• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/105

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

105 Cards in this Set

  • Front
  • Back
Data is _________ _________ without further meaning.
raw facts
Information is data that an Information System (IS) has ________________ into meaningful information.
transformed

Good Information Characteristics


Always Take Real Sufficient Reliable Coats

Accurate (free from errors),


Timely (available when needed),


Relevant (appropriate),


Sufficient (the right amount),


Reliable


Cost-Effective (cost doesn't outweigh benefits).



Two types of Information decisions

Structured - follows a formula


Unstructured - several answers might work

Managerial Information Systems


E M O

Executive - highly summarized


Managerial - tactical decision making based upon Exec.


Operational - Structured, detailed

Five Component Parts in Information System

(Howard, Saw, Dana, Poke, Peter)

Hardware,


Software,


Data,


Procedures,


People

Information Granularity

Coarse - Highly Summarized, usually a report.


Fine - Highly detailed useful for low level managers

3 User roles in Information Systems


C S E


Computer User - Basic, can operate the system


Super User-Understands the IS and how it works


Expert User - Can operate, train and convert old to new

A network of activities, repositories, roles, resources and flows (series of steps) that interact to accomplish a business function.


Business Process

A process whereby a network of IS takes inventory, reduces stock, tracks buying trends and identifies times to reorder. (Walmart)


Fully Automated Process

A process whereby staff counts inventory, inputs inventory in spreadsheet or data collection tool and executes a purchase electronically. (small grocery)


Partially Automated Process

A process where items are manually weighed, sold, and verbally providing the customer the price. (Farmers Market)


Fully Manual Process

Business Process Engineering Phases


Cathy Called In Albert


Create As-Is model


Create Components


Implement the processes


Assess the results

a graphic representation, using ______ ________notation, of how data flow and how activities are related in an organization.


Process Modeling

Process Modeling Symbol - Rectangle


Activity

Process Modeling Symbol - Diamond


Decision/Gateway

Process Modeling Symbol - Page


Data

Process Modeling Symbol - Dashed Line


Data Flows

Process Modeling Symbol - Solid Line
Control Flows

Components of the Business Process


(After Running Fall Down)

Activities,


Resources,


Facilities,


Data Flows

What are Facilities?


storage areas (warehouses or Databases)

the alignment of an organization's planning, decisions, and actions to enable it to reach its goals, mission, objectives


Organizational Strategy

Reasons why organizations create information systems


obtain


solve

1. obtain its goals, objectives or mission.


2. solve a major problem or meet a challenge


Michael Porter's Five Forces Model - Reasons (3)


understand


determine


how to conduct


1. better understand the industry


2. determine how attractive the prospect of starting a business in a given industry.


3. how to conduct a successful business in a given industry

Porter's Five Forces

Randy Takes Camille Shopping Today

Rivalry


Threat of Substitution


Customer Bargaining Power


Supplier's Power


Threat of New Entrant

Porter's Generic Strategies Model Reasoning (2)


Leverage


Identify

1. Businesses leverage their strengths to select the strategy for best success


2. identify the best way to operate


Porter's Generic Strategies


B B Nay Nay


Broad Cost Leadership - Across a industry


Broad Differentiation - Unique


Narrow Cost Leadership


Narrow Differentiation

reduced overall production/distribution cost, and appeal to cost-conscious customers. Lower prices (maintaining value (cost/quality)


Broad Cost Leadership Strategy

products stand out, customers willing to pay premium price. Focus on satisfying under-served needs.


Broad Differentiation Strategy

focus on cost behavior on a smaller segment (southwest - only in certain markets and one type of aircraft)

Narrow Cost Leadership Strategy

focus on one market segment (Ferrari targets high performance car enthusiasts)

Narrow Differentiation Strategy


network of value creating activities with primary activities that create value and secondary activities that indirectly contribute to value creation

Value Chain

Value Chain - Primary Activities


I O O M S


Inbound Logistics


Operations


Outbound Logistics


Marketing and Sales


Service


Value Chain - Secondary Activities


P H T I


Procurement,


Human Resources,


Technological Development


Infrastructure

Value Chain Analysis Advantages


Identify


enhancing


modifying


identifying

Identify inefficiencies


enhancing activities


modifying activities


identifying weak information systems

Approaching an IS using Porter's models


1. Five Forces - understanding of the ________ the company _______ in the industry


2. generic strategies - organization _________ the best way to ____________.


3. Value Chain - enables the org to ______ _______ processes to look for _____________.


1. Five Forces - understanding of the forces the company faces in the industry


2. generic strategies - organization develops the best way to compete.


3. Value Chain - enables the org to break down processes to look for opportunities.



Tasks to Determine Requirements - System Development


C I E A


1. Cooperate


2. Identify Expectations


3. Examine Previous Work


4. Ask Questions

The _____ a project the harder it is to change
Larger

Budgeting Factors - Tools to Determine System Cost


C C E


Cost Benefit Analysis


Cost Projection


Examining Past Projects and their Costs

Outsourcing Advantages (3)


Management


Cost


Risk

1. Management Advantage
2. Cost Reduction (initially)
3. Risk Reduction (initially)

Outsourcing Disadvantages (3)


Loss


Benefits


No

1. Loss of Control


2. Benefits eventually outweighed by overall cost


3. No Easy Exit

a rigid, phased approach to system development. Usually offers a high chance for success.

System Development Life Cycle (SDLC)

System Development Life Cycle (SDLC) Strengths


(6)


Able


detailed


good


great


Easy


staff

1. Able to monitor and maintain control over large projects


2. detailed phases


3. Good documentation


4.Great input into requirements


5. Easy System Maintenance


6. Staff changes do not impact development

System Development Life Cycle (SDLC) Weaknesses (6)


Longer


Higher


needs


Rigid


difficulty


limited

1. Longer Development time


2. Higher Cost


3. needs well-defined systems at the beginning


4. Rigid Process


5. difficulty estimating scheduling and budgeting


6. Limited user input

System Development Life Cycle (SDLC) Phases


(People Always Delight In Meals)


Planning


Analysis


Design


Implementing


Maintenance

System Development Life Cycle (SDLC) Phase 1


Planning (3)


define


conduct


form


Planning


- define the scope


- conduct feasibility studies


- form a project team

System Development Life Cycle (SDLC) Phase 2


Analysis (5)


Identify


Identify


Identify


Identify


create

Analysis


- identify system requirements


- identify system object requirements


- identify system security requirements


- identify personnel procedures


- create a data model

System Development Life Cycle (SDLC) Phase 3


Design (5)


H


S


D


Create


Create

Design


- HW


- SW


- DB


- Create job descriptions


- Create system procedures

System Development Life Cycle (SDLC) Phase 4


Implementation (4+)


Build


Test++


Convert+++


Training

Implementation


- Build the system


- test the system


- - - Unit Test


- - - User Test


- Conversion


- - - Parallel


- - - Pilot


- - - Plunge


- Training

System Development Life Cycle (SDLC) Phase 5


Maintenance (3)


Resolve


Addressing


Issuing

Maintenance


- Resolve request for revisions


- Addressing reported problems


- Issuing Patches

building a preliminary model of a proposed finished system / temporary systems that don't include all functionality
Prototyping

Prototyping advantages (4)


Development


Systems


User


Users

1. Development time / cost is reduced


2. Systems likely to fulfill user requirements


3. User involvement provide valuable feedback


4. Users adapt easily to finished system

Prototyping Disadvantages (4)


Users


Documentation


Expectations


prototyping

1. Users use prototypes as final systems


2. Documentation is incomplete


3. expectations are high and lead to disappointment of final system


4. prototyping can not accommodate large amounts of users

Prototyping Steps


I D T R


1. Identify


2. Develop


3. Test


4. Refine


Prototyping is an __________ approach


iterative


Object Orientated Development (OOD) is an_____________ System


unstructured

ability to appear in different forms (object appearing as a sub object)


Polymorphism

act of storing data and procedures together in an object


Encapsulation


allows an object to inherit properties from objects in different classes

Inheritance

collections of similar objects that can contain subclasses
Classes

entities that can interact with one another


Objects

Object Orientated Development (OOD) Advantages (4)


Code


Objects


Objects


Security



1. Code is modified easily using other objects


2. objects are reusable


3. objects are modular


4. Security is easy to set in program code


Object Orientated Development (OOD) Disadvantages (6)


Code


OOD


Takes


Fewer


Not


Extensive




1. Code is difficult to read and understand


2. OOD is ineffective at representing non-objects


3. it takes longer to execute routines


4. fewer functions


5. not user friendly


6. extensive evaluation and monitoring


a methodology that enables a rapid development process for systems while maintaining an acceptable level of quality.

Rapid Application Development (RAD)

Rapid Application Development (RAD) Qualities


(5)


Accomplished


prototyping


reuses


uses


80/20

- Accomplished in small groups


- prototyping and iterative testing


- reuses software components


- uses visual programming


- 80/20

Rapid Application Development (RAD) develops software by ________ and ________ existing software components into a new system


assembling,


integrating (Component based Development)


Rapid Application Development (RAD) Life Cycle


(4)


R U C I

1. Requirements Planning


2. User Design


3. Construction


4. Implementation

Rapid Application Development (RAD) Disadvantages (6)


less


more


quality


needs


less


prone

1. less scalable, may not contain all the features


2. more costly


3. quality problems


4. needs not adequately met


5. less efficient


6. Prone to Problems

Agile Systems Methodology Advantages (6)


breaks


iterations


Small


Face


Working


More adaptive



1. breaks tasks into small increments with minimal planning -no long term planning


2. Iterations are short time frames (1-to 4 weeks)- - Each iteration involve planning, requirements analysis, design, coding, unit testing, and acceptance testing.


3. Small cross functional teams


4. Face to Face communications / Stand-Up Meetings


5. Working software is the primary measure of progress.


6. More adaptive to project changes than predictive.

Agile Systems Methodology is based on _______ and ________ development.

iterative and incremental development.

Extreme Programming (XP) is a _________-_______, ________ process


customer-driven, agile process

Extreme Programming (XP) responds well to changes because of ____________ that enable _____________ _____________ and ____________.


of checkpoints that enable customer feedback and review

Extreme Programming (XP) 12 core practices A


Customer


XP team


XP use


1. Customer Defines application with User Stories


2. XP team puts small code into production


3. XP use common system names and descriptions



Extreme Programming (XP) 12 core practices B


simply


writes


frequent

4. simply written, object orientated code meets requirements


5. writes automated unit tests upfront uses through out the process.


6. frequent revise and edit of unit code (Refactoring)

Extreme Programming (XP) 12 core practices C


Pair


Collective


Integrate

7. Pair Programming


8. Collective Ownership of code


9. integrate code and save to repository every couple hours

Extreme Programming (XP) 12 core practices D


programmers


Customer Rep


Common


10. programmers work full time


11. Customer Rep onsite through out development


12. common coding structure

Extreme Programming (XP) Phases


Please, Don't, Chew, The, Line

1. Planning


2. Designing


3. Coding


4. Testing


5. Listening



XP Advantages (9)


A focus


A quality


Simple


Continuous


Robustness


Resilience


Reduced


High


The ability

1. A focus on Programming code for quick delivery of features


2. A quality methodology for smaller systems, resulting in low cost compared with other methodologies


3. Simple design, because each feature is coded, tested, and implemented independent of other functionalities


4. Continuous testing for ensuring quality feature development


5. Robustness, because each feature is listed along with a cost estimate for organizations to rank feature development


6. Resilience, because changes can be made late in the system's development life cycle, incorporated into development, and used without going back to an earlier phase as in other methodologies


7. Reduced risk in Programming and coding because two programmers work on each feature: one writing code and one testing it


8. High employee satisfaction because of users' intense involvement during the entire development process


9. The ability to add features at any time during the development process without negatively affecting development

XP Disadvantages (7)


Scant


potential


Unstable


Limited


Methodology


Does not work


Constant

1. Scant documentation because of the lack of design-centered approach usually followed in larger systems development projects


2. The potential for user conflicts to bog down the development when agreements are hard to reach


3. Unstable requirements because of the lack of a formal requirements analysis before design and Programming are done


4. Limited overall design specifications because features are designed as needed.


5. Methodology geared toward single projects; not good for large projects


6. Does not work well when scalability issues exist because they cannot be integrated with other programs later


7. Constant contact with the customer is assumed, which can be difficult to ensure if users are ambivalent or do not want to be a part of the development team

A type of audit that ensures an org system and applications are appropriate and controlled to maintain security and reliability

Systems-Type Audit

A type of audit that includes a risk analysis of new and existing projects to determine how organizations compare

Process-Type Audit

Successful management of IS....(4)


keeps


integrating


strategic


data

1. keeps systems from being obsolete


2. integrating systems to avoid duplication


3. strategic approach


4. data integrity without duplication, inconsistencies and errors

highest ranking exec, responsible for all IS within the org.

Chief Information Officer (CIO)

IS Departments


TODOD

Technology,


Operations,


Development


Outsourcing Relations,


Data Admin

Ethics are _________ guidelines in ________________.

moral guidelines in organizations.

2 questions in ethics


1. was harm done to anyone


2. did someone gain an undeserved advantage from the behavior.

Approaches to Managing Ethics (4)


IGWT

1. Informal Approach - address as occurs


2. General Written Procedures


3. Written Code of Ethics


4. Top down Ethics Approach


Important Steps in Promoting Ethics (5)


Inform


Incorporate


Train


avoid


Formal

1. Inform employees about policies and procedures


2. incorporate ethics in all areas of the organization


3. train employees how to recognize unethical behavior


4. help avoid circumstances


5. Hold Formal Training

Types of threats to Information System (2)


1. Unintentional


2. intentional

Types of Threats a (5)

1. Natural


2. Human


3. Environmental


4. Physical


5. Technical

Aspects to consider in a security plan (4)


HSDP

1. Hardware Security


2. Software Security


3. Data Security


4. People Security

Physical Safeguards (3)


ICS

1. ID Badges


2. Cubical Design


3. Shredder

Acts of Congress that require Data backups (3)


SHG

1. Sarbanes-Oxley Act


2. HIPPA


3. Gramm-Leach-Bliley Act (GLBA)

Types of Media for Backups (4)


OSMC

1. Optical


2. Semiconductor


3. Magnetic


4. Cloud

Organizations spend ____% of their IT budget on disaster recovery


2-4%

Disaster Recovery Plans (DRP) Objectives (7)


1. decrease risk of disaster


2. decrease probability of disaster


3. decrease insurance premiums


4. protect assets


5. reduce dependencies on human decision making


6. organization stability


7. improve employee safety

Disaster Recovery Plans (DRP) Steps (4+)


1. Select DRP Team - entire organization


2. conduct a risk analysis


3. identify recovery options


4. Create a DRP strategy


- - - key contacts


- - - HW / SW considerations


- - - Data Files


- - - Communications and Infrastructure


- - - Org Facilities


- - - Hot / Cold Sites

Types of protected data (2)


1. Business Financial Data


2. Personally Identifiable Information (Customer Data)

Data Safeguards should ensure (3)


CIA

1. Confidentiality


2. Integrity


3. Availability

If you are aware / witness a security compromise or breach (6)


Protect


Identify


Limit


Alert


Resolution


Enable

1. protect company and customer


2. identify offender


3. limit damage


4. alert customers


5. help in the resolution of security incidents.


6. enable policies and procedures to be effective.

Problem Management Benefits (4)


Reduce


Quality


Increased


Proactive

1. Reduce number of errors/incidents


2. Quality of Service Improves


3. Increased Organizational Knowledge


4. Proactive problem management

work done to resolve issues before they are reported
Proactive

customer initiates problem solving, contacting customer support


Reactive

Problem Management Steps (5)


Record


Classify


Check


Track


Provide

1. Record


2. Classify / Categorize


3. Check the incident against known issues.


4. Track Progress


5. Provide closure

Change Management Stages (5)


Acceptance


Classification


Approval


Building


Post


1. Acceptance and Filtering


2. Classification


3. Approval


4. Building, Testing and Implementing


5. Post Implementation Review