• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/109

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

109 Cards in this Set

  • Front
  • Back

CHAPTER 11

CHAPTER 11

What are expert systems?

capture the knowledge of skilled employees in the form of a set of rules in a software system that can be used by others in the organization

Four different types of expert systems

• Knowledge Base

• Inference Engine


• Forward Chaining


• Backward Chaining

Four different types of case-based reasoning

•Fuzzy Logic Systems

•Machine Learning


•Neural Networks


•Genetic Algorithms

Case-based reasoning represents knowledge as...

a database of past cases and other solutions

Types of decisions? (3)

Unstructured: non-routine requiring judgement and insights


Structured: routine decisions with definite procedures


Semi-structured: Only part of the decision has clear-cut answers

Decision-making process (4)

1. Intelligence


2. Design


3. Choice


4. Implementation



Managerial Roles (2 Models)

Classical and behavioral

Categories of Managerial Roles (3)

Interpersonal Roles


Informational


Decisional

Real-world Decision Making (3)

Information quality: High-quality decisions require high-quality information

Management filters: Managers have selective attention and have variety of biases that reject information that does not conform to prior conceptions


Organizational inertia and culture: Strong forces within organizations resist making decisions calling for major change

What is High-Velocity Automated Decision Making and list an Example?

Made possible through computer algorithms precisely defining steps for a highly structured decision Ex. high speed computer trading platforms

What is business Intelligence?

Infrastructure for collecting, storing, analyzing data produced by business

6 elements in the business intelligence environment ?

1. Data from the business environment

2.Business intelligence infrastructure


3.Business analytics toolset


4.Managerial users and methods


5.Delivery platform–MIS, DSS, ESS


6.User interface

List some of the Business Intelligence and Analytic capabilities

Production Reports

Formalized Reports


Dashboards/scorecards


Ad hoc/query/search/report creation


Drill Down


Forecasts, scenarios, models

Business Intelligence Users (3)

Predictive Analytics


Data Visualization


Geographic Infomation Systems (GIS)

Management Strategies for Developing BI and BA Capabilities (2)

1. One-stop integrated solution


2. Multiple best-of-breed solution



CHAPTER 10

CHAPTER 10

Types of E-Commerce (3)

Business-to-customer (B2C): Retailing of productsand services directly to individual customers(Chapters.Indigo.ca)

Business-to-business (B2B): Sales of goods andservices to other businesses (ChemConnect)


Consumer-to-consumer (C2C): Individuals using theWeb for private sales or exchange (Kijiji)

Name some E-Commerce revenue Models...

Advertising

Sales


Subscription


Free/Freemium


Transaction Fee


Affiliate

E-Commerce Markting (2)

Long-tail Marketing


Behavioral Targeting

Most Popular Web 2.0 service....?

Social Networking

What are prediction Markets?

Peer-to-peer bettting market on specific outcomes (Ex. elections, Salesfigures)

B2B e-commerce: New Efficiencies and Relationships..... name a couple?

Electronic data interchange (EDI)•Private industrial networks (private exchanges)•Net marketplaces•Exchanges

Mobile digital Platform and mobile e-commerce... list a couple services and apllications?

Location-based Services

Banking and Financial Services


Wireless Advertising and Retailing


Games and Entertainment

building a web site in-house versus outsourcing... name three factors that would affect the decision making process?

The development decision, The hosting decision, and the budget

CHAPTER 9

CHAPTER 9

What are enterprise systems?

Suite of integrated software modules and a common central database

To implement enterprise software what should companies do? (3)

Select functions of system they wish to use

Map business processes to software processes


Use software’s configuration tables for customizing

The business value of enterprise systems (3)

A more uniform organization

More efficient operations and customer-driven business processes


Firm-wide information for improved decision making

Supply Chain management systems help with...?

linking suppliers, distribution, retail outlets, and customers

Inefficiencies cut into operating costs and can waste up to ____ of _______ ________

25% of Operating expenses

Supply chain Management software has two systems, what are they?

Planning and execution systems

What are the two different types of Demand-Drive supply chains?

Push based (based on forecasts or best guesses of demand) and


Pull based (actual customer order triggers purcahse

What are Customer Relationship Management systems (CRM)

Capture and integrate customer data, consolidate it, and analyse it distributing the results to various points

PRM and ERM stand for?

Partner relationship management (PRM) Employee relationship management (ERM)

Most CRM software has modules for (3)

Sales force Automation


Customer Service


Marketing

Opertational CRM

Customer-facing applications such as call centre and customer service support

Analytical CRM

Based on data warehouses that consolidate the data for data analysis

Business Value of CRM systems.... name a couple?

Increased customer satisfaction

Reduced direct-marketing costs


More effective marketing


Lower costs for customer acquisition/retention


Increased sales revenue


Reduced churn rate

CHAPTER 8

CHAPTER 8

In terms of system vulnerability and abuse there are two main ways to prevent them, what are they?

Security and controls

Security is?

Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems

Controls are?

Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards

Why are systems vulnerable name two things?

Accessibility of networks

Hardware problems (breakdowns, configuration errors, damage from improper use or crime)


Software problems (programming errors, installation errors, unauthorized changes)


Disasters


Use of networks/computers outside of firm’s control


Loss and theft of portable devices

Internet vulnerabilities, list 2

Network open to anyone

Size of Internet means abuses can have wide impact


Use of fixed Internet addresses with cable or DSL modems creates fixed targets for hackers


Unencrypted VoIP


E-mail, P2P, IM

What are two wireless security challenges?

Radio frequency bands easy to scan

SSIDs (service set identifiers): Broadcast the access point multiple times

Is terms of Malicious software there is?

Computer viruses - (attach to other programs, execute without user approval)


Worms - (Programs that copy form computer to computer, can destroy data and programs)


Trojan horses (A software program that appears to be benign, but then does something unexpected)


Spyware (Keylogging)

What is spoofing?

Masquerading as someone else, or redirecting a Web link to an unintended address

What is Sniffing

An eavesdropping program that monitors information travelling over a network

What are Denial of Service attacks?

Hackers flood a server with false communications in order to crash the system

Two ways that identity theft is performed?

Phishing : (Setting up fake web sites to ask for confidential data)


Pharming : redirecting users to a bogus web site)

What is social engineering? (Hint: internal threat)

Tricking employees into revealing their passwords by pretending to be legitimate members of the company

What are the repercussions of security and control in terms of a business?

Significant or total loss of business function, may cut into firms market value, and can bring forth issues of liability

What are patches?

Small pieces of software that repairs flaws

Firewalls are?

hardware/software that controls the flow of network traffic

CHAPTER 7

CHAPTER 7

What is client/server Computing?

Clients linked through network controlled by network server computer. server provides every user with an address so other users can find them

What is packet switching?

method of slicing digital messages into parcels which go along different communication paths as they become available

TCP stand for?

Transmission Control Protocol

SEO stands for?

Seach engine optimization

What is semantic search?

anticipating what the person is going to search for

Web 2.0 is blogs, wikis, social software where as web 3.0 is a ____ ___?

semantic web

CHAPTER 6

CHAPTER 6

What is a Hadoop?

Designed to handle big data. Parallel processing of hugh amount of data across inexpensive computers

OLAP stands for

Online analytical Processing

DBMS stands for?

database management systems

SQL stands for?

Structured query language

What is Data Mining?

Tools for analyzing large pools of data

CHAPTER 5

CHAPTER 5

What is Moore's Law?

Interpreted as: Every 18 months computing power doubles and the price falls in half

What is the law of mass digital storage?

-The amount of digital information is roughly doubling every year




- the cost of storage is falling at an exponential rate of 100% a year

What is Metcalfe's law?

The value of a network grows exponentially as a function of the number of network members

What is a mainframe system used for within an enterprise network/corporate websites?

Giant Servers

Who are the largest suppliers of enterprise software

SAP and Oracle

What is a SAN?

Storage area network

What does BYOD stand for in terms of the mobile digital platform?

Bring your own device

What is Grid computing?

connecting remote computers for the purpose of short term access to large computational capacity

CHAPTER 4

CHAPTER 4

What is Behavioural Targeting?

allows businesses and organizations to more precisely target a desired demographic

What are the 5 moral dimensions of the information age?

Information rights and obligations

Property rights and obligations


Accountability and control


System quality


Quality of life

What is Nonobvious relationship awareness (NORA)?

Takes information about people from disparate sources and finds obscure nonobvious relationships

What is Immanuel Kant's Categorical Imperative?

If an action is not for to then it is not right for anyone

What is Descartes' rule of change?

If an action cannot be taken repeatedly, then it is not right to be taken at any time

CHAPTER 3

Information Systems, Organizations, and Strategy

What are first movers?

Inventors of disruptive technologies

Fast Followers

Firms with the size and resources to capitalize on that technology

What is Transaction Cost Theory?

Firms seek to economize on cost of participating in market




Ex. T lowers market transaction costs for firm, making it worthwhile for firms to transact with other firms rather than grow the number of employees

What is the Agency Theory

Firm is nexus of contracts among self interested parties requiring supervision

The value web means...?

a system that can synchronize the value chains of business partners and respond to changes rapidly

A keystone firm is...?

a firm that dominates the ecosystem and creates platforms used by other firms

MIS Stands for?

Management Information Systems

MIS does what?

Servers middle management, provides answers to routine questions with predefined procedure for answering them

DSS Stands for

Decision Support Systems

DSS does what?

Servers middle management, support non-routine decision making

ESS Stands for

Executive Support Systems

ESS does what?

Supports senior management, address non-routine decisions requiring judgement, evaluation and insight.

SCM Stands for?

Supply chain management systems

SCM does what?

Manage a firms relationships with its suppliers. GOALS right amount of products to destination with least amount of time and lowest cost

KMS stands for?

Knowledge Management Systems

CRM stands for?

Customer Relationship Management Systems

CRM does what?

Integrate firm’s customer-related processes and consolidate customer information from multiple communication channels

ERP stands for?

Enterprise Resource Planning

KMS does what?

Support processes for acquiring, creating, storing, distributing, applying, integrating knowledge

What is social business?

to deepen interactions with groups inside and outside of the firm

CHAPTER 12

Managing Global Systems

What are the four main global strategies?

Domestic exporter, Multinational, Franchisers, Transnational

The Four kinds of organizations for global strategies?

Centralized (Systems development and operation occur totally at domestic home base)


Duplicated (development occurs at home base but operation are handed over to autonomous units in foreign locations)


Decentralized (Each foreign unit designs own solutions and systems)


Networked (Development and operations occur in coordinated fashion across all units)



Steps to a global system strategy? (4)

1. Define core business processes


2. Identify core systems to coordinate centrally


3. Choose an approach


4. Make benefits clear

Technology challenges of global systems? (3)

Computing platforms and systems integration


Connectivity


Software (Localization, Managing global software development)