Organization Management and Information Systems Review

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/68

flashcard set

Earn XP

Description and Tags

Comprehensive vocabulary flashcards covering Organization Management, Information Systems, SDLC, E-Commerce, ERP, BCP, and IT Laws.

Last updated 6:42 AM on 5/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

69 Terms

1
New cards

Computer Based Information Systems (CBIS)

Information systems that use computer technology to process data and are essential for efficiently running large-scale, multi-branch, and internationally competitive organizations.

2
New cards

Security Triad (CIA)

The three primary goals of Information Security: Confidentiality, Integrity, and Availability.

3
New cards

Confidentiality

Ensuring that information is not disclosed to unauthorized individuals, often promoted using tools like encryption, access control lists (ACLs), and passwords.

4
New cards

Integrity

Making sure information has not been changed from how it was intended to be, protecting it from malicious software like worms, viruses, and trojans, or accidental errors.

5
New cards

Availability

Ensuring that information and systems are available for use when needed, focusing on system uptime and recovery from issues like natural disasters.

6
New cards

Unstructured Decisions

Decisions in which the decision-maker must provide judgment, evaluation, and insights into the problem definition, typically occurring at higher organizational levels.

7
New cards

Structured Decisions

Repetitive and routine decisions where decision-makers can follow a definite procedure, commonly found at lower organizational levels.

8
New cards

Semi-structured Decisions

Decisions in which only part of the problem has a clear-cut answer provided by an accepted procedure.

9
New cards

IT Governance

A structure for aligning IT strategy with business strategy to ensure companies achieve goals and possess measurable results for all stakeholders.

10
New cards

CoBIT

A popular framework for IT governance from ISACA, accepted worldwide and well-suited for organizations focused on risk management and mitigation.

11
New cards

ITIL

The Information Technology Infrastructure Library from the UK government, offering eight sets of management procedures focused on operations.

12
New cards

System

A group of interconnected components (input, processing, storage, and output) working toward a common goal through ordered transformation.

13
New cards

Open System

A system that actively interacts with other systems and its environment through exchange relationships.

14
New cards

Closed System

A self-contained system that does not interact or make exchanges across its boundaries with its environment.

15
New cards

Deterministic System

A system that operates in a predictable manner, such as software performing a set of instructions.

16
New cards

Probabilistic System

A system described in terms of probable behavior where exact values at any given time are unknown, such as an inventory system.

17
New cards

Transaction Processing Systems (TPS)

Operational level systems that manipulate data from business transactions like sales, purchases, and payments.

18
New cards

Knowledge Management System (KMS)

An IT system used to store, retrieve, and share organizational knowledge to achieve objectives and gain competitive advantage.

19
New cards

Explicit Knowledge

Knowledge that is easily formalized, articulated, codified, and documented, such as online tutorials or policy manuals.

20
New cards

Tacit Knowledge

Personal, context-specific knowledge represented as intuition or beliefs that is difficult to document or communicate.

21
New cards

Management Information System (MIS)

An integrated user-machine system designed to provide summarized reports to mid-level management to support ongoing operations and routine decisions.

22
New cards

Decision Support System (DSS)

An interactive software-based system intended to help decision-makers solve semi-structured and unstructured problems using data and business models.

23
New cards

Executive Information Systems (EIS)

A tool providing top-level managers with rapid, on-line access to timely, accurate, and actionable summary data about business aspects.

24
New cards

Expert Systems

A highly developed DSS that imitation the reasoning processes of human experts to provide advice and solve problems in specific domains.

25
New cards

Artificial Intelligence (AI)

The science and engineering of making intelligent machines and computer programs that can simulate human abilities to think, see, hear, and feel.

26
New cards

Fuzzy Logic

A form of many-valued logic handling partial truth, where truth values range between 00 and 11.

27
New cards

Genetic Algorithms

Software that uses Darwinian evolutionary processes (survival of the fittest) to simulate and generate increasingly better solutions to complex problems.

28
New cards

Software Development Life Cycle (SDLC)

A process framework defining tasks performed at each step to design, develop, and test high-quality software.

29
New cards

Waterfall Model

A linear-sequential SDLC model where each phase must be completed before the next begins, and phases do not overlap.

30
New cards

Spiral Model

An SDLC model combining design and prototyping elements with a heavy emphasis on risk analysis, primarily used for complex and large projects.

31
New cards

Agile Methodology

A software development process based on iterative and incremental development where requirements and solutions evolve through cross-functional team collaboration.

32
New cards

Feasibility Study

A process carried out by system analysts to evaluate alternative systems through cost/benefit analysis across dimensions like technical, financial, and legal.

33
New cards

Unit Testing

A software verification method where a programmer tests individual units of source code (the smallest testable parts) for fitness for use.

34
New cards

Alpha Testing

The first stage of user acceptance testing, typically performed by users within the organization.

35
New cards

Beta Testing

The last stage of testing, generally performed by external users to provide real-world exposure for the product.

36
New cards

Direct Changeover

A conversion strategy where the old system is dropped and the new system is put into use on a specified date.

37
New cards

Parallel Conversion

A conversion strategy where the old and new systems are run simultaneously for a period to ensure the reliability of the new results.

38
New cards

Post Implementation Review

An evaluation conducted typically 66 weeks to 66 months after deployment to ascertain if the project met its business objectives and delivered planned benefits.

39
New cards

Corrective Maintenance

The process of fixing bugs in the code or defects found by users after the system is in operation.

40
New cards

Adaptive Maintenance

Adapting software to changes in the environment, such as new hardware, operating systems, or government policies.

41
New cards

CASE Tools

Computer-Aided Software Engineering tools that provide automated facilities for producing charts, generating code, and creating documentation to increase productivity.

42
New cards

E-Commerce

The buying and selling of goods/services or transmitting funds/data over electronic networks, primarily the Internet.

43
New cards

Business-to-Consumer (B2C)

A form of e-commerce where businesses develop electronic marketplaces to sell products and services directly to customers.

44
New cards

Digital Wallet

A tool that securely stores credit card and owner identification information to make web purchases more efficient.

45
New cards

Electronic Funds Transfer (EFT)

A system of transferring money from one bank account directly to another without paper money changing hands.

46
New cards

Enterprise Resource Planning (ERP)

A fully integrated business management system that automates many internal business processes across logistics, production, finance, and HR functions.

47
New cards

Supply Chain Management (SCM)

The centralized management of the flow of goods and services, including all processes that transform raw materials into final products.

48
New cards

Reverse Logistics

The process of moving goods from their final destination back to the point of origin to recapture value or ensure proper disposal.

49
New cards

Business Continuity Planning (BCP)

A detailed plan to make sure business processes and systems continue operating in the event of a natural or man-made disaster.

50
New cards

Disaster Recovery Plan (DRP)

A strategy focused on the technical issues involved in restoring computing and communications services after they have been disrupted.

51
New cards

Cold Site

An alternate processing facility that has all infrastructure (power, air conditioning) but lacks the actual computer hardware, which must be provided by the organization.

52
New cards

Hot Site

A fully operational alternate processing facility inclusive of hardware, software, and data for immediate recovery.

53
New cards

Cloud Computing

Delivery of computing services like servers, storage, and applications over the Internet as a networked service.

54
New cards

Infrastructure as a Service (IaaS)

A cloud model providing hardware-level resources (processing power, memory, storage) for users to run applications on demand.

55
New cards

Platform as a Service (PaaS)

A cloud model providing users the ability to develop and deploy applications on an online development platform.

56
New cards

Software as a Service (SaaS)

A cloud model where consumers access software applications over the Internet, often on a subscription basis or as software-on-demand.

57
New cards

Virtualization

The abstraction of computer resources making a single physical resource appear as multiple virtual ones, or vice versa.

58
New cards

Virtual Organisation

A network of cooperation made possible by ICT where horizontal and vertical boundaries are removed, consisting of physically dispersed knowledge workers.

59
New cards

Patent

An exclusive right granted for a limited period (typically 20 years) in exchange for public disclosure of an invention.

60
New cards

Trademark

A sign, word, or logo capable of distinguishing the goods or services of one enterprise from those of others.

61
New cards

Copyright

A legal right granted to creators of original works for exclusive use and distribution, typically for the author\'s life plus additional decades.

62
New cards

Digital Signature

A mathematical technique used to validate the authenticity and integrity of a message or digital document.

63
New cards

XML

Extensible Markup Language; a tool used to store and transport data in a format that is both human-readable and machine-readable.

64
New cards

XBRL

Extensible Business Reporting Language; an open standard for describing financial and non-financial information in a machine-readable format.

65
New cards

Data Diddling

Changing data before, during, or after it is entered into the system to delete, alter, or add key system data.

66
New cards

Salami Technique

A fraud technique where tiny slices of money are stolen over a period of time by increasing expenses by a fraction of a percent.

67
New cards

Social Engineering

A technique where a perpetrator tricks an employee into giving out information needed to access a system.

68
New cards

Intrusion Detection System (IDS)

Security software designed to alert administrators when a system is being compromised through malicious activity.

69
New cards

Audit Trail

Logs designed to record chronological activities at the system, application, and user level to ensure accountability.