• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/61

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

61 Cards in this Set

  • Front
  • Back
Artificial Intelligence
The science of enabling information technologies to simulate human intelligence as well as gain sensing capabilities
Big Data
Extremely large and complex datasets, typically characterized as being of high volume, variety, velocity
Business Analytics
Applications that augment business intelligence by using predictive analysis to help identify trends or predict business outcomes.
Business Rules
Policies by which a business runs
Competitive Intelligence
Information about competitors, used to enhance a business's strategic position
Data Mining
Methods used by companies to discover "hidden" predictive relationships in data to better understand their customers, products, markets or any other phase of their business for which data have been captured.
Decision Support System
A special purpose information system designed to support organizational decision making.
Drill Down
To analyze data at more detailed levels of a specific dimension.
Expert System
A special purpose information system designed to mimic human expertise by manipulating knowledge--understanding acquired through experience and extensive learning, rather than simply information.
Informational System
A system designed to support decision making based on stable point-in-time or historical data.
Knowledge Management
The processes an organization uses to gain the greatest value from its knowledge assets.
Structured Data
Data, such as transaction data, which fit neatly into spreadsheets or databases.
Can business intelligence help respond to external threats?
External threats: globalization, competitive pressures, consumer demands, societal changes. BI provides right info at right time by enabling decision makers to extract and analyze data provided by systems.
Business Intelligence
The use of information systems to gather and analyze information from both external and internal sources to make better decisions, and the data derived from these processes.
ERP (Enterprise Resource Planning)
An information system that integrates business activities across departmental boundaries including planning, manufacturing, sales, marketing and so on.
Core Activities
The activities within a value chain that processes input and produce outputs, including inbound logistics, operations and manufacturing, outbound logistics, marketing and sales, and customer service.
Enterprise System
An information system that spans the entire organization and can be used to integrate business processes, activities and information across all functional areas of a firm.
Legacy System
Older stand-alone computer systems within an organization with older versions of applications that are either fast approaching or beyond the end of their useful life within the organization.
Standalone Application
A system that focuses on the specific needs of an individual department and its not designed to communicate with other systems in the organization.
Vanilla Version
The features and modules that a packaged software system comes with out of the box.
Customization
Modifying software so that is better suits user needs.
What are the core business processes?
Marketing and sales, supply chain management, manufacturing and operations, accounting and finance and human resources.
Compare and Contrast customized and vanilla software.
Vanilla: less expensive, easy to install, larger support system. Customized: Focused, competitive advantage.
Customer Relationship management (CRM)
A corporate level strategy designed to create and maintain lasting relationships with customers by concentrating on the downstream information flows through the introduction of reliable systems, processes, and procedures.
Customer Service and Support
A part of operational CRM that automates service and information requests, complaints and product returns.
Just-in-time
A method to optimize ordering quantities so that parts or raw materials arrive just when they are needed for production.
Operational CRM
Systems for automating the fundamental business processes, marketing, sales and support, for interacting with the customer.
Portal
An access point (or front door) through which a business partner accesses secured, proprietary information from an organization (typically using extranets).
Sales force Automation
CRM systems to support the day-to-day sales activities of an organization.
Social CRM
The use of social media for customer relationship management.
Supply Chain
The collection of companies and processes involved in moving a product from the suppliers of raw materials, to the supplies or intermediate components, to final production, and ultimately to the customer.
Vendor-Managed Inventory (VMI)
A business model in which the suppliers to a manufacture (or retailer) manage the manufacturer's or (retailer's) inventory levels based on pre-established service levels.
Break even Analysis
A type of cost-benefit analysis to identify at what point tangible benefits equal tangible costs.
Cost Benefit Analysis
Techniques that contrast the total expected tangible costs versus the tangible benefits for an investment.
Developmental Testing
Testing performed by programmers to ensure that each module of a new program is error free.
Information Systems Planning
A formal proces for identifying and assessing all possible information systems development projects of an organization.
Making the Business Case
The process of identifying, quantifying, and presenting the value provided by an information system.
Productivity Paradox
The observation that productivity increases at a rate that is lower than expected when new technology are introduced.
System Effectiveness
The extent to which a system enables people and/or a firm accomplish goals or tasks well.
System Efficiency
The extent to which a system enables people and/or a firm to do things fast, at lower cost, or with relatively little time and effort.
Systems Implementation
The fourth phase of the systems development life system in which the information system is programmed, tested, installed and supported.
Advantages/Disadvantage of shelf software vs. creating software
Customized: Tailored to meet organizations requirements. Company only pays for features specifically required for users.
Shelf Software: less costly, faster to procure, less risky, support.
Why is outsourcing more popular?
Higher quality at lower prices, lower labor costs, financial factors: greater value, simplifying: not core competency, better management of hardware.
Faith Arguments
Based on beliefs about organizational strategy, competitive advantage, customer perceptions, market share
Fear Arguments
Based on the notion that if the system is not implemented, the firm will lose out to the competition or worse, go out of business.
Fact Arguments
Based on data, quantitative analysis, or indisputable factors
Authentication
The process of confirming the identify of a user who is attempting to access a restricted system or web site.
Back Up
A copy or critical data on a separate storage medium.
Biometrics
Body Characteristics such as fingerprints, retinal patterns in the eye, or facial characteristics that allow the unique identification of a person.
Computer Crime
The use of a computer to commit an illegal act.
Cyber bullying
The use of a computer to intentionally cause emotional distress to a person.
Cyber Harassment
The use of a computer to communicate obscene, vulgar, or threatening content that causes a reasonable person to endure distress.
Cyber Stalking
The use of computer to repeatedly engage in threatening or harassing behavior.
Hacker
An individual who gain unauthorized access to computer systems.
Identify Theft
Stealing another person's social security number, credit car number, and other personal information for the purpose of using the victims's credit rating to borrow money, buy merchandise, or run up debts that are never repaid.
Phishing
Attempts to trick financial account and credit car holders into giving away their authorization information, usually by sending spam messages to literally millions of e-mail accounts
Risk Acceptance
A computer system security policy in which no countermeasures are adopted and any damages that occur are simply absorbed.
Risk Analysis
The process in which the value of the assets being protected are assessed, the likelihood of their being compromised is determined, and the costs of their being compromised are compared with the costs of the protections to be taken.
Risk Reduction
The process of taking active countermeasures to protect information systems.
Define Computer Crime. What are three examples?
Using a computer to commit an illegal act. 1. Someone gains authorized entry to a computer system to cause damage. 2. Steal credit card numbers from websites. 3. Drug dealers and other professional criminals may use computers to store records of their illegal transactions.
List & Describe threats to IS security.
1. Employees keep passwords or access codes in plain sight. 2. Organizations fail to limit access to company files and systems recourses. 3. Never bothered to install antivirus software.