MIS final exam (ch. 1-9) Dr. Jerry Ward UCO
Data warehouses
provided the ability to support decision making without disrupting the day-to-day operations
Supply Chain Downstream
serve as distribution channels that link the firm and its customers
Outsourcing benefits
•Increased quality and efficiency of business processes •Reduced operating expenses for head count and exposure to risk for large capital investments •Access to outsourcing service provider's expertise, economies of scale, best practices, and advanced technologies •Increased flexibility for faster response to market changes and less time to market for new products or services
Outsourcing challenges
•Length of contract 1.Difficulties in getting out of a contract 2.Problems in foreseeing future needs 3.Problems in reforming an internal IT department after the contract is finished •Threat to competitive advantage •Loss of confidentiality
Characteristic of a well-defined project plan
•easy to understand and read •Communicated to all key participants •Appropriate to the project's size, complexity, and criticality •Prepared by the team, rather than by the individual project manager
Universal resource locator
(URL) The specific address of a page on the Internet
3D printing
(additive manufacturing) builds—layer by layer in an additive process—a three-dimensional solid object from a digital model
Enterprise systems
-can manage information across the entire enterprise allowing users to view every detail of business operations -are often available as a generic, but highly customizable, group of programs for business functions such as accounting, manufacturing, and marketing
Disaster recovery plan
A detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood
Business strategy
A leadership plan that achieves a specific set of goals or objectives such as: *Developing new products or services *Entering new markets *Increasing customer loyalty *Attracting new customers *Increasing sales
Streaming
A method of sending audio and video files over the Internet
MAN
A metropolitan area network that uses radio signals to transmit and receive data
Business continuity plan
A plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption
Extraction, transformation, and loading (ETL)
A process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse
Key logger software
A program that, when installed on a computer, records every keystroke and mouse click
Hot site
A separate and fully equipped facility where the company can move immediately after a disaster and resume business
Cold site
A separate facility that does not have any computer equipment, but is a place where employees can move after a disaster
Warm site
A separate facility with computer equipment that requires installation and configuration
Network Protocols
A standard that specifies the format of data as well as the rules to be followed during transmission
Phishing
A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email
Systems thinking
A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part
WAN
A wide area network that uses radio signals to transmit and receive data
Internet of Things
A world where interconnected Internet-enabled devices or "things" have the ability to collect and share data without human intervention
Seven abilities of an agile organization
Accessibility Availability Maintainability Portability Reliability Scalability Usability
Business Process Reengineering (BPR)
Analysis and redesign of workflow within and between enterprises
Neural network
Attempts to emulate the way the human brain works
e-business models
B2B, B2C, C2C, pure play, click-and-mortar, etc.
transaction processing system (TPS)
Basic business system that serves the operational level and assists in making structured decisions
Relational database model
Entities, Relationships, Attributes, Primary Keys, Foreign Keys (ERD's)
Data validation
Includes the tests and evaluations used to determine compliance with data governance policies to ensure correctness of data
Project stakeholder
Individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion
Business Intelligence
Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making
Business intelligence
Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making
Knowledge management
Involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions
LAAS
Local Area Augmentation System. Ground-based augmentation to GPS that focuses its service on the airport area (approximately 20-30 mile radius) for precision approach, departure procedures, and terminal area operations.
Security breaches
Most information security breaches result from people misusing an organization's information either advertently or inadvertently.
Open system
Nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system
Personalization
Occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person
PaaS
Platform as a Service. Provides cloud customers with an easy-to-configure operating system and on-demand computing capabilities.
Transmission control protocol/Internet protocol (TCP/IP)
Provides the technical foundation for the public Internet as well as for large numbers of private networks
Key performance indicator (KPI)
Quantifiable metrics a company uses to evaluate progress toward critical success factors *Turnover rates of employees *Percentage of help desk calls answered in the first minutes *Number of product returns *Number of new customers *Average customer spending
Moore's law
Refers to the computer chip performance per dollar doubles every 18 months
Pharming
Reroutes requests for legitimate websites to false websites
Porter's Five Forces model
Rivalry among existing competitors, threat of substitute products or services, threat of new entrants, buyer power, supplier power
Managerial level
Semistructured decisions Employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change
Middleware
Several different types of software that sit between and provide connectivity for two or more software applications
SaaS
Software as a Service; a subscription service where you purchase licenses for software that expire at a certain date.
Reintermediation
Steps are added to the value chain as new players find ways to add value to the business process
SAN
Storage Area Network is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.
Operational level
Structured decisions Employees develop, control, and maintain core business activities required to run the day-to-day operations
Predictive Analytics
Techniques that extract information from data and use it to predict future trends and identify behavioral patterns Example: Using past sales data to predict future sales data
Hypertext transport protocol (HTP)
The Internet protocol Web browsers use to request and display Web pages using URL
System restore
The ability to get a system up and running in the event of a system crash or failure
Network convergence
The efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures
Supply Chain Midstream
The midstream sector involves the transportation (by pipeline, rail, barge, oil tanker or truck), storage, and wholesale marketing of crude or refined petroleum products.
System Development Life Cycle (SDLC)
The overall process for developing information systems from planning and analysis through implementation and maintenance
Project sponsor
The person or group who provides the financial resources for the project
microblogging website
The practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text Example: Twitter
information management
The process of accessing, processing, maintaining, evaluating, and disseminating knowledge, facts, or data for the purpose of assisting business decision making.
Automation
The process of computerizing manual tasks
data cleansing
The process of detecting incorrect or insufficient data
Analytics
The science of fact-based decision making
pirated software
The unauthorized use, duplication, distribution, or sale of copyrighted software
Project Scope
The work performed to deliver a product, service, or result with the specified features and functions.
project risks
Time, Quality, Cost
Digital dashboards
Tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs
Strategic level
Unstructured decisions Managers develop overall business strategies, goals, and objectives as part of the company's strategic plan
Voice over IP (VOIP)
Uses IP technology to transmit telephone calls.
RFID
Uses electronic tags and labels to identify objects wirelessly over short distances•Uses electronic tags and labels to identify objects wirelessly over short distances
Value Chain Analysis
Views a firm as a series of business processes that each add value to the product or service
Ransomware
a form of malicious software that infects your computer and asks for money
Fair Information Practices
a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy
System integration
a process that brings together a set of component subsystems to ensure that the subsystems interact together as a coordinated whole
Competitive advantage
a product or service that an organization's customers place a greater value on than similar offerings from a competitor
Executive information system (EIS)
a specialized DSS that supports senior level executives within the organization
Utility computing
a technology whereby a service provider makes computing resources and infrastructure management available to a customer as needed
Bring Your Own Device Policy
allows employees to use their personal mobile devices and computers to access enterprise data and applications
Drive-by hacking
A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
LAN
A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet
System backup
An exact copy of a system's information
Internet use policy
Contains general principles to guide the proper use of the Internet
counterfeit software
Software that is manufactured to look like the real thing and sold as such
Visualization
charts, graphs, etc.
SWOT
evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies
goal-seeking analysis
finds the inputs necessary to achieve a goal such as a desired level of output
Data quality
how accurately the data actually match reality
Data Flow Diagram (DFD)
illustrates the movement of information between external entities and the processes and data stores within the system
Agile MIS Infrastructure
includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals.
Proxy
is software that prevents direct communication between ascending and receiving computer and is used to monitor packets for security reasons.
Data marts
marketing, inventory, and sales
Decision support system (DSS)
models information to support managers and business professionals during the decision-making process
First-mover advantage
occurs when an organization can significantly impact its market share by being first to market with a competitive advantage
Levels of a company's strategic plan
operational level, managerial level, strategic level
Integrity constraints
rules that help ensure the quality of information *Relational integrity constraint *Business-critical integrity constraint
Forward integration
sends information entered into a given system automatically to all downstream systems and processes
Supply Chain Upstream
set of firms that supply the raw materials, components, parts, information, financesterm-89, and expertise needed to create a product and services
Buyer Power
the power of customers to drive down prices
Crowdsourcing
the wisdom of the crowd
Human resource components
track employee information including payroll, benefits, compensation, performance assessment, and assumes compliance with the legal requirements of multiple jurisdictions and tax authorities