• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/128

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

128 Cards in this Set

  • Front
  • Back
6 Important Business Objectives
1. Operational Excellence
2. New products, services, and business models
3. Customer and Supplier intimacy
4. Improved decision making
5. Competitive Advantage
6. Survival
Operation Excellence
Improved efficiency results in higher profits

Information systems and technology help improve efficiency and productivity
Business Model
How a company produces, delivers, and sells its products and services
Customer and Supplier Intimacy
Customers who are treated well become repeat customers who purchase more

Close relationships with suppliers result in lower costs
Competitive Advantage
This often results from achieving previous business objectives (Ex. Dell established online customization of their computers and they dominated the market at the time). This can be short lived because other companies will follow your lead

Advantages over Competitors : Charging less for superior products, better performance, and better response to suppliers and customers
Survival
Businesses may need to invest in information systems out of necessity; simply the cost of doing business

Keeping up with competitors

Federal and state regulations and reporting requirements
Information Technology
The hardware and software a business uses to achieve its objectives
Information System
Interrelated components that manage information to:
1. Support decision making and control
2. Help with analysis, visualization, and production creation
Data
A stream of raw facts
Information
Data that is shaped into a meaningful, useful form
6 Important Business Objectives
1. Operational Excellence
2. New products, services, and business models
3. Customer and Supplier intimacy
4. Improved decision making
5. Competitive Advantage
6. Survival
Operation Excellence
Improved efficiency results in higher profits

Information systems and technology help improve efficiency and productivity
Business Model
How a company produces, delivers, and sells its products and services
Customer and Supplier Intimacy
Customers who are treated well become repeat customers who purchase more

Close relationships with suppliers result in lower costs
Competitive Advantage
This often results from achieving previous business objectives (Ex. Dell established online customization of their computers and they dominated the market at the time). This can be short lived because other companies will follow your lead

Advantages over Competitors : Charging less for superior products, better performance, and better response to suppliers and customers
Survival
Businesses may need to invest in information systems out of necessity; simply the cost of doing business

Keeping up with competitors

Federal and state regulations and reporting requirements
Information Technology
The hardware and software a business uses to achieve its objectives
Information System
Interrelated components that manage information to:
1. Support decision making and control
2. Help with analysis, visualization, and production creation
Data
A stream of raw facts
Information
Data that is shaped into a meaningful, useful form
Activities in an information system that produce information

(4 things)
1. Input
2. Processing
3. Output
4. Feedback

There is a sharp distinction between information technology (hardware and software) vs information systems
Information Systems Literacy
Includes a behavioral and technical approach
Computer Literacy
Focuses more on knowledge of IT
Management Information Systems
Focuses on information systems literacy

Issues surrounding development, use, impact of information systems used by managers and employees
The 3 dimensions of Information Systems
1. Organizations
2. People
3. Technology
Organizations
Coordinate work through structured hierarchy and business processes
Business Processes
Related tasks and behaviors for accomplishing work

ex. Filling an order
Organizations
Culture
The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members
People
Information Systems require skilled people to build, maintain and use them

Employee attitudes affect ability to use systems productively
Role of managers
(4 things)
1. Perceive business challenges
2. Set organizational strategies
3. Allocate human and financial resources
4. Create work: New products and services
Technology: IT Infrastructure
Foundation or platform that information systems are built on
1. Computer hardware
2. Computer software
3. Data management technology
4. Networking and telecommunications technology; Internet, web, extranets, intranets, voice, and video communications
Problem Solving Approach: A 4 Step Approach
1. Problem Identification
2. Solution Design
3. Choice
4. Implementation
Problem Identification includes these 4 things
1. Agreement that a problem exists
2. Definition of a problem
3. Causes of the problem
4. What can be done given the resources of the firm
Solution Design includes these 2 things
1. Often too many solutions
2. Consider as many solutions as you can to understand the range of the solutions
Choice includes these 3 factors
1. Cost
2. Feasibility given resources and skills
3. Length of time needed to implement the solution
Implementation includes these 5 options
1. Building or purchasing a solution
2. Testing solution, employee training
3. Change measurement
4. Measurement of outcomes
5. Feedback / evaluation of the solution
Problem solving is a _______ process, not a one time single event
Continuous
Critical Thinking
Sustained suspension of judgment with an awareness of multiple perspectives and alternatives

Without critical thinking it is easy to jump to conclusions, misjudge a problem and waste resources
What are the 4 elements of Critical Thinking
1. Maintaining doubt and suspending judgment
2. Being aware of different perspectives (including technology, organizations, and peoples perspectives)
3. Testing alternative and letting experience guide
4. Being aware of organizational and personal limitations
The connection between business objectives, problems and solutions
When a firm cannot achieve business objectives, these objectives become challenges

Information systems often present solutions, partially or fully, to these challenges
How info systems will affect careers
Accounting
Accountants increasingly rely on info systems to summarize transactions, create financial records, organize data and perform financial analysis
How info systems will affect careers
Finance
Relationship between info systems and financial management and services is so strong that many advise finance majors to double major in Information Systems
How info systems will affect careers
Marketing
No field has undergone more technology driven change in the past 5 years than marketing and advertising
How info systems will affect careers
Operations management in services and manufacturing
Industrial production managers, administrative service managers, and operations analysts
How info systems will affect careers
Management
The job of management has been transformed by information systems
How info systems will affect careers
Information systems
Fast changing and dynamic profession because information technologies are among the most important tools for achieving a business's key objectives

domestic and offshore outsourcing
Security
Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft or physical damage to information systems
Controls
Methods, policies, and organizational procedures that ensure safety of an organization's assets; accuracy and reliability of its accounting records; and operational adherence to management standards
Service Set Identifiers
(SSIDs)
Identify access points
Broadcast multiple times
Can be picked up fairly easy by sniffer programs
War Driving
Eavesdroppers drive by buildings and try to intercept network traffic

When a hacker gains access to a SSID, they have access to a networks resources
WEP
Wired Equivalent Privacy
Security standard for 802.11

Basic specification uses shared password for both users and access point

Stronger encryption is now available, but users often fail to employ it
Viruses
Rouge software program that attaches itself to other software programs or data files in order to be executed
Worms
Independent computer programs that copy themselves from one computer to other computers over a network
Trojan Horses
Software program that appears to be safe but then does something else other than what is expected
Spyware
Small programs that install themselves silently on computer to monitor user web surfing activity and serve up advertising (popups)
Key Loggers
Record every keystroke made on a computer to steal serial numbers, passwords, and to launch internet attacks
Hackers activities include
System intrusion
System damage
Cybervandalism : Intentional disruption, defacement or destruction of a website or corporate information system
Spoofing
Misrepresenting oneself by using a fake email address or masquerading as someone else
Pharming
Redirecting web link to an address that is different from the intended one, with the site looking like the intended link
Sniffer
Eavesdropping program that monitors the information being passed over a network

Enables hackers to gain access and steal information such as email, company files, etc.
Denial of Service attacks

(DoS)
Flooding the server with thousands of false requests to crash the server
Distributed Denial of Service attacks
(DDos)
The use of numerous computers to launch a DoS attack

Botnets - networks of zombie PCs infiltrated by bot malware. People do not even know that their computer has Bot malware on their computer
Computer Crime

Target of Crime

Instrument of Crime
any violations of criminal law that involve a knowledge of computer technology for the perpetration, investigation or prosecution

Breaching confidential or protected computerized data

accessing a computer without authority

Theft of trade secrets

Using email for threats or harassment
Identity theft
Theft of personal information; SSNs, divers license, or credit card numbers to impersonate someone else
Phishing
sending emails that look like a professional business to try and get people to reveal their personal information
Evil Twins
Wireless networks that pretend to offer protected WiFi connections to the internet when they are actually not protected
Click Fraud
Occurs when an individual or computer program fraudulently clicks an online ad without any intention of learning more about the advertiser or making a purchase
Internal threat of employees
security threats often originate inside an organization with their employees
1. inside knowledge
2. sloppy security procedures: user lack of knowledge
3. Social engineering: tricking employees into revealing their passwords by pretending to be legitimate members of a company in need of their information
Commercial Software Vulnerability
There are hidden bugs (program code defects) and these defects can open networks to intruders
Patches
Vendors release small pieces of software to repair flaws

however, exploits in program code defects are often exploited faster than patches can be released
HIPAA Act of 1996

Health insurance portability and accountability act
Medical security and privacy rules and procedures. Only you can access your medical records
Gramm-Leach-Bliley Act of 1999
Requires that financial institutions ensure the confidentially and security of customer data
Sarbanes-Oxley Act of 2002
Imposes responsibility of companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally

(business must keep their email for so many number of years )
Ambient Data
Hidden Data
General Information Systems Controls
Govern design, security, and use of computer programs and security of data files in general throughout and organizations information technology infrastructure

Use of hardware, software, and manual procedures to create an overall control environment
Types of general control
software controls
hardware controls
computer operation controls
data security controls
implementation controls
administrative controls
Application Controls
specific controls unique to each computerized application, such as payroll or order processing

both automated and manual procedures

ensure that only authorized data is completely and accurately processed by that application
Risk Assessment
Determines the level of risk to a firm if specific activities or processes are not properly controlled
Authorization management systems
Establishes when and where a user is permitted to access certain parts or a web site or corporate database

allow each user to access only those portions of a system that a person is permitted to enter, based on information established by a set of access rules
Disaster recovery planning
devise plans for restoration of disrupted services
business continuity planning
focuses restoring business operations after a disaster

identify systems critical to business operations

management must determine which systems are restored first
Firewall
A combination of hardware and software that prevents unauthorized users from accessing private networks
Encryption
transforming text or data into cipher text that cannot be read by unintended recipients either secured sockets layer (SSL) or secure hypertext transfer protocall (s-HTTP)
Symmetric Key Encryption
sender and receiver use single, shared key
Public Key Encryption
uses 2 mathmatically related keys; public and private key

sender encrypts message with recepients public key
receipient decrypts with private key
Fault tolertant computer
computers that need continuous availability. contains redundant hardware, software and power supply to create an environment that provides uninterrupted service ex. stock market
High Avalibility computing
helps recover quickly from a crash

minimizes downtime
recovery oriented computing
systems designed to recover from a crash quickly with capabilities to pinpoint and correct the faults
controlling network traffic
DPI: deep packet inspection, restricts music and video
Security Outsourcing
managed security service providers (MSSP)
Software metrics
and objecting assessment of a system in the form of quantified measurements ex. # of transactions, online response time, payroll checks printed per hour
Walkthrough
review of specification or design document by a small group of qualified people
debugging
the process by which errors are eliminated
High Avalibility computing
helps recover quickly from a crash

minimizes downtime
recovery oriented computing
systems designed to recover from a crash quickly with capabilities to pinpoint and correct the faults
controlling network traffic
DPI: deep packet inspection, restricts music and video
Security Outsourcing
managed security service providers (MSSP)
Software metrics
and objecting assessment of a system in the form of quantified measurements ex. # of transactions, online response time, payroll checks printed per hour
Walkthrough
review of specification or design document by a small group of qualified people
debugging
the process by which errors are eliminated
High Avalibility computing
helps recover quickly from a crash

minimizes downtime
recovery oriented computing
systems designed to recover from a crash quickly with capabilities to pinpoint and correct the faults
controlling network traffic
DPI: deep packet inspection, restricts music and video
Security Outsourcing
managed security service providers (MSSP)
Software metrics
and objecting assessment of a system in the form of quantified measurements ex. # of transactions, online response time, payroll checks printed per hour
Walkthrough
review of specification or design document by a small group of qualified people
debugging
the process by which errors are eliminated
ethics
principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors
The five moral dimensions of the information age
1. information rights and obligations
2. property rights and obligations
3. accountability and control
4. system quality
5. quality of life
Profiling
combining data from multiple sources to create a file of information on the individual
nonobvious relationship awareness
combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists
Responsibility
accepting the potential costs, duties and obligations for decisions
accountability
mechanisms for identifying responsible parties
liability
permits individuals and firms to recover damages done to them
Due Process
laws are well known and uderstood and everyone is treated the same way under these laws, with an ability to appeal to a higher authority
the five steps of ethical analysis
1. identify and clearly describe the facts
2. define the conflict of dilemma and identify the higher order values involved
3. identify the stakeholders
4. identify the options that you can reasonably take
5. identify the potential consequenses of your options
COPPA Childrens online privacy protection act
requires websites to obtain parental permission before collecting information of those under the age of 13
Safe Harbor
self regulating policy and enforcement that meets objectives or government legislation but does not involve government regulation or enforcement
Cookies
tiny files downloaded to a users computer

identify users browser and tracks history

allow visitors to develop profiles on users
Web bugs
tiny graphics embedded in email messages and web pages

designed to monitor who is reading the message and web pages
Spyware
Installed unnoticed on your computer

may transmit users keystrokes or display unwanted ads
Platform for Privacy Principles P3P
allows websites to communicate privacy policies to visitors web browser

user specifies privacy levels desired in browser settings
Intellectual Property
intangible property of any kind created by individuals or corporations

protected by trade secret, copyright, patents
Trade Secret
intellectual work or product belonging to business, not in public domain

protects their ideas, not only their implementation
copyright
statutory grant protecting intellectual property from getting copied for the life of the author plus 70 years
Digital Millennium copyright act of 1998
Copyright act of the digital age, it illegal to circumvent technology based protections of copyrighted materials

libraries are against this
Patents
legal document granting the owner an exclusive monopoly on the ideas behind an invention for 20 years
the most common source of business system failure
poor input data quality