Looks like no one added any tags here yet for you.
What is an information system?
A set of interrelated components that work together to collect, process, store, and disseminate information. It includes a feedback mechanism to monitor and control its operation.
Two examples of an information system
Personal
Enterprise
How does using information systems achieve a competitive advantage?
Generating more sales
Achieving superior profit margins
Cost leadership, differentiation, and focus
Gives managers strategic information
What are the four components of the Leavitt Diamond Model, and what is the most important?
People, Technology, process, and structure. People are the most important
What is a Process?
A structured set of related activities or tasks that take an input, add value to it, and create an output. Processes are fundamental to how work is organized and completed, and they often follow specific procedures to achieve a desired end result.
What is an input and its examples?
Raw material, data, or resources required to initiate a process.
Examples: Customer data entered into a CRM system
What is output and its examples?
The final product, result, or information generated from a process.
Example: A completed report fora product ready for delivery.
What is feedback and its examples?
Information that monitors/evaluates a process’ performance to ensure it meets objectives by making adjustments, improving efficiency, and correcting errors.
Examples: Customer satisfaction surveys
What are the four types of information systems?
Personal - Enhances productivity for Indvidual’s performing solo tasks
Workgroup - Enables those in a group to collaborate and work together more efficiently
Enterprise - Facilities the business needs of an entire organization
Interorganizational - Supports the sharing of information and coordination between organizations
What is a value chain and a supply chain?
Value chain - a series of activities that an organization performs to transform inputs into outputs.
Supply chain - a network of organizations people, activities, information, and resources involved in producing and delivering a product or service.
What are the five primary processes and four support processes?
5 Primary sources:
Inbound logistics
Operations
Outbound logistics
Marketing and sales
Service
4 Support processes in the value chain:
Firm infrastructure
Human resource management
Technology development
Procurement
What are the sources of cyberattacks and the most likely source of one?
nation-states - Governments/state-sponsored groups engaging in cyberwarfare or espionage
Hacktivists - Individuals or groups driven by ideological or political motives
(Most likely) Insiders - Current or former employees/partners releasing sensitive info by accident or malicious intent
Criminal organizations - Organized groups conducting cybercrime for financial gain
Script kiddies - Amateur hackers using pre-written scripts or tools with limited expertise
Terrorists - Cyberattacks aimed to cause fear, disruption, or destruction for ideological purposes
Competitors - Rival companies engaging in industrial espionage
What are the source of cyber threats?
Rootkit - Collection of malicious software designed to enable unauthorized access to or control of a computer system without being detected.
Phishing - Social engineering attack by sending fraudulent messages or emails pretending to be a form of legitimate source to trick victims to reveal sensitive information
Virus - Attaches itself to legitimate files or programs and spreads throughout computer once said program/file is launched or executed
Worm - Program that replicates itself to spread across networks and or systems without requiring user interaction
Trojan Horse - Programs disguised as legitimate applications to trick users into installing it