MIS Vocab 14-20

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

User-contributed content (or user-generated content)

...is created and updated by many users for many users. Websites such as Flickr, Wikipedia, and YouTube, for example, move control of online media from the hands of leaders to the hands of users. Netflix and Amazon both use user-generated content to drive their recommendation tools, and websites such as Yelp use customer reviews to express opinions on products and services.

War driving

...is deliberately searching for Wi-Fi signals while driving by in a vehicle. Many individuals who participate in war driving simply map where Wi-Fi networks are available. Other individuals have a more malicious intent and use war driving to hack or break into these networks. War driving has been a controversial practice since its inception and has raised the awareness of the importance of wireless network security.

Workshop training

...is held in a classroom environment and led by an instructor.

Folksonomy

...is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system. Using the collective power of a community to identify and classify content significantly lowers content categorization costs, because there is no complicated nomenclature to learn. Users simply create and apply tags as they wish.

Mobile business (or mbusiness, mcommerce)

...is the ability to purchase goods and services through a wireless Internet-enabled device.

An access point (AP)

...is the computer or network device that serves as an interface between devices and the network. Each computer initially connects to the access point and then to other computers on the network.

The graphical user interface (GUI)

...is the interface to an information system. GUI screen design is the ability to model the information system screens for an entire system using icons, buttons, menus, and submenus. Data models represent a formal way to express data relationships to a database management system (DBMS).

Feasibility

...is the measure of the tangible and intangible benefits of an information system

Web 2.0 (or Business 2.0)

...is the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free. Business 2.0 encourages user participation and the formation of communities that contribute to the content. In Business 2.0, technical skills are no longer required to use and publish information to the World Wide Web, eliminating entry barriers for online business.

The systems development life cycle (SDLC)

...is the overall process for developing information systems, from planning and analysis through implementation and maintenance. The SDLC is the foundation for all systems development methods, and hundreds of different activities are associated with each phase. These activities typically include determining budgets, gathering system requirements, and writing detailed user documentation.

Social networking

...is the practice of expanding your business and/or social contacts by constructing a personal network. is the ability to create and maintain a profile that serves as an online identity within the environment.

Microblogging

...is the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages. The main advantage of microblogging is that posts can be submitted by a variety of means, such as instant messaging, email, or the web

War chalking

...is the practice of tagging pavement with codes displaying where Wi-Fi access is available. The codes for war chalking tell other users the kind of access available, the speed of the network, and if the network is secured.

Requirements management

...is the process of managing changes to the business requirements throughout the project. Projects are typically dynamic in nature, and change should be expected and anticipated for successful project completion.

Conversion

...is the process of transferring information from a legacy system to a new system.

Cartography

...is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps.

Taxonomy

...is the scientific classification of organisms into groups based on similarities of structure or origin. Taxonomies are also used for indexing the content on the website into categories and subcategories of topics. For example, car is a subtype of vehicle.

Podcasting

... converts an audio broadcast to a digital music player. Podcasts can increase marketing reach and build customer loyalty. Companies use podcasts as marketing communication channels discussing everything from corporate strategies to detailed product overviews.

The planning phase

... establishes a high-level plan of the intended project and determines project goals. Planning is the first and most critical phase of any systems development effort, regardless of whether the effort is to develop a system that allows customers to order products online, determine the best logistical structure for warehouses around the world, or develop a strategic information alliance with another organization.

Pay-per-conversion:

... generates revenue each time a website visitor is converted to a customer.

A data flow diagram (DFD)

... illustrates the movement of information between external entities and the processes and data stores within the system. Process models and data flow diagrams establish the specifications of the system.

Geocoding

... in spatial databases is a coding process that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category). GIS professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data.

Wi-Fi infrastructure

... includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal. Most WLANs use a Wi-Fi infrastructure in which a wireless device, often a laptop, communicates through an access point or base station by means of, for instance, wireless fidelity.

Sign-off consists of the users' actual signatures

... indicating they approve all of the business requirements. If a system does not meet the business requirements, it will be deemed a failed project.

Process modeling

... involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment. One of the most common diagrams used in process modeling is the data flow diagram.

Egovernment

... involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer and all branches of government.

Geocache

... is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find. GPS users find the geocache and typically sign a guest book or take an item and leave an item for the next adventure players to find.

An Internet service provider (ISP)

... is a company that provides access to the Internet for a monthly fee. Major ISPs in the United States include AOL, AT&T, Comcast, Earthlink, and Netzero, as well as thousands of local ISPs including regional telephone companies.

The RFID accelerometer

... is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds

A business model

... is a plan that details how a company creates, delivers, and generates revenues.

A scripting language

... is a programming method that provides for interactive modules to a website.

Instant messaging (IMing)

... is a service that enables instant or real-time communication between people. Businesses immediately saw what they could do:Answer simple questions quickly and easily. Resolve questions or problems immediately. Transmit messages as fast as naturally flowing conversation.Easily hold simultaneous IM sessions with multiple people. Eliminate long-distance phone charges. Quickly identify which employees are at their computers.

Control objects for information and related technology (COBIT)

... is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors.

Brainstorming

... is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted.

An RFID reader (RFID interrogator)

... is a transmitter/receiver that reads the contents of RFID tags in the area. A RFID system is comprised of one or more RFID tags, one or more RFID readers, two or more antennas (one on the tag and one on each reader), RFID application software, and a computer system or server

Real Simple Syndication (RSS)

... is a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format. An RSS document or feed includes full or summarized text, plus other information such as publication date and authorship. News websites, blogs, and podcasts use RSS, constantly feeding news to consumers instead of having them search for it

A mashup

... is a website or web application that uses content from more than one source to create a completely new product or service. The term is typically used in the context of music; putting Jay-Z lyrics over a Radiohead song makes something old new.

A social network

... is an application that connects people by matching profile information. Providing individuals with the ability to network is by far one of the greatest advantages of Business 2.0.

Outsourcing

... is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house. In some cases, the entire MIS department is outsourced, including planning and business analysis as well as the design, development, and maintenance of equipment and projects. Outsourcing can range from a large contract under which an organization such as IBM manages all MIS services for another company, to hiring contractors and temporary staff on an individual basis.

Project management

... is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.

Tacit knowledge

... is the knowledge contained in people's heads. The challenge inherent in tacit knowledge is figuring out how to recognize, generate, share, and manage knowledge that resides in people's heads.

Estimated time of arrival (ETA)

... is the time of day of an expected arrival at a certain destination and is typically used for navigation applications.

GIS map automation

... links business assets to a centralized system where they can be tracked and monitored over time.

Software customization

... modifies software to meet specific user or business requirements.

Asset tracking

... occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention. Asset tracking allows a company to focus on its supply chain, reduce theft, identify the last known user of assets, and automate maintenance routines.

A personal area network (PAN)

... provides communication for devices owned by a single user that work over a short distance. PANs are used to transfer files, including email, calendar appointments, digital photos, and music. A PAN can provide communication between a wireless headset and a cell phone or between a computer and a wireless mouse or keyboard.

Open source

... refers to any software whose source code is made available free (not on a fee or licensing basis as in ebusiness) for any third party to review and modify. Business 2.0 is capitalizing on open source software. Mozilla, for example, offers its Firefox web browser and Thunderbird email software free.

Off-the-shelf application software

... supports general business processes and does not require any specific software customization to meet the organization's needs.

In-sourcing (in-house development)

... uses the professional expertise within an organization to develop and maintain its information technology systems. In-sourcing has been instrumental in creating a viable supply of IT professionals and in creating a better quality workforce combining both technical and business skills.

A wiki

...(the word is Hawaiian for quick) is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required.

GPS provides the foundation for geographic information systems.

...A geographic information system (GIS) stores, views, and analyzes geographic data creating, multidimensional charts or maps. For example, GIs are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica.

Many LBS applications complement GPS and GIS, such as:

...Emergency services, field service management, find it services, mapping, navigation, tracking assets, traffic info, vehicle location, weather info, wireless advertising

As a rule, explicit knowledge consists of anything that can be documented, archived, and codified, often with the help of IT.

...Examples of explicit knowledge are assets such as patents, trademarks, business plans, marketing research, and customer lists.

A geocoin, a round coin-sized object, is uniquely numbered and hidden in geocache.

...Geocoins can also be shaped to match a theme such as the state of Colorado or a birthday party hat. Geocoins are often decorative or commemorative, making them collectible and highly valuable for technology adventures.

Hotspots are designated locations where Wi-Fi access points are publically available.

...Hotspots are found in places such as restaurants, airports, and hotels—places where business professionals tend to gather. Hotspots are extremely valuable for those business professionals who travel extensively and need access to business applications.

The four primary information technology areas where organizations are focusing are:

...IT infrastructures, security, ebusiness, integration

Information architecture

...is the set of ideas about how all information in a given context should be organized. Many companies hire information architects to create their website taxonomies. A well-planned taxonomy ensures search and navigation are easy and user-friendly. If the taxonomy is confusing, the site will soon fail.

Estimated time enroute (ETE)

...is the time remaining before reaching a destination using the present speed and is typically used for navigation applications.

A search engine

...is website software that finds other pages based on keyword matching similar to Google

Preventive maintenance

...makes system changes to reduce the chance of future system failure. During the maintenance phase, the system will generate reports to help users and MIS specialists ensure it is functioning correctly

Corrective maintenance

...makes system changes to repair design flaws, coding errors, or implementation issues.

Social networking analysis (SNA)

...maps group contacts (personal and professional) identifying who knows each other and who works together. In a company it can provide a vision of how employees work together. It can also identify key experts with specific knowledge such as how to solve a complicated programming problem or launch a new product.

Real-time communication

...occurs when a system updates information at the same rate it receives it.

Edge matching (warping, rubber sheeting)

...occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match. Edge matching is a critical component of creating a GIS database because map misalignments occur frequently for many reasons, including survey error and cartographic errors.

The many benefits associated with outsourcing include:

...Increased quality and efficiency of business processes. Reduced operating expenses for head count and exposure to risk for large capital investments. Access to outsourcing service provider's expertise, economies of scale, best practices, and advanced technologies. Increased flexibility for faster response to market changes and less time to market for new products or services.

Tim Berners-Lee,

...one of the founders of the WWW, has described the semantic web as a component of Web 3.0 that describes things in a way that computers can understand. The semantic web is not about links between web pages; rather it describes the relationships between things (such as A is a part of B and Y is a member of Z) and the properties of things (size, weight, age, price).

The rational unified process (RUP) methodology, owned by IBM,

...provides a framework for breaking down the development of software into four "gates." Each gate consists of executable iterations of the software in development. A project stays in a gate waiting for the stakeholder's analysis, and then it either moves to the next gate or is cancelled. The gates include:

Social media

...refers to websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg.

Latitude

...represents a north/south measurement of position.

Longitude

...represents an east/west measurement of position.

Online training

...runs over the Internet or on a CD or DVD, and employees complete the training on their own time at their own pace.

An eshop,

...sometimes referred to as an estore or etailer, is an online version of a retail store where customers can shop at any hour. It can be an extension of an existing store such as The Gap or operate only online such as Amazon.com.

Content used in mashups is typically

...sourced from an application programming interface (API), which is a set of routines, protocols, and tools for building software applications. A programmer then puts these building blocks together.

A knowledge management system (KMS)

...supports the capturing, organization, and dissemination of knowledge (i.e., know-how) throughout an organization. KMS can distribute an organization's knowledge base by interconnecting people and digitally gathering their expertise.

The development phase

...takes all the detailed design documents from the design phase and transforms them into the actual system. In this phase, the project transitions from preliminary designs to actual physical implementation. During development, the company purchases and implements the equipment necessary to support the architecture.

WAPs with multiple-in/multiple-out (MIMO)

...technology have multiple transmitters and receivers, allowing them to send and receive greater amounts of data than traditional networking devices.

In the analysis phase

...the firm analyzes its end-user business requirements and refines project goals into defined functions and operations of the intended system.

A significant trend for the 21st century is to increase the focus on IT infrastructure—

...the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals. Organizations in the past underestimated the importance that IT infrastructures have for the many functional areas of an organization.

In concert with these trends, a new series of business success factors and challenges has emerged that is helping to determine marketplace winners and losers:

...Organization agility, often supported by a "plug and play" IT infrastructure (with a flexible and adaptable applications architecture). A focus on core competencies and processes. A redefinition of the value chain. Instantaneous business response. The ability to scale resources and infrastructure across geographic boundaries.

Gate four: transition.

...Primary questions answered in this phase address ownership of the system and training of key personnel.

Reflecting these changes, core business relationships and models are dramatically changing, including shifts from:

...Product-centricity to customer-centricity. Mass production to mass customization. The value in material things to the value of knowledge and intelligence.

Examples of the innovative uses of RFID include:

...RFID chips injected under the skin of animals using a syringe can help ranchers meet regulations, track wild animals for ecological studies, and return lost pets to their owners. Car manufacturers install RFID antitheft systems. Toll roads use RFID to collect payments from passing cars.

The primary forms of agile methodologies include:

...Rapid prototyping or rapid application development methodology. Extreme programming methodology. Rational unified process (RUP) methodology. Scrum methodology.

One of the newer services is third-generation, or 3G, services that bring wireless broadband to mobile phones.

...The 3G networks let users surf web pages, enjoy streaming music, watch video-on-demand programming, download and play 3-D games, and participate in social media and teleconferencing.

Passive RFID tags do not have a power source, whereas active RFID tags have their own transmitter and a power source (typically a battery).

...The power source runs the microchip's circuitry and broadcasts a signal to the reader (similar to the way a cell phone transmits signals to a base station). Passive RFID tags draw power from the RFID reader, which sends out electromagnetic waves that induce a current in the tag's antenna.

Cell phones have morphed into smartphones that offer more advanced computing ability and connectivity than basic cell phones.

...They allow for web browsing, emailing, listening to music, watching video, computing, keeping track of contacts, sending text messages, and taking and sending photos. The Apple iPhone and RIM BlackBerry are examples of smartphones.

Gate one: inception.

...This phase ensures all stakeholders have a shared understanding of the proposed system and what it will do.

Gate two: elaboration.

...This phase expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it.

Gate three: construction.

...This phase includes building and developing the product.

One with the potential for success is Worldwide Interoperability for Microwave Access (WiMAX),

...a communications technology aimed at providing high-speed wireless data over metropolitan area networks. In many respects, WiMAX operates like Wi-Fi, only over greater distances and with higher bandwidths. A WiMAX tower serves as an access point and can connect to the Internet or another tower.

kill switch—

...a trigger that enables a project manager to close the project before completion.

WLANs that use Wi-Fi have a built-in security mechanism called Wi-Fi Protected Access (WPA),

...a wireless security protocol to protect Wi-Fi networks. It is an improvement on the original Wi-Fi security standard, Wired Equivalent Privacy (WEP), and provides more sophisticated data encryption and user authentication.

agile methodology

...aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements. Agile methodology is what it sounds like: fast and efficient, with lower costs and fewer features. Using agile methods helps refine feasibility and supports the process for getting rapid feedback as functionality is introduced. Developers can adjust as they move along and better clarify unclear requirements.

Social bookmarking

...allows users to share, organize, search, and manage bookmarks. Del.icio.us, a website dedicated to social bookmarking, provides users with a place to store, categorize, annotate, and share favorites. StumbleUpon is another popular social bookmarking website that allows users to locate interesting websites based on their favorite subjects

location-based services (LBS),

...applications that use location information to provide a service. LBS is designed to give mobile users instant access to personalized local content and range from 911 applications to buddy finders ("Let me know when my friend is within 1,000 feet") to games (treasure hunts) to location-based advertising ("Visit the Starbucks on the corner and get $1.00 off a latte"). Many LBS applications complement GPS and GIS, such as:

Business-to-consumer (B2C)

...applies to any business that sells its products or services directly to consumers online. Carfax offers car buyers detailed histories of used vehicles for a fee.

Consumer-to-business (C2B)

...applies to any consumer who sells a product or service to a business on the Internet. One example is customers of Priceline.com, who set their own prices for items such as airline tickets or hotel rooms and wait for a seller to decide whether to supply them.

Consumer-to-consumer (C2C)

...applies to customers offering goods and services to each other on the Internet. A good example of C2C is an auction where buyers and sellers solicit consecutive bids from each other and prices are determined dynamically. EBay, the Internet's most successful C2C online auction website, links like-minded buyers and sellers for a small commission.

Bugs

...are defects in the code of an information system.

Intangible benefits

...are difficult to quantify or measure One of the most difficult decisions managers make is identifying the projects in which to invest time, energy, and resources. An organization must choose what it wants to do—justifying it, defining it, and listing expected results—and how to do it, including project budget, schedule, and analysis of project risks.

Tangible benefits

...are easy to quantify and typically measured to determine the success or failure of a project.

Fourth-generation languages (4GL)

...are programming languages that look similar to human languages. For example, a typical 4GL command might state, "FIND ALL RECORDS WHERE NAME IS "SMITH"."

Computer-aided software engineering (CASE) tools

...are software suites that automate systems analysis, design, and development. Process models and data flow diagrams can provide the basis for the automatic generation of the system if they are developed using a CASE tool.

Tags

...are specific keywords or phrases incorporated into website content for means of classification or taxonomy. An item can have one or more tags associated with it, to allow for multiple browseable paths through the items, and tags can be changed with minimal effort

Mobility and wireless

...are the new focus in ebusiness, and some upcoming trends are mobile commerce, telematics, electronic tagging, and RFID.

Business requirements are the specific business requests the system must meet to be successful, so the analysis phase is critical

...because business requirements drive the entire systems development effort. A sample business requirement might state, "The CRM system must track all customer inquiries by product, region, and sales representative." The business requirement will state what the system must accomplish to be considered successful.

Web conferencing, or a webinar,

...blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants. Regardless of the type of hardware or software the attendees are running, every participant can see what is on anyone else's screen

Extreme programming (XP) methodology, like other agile methods,

...breaks a project into four phases, and developers cannot continue to the next phase until the previous phase is complete. The delivery strategy supporting XP is that the quicker the feedback the more improved the results. XP has four basic phases: planning, designing, coding, and testing.

testing phase

...brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase.

A PERT (Program Evaluation and Review Technique)

...chart is a graphical network model that depicts a project's tasks and the relationships between them.

An open system

...consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate with the system. Thousands of hardware devices and software applications created and sold by third-party vendors interoperate with computers, such as iPods, drawing software, and mice.

Source code

...contains instructions written by a programmer specifying the actions to be performed by computer software.

A requirements

...definition document prioritizes all of the business requirements by order of importance to the company.

The project scope

...describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project.

Social tagging

...describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search. The entire user community is invited to tag, and thus essentially defines, the content.

Test conditions

...detail the steps the system must perform along with the expected result of each step.

The Project Management Institute (PMI)

...develops procedures and concepts necessary to support the profession of project management (www.pmi.org). PMI defines a project as a temporary activity a company undertakes to create a unique product, service, or result.

The network

...effect describes how products in a network increase in value to users as the number of users increases. The more users and content managers on a wiki, the greater the network effect because more users attract more contributors, whose work attracts more users, and so on. For example, Wikipedia becomes more valuable to users as the number of its contributors increases.

Rapid application development (RAD) methodology (also called rapid prototyping)

...emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process

A wireless access point (WAP)

...enables devices to connect to a wireless network to communicate with each other.

Onshore outsourcing—

...engaging another company within the same country for services.

The design phase

...establishes descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudo code, and other documentation.

The critical path

...estimates the shortest path through the project ensuring all critical tasks are completed from start to finish.

Search engine ranking

...evaluates variables that search engines use to determine where a URL appears on the list of search results.

Pay-per-call:

...generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call.

Pay-per-click:

...generates revenue each time a user clicks on a link to a retailer's website.

Object-oriented languages

...group data and corresponding processes into objects.

content management systems (CMS)

...help companies manage the creation, storage, editing, and publication of their website content. CMSs are user-friendly; most include web-based publishing, search, navigation, and indexing to organize information; and they let users with little or no technical expertise make website changes.

Spatial data (geospatial data or geographic information)

...identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. Spatial data can be mapped and is stored as coordinates and topology. A GIS accesses, manipulates, and analyzes spatial data.

Software engineering

...is a disciplined approach for constructing information systems through the use of common methods, techniques, or tools. Software engineers use computer-aided software engineering (CASE) tools, which provide automated support for the development of the system.

The project plan

...is a formal, approved document that manages and controls the entire project.

A wireless LAN (WLAN)

...is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.

A website bookmark

...is a locally stored URL or the address of a file or Internet page saved as a shortcut

dependency

...is a logical relationship that exists between the project tasks, or between a project task and a milestone. PERT charts define dependency between project tasks before those tasks are scheduled

Wireless fidelity (Wi-Fi)

...is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves.

Streaming

...is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred. Streaming is not limited to cellular usage; all wireless and even wired networks can take advantage of this method. The most obvious advantage is speed, a direct benefit for mobile and wireless devices since they are still not as fast as their wired counterparts.

A wireless MAN (WMAN)

...is a metropolitan area network that uses radio signals to transmit and receive data. WMAN technologies have not been highly successful to date, mainly because they are not widely available, at least in the United States.

A change agent

...is a person or event that is the catalyst for implementing major changes for a system to meet business changes.

An ebusiness model

...is a plan that details how a company creates, delivers, and generates revenues on the Internet.

A global positioning system (GPS)

...is a satellite-based navigation system providing extremely accurate position, time, and speed information.

A methodology

...is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges. Firms use a methodology to manage the deployment of technology with work plans, requirements documents, and test plans, for instance. A formal methodology can include coding standards, code libraries, development practices, and much more.

A collaboration system

...is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information. Business 2.0's collaborative mind-set generates more information faster from a wider audience

A satellite

...is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area. When satellite systems first came into consideration in the 1990s, the goal was to provide wireless voice and data coverage for the entire planet, without the need for mobile phones to roam between many different provider networks.

A wireless WAN (WWAN) .

...is a wide area network that uses radio signals to transmit and receive data. WWAN technologies can be divided into two categories: cellular communication systems and satellite communication systems

Wired equivalent privacy (WEP)

...is an encryption algorithm designed to protect wireless transmission data. If using a Wi-Fi connection, WEP encrypts the data using a key that converts the data into a non-human readable form. The purpose of WEP was to provide wireless networks with the equivalent level of security as wired networks.

A project manager

...is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget. The project manager is the person responsible for executing the entire project and defining the project scope that links the project to the organization's overall business goals.

A legacy system

...is an old system that is fast approaching or beyond the end of its useful life within an organization.

A blog, or web log,

...is an online journal that allows users to post their own comments, graphics, and video. Unlike traditional HTML web pages, blog websites let writers communicate—and readers respond—on a regular basis through a simple yet customizable interface that does not require any programming.

Collective intelligence

...is collaborating and tapping into the core knowledge of all employees, partners, and customers. Knowledge can be a real competitive advantage for an organization.

Bluetooth

is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices. The name is borrowed from Harald Bluetooth, a king in Denmark more than 1,000 years ago. Bluetooth eliminates the need for wires, docking stations, or cradles, as well as all the special attachments that typically accompany personal computing devices....

•Radio frequency identification (RFID)

technologies use active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers.

The most common form of collective intelligence found inside the organization is knowledge management (KM),

...which involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions. The primary objective of knowledge management is to be sure that a company's knowledge of facts, sources of information, and solutions are readily available to all employees whenever it is needed.

The most common form of collective intelligence found outside the organization is crowdsourcing,

...which refers to the wisdom of the crowd. The idea that collective intelligence is greater than the sum of its individual parts has been around for a long time With Business 2.0 the ability to efficiently tap into its power is emerging.

Nearshore outsourcing—

...—contracting an outsourcing arrangement with a company in a nearby country. Often this country will share a border with the native country.

•Common reasons companies outsource include:Core competencies.

Core competencies. Many companies have recently begun to consider outsourcing as a way to acquire best-practices and the business process expertise of highly skilled technology resources for a low cost. Technology is advancing at such an accelerated rate that companies often lack the technical resources required to keep current.

•Common reasons companies outsource include:Financial savings

Financial savings. It is far cheaper to hire people in China and India than pay the required salaries for similar labor in the United States.

•Telematics—

blending computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations. The most notable example of telematics may be the Internet itself, since it depends on a number of computer networks connected globally through telecommunication devices.

the maintenance phase,

...the organization performs changes, corrections, additions, and upgrades to ensure the system continues to meet business goals. This phase continues for the life of the system because the system must change as the business evolves and its needs change, which means conducting constant monitoring, supporting the new system with frequent minor changes (for example, new reports or information capturing), and reviewing the system to be sure it is moving the organization toward its strategic goals.

In the implementation phase,

...the organization places the system into production so users can begin to perform actual business operations with it.

Semi-passive RFID tags

...use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader.

Chipless RFID tags

...use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip.

Automatic vehicle location (AVL)

...uses GPS tracking to track vehicles. AVL systems use a GPS receiver in the vehicle that links to a control center. Garmin is one of the more popular manufacturers of GPS tracking systems, offering vehicle tracking, phone and laptop integration, and hiker navigation for water and air.

Radio-frequency identification (RFID)

...uses electronic tags and labels to identify objects wirelessly over short distances. It holds the promise of replacing existing identification technologies such as the bar code. RFID wirelessly exchanges information between a tagged object and a reader/writer. An RFID tag is an electronic identification device that is made up of a chip and antenna

scrum methodology,

...uses small teams to produce small pieces of software using a series of "sprints," or 30-day intervals, to achieve an appointed goal. In rugby, a scrum is a team pack and everyone in the pack works together to move the ball down the field. In scrum methodology, each day ends or begins with a stand-up meeting to monitor and control the development effort.

Offshore outsourcing—

...using organizations from developing countries to write code and develop systems. In offshore outsourcing the country is geographically far away.

Traditional ebusiness communications

...were limited to face-to-face conversations and one-way technologies that used asynchronous communications, or communication such as email in which the message and the response do not occur at the same time.

One of the most popular forms of user-generated content is a reputation system,

...where buyers post feedback on sellers. eBay buyers voluntarily comment on the quality of service, their satisfaction with the item traded, and promptness of shipping.

MIS project failures can cost companies financially and even ruin business reputations. The primary reasons for project failure are:

... Unclear or missing business requirements. Skipping SDLC phases. Failure to manage project scope. Failure to manage project plan. Changing technology

Business-to-business (B2B)

... applies to businesses buying from and selling to each other over the Internet.

Business 2.0

... brought synchronous communication, or communications that occur at the same time such as IM or chat. Ask a group of college students when they last spoke to their parents. For most the answer is less than hour ago, as opposed to the traditional response of a few days ago. In business too, continuous connections are now expected in today's collaborative world.

Search engine optimization (SEO)

... combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking

Loss of confidentiality.

Information on pricing, products, sales, and customers can be a competitive asset and often critical for business success. Outsourcing could place confidential information in the wrong hands. Although confidentiality clauses contained in the contracts are supposed to protect the company, the potential risk and costs of a breach must be analyzed.

...•Length of contract. Most companies look at outsourcing as a long-term solution with a time period of several years. Training and transferring resources around the globe is difficult and expensive, hence most companies pursuing offshore outsourcing contract for multiple years of service. A few of the challenges facing the length of the contract include:

It can be difficult to break the contract. Forecasting business needs for the next several years is challenging and the contract might not meet future business needs. Re-creating an internal MIS department if the outsource provider fails is costly and challenging.

•Threat to competitive advantage.

Many businesses view MIS as a competitive advantage and view outsourcing as a threat because the outsourcer could share the company's trade secrets.

•The emerging technology behind mbusiness is a mobile device equipped with a web-ready micro-browser that can perform the following services:

Mobile entertainment—downloads for music, videos, games, voting, ring tones, as well as text-based messaging services. Mobile sales/marketing—advertising, campaigns, discounts, promotions, and coupons. Mobile banking—manage accounts, pay bills, receive alerts, and transfer funds. Mobile ticketing—purchase tickets for entertainment, transportation, and parking including the ability to automatically feed parking meters. Mobile payments—pay for goods and services including in-store purchases, home delivery, vending machines, taxis, gas, and so on.

•Common reasons companies outsource include:Rapid growth.

Rapid growth. Firms must get their products to market quickly and still be able to react to market changes. By taking advantage of outsourcing, an organization can acquire the resources required to speed up operations or scale to new demand levels.

•Common reasons companies outsource include:The Internet and globalization.

The Internet and globalization. The pervasive nature of the Internet has made more people comfortable with outsourcing abroad as India, China, and the United States become virtual neighbors.

Outsourcing comes with several challenges

These arguments are valid and should be considered when a company is thinking about outsourcing. Many challenges can be avoided with proper research. The challenges include: length of contract, threat to competitive advantage, loss of confidentiality

•Electronic tagging—

a technique for identifying and tracking assets and individuals via technologies such as radio frequency identification and smart cards.

•Mobile commerce (m-commerce)

—the ability to purchase goods and services through a wireless Internet-enabled device.


Set pelajaran terkait

MANA 4322 ORG STRATEGY EXAM ONE - 1,2,3

View Set

InQuizitive: Chapter 15 "What is freedom?": Reconstruction, 1865-1877

View Set

BANA 2372 - Hollander - Final Exam - Chapters 1-9 - All Practice Questions, Final Exam Part 3

View Set

Advanced Accounting Exam 1 - Consolidation

View Set

Chapter 38: Agents to Control Blood Glucose Levels

View Set