• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/53

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

53 Cards in this Set

  • Front
  • Back

TPS and Essential Characteristics (4)

Transaction Processing Systems


Handle High data in high volume


Avoid Errors and Downtime


Record accurately and securely


Maintain Privacy and Security

Batch Processing

Data collected from transactions as they occur then placed in groups for periodical processing

OLTP

Online transaction processing

FAIS and 4 Types

Functional Area Information System


Human Resources


Marketing


Accounting and Finance


POM

ERP

Enterprise Resource Planning

Companies that Provide ERP systems (3)

Oracle


SAP


PeopleSoft

ERP 2

Interorganizational systems that provide web-enabled links between a company's key business systems

Benefits of ERPs (3)

Organization flexibility - break down barriers


Decision Support - provide information across functional areas


Quality and efficiency - Integrate and improve an organizations business processes

Enterprise Application Intregation

Middleware that bridges two existing systems together

Routine Reports

Reports produced at scheduled intervals

Ad Hoc Reports (4)

Drill-down reports - display greater level of detail


Key-indicator - Summarize the performance of critical activities


Comparative Reports


Exception reports - information that only falls outside certain threshold standards

CRM

Customer Relationship Management- a customer focused and customer driven organizational strategy

Customer Touch Points

the numerous and diverse ways a customer will interact with an organization

Customer Interaction Centres

Basically gorified call centres

Sales Force Automation

a component of a CRM system that records all the components in a sales transaction process


In addition - Sales lead tracking, sales forecasting, and a product knowledge system



Types of additional Selling (3)

Upselling - offering the ability to purchase a higher end value product


Cross -selling - selling related products based on previous purchase


Bundling - selling two or more products together at a low price point

Function of CRM systems

Support front end business process

Function of Analytical CRM Systems

Provide business intelligence by analyzing customer behaviour and preceptions

On- Demand Crm Systems and Drawbacks

A type of software as a service deal,


Vendor could go out of business


Difficult or impossible to modify


Difficult to integrate with existing software

Supply Chain

the flow of materials, information, money, and services from raw material suppliers, through factories and warehouses to the end user

Supply Chain visibility

the ability for all involved in the supply chain to be able to see the flow of materials and services in the supply chain

Components of a Supply Chain (3)

Upstream - where sourcing or procurement from external suppliers occurs


Internal - packaging, assembly, or manufacturing takes place


Downstream - where distribution takes place

Supply Chain Management

is to plan, organize, and optimize the various activities performed in the supply chain



IOS (3)

Interorganizational Information system - by connecting the information systems of two partners IOS reduces


routine transactions,


improves quality of information,


compresses the cycle in fulfilling business transactions

Pull Model

the production process begins when a customer orders

EDI

Electronic Data Interchange - a communication standard that allows business partners to exchange routine documents

Vendor-managed inventory

when the supplier manages the entire inventory process for a particular product

3 Basic Roles of Managers

Interpersonal Roles - Leader


Informational Roles - monitor, analyze


Decisional Roles - negotiator

OLAP

Online Analytical Processing; also refered to multidimensional analysis

Data Mining and two basic operations

the process of searching for valuable business information in a large database


Predicting Trends and behaviour - as in credit card fraud


Identifying previous unknown patterns - looking at buying behaviour and comparing

DSS and 3 types of DSS

Decision Support Systems


Sensitivity Analysis


What if Analysis


Goal Seeking Analysis

Dashboards Capabilities (4)

Drill Down reports


Exception Reports


Trend analysis


Key indicators

GIS

Geographical Information System - a computer system that captures, integrates, and manipulate data while using digital maps

Reality Mining

Extracting the information from usage patterns of mobile devices

CPM

Corporate Performance Management - monitoring and managing of an organization performance based on KPI (Key Performance indictors) revenue, profits, market share

Strategies for Acquiring IT Applications (7)

Buy Option


Customize a prewritten App


Lease the applications


Software as a service


Open Source Software


Outsourcing


Custom Development



Systems Development Life Cycle (SDLC)

is a structured framework that consists of sequential processes by which information systems are developed

Types of System Acquisition Methods (7)

Traditional system development


Prototyping


Integrated Computer-Assisted Software Engineering


RAD (Rapid App Development)


End-User Development


JAD (Joint App Design)


Object- Orientated Development

3 Types of Feasibility Studies

Technical - whether the company can develop or purchase the necessary hardware or software


Economic - whether the project is an acceptable financial risk


Behavioural - the impact on humans in the development process



4 Types of Implementations

Direct Conversion - old system shut down and new one brought online


Phased Conversion - parts of new system slowly introduced into company checking if all systems run well


Parallel Conversion - both old and new run for a time together


Pilot Conversion - a part of the organization has the system tested within it

Methods of System Development (4)

JAD - Joint Application Design; collecting user requirements and creating system designs


RAD - Rapid Application Development; produces functional components of the final system, but not the final system


Agile Development - Develop parts of the system in order to maintain functionality


End- User Development - end users develop the systems without assistance from the IT department

Tools for System Development (4)

Prototyping - defines an initial list of user requirements then refines throughout process


CASE - Computer aided software engineering; a group of tools that automate the system development


Component-based development - Uses standard components to build applications; components are reusable


Object- Orientated Development - designing systems around real systems that are then modeled

Vendor and Software Selection (6)

Identifying Potiential Vendors


Determine the Evaluation Criteria


Evaluate vendors and packages


Choose the Vendor and package


Negotiate a Contract


Establish Service Level agreement

4 Approaches to Ethics

Utilitarian -needs of the many out weight the needs of the few

Rights View - an action that best protects and respects the moral rights of the affected parties


Common Good - Highlights the interlocking relationships that underlie all societies


Fairness - Treat all humans equally, if not fairly on a defensible standard



3 Ethical Tenets

Responsiblity - accepting the consequences for decisions and actions


Accountability - who is responsible


Liability - the legal concept of the right to recover damages done by others

4 Ethical Issues in IT

Privacy Issues - the right to keep personal information private


Accuracy Issues - keep data accurate and relevant


Property Issues - Who owns what?


Accessibility Issues - Who is allowed to access information?

Issues of Privacy in IT (3)

Data Collection - must be business related


Data Accuracy - should be kept current, where and when neccessary


Data Confidentially - security measures to keep data safe from unauthorized access

5 Factors that contribute to increased cybercrime

Computer networks are highly connected


Computers are getting smaller and faster


Hacking skills are decreasing in difficulty


International organized crime is taking over cyber crime


Lack of Mangement support

Human Errors vs Social Engineering

largely because of human laziness, carelessness, or a lack of awareness concerning information security


Using social skills to trick or manipulate the system

Types of Delibrate Attacks

Alienware


Cyberwarfare/ terrorism


SCADA Attacks


Identity Theft


Espionage


Information Extortion


Sabotage or vandalism


Theft of Equipment or information


Software Attacks

Risk Mitigation Strategies (3)

Risk Transference - transfer the risk to another party - purchase insurance


Risk Limitation - limiting risk by bring in controls


Risk Acceptance - accepting the risk and continue to operate and absorb any damages

Types of Controls used to protect an organization (3)

Physical - doors, walls, locks


Assess - authentication and authorization systems


Communication - securing the movement of data; firewalls, blacklisting, whitelisting,

Turing Test

Determining if a computer or human