Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
39 Cards in this Set
- Front
- Back
Data |
raw facts that describe the characteristics of an event or object |
|
Information |
data converted into a meaningful and useful context |
|
Business Intelligence (BI) |
information collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making |
|
Knowledge |
the skills, experience and expertise, coupled with information and intelligence, that create a person's intellectual resources |
|
Information systems (IS) |
combination of people, technology, and business processes used to achieve a goal triangle: people-technology-business processes |
|
systems thinking |
way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback. |
|
competitive advantages |
feature of a product or service on which customers place a greater value than they do on similar offerings from competitors |
|
operational decisions (structured decisions) |
arise when established processes offer potential solutions. They are made frequently and affect SHORT-TERM BUSINESS STRATEGIES |
|
managerial decisions (semistructured decisions) |
cover SHORT AND MEDIUM RANGE PLANS, schedules, and budgets along with policies procedures, and business objectives for the firm |
|
Strategic decisions (unstructured decisions) |
occur in situations which no procedures or rules exist to guide decision makers toward the correct choice. They are FREQUENT AND EXTREMELY IMPORTANT. AFFECT LONG TERM |
|
efficiency |
measure the PERFORMANCE itself (such as throughput, transaction speed, and system availability) |
|
effectiveness |
measure the IMPACT MIS has on business processes and activities. (customer satisfaction and customer conversion rates) |
|
benchmarking |
process of continuously measuring system results, comparing those results to optimal system performance and identifying steps and procedures to improve system performance |
|
Key performance indicators (KPI) |
quantifiable metrics a company uses to evaluate progress toward critical success factors. more specific than CSFs |
|
ebusiness |
includes ecommerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real-time information |
|
ecommerce |
buying a selling of goods and services over the Internet. refers only to online transactions |
|
ebusiness model |
plan that details how a company creates, delivers, and generates revenues on the Internet |
|
Business-to-business (B2B) |
businesses buying from and selling from each other over the Internet (ebusiness model) |
|
business-to-consumer (B2C) |
applies to any business that sells its products or services directly to consumers online (ebusiness model) |
|
Consumer-to-business (C2B) |
applies to any consumer who sells a product or service to a business on the Internet (ebusines model) |
|
Consumer-to-consumer (C2C) |
applies to customers offering goods and services to each other on the Internet (ebusiness model) |
|
web 2.0 (business 2.0) |
next generation of Internet use- a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing and free |
|
intellectual property |
protect property that is primarily the result of mental creativity rather than physical effort |
|
trademark |
distinctive mark, word, design, picture, or arrangement used with a product that helps consumers identify the product with the producer |
|
copyrights |
protect the expression of creative ideas |
|
patent |
protects a product, process, invention, machine or plant produced by asexual reproduction |
|
information ethics |
govern the ethical and moral issues arising from the development and use of information technologies as well as the creation, collection, duplication, distribution, and processing of information itself |
|
intellectual property |
intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents |
|
digital rights management |
technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
|
|
ethical computer use policy |
contains general principles to guide computer user behavior |
|
information privacy policy |
contains general principles regarding information privacy |
|
acceptable use policy (AUP) |
requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet |
|
people |
1ST LINE OF DEFENSE |
|
insiders |
legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident |
|
technology |
2nd LINE OF DEFENSE |
|
phishing |
technique to gain personal information for the purpose of identity theft, usually by means of FRAUDULENT EMAILS |
|
automation |
process of computerizing manual task, making them more efficient and effective, and dramatically lowering operational costs |
|
steamlining |
improves business process efficiences by simplifying or eliminating unnecessary steps |
|
business process reengineering (BPR) |
analysis and redesign of workflow within and between enterprises |