1/52
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is an ERP
enterprise resource planning system: Provide communication among functional area ISs (information systems)
Data
Data are raw facts and figures. It does not have any meaning until it is processed and turned into something useful. Data comes in many forms, the main ones being letters, numbers, and symbols but also images and sounds.
Information
Information is data that has been processed by the computer (in a context) to give it meaning.
Knowledge
Knowledge is derived from information by applying rules to it. You use knowledge to make decisions.
Wisdom
The ability or result of an ability to think and act utilizing knowledge, experience, understanding, common sense, and insight.
IT Infrastructure consists of?
Consists of IT services, IT personnel, and IT components.
What two information systems support the entire organization?
1. Enterprise resource planning (ERP) systems
2.Transaction processing systems (TPS)
Informed User
A person knowledgeable about information systems and information technology.
What is an TPS
Transaction processing systems: Support the "real-time" monitoring, collection, storage, and processing of data from the organization's day-to-day operations
What are the six basic components of computer based information?
1. Hardware
2. Software
3. Database
4. Network
5. Procedures
6. People
(IT, information tech consists of first 4 in basic components)
What is Social Engineering?
- Involves the use of social skills to manipulate people to garner information they would normally not disclose.
- It can also be defined as an art of deception.
The social engineering process preys upon two common characteristic traits?
- Acceptance of authority
- Willingness to cooperate with other
What is Digital Transformation?
- A business strategy initiative that incorporates digital technology across all areas of an organization.
- It evaluates and modernizes an organization's processes, products, operations, and technology stack to enable continual, rapid, customer-driven innovation.
Why is managing information resources difficult and complex?
• IS has an enormous strategic value to organizations
• ISs are very expensive to acquire, operate, and maintain
• Evolution of the MIS function within the organization
• MIS personnel vs. end users
• Changing role of the IS department
• The traditional function of the MIS department
• New (consultative) functions of the MIS department
What is customer satisfaction?
Customer satisfaction is a measure of expectations being exceeded, met, or not met.
When thinking of customer satisfaction measurement what do we want?
we want to know that we are meeting or exceeding customer expectations
What is BPI?
Business Process Improvement is an incremental approach to move an organization toward business process-centered operations. It focuses on reducing variation in process outputs by identifying the underlying cause of the variation.
What is the order of BPI phases
1. Define
2. Measure
3. Analyze
4. Improve
5. Control
What is BPM?
Management approach focused on aligning all aspects of an organization with the wants and needs of clients. BPM begins with process modeling which is a graphical depiction of all of the steps in a process.
What is electronic commerce?
describes the buying, selling, transferring, or exchanging of products, services, or information via computer networks, including the Internet.
What is electronic business?
is a broader definition of EC (Electronic Commerce), including buying and selling goods and services, and also servicing customers, collaborating with partners, conducting e-learning, and conducting electronic transactions within an organization.
What is competitive advantage?
Competitive advantage implies gaining the edge over others
- using resources and capabilities.
What is competitive strategy
Consist of business approaches to:
• Attract customers by fulfilling their expectations
• Withstand competitive pressure
• Strengthen market positions
What are integrated supply chains?
A supply chain is considered integrated when the different operations are performed in it.
EX: raw materials procurement, product design, manufacturing, warehousing, and distribution - are coordinated
What are porters competitive forces model?
1. Threat of entry of new competitors
2. Bargaining power of suppliers
3. Bargaining power of customers/buyers
4. Threat of substitute products or services
5. Rivalry among existing firms within the industry
5 strategies for competitive advantage.
1. cost leader - EX: "I can sell at a lower price than you"
2. innovation - EX: "I'm doing something new and you can't catch up."
3. Differentiation - EX: "I am better because I am different."
4. Operational Effectiveness - EX: "I can do the same thing more efficiently than you can."
5. Customer Oriented- EX: "I treat my customers better than you do."
What is ethics
Ethics examines the rational justification for our moral judgments; it studies what is morally right or wrong, just or unjust.
What is privacy
Privacy is a fundamental human right that underpins freedom of association, thought, and expression, as well as freedom from discrimination.
What are the 4 widely used ethical standards
1. The utilitarian approach
2. The rights approach
3. Fairness Approach
4. The common good approach
what is the utilitarian approach
Provides the most good or does the least harm.
what is the rights approach
Best protects and respects the moral rights of the affected parties.
what is the fairness approach
Treats all humans equally, or if unequally, then fairly, based on some defensible standard.
what is the common good approach
Best serves the community as a whole and is important to the welfare of everyone, not just some members.
What are the 4 categories of ethical issues
1. Privacy issues
2.Accuracy issues
3.Property issues
4. Accessibility issues
what are privacy issues
involve collecting, storing, and disseminating information about individuals.
what are accuracy issues
involve the authenticity, fidelity, and accuracy of information that is collected and processed.
what are property issues
involve the ownership and value of information.
what are accessibility issues
revolve around who should have access to information and whether they should have to pay for this access.
What is the conflict between free speech and privacy?
- Easy to be anonymous and derogatory with no basis of fact and no recourse;
- companies can check the Internet for potential and current employees,
- people may not be able to defend themselves.
what are threats?
Any danger to which a system/information resource may be exposed.
what is exposure?
Is the harm, loss, or damage that can result if a threat compromises an information resource.
what is Vulnerability?
Is the possibility that the system/information resource will suffer harm by a threat?
what is risk?
Is the likelihood that a threat will occur.
what are the two threats to information systems?
unintentional and Deliberate threats.
what types of unintentional errors are there?
- Human errors
-Social engineering
what are the common human errors
Carelessness with laptops
• Carelessness with computing devices
• Opening questionable e-mail
• Careless Internet surfing
• Poor password selection and use
• Carelessness with one's office
• Carelessness using unmanaged devices
• Carelessness with discarded equipment
• Careless monitoring of environmental hazards
what is social engineering
An attack where the attacker uses social skills to trick a legitimate employee into providing confidential company information such as passwords. Social engineering is a typically unintentional human error on the part of an employee, but it
is the result of a deliberate action on the part of an attacker.
what are deliberate threats?
• Espionage or trespass
- Competitive intelligence consists of legal information-gathering techniques. Espionage crosses the legal boundary.
• Information extortion
• Sabotage or vandalism
• Theft of equipment or information
what are the 5 Information security controls
• Physical Controls
• Access Controls
• Communication Controls
• Business Continuity Planning
• Information Systems Auditing
What are physical controls?
Physical protection of computer facilities and resources.
What are access controls?
Restriction of unauthorized user access to computer resources; use biometrics and password controls for user identification.
what is communications (network) control?
To protect the movement of data across networks and include border security controls, authentication, and authorization.
what are the benefits of being an informed user?
- Understanding what's behind apps
• Able to enhance the quality of the organization's apps
• Able to help recommend or even select IT apps for the organization
• understand how using IT can improve your organization's performance and teamwork and your productivity