• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/53

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

53 Cards in this Set

  • Front
  • Back

Moore's Law

Notion that has held true since the early 90's, it states that the processing power of technology will double every 18-24 months

Internet

hardware that connects all of the computers in the world to each other

Intranet

hardware/networks within a single organization that connect them together (BannerWeb)

Extranet

hardware/networks that are shared between companies and other organizations and connects them together. (Doctors offices)

Three main categories of pressures

Market, Technological, Societal/Political/Legal Pressures

Globalization/Competition

Market pressure: international regulations, foreign consumer demand, and adjustment to international cultures

Real Time Operations

Market pressure: Companies have access to adjust sales/inventory/other functions within a company to correlate with real time data/demand

Changes in the workforce

Market pressure: telecommuters, flexible hours, disabled access

Powerful customers

Market pressure: customers know more than ever before because of modern technology/internet

Obsolescence of today's products

Technological pressure: products today are improved upon and updated so quickly that products even just a year old are considered outdated.

Social Responsibilty

Societal pressure: companies are pressured to maintain industry and ethical standards that adhere to protecting the environment

Government De-regulations

Political pressure: for instance the prime minister of England wanting backdoors for applications

Homeland Security

Political pressure: information sharing, encryption, etc.

Critical Response Activities (CRA's)

Activities performed by organizations to try to keep pressures in equilibrium

Strategic Systems

CRA: Goal is to provide competitive advantage, for instance, Fedex and package tracking or AA airline reservation system.

Customer Focus

CRA: Goal is to provide exceptional customer service to retain business

Continuous Process Improvement

CRA: Small, incremental changes within a company

Business Process Reengineering (BPR)

CRA: Radical changes in organizational structure and procedures, for instance Xerox partnering with IBM for 10 years and outsourcing all IT to IBM.

Roles that IT plays in BPR

Allows automation, increased flexibility/reliability, rapid, paperless transactions, and reduced time to market.

Mass customization

CRA: Goal is to mass customize a product in order to personalize orders, for instance Nike shoes, M&M's, Netflix pages, etc.

Business Alliances

CRA: Goal is cost savings, and involves allying within industries or across.

Electronic Commerce

E-commerce has grown faster than any other industry in the entire world.

Technological Trends

ongoing technological convergence, shift from mobile to embedded electronics, and 3D printing will change everything

Transaction Processing System (TPS)

Classifying IS: TPS can respond to business transactions, allow data maintenance, and its primary focus concerns data. Examples: VISA, ATM, Paypal, EZ-Pass, Pay-roll

Management Information System (MIS)

Classifying IS: MIS is used by mid-upper management and is used to make reports that are summaries across time, like sales last week/month/year.



These reports are issued to monitor, control, and plan and transforms data into information.

Decision Support Systems (DSS)

Classifying IS: Three types: unstructured, semi-structured, and structured. DSS is helpful only in the unstructured-semi-structured range.



Involves strategy in positioning oneself to succeed, to grow, and helps with managing financial funds as well as hiring administration/management/employees.



Sometimes mathematical models.

Knowledge Management Systems (KMS)

Classifying IS: All about capturing organizational knowledge since people retire/move onto other jobs.



Smooth transitions between new workers

Centralized decision making

One individual is relied upon to make the decisions in the company/division and provide direction

Decentralized decision making

A team of individuals is relied upon for making decisions for the company/division and providing direction.

Architecture of a Business

high-level plan or blueprint like hardware and networks that support a company's IS. Example:


Supercomputers, Mainframes, Minicomputers, and Microcomputers

Standard rule for managing IS resources

None. Can have one centralized IS department, multiple decentralized groups, or outsource/cloud source.

Strategic IS

A system that significantly improves the manner in which business is conducted.



for instance, controling a market, larger than average profit margins, and significant increases in productivity/performance

Outwardly focused SIS

Competitors can see the way in which the system significantly improves upon the manner in which business is conducted. I.E Fedex and its package tracking.

Inwardly focused SIS

Competitors can't see the way in which the system significantly improves upon the manner in which business is conducted.

Role of IT in Strategic Management

Enabler for change; allows creation of new applications for strategic advantages; supports strategic changes like in BPR (improved communication/new product development cycles, i.e jeep liberty switching to comp designed cars); increased competitive intelligence

Competitive intelligence

gather information about competition (understand them) and gather internal information

Strategic Alignment Problems

90% IS critical to strategic success yet only x<35% IS very involved with business strategy and only x<30% have a business strategist work with IS division

Porter's Five Competitive Forces

Aligning IS & Strategy: Used to develop strategies to increase competitive advantage: Threat of new entry of competitors, bargaining power of suppliers/customers, threat of substitute products/services, and rivalry among existing industry firms.

Critical Success Factors (CSF's)

Milestones that are key factors for the success of the company that should be made to pass.

Mission Statement

Aligning IS & Strategy: Have a clear, concise, believable, and repeatable mission statement about your identity as a company.

Business Goals

Aligning IS & Strategy: Broad, and derived from the mission statement

Business Objectives

Aligning IS & Strategy: Actual tangible milestones that lead to growth and improvements in ROI.

Examples of Determining CSF's

Bank = Money; Ice cream manufacturer = freezers so ice cream stays cold; discount retail chain = low prices, high inventory.

Primary Value Activities

Aligning IS & Strategy through value chain analysis: Inbound logistics, operations, outbound logistics, marketing and sales, and service. Each activity adds value.

Support Value Activities

Aligning IS & Strategy through value chain analysis: Organizational infrastructure, human resource management, research and development, and procurement.

Margin

Aligning IS & Strategy through value chain analysis: Revenue generated by above activities minus the costs of each activity.

E-Commerce Application

Management of traffic flow on Highway 91 near LA, California.

Benefits/Drawbacks of E-Commerce?

The benefits are convenience and ease of use, but the drawbacks are that customers can't actually see and hold the product, that returns are difficult, and that it puts a lot of "mom and pop" stores out of business.

Three things to know about secure transactions/payments

How are you going to keep other third parties out of this interaction/transaction?; is it secure?; how secure/robust is the security?

Single-key/Symmetric encryption

Encryption/decryption with the same key

Public key

A key that is used to decrypt information, but is viewable to all and verified by a Certificate authority as a public key to only one specific person.

Private key

A key that is also used to decrypt information, but is held by you alone. Mathematically related to the public key.



If you buy something off amazon, amazon encrypts your information sent to you with your own public key, which is then decrypted by you with your own private key.

When is a site secure?

When there is https in the url address AND a closed lock on the screen that you can't scroll away from.