• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/87

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

87 Cards in this Set

  • Front
  • Back

Six Major Strategic Reasons for CBIS

  1. Operational Excellence
  2. New Products, Services, Business Models
  3. Customer & Supplier Intimacy
  4. Improved Decision Making
  5. Competitive Advantage
  6. Survival

5 Primary Activities in Value Chain Model

  1. Inbound Logistics
  2. Operations
  3. Sales & Marketing
  4. Service
  5. Outbound Logistics

4 Support Activities in Value Chain Model

  1. Administration & Management
  2. Human Resources
  3. Technology
  4. Procurement

HIPPA

Health Insurance Portability & Privacy Act


Regulates use and disclosure of protected health information

COPPA

Children's Online Privacy Protection Act


Includes what website musts include in privacy policy and their responsibility for protecting children's privacy and safety online.

GLBA

Gramm-Leach-Bailey Act


Ensures safety and privacy of consumer data and financial institution must have policy in place to protect information from security threats.

Sarbanes-Oxley-Act

Financial information must be safeguarded

Do Not Track Online Act of 2011

Is a term that refers to a series of policy proposals that protects users’ right to choose whether or not to be tracked by third-party websites

Definition of Opt-Out

An opt-out model of informed consent permits the collection of personal informationuntil the consumer specifically requests that the data not be collected.

Definition of Opt-In

Privacy advocates would like to see wider use of an opt-in model of informed consent in which a business is prohibited from collectingany personal information unless the consumer specifically takes action toapprove information collection and use.

Six Major Steps in Systems Development Process

  1. Systems Analysis
  2. Systems Design
  3. Programming
  4. Testing
  5. Conversion
  6. Production & Maintenance

Systems Analysis

  • Identify Problems
  • Specify Solutions
  • Establish Information Requirements

Systems Design

Create design specifications

Programming Activities

Translates decision specifications into program code

Testing Activities

  • Perform Unit Testing
  • Perform Systems Testing
  • Perform Acceptance Testing

Conversion Activities

  • Plan Conversion
  • Prepare Documentation
  • Train users and technical staff

Production and Maintenance Activities

  • Operate the system
  • Evaluate the system
  • Modify the system

Internet Platform Providers

  • Internet hardware: IBM, Dell, Oracle, HP
  • Web Development Tools: Microsoft, Adobe

Client Machine Provider

Dell PC's, desktop/laptop

Mainframe Provider

IBM

Network Hardware Providers

  • Cisco
  • Alcatel-Lucent
  • Juniper Networks

Database Software Providers

  • IBM
  • Oracle
  • Microsoft SQL
  • Sysbase
  • MySQL

Top Chip Producers

Intel & AMD

Physical Data Storage Providers

Western Digital, Seagate, EMC Corp

5 Major eras in IT infrastructure evolution

  1. General purpose 1959 to present
  2. Personal computer 1981 to present
  3. Client/server 1983 to present
  4. Enterprise computing 1992 to present
  5. Cloud and mobile 2000 to present

General-purpose mainframe and minicomputer era


  • 1959 to present
  • 1958: IBM first mainframes introduced
  • 1965: Less expensive DEC minicomputers introduced

Personal Computer Era

  • 1981 to present
  • 1981: Introduction of IBM PC
  • Proliferation in 80s, 90s resulted in growth of personal software

Client/Server Era

  • 1983 to present
  • Desktop clients networked to servers
  • Network may be two-tiered or multi
  • Various types of services (network, Web)

Enterprise Computing Era

  • 1992 to present
  • Move towards integrating disparate networks, applications using Internet standards and enterprise applications

Cloud and Mobile Computing

  • 2000 to present
  • Cloud computing: software applications supplied over Internet or network
  • Fastest growing form of computing

Moore's law and micro processing power

Computing power doubles every 18 months

SQL Definition

Query language that retrieves data stored in databasesor files. Capable of supporting requests for information that are notpredefined.

Microsoft Access

Microsoft Access is a DBMS (also known as DatabaseManagement System) from Microsoft thatcombines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools.

Trojan Horse

Asoftware program that appears legitimate but contains a second hidden functionthat may cause damage

Viruses

Rogue softwareprogram that attaches itself to other software programs or data files in orderto be executed

Spyware

Technology that aids in gathering information about a personor organization without their knowledge.

Click Fraud

Fraudulently clicking on an online ad in pay per clickadvertising to generate an improper charge per click

Phishing

Form of spoofing involving setting up fake Web sitesor sending e-mail messages that resemble those of legitimate businesses thatask users for confidential personal data.

Customer Lifetime Value (CLTV)

Difference between revenues produced by a specificcustomer and the expenses for acquiring and serving that customer minus thecost of promotional marketing over the lifetime of the customer relationship,expressed in today’s dollars.

Churn Rate

Measurement of the number of customer who stop usingor purchasing products or services from a company. Used as an indicator of thegrowth or decline of a firm’s customer base.

Three Major Types of KMS

  1. Enterprise-wide
  2. Knowledge work systems
  3. Intelligent Techniques

Enterprise-wide KMS

General-purpose firm-wide efforts to collect, store,distribute, and apply digital content and knowledge. Includes collaboration and social tools, learning management systems.

Knowledge work systems (KWS)

Specialized systems built for engineers, scientists, otherknowledge workers charged with discovering and creating new knowledge. Includes CAD software, 3D virtualization, investment workstations (banking)

Intelligent Techniques

Diverse group of techniques such as data mining used forvarious goals: discovering knowledge, distilling knowledge, discovering optimalsolutions. Includes data mining, expert systems, fuzzy logic, genetic algorithms

4 Characteristics of Knowledge

  1. Knowledge is a firm asset
  2. Knowledge has different forms
  3. Knowledge has a location
  4. Knowledge is situational

Knowledge is a firm asset


  • Intangible
  • Creation of knowledge from data, information, requiresorganizational resources
  • As it is shared, experiences network effects

Knowledge has different forms

  • May be explicitly (documented) or tactic (residing in minds
  • Know-how, craft, skill
  • How to follow procedure
  • Knowing why things happen

Knowledge has a location

  • Cognitive event
  • Both social and individual
  • Sticky (hard to move)
  • Situated (enmeshed in firm's culture)
  • Contextual (works only in certain situations)

Knowledge is situational

  • Conditional: knowing when to apply procedure
  • Contextual: knowing circumstances to use certain tool

Why are Knowledge systems valuable?

  • Is fastest growing area of software investment
  • 37% of US labor force are knowledge and information workers
  • 45% of GDP is knowledge and information sectors
  • Stock market value includes knowledge
  • Well executed projects produce high ROI

Artificial Intelligence Definition

The effort to develop computer-based systems that canbehave like humans, with the ability to learn languages, accomplish physicaltasks, use a perceptual apparatus, and emulate human expertise and decisionmaking.

4 major types of organization change enabled by IT

  1. Automation
  2. Rationalization of procedures
  3. Business process redesign
  4. Paradigm shifts

Automation


  • Increases efficiency
  • Replaces manual tasks

Rationalization of Procedures

  • Streamlines standard operatingprocedures
  • Often found in programs for makingcontinuous quality improvements: Total quality management (TQM)Six sigma

Business Process Redesign

  • Analyze, simplify, and redesignbusiness processes
  • Reorganize workflow, combine steps,eliminate repetition

Paradigm Shifts

  • Rethink nature of business
  • Define new business model
  • Change nature of organization

IT System Failure Definition

Can occur because of ahardware failure or a severe software issue; causing the system to freeze, reboot, or stop functioning altogether.

4 Types of System Failure

  1. Fail to capture essential business requirements
  2. Fail to provide organizational benefits
  3. Complicated, poorly organized interface
  4. Inaccurate or inconsistent data

Runaway Projects (30-40% of IT projects)

  • Exceed budget
  • Fail to perform as specified

3 General Cultural Challenges in Global Systems


  • Cultural particularism
  • Social Expectations
  • Political Laws

4 Specific Challenges in Global Systems

  • Standards (telecommunication, email)
  • Reliability (phone networks)
  • Speed (data speeds)
  • Personnel (shortage of skilled labor)

5 Principle Management Challenges in Developing Global Systems


  • Agreeing on user requirements
  • Introducing change in business processes
  • Coordinating development
  • Coordinating software releases
  • Encouraging support of local users

4 Technology Challenges of Global Systems


  1. Computing Platforms
  2. Systems Integration
  3. Connectivity
  4. Software

Computing Platforms and Systems Integration


  • How new core systems will fit in with existing suite ofapplications developed around globe by different divisions
  • Standardization: Data standards, interfaces, software, andso on

Connectivity


  • Internet does not guarantee any level of service
  • Many firms use private networks and VPNs
  • Low penetration of PCs, outdated infrastructures indeveloping countries

Software


  • Integrating new systems with old
  • Human interface design issues, languages
  • Software localization: convertingsoftware to operate in second language
  • Most important applications including TPS, MIS, collaboration tools, and SCM

Senior Management Decisions


  • Unstructured
  • Decide entrance into or from markets
  • Decide long term goals

Middle Management Decisions

  • Semistructured
  • Design marketing plan
  • Design new corporate website

Operational Management Decisions


  • Structured
  • Determine overtime eligibility
  • Restock inventory
  • Offer credit to customers

Gore-Tex Article Summary

  • PeopleSoft used incompetent consultants
  • Unreliable system, connectivity issues
  • Software to support back-office cost thousands due to new system errors

Input

Anything we wish to embed in a system for sometype of use. A variety of sources are used to input:keyboard, scanner, microphone, mouse, and even another computer.

Transaction Processing System (TPS)

A transaction processing system is a computerizedsystem that performs and records the daily routine transactions necessary toconduct business, such as sales order entry, hotel reservations, payroll,employee record keeping, and shipping.

Management Information System (MIS)

MIS provide middle managers with reports on theorganization’s current performance. This information is used to monitor andcontrol the business and predict future performance.

Decision-support systems (DSS)

Focus on problems that are unique and rapidlychanging, for which the procedure for arriving at a solution may not be fullypredefined in advance.

Executive Support Systems (ESS)

Addressnon-routine decisions requiring judgment, evaluation, and insight because thereis no agreed-on procedure for arriving at a solution. ESS present graphs anddata from many sources through an interface that is easy for senior managers touse.

Supply Chain Management System (SCM)

These systems help suppliers, purchasing firms,distributors, and logistics companies share information about orders,production, inventory levels, and delivery of products and services so they cansource, produce, and deliver goods and services efficiently.

Customer Relationship Management (CRM)

Help manage their relationships of the businessprocesses that deal with customers in sales, marketing, and service to optimizerevenue, customer satisfaction, and customer retention.

Enterprise Resource Planning (ERP)

Integrate business processes in manufacturing andproduction, finance and accounting, sales and marketing, and human resourcesinto a single software system.

5 Aspects of Porter's Competitive Forces

  1. Traditional Competitors
  2. New Market Entrants
  3. Substitute Products & Services
  4. Customers
  5. Suppliers

4 Ways to use MIS to lessen Competitive Forces

  1. Low Cost Leadership
  2. Product Differentiation
  3. Focus on Market Niche
  4. Strengthen Customer & Supplier Intimacy

7 ways digital markets are different

  1. Ubiquity
  2. Global Reach
  3. Universal Standards
  4. Richness
  5. Interactivity
  6. Information Density
  7. Personalization/Customization

Data Mining

Analysisof large pools of data to find patterns and rules that can be used to guidedecision making and predict future behavior.

Freemium Revenue Model

Offers basic services or content for free, whilecharging a premium for advanced or special features. For example, Google offersfree applications but charges for premium services.

Sales Revenue Model

Companies derive revenue by selling goods, information,or services to customers.

Affiliate Revenue Model

Websites (called “affiliate Websites”) send visitors to other Web sites in returnfor a referral fee or percentage of the revenue from any resulting sales.

Transaction Fee Revenue Model

A company receives a fee for enabling or executing a transaction. For example, eBayprovides an online auction marketplace and receives a small transaction feefrom a seller if the seller is successful in selling an item.

3 Types of Business E-Commerce Models

  1. Business-to-consumer (B2C)
  2. Business-to-business (B2B)
  3. Consumer-to-consumer (C2C)