Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
87 Cards in this Set
- Front
- Back
Six Major Strategic Reasons for CBIS |
|
|
5 Primary Activities in Value Chain Model |
|
|
4 Support Activities in Value Chain Model |
|
|
HIPPA |
Health Insurance Portability & Privacy Act Regulates use and disclosure of protected health information |
|
COPPA |
Children's Online Privacy Protection Act Includes what website musts include in privacy policy and their responsibility for protecting children's privacy and safety online. |
|
GLBA |
Gramm-Leach-Bailey Act Ensures safety and privacy of consumer data and financial institution must have policy in place to protect information from security threats. |
|
Sarbanes-Oxley-Act |
Financial information must be safeguarded |
|
Do Not Track Online Act of 2011 |
Is a term that refers to a series of policy proposals that protects users’ right to choose whether or not to be tracked by third-party websites |
|
Definition of Opt-Out |
An opt-out model of informed consent permits the collection of personal informationuntil the consumer specifically requests that the data not be collected. |
|
Definition of Opt-In |
Privacy advocates would like to see wider use of an opt-in model of informed consent in which a business is prohibited from collectingany personal information unless the consumer specifically takes action toapprove information collection and use. |
|
Six Major Steps in Systems Development Process |
|
|
Systems Analysis |
|
|
Systems Design |
Create design specifications |
|
Programming Activities |
Translates decision specifications into program code |
|
Testing Activities |
|
|
Conversion Activities |
|
|
Production and Maintenance Activities |
|
|
Internet Platform Providers |
|
|
Client Machine Provider |
Dell PC's, desktop/laptop |
|
Mainframe Provider |
IBM |
|
Network Hardware Providers |
|
|
Database Software Providers |
|
|
Top Chip Producers |
Intel & AMD |
|
Physical Data Storage Providers |
Western Digital, Seagate, EMC Corp |
|
5 Major eras in IT infrastructure evolution |
|
|
General-purpose mainframe and minicomputer era |
|
|
Personal Computer Era |
|
|
Client/Server Era |
|
|
Enterprise Computing Era |
|
|
Cloud and Mobile Computing |
|
|
Moore's law and micro processing power |
Computing power doubles every 18 months |
|
SQL Definition |
Query language that retrieves data stored in databasesor files. Capable of supporting requests for information that are notpredefined. |
|
Microsoft Access |
Microsoft Access is a DBMS (also known as DatabaseManagement System) from Microsoft thatcombines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools. |
|
Trojan Horse |
Asoftware program that appears legitimate but contains a second hidden functionthat may cause damage |
|
Viruses |
Rogue softwareprogram that attaches itself to other software programs or data files in orderto be executed |
|
Spyware |
Technology that aids in gathering information about a personor organization without their knowledge. |
|
Click Fraud |
Fraudulently clicking on an online ad in pay per clickadvertising to generate an improper charge per click |
|
Phishing |
Form of spoofing involving setting up fake Web sitesor sending e-mail messages that resemble those of legitimate businesses thatask users for confidential personal data. |
|
Customer Lifetime Value (CLTV) |
Difference between revenues produced by a specificcustomer and the expenses for acquiring and serving that customer minus thecost of promotional marketing over the lifetime of the customer relationship,expressed in today’s dollars. |
|
Churn Rate |
Measurement of the number of customer who stop usingor purchasing products or services from a company. Used as an indicator of thegrowth or decline of a firm’s customer base. |
|
Three Major Types of KMS |
|
|
Enterprise-wide KMS |
General-purpose firm-wide efforts to collect, store,distribute, and apply digital content and knowledge. Includes collaboration and social tools, learning management systems. |
|
Knowledge work systems (KWS) |
Specialized systems built for engineers, scientists, otherknowledge workers charged with discovering and creating new knowledge. Includes CAD software, 3D virtualization, investment workstations (banking) |
|
Intelligent Techniques |
Diverse group of techniques such as data mining used forvarious goals: discovering knowledge, distilling knowledge, discovering optimalsolutions. Includes data mining, expert systems, fuzzy logic, genetic algorithms |
|
4 Characteristics of Knowledge |
|
|
Knowledge is a firm asset |
|
|
Knowledge has different forms |
|
|
Knowledge has a location |
|
|
Knowledge is situational |
|
|
Why are Knowledge systems valuable? |
|
|
Artificial Intelligence Definition |
The effort to develop computer-based systems that canbehave like humans, with the ability to learn languages, accomplish physicaltasks, use a perceptual apparatus, and emulate human expertise and decisionmaking. |
|
4 major types of organization change enabled by IT |
|
|
Automation |
|
|
Rationalization of Procedures |
|
|
Business Process Redesign |
|
|
Paradigm Shifts |
|
|
IT System Failure Definition |
Can occur because of ahardware failure or a severe software issue; causing the system to freeze, reboot, or stop functioning altogether. |
|
4 Types of System Failure |
|
|
Runaway Projects (30-40% of IT projects) |
|
|
3 General Cultural Challenges in Global Systems |
|
|
4 Specific Challenges in Global Systems |
|
|
5 Principle Management Challenges in Developing Global Systems |
|
|
4 Technology Challenges of Global Systems |
|
|
Computing Platforms and Systems Integration |
|
|
Connectivity |
|
|
Software |
|
|
Senior Management Decisions |
|
|
Middle Management Decisions |
|
|
Operational Management Decisions |
|
|
Gore-Tex Article Summary |
|
|
Input |
Anything we wish to embed in a system for sometype of use. A variety of sources are used to input:keyboard, scanner, microphone, mouse, and even another computer. |
|
Transaction Processing System (TPS) |
A transaction processing system is a computerizedsystem that performs and records the daily routine transactions necessary toconduct business, such as sales order entry, hotel reservations, payroll,employee record keeping, and shipping. |
|
Management Information System (MIS) |
MIS provide middle managers with reports on theorganization’s current performance. This information is used to monitor andcontrol the business and predict future performance. |
|
Decision-support systems (DSS) |
Focus on problems that are unique and rapidlychanging, for which the procedure for arriving at a solution may not be fullypredefined in advance. |
|
Executive Support Systems (ESS) |
Addressnon-routine decisions requiring judgment, evaluation, and insight because thereis no agreed-on procedure for arriving at a solution. ESS present graphs anddata from many sources through an interface that is easy for senior managers touse. |
|
Supply Chain Management System (SCM) |
These systems help suppliers, purchasing firms,distributors, and logistics companies share information about orders,production, inventory levels, and delivery of products and services so they cansource, produce, and deliver goods and services efficiently. |
|
Customer Relationship Management (CRM) |
Help manage their relationships of the businessprocesses that deal with customers in sales, marketing, and service to optimizerevenue, customer satisfaction, and customer retention. |
|
Enterprise Resource Planning (ERP) |
Integrate business processes in manufacturing andproduction, finance and accounting, sales and marketing, and human resourcesinto a single software system. |
|
5 Aspects of Porter's Competitive Forces |
|
|
4 Ways to use MIS to lessen Competitive Forces |
|
|
7 ways digital markets are different |
|
|
Data Mining |
Analysisof large pools of data to find patterns and rules that can be used to guidedecision making and predict future behavior. |
|
Freemium Revenue Model |
Offers basic services or content for free, whilecharging a premium for advanced or special features. For example, Google offersfree applications but charges for premium services. |
|
Sales Revenue Model |
Companies derive revenue by selling goods, information,or services to customers. |
|
Affiliate Revenue Model |
Websites (called “affiliate Websites”) send visitors to other Web sites in returnfor a referral fee or percentage of the revenue from any resulting sales. |
|
Transaction Fee Revenue Model |
A company receives a fee for enabling or executing a transaction. For example, eBayprovides an online auction marketplace and receives a small transaction feefrom a seller if the seller is successful in selling an item. |
|
3 Types of Business E-Commerce Models |
|