Term
| * A business process is a network of activities |
|
Definition
| resources, facilities, and information that interact to achieve some business function. |
|
|
Term
|
Definition
| facilities are structures used within the business process. (ex. Inventories and databases) |
|
|
Term
| * information is knowledge derived from data |
|
Definition
| where data is defined as recorded facts or figures. |
|
|
Term
| * Good information is accurate |
|
Definition
|
|
Term
| * Information needs to be sufficient for the purpose for which it is generated |
|
Definition
|
|
Term
| * For information to be worth its cost |
|
Definition
| An appropriate relationship must exist between the cost of information and its value. |
|
|
Term
| - five forces model- According to this model |
|
Definition
| five competitive forces determine industry profitability: bargaining power of customers, threat of substitutions, bargaining power of suppliers, threat of new entrants, and rivalry among existing firms. The intensity of each of the five forces determines the characteristics of the industry, how profitable it is, and how sustainable that profitability will be. |
|
|
Term
| - primary activities: marketing and sales |
|
Definition
| in-bound logistics, operations, out-bound logistics, and service. |
|
|
Term
| - Support activities- in the generic value chain contribute indirectly to the production |
|
Definition
| sale, and service of the product. They include human resources, accounting and infrastructure, and technology. They add value indirectly but also have costs. |
|
|
Term
| - Porters model of business activities includes linkages |
|
Definition
| which are interactions across value activities. Linkages are important sources of efficiencies and are readily supported by information systems. |
|
|
Term
| - Organizations gain a competitive advantage by creating new products or services |
|
Definition
| by enhancing existing products or services, and by differentiating their products and services from those of their competitors |
|
|
Term
| - Because business processes are critical |
|
Definition
| complex, and dynamic in structure, well-managed organizations practice business process management (BPM).BPM is the systematic process of creating, assessing, and altering business processes. |
|
|
Term
| - BPM varies in scope through functional processes |
|
Definition
| cross-functional processes, and interorganizational processes |
|
|
Term
|
Definition
| cross-functional processes involve activities among several, or even many, business departments. A classic example is the customer relationship management (CRM) process, which involves the activities of various departments, such as sales, marketing, operations, and customer support. |
|
|
Term
| - The order-processing example at REI is an interorganizational process. It includes activities at REI of course |
|
Definition
| but it also includes activities at the company that processes your credit card transactions and activities at the shipper. |
|
|
Term
|
Definition
| a software-industry standards organization called the Object Management Group (OMG) created a standard set of terms and graphical notations for documenting business processes. That standard, called Business Process Modeling Notation (BPMN), is documented at www.bpmn.org. |
|
|
Term
| - According to Porters model |
|
Definition
| one should add cost to a value chain (here, the business process) if the change generates value greater than its cost |
|
|
Term
|
Definition
| information systems developers studied best-of-practice techniques and from these developed a design philosophy known as service-oriented architecture (SOA).SOA was originally used to design interacting computer programs. More recently, systems designers have applied SOA principles to business process activities, whether those activities are manual, partly automated, or fully automated |
|
|
Term
| - When the logic for some service is isolated in this way |
|
Definition
| the logic is said to be encapsulated in the service. Encapsulation places the logic in one place, which is desirable; all other services go to that one place for that service. |
|
|
Term
|
Definition
| which stands for the eXtensible Markup Language, is used to model and structure data. |
|
|
Term
|
Definition
| which are metadata that name and identify data items |
|
|
Term
| - Two other standards are important for service-oriented architecture. SOAP (which |
|
Definition
| oddly enough, is not an acronym) is a protocol for exchanging messages encoded in XML. A SOAP message can include metadata that specifies how the message is to be routed, what services need to process it, how security and encryption are to be handled, and so forth |
|
|
Term
| - Web Services Description Language (WSDL). . To expose a service or services to the world |
|
Definition
| the designer of the service creates a WSDL document that describes, in a standard way, the particular features that the service provides and the data that need to be sent or that will be returned from the service |
|
|
Term
| * Problems in security threats can be unauthorized data disclosure |
|
Definition
| incorrect data modification, faculty service, denial of service, and loss of infrastructure. |
|
|
Term
| * Three sources of security threats are human error and mistakes |
|
Definition
| malicious human activity, and natural events and disasters. |
|
|
Term
| * Natural events and disasters are the third source of security problems. This category includes fires |
|
Definition
| floods, hurricanes, earthquakes, tsunamis, avalanches, and other acts of nature |
|
|
Term
| * Spoofing is another term for someone pretending to be someone else. If you pretend to be your professor |
|
Definition
| you are spoofing your professor. IP spoofing occurs when an intruder uses another sites IP address as if it were that other site. Email spoofing is a synonym for phishing. |
|
|
Term
| * Sniffing is a technique for intercepting computer communications. With wired networks |
|
Definition
| sniffing requires a physical connection to the network |
|
|
Term
|
Definition
| no such connection is required: Drive-by sniffers simply take computers with wireless connections through an area and search for unprotected wireless networks. |
|
|
Term
| * The third problem category |
|
Definition
| faulty service, includes problems that result because of incorrect system operation. Usurpation occurs when unauthorized programs invade a computer system and replace legitimate programs |
|
|
Term
| * The user name identifies the user (the process of identification) |
|
Definition
| and the password authenticates that user (the process of authentication). |
|
|
Term
| * A smart card is a plastic card similar to a credit card. The microchip |
|
Definition
| which holds far more data than a magnetic strip, is loaded with identifying data |
|
|
Term
| * Biometric authentication uses personal physical characteristics such as fingerprints |
|
Definition
| facial features, and retinal scans to authenticate users |
|
|
Term
|
Definition
| worms, Trojan horses, spyware, and adware |
|
|
Term
| * Database administration refers to a function that pertains to a particular database. The ERP |
|
Definition
| CRM, and MRP databases each have a database administration function. |
|
|
Term
| * One potential problem with stored data |
|
Definition
|
|
Term
| * the key might be lost or that disgruntled or terminated employees might destroy it. Because of this possibility |
|
Definition
| when data are encrypted, a trusted party should have a copy of the encryption key. This safety procedure is sometimes called key escrow. |
|
|
Term
| * Human safeguards involve the people and procedure components of information systems. Human safeguards include position definitions |
|
Definition
| hiring and screening, dissemination and enforcement, and termination. |
|
|
Term
| * Given appropriate job descriptions |
|
Definition
| user accounts should be defined to give users the least possible privilegeneeded to perform their jobs |
|
|
Term
| * Account administration includes account management |
|
Definition
| password management, and help desk policies |
|
|
Term
|
Definition
| in contrast, provide office space, but customers themselves provide and install the equipment needed to continue operations. |
|
|
Term
| * Collaboration occurs when two or more people work together to achieve a common goal |
|
Definition
|
|
Term
| * content management. When multiple users are contributing and changing documents |
|
Definition
| schedules, task lists, assignments, andso forth, one users work might interfere with anothers. |
|
|
Term
| * Workflow control is the third key driver of effective collaboration. A workflow is a process or procedure by which content is created |
|
Definition
| edited, used, and disposed |
|
|
Term
|
Definition
| the team increases in capability. Working together becomes easier and more effective. |
|
|
Term
|
Definition
| a network of activities, resources, facilities, and information that interact to achieve some business function. |
|
|