1/182
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Business Processes
Series of steps performed by a group in an organization to achieve a task. Examples include sales, billing, and inventory management.
Digital Firm
Significant business relationships are digitally enabled and core business processes are accomplished through digital networks. Key corporate assets are managed digitally such as intellectual property, core competencies, and financial human assets (Cisco, 3M and GE)
Business Function
Specific activities in an organization, such as HR, finance, sales, manufacturing, production and marketing.
Six Strategic Business Objectives of IS
These include operational excellence, new products, services, and business models, customer/supplier intimacy, improved decision-making, competitive advantage, and survival.
Management Information Systems (MIS)
Designed to support middle management decision-making. Deals with behavioural issues as well as technical issues surrounding the development, use, and impact of information systems used by managers in the firm.
Senior Middle Operational Management
Different levels of management in an organization, each with specific informational needs.
Sociotechnical View
An approach that recognizes the interaction between people and technology in workplaces to achieve optimal organizational performance.
Big Data Problem:
opportunities from new technology, underdeveloped legal environment, tech innovations can be a dangerous
Information Systems Literacy:
Ability to use information systems in all kinds of the digital environment in today's technology.
Transaction Processing Systems
Systems that process basic data transactions in an organization. Serves operational managers to perform daily transactions to conduct business (e.g. sales order, payroll, online purchases) Allow managers to monitor status of operations and relations with external environment.
Decision Support Systems (DSS)
Information systems that support business or organizational decision-making activities. Focuses on problems that are unique and rapidly changing for which the procedure for arriving at a solution may not be fully predefined in advance. It serves the middle management.
Executive Support Systems (ESS)
Helps senior management make these decisions. They address nonroutine decisions requiring judgement, evaluation, and insight. Presents graphs and data from sources through an interface that is easy for managers to use. Incorporates data about external events.
Enterprise Application
Systems for linking the enterprise & Span functional areas, focus on executing business processes across the firm (Include all levels of management). Helps businesses become more flexible and productive by coordinating their business processes more closely and integrating groups of processes so they focus on efficient management of resources and customer service.
Enterprise Resource Planning Systems (ERP)
Integrate business processes in marketing, SAF, etc. into a single software system.
Chief information officer (CIO)
manager who oversees the use of information technology
Chief information security officer (CISO
senior-level executive who oversees an organization's information, cyber, and technology security
Chief privacy officer (CPO)
responsible for the firms knowledge management program
Moore's Law:
The observation that the number of transistors on integrated circuits doubles approximately every two years.
Law of Mass Digital Storage
The observation that the amount of digital data storage increases over time for the same price. Amount of data storage doubles every year. Cost of storing digital information is falling at a rate of 100% a year. SAN is a storage area network.
Metcalfe's Law:
States that the value of a telecommunications network is proportional to the square of the number of connected users of the system.
Stages in IT Infrastructure Evolution:
Evolution stages include mainframe, personal computer, client/server, enterprise computing, and virtual computing .
Total Cost of Ownership:
The purchase price of an asset plus the costs of operation and maintenance.
Interpersonal Roles
Figurehead, Leader, Liaison
Decisional roles
Entrepreneur, Disturbance handler, Resource allocator, Negotiator
Informational roles
Nerve centre, Disseminator, Spokesperson
3 Challenges for E-Com Business Models:
Diminishing Returns Of The "Network Effects" Model, Low Barriers To Entry, Dependence On Some Else's Platform (Such As Apple, Android, Other Apps)
Business Continuity Planning
Strategies to continue business operations in the event of disruptions/Preparing to maintain business functions during and after emergencies. Example: A retail company having an online platform to continue sales during a physical store closure.
Disaster Recovery
Plans to recover IT systems, data, and operations after a disaster
Ransomware
Malware that locks data and demands payment for access
Cyberwarfare
:Using technology to attack a nation's information systems
Public-key Cryptography
An approach in which each user has two related keys, one public and one private. One's public key is distributed freely. A person encrypts an outgoing message, using the receiver's public key.Only the receiver's private key can decrypt the message.
Virus
active, needs to be sent from one computer to another by a user or via software.
Worms
stand alone, can replicate themselves & spread to other laptops
Identity Management Software
Automates keeping track of all users and privileges. Authenticates users, protecting identities, controlling access.
Firewall:
A system of hardware+software blocking unauthorized access to a network. Technology used to protect network security by filtering incoming & outgoing traffic.
Intrusion detection system
Monitors hot spots on corporate networks to detect & deter intruders
Antivirus and antispyware software
Checks computers for presence of malware and can often eliminate it as well. Requires continual updating.c
DoS
Hackers flood a server with false communications in order to crash the system
Pushdo
spamming botnet infected computers sent as many as 7.7 billion spam messages per day.
Distributed DoS
Uses numerous computers to launch a DoS.
WEP security
Static encryption keys are relatively easy to crack. Improved if used in conjunction with VPN.
WPA2 specification
Replaces WEP with stronger standards. Continually changing, longer encryption keys.
IS Audit
Examines firm's overall security environment as well as controls governing individual information systems.
Security Audits
Review technologies, procedures, documentation, training, and personnel. May even simulate disaster to test responses.
Traditional competitors
firms share market space with competitors who are continuously devising new products, services, efficiencies, and switching costs
New market entrants
Some industries have high barriers to entry, for example, computer chip business. New companies have new equipment, younger workers, but little brand recognition
Substitute products & services
Substitutes customers might use if your prices become too high,for example, iTunes substitutes for CDs
Synergies
When output of some units are used as inputs to others, or organizations pool markets & expertise. Synergies = ability to get
Information System
series of interrelated components that collect, retrieve, process, store, and distribute information to support decision making and control in an organization, automate business processes
knowledge workers
design products (engineers, architects)
data workers
scheduling, communications (clerks, assistants)
organizational assets
supports organizational culture that5 values efficiency and effectiveness
managerial assets
strong senior management support for technology investments and change
social assets
The Internet and telecommunications infrastructure
supply chain management (SCM) systems
help suppliers, purchasing firms, distributors, and logistics companies share information about orders, production, inventory levels, and delivery of products and
services so they can source, produce, and deliver goods and services efficiently. get the right amount of their products from their source to their point of consumption in the least amount of time and at the lowest cost.
Customer Relationship Management Systems
provide information to coordinate all of the business processes that deal with customers in sales, marketing, and service to optimize revenue, customer satisfaction, and customer retention.
Knowledge Management Systems
systems collect all relevant knowledge and
experience in the firm and make it available wherever and whenever it is needed to improve business processes and management decisions. They also link the firm
to external sources of knowledge.
Chief Knowledge Officer (CKO)
responsible for the firm's knowledge management program.
e-business
the use of digital technology and the Internet to execute the major business processes in the enterprise.
E-commerce
part of e-business that deals with the buying and selling of
goods and services over the Internet. It also encompasses activities supporting those market transactions, such as advertising, marketing, customer support,
security, delivery, and payment.
E-government
the application of the Internet and networking technologies to digitally enable government and public sector agencies' relationships with citizens, businesses, and other arms of
government.
information system managers
leaders of teams of programmers and analysts, project managers, physical facility managers, telecommunications managers, or database specialists
Chief Data Officer (CDO)
is responsible for enterprise-wide governance
and utilization of information to maximize the value the organization can realize from its data.
consumerization of IT
new information technology that first emerges in the consumer market spreads into business organizations.
Quantum computing
uses the principles of quantum physics to represent data and perform operations on these data
Virtualization
the process of presenting a set of computing resources
(such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location.
Edge computing
method of optimizing cloud computing
systems by performing some data processing on a set of linked servers at the edge of the network, near the source of the data.
Green computing
practices and technologies for designing, making, using, and disposing of computer hardware to reduce environmental impact
Service-oriented architecture (SOA)
set of self-contained services that communicate with
each other to create a working software application.
Service Level Agreement (SLA)
a formal contract between customers and their service providers that defines the specific responsibilities of the service provider and thelevel of service expected by the customer.
Scalability
Refers to how well a system can adapt to increased demands
Enterprise Systems (ERP)
increase operational efficiency and providing firmwide information to help managers make better decisions.
upstream supply chain
the company's suppliers, the suppliers' suppliers, and the processes for managing relationships with
them.
downstream supply chain
of the organizations and processes for distributing and delivering products to the final customers.
bullwhip effect
which information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain.
supply chain planning systems
systems that enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans.
Supply chain execution systems
manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner.
Sales force automation (SFA)
provide sales prospect and contact information, product information, product configuration capabilities, and sales quote generation capabilities.
Cross-selling
marketing of complementary products to customers.
Operational CRM
Customer-facing applications such as sales force automation, call center and customer service support, and marketing automation
Analytical CRM
includes applications that analyze customer data generated by operational CRM applications to provide information for improving business performance
Customer Lifetime Value
revenue, and expenses in servicing and acquiring the customer
Enterprise application challenges
-Highly expensive to purchase and implement enterprise applications
-Technology changes
-Business process changes
-Organizational learning, changes
-Switching costs, dependence on software vendors
-Data standardization, management, cleansing
Social CRM
enable a business to connect customer conversations and
relationships from social networking sites to CRM processes.
Touch Point
any point at which a customer and the company come into contact
File Organization
File, record, field, byte, bit
data inconsistency
occurs when the same data element has different values
data redundancy
occurs when unnecessary duplicate information exists in a database
program data dependence
when data is stored in systems that require updates to change the data
Database Management System (DBMS)
enables organization to centralize data, manage them efficiently, and provide access to the stored data by application programs
relational DBMS.
represent data as two-dimensional tables (called relations).
Each table contains data on an entity and its attributes.
tuples
The actual information about a single supplier that resides in a table
key field
the SUPPLIER table uniquely identifies each record so that the record can be retrieved, updated, or sorted.
primary key
the unique identifier for all the information in any row
of the table and this primary key cannot be duplicated
foreign key
A primary key from one table that is used in another table.
data manipulation language
commands that permit end users and programming specialists to extract data from the database to satisfy information requests and develop applications.
normalization
small stable, flexible adaptive data from complex data structures
Nonrelational database management systems
managing large data sets across many distributed machines and for easily scaling up or down.
distributed database
one that is stored in multiple physical locations.
Blockchain
distributed database technology that enables firms and organizations to create and verify transactions on a network nearly instantaneously without a central authority.