MIS

Ace your homework & exams now with Quizwiz!

Tools/Software for protection in ISS

- Authentication - Firewalls - Intrusion Detection System - Antivirus & Anti-spyware software - Threat mgmt system - Encryption

Points to note on SDLC

- Divides process into steps - steps need to be completed before next - requires review at each step - necessary to go back to correct problems - users heavily involved in SDLC process - in custom development each stage in SDLC is carried out with possible over laps/ retracking - in alternative methods of software acquisition not all steps in SDLC need to be followed

Limitations of SDLC

- Expensive - Prolongs time - Rigid approach - Difficult to go back steps - Doesn't actively involve users - Not intended for systems that need changes - lack of good analysis results in system that may not match needs

Crime and threat to Information Systems

- Hacker/Cracker - Ransomeware/spyware/trojan horse - identity theft/phishing - botnet - pharming - click fraud - cyber warfare - internal threats/employees - software vulnerability

Information Systems Analysis Tools

- Porters 5 Forces - Nolans stages of growth -. Porters value Chain Analysis - Strategic Grid

Benefits of ERD

- makes data travel easy - Visual Representation - Effective communication - Easy To Understand - Easy To Understand

Techniques to System anaylsis

1. Brainstorming 2. Questionnaires 3. Interviewing 3. documentation Review 4. Observation 5. Research

Porter's Generic Strategies

1. Cost Leadership 2. Product differentiation 3. Focus on market niche

First steps in ISS

1. Determine value of assets, hardware, software, networks & data 2. Establish weaknesses in existing system 3. Risk assessment 4. Choosing controls most suited -> cost-benefit analysis

key database activities

1. Entering & querying data using SQL or Query by Example (QBE) 2. Producing reports

Name Diagraming tools and what they do

1. Information flow diagrams (IFD) 2. Data Flow Diagrams (DFD) 3. Flow Process Charts 4. Entity Relationship Diagrams (ERD) Diagramming tools document current and new systems and tools that enable processionals to communicate and check analyzes with user community

Evolution of ISS

1. Technical - Responsibility of tech experts 2. Management - Responsibility shared by tech, users & mgmt 3. Institutional - Institutionalizing info security within organization

Features of ecommerce

1. Ubiquity 2. Global Reach 3. Universal Standards 4. Richness 5. Interactivity

Benefits of the internet in relation to Porters 5 Forces

1. enables new subs to emerge 2. shifts power to customer due to availability 3. reduces supplier power because of availability 4. Reduces barriers to entry 5. Widens geographic market

Steps in SSADM (Structured Systems Analysis and design methodology)

1. feasibility 2. requirement analysis 3. requirements specification 4. Logical systems specification 5. physical design

Types of Information Systems

1. transaction processing systems 2. management information systems 3. decision support systems 4. executive information systems 5. Business Intelligence 6. Human Resource Systems 7. Material Requirement Planning 8. Customer Relationship Systems 9. Supply Chain Management System 10. Enterprise System

Rapid Application Development (RAD)

A form of rapid prototyping that requires strict time limits on each phase and relies on tools that enable quick development. And lots and lots of testing

Which of the following is an example of a business using information systems to create new products and services?

A) Apple`s creation of the iPod

risks and advantages to database approach

Advantages: - program-data independence - minimal data redundancy - improved data consistency - improved data sharing - improved data accessibility Risks & Costs: - requires new, specialized personnel - conversion costs - installation & management - need for explicit backup & recovery - organizational conflict

Rapid Application Development (RAD) and Prototyping advantages and disadvantages

Advantages: RAD: - human acceptance - increased speed of development - increased quality Prototyping: - involves users in analysis & design - Reduced time and costs Disadvantages: RAD: -Reduced Scalability - Reduced features Prototyping: - Excessive Development Time - User confusion

What are Porter's 5 forces?

Allows businesses to gauge level of competition within industry and potential lines of business. The 5 Forces are: 1.) Bargaining power of suppliers 2.) Bargaining power of customers 3.)Threat of new entrants 4.) Threat of substitutes 5.) Competitive rivalry within the industry

An example of a business using information systems for customer and supplier intimacy is:

B) JC Penney`s information system that allows its contract manufacturers to see what garments have been sold and need to be replaced.

Why are businesses interested in big data?

Big data reveals patterns and anomalies; can provide insights into customer behavior, weather patterns, financial market activity, etc.

Approaches to Database Design

Bottom up: normalization Top-down: Entity-relationship modeling technique

______ refers to technologies, applications and practices for the collection, integration, analysis, and presentation of business information. The purpose is to support better business decision making.

Business Intelligence

A DSDM project's lifecycle phase are:

Business Study → Feasibility Study → Functional Model Iteration → Design and Build Iteration → Implementation

The field that deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm is called:

C) management information systems.

______ system allows businesses to manage business relationships and the data and information associated with them. Helps company stay connected to customers; contact info, transactions, client preferences, etc.

Customer Relationship Systems

Define Information Systems Stragegy

Defined by Ward and Peppard as a strategy that sets direction in which organization is going. Provides frame work for IS needs in terms of requirements and IT

______ is a systems that link together different functions into one system, such as HR, production & operation, accounting & finance.

Enterprise System

______ are systems at the strategic level, designed to provide the executive with information on the over all performance of the firm.

Executive information systems

Define system analysis

Finding out what system needs to be able to do. Identifying requirements by 1. Fact finding. 3 Attributes under consideration 1. Business processes 2. Data 3. Information Flows

Data Flow Diagram (DFD)

Flow of data within an information system.indicates sequence of tasks within a process, how it moves from one process to the next. Hoffer et al. "Data in motion, moving from one place to another"

______ store information on employees, recruit new ones, training and development of existing staff, automated pay roll, appraisals

Human Resource Management Systems

Connection between Information Systems strategies and Business strategy.

Information Systems strategy identifies applications (IT) that can support business strategy objectives

Information Security System

Information Technology (IT) Department is mainly responsible of the implementation and the maintenance of the ______________

14) What is the difference between information technology and information systems? Describe some of the functions of information systems.

Information technology (IT) consists of all the hardware and software that a firm needs to use in order to achieve its business objectives. Information systems are more complex. An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support decision making and control in an organization. The functions of an information system are to support decision making, coordination, and control; help employees analyze problems; help employees visualize complex subjects; and help create new products.

What does data provide? and what is performance based on?

It provides competitive advantage. It forces competition to match e.g., Fedex data tracking on website. Performance depends on accuracy and reliability of data

Define Database management system (DBMS) and give examples of types

Its a software for creating, storing, organizing, and accessing data. Systems helps manage volumes of data and large number of people. Types: 1. Hierarchical databases 2. Network databases 3. Oracle database 4. MySQL 5. Microsoft SQL

______ a system underneath production and operation information systems. Helps in scheduling resources used in production process.

Material Requirement Planning

Security Control Mechanisms in ISS and define

Methods, policies, procedures that aim in protecting organizations assets Controls: 1. Physical Hardware & Software controls -Equipment needs security against fire, dust, humidity, theft, etc. 2. Computer Operations Controls - Ensure programmed software controls correctly applied to processing & storage of data (data backup, recovering procedures) 3. Data security Controls -Ensures accuracy and completeness of any data thats stored, safeguards against illegal access, manipulation, or change. 4. Systems Implementation Controls - Done through audits at end of implementation stage. Done to secure system 5. Documentation Controls -Good documentation makes system more secure and less applicable to damage 6. Administrative Controls -Standards, rules & procedures to ensure all security controls are enforced fully 7. Application Controls Input controls, processing controls & output controls

Define normalization

Normalization is the process of organizing data into tables in a way to minimize data elements and many-to-many relationships (Laudon & Laudon, 2015)

Describe bargaining power customers and provide example

Powerful customers are able to exert pressure to drive down prices, or increase the required quality for the same price and therefore reduce profits in the industry Power also if various subs available such as various platforms to buy similar products E.g., Airline tickets

Describe threat of substitute products and provide example

Refers to the multiple substitute products that can replace ones own and what a consumer might buy instead. Example: Instead of flying, people can use trains, bullet trains, cars, motorcycles, or the biggest airplane threat to emerge: Elon Musks Hyperloop concept of capsule travel, 1200 km/h

Describe bargaining power of suppliers

Refers to the pressure suppliers can exert on businesses by raising prices, lowering quality, or reducing availability of their products. Business example: Coca-cola - largest supplier customer, meaning company has power over supplier

Stages of SDLC

Series of logical phases project has to go through: 1. Planning 2. Analysis 3. Design 4. Development 5. Implementation 6. Maintenance

define the database approach

Shared collection of data designed to meet info needs of an organization. Large repository of data used simultaneously within the company. Its a shared corporate resource.

Process Flow Diagram

Shows different functions required from a process and the logic of that process. Does not indicate sequence of tasks.

______ Helps manage relationships w/ suppliers...such as sharing info

Supply Chain Management System

What does a database administrator do?

The database administrator is responsible for maintaining the database and restricting access to the database to authorized personnel.

Systems Development Life Cycle (SDLC)

The overall process for developing business information systems from planning and analysis through implementation and maintenance

An IT infrastructure provides the platform on which the firm can build its information systems. A) True B) Fale

True

UPS's use of Web-based tools that allow customers to embed UPS functions such as tracking and cost calculations into their own Web sites was an information systems solution used to achieve customer intimacy. A) True B) Fale

True

Cash, McFarlan & McKenney Strategic Grid

Used to determine strategic importance of Information Systems. Modes: 1. Factor 2. Strategic 3. Support 4. Turnaround

Why is Information Security System important?

Used to prevent unauthorized access, alteration, theft, damage to the information systems.

Porter's Value Chain Analysis

Views a firm as a series of business processes that each add value to the product or service as it moves through each stage, categorized as primary value or support

Big Data 3 V's

Volume: amount of data available is greater than the firms ability to process it Variety: Big data is often "messy" it does't fit neatly into a database Velocity: data "arrives" rapidly and continuously

Datawarehouse

a large collection of data that contains and organizes in one place all the data from an organization's multiple databases. Father of data warehouses is William Inmon

Entity Relationship Diagram (ERD)

a technique for documenting the entities and relationships in a database environment One-to-on one-to-many many-to- many one and one only one many one or many zero or many zero or one Business example: Amazon order numbers and customer IDs

Define feasibility study

an assessment of the practicality and potential for success of a proposed business idea. Considers economic, technical, operational, and organizational feasibility

Define big data

billions to trillions of records from different sources. Data from web traffic, emails, social media, machine generated data, or electronic trading systems. Unstructured or semi-structured

Prototyping

building an experimental system rapidly and inexpensively for end users to evaluate

______ are computer-based information systems at the management level that combine data and analytical models to support semi-structured and unstructured decision-making.

decision support systems

Structured systems analysis and design methodology (SSADM)

developed by Learmont & Burchett and CCTA Provides project development staff with detailed rules and guidelines to work to and is highly structured. Covers feasibility to design

Information Flow Diagrams

diagram that shows how information is communicated from a source to a receiver or target, through some medium

Why is there a need for a security policy in ISS?

ensures appropriate backup & procedures are in place for any security problems

Describe competitive rivalry among competitors and provide example

extent to which firms within an industry put pressure on one another and limit each other's profit potential Example: Pepsi and Coca-cola

Define data modeling

focuses on the data that must be stored by the system.

Define database reports

generates reports that organizes data from database and prints it into useful format. e.g., quarterly sales report -> summing sale total

Define Process modeling

graphically represents the processes that capture, distribute, and store data between a system and its environment

define database administrator (DBA)

helps in development and effective management of an organizations database.

define DBMS facilities and what it allows

it is a software that interacts w/ the users application programs and the database. It allows: - users to define database - users to insert, update, delete, & retrieve data - provides controlled access

______ are computer- based systems that make information available to users with similar needs. Provide reports about current performance

management information systems

relational database model

proposed by E.F Codd (1970) stores information in the form of logically related two-dimensional tables

Dynamic Systems Development Methodology (DSDM)

proposes an interactive approach with frequent delivery of prototypes to end users through phases of project

Describe threat of new entrants and provide example

refers to the threat new competitors pose to existing competitors in an industry. E.g., Airline industry, hard to enter, various established companies such as KLM. Southwest and various others entered using cost-cutting strategies.

database design

the process of converting a data model into tables, relationships, and data constraints

______ are systems designed to ensure routine tasks are carried out effectively and efficiently.

transaction processing systems


Related study sets

Teaching & Learning / Patient Education

View Set

Marketing Medicare Advantage and Part D Plans

View Set

True or False Questions For ELA Exam

View Set

NSG 245- Ch 20 Assessment of Respiratory Function

View Set

CRM: Module 2 - Cancer Data & Confidentiality

View Set

ACG Chapter 4: Accounting for Merchandising Operations

View Set