• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/48

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

48 Cards in this Set

  • Front
  • Back
5 reasons why companies implement ERS
1. integrate financial information
2. integrate customer order information
3. standardize and speed up manufacturing processes
4. reduce inventory
5. standardize HR information
activities that make up:
manufacturing
bill of materials, scheduling, capacity, workflow management, quality control, cost management, manufacturing process
activities that make up:
supply chain management
"order to cash", inventory, order entry, purchasing, demand forecasting
activities that make up:
accounting and finance
general ledger, cash management, A/P, A/R, fixed assets, costing
activities that make up:
customer relationship management (CRM)
sales force automation, lead generation, pipeline management, sales forecasting
activities that make up:
product lifestyle management (PLM)
integrates people, data, processes, and business systems; provides a product info. backbone for companies
top 3 reductions from a 'typical' ERP
1. inventories
2. build/test cycle times
3. manufacturing costs
4 reasons Hershey ERP failed (typical ERP failure points)
1. squeezed deadlines
2. wrong timing
3. big-bang approach (a lot implemented simultaneously)
4. unentered data
5 hidden costs of ERP
1. training (rarely sufficient)
2. customization
3. data conversion
4. data analysis and reporting
5. human capital costs
6 key risks and controls in ERP
1. technical complexity
2. event driven processing
3. "batch" controls and audit trails no longer available
4. integrated databases
5. security and access
6. implementation impact
SaaS (pros/cons)
Saas: software as a service
Pros: faster implementation, easier & more frequent updates, cheaper up-front costs
Cons: critical CO. data not on premises
Role of ERP vendor
provide a 'package' solution for all areas of the ERP chain enterprise processes into one database
Roles of ERP implementer (3)
work with company to:
1. re-engineer their processes
2. re-organize their company
3. implement package solution (includes integration to legacy and other apps)
4 capabilities of CRM
1. sales force automation (includes inventory control, sales processing, tracking cust. interactions
2. lead generation (search engines, email, phone, etc)
3. sales forecasting (micro & macro)
4. pipeline/sales funnel management
2 new developments/capabilities in CRM
1. 'social CRM': mining twitter, facebook, etc for customer feedback
2. 'enterprise feedback CRM': share customer feedback info across the org.
2 examples of HR components in an ERP
time & labor; compensation; reviews/performance docs
PLM
product lifestyle management: process of managing the entire life-cycle of a product from its conception, through design and manufacture, to service and disposal
eBusiness vs ECOMMERCE
enhancing brand value, comm., and service by leveraging info
improving efficiency by automating processes
reducing costs/cycle times
EBUSINESS vs eCommerce
more inclusive; says Internet/WWW are connected to existing enterprise info tech and business competencies
contextual awareness
tracking experience across platforms; ex: searches on smartphone show up next time on PC
PCI
Payment Card Industry; not federal or state; you have to be PCI compliant to do business with PCISSC credit card COs
companies that make up the Payment Card Industry Security Standards
American Express
Discover Financial Services
Japan Credit Bureau
MasterCard Worldwide
Visa International
6 control objectives of PCI
1. build and maintain a secure network
2. protect cardholder data
3. maintain a vulnerability management program
4. implement strong access control measures
5. regularly monitor and test networks
6. maintain an information security policy
EDI
electronic data exchange; secure and standard way to transmit important business info quickly; on a private network (extranet); a protocol
EDI vs eCommerce
EDI is done on a secure private network, eCommerce utilizes the internet
core purposes of HIPAA
1. grants rights to coverage (to 'covered entities')
2. fraud prevention in healthcare
HIPAA "Covered Entities"
A Health Care Providers: doctors, nursing homes, pharmacies
A Health Care Plan: health insurance companies, HMOs, company health plans, medicare/medicade
A Health Care Clearinghouse
What HITEC added to HIPAA
Health Information Technology for Economic and Clinical Health Act:
-extends complete privacy and security provisions of HIPAA to business associates of covered entities
-new breach notification rulings
-extended 'accounting of disclosure' of a patient info rules
ITIL and CMMI (abbv.)
Information Technology Infrastructure Library
Capability Maturity Model Integration
when to use CobiT & ISO vs ITIL & CMMI
CobiT/ISO: define WHAT needs to be done
ITIL/CMMI: define HOW it will be done
current owner of ITIL
Office of Government Commerce (OCG)
why auditors care about ITIL
ITIL has become the de-facto standard for IT service mgmt
The terminology is widely understood and used
version of ITIL we are currently on
3
3 key processes of Service Strategy phase
1. service portfolio management: develop the service provider's offerings and capabilities
2. demand management
3. IT financial management
service vs server
service: many components of one; ex. email;
server: router, internet, network
user only cares if service is working
service level agreement
a part of a service contract where the level of service is formally defined
ex: ISPs commonly include SLAs to define the level(s) of service being sold in plain language terms
why financial management is important
budget requests, budget allocation, cost data for service provisioning, invoice, IT budget
capacity management
process used to manage IT
primary goal: to ensure that IT capacity meets current and future business requirements in a cost-effective manner
incident management
the process of restoring operations as quickly as possible with minimal adverse impact on business operations after an incident
request fulfillment
i mean, fulfilling requests?
access management
control over who has access to the system
problem management
to resolve the root causes of incidents and thus to minimize the adverse impact of incidents and problems on business that are caused by errors within the IT infrastructure, and to prevent recurrence of incidents related to these errors
disaster recover vs business continuity
DR: primarily focuses on the recovery of IT services; often associated w/ loss of a facility
BC: touch all areas of business and focus on the business function
RTO and factors that determine it
recovery time objective
factors: costs; recovery process (gathering place, equipment, personnel)
hot site
ready to go; fully equipped
typically has real-time synchronization-ops can usually be restored in hours
warm site
equipped partially but needs to be "put together"; backups typically on-site but still need to be restored
cold site
just a shell of a site with no computers, backups, etc
3 key factors in determining a DR plan and their relationship
1. critical services definition 2. RTO 3. cost
More services to be recovered = more cost (in a particular time frame)
Longer RTO and cost goes down in same window