Shared Flashcard Set

Details

Information Systems FINAL Review
BUS 340 Final Review
74
Business
12/10/2009

Additional Business Flashcards

 


 

Cards

Term
Organizations typically operate by
Definition
functional areas or functional silos
Term
Functional Areas/Silos are..and include...
Definition
-independent
-Sales, Accounting, HR, Logistics, and Operations and operate with marketing
Term
Porter’s Five Forces Model determines ...
Definition
- the relative attractiveness of an industry
Feed into Rivalry Among Competitors
-Threats of Substitute
-Threats of new entrants
Feed with Rivalry Among Cometitors
-Supplier power
-and Buying Power (of channel members and end users)
Term
The Value Chain support value activities
Definition
Firm Infrastructure 3%
HR Management 7%
Technology Development 4%
Procurement 27%
Term
Value Chain Primary Value Activities
Definition
Receive and store Raw Materials 5%
Make product 40%
Deliver Product 6%
Market and sell product 4%
Service after sale 2%
Term
What is open system
Definition
A broad, general term that describes nonproprietary IT hardware and software made
availa6{'~y 'the standards and procedures by which their products work, making it easier to
integrate them
Term
Which information culture has employees who trust each other to use information about
problems to improve performance?
Definition
lNmation-sharing culture
Term
In Porter's fi ve forces model, whi ch of the fo llowing forces i~ when competition is ~erce
-in a market?
Definition
rivalry among existing competitors
Term
Consider Porter's three generic strategies, which is most appropriate when the ~
~cope of the market is narrow and the cost strategy is low?
Definition
focused Strategy
Term
According to Peter Drucker, what are managers who "get the most from each resource,"
addressing?
Definition
efficiency
Term
Which part of the value chain consists of human resources management and Research & develoment?
Definition
support value activities
Term
The number of customers an organization "touches" for the first time and persuades to
purchase its products is an effectiveness IT metric referred to as:
Definition
conversion Rates
Term
The officer responsible for developing strategies and IT safeguards against attacks from
hackers and viruses is:
Definition
Chief security Officer
Term
The amount of time a system takes to cOl}lPlete a financial exchange/interaction with a
customer is what type of Efliciency IT Metric?
Definition
transaction Speed
Term
Who is the author of the New York Times Best Seller, "The World is FIatT
Definition
thomas Friedman
Term
According to the author or the New York Times Best Seller, "The World is Flat," what is the
major thesis that supports the notion or a " nat" world?
Definition
information teehnolog\' has reduced ba rrie rs for doing business across the globe.
Term
What is the study of the impact that changes in one (or more) parts of the model have on other parts of the model?
Definition
Sensitivity analysis
Term
What is consolidation?
Definition
Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information.
Term
What integrates information from multiple components and presents it in a unified display?
Definition
Digital dashboards
Term
What is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users?
Definition
Intelligent agent
Term
Which type of model represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes?
Definition
As-Is process model
Term
Which of the following is an example of analytical information?
Definition
A) Trend projection
B) Sales projection
C) Product statistics
all
Term
Invisible to the external customer but essential to the effective management of the business and include goal setting, day-to-day planning, performance feedback, rewards, and resource allocation
Definition
a business facing process
Term
What factor significantly contributed to people’s needs to use information systems to make decisions?
Definition
The amount of information people must understand to make good decisions is increasing exponentially
Term
The ability to look at information from different perspectives
Definition
is slice-and-dice capability
Term
What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem?
Definition
Genetic algorithm
Term
Which company has “The Wall of Shaygan”, which is a digital dashboard that tracks 100-plus IT systems on a single screen?
Definition
Verizon Communications
Term
Which company used BPR to change its industry by implementing a mobile claims process?
Definition
Progressive Insurance
Term
Budget forecasting
is a....
Definition
is a business facing process
Term
What integrates all of an organization’s business process to make individual processes more efficient?
Definition
Business process management
Term
What is a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint?
Definition
Business process model
-As-is-order fulfillment process (customer, sales, billing, inventory, shipping)
-To-be process model...
Term
The real world vs. the Model World
Definition
Real World - includes problem statement and solution
through formulation reach the..
-Model World which includes assumptions and model structures..analysis..Results and conclusions.
-Then through interpretation (translation, communication) the Solution in the real world is reached.
Term
an approach to conducting electronic business on the Internet
Definition
Ebusiness model
Term
E-business model includes what channels?
Definition
B2B, B2C, C2C, C2B
Term
the ability to purchase goods and services through a wireless Internet-enabled device
Definition
Mobile commerce
Term
Wireless Devices connect to
Definition
wireless provider to the internet to M-Commerce marketplaces (e-mail, news, stocks, etc.)
Term
What is a glohal hypertext system that uses the Internet as its transport mechanism?
Definition
world Wide Web
Term
What is information richness?
Definition
refers to the depth and breadth of information transferred between customers and
businesses
Term
What is a business that operates on the Internet only without a physical store?
Definition
pure play business
Term
Which of the following offers an extensive array of unique services such as its own version of
a web browser?
Definition
Online service provider (aSP)
Term
What is a family of web feed formats used for web syndication of programs and content
Definition
RSS
Term
What is disruptive technology?
Definition
new way of doing things that initially does not meet the needs of existing
customers
Term
What is an internalized portion of the Internet, protected from outside access, that allows an
organization to provide access to information and application software to only its employees?
Definition
intranet
Term
Which of the following is not an online business payment method?
Definition
ARE
-Fin. EDI
-EDI
are NOT
-Electronic Check
-BBPP
-Digital Wallet
-Financial Cybermediary
(consumer methods)
Term
count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser?
Definition
click-through
Term
Which of the following represents any consumer that sells a product or service to a business over the Internet?
Definition
C2B
Term
downtime affects 4 areas of business
Definition
-financial performance (revenue recognition, cash flow, payment guarentees, credit rating, stick price.)
-Revenue (direct loss, compensatory payments, lost future revenue, billing losses, investment losses, productivity losses)
-Damaged Reputation (customers, suppliers, financial markets, banks, business partners)
-other expenses (temp. employees, equipment rentals, overtime cost, chipping charges, travel expense, legal obligations)
Term
email privacy policy
Definition
details the extent to which email messages may be read by others
-1.should compliment ethical computer use policy.
2.defines who are legitimate email users
3.identifies backup procedures
4.explains legitimate grounds for reading user email
5.informs email control
6.explans ramifications of leaving
7.asks employees to be careful when posting organizational info.
Term
"information has no ethics"
Definition
-information doesn't care how it's used
-information will not stop itself from sending spam or viruses
-information can't delete or preserve itself.
Term
ethical and illegal
Definition
court system ruled microsoft (netscape) monopoly
Term
unethical and legal
Definition
youtube clip of viral marketing with woman and fake baby
Term
unethical and illegal
Definition
Bernie Madoff $50 bil ponzie scheme
Term
downtime severity and frequency
Definition
-s: how much you loose
-f: how often you loose
-probability distribution tells how much reserves are needed
Term
first line of security defense?
Definition
people
-
Term
Five steps to creating an information security plan
Definition
Develop the information security policies
Communicate the information security policies
Identify critical information assets and risks
Test and reevaluate risks
Obtain stakeholder support
Term
second line of security defense?
Definition
technology
-authentication (password), authorization (level of access)
-prevention (filtering, encryption ), resistance (firewalls)
-detection (antivirus), response (antivirus quarantines)
Term
Hacker Tpyes
(update definitions)
Definition
-White Hat
-Black Hat
-Hactivist
-Script Kiddies/bunnies
-Cracker
-Cyberterrorist
Term
Security Threats to businesses include
Definition
-elevation of privilege, hoaxes, malicious code, spoofing, spyware, sniffer, packet tampering
Term
Types of Virus'
(update definitions)
Definition
Worm, DoS, DDoS, Trojan Horse Virus, Backdoor program, Polymorphic virus and worm
Term
important Laws to update
Definition
FERPA
Homeland Security Act
Patriot Act
Freedom of Information Act
Sarbanes Oxley
Term
What states that you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes?
Definition
Fair Use Doctrine
Term
the following is considered an ePolicy
Definition
A) Acceptable use policy
B) Internet use policy
C) Ethical computer use policy
Term
The Freedom of Information Act allows
Definition
any person to examine government records unless it causes an invasion of privacy.
Term
Which term describes legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident?
Definition
insiders
Term
three primary information security areas?
Definition
A) Authentication and authorization
B) Prevention and response
C) Detection and response
Term
What is a method for confirming users' identities?
Definition
authentication
Term
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?
Definition
Content filtering
Term
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
Definition
Spoofing
Term
What is the legal protection afforded to an expression of an idea, such as a song, video game, and some types of proprietary documents?
Definition
Copyright
Term
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?
Definition
Ethical computer use policy
Term
Which of the following is part of the acceptable use policy stipulations?
Definition
A) Not using the service as part of violating any law


B) Not attempting to break the security of any computer network or user


C) Not posting commercial messages to groups without prior permission
Term
What is a program, when installed on a computer, records every keystroke and mouse click?
Definition
Key logger software
Term
Which of the following represents the estimated percentage that spam accounts for in an organizations’ email traffic?
Definition
40 to 60 percent
Term
Using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker
Definition
social engineering