Term
|
Definition
| Gordon Moore is one of the founders of Intel Corporation, which makes 75 percent of the integrated processors used in personal computers. In 1965, Moore predicted that computer-processing power would double and its cost would drop by 50 percent about every 2 years. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| useful data that can influence someone’s choices and behavior. |
|
|
Term
|
Definition
| The strategic advantage that companies earn by being first to use information technology to substantially lower costs or differentiate a product |
|
|
Term
| Sustaining A Competitive Advantage |
|
Definition
| The key to sustaining a competitive advantage is not faster computers or better technology. The key is using information technology to continuously improve and support the core functions of a business. |
|
|
Term
| Characteristics of Useful Information |
|
Definition
Accurate
Complete
Relevant
Timely |
|
|
Term
| Costs of Useful Information |
|
Definition
Acquisition costs
Processing costs
Storage costs
Retrieval costs
Communication costs |
|
|
Term
|
Definition
Bar codes
Radio frequency identification (RFID) tags
Electronic scanners optical character recognition |
|
|
Term
|
Definition
| Transforming raw data into meaningful information that can be applied to business decision making. |
|
|
Term
|
Definition
| The process of discovering patterns and relationships in large amounts of data. Can be supervised or unsupervised |
|
|
Term
|
Definition
|
|
Term
|
Definition
Association (affinity)
Sequence
Predictive
Data clusters |
|
|
Term
| Association or affinity patterns |
|
Definition
| occur when two or more database elements tend to occur together in a significant way |
|
|
Term
|
Definition
| occur when two or more database elements occur together in a significant pattern in which one of the elements precedes the other. Whereas association or affinity patterns look for database elements that seem to go together, |
|
|
Term
|
Definition
| help identify database elements that are different. |
|
|
Term
|
Definition
| occur when three or more database elements occur together (i.e., cluster) in a significant way. |
|
|
Term
|
Definition
| Process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users but no one else. |
|
|
Term
| Two critical steps are required to make sure that data can be accessed by authorized users and no one else. |
|
Definition
Authentication Authorization |
|
|
Term
|
Definition
| that is, making sure potential users are who they claim to be |
|
|
Term
|
Definition
| that is, granting authenticated users approved access to data, software, and systems. |
|
|
Term
|
Definition
| such as fingerprint recognition or iris scanning, users are identified by unique, measurable body features. Of course, since some fingerprint scanners can be fooled by fingerprint molds, some companies take security measures even further by requiring users to simultaneously scan their fingerprint and insert a secure, smart card containing a digital file of their fingerprint. This is another form of two-factor authentication. Unfortunately, stolen or cracked passwords are not the only way for hackers and electronic thieves to gain access to an organization’s computer resources. Unless special safeguards are put in place, every time corporate users are online there’s literally nothing between their personal computers and the Internet (home users with high-speed DSL or cable Internet access face the same risks). Hackers can access files, run programs, and control key parts of computers if precautions aren’t taken |
|
|
Term
|
Definition
| hardware or software devices that sit between the computers in an internal organizational network and outside networks, such as the Internet. Firewalls filter and check incoming and outgoing data. They prevent company insiders from accessing unauthorized sites or from sending confidential company information to people outside the company. Firewalls also prevent outsiders from identifying and gaining access to company computers and data. If a firewall is working properly, the computers behind the company firewall literally cannot be seen or accessed by outsiders. Another way of protecting information is to encrypt sensitive data |
|
|
Term
|
Definition
| transforms data into complex, scrambled digital codes that can be unencrypted only by authorized users who possess unique decryption keys. Although firewalls can protect personal computers and network servers connected to the corporate network, people away from their offices (e.g., salespeople, business travelers, telecommuters who work at home) who interact with their company networks via the Internet face a security risk. Because Internet data are not encrypted, packet sniffer software easily allows hackers to read everything sent or received except files that have been encrypted before sending. Previously, the only practical solution was to have employees dial into secure company phone lines for direct access to the company network. Of course, with international and long-distance phone calls, the costs quickly added up. |
|
|
Term
| virtual private networks (VPNs) |
|
Definition
| have solved this problem by using software to encrypt all Internet data at both ends of the transmission process. Instead of making long-distance calls, employees connect to the Internet. But, unlike typical Internet connections in which Internet data packets are unencrypted, the VPN encrypts the data sent by employees outside the company computer network, decrypts the data when they arrive within the company network, and does the same when data are sent back to the computer outside the network. |
|
|
Term
| secure sockets layer (SSL) encryption |
|
Definition
| to provide secure off-site access to data and programs. If you’ve ever entered your credit card in a Web browser to make an online purchase, you’ve used SSL technology to encrypt and protect that information. SSL encryption is being used if a gold lock (Internet Explorer) or a gold key (Netscape) appears along the bottom of your Web browser page. SSL encryption works the same way in the workplace. Managers and employees who aren’t at the office simply connect to the Internet, open a Web browser, and then enter a user name and password to gain access to SSL-encrypted data and programs |
|
|
Term
|
Definition
collaboration tools customizable email accounts presence awareness instant messaging simultaneous access to files |
|
|
Term
| executive information system (EIS) |
|
Definition
| uses internal and external sources of data to provide managers and executives the information they need to monitor and analyze organizational performance. The goal of an EIS is to provide accurate, complete, relevant, and timely information to managers. Intranets are private company networks that allow employees to easily access, share, and publish information using Internet software. |
|
|
Term
|
Definition
| websites are just like external websites, but the firewall separating the internal company network from the Internet permits only authorized internal access. Corporate portals are a hybrid of executive information systems and intranets. While an EIS provides managers and executives with the information they need to monitor and analyze organizational performance, and intranets help companies distribute and publish information and forms within the company |
|
|
Term
|
Definition
| allow managers and employees to access customized information and complete specialized transactions using a web browser. |
|
|
Term
| External Access & Sharing |
|
Definition
Electronic data interchange (EDI)
Web services
Extranet |
|
|
Term
| electronic data interchange, or EDI |
|
Definition
| two companies convert purchase and ordering information to a standardized format to enable direct electronic transmission of that information from one company’s computer system to the other company’s system |
|
|
Term
|
Definition
| are another way for companies to directly and automatically transmit purchase and ordering information from one company’s computer system to another company’s computer system. Web services use standardized protocols to describe and transfer data from one company in such a way that those data can automatically be read, understood, transcribed, and processed by different computer systems in another company. |
|
|
Term
|
Definition
| allows companies to exchange information and conduct transactions by purposely providing outsiders with direct, Web–based access to authorized parts of a company’s intranet or information system. Typically, user names and passwords are required to access an extranet. |
|
|
Term
| Sharing Knowledge & Expertise |
|
Definition
Knowledge Decision support system (DSS)
Expert systems |
|
|
Term
| decision support system (DSS) |
|
Definition
| helps managers understand problems and potential solutions by acquiring and analyzing information with sophisticated models and tools. |
|
|
Term
|
Definition
| systems are created by capturing the specialized knowledge and decision rules used by experts and experienced decision makers. They permit nonexpert employees to draw on expert knowledge base to make decisions. Most expert systems work by using a collection of “if–then” rules to sort through information and recommend a course of action. |
|
|