click below
click below
Normal Size Small Size show me how
Final INFO 439
cumulative
Question | Answer |
---|---|
Ecosystem | building relationships with various players in one's business ecosystem is the current strategi objective for use of IT and the Internet. |
Supply Push | companies are organized to build a supply of products or services and "push" them to end customers, ons tore shelves, in catalogs, and such |
Demand Pull | companies offer customers the components of a service or product, and the customer creates their own personalized versions, creating the demand that pulls the specific product or service they want through the supply chain |
Tacit Knowledge | "known" but not easily explained to others |
Explicit Knowledge | knowledge that has been articulated, codified, and made public |
Procedure-based activities | large volume transactions, where each transaction has relatively low cost or value. The activities are well defined; therefore, the principal performance measure is efficiency |
Knowledge-based activities | handle fewer transactions, but each one has a higher value. These activities, which can be accomplished in various ways, must therfore be measured by results, that is, attainment of objectives or goals |
Internet | global system of interconnected computer networks that use the standard internet protocol suite (TCP/IP) |
Intranet | an internal company network that takes advantage of the internet's infrastructure, telecommunications protocols, and browsers. |
Electronic Data Interchange - EDI | business transactions, such as orders, that cross company boundaries via a network using carefully defined protocols and data formats |
Business Process Redesign - BPR | significantly restructuring the operational business processes in a firm |
Business Process Management | focuses on aligning all aspects of an organization with the wants and needs of clients. Attempts to improve processes continuously. Described as a process optimization process |
Strategic Planning | target horizon is 3-5 years. Issues include strategic planning and business process reengineering. |
Tactical Planning | target horizon is 1-2 years. issues include resource allocatino adn project sekection |
Nolan and Gibson growth model | observed that many organizations go through four stages in the introduction and assimilatin of new technology |
Scenerio Planning | the goal is not to predict the future, but to expore the forces that could cause different futures to take place and then decide on actions to take if those forces begin to materialize |
Portfolio Management | is of great value to senior and functional executives to ensure that they are working on a broad front that will lead to success in the internet economy |
Distributed systems | a computer system that has components physically distributed around a company or among companies |
Open Systems | system based on national or international standards so that the products of many manufacturers work with each other |
Types of client-server systems | distributed man-machine interface, remote man-machine interface, distributed business application, remote information management, distributed database |
Distributed man-machine interface | puts all data, all the application software, and some of the presentation software on a server. Appropriate for wireless web-based computing. |
Remote man-machine interface | puts all the software on the client machine but leaves the applications and information (data)on the remote server. Used to put transaction processing behind web sites |
Distributed business application | places all the software on the client, all the data on the server, and splits the application software between the client and the server |
Remote information management | places all the software on the client, leaving only data and information management software on the server |
Distributed database | places all presentation and application software as well as some of the data on the client. Remaining data are on the server |
Web Services | second-generation internet-based system environment that gives software modules URLs (internet addresses) so they can be called upon to perform their function as a service via the internet. |
Intranet | a computer netwrok that uses Internet Protocol technology to share an organization's information within that organization |
Extranet | A computer network that allows controlled access from the outside, for specific business or education purposes. |
Digital Convergence | Intertwining of various forms of media - voice, data, and video. All separate media will be replaced by integrated digital appliances. |
WPAN -Wireless Personal Area Netwok | Networks that provide high-speed connections between devices that are up to 30 feet apart. |
Wireless Local Area Network (WLAN) | Networks that provide access to corporate computers in office buildings, retail stores, and hospitals, or access to Internet hot spots where people congregate. |
Wireless Metropolitan Area Network (WMAN) | Networks that provide connections in cities and campuses at distances up to 30 miles |
Wireless Wide Area Network (WWAN) | Networks that provide broadband wireless connections over thousands of miles |
Data | consists of facts devoid of meaning or intent |
Information | is data in context, which means the data has been given an explicit meaning in a specific context |
Knowledge | is information with direction or intent, where intent is derived rom strategies or objects |
Hierarchical | structures data so that each element is subordinate to another in a distinct hierarchical manner. Each data item can have only one parent |
Network | allows each data item to have more than one parent. More flexible. Relationships stated by pointers stored with the data |
Relational | data stored in tables (that represent entities) in a form that is intuitive for users. |
Object Oriented | expands the view of data by storing and managing objects |
Data Administrator | administers databases and software that mangoes them to provide accurate and timely information to users |
Database Administrator | concerned with the technical aspects and physical storage of data |
Metadata | part of the data warehouse that defines the data/explains meaning of each data element and sets standards |
Data Warehouse | stores data used to make decisions, gives insights into customer behavior, internal operations, product mixes, and can yield business intelligence |
Document Management | Computer system used to track and store electronic documents. OFten provides history tracking. Supports communication among people and groups |
Content Management | Searching, filtering, synthesizing, assimilating, and sharing knowledge resources. |
Knowledge Management | a range of strategies and practices used in an organization to identify, create, represent, distribute, and enable adoption of insights and experiences. |
External measures | what customers see, directly relates to customer satisfaction |
Internal measures | of interest to IS people. |
Global Focus | rapid development in communication, globalization and increased mobility of resources among countries |
Just In Time (JIT) | goods and services are produced upon receipt of order with customizations, it reduces inventory costs |
Product Development | product life cycle continues to shorten, products are replaced very quickly. |
Collaborative | one company becomes the prime contractor for numerous facets of IS operations but some of the work is provided by other ESPs |
Best-of-Breed | one outsourcer handled desktop operations, another data-center operations, and a third network management |
Waterfall Development Methodology | a way to view the systems development process as a series of steps. should only move to the next phase once the current phase is complete |
CASE tools (computer aided software engineering) | a class of software that automates many of the activities in the various life cycle phase. assists in creation, maintenance, and management of software |
1st GL | machine-leel languages, which are harder to learn and harder to implement, but efficient |
2nd GL | assembly languages, which are readable commands that must be "assembled" to be read by the computer |
3rd GL | Highly usable languages |
4th GL | languages created to reduce effort and time put into development, which allows more effort to be put into system design |
Prototyping | an iterative process for developing a software system. It focuses on the development of a basic system in order to quickly provide needed functionality |
Object Oriented Development | developers just need to click at generic items - menus, dialog boxes, radio buttons and other graphical components - and then rearrange them to create a screen |
Timeboxing | CASE technique used to guarantee delivery of a system within a fixed period (120 days or less). Often used in conjunction with RAD |
Middleware | software that eases connection between clients and servers in a client-server system |
Sponsor | the person or group who legitimizes the change. |
Change Agent | the person or group who causes the change to happen. Change agents are often the IS staff. They can introduce the change but not enforce its use. |
Target | the person or group who is being expected to change and at whom the change is being aimed |
Reverse Engineering | extracting and converting data elements from existing systems and formats |
Forward Engineering | moving them to new hardware platforms and creating new application |
Project Charter | is a statement of the scope, objectives and participants in a project. It provides a preliminary delineation of roles and responsibilities, outlines the project objectives, identifies the main stakeholders, and defines the authority of the project manager |
Security Management | information security is more than just protecting hardware and software from from being crashed, it is about protecting the information resources that keep the company operating |
Man-in-the-Middle | attacker makes independent connections with the victim and relays messages between them, making them believe that they are talking directly to each other over private connection, when in fact entire conversation is controlled by the attacker. |
Denial of Service | an attempt to make a computer resource unavailable to its intended users. Prevent website or service from functioning efficiently or at all, temporarily or indefinitely. |
Trojan Horse | is software that appears to perform a desirable function for the user prior to run or install, but steals information or harms the system |
Network sniffing | trying to read or intercept information |
Spoofing | an e-mail that directs you to a different website |
non-repudiation | preventing parties from denying actions they have taken |
Encryption | using an algorithm to make plain text unreadable to anyone that has a key |
Business Continuity | Involves not only disaster recover, but also having back-up work procedures and office space for displaced employees to work with telephone lines and computers so that the business can continue to operate |
Computer Viruses | a computer program that can replicate itself and spread from one computer to another |
Data Mining | use of computers to uncover unknown or relations from a large data set |
Agent based modeling | a simulation technology for studying emergent behavior |
Neural Network | a the of decision making system organized like the brain |
Risk Avoidance | identify and eliminate source of perceived risk |
Risk limitation | implementing controls to contain potential risk effects |
risk transfer | letting others assume risk (outsourcing) |
Big Bang Approach | authoritative management style and fixed budget |
Improvisation | participative management style adjustable budget |
Guided Evolution | participative management style and fixed budget |
Top-Down Coordination | authoritative management style and adjustable budget |
Critical Success Factors | focuses on individual managers and their current information needs. It has become a popular planning approach. |
Nolan and Gibson Growth Model | Stage 1: early successes Stage 2: Contagion Stage 3: Control Stage 4: Integration |
Early successes | beginning use of new technology. early successes lead to increased interest and experimentation |
Contagion | uncontrolled growth adn rapid rise in the use of IT |
Control | management begins to believe the costs of using the new technology are too high and the variety of approaches generates waste. |
Primary Activities | inbound logistics, outbound logistics, operations, marketing and sales, service |
Supporting Activities | Human Resources, Organizational Infrastructure, Technology Development, Procurement |