• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/65

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

65 Cards in this Set

  • Front
  • Back
ERP
Enterprise resource planning – integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make enterprisewide decisions by viewing enterprisewide information on all business operations
reasons ERP systems are powerful organizational tools:
-logical solution to the mess of incompatible applications
-addresses the need for global info sharing and reporting
-used to avoid the pain and expense fo fixing legacy systems
ERP benefits
-Integrate financial information
-Integrate customer order information
-Standardize and speed up manufacturing processes
-Reduce inventory
-Standardize human resource information
ERP risks
software cost

consulting fees

process rework

customization

integration and testing

training

data warehouse integration
business process
a standardized set of activities that accomplish a specific task, such as processing a customer’s order
Supply Chain Management (SCM) –
involves the management of information flows between and among stages in a supply chain to maximize total supply chain effectiveness and profitability
goal of SCM:
Decrease the power of its buyers
Increase its own supplier power
Increase switching costs to reduce the threat of substitute products or services
Create entry barriers thereby reducing the threat of new entrants
Increase efficiencies while seeking a competitive advantage through cost leadership
personalization
when a Web site knows enough about a persons likes and dislikes that it can fashion offers that are more likely to appeal to that person
business intelligence
– information that people use to support their decision-making efforts
RFID tag
contains a microchip and an antenna, and typically work by transmitting a serial number via radio waves to an electronic reader, which confirms the identity of a person or object bearing the tag
ERP system provides a method for...
effective planning and controlling of all the resources required to take, make, ship, and account for customer orders in a manufacturing, distribution, or service org.
successful ERP projects share 3 attributes:
overall fit

proper business analysis

solid implementation plans
SAP-
the leading ERP vendor
ERP...
eliminates redundancies, reduces wasted time,
remoses misinformation
3 components of ERP:
accounting and finance

production and materials management

human resources
How does this practice help Best Buy to optimize its supply chain??
they are PLANNING to have all resources to meet customer demand

SOURCE- they can see if suppliers got the inventory there on time

LOGISTICS- they can plan for effective transportation and storage since they know how much inventory they have
why is business intelligence software required in order for this to work?
business intelligence software tells Best Buy the information they need in order to make decisions about when and what inventory to order
is it possible for the results of such checks to be analyzed manually/visually?
no

you can't go to all 750 stores
goal of business intelligence:
gain sustainable competitive advantage
benefits of business intelligence
competitive advantage

information can be turned into actionable knowledge
authentication-
a method for confirming user's identities

once a system determines the authentication of a user, it can determine the access privledges
datamining-
sifts thru lots of info to uncover patterns and relationships
how is data mining used in target marketing?
shows patterns of people who buy certain products so you can determine your target market for that product
how is data mining used in churn analysis?
CHURN ANALYSIS involves identifying those consumers who are most likely to discontinue using your service or product.


data mining can be used to find this, so you can take action to retain those customers
configuration data
Refers to data entered into SAP to configure the system and establish the details of the business process models.
transactions data
Describes a business event or the result of a business process. Records activity within the business
vendor master record
Name, Address
Tax Jurisdiction Code
Language
Payment terms
Currency
Vender ID – Identifies vendor and serves as account number in accounts payable ledger
materials master record
Trade Goods – Goods or materials that are purchased with the intent of being resold.
Raw Materials – Goods or materials purchased for use in manufacturing.
Finished Goods – are manufactured goods which will be sold to customers.
HIPPA
health insurance portability and accountability act

requires the health care industry formulate and implement regulations to keep patient info confidential. must document and keep current records detailing how theyre preforming securing measures for all transmissions of info

protects privacy and security of personal health recoreds and has the potential to immpact every business in the US

affects all companies that use EDI to communicate personal health records
ethics-
principles and standards that guide our behavior toward other people
ethics issues affected by technology advances:
-intellectual property
-copyright
-fair use doctrine
-pirated software
-counterfeit software
information has no ethics-
Individuals form the only ethical component of IT

Information does not care how it is used

Information will not stop itself from sending spam, viruses, or highly-sensitive information

Information cannot delete or preserve itself
acceptable use policy (AUP)
policy that a user must agree to follow in order to be provided access to a network or to the Internet

An AUP usually contains a nonrepudiation clause
nonrepudiation-
a contractual stipulation to ensure that e-business participants do not deny (repudiate) their online actions
spam-
unsolicited e-mail

Spam accounts for 40% to 60% of most organizations’ e-mail and cost U.S. businesses over $14 billion in 2005
anti-spam policy
simply states that e-mail users will not send unsolicited e-mails (or spam)
One of the most common defenses for preventing a security breach is a FIREWALL-
hardware and/or software that guards a private network by analyzing the information leaving and entering the network
ENCRYPTION-
scrambles information into an alternative form that requires a key or password to decrypt the information

If there is an information security breach and the information was encrypted, the person stealing the information would be unable to read it
Public key encryption (PKE) –
an encryption system that uses two keys: a public key for everyone and a private key for the recipient
There are three primary information technology security areas :
Authentication and authorization
Prevention and resistance
Detection and response
Authentication –
a method for confirming users’ identities
authorization-
the process of giving someone permission to do or have something
1st line of defense:

2nd:
people

technology
1st line of defense: people
Organizations must enable employees, customers, and partners to access information electronically

The biggest issue surrounding information security is not a technical issue, but a people issue

33% of security incidents originate within the organization
Insiders – legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of

The first line of defense an organization should follow to help combat insider issues is to develop information security policies and an information security plan
Information security policies – identify the rules required to maintain information security
Information security plan – details how an organization will implement the information security policies


Hackers frequently use “social engineering” to obtain password
Social engineering –
using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker
detection and response-
If prevention and resistance strategies fail and there is a security breach, an organization can use detection and response technologies to mitigate the damage

Antivirus software is the most common type of detection and response technology
Security threats to e-business include:
Elevation of privilege
Hoaxes
Malicious code
Spoofing
Spyware
Sniffer
Packet tampering
hacker-
people very knowledgeable about computers who use their knowledge to invade other people’s computers
White-hat hacker
Black-hat hacker
Hactivist
Script kiddies or script bunnies
Cracker
Cyberterrorist
virus-
software written with malicious intent to cause annoyance or damage
Worm
Denial-of-service attack (DoS)
Distributed denial-of-service attack (DDoS)
Trojan-horse virus
Backdoor program
Polymorphic virus and worm
brick and mortor business-
no selling online

an e-business
click and mortor business-
e-commerce AND e-business
white hat hacker
work at the request of the system owners to find system vulnerabilities and plug the holes
black hat hackers
sbreak into other ppls computer systems and may just look around or ma steal and destroy info
hactivists
have philosophical and political reasons for breaking into systems and will often deface the website as a protest
script kiddies/bunnies
find hacking code on the internet and click and point their way into systems to cause damage or spread viruses
cracker
hacker with criminal intent
cyberterrorist
seek to cause harm to people ro destroy critical systems or info and use the internet as a weapon of mass destruction
worm-
type of virus that spreads itself from computer to computer. VIRUS must attach to something in order to spread, WORMS do not neeed to attach to anything to spread and can tunnel themselves into computers
denial of service attack DoS
floods a website w/ so many requests for service that it slows down or crashes
distributed denial of service attack (DDoS)
attacks from multiple computers that flood a website w/ so many requests it slows or crashes. ocmmon type is the PING OF DEATH- where thousonds of computers try to acccess a website at the same time shutting it down
trojan horse virus
hides inside other software, usually as an attachment or downloadable file
backdoor programs-
viruses that open a way into the network for future attacks
polymorphic viruses and worms
schange form as they propogate
SAP
Enables a company to link it’s business processes
Ties together disparate business functions (integrated business solution)
Helps the organization run smoothly
Real-time environment
Scalable and flexible
GIS
geographic information system

designed to work w/ info that can be shown on a map