BIA Exam 3

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/168

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

169 Terms

1
New cards
Structured processes
Support operational and structured managerial decisions and activities, standardized, usually formally defined and documented, exceptions rare and not (well) tolerated, process structure changes slowly and with organizational agony (ex. customer returns, order entry, purchasing, payroll)
2
New cards
Dynamic Processes
Support strategic and less structured managerial decision and activities, less specific, fluid, usually informal, exceptions frequent and expected, adaptive processes that change structure rapidly and readily (collaboration, social networking, ill-defined, ambiguous situations)
3
New cards
Workgroup
Support one or more processes, 10-100 users, procedures often formalized, problem solutions within group, can duplicate data, somewhat difficult to change (doctor's office, medical practice)
4
New cards
Enterprise
Support one or more processes, 100-1,000+ users, procedures formalized, problem solutions within group, eliminate workgroup data duplication, difficult to change (hospital)
5
New cards
Inter-enterprise
Support one or more processes, 1,000+ users, systems procedures formalized, problem solutions affect multiple organizations, can resolve problems of duplicated enterprise data, very difficult to change
6
New cards
Change process structure, change process resources
How can we improve efficiency or effectiveness in a process?
7
New cards
Information systems
Performs activities (automation), augments a human performing an activity, controls data quality and process flow
8
New cards
Information silos
When data is isolated in separate systems, data is isolated in islands of automation, different department goals, different personal and workgroup needs, duplicate data as organization grows, results in data integrity problems, disjointed business process
9
New cards
Data duplication, data inconsistency, disjointed processes, limited information and lack of integrated information, isolated decisions lead to organizational inefficiencies, increased expense
Problems created by information silos
10
New cards
Business Process Reengineering
Enterprise systems enabled creation of more efficient or more effective processes, integrated data, enterprise systems create stronger, faster, more effective linkages in value chains, difficult, slow, exceedingly expensive
11
New cards
Standardization
Inherent processes with predesigned procedures for using software products based on "industry best practices"
12
New cards
Customer relationship management (CRM)
Suite of applications, database, and set of inherent processes that manage all interactions with customer through four phases of customer life cycle, supports customer-centric organization
13
New cards
Marketing, Customer acquisition, relationship management, loss/churn
4 phases of customer life cycle
14
New cards
Enterprise Resource Planning
Suite of applications, database, and inherent processes that consolidates business operations into a single, consistent computing platform, CRM plus accounting, manufacturing, inventory, and Human Resources applications, SAP offers industry-specific customized packages
15
New cards
Enterprise Application Integration
Connects system "islands," enables communicating and sharing data, provides integrated information, provides integrated layer on top of existing systems while leaving functional applications "as is", enables less expensive, gradual move to ERP
16
New cards
Careful planning, substantial training, senior management involvement
How to reduce challenges?
17
New cards
Employee resistance
Change requires effort and engenders fear, threat to self-efficacies, requirements gaps, expect it
18
New cards
New technology
The Cloud, mobile technology, risks and potential outside control of organization resources
19
New cards
Security concerns
IS design involves constant trade-offs, threat of focused attack, inter-enterprise system connects competitors, security in the cloud
20
New cards
Collaborative management, requirements gaps, transition problems, employee resistance, new technology
What are the challenges of integrating?
21
New cards
Section 230 of the Communications Decency Act
No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.
22
New cards
Social media (SM)
IT to support content sharing among networks of users, enables communities of practice (people related by common interest), content that is uploaded
23
New cards
Social media information system (SMIS), or Social Networking sites
IS for sharing content among networks of users
24
New cards
Providers, users, communities/sponsors
Three roles for Social Networking Sites
25
New cards
Application Providers
Costs to develop, implement, manage social networking procedures
26
New cards
Enterprise SNs
Internal networks using SharePoint for wikis, discussion board, photo sharing (Yammer, Slack)
27
New cards
Constantly changing balance of power with customers (dynamic), Users can build on each other (solve issues, complaints, reviews, market), employee recruitment/use
Benefits and Uses of Social Media
28
New cards
Sales and marketing
Outward to prospects, social CRM, peer-to-peer sales, loss of credibility, bad PR
29
New cards
Customer service
Outward to customers, peer-to-peer support, loss of control
30
New cards
Inbound logistics
Upstream supply chain providers, problem solving, privacy
31
New cards
Outbound logistics
Downstream supply chain shippers, problem solving, privacy
32
New cards
Manufacturing and operations
Outward for user design, inward to operations and manufacturing, user-guided design, industry relationships, operational efficiencies, efficiency/effectiveness
33
New cards
Human Resources
Employment candidates, employee communications, employee prospecting, recruiting, and evaluation SharePoint for employee-to-employee communication, error, loss of credibility
34
New cards
Hyper-social organization
Use SM to transform interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities
35
New cards
You Are the Product
"If you're not paying, you're the product.", renting your eyeballs to an advertiser
36
New cards
Advertising, Freemium, Sales
Revenue Models for Social Media
37
New cards
Advertising
Pay-per-click, use increases value
38
New cards
Freemium
Offers users a basic service for free, then charges a premium for upgrades or advanced features
39
New cards
Sales
Apps and virtual goods, affiliate commissions, donations
40
New cards
Edward Tufte
"There are only two industries that call their customers 'users': illegal drugs and software"
41
New cards
12.3 billion
By 2022, number of mobile devices to reach ?
42
New cards
$141B, 75%
Mobile ad spending should reach ?, and account for ? of total digital ad spending
43
New cards
3.75%, 2.29%
Average click-through rate of smartphones is ?, but just ? on PCs
44
New cards
Conversion rate
Frequency someone clicks on ad makes a purchase, "likes" a site, or takes some other action desired by advertiser, on smartphones is 2.25%, but 4.84% on PCs
45
New cards
69%
Use of ad-blocking software is growing by ? per year.
46
New cards
User-generated content (UGC)
Content on your SM site that is contributed by users
47
New cards
Problems from external sources
Junk and crackpot contributions, inappropriate content, unfavorable reviews, mutinous movements
48
New cards
Leave it, respond to it, delete it
How to respond to social networking problems?
49
New cards
Never wrestle with a pig; you'll get dirty and the pig will enjoy it
General rule for responding to social networking problems?
50
New cards
Disclose, Protect, Use Common Sense
3 Rules of Engagement for Responding to Social Networking Problems
51
New cards
Disclose
Your presence in social media must be transparent
52
New cards
Protect
Take extra care to protect both Intel and yourself
53
New cards
Use Common Sense
Remember that professional, straightforward and appropriate communication is best
54
New cards
Review employee sites when hiring and after hired, don't post on sites about work
How to manage employees SN use?
55
New cards
Social capital
investment in social relations with the expectation of returns in the marketplace, people benefit from it through information, influence, social credentials, and personal reinforcement
56
New cards
Internal Risk
Can include threats to information security, increased organizational liability, and decreased employee productivity
57
New cards
Hardware
Desktops, laptops, mobile devices
58
New cards
Software
Browsers and clients applications, NoSQL
59
New cards
Data
Content (data and responses to data that are contributed by users) and connections (relationships)
60
New cards
Procedures
Informal, evolving and socially oriented
61
New cards
Organizational strategy
Social networking procedures are more formalized and aligned with the organization's strategy, develop procedures for creating content, managing user responses, removing obsolete or objectionable content, and extracting value from content, anyone who uses his or her position in a company to speak for an organization needs to be trained on both SMIS user procedures and the organization's social networking policy
62
New cards
People
users of social media do what they want to do depending on their goals and their personalities
63
New cards
To balance the trade-off
What is the goal of information systems security?
64
New cards
Human Error
mistakenly give out information, mistakes overwriting data
65
New cards
Computer crime
Intentional destruction of data, viruses
66
New cards
Natural disaster
fires, hurricanes
67
New cards
The Art of Deception by Mitnick and Simon
Lady wants a divorce, husband puts all money in a different account, wants to know where assets are, find out what information you need to know, call to get credit information
68
New cards
Pretexting, Spoofing, Phishing, Sniffing, Wardriving
Types of Security Loss (Unauthorized data disclosure)
69
New cards
Pretexting
Creating a scenario to get people to divulge
70
New cards
Spoofing
Pretending to be an authorized person
71
New cards
Phishing
Emailing purporting to be a reputable company
72
New cards
Sniffing
Intercepting through a wired connection
73
New cards
Wardriving
Driving around to connect to available Wi-Fi
74
New cards
Hacking
breaking into computers to steal data
75
New cards
Ransomware
Encrypts data until ransom paid
76
New cards
Incorrect data modification
Setup internal controls
77
New cards
Faulty service
System mistakes, sending wrong information somewhere
78
New cards
Loss of infrastructure
Loss of property, theft of intellectual property
79
New cards
Denial of service
Overloading servers with requests
80
New cards
Technical Safeguards
Identification and authorization, encryption, firewalls, malware protection, application design (hardware and software)
81
New cards
Data Safeguards
Data rights and responsibilities, passwords, encryption, backup and recovery, physical security (data), define data policies, rights enforced by user accounts authenticated by passwords
82
New cards
Human Safeguards
Hiring, Training, Education, Procedure Design, Administration, Assessment, Compliance, Accountability (Procedures and People), take security seriously, create strong passwords, use multiple passwords, send no valuable data via email or IM, use https at trusted, reputable vendors, remove high-value assets from computers, clear browsing history, temporary files, and cookies, regularly update antivirus software, demonstrate security concern to your fellow workers, follow organizational security directives and guidelines, consider security for all business initiatives
83
New cards
Viruses
Payload, Trojan horses, worms, spyware, adware (slow system startup, sluggish system performance, many pop-up advertisements, suspicious browser homepage changes, suspicious changes to the taskbar and other system interfaces, unusual hard-disk activity)
84
New cards
Malware Safeguards
Install antivirus and anti spyware software, scan your computer frequently, update malware definitions, open email attachments only from known sources, promptly install software updates from legitimate sources, browse only reputable web sites
85
New cards
Human Safeguards for Nonemployee Personnel
Temporary personnel, vendors, partner personnel (employees of business partners), and public, hardening to reduce vulnerabilities, require vendors and partners to perform appropriate screening and security training, contract specifies security responsibilities, least privilege accounts and passwords, remove accounts as soon as possible
86
New cards
Responding to Security Incidents
Have a plan in place, centralized reporting, specific responses (speed, preparation pays, don't make problem worse), practice
87
New cards
Human error, computer crime, natural events and disasters
Three sources of threats
88
New cards
Unauthorized data disclosure, incorrect data modification, faulty service, denial of service, and loss of infrastructure
5 types of security loss
89
New cards
Incorrect data modification
Incorrectly increasing a customer's discount or incorrectly modifying an employee's salary, earned days of vacation, or annual bonus
90
New cards
Identification
The process whereby an information system identifies a user by requiring the user to sign on with a username and password
91
New cards
Authentication
The process whereby an information system verifies (validates) a user
92
New cards
Smart card
Plastic cards similar to credit cards that have microchips. The microchip, which holds much more data than a magnetic strip, is loaded with identifying data. Normally requires a PIN.
93
New cards
Personal identification number (PIN)
A form of authentication whereby the user supplies a number that only he or she knows
94
New cards
biometric authentication
The use of personal physical characteristics, such as fingerprints, facial features, and retinal scans, to authenticate users
95
New cards
encryption
The process of transforming clear text into coded, unintelligible text for secure storage or communication
96
New cards
encryption algorithms
Algorithms used to transform clear text into coded, unintelligible text for secure storage or communication
97
New cards
key
A string of bits used to encrypt data. The encryption algorithm applies this to the original message to produce the coded message. Decoding (decrypting) is similar; this is applied to the coded message to recover the original text
98
New cards
symmetric encryption
An encryption method whereby the same key is used to encode and to decode the message
99
New cards
asymmetric encryption
An encryption method whereby different keys are used to encode and to decode the message; one key encodes the message, and the other key decodes the message, is slower and more complicated than symmetric encryption
100
New cards
public key encryption
A special version of asymmetric encryption that is popular on the Internet. With this method, each site has a public key for encoding messages and a private key for decoding them