ISDS 351 Mid-Term Review Guide

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/117

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:21 AM on 3/13/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

118 Terms

1
New cards

Information Systems

Helps rework products and services, recognize and capitalize on IS opportunities, enhances career advancement opportunities, improves problem-solving and decision-making skills, defines IT policies and supports new IT solutions, increases productivity and sustains competitive advantage.

2
New cards

Key Management Responsibilities

Identifying and using information systems for competitive advantage; managing people, technology infrastructure, processes, and organizational structure.

3
New cards

Leavitt's Diamond Model

A framework for introducing new systems into the workplace with four key components: People, Technology Infrastructure, Processes, and Structure.

4
New cards

Reasons for Using Leavitt's Diamond Model

Reduces stress during system implementation, encourages teamwork and collaboration, increases success rates of IS implementation.

5
New cards

Fundamental Information System Types

Personal IS - Individual productivity tools (e.g., Excel, email); Workgroup IS - Supports team collaboration (e.g., Google Drive, Slack); Enterprise IS - Organization-wide systems (e.g., ERP, CRM); Interorganizational IS - Links multiple organizations (e.g., supply chain management systems).

6
New cards

Role of Information Systems in Value Chains

Supports primary activities like inbound logistics, operations, outbound logistics, marketing, and service; enhances competitive advantage through efficiency and innovation.

7
New cards

Benefits of Strategic Planning

Provides a structured framework for decision-making, ensures optimal use of resources, enhances adaptability to change, improves communication and coordination.

8
New cards

Key Forces of IS Organizational Strategy Development

New technology innovations, business needs and market trends, cost efficiency and resource allocation, competitive pressures.

9
New cards

Perceptions of IS Organization

Perception 1: Cost center → IS seen as a necessary expense, leading to minimal investment; Perception 2: Service provider → IS supports business functions but lacks strategic influence; Perception 3: Business partner/peer → IS is aligned with corporate strategy and contributes to innovation.

10
New cards

Non-Technical Skills for IS Professionals

Problem-solving and critical thinking, communication and teamwork, project management, business analysis.

11
New cards

Importance of Certification in IS Field

Validates expertise and skills, enhances career opportunities, helps stay current with industry standards, increases credibility in the job market.

12
New cards

Importance of Learning About Computer Crime

Growing threat to individuals and organizations, financial and reputational damage, protects personal and corporate data.

13
New cards

Reasons for Prevalence of Computer Crime

Increased reliance on technology, more sophisticated hacking tools, lack of security awareness, global connectivity makes cybercrime easier.

14
New cards

Types of Cyberattack Perpetrators

Hackers, cybercriminals, insider threats (disgruntled employees), hacktivists.

15
New cards

Attack Vector

A method used to breach a system, network, or device.

16
New cards

Commonly Used Attack Vectors

Not specified in the provided notes.

17
New cards

Phishing emails

Fraudulent emails designed to trick recipients into revealing personal information.

18
New cards

Malware and ransomware

Malicious software designed to harm or exploit any programmable device or network.

19
New cards

Weak passwords

Passwords that are easily guessable or not complex enough to provide security.

20
New cards

Exploiting software vulnerabilities

Taking advantage of flaws in software to gain unauthorized access or cause harm.

21
New cards

Malware

Software specifically designed to disrupt, damage, or gain unauthorized access to computer systems.

22
New cards

Phishing attacks

Attempts to obtain sensitive information by masquerading as a trustworthy entity in electronic communication.

23
New cards

Denial-of-Service (DoS) attacks

Attacks aimed at making a machine or network resource unavailable to its intended users.

24
New cards

Insider threats

Security risks that originate from within the organization, often involving employees or contractors.

25
New cards

Financial loss

The loss of money or assets due to a successful cyberattack.

26
New cards

Reputation damage

Harm to an organization's public image as a result of a cyber incident.

27
New cards

Legal penalties

Consequences imposed by law for violations related to cybersecurity.

28
New cards

Data theft

The unauthorized acquisition of sensitive information.

29
New cards

Computer Fraud and Abuse Act (CFAA)

Criminalizes unauthorized access to systems.

30
New cards

Electronic Communications Privacy Act (ECPA)

Protects electronic communication privacy.

31
New cards

USA PATRIOT Act

Expands surveillance capabilities.

32
New cards

Confidentiality

Access control and encryption measures to protect sensitive information.

33
New cards

Integrity

Data validation and error checking processes to ensure data accuracy.

34
New cards

Availability

Backup systems and redundancy measures to ensure access to information.

35
New cards

Self-assessment of computer habits

Helps identify security vulnerabilities and reduces risk of cyber threats.

36
New cards

Security risk assessment steps

Identify assets, assess threats and vulnerabilities, implement security measures.

37
New cards

Response to a successful cyberattack

Contain the breach, notify affected parties, improve security policies.

38
New cards

Managed security service provider (MSSP)

Monitors and manages cybersecurity for organizations.

39
New cards

Computer forensics

Investigating digital crimes by analyzing electronic evidence.

40
New cards

Ethics and ethical dilemmas

Helps in decision-making and encourages responsible behavior.

41
New cards

Ethical vs. legal issues

Ethical issues are based on morals and values, while legal issues are defined by laws and regulations.

42
New cards

Promoting ethical behavior

Builds trust and credibility while reducing legal risks.

43
New cards

Ethical decision-making process steps

Recognize an ethical issue, get the facts, evaluate alternatives, make a decision, act and reflect.

44
New cards

Code of ethics intent and elements

Intent: Define expected behavior; Elements: High standards, decision-making guidance, accountability.

45
New cards

Benefits of following a code of ethics

Improves decision-making and builds public trust.

46
New cards

U.S. vs. EU information practices

U.S.: More industry-driven, less strict privacy laws; EU: Stronger privacy protections (e.g., GDPR).

47
New cards

Measures to protect personal data

Government regulations and corporate policies.

48
New cards

Measures individuals take for privacy

Use strong passwords, enable two-factor authentication, avoid sharing personal data unnecessarily.

49
New cards

Tradeoff between security and privacy

Strong security can limit privacy rights.

50
New cards

U.S. federal statutes on surveillance

Laws like ECPA and FISA regulate surveillance activities.

51
New cards

First Amendment and anonymous expression

Protects free speech and privacy in online communications.

52
New cards

Impact of censorship on ISPs

Limits access to information and can create compliance burdens.

53
New cards

Measures against defamation, hate speech, and pornography online

Content moderation policies and legal enforcement.

54
New cards

High-quality software vs. safety-critical systems

High-quality software: Reliable, efficient, user-friendly; Safety-critical systems: Must ensure zero failure in critical environments.

55
New cards

Development of safety-critical systems

Takes longer and costs more due to stringent requirements.

56
New cards

Safety-critical system

Requires extensive testing and compliance.

57
New cards

Ethical dilemmas for software developers

Data privacy vs. user tracking.

58
New cards

Ethical dilemmas for software developers

Security backdoors vs. Accessibility.

59
New cards

Data

Raw facts.

60
New cards

Information

Processed and organized data.

61
New cards

Knowledge

Understanding of information used for decision-making.

62
New cards

Entity

Object of interest (person, place, thing).

63
New cards

Attribute

Characteristic of an entity.

64
New cards

Primary Key

Uniquely identifies a record.

65
New cards

Foreign Key

Connects records between tables.

66
New cards

Database Management System (DBMS)

Manages and organizes databases.

67
New cards

Functions of DBMS

Data storage, retrieval, security, and backup.

68
New cards

Data Cleansing

Identifies and corrects inaccurate data.

69
New cards

Data Cleansing vs. Data Validation

Different from data validation.

70
New cards

Entity-Relationship (ER) Diagrams

Graphical representation of data structure.

71
New cards

Normalization

Reduces data redundancy and improves efficiency.

72
New cards

SQL

Language for database management (SELECT, FROM, WHERE).

73
New cards

ACID Properties

Ensures database integrity (Atomicity, Consistency, Isolation, Durability).

74
New cards

Database as a Service (DaaS)

Cloud-based database storage.

75
New cards

Data Governance

Defines roles and processes to ensure data integrity.

76
New cards

Data Management

Encompasses storage, security, and access policies.

77
New cards

Data Steward

Manages critical data entities.

78
New cards

Database Administrator (DBA)

Implements and manages database systems.

79
New cards

Big Data

Data is growing exponentially (nearly a zettabyte per year).

80
New cards

Sources of big data

Organizational databases, social media platforms, sensor and machine-generated data, transactional data from business operations.

81
New cards

Data Warehouses

Centralized storage for business data.

82
New cards

ETL process

Moves data from various sources to a warehouse.

83
New cards

Data Marts

Subset of a data warehouse, used by specific departments.

84
New cards

Data Lakes

Stores raw, unstructured data.

85
New cards

NoSQL Databases

Flexible data storage, not limited to table structures.

86
New cards

Hadoop

Open-source framework for big data storage and processing.

87
New cards

In-Memory Databases (IMDB)

Speeds up data retrieval.

88
New cards

Categories of NoSQL databases

Key-value, Document, Graph, Column.

89
New cards

Key-value

Uses key-value pairs (e.g., Redis).

90
New cards

Document

Stores and retrieves document-based data (e.g., MongoDB).

91
New cards

Graph

Analyzes relationships (e.g., Neo4j).

92
New cards

Column

Organizes data in columns for quick access (e.g., Cassandra).

93
New cards

Benefits of business intelligence (BI)

Enhances decision-making, identifies business trends, improves operational efficiency, enables predictive analytics.

94
New cards

Key components for effective BI and analytics

Strong data management program, skilled data scientists, commitment to data-driven decision-making.

95
New cards

E-commerce

Has transformed business operations and customer interactions.

96
New cards

Categories of e-commerce

Business-to-Business (B2B) - Companies selling to other businesses (e.g., suppliers, wholesalers).

97
New cards

Business-to-Consumer (B2C)

Direct sales to consumers (e.g., Amazon, Walmart).

98
New cards

Consumer-to-Consumer (C2C)

Peer-to-peer transactions through platforms (e.g., eBay, Etsy).

99
New cards

E-Government (G2C, G2B, G2G)

Government services online.

100
New cards

Key components of e-commerce technology infrastructure

Secure web hosting, online payment systems, mobile-friendly interfaces for m-commerce, search engine optimization (SEO), website personalization (implicit vs. explicit).