1/76
Intro Mgmt information systems Yvette Monistere SELU Fall 2025
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Ethics
Principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behavior.
Five Moral Dimensions of the Information Age
1. Information rights and obligations.
2. Property rights and obligations.
3. System quality.
4. Accountability and control.
5. Quality of life.
Privacy Definition
The claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state. It is also the claim to be able to control information about yourself.
What is the claim of individuals to be left alone, free from surveillance or interference
Privacy
Information Rights
Rights that individuals and organizations have with respect to the information that pertains to them.
Fair Information Practices (FIP)
A set of principles, not law, that most US and European privacy law is based on. They are based on the mutuality of interest between the record holder and the individual involved in a transaction.
What set of principles is the basis of most U.S. and European privacy laws?
Fair Information Practices (FIP)
Opt-out
A model of informed consent that permits the collection of personal information until the consumer specifically requests that the data not be collected.
What is the difference between the U.S. and E.U. practices regarding choice/consent?
The U.S. practices opt-out, which permits the collection of personal information until the consumer specifically requests the data not be collected. The European Union practices opt-in, which prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
Opt-in
A model of informed consent that prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
Safe harbor
A private self-regulating policy and enforcement mechanism that meets the objectives of government regulation but does not involve government regulation or enforcement.
GDPR
General Data Protection Regulation
General Data Protection Regulation (GDPR)
Legislation established in 2018 that applies to all firms and organizations that collect, store, or process personal information of EU citizens. Its protections apply worldwide regardless of where the processing of the transaction takes place.
What major privacy legislation was established in 2018 that applies to firms processing personal information of EU citizens worldwide?
The General Data Protection Regulation (GDPR)
What is an exclusive monopoly on the ideas behind an invention, typically for 20 years?
A patent.
What are the three principal sources of poor system performance?
Software bugs and errors, hardware or facility failures (caused by natural or other causes), and poor input data quality.
Intellectual property
Tangible and intangible products of the mind created by individuals or corporations.
What is the most common source of business system issues?
Poor data quality.
What is a private self-regulating policy and enforcement mechanism that meets the objectives of government regulation?
Safe harbor.
Copyright
Protects creators of certain types of intellectual property against copying by others for a certain period of time.
Patents
Grants the owner an exclusive monopoly on the ideas behind an invention for a certain period of time, typically 20 years.
Trademarks
Marks, symbols, or images used to distinguish a product in the marketplace.
Trade secrets
Any intellectual work product used for a business purpose, provided it is not based on information in the public domain.
The three principal sources of poor system performance are:
software bugs and errors, hardware or facility failures (caused by natural or other causes), and poor input data quality.
The most common source of business system issues is
poor data quality.
The digital divide
The disparity in access to computers and the Internet.
Computer crime
Generally defined as the commission of illegal acts through the use of a computer or against a computer system.
Computer abuse
The commission of acts involving a computer that may not be illegal but are considered unethical.
IT infrastructure
Comprises several components designed to work together in developing, controlling, and supporting a business's IT services.
The seven vital components of an IT infrastructure are
hardware platforms, enterprise and software platforms, operating system platforms, data storage management, network and telecommunication platforms, internet platforms, and customer and system integration services.
Hardware Platforms
A group of interconnected hardware elements that combine to run all software applications and are the foundation of the IT infrastructure.
Enterprise and Software Applications
Large-scale proprietary software and other relevant software utilized by a business to run effectively. They instruct the hardware and enable devices to function.
Operating System (OS) Platforms
The software that manages all other applications once it's uploaded onto a computer; it's the primary software that drives all other software and is the main interface for users.
Data Storage and Management
The data center is where software manages and stores a company's information while providing secure access to data and applications.
LAN
Local Area Network
LAN (local area network)
Designed for smaller areas such as offices, homes, or schools.
WAN
Wide Area Network
WAN (wide area network)
Encompasses larger areas such as cities, countries, and even the world.
Cloud Storage
Keeps data on third-party servers in the cloud.
Network and Telecommunication Platforms
Allow network operations, management, and communication between internal and external systems. Offer connection to data through internet access, cellular wireless, and WAN.
Internet Platforms
Hardware and software that work to facilitate the functions of web hosting, web maintenance, and web applications.
Consulting and System Integration Services
Designed to integrate the various components of infrastructure, software, and platforms into a seamless information system that is fast, consistent, and secure.
What comprises several components designed to work together in developing, controlling, and supporting a business's IT services?
Information technology (IT) infrastructure.
Which component is the foundation of the IT infrastructure?
Hardware platforms.
What is the software that manages all other applications and is the main interface for users?
Operating system (OS) platform.
What is the difference between LAN and WAN?
LAN (local area network) is designed for smaller areas such as offices, homes, or schools. WAN (wide area network) encompasses larger areas such as cities, countries, and even the world.
What type of storage keeps data on third-party servers and offers convenience and ease of access anytime and anywhere?
Cloud storage.
Which component allows network operations, management, and communication between internal and external systems?
Network and telecommunication platforms.
What is the purpose of Consulting and System Integration Services?
They are designed to integrate the various components of infrastructure, software, and platforms into a seamless information system that is fast, consistent, and secure. They are critical for merging old legacy systems with newer technologies.
Byte
A single character of data.
Field
A group of characters as word(s) or number(s).
Record
A group of related fields.
File
A group of records of the same type.
Database
A group of related files.
Entity
A person, place, or thing on which we store information.
Attribute
Each characteristic, or quality, describing an entity. Also called a Field or a Column in a table.
Relational Database
The most common type of database that represents data as two-dimensional tables, called relations.
Key field
A field used to uniquely identify each record.
Primary key
The field in a table used for key fields, uniquely identifying each record.
Foreign key
A primary key used in a second table as a look-up field to identify records from the original table.
DBMS
Database Management System
Database Management System (DBMS)
Software that enables an organization to centralize data, manage that data efficiently, and provide access to the stored data by application programs.
RDBMS
Relational DBMS
Relational DBMS (RDBMS)
The most popular type of DBMS today for desktops as well as for larger computers and mainframes.
Basic Operations of a Relational DBMS Steps:
Select
Join
Project
Select (Basic Operations of a Relational DBMS Step 1)
Creates a subset of data of all records that meet a stated criteria.
Join (Basic Operations of a Relational DBMS Step 2)
Combines relational tables to provide the user with more information than is available in the individual tables.
Project (Basic Operations of a Relational DBMS Step 3)
Creates a subset of columns in a table, creating tables with only the information specified.
Arrange the data hierarchy from smallest to largest: field, byte, file, record, database.
Byte , Field , Record , File , Database.
In a relational database, what are the two-dimensional tables called?
Relations.
What is a characteristic or quality describing an entity?
An attribute (also a field or column).
What are the six problems associated with the traditional file environment?
Data redundancy , data inconsistency , program-data dependence , lack of flexibility , poor data security , and inability to share data among applications.
What is a field used in one table as a look-up field to identify records from another table?
A foreign key.
What are the three basic operations of a relational DBMS?
Select, Join, and Project.
Which operation combines relational tables to provide the user with more information than is available in individual tables?
Join
Which operation creates a subset of columns in a table, creating a table with only the information specified?
Project
Which operation creates a subset of data of all records that meet a stated criteria?
Select