• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/101

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

101 Cards in this Set

  • Front
  • Back

Business Intelligence, BI

The processing of operational and other data to create information that exposes patterns, relationships, and trends of importance to the organization

BI analysis

The process of creating business intelligence

Four fundamental categories of BI analysis

1. Reporting


2. Data Mining


3. BigData


4. Knowledge management

BigData

A term used to describe data collections that are characterized by huge VOLUME, rapid VELOCITY, and great VARIETY

Cluster analysis

An unsupervised data mining technique whereby statistical techniques are used to identify groups of entities that have similar techniques



Ex. Finding groups of similar customers in data about customer orders + demographics

Confidence

The probability estimate that two items will be purchased together

Data acquisition

In BI systems, the process of obtaining, cleaning, organizing, relating, and cataloging source data

Data mart

A data collection, smaller than a data warehouse,
that addresses the needs of a particular department or functional area of a business.

Data mining

The application of statistical techniques to find
patterns and relationships among data for classification and prediction.

Data warehouse

A facility for managing an organization’s BI
data.

Decision support systems

BI systems that are defined as supporting decision making only

Decision tree

A hierarchical arrangement of criteria that predict a classification or a value.

Drill down

With an OLAP report, to further divide the data
into more detail.

Expert system

Rule-based systems that encode human
knowledge in the form of if/then rules. v

Granularity

The level of detail in data.



Ex. Account balance--> Large granularity


Order details--> Small granularity

If-then Rules

Statements that specify that if a particular con-
dition exists, then a particular action should be taken.

Knowlege Management, KM

The process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it.

Metadata

Data that describe data

Online analytical processing, OLAP

A dynamic type of reporting system that provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data.

Pull publising

In business intelligence (BI) systems, the
mode whereby users must request BI results.

Push publishing

The mode whereby the BI system delivers business intelligence to users without any request from the users, according to a schedule, or as a result of an event or particular data condition.

Regression Analysis

A type of supervised data mining that
estimates the values of parameters in a linear equation.



Used to determine the relative influence of variables on an outcome and also to predict future values of that outcome.

Rich Site Summary, RSS

Uses a family of standard web feed formats to publish frequently updated information

RSS feed

Enable publishers to syndicate data automatically

RSS reader

Presents RSS feed data to users

Three primary activities in BI processing

Acquire Data


Perform Analysis


Publish Results

Possible problems with source data

Curse of dimensionality


(too much data)



Wrong granularity



Data not integrated



Dirty, inconsistent data



Missing values

Data warehouse v. Data mart

Data mart is a subset of a data warehouse



Data marts address a particular component or functional area of the business

Basic reporting operations of BI systems

Sorting


Filtering


Grouping


Calculating


Formatting

Supervised v. Unsupervised data mining

Supervised- uses a priori model to compute outcome of model; regression analysis



Unsupervised- does not start with a priori hypothesis or model; clutter analysis

BI publishing alternatives

Email


Web server


SharePoint


BI server

Activity

A business function that receives inputs and pro-
duces outputs.

Business process management, BPM

A cyclical process
for systematically creating, assessing, and altering business
processes.

Brook's Law

Adding more people to a late project makes the project later.


A larger staff requires increased coordination
The only people who can train the new employees are the existing team members, who are thus taken off productive tasks.


The costs of training new people can overwhelm the benefit of their contributions.

Business analyst

(1) A person who understands business strat-
egies, goals, and objectives and who helps businesses develop and manage business processes and information systems.
(2) Someone who is well versed in Porter’s models, organizational strategy, and systems alignment theory, like COBIT, and who also understands the proper role for technology.

Business process

A network of activities that generate value by transforming inputs into outputs.

Cost feasibility

An assessment of the cost of an information
system development project that compares estimated costs to the available budget.



Development + operational costs


vs. value delivered.

Critical path

The sequence of activities that determine the
earliest date by which the project can be completed.

Data flow

A BPMN symbol that documents the movement
of data among activities and repositories in a business process.

Deliverables

Tasks that are measurable or observable steps
in a development project.

Gantt chart

A chart that shows tasks, dates, dependencies,
and possibly resources.

Maintenance

(1) to fix the system to do what it was supposed to do in the first place
or (2) to adapt the system to a change in requirements.

Organizational feasibility

Whether an information system fits within an organization’s customer, culture, and legal
requirements.

Resources

People or information system applications that
are assigned to roles in business processes.

Roles

Collections of activities.

Schedule feasibility

Whether an information system will be
able to be developed on the timetable needed.

Systems development life cycle, SDLC

The classical process used to develop information systems.

Swim-lane layout

A process diagram layout similar to swim
lanes in a swimming pool; each role in the process is shown in its own horizontal rectangle, or lane.

System conversion

The process of converting business activity from the old system to the new.

Systems analysts

IS professionals who understand both busi-
ness and technology.

Technical feasibility

Whether existing information technology will be able to meet the needs of a new information
system.

Test plan

Groups of action and usage sequences for validating the capability of new using software.

Work breakdown structure, WBS

A hierarchy of the tasks required to complete a project

Phases of system development

1. Define system


2. Determine requirements


3. Design systems components


4. Implement system


5. Maintain system


Stages of BPM

Create Components


Systems Development Process


Implement Processes


Assess Results


Model Processes

Business process modeling notation

When to buy and install existing software package

When budget is low and need is immediate

Functional specifications for a system

What the system must DO

Implementation

Parallel cutover-more costly, less risky


Direct cutover

Chief Information Officer

The title of the principal manager of the IS department.

Chief Technology Officer, CTO

The head of the technology
group.

Green computing

Environmentally conscious computing consisting of three major components: power management, virtualization, and e-waste management.

Outsourcing

The process of hiring another organization to
perform a service.

Steering committee

A group of senior managers from a company’s major business functions that works with the
CIO to set the IS priorities and decide among major IS projects and alternatives.

Functions + Organizations of IS dept

Plan use of IS to accomplish org. goals



Manage outsourcing relationships



Protect information assets



Develop, operate, and maintain the org computing structure



Develop, operate, and maintain applications

Importance of strategic alignment

Pertains to IT planning



Difficult?

Advantages v. Disadvantages of Outsourcing

ADV: Management advantages, cost reduction, risk reduction



DIS: Loss of control, high long-term costs, no easy exit

Adware

Programs installed on the user’s computer without the user’s knowledge or permission that reside in the background and observe the user’s actions and keystrokes, modify computer activity, and report the user’s activities to sponsoring organizations.

Authentication

The process whereby an information system
verifies (validates) a user.

Biometric authentication

The use of personal physical characteristics, such as fingerprints, facial features, and retinal scans, to authenticate users.

Cookies

A small file that is stored on the user’s computer by a browser.

Denial of service, DOS

Security problem in which users are not able to access an information system;

Encryption

The process of transforming clear text into
coded, unintelligible text for secure storage or communication.

Hacking

A form of computer crime in which a person gains unauthorized access to a computer system.

Health Insurance Portability and Accountability Act, HIPAA

The privacy provisions of this 1996 act give in-
dividuals the right to access health data created by doctors and other health-care providers,
and limits who can read and receive a person’s health information.

Honey pot

False targets for computer criminals to attack.

Hot site

A duplicate of the original site of the organization, with full computer systems as well as near-complete backups of user data.

https

An indication that a Web browser is using the SSL/TLS protocol to provide secure communication.

Intrusion detection system, IDS

A computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

Malware

Viruses, worms, Trojan horses, spyware, and
adware.

Payload

The program codes of a virus that causes unwanted or hurtful actions, such as deleting programs or data, or even worse, modifying data in ways that are undetected by
the user.

Phishing

A technique for obtaining unauthorized data that
uses pretexting via email.

Pretexting

Deceiving someone over the Internet by pretend-
ing to be another person or organization.

Safeguard

Any action, device, procedure, technique, or
other measure that reduces a system’s vulnerability to a threat.

Sniffing

A technique for intercepting computer communi-
cations.

Spoofing

When someone pretends to be someone else with the intent of obtaining unauthorized data

Spyware

Programs installed on the user’s computer without the user’s knowledge or permission that reside in the background and observe the user’s actions and keystrokes, modify computer activity, and report the user’s activities to sponsoring organizations.

Trojan horse

Viruses that masquerade as useful programs
or files.

Virus

A computer program that replicates itself.

Worm

A virus that propagates itself using the Internet or some other computer network.

Goal of Information Security

Find an appropriate trade-off between the risk of loss and the cost of implementing safeguards

Threat

A person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner’s permission and often without the owner’s knowledge.

Vulnerability

An opportunity for threats to gain access to
individual or organizational assets.

Target

The asset that is desired by a security threat.

CCleaner

A utility program used to clean potentially unwanted files (including temporary internet files, where malicious programs and code tend to reside) and invalid Windows Registry entries from a computer.

Information assurance

The set of measures intended to protect and defend information and information systems

Access control methods

1. Know-->username+password


2. Have-->token+IDcard+badge


3. Are-->Retinalpattern+fingerprint

Non-repudiation

A user cannot deny his or her actions

Integrated Defense Strategies

People, technology, and operations

Confidentiality

Only authorized recipients of data will be allowed access to private data

Four dimensions of feasibility

Cost


Schedule


Technical


Organizational