MIS 3305 Final Exam Willis

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

intrusion detection software

Features full-time monitoring tools that search for patterns in network traffic to identify intruders

bullwhip effect

Occurs when distorted product demand information ripples from one partner to the next throughout the supply chain

phishing

a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emain

worm

a type of virus that spreads itself, not only from file to file, but also from computer to computer. Dont need to attach to anything and can tunnel themselves into computers

Supplier relationship management (SRM)

focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects, which optimizes supplier selection

Partner relationship management (PRM)

focuses on keeping vendors satisfied by managing alliance partner and reseller relationship that provide customers with the optimal sales channel

Firewall

hardware and/or software that guards a private network by analyzing the information leaving and entering the network

hactivitsts

have philosophical and political reasons for breaking into systems and will often deface the website as a protest

trojan-horse virus

hides inside other software, usualy as an attachment or a downloadable file

information security policies

identify the rules required to maintain information security

Fair use doctrine

in certain situations, it is legal to use copyrighted material

logistics

includes the processes that control the distribution, maintenance and replacement of materials and personnel to support the supply chain

Intellectual property

intangible creative work that is embodied in physical form

Radio-frequency identification (RFID)

uses electronic tags and labels to identify objects wirelessly over short distances.

intelligent system

various commercial applications of artificial intelligence

backdoor programs

viruses that open a way into the network for future attacks

White hat hackers

work at the request of the system owners to find system vulnerabilities and plug the holes

Executive Information system (EIS)

- A specialized DSS that supports senior level executives within the organization. Most have digital dashboards, consolidation, drill-down and slice-and-dice capabilities

Visualization

- Produces graphical displays of patterns and complex relationships in large amounts of data

consolidation

- involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information Would occur when grouping multiple store sales together to get a total for the company.

Employee relationship management (ERM)

- provides employees with a subset of CRM applications available through a Web browser

Expert systems

: Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. Human expertise is transferred to the expert system, and users can access the expert system for specific advice. Most expert systems contain information from many human experts and can therefore perform a better analysis than any single human. Examples of expert systems include turbo tax for tax returns. In India I doctors use expert pallative care systems to help them care for patients.

virtual reality

A computer-simulated environment that can be a simulation of the real world or an imaginary world. Ford Motor company has been using virtual reality to help design its vehicles.

genetic algorithm

An artificial intelligent system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem.

Optimization analysis

An extension of goal-seeking analysis, finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints. Allows managers to change revenue and cost variables in an optimization mode, to calculate the highest potential profits. Can consider constraints like limits on the amount of raw materials and employees available.

supply chain execution system

Automates the different activities of the supply chain

cracker

a hacker with criminal intent

Transaction Processing system (TPS)

Basic business system that serves the operational level and assists in making structured decisions. Uses online transaction processing (OLTP)

authentification

a method for confirming users' identities

Online transaction processing (OLTP)

Capturing of transaction and event information using technology to process, store, and update. Analysts typically use TPS to perform their daily tasks.

automatic call distribution

a phone switch routes inbound calls to available agents.

Operation decision making (bottom of pyramid)

Employees develop, control, and maintain core business activities required to run the day-to-day operations. Ex: manager of a restaurant chain structured decisions lower management/staff internal/functional focu short term/day to day operations structured/recurring/ repetitive decsion key performance indicators focus on efficiency

Managerial Decision Making (middle level)

Employees evaluate company operations to identify, adapt to, and leverage change semi structured decisions middle managers/directors internal/cross functional focus short term/daily/monthly/yearly KPIs focusing on efficiency, and CSFc focusing on effectiveness

Hacker

Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge

information ethics

Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself

customer relationship management (CRM)

Involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability

Contact management CRM system

Maintains customer contact information and identifies prospective customers for future sales

Strategic decision making (top level of pyramid)

Managers develop overall strategies, goals, and objectives senior management/presidents external/industry/cross company long term/yearly/multi-year decision types:Unstructured, nonrecurring, one time. Occurs in situations in which no procedures or rules exist to guide decision makers toward the correct choice. CSFs focusing on effectiveness

Online analytical processing (OLAP)

Manipulation of information to create business intelligence in support of strategic decision making

Decision support system (DSS)

Models information to support managers and business professionals during the decision-making process primarily use analytical Information. Analytical information encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis or semistructured decisions. rely on Online analytical processing (OLAP)

neural networks

Neural networks are most useful for decisions that involve patterns or image recognition. Typically used in the finance industry to discover credit card fraud by analyzing individual spending behavior. Uses fuzzy logic - A mathematical method of handling imprecise or subjective information.

Semi-structured decisions

Occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision

the decision making process

Problem identification Data collection Solution generation Solution test Solution selection Solution implementation

Structured decisions

Situations where established processes offer potential solutions

intelligent agent

Special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users. Virtual personal assistants like Siri and Alexa are examples

Analytical CRM

Supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers

Opportunity management CRM system

Targets sales opportunities by finding new customers or companies for future sales

supply chain management (SCM)

The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and profitability

information security

The protection of information from accidental or intentional misuse by persons inside or outside an organization

sales force automation

a system that automatically tracks all of the steps in the sales process

Digital dashboard

Tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs

supply chain planning system

Uses advanced mathematical algorithms to improve the flow and efficiency of the supply chain while reducing inventory

What 4 quantitative models are used in DSS?

What-if analysis Sensitivity analysis Goal-seeking analysis optimization analysis

smart card

a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing. Can act as id cards, a form of digital cash or data storage

spam

a form of unsolicited email

Call Scripting system

access organizational databases that track similar issues or questions and automatically generate the details to the CSR who can then relay them to the customer

Web-based self-service system

allow customers to use the Web to find answers to their questions or solutions to their problems Click-to-talk -customers click on a button and talk with a CSR via the Internet

Public key encryption (PKE)

an encryption system that uses two keys: a public key for everyone and a private key for the recipient

reasons for the growth of decision making info systems

analyze large amounts of information, make decisions quickly, apply sophisticated analysis techniques

digital dashboards

as they become easier to use, more executives can perform their own analysis without inundating IT personnel with queries and request for reports

Hoaxes

attack computer systems by transmitting a virus hoax, with a real virus attached.

Distributed denial-of-service attack (DDoS)

attacks from multiple computers that flood a website with so many requests for service that it slows down or crashes. A common type is the Ping of Death, in which thousands of computers try to access a website at the same time, overloading it and shutting it down.

sales management CRM system

automates each phase of the sales process, helping individual sales representatives coordinate and organize all of their accounts

Predictive dialing

automatically dials outbound calls and when someone answers, the call is forwarded to an available agent

black hat hackers

break into other people's computer systems and may just look around or may steal and destroy information

polymorphic viruses and worms

change their form as they propagate

What-if analysis

checks the impact of a change in an assumption on the proposed solution. What-if analysis can be done using Excel's Scenario Manage. For example, what will happen to total sales as the price and quantity of units sold changes. What will happen to total sales if building Trump's border wall causes the price of produce to increase

what are three customer service operational CRM technologies

contact center web-based self-service system call scripting system

Prevention and Resistance

content filtering, encryption, firewalls

information security plan

details how an organization will implement the informaiton security policies

interactive voice response (IVR)

directs customers to use touch-tone phones or keywords to navigate or provide information

drill-down

enables users to get details, and details of details, of information Would occur when digging into the numbers on the balance sheet or income statement, such as revenues broken down into individual product revenues for each store during different dates and times

script kiddies/script bunnies

find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses

Goal-seeking analysis

finds the inputs necessary to achieve a goal such as a desired level of output. How much money a person can borrow with an interest rate of 5.5% and a monthly payment of $1,300. If a person needs to make an A in the class, what do they need to score on the final exam. Solves for a desired goal. For example - we want to improve revenues by 30 percent, how much does sales have to increase and costs have to decrease to meet this goal?

Denial-of-service attack (DoS)

floods a website with so many requests for service that it slows down or crashed the site

Elevation of privilege

is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system. For example, an attacker might log on to a network by using a guest account, and then exploit a weakness in the software that lets the attacker change the guest privileges to administrative privileges.

Model

is a simplified representation or abstraction of reality. Models help managers to: calculate risks, understand uncertainty, change variables and manipulate time to make decisions

slice-and-dice

looks at information from different perspectives. Would occur when users begin looking at information with different dimensions, similar to the cubes of information

privacy

major ethical issue The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent

Visibility

more visible models of different ways to do things in the supply chain have emerged. High visibility in the supply chain is changing industries, as Wal-Mart demonstrated

content filtering

occurs when organizations use software that filters content to prevent the transmission of unauthorized information

what are the three components of supply chain management

procurement, logistics, materials management

downtime

refers to a period of time when a system is unavailable

pharming

reroutes requests for legitimate websites to false websites

encryption

scrambles information into an alternative form that requires a key or password to decrypt the information

cyberterrorists

seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction

tokens

small electronic devises that change user passwords automatically

counterfeit software

software that is manufactured to look like the real thing and sold as such

virus

software written with malicious intent to cause annoyance or damage. Must attach to something such as a file in order to spread

Artificial intelligence (AI)

stimulates human intelligence such as the ability to reason and learn expert system neural network genetic algorithms intelligent agents virtual reality

Operational CRM

supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers. Marketing/sales/customer

supply chain visibility

the ability to view all areas up and down the supply chain in real time

Confidentiality

the assurance that messages and information are available only to those who are authorized to view them

Biometrics

the identification of a user based on a physical characteristics, such as a fingerprint, iris, face, voice, or handwriting

Copyright

the legal protction afforded an expression of an idea, such as a song, video game, and some types of proprietary documents

ethics

the principles and standards that guide our behavior towards other people

authorization

the process of giving someone permission to do or have something

procurement

the purchasing of goods and services to meet the needs of the supply chain

Sensitivity analysis

the study of the impact that changes in one (or more) parts of the model have on other parts of the model. How changing revenue affects other variables. For example - if we continually change the amount of inventory we carry, how low can our inventories go before issues start occurring in other parts of the supply chain? This would require changing the inventory level and watching the model to see "how sensitive" it is to inventory levels. Studies the impact on a single change in a current model. What-if analysis - determines the impact of change on an assumption or an input. For example - if the economic condition improves, how will it affect our sales?

pirated software

the unauthorized use, duplication, distribution, or sale of copyrighted software


Set pelajaran terkait

VHL Lección 5 Estructura 5.4 Repaso

View Set

Unit 5 History The peopling of the America's

View Set

Chapter 3: Categorical Grants and block grants

View Set

Economics True/False questions (all chapters)

View Set

Water Cycle Vocabulary Test Study Guide

View Set