• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/128

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

128 Cards in this Set

  • Front
  • Back
Business Objectives of Information Systems
Use Information Systems to Achieve six major objectives: 1. Operational Excellence. 2. New products, services, and business models. 3. Customer / Supplier Intimacy. 4. Improved Decision Making. 5. Competitive Advantage. 6. Day to Day Survival
What is an information system and the mechanism for transforming data into information
IS: a set of interrelated components that collect, process, store, and distribute information to support decision making, coordinating and control in an organization. INPUT > PROCESSING > OUTPUT
Dimensions of the information system from a socio-technical systems description
IS is useless without skilled people to build and maintain them, and without those who can understand how to use the system to achieve the objectives. People are the only ones able to problem solve and convert information to solutions.
Are information systems flexible?
Yes, the infrastructure provides the foundation on which the firm can build its specific information systems. Each organization must design and manage its information technology infrastructure so that it has the set of technology services it needs for the work it wants to accomplish. Ultimately, an effective IS is created through a combination of people, organization, and technology elements.
Problem Solving Approach
1) Problem Identification: Understanding what kind of problem is being presented, identifying people, organization and technology factors. 2) Solution design: designing several alternative solutions to the problem that has been identified. 3)Evaluation and choice: selecting the best solution, taking into account its cost and the available resources and skills in the business. 4)Implementation: purchasing or building hardware and software, testing the software, providing training and document, managing change as the system is introduced, measuring outcome. Also requires critical thinking in which one suspends judgement to think of other options.
Business Process
the unique ways in which orgs coordinae and organize work activities, information, and knowledge to produce a product or service
Management Information Systems
the study of information systems focusing on their use in business and management
Computer literacy
knowledge of IT, focusing on understanding of how computer-based technologies work
Data Management Technology
the software that governs the organization of data on physical storage media
Intranet
internal networks based on inernet and www technology and standards
Information technology infrastructure
computer hardware, software, data, storage technology, and networks providing a portfolio of shared IT resources for the organizaion
Extranet
private intranets that are accessible to authorized outsiders
Network
linking of two or more computers to share data or resources, such as a printer
Information systems literacy
broad-based understanding of information systems that includes behavioral knowledge about organizations and individuals using information information systems as well as technical knowledge about computers
Information
Data that has been shaped into a form that is meaningful and useful to human beings
TPS
transaction processing systems- operational managers
• Computerized system that performs and records the daily routine transactions necessary to conduct business, such as a sales order entry, payroll, etc.
• Principal purpose is to answer routine questions and to track the flow of transactions through the organization
• Managers need TPS to monitor the status of internal operations and the firm’s relations with the external environment
• TPS are also major producers of information for the other systems and business functions
MIS
management information systems- middle management
• Provides middle managers with reports on the organization’s current performance, this information is used to monitor and control the business and predict future performance
• Summarize and report on the company’s basic operations using data from the TPS
• MIS generally provide answers to routine questions that have been specified in advance and have a predefined procedure for answering them
DSS
Decision-support systems-middle management
• Support non-routine decision making for middle management, focus on helping users make a better decision
• Focus on problems that are unique and rapidly changing, procedure for finding a solution may not be predefined
• Uses internal information from TPS and MIS, but also brings in information from external sources
• Condense large amount of data into a form which decision makers can analyze them
• Designed so that users can work with them directly, user friendly
ESS
Executive Support system- senior management
• Addresses non- routine decisions requiring judgment, evaluation, and insight because there is no agreed-on procedure for arriving at a solution
• Presents graphs and data, through a portal which uses a Web interface to present integrated personalized business content
• Designed to incorporate data about external events, but also draw summarized information from internal MIS and DSS
• Information presented on a digital dashboard- displays on a single screen graphs and charts of key performance indicators for managing a company
Different types of systems (4)
TPS, MIS, DSS, ESS
Enterprise Applications
Systems that span functional areas, focus on executing business processes across the business firm, and include all levels of management.
Why are enterprise applications helpful?
• Help businesses become more flexible and productive by coordinating their business processes more closely and integrating groups of processes so they focus on efficient management of resources and customer service
4 types of Enterprise Applications
Enterprise system (ERP Systems), Supply Chain Management Systems (SCM), Customer Relationship Manager (CRM), Knowledge Management Systems (KMS)
Enterprise System (ERP)
Integrate business processes in manufacturing and production, finance and accounting, sales and marketing, and human resources into a single software system
Supply Chain Management Systems (SCM)
Help manage relationships with their suppliers

Objective is to get the right amount of products from source to point of consumption in least amount of cost and time
Customer Relationship Manager (CRM)
coordinates the business process surround his final customer
Knowledge Management Systems (KMS)
Enables organizations to better manage processes for capturing and applying knowledge and experise, collect all knowledge and experience of firm and make available wherever and whenever it is needed, and also link firm to external sources of knowledge.
E-Business vs. E-Commerce vs. E-Government
• E-business: use of digital technology and Internet to execute the major business processes in the enterprise, both internally and with suppliers or business partners

• E-commerce: part of e-business that deals with the buying and selling of goods and services over the Internet, also encompasses activities supporting those market transactions, such as, advertising, marketing, customer support, security, delivery and payment

• E-government: refers to the application of the Internet and networking technologies to digitally enable government and public sector agencies’ relationships with citizens, businesses and other parts of the government. Makes government operations more efficient and empower its citizens by given them easier access to information and the ability to network electronically with other citizens
CIO
(chief information officer)- Senior manager in charge of the information systems function in the firm
CRM
(customer relationship management systems)- Information systems that track all the ways in which a company interacts with its customers and analyze these interactions to optimize revenue, profitability, customers satisfaction, and customer retention
Knowledge Management
The set of processes developed in an organization to create, gather, store, maintain and disseminate the firm’s knowledge
Supply Chain Management (SCM) Chain
Information systems that automate the flow of information between a firm and its suppliers in order to optimize the planning, sourcing, manufacturing, and delivery of products and services
Transaction processing system
Computerized systems that perform and record the daily routine transactions necessary to conduct businesses; they serve the organization’s operational level
Programmer
Highly trained technical specialists who write computer software instructions
End User
Representatives of departments outside the information systems group for whom applications are developed
Inter-organizational system
Information systems that automate the flow of information across organizational boundaries and link a company to its customers, distributors or suppliers
Systems analyst
Specialists who translate business problems and requirements into information requirements and systems, acting as liaison between the information systems department and the rest of the organization
Enterprise Application and types of systems
Systems that can coordinate activities, decisions, and knowledge across many different functions, levels, and business units in a firm. Include enterprise systems, (coordinate key internal processes of firm), SCM systems, CRM systems, and knowledge management systems
Porter's Model
5 forces of competition
How can information systems help companies compete with others?
They maintain low costs, differentiate products, focus on market niches, strengthen ties with customers and supplies, and increase barriers o market entry with high levels of operational excellence.
When are ISs most successful?
when the technology is aligned with the business objectives.
How has the internet changed how firms do business?
1. Because Internet technology is based on universal standards anyone can use, it makes it easy for rivals to compete on price alone and for new competitors to enter the market.

2. It raises the bargaining power of customers/suppliers because they can easily find the lowest price online.

3. It widens the geographic market, increasing competitors, and reducing differences between. But it also creates new opportunities for building brands and building large customer bases.

5. Drastically cut the costs of operating on a global scale
Management Decision Problems
organizations have to change their business processes in order to execute their business strategy successfully. Problems include: repetitive and redundant work, in quality, service, and speed.
Benchmarking
Companies achieve quality by using benchmarking to set strict standards for their products, services, and other activities, and then measuring performance against those standards.
Business Process Reengineering
Radical re-thinking and redesign of business processes. Can lead to drastic increases in productivity and efficiency; however, the change can be too far-reaching, making it hard for the employee transition.
Computer Aided Design
it automates the creation and revision of designs, using computers and sophisticated graphics software. The software allows users to create a digital model of a part, a product, or a structure, and make changes to the design on the computer without having to build physical prototypes.
Network economics
Business models based on a network helping firms strategically. In traditional economics, production experiences diminishing returns. However, the more people in a network-based business, the marginal costs are about zero while the gain is much larger.
Total Quality Management
Making quality the responsibility of all people and functions within the organization. TQM holds that the achievement of quality control is an end in itself.
Six Sigma
a specific measure of quality. Most companies use six sigma as a goal to implement a set of methodologies and techniques for improving quality and reducing costs.
Value Web
a collection of independent firms that use information technology to coordinate their value chains to produce a product or service for a market collectively. It synchronize the business processes of customers, suppliers, and trading partners among different companies in an industry or in related industries.
Workflow Management
workflow management system is a computer system that manages and defines a series of tasks within an organisation to produce a final outcome or outcomes. Workflow Management Systems allow you to define different workflows for different types of jobs or processes
Product Differentiation
Use information systems to enable new products and service or grealy change customer convenience in using your existing products and services. And also use it to create products and services that are customized and personalized to fit customer needs.
Two components of infrastructure
Computer hardware and computer software
Computer Hardware
consists of technology for computer processing, data storage, input, and output. This component includes large mainframes, servers, desktop and laptop computers, and mobile devices for accessing cooperate data and the Internet. IT includes equipment for gathering and inputting data, physical media for storing the data and devices for delivering the processed information as output.
Computer Software
System software manages the resources and activities of the computer. Application software applies the computer to a specific task for an end user, such as processing an order or generating a mailing list.
Most important issues you will face when managing hardware and software technology
capacity and scalability; determining the total cost of technology assets; determining whether to own and maintain your own hardware, software, and other infrastructure components or lease them; and managing mobile platforms and software localization.
Application Service Provider
is a business that provides computer-based services to customers over a network. Software offered using an ASP model is also sometimes called On-demand software or software as a service
Capacity planning
process of predicting when a computer hardware system becomes saturated. considers factors such as max number of users that the system can accommodate, impact of existing or future software applications.
Centralized Processing
processing is accomplished by one large central computer.
Client/Server computing
a type of distributed processing. processing clients and servers on the same network, but each machine is assigned functions it is best suited to perform.
Distributed processing
use of multiple computers linked by communications network for processing
On-demand computing
firms can purchase their computing services from remote providers and pay only for the amount of computing power they can actually use.
Outsourcing
contract with an external service provider to run their computer center and networks, to develop new software, or to manage all components of their IT infrastructures.
Open source software
providing all computer users with free access to its program code, so they can modify the code to fix errors or to make improvements
Scalability
the ability of a computer, product, or system to expand to serve a large number of users without breaking down.
Web service
refer to a set of loosely coupled software components that exchange information with each other using universal Web communication standards and languages
TCP/IP Connectivity
Universal and standard.

Developed during the early 1970’s to support U.S. Department of Defense Advanced Research Projects Agency (DARPA) efforts to help scientists transmit data among different types of computers over long distances. Uses TCP to handle movement of data between computers and IP to deliver packets during transmission. The reference model for TCP/IP reference model contains four layers: Application layer, Transport Layer, Internet Layer, and the Network Interface Layer. Data sent from one computer to the other passes downward through all four layers and reach the recipient computer. Then the data travel up the layers and are reassembled into a format the receiving computer can use. Allows two computers to communicate even if they are based on different hardware and software programs.
Types of physical transmission cables
Twisted Wire, Coaxial Cable, Fiber Opitics, Wireless
Twisted Wire Transmission
consists of strands of copper wire twisted in pairs and is an older type of transmission medium. Can be used for analog or digital communication. Can obtain speeds up to 1 Gbps.
Coaxial Cable
consists of thickly insulated copper wire, which can transmit a larger volume of data than twisted wire. Has speeds up to 1 Gbps.
Fiber Optics
Fiber-optic cable consists of bound strands of clear glass fiber, each the thickness of a human hair. Transfers data by transforming them into pulses of light, which are sent by laser devices. Provides download speeds up to 50 Mbps.
Wireless
based on radio signals of various frequencies. Microwave systems transmit high-frequency radio signals through the atmosphere and are used for high volume, long distance, point to point communication. Cellular systems use radio waves and other protocols to communicate with radio antennas placed within adjacent geographic areas called cells. System used with cell phones.
Transmission Speed
bps=bits per second. Hertz=a cycle or signal change of the medium (how bits are transmitted). One cycle equals hertz. The bandwidth is the range of frequencies that can be accommodated on a particular telecommunications channel.
Types / Uses for wireless transmission
o Cellular systems, Bluetooth, Wi-Fi, WiMax are all forms of wireless internet use or mediums of communication. Radio frequency identification systems, which allows for the tracking of the movement of goods through the supply chain, and wireless sensor networks, which are networks of interconnected wireless devices that are embedded into the physical environment to provide measurements of many points over large spaces, are also having major impacts on the shipping and security sectors, respectively.
Bandwidth
the capacity of a communications channel as measured by the difference between the highest and lowest frequencies that can be transmitted by that channel
Hertz
measure of frequency of electrical impulses per second, with 1 Hertz equivalent to 1 cycle per second
Broadband
high-speed transmission technology. Also designates a single communications medium that can transmit multiple channels of data simultaneously
Modem
a device for translating a computer’s digital signals into analog form for transmission over ordinary telephone lines, or for translating analog signals back into digital form for reception by a computer.
Domain Name
English-like name that corresponds to the unique 32-bit numeric Internet Protocol (IP) address for each computer connected to the Internet.
IP address- four-part numeric address indicating a unique computer location on the Internet
Domain Name Server (DNS)
a hierarchical system of servers maintaining a database enabling the conversion of domain names to their numeric IP addresses.
TCP/IP
dominant model for achieving connectivity among different networks. Provides a universally agreed-on method for breaking up digital messages into packets, routing them to the proper addresses, and then reassembling them into coherent messages
Groupware
a collaborative software system with capabilities that allow each participant to see and display information from others and other activities.
VoIP
voice over IP. Facilities for managing the delivery of voice information using the Internet Protocol (IP)
WiFi
Standards for Wireless Fidelity and refers to the 802.11 family of wireless networking standards
RFID
radio frequency identification. Technology using tiny rags with embedded microchips containing data about an item and its location to transmit short-distance radio signals to special RFID readers that then pass the data on to a computer for processing.
System Vulnerability
o When data are stored in electronic form, they are vulnerable to many threats. Through communications networks, information systems in different locations are interconnected, which means the potential for unauthorized access, abuse, or fraud is not limited to a single location but can occur at any access point in the network. Threats can stem from technical, organizational, and environmental factors compounded by poor management decisions. Criminal acts, software failure, natural disasters, and the increasing use of portable technologies all increase system vulnerabilities.
HIPAA
o All firms in the healthcare industry are now forced to comply with HIPAA which outlines medical security and privacy rules and procedures for simplifying the administration of healthcare billing and automating the transfer of healthcare data between healthcare providers, payers, and plans. Members must retain patient info for six years and ensure confidentiality. Also specifies privacy, security and electronic transactions standards for handling patient info.
Gramm-Leach Billey Act
Firms in financial services need to comply with the Financial Services Modernization Act of 1999, or the Gramm-Leach Billey Act. This requires financial institutions to ensure the security and confidentiality of customer data. Data must be stored on a secure medium, and special security measures must be enforced.
Public Company Accounting Reform and Investor Protection Act of 2002, aka the Sarbanes-Oxley Act
Publicly traded companies must comply with the Public Company Accounting Reform and Investor Protection Act of 2002, aka the Sarbanes-Oxley Act. This was designed to protect investors after financial scandals at various public companies. It imposes responsibility of companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally.
AUP
An acceptable use policy (AUP) defines acceptable uses of the firm’s information resources and computing equipment. Authorization policies determine differing levels of access to information assets for different levels of users. Authorization management systems establish where and when a user is permitted to access certain parts of a Web site or a corporate database.
Disaster Recovery Planning
o Planning for events that prevent information systems and the business from operating is called disaster recovery planning. This devises plans for the restoration of computing and communications services after they have been disrupted. Focus primarily on technical issues involved in keeping systems up and running.
What tools and technologies are there that protect information resources?
Access control (tokens, smart cards, biometric authentication), and firewalls, which are a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Intrusion detection systems, antivirus software, and unified threat management systems, all make connecting to the internet safe.
What secures wireless networks?
Secure Sockets Layer (SSL) and Secure Hypertext Transfer Protocol (S-HTTP) and digital certificates
Authentication
the ability of each party in a transaction to ascertain the identity of the other party
Token
physical device, similar to an identification card that is designed to prove the identity of a single user
Denial of service attacks
DoS attacks. Flooding a network server or Web server with false communications or requests for services in order to crash the network
Social Engineering
tricking people into revealing their passwords by pretending to be legitimate users or members of a company in need of information
Fault tolerant computer systems
systems that contain extra hardware, software, and power supply components that can back a system up and keep it running to prevent system failure
Spoofing
misrepresenting one’s identity on the Internet or redirecting a Web link to an address different from the intended one, with the site masquerading as the intended destination
MIS Audit
identifies all the controls that govern individual information systems and assesses their effectiveness
Trojan Horse
a software program that appears legitimate but contains a second hidden function that may cause damage.
PKI
public key infrastructure. system for creating public and private keys using a certificate authority (CA) and digital certificates for authenication.
War driving
an eavesdropping technique in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic
Supply Chain
network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers
Why are supply chain management systems helpful?
o Enables a company to model its existing supply chain, generate demand forecasts for products, and develop optimal sourcing and manufacturing plans
o They help companies make better decisions about amounts to manufacture, amount of inventory to have, and identifying how to transport goods
o Manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner
o Reduce supply chain costs and help increase sales
Customer Relationship Management
o Capture and integrate customer data from all over the organization, consolidate the data, analyze the data, and distribute the results to various systems throughout the company
o Provide a single enterprise view of a customer that is useful for improving sales and customer service. They also provide the customer with a single view of the company regardless of the touch point they use
Upstream
portion of the supply chain that includes the company’s suppliers and supplier’s suppliers and the processes for managing relationships with them
Downstream
portion of the supply chain that consists of organizations and processes for distributing and delivering products to the final customers
Just in Time Strategy
components would arrive exactly at the moment they were needed and finished goods would be shipped as they left the assembly line. Requires companies to have perfect information
Bullwhip Effect
information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain. As small change by one entity affects all the others and often becomes magnified
Push-based Model
production master schedules are based on forecasts or best guesses of demand for products and products are pushed to customers
Pull-Based Model
actual customer orders or purchases trigger events in the supply chain (more current model)
Touch Point
method of interaction with the customer (ex: phone, customer svc desk, retail store)
Churn Rate
number of customers who stop using or purchasing products from the company
Operational CRM
customer facing applications, such as tools for sales force automation, call center and customer svc support, and marketing automation
Analytical CRM
applications that analyze customer data generated by operational CRM applications to provide info for improving business processed
Ethical Issues in IT
o Information rights and obligations, property rights and obligations, system quality, quality of life, and accountability and control
o As computing power doubles and becomes more complex and the cost of data storage declines, this allows companies to keep detailed profiles of customers: violation of individual privacy?
o The rise of the internet has brought with it concerns about privacy
Non Obvious Relationship Awareness (NORA)
takes information from different and unrelated sources and compiles it to look for hidden links that indicate criminal or terrorist activity
Fair Information Practices
set of principles governing the collection and use of information about individuals
Cookies
small text files deposited on a computer hard drive when a user visits a website. When the user revisits the website that cookie will see what the user has visited since it was there last so the experience is more customized
Web Bugs
tiny graphic files embedded in email messages that are designed to monitor who reads the email and send that info to another computer
Opt In
security advocates prefer this method of consent which forces users to give consent to use personal information
P3P
Platform for Privacy Preferences: a standard for providing a Web site’s security information to consumers and comparing that policy to a user’s preferences
Intellectual Property
intangible property created by individuals or organizations
Copyright
statutory grant that protects intellectual property from being copied during the creator’s life plus 70 years after death
Profiling
use of computers to combine data from multiple sources to create a database of detailed info about a person
Policy Process
1. Make the Policy, 2. Educating the employees about the policy, 3. Monitoring employees. 4. Punishing employees if policy isn't abided by.
Computer Aided Design
Automates the creation and revision of designs, enables users to create digital models of products and tweak them as necessary.