Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
53 Cards in this Set
- Front
- Back
Moore's Law |
Notion that has held true since the early 90's, it states that the processing power of technology will double every 18-24 months |
|
Internet |
hardware that connects all of the computers in the world to each other |
|
Intranet |
hardware/networks within a single organization that connect them together (BannerWeb) |
|
Extranet |
hardware/networks that are shared between companies and other organizations and connects them together. (Doctors offices) |
|
Three main categories of pressures |
Market, Technological, Societal/Political/Legal Pressures |
|
Globalization/Competition |
Market pressure: international regulations, foreign consumer demand, and adjustment to international cultures |
|
Real Time Operations |
Market pressure: Companies have access to adjust sales/inventory/other functions within a company to correlate with real time data/demand |
|
Changes in the workforce |
Market pressure: telecommuters, flexible hours, disabled access |
|
Powerful customers |
Market pressure: customers know more than ever before because of modern technology/internet |
|
Obsolescence of today's products |
Technological pressure: products today are improved upon and updated so quickly that products even just a year old are considered outdated. |
|
Social Responsibilty |
Societal pressure: companies are pressured to maintain industry and ethical standards that adhere to protecting the environment |
|
Government De-regulations |
Political pressure: for instance the prime minister of England wanting backdoors for applications |
|
Homeland Security |
Political pressure: information sharing, encryption, etc. |
|
Critical Response Activities (CRA's) |
Activities performed by organizations to try to keep pressures in equilibrium |
|
Strategic Systems |
CRA: Goal is to provide competitive advantage, for instance, Fedex and package tracking or AA airline reservation system. |
|
Customer Focus |
CRA: Goal is to provide exceptional customer service to retain business |
|
Continuous Process Improvement |
CRA: Small, incremental changes within a company |
|
Business Process Reengineering (BPR) |
CRA: Radical changes in organizational structure and procedures, for instance Xerox partnering with IBM for 10 years and outsourcing all IT to IBM. |
|
Roles that IT plays in BPR |
Allows automation, increased flexibility/reliability, rapid, paperless transactions, and reduced time to market. |
|
Mass customization |
CRA: Goal is to mass customize a product in order to personalize orders, for instance Nike shoes, M&M's, Netflix pages, etc. |
|
Business Alliances |
CRA: Goal is cost savings, and involves allying within industries or across. |
|
Electronic Commerce |
E-commerce has grown faster than any other industry in the entire world. |
|
Technological Trends |
ongoing technological convergence, shift from mobile to embedded electronics, and 3D printing will change everything |
|
Transaction Processing System (TPS) |
Classifying IS: TPS can respond to business transactions, allow data maintenance, and its primary focus concerns data. Examples: VISA, ATM, Paypal, EZ-Pass, Pay-roll |
|
Management Information System (MIS) |
Classifying IS: MIS is used by mid-upper management and is used to make reports that are summaries across time, like sales last week/month/year.
These reports are issued to monitor, control, and plan and transforms data into information. |
|
Decision Support Systems (DSS) |
Classifying IS: Three types: unstructured, semi-structured, and structured. DSS is helpful only in the unstructured-semi-structured range.
Involves strategy in positioning oneself to succeed, to grow, and helps with managing financial funds as well as hiring administration/management/employees.
Sometimes mathematical models. |
|
Knowledge Management Systems (KMS) |
Classifying IS: All about capturing organizational knowledge since people retire/move onto other jobs.
Smooth transitions between new workers |
|
Centralized decision making |
One individual is relied upon to make the decisions in the company/division and provide direction |
|
Decentralized decision making |
A team of individuals is relied upon for making decisions for the company/division and providing direction. |
|
Architecture of a Business |
high-level plan or blueprint like hardware and networks that support a company's IS. Example: Supercomputers, Mainframes, Minicomputers, and Microcomputers |
|
Standard rule for managing IS resources |
None. Can have one centralized IS department, multiple decentralized groups, or outsource/cloud source. |
|
Strategic IS |
A system that significantly improves the manner in which business is conducted.
for instance, controling a market, larger than average profit margins, and significant increases in productivity/performance |
|
Outwardly focused SIS |
Competitors can see the way in which the system significantly improves upon the manner in which business is conducted. I.E Fedex and its package tracking. |
|
Inwardly focused SIS |
Competitors can't see the way in which the system significantly improves upon the manner in which business is conducted. |
|
Role of IT in Strategic Management |
Enabler for change; allows creation of new applications for strategic advantages; supports strategic changes like in BPR (improved communication/new product development cycles, i.e jeep liberty switching to comp designed cars); increased competitive intelligence |
|
Competitive intelligence |
gather information about competition (understand them) and gather internal information |
|
Strategic Alignment Problems |
90% IS critical to strategic success yet only x<35% IS very involved with business strategy and only x<30% have a business strategist work with IS division |
|
Porter's Five Competitive Forces |
Aligning IS & Strategy: Used to develop strategies to increase competitive advantage: Threat of new entry of competitors, bargaining power of suppliers/customers, threat of substitute products/services, and rivalry among existing industry firms. |
|
Critical Success Factors (CSF's) |
Milestones that are key factors for the success of the company that should be made to pass. |
|
Mission Statement |
Aligning IS & Strategy: Have a clear, concise, believable, and repeatable mission statement about your identity as a company. |
|
Business Goals |
Aligning IS & Strategy: Broad, and derived from the mission statement |
|
Business Objectives |
Aligning IS & Strategy: Actual tangible milestones that lead to growth and improvements in ROI. |
|
Examples of Determining CSF's |
Bank = Money; Ice cream manufacturer = freezers so ice cream stays cold; discount retail chain = low prices, high inventory. |
|
Primary Value Activities |
Aligning IS & Strategy through value chain analysis: Inbound logistics, operations, outbound logistics, marketing and sales, and service. Each activity adds value. |
|
Support Value Activities |
Aligning IS & Strategy through value chain analysis: Organizational infrastructure, human resource management, research and development, and procurement. |
|
Margin |
Aligning IS & Strategy through value chain analysis: Revenue generated by above activities minus the costs of each activity. |
|
E-Commerce Application |
Management of traffic flow on Highway 91 near LA, California. |
|
Benefits/Drawbacks of E-Commerce? |
The benefits are convenience and ease of use, but the drawbacks are that customers can't actually see and hold the product, that returns are difficult, and that it puts a lot of "mom and pop" stores out of business. |
|
Three things to know about secure transactions/payments |
How are you going to keep other third parties out of this interaction/transaction?; is it secure?; how secure/robust is the security? |
|
Single-key/Symmetric encryption |
Encryption/decryption with the same key |
|
Public key |
A key that is used to decrypt information, but is viewable to all and verified by a Certificate authority as a public key to only one specific person. |
|
Private key |
A key that is also used to decrypt information, but is held by you alone. Mathematically related to the public key.
If you buy something off amazon, amazon encrypts your information sent to you with your own public key, which is then decrypted by you with your own private key. |
|
When is a site secure? |
When there is https in the url address AND a closed lock on the screen that you can't scroll away from. |