Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
39 Cards in this Set
- Front
- Back
Executive level
|
The top level of the organization, where executives focus on long term strategic issues facing the organization
|
|
Functional Informational Systems
|
A cross-organizational level information system designed to support a specific function area
|
|
Expert Systems
|
-A special purpose IS designed to mimic human expertise by manipulating knowledge
-Understanding acquired through experience and extensive learning rather than simply information |
|
Decision Support
|
A special purpose IS designed to support organizational decision making
|
|
Destructive agent
|
Malicious agents designed by spammers and other internet attackers to farm e-mail addresses off web sites or deposit spyware on machines
|
|
Customizable CRM
|
(customer relationship management). A corporate level strategy designed to create and maintain lasting relationships with customers by concentrating on the down stream information flows, through the introduction of reliable systems, processes, and procedures
|
|
Sale Force Automation
|
SFA: CRM (customer relationship management) systems to support the day to day sales activities of an organization
|
|
Enterprise Systems
|
IS that allow companies to integrate information across operations on a company-wide basis
|
|
Stand-Alone Applications
|
Systems that focus on the specific needs of individual departments and are not designed to communicate with other systems in the organization
|
|
Legacy Systems
|
Older stand-alone computer systems within an organization with older versions of applications that are either fast approaching or beyond the end of their useful life within the organization
|
|
Software engineering
|
A disciplined approach for constructing IS through the use of common methods, techniques, or tools
|
|
Preventive
|
Making changes to a system to reduce the chance of future system failure
|
|
Forms and reports
|
Forms:
1. A collection of blank entry boxes, each representing a field, that used to enter info into a database 2. A business document that contains some predefined data and may include some areas where additional data is to be filled in, typically for a single record Report: A compilation of data from a database that is organized and produced in printed format |
|
RAD
|
Rapid Application development: A four phase systems development methodology that combines prototyping, computer based development tools, special management practices, and close user involvement
|
|
External Acquisition
|
The process of purchasing an existing information system from an external organization or vender
|
|
Object-oriented analysis and design
|
systems development methodologies and techniques based on objects rather than on data and process
|
|
Logical bomb
|
A virus that only targets certain people
EX: people who have been fired from a company |
|
Line of sight
|
VQ: A big advantage of RFID is that reading an RFID tap doesnt require a line of sight
|
|
Time related sweet spot
|
VQ: all forms of data have a time-related sweet spot where information creates the greatest value.
-data becomes old and outdated over time |
|
Napster
|
The owner of the UK itunes URL redirected his link to Napster, Apple is top competitor
|
|
Cracker
|
An individual who breaks into computer systems with intention of doing damage or committing crime
|
|
Computer crime
|
the use of a computer to commit an illegal act
|
|
Identity theft
|
stealing of another persons social security #, credit card #, and other personal info, for the purpose of using the victims credit rating, borrow money, buy merchandise and otherwise run up debts that are never paid
|
|
Salami slicing
|
A form of data diddling that occurs when a person shaves small amounts from financial accounts and deposits them into personal accounts
|
|
Software piracy
|
A type of computer crime where individuals make illegal copies of software protected by copyright laws
|
|
phreaking
|
crimes committed against phone companies computers with the goal of making free long distance calls, impersonating directory assistance or other operator services, diverting calls to numbers of the perpetrators choice, or otherwise disputing telephone service for subscribers
|
|
Prototyping
|
A systems development process in which requirements are converted into a working system that is continually revised through close work between analysts and users
|
|
Information accessibility
|
an ethical issue concerned with the authenticity and fidelity of info, as well as identifying who is responsible for informational errors that harm people
|
|
Time bomb
|
A virus designed to enable at a certain time
EX: april fools virus |
|
Operational (level)
|
Purpose-processing of business events and transactions
Increasing efficiency: automation lowers costs Example: payroll processing, sales order processing, inventory management |
|
Sales and order process
|
operational level
|
|
Document preparation and scheduling
|
office automation systems
-word processing, email, electronic calendar |
|
Written 3rd party vendors
|
-packaged application
-enterprise application |
|
Direct
|
-new system conversion, happens instantly (Installation of a new system)
|
|
Analysis Phase
|
phase 2: system analysis
-designers gain understanding of current process |
|
Beta
|
testing the capabilities of the system in the user environment with actual data
|
|
Digital divide
|
Gap between generations understanding technologies
|
|
SDLC
|
systems development life cycle. Describes the life of an information system from conception to retirement
|
|
Steps in the Systems Development Process
|
1. system identification, selection, planning
2. system analysis 3. system design 4. system implimentation 5. system maintenance |