

the design of websites and other software so they can be easily integrated and work together

MIS skills gap

the difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies

chip line width

the distance between transistors on a chip. The shorter the chip line width the faster the chip since more transistors can be placed on a chip and the data and instructions travel short distances during processing.

cybervandalism

the electronic defacing of an existing website

information granularity

the extent of details within the information

information accuracy

the extent to which a system generates the correct results when executing the same transaction numerous times

Analysis Phase

the firm analyzes its end-user business requirements and refines project goals into defined functions and operations of the intended system

Inventory turnover

the frequency of inventory replacement

Network Adapter

the hardware installed in computers that enables them to communicate on a network

Stickiness (visit duration time)

the length of time a visitor spends on a website

data stewardship

the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner

Network Interface Card (NIC)

the most common network adapter that is designed to be installed directly into a standard expansion slot inside a PC

Code Modifications

the most expensive customization occurs when application code is changed and should only be done if the code changes provide specific competitive advantages

IEEE 802.11n (or Wireless-N)

the newest standard for wireless networking

Conversion rate

the number of customers an organization "touches" for the first time and persuades to purchase its products or services Useful for evaluating pop-ups, banners.

system availability

the number of hours a system is available for users

implementation phase

the organization places the system into production so users can begin to perform actual business operations with it

Transmission Media (Medium)

the physical path that is used carry a signal between a signal transmitter and a signal receiver

Astroturfing

the practice of artificially stimulating online conversation and positive reviews about a product, service, or brand.

Social Networking

the practice of expanding your business and/or social contacts by constructing a personal network

master data management (MDM)

the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems

data mining

the process of analyzing data to extract information not offered by the raw data alone

Clickstream analytics

the process of collecting, analyzing, and reporting aggregate data about which pages a website visitor visits-and in what order.

requirements management

the process of managing changes to the business requirements throughout the project

social media monitoring

the process of monitoring and responding to what is being said about a company, individual, product, or brand

data replication

the process of sharing information to ensure consistency between multiple data sources

Mutation

the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome

Market share

the proportion of the market that a firm captures

Open ID

the provision of an online identity that can be easily carried to a variety of devices (cell phones, PCs) allowing for easy authentication across different websites

Procurement

the purchasing of goods and services to meet the needs of the supply chain

Productivity

the rate at which goods and services are produced based upon total output given total inputs

Internal Rate of Return (IRR)

the rate at which the net present value of an investment equals zero

Cartography

the science and art of making an illustrated map or chart

Taxonomy

the scientific classification of organisms into groups based on similarities of structure or origin

bus width

the size of the internal electrical pathway along which signals are sent from one part of the computer to another. A wider bus can move more data, hence faster processing.

clock speed

the speed of the internal clock of a CPU that sets the pace at which operations proceed within the computer's internal processing circuitry.

Long tail

the tail of a typical sales curve

inventory cycle time

the time it takes to manufacture a product and deliver it to the retailer

response time

the time it takes to respond to user interactions such as a mouse click

Cycle time

the time required to process an order, is a common KPI for operations management

Sock puppet marketing

the use of a false identity to artificially stimulate demand for a product, brand, or service.

Intelligent applications

the use of agents, machine learning, and semantic web concepts to complete intelligent tasks for users

Robotic Process Automation (RPA)

the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks previously required a human to perform.

sign-off

the users' actual signatures indicating they approve all of the business requirements

Augmented reality

the viewing of the physical world with computer-generated layers of information added to it

Gate Three: Construction

this phase includes building and developing the product

Digital Line Subscriber (DSL)

this technology uses the unused digital portion of a regular copper telephone line to transmit and receive information. A special modem and adapter card are required.

forecasting model

time series information is time-stamped information collected at a particular frequency. Forecasts are predictions based on time-series information allowing users to manipulate the time series for forecasting activities

Shortened

time-to market for products and services

Primary purpose of a data warehouse

to aggregate information throughout an organization into a single repository for decision-making purposes

Goal of VCA

to identify processes in which the firm can add value for the customer and create a competitive advantage for itself, with a cost advantage or product differentiation.

computer-aided software engineering (CASE)

tools are software suites that automate systems analysis, design, and development.

business intelligence dashboard

track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls, allowing users to manipulate data for analysis.

Human resource erp components

track employee information including payroll, benefits, compensation, and performance assessment and ensure compliance with all laws

Digital dashboard

tracks key performance indicators (KPIs) and critical success factors (CSFs) by compiling information from multiple sources and tailoring it to meet user needs

Workplace MIS monitoring

tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed

Core ERM components

traditional components included in most ERP systems and they primarily focus on internal operations

Training

training all new users and creating the training user manuals

Operations

transforms raw materials or inputs into goods and services.

Wire media

transmission material manufactured so that signals will be confined to a narrow path and will behave predictably

Wired (Guided) Media

transmission material manufactured so that signals will be confined to a narrow path and will behave predictably

Databases today scale to exceptional levels, allowing all types of users and programs to perform information-processing and information-searching tasks.

true

spam

unsolicited email

Erp systems in the future will focus on

usability, ubiquity, accessibility, and mobility drawing

semi-passive RFID tags

use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader

supply chain planning systems

use advanced mathematical algorithms to improve the flow and efficiency of the supply chain while reducing inventory

chipless RFID tags

use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip

Bridges and Gateways

used to connect networks that use dissimilar protocols

Business process management tools

used to create an application that is helpful in designing business process models and helpful in simulating, optimizing, monitoring, and maintaining various processes that occur within an organization. Many tasks are involved in achieving a goal, and these tasks are done either manually or with the help of software systems.

Information secrecy

is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

A few details managers should consider surrounding people and information security policies include defining the best practices for:

-Applications allowed to be placed on the corporate network, especially various file sharing applications, IM software, and entertainment or freeware created by unknown sources -Corporate computer equipment used for personal reason on personal networks -Password creation and maintenance including minimum password length, characters to be included, and frequency for password changes -Personal computer equipment allowed to connect to the corporate network -Virus protection including how often the system should be scanned and how frequently the software should be updated.

trends shaping our future

-World's population will double in the next 40 years -People in developed countries are living longer -Growth in information industries is creating a knowledge-dependent global society -The global economy is becoming more integrated -The economy and society are dominated by technology -Pace of technological innovation is increasing -Time is becoming one of the most precious commodities

3 reasons why organizations should develop written epolicies

-establish employee guidelines -establish organizational rules -establish employee procedures

4 basic options offered by BYOD

-unlimited access for personal devices -access only to nonsensitive systems and data -access, but with MIS control over personal devices, apps, and stored data -access, but preventing local storage of data on personal devices

6 Epolicies

1. ethical computer use policy 2. information privacy policy 3. acceptable use policy 4. email privacy policy 5. social media policy 6. workplace monitoring policy

U.S. workers spend _ more time on the job than they did a decade ago

10%

nonrepudiation

A contractual stipulation to ensure that ebusiness participants do not deny their online actions

Security Response Plan Policy

Client confidential information is defined as proprietary and confidential information received from customers. An example of this type of information is customer bank account info. This information type is restricted to management approved internal access only.

computer simulation

Complex systems, such as the U.S. economy, can be modeled by means of mathematical equations and different scenarios can be run against the model to conduct "what if" analysis.

social media policy

Outlines the corporate guidelines or principles governing employee online communications

Digital Signature Acceptance Policy

Keep filing cabinets locked at all times, and if feasible keep them behind locked doors. Keep keys locked in a single location with limited access.

Acceptable Encryption Policy

On-premise network servers must be encrypted and kept behind locked doors at a minimum. Limit employee access to servers.

anti-spam policy

Simply states that email users will not send unsolicited emails (or spam)

typosquatting

a problem that occurs when someone registers purposely misspelled variations of well-known domain names

key logger software

a program that records every keystroke and mouse click

Insiders

are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business affecting incident. EX) Many individuals freely give up their passwords or write them on sticky notes next to their computers, leaving the door wide open for hackers.

Destructive agents

are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

Tigher

competition based on new technologies

Business impact of knowledge-dependent society

computer literate management, more ed reqs, info flows from front-office to upper mgt., more downsizing, layoffs, etc.

ethical computer use policy

contains general principles to guide computer user behavior

Internet use policy

contains general principles to guide the proper use of the internet

email privacy policy

details the extent to which email messages may be read by others

Business impact of longer life expectancy

growing demand for elderly products, higher cost of health care, advances in geriatric medicine

Information security policies

identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days EX) Acceptable Encryption Policy Clean Desk Policy Disaster Recovery Plan Policy Digital Signature Acceptance Policy Password Protection Policy Password Construction Guidelines Security Response Plan Policy

cyberbullying

includes threats, negative remarks, or defamatory comments transmitted through the Internet or posted on the website

information of everything

iot, ioe

Phishing expedition

is a masquerading attack that combines spam with spoofing. The perpetrator sends millions of spam emails that appear to be from a respectable company. The email contains a link to a website that is designed to look exactly like the company's website. The victim is encouraged to enter username, password, and sometimes credit card information.

Phishing

is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as thought they came from legitimate businesses. The messages appear to be genuine, with official-looking formats and logos, and typically ask for verification of important information such as passwords and account numbers, ostensibly for accounting or auditing purposes. Up to one in five recipients responds and become a victim of identity theft.

Countries expected to have the largest population increases

palestinian territory (217), niger (205), yemen (168), angola (162), democratic republic of congo (161), uganda (133)

clickstream

records information about a customer during a web surfing session such as what websites were visited, how long the visit was, what ads were viewed, and what was purchased

Click-fraud

the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser

trend analysis

the examination of a trend to identify its nature, causes, speed of development, and potential impacts

website name stealing

the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner


Set pelajaran terkait

unit 8 practice quiz -- metabolism, nutrition, energetics

View Set

CHAPTER 16 REGULATION OF FINANCIAL INSTITUTIONS

View Set

Honors World Geography Ch 9 Test 6

View Set

MSU anatomy chapter 26 pratice exam

View Set