Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
109 Cards in this Set
- Front
- Back
CHAPTER 11 |
CHAPTER 11 |
|
What are expert systems? |
capture the knowledge of skilled employees in the form of a set of rules in a software system that can be used by others in the organization |
|
Four different types of expert systems |
• Knowledge Base
• Inference Engine • Forward Chaining • Backward Chaining |
|
Four different types of case-based reasoning |
•Fuzzy Logic Systems
•Machine Learning •Neural Networks •Genetic Algorithms |
|
Case-based reasoning represents knowledge as... |
a database of past cases and other solutions |
|
Types of decisions? (3) |
Unstructured: non-routine requiring judgement and insights Structured: routine decisions with definite procedures Semi-structured: Only part of the decision has clear-cut answers |
|
Decision-making process (4) |
1. Intelligence 2. Design 3. Choice 4. Implementation |
|
Managerial Roles (2 Models) |
Classical and behavioral |
|
Categories of Managerial Roles (3) |
Interpersonal Roles Informational Decisional |
|
Real-world Decision Making (3) |
Information quality: High-quality decisions require high-quality information
Management filters: Managers have selective attention and have variety of biases that reject information that does not conform to prior conceptions Organizational inertia and culture: Strong forces within organizations resist making decisions calling for major change |
|
What is High-Velocity Automated Decision Making and list an Example? |
Made possible through computer algorithms precisely defining steps for a highly structured decision Ex. high speed computer trading platforms
|
|
What is business Intelligence? |
Infrastructure for collecting, storing, analyzing data produced by business
|
|
6 elements in the business intelligence environment ? |
1. Data from the business environment
2.Business intelligence infrastructure 3.Business analytics toolset 4.Managerial users and methods 5.Delivery platform–MIS, DSS, ESS 6.User interface |
|
List some of the Business Intelligence and Analytic capabilities |
Production Reports
Formalized Reports Dashboards/scorecards Ad hoc/query/search/report creation Drill Down Forecasts, scenarios, models |
|
Business Intelligence Users (3) |
Predictive Analytics Data Visualization Geographic Infomation Systems (GIS) |
|
Management Strategies for Developing BI and BA Capabilities (2)
|
1. One-stop integrated solution 2. Multiple best-of-breed solution |
|
CHAPTER 10 |
CHAPTER 10 |
|
Types of E-Commerce (3) |
Business-to-customer (B2C): Retailing of productsand services directly to individual customers(Chapters.Indigo.ca)
Business-to-business (B2B): Sales of goods andservices to other businesses (ChemConnect) Consumer-to-consumer (C2C): Individuals using theWeb for private sales or exchange (Kijiji) |
|
Name some E-Commerce revenue Models... |
Advertising
Sales Subscription Free/Freemium Transaction Fee Affiliate |
|
E-Commerce Markting (2) |
Long-tail Marketing Behavioral Targeting |
|
Most Popular Web 2.0 service....? |
Social Networking |
|
What are prediction Markets? |
Peer-to-peer bettting market on specific outcomes (Ex. elections, Salesfigures) |
|
B2B e-commerce: New Efficiencies and Relationships..... name a couple? |
Electronic data interchange (EDI)•Private industrial networks (private exchanges)•Net marketplaces•Exchanges
|
|
Mobile digital Platform and mobile e-commerce... list a couple services and apllications? |
Location-based Services
Banking and Financial Services Wireless Advertising and Retailing Games and Entertainment |
|
building a web site in-house versus outsourcing... name three factors that would affect the decision making process? |
The development decision, The hosting decision, and the budget |
|
CHAPTER 9 |
CHAPTER 9 |
|
What are enterprise systems? |
Suite of integrated software modules and a common central database |
|
To implement enterprise software what should companies do? (3) |
Select functions of system they wish to use
Map business processes to software processes Use software’s configuration tables for customizing |
|
The business value of enterprise systems (3) |
A more uniform organization
More efficient operations and customer-driven business processes Firm-wide information for improved decision making |
|
Supply Chain management systems help with...? |
linking suppliers, distribution, retail outlets, and customers |
|
Inefficiencies cut into operating costs and can waste up to ____ of _______ ________ |
25% of Operating expenses |
|
Supply chain Management software has two systems, what are they? |
Planning and execution systems |
|
What are the two different types of Demand-Drive supply chains? |
Push based (based on forecasts or best guesses of demand) and Pull based (actual customer order triggers purcahse |
|
What are Customer Relationship Management systems (CRM) |
Capture and integrate customer data, consolidate it, and analyse it distributing the results to various points |
|
PRM and ERM stand for? |
Partner relationship management (PRM) Employee relationship management (ERM)
|
|
Most CRM software has modules for (3) |
Sales force Automation Customer Service Marketing |
|
Opertational CRM |
Customer-facing applications such as call centre and customer service support |
|
Analytical CRM |
Based on data warehouses that consolidate the data for data analysis |
|
Business Value of CRM systems.... name a couple? |
Increased customer satisfaction
Reduced direct-marketing costs More effective marketing Lower costs for customer acquisition/retention Increased sales revenue Reduced churn rate |
|
CHAPTER 8 |
CHAPTER 8 |
|
In terms of system vulnerability and abuse there are two main ways to prevent them, what are they?
|
Security and controls |
|
Security is? |
Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems
|
|
Controls are? |
Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards
|
|
Why are systems vulnerable name two things? |
Accessibility of networks
Hardware problems (breakdowns, configuration errors, damage from improper use or crime) Software problems (programming errors, installation errors, unauthorized changes) Disasters Use of networks/computers outside of firm’s control Loss and theft of portable devices |
|
Internet vulnerabilities, list 2 |
Network open to anyone
Size of Internet means abuses can have wide impact Use of fixed Internet addresses with cable or DSL modems creates fixed targets for hackers Unencrypted VoIP E-mail, P2P, IM |
|
What are two wireless security challenges? |
Radio frequency bands easy to scan
SSIDs (service set identifiers): Broadcast the access point multiple times |
|
Is terms of Malicious software there is? |
Computer viruses - (attach to other programs, execute without user approval) Worms - (Programs that copy form computer to computer, can destroy data and programs) Trojan horses (A software program that appears to be benign, but then does something unexpected) Spyware (Keylogging) |
|
What is spoofing? |
Masquerading as someone else, or redirecting a Web link to an unintended address
|
|
What is Sniffing |
An eavesdropping program that monitors information travelling over a network
|
|
What are Denial of Service attacks? |
Hackers flood a server with false communications in order to crash the system
|
|
Two ways that identity theft is performed? |
Phishing : (Setting up fake web sites to ask for confidential data) Pharming : redirecting users to a bogus web site) |
|
What is social engineering? (Hint: internal threat) |
Tricking employees into revealing their passwords by pretending to be legitimate members of the company
|
|
What are the repercussions of security and control in terms of a business? |
Significant or total loss of business function, may cut into firms market value, and can bring forth issues of liability |
|
What are patches? |
Small pieces of software that repairs flaws |
|
Firewalls are? |
hardware/software that controls the flow of network traffic |
|
CHAPTER 7 |
CHAPTER 7 |
|
What is client/server Computing? |
Clients linked through network controlled by network server computer. server provides every user with an address so other users can find them |
|
What is packet switching? |
method of slicing digital messages into parcels which go along different communication paths as they become available |
|
TCP stand for? |
Transmission Control Protocol |
|
SEO stands for? |
Seach engine optimization |
|
What is semantic search? |
anticipating what the person is going to search for |
|
Web 2.0 is blogs, wikis, social software where as web 3.0 is a ____ ___? |
semantic web |
|
CHAPTER 6
|
CHAPTER 6 |
|
What is a Hadoop? |
Designed to handle big data. Parallel processing of hugh amount of data across inexpensive computers |
|
OLAP stands for |
Online analytical Processing |
|
DBMS stands for? |
database management systems |
|
SQL stands for? |
Structured query language |
|
What is Data Mining? |
Tools for analyzing large pools of data |
|
CHAPTER 5 |
CHAPTER 5 |
|
What is Moore's Law? |
Interpreted as: Every 18 months computing power doubles and the price falls in half |
|
What is the law of mass digital storage? |
-The amount of digital information is roughly doubling every year - the cost of storage is falling at an exponential rate of 100% a year |
|
What is Metcalfe's law? |
The value of a network grows exponentially as a function of the number of network members |
|
What is a mainframe system used for within an enterprise network/corporate websites? |
Giant Servers |
|
Who are the largest suppliers of enterprise software |
SAP and Oracle |
|
What is a SAN? |
Storage area network |
|
What does BYOD stand for in terms of the mobile digital platform? |
Bring your own device |
|
What is Grid computing? |
connecting remote computers for the purpose of short term access to large computational capacity |
|
CHAPTER 4 |
CHAPTER 4 |
|
What is Behavioural Targeting? |
allows businesses and organizations to more precisely target a desired demographic |
|
What are the 5 moral dimensions of the information age? |
Information rights and obligations
Property rights and obligations Accountability and control System quality Quality of life |
|
What is Nonobvious relationship awareness (NORA)? |
Takes information about people from disparate sources and finds obscure nonobvious relationships |
|
What is Immanuel Kant's Categorical Imperative? |
If an action is not for to then it is not right for anyone |
|
What is Descartes' rule of change? |
If an action cannot be taken repeatedly, then it is not right to be taken at any time |
|
CHAPTER 3 |
Information Systems, Organizations, and Strategy |
|
What are first movers? |
Inventors of disruptive technologies |
|
Fast Followers |
Firms with the size and resources to capitalize on that technology |
|
What is Transaction Cost Theory? |
Firms seek to economize on cost of participating in market Ex. T lowers market transaction costs for firm, making it worthwhile for firms to transact with other firms rather than grow the number of employees |
|
What is the Agency Theory |
Firm is nexus of contracts among self interested parties requiring supervision |
|
The value web means...? |
a system that can synchronize the value chains of business partners and respond to changes rapidly |
|
A keystone firm is...? |
a firm that dominates the ecosystem and creates platforms used by other firms |
|
MIS Stands for? |
Management Information Systems |
|
MIS does what? |
Servers middle management, provides answers to routine questions with predefined procedure for answering them |
|
DSS Stands for |
Decision Support Systems |
|
DSS does what? |
Servers middle management, support non-routine decision making |
|
ESS Stands for |
Executive Support Systems |
|
ESS does what? |
Supports senior management, address non-routine decisions requiring judgement, evaluation and insight. |
|
SCM Stands for? |
Supply chain management systems |
|
SCM does what? |
Manage a firms relationships with its suppliers. GOALS right amount of products to destination with least amount of time and lowest cost |
|
KMS stands for? |
Knowledge Management Systems |
|
CRM stands for? |
Customer Relationship Management Systems |
|
CRM does what? |
Integrate firm’s customer-related processes and consolidate customer information from multiple communication channels
|
|
ERP stands for? |
Enterprise Resource Planning |
|
KMS does what? |
Support processes for acquiring, creating, storing, distributing, applying, integrating knowledge
|
|
What is social business? |
to deepen interactions with groups inside and outside of the firm |
|
CHAPTER 12 |
Managing Global Systems |
|
What are the four main global strategies? |
Domestic exporter, Multinational, Franchisers, Transnational |
|
The Four kinds of organizations for global strategies? |
Centralized (Systems development and operation occur totally at domestic home base) Duplicated (development occurs at home base but operation are handed over to autonomous units in foreign locations) Decentralized (Each foreign unit designs own solutions and systems) Networked (Development and operations occur in coordinated fashion across all units) |
|
Steps to a global system strategy? (4) |
1. Define core business processes 2. Identify core systems to coordinate centrally 3. Choose an approach 4. Make benefits clear |
|
Technology challenges of global systems? (3) |
Computing platforms and systems integration Connectivity Software (Localization, Managing global software development) |