1/87
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are the Five Forces in the Porter's 5 Forces Model?
Buyer power, supplier power, threat of substitutes, threat of new entrants, rivalry among existing competitors
Porter's Generic Model
Broad market or focused strategy (narrow market) focusing on cost leadership or differentiation or certain focused strategy.
Value Chain Model
Firm infrastructure, human resource management, technology development, procurement. And then inbound logistics, operations, outbound logistics, marketing and sales and customer service.
The Triple Constraints
Scope (functional requirements), time (deadline) and costs (budget/expense)
The System's Development Life Cycle (SDLC)
Planning, anaylsis, design, development, testing, implementation, maintenance.
Who are involved in IS development?
System/Buisness analyst, users, managers, vendor/suppliers, programmers, technical specialists
Primary Project Planning (SMART)
Specific, Measureable, Attainable, Relevent, Time-Bound
System Development Project Manager Techniques
Draw up project plan, then balance the triple constraints, then manage the soft issues
What are the soft issues of project planning?
Managing people, communications and change.
System Development Methodologies
waterfall, agile, rapid application development, extreme programming, rational unified process, scrum
Explain Waterfall and what is it most ideal for?
A sequence of phases in which the output of each phase becomes the input for the next. its ideal for projects with clear, unchanging requirements and a need for a structured approach.
Explain Agile and what is it most ideal for?
It is iterative develoment, consisting of a series of tiny projects. It aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements.
Explain Rapid Application Development (RAD) and what is it most ideal for?
emphasizes quick development and iteration of prototypes. It focuses on rapid delivery by using user feedback to refine and improve prototypes continuously.suited for rapid development and frequent iterations.
Explain Extreme Programming and what is it most ideal for?
Extreme Programming (XP) is an Agile methodology that focuses on improving software quality and responsiveness to changing customer requirements. It promotes frequent releases in short development cycles, which improves productivity and introduces checkpoints where new customer requirements can be adopted.suited for rapid development and frequent iterations.
Explain Rational Unified Process (RUP) and what is it most ideal for?
. It provides a disciplined approach to assigning tasks and responsibilities within a development organization and aims to ensure the production of high-quality software that meets the needs of its end-users. offers a structured approach with a focus on use cases and architecture.
Explain waterfall and what is it most ideal for?
A sequence of phases in which the output of each phase becomes the input for the next. is ideal for projects with clear, unchanging requirements and a need for a structured approach.
Explain Scrum and what is it most ideal for?
uses small teams to produce small pieces of deliverable software, using sprints to achieve an appointed goal. Each day begins or ends with a stand-up meeting to monitor and control the development effort.
Project Planning Diagrams
1) PERT chart (dependency or critical path)
2) Gantt chart
What is outsourcing? And why do people use them?
Is the process of hiring another organisation (external company) to perform a service. To save costs, gain expertise and free up management time.
What are the advantages of outsourcing?
1. cost reduction
2. faster project completion
3. high level of expertise
4. flexibility (management advantages)
5. risk reduction (reduce implementation risk)
What are the risks of outsourcing?
loss of control, benefits outweighed by long-term costs, no easy exit, highly dependent on vendors over time, security and intellectual risks.
IS/IT outsourcing alternatives
Iaas (offers basic infrastructure), Paas (offers a platform for developing applications), Saas (offers ready-to-use software applications).
Information MIS
(supports operations)
Backup
Recovery
disaster recovery
business continuity planning
Agile MIS
(Supports change)
Accessibility
Availability
Maintainability
Portability
Reliability
Scalability
Usability
Sustainable MIS
(Supports Sustainability)
- Grid computing
- Cloud COmputing
- Virtualization
Backup
An exact copy of a system's information
Recovery
The ability to get a system up and running in the event of a system crash or failure
Hot site
A separate and fully equipped facility where the company can move immediately after a disaster and resume business
Cold Site
A separate facility that does not have any computer equipment, but is a place where employees can move after a disaster
Warm site
A separate facility with computer equipment that requires installation and configuration
Business Continuity Plan
A plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption
IoT
The network of physical objects—devices, vehicles, buildings and other items—embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data.
How does IoT work in regards to architecture?
- Sensing/Device (motion sensor, GPS, proximity)
- Connectivity (bluetooth, cellular)
- Data Processing (Algorithms, AI, Machine Learning)
- User Interface (UX, Touch Screen)
Cloud Computing
using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer
Cloud Computing Characteristics
On-Demand Self Service
Rapid Elasticity
Broad Network Access
Resource Pooling
Measured Service
Private cloud - And what is its advantages and disadvantages?
serves only one tenant/organization and can be on premise or service provided.
- lots of control, customisation and security
- however, it is costly and high maintenance
Public cloud - And what is its advantages and disadvantages?
Multi-tenant environment, provided by service provider and shared among multiple organisations.
Advantages:
- Cost-effective (lower costs as resources shared and pay-as-you-go basis)
- Maintenance free (provider does it for you)
Disadvantages:
- Data security is a concern
- limited customisation
- less control over infrastructure and data management.
Hybrid cloud - And what is its advantages and disadvantages?
Combines private and public clouds integrated through networking.
Advantages:
- cost effective
- use public cloud for non sensitive data
- use private cloud for sensitive data
Disadvantages:
- more complex to manage
- high cost.
PaaS
Platform as a Service.
Provides a platform that is quick and reliable developing and delpoying applications.
Targets IT professionals and developers.
Offers more control
Saas
Software as a Service
Delivers fully functional software to end users
Offers less control as the provider manages everything
Targets end users needing specific software functionalities
IaaS
Infrastructure as a Service.
useful for heavily utilized systems and networks.
Provides virtualised infrastructure resources
Offers the highest level of control over infrastructure
Targets IT administrators and developers
Opportunities of Cloud Computing
- Enables service to be used without any infrastructure understanding
- Works economies of a scale
- Stored remotely but accessible from "anywhere"
Challenges of Cloud Computing
- Use of cloud computing means dependence on others (can limit flexibility and innovation)
- Security risks
IoT Processes
1. Data gathering
2. Data transmission
3. Data processing and analysis
4. Decision Making
5. Notification and Alerting
6. Order Fulfillment
Disruptive technology
A new way of doing things that initally does not meet the needs of existing customers
Sustaining Technology
Produces an improved product customers are eager to buy
Web 1.0
A term to refer to the WWW during its first few years of operation between 1991 and 2003
eCommerce
the buying and selling of goods and services over the internet
What are the advantages of eBusiness
- Expanding global reach
- Opening new markets
- Reducing costs
- Improving effectiveness
Expanding global reach
- What is information richness?
Refers to the depth and breadth of details contained in a piece of online information
Expanding global reach
- What is information reach?
Measures the number of people a firm can communicate with all over the world
Opening new markets
- What is mass customisation?
The ability of an organisation to tailor its products or services to the customers specifications
Opening new markets
- What is personalisation?
Occurs when a company knows enough about a customer's likes and dislikes to fashion offers that likely appeal to that person,
Reducing Cost (the longtail is also one of them)
- disintermediation
When a business sells directly to the customer and cuts out the intermediary.
Reducing cost (the longtail is also one of them)
- intermediaries
Agents, softwares or businesses that provides a trading infrastructure (distributor/retailer)
Improving effectiveness (heat map is also one of them)
- Interactivity
Measures advertising effectiveness by counting visitor interaction with the target ad
Improving effectiveness (heat map is also one of them)
- Stickiness
Measures the amount of time visitors spend on a website or application
Analysing Website Data
- Viral marketing
a strategy where analysing website data helps identify and leverage content that is likely to be shared and spread by users, thereby increasing the reach and visibility of a product/service.
What are examples of eBusiness forms?
- content providers
- infomediaries
- online marketplaces
- portals
- service providors
- transaction brokers
eBusiness revenue models?
1. Advertising fees
2. License fees
3. Subscription fees
4. Transaction fees
5. Value-added service fees
revenue generating strategies
search enginge, search engine ranking, search engine optimization (seo)
Web 2.0 and what are its 3 qualities and its 4 key factors
The next generation of internet use - a more mature, distinctive communications platform characterised by 3 qualities.
qualities:
1. Collaboration
2. Sharing
3. Free
key factors:
- Content sharing through open sourcing
- User-contributed content
- Collaboration inside the organisation
- Collaboration outside the organisation
Content sharing through open sourcing - what is it and what are examples
Open system - Uses non-propriety hardware and software based on public standards, allowing 3rd parties to create compatible add-ons.
Source code
Open source
Closed source
User contributed content - what is it and what are examples
created and updated by many users for many users
- Native advertising
- Reputation system
Collaboration inside the organisation - what is it and what are examples
- Collaboration system: tools that support the work of teams or groups by facilitating the sharing and flow of information.
- Collective intelligence
- Knowledge management: Involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions.
What are examples of Business 2.0
- social media
- social network
- social networking
- social network analysis (SNA)
Social Tagging - What does Tags mean?
Specific keywords or phrases incorporated into website content for means of classification or taxonomy
Features of social tagging
- hashtag
- folksonomy
- social tagging
- social bookmarking
- website bookmark.
What is social computing
Social computing combines social behaviour and information systems to create value.
This is focused mainly on user-contributed content
(Users, rather than organisations, produce, control, use, and manage content via interactive communications and collaboration.)
Examples of social trust
- misinformation
- disinformation
- fake news
- filter bubble
Web 3.0
Based on "intelligent" web applications using natural language processing, intelligence applications and machine-based learning/reasoning
Examples of Social computing
- user-generated content
- social marketing (twitter, instagram, facebook)
- customer reviews and rating
- online communities and forms
- influencer marketing
Information ethics
legal but unethical
legal and ethical
illegal and unethical
illegal but ethical
List possible security risks
- phishing
- ransomware
- spyware
- social engineering
- man in the middle (eavesdropping)
- denial of service (disrupt service, make unavailable)
- malware (virus)
- unathorised access
- data breach (personal, financial and health info being exposed)
- data loss
List possible losses due to cyber attacks
- financial performance
- revenue loss
- damaged reputation
- other expenses
Why do buisnesses use information management policies?
The organisations strive to build a corporate culture based on ethical principles that employees can understand and implement
list Information management policies
- social media policy
- acceptable use policy
- information privacy policy
- ethical computer use policy
- email privacy policy
- workplace monitoring policy
What are the four primary secruity measures (protection approaches)
1. Predict
2. Prevent
3. Response
4. Detect
Methods of prediction?
Predict the most likely attacks, targets and methods
- Risk assessment
- Identify threats
- Produce reports
Methods of prevention
Prevent of deter attacks so no loss is experience
- People: Info security policy and plan, control access, regular security audits and montioring
- Technology: Smart cards, tokens, biometrics, content filtering, end-to-end encryption, firewall
Methods of response and detection
Response rapidly addresses incidents to minimise loss and return to normal
Detection identifies attacks not prevented to allow for rapid thorough response.
- Intrusion detection software
- Business continuinty plan/recovery plan/backup/disaster plan/disaster sites
Why do emerging technologies matter?
- innovation and advancement
- economic growth
- improved efficiency and productivity
- addressing global challenges
- competitive advantage
- transforming society
what are the advantages of ai
- effiency
- insights
- personalisation
what are the disadvantages of ai
- job displacement
- bias
- privacy
what is blockchain
blockchain is a secure, decentralised way to record transactions in a transparent and tamper-proof manner.
applications of blockchain
smart contracts, digital currency, securities, record keeping
- IoT
- accounting ledgers
- investment management
- crowd funding
- corporoate governance
advantages of blockchain
- it is a single file shared by a network of computer
- shared, "trusted" public ledger
- transparency: all can inspect and verify it
- no single user controls it
- anonymity and privacy
- security and tamper resistance
disadvantages of blockchain
- may be computationally expensive
- may be high energy use
- development costs, and high cost of failure
- risky: the high threat of regulation and legal scrutiny