MIS Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A major benefit of implementing an enterprise system is that most vendors have perfected the implementation process to such a degree that the total costs and time needed are known upfront.

False

A unique aspect of social media information systems is that they do not have the same five components as other information systems.

False

In general, it is better to have data that is too course than data that is too fine for your needs

False

Which of the following is NOT listed as one of the three primary activities of the business intelligence process?

Implement findings

While data are being collected everywhere, getting the data into a useable format can be quite challenging

True

Trojan Horse

a virus that masquerades as a useful program or file

Worm

a virus that self-propagates using the internet or other computer networks (spreads beyond the host computer)

Life of an association rule

confidence of the rule / support of the right-hand items

What is Enterprise Application Integration and why would a company do this?

- It enables existing applications to communicate and share data - It provides integrated information - It leverages existing systems -It enables a gradual move to ERP

What are the three types of enterprise applications that have emerged?

- Customer Relationship Management (CRM): a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service - Enterprise Resource Planning (ERP): a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent computing platform. - Enterprise Application Integration (EAI): a suite of software applications that integrates existing systems by providing layers of software that connect applications together.

What are the three role types of SMIS (Social Media Information Systems)?

- Social Media Providers - Users -Communities

Which of the following is true regarding a Data Mart?

A data mart allows a data analyst within a specific department to work with data relating to a specific business function

Which of the following is true regarding operational data and a data warehouse?

A data warehouse allows analysts to interact with data without the risk of negatively impacting the operations of the company

Which of the following is NOT a defining characteristic of Big Data

A. Huge Volume B. Sufficient Validity C. Rapid Velocity D. Great Variety answer is B

Which of the following is NOT one of the three possible responses by an organization when problematic social media content is found

A. Respond to it B. Leave it C. Delete it D. None of the above (meaning they are all options)

Which of the following is NOT an internal risk from social media?

A. Threats to information security B. Sexual harassment liability C. Increased organizational liability D. None of the above (meaning they are all risks)

Which of the following is a possible problem with source data?

A. Wrong granularity B. Missing values C. Too much data D. All of the above answer is D

Deep Learning

AI function that imitates the workings of a human brain in processing data and creating patterns for use in decision making

What are three ways social media sites can make money?

Advertising, charging for premium services (freemiums), by making users the product

How do organizations plan the use of IS?

Align IS with organizational strategy Communicate IS issues to the executive group develop/enforce IS priorities within the IS department Sponsor steering committee

What is a personal information system?

An information system used by a single individual

What does diseconomies of scale mean in the context of systems development?

Brook's Law: adding more people to a late project makes the project later When you add members, veteran members must rain new staff and lose productivity while training

Social media data can fall into which two categories?

Content and connection data

Why is systems development so risky (5 reasons)?

Difficulty of determining requirements Changes in requirements Difficulties involving scheduling and budgeting Changing technology Diseconomies of scale

What is structured data?

Data that is in the form of rows and columns

Dirty data generally refers to what?

Data that is not yet ready to be used for business intelligence purposes

What is the difference between a data warehouse and a data mart? What are potential issues with operational data?

Data warehouse is a distributor in a supply chain, data mart is like the retail store in a supply chain Smaller than data warehouse - addresses the needs of a particular department or functional area Problems - Dirty Data, missing values, inconsistent data, wrong granularity, too much data

What are your options when there is a significant change in technology while a system is being developed? What are the drawbacks of each option?

Do you stop development to switch to the new technology? It will become very expensive Do you finish developing according to the existing plan? You will be making an out of date system

What is the difference between Enterprise Resource Planning and Customer Relationship Management?

ERP and CRM systems use different approaches to increase profitability. ERP focuses on reducing overheads and cutting costs. By making business processes more efficient, ERP reduces the amount of capital spent on those processes. CRM works to increase profits by producing greater sales volume.

Which of the following is not one of the four phases of the customer life cycle?

Employee training

Which of the following statements is NOT true?

Employees are generally excited to receive upgraded systems and processes

What are elements of Agile Methodologies?

Expects, even welcomes, changes in requirements Frequently deliver working version of the product Work closely with the customer for the duration Design as you go Test as you go Team knows best how it's doing / how to change Can be used for applications, information systems, and business process development

What is the goal of IS Security?

Find an appropriate trade-off between the risk of loss and the cost of implementing safeguards

Point of Association Rule

Generally used with transactional data to find items that occur frequently together, helps identify useful and actionable patterns in the data Goal: to come up with actionable ru;es that provide clear and useful insight

What are four elements of an effective organizational incident response plan?

Have a plan in place Centralized reporting Specific responses (speed, preparation pays, don't make problem worse), snd practice

What are the three sources of information security threats?

Human error: accidental problems caused by both employees and nonemployees Computer crime: employees and former employees who intentionally destroy data or other system components Includes hackers and terrorists Natural disasters: fires, floods, hurricanes, earthquakes, avalanches, etc.

When the same data is stored in multiple locations, which of the following is an issue that often arises?

Increase costs Data integrity problems Inefficiency D. All of the above

What is the term used to describe when data are isolated in separated information systems?

Information silo

What does business intelligence do?

Information systems that process operational and other data to analyze past performance and to make predictions. Identifying Changes in Purchasing Patterns Business Intelligence for Entertainment Just-in-Time Medical Reporting

How do you eliminate information silos?

Integrate the data into a single database and revise applications to use that database. The business process.

What is Social Capital?

Investment in social relations with the expectation of returns in the marketplace

Which of the following statements is true regarding enterprise resource planning systems?

It includes the functions of a customer relationship management system as well as additional functionality

What are three potential responses to problematic content on social media. When would that response be a good idea?

Leave it - if content represents reasonable criticism of the organization's products or services. Respond to it (dangerous) - best reserved for the the problematic content has caused the organization to do something positive as a result Delete it - reserved for contributions that are inappropriate because they are contributed by crackpots, have nothing to do with the site, or contain obscene content.

Which of the following statements regarding enterprise systems is true?

Many were not feasible until network, data communication, and database technologies reached a sufficient level of capability in the late 80s and 90s

Why is it called a waterfall methodology?

Like a waterfall, the process is supposed to operate in a sequence of nonrepetitive phases

Be able to explain the 3 risks of outsourcing IT

Loss of control: vendor's in control, technology direction, potential loss of intellectual capital, product fixes/enhancements in wrong priority, vendor management-direction- or identity changes, CIO superfluous Benefits outweighed by long-term costs: high unit cost forever, paying for someone else's mismanagement, in time outsource vendor is de facto sole source, may not get what you pay for but don't know it No easy exit: critical knowledge in minds of vendors, not employees; expensive and risky to change vendors

Be able to explain the 3 benefits of outsourcing IT

Management advantages: obtain expertise, avoid management problems, free management time Cost reduction: obtain part-time services, gain economies of scale Risk reduction: cap financial exposure, improve quality, reduce implementation risk

Why should a company have a social media policy?

Manager the risk of inappropriate content

Why is it difficult to determine an accurate schedule and budget?

Many people will have an opinion on what needs to happen and when it needs to happen by; there are also many cases where you can't just name a date that something will be done by or how much it will all cost because it is hard to determine

What are the four phases of the customer life cycle?

Marketing, customer acquisition, relationship management, and loss/churn

Which of the following is not one of the three organizational units of a social media information system?

Moderator

What is SQL injection?

Occurs when users enter a SQL statement into a form in which they were supposed to enter a name or other data

Which of the following statements is NOT true?

One challenge with online ads is the inability to track the effectiveness of an individual ad

What are the three ways you can authenticate on a system?

Passwords, smart cards, and biometric authentication

What are the 4 methods you can use to implement the new system? What are the pros/cons of each method?

Pilot: organization implements the entire system on a limited portion of the business Pro: if the system fails, failure is contained within limited boundary; reduces exposure and protects new systems from developing a negative rep Phased: new system is installed in phases across the organization; once one piece works, the next is installed Cons: some systems are so tightly integrated that they cannot be phased Parallel: new system runs in parallel with old one until new system is tested and fully operational Cons: expensive, users work double time to run both, and considerable work is needed to determine if new system is consistent with old Pros: provides easy fallback if new system fails Plunge: organization shuts off old system and starts new one Cons: if new fails, company is in trouble

What are major functions of the IS Department?

Plan the use of IS to accomplish organizational goals and strategies Manage outsourcing relationships Protect information assets Develop, operate, and maintain the organization's computing infrastructure Develop, operate, and maintain applications

Business intelligence systems are used to do what?

Process data to analyze past performance and make predictions

Spyware

Programs installed on user's computer without their knowledge and observes user's actions

What does it mean if a variable has a significant effect on another variable? What doesn't this mean?

R-squared tells you how much of the observed variance in Y is explained by the model. If you are using this model to predict values (as opposed to hypothesis testing), you want a high R-squared value. If you have not included that contribute to the value of Y.

What are three types of BI Analysis

Reporting Analysis - process of sorting, grouping, summing, filtering, and formatting structured data (relational database or spreadsheet data) Goal: create information about past performance Data Mining analysis - application of statistical techniques to find patterns and relationships among data for classification and prediction, comes from convergence or disciplines (AI and Machine Learning) Goal: classify and predict Big Data - data collections that are characterized by huge volume, rapid velocity, and great variety Goal: find patterns and relationships in big data

What does Changes in Requirements mean?

Requirements change as the system is developed, and the bigger the system and longer the project, the more the requirements change

Phishing

Sending emails (usually to a large number of 'random targets') trying to trick people to click links or visit fake websites

Which of the following is NOT a primary component of a customer relationship management system?

Specialized hardware

What makes for a good rule?

Support is high. The best rules are not blatantly obvious, but upon reflection, they likely represent a broad and reasonable relationship between the two itemsets

What is the difference between symmetric and asymmetric encryption?

Symmetric: the same key is used to encode and decode Asymmetric: two keys are use (one for encoding and one for decoding)

What are the 5 phases of the Systems Development Lifecycle?

System definition Requirements analysis Component design Implementation Maintenance

What is Business Process Reengineering and how might you describe the process?

The activity of altering existing and designing new business processes to take advantage of new information systems. Difficult, slow, and exceedingly expensive.

Which of the following statements is NOT true regarding social media use?

The growth of social media has slowed considerably in the last few years

Why is it difficult to determine system requirements?

There tends to be questions that people fail to ask or know the answer to

Why do natural disasters pose information security threats?

They can result in the initial loss of capability and service as well as losses stemming from actions to recover from initial problem

Which of the following statements is true regarding an enterprise information system?

They span an organization and support activities of people in multiple departments

What are four internal risks created by social media?

Threats to informations security, increased organizational liability, decreased employee productivity Seemingly innocuous comments inadvertently leak information used to secure access to organizational resources - Bad idea to tell everyone it's your birthday because your DOB can be used to steal your identity, posting pictures with keys visible can be replicated Employees may inadvertently increase corporate liability when they use social media - Sexual harassment liability, Leak confidential information Reduced employee productivity - 64% of employees visit non-work related web sites each day, Tumblr (57%), Facebook (52%), Twitter (17%), Instagram (11%), and Snapchat (4%)

Seemingly innocent social media posts may be used by cyber criminals to gain unauthorized access to your online accounts

True

What are the five different types of loss relating to information security?

Unauthorized data disclosure: when a threat obtains data that is supposed to be protected Incorrect data modification Faulty service Denial of service: result from human error in following procedures or a lack of procedures Loss of infrastructure

Understand what Incorrect Data Modification means, what could cause them, what an example would be

Usually caused by human error; ex- employee follows procedure wrong, placing incorrect information on website, etc.

What is an information silo and what are problems that result from them?

When data is stored in isolated systems. Problems: data duplicated (integrity problem), data inconsistency, disjointed processes, data integration problems, Inefficiency: decisions made in isolation, increased cost for organization

Are SMIS consistent with the 5 Component Framework of IS?

Yes, hardware, software, data, procedures, and people

Malware

a broad category of software that has malicious intent

Data mart

a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business

Data warehouse

a facility for managing an organization's BI data

Threat

a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge

Virus

a program that replicates itself

Vulnerability

an opportunity for threats to gain access to individual or organizational assets

IP Spoofing

changing the IP address of information you send out

Wardriving

driving through areas searching for unsecure wifi networks to sniff the network traffic

Support for an itemset or association rule

how many times all items appear / how many records there are total

Confidence for the association rule

how many times all the items appear together / times the left hand side items appear.

Need for Machine Learning

large amounts of data to 'train' on. The training data often requires data to be labeled. Also need powerful computers to create and run the mathematical models.

Operational data

one type of strategic data, which includes internal control and operational environment information such as data on the company's workforce, direct competitors, creditors, suppliers and information on customers.

Understand what Faulty Service means, what could cause it?

problems that result from incorrect system operation

What does Denial of Service mean? How can it happen on accident?

result from human error in following procedures or a lack of procedures; can get messed up by worms or natural disasters

Ransomware

software that blocks access to a system or data until money is paid

Safeguard

some measure that individuals or organizations take to block the threat from obtaining the asset

What does Loss of Infrastructure mean? What can cause it?

tend to result from human accidents; ex- natural disasters, floor buffer crashing into routers

Sniffing

the act of intercepting and viewing network traffic

Target

the asset that is desired by the threat

Hacking

the general term for unauthorized entry to networks or systems, generally by finding vulnerabilities in code

Pretexting

the general term used when you pretend to be someone else

Artificial Intelligence

the use of computer programming in such a way as to Imitate intelligent behavior

Turing Test

whether a human can interact with a machine and not realize it is a machine


Set pelajaran terkait

Chapter 28: Drugs Used to Treat Heart Failure

View Set

GEO101 Exam 2 Terms & Practice Questions

View Set