1/17
These flashcards cover key concepts from the Management Information Systems lecture notes, including definitions, differentiations, ethical frameworks, and technological components.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
What is the primary purpose of information systems in organizations?
Information systems collect, process, store, analyze, and disseminate information for a specific purpose.
What are the key characteristics that differentiate Big Data from traditional data?
Big Data is characterized by volume, velocity, and variety.
What role do ethical frameworks, such as the utilitarian approach, serve in decision-making?
Ethical frameworks guide decision-making by evaluating the outcomes and ethical implications of potential actions.
What are the primary components of a computer-based information system (CBIS)?
The primary components include hardware, software, databases, networks, and procedures.
What are the major threats to information security?
Major threats include unintentional threats like human error, and deliberate threats such as espionage, identity theft, and software attacks.
What is the difference between explicit knowledge and tacit knowledge?
Explicit knowledge is documented and easily shared, while tacit knowledge is personal, experiential, and more challenging to transfer.
What is the importance of business intelligence (BI) for decision making?
BI helps organizations analyze data to make informed decisions and improve performance.
How does a data warehouse differ from a data mart?
A data warehouse is a centralized repository of data for analysis and decision support, while a data mart is a subset designed for a specific business area.
What are the roles of physical controls in information security?
Physical controls prevent unauthorized access to company facilities and protect physical assets against theft or damage.
What does the term 'access controls' refer to in the context of information security?
Access controls restrict unauthorized individuals from using information resources by confirming user identity and defining user privileges.
What are some common applications of data mining in business?
Data mining can predict trends, identify patterns, forecast sales, detect fraud, and optimize operations.
How has the role of IT changed regarding employee productivity?
IT has changed the manner in which managers make decisions and can lead to fewer managerial levels, impacting job roles and organizational structure.
What is the significance of user education in information security?
User education is the most valuable control, as it raises awareness of security importance and effective practices among all employees.
What is the definition of ethical decision making?
Ethical decision making involves recognizing ethical issues, gathering facts, evaluating alternatives, making decisions, and reflecting on outcomes.
What is a decision support system (DSS)?
DSS is a computer-based system that combines data and models to assist with semistructured and unstructured decision-making.
What advantages do geographic information systems (GIS) provide?
GIS allows for capturing, integrating, manipulating, and displaying data using maps, facilitating better planning and decision-making.
What ethical issues arise from electronic surveillance?
Electronic surveillance raises privacy concerns regarding the monitoring of employee activities, potential misuse of data, and invasion of personal privacy.
What are the characteristics of effective knowledge management systems (KMSs)?
KMSs integrate explicit and tacit knowledge to improve access to best practices, enhance organizational performance, and promote knowledge sharing.