ISDS 351 Mid-Term Review Guide

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 117

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

118 Terms

1

Information Systems

Helps rework products and services, recognize and capitalize on IS opportunities, enhances career advancement opportunities, improves problem-solving and decision-making skills, defines IT policies and supports new IT solutions, increases productivity and sustains competitive advantage.

New cards
2

Key Management Responsibilities

Identifying and using information systems for competitive advantage; managing people, technology infrastructure, processes, and organizational structure.

New cards
3

Leavitt's Diamond Model

A framework for introducing new systems into the workplace with four key components: People, Technology Infrastructure, Processes, and Structure.

New cards
4

Reasons for Using Leavitt's Diamond Model

Reduces stress during system implementation, encourages teamwork and collaboration, increases success rates of IS implementation.

New cards
5

Fundamental Information System Types

Personal IS - Individual productivity tools (e.g., Excel, email); Workgroup IS - Supports team collaboration (e.g., Google Drive, Slack); Enterprise IS - Organization-wide systems (e.g., ERP, CRM); Interorganizational IS - Links multiple organizations (e.g., supply chain management systems).

New cards
6

Role of Information Systems in Value Chains

Supports primary activities like inbound logistics, operations, outbound logistics, marketing, and service; enhances competitive advantage through efficiency and innovation.

New cards
7

Benefits of Strategic Planning

Provides a structured framework for decision-making, ensures optimal use of resources, enhances adaptability to change, improves communication and coordination.

New cards
8

Key Forces of IS Organizational Strategy Development

New technology innovations, business needs and market trends, cost efficiency and resource allocation, competitive pressures.

New cards
9

Perceptions of IS Organization

Perception 1: Cost center → IS seen as a necessary expense, leading to minimal investment; Perception 2: Service provider → IS supports business functions but lacks strategic influence; Perception 3: Business partner/peer → IS is aligned with corporate strategy and contributes to innovation.

New cards
10

Non-Technical Skills for IS Professionals

Problem-solving and critical thinking, communication and teamwork, project management, business analysis.

New cards
11

Importance of Certification in IS Field

Validates expertise and skills, enhances career opportunities, helps stay current with industry standards, increases credibility in the job market.

New cards
12

Importance of Learning About Computer Crime

Growing threat to individuals and organizations, financial and reputational damage, protects personal and corporate data.

New cards
13

Reasons for Prevalence of Computer Crime

Increased reliance on technology, more sophisticated hacking tools, lack of security awareness, global connectivity makes cybercrime easier.

New cards
14

Types of Cyberattack Perpetrators

Hackers, cybercriminals, insider threats (disgruntled employees), hacktivists.

New cards
15

Attack Vector

A method used to breach a system, network, or device.

New cards
16

Commonly Used Attack Vectors

Not specified in the provided notes.

New cards
17

Phishing emails

Fraudulent emails designed to trick recipients into revealing personal information.

New cards
18

Malware and ransomware

Malicious software designed to harm or exploit any programmable device or network.

New cards
19

Weak passwords

Passwords that are easily guessable or not complex enough to provide security.

New cards
20

Exploiting software vulnerabilities

Taking advantage of flaws in software to gain unauthorized access or cause harm.

New cards
21

Malware

Software specifically designed to disrupt, damage, or gain unauthorized access to computer systems.

New cards
22

Phishing attacks

Attempts to obtain sensitive information by masquerading as a trustworthy entity in electronic communication.

New cards
23

Denial-of-Service (DoS) attacks

Attacks aimed at making a machine or network resource unavailable to its intended users.

New cards
24

Insider threats

Security risks that originate from within the organization, often involving employees or contractors.

New cards
25

Financial loss

The loss of money or assets due to a successful cyberattack.

New cards
26

Reputation damage

Harm to an organization's public image as a result of a cyber incident.

New cards
27

Legal penalties

Consequences imposed by law for violations related to cybersecurity.

New cards
28

Data theft

The unauthorized acquisition of sensitive information.

New cards
29

Computer Fraud and Abuse Act (CFAA)

Criminalizes unauthorized access to systems.

New cards
30

Electronic Communications Privacy Act (ECPA)

Protects electronic communication privacy.

New cards
31

USA PATRIOT Act

Expands surveillance capabilities.

New cards
32

Confidentiality

Access control and encryption measures to protect sensitive information.

New cards
33

Integrity

Data validation and error checking processes to ensure data accuracy.

New cards
34

Availability

Backup systems and redundancy measures to ensure access to information.

New cards
35

Self-assessment of computer habits

Helps identify security vulnerabilities and reduces risk of cyber threats.

New cards
36

Security risk assessment steps

Identify assets, assess threats and vulnerabilities, implement security measures.

New cards
37

Response to a successful cyberattack

Contain the breach, notify affected parties, improve security policies.

New cards
38

Managed security service provider (MSSP)

Monitors and manages cybersecurity for organizations.

New cards
39

Computer forensics

Investigating digital crimes by analyzing electronic evidence.

New cards
40

Ethics and ethical dilemmas

Helps in decision-making and encourages responsible behavior.

New cards
41

Ethical vs. legal issues

Ethical issues are based on morals and values, while legal issues are defined by laws and regulations.

New cards
42

Promoting ethical behavior

Builds trust and credibility while reducing legal risks.

New cards
43

Ethical decision-making process steps

Recognize an ethical issue, get the facts, evaluate alternatives, make a decision, act and reflect.

New cards
44

Code of ethics intent and elements

Intent: Define expected behavior; Elements: High standards, decision-making guidance, accountability.

New cards
45

Benefits of following a code of ethics

Improves decision-making and builds public trust.

New cards
46

U.S. vs. EU information practices

U.S.: More industry-driven, less strict privacy laws; EU: Stronger privacy protections (e.g., GDPR).

New cards
47

Measures to protect personal data

Government regulations and corporate policies.

New cards
48

Measures individuals take for privacy

Use strong passwords, enable two-factor authentication, avoid sharing personal data unnecessarily.

New cards
49

Tradeoff between security and privacy

Strong security can limit privacy rights.

New cards
50

U.S. federal statutes on surveillance

Laws like ECPA and FISA regulate surveillance activities.

New cards
51

First Amendment and anonymous expression

Protects free speech and privacy in online communications.

New cards
52

Impact of censorship on ISPs

Limits access to information and can create compliance burdens.

New cards
53

Measures against defamation, hate speech, and pornography online

Content moderation policies and legal enforcement.

New cards
54

High-quality software vs. safety-critical systems

High-quality software: Reliable, efficient, user-friendly; Safety-critical systems: Must ensure zero failure in critical environments.

New cards
55

Development of safety-critical systems

Takes longer and costs more due to stringent requirements.

New cards
56

Safety-critical system

Requires extensive testing and compliance.

New cards
57

Ethical dilemmas for software developers

Data privacy vs. user tracking.

New cards
58

Ethical dilemmas for software developers

Security backdoors vs. Accessibility.

New cards
59

Data

Raw facts.

New cards
60

Information

Processed and organized data.

New cards
61

Knowledge

Understanding of information used for decision-making.

New cards
62

Entity

Object of interest (person, place, thing).

New cards
63

Attribute

Characteristic of an entity.

New cards
64

Primary Key

Uniquely identifies a record.

New cards
65

Foreign Key

Connects records between tables.

New cards
66

Database Management System (DBMS)

Manages and organizes databases.

New cards
67

Functions of DBMS

Data storage, retrieval, security, and backup.

New cards
68

Data Cleansing

Identifies and corrects inaccurate data.

New cards
69

Data Cleansing vs. Data Validation

Different from data validation.

New cards
70

Entity-Relationship (ER) Diagrams

Graphical representation of data structure.

New cards
71

Normalization

Reduces data redundancy and improves efficiency.

New cards
72

SQL

Language for database management (SELECT, FROM, WHERE).

New cards
73

ACID Properties

Ensures database integrity (Atomicity, Consistency, Isolation, Durability).

New cards
74

Database as a Service (DaaS)

Cloud-based database storage.

New cards
75

Data Governance

Defines roles and processes to ensure data integrity.

New cards
76

Data Management

Encompasses storage, security, and access policies.

New cards
77

Data Steward

Manages critical data entities.

New cards
78

Database Administrator (DBA)

Implements and manages database systems.

New cards
79

Big Data

Data is growing exponentially (nearly a zettabyte per year).

New cards
80

Sources of big data

Organizational databases, social media platforms, sensor and machine-generated data, transactional data from business operations.

New cards
81

Data Warehouses

Centralized storage for business data.

New cards
82

ETL process

Moves data from various sources to a warehouse.

New cards
83

Data Marts

Subset of a data warehouse, used by specific departments.

New cards
84

Data Lakes

Stores raw, unstructured data.

New cards
85

NoSQL Databases

Flexible data storage, not limited to table structures.

New cards
86

Hadoop

Open-source framework for big data storage and processing.

New cards
87

In-Memory Databases (IMDB)

Speeds up data retrieval.

New cards
88

Categories of NoSQL databases

Key-value, Document, Graph, Column.

New cards
89

Key-value

Uses key-value pairs (e.g., Redis).

New cards
90

Document

Stores and retrieves document-based data (e.g., MongoDB).

New cards
91

Graph

Analyzes relationships (e.g., Neo4j).

New cards
92

Column

Organizes data in columns for quick access (e.g., Cassandra).

New cards
93

Benefits of business intelligence (BI)

Enhances decision-making, identifies business trends, improves operational efficiency, enables predictive analytics.

New cards
94

Key components for effective BI and analytics

Strong data management program, skilled data scientists, commitment to data-driven decision-making.

New cards
95

E-commerce

Has transformed business operations and customer interactions.

New cards
96

Categories of e-commerce

Business-to-Business (B2B) - Companies selling to other businesses (e.g., suppliers, wholesalers).

New cards
97

Business-to-Consumer (B2C)

Direct sales to consumers (e.g., Amazon, Walmart).

New cards
98

Consumer-to-Consumer (C2C)

Peer-to-peer transactions through platforms (e.g., eBay, Etsy).

New cards
99

E-Government (G2C, G2B, G2G)

Government services online.

New cards
100

Key components of e-commerce technology infrastructure

Secure web hosting, online payment systems, mobile-friendly interfaces for m-commerce, search engine optimization (SEO), website personalization (implicit vs. explicit).

New cards
robot