Management Information Systems: Strategic Metrics, Ethics, Security Questions and answers with 100% accuracy(GUARANTEED SUCCESS), and Data Technologies

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/98

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

99 Terms

1
New cards

Chief Information Officer (CIO)

Responsible for overseeing all uses of MIS and ensuring MIS strategically aligns with business goals and objectives.

2
New cards

Chief Data Officer (CDO)

Responsible for determining the types of information the enterprise will capture, retain, analyze, and share.

3
New cards

Chief Technology Officer (CTO)

Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of the MIS.

4
New cards

Chief Security Officer (CSO)

Responsible for ensuring the security of business systems and safeguarding against hackers and viruses.

5
New cards

Chief Privacy Officer (CPO)

Responsible for ensuring the ethical and legal use of information within a company.

6
New cards

Chief Knowledge Officer (CKO)

Responsible for collecting, maintaining, and distributing company knowledge.

7
New cards

Project

A temporary activity a company undertakes to create a unique product, service, or result.

8
New cards

Metrics

Measurements that evaluate results to determine whether a project is meeting its goals.

9
New cards

Critical Success Factors (CSFs)

The crucial steps companies perform to achieve their goals and objectives and implement strategies.

10
New cards

Key Performance Indicators (KPIs)

The quantifiable metrics a company uses to evaluate progress toward critical success factors.

11
New cards

Efficiency MIS Metrics

Measure the performance of MIS itself.

12
New cards

Effectiveness MIS Metrics

Measure the impact MIS has on business processes and activities.

13
New cards

Optimal Operation

Occurs in the area of high efficiency and high effectiveness.

14
New cards

Benchmark

Baseline values that the system seeks to attain.

15
New cards

Benchmarking

The process of continuously measuring system results, comparing those results to benchmark values, and identifying steps to improve performance.

16
New cards

Ethics

The principles and standards that guide our behavior toward other people.

17
New cards

Information Ethics

Govern the ethical and moral issues arising from the development and use of information technologies.

18
New cards

Privacy

The right to be left alone when you want to be, to have control over personal possessions, and not to be observed without consent.

19
New cards

Confidentiality

The assurance that messages and information remain available only to those authorized to view them.

20
New cards

Information Security

The protection of information from accidental or intentional misuse by persons inside or outside an organization.

21
New cards

Downtime

A period of time when a system is unavailable, which can be very costly to a business.

22
New cards

Cybersecurity

Prevention, detection, and response to cyberattacks.

23
New cards

Hacker

Experts who use their knowledge to break into computers/networks for profit or challenge.

24
New cards

Virus

Software written with malicious intent to cause annoyance or damage.

25
New cards

Denial-of-Service Attack (DoS)

Attacks that flood a network with requests to prevent legitimate users from accessing it.

26
New cards

Phishing

A technique to gain personal information for identity theft, usually via fraudulent email.

27
New cards

Pharming

Reroutes requests for legitimate websites to false websites.

28
New cards

Insiders

A security threat as the biggest issue is often a people issue, not a technical one.

29
New cards

Authentication

Confirming users' identities.

30
New cards

Authorization

Giving someone permission to do or have something.

31
New cards

Content Filtering

Prevents emails with sensitive information from transmitting and stops spam/viruses.

32
New cards

Encryption

Scrambles information so that if stolen, it is unreadable.

33
New cards

Firewall

Hardware/software that guards a private network by analyzing incoming and outgoing information.

34
New cards

Detection and Response (Attacks)

Technologies to mitigate damage if prevention/resistance fail.

35
New cards

Intrusion Detection Software

Full-time monitoring tools that search for patterns in network traffic to identify intruders.

36
New cards

Data Challenges

Many organizations are data rich and information poor, struggling to turn data into business intelligence.

37
New cards

Organizational data

Difficult to access and contains both structured data (in databases) and unstructured data (voice mail, text messages, videos).

38
New cards

Reasons Business Analysis is Difficult from Operational Systems

Inconsistent data definitions, lack of data standards, poor data quality, inadequate data usefulness, and ineffective direct data access.

39
New cards

Data Warehouse

A logical collection of data gathered from many different operational databases that supports business analysis and decision-making tasks.

40
New cards

Primary Purpose of Data Warehouse

To aggregate data throughout an organization into a single repository for decision-making.

41
New cards

Data Warehouses in the 1990s

Provided the ability to support executive decision-making without disrupting day-to-day operations.

42
New cards

Data Aggregation

The process of compiling information.

43
New cards

Extraction, Transformation, and Loading (ETL)

The process used to move data from the internal and external databases into the data warehouse (or data marts).

44
New cards

Data Mart

A smaller segment of a data warehouse typically designed for a specific business line or department.

45
New cards

Data Lake

A storage repository that holds a vast amount of raw data in its original format until the business needs it.

46
New cards

Dirty Data

Inaccurate, duplicate, misleading, non-integrated, incorrect, non-formatted data, or data that violates business rules.

47
New cards

Data Cleansing (Scrubbing)

The process of weeding out and fixing or discarding inconsistent, incorrect, or incomplete information.

48
New cards

The Cost of Data Quality

Obtaining 'Perfect Information' (100% completeness and 100% accuracy) is pricey; managers must balance accuracy and completeness with cost.

49
New cards

Data Visualization

Technologies that allow users to 'see' or visualize data to transform it into a business perspective.

50
New cards

Infographic (Information Graphic)

Used by data artists to display patterns, relationships, and trends in a visual format.

51
New cards

Business Intelligence Dashboards

Track corporate metrics such as CSFs and KPIs and include interactive controls for data manipulation.

52
New cards

Blockchain

A specific type of database and a type of distributed ledger.

53
New cards

Distributed Ledger

Records classified and summarized transactional data.

54
New cards

Structure of Blockchain

Structures data into chunks (blocks) that are chained together, unlike a traditional database that uses tables.

55
New cards

Blocks in Blockchain

Data structures containing: Hash (the block's unique identifier/fingerprint), Previous Hash (hash of the prior block), and Data (transactional data).

56
New cards

Key Features/Advantages of Blockchain

Decentralized, Immutability, Digital Trust, Consensus Building.

57
New cards

Proof-of-Work

Has two main goals: to verify the legitimacy of a transaction (avoid double-spending) and to create new digital currencies by rewarding miners.

58
New cards

Organizational Levels and Decisions

Organizational decisions are made at three primary levels.

59
New cards

Decision-Making Challenges

Managers face challenges including: Need to analyze large amounts of information, Must make decisions quickly, Must apply sophisticated analysis techniques to make strategic decisions.

60
New cards

The Six-Step Decision-Making Process

1. Problem Identification 2. Data Collection 3. Solution Generation 4. Solution Test 5. Solution Selection 6. Solution Implementation.

61
New cards

Transaction Processing System (TPS)

Supports day-to-day operational or structured decisions using transactional information.

62
New cards

Decision Support System (DSS)

Supports managerial analysis or semi-structured decisions using analytical information.

63
New cards

Executive Information System (EIS)

A specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions.

64
New cards

Artificial Intelligence (AI)

Simulates human intelligence such as the ability to reason and learn.

65
New cards

Weak AI

Machines make decisions based on reasoning and past data.

66
New cards

Strong AI

Works toward providing brain-like powers to machines, making them as intelligent as humans.

67
New cards

Types of AI

Expert Systems, Neural Networks, Genetic Algorithms, Intelligent Agents, Virtual Reality (VR), Augmented Reality (AR), Machine Learning (ML).

68
New cards

Training Problems in AI

Overfitting and Underfitting.

69
New cards

Bias

A disproportionate weight for or against an idea.

70
New cards

Systems Development Life Cycle (SDLC)

The overall process for developing information systems from planning through maintenance.

71
New cards

Planning Phase

Establish a high-level plan and determine project goals.

72
New cards

Analysis Phase

Analyze end-user business requirements and refine project goals into defined functions.

73
New cards

Design Phase

Establish descriptions of desired features and operations (screen layouts, business rules, etc.).

74
New cards

Development Phase

Transform detailed design documents into the actual system.

75
New cards

Testing Phase

Bring all project pieces together in a testing environment to eliminate errors/bugs and verify system meets requirements.

76
New cards

Implementation Phase

Place the system into production for users to begin business operations.

77
New cards

Maintenance Phase

Perform changes, corrections, additions, and upgrades to ensure the system continues to meet business goals.

78
New cards

Software Costs

The later in the SDLC an error is found, the more expensive it is to fix.

79
New cards

Waterfall Methodology

A sequence of phases where the output of each phase becomes the input for the next (linear progression).

80
New cards

Agile Methodology

Aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using bare minimum requirements.

81
New cards

Rapid Application Development (RAD) Methodology

Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes to accelerate development.

82
New cards

Extreme Programming (XP) Methodology

Breaks a project into tiny phases; developers cannot proceed until the first phase is complete.

83
New cards

Rational Unified Process (RUP)

A framework that breaks software development into four gates: Inception, Elaboration, Construction, and Transition.

84
New cards

Scrum

Uses small teams to produce small pieces of deliverable software using sprints (30-day intervals) and daily stand-up meetings.

85
New cards

Project Management

The application of knowledge, skills, tools, and techniques to project activities to meet project requirements.

86
New cards

Project Manager

An individual expert in planning and management who defines, develops, and tracks the project plan to ensure completion on time and on budget.

87
New cards

Project Deliverable

Any measurable, tangible, verifiable outcome, result, or item produced to complete a project.

88
New cards

Project Milestone

Represents key dates when a certain group of activities must be performed.

89
New cards

Project Management Office (PMO)

An internal department that oversees all organizational projects.

90
New cards

Project Stakeholder

Individuals and organizations actively involved in the project or whose interests are affected by its execution or completion.

91
New cards

Executive Sponsor

The person or group who provides the financial resources for the project.

92
New cards

Triple Constraint

The Project Management Interdependent Variables are Time, Resources, and Scope, with the goal of Managing Expectations.

93
New cards

Feasibility

Types of feasibility studies: Economic, Operational, Schedule, Technical, Political, and Legal.

94
New cards

Outsourcing

An arrangement where one organization provides a service for another that chooses not to perform it in-house.

95
New cards

Onshore Outsourcing

Sourcing to a company in the same country.

96
New cards

Nearshore Outsourcing

Sourcing to a company in a nearby country.

97
New cards

Offshore Outsourcing

Sourcing to a company in a farther-away country (often sold as 'inexpensive good work').

98
New cards

Moore's Law

Refers to the computer chip performance per dollar doubling every 18 months.

99
New cards

Sustainable (Green) MIS

Describes the production, management, use, and disposal of technology in a way that minimizes environmental damage.