MIS 180

studied byStudied by 2 People
0.0(0)
Get a hint
hint

Business intelligence (BI)

1/111

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

Studying Progress

New cards
111
Still learning
0
Almost done
0
Mastered
0
111 Terms
New cards

Business intelligence (BI)

provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace.

New cards
New cards

Computer literacy

is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, as well as having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies.

New cards
New cards

Data

consists of raw facts and is a component of an information system.

New cards
New cards

Database

A database is a collection of all relevant data organized in a series of integrated files.

New cards
New cards

Five Forces Model

Michael Porter's Five Forces Model analyzes an organization, its position in the marketplace, and how information systems could be used to make it more competitive. The five forces include buyer power, supplier power, threat of substitute products or services, threat of new entrants, and rivalry among existing competitors.

New cards
New cards

Information

consists of facts that have been analyzed by the process component and is an output of an information system.

New cards
New cards

Information literacy

is understanding the role of information in generating and using business intelligence.

New cards
New cards

Information technologies

support information systems and use the Internet, computer networks, database systems, POS systems, and RFID tags.

New cards
New cards

Management information system (MIS)

A management information system (MIS) is an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes.

New cards
New cards

Process

The process component of an information system generates the most useful type of information for decision making, including transaction-processing reports and models for decision analysis.

New cards
New cards

Strategic information systems (SISs)

focus on big-picture, long-term goals and objectives and assist an organization or a decision maker to achieve them.

New cards
New cards

Transaction-processing systems (TPSs)

focus on data collection and processing; the major reason for using them is cost reduction.

New cards
New cards

Artificial intelligence (AI)

consists of related technologies that try to simulate and reproduce human thought and behavior, including thinking, speaking, feeling, and reasoning. AI technologies apply computers to areas that require knowledge, perception, reasoning, understanding, and cognitive abilities.

New cards
New cards

Artificial neural networks (ANNs)

are networks that learn and are capable of performing tasks that are difficult with conventional computers, such as playing chess, recognizing patterns in faces and objects, and filtering spam e-mail.

New cards
New cards

Augmented intelligence

The goal of augmented intelligence is to complement decision makers, not replace them.

New cards
New cards

Backward chaining

In backward chaining, the expert system starts with the goal—the "then" part—and backtracks to find the right solution.

New cards
New cards

Case-based reasoning (CBR)

is a problem-solving technique that matches a new case (problem) with a previously solved case and its solution, the details of which have been stored in a database. After finding a match, the CBR system offers a solution; if no match is found, even after more information is supplied, the human expert must solve the problem.

New cards
New cards

Contextual computing

refers to a computing environment that is always present, can feel our surroundings, and—based on who we are, where we are, and whom we are with—offer recommendations.

New cards
New cards

Data-mining agents

work with a data warehouse, detecting trends and discovering new information and relationships among data items that were not readily apparent.

New cards
New cards

Expert systems

mimic human expertise in a particular field to solve a problem in a well-defined area.

New cards
New cards

Explanation facility

An explanation facility performs tasks similar to what a human expert does by explaining to end users how recommendations are derived.

New cards
New cards

Forward chaining

In forward chaining, a series of "if-then-else" condition pairs is performed.

New cards
New cards

Fuzzy logic

allows a smooth, gradual transition between human and computer vocabularies and deals with variations in linguistic terms by using a degree of membership.

New cards
New cards

Genetic algorithms (GAs)

are search algorithms that mimic the process of natural evolution. They are used to generate solutions to optimization and search problems using such techniques as mutation, selection, crossover, and chromosome.

New cards
New cards

Inference engine

An inference engine is similar to the model base component of a decision support system. By using different techniques such as forward and backward chaining, it manipulates a series of rules.

New cards
New cards

Intelligent agents

are software capable of reasoning and following rule-based processes; they are becoming more popular, especially in e-commerce.

New cards
New cards

Knowledge acquisition facility

A knowledge acquisition facility is a software package with manual or automated methods for acquiring and incorporating new rules and facts, making the expert system capable of growth.

New cards
New cards

Knowledge base

A knowledge base is similar to a database, but in addition to storing facts and figures, it keeps track of rules and explanations associated with facts.

New cards
New cards

Knowledge base management system (KBMS)

A knowledge base management system (KBMS), similar to a DBMS, is used to keep the knowledge base updated with changes to facts, figures, and rules.

New cards
New cards

Machine learning

is a process and procedure by which knowledge is gained through experience. In other words, computers learn without being explicitly programmed.

New cards
New cards

Monitoring and surveillance agents

usually track and report on computer equipment and network systems to predict when a system crash or failure might occur.

New cards
New cards

Natural-language processing (NLP)

was developed so users could communicate with computers in human language.

New cards
New cards

Personal agents

perform specific tasks for a user, such as remembering information for filling out Web forms or completing e-mail addresses after the first few characters are typed.

New cards
New cards

Robots

are one of the most successful applications of AI. They perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs.

New cards
New cards

Shopping and information agents

help users navigate through the vast resources available on the Web and provide better results in finding information. These agents can navigate the Web much faster than humans and gather more consistent, detailed information. They can serve as search engines, site reminders, or personal surfing assistants.

New cards
New cards

Soft robot

A soft robot is made of elastomer, is simpler to make and less expensive than conventional robots, and is used for an increasing number of applications.

New cards
New cards

Business networking ethics

advocates that to maintain a business network, not only should the organization provide open and fair access to all authorized users, it should also consider three types of networking: utilitarian, emotional, and virtuous.

New cards
New cards

Acceptable use policies

An acceptable use policy is a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.

New cards
New cards

Accountability

refers to issues involving both a user's and organization's responsibilities and liabilities.

New cards
New cards

Cheap fakes

sometimes known as the new fake news, are audiovisual manipulations of events created with cheap software that's readily available on the Web and then modified using Photoshop and other tools and distributed through the Web.

New cards
New cards

Cookies

are small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.

New cards
New cards

Cybersquatting

is registering, selling, or using a domain name to profit from someone else's trademark.

New cards
New cards

Deepfakes

are fake videos or audio recordings that look and sound just like real events.

New cards
New cards

Digital citizenship

means using information technology safely, ethically, and responsibly.

New cards
New cards

Digital divide

Information technology and the Internet have created a ________. Computers are still not affordable for many people. The digital divide has implications for education.

New cards
New cards

Disinformation

is fake information that is knowingly distributed.

New cards
New cards

Fake news

is a story or hoax created to intentionally misinform or deceive readers.

New cards
New cards

General Data Protection Regulation (GDPR)

The (GDPR) covers a series of laws that protect European Union (EU) citizens' personal data, including genetic data, health records, racial or ethnic origin, and religious beliefs.

New cards
New cards

Green computing

involves the design, manufacture, use, and disposal of computers, servers, and other computing devices so that there is minimal impact on the environment.

New cards
New cards

Intellectual property

is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for "creations of the mind" developed by people or businesses.

New cards
New cards

Log files

which are generated by Web server software, record a user's actions on a Web site.

New cards
New cards

Misinformation

is fake information that is distributed to an audience, regardless of intent to mislead.

New cards
New cards

Nonrepudiation

is a method for binding all parties to a contract.

New cards
New cards

Social media networking ethics

advocates that social media should be open and provide fair access to all of its users.

New cards
New cards

Spam

is an unsolicited e-mail sent for advertising purposes.

New cards
New cards

Virtual organizations

are networks of independent companies, suppliers, customers, and manufacturers connected via information technology so they can share skills and costs and have access to each other's markets.

New cards
New cards

Access controls

are designed to protect systems from unauthorized access in order to preserve data integrity.

New cards
New cards

Adware

is a form of spyware that collects information about the user (without the user's consent) to determine which advertisements to display in the user's Web browser.

New cards
New cards

Asymmetric encryption

uses two keys: a public key known to everyone and a private or secret key known only to the recipient. A message encrypted with a public key can be decrypted only with the same algorithm used by the public key and requires the recipient's private key, too. Any people who intercept the message cannot decrypt it because they do not have the private key.

New cards
New cards

Authentication tokens

improve security by transmitting a security token among connected applications. The user logs in once with approved credentials, and then a unique token is generated and shared with connected applications or Web sites to verify the user's identity for a given period.

New cards
New cards

Availability

means that computers and networks are operating, and that authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster.

New cards
New cards

Backdoors

A backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

New cards
New cards

Baiting

is similar to phishing attacks. What distinguishes it from phishing is the promise that the baiter gives to the recipient.

New cards
New cards

Biometric security measures

use a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others.

New cards
New cards

Black hats

Hackers who specialize in unauthorized penetration of information systems. They attack systems for profit, fun, or political motivation or as part of a social cause. These penetration attacks often involve modifying and destroying data.

New cards
New cards

Blended threats

A blended threat is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.

New cards
New cards

Brain passwords

A brain password is a digital reading of a user's brain activity while looking at a series of images. These brain activities are recorded in a database. To log in to a system or enter a secure room, the user puts on a special hat and again watches the sequence of images. The new brain activities are compared with the ones in the database and then access is given or denied.

New cards
New cards

Business continuity planning

outlines procedures for keeping an organization operational after a natural disaster or network attack.

New cards
New cards

Callback modem

A callback modem verifies whether a user's access is valid by logging the user off (after the user attempts to connect to the network) and then calling the user back at a predetermined number.

New cards
New cards

Computer fraud

is the unauthorized use of computer data for personal gain.

New cards
New cards

Confidentiality

means that a system must prevent disclosing information to anyone who is not authorized to access it.

New cards
New cards

Cryptojacking

occurs when hackers secretly use the computing power of a user to mine cryptocurrency.

New cards
New cards

Data encryption

transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others.

New cards
New cards

Denial-of-service attacks

A denial-of-service (DoS) attack floods a network or server with service requests to prevent legitimate users' access to the system.

New cards
New cards

DNA identification

gathers a user's unique behavioral characteristics and then creates an "eDNA" profile that is used for identification when the user tries to log in to a system.

New cards
New cards

Fault-tolerant systems

ensure availability in the event of a system failure by using a combination of hardware and software.

New cards
New cards

Firewall

A firewall is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all other data transmissions are blocked.

New cards
New cards

Gray hats

As you might imagine, they are a mixture of black and white hacking. Gray hats may violate laws or ethical standards, but they do not have the malicious intent to harm a person or a system. They look for vulnerabilities in a system without the owner's permission or knowledge. They may inform the owner that they have found vulnerabilities and will fix them for a small fee.

New cards
New cards

Implanted microchips

a controversial technology, are microchips the size of a grain of rice that are inserted between the thumb and the index finger. The microchip can store various information, including that for a user's ID cards and credit cards, which could be used to log in to Web sites and to enter a secure room.

New cards
New cards

Integrity

refers to the accuracy of information resources within an organization.

New cards
New cards

Intrusion detection system (IDS)

An intrusion detection system (IDS) can protect against both external and internal access. It is usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for the network administrator, and cause routers to terminate connections with suspicious sources.

New cards
New cards

Keystroke loggers

are software or hardware devices that monitor and record keystrokes.

New cards
New cards

Logic bombs

A logic bomb is a type of Trojan program used to release a virus, worm, or other destructive code. Logic bombs are triggered at a certain time (sometimes the birthday of a famous person) or by a specific event, such as a user pressing the Enter key or running a certain program.

New cards
New cards

Password

A password is a combination of numbers, characters, and symbols that a user enters to gain access to a system.

New cards