click below
click below
Normal Size Small Size show me how
MIS Final
Terms
Question | Answer |
---|---|
Productivity Paradox | Given the vast number of potential systems and technologies that could be developed or acquired, a strong business case aids the decision making process and helps direct resources in more strategic ways |
System Effectiveness | Result of the biggest increase in productivity |
System Efficiency | Accomplishing things faster at lower costs |
Redistribution | A new type of system may be beneficial for individual firms but not for a particular industry or the economy as a whole |
Mismanagement | A system is implemented but not managed well |
Managers use the 3 F's when making a successful business case | Faith,Fear,Fact |
TCO | Total Cost of Ownership One goal of a cost-benefit analysis |
Nonrecurring Costs | one-time costs that are not expected to continue after the system is implemented |
Recurring Costs | Ongoing Costs that occur throughout the life of a system |
Tangible Costs | Relatively easy to quantify |
Intangible Costs | Will not easily fit into quantitative analysis but should be accounted for |
Break-Even Analysis | type of Cost-benefit analysis to identify at what point tangible benefits equal tangible costs |
Net-Present-Value Analysis | Cost-benefit analysis relevent to cash flow steams associated with the system at the organization's dicount rate |
Discount Rate | The rate of return used by an organization to compute the present value of futre cash flows |
Systems Analysis and Design | The process of designing, building, and maintaining information systems |
Systems Analyst | Performs the process of designing, building, and maintaining information systems |
Project Manager | Oversees the system analyst and responsible for ensuring that the system is successful |
SDLC | Systems Development Life Cycle, Describes the lifespan of an information system |
System Planning and Selection | Formal process mainly to identify, plan, and select a development project from all possible projects that can be performed |
Systems Analysis | Designers gain a full understanding of the organizations current systems and then decide which new info system will be constructed |
Pseudocode | Used by systems analysts to express the way in data is transformed |
Data Flows | Represents the movement of data through an organization or within an info system |
System Design Elements | Human-Computer interface,Databases and files,Processing and logic |
HCI | Human-Computer Interface, the point of contact between a system and a user |
Designing Processing and Logic | Steps and procedures that transform raw data inputs into new or modified information |
Order of Phases of the Systems Development Life Cycle | Systems Planning and Selection,Systems analysis,Systems Design,Systems Implementation and Operation,Systems Maintnenance |
Making a Business Case | Refers to the process of identifying, quantifying, and presenting the value provided by a system |
Weighted Multicriteria Analysis | Method for deciding among different IS investments or when considering alternative designs for a system |
Proxy Variables | Alternative measures of outcomes when it is not easy to quantify the impact of an investment |
Patch Management Systems | System that uses the internet to to check for available patchs and/or updates |
Prototyping | Alternative to SDLC, which uses a trial-and-error approach for discovering how a system should operate |
Corrective Maintenance | Making changes to an information system to repair flaws in the design, coding, and implementation |
Adaptive Maintenance | Making changes to accommodate changes in business needs |
Perfective Maintenance | Making enhancements to improve processing performance or interface |
Preventive Maintenance | Making changes to a system to reduce the chance of future system failure |
End-User Development | Individuals within organizations build increasingly complex and useful applications after the system has already been implemented |
External Acquisition | Purchasing an existing system from an outside vendor such as IBM, HP Enterprise Services, or Accenture |
RFP | Request For Proposal A document that is used to tell vendors what an organizations requirements are |
Systems Benchmarking | Used to standardize performance tests to facilitate comparison between systems |
Shrink-Wrap Licenses | Contract is activated when the shrink wrap on the packaging is removed |
Click-Wrap Licenses | A license primarily used for downloaded software |
Enterprise License | License that usually contain limitations of liability and warranty disclaimers |
Computer Crime | The act of using a computer to commit an illegal act |
Hackers | Individuals who are knowledgeable enough to gain access to a computer system without authorization |
Hacktivists | Computer crimminals that attempt to break into systems or deface websites to promote political or idealogical goals |
Crackers | Individuals who break into computer systems with the intention of doing damage or committing a crime |
Information Modification | Occurs when someone accesses electronic information and then changes the information |
Malware | short for "malicious software" Refers to harmful Viruses, Worms, and Trojan horses |
Virus | Desructive program that disrupts the normal functioning of computer systems |
Worm | A variation of a Virus that is targeted at networks ultimately denying intenet access to users |
Trojan Horse | Destructive program like a virus, but does not copy itself |
Logic Bombs or Time Bombs | Variations of Trojan horses that lie in wait for unsuspecting computer users to perform a triggering operation |
Zombie Computers | Intruders infect computers located in homes, schools, and business with viruses or worms |
Spyware | Any software that covertly gathers information about a user through an Intenet connection |
Adware | Free software paid for by advertisements appearing during the use of the software |
Spam | Electronic junk mail or junk newsgroup postings |
Phishing | Used by spam e-mail to trick financial accounts and credit card holders into giving away their authorization information |
CAPTCHA | Completely Automated Public Turning Test to Tell Computers and Humans Apart |
Cookies | A message passed to a Web browser on a user's computer by a Web server to be stored as a text file on the computer |
Cybersquating | Dubious practice of registering a domain name and then trying to sell the name for money to the person, company, or organization that wants it |
Intellectual Property | Software for patent and copyright laws applied to works used in commerce |
Patents | Refers to process, machine, or material inventions |
Copyrights | Refers to creations of the mind such as music, literature, or software |
Warez | Slang term for stolen software |
Information System Security | Refers to precautions taken to keep all aspects of information systems safe |
Risk Analysis | process in which you access the value of the assets being protected |
Risk Reduction | Active countermeasures to protect your systems |
Risk Acceptance | Implementing no countermeasures and simply absorbing any damages that occur |
Risk Transference | Having someone else absorb the risk |
Biometrics | Sophisticated form of authentication used to govern access to systems, data, and/or facilities |
Access-Control Software | Special software used to keep stored information secure |
VPN | Virtual Private Network A network connection that is constructed dynamically within an existing network Also known as a secure tunnel |
Firewall | A part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network |
Encryption | Process of encoding messages before they enter the network to be securley transfered to the intended recipient |
Secure Sockets Layer | Popular public key encryption method used on the internet, created by Netscape |
Audit-Control Software | Used to keep track of computer activity so that auditors can spot suspicious activity and take action |
Backups | Important files saved to external hard drives |
Cold Backup Site | Empty warehouse with all necessary connections for power and communication |
Hot Backup Site | Fully equiped backup facility with exact replication of the most current data |
Mirrored | Everything is stored synchronously on two independent systems |
Closed-Circuit Television | Systems that monitor for physical intruders such as video cameras |
Collocation Facilities | Rented space for backup storage for only a few servers |
Computer Forensics | Use of formal invesitgative techniques to evalute digital information for judicial review |
Honeypot | A computer, data, or network site that is designed to lure crackers |
Information System Audit | Helps organizations assess the state of their IS controls to determine necessary changes and to help ensure the information system's availability, confidentiality, and integrity |
Sarbanes-Oxley Act | Government regulations on the requirement of controls in place to prevent misuse or fraud, controls to detect problem, and effective measures to correct problems |
Botherder | A criminal that has a botnet residing on a collection of zombie computers |
Requirements Collection | Process of gathering and organizing information from users, managers, customers, business processes, and documents to understand how an IS should function |
Developmental Testing | Testing the correctness of individual modules and the integration of multiple modules performed by the programmer |
Alpha Testing | Testing of overall system to see whether it meets design requirements Performed by Software Tester |
Beta Testing | Testing of the capabilities of the system in the user enviroment with actual data Performed by actual system users |
Recovery Time Objectives | Specifies the maximum time allowed to recover from a catastrophic event |
Recovery Point Objectives | Specifies how current the back data should be |
3 Authentication Forms | Something You Have- Ex. Keys,Something You Know- Ex. Password,Something You Are- Ex. Fingerprint |
Acceptable Use Policies | Policies for people within the organization, with clearly spelled out penalties for noncompliance |