MIS 3100 - Test 3 (Ch. 7-10)

Ace your homework & exams now with Quizwiz!

***supply chain management (SCM)***

((inter-enterprise IS)) management of the flow of goods and services, involves moving raw materials, WIP inventory, or finished goods within a network

SM revenue models

1. ADS - used by most companies to earn revenue, use increases value (pay-per-click: advertisers pay for ads only when customers click on the ad) 2. FREEMIUM -offers basic service for free with paid upgrades (ad blocking software) - also: sale of apps & virtual goods, affiliate commissions, donations

cluster analysis (unsupervised data mining)

In ________, statistical techniques can identify groups of entities that have similar characteristics.

________ is a term that refers to the level of detail represented by the data.

Granularity

brute force attack

Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters.

REPORTING APP: RFM analysis

RECENCY, FREQUENCY, MONEY technique used to analyze and rank customers according to their purchase patterns considers: how recently a customer ordered, how frequently a customer ordered, and how much money the customer has spent a technique readily implemented with basic reporting operations

***SMIS Roles/Stakeholders***

THREE ROLES: * SM PROVIDERS - provide platforms that enable creation of social networks/relationships * USERS - individuals and organizations that use SM to build social relationships * COMMUNITIES - formed based on mutual interests and transcend geographical boundaries (second-tier users like classmates, coworkers, and friends of users)

social media

________ is the use of information technology to support the sharing of content among networks of users. The first step that any organization should take to manage the risk of employee communication is to develop and publicize a ________ policy.

conversion rate

________ measures the frequency that someone who clicks on an ad makes a purchase, "Likes" a site, or takes some other action desired by the advertiser.

user-generated content

________, which refers to the matter on a social media (SM) site that is contributed by users, is the essence of SM relationships.

malware

a broad category of software that includes viruses, spyware, and adware virus - computer program that replicates itself spyware - programs installed on a user's computer without knowledge or permission adware - installed without user's permission and resides in the background and observes user behavior

data marts

a data collection (smaller than data warehouse) that addresses the needs of a particular department or functional area of the business analogy: if warehouse is distributor in supply chain, mart is like a retail store in the chain

***enterprise resource planning (ERP)***

a suite of applications (modules), a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform primary purpose is integration!!!

enterprise application integration (EAI)

a suite of software applications that integrates existing systems by providing layers of software that connect applications together, enabling existing applications to communicate with each other and share data

sniffing

a technique for intercepting computer communications which requires a physical or wireless connection to the network

human errors

accidental problems caused by both employees and non-employees ex. misunderstanding of operating procedures, installing old databases on top of new ones

business process reengineering

activity of altering existing and designing new business processes to take advantage of new information systems difficult, slow, and expensive

***unsupervised data mining***

analysts do not create a model or hypothesis before running the analysis (experimental) they observe the results after analysts create a hypothesis after the analysis * CLUSTER ANALYSIS (statistical techniques can identify groups of entities that have similar characteristics; ex: Target identifies pregnant teen by matching purchases with other pregnant women)

data mining (knowledge discovery)

application of statistical techniques to find patterns and relationships among data for classification and prediction

hacking

breaking into computers, servers, or networks to steal proprietary and confidential data

Information systems improve process quality by ________.

controlling process flow

When an organization has inconsistent duplicated data, it is said to have a(n) ________.

data integrity problem

***supervised data mining***

data miners develop a model/hypothesis prior to the analysis and apply statistical techniques to data to estimate parameters of the model * REGRESSION ANALYSIS: measures the effect of a set of variables on another variable; EX: Cellphone/Weekend/Minutes

A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves.

data warehouse

crowdsourcing

dynamic social media process of employing users to participate in product design or redesign

The two dimensions of process quality are ________.

efficiency and effectiveness

workgroup processes

exists to enable workgroups to fulfill the charter, purpose, and goals of a particular group or department

data acquisition

first step in the BI process (by data warehouse) process of: obtain, cleanse, organize, relate, and catalog data OCORC

data warehouse

for larger orgs; a staff/group of people who manage an organization's business intelligence data functions: obtain, cleanse, organize, & catalog data

REPORTING APP: online analytical processing system (OLAP)

generic reporting application with the ability to sum, count, average, and perform simple arithmetic operations on groups of data DYNAMIC reports!!! measure: the data item of interest dimension: a characteristic of a measure

To reduce the substantial work that needs to be done to customize an ERP application to a particular customer, ERP vendors provide ________.

industry-specific solutions

Business Intelligence Systems

information systems that process operational, social, and other data to identify patterns, relationships, and trends for use by business professionals and other knowledge workers

human safeguards

involve the people and procedure components of information systems result when authorized users follow appropriate procedures for system use and recovery (hiring/screening, termination, enforcement, defined job responsibilities)

A ________ is a string of bits used to encrypt data.

key

Success metrics are also known as ________.

key performance indicators (KPI)

In market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________.

lift

A data ________ is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business.

mart

***knowledge management (KM)***

process of creating, sharing, using, and managing the knowledge and information of an organization making the best use of organizational knowledge

enterprise processes

span an organization and support activities in multiple departments (EX: hospital discharge involves housekeeping, pharmacy, kitchen, nurses, etc.)

inter-enterprise processes

span two or more independent organizations (EX: buying a healthcare policy via a healthcare exchange involves many insurance co's and gov agencies; each org has activities to fulfill, with external influences like gov policies, laws, competition w other insurance co's) *** problem solutions affect multiple organizations

To an organization, the ________ is the likelihood that an entity in a relationship will do something that benefits the organization.

strength of the relationship

***customer relationship management (CRM)***

suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer from lead generation to customer service every contact and transaction with a customer is recorded in the system's database

In market-basket terminology, ________ describes the probability that two items will be purchased together.

support

enterprise information system

support one or more enterprise processes, typically have hundreds to thousands of users, procedures are formalized and extensively documented, eliminates data duplication; difficult to change ex. hospital

inter-enterprise information systems

support one or more inter-enterprise processes, involve thousands of users, solutions require cooperation among independent organizations ex. supply chain management

phishing (email spoofing)

technique for obtaining unauthorized data that uses pretexting via email phishers pretend to be legitimate companies requesting confidential data

social capital

the investment in social relations with the expectation of returns in the marketplace Number of Relationships × Relationship Strength × Entity's Resources

encryption

the process of transforming clear text into coded, unintelligible text for secure storage or communication

enterprise 2.0

use of emergent social software platforms within companies/use of enterprise social networks (blogs, updates, sharing, personal sites, etc)

According to Henk Flap, the ________ is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.

value of social capital

exists to support one or more processes within the workgroup; procedures are often formalized, somewhat difficult to change also called functional information systems ex. Doctor's office, medical practice (managing records, prescriptions, post-surgery, etc.)

workgroup (dept) information system

A ________ is a type of virus that self-propagates using the Internet or other computer network.

worm


Related study sets

CFP Class 2 - Module 3 - Modern Portfolio Theory and Behavioral Finance

View Set

Chapter 6 Computer Science Quiz-AB

View Set

מבחנים אתר מד״א פרק החולה קורס חובשים מד״א פברואר 2017

View Set

Pediatric Nursing Growth and Development

View Set

U.S. History Chapter 3 Study Guide

View Set

MASTERING TEST - Chapter 26: Fluid, Electrolyte, and Acid-Base Balance

View Set

APEX Business Finance 8.2.4 Study Guide

View Set