MIS Test 3 Tech Reports

0.0(0)
studied byStudied by 2 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/40

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1
New cards

Cloud Computing and SaaS – What They Are

  • Cloud Computing stores data in remote data centers rather than physical hardware.

  • SaaS is a cloud service model where users subscribe to software hosted online.

  • Cloud enables on-demand access to computing power, storage, and apps.

  • SaaS uses multi-tenant architecture so one software serves multiple accounts securely.

2
New cards

Cloud Computing and SaaS – How Cloud Computing Works

  • Cloud relies on physical data centers containing servers, hardware, and storage systems.

  • Virtualization divides one physical server into multiple virtual ones to maximize capacity

  • High-speed networks (WAN), load balancers, CDNs, and software-defined networking move data efficiently

  • Users pay providers (hosts) for storage, communication, and infrastructure management

3
New cards

Cloud Computing and SaaS – How SaaS Works

  • SaaS apps run on cloud infrastructure and are accessed through the internet.

  • Multi-tenant design allows one application to serve many users while isolating data.

  • Providers handle maintenance, updates, security, and hosting.

  • Users pay subscription fees instead of installing software locally

4
New cards

Cloud Computing and SaaS – Value for Individuals

  • Avoid installation and maintenance of hardware/software.

  • Pay simple end-user fees for powerful online tools.

  • Applications are accessible anytime, on any device.

  • Enhances flexibility, convenience, and ease of use.

5
New cards

Cloud Computing and SaaS – Value for Organizations

  • Reduces costs for hardware, storage, and IT staffing.

  • Provides scalability (capacity adjusts with business needs).

  • Enables remote work, real-time collaboration, and secure access.

  • Supports faster innovation and more efficient operations.

6
New cards

Cloud Computing and SaaS – Key Applications

  • Leading cloud platforms: Google Cloud, Microsoft Azure, AWS (~63% of global market).

  • Popular SaaS examples: Slack (collaboration), Salesforce (CRM), Adobe Creative Cloud (design).

  • Cloud provides on-demand compute, storage, analytics, and tools.

7
New cards

Cloud Computing and SaaS – Competing Technologies (Edge Computing)

  • Processes data near its source (IoT devices) for real-time decision-making.

  • Sends only relevant data to the cloud, reducing network load.

  • Ideal for low-latency tasks and large volumes of real-time data.

  • Cloud is still dominant; Edge supplements it for time-sensitive workloads.

8
New cards

Cloud Computing and SaaS – Technology Being Replaced

  • Replaces on-premises physical infrastructure (servers, data centers, databases).

  • Traditional systems require large upfront investments and fixed capacity.

  • Cloud enables on-demand scaling without physical upgrades.

  • 85%+ of organizations surveyed now use cloud over on-prem solutions.

9
New cards

Cloud Computing and SaaS – Ethical Issues

  • Users must trust third-party providers with sensitive data stored remotely.

  • Concerns about data ownership and providers selling data to external parties.

  • Requires transparency about data collection and usage

10
New cards

Cloud Computing and SaaS – Security Challenges

  • Cloud systems are targets for cyberattacks and data breaches.

  • Example: 2014 Yahoo breach of 500M+ user accounts (names, passwords, emails).

  • Strong encryption, access control, and security protocols are essential.

  • Users rely on providers to secure infrastructure and data.

11
New cards

Internet of Things (IoT) – What It Is

  • Network of everyday devices that connect to the internet and communicate with one another.

  • Devices use sensors to collect data, transmit it via Wi-Fi/Bluetooth/cellular, then trigger actions.

  • Actions can include alerts, recommendations, or automated responses.

  • Example: Smart thermostats adjust temperature based on home activity.

12
New cards

Internet of Things (IoT) – Value for Individuals

  • Provides convenience, automation, and real-time insights.

  • Improves safety through monitoring tools (e.g., baby monitors, security devices).

  • Supports healthier living through trackers and health devices.

13
New cards

Internet of Things (IoT) – Value for Organizations

  • Enables real-time data collection for better decision-making.

  • Improves operational efficiency and reduces costs.

  • Supports automation in inventory tracking, equipment monitoring, and logistics.

14
New cards

Internet of Things (IoT) – Value for Society

  • Supports smart cities and sustainable communities.

  • Improves energy management through smart grids.

  • Enhances public services and overall quality of life.

15
New cards

Internet of Things (IoT) – Everyday Applications and industry applications

Everyday Applications

  • Smart home tools: baby monitors, thermostats, fridges, ovens.

  • Devices monitor, alert, and adapt to user behavior.

  • Enhance convenience by automating routine tasks.

Industry Applications

  • Manufacturing: sensors track machines and predict maintenance.

  • Transportation: GPS, cameras, sensors monitor vehicles and traffic.

  • Retail: smart shelves manage real-time inventory.

  • Healthcare: remote monitoring of vital signs.

  • Agriculture: soil and weather sensors improve crop management.

16
New cards

Internet of Things (IoT) – Adjacent Tech: M2M Communication, SCADA, Edge Computing

M2M Communication

  • Device-to-device communication with no human involvement.

  • Used in telemedicine, fleet tracking, remote sensors.

  • Efficient for specific tasks but difficult to scale broadly.

SCADA

  • Industrial system for monitoring and controlling infrastructure.

  • Used in electric grids, pipelines, and large-scale industrial processes.

  • Reliable but legacy systems lack security and scalability

Edge Computing

  • Processes data close to devices instead of relying on cloud-only systems.

  • Reduces latency and boosts reliability during network disruptions.

  • Used in autonomous vehicles, smart grids, industrial robotics

17
New cards

Internet of Things (IoT) – Interoperability Challenges, Reliability & Connectivity Problems, Device Lifespan Issues

Interoperability Challenges

  • Devices from different manufacturers often fail to communicate.

  • Ecosystems like Apple work smoothly internally but not cross-brand.

  • Leads to fragmented, isolated systems instead of universal connectivity.

Reliability & Connectivity Problems

  • IoT systems heavily depend on strong internet connections.

  • Outages can disrupt essential functions (e.g., remote healthcare).

  • Real-time data requires large storage and processing power.

Device Lifespan Issues

  • Devices become outdated quickly and may be abandoned.

  • “Zombie devices” stay connected but insecure.

  • Creates long-term cybersecurity risks and maintenance burdens

18
New cards

Internet of Things (IoT) – Ethical Concerns (Privacy), Security Concerns, Surveillance & Autonomy Concerns, Environmental Challenges

Ethical Concerns (Privacy)

  • IoT collects vast amounts of personal data (health, location, habits).

  • Raises questions about ownership, consent, and potential misuse.

  • Sensitive data could be exploited by insurers, employers, or third parties

Security Concerns

  • Each device is a potential entry point for hacking.

  • Examples: AirTag misuse, HomeKit vulnerabilities enabling device control.

  • Requires strong authentication, encryption, and secure design

Surveillance & Autonomy Concerns

  • IoT devices can form detailed profiles of individuals’ behavior.

  • Raises risks of government overreach and corporate surveillance.

  • Smart assistants and home devices blur boundaries of privacy.

Environmental Challenges

  • Billions of devices become electronic waste.

  • High resource and energy consumption across device lifespan.

  • Contradiction between IoT’s “green” benefits and its ecological footprint.

19
New cards

Wireless Technologies: 5G – What It Is

  • Fifth generation of wireless communication enabling higher speeds, lower latency, and massive device connectivity.

  • Supports modern technologies like IoT, cloud computing, AI, machine learning (Industry 4.0).

  • Evolves from 1G → 4G, each adding digital signals, mobile internet, and high-speed data.

20
New cards

Wireless Technologies: 5G – How It Works

  • Uses low-, mid-, and high-band spectrum, with higher frequencies enabling faster data but shorter range.

  • Requires dense networks of small cells/nodes on buildings, poles, and streetlights to overcome signal obstacles.

  • Uses network slicing to create dedicated virtual networks tailored to specific user or industry needs.

21
New cards

Wireless Technologies: 5G – Key Technical Advantages

  • High bandwidth → more devices supported at once.

  • Ultra-low latency → rapid data transfer, essential for real-time operations.

  • Lower error rates due to improved modulation and coding schemes.

22
New cards

Wireless Technologies: 5G – Value for Individuals &Value for Businesses

Value for Individuals

  • Faster downloads and streaming.

  • Smoother performance for apps, gaming, and video calls.

  • Better reliability in crowded areas (stadiums, cities, events).

Value for Businesses

  • Autonomous vehicles: faster communication between sensors and infrastructure.

  • Healthcare: real-time surgical imaging and instant access to patient records.

  • General operations: quicker data flows support automation and decision-making.

23
New cards

Wireless Technologies: 5G – Key Challenges

  • Infrastructure gaps: expensive to deploy in rural/developing regions.

  • Digital divide: limited access widens inequities as IoT and smart systems depend on 5G.

  • Supply chain risks: untrusted vendors can introduce compromised equipment.

24
New cards

Wireless Technologies: 5G – Security Risks

  • Vulnerable to malware, spoofing, and jamming attacks.

  • Billions of IoT devices become entry points for cyber threats.

  • Requires strong safeguards: secure networking, vetted vendors, encryption.

25
New cards

Wireless Technologies: 5G – Competing & Successor Technologies

  • 6G (emerging): aims for lower latency, higher data rates, and improved global coverage.

  • Key enablers: terahertz (THz) communication, reconfigurable intelligent surfaces (RIS), AI-optimized networks.

  • Hybrid models: integration of 5G/6G with satellite networks and advanced Wi-Fi for seamless global connectivity.

26
New cards

Cybersecurity and Digital Trust – What They Are

  • Cybersecurity = protection of an organization’s digital infrastructure and assets.

  • Uses safeguards such as risk management, MFA, firewalls, encryption, and intrusion detection.

  • Digital trust = confidence users have that organizations protect data ethically and reliably.

27
New cards

Cybersecurity and Digital Trust – How They Work

  • Cybersecurity detects, prevents, and responds to digital threats.

  • Digital trust forms through transparency, ethical data practices, and consistent security.

  • Together, they reduce vulnerability and strengthen user confidence in digital systems.

28
New cards

Cybersecurity and Digital Trust – Value for Individuals, Organizations, Society

  • Individuals: protects privacy, identity, and financial information.

  • Organizations: avoids breaches, protects reputation, and serves as a competitive differentiator.

  • Society: secures national infrastructure and supports digital commerce and innovation.

29
New cards

Cybersecurity and Digital Trust – Key Applications

  • Used in healthcare for securing sensitive patient records and telemedicine.

  • Used in education (e.g., LMS platforms) to protect student and academic data.

  • Applied across industries wherever sensitive or regulated data must be safeguarded.

30
New cards

Cybersecurity and Digital Trust – Competing & Evolving Technologies

  • Traditional tools: firewalls, antivirus, intrusion detection — effective but limited.

  • Modern solutions: AI-powered security (anomaly detection, automated response).

  • Zero Trust Architecture: “never trust, always verify” continuous authentication.

31
New cards

Cybersecurity and Digital Trust – Challenges

  • Cybersecurity is a “negative deliverable”: reduces risk but can’t guarantee full protection.

  • Threats evolve constantly, requiring ongoing updates and reassessments.

  • Balance needed: too much security harms innovation; too little increases vulnerability.

  • Some risks are hard to quantify, complicating investment decisions.

32
New cards

Cybersecurity and Digital Trust – Ethical & Security Concerns

  • Privacy: unethical to collect data without strong protection (e.g., weak encryption).

  • Transparency: users must know how their data is used and who can access it.

  • Phishing threats: increasingly sophisticated, requiring user education and vigilance.

33
New cards

Cybersecurity and Digital Trust – Technology Being Replaced

  • Replacing traditional perimeter-based security (“trust but verify”).

  • New models assume threats can come from anywhere — even inside the network.

  • Zero Trust + AI/ML automation → adaptive, real-time, intelligent defense systems.

34
New cards

Advanced Robotics & Automation – How It Works

  • Integrates mechanical, electronic, and digital systems to act with limited human input.

  • Uses sensors (cameras, LiDAR) + AI-based controllers for perception and movement planning.

  • Operates as MIS sociotechnical systems: robots generate data fed into ERP/SCM systems to improve decisions.

  • Guided by global safety standards (ISO 10218 + ISO/TS 15066).

35
New cards

Advanced Robotics & Automation – Value for Individuals

  • Reduces repetitive and dangerous tasks.

  • Enables higher-skill work: programming, monitoring, analysis.

  • Represents MIS concept of informate → technology enhances human capability rather than replaces it.

36
New cards

Advanced Robotics & Automation – Value for Organizations

  • Increases productivity, consistency, and quality.

  • Provides real-time data for predictive maintenance and smarter decisions.

  • Lowers operating costs and improves adaptability to demographic/environmental pressures.

37
New cards

Advanced Robotics & Automation – Key Applications (High-Level)

  • Manufacturing: precision assembly, welding, quality control.

  • Healthcare: surgical robotics, automated dispensing.

  • Warehousing: material handling, order picking.

  • Mining / Hazardous sectors: inspection, monitoring, safer access to dangerous areas.

38
New cards

Advanced Robotics & Automation – Competing Technologies

  • Fixed automation: conveyor systems / hard-coded assembly lines → cost-effective for high-volume, stable tasks.

  • Software automation (RPA): automates digital workflows without physical robots.

  • Hybrid systems: human-robot collaboration (including AR-supported labor).

  • Advanced robotics differentiates by combining physical capabilities with adaptive AI.

39
New cards

Advanced Robotics & Automation – Suitability Across Industries

  • Suitable where precision, safety, and efficiency are essential.

  • Common in healthcare, logistics, manufacturing, agriculture, mining.

  • Drives major improvements in output, quality, and reduced safety incidents.

40
New cards

Advanced Robotics & Automation – Challenges & Problems

  • High upfront cost + integration and maintenance expenses.

  • Workforce displacement and skills gap (need programming/oversight skills).

  • Safety standards must continually evolve with rapid technological change.

41
New cards

Advanced Robotics & Automation – Ethical & Security Concerns + What It Replaces

  • Ethical: job displacement, wage pressure, inequality (robots replacing routine human labor).

  • Security: robotics systems increase cyberattack exposure in operational environments.

  • Replaces manual and semi-automated tasks; shifts work toward oversight and machine programming.

  • Many jobs have 30%+ automatable tasks, reshaping the structure of work.