MIS Readings + Quiz Questions (K-201 Lecture) (OPEN-BOOK Exam, 50 Questions!!)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

If the incident-response plan is not well-prepared, there is substantial risk that the actions of well-meaning people will make the problem worse.. Single choice.

True

Poll - The contents of unsaved documents on a volatile storage device are lost when the power is off.

True

Quiz Question While social capital can depreciate over time, just like traditional forms of capital, social capital can also increase in value over time.

True

Which of the following is considered a threat caused by human error?

an employee inadvertently installing an old database on top of the current one

In 2017, the FCC reversed the 2015 ruling on net neutrality classifying the Internet as ________.

an information service

Web applications are typically limited by the capabilities of the ________. a) operating system b) browser c) hardware d) programming language

b) browser

A computer hacker trying different combinations of characters to crack a password is a ________.

brute force attack

Which of the following is not an example of a support activity? a) Procurement b) Research and Development c) Customer Service d) Human resources

c) Customer Service

Firmware

computer software that is installed into devices such as printers, print servers, and various types of communication devices. - The software is coded just like other software, but it is installed into special, read-only memory of the printer or other device.

QUIZ: The forked lines on an E-R diagram that represent the relationship between two entities are referred to as ________.

crow's feet

The forked lines on the end of a line in an E-R diagram that indicates a 1:N relationship between two entities are referred to as ________.

crow's feet

Columns that are keys to different tables than the ones in which they reside are called ________. primary keys internal records foreign keys attributes

foreign keys

Which of the following workgroup processes is related to sales and marketing?

lead tracking

In 2015, the Federal Communications Commission approved new net neutrality regulations, making the Internet more ________.

like a utility

A database is used instead of a spreadsheet when ________. the data must be shared among users users do not want to store all data in one place structures of data lists are simple lists involve data with multiple themes

lists involve data with multiple themes

How can Social Capital Add Value?

information - About opportunities, alternatives, problems, etc. influence - Decision-makers that are critical to your success social credentials - making connections with respected professionals personal reinforcement - Seeing yourself in the context of the professionals in your social network

creating entry barriers

make it difficult and expensive for new competition to enter the market.

Identify a primary purpose of collaboration.

making decisions

Geofencing

is a location service that allows applications to know when a user has crossed a virtual fence (specific location) and then trigger an automated action. - Offering localized promotions for retailers in close proximity to the customer, as determined by phone location technology. - huge future application

QUIZ: Which of the following relationship types cannot be directly represented in relational databases with foreign keys?

many-to-many

Cloud resources are ________ because many different organizations use the same physical hardware.

pooled

Quiz Question: Project teams who never provide each other critical feedback may lead to __________________.

poor decision making

QUIZ Question A(n) ________ is the hierarchy of the tasks required to complete a project.

work breakdown structure

Which of the following is one of the keys to successful systems development life cycle (SDLC) projects?

work breakdown structure

A ________ is a type of virus that self-propagates using the Internet or other computer network.

worm

Quiz Question: Which of the following types of networks best describes the Cloud?

the Internet and internets

How is Business Process Modeling Notation (BPMN) Used to Model Processes?

Activities - Rectangles Decision of Gateway - Diamond Data - Paper icon

Which of the following hardware components are considered the "brain" of the computer?

CPU

Quiz Question Due to the complex nature of SMIS systems, they contain 7 components as opposed to the traditional 5 components of other information systems..

False

Quiz Question: The more unstructured a decision is, the less of a need there is for collaboration.

False

All team members should always agree on every decision and only give each other positive feedback. (T/F)

False - we don't want everyone to agree all the time. A group that agrees all the time will make worse decisions.

Margaret finds that calling all her senior supervisors and quality managers for a face-to-face meeting is not feasible. She arranges for a multiparty text chatting session involving all of them. This is an example of asynchronous communication.

False: this is an example of synchronous communication because all have arranged to text at the same time.

Bargaining Power of Buyers (1 of 5 forces)

Fewer buyers and larger amounts of sellers give the buyers leverage. Usually, everyday customers have a weak force of bargaining power What affects the Bargaining Power of Buyers? - Number of buyers - Size of each order - Cost of Changing - Differences between competitors

During which of the following stages do teams document project results and information for future teams?

Finalizing

Social Media and Human Resources

Finding prospective employees, recruiting and evaluating candidates Employee communications using internal personnel sites. - MySite and MyProfile in SharePoint Place for employees to post their expertise Risks - Forming erroneous conclusions about employees - Pushing unpopular management message

______________________ is a content structure that emerges from the processing of many user tags.

Folksonomy

First Mover Advantage

Gaining market share by being the first to develop a new technology in a market segment, doesn't guarantee an advantage over rivals. - the pioneering creator - not necessary to get a competitive advantage On the contrary, pioneering companies have to spend considerable resources on research and development (R&D) and educating the public about the new product or service. Ironically, the cutting edge of technological development can quickly turn into the bleeding edge.

Minimum Cardinality (Figure shows both maximum and minimum cardinalities)

The minimum number of instances of one entity that may be associated with each instance of another entity. - Must an adviser have a student to advise, and must a student have an adviser? - Constraints on minimum requirements are called minimum cardinalities. Notation Rules: - The second vertical bar on the lines means that at least one entity of that type is required. - The small oval means that the entity is optional; the relationship need not have an entity of that type. - Using this notation, if there are two vertical bars, both the minimum and maximum cardinality are one. - If there is a vertical bar with a crow's foot, then the minimum cardinality is one and the maximum is many. Reading the Figure: - a department is not required to have a relationship to any adviser - an adviser is required to belong to a department. - an adviser is not required to have a relationship to a student - a student is required to have a relationship to an adviser. the maximum cardinalities in Figure 5-21 have been changed so that both are 1:N.

Technology Skills Gap

The mismatch between the high level of tech skills demanded by employers and the low level of tech skills held by the employees.

Utilitarianism

The morality of an act is determined by its outcome. - Acts are judged to be moral if they result in the greatest good to the greatest number or if they maximize happiness and reduce suffering. - utilitarianism can assess lying or other forms of deception as moral if the act results in the greatest good to the greatest number.

Value Chain Primary Activities, all 5 (Refer to the Figure)

The network of value created activities that a company does, there are five primary activities - The goal is to create value that exceeds the cost of creating it. In other words, make a profit. Inbound Logistics - Receiving, storing, and disseminating inputs to the products Operations/Manufacturing - Transforming inputs into the final products Outbound Logistics - Collecting, storing, and physically distributing the products to buyers Sales and Marketing - Inducing buyers to purchase the products and provide a means for them to do so. (advertising, promotion, and marketing) Customer Service - Assisting customers' use of the products and thus maintaining and enhancing the products' value. (repairs, replacements, offering warranties, etc.)

Computer ________ include(s) physical parts such as the motherboard, central processing unit, keyboard, and monitor.

Hardware

How do organizations respond to security incidents?

Have a plan in place Centralized reporting Specific responses Practice

Microsoft PowerPoint is an example of ______.

Horizontal-market application

Loss and Threats

How certain threats can cause losses - EXAMPLES

Hyper Text Transfer Protocol (HTTP)

How data is transferred through the servers.

Pull Publishing

In business intelligence (BI) systems, the mode whereby users must request BI results. - the BI results are delivered according to a schedule or as a result of an event or particular data condition.

Collaboration tools for sharing Content

Iterating and feedback depend on sharing - project data - documents, illustrations, spreadsheets, and other data - project metadata -tasks, schedules, and budgets Choice of system for sharing content depends on degree of control desired. Alternatives for Sharing Content: No control - Email with attachments, Shared files on a server Version Management - Google Docs, Microsoft online, Microsoft Office Version Control - Microsoft Sharepoint

Moore's Law

"The number of transistors per square inch on an integrated chip doubles every 18 months." - Increasing processing power has had a greater impact on the global economy in the past 30 years than any other single factor (see figure) - because of Moore's law, the cost of data processing is approaching zero.

What is done in the Determine Requirements Phase?

** Most important phase in the SDLC Conduct user interviews - Multiple interviews to clarify and think about what the user truly wants. Lots of follow up questions Evaluate existing systems - Determine what it's lacking, or ways that can be tweaked to improve it Consider all 5 components

What is Information?

- A graph is data It's data people perceive and use to conceive information - Processed Data is information - Ability to conceive information determined by cognitive skills - People conceive information determined by cognitive skills. - You add value by conceiving information from data.

Tips for Giving Critical Feedback (examples in the figure)

- Be Specific - Offer Suggestions "Consider this" - Avoid personal comments - Strive for Balance Highlight the good part, to balance out the negative. "I thought Section 2 was particularly good. What do you think about moving it to the beginning?"

Is Social Media Free?

- Costs to develop, implement, and manage social networking procedures - Direct labor costs for employees who contribute to and manage social networking sites - 96% of companies use social media to recruit

What are the problems associated with information silos?

- Duplicated and inconsistent data - Lack of integrated data due to disjointed systems - Inefficiency from making decisions in isolation - Increased Expense

How can your team use Collaboration tools to communicate?

- Enabling and supporting team communication are major functions of collaboration systems. - Tolls depend upon the ways a team needs or wants to communicate Synchronous: Shared calendars, Invitation and attendance Single Location (in figure) Multiple Locations Asynchronous: Single or multiple locations (email, discussion forums, team surveys)

Social Media and Manufacturing and Operations

- Improves communication channels within an organization and externally with consumers, design products, develop supplier relationships, and operational efficiencies - Crowdsourcing - Businesses-to-business instead of just Business-to-consumer - Youtube for posting videos of product reviews and testing, factory walk-throughs

What are collaboration information systems?

- Information systems that support collaboration (decision making) Made up of same 5 components of every information system and support collaboration Hardware: Computers, tablets, phones, keyboards, screens, projector, etc. Software: email programs, word processors, text messaging Data: Project Data: the big pieces, data that is part of the collaboration: Design documents, team paper, etc. Project metadata: Data used to manage the project: Schedules, tasks, budgets, etc. Procedures: Specify standards, policies, and techniques for conducting team's work People: Team members, Project Managers, sers, etc. (the most important part). Not just the people on the team, but who it's going to.

How to solve the problem of information silos?

- Integrate data into a single database and revise applications and business processes - Allow for isolation but manage it effectively to avoid problems

Why are organizations moving to the cloud?

- Lease storage capacity from third party - All incoming data from mobile storefronts automatically uploaded - Average monthly storage costs cut at least 50% because resources are pooled over the internet - Power Savings, backup time saved, no new hardware configuration - One-time set up and development costs

Native Applications

- Professional programming languages: - Objective, C, C#, C++, Swift, Java, etc. - Enable creation of sophisticated and complex user interfaces - limited to one type of operating system - Costly development

Social Media and Customer Service

- Relationships emerge from joint activity; customers have as much control as companies - Product users freely help others solve problems - Companies lose control over the customer service process

What makes an effective collaborator?

- Speaks his or her mind even if it's an unpopular viewpoint - Is willing to enter into difficult conversations - Is skillful at giving/receiving negative feedback - Is willing to put forward unpopular ideas - Thinks differently that I do/brings different perspectives - These can cause disagreement, but that is good for the team to grow.

Web Applications

- Web development languages: - HtML5, CSS3, Javascript - Support graphics, animation, logic, and more - Works in a browser, regardless of operating system - less expensive to develop

How are databases developed? What is the most important part of developing a database? A: getting the requirements from the people that will use the database

- a long process get the requirements from the end-users, what they want the database to actually do Requirements: Forms, Reports, Queries Data Model: Create Data Model (Entities and Relationships), learn exactly what the programmers are creating the database for Database Design: Create Database Design (Tables with Foreign Keys) Create Database

Supervised data mining

- data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model Regression Analysis: - measures the effect of a set of variables on another variable. - As you will learn in your statistics classes, considerable skill is required to interpret the quality of such a model. - The regression tool will create an equation, Whether that equation is a good predictor of future cell phone usage depends on statistical factors, such as t values, confidence intervals, and related statistical techniques. Neural Networks - Predict, make classifications, identify good prospects

IS creating Competitive Advantages for the ABC shipping Co.

- enhances an existing service because it eases the effort of creating a shipment to the customer while reducing errors. - helps to differentiate the ABC package delivery service from competitors that do not have a similar system. - the generation of email messages when ABC picks up and delivers a package could be considered a new service. - Customers will be locked in by this system because all of their information is saved - it raises the barriers to market entry. other companies will have to create a high end IS to compete with ABC - the system reduces costs, reduces errors, and saves ABC paper, ink, and printing costs.

Principles of Agile (Scrum) Development

- expect, even welcome, changes in requirements - frequently deliver working version of the product - work closely with customer for the duration - design as you go - test as you go - team knows best how it's doing/how to change - can be used for business processes, information systems, and applications development

What skills will be marketable during your career?

- need to develop strong nonroutine cognitive skills Four Key skills: Abstract Reasoning - Construct and manipulate models - IS framework, Porter's 5 Forces, Value Chain Systems thinking - Model components of a system to show how inputs and outputs relate to one another - Find ways to create more efficient processes Collaboration - Develop ideas and plans with others - Provide and receive critical feedback Ability to experiment. - Create and test promising new alternatives to solutions - Don't be afraid that an idea might fail - Humans, unlike technology, aren't changing that rapidly.

How should you respond to security threats?

- take security seriously - create strong passwords - Use multiple passwords - Send no valuable data via email or IM - Use https at trusted, reputable vendors - Remove high-value assets from computers - Clear browsing history, temporary files, and cookies (CCleaner or equivalent) - Regularly update antivirus software - Demonstrate security concern to your fellow workers - Follow organizational security directives and guidelines - Consider security for all business initiatives

How do Organizations Use Business Intelligence (BI)?

-project management -problem solving -decision making -becoming informed

How does Watson work? IBM AI

1) acquires content from sources like dictionaries, encyclopedias, literature, reports, and databases. It extracts valuable pieces of data 2) adds them to a corpus of knowledge - a large set of related data and texts. Once the corpus is built, it can start answering questions. 3) Watson generates hypotheses about what might be the right answer to the question. It searches its data for possible candidate answers. takes the top 250 candidate answers and then filters them down to the top 100 answers. uses many different techniques to score each answer 4) Watson merges all of the scored candidate answers, identifies the best possible answer, and estimates the probability that the answer is correct does everything from question analysis to final answer estimation in 3 seconds! That's powerful.

This is the most important Class in the School of Business because...

1. Future business professionals need to be able to assess, evaluate, and apply emerging information technology to business. 2. It can give you the ultimate in job security, marketable skills, by helping you learn abstraction, systems thinking, collaboration, and experimentation. 3. Many well-paid MIS-related jobs are in high demand. -Technology is fundamentally changing business - Production, distribution, control of information are primary economic drivers (Information Age) - Conversion from mechanical/analog devices to digital devices (digital revolution)

Example of Business Processes (Drone Manufacturer)

1. The materials ordering process transforms cash into a raw materials inventory. 2. The manufacturing process transforms raw materials into finished goods. 3. The sales process transforms finished goods into cash. - the business processes span the value chain activities. - The sales process involves sales and marketing as well as outbound logistics activities - none of these three processes involve a customer-service activity, but customer service plays a role in other business processes. - activities get and put data resources from and to databases.

A hierarchy of data Elements (things that makeup a database)

1. table or file (represents an Entity) 2. records or rows 3. fields or columns (Attributes) 4. bytes (a character of data) or characters As you learned in Chapter 4, a byte is a character of data. In databases, bytes are grouped into columns, such as Student Number and Student Name. Columns are also called fields. Columns or fields, in turn, are grouped into rows, which are also called records. Finally, a group of similar rows or records is called a table or a file. From these definitions, you can see a hierarchy of data elements, as shown in Figure 5-4.

3D Printing In the future: 3D-print extra-large objects like cars, 19 planes, boats, houses, and drones?

3D printing will not only change the competitive landscape, but it may change the nature of businesses themselves. - They can print in plastic, metal, wood, ceramics, foods, and biological material too. - 3D printers have the potential to affect a broad array of industries beyond sporting equipment. - Take the ability to 3D-print in a variety of materials and look for opportunities across the aerospace, defense, automotive, entertainment, and healthcare industries.

Two Functions of a BI Server (BI Server stored in Metadata, shown in Figure)

A BI server is a Web server application that is purpose-built for the publishing of business intelligence. BI servers use metadata to determine what results to send to which users and, possibly, on which schedule. Management - maintains metadata about the authorized allocation of BI results to users. Delivery - tracks what results are available, what users are authorized to view those results, and the schedule upon which the results are provided to the authorized users. Also, It adjusts allocations as available results change and users come and go.

1. Which of the following statements is TRUE about the relationship between business processes and information systems?

A business process need not relate to any information system but an information system relates to at least one information system

ISP (Internet Service Provider)

A company that provides customers access to the Internet.

Stored Procedure

A computer program stored in the database that is used to enforce business rules.

What is artificial intelligence? Importance?

A computer program that can perform tasks that can usually only be performed by humans. This technically includes translation, vision, communication, learning, decision making, voice recognition, and more to achieve a goal. - AI could be used in robots, commercial drones, agricultural systems, military platforms, surgical systems, and other smart devices. - AI increases automation, or the process of making systems operate without human intervention, of mundane tasks typically done by humans.

What is a data mart?

A data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business. - If the data warehouse is the distributor in a supply chain, then a data mart is like a retail store in a supply chain. - Users in the data mart obtain data that pertain to a particular business function from the data warehouse. - Such users do not have the data management expertise that data warehouse employees have, but they are knowledgeable analysts for a given business function. - subsidiaries of a data warehouse Examples: Web sales data mart, Store sales data mart, Inventory Data Mart Application of Data marts: - used to analyze clickstream data for the purpose of designing Web pages. - analyzes store sales data and determines which products tend to be purchased together. used to train salespeople on the best way to up-sell to customers. - used to analyze customer order data for the purpose of reducing labor for item picking from the warehouse.

What is a database management system (DBMS)?

A database management system (DBMS) is a program used to create, process, and administer a database. - companies license DBMS products from vendors such as IBM, Microsoft, Oracle, and others. Note that a DBMS and a database are two different things. For some reason, the trade press and even some books confuse the two. A DBMS is a software program; a database is a collection of tables, relationships, and metadata. Create Database developers use the DBMS to create tables, relationships, and other structures in the data- base. Process (second function) Such processing can be quite complex, but, fundamentally, the DBMS provides applications for four processing operations: to read, insert, modify, or delete data, using SQL - These operations are requested in application calls upon the DBMS. Administer (third function) - Accounts, Passwords, permissions of least privilege provide tools to assist in the administration of the database. - AND backing up database data, add- ing structures to improve the performance of database applications, removing data that are no longer wanted or needed, and similar tasks. - Database administration involves a wide variety of activities. For example, the DBMS can be used to set up a security system involving user accounts, passwords, permissions, and limits for processing the database.

What is a data warehouse?

A facility for managing an organization's BI data. - Obtain data: operational, internal, and external databases - Cleanse data - Organize and relate data - Catalog data, using metadata a large store of data accumulated from a wide range of sources within a company and used to guide management decisions. - The data warehouse takes data from the data manufacturers (operational systems and other sources), cleans and processes the data, and locates the data on the shelves, so to speak, of the data warehouse. - think of a data warehouse as a distributor in a supply chain. - data analysts who work with a data warehouse are experts at data management, data cleaning, data transformation, data relationships, - facility for managing an organization's BI data. - Metadata concerning the data—its source, its format, its assumptions and constraints, and other facts about the data—is kept in a data warehouse metadata database. - Programs read operational and other data and extract, clean, and prepare that data for BI processing. The prepared data is stored in a data warehouse database. The data warehouse extracts and provides data to BI applications.

Where is information?

A graph is not information, but instead data that humans perceive, and from that perception you conceive information. - If it's on a piece of paper or a digital screen, it's data, if it's in the mind of a human, it's information. - Data is just data; the information that you conceive from it is the value that you add to the information system.

Which of the following usually happens in a malicious denial-of-service attack?

A hacker floods a Web server with many millions of bogus service requests.

Connecting Tables through Keys and Relationships

A key (also called a primary key) is a column or group of columns that identify a unique row in a table. - Every table must have a key. foreign keys. This term is used because such columns are keys, but they are keys of a different (foreign) table than the one in which they reside. - databases that carry their data in the form of tables and that represent relationships using foreign keys are called relational databases.

Data Storage Capacity Terminology

A kilobyte, abbreviated KB, is a collection of 1,024 bytes. A megabyte, or MB, is 1,024 kilobytes. A gigabyte, or GB, is 1,024 megabytes; a terabyte, or TB, is 1,024 gigabytes; a petabyte, or PB, is 1,024 terabytes; an exabyte, or EB, is 1,024 petabytes; a zettabyte, or ZB, is 1,024 exabytes.

Server Farm

A massive network of computer servers running software to coordinate their collective use. Server farms provide the infrastructure backbone to SaaS and hardware cloud efforts, as well as many large-scale Internet services.

What are the following criteria for successful collaboration?

A meaningful and satisfying experience Successful outcome Growth in team capability

Deep Learning

A method for stimulating multiple layers of neural networks rather than just a single layer.

What is a Value Chain?

A network of value-creating activities (5 primary activities in the generic value chain) Porter's definition of Value: - the amount of money that a customer is willing to pay for a resource, product, or service. Margin: - The difference between the value that an activity generates and the cost of the activity - (Margin = value - costs) A business with a differentiation strategy will add cost to an activity only as long as the activity has a positive margin. Linkages: - Interactions across value activities - That generic chain consists of five primary activities and four support activities. - Each stage of this generic chain accumulates costs and adds value to the product.

Information Age

A period in history where the production, distribution, and control of information is the primary driver of the economy. - Started in the 1970s with the digital revolution

What is the difference between a system and an information system (IS)?

A system is a group of components that interact to achieve some purpose, whereas an information system (IS) is a group of components that interact to produce information.

Turing Test (and a figure that shows the human abilities that AI is trying to replicate)

A test proposed by Alan Turing in which a machine would be judged "intelligent" if the software could use conversation to fool a human into thinking it was talking with a person instead of a machine.

IP Address (Internet Protocol Address)

A unique number identifying every computer on the Internet (like 197.123.22.240) - normally 11 digits

Surviving a Shifting Workplace

AI-enabled machines will also need humans for the foreseeable future because they lack some- thing humans have—instincts. - drive humans to stay alive, procreate, improve their position, and seek the protection of others. - These forces ensured the survival of the human species.

What are Human Safeguards? (Other)

Account Administration - Manage accounts - Password management - Help Desk Policies Systems Procedures - Normal Operation - Backup - Recovery Security Monitoring - Activity log analyses - Security testing - Investigating Security Incidents

Revenue Models for Social Media

Advertising Pay-per-click - Use increase value: The more people use a site, the more value it has, and the more people will visit Freemium - Offers users a basic service for free, and then charges a premium for upgrades or advanced features

Smart Devices

An electronic device connected to other devices, usually with wireless technology, to exchange data and information. - Smart devices need microprocessors, memory, wireless network connections, a power source, and new software - These devices will also need new protocols, more bandwidth, and tighter security, and they will consume more energy.

Porter's Four Competitive Strategies, Analysis of Industry Structure Determining Competitive Strategy

Analysis of Industry Structure Determines Competitive Strategy (1)cost-leadership, (2)differentiation, (3)cost-focus, (4)focused-differentiation 1. Industry-Wide Cost: The lowest cost across the industry 2. Industry-Wide Differentiation: Better product/service across the industry 3. Cost Focused: Lowest cost within an industry segment 4. Focus Differentiation: Better product/service within an industry segment

Unsupervised data mining

Analysts do not create a model or hypothesis before running the analysis. Analysts create hypotheses after the analysis, in order to explain the patterns found. - they apply a data mining application to the data and observe the results. Cluster analysis - a statistical technique that identifies groups of entities that have similar characteristics. - A common use for cluster analysis is to find groups of similar customers from customer order and demographic data. - Market-Based Analysis - Decision Trees

What Types of Applications Exist, and How Do Organizations Obtain Them?

Application software performs a service or function. - Some application programs are general purpose, such as Microsoft Excel or Word. Other application programs provide specific functions example - QuickBooks. Horizontal-market application software provides capabilities common across all organizations and industries. - Everybody buys it and then uses them for different purposes. Word processors, graphics programs, spreadsheets, and presentation programs (Microsoft Word, Excel, and PowerPoint.) Vertical-market application software serves the needs of a specific industry.

What Are the Differences Between Native and Web Applications? The Figure contrasts native and Web applications on their important characteristics.

Applications can be categorized as native applications that run on just one operating system or Web applications that run in browsers.

Users' Role in the Development of Databases

As stated, a database is a model of how the users view their business world. - the users are the final judges as to what data the database should contain and how the records in that database should be related to one another. - user review of the data model is crucial. - Entities must contain all of the data you and your employees need to do your jobs, and relationships must accurately reflect your view of the business. - The easiest time to change the database structure is during the data modeling stage.

Digital reality devices (VR/AR/MR) - Levels of Digital Reality Virtual - simulated nonphysical environments. Reality - the state of things as they actually exist.

Augmented Reality (AR) - Alter reality by overlaying digital information on real-world objects. Can actually still see the natural environment around you (Using a Snapchat filter overlay on faces, Google Glass ($1,250), Epson's Moverio Smart Glasses ($700), and Daqri Smart Helmet) Virtual Reality (VR) - Completely computer-generated virtual world with interactive digital objects - Facebook's Oculus Rift ($465), Sony's PlayStation VR ($349), and Samsung Gear VR ($129). You are just looking at a virtual world Mixed Reality (MR) - Combination of real-world with interactive virtual images or objects. - Microsoft (HoloLens, $3,000) and Meta (Meta 2, $1,495) - These are completely immersive experiences that try to create a strong sense of presence or the illusion that a virtual experience is real. - ability to interact with virtual objects in real-time. A hybrid of the two Doesn't cover the entire physical world, some transparency

Self-Driving Cars will Disrupt Businesses

Auto Sales - Fewer cars on the road may mean fewer cars sold - Auto Loans, insurance, collision repair jobs - More jobs for engineers, technical jobs - More computer Hardware

Difference between business intelligence users and knowledge workers

BI users are generally specialists in data analysis knowledge workers are often non-specialist users of BI results. A loan approval officer at a bank is a knowledge worker but not a BI user.

1. What is the software component of a BI System called?

BI application

Stages of Business Process Management - 4 Steps

BPM is a cyclical process for systematically creating, assessing, and altering business processes. 1. As-is-model: model of existing business processes. 2. Create components: design changes to the business process at a depth sufficient for implementation 3. Implement processes 4. Continually assess business process effectiveness. "As-is-model" is considered the most important phase

What are the four primary purposes of collaboration?

Become Informed Share data and communicate interpretations of data Develop & document shared understandings Discuss and come to some agreements, document these agreements, to continue pursuing forward progress Making decisions (structure and unstructured) Operational - Support day-to-day activities Managerial - About the allocation and utilization of resources Strategic - Support broad scope organizational issues Solve problems Perceived differences between what is and what should be Manage projects - starting, planning, doing, and finalizing

Quiz Question: The four primary purposes of collaboration are organized in a hierarchy that build on each other. Which option correctly lists that hierarchy?

Become informed, Make decisions, Solve problems, Manage projects

How do organizations use BI?

Becoming Informed - Which products are selling quickly? - Which products are most profitable? - Using the data to find out what is selling the best Decision Making - Determine what products/services to suggest for cross-selling. - Create custom marketing plans per store. - Determine the location of the closest retail store to each user. They could then create customized marketing plans for each store, targeting the products those specific customers buy most often. Problem Solving - How can we increase sales? - How can we reduce waste? - Determining what is as well as what should be. If revenue is below expectations, a grocery store manager can use BI to learn what factors to change to increase sales and reduce food waste. (i.e buying the right types of food in the correct quantities) Project Management - Support projects by leveraging BI to do all the above - A grocery store manager can use BI to support a project to build an in-store café. If the café is successful, it can use BI to determine which locations would be good future expansion targets.

Social Media and Inbound and Outbound Logistics

Benefits - Numerous solution ideas and rapid evaluation of them. - Better solutions to complex supply chain problems. - Facilitates user created content and feedback among networks needed for problem solving. Loss of Privacy - Open discussion of problem definitions, causes, and solution constraints. - Problem solving in front of your competitors.

Computer Data

Binary Bits, called Bits - How Computers represent data. A bit is either a zero or a one. Bits are used for computer data because they are easy to represent physically. All forms of computer data are represented by bits. - bits are grouped into 8-bit chunks called bytes. - the orientation of a magnetic field can represent a bit: magnetism in one direction represents a zero; magnetism in the opposite direction represents a one.

The Five components of a Mobile System (Figure shows Five Components of Mobile Change and Opportunity) "If you're not paying for it, you are the product. Data is where you make money, not software. Give them the software, take the data, and make the money. It's simple."

Broken into: Hardware: increasing demand for mobile systems means the sales of many more mobile devices, Software: The reduced size of mobile devices requires the invention of new, innovative interfaces.The mobile user is an active user and expects an active screen experience. Because of the continually changing software environment, new opportunities abound and will continue to do so for decades. Data: Many more mobile systems mean an incredible amount of new data, data that professionals can use to create much more information. Procedures: blending of our personal and professional lives. Such blending means, in part, that business will intrude on your personal life, and your personal life will intrude on your business. Mobile systems offer the potential of just-in-time data, which is data delivered to the user at the precise time it is needed. People: Mobile systems change the value of our thinking. For example, just-in-time data removes the premium on the ability to memorize vast quantities of product data, but creates a premium for the ability to access, query, and present that data.

What are some challenges for Managing Development?

Brook's Law 1. Coordination 2. Diseconomies of scale - Brook's Law - "Adding more people to a late project makes the project later." 3. Configuration Control - Set of management policies, practices, and tools. - Used to maintain control over project resources 4. Unexpected Events - New management - Technology, competitor changes - Disasters - Loss

Browser applications - Databases on the web (web database) Figure Shows Four Application Programs on a Web Server Computer

Browser applications are thin-client applications that need not be preinstalled on the users' computers. - In most cases, all of the code for generating and processing the application elements is shared between the users' computers and the servers. JavaScript is the standard language for user-side processing. - Languages like C# and Java are used for server-side code, though JavaScript is starting to be used on the server with an open-source product named Node.js. - Browser database application forms, reports, and queries are displayed and processed using HTML and, most recently, using html5, css3, and JavaScript - Browser-based applications can support traditional queries, but more exciting are graphical queries, in which query criteria are created when the user clicks on a graphic. -Security requirements are more stringent for browser-based Internet applications than for traditional ones. Most traditional applications run within a corporate network protected from threats common on the Internet.

What is done in the Implementation phase?

Build System components Conduct unit test Integrate components Conduct integrated tests Convert to New System

Role of Development Personnel

Business Analysts - Business Process Management System Analysts - Information System Development Programmers, Database Designer, Test Personnel, Hardware Specialists, System Analysts - Application Development

Properties of Business Processes

Business processes are defined as a network of activities, repositories, roles, resources, and flows that are continuously evolving. Roles - are like job titles - are a collection of activities Resources - People or computer applications assigned to roles Flow can be one of two things: - Control flow - directs order of activities - Data flow - movement of data among activities and repositories

How can information systems improve process quality? How do IS improve Process Quality?

By performing an activity - Automate credit check - Reserve seat on an airline By enhancing how a human performs an activity - Managing patient appointments - Entering grades into Canvas By controlling data quality and process flow - Ensure data values are correct and complete - Approve orders as it pertains to an established schedule - Data quality can be controlled by data types in Access

In a database, ________ are grouped into columns. A) fields B) records C) bytes D) files

C) bytes

How do Social Media information systems increase Social Capital

Capital - Investment of resources for future profit Types of business capital - Physical capital: produce foods and services (factories, machines, manufacturing equipment) - Human capital: human knowledge and skills investments - Social capital: social relations with the expectation of marketplace returns.

Hardware Basics - Central Processing Unit (CPU) Start of Module 4

Central Processing Unit (CPU) - "the brain" Dual processor (two CPUs) and Quad processor computers (4 CPUs), The CPU selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory. - CPUs can be made with different processing speeds, called hertz, different function, different costs. - Works in conjunction with main memory (RAM) - The CPU reads data and instructions from memory and then stores the results of computations in the main memory. Main memory is sometimes called RAM, for random access memory. -Reads data and instructions from memory, and stores results of the computation in memory. - CPU works in conjunction with main memory (RAM)

How do organizations use the cloud? The figure shows what you manage, and what the Vendor Manages. Service Models: Traditional On-Premises Infrastructure as a service (IaaS) Platform as a service (PaaS) Software as a Service (SaaS) In figure: Applications, Data, Runtime, Middleware, OS, Virtualization, Servers, Storage, Network

Cloud Services from Cloud Vendors (Most Popular) IaaS (Infrastructure as a service) - the most basic cloud service, offering basic server computers and/or storage. - Amazon EC2, Amazon S3 PaaS (Platform as a service) - Provides hosted computers, an operating system, and possible a DBMS - Microsoft Azure, Oracle on Demand, Amazon Web Services - the individual simply logs in, and what they see on their computer is not really installed on their computer, but is being hosted by the vendor through the internet SaaS (Software as a Service) - Provides operating system and application programs - vendor manages everything - SalesForce, Apple iCloud, Microsoft Office 365

Lego involves consumers in the creation of new sets on its Lego Ideas site where people can submit their own Lego creations and if they get enough votes, Lego puts them into production. This is an example of using social media to do what?

Crowdsource

Scrum Process

Connected in the Figure: Product owner to Prioritized Requirement List Choose Requirements to Deliver Stand-Up (daily) Do Work (Daily) Deliver & Reflect

Amanda is at her first IU Basketball game. She posts a selfie to Instagram getting several likes and comments. Her post along with the likes and comments are examples of _____________.. Single choice.

Content Data

________ are small files that enables a browser to access Web sites without having to sign in every time.

Cookies

How do CRM, ERP, and EAI support Enterprise processes?

Customer Relationship Management (CRM) Enterprise Application Integration (EAI) Enterprise Resource Planning (ERP)

Quiz Question When a group of product users voluntarily help other users solve problems with the product, to which primary value chain activity are they contributing?

Customer Service

Impact of Digital Reality Devices **The full impact of digital reality devices won't be understood for years—we just don't know how they'll be used.

Could disrupt the smartphone market - iOS 11 supports broad use AR Education, Training, Collaboration, etc. - Lowe's Holoroom - design your own room before commiting. Too many unknowns to predict its (full) impact - New skills, processes, tools, and ways of thinking are going to be needed as companies start to take up these devices

Who is responsible for Data Safeguards? (In an organization)

Data Administration - An organization-wide function develops data policies and enforcing data standards Database Administration - Develop procedures and practices to ensure efficient and orderly multiuser processing, control changes, and protect databases

QUIZ Question In a BPMN process diagram, dotted arrows depict the flow of ________ in the process.

Data

Primary Activities in the BI Process

Data Sources: - Operational databases, Social Data, Purchased Data, Employee knowledge Acquire data: - the first step in the BI process. - Obtain, Cleanse, Organize & relate, Catalog Perform analysis (analyzing data): - Filtering the data. - Reporting, Data mining, Big Data, AI, Machine Learning Publish results: the last activity in the BI process. the process of delivering business intelligence to the knowledge workers who need it. - Print, upload to Web servers, Report servers, Knowledge management systems, creating PDFs and Powerpoints, content management systems (push and pull publishing) - Then Feedback results

How is a data model transformed into a database design?

Database design is the process of converting a data model into tables, relationships, and data constraints. - The database design team transforms entities into tables and expresses relationships by defining foreign keys. Normalization: the process of converting a poorly structured table into two or more well-structured tables. - a foundation of database design - The general goal of normalization is to construct tables such that every table has a single topic or theme. - Transforming a table into a normal form to remove duplicated data and other problems is called normalizing the table. - Summary: every normalized (well-formed) table has one and only one theme. tables that are not normalized are subject to data integrity problems. normalized designs can be slower to process data integrity problem: Some rows indicate that the name of Department 100 is "Accounting and Finance," and another row indicates that the name of Department 100 is "Accounting." Representation of two kinds of relationships: - help you understand important design considerations. First, the database designer creates a table for each entity. The identifier of the entity becomes the key of the table. Each attribute of the entity becomes a column of the table. Next, the resulting tables are normalized so that each table has a single theme. Once that has been done, the next step is to represent the relationships among those tables.

What are Data Safeguards?

Define data policies Data rights and responsibilities Enforce rights with least privileged (usernames and passwords) Data encryption Backup and recovery procedures - to protect against data being lost Physical security - Data in physically locked securities

What is done in the Define System System phase?

Define the system goals and scope - What does the system have to accomplish? - How many features are necessary? Determine feasibility - Cost, schedule, technical, and organizational Form a project team - Project managers, coders, business analysts, end-user, and more Plan the project - Determine roles, set schedules, and determine task dependencies

Which phase in the SDLC is considered the MOST important?

Determine Requirements

What is done in the Design System Component Phase?

Determine hardware specifications Determine software specifications Design database Design Procedures Create job definitions (people)

Primary Drivers of System Development

Development involves inherent trade offs between time and scope, cost and scope, and time and cost. Keys to success: - Create work breakdown structure (WBS) - Estimate time vs costs - Create project plan - Adjust for trade-offs - Manage Challenges

Connecting to the Internet

Devices connect through an Internet Service Provide (ISP) Digital Subscriber Line (DSL) - Operates using telephone lines but does not interfere with phone communication (these days) Cable Line - Provide high-speed data transmission using cable TV lines (speeds vary) - internet providers will typically tell you what speeds you are paying for, but can very because of traffic. WAN Wireless Connection - AT&T, Sprint, Verizon cellular towers or through Wireless router as part of a LAN network. - think of a cellular data plan Fiber Optic - The newest and fastest way to connect. Requires a company to install fiber optic cable underground. Limited, but growing, availability. Usually less expensive than cable. - has to be buried and connected by internet companies

Cryptocurrencies Potential to transform world economies Bitcoin, introduced in 2009, is currently the most well-known cryptocurrency among the thousands available today.

Digital-only currencies (Like Bitcoin) - use cryptographic protections to manage and record secure transactions. - Use cryptographic protections to manage and record secure transactions Benefits: Faster, easier, few to no fees - Governments can't tax, seize, monitor - protects against inflation: 21 million possible bitcoins, Each bitcoin can be broken down into smaller fractions of a bitcoin, with the smallest unit, a satoshi, being 1/100,000,000 of one bitcoin. won't be any more bitcoins created beyond the original 21 million. This is not the case with Fiat currencies (government-approved legal tender.) Risks: price volatility, not accepted everywhere, nothing backing its value, bad reputation with being used in organized crime. Future: Cryptocurrencies are slowly gaining acceptance. Banks and even some governments are launching their own cryptocurrencies. Blockchain - underlying technology, making all types of transactions more secure - the decentralized public ledger system used to record cryptocurrency transactions, to manage transactions in traditional sectors like shipping, real estate, voting, and stock trading.

Business A is experiencing a high rate of employee turnover due to Business B having a better benefits package. How to resolve this issue and keep employees at Business A involves which type of business processes?. Single choice.

Dynamic Process because it requires human thinking

________ are flexible, informal, and adaptive processes that normally involve strategic and less structured managerial decisions and activities.

Dynamic processes

Social Media and Sales and Marketing

Dynamic, SM-Based CRM process Social CRM - Each customer crafts a relationship: Wikis, blogs, discussion lists, FAQ, reviews, tweets, etc. - Balance of Power is shifted: A "low value" customer can have major influence - Social media "Ambassadors" help to sell products

Indiana University's network is best described as a Local Area Network (LAN).

False

Company A engages in a low-cost strategy. If Company A improves their business process by reducing the time it takes to fulfill customer orders while improving order accuracy, and using fewer resources, it improves the business process in which way(s)?. Single choice.

Efficiency and Effectiveness because not only is it making more outputs, it's also making it more accurate

Quiz Question Social media (SM) providers host the SM presence using ________ in the cloud.

Elastic Servers

How should organizations respond to security threats?

Establish a company-wide security policy - Technical, data, and human safeguards Manage Risk - Proactivity balance trade-off between risk and costs

Information Systems vs Applications vs Business Process

Every information system (IS) has 5 components with at least one application An application (App) is a combination of hardware, software, and data components - A business process (BP) consists of one or more activities. A BP need not relate to any information system, but an information system relates to at least one business process.

Dynamic processes are standardized processes that involve day-to-day operations.

False

New Entrants (1 of 5 forces)

How easy or difficult it is for more competition to join the marketplace What affects threat of new entrants? - Time and cost of entry - Specialist Knowledge - Economies of Scale - Barriers to entry (i.e regulations)

How do information systems eliminate the problems of information silos?

How information Silos Occur: - Data isolated in islands of automation - Different department goals - Different personal and workgroup needs - Duplicate data as an organization grows Information Silo Examples: - Manufacturing - IT Department - Recently Acquired Company - Marketing Department - Can also occur in the same department, with the duplication of data

Transfer Control Protocol (TCP)

How information is broken up into small packets, which can be sent separately in route

Benefits of AI

Human Employees cost at least $35 per hour. If you buy an automated system, you won't have to pay for any of the additional benefits required with human labor. You won't have to pay for overtime, leave, insurance, or retirement contributions. Reduces the risks of employee fraud, don't need severance packages, don't have union overhead, can't go on strike, don't steal intellectual property, won't file discrimination lawsuits, and can't harass coworkers. - A good example of an organization benefiting from an automated system is online banking. Banks that offer consumers online banking have seen both increases in productivity and decreases in costs

The ________ protocol standard is also known as Ethernet.

IEEE 802.3

What are the common approaches to system conversions (implementation)?

IS Professionals recommend any of first three, depending on circumstances. In most cases, avoid "taking the plunge!" Pilot - Implement entire system in limited portion of business - Limits exposure to business if system fails Phased - System installed in phases or modules - Each piece installed and tested Parallel - Complete new and old systems run simultaneously - Very safe, but expensive Plunge - High risk if new system fails - Only used if new system not vital to company operations

Do you already use cloud computing?

IU anyWare - Use IU-licensed software applications without actually needing to install the software on the device. OneDrive, Google Drive, DropBox, iCloud, etc. - Store personal files on another computer that can be accessed from anywhere. Gmail, Hotmail, Yahoo mail, etc. - You are not responsible for hosting an e-mail server and you can access e-mail from anywhere

What are Technical Safeguards? pg. 398

Identification and authentication - Usernames and Passwords/smart cards/biometrics Encryption - Transforms clear text into coded, unintelligible text, requiring a key to read Firewalls - Prevent unauthorized access to the network - Like a filter that filters traffic in a variety of ways Malware protection - Virus: a computer program that replicates itself. Unchecked replication is like computer cancer; ultimately, the virus consumes the computer's resources. Furthermore, many viruses also take unwanted and harmful actions. The program code that causes the unwanted actions is called the payload. The payload can delete programs or data—or, even worse, modify data in undetected ways. - Trojan Horse: viruses that masquerade as useful programs or files. A typical Trojan horse appears to be a computer game, an MP3 music file, or some other useful, innocuous program. - Worm: a virus that self-propagates using the Internet or other computer network. Worms spread faster than other virus types because they can replicate by themselves. Unlike non worm viruses, which must wait for the user to share a file with a second computer, worms actively use the network to spread. Sometimes, worms can propagate so quickly that they overload and crash a network. - Spyware: programs are installed on the user's computer without the user's knowledge or permission. Spyware resides in the background and, unknown to the user, observes the user's actions and keystrokes, monitors computer activity, and reports the user's activities to sponsor organizations. Some malicious spyware, called key loggers, captures keystrokes to obtain usernames, passwords, account numbers, and other sensitive information. Other spyware supports marketing analyses such as observing what users do, Web sites visited, products examined and purchased, and so forth. - Adware: Adware is similar to spyware in that it is installed without the user's permission and resides in the background and observes user behavior. Most adware is benign in that it does not perform malicious acts or steal data. It does, however, watch user activity and produce pop-up ads. Adware can also change the user's default window or modify search results and switch the user's search engine. - Ransomware: is malicious software that blocks access to a system or data until the money is paid to the attacker. Some forms of ransomware encrypt your data (CryptoLocker), prevent you from running applications, or even lock you out of your operating system (Reveton). Attackers demand to be paid before they will allow access to your data or system. - A lot of OS comes with malware nowadays, but most need to be updated Design for secure applications - Prevent common attacks like SQL injection attacks

What is the goal of IS security?

Implement safeguards that balance risk and cost

Process Need Management for 3 Reasons

Improve process Quality - Efficiency/Effectiveness Adapt to change in technology - New Capabilities Adapt to change in business fundamentals - Customer demographics, mergers, new product lines, etc.

Social Media in all Value Chain Activities

Inbound Logistics Manufacturing Outbound Logistics Sales and Marketing Customer Service

As you get ready to schedule classes for next semester, you might ask a friend for advice about which professor to choose. This is an example of social capital adding value in which way?

Information

What is the difference between IS and IT?

Information Technology + Procedures & People = Information Systems - IS is the umbrella department of which IT is a major part

What are the components of a BI system? (decision support systems)

Information systems that process operational data, social data, purchased data, and employee knowledge to identify patterns, relationships, and trends for use by business professionals and other knowledge workers. - These patterns, relationships, trends, and predictions are referred to as business intelligence. - Business intelligence is buried inside data, and the function of a BI system is to extract Business Intelligence and make it available to those who need it. - As information systems, BI systems have the five standard components: hardware, software, data, procedures, and people. - The software component of a BI system is called a BI application: - The BI application processes the data with reporting applications, data mining applications, and Big Data applications to produce business intelligence for knowledge workers. - A reporting application is a BI application that inputs data from one or more sources and applies reporting processes to that data to produce business intelligence. - The boundaries of BI systems are blurry.

Which of the following scope classifications would most likely include information systems that are the most difficult to change?

Inter-Enterprise process because it involves the most people

Poll - Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device?

Internet of Things (IoT)

How do businesses acquire software? Figure shows Software Sources and Types

License: - Right to use a specified number of copies - Limits the vendor's liability Site License: - Flat fee to install the software product on all company computers or all computers at a specific site. - a flat fee that authorizes the company to install the product (operating system or application) on all of that company's computers or on all of the computers at a specific site. Open Source: - No license Fees (typically) Software Type: Horizontal Applications - Buy and use as is Vertical Applications - software that serves a particular industry, can be purchased off the shelf and then customized One-of-a-kind applications - customized to a certain niche, more expense, and last alternative if nothing else can suit their needs. The U.S. Depart- ment of Defense develops such software, for example, because it has needs that no other organization has. Software Source: - Shown in the figure Off the Shelf, Off the Shelf and then customized, Custom developed

What's the difference between spreadsheets and databases?

Lists of data involving a single theme can be stored in a spreadsheet; lists that involve data with multiple themes require a database. Databases store data about multiple related themes: Grades, email, office visits, etc. - Each table has just the data for that theme - A well-designed database should not have redundant data or calculated fields.

Competitive Strategy Determines Value Chain Structure

Low Cost Strategy - All value chain activities focused on keeping costs low Differentiation Strategy - Value chain activities focused on increasing value

How AI Works

Machine-learning (Machine Learning) - a subset of AI, or the extraction of knowledge from data based on algorithms created from training data. focused on predicting outcomes based on previously known training data. Algorithm - a set of procedures used to solve a mathematical problem, that best fits our situation. Example of an algorithm: Naïve Bayes Classifier - predicts the probability of a certain outcome based on prior occurrences of related events. Natural language processing (NLP) - the ability of a computer system to understand spoken human language, to answer questions. IBM's artificial intelligence named Watson uses this and is a question answering system that draws on several areas of AI.

Ability to Experiment (Experimentation)

Making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources that you have. - Create and test promising new alternatives to solutions - Don't be afraid that an idea might fail

Which of the following alternatives for sharing content provides version control?

Microsoft SharePoint

Mobile systems; a game changer? (lots of detail in the figures) A mobile device (smartphones, tab- lets, smartwatches, and small, light laptops) is a small, lightweight, power-conserving, computing device that is capable of wireless connectivity.

Mobile systems are information systems that support users in motion. Mobile systems users access the system from any place—at home, at work, in the car, on the bus, or at the beach—using any smart device, such as a smartphone, tablet, or PC. The possibilities are endless. - not only geographically but also from device to device. -the cloud is a group of servers on the other end of a connection with a mobile device. - can be a game-changer on how we work - Impact of mobile systems growth - Industry changes - Career Opportunities

Which of the following is TRUE of online ad revenue?

Most ads on social media generate revenue only when customers click on them.

Multi-user Processing

Most traditional and browser-based applications involve multiple users processing the same database. - does pose unique problems: lost-update problem, someone checks out with the last item, and then someone else buys that item because they already had it in their virtual cart. - If you find inaccurate results that seem not to have a cause, you may be experiencing multi-user data conflicts. Contact your IS department for assistance.

Programs that are written to work with a particular operating system are known as ________ applications.

Native

Developing Native Applications All of these languages are object-oriented, which means they can be used to create difficult, complex applications and, if used properly, will result in high-performance code that is easy to alter when requirements change. object oriented gives programmers close control over the assets of the computing device and enables the creation of sophisticated and complex user interfaces. object oriented is limited by the budget usually, not the technological aspect Also, they are native, so they only run on the program that they were programmed on.

Native applications are developed using serious, heavy-duty, professional programming languages. - macOS and iOS applications are constructed using Objective-C or the Swift - Linux (Android) applications are constructed using Java - Windows applications are constructed using C#, VB.NET, C++ - native applications are expensive, relative to web applications

Is microsoft access considered a database?

No, its a database management system (DBMS)

Which of the following programming languages are essential to developing native applications? CSS3 HTML5 JavaScript None of these

None of these

The Major Operating Systems (Great detail shown in the Figure)

Nonmobile Clients (Computers): Windows, MAC OS, Unix and Linux Mobile Clients (Mobile Devices): iOS, Android and Windows Servers: Window Server, Unix, Linux Unix is an operating system that was developed at Bell Labs in the 1970s. It has been the workhorse of the scientific and engineering communities since then. Unix is seldom used in business. Linux is a version of Unix that was developed by the open-source community. This community is a loosely coupled group of programmers who mostly volunteer their time to contribute code to develop and maintain Linux.

Nonmobile Client Operating Systems

Nonmobile client operating systems are used on personal computers. The most popular is Microsoft Windows. - Some version of Windows resides on more than 88 percent of the world's desktops, and, if we consider just business users, the figure is more than 95 percent. - Apple touts macOS High Sierra it as the world's most advanced desktop operating system. Until recently, macOS was used primarily by graphic artists and workers in the arts community.

Quiz Question: Deciding how many parts to order from a vendor is an example of what type of decision?

Operational

Switching Costs

Organizations can lock in customers by making it difficult or expensive for customers to switch to another product. - Organizations can lock in suppliers by making it difficult to switch to another organization or, stated positively, by making it easy to connect to and work with the organization.

In information security, which of the following is true about managing risk?

Organizations should implement safeguards that balance the trade-off between risk and cost.

Purpose of Database?

Organize and keep track of things Keep track of multiple themes - Products - Transactions - Customers - Employees

Software Basics - Virtualization

PC virtualization - A personal computer hosts multiple operating systems (Oracle VMWARE) Server virtualization - A server computer hosts on or more server computers Desktop virtualization - A server hosts multiple versions of desktop operating systems (IUanyWare - access your virtual desktop from anywhere)

Types of Hardware (examples in the figure)

Personal Computer, Tablet, Smartphone, server, server farm Servers - a computer that is designed to support processing requests from many remote computers and users. A server is essentially a PC on steroids. - In computing environments servers can send Web pages, email, files, or data to PCs. PCs, tablets, and smartphones that access servers are called clients. Example: Dell Poweredge Server Server Farm - a collection of, typically, thousands of servers. Server farms are often placed in large truck trailers that hold 5,000 servers or more.

What network technology supports the cloud? Computer Network: a collection of computers that communicate with one another Basic Network Types

Personal area Network (PAN) - Connected devices located around a single person think of the things that you own and use, and are connected to one another Local area Network (LAN) - Connects devices that reside in a single location Usually, this means they are in the same building, or if they are in different buildings, they need to be pretty close to one another (a half-mile or less) - the key difference is that all the computers in the local area network are located on property controlled by the organization that operates the local area network. This means that the company can control what goes on and control the cables to connect all those devices. Wide area Network (WAN) - Connects devices at different locations (a company with several campuses worldwide) The Internet and internets (defined) - An internet is a network of networks (LANs, WANs, and other internets), connects the networks together - The internet (capital I) is the most famous internet and is THE collection of networks that you use when you do things in your browser (check your email, go to different websites) - Intranets are private internets used exclusively within an organization. Don't allow access to the outside world, but can still allow for connectivity within the organization. Can still use applications to communicate with one another, but only internally with an intranet. Very private and secure.

You receive an email from Dean Kesner, asking you to click on a link to fill out a survey about student experiences. The email does not have her normal signature and seems too informal. You report this because it is ____________________.

Phishing

If you travel a lot for your job and need to rent a car in each city you visit, that is like which cloud service offering?

Platform as a Service (PaaS)

In the context of the system implementation phase of the systems development life cycle (SDLC), a ________ installation is the riskiest because the old system is shut down and the new system is introduced.

Plunge

Virtualization technology strengthens which characteristic of cloud computing?

Pooled resources

What are Human Safeguards?

Position definition - Provide separation of duties and authorities; determine least privilege - Document whether or not the job involves sensitive data (how sensitive) Hiring and Screening - Background checks, references, social media posts Dissemination of Policies and Enforcement - Employee security training Termination Policies - Revoke access to systems prompt

How can new hardware affect competitive strategies? Five Disrupting Forces (five new hardware developments that have the potential to disrupt existing organizations.)

Potentially Disruptive Hardware Developments for existing organizations - Internet of Things (IoT) - Digital Reality Devices - Self-Driving Cars - 3D printing - Cryptocurrencies

What are practical applications of AI?

Practical AI applications produced to solve real-world problems.

Information Systems support business processes

Prepare Quotation - CRM (IS) Verify Availability - Inventory IS Check Customer Credit - Customer Credit IS Approve Special Terms - No IS Process Order - Shipping IS

Quiz Question Which component of a SMIS is Facebook's Mark Zuckerberg currently struggling with as it pertains to their policies on user content and advertisements?

Procedures

Improve Process Quantity

Process Efficiency - Measure of the ratio of process outputs to inputs - Efficiency is able to be measured Process Effectiveness - Measure of how well a process achieves organizational strategy - More challenging to be quantified How a process can become more efficient/effective: Change Structure -> Change Resources -> Change Both

Social media is the convergence of Disciplines

Psychology Sociology Computer Science MIS Marketing Organization Theory

Diego, the CEO of a bicycle parts manufacturer, asks Abby, the manager of the IS department, for a report of which parts were frequently ordered but ordered in small quantities. Which type of publishing is this?

Pull Publishing Example

Tips for Receiving Critical Feedback

Question you Emotions - Don't get angry, objectively interpret the feedback Do not Dominate - Don't do all the work, delegate evenly - If someone isn't participating, try to involve them in the conversation Demonstrate a commitment to the group "I know this is painful, but if we can make these changes our results will be so much better."

What is done in the maintenance Phase?

Record Requests for change - Failures - Enhancements Prioritize requests - Mandated changes - Severe failures - Enhancements Fix Failures - Patches - Service Packs - New Releases

Which of the following is NOT an example of an unsupervised data mining technique?

Regression analysis

many-to-many relationships

Relationships like this one are called N:M, or many-to-many relationships, because one adviser can have many students and one student can have many advisers. - Adviser and Student. Notice the crow's feet that appear at each end of the line. - This notation signifies that an adviser can be related to many students and that a student can be related to many advisers - Interpret the N and M to mean that a variable number, greater than one, is allowed on each side of the relationship, and that the number of entities on each side can be different.

What are three techniques for processing BI data? (Figure shows the goals and characteristics of three fundamental types of BI analysis.)

Reporting Analysis - Create information about past performance. - Process structured data by sorting, grouping, summing, filtering, and formatting. - Reporting analyses are used to create information about past performance through sorting, grouping, summing, filtering Data mining - Classify and predict. - Use sophisticated statistical techniques to find patterns and relationships Big Data - Find patterns and relationships in big data. - Volume, Velocity, and variety force use of MapReduce techniques. - Some applications use reporting and data mining as well. - The goal of Big Data analysis is to find patterns and relationships in the enormous amounts of data generated from sources like social media sites or Web server logs.

Scrum Essentials

Requirements list drives process Each Work period (1 to 4-8 weeks) - Select requirements to consider - Determine tasks to perform - select requirements to deliver - Team meets daily for 15 minutes (stand-up): What I did yesterday, What I'm going to do today, What's blocking me - Test frequently - Paired work possible - Minimal documentation - Deliver (something) that works - Evaluate team's work process at end of period (and say thanks) Rinse and Repeat until - Customer says we're done - out of time - out of money Three principle roles - Product Owner (business professionals who represent customer) - Scrum Master - Team Member (7 +/- 2 people)

How can Scrum Overcome the Problems of the SDLC?

SDLC has a critical problem: Systems requirements are fuzzy and always changing because they need to be corrected, or more is known, or users change their minds about what they want after they use part of the system, or business needs change, or technology offers other possibilities. Alternatives to SDLC that reflects the unpredictable nature of development: Rapid Application Development (RAD) Scrum (agile development method)

The 5 phases in the Systems Development Life Cycle (SDLC)

SDLC is the traditional process used to develop information systems and applications. Define System - System Need Determine Requirements - Project Plan Design System components - Approved Requirements Implement System Maintain System

Which of the following is an international standard language for processing a database? SQL DB2 DB2 Cassandra

SQL

What are the Characteristics of Enterprise 2.0?

Search Search for a company resources with ease Links - Links to important or commonly used company resources Authoring - Create content via blogs, wikis, discussion forums, etc. Tags - Tag content of relevance Extensions - Suggest additional content based on tags created Signals - Relevant content

Which of the following questions is best answered through unstructured decision making?

Should we continue to outsource our bookkeeping processes?

Quiz Question Taking time to foster genuine connections with your professors, classmates, etc. now with hopes of it leading to opportunities in the future is an example of investing in your __________.

Social Capital

Quiz Question ________ is the investment in social relations with the expectation of returns in the marketplace.

Social Capital

What is a social media information system (SMIS)?

Social Media (SM) - Use of IT to support the sharing of content amongst networks of users - Enables People who share common interests to develop "communities of practice" Social media information system (SMIS) - Contain the same 5 components of all information systems - An IS that supports the sharing of content among networks of users

________ is the investment in social relations with the expectation of returns in the marketplace.

Social capital

What are the Roles in an SMIS?

Social media providers - Facebook, Pinterest, Twitter WeChat, TikTok Users - Individuals and Organizations Communities - Groups of users with a common interest (Facebook page, Group)

Operating System (OS) - Categories of Computer Software in Figure Although the operating system makes the computer usable, it does little application-specific work. **a particular version of an operating system is written for a particular type of hardware.

Software used to control the computer and its peripheral equipment. - Both client and server computers need an operating system, The application's design determines whether the client, the server, or both process it. - functions of an operating system are to read and write data, allocate main memory, perform memory swapping, start and stop programs, respond to error conditions, and facilitate backup and recovery. In addition, the operating system creates and manages the user interface, including the display, keyboard, mouse, and other devices.

Competitive Techniques

Some of these competitive techniques are created via products and services, and some are created via the development of business processes.

one-to-many relationships crow's feet

The angled lines, which are referred to as crow's feet, are shorthand for the multiple lines between Department and Adviser in Figure 5-18. - Relationships like this one are called 1:N, or one-to-many relationships, because one department can have many advisers, but an adviser has at most one department.

Manage Projects (fourth reason for collaboration) Phases, tasks, and shared data in the figure

Starting - set team authority - Set project scope and initial budget - form team - Establish team roles, responsibilities, and authorities - establish team rules Planning Determine tasks and dependencies Assign tasks determine schedule revise budget Doing Perform project tasks Manage tasks and budget reschedule tasks, as necessary document and report progress Finalizing Determine completion prepare archival documents disband team

BI Publishing Alternatives (Figure Lists four)

Static reports are BI documents that are fixed at the time of creation and do not change. (ie. printed sales analysis) - low skill needed Dynamic reports are BI documents that are updated at the time they are requested. A sales report that is current at the time the user accessed it on a Web server is a dynamic report. - higher skill needed user subscriptions, which are user requests for particular BI results on a particular schedule or in response to particular events. (ie a sales manager might subscribe to receive a sales report whenever sales in his region exceed $1M during the week.)

Quiz Question To an organization, the ________ is the likelihood that an entity in a relationship will do something that benefits the organization.

Strength of a relationship

What are the Basic Types of Processes?

Structured Processes: - Formally Defined, standardized processes, that involve day-to-day operations. - Support operational and structured managerial decisions and activities - Structure changes slowly and with resistance - Accepting a return, placing an order, purchasing raw materials, etc. Dynamic Process: - Flexible, informal, and fluid processes - Support strategic and less structured managerial decisions and activities - Adaptive processes that change structure rapidly and readily - Whether to open a new store location, how to solve problems with excessive returns, etc.

Structured Query Language (SQL) Example in the figure

Structured Query Language (SQL) is an international standard language for processing a database. - All five of the DBMS products mentioned earlier accept and process SQL (pronounced "see-quell") statements. - SQL is an international standard for processing a database. SQL can also be used to create databases and database structures.

An employee has to decide how many supplies to order from a certain vendor. What type of decision is this?

Structured operational - No need for feedback and collaboration. Involving collaboration for routine tasks can be frustrating and a waste of time

What are criteria for successful collaboration?

Successful outcome Finish and submit an assignment on time earn 100% on team xP assignments All team members contributing Growth in team capability Better work process Better organization Workload spread evenly A meaningful and satisfying experience Content learned and applied to a real-world scenario Perceived value from the experience Earned an A on the assignment (recognition for work completed)

Establish Alliances with other Organizations

Such alliances establish standards, promote product awareness and needs, develop market size, reduce purchasing costs, and provide other benefits.

Developing Web Applications (great detail in the figure) While browsers are becoming increasingly sophisticated, they cannot offer the full capabilities of the underlying operating system and hardware. While browsers are becoming increasingly sophisticated, they cannot offer the full capabilities of the underlying operating system and hardware.

Such applications run inside a browser such as Firefox, Chrome, Opera, or Edge. The browser handles the idiosyncrasies of the operating system and underlying hardware. Major Advantage: They will run on any operating system or device, within reason. So, one code base and one development team. Considerably cheaper than native applications, due to complexity and needing fewer people to manage just one codebase. - Web development languages are html5, css3, and Javascript. html5 is the latest version of html, - Web applications can be written by professional programmers, and, indeed, most are. The entry-level technical skill required is low, and simple applications are relatively easy to develop.

Swim-Lane Layout

Swim-Lane Layout simplifies the process diagram and draws attention to interactions among components of the diagram. Existing Order Process: Customer Salesperson Operation Manager Credit Manager Sales VP - The tools to read the figure are in the figure above this flashcard.

________ play a key role in moving development projects through the SDLC or scrum development process.

Systems analysts

Security Safeguards and Information Systems

Technical Safeguards - In place to protect hardware and software components Data Safeguards - In place to protect data component Human Safeguards - In place to protect procedure and people components

What is the "Cloud"?

The "cloud" is defined as the elastic leasing of pooled computer resources over the internet. Elastic - Resources can be increased or decreased on demand - pay for only the resources used Pooled - Same hardware used by many different organizations - shared through virtualization Over the Internet (Cloud Definition) - Made easier due to web standards for sending and receiving services over the internet -Allows vendors to manage resources for organizations all over the world.

DNS (Domain Name Server)

The Internet's system for converting alphabetic names into numeric IP addresses.

Abstract Reasoning

The ability to make and manipulate models. One of four key skills for non-routine cognitive thinking. - take a theory and apply it to a scenario

Systems Thinking

The ability to model the components of the system to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. - Find ways to create more efficient processes - parts of the system that come together (the input) to create the output

Collaboration

The activity of two or more people working together to achieve a common goal, result, or work product. - provide and receive critical feedback

Brooks' Law

The adage that states: Adding more people to a late project makes the project later. Brooks' Law is true not only because a larger staff requires increased coordination, but also because new people need to be trained. The only people who can train the new employees are the existing team members, who are thus taken off productive tasks. The costs of training new people can overwhelm the benefit of their contributions.

What is data mining? (Figure shows the Disciplines of Data Mining)

The application of statistical techniques to find patterns and relationships among data for classification and prediction. What are the categories of data mining? - Unsupervised - Supervised Data Mining Characteristics: - used to track customers purchasing patterns - becoming cheaper to do it - not only sales and marketing, but also HR and management - data mining resulted from a convergence of disciplines, including artificial intelligence and machine learning.

QUIZ: Which of the following is TRUE of traditional database application programs with "thick" installations?

The application, the DBMS, and the database all reside on the user's computer.

Central Idea of Business Process Design

The central idea is that organizations should not automate or improve existing functional systems. - Rather, they should create new, more efficient business processes that integrate the activities of all departments involved in a value chain.

How Are Data Models Used for Database Development? data modeling and database design. Figure 5-16 summarizes the database development process.

The database development process starts with interviewing users to identify database requirements. Requirements are summarized in a data model. The validated data model is transformed into a database design, which is implemented into database structures. - Because the design of the database depends entirely on how users view their business environment, user involvement is critical for database development. developers must rely on the users to tell them what to include in the database. - before building the database the developers construct a logical representation of database data called a data model. The data model describes the data and relationships that will be stored in the database, like a blueprint.

What is an Entity-Relationship Data model? Databases are made up of entities (shown in the figure) - An entity is something that the users want to track. Examples of entities are Order, Customer, Salesperson, and Item. - Entities have attributes that describe the characteristics of the entity. Example attributes of Order are OrderNumber, OrderDate, SubTotal, Tax, Total, and so forth. - Entities have an identifier (key), which is an attribute (or group of attributes) whose value is associated with one and only one entity instance. - Entities have relationships to connect to one another and eliminate redundant data - Entity names are always singular

The entity-relationship (E-R) data model is a tool for constructing data models. - Developers use it to describe the content of a data model by defining the things (entities) that will be stored in the database and the relationships among those entities. - Often referred to as an ER diagram - A tool for constructing data models - Defines entities (tables) and their relationships a less popular tool for data modeling is the Unified Modeling Language (UML).

Threat of Substitutes (1 of 5 forces)

The idea that products or services available from outside the given industry will come close to meeting the needs of current customers What affects the Threat of Substitutes? - Availability of Substitute - Substitute Performance - Cost of Substitute - Switching Costs

Supplier Power (1 of 5 forces)

The suppliers' ability to influence the prices they charge for supplies. If there is a small limited amount of suppliers for a product, then the supplier has more power and control What affects Supplier Power? - Number of Suppliers: fewer suppliers available, then the suppliers have the power, and the business is stuck with that one. - Size of suppliers - Uniqueness of Service - Cost of Changing

How is Social Capital Valuated?

The value of social capital is determined by the number of relationships, strength of relationships, and the power of the people in those relationships Social Capital Value = Strength x Quantity x Power

What forces are driving AI innovation? (Significant Innovations all shown in the figure)

These six forces have driven innovations in AI to the point that AI is now becoming widely used, and it's becoming a core part of many tech companies' strategic advantage: Increases in computer power (Moore's Law) - AI can process at such a speed that it is now useful. Availability of large data sets for Training - AI applications require a surprisingly large amount of data in order to learn, represent knowledge, and process natural language. Cloud scalability and applications - scalable resources available at very low costs. The cloud allows developers to access existing AI applications through online interfaces. Increased Device connectivity - produces vast amounts of data for AI applications. There are thousands of IoT devices that can provide the data AI applications use to learn. New fundamental breakthroughs in AI techniques - i.e. for simulating multiple layers of artificial neural networks rather than just a single layer. 15 A neural network Solve Practical Problems, Practice AI applications - practical AI applications produced to solve real-world problems.

What is a similarity between adware and spyware?

They both are installed without the user's permission.

Software Basics - Applications

Thick client Applications - "Native Applications" designed to be run on a particular operating system. - Microsoft Access, for example, will run only on the Windows operating system. Thin client applications - "Web applications" designed to be run within a browser on any operating system - Don't have all the functionality of Thick-client application - Web applications run within the browser and can run on any type of computer. Web applications run within the browser and can run on any type of computer.

Poll - Canvas is an example of which type of application?

Thin-Client Application

Internet of Things (IoT)

This is the idea that objects are becoming connected to the Internet so they can interact with other devices, applications, or services. - Everyday products embedded with hardware capable of sensing, processing, and transmitting data. - Objects share data via a network with any other application, service, or device. Example: mobile phones, started as a simple device that just handled voice calls, but how now innovated to contain processing power, more memory, internet access, Wifi, and the ability to interconnect with other devices and applications. Impact of IoT: - Increase efficiencies, reduce waste, improve decision making Examples: - The greatest potential for smart devices in hospitals, power grids, railroads, and manufacturing plants. - GE's Industrial Internet - Smart Building (Microsoft) - ID problems like wasteful lighting, competing heating and cooling systems, rogue fans, etc.

What is the threat/loss scenario?

Threat—person or organization seeks to obtain data or other assets illegally, without owner's permission and often without owners knowledge. Vulnerability—opportunity for threat to gain access to individual or organizational assets. Safeguard—measure individuals or organizations take to block threat from obtaining an asset.

How does data processing on a web server work?

Three-Tier (three tier) Architecture: listed below - almost all web applications use the three-tier architecture structure. User Tier - Computers, phones, other devices with a browser that request and process webpages Server Tier - Computers running Web Servers and Applications Database Tier - DBMS processes requests to retrieve and store data - the DBMS is outside the webserver, on its own server You, the user, are using a device (the user tier). When you go to the website that's the server tier that's allowing you to access the website. The web server passes eCommerce traffic to the commerce server (because you're trying to buy something). The commerce server acquires product data from the database. The commerce server also manages the shopping cart and coordinates the checkout process.

Secure Sockets Layer is also known as ________.

Transport Layer Security

Access to cloud-based resources is a major element of mobile information systems.

True

An unstructured decision process is one for which there is no agreed-on decision-making method.

True

ERP and EAI are essentially two different approaches to solving the problems of information silos.

True

The goal of AI research is to create strong AI that can complete all the same tasks a human can. T or F Goals of AI

True, the overall goal of AI is to create a machine that can complete the same tasks as a human. create artificial general intelligence or strong AI that can complete all of the same tasks a human can: to sense, learn, interact with the physical world; to represent knowledge; to reason; and to plan. (estimated to happen sometime around 2040) - we currently have weak AI, which focuses on completing a single specific task. - AI superintelligence is capable of intelligence more advanced than human intelligence.

How will AI and automation affect you?

Two reactions: - The first reaction is from the group of people who see AI as an incredible opportunity. Offers more productivity, profitability, and competitive advantages. - The second reaction is from the group of people who see AI as a serious threat. worried about their jobs. Jobs requiring routine physical and mental tasks are prime candidates for automation. - Experts on AI and automation estimate that by 2025, nearly 100 million workers could be taken out of the current U.S. labor force (146 million workers). They will be replaced by robots with IQs higher than 90 percent of the U.S. population. Unwanted Dirty Jobs - AI and automation could do jobs that humans don't really want to do. Take waste disposal, for example. Retooling of the existing workforce will be necessary when AI and automated machines take a more prominent role in our economy. will be new types of jobs for humans to do.

What are types of Security Loss? (Definitions in Book)

Unauthorized data disclosure Incorrect data modification Faulty service Denial of service (DoS) Loss of infrastructure

Unauthorized Data Disclosure

Unauthorized data disclosure occurs when a threat obtains data that is supposed to be protected. It can occur by human error when someone inadvertently releases data in violation of policy. Pretexting: occurs when someone deceives by pretending to be someone else. A common scam involves a telephone caller who pretends to be from a credit card company and claims to be checking the validity of credit card numbers: Phishing: is a similar technique for obtaining unauthorized data that uses pretexting via email. The phisher pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth. Spoofing: is another term for someone pretending to be someone else. If you pretend to be your professor, you are spoofing your professor. IP spoofing occurs when an intruder uses another site's IP address to masquerade as that other site. Email spoofing is a synonym for phishing. Sniffing: is a technique for intercepting computer communications. With wired networks, sniffing requires a physical connection to the network. With wireless networks, no such connection is required: Wardrivers simply take computers with wireless connections through an area and search for unprotected wireless networks. They use packet sniffers, which are programs that capture network traffic to monitor and intercept traffic on unsecured wireless (or wired) networks. Even protected wireless networks are vulnerable, as you will learn. Spyware and adware are two other sniffing techniques discussed later in this chapter. Hacking: which is breaking into computers, servers, or networks to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

Making Decisions: Process by scope (operational, managerial, strategic) The farther to the right in the graph, the more collaboration needed.

Unstructured (strategic) - No agreed-on decision-making process Structured (operational) - An understood and accepted method for making a decision

Which role is ALDI with their Twitter account @AldiUSA?. Single choice.

User

What are the three tiers in the three-tier architecture?

User, Server, Database

________, which refers to the matter on a social media (SM) site that is contributed by users, is the essence of SM relationships.

User-generated content

Summary of Scrum Estimation Techniques

Velocity is the total number of points of work the team can accomplish each scrum period. The team uses its velocity to determine how many requirements it can commit to accomplishing in the next scrum period. 1. Team assigns 1 point to the Simplest task. 2. Times to deliver working tasks are compared to each other and assigned points (points are Fibonacci numbers). Use: Team estimation, Planning poker, other 3. Using past experiences, the team computes its velocity ... number of points it can accomplish per scrum period. 4. Working with the product owner, the team selects tasks for the upcoming scrum period, constrained by its velocity.

Version Control vs Version Management

Version Control: limiting permission, how many people can access the document from the beginning - Activity limited by permissions - Edited by 1 person at a time - Version Histories - Workflow control Version Management: how the changes are tracked, and if there are multiple that can edit the document at the same time - Allow multiple users to edit - Track changes by users - No version control - No workflow control

How can organizations use cloud services securely?

Virtual Private Network (VPN) - creates a secure tunnel used to encrypt data being transmitted over the internet - used to surf the internet privately. - VPNs will encrypt your data, making it so that your internet provider will not know what website you are visiting (can't see it to block it) - can be used to prevent your data from being stolen Using a Private Cloud - owned and operated by an organization for its own benefit. - A VPN would be necessary to access cloud from outside the infrastructure. Using Virtual Private Cloud (VPC) - A subset of private cloud that has highly restricted, secure access. - Sensitive data can be stored on own infrastructure and less sensitive data on VPC. - some industries have regulation that prevents the storing of some data in the cloud. So, those organizations have to store the data locally on their own servers, that they are maintaining, with other data.

______________ is a completely computer-generated non-real world with interactive digital objects.

Virtual Reality

Common Storage Devices - Hardware Basics (Volatile and Non-Volatile)

Volatile - Cache and main memory (RAM) Meaning their contents are lost when power is off. Non-Volatile (nonvolatile)- Magnetic Disks (Hard Drive) Solid-state Drive (SSD) Thumb Drives Optical Disks Meaning their contents survive when power is off.

Porter's Five Forces Model (in the figure)

What Forces Determine Industry Structure? Porter's Five Forces Model is used to assess and determine an industry structure - used to assess industry structure (poll question), assess the strengths of the five forces that make up the five forces model in their own company. - five competitive forces determine industry profitability: 1. bargaining power of customers 2. the threat of substitutions 3. bargaining power of suppliers 4. threat of new entrants 5. rivalry among existing firms. - organizations examine these five forces and determine how they intend to respond to them. That examination leads to a competitive strategy in their industry. - According to Porter, to be effective, the organization's goals, objectives, culture, and activities must be consistent with the organization's strategy. - The intensity of each of the five forces determines the characteristics of the industry, how profitable it is, and how sustainable that profitability will be. For example, an organization can focus on being the cost leader, or it can focus on differentiating its products or services from those of the competition.

Management Information Systems (MIS)

Why would a course on MIS be the most useful course at Kelley? - Technology is fundamentally changing business - Production, distribution, control of information are primary economic drivers (Information Age) - Conversion from mechanical/analog devices to digital devices (Digital Revolution)

Processes Vary by Scope

Workgroup Process: - Exists to enable workgroups to fulfill the charter, purpose, and goals of a particular group or department Enterprise Process: - Span an organization and support activities in multiple departments - Doesn't have to span every department in an organization, but does need to span multiple departments Inter-Enterprise Process: - Span two or more independent organizations - Example: going to the doctor for a prescription, and the pharmacy for the actual medication

The employees at a single ALDI location choose which items are closest to the door each week. What is the scope for this process?

Workgroup, just those single group of people

How is Money Made in Social Media?

You are the product - "If you're not paying, you're the product" - Renting your eyeballs to an advertiser

Consequences of Saying NO to AI

You may lose a competitive advantage if your competitor can produce a higher-quality product at one-third the price because they use AI, and you don't, because you said NO. Saying "yes" to AI may be a painful but necessary decision: Employment costs could be reduced by $9 trillion. World economies could also see productivity gains of at least 30 percent.

URL (Uniform Resource Locator)

_______ is the address of a Web page on the World Wide Web.

In a business process, a role refers to ________.

a collection of activities

What is a database application? Components of a Database Application System shown in the figure - In most cases, a traditional database is shared among many users. the application. resides on the users' computers and the DBMS and database reside on a server computer. A network, in most cases not the Internet, is used to transmit traffic back and forth between the users' computers and the DBMS server computer. - Traditional database application programs are written in object-oriented languages such as C++ and VisualBasic (and even in earlier languages like COBOL).

a collection of forms, reports, queries, and application that serves as an intermediary between users and database data. The specific purposes of the four elements of a database application are: Forms: View data; insert new, update existing, and delete existing data Reports: Structured presentation of data using sorting, grouping, filtering, and other operations Queries: Search based on data values provided by the user Application Programs: Provide security, data consistency, and special-purpose processing, (e.g., handle out-of-stock situations)

Customer Relationship Management (CRM)

a company-wide business strategy designed to optimize profitability, revenue, and customer satisfaction by focusing on highly defined and precise customer groups - A suite of applications, a database, and a set of inherent processes for managing all customer interactions, from lead generation - In the figure: Marketing (attract), Customer Acquisition(sell), Relationship management (support and resell), Loss/Churn (categorize) - Target, Prospect, Customer (sell more), either low-value customer or High-value customer

A stored procedure is a ________.

a computer program stored in the database that is used to enforce business rules

What is a Database?

a database is a collection of tables plus relationships among the rows in those tables, plus special data, called metadata, that describes the structure of the database. a self-describing collection of integrated records used to keep track of things - a collection of related tables - relationships among rows - metadata

Self-Driving Cars (Self Driving Cars) In the future, manual driving may be a risky and expensive hobby.

a driverless car - uses a variety of sensors to navigate like a traditional car but without human intervention. It will be full of advanced hardware and integrated software and is the epitome of a mobile system. - able to move without anyone being in the car - Make things easier, cheaper, safer. - 90 percent of motor vehicle crashes are caused by human error. 16 Motor vehicle crashes are the leading cause of death for people ages 3 to 33. - Automated accidents may become a thing of the past. - Eliminate the need to have multiple cars per family - Avoid costly traffic tickets, parking tickets, DUI citations. - Uber, Waymo (Google), and Tesla have been testing self-driving cars for a few years now with more than 1 billion miles driven. - effect of self-driving cars on the insurance industry, KPMG estimated that accident frequency will drop by 90 percent by the year 2050. Subsequently, the personal automobile industry will shrink to 22 percent of its current size.

System

a group of components that interact to achieve some purpose

What is an Information System

a group of components that interact to produce information - Consists of 5 components - Data is at the center - Most important component is people All Components & Attributes: Hardware - Computer Side + Actor Software - Computer Side + Instructions Data - Bridge Procedures - Human side + Instructions People - Human Side + Actor (most difficult to change)

Information System (IS)

a group of components that interacts to produce information. - an assembly of hardware, software, data, procedures, and people that produces information - broken into the five component model defined below

Collaboration #2

a group of people working together to achieve a common goal via a process of feedback and iteration

Cooperation

a group of people working together, all doing essentially the same type of work, to accomplish a job

Five-Component Framework

a model of the components of an information system: computer hardware, software, data, procedures, and people - these five components are present in every information system, from the simplest to the most complex.

Business Process

a network of activities that generate value by transforming inputs into outputs. How do business processes generate value? (view the chain in the figure) - The cost of the business process is the cost of the inputs plus the cost of the activities. - The margin of the business process is the value of the outputs minus the cost. - Each activity is a business function that receives inputs and produces outputs. Activities are performed by humans, a computer system, or both. Also, The inputs and outputs can be physical, like drone parts, or they can be data, such as a purchase order. A repository is a collection of something; a database is a repository of data, and a raw material repository is an inventory of raw materials. - the streamlining of business processes to increase margin (add value, reduce costs, or both) is key to competitive advantage.

Belle's Law

a new computer class forms roughly each decade establishing a new industry. - in other words, digital devices will evolve so quickly that they will enable new platforms, programming environments, industries, networks, and information systems every 10 years. - exponential change is affecting digital devices: processing power, interconnectivity of devices, storage capacities, and bandwidth are all increasing extremely rapidly, so rapidly that it's changing the way that devices are used.

Definition of a Problem

a perceived difference between what is and what ought to be.

Quiz Question: Which of the following is essential to collaboration?

a process of critical feedback and iteration

Enterprise Resource Planning (ERP)

a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform (centralized database) - ERP systems include the functions of CRM systems but also incorporate accounting, manufacturing, inventory, and human resources applications. - This integration allows real-time updates globally, whenever and wherever a transaction takes place. Critical business decisions can then be made on a timely basis using the latest data. - Everything centers around the ERP database (shown in the figure) - Difficult and takes a lot of planning to get people on board What makes it difficult to implement ERP? - Collaborative management - Requirement gaps - Transition problems - Employee Resistance - New technology

Enterprise Application Integration (EAI)

a suite of software applications that integrates existing systems by providing layers of software that connect applications together. Makes it so that interfaces are no longer isolated (not as much value as ERP) - Connects "islands" via a new layer of software/system - Enables existing application to communicate and share data - Provides integrated information - Leverages existing systems - Enables gradual move to ERP Figure Shows Connection of CRM, Manufacturing systems, Accounting System, and Human Resource Systems connecting to one another through the EAI Server

Granularity

a term that refers to the level of detail represented by the data. - Granularity can be too fine or too coarse. - In general, it is better to have too fine a granularity than too coarse because if the data is too fine, the data can be made coarser by summing and combining. For example, a file of regional sales totals can- not be used to investigate the sales in a particular store in a region, and total sales for a store cannot be used to determine the sales of particular items within the store.

Which of the following statements is TRUE about data marts?

a) Data marts address the needs of a particular department or functional area of a business.

The phrase ________ refers to data that is inaccurate, incomplete, or erroneous. a) Dirty Data b) Metadata c) Rough Data d) Granular Data

a) Dirty Data

An algorithm that predicts the probability of a certain outcome based on prior occurrences of related events is called ________.

a) Naïve Bayes Classifier

Which of the following statements is consistent with the central idea of business process design? a) Organizations should create new business processes instead of improving existing systems. b) Technology should be used to modify and improve all business processes. c) Business processes should focus on improving individual functional systems. d) Technology should be used to supplement the existing value chain.

a) Organizations should create new business processes instead of improving existing systems.

Porter recognized a movement to create integrated, cross-departmental systems. His work lead to the creation of a new discipline called ________. a) business process design b) cost reduction planning c) value chaining d) linkages

a) business process design

Because artificial intelligence (AI) started developing a bad reputation, IBM titled their AI research ________. Group of answer choices

a) cognitive computing

In large organizations, a group of people manage and run a(n) ________, which is a facility for managing an organization's BI data.

a) data Warehouse

All of the following are benefits of artificial intelligence except ________.

a) increase costs

An automobile company decides to improve the quality of its products and bring more variety into its entire product line. The company has decided to adopt ________. a) industry-wide differentiation b) focused differentiation c) industry-wide cost leadership d) focused cost leadership

a) industry-wide differentiation

LiveWords is an app used for animated text messaging. The company has offered a six-month membership extension to its existing customers without any additional charges. What is LiveWords trying to accomplish with this strategy? a) locking in customers b) creation of a new service c) product differentiation d) locking in suppliers

a) locking in customers

A ________ is equivalent to 1,024 kilobytes. a) megabyte b) kilobyte c) gigabyte d) zettabyte

a) megabyte

Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers? a) outbound logistics b) customer service c) inbound logistics d) operations

a) outbound logistics

Main memory is also known as ________. a) random access memory b) read-only memory c) optical memory d) cache memory

a) random access memory

In the value chain, which of the following is an example of a primary activity? a) service customers b) procurement c) human resources d) manage company resources

a) service customers

Which of the following is NOT a data acquisition process? a) updating b) relating c) obtaining d) cataloging

a) updating

Information systems exist to ______. a. help organizations achieve their strategies b. increase the competitive rivalry in business c. store and manage data d. establish customer loyalty

a. help organizations achieve their strategies

What are necessary data characteristics? What are the characteristics of data?

accurate - accurate, correct, and complete data that has been processed correctly as expected. timely - available in time for its intended use, need to set up realistic timeliness needs for a successful IS relevant - Data should be relevant both to the context and the subject. just sufficient - data needs to be efficient, but just barely. There is only a certain amount of time in the day. worth its cost - developing an IS, operating and maintaining that system, and your time of reading and processing that data all costs money. An appropriate relationship must exist between the cost of data and its value.

Competitive Strategy Organizational Strategy determines Information Systems

an organization's goals and objectives - the industry structure informs the competitive strategy - competitive (Organizational) strategy determines the structures, features, and functions of every information system. - Ultimately, organizations examine the structure of their industry and determine a competitive strategy. That strategy determines value chains, which, in turn, determine business processes. The structure of business processes determines the design of supporting information systems. - An organization responds to the structure of its industry by choosing a competitive strategy.

Lecture 1 Quiz Questions _____ are examples of the computer hardware component in an information system. a. Words, sentences, and paragraphs in a report b. The storage disk, keyboard, and monitor c. Windows, MS Office 365, and Apple's iOS d. Most business processes

b. The storage disk, keyboard, and monitor

Applying Porter's Five Forces Model to eHermes

bargaining power of customers, threat of substitutions, bargaining power of suppliers, threat of new entrants, and rivalry among existing firms. (View the Figure for analytical breakdown)

A ________ is a quantitative way of describing when, how often, and how much a customer spends. a) cluster analysis b) decision tree c) RFM analysis d) Neural Network

c) RFM analysis

Some organizations ________ by using information systems to lock in customers. a) decrease the threat of new entrants b) increase competitive rivalry c) increase switching cost d) increase the threat of substitution

c) increase switching cost

Jonetta checked two databases before deciding how much quilting fabric to re-order: the raw materials and the finished goods. The ________ across her company's value chain have greatly improved Jonetta's margins. a) strategy b) support c) linkages d) forces

c) linkages

Which of the following workgroup processes is related to manufacturing?

capacity planning and scheduling

Support Activities in the Value Chain

contribute indirectly to the production, sale, and service of the product. - But there is a value added, there are costs, and there is a margin—even if it is only in concept. - This includes procurement, which consists of the processes of finding vendors, setting up contractual arrangements, and negotiating prices. - Supporting functions add value, albeit indirectly, and they also have costs. - In the case of supporting activities, it would be difficult to calculate the margin because the specific value added is difficult to know. Example: human resources as recruiting, compensation, evaluation, and training of full-time and part-time employees. Manufacturer's lobbyist in Washington DC

1. Which of the following would be least affected by the threat of substitutes? (1 Point, Poll Question) a) A used car dealership in New York b) A corner coffee shop in Seattle c) A convenience store that sells toiletry items d) A company that develops and patents a new method for capturing solar energy

d) A company that develops and patents a new method for capturing solar energy

Dominick owns a bakery. He creates a model that measures how oven temperature and number of minutes in the oven affect the shelf life of cookies. Dominick is using ___________________. a) Big Data b) Static Reports c) Cluster Analysis d) Regression Analysis

d) Regression Analysis

Which of the following is an example of nonvolatile memory? a) cache memory b) static random access memory (SRAM) c) main memory d) optical disk

d) optical disk

In a manufacturing business, which of the following transforms finished goods into cash? a) warehouse operations b) manufacturing process c) outbound logistics d) sales process

d) sales process

______ refers to the products, methods, inventions, and standards used for the purpose of producing information. a. Decision Support Systems (DSS) b. Information systems (IS) c. Management information systems (MIS) d. Information technology (IS)

d. Information technology (IT)

The conversion from mechanical or analog devices to digital ones is known as the _____. a. industrial age b. age of experimentation c. information age d. digital revolution

d. digital revolution

The internet (and web browsers with graphical user interfaces) played a key role in the______. a. industrial revolution b. information age c. age of the "mega" four companies' d. digital revolution

d. digital revolution

What is Big Data? (VVV)

data collections that are characterized by huge volume, rapid velocity, and great variety. Huge volume - Petabyte and larger - Considering volume, Big Data refers to data sets that are at least a petabyte in size, and usually larger. Rapid velocity - Generated Rapidly - Big Data has high velocity, meaning that it is generated rapidly. Great variety - Structured data, freeform text, log files, graphics, audio, visual, etc. - Big Data is varied, may have structured data, but it also may have free-form text, dozens of different formats of Web server and database log files, streams of data about user responses to page content, and possibly graphics, audio, and video files. cannot be processed using traditional techniques, so MapReduce is a technique used for harnessing the power of thousands of computers working in parallel. The basic idea is that the Big Data collection is broken into pieces, and hundreds or thousands of independent processors search these pieces for something of interest (known as Map Phase). their results are combined in what is referred to as the Reduce phase.

Structured Data

data in the form of rows and columns. - Most of the time structured data means tables in a relational database, but it can refer to spreadsheet data as well.

QUIZ: Metadata is/are ________.

data that describes data

What is Metadata?

data that describes data - e.g. Design view of a table, Field Properties - Databases are self-describing because they contain not only data, but also data about the data in the database. - just understand that metadata is data about data and that such metadata is always a part of a database. - To find out what a database con- tains, we just look at the metadata inside the database.

A ________ is a self-describing collection of integrated records. field column database spreadsheet

database

The first step in the system definition phase of the systems development life cycle (SDLC) is to ________.

define the goals and scope

Dentoin Pharmaceuticals requires an information system to support its new assembly line. The management has assigned a team of ten members to plan this project. Which of the following will be the first major task for this team?

defining the system goals and scope

Push Publishing

delivers business intelligence to users without any request from the users - the BI results are delivered according to a schedule or as a result of an event or particular data condition.

The situation that occurs when the addition of resources creates inefficiencies is known as ________.

diseconomies of scale

Asynchronous communication occurs when team members ________.

do not meet at the same time

Information System creating Competitive Advantages

either as part of a product or by providing support to a product. - IS can improve either a product, or improve the processes (enhancing processes that businesses perform) - IS can help achieve the first 3 principles in the figure above. (create a new product or service, enhance a product or service, differentiate products or services) Product Implementations: - Create a new product or service - Enhance products or services - Differentiate Products or Services Process Implementations - Lock in customers and buyers - Lock in Suppliers - Raise Barriers to Market Entry - Establish Alliances - Reduce Costs For example, An information system that produces information about the car's location and provides driving instructions to destinations is part of the car rental and thus is part of the product itself. an information system that schedules car maintenance is not part of the product but instead supports the product

Quiz Question: With regard to cloud computing, the term __________ means that leased computing resources can be increased or decreased dynamically.

elastic

Social media (SM) providers host the SM presence using ________ in the cloud.

elastic servers

Relationships - Entities have relationships to each other How to Notate types of relationships?

entity-relationship (E-R) diagrams - show the entities and the relationships between them. Maximum Cardinality Notations one to many - a department can have many advisors, but advisers can have only one department - Advisers can many students and students can have many advisers

Exception Reports

exception reports are produced when something out of predefined bounds occurs. - Consider RFM analysis and online analytical processing as two prime examples. RFM Analysis - a technique readily implemented with basic reporting operations, is used to analyze and rank customers according to their purchasing patterns. RFM considers how recently (R) a customer has ordered, how frequently (F) a customer ordered, and how much money (M) the customer has spent. Scores between 1 and 5 are given to rank each letter aspect. 5 5 5 is the best possible customer score and is a customer to fight to keep. Online analytical processing (OLAP) - is more generic than RFM. OLAP provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. OLAP report has measures and dimensions. A measure is the data item of interest (total sales, average sales, average cost). A dimension is a characteristic of a measure (purchase date, customer type). Shown in the Figure Example of using the Exception Report, a hospital might want an exception report showing which doctors are prescribing more than twice the amount of pain medications than the average doctor.

Which of the following is classified as a technical safeguard?.

firewalls

Second Mover Advantage

gaining market share by following a pioneering company and imitating its product or service, thereby reducing costly R&D expenditures. - Google, Amazon, and Facebook were all second mover companies - "the second mouse gets the cheese"

Carlee told Stan that he was the highest paid employee but Stan was not convinced. So, he illegally ________ the employee database and downloaded all of the records in the company's employee information table.

hacked

What are the 5 Components of SMIS? (Social Media Porter's Five Forces - Information System)

hardware - Laptops, tablets, smartphones - Servers software - Browser, App, iOS, Android, Windows - Development software, NoSQL, other DBMS, Analytics data - User Content: tweets, stories, posts - Connection: relationships to people, businesses, organizations procedures - how to create posts, share posts, message someone - run and maintain the applications, fix bugs, implement new features - anything that starts with "how to" people - You, your friends, your future employers - Developers, software engineers, marketers

What are the sources of threats? (Definitions in Book)

human error computer crime natural events and disasters

Quiz Question Which of the following would be a software component in an SMIS for a social media user?

iOS

Content Management Systems (CMS)

information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge. - Typical users of content management systems are companies that sell complicated products and want to share their knowledge of those products with employees and customers. - A form of knowledge management concerns knowledge that is encoded in documents. - Challenges of a CMS: most content databases are huge, CMS content is dynamic, documents are linked for changes, document contents are perishable, content is provided in many languages.

Linkages

interactions across value activities. For example, manufacturing systems use linkages to reduce inventory costs. Such a system uses sales forecasts to plan production; it then uses the production plan to determine raw material needs and then uses the material needs to schedule purchases. The end result is just-in-time inventory, which reduces inventory sizes and costs.

Which of the following are the steps, in order, of the business process management (BPM) cycle?

model processes; create components; implement processes; assess results

QUIZ Question What are BPM activities?

model, design, implement, and assess

Nielsen's Law

network connection speeds for high-end users will increase by 50 percent per year. - Example was YouTube becoming worth 1.65B in just one year before being bought by Google.

Which of the following is a characteristic of cloud-based hosting?

no obsolescence

GNU general public license (GPL) agreement

one of the standard license agreements for open source software - Richard Matthew Stallman is the father of the movement. In 1983. In 1991 Linus Torvalds, working in Helsinki, began work on another version of Unix, using some of Stallman's tools. That version eventually became Linux,

Components of a BI System

operational data - social data - purchased data - employee knowledge -

Users of smart cards are required to enter a ________ to be authenticated.

personal identification number

Quiz Question: NewWay Technologies offers customers an operating system, runtime environment, and middleware services. This is an example of the ________ as a service model.

platform

QUIZ Question The ________ phase is the easiest and cheapest time to alter an information system in the systems development life cycle (SDLC).

requirements

QUIZ: Which of the following notations in an E-R diagram means that the entity is optional and a relationship need not have an entity of that type?

small oval

Anthony is in his senior year of college. He spends time creating a LinkedIn page so recruiters can more easily find him. He also goes to the university sponsored "meet the firms" nights to become more acquainted with people in the corporate world. In this scenario, Anthony is investing in his ________.

social capital

Operational Data (Figure shows problem with operational data)

structured for fast and reliable transaction processing - operational data is structured for fast and reliable transaction processing. - Although it is possible to create basic reports and perform simple analyses from operational data, this course is not usually recommended. - Reasons for security and control, IS professionals do not want data analysts processing operational data. Mainly because if an analyst made an error on the operational data, that could ensure a serious disruption in the company's operations. - Most operational and purchased data has problems that inhibit its usefulness for business intelligence. - most organizations extract operational data for BI processing. - Purchased data often contains missing elements.

QUIZ Question According to Brooks' Law, adding more people to a late project makes it ________.

take longer

Digital Revolution

the conversion from mechanical and analog devices to digital devices.

net savings in cost

the cost of developing and operating the information system will need to be offset against the gains in reduced errors and paper, ink, and printing costs.

Information

the definitions varies, and is in general a challenge to define. - most common definition: Knowledge derived from data, whereas data is defined as recorded facts or figures. - So, Jim makes $70 an hour, and Jill makes $50 an hour. This is the data. The statement that the average hourly wage of both of the graphic designers is $60 an hour is information. Because, the average wage is knowledge derived from the data of individual wages. - Another common definition: Information is data presented in a meaningful context. - One more common definition: information is data processed by summing, ordering, averaging, grouping, comparing, or other similar operations. - The fundamental idea of this definition is that we do something to the data to produce information. - definition by Gregory Bateson: He defined information as a difference that makes a difference. - All definitions are acceptable, but it's important to remember that you discriminate between data and information.

Quiz Question: Complete the following phrase: The cloud is ________.

the elastic pooling of computer resources over the Internet

Five Component Model (Hardware, Software, Data, Procedures, People)

the five components are symmetric. - the outermost components, hardware and people, are both actors; they can take actions. The software and procedure components are both sets of instructions: Software is instructions for hardware, and procedures are instructions for people. Finally, data is the bridge between the computer side on the left and the human on the right. - the most important component is YOU - has to have all five components to be an information system

MIS (Management information systems)

the management and use of information systems that help organizations achieve their strategies - MIS has 3 key elements: management and use, information systems, and strategies.

Maximum Cardinality (Figure shows both maximum and minimum cardinalities)

the maximum number of entities that can be involved in a relationship - The crow's-foot notation shows the maximum number of entities that can be involved in a relationship. Accordingly, they are called the relationship's maximum cardinality. - Common examples of maximum cardinality are 1:N, N:M, and 1:1 (not shown). Notation Rules: - The second vertical bar on the lines means that at least one entity of that type is required. - The small oval means that the entity is optional; the relationship need not have an entity of that type. - Using this notation, if there are two vertical bars, both the minimum and maximum cardinality are one. - If there is a vertical bar with a crow's foot, then the minimum cardinality is one and the maximum is many. Reading the Figure: - a department is not required to have a relationship to any adviser - an adviser is required to belong to a department. - an adviser is not required to have a relationship to a student - a student is required to have a relationship to an adviser. the maximum cardinalities in Figure 5-21 have been changed so that both are 1:N.

the curse of dimensionality,

the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor

Competitive Rivalry (1 of 5 forces)

the ongoing set of competitive actions and competitive responses that occur among firms as they maneuver for an advantageous market position. - Competition with other companies What affects Competitive Rivalry? - Number of competitors - Quality Differences - Switching Costs - Customer Loyalty

Virtualization (3 types) • PC virtualization a personal computer, such as a desktop or laptop, hosts several different operating systems. run two systems on the same hardware at the same time if the host operating system has sufficient resources • Server virtualization a server computer hosts one or more other server computers. Users can log on to any of those virtual machines, and they will appear as normal desktop computers. Server virtualization plays a key role for cloud vendors • Desktop virtualization (potential to be revolutionary, in its infancy) a server hosts many versions of desktop operating systems. Each of those desktops has a complete user environment and appears to the user to be just another PC. However, the desktop can be accessed from any computer to which the user has access. However, the desktop can be accessed from any computer to which the user has access.

the process by which one physical computer hosts many different virtual (not literal) computers within it. - One operating system, called the host operating system, runs one or more operating systems as applications. These hosted operating systems are called virtual machines (vm). - Each virtual machine has disk space and other resources allocated to it. - With virtualization, each vm is able to operate exactly the same as it would if it were operating in a stand-alone, nonvirtual environment.

BI analysis

the process of creating business intelligence. - The three fundamental categories of BI analysis are reporting, data mining, and Big Data.

Knowledge management (KM)

the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need that capital. - KM benefits organizations in two fundamental ways:It improves process quality, and, It increases team strength.

Data Acquisition

the process of obtaining, cleaning, organizing, relating, and cataloging source data

Information Technology (IT)

the products, methods, inventions, and standards that are used for the purpose of producing information - IT drives the development of new information systems

Process Design Example (shown in Figure)

the purchase-drone-parts activity not only queries the raw materials inventory database, it also queries the finished goods inventory database. - Querying both databases allows the purchasing department to make decisions not just on raw materials quantities but also on customer demand. - using this data, purchasing can reduce the size of raw materials inventory, reducing production costs and thus adding margin to the value chain. - This is an example of using a linkage across business processes to improve process margin.

BI application

the software component of a BI system - The data warehouse extracts and provides data to BI applications.

Open Source/Closed Source

the source code of the program is available to the public. Source code is computer code as written by humans and understandable by humans. - Source code (100011010100101) is compiled into a machine code that is processed by a computer. Machine code is, in general, not understandable by humans and cannot be modified. In a closed source project, say, Microsoft Office, the source code is highly protected and only available to trusted employees and carefully vetted contractors. - protected like gold in a vault. Only those trusted programmers can make changes to a closed source project.

Kryder's Law

the storage density on magnetic disks is increasing at an exponential rate. In other words, digital storage on devices

Metcalfe's Law

the value of a network is equal to the square of the number of users connected to it. in other words, as more digital devices are connected together, the value of that network will increase. - Look at the figure to see the dramatic rise of the internet in the 1990s.

Quiz Question: Almost all Web applications use the ________ architecture, which is a design of user-computers and servers.

three-tier

Sarah was so happy with the new video app she had downloaded to her phone that she left a positive review. A few days later, she noticed that her phone's upload speed was dramatically slower. Sarah was probably the victim of a(n) ________ attack.

trojan horse

In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

unauthorized data disclosure

Storage Hardwares

used to save data and programs. - Magnetic disks (also called hard disks) are the most common storage device. - Solid-state storage (SSD) (or an SSD drive) is much faster than traditional magnetic storage because it stores information using nonvolatile electronic circuits.


Set pelajaran terkait

Sociology (AS) Research Methods- Documents

View Set

bio psych - ch.3.3 research methods

View Set

MyEconLab Chapter 8 (Gross Domestic Product)

View Set