Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
101 Cards in this Set
- Front
- Back
Business Intelligence, BI |
The processing of operational and other data to create information that exposes patterns, relationships, and trends of importance to the organization |
|
BI analysis |
The process of creating business intelligence |
|
Four fundamental categories of BI analysis |
1. Reporting 2. Data Mining 3. BigData 4. Knowledge management |
|
BigData |
A term used to describe data collections that are characterized by huge VOLUME, rapid VELOCITY, and great VARIETY |
|
Cluster analysis |
An unsupervised data mining technique whereby statistical techniques are used to identify groups of entities that have similar techniques
Ex. Finding groups of similar customers in data about customer orders + demographics |
|
Confidence |
The probability estimate that two items will be purchased together |
|
Data acquisition |
In BI systems, the process of obtaining, cleaning, organizing, relating, and cataloging source data |
|
Data mart |
A data collection, smaller than a data warehouse, |
|
Data mining |
The application of statistical techniques to find |
|
Data warehouse |
A facility for managing an organization’s BI |
|
Decision support systems |
BI systems that are defined as supporting decision making only |
|
Decision tree |
A hierarchical arrangement of criteria that predict a classification or a value. |
|
Drill down |
With an OLAP report, to further divide the data |
|
Expert system |
Rule-based systems that encode human |
|
Granularity |
The level of detail in data.
Ex. Account balance--> Large granularity Order details--> Small granularity |
|
If-then Rules |
Statements that specify that if a particular con- |
|
Knowlege Management, KM |
The process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it. |
|
Metadata |
Data that describe data |
|
Online analytical processing, OLAP |
A dynamic type of reporting system that provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. |
|
Pull publising |
In business intelligence (BI) systems, the |
|
Push publishing |
The mode whereby the BI system delivers business intelligence to users without any request from the users, according to a schedule, or as a result of an event or particular data condition. |
|
Regression Analysis |
A type of supervised data mining that
Used to determine the relative influence of variables on an outcome and also to predict future values of that outcome. |
|
Rich Site Summary, RSS |
Uses a family of standard web feed formats to publish frequently updated information |
|
RSS feed |
Enable publishers to syndicate data automatically |
|
RSS reader |
Presents RSS feed data to users |
|
Three primary activities in BI processing |
Acquire Data Perform Analysis Publish Results |
|
Possible problems with source data |
Curse of dimensionality (too much data)
Wrong granularity
Data not integrated
Dirty, inconsistent data
|
|
Data warehouse v. Data mart |
Data mart is a subset of a data warehouse
Data marts address a particular component or functional area of the business |
|
Basic reporting operations of BI systems |
Sorting Filtering Grouping Calculating Formatting |
|
Supervised v. Unsupervised data mining |
Supervised- uses a priori model to compute outcome of model; regression analysis
Unsupervised- does not start with a priori hypothesis or model; clutter analysis |
|
BI publishing alternatives |
Web server SharePoint BI server |
|
Activity |
A business function that receives inputs and pro- |
|
Business process management, BPM |
A cyclical process |
|
Brook's Law |
Adding more people to a late project makes the project later. A larger staff requires increased coordination The costs of training new people can overwhelm the benefit of their contributions. |
|
Business analyst |
(1) A person who understands business strat- |
|
Business process |
A network of activities that generate value by transforming inputs into outputs. |
|
Cost feasibility |
An assessment of the cost of an information
Development + operational costs vs. value delivered. |
|
Critical path |
The sequence of activities that determine the |
|
Data flow |
A BPMN symbol that documents the movement |
|
Deliverables |
Tasks that are measurable or observable steps |
|
Gantt chart |
A chart that shows tasks, dates, dependencies, |
|
Maintenance |
(1) to fix the system to do what it was supposed to do in the first place |
|
Organizational feasibility |
Whether an information system fits within an organization’s customer, culture, and legal |
|
Resources |
People or information system applications that |
|
Roles |
Collections of activities. |
|
Schedule feasibility |
Whether an information system will be |
|
Systems development life cycle, SDLC |
The classical process used to develop information systems. |
|
Swim-lane layout |
A process diagram layout similar to swim |
|
System conversion |
The process of converting business activity from the old system to the new. |
|
Systems analysts |
IS professionals who understand both busi- |
|
Technical feasibility |
Whether existing information technology will be able to meet the needs of a new information |
|
Test plan |
Groups of action and usage sequences for validating the capability of new using software. |
|
Work breakdown structure, WBS |
A hierarchy of the tasks required to complete a project |
|
Phases of system development |
1. Define system 2. Determine requirements 3. Design systems components 4. Implement system 5. Maintain system
|
|
Stages of BPM |
Create Components Systems Development Process Implement Processes Assess Results Model Processes |
|
Business process modeling notation |
|
|
When to buy and install existing software package |
When budget is low and need is immediate |
|
Functional specifications for a system |
What the system must DO |
|
Implementation |
Parallel cutover-more costly, less risky Direct cutover |
|
Chief Information Officer |
The title of the principal manager of the IS department. |
|
Chief Technology Officer, CTO |
The head of the technology |
|
Green computing |
Environmentally conscious computing consisting of three major components: power management, virtualization, and e-waste management. |
|
Outsourcing |
The process of hiring another organization to |
|
Steering committee |
A group of senior managers from a company’s major business functions that works with the |
|
Functions + Organizations of IS dept |
Plan use of IS to accomplish org. goals
Manage outsourcing relationships
Protect information assets
Develop, operate, and maintain the org computing structure
Develop, operate, and maintain applications |
|
Importance of strategic alignment |
Pertains to IT planning
Difficult? |
|
Advantages v. Disadvantages of Outsourcing |
ADV: Management advantages, cost reduction, risk reduction
|
|
Adware |
Programs installed on the user’s computer without the user’s knowledge or permission that reside in the background and observe the user’s actions and keystrokes, modify computer activity, and report the user’s activities to sponsoring organizations. |
|
Authentication |
The process whereby an information system |
|
Biometric authentication |
The use of personal physical characteristics, such as fingerprints, facial features, and retinal scans, to authenticate users. |
|
Cookies |
A small file that is stored on the user’s computer by a browser. |
|
Denial of service, DOS |
Security problem in which users are not able to access an information system; |
|
Encryption |
The process of transforming clear text into |
|
Hacking |
A form of computer crime in which a person gains unauthorized access to a computer system. |
|
Health Insurance Portability and Accountability Act, HIPAA |
The privacy provisions of this 1996 act give in- |
|
Honey pot |
False targets for computer criminals to attack. |
|
Hot site |
A duplicate of the original site of the organization, with full computer systems as well as near-complete backups of user data. |
|
https |
An indication that a Web browser is using the SSL/TLS protocol to provide secure communication. |
|
Intrusion detection system, IDS |
A computer program that senses when another computer is attempting to scan the disk or otherwise access a computer. |
|
Malware |
Viruses, worms, Trojan horses, spyware, and |
|
Payload |
The program codes of a virus that causes unwanted or hurtful actions, such as deleting programs or data, or even worse, modifying data in ways that are undetected by |
|
Phishing |
A technique for obtaining unauthorized data that |
|
Pretexting |
Deceiving someone over the Internet by pretend- |
|
Safeguard |
Any action, device, procedure, technique, or |
|
Sniffing |
A technique for intercepting computer communi- |
|
Spoofing |
When someone pretends to be someone else with the intent of obtaining unauthorized data |
|
Spyware |
Programs installed on the user’s computer without the user’s knowledge or permission that reside in the background and observe the user’s actions and keystrokes, modify computer activity, and report the user’s activities to sponsoring organizations. |
|
Trojan horse |
Viruses that masquerade as useful programs |
|
Virus |
A computer program that replicates itself. |
|
Worm |
A virus that propagates itself using the Internet or some other computer network. |
|
Goal of Information Security |
Find an appropriate trade-off between the risk of loss and the cost of implementing safeguards |
|
Threat |
A person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner’s permission and often without the owner’s knowledge. |
|
Vulnerability |
An opportunity for threats to gain access to |
|
Target |
The asset that is desired by a security threat. |
|
CCleaner |
A utility program used to clean potentially unwanted files (including temporary internet files, where malicious programs and code tend to reside) and invalid Windows Registry entries from a computer. |
|
Information assurance |
The set of measures intended to protect and defend information and information systems |
|
Access control methods |
1. Know-->username+password 2. Have-->token+IDcard+badge 3. Are-->Retinalpattern+fingerprint |
|
Non-repudiation |
A user cannot deny his or her actions |
|
Integrated Defense Strategies |
People, technology, and operations |
|
Confidentiality |
Only authorized recipients of data will be allowed access to private data |
|
Four dimensions of feasibility |
Cost Schedule Technical Organizational |