Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
53 Cards in this Set
- Front
- Back
TPS and Essential Characteristics (4) |
Transaction Processing Systems Handle High data in high volume Avoid Errors and Downtime Record accurately and securely Maintain Privacy and Security |
|
Batch Processing |
Data collected from transactions as they occur then placed in groups for periodical processing |
|
OLTP |
Online transaction processing |
|
FAIS and 4 Types |
Functional Area Information System Human Resources Marketing Accounting and Finance POM |
|
ERP |
Enterprise Resource Planning |
|
Companies that Provide ERP systems (3) |
Oracle SAP PeopleSoft |
|
ERP 2 |
Interorganizational systems that provide web-enabled links between a company's key business systems |
|
Benefits of ERPs (3) |
Organization flexibility - break down barriers Decision Support - provide information across functional areas Quality and efficiency - Integrate and improve an organizations business processes |
|
Enterprise Application Intregation |
Middleware that bridges two existing systems together |
|
Routine Reports |
Reports produced at scheduled intervals |
|
Ad Hoc Reports (4) |
Drill-down reports - display greater level of detail Key-indicator - Summarize the performance of critical activities Comparative Reports Exception reports - information that only falls outside certain threshold standards |
|
CRM |
Customer Relationship Management- a customer focused and customer driven organizational strategy |
|
Customer Touch Points |
the numerous and diverse ways a customer will interact with an organization |
|
Customer Interaction Centres |
Basically gorified call centres |
|
Sales Force Automation |
a component of a CRM system that records all the components in a sales transaction process In addition - Sales lead tracking, sales forecasting, and a product knowledge system |
|
Types of additional Selling (3) |
Upselling - offering the ability to purchase a higher end value product Cross -selling - selling related products based on previous purchase Bundling - selling two or more products together at a low price point |
|
Function of CRM systems |
Support front end business process |
|
Function of Analytical CRM Systems |
Provide business intelligence by analyzing customer behaviour and preceptions |
|
On- Demand Crm Systems and Drawbacks |
A type of software as a service deal, Vendor could go out of business Difficult or impossible to modify Difficult to integrate with existing software |
|
Supply Chain |
the flow of materials, information, money, and services from raw material suppliers, through factories and warehouses to the end user |
|
Supply Chain visibility |
the ability for all involved in the supply chain to be able to see the flow of materials and services in the supply chain |
|
Components of a Supply Chain (3) |
Upstream - where sourcing or procurement from external suppliers occurs Internal - packaging, assembly, or manufacturing takes place Downstream - where distribution takes place |
|
Supply Chain Management |
is to plan, organize, and optimize the various activities performed in the supply chain |
|
IOS (3) |
Interorganizational Information system - by connecting the information systems of two partners IOS reduces routine transactions, improves quality of information, compresses the cycle in fulfilling business transactions |
|
Pull Model |
the production process begins when a customer orders |
|
EDI |
Electronic Data Interchange - a communication standard that allows business partners to exchange routine documents |
|
Vendor-managed inventory |
when the supplier manages the entire inventory process for a particular product |
|
3 Basic Roles of Managers |
Interpersonal Roles - Leader Informational Roles - monitor, analyze Decisional Roles - negotiator |
|
OLAP |
Online Analytical Processing; also refered to multidimensional analysis |
|
Data Mining and two basic operations |
the process of searching for valuable business information in a large database Predicting Trends and behaviour - as in credit card fraud Identifying previous unknown patterns - looking at buying behaviour and comparing |
|
DSS and 3 types of DSS |
Decision Support Systems Sensitivity Analysis What if Analysis Goal Seeking Analysis |
|
Dashboards Capabilities (4) |
Drill Down reports Exception Reports Trend analysis Key indicators |
|
GIS |
Geographical Information System - a computer system that captures, integrates, and manipulate data while using digital maps |
|
Reality Mining |
Extracting the information from usage patterns of mobile devices |
|
CPM |
Corporate Performance Management - monitoring and managing of an organization performance based on KPI (Key Performance indictors) revenue, profits, market share |
|
Strategies for Acquiring IT Applications (7) |
Buy Option Customize a prewritten App Lease the applications Software as a service Open Source Software Outsourcing Custom Development |
|
Systems Development Life Cycle (SDLC) |
is a structured framework that consists of sequential processes by which information systems are developed |
|
Types of System Acquisition Methods (7) |
Traditional system development Prototyping Integrated Computer-Assisted Software Engineering RAD (Rapid App Development) End-User Development JAD (Joint App Design) Object- Orientated Development |
|
3 Types of Feasibility Studies |
Technical - whether the company can develop or purchase the necessary hardware or software Economic - whether the project is an acceptable financial risk Behavioural - the impact on humans in the development process |
|
4 Types of Implementations |
Direct Conversion - old system shut down and new one brought online Phased Conversion - parts of new system slowly introduced into company checking if all systems run well Parallel Conversion - both old and new run for a time together Pilot Conversion - a part of the organization has the system tested within it |
|
Methods of System Development (4) |
JAD - Joint Application Design; collecting user requirements and creating system designs RAD - Rapid Application Development; produces functional components of the final system, but not the final system Agile Development - Develop parts of the system in order to maintain functionality End- User Development - end users develop the systems without assistance from the IT department |
|
Tools for System Development (4) |
Prototyping - defines an initial list of user requirements then refines throughout process CASE - Computer aided software engineering; a group of tools that automate the system development Component-based development - Uses standard components to build applications; components are reusable Object- Orientated Development - designing systems around real systems that are then modeled |
|
Vendor and Software Selection (6) |
Identifying Potiential Vendors Determine the Evaluation Criteria Evaluate vendors and packages Choose the Vendor and package Negotiate a Contract Establish Service Level agreement |
|
4 Approaches to Ethics |
Utilitarian -needs of the many out weight the needs of the few
Rights View - an action that best protects and respects the moral rights of the affected parties Common Good - Highlights the interlocking relationships that underlie all societies Fairness - Treat all humans equally, if not fairly on a defensible standard |
|
3 Ethical Tenets |
Responsiblity - accepting the consequences for decisions and actions Accountability - who is responsible Liability - the legal concept of the right to recover damages done by others |
|
4 Ethical Issues in IT |
Privacy Issues - the right to keep personal information private Accuracy Issues - keep data accurate and relevant Property Issues - Who owns what? Accessibility Issues - Who is allowed to access information? |
|
Issues of Privacy in IT (3) |
Data Collection - must be business related Data Accuracy - should be kept current, where and when neccessary Data Confidentially - security measures to keep data safe from unauthorized access |
|
5 Factors that contribute to increased cybercrime |
Computer networks are highly connected Computers are getting smaller and faster Hacking skills are decreasing in difficulty International organized crime is taking over cyber crime Lack of Mangement support |
|
Human Errors vs Social Engineering |
largely because of human laziness, carelessness, or a lack of awareness concerning information security Using social skills to trick or manipulate the system |
|
Types of Delibrate Attacks |
Alienware Cyberwarfare/ terrorism SCADA Attacks Identity Theft Espionage Information Extortion Sabotage or vandalism Theft of Equipment or information Software Attacks |
|
Risk Mitigation Strategies (3) |
Risk Transference - transfer the risk to another party - purchase insurance Risk Limitation - limiting risk by bring in controls Risk Acceptance - accepting the risk and continue to operate and absorb any damages |
|
Types of Controls used to protect an organization (3) |
Physical - doors, walls, locks Assess - authentication and authorization systems Communication - securing the movement of data; firewalls, blacklisting, whitelisting, |
|
Turing Test |
Determining if a computer or human |