1/30
Flashcards covering key vocabulary and concepts from the lecture notes on Management Information Systems, including MIS fundamentals, applications, implementation, and related topics like e-commerce, ERP, cybercrime, and system development.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Management Information Systems (MIS)
The study of people, technology, organizations, and the relationships among them.
MIS Role
To provide information to management for smooth company operations, working with people, organizations, technology, and relationships.
MIS Importance
A formal method of collecting information in summarized form, providing systematic and analytical information to all levels of managers for decision-making.
MIS Classifications by Anthony
Strategic Information, Tactical Information, and Operational Information.
TPS
Transaction Processing System: Primarily used for structured operational and management control applications.
MIS
Management Information System: Used for semi-structured, management control applications, overlapping into operational and strategic planning.
DSS
Decision Support System: Used primarily for unstructured decision-making at operational, management, and strategic planning levels.
ESS
Executive Support System: Used primarily for structured management and strategic planning applications.
OAS
Office Automation System: Used as a facilitator of office correspondence and communication.
E-Commerce
The process of buying or selling goods or services using an electronic medium such as the Internet.
ERP System
A software built to integrate almost every functional area of a business process such as procurement, sales, finance, HR, etc.
Decision support systems (DSS)
Interactive software-based systems intended to help managers in decision-making by accessing large volumes of information generated from various related information systems.
Business Intelligence System (BIS)
A system used for finding patterns from existing data from operations for use in decision-making.
Knowledge Management System
Practices used in an organization to identify, create, represent, distribute, and enable adoption to insight and experience.
Information Systems Planning
Critical in developing and executing successful strategic plans, focusing on adapting to uncertain markets and gaining competitive advantage.
Acquisition of Information Systems
Involves external sourcing or internal development/modification, with companies often acquiring systems from specialized vendors.
Outsourcing
Transferring major components of the firm’s systems and operations to a specialized company under long-term contracts.
Implementation of Information Systems
The process of getting the MIS online, ensuring the outputs are continuously utilized by decision-makers through various methods like parallel operation, direct cut-over, etc.
Evaluation of MIS
Integral part of the management control process, appraising the quality or worth of organizational information systems.
System Maintenance
Ongoing activity of monitoring, evaluating, and modifying existing information systems to make required or desirable improvements.
IS SECURITY and CONTROL
Protecting information systems from potential hazards, especially due to networked computing, ensuring data integrity and availability.
Information system development
Is a process of making and changing the system and the model and methodology used.
MIS Development Approaches
Top-down approach, Bottom-up approach and Integrative approach.
Requirements Determination
It involves studying the existing system and gathering details to find out what are the requirements, how it works, and where improvements should be made
Structured Analysis
Is a development method that allows the analyst to understand the system and its activities in a logical way.
Systems Design
Is the process of defining elements of a system like modules, architecture, components and their interfaces and data for a system based on the specified requirements.
Modular Structure
Programs must be constructed of modules. A module is a named program routine that is handled as a unit which is evoked (called) by their names during program execution.
Cybercrime
Refers broadly to any criminal activity that pertains to or is committed through the use of the Internet.
Phishing
Refers to an attack using mail programs to deceive or coax Internet users into disclosing confidential information that can be then exploited for illegal purposes.
Information Security
Information Security is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
Cybercriminals
Are individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating profit.