IS300 Exam 1 Review: god pray for me pls

0.0(0)
studied byStudied by 1 person
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/52

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

53 Terms

1
New cards

What is an ERP

enterprise resource planning system: Provide communication among functional area ISs (information systems)

2
New cards

Data

Data are raw facts and figures. It does not have any meaning until it is processed and turned into something useful. Data comes in many forms, the main ones being letters, numbers, and symbols but also images and sounds.

3
New cards

Information

Information is data that has been processed by the computer (in a context) to give it meaning.

4
New cards

Knowledge

Knowledge is derived from information by applying rules to it. You use knowledge to make decisions.

5
New cards

Wisdom

The ability or result of an ability to think and act utilizing knowledge, experience, understanding, common sense, and insight.

6
New cards

IT Infrastructure consists of?

Consists of IT services, IT personnel, and IT components.

7
New cards

What two information systems support the entire organization?

1. Enterprise resource planning (ERP) systems
2.Transaction processing systems (TPS)

8
New cards

Informed User

A person knowledgeable about information systems and information technology.

9
New cards

What is an TPS

Transaction processing systems: Support the "real-time" monitoring, collection, storage, and processing of data from the organization's day-to-day operations

10
New cards

What are the six basic components of computer based information?

1. Hardware
2. Software
3. Database
4. Network
5. Procedures
6. People
(IT, information tech consists of first 4 in basic components)

11
New cards

What is Social Engineering?

- Involves the use of social skills to manipulate people to garner information they would normally not disclose.
- It can also be defined as an art of deception.

12
New cards

The social engineering process preys upon two common characteristic traits?

- Acceptance of authority
- Willingness to cooperate with other

13
New cards

What is Digital Transformation?

- A business strategy initiative that incorporates digital technology across all areas of an organization.
- It evaluates and modernizes an organization's processes, products, operations, and technology stack to enable continual, rapid, customer-driven innovation.

14
New cards

Why is managing information resources difficult and complex?

• IS has an enormous strategic value to organizations
• ISs are very expensive to acquire, operate, and maintain
• Evolution of the MIS function within the organization
• MIS personnel vs. end users
• Changing role of the IS department
• The traditional function of the MIS department
• New (consultative) functions of the MIS department

15
New cards

What is customer satisfaction?

Customer satisfaction is a measure of expectations being exceeded, met, or not met.

16
New cards

When thinking of customer satisfaction measurement what do we want?

we want to know that we are meeting or exceeding customer expectations

17
New cards

What is BPI?

Business Process Improvement is an incremental approach to move an organization toward business process-centered operations. It focuses on reducing variation in process outputs by identifying the underlying cause of the variation.

18
New cards

What is the order of BPI phases

1. Define
2. Measure
3. Analyze
4. Improve
5. Control

19
New cards

What is BPM?

Management approach focused on aligning all aspects of an organization with the wants and needs of clients. BPM begins with process modeling which is a graphical depiction of all of the steps in a process.

20
New cards

What is electronic commerce?

describes the buying, selling, transferring, or exchanging of products, services, or information via computer networks, including the Internet.

21
New cards

What is electronic business?

is a broader definition of EC (Electronic Commerce), including buying and selling goods and services, and also servicing customers, collaborating with partners, conducting e-learning, and conducting electronic transactions within an organization.

22
New cards

What is competitive advantage?

Competitive advantage implies gaining the edge over others
- using resources and capabilities.

23
New cards

What is competitive strategy

Consist of business approaches to:
• Attract customers by fulfilling their expectations
• Withstand competitive pressure
• Strengthen market positions

24
New cards

What are integrated supply chains?

A supply chain is considered integrated when the different operations are performed in it.
EX: raw materials procurement, product design, manufacturing, warehousing, and distribution - are coordinated

25
New cards

What are porters competitive forces model?

1. Threat of entry of new competitors
2. Bargaining power of suppliers
3. Bargaining power of customers/buyers
4. Threat of substitute products or services
5. Rivalry among existing firms within the industry

26
New cards

5 strategies for competitive advantage.

1. cost leader - EX: "I can sell at a lower price than you"
2. innovation - EX: "I'm doing something new and you can't catch up."
3. Differentiation - EX: "I am better because I am different."
4. Operational Effectiveness - EX: "I can do the same thing more efficiently than you can."
5. Customer Oriented- EX: "I treat my customers better than you do."

27
New cards

What is ethics

Ethics examines the rational justification for our moral judgments; it studies what is morally right or wrong, just or unjust.

28
New cards

What is privacy

Privacy is a fundamental human right that underpins freedom of association, thought, and expression, as well as freedom from discrimination.

29
New cards

What are the 4 widely used ethical standards

1. The utilitarian approach
2. The rights approach
3. Fairness Approach
4. The common good approach

30
New cards

what is the utilitarian approach

Provides the most good or does the least harm.

31
New cards

what is the rights approach

Best protects and respects the moral rights of the affected parties.

32
New cards

what is the fairness approach

Treats all humans equally, or if unequally, then fairly, based on some defensible standard.

33
New cards

what is the common good approach

Best serves the community as a whole and is important to the welfare of everyone, not just some members.

34
New cards

What are the 4 categories of ethical issues

1. Privacy issues
2.Accuracy issues
3.Property issues
4. Accessibility issues

35
New cards

what are privacy issues

involve collecting, storing, and disseminating information about individuals.

36
New cards

what are accuracy issues

involve the authenticity, fidelity, and accuracy of information that is collected and processed.

37
New cards

what are property issues

involve the ownership and value of information.

38
New cards

what are accessibility issues

revolve around who should have access to information and whether they should have to pay for this access.

39
New cards

What is the conflict between free speech and privacy?

- Easy to be anonymous and derogatory with no basis of fact and no recourse;
- companies can check the Internet for potential and current employees,
- people may not be able to defend themselves.

40
New cards

what are threats?

Any danger to which a system/information resource may be exposed.

41
New cards

what is exposure?

Is the harm, loss, or damage that can result if a threat compromises an information resource.

42
New cards

what is Vulnerability?

Is the possibility that the system/information resource will suffer harm by a threat?

43
New cards

what is risk?

Is the likelihood that a threat will occur.

44
New cards

what are the two threats to information systems?

unintentional and Deliberate threats.

45
New cards

what types of unintentional errors are there?

- Human errors
-Social engineering

46
New cards

what are the common human errors

Carelessness with laptops
• Carelessness with computing devices
• Opening questionable e-mail
• Careless Internet surfing
• Poor password selection and use
• Carelessness with one's office
• Carelessness using unmanaged devices
• Carelessness with discarded equipment
• Careless monitoring of environmental hazards

47
New cards

what is social engineering

An attack where the attacker uses social skills to trick a legitimate employee into providing confidential company information such as passwords. Social engineering is a typically unintentional human error on the part of an employee, but it
is the result of a deliberate action on the part of an attacker.

48
New cards

what are deliberate threats?

• Espionage or trespass
- Competitive intelligence consists of legal information-gathering techniques. Espionage crosses the legal boundary.
• Information extortion
• Sabotage or vandalism
• Theft of equipment or information

49
New cards

what are the 5 Information security controls

• Physical Controls
• Access Controls
• Communication Controls
• Business Continuity Planning
• Information Systems Auditing

50
New cards

What are physical controls?

Physical protection of computer facilities and resources.

51
New cards

What are access controls?

Restriction of unauthorized user access to computer resources; use biometrics and password controls for user identification.

52
New cards

what is communications (network) control?

To protect the movement of data across networks and include border security controls, authentication, and authorization.

53
New cards

what are the benefits of being an informed user?

- Understanding what's behind apps
• Able to enhance the quality of the organization's apps
• Able to help recommend or even select IT apps for the organization
• understand how using IT can improve your organization's performance and teamwork and your productivity