Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
65 Cards in this Set
- Front
- Back
ERP
|
Enterprise resource planning – integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make enterprisewide decisions by viewing enterprisewide information on all business operations
|
|
reasons ERP systems are powerful organizational tools:
|
-logical solution to the mess of incompatible applications
-addresses the need for global info sharing and reporting -used to avoid the pain and expense fo fixing legacy systems |
|
ERP benefits
|
-Integrate financial information
-Integrate customer order information -Standardize and speed up manufacturing processes -Reduce inventory -Standardize human resource information |
|
ERP risks
|
software cost
consulting fees process rework customization integration and testing training data warehouse integration |
|
business process
|
a standardized set of activities that accomplish a specific task, such as processing a customer’s order
|
|
Supply Chain Management (SCM) –
|
involves the management of information flows between and among stages in a supply chain to maximize total supply chain effectiveness and profitability
|
|
goal of SCM:
|
Decrease the power of its buyers
Increase its own supplier power Increase switching costs to reduce the threat of substitute products or services Create entry barriers thereby reducing the threat of new entrants Increase efficiencies while seeking a competitive advantage through cost leadership |
|
personalization
|
when a Web site knows enough about a persons likes and dislikes that it can fashion offers that are more likely to appeal to that person
|
|
business intelligence
|
– information that people use to support their decision-making efforts
|
|
RFID tag
|
contains a microchip and an antenna, and typically work by transmitting a serial number via radio waves to an electronic reader, which confirms the identity of a person or object bearing the tag
|
|
ERP system provides a method for...
|
effective planning and controlling of all the resources required to take, make, ship, and account for customer orders in a manufacturing, distribution, or service org.
|
|
successful ERP projects share 3 attributes:
|
overall fit
proper business analysis solid implementation plans |
|
SAP-
|
the leading ERP vendor
|
|
ERP...
|
eliminates redundancies, reduces wasted time,
remoses misinformation |
|
3 components of ERP:
|
accounting and finance
production and materials management human resources |
|
How does this practice help Best Buy to optimize its supply chain??
|
they are PLANNING to have all resources to meet customer demand
SOURCE- they can see if suppliers got the inventory there on time LOGISTICS- they can plan for effective transportation and storage since they know how much inventory they have |
|
why is business intelligence software required in order for this to work?
|
business intelligence software tells Best Buy the information they need in order to make decisions about when and what inventory to order
|
|
is it possible for the results of such checks to be analyzed manually/visually?
|
no
you can't go to all 750 stores |
|
goal of business intelligence:
|
gain sustainable competitive advantage
|
|
benefits of business intelligence
|
competitive advantage
information can be turned into actionable knowledge |
|
authentication-
|
a method for confirming user's identities
once a system determines the authentication of a user, it can determine the access privledges |
|
datamining-
|
sifts thru lots of info to uncover patterns and relationships
|
|
how is data mining used in target marketing?
|
shows patterns of people who buy certain products so you can determine your target market for that product
|
|
how is data mining used in churn analysis?
|
CHURN ANALYSIS involves identifying those consumers who are most likely to discontinue using your service or product.
data mining can be used to find this, so you can take action to retain those customers |
|
configuration data
|
Refers to data entered into SAP to configure the system and establish the details of the business process models.
|
|
transactions data
|
Describes a business event or the result of a business process. Records activity within the business
|
|
vendor master record
|
Name, Address
Tax Jurisdiction Code Language Payment terms Currency Vender ID – Identifies vendor and serves as account number in accounts payable ledger |
|
materials master record
|
Trade Goods – Goods or materials that are purchased with the intent of being resold.
Raw Materials – Goods or materials purchased for use in manufacturing. Finished Goods – are manufactured goods which will be sold to customers. |
|
HIPPA
|
health insurance portability and accountability act
requires the health care industry formulate and implement regulations to keep patient info confidential. must document and keep current records detailing how theyre preforming securing measures for all transmissions of info protects privacy and security of personal health recoreds and has the potential to immpact every business in the US affects all companies that use EDI to communicate personal health records |
|
ethics-
|
principles and standards that guide our behavior toward other people
|
|
ethics issues affected by technology advances:
|
-intellectual property
-copyright -fair use doctrine -pirated software -counterfeit software |
|
information has no ethics-
|
Individuals form the only ethical component of IT
Information does not care how it is used Information will not stop itself from sending spam, viruses, or highly-sensitive information Information cannot delete or preserve itself |
|
acceptable use policy (AUP)
|
policy that a user must agree to follow in order to be provided access to a network or to the Internet
An AUP usually contains a nonrepudiation clause |
|
nonrepudiation-
|
a contractual stipulation to ensure that e-business participants do not deny (repudiate) their online actions
|
|
spam-
|
unsolicited e-mail
Spam accounts for 40% to 60% of most organizations’ e-mail and cost U.S. businesses over $14 billion in 2005 |
|
anti-spam policy
|
simply states that e-mail users will not send unsolicited e-mails (or spam)
|
|
One of the most common defenses for preventing a security breach is a FIREWALL-
|
hardware and/or software that guards a private network by analyzing the information leaving and entering the network
|
|
ENCRYPTION-
|
scrambles information into an alternative form that requires a key or password to decrypt the information
If there is an information security breach and the information was encrypted, the person stealing the information would be unable to read it |
|
Public key encryption (PKE) –
|
an encryption system that uses two keys: a public key for everyone and a private key for the recipient
|
|
There are three primary information technology security areas :
|
Authentication and authorization
Prevention and resistance Detection and response |
|
Authentication –
|
a method for confirming users’ identities
|
|
authorization-
|
the process of giving someone permission to do or have something
|
|
1st line of defense:
2nd: |
people
technology |
|
1st line of defense: people
|
Organizations must enable employees, customers, and partners to access information electronically
The biggest issue surrounding information security is not a technical issue, but a people issue 33% of security incidents originate within the organization Insiders – legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of The first line of defense an organization should follow to help combat insider issues is to develop information security policies and an information security plan Information security policies – identify the rules required to maintain information security Information security plan – details how an organization will implement the information security policies |
|
Hackers frequently use “social engineering” to obtain password
Social engineering – |
using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker
|
|
detection and response-
|
If prevention and resistance strategies fail and there is a security breach, an organization can use detection and response technologies to mitigate the damage
Antivirus software is the most common type of detection and response technology |
|
Security threats to e-business include:
|
Elevation of privilege
Hoaxes Malicious code Spoofing Spyware Sniffer Packet tampering |
|
hacker-
|
people very knowledgeable about computers who use their knowledge to invade other people’s computers
White-hat hacker Black-hat hacker Hactivist Script kiddies or script bunnies Cracker Cyberterrorist |
|
virus-
|
software written with malicious intent to cause annoyance or damage
Worm Denial-of-service attack (DoS) Distributed denial-of-service attack (DDoS) Trojan-horse virus Backdoor program Polymorphic virus and worm |
|
brick and mortor business-
|
no selling online
an e-business |
|
click and mortor business-
|
e-commerce AND e-business
|
|
white hat hacker
|
work at the request of the system owners to find system vulnerabilities and plug the holes
|
|
black hat hackers
|
sbreak into other ppls computer systems and may just look around or ma steal and destroy info
|
|
hactivists
|
have philosophical and political reasons for breaking into systems and will often deface the website as a protest
|
|
script kiddies/bunnies
|
find hacking code on the internet and click and point their way into systems to cause damage or spread viruses
|
|
cracker
|
hacker with criminal intent
|
|
cyberterrorist
|
seek to cause harm to people ro destroy critical systems or info and use the internet as a weapon of mass destruction
|
|
worm-
|
type of virus that spreads itself from computer to computer. VIRUS must attach to something in order to spread, WORMS do not neeed to attach to anything to spread and can tunnel themselves into computers
|
|
denial of service attack DoS
|
floods a website w/ so many requests for service that it slows down or crashes
|
|
distributed denial of service attack (DDoS)
|
attacks from multiple computers that flood a website w/ so many requests it slows or crashes. ocmmon type is the PING OF DEATH- where thousonds of computers try to acccess a website at the same time shutting it down
|
|
trojan horse virus
|
hides inside other software, usually as an attachment or downloadable file
|
|
backdoor programs-
|
viruses that open a way into the network for future attacks
|
|
polymorphic viruses and worms
|
schange form as they propogate
|
|
SAP
|
Enables a company to link it’s business processes
Ties together disparate business functions (integrated business solution) Helps the organization run smoothly Real-time environment Scalable and flexible |
|
GIS
|
geographic information system
designed to work w/ info that can be shown on a map |