Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
128 Cards in this Set
- Front
- Back
6 Important Business Objectives
|
1. Operational Excellence
2. New products, services, and business models 3. Customer and Supplier intimacy 4. Improved decision making 5. Competitive Advantage 6. Survival |
|
Operation Excellence
|
Improved efficiency results in higher profits
Information systems and technology help improve efficiency and productivity |
|
Business Model
|
How a company produces, delivers, and sells its products and services
|
|
Customer and Supplier Intimacy
|
Customers who are treated well become repeat customers who purchase more
Close relationships with suppliers result in lower costs |
|
Competitive Advantage
|
This often results from achieving previous business objectives (Ex. Dell established online customization of their computers and they dominated the market at the time). This can be short lived because other companies will follow your lead
Advantages over Competitors : Charging less for superior products, better performance, and better response to suppliers and customers |
|
Survival
|
Businesses may need to invest in information systems out of necessity; simply the cost of doing business
Keeping up with competitors Federal and state regulations and reporting requirements |
|
Information Technology
|
The hardware and software a business uses to achieve its objectives
|
|
Information System
|
Interrelated components that manage information to:
1. Support decision making and control 2. Help with analysis, visualization, and production creation |
|
Data
|
A stream of raw facts
|
|
Information
|
Data that is shaped into a meaningful, useful form
|
|
6 Important Business Objectives
|
1. Operational Excellence
2. New products, services, and business models 3. Customer and Supplier intimacy 4. Improved decision making 5. Competitive Advantage 6. Survival |
|
Operation Excellence
|
Improved efficiency results in higher profits
Information systems and technology help improve efficiency and productivity |
|
Business Model
|
How a company produces, delivers, and sells its products and services
|
|
Customer and Supplier Intimacy
|
Customers who are treated well become repeat customers who purchase more
Close relationships with suppliers result in lower costs |
|
Competitive Advantage
|
This often results from achieving previous business objectives (Ex. Dell established online customization of their computers and they dominated the market at the time). This can be short lived because other companies will follow your lead
Advantages over Competitors : Charging less for superior products, better performance, and better response to suppliers and customers |
|
Survival
|
Businesses may need to invest in information systems out of necessity; simply the cost of doing business
Keeping up with competitors Federal and state regulations and reporting requirements |
|
Information Technology
|
The hardware and software a business uses to achieve its objectives
|
|
Information System
|
Interrelated components that manage information to:
1. Support decision making and control 2. Help with analysis, visualization, and production creation |
|
Data
|
A stream of raw facts
|
|
Information
|
Data that is shaped into a meaningful, useful form
|
|
Activities in an information system that produce information
(4 things) |
1. Input
2. Processing 3. Output 4. Feedback There is a sharp distinction between information technology (hardware and software) vs information systems |
|
Information Systems Literacy
|
Includes a behavioral and technical approach
|
|
Computer Literacy
|
Focuses more on knowledge of IT
|
|
Management Information Systems
|
Focuses on information systems literacy
Issues surrounding development, use, impact of information systems used by managers and employees |
|
The 3 dimensions of Information Systems
|
1. Organizations
2. People 3. Technology |
|
Organizations
|
Coordinate work through structured hierarchy and business processes
|
|
Business Processes
|
Related tasks and behaviors for accomplishing work
ex. Filling an order |
|
Organizations
Culture |
The fundamental set of assumptions, values, and ways of doing things that has been accepted by most of a company's members
|
|
People
|
Information Systems require skilled people to build, maintain and use them
Employee attitudes affect ability to use systems productively |
|
Role of managers
(4 things) |
1. Perceive business challenges
2. Set organizational strategies 3. Allocate human and financial resources 4. Create work: New products and services |
|
Technology: IT Infrastructure
|
Foundation or platform that information systems are built on
1. Computer hardware 2. Computer software 3. Data management technology 4. Networking and telecommunications technology; Internet, web, extranets, intranets, voice, and video communications |
|
Problem Solving Approach: A 4 Step Approach
|
1. Problem Identification
2. Solution Design 3. Choice 4. Implementation |
|
Problem Identification includes these 4 things
|
1. Agreement that a problem exists
2. Definition of a problem 3. Causes of the problem 4. What can be done given the resources of the firm |
|
Solution Design includes these 2 things
|
1. Often too many solutions
2. Consider as many solutions as you can to understand the range of the solutions |
|
Choice includes these 3 factors
|
1. Cost
2. Feasibility given resources and skills 3. Length of time needed to implement the solution |
|
Implementation includes these 5 options
|
1. Building or purchasing a solution
2. Testing solution, employee training 3. Change measurement 4. Measurement of outcomes 5. Feedback / evaluation of the solution |
|
Problem solving is a _______ process, not a one time single event
|
Continuous
|
|
Critical Thinking
|
Sustained suspension of judgment with an awareness of multiple perspectives and alternatives
Without critical thinking it is easy to jump to conclusions, misjudge a problem and waste resources |
|
What are the 4 elements of Critical Thinking
|
1. Maintaining doubt and suspending judgment
2. Being aware of different perspectives (including technology, organizations, and peoples perspectives) 3. Testing alternative and letting experience guide 4. Being aware of organizational and personal limitations |
|
The connection between business objectives, problems and solutions
|
When a firm cannot achieve business objectives, these objectives become challenges
Information systems often present solutions, partially or fully, to these challenges |
|
How info systems will affect careers
Accounting |
Accountants increasingly rely on info systems to summarize transactions, create financial records, organize data and perform financial analysis
|
|
How info systems will affect careers
Finance |
Relationship between info systems and financial management and services is so strong that many advise finance majors to double major in Information Systems
|
|
How info systems will affect careers
Marketing |
No field has undergone more technology driven change in the past 5 years than marketing and advertising
|
|
How info systems will affect careers
Operations management in services and manufacturing |
Industrial production managers, administrative service managers, and operations analysts
|
|
How info systems will affect careers
Management |
The job of management has been transformed by information systems
|
|
How info systems will affect careers
Information systems |
Fast changing and dynamic profession because information technologies are among the most important tools for achieving a business's key objectives
domestic and offshore outsourcing |
|
Security
|
Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft or physical damage to information systems
|
|
Controls
|
Methods, policies, and organizational procedures that ensure safety of an organization's assets; accuracy and reliability of its accounting records; and operational adherence to management standards
|
|
Service Set Identifiers
(SSIDs) |
Identify access points
Broadcast multiple times Can be picked up fairly easy by sniffer programs |
|
War Driving
|
Eavesdroppers drive by buildings and try to intercept network traffic
When a hacker gains access to a SSID, they have access to a networks resources |
|
WEP
Wired Equivalent Privacy |
Security standard for 802.11
Basic specification uses shared password for both users and access point Stronger encryption is now available, but users often fail to employ it |
|
Viruses
|
Rouge software program that attaches itself to other software programs or data files in order to be executed
|
|
Worms
|
Independent computer programs that copy themselves from one computer to other computers over a network
|
|
Trojan Horses
|
Software program that appears to be safe but then does something else other than what is expected
|
|
Spyware
|
Small programs that install themselves silently on computer to monitor user web surfing activity and serve up advertising (popups)
|
|
Key Loggers
|
Record every keystroke made on a computer to steal serial numbers, passwords, and to launch internet attacks
|
|
Hackers activities include
|
System intrusion
System damage Cybervandalism : Intentional disruption, defacement or destruction of a website or corporate information system |
|
Spoofing
|
Misrepresenting oneself by using a fake email address or masquerading as someone else
|
|
Pharming
|
Redirecting web link to an address that is different from the intended one, with the site looking like the intended link
|
|
Sniffer
|
Eavesdropping program that monitors the information being passed over a network
Enables hackers to gain access and steal information such as email, company files, etc. |
|
Denial of Service attacks
(DoS) |
Flooding the server with thousands of false requests to crash the server
|
|
Distributed Denial of Service attacks
(DDos) |
The use of numerous computers to launch a DoS attack
Botnets - networks of zombie PCs infiltrated by bot malware. People do not even know that their computer has Bot malware on their computer |
|
Computer Crime
Target of Crime Instrument of Crime |
any violations of criminal law that involve a knowledge of computer technology for the perpetration, investigation or prosecution
Breaching confidential or protected computerized data accessing a computer without authority Theft of trade secrets Using email for threats or harassment |
|
Identity theft
|
Theft of personal information; SSNs, divers license, or credit card numbers to impersonate someone else
|
|
Phishing
|
sending emails that look like a professional business to try and get people to reveal their personal information
|
|
Evil Twins
|
Wireless networks that pretend to offer protected WiFi connections to the internet when they are actually not protected
|
|
Click Fraud
|
Occurs when an individual or computer program fraudulently clicks an online ad without any intention of learning more about the advertiser or making a purchase
|
|
Internal threat of employees
|
security threats often originate inside an organization with their employees
1. inside knowledge 2. sloppy security procedures: user lack of knowledge 3. Social engineering: tricking employees into revealing their passwords by pretending to be legitimate members of a company in need of their information |
|
Commercial Software Vulnerability
|
There are hidden bugs (program code defects) and these defects can open networks to intruders
|
|
Patches
|
Vendors release small pieces of software to repair flaws
however, exploits in program code defects are often exploited faster than patches can be released |
|
HIPAA Act of 1996
Health insurance portability and accountability act |
Medical security and privacy rules and procedures. Only you can access your medical records
|
|
Gramm-Leach-Bliley Act of 1999
|
Requires that financial institutions ensure the confidentially and security of customer data
|
|
Sarbanes-Oxley Act of 2002
|
Imposes responsibility of companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally
(business must keep their email for so many number of years ) |
|
Ambient Data
|
Hidden Data
|
|
General Information Systems Controls
|
Govern design, security, and use of computer programs and security of data files in general throughout and organizations information technology infrastructure
Use of hardware, software, and manual procedures to create an overall control environment |
|
Types of general control
|
software controls
hardware controls computer operation controls data security controls implementation controls administrative controls |
|
Application Controls
|
specific controls unique to each computerized application, such as payroll or order processing
both automated and manual procedures ensure that only authorized data is completely and accurately processed by that application |
|
Risk Assessment
|
Determines the level of risk to a firm if specific activities or processes are not properly controlled
|
|
Authorization management systems
|
Establishes when and where a user is permitted to access certain parts or a web site or corporate database
allow each user to access only those portions of a system that a person is permitted to enter, based on information established by a set of access rules |
|
Disaster recovery planning
|
devise plans for restoration of disrupted services
|
|
business continuity planning
|
focuses restoring business operations after a disaster
identify systems critical to business operations management must determine which systems are restored first |
|
Firewall
|
A combination of hardware and software that prevents unauthorized users from accessing private networks
|
|
Encryption
|
transforming text or data into cipher text that cannot be read by unintended recipients either secured sockets layer (SSL) or secure hypertext transfer protocall (s-HTTP)
|
|
Symmetric Key Encryption
|
sender and receiver use single, shared key
|
|
Public Key Encryption
|
uses 2 mathmatically related keys; public and private key
sender encrypts message with recepients public key receipient decrypts with private key |
|
Fault tolertant computer
|
computers that need continuous availability. contains redundant hardware, software and power supply to create an environment that provides uninterrupted service ex. stock market
|
|
High Avalibility computing
|
helps recover quickly from a crash
minimizes downtime |
|
recovery oriented computing
|
systems designed to recover from a crash quickly with capabilities to pinpoint and correct the faults
|
|
controlling network traffic
|
DPI: deep packet inspection, restricts music and video
|
|
Security Outsourcing
|
managed security service providers (MSSP)
|
|
Software metrics
|
and objecting assessment of a system in the form of quantified measurements ex. # of transactions, online response time, payroll checks printed per hour
|
|
Walkthrough
|
review of specification or design document by a small group of qualified people
|
|
debugging
|
the process by which errors are eliminated
|
|
High Avalibility computing
|
helps recover quickly from a crash
minimizes downtime |
|
recovery oriented computing
|
systems designed to recover from a crash quickly with capabilities to pinpoint and correct the faults
|
|
controlling network traffic
|
DPI: deep packet inspection, restricts music and video
|
|
Security Outsourcing
|
managed security service providers (MSSP)
|
|
Software metrics
|
and objecting assessment of a system in the form of quantified measurements ex. # of transactions, online response time, payroll checks printed per hour
|
|
Walkthrough
|
review of specification or design document by a small group of qualified people
|
|
debugging
|
the process by which errors are eliminated
|
|
High Avalibility computing
|
helps recover quickly from a crash
minimizes downtime |
|
recovery oriented computing
|
systems designed to recover from a crash quickly with capabilities to pinpoint and correct the faults
|
|
controlling network traffic
|
DPI: deep packet inspection, restricts music and video
|
|
Security Outsourcing
|
managed security service providers (MSSP)
|
|
Software metrics
|
and objecting assessment of a system in the form of quantified measurements ex. # of transactions, online response time, payroll checks printed per hour
|
|
Walkthrough
|
review of specification or design document by a small group of qualified people
|
|
debugging
|
the process by which errors are eliminated
|
|
ethics
|
principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors
|
|
The five moral dimensions of the information age
|
1. information rights and obligations
2. property rights and obligations 3. accountability and control 4. system quality 5. quality of life |
|
Profiling
|
combining data from multiple sources to create a file of information on the individual
|
|
nonobvious relationship awareness
|
combining data from multiple sources to find obscure hidden connections that might help identify criminals or terrorists
|
|
Responsibility
|
accepting the potential costs, duties and obligations for decisions
|
|
accountability
|
mechanisms for identifying responsible parties
|
|
liability
|
permits individuals and firms to recover damages done to them
|
|
Due Process
|
laws are well known and uderstood and everyone is treated the same way under these laws, with an ability to appeal to a higher authority
|
|
the five steps of ethical analysis
|
1. identify and clearly describe the facts
2. define the conflict of dilemma and identify the higher order values involved 3. identify the stakeholders 4. identify the options that you can reasonably take 5. identify the potential consequenses of your options |
|
COPPA Childrens online privacy protection act
|
requires websites to obtain parental permission before collecting information of those under the age of 13
|
|
Safe Harbor
|
self regulating policy and enforcement that meets objectives or government legislation but does not involve government regulation or enforcement
|
|
Cookies
|
tiny files downloaded to a users computer
identify users browser and tracks history allow visitors to develop profiles on users |
|
Web bugs
|
tiny graphics embedded in email messages and web pages
designed to monitor who is reading the message and web pages |
|
Spyware
|
Installed unnoticed on your computer
may transmit users keystrokes or display unwanted ads |
|
Platform for Privacy Principles P3P
|
allows websites to communicate privacy policies to visitors web browser
user specifies privacy levels desired in browser settings |
|
Intellectual Property
|
intangible property of any kind created by individuals or corporations
protected by trade secret, copyright, patents |
|
Trade Secret
|
intellectual work or product belonging to business, not in public domain
protects their ideas, not only their implementation |
|
copyright
|
statutory grant protecting intellectual property from getting copied for the life of the author plus 70 years
|
|
Digital Millennium copyright act of 1998
|
Copyright act of the digital age, it illegal to circumvent technology based protections of copyrighted materials
libraries are against this |
|
Patents
|
legal document granting the owner an exclusive monopoly on the ideas behind an invention for 20 years
|
|
the most common source of business system failure
|
poor input data quality
|