IST 310 Ch 1 - 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Splogs (spam blogs)

Fake blogs created solely to raise the search engine rank of affiliated websites

Services

Tasks performed by people that customers will buy to satisfy a want or need Teaching, Waiting Tables and Cutting Hair

Velocity

the analysis of streaming data as it travels around the internet Analysis necessary of social media messages spreading globally

Marketing and Sales

Promotes, prices, and sells products to customers

Service

Provides customer support after the sale of goods and services

Human Resource Management

Provides employee training, hiring, and compensation

Real-Time System

Provides real-time information in response to query requests.

Value Chain Analysis

Views a firm as a series of business processes that each add value to the product or service.

Data Integrity

A measure of the quality of data.

Internal Rate of Return

The rate at which the net present value of an investment equals zero

Data Element (Data Field)

The smallest or basic unit of data.

Common Forms of Viruses

- Backdoor Programs - Denial-of-service attack (DoS) - Distributed denial-of-service attack (DDoS) - Polymorphic viruses and worms - Trojan-horse virus

Service Metrics

-Cases closed same day -Number of cases handled by agent -Number of service calls -Average number of service requests by type -Average time to resolution -Average number of service calls per day -Percentage compliance with service-level agreement -Percentage of service renewals -Customer satisfaction level

Marketing Metrics

-Number of marketing campaigns -New customer retention rates -Number of responses by marketing campaign -Number of purchases by marketing campaign -Revenue generated by marketing campaign -Cost per interaction by marketing campaign -Number of new customers acquired by marketing campaign -Customer retention rate -Number of new leads by product

Method for defining KPIs

1) Identify which three to five key performance indicators (KPI) should be tracked for each employee role or line of business (LOB) 2) Implement automated tools to collect data and present KPIs to company management in a balanced scorecard, performance scorecard or executive dashboard 3) Evaluate how well the employee or LOB is making progress towards the organization's strategic business goals 4) Re-evaluate how well the KPIs are supporting current business goals 5) Make adjustments as needed

Five steps in the Order-to-Delivery Business Process

1) Marketing 2) Sales 3) Operations Management 4) Accounting and Finance 5) Customer Service

Hacker Weapons

1. Elevation of privilege 2. Hoaxes 3. Malicious code 4. Packet tampering 5. Sniffer 6. Spoofing 7. Splogs (spam blogs) 8. Spyware

Four Common Characteristics of Big Data

1. Variety 2. Veracity 3. Volume 4. Velocity

Record

A collection of related data elements.

Identity Management

A broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity.

Information Security

A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

Management Information System (MIS)

A business function, such as accounting and human resources, that moves information about people, products, and processes across the company to facilitate decision making and problem solving.

Big Data

A collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.

System

A collection of parts that link to achieve a common purpose.

Drive-by Hacking

A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

Bug Bounty Program

A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.

Variable

A data characteristic that stands for a value that changes or varies over time.

Outlier

A data value that is numerically distant from most of the other data points in a dataset.

Report

A document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information.

Comparative Advantage

A feature of a product or service that an organization's customers place a greater value on than similar offerings from a competitor.

Entry Barrier

A feature of a product or service that customers have come to expect and entering competitors must offer the same for survival.

Primary Key

A field (or group of fields) that uniquely identifies a given entity in a table.

Ransomware

A form of malicious software that infects your computer and asks for money.

Information Technology Infrastructure Library (ITIL)

A framework provided by the government of the United Kingdom that offers eight sets of management procedures. 1) Service Delivery 2) Service Support 3) Service Management 4) Information and Communication Technology (ICT) Infrastructure Management 5) Software Asset Management 6) Business Perspective 7) Security Management 8) Application Management

Child Online Protection Act (COPA)

A law that protects minors from accessing inappropriate material on the Internet.

Business Strategy

A leadership plan that achieves a specific set of goals or objectives such as increasing sales, decreasing costs, entering new markets, or developing new products or services.

Balanced Scorecard

A management system, in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action.

Algorithm

A mathematical formula placed in software that performs an analysis on a dataset.

Information Governance

A method or system of government for information management or control

Stakeholder

A person or group that has an interest or concern in an organization.

Ethical Hacker

A person who hacks into a computer system to find vulnerabilities to help a company test its security.

National Risk Management Center (NRMC)

A planning, analysis and collaboration center that works in close coordination with the private sector and other key stakeholders to identify, analyze, prioritize and manage the most strategic risks to the nation's critical infrastructure and functions

Foreign Key

A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

Elevation of Privilege

A process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system

Capability Maturity Model Integration (CMMI) method

A process improvement approach that contains 22 process areas.

Sniffer

A program or device that can monitor data traveling over a network

Static Report

A report created once based on data that does not change.

Dynamic Report

A report that changes automatically during creation.

Business Unit

A segment of a company (such as accounting, production, marketing) representing a specific business function.

Control objectives for information and related technologies (COBIT)

A set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors.

Information Systems Audit and Control Association (ISACA)

A set of guidelines and supporting tools for IT governance that is accepted worldwide and generally used by auditors and companies as a way to integrate technology to implement controls and meet specific business objectives.

Spyware

A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

Business Process

A standardized set of activities that accomplish a specific task, such as processing a customer's order.

Digital Rights Management

A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

Project

A temporary endeavor undertaken to create a unique product or service.

Information Age

A time when infinite quantities of facts are widely available to anyone who can use a computer.

Relationship Database Model

A type of database that stores data in the form of logically related two-dimensional tables.

Scareware

A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.

Polymorphic Viruses and Worms

A type of virus and worm that changes their form as they propogate

Trojan Horse Virus

A type of virus that hides inside other software, usually as an attachment or a downloadable file

Snapshot

A view of data at a particular moment in time.

Systems Thinking

A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part.

Internet of Things (IoT)

A world where interconnected Internet-enabled devices or "things" have the ability to collect and share data without human intervention.

Website Metrics

Abandoned registrations Abandoned shopping cards Click-through Conversion rate Cost-per-thousand Page exposures Total hits Unique visitors

Inbound Logistics

Acquires raw materials and resources and distributes to manufacturing as required

Relationship Database Management System

Allows users to create, read, update, and delete data in a relational database.

Product Differentiation

An advantage that occurs when a company develops unique differences in its products with the intent to influence demand.

Information Property

An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged

Patent

An exclusive right to make, use, and sell an invention granted by a government to the inventor.

Speech Analysis

Analyzes recorded calls to gather information; brings structure to customer interactions and exposes information buried in customer contact center interactions with an enterprise

Social Media Analysis

Analyzes text flowing across the Internet, including unstructured text from blogs and messages

Porter's Five Forces Model

Analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry.

Web Analysis

Analyzes unstructured data associated with websites to identify consumer behavior and website navigation

Text Analysis

Analyzes unstructured data to find trends and patterns in words and sentences

Technology Development

Applies MIS to processes to add value

Hoaxes

Attack computer systems by transmitting a virus hoax, with a real virus attached

Distributed Denial-of-Service (DDoS) Attack

Attacks from multiple computers that flood a website with so many requests for service that it slows down or crashes. An example is the Ping of Death, in which thousands of computers try to access a website at the same time, overloading it and shutting it down

Page Exposures

Average number of page exposures to an individual visitor

Supply Chain Management Metrics

Back order: an unfulfilled customer order due to insufficient stock level Customer order promised cycle time: anticipated/agreed upon cycle time of a purchase order Customer order actual cycle time: the avg time it takes to actually deliver order Inventory replenishment cycle time: measure the manufacturing cycle time + time to deploy product to distribution center Inventory turnover: # of times a company's inventory cycles or turns over per year

Benchmark

Baseline values the system seeks to attain.

Black-hat Hackers

Break into other people's computer systems and may just look around or may steal and destroy information

Cybersecurity and Infrastructure Security Agency (CISA)

Builds the national capacity to defend against cyberattacks and works with the federal government to provide cybersecurity tools, incident response services, and assessment capabilities to safeguard the ".gov" networks that support the essential operations of partner departments and agencies. It is responsible for protecting the nation's critical infrastructure from physical and cyber threats. It requires effective coordination and collaboration among a broad spectrum of government and private-sector organizations

Core Processes

Business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain.

Pattern Recognition Analysis

Classifies or labels an identified pattern in the machine learning process

Data Dictionary

Compiles all of the metadata about the data elements in the data model.

Supply Chain

Consists of all parties involved, directly or indirectly, in the procurement of a product or raw material.

Packet Tampering

Consists of altering the contents of packets as they travel over the internet or altering data on computer disks after penetrating a network

Spoofing

Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender

Dynamic Process

Continuously changing and provides business solutions to ever-changing business operations.

Click-through

Count of the number of people who visit one site and use an ad to get to another

Chief User Experience Officer

Create the optimal relationship between user and technology.

Database Management (DBMS)

Creates, reads, updates, and deletes data in a database while controlling access and security

Critical Success Factors (CSFs)

Crucial steps companies perform to achieve their goals and objectives and implement their strategies.

Information

Data converted into a meaningful and useful context.

Machine Generated Data

Data created by a machine without human intervention.

Structured Data

Data that has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address.

Human Generated Data

Data that humans, in interaction with computers, generate.

Unstructured Data

Data that is not defined and does not follow a specified format and is typically free-form text such as emails, Twitter tweets, and text messages.

Finance

Deals with strategic financial issues including money, banking, credit, investments, and assets Ex: investment, monetary and reporting data

Business Rule

Defines how a company performs a certain aspect of its business and typically results in either a yes/no or true/false answer.

Metadata

Details about data.

Correlation Analysis

Determines a statistical relationship between variables, often for the purpose of identifying predictive factors among the variables

Chief Automation Officer

Determines if a person or business process can be replaced by a robot or software.

Break Even Analysis

Determines the volume of business required to make a profit at the current prices charged for the products or services

Variety

Different forms of structured and unstructured data Data from spreadsheets and databases as well as from email, videos, photos, and PDFs, all of which must be analyzed

Outbound Logistics

Distributes goods and services to customers

Transactional Data

Encompasses all of the data contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational tasks.

Analytical Data

Encompasses all organizational data, and its primary purpose is to support the performing of managerial analysis tasks.

Business Critical Integrity Constraints

Enforce business rules vital to an organization's success and often requires more insight and knowledge than relational integrity constraints.

SWOT Analysis

Evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies.

Information Management

Examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively

Hacker

Experts in technology who use their knowledge to break into computers and computer networks, either for profit or simply for the challenge.

Data Scientist

Extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information.

Script Kiddies/Bunnies

Find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses

Denial of Service Attack (DoS)

Floods a website with so many requests for service that it slows down or crashes the site

Logical View of Data

Focuses on how users logically access data to meet their particular business needs.

Support Value Activities

Found along the top of the value chain and includes business processes, such as firm infrastructure, human resource management, technology development, and procurement that support the primary value activities. 1) Firm Infrastructure 2) Human Resource Management 3) Technology Development 4) Procurement

Primary Value Activities

Found at the bottom of the value chain, these include business processes that acquire raw materials and manufacture, deliver, market, sell, and provide after-sales services. 1) Inbound Logistics 2) Operations 3) Onbound Logistics 4) Marketing and Sales 5) Service

Porter's Three Generic Strategies

Generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service. 1) Broad Cost Differentiation 2) Broad Differentiation 3) Focused Strategy

Information Ethics

Governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies).

Crackers

Hackers who have criminal intent when hacking

Hacktivists

Hackers who have philosophical and political reasons for breaking into systems and will often deface the website as a protest

Knowledge Facilitators

Help harness the wealth of knowledge in the organization.

CRM Reporting Technologies

Help organizations identify their customers across other applications.

CRM Predicting Technologies

Help organizations make predictions regarding customer behavior such as which customers are at risk of leaving.

CRM Analysis Technologies

Help organizations segment their customers into categories such as best and worst customers.

Query by Example Tool (QBE)

Helps users graphically design the answer to a question against a database.

Rivalry Among Existing Competitors

High when competition is fierce in a market and low when competition is more complacent.

Threat of New Entrants

High when it is easy for new competitors to enter a market and low when there are significant entry barriers to entering a market.

Threat of substitute products or services

High when there are many alternatives to a product or service and low when there are few alternatives from which to choose.

Explanatory Data Analysis

Identifies patterns in data, including outliers, uncovering the underlying structure to understand relationships between the variables

Potential Internal Weaknesses (Harmful)

Identify all key areas that require improvement. Weaknesses focus on the absence of certain strengths, including absence of an Internet marketing plan, damaged reputation, problem areas for service, outdated technology, employee issues, and so on.

Potential Internal Strengths (Helpful)

Identify all key strengths associated with the competitive advantage including cost advantages, new and/or innovative services, special expertise and/or experience, proven market leader, and improved marketing campaigns.

Potential External Opportunities

Identify all significant trends along with how the organization can benefit from each, including new markets, additional customer groups, legal changes, innovative technologies, population changes, competitor issues, and so on.

Potential External Threats (Harmful)

Identify all threats or risks detrimental to your organization, including new market entrants, substitute products, employee turnover, differentiating products, shrinking markets, adverse changes in regulations, economic shifts, and so on.

Real-Time Data

Immediate, up-to-date data.

Malicious Code

Includes a variety of threats such as viruses, worms, and Trojan horses

Machine Generated Unstructured Data

Includes satellite images, scientific atmosphere data, and radar data.

Human Generated Unstructured Data

Includes text messages, social media data, and emails.

Firm Infrastructure

Includes the company format or departmental structures, environment, and systems

Data Validation

Includes the tests and evaluations used to determine compliance with data governance polices to ensure correctness of data.

Return on Investment

Indicates the earning power of a project and is measured by dividing the benefits of a project by the investment

Return on Investment (ROI)

Indicates the earning power of a project.

Knowledge Workers

Individuals valued for their ability to interpret and analyze information.

Business Intelligence (BI)

Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making.

Feedback

Information that returns to its original transmitter (input, transform, or output) and modifies the transmitter's actions.

Intellectual Property

Intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

Enterprise Resource Planning (ERP)

Integrates all departments and functions throughout an organization into a single system (or integrated set of MIS systems) so that employees can make decisions by viewing enterprise-wide information on all business operations.

Business Facing Processes

Invisible to the external customer but essential to the effective management of the business; they include goal setting, day-to-day planning, giving performance feedback and rewards, and resource allocation.

Sales Analytics

Involves gathering, classifying, comparing, and studying company sales data to analyze product cycles, sales pipelines, and competitive intelligence.

Customer Analytics

Involves gathering, classifying, comparing, and studying customer data to identify buying trends, at-risk customers, and potential future opportunities.

Customer Relationship Management (CRM)

Involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability.

Cybersecurity

Involves prevention, detection, and response to cyberattacks that can have wide-ranging effects on the individual, organizations, community, and at the national level.

Supply Chain Management (SCM)

Involves the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability.

Committee of Sponsoring Organizations (COSO)

Key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing and sales, operations, financial functions, procurement, and reporting.

Botnets

Malware that causes a collection of connected devices to be controlled by a hacker.

Data Models

Logical data structures that detail the relationships among data elements using graphics or pictures.

Database

Maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).

Human Resources

Maintains policies, plans, and procedures for the effective management of employees Ex: Employee, Promotion and Vacation data

Cyberattacks

Malicious attempts to access or damage a computer system.

Chief Intellectual Property Officer

Manage and defend intellectual property, copyrights, and patents

Operations Management

Manages the process of converting or transforming resources into goods or services Ex: Manufacturing, distribution and production data

Goods

Material items or products that customers will buy to satisfy a want or need Cars, Groceries and Clothing

Metrics

Measurements that evaluate results to determine whether a project is meeting its goals.

Effectiveness MIS Metric

Measures the impact MIS has on business processes and activities including customer satisfaction, conversion rates, and sell-through increases.

Efficiency MIS Metric

Measures the performance of the MIS system itself including throughput, speed, and availability.

Examples of Sales Metrics

Number of Prospective Customers Number of New Customers Number of Retained Customers Number of Open Leads Number of Sales Calls Number of Sales Calls per Lead Amount of New Revenue Amount of Recurring Revenue Number of Proposals Given

Abandoned Registrations

Number of visitors who start the process of completing a registration page and then abandon the activity

Total Hits

Number of visits to a website, many of which may be by the same visitor

Data Gap Analysis

Occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where missing data might exist.

First Mover Advantage

Occurs when an organization can significantly impact its market share by being first to market with a competitive advantage.

Information Silo

Occurs when one business unit is unable to freely communicate with other business units making it difficult or impossible for organizations to work cross-functionally.

Data Inconsistency

Occurs when the same data element has different values.

Backdoor Programs

Opens a way into the network for future attacks

Chief Sustainability Officer

Oversees the corporation's "environmental" programs such as helping adapt to climate change and reducing carbon emissions.

Conversion Rate

Percentage of potential customers who visit a site and actually buy something

Sales

Performs the function of selling goods or services Ex: potential customer, sales report, commission and customer support data

The five basic supply chain PLAN activities

Plan - prepare to manage all resources required to meet demand Source - build relationships with suppliers to procure raw materials Make - manufacture products and create production schedules Deliver - plan for transportation of goods to customers Return - support customers and product returns

Procurement

Purchases inputs such as raw materials, resources, equipment, and supplies

Key Performance Indicators (KPIs)

Quantifiable metrics a company uses to evaluate progress toward critical success factors.

Data

Raw facts that describe the characteristics of an event.

Accounting

Records, measures, and reports monetary transactions Ex: transactional data, purchasing data, payroll days and tax data

Downtime

Refers to a period of time when a system is unavailable. Costs of this include (1) financial performance, (2) revenue loss, (3) damaged reputation, and (4) other expenses

Machine to Machine (M2M)

Refers to devices that connect directly to other devices.

Ediscovery

Refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

Data Granularity

Refers to the extent of detail within the data (fine and detailed or "coarse" and abstract).

Data Governance

Refers to the overall management of the availability, usability, integrity, and security of company data.

Chief Information Officer

Responsible for (1) overseeing all uses of information systems and (2) ensuring the strategic alignment of MIS with business goals and objectives.

Chief Knowledge Officer

Responsible for collecting, maintaining, and distributing the organization's knowledge.

Chief Data Officer

Responsible for determining the types of information the enterprise will capture, retain, analyze, and share.

Chief Privacy Officer

Responsible for ensuring the ethical and legal use of information within an organization.

Data Steward

Responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business.

Chief Security Officer

Responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers and viruses.

Chief Technology Officer

Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology.

Customer Facing Process

Results in a product or service that is received by an organization's external customer.

Loyalty Programs

Rewards customers based on their spending.

Cost-per-thousand (CPM)

Sales dollars generated per dollar of advertising, commonly used to make the case for spending money to appear on a search engine.

Cyberterrorists

Seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction

Knowledge

Skills, experience, and expertise coupled with information and intelligence that creates a person's intellectual resources.

Malware

Software that is intended to damage or disable computers and computer systems.

Counterfeit Software

Software that is manufactured to look like the real thing and sold as such.

Adware

Software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

Virus

Software written with malicious intent to cause annoyance or damage.

Worm

Spreads itself not only from file to file but also from computer to computer.

Entity

Stores data about a person, place, thing, transaction, or event.

Marketing

Supports sales by planning, pricing, and promoting goods or services Ex: promotion, sales and advertising data

Prescriptive Analytics

Techniques that create models indicating the best decision to make or course of action to take. Ex: Airline using past purchasing data as inputs into a model that recommends the best pricing strategy across all flights allowing the company to maximize revenue

Descriptive Analytics

Techniques that describe past performance and history. Ex: Creating a report that includes charts and graphs that explain data

Predictive Analytics

Techniques that extract information from data to predict future trends and identify behavioral patterns. Ex: Using past sales data to predict future sales

Data Democratization

The ability for data to be collected, analyzed, and accessible to all users (the average end user).

Buyer Power

The ability of buyers to affect the price they must pay for an item.

Information Compliance

The act of conforming, acquiescing, or yielding information

Business Process Reengineering (BPR)

The analysis and redesign of workflow within and between enterprises.

Confidentiality

The assurance that messages and information are available only to those who are authorized to view them.

Information Secrecy

The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity

Fact

The confirmation or validation of an event or object.

Switching Cost

The costs that can make customers reluctant to switch to another product or service.

Attributes

The data elements associated with an entity.

MIS Skills Gap

The difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies.

Data Redundancy

The duplication of data, or the storage of the same data in multiple places.

Knowledge Assets

The human, structural, and recorded resources available to the organization.

Copyright

The legal protection afforded an expression of an idea, such as a song, book, or video game.

Data Stewardship

The management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner.

Digital Trust

The measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals.

Best Practices

The most successful solutions or problem-solving methods that have been developed by a specific organization or industry.

Unique Visitors

The number of unique visitors to your sites in a given time

Abandoned Shopping Carts

The number of visitors who create a shopping cart and start shopping and then abandon the activity before paying for the merchandise.

Rule 41

The part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.

Physical View of Data

The physical storage of data on a storage device such as a hard disk.

Master Data Management (MDM)

The practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems.

Ethics

The principles and standards that guide our behavior toward other people.

Benchmarking

The process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance.

Competitive Intelligence

The process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed.

Anomaly Detection

The process of identifying rare or unexpected items or events in a data set that do not conform to other items in the dataset.

Production

The process where a business takes raw materials and processes them or converts them into a finished product for its goods or services.

Market Share

The proportion of the market that a firm captures.

Productivity

The rate at which goods and services are produced based upon total output given total inputs.

Privacy

The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

Relational Integrity Constraints

The rules that enforce basic and fundamental information-based constraints.

Integrity Constraints

The rules that help ensure the quality of data.

Volume

The scale of data Includes enormous volumes of data generated daily Massive volume created by machines and networks Big data tools necessary to analyze zettabytes and brontobytes

Analytics

The science of fact-based decision making.

Supplier Power

The suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services).

Value-Added

The term used to describe the difference between the cost of inputs and the value of price of outputs.

Data Latency

The time it takes for data to be stored or retrieved.

Pirated Software

The unauthorized use, duplication, distribution, or sale of copyrighted software.

Veracity

The uncertainty of data, including biases, noise, and abnormalities Uncertainty or untrustworthiness of data Data must be meaningful to the problem being analyzed Must keep data clean and implement processes to keep dirty data from accumulating in systems

Efficiency Metrics

Throughput The amount of information that can travel through a system at any point in time. Transaction speed The amount of time a system takes to perform a transaction. System availability The number of hours a system is available for users. Information accuracy The extent to which a system generates the correct results when executing the same transaction numerous times. Response time The time it takes to respond to user interactions such as a mouse click.

Operations

Transforms raw materials or inputs into goods and services

Effectiveness Metrics

Usability The ease with which people perform transactions and or find information Customer Satisfaction Measured by satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer Conversion Rates The number of customers an organization 'touches' for the first time and persuades to purchase its products or services. This is a popular metric for evaluating the effectiveness of banner, pop-up and pop-under ads on the internet Financial Such as return on investment (the earning power of an organization's assets), cost-benefit analysis (the comparison of projected revenues and costs including development, maintenance, fixed and variable), and break-even analysis (the point at which constant revenues equal ongoing costs).

Structured Query Language

Users write lines of code to answer questions against a database.

Static Process

Uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously.

Behavioral Analysis

Uses data about people's behaviors to understand intent and predict future actions

White Hat Hackers

Work at the request of the system owners to find system vulnerabilities and plug the holes


Set pelajaran terkait

Chapter 4: Health Education and Promotion

View Set