ISAM3303 Final Review

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 31

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

32 Terms

1

What is an information system?

A set of interrelated components that work together to collect, process, store, and disseminate information. It includes a feedback mechanism to monitor and control its operation.

New cards
2

Two examples of an information system

  • Personal

  • Enterprise

New cards
3

How does using information systems achieve a competitive advantage?

  • Generating more sales

  • Achieving superior profit margins

  • Cost leadership, differentiation, and focus

  • Gives managers strategic information

New cards
4

What are the four components of the Leavitt Diamond Model, and what is the most important?

People, Technology, process, and structure. People are the most important

New cards
5

What is a Process?

A structured set of related activities or tasks that take an input, add value to it, and create an output. Processes are fundamental to how work is organized and completed, and they often follow specific procedures to achieve a desired end result.

New cards
6

What is an input and its examples?

Raw material, data, or resources required to initiate a process.

Examples: Customer data entered into a CRM system

New cards
7

What is output and its examples?

The final product, result, or information generated from a process.

Example: A completed report fora product ready for delivery.

New cards
8

What is feedback and its examples?

Information that monitors/evaluates a process’ performance to ensure it meets objectives by making adjustments, improving efficiency, and correcting errors.

Examples: Customer satisfaction surveys

New cards
9

What are the four types of information systems?

  • Personal - Enhances productivity for Indvidual’s performing solo tasks

  • Workgroup - Enables those in a group to collaborate and work together more efficiently

  • Enterprise - Facilities the business needs of an entire organization

  • Interorganizational - Supports the sharing of information and coordination between organizations

New cards
10

What is a value chain and a supply chain?

Value chain - a series of activities that an organization performs to transform inputs into outputs.

Supply chain - a network of organizations people, activities, information, and resources involved in producing and delivering a product or service.

New cards
11

What are the five primary processes and four support processes?

5 Primary sources:

  • Inbound logistics

  • Operations

  • Outbound logistics

  • Marketing and sales

  • Service

4 Support processes in the value chain:

  • Firm infrastructure

  • Human resource management

  • Technology development

  • Procurement

New cards
12

What are the sources of cyberattacks and the most likely source of one?

  • nation-states - Governments/state-sponsored groups engaging in cyberwarfare or espionage

  • Hacktivists - Individuals or groups driven by ideological or political motives

  • (Most likely) Insiders - Current or former employees/partners releasing sensitive info by accident or malicious intent

  • Criminal organizations - Organized groups conducting cybercrime for financial gain

  • Script kiddies - Amateur hackers using pre-written scripts or tools with limited expertise

  • Terrorists - Cyberattacks aimed to cause fear, disruption, or destruction for ideological purposes

  • Competitors - Rival companies engaging in industrial espionage

New cards
13

What are the source of cyber threats?

  • Rootkit - Collection of malicious software designed to enable unauthorized access to or control of a computer system without being detected.

  • Phishing - Social engineering attack by sending fraudulent messages or emails pretending to be a form of legitimate source to trick victims to reveal sensitive information

  • Virus - Attaches itself to legitimate files or programs and spreads throughout computer once said program/file is launched or executed

  • Worm - Program that replicates itself to spread across networks and or systems without requiring user interaction

  • Trojan Horse - Programs disguised as legitimate applications to trick users into installing it

New cards
14
New cards
15
New cards
16
New cards
17
New cards
18
New cards
19
New cards
20
New cards
21
New cards
22
New cards
23
New cards
24
New cards
25
New cards
26
New cards
27
New cards
28
New cards
29
New cards
30
New cards
31
New cards
32
New cards

Explore top notes

note Note
studied byStudied by 77 people
636 days ago
5.0(1)
note Note
studied byStudied by 2 people
57 days ago
5.0(1)
note Note
studied byStudied by 51 people
757 days ago
5.0(2)
note Note
studied byStudied by 37 people
706 days ago
5.0(1)
note Note
studied byStudied by 2 people
46 days ago
5.0(1)
note Note
studied byStudied by 3 people
52 days ago
5.0(1)
note Note
studied byStudied by 35 people
1037 days ago
5.0(1)
note Note
studied byStudied by 215 people
501 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (58)
studied byStudied by 4 people
790 days ago
5.0(1)
flashcards Flashcard (122)
studied byStudied by 49 people
408 days ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 5 people
9 days ago
5.0(2)
flashcards Flashcard (30)
studied byStudied by 22 people
738 days ago
5.0(2)
flashcards Flashcard (40)
studied byStudied by 388 people
696 days ago
4.0(5)
flashcards Flashcard (127)
studied byStudied by 304 people
526 days ago
5.0(4)
flashcards Flashcard (45)
studied byStudied by 191 people
752 days ago
5.0(2)
flashcards Flashcard (20)
studied byStudied by 12 people
472 days ago
5.0(1)
robot