Management Information Systems

0.0(0)
studied byStudied by 11 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/134

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

135 Terms

1
New cards

Data

Raw facts. For example, a list of items scanned at a supermarket checkout scanner.

2
New cards

Information

Data shaped into a form that is meaningful to human beings. For example, which items are selling well, which aren't, and which need reordering.

3
New cards

Competitive Advantage

The use of information technology in a manner that creates an advantage over competitors because they don’t have the same information-enabled processes. Ideal systems are sustainable, meaning they are very difficult to copy . SISs (Strategic Information Systems) can be built by differentiating service/product, reducing costs, supporting growth, innovating, or forming alliances

4
New cards

Bit

A small 'b' is a single binary digit . There are only 2 possible bit values: 0 or 1.

5
New cards

Byte

A big 'B' is a byte (8 bits), enough information to specify one English letter . There are 2<sup>8</sup> = 256 possible values: 00000000 to 11111111.

6
New cards

Torrent site

an example of peer-to-peer (P2P) networks where every machine is both a client and a server, allowing users to download files from and upload files to each other's computers. P2P started out in software/game/music/video piracy but is now also used for downloading software updates.

7
New cards

MIPS (Millions of Instructions Per Second)

in the context of Moore's Law in terms of processing power, comparing the number of transistors on a chip to how many millions of instructions per second (MIPS) a processor can execute.

8
New cards

ASCII (American Standard Code for Information Interchange)

An example of a technology standard used for representing alphabets, specifically the English alphabet.

9
New cards

Unicode

An example of a technology standard used for representing most written languages.

10
New cards

Blade format

A type of server machine that is thin and modular, like books in a bookcase, without a dedicated keyboard or monitor . These are often stored in racks . Companies like Google, Facebook, and Amazon have server farms with 100,000s of rack or blade servers.

11
New cards

Rack format

A way to store server machines, often as a large number of rack servers . Rack servers are specialized high-end computers. Server farms use racks to store rack or blade servers, taking up the least amount of space.

12
New cards

Server farm

Collections of 100,000s of rack or blade servers stored in racks in large, windowless, air-conditioned rooms, used by companies like Google, Facebook, and Amazon . This design takes up the least amount of space.

13
New cards

RAID (Redundant Array of Independent Disks)

A technique that can be used to improve hard disk performance . It involves using many drives to achieve improvements in reliability, availability, performance, and capacity . There are officially recognized levels (RAID 0 - RAID 6) and many non-standard levels, each with a different balance of these four characteristics. Examples include RAID 0 (disk striping) and RAID 1 (disk mirroring). RAID 2- RAID 6 use parity to detect and possibly correct errors.

14
New cards

MIS (Management Information Systems)

broader than an IS, considering both technical and behavioral issues. The mission of MIS is to improve the performance of people in organizations through the use of information technology (IT) and to automate data gathering, processing, storage, and information distribution. It involves converting business data into information with business intelligence.

15
New cards

TPS (Transaction Processing Systems)

a type of data management system used in business transactions.

16
New cards

ES (Expert System)

a knowledge-based information system that uses its knowledge of a specific, complex application domain to act as an expert consultant to end users.

17
New cards

DSS (Decision Support Systems)

a computerized tool that helps managers and organizations make informed decisions by analyzing data and providing insights.

18
New cards

EIS (Executive Information Systems)

a type of management support system designed to facilitate senior executive information and decision-making. It provides easy access to both internal and external information relevant to an organization's goals.

19
New cards

SIS (Strategic Information Systems)

The use of information technology in a manner that creates a competitive advantage. The ideal SIS is sustainable and difficult for competitors to copy. SISs can be built by finding ways to differentiate, reduce costs, support growth, innovate, or form alliances.

20
New cards

DCGIA "Drunk Camels Get In Accidents"

Framework to assess SIS: Differentiate, Costs, Growth, Innovate, Alliance

21
New cards

Porter’s 5 forces model

This model is mentioned as a consideration when deciding how much to spend on IT infrastructure, specifically as one of the competitive forces. The power of buyers, power of suppliers, threat of new entrants, threat of substitute products or services, and rivalry among existing firms are the forces to consider.

22
New cards

Value chain model

one of two ways of creating a competitive advantage, along with Porter's Competitive Forces Model.

23
New cards

Alignment/balance

Managing a successful organization requires a balance between strategy, processes, information systems, and people. Organizations struggle when they don’t have effective balance among these four elements.

24
New cards

Diamond model

This refers to the model that represents the balance needed between strategy, processes, information systems, and people for a successful organization. It is visualized as a triangle with people and processes combined in the text but presented as a four-cornered model.

25
New cards

Hub

A network hardware component where data received by the hub is sent to all connected devices.

26
New cards

Router

A network hardware component that is like a switch but connects different networks together. For example, connecting your home network to the Internet.

27
New cards

Server

In terms of hardware, a specialized high-end computer. Examples include mainframes or a large number of rack or blade servers. Server can also refer to software (the server application) or both hardware and software. Dedicated servers include file servers, e-mail servers, database servers, and web servers.

28
New cards

Switch

A network hardware component with many ports that looks at the destination of data and decides which port to send it out on. It connects machines on the same network and forwards data.

29
New cards

IP Address (Internet Protocol Address)

Every device connected to the Internet has a unique identifier called its IP address. It is like a telephone number for a cell phone. IP version 4 consists of four 8-bit numbers separated by a dot (e.g., 192.3.15.1).

30
New cards

NIC (Network Interface Card)

Allows a computer to be connected to the network. Examples include Ethernet, Wi-Fi, Bluetooth, and near-field communication (NFC).

31
New cards

HTML (Hypertext Markup Language)

A language used for simple websites, typically static. It is the format for displaying information on the web. Hypertext refers to text containing links, and markup language refers to a way of annotating and presenting text (bold, italics, etc.).

32
New cards

Open source software (OSS)

Software (and its source code) that is available to use, study, modify, and distribute by anyone. Different standards exist, such as the Free Software Foundation (copyleft) and the Open Source Initiative (allowing different licenses). Benefits include lower cost, more security (due to many people inspecting code), flexibility, and transparency, as well as not being reliant on a single vendor. Drawbacks can include being less easy to use, not meeting customer needs, incompatibility with hardware, and lack of support.

33
New cards

Decentralised architecture

One of the four configurations for IT architecture. In a decentralized architecture, each department might have its own IT group.

34
New cards

Centralised architecture

One of the four configurations for IT architecture. In a centralized architecture, there is one overall IT group for the whole company. A challenge is that users often feel one size doesn't fit all.

35
New cards

Software as a service (SaaS)

Using software available from the cloud. Examples include Salesforce.com for CRM and Microsoft 365 (cloud version of Microsoft Office), Google Docs, Gmail.

36
New cards

Cloud computing

An extension of client/server architecture but with a shared pool of resources rather than a single server. These resources include clusters of computers, software (e.g., Gmail, Google Docs), and storage (e.g., iCloud, OneDrive). It allows selling software applications as a service over the internet.

37
New cards

Consumerism of IT (Consumerization)

A contemporary hardware trend describing the trend to redesign corporate systems for smartphones, tablets, and other consumer-oriented devices.

38
New cards

P2P (Peer-to-peer)

A distributed computing architecture where every machine in the network consumes (is a client) and provides service(s) (is a server) at the same time. Examples include torrent sites and systems like Skype or the internet where the network still functions if nodes go down. It started out in software/game/music/video piracy but is now used for software updates

39
New cards

BYOD (Bring Your Own Device)

Consumerism of IT.

40
New cards

Architecture (IT Architecture)

How the information system is conceptualized. Contemporary architecture views are often organized as centralized, decentralized, service-oriented (or web-based), or software-defined architectures.

41
New cards


Infrastructure (IT Infrastructure)

The shared technology resources that provide the platform for the firm’s information system applications. It includes investment in hardware, software, and services like consulting, education, and training. It has evolved in five stages: mainframe/minicomputer, personal computer, client/server, enterprise computing, and cloud and mobile computing. Infrastructure components include computer hardware platforms, operating system platforms, enterprise applications, data management and storage, network and telecom platforms, internet platforms, and service platforms.

42
New cards

Enterprise Architecture (EA) models

Frameworks that guide the translation from business strategy to IS design. This translation can be simplified by categorizing components into broad classes (platforms, apps, network, data), which make up both IT architecture and infrastructure. Common Enterprise Architectures include TOGAF, Zachman, Gartner, and IBM’s Resolve.

43
New cards

Total cost of ownership (TCO)

Different ways to estimate the total cost of owning IT infrastructure. Acquisition costs for hardware and software represent a portion of the TCO (e.g., 20%). TCO can be broken down into capital expenditure (fixed, one-time cost) and operational expenditure (ongoing expenses). Operational expenditures include technical support, end-user training, downtime, real estate, computer furniture, and utility costs.

44
New cards

Virtualisation

a technology that creates virtual versions of physical resources, like servers, storage, or networks, allowing multiple operating systems or applications to run on a single physical machine.

45
New cards

Entity

In a relational database, a table stores information about entities, which are rows in the table that track data about people, places, things, or events. In an Entity-Relationship (ER) diagram, rectangles represent entities (nouns that we store data about). Examples include Employee, Department, Project.

46
New cards

Relationship

In a relational database context, information is related (e.g., customers make purchases, purchases list products). In an ER diagram, diamonds represent relationships between entities. We sometimes store data about the relationship, such as StartDate or Hours. Examples of relationships include supervises, works_for, manages, works_on, controls.

47
New cards

Attribute

A property an entity might have or a field; represented as a column in a table. Examples include student number, given name, family name. In an ER diagram, ovals represent attributes that we store about entities or their relationships.

48
New cards

Tupple

When rows in a table are unique, they are called a tupple. In a relational database, a row in a table stores information about an entity, which can be called a tupple.

49
New cards

Primary key

An attribute or a set of attributes that uniquely identifies each row in a table. In an ER diagram, primary keys for each entity are underlined in the ovals.

50
New cards

Foreign key

A foreign key is an attribute (or set of attributes) in one table that references the primary key of another table, establishing a link between the two.

51
New cards

Normalisation

A process of organising data for use in a relational database to avoid problems when running queries and minimize storage space. It involves structuring data for a relational database. There are 5 "normal forms," but for the course, 3NF is generally sufficient.

52
New cards

Relation

In the context of relational databases, a table stores information about entities. The terms relation and table are often used interchangeably.

53
New cards

Tacit knowledge

What employees know that has not been documented. It is knowledge held in the minds of employees, informal and uncodified, including values, perspectives, culture, and memories. Accounts for about 80% of knowledge.

54
New cards

Explicit knowledge

Knowledge that has been documented somewhere (reports, policies, manuals, emails, databases, books). It is formal or codified. Accounts for about 20% of knowledge.

55
New cards

Knowledge transfer

Leveraging knowledge transfer from one to many is an objective of Knowledge Management. KM aims to connect those who know to those who need to know.

56
New cards

NIST

National Institute of Standards and Technology

57
New cards

2FA (Two-Factor Authentication)

Using two different authentication approaches (e.g., password and a code from a security token).

58
New cards

Authentication

Assurance that the other party is the one claimed (not an imposter). Methods include something you know (password), something you have (smart card, security token), or something you are (biometrics).

59
New cards

Security principles

six security service definitions: authentication, access control, data confidentiality, data integrity, availability, and non-repudiation.

60
New cards

Digital signature

Used to verify the legitimacy of a certificate.

61
New cards

Algorithm (Encryption Algorithm)

The method or procedure used for encryption and decryption. The source mentions RSA as an example of how encryption and decryption can be done.

62
New cards

Key (Encryption Key)

Used in encryption and decryption to render a message unreadable and retrieve the original message. The strength of encryption depends on the number of possible keys.

63
New cards

Worm

Similar to a virus but runs on its own (does not need to attach to other programs) and uses a computer network to spread.

64
New cards

Malware (Malicious Software)

Software designed to cause damage to or loss of control of a computer or network. Includes computer viruses, worms, Trojan horses, spyware, adware, ransomware, denial of service attacks, sniffing, and botnets.

65
New cards

Trojan horse

A software program that appears to be benign but does something unexpected behind the scenes. The user has to launch them, and they cannot replicate on their own.

66
New cards

Certificate authority (CA)

A trusted entity that verifies the legitimacy of a digital signature and hence the legitimacy of a certificate, which contains the public key of the certificate holder.

67
New cards

Asymmetric encryption (Public Key Encryption)

Uses a pair of keys: a public key for encryption and a private key for decryption. The public key can be shared with anyone, but only the holder of the private key can decrypt messages encrypted with the corresponding public key.

68
New cards

Symmetric encryption

Uses a single, shared key for both encryption and decryption.

69
New cards

Types of IP (Intellectual Property)

Includes trade secrets, copyright, and patents.

70
New cards

NORA (Nonobvious Relationship Awareness)

A technology that combines information from various sources (e.g., telephone listings, customer lists, credit card purchases, data brokers) to create a more detailed profile of each person.

71
New cards

Web beacons

Small, often invisible pictures on websites or in emails that can tell websites that you’ve viewed a certain item, like an ad.

72
New cards

Cookies

A unique bit of data that a website stores on your device to track your activity on their website.

73
New cards

PIPEDA (Personal Information Protection and Electronic Documents Act)

A Canadian law that establishes principles for the collection, use, and disclosure of personal information.

74
New cards

PI (Personal Information)

Includes demographics (age, income, etc.), internet-related data (e-mail, IP address), physical attributes (age, medical records), and financial details (purchases, banking information, SIN). Organizations in Canada need informed consent to collect and use customer data (PI).

75
New cards

Descarte’s rule of change

a method for determining the maximum number of positive and negative real roots of a polynomial equation.

76
New cards

PAPA

the framework for thinking about ethical issues (Privacy, Accuracy, Property, Accessibility)

77
New cards

Kant’s imperative (Categorical Imperative)

encourages ethical decision-making by focusing on universalizability and treating individuals (including users and stakeholders) as ends in themselves, not just means.

78
New cards

Privacy paradox

describes the discrepancy between people's stated concerns about privacy and their actual behaviors in online environments, where they often disclose personal information despite expressing concern.

79
New cards

GDPR

General Data Protection Regulation

80
New cards

Levels of management

different groups in a firm have different information needs (e.g., senior management for long-range planning vs. operational workers for day-to-day transactions).

81
New cards

Logical schema (External Schema)

How the data is displayed to a particular user. Different user groups can have different views, and the rest of the database is hidden from that user (e.g., Payroll sees net pay, IT does not).

82
New cards

Physical schema (Physical View)

How the data is physically stored and organized. This includes what data is in which file on which disk

83
New cards

1NF (First Normal Form)

all rows in the relation must be unique (when rows are unique, they are called a tupple).

84
New cards

2NF (Second Normal Form)

it must take the whole key to determine a non-key field. This means that every non-key attribute must be fully functionally dependent on the primary key.

85
New cards

3NF (Third Normal Form)

it can’t be possible to know the value of a non-key field knowing another non-key field. More formally, every non-key attribute is non-transitively dependent on the primary key; it depends only on the candidate key(s)

86
New cards

DBMS (Database Management System)

A collection of programs that manipulate a database. It sets up storage structures, performs updates on the data, and processes queries from applications and users. The DBMS provides a central point of access to the data. It helps provide data integrity, data independence, security, concurrent access, crash recovery, and centralized data administration. It also reduces application development time because standard software packages exist.

87
New cards

DML (Data Manipulation Language)

the set of commands used to manipulate data in the database (e.g., SELECT, INSERT, UPDATE, DELETE).

88
New cards

DDL (Data Definition Language)

A language used to clearly define the contents of a database, specifying the type of each attribute/field/column heading. For example, the CREATE TABLE command in SQL is a DDL command.

89
New cards

ER Diagram (Entity-Relationship Diagram)

A diagram that allows us to draw an informative picture of the structure of a database. Rectangles represent entities, diamonds represent relationships, and ovals represent attributes. Primary keys are underlined in ovals, and double ovals indicate multivalued attributes. ER diagrams are used to capture data requirements and are converted into tables.

90
New cards

Cardinality

In the context of ER diagrams and relationships between entities, cardinality refers to the number of instances of one entity that can be associated with another entity. 1:N (one to many) and N:M (many to many) relationships in an ER diagram.

91
New cards

Functional dependency (FD)

A → (B, C) means the value of A determines the values of B and C. The values of B and C depend on the value of A. Knowing the value of A, there is only one possible value for B and for C in the database. It is a key concept in normalization.

92
New cards

1:n (one-to-many relationship)

Shown in the example ER diagram where one department manages many employees. One instance of the first entity can be related to zero, one, or many instances of the second entity.

93
New cards

m:n (many-to-many relationship)

Shown in the example ER diagram where many employees work on many projects. Many instances of the first entity can be related to many instances of the second entity.

94
New cards

1:1 (one-to-one relationship)

Shown in the example ER diagram where one department controls one location. One instance of the first entity can be related to at most one instance of the second entity, and vice versa.

95
New cards

Data mart

Departmental subsets of a data warehouse that focus on selected subjects, e.g., a marketing data mart focusing on customers, products, and sales.

96
New cards

Data warehouse

Collects information about multiple subjects that span the entire organization. It requires historical data (up to 5-10 years), consolidates data from many operational systems and external sources, and has data quality considerations. It is used to find relationships, patterns, and trends in data to provide insights for decision making.

97
New cards

OLAP (Online Analytical Processing)

We characterize each dimension by measures (numerical values) such as revenue, cost, profit, quantity, defect rate. Dimensions can be broken down into smaller units, forming hierarchies (e.g., countries into regions, time into years/months). OLAP enables different levels of detail for analysis.

98
New cards

Data mining

Techniques used to find patterns and relationships in large databases to predict future behaviour. Examples include associations (if customers buy X, they likely buy Y), sequences (events linked over time), classifications (discover properties of predefined groups), clusters (discover properties, classifications not predefined), and forecasts (predict future values).

99
New cards

Topology (network topology)

computers are linked together to share resources7 ... and the components involved (hubs, bridges, switches, routers). the arrangement of the elements of a communication network. Ring, Star, Bus

100
New cards

Protocol

A set of rules governing how data is exchanged in a network.