1/92
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Batch processing system
business transactions accumulated over period of time & prepared for processing as one unit/batch, delay btw event & processing of transactions
online transaction processing (OLTP)
each transaction processed immediately, often seen as more efficient
enterprise system
central to individuals & org., info can be shared across all business functions/levels of management
enterprise resource planning (ERP)
set of integrated programs that manage a company’s vital business operations for an entire organization
business process
set of coordinated activities that takes 1 or more kinds of input to create an output value to the customer of that process
supply chain management
system includes planning, executing, controlling all activities involved in: sources raw materials, converting raw to finished products, delivering finished product
process for developing production plan
sales forecasting
sales and operations plan (S&OP)
demand management
detailed scheduling
materials requirement planning (MRP)
purchasing
production
sales ordering
customer relationship management (CRM)
helps company manage all aspects of customer encounters, to understand/ anticipate needs of customers, used mostly in sales/marketing
key features of CRM system
contact management
sales management
customer support
marketing automation
analysis
social networking
access by mobile devices
import contact data
Product lifecycle management (PLM)
creates common repository of product info/processes (Supports collaborative creation/management)
Types of software:
computer aided design
computer aided engineering
computer aided manufacturing
Types of manufacturing
discrete manufacturing
process manufacturing
computer-aided design
use of software to assist in creation, analysis, and modification of design of a product/comoponent
computer aided engineering
software use to analyze robustness & performance of components and assemblies
computer aided manufacturing
software use to control tools/machinery in manufacturing of components & products
discrete manufacturing
production of distinct items (ex: cars, airplanes, toys, furniture) that can be decomposed into basic components
process manufacturing
production of products that’s result of chemical process and can’t be easily decomposed into basic components ex) gas, medicines
how to avoid failed implementation
assign full-time exec. to manage
appoint experienced/independent resource for project oversight
allow time for transition
put enough time & $ for training
define metrics to assess project progress
keep project scope defined
be wary of modifying enterprise system software to conform to business practices
Vision systems
hardware and software allowing computers to capture/store/manipulate visual images & pictures ex) Augmented reality in medical
ai in jobs
introduced to new industries/applications rapidly, growth of AI could create up to 58 mil jobs by 2022
natural language processing
computer understanding, analyzing, manipulating, and generating natural language for processing, widely used in search engines
brain computer interface
tech interacts w human’s brain and translates info (thoughts) into activity (actions), used in medical field and DARPA
industrial robots
designed for speed, accuracy, and safety (size/look dependent on use), ex) Cartesian robot, SCARA robots, articulated robot)
cartesian robot
take up smaller space (footprint), move in straight lines, commonly used for 3D printing
Selective Compliance Assembly Robot Arm (SCARA)
easier to integrate into complex printing designs, both lateral & rotary movement, faster than cartesians, often used in biomedical field
Articulated robot
made to function like an arm, may have 10 or more rotary joints can move like elbow and twist, often used in industrial manufacturing settings (automotive lines) bc quick & precise
strategic planning
gives framework/direction for decision making, ensures effective use of resources (focus on key priorities), allows organization to be proactive & take advantage of trends, gives measures for judging performance, improves communication
Michael porter’s 5 forces model
most frequently used model for assessing competition
strengths, weaknesses, opportunities, threats (SWOT) matrix
used to analyze org. internal assessment and study of its external environment
technology acceptance model (TAM)
specifies the factors that can lead to better attitudes about the use of new info system & higher acceptance & usage
Diffusion of innovation theory
developed by EM rogers to explain how new idea/product gains acceptance and diffuses through a specific pop. or subset of org.- adoption of innovation is a drawn-out process, some quicker than others
scope
which tasks are included and which aren’t in a project
cost
all capital, expenses, internal cross-charges associated w project’s buildings, operation, maintenance, and support
time
frequently a critical constraint, often projects must be met certain date
quality
degree to which project meets the needs of its users
user expectations
stakeholders will form expectations about how project will be conducted and how it will affect them
schedule management
develop workable schedule
ensure timely completion of project
identify specific tasks
sequence tasks
estimate resources needed
estimate elapsed time to finish each task
analyze data to create project schedule
controlling & managing changes
gantt chart
graphical tool used for planning, monitoring, and coordinating projects, is a grid listing activities and deadlines
work breakdown structure (WBS)
outline of work to be done to complete the project
project resource management
activities designed to identify, acquire, and manage resources for a project
Forming-Storming-Norming-Performing-Adjourning model
Forming-Storming-Norming-Performing-Adjourning model
useful model to describe how teams develop & evolve
Subscribe
+software more cost-effective for small projects & temporary needs, updates completed by vendor, technical support available 24/7
- offered as is, not able to be modified to match needs, recurring licensing costs
buy
+ acquired & deployed relatively quickly, can “test drive” software before buying
- unmodified software may not be good match to org. needs, maintenance & support costs can be excessive
build your own IS
+ better match to org. needs, potential to achieve competitive advantage
- cost to build can be high compared to purchasing off-shelf, can take months to years to deploy
system development
set of activities involved in building info systems to meet users needs, projects can range from small to large and conducted in diverse fields
waterfall system development
sequential/multistage system process, next stage can’t start until results of current stage approved,
1) investigation, 2) analysis, 3) design, 4) construction, 5) integration/testing 6) implementation
system investigation
to gain a clear understanding of specifics of problem to solve or opportunity to address
1) review systems investigation request
2) identify/recruit team leader & members
3) develop budget/schedule for investigation
4) perform investigation (joint application development, functional decomposition)
5) perform preliminary feasibility analysis
6) prepare draft of investigation report
7) review results of investigation with steering team
agile development
develops system in “sprint” increments lasting 2 weeks- 2 months, concentrates on maxing team’s ability to deliver quickly/ respond to emerging requirements, uses scrum
scrum
method to keep agile system development effort focused & moving quickly, the master coordinates all activities
people
the most important element of information systems
employee requirements for success
training & an understanding of need for info system, motivation to use the info system, access to system support ppl as needed
technology infrastructure
hardware, software, databases, networks, facilities, 3rd party services, required to meet customers’/suppliers’/key business partners’/ regulatory agencies/ employees’ needs, forms foundation of every computer-based info system
processes:
structured set of related activities, takes input, adds value, creates output
procedure
steps to follow to achieve a specific end result, how to achieve end result, who does what when, what to do if something goes wrong
structure
defines relationships btwn org members, defines roles/responsibilities/lines of authority, employees must understand/accept their roles/responsibilities, roles/responsibilities often change w introduction of new info system
types of info systems
personal IS, workgroup IS, enterprise IS, interorganizational IS
personal information system
improves productivity of individual users in performing stand-alone tasks
workgroup information system
enables ppl to work together effectively
enterprise information system
facilitates org-wide business needs
interorganizational information system
enables sharing of info across org boundaries
advanced persistent threat
network attack where intruder gets access to network and stays undetected to steal data over long-period of time
blended threat
sophisticated threat combining features of a virus, worm, trojan horse, and other malicious code into single payload
phishing
act of fraudulently using email to get recipient to reveal personal data
rootkit
set of programs allowing user to gain administrator level access to computer w/out end users consent/knowledge, attacker can gain full control of system and hide its presence
smishing
variation of phishing using text
social engineering
use of deception to trick ppl into divulging data needed to gain access to an info system or network
spam
use of email systems to send unsolicited email to large #’s of ppl
trojan horse
seemingly harmless program where malicious code is hidden, victim is usually tricked into opening bc it looks like useful software from a verified source
virus
piece of programming code, usually disguised as something else, causes computer to behave in unexpected and usually undesirable manner
vishing
similar to smishing but victims receive voice mail message telling them to call a # or go to a website
worm
harmful program residing in active memory of computer and duplicates itself, diff from virus bc can recreate w/out human intervention, often sending copies of themselves to other computers through email
CIA security triad
confidentiality, integrity, availability, layered security solution design to make cyberattacks hard
implementing CIA at network level
authentication methods & encryption
authentication methods
3 types: know/ possess/ or are, 2-factor authorization, biometric authentication
biometric authentication
physiological/behavioral measurements used, requires reference model of unique characteristics stored digitally
encryption
scramble messages or data, only authorized parties can read data, requires encryption key to read
encryption key
value applied to plaintext to product cipher text, required to decipher cipher text
advanced encryption standard (AES)
common symmetric algorithm, used by the WPA2 security protocol
server virtualization
logically dividing a single physical server’s resources to create multiple logical servers, virtual machine acts as it’s own dedicated machine, allows running multiple operating systems
hypervisor
virtual server program controlling host processor and resources, allocating necessary resources to each virtual machine, ensuring they don’t disrupt eachother
software as a service (SaaS)
3rd party provider hosts applications, available to subscribers over internet
+ available from any device, SaaS provider handles upgrades/patches, lower cost software licensing, provider manages service levels and availability
DBMS function
interface btwn application program and database, must request database data through this
concurrency control
addresses situation where 2 or more users/applications access the same record at same time
SQL
special-purpose programming language, used for accessing and manipulating relational database data, conform to ACID properties
ACID properties
atomicity, consistency, isolation, durability, guarantees database transactions are processed reliably, ensures integrity of data in the database
big data
enormous (terabytes or more), complex (sensor to social media data), traditional processes incapable of dealing with them, key characteristics:
1) volume
2) velocity
3) value
4) variety
5) veracity
client/server architecture
many clients request/receive services from servers on the network
domain name system (DNS)
maps name ppl use to locate a website to the IP address that a computer uses to locate a website
uniform resource locator (URL)
web address specifying exact location of a web page using letters & words that map to an IP address and a location on the host
Internet of Things
network of physical objects, embedded w sensors, processors, software, and network connectivity capability
sensor
device capable of sensing something about its surroundings ex) pressure, temp, humidity, pH level, motion, vibration, light
business benefits of IoT
reduce costs to achieve a competitive advantage, deepen org. understanding of consumer preferences/behaviors, improve customer service/experience, improve workplace safety
authentication technologies
used by many org to confirm identity of a user requesting access
digital certificate
attachment to an e-mail message or data embedded in a website that verifies the identity of a sender or website
certificate authority (CA)
trusted third-party org. or company that issues digital certificates