IS 130 Exam #1

0.0(0)
studied byStudied by 3 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:21 PM on 9/19/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

100 Terms

1
New cards

1. Why should you study Information Systems?

-Offers career opportunities

-Manages Info resources

2
New cards

What do we mean by the "informed you?"

1. Understand, what is "behind" IT applications

2. Provide valuable input

3. Recommend/help select applications

4. Aware of new technology

5. Understand how IT improves performance and is beneficial

3
New cards

What careers are available in Information Systems?

1. Programers

2. Chief Info. Officers

3. Based on Location

4
New cards

Difference between IT and Information Systems?

1. IT is the computer-based tool that people use to work with info. and to support the info

2. IS collects, processes, stores, analyzes, and disseminates info.

5
New cards

Why is it difficult to manage information resources?

1. IS is very expensive to acquire, operate , maintain

2. Evolution of the MIS function

6
New cards

What's data, information, knowledge, computer-based information system?

Raw #'s or anything that doesn't have a meaning

7
New cards

What is information?

Data that has been processed and organized

8
New cards

What is knowledge?

Is the info that has been processed and has an understanding

9
New cards

What is a computer-based information system?

Use computer technology to perform some or all of its intended tasks

10
New cards

What are the information technology components?

1. Hardware

2. Software

3. Database

4. Network

5. Procedures

6. People

11
New cards

Hardware

Devices such as keyboard, etc.

12
New cards

Software

Is a program or collection of programs that enable the hardware to process data.

13
New cards

Database

a collection of related files or tables containing data

14
New cards

Network

is a connecting system that permits different computers to share resources

15
New cards

Procedures

are the instructions for combining the above components to process information and generate the desired output.

16
New cards

People

Use the hardware and software

17
New cards

What are the types of computer-based information systems?

1. Transaction Processing System (TPS)

2. Enterprise Resource Planning (ERP)

3. Inter-organizational information systems (IOSe)

4. Business Intelligence Systems (BI)

5. Functional Area Info. Systems

6. Expert Systems

7. Dashboards

18
New cards

Transaction Processing Systems (TPS)

support the "real time" monitoring, collection, storage, and processing of data from the organizations day to day operations

19
New cards

Enterprise Resource Planning (ERP

provide communication among functions

20
New cards

Inter-organizational information systems (IOSe)

1. Supply Chain Management

2. Electronic Commerce

21
New cards

Business Intelligence Systems (BI)

for complex, non routine decisions, primarily for middle managers and knowledge works

22
New cards

Functional Area Info. Systems

summarize data and prepare reports primarily for middle managers, but sometimes for lower-level managers

23
New cards

Expert Systems (ES)

attempt to duplicate the work of human experts by applying reasoning capabilities, knowledge, and expertise within a specific domain

24
New cards

Dashboards (digital dashboards)

support all managers by providing rapid access to timely info./direct access

25
New cards

What industries get impacted by IT?

1. Book

2. Music

3. Video

26
New cards

How does IT impact organizations?

1. Reduces the # of middle managers

2. Changes managers jobs to be more productive

3. Eliminates Jobs

4. Impacts employees at work

5. Affects our quality of life

6. Impacts healthcare

27
New cards

What's information systems?

1. Operational Systems

2. Transactional Processing Systems

3. Coordinating the Transactions

4. E commerce

5. Database Management Systems

6. Decision Making and Business Intelligence

7. Collaboration and Knowledge Management

28
New cards

What's a business process?

an ongoing collection of related activities that create a product service of value to the organization, its business parts, and or its customers

29
New cards

What are the 3 elements of the business process

1. Inputs

2. Resources

3. Outputs

30
New cards

Describe cross-functional processes

multiple functional areas collaborate to perform the process

-Procurement: acquiring need material externally from vendors

-Fulfillment: processing customer orders

31
New cards

How does IS and business processes work together?

1. By executing the process

2. By capturing and storing process data

3. By monitoring process performance

32
New cards

How does IS play a role in executing the process, capturing and storing process data, monitoring process performance?

1. informs people when it is time to complete a task, provide data, provide the means to complete the task

2. captors and stores data through barcodes

3. checks time and whether its recieved

33
New cards

Business Process Reengineering

a radical redesign of a business process that improves its efficiency and effectiveness, often by beginning with a "clean sheet"

34
New cards

Business Process Improvement

focuses on reducing variation in the process outputs by searching for root causes of the variation in the process itself or among the process inputs

35
New cards

Business process management

a management system that includes methods and tools to support the process throughout the organization

36
New cards

What are business pressures

1. Business Environment

2. Market Pressure

37
New cards

Business Environment

the combination of social, legal, economic, physical, and political factors in which businesses conduct their operations

38
New cards

Market Pressures

generated by the global economy, intense competition, the changing nature of the workforce, and powerful customers

39
New cards

What are the market pressures?

1. Globalizations

2. Changing nature of the workforce

3. Powerful customers

40
New cards

Globalization

the integration and interdependence of economic, social, cultural, and ecological facets of life, enabled by rapid advances in information technology

41
New cards

Changing nature of the workforce

diversity and woman

42
New cards

Powerful Customers

more educated customers, online customer reviews, price comparison

43
New cards

Technology Pressures

1. Technological Innovation and Obsolescence

2. Information Overload

44
New cards

Technological Innovation/Obsolescence

rapid development of both new and substitute products and services

45
New cards

Societal/Political/Legal Pressures

-Social Responsibility

-Compliance with Government Regulations

-Protection against Terrorist Attacks

-Ethical Issues

46
New cards

Strategic Systems,

enable a company to increase market share/profits to better negotiate with suppliers/prevent competitors from entering market

47
New cards

Customer focus

provide superb customer service

48
New cards

Make-to-order

producing customized products

49
New cards

Mass customizations

producing large quantities and customizes them to individuals

50
New cards

What's Competitive Advantage?

using competitive strategy

51
New cards

Competitive Strategy

identities a business approach to complete; its goals, plans, and policies required to attain those goals

52
New cards

Strategic Information Systems

helps an organization either achieve a competitive advantage or reduce a competitive disadvantage

53
New cards

Porter's Competitive Forces Model

1. Threat of entry of new competitors

2. Bargaining Power suppliers

3. Bargaining Power of customers/buyers

4. Threat of substitute products/services

5. Rivalry among existing firms within the industry

54
New cards

Porter's Value Chain Model

1. Primary Actives

-Inbound Logistics (inputs)

-Operations (manufacturing and testing)

-Outbound logistics (storage/distribution)

-Marketing/Sales

-Services

2. Support Activities

-HR

-Legal

55
New cards

What are primary activities?

-Inbound Logistics (inputs)

-Operations (manufacturing and testing)

-Outbound logistics (storage/distribution)

-Marketing/Sales

-Services

56
New cards

What are support activities?

HR/Legal

57
New cards

Strategies for Competitive Advantage

Cost leadership, differentiation, innovation, operational effectiveness, customer orientation

58
New cards

What's business-information Technology Alignment?

tight integration of the IT function with the organization's strategy, mission, and goals

59
New cards

What's Ethics?

The principles of right and wrong that individuals use to make choices that guide their behavior

60
New cards

Utilitarian Approach

State that an ethical action is the one that provides the most good or does the least harm.

61
New cards

Rights Approach

maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties

62
New cards

Fairness Approach

ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard

63
New cards

Common Good Approach

respect and compassion for all others is the basis for ethical actions

64
New cards

Describe Ethics in the corporate environment

1. Code of Ethics

2. Fundamental Tenets of Ethics

65
New cards

Code of Ethics

a collection of principles intended to guide decision making by members of an organization

66
New cards

Fundamental Tenets of Ethics

1. Responsibility

2. Accountability

3. Liability

67
New cards

What is responsibility?

accept consequences of your decisions and actions

68
New cards

What is accountability?

determining who is responsible for actions that were taken

69
New cards

What is liability?

a legal concept that gives individuals the right to recover the damages done to them.

70
New cards

What role does ethics play in information technology?

1. Privacy Issues

2. Accuracy Issues

3. Property Issues

4. Accessibility Issues

71
New cards

Privacy Issues

collection, storing, and disseminating info. about individuals

72
New cards

Accuracy Issues

the authenticity, fidelity, and correctness of collected, processed info.

73
New cards

Property Issues

the ownership and value of information (property rights)

74
New cards

Accessibility Issues

Who should have the info.

75
New cards

Privacy

the right to be left alone and to be free of unreasonable personal intrusion

76
New cards

Information Privacy

the right to determine when, and to what extent, information about you can be gathered and/or communicated to others

77
New cards

Digital dossier

an electronic profile of you and your habits

78
New cards

Profiling

the process of forming a digital dossier

79
New cards

What's Electronic Surveillance?

Using technology to monitor individuals as they go about their daily routines

-Digital sensors

80
New cards

What are the concerns of our personal information in databases, on bulletin boards, social networking sites, etc.?

1. Do you know where the record are?

2. Are the records accurate?

3. Can you change inaccurate data?

4. How long will it take to make a change?

5. under what circumstances will the personal data be released

6. How are the data used?

7. To whom are the data given or sold?

8. How secure are the data against by unauthorized people?

81
New cards

Privacy Codes and Policies

an organization's guidelines for protecting the privacy of its customers, clients, and employees.

82
New cards

Opt-out model

allows company to collect personal information until the customer specifically requests otherwise.

83
New cards

Opt-in model

prohibits an organization from collecting any personal info. unless the customer specifically authorize it

84
New cards

Transborder data flow

flow of data among countries

85
New cards

Safe Harbor

Framework developed by the US to regulate the way the US companies export/handle personal data

86
New cards

Security

the degree of protection against criminal activity, danger, damage, or loss.

87
New cards

Information Security

all the processes and policies designed to protect an organization's info and IS from unauthorized access

88
New cards

Threat

any danger to which a system may be exposed

89
New cards

Exposure

the harm, loss, or damage that can result if a threat compromises an information resource

90
New cards

Vulnerability

the possibility that the system will be harmed by a threat

91
New cards

What are the five factors that contribute to the increasing vulnerability of organizational information resources making it difficult to secure.

1. Today's interconnected, interdependent, wirelessly environment

2. Smaller, faster, cheaper computers and storage devices

3. Decreasing skills necessary to be a computer hacker

4. International organized crime taking over cyber crime

5. Lack of management support

92
New cards

What are some unintentional threats to information systems?

1. Human Errors

2. Human Resources

3. Information Systems

93
New cards

Human Errors....

Higher level employees + greater access privileges = greater threat

94
New cards

Human Resources

Sensitive Data

95
New cards

Info systems

More access than HR

96
New cards

What are some human errors?

Lack of training, poor training, and lack of awareness

97
New cards

Define social engineering

an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company info.

98
New cards

What are some deliberate threats to information systems?

1. Espionage or Trespass

2. Info. Extortion

3. Sabotage or Vandalism

4. Theft of Equipment

5. Identity Theft

99
New cards

Be familiar with compromise to intellectual property

the property created by individuals or corporations that is protected under trade secret, patent, and copyright laws.

-Patent

-Copyright

-Trademarks

100
New cards

Viruses, worms phishing attacks, spear phishing attacks and dos are....

Software Attacks

Explore top flashcards