Business Information Systems

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/108

flashcard set

Earn XP

Description and Tags

Business

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

109 Terms

1
New cards

Information Age

The present time, during which infinite quantities of facts are widely available to anyone who can use a computer.

2
New cards

Internet of Things (IoT)

A world where interconnected internet-enabled devices or “things” have the ability to collect and share data without human intervention.

EX. a manufacturer can use IoT sensors to monitor production line performance, look for improvements, and reduce down time.

3
New cards

Machine to Machine (M2M)

Refers to devices that connect directly to other devices.

4
New cards

Telecommuting

using communication technology to work in a place other than a central location.

EX. working from a hotel. most everyone can except service industry, manual jobs.

5
New cards

Data

Raw facts that describe the characteristics of an event or object.

Is the smallest or least complex.

Is considered the input of the system.

6
New cards

Information

data converted into a meaningful and useful context.

computers need data, humans need information.

7
New cards

Business Intelligence

Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyze patterns, trends, and relationships for strategic decision-making.

8
New cards

Knowledge

making meaning of the business intelligence.

skills, experience, and expertise coupled with information and intelligence that creates a person’s intellectual resources.

is the most complex of the core drivers of the information age.

9
New cards

Knowledge Worker

individuals who are valued for their ability to interpret and analyze information.

10
New cards

Systems Thinking

Way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part.

The output is not the product itself, just the information.

EX.

inputs → lettuce, tomatoes, patty, bun

process → cook the patty/ ingredients together

output→ hamburger

11
New cards

Management Information Systems (MIS)

a business function, like accounting or HR, which moves information about people, products, and processes across the company to facilitate decision-making and problem-solving.

12
New cards

Information Technology

any computer-based tool that people use to work with information and support the information and information processing needs of an organization.

13
New cards

Hardware

consists of the physical devices associated with a computer system.

physical.

5 C’s:

Create → CPU (Intel, Pentium)

Capture → Input (mouse, keyboard)

Convey → Output (monitor, printer, headphones)

Cradle → Storage ( hard drive, memory stick)

Communicate → (cable modem)

14
New cards

Software

the set of instructions the hardware executes to carry out specific tasks.

Application Software → apps, performs specific information processing needs (Microsoft word)

System Software: controls how the various tools work together along with the application software.

Operating system Software → (windows)

Utility software → (antivirus, data recovery)

15
New cards

Competitive Advantage

a product or service that an organization’s customers place a greater value on than similar offerings from a competitor.

16
New cards

SWOT Analysis

evaluates an organization’s strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies.

17
New cards

Porter’s Five Forces Model

Analyzes competitive forces within the company environment to assess the potential for profitability in an industry. Where profitability exists, invest in I.T.

who is the consumer? who are the rivals?

if forces are strong => increase competition

if forces are weak => decrease competition

18
New cards

Three Generic Strategies

Business strategies that are neither organization or industry specific and can be applied to any business, product, or service. Helps to formulate a strategy for entering the industry. industry-specific

looking at the market and cost to see where to invest in.

19
New cards

Value Chain Analysis

views a firm as a series of business processes that each add value to the product or service.

looking where the value is by breaking everything down.

20
New cards

Online Analytical Processing (OLAP)

Manipulation of information to support decision making.

Systems that use it are; MIS, DSS, AI, EIS

21
New cards

Online Transaction Processing (OLTP)

gather transaction information, process information, and update existing information to reflect the gathered and processed transaction information.

EX. calculated grade

systems that use it are; TPS and CIS

22
New cards

Transaction Processing System (TPS)

Process transactions w/ an organization

EX. payroll, accounts receivable, inventory

OLTP

23
New cards

Customer Integrated System (CIS)

Customer processes own transaction. Empowers the customer.

EX. ATM, airport kiosk,

OLTP

24
New cards

Management Information Systems (MIS)

Produce pre-determined reports.

Types:

Periodic - produced on a pre-determined time interval i.e. monthly statement

Summarized - aggregate information, i.e. district, state, or country

Exception - show a subset of information based on selection criteria. i.e. when accidents occur in a manufacturing plant

Comparative - show two or more sets of similar information to illustrate a relationship, a vs b

Ad hoc - generated whenever wanted, opposite of periodic. i.e. class roster.

OLAP

25
New cards

Workgroup Support System (WSS)

Designed to improve the performance of teams by supporting the sharing and flow of information

Both OLTP and OLAP

Groupware: core of WSS

team dynamic: group scheduling, electronic meeting, videoconferencing, software

document management - group document database

application development

26
New cards

Decision Support System (DSS)

Supports decision making

OLAP

EX. Excel, GIS

27
New cards

Artificial Intelligence (AI)

Science of making machine imitate human thinking and behavior

OLAP

28
New cards

Executive Information System (EIS)

Combines DSS and AI to help managers with problems/opportunities. Provides drill down capabilitie.

OLAP

29
New cards

Integration

Allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems.

Application integration → integration of a company’s existing management information systems

Data integration → integration of data from multiple sources, which provides a unified view of all data

Forward integration → sends information entered into a given system automatically to all downstream systems and processes

Backward integration → sends information entered into a given system automatically to all upstream systems and processes

30
New cards

Enterprise System

Provide enterprise-wide support and data access for a firm’s operations and business processes.

31
New cards

Middleware

Several different types of software sit between and provide connectivity for 2 or more software applications.

A piece of software that sits between two software applications and acts as the communication link. Think of it like a translator for two people who don’t speak the same language.

32
New cards

Integration Tools

Supply Chain Management (SCM) - The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and profitability.

3D Printing

RFID (Radio Frequency Identification)

Drones

Robotics

33
New cards

Customer Relationship Management System (CRM)

Involves managing all aspects of a customer relationship with an organization to increase customer loyalty and retention and an organization’s profitability.

Understanding behaviors.

Understanding wants and needs of customers

Benefits→ Recency, Frequency, Monetary (RFM)

34
New cards

Enterprise Resource Planning System (ERP)

Integrates all departments and functions throughout an organization into a single IT system so that employees can make enterprise-wide decisions by viewing enterprise-wide information on all business operations.

Integrates management, accounting, finance, HRM, PM, inventory management, etc.

Benefits → logical solution to incompatible applications; addresses global information and sharing and reporting, avoids the pain and expense of fixing legacy systems.

Collects data from across an organization and correlates the data generating an enterprise wide view.

35
New cards

Moral

Personal Character

Facts

Social conventions

Vary by age, cultural group

EX nursing homes

36
New cards

Ethic

Social system in which morals apply

Principles and standards that guide our behavior towards other people

Beliefs regarding right and wrong

influenced by family, religion, education, etc

EX lost and found box

37
New cards

Law

Legislated by governing body

38
New cards

Rights to Information - Mason 1986

Privacy

Accuracy

Property

Accesss

39
New cards

Privacy

concerned with what information an individual should have to reveal to others through the course of employment or through other transactions such as online shopping.

40
New cards

Accuracy

concerned with the authenticity and fidelity of information, as well as identifying who is responsible for informational errors that harm people.

41
New cards

Property

focuses on who owns information about individuals and how information can be sold and exchanged

42
New cards

Access

focuses on defining what information a person or organization has the right to obtain about others and how this information can be accessed and used.

43
New cards

Information Ethics

Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.

44
New cards

Intellectual property

intangible creative works that is embodied in a physical form; more valuable than the actual physical form

45
New cards

Copyright

legal protection afforded an expression of an idea, such as a song, video game, etc.

46
New cards

Fair Use Doctrine

exception of copyright law, may use copyrighted material in certain situations.

47
New cards

Pirated Software

unauthorized use, duplication, distribution, or sale of copyrighted software

48
New cards

counterfeit software

software manufactured to look like the real thing

49
New cards

Ethical Computer Use Policy

Contains general principles to guide computer user behavior ; issues since employees can BYOD.

ensures all users are informed of the rules and, by agreeing to use the system on that basis. also ensures that all user consent to abide by the rules.

50
New cards

Information privacy policy

contains general principle regarding information privacy

51
New cards

Acceptable use Policy

Requires a user to agree to follow it to be provided access to corporate email, information systems and the internet

52
New cards

Email privacy policy

details the extent to which email messages may be read by other.

53
New cards

Social media policy

outlines the corporate guidelines or principles governing employee online communications

54
New cards

Workplace IT Monitoring Policy

Tracks people activities by such measures as number of keystrokes, error rate, and number of transactions processed.

55
New cards

Employee Monitoring Policy

Explicitly state how, when, and where the company monitors its employees

56
New cards

Spam

unsolicited email

57
New cards

keylogger software

a program that records every keystroke and mouse click, such as email, instant messages, chat rooms, websites visited

58
New cards

Hardware keylogger

hardware device that captures keystrokes

59
New cards

Cookie

a small file that contains information about you and your Web activities, which websites you visit, and helps with IDs and passwords

60
New cards

Web Log

one line of information for every visitor to a website

61
New cards

Clickstream

records information about you during a web session such as websites visited , how long the visit was, etc; more than one line per visitor is recorded

62
New cards

Hacker

Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge

63
New cards

Black-hat hackers

break into other people’s computer systems and may just look around or may steal and destroy information.

64
New cards

Cracker

a hacker with criminal intent

65
New cards

Cyberterrorist

seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction

66
New cards

Hactivist

have a philosophical and political reason for breaking into systems and will often deface the website as a protest

67
New cards

White-hat hacker

work at the request of the system owners to find systems vulnerabilities and plug the holes

68
New cards

Virus

software written with malicious intent to cause annoyance of damage

69
New cards

Adware

software that, although purporting to serve some useful function and ofen fulfilling that function, also allows internet advertisers to display advertisements without the consent of the computer user

70
New cards

Malware

software that is intended to damage or disable computers

71
New cards

Ransomware

form of malicious software that infects your computer and asks for money

72
New cards

Scareware

a type of malware designed to tricl victims into giving up personal information to purchase or download useless and potentially dangerous software

73
New cards

Spyware

special class of adware that collects data about the user and transmits it over the internet without the users knowledge or permission

74
New cards

Worm

a type of virus that spreads itself, not only from file to file, but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, in order to spread. Worms do no need to attach to anything to spread and can tunnel themselves into computer

75
New cards

Backdoor program

viruses that open a way into the network for future attacks

76
New cards

Denial of service attack (DoS)

floods a website with so many request for service that it slows down or crashes the site

77
New cards

Trojan horse virus

hides inside other software, usually as an attachment or a downloadable file

78
New cards

Insiders

legitimate users who purposely or accidently misuse their access

79
New cards

Social Engineering

hackers use their social skills to trick people into revealing access credentials

80
New cards

Dumpster diving

looking through peoples trash

81
New cards

Pretexting

form of social engineering where one lies to obtain confidential data about another

82
New cards

Identity theft

the forging of someones identity for the purpose of fraud

83
New cards

Phishing

a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email

84
New cards

Pharming

reroutes requests for legitimate websites to false websites.

85
New cards

Biometrics

system that captures and stores characteristics like fingerprints, facial recognition,

86
New cards

Content Filtering

prevents emails containing sensitive information from transmitting and stops spam and viruses from spreading

87
New cards

Encryption

scrambles information so much decrypt when received

88
New cards

Firewalls

hardware and/or software that guards a private network by analyzing the information leaving and entering the network

89
New cards

Phases of Decision Making

Problem Identification → define problem clearly

Data Collection → gather related data, who, what, where, why, how, when

Solution Generation → detail all solutions even farfetched ones

Solution Test → evaluate in terms of feasibility, suitability, and acceptability

Solution Selection → select what best solve the problem and meets businesses needs

Solution Implementation→ correct = solved problem; incorrect = problem persist, start process again

90
New cards

Structured Decision

situations where established processes offer potential solutions.

computer could solve it

EX gross pay

91
New cards

Semi-structure Decision

happens in situations where a few established processes help evaluate potential solutions, not enough to be a definite reccommended decision

computer can help but not solve

EX budgeting to different departments

92
New cards

Unstructured/nonstructured Decision

happens in situations where no procedures or rules exist to guide in making the correct decision

EX where to go to school, offering a new product line

93
New cards

Recurring Decision

repeating or periodically repeating

EX payroll, accounts receivable,

94
New cards

Nonrecurring Decision

Ad hoc decision

infrequently

EX company merger, location decision

95
New cards

Critical Success Factor (CSF)

the crucial steps companies make to perform to achieve their goals and objectives and implement strategies

96
New cards

Key Performance Indicator (KPI)

the quantifiable metrics a company uses to evaluate progress towards critical success factors; they are measurable

97
New cards

Efficiency MIS Metrics

Measures the performance of MIS itself, like throughput, transaction speed, and system availability

98
New cards

Effectiveness MIS Metrics

measures the impact MIS has on business processes and activities, including customer satisfaction and customer conversation rates

99
New cards

Decision Support System (DSS)

Models information to support managers and business professionals during the decisionmaking process

assist in decision making

for semi and unstructured decisions

100
New cards

Model Management Component

store and access models