click below
click below
Normal Size Small Size show me how
2100 - 1
| Question | Answer |
|---|---|
| What changes in business and business environment make IS so important? | – Internet & networking technologies chang businesses and markets – Transformation of business environment –Globalization – Rise of the information economy – The emerging “Digital Firm” |
| What is a digital firm? (see also p11)* | nearly all of the organization's significant business relationships with customers, suppliers and employees are digitally enabled and mediated |
| What are the strategic business objectives of information systems (p12+)? Understand theexamples in the book for each strategic business objective.* | Operational excellence New products, services and business models Customer and supplier intimacy Improved decision making Competitive advantage Survival |
| What is information technology (IT)? (see also p 15)* | consists of all the hardware and software that a firm needs to in order to achieve its business objectives. |
| What is an information system (IS)? (see also p 15+)* | set of interrelated components that collect (or retrieve), process, store and distribute information to support decision making and control in an organization. |
| What are data, information, and knowledge? Understand the example from the slide.* | Data: facts Information: meaning Knowledge understanding |
| What are the three basic dimensions of an information system? (see also p 17+)* | Organization: people, structure, business process, politics, culture. Management - promoting the company's stragegy of combining low cost and superior service. Information Technology - handheld computers, software |
| What is the sociotechnical perspective on information systems?* | Optimal organizational performance is achieved by jointly optimizing both the social and technical systems used in production. Social: Structure, people Technical: Technology, Task |
| How can we improve business process them with IS? Read through theexamples in the book.* | automation, change the flow of information giving more people access and share info, providing a new platform with new business process (downloading books) Makes them more efficient and effective |
| What are the four information systems we discussed for different management groups? (p45+)Understand their basic characteristics (e.g., MIS provides reports for managers)* | Transaction processing systems, management information systems, decision-support systems, and Executive support systems |
| Why do we need a strong transaction processing system? (p47)* | TPS are central to a business - TPS failure for a few hours can lead to a firm's demise and perhaps that of other firms linked to it. |
| What are the IS linking the enterprise (enterprise systems, supply chain management systems,customer relationship management system, knowledge management systems, intranets,extranets, e-business, and e-commerce)?* | .enterprise systems, supply chain management systems, customer relationship management system, knowledge management systems, intranets, extranets, e-business, and e-commerce |
| What are some collaboration technologies firms can use?* | Email and IM Collab writing, reviewing/editing File sharing Event scheduling Screen sharing Video/Audio conferencing Webinars Co-browsing Work Schedulign White boarding Web presenting |
| Key corporate assets* | intellectual property, core competencies, and financial and human assets - are managed through digital means. |
| Operational Excellence* | efficiency of operations in order to achieve higher profitability |
| New Products, Services, and Business Models* | How a company produces, delivers adn sells products or services to create wealth |
| business functions/process* | specialized tasks performed by business organizations: sales and marketing - selling manufacturing and production - producing/delivering finance and accounting - Managing finances human resources - maintaining labor force. |
| Data Management Technology* | software governing the organization on physical storage media |
| Networking and telecommunications technology* | both physical devices and software, links the various peices of hardware and transfers data from one physical location to another |
| network* | links two or more computers to share data or resources such as a printer |
| internet* | global network of networks using universal standards to connect millions of different networks with more users around the world |
| Intranets* | internal corporate networks based internet technology |
| extranets* | private intranets extended to authorized users outside the organization |
| www* | service provided by the internet that uses universally accepted standards for storing, retrieving, formatting, and displaying information in a page format on the internet. |
| IT infrastructure* | All technologies including the peole required to run and manage them, represent resources that can be shared throughout the the orgaization and constitute the firm's IT infrastructure. Provides platform on which the firm can build its specific is. |
| platform | foundation |
| Organization* | Org: ppl, structure, bus process, politics, cult Sr Mgt: Long-range and ensure financial Middle Mgt: carry out programs and plans of Sr. Mgt, Knowledge workers Op Mgt: monitoring the daily activities of the bus. Data Wrkrs and Production or serv |
| Management* | - make sense out of the many situations faced by organizations, make decisions, and formulate action plans to solve organizational problems. Must creat new products and services and re-create the organization from time to to time. |
| Information Technology* | tools used to cope with change: hardware/software/data mgt technology/networking and telecommunication |
| complimentary asset* | assets required to derive value from a primary investment Orgnaizational assets: appropriate bus model Mgrl assets: strong sr mgt support for tech investment and change Social assets - internet and telecommuncations structure, laws and regulation |
| organizational and managerial capital* | investmetns in organization and management |
| Management information systems* | • Reporting system for managers • Uses TPS data to provide usable reports • Focus on internal processes and events • Most commonly summarizes data |
| Transaction Processing System (TPS)* | • Earliest info systems type • Processes large number of business transactions – Programmable, highly predictable transactions • Payroll, Sales Processing, Billing, Purchasing, Student Enrollment, etc. • foundation of business, “back office” |
| Decision-support Systems (DSS)* | • Analytical systems to support managerial decision-making • Uses both TPS/internal data and other data sources • User controls analysis to be performed • Supports, but does not replace, • a human decision maker |
| Executive Support Systems (ESS)* | • Serves information needs of executives • Provides summarized internal data & extensive access to outside data • Integrates with other productivity tools • Interface – Easy to use – High level data, but “drill down” to details – Inte |
| Business Intelligence* | data and software tools for organziing, analyzing and providing access to data to help managers and other enterprise users make more informed decisions. |
| Digital dashboard* | part of an ESS used by senior managers - information on a single screen graphs and charts of key performance indicators for managing a company. |
| Enterprise Applications* | systems that span functional areas, focus on executing business processes across the business firm and include all levels of management. 4 types: E systems scmanagement systems customer relationship management systems knowledge management systems |
| Enterprise Systems* | aka enterprise resource planning (ERP) integrate business process into a single software system. Information stored in a single comprehensive data repository where it can be used by many different parts of the business. |
| Supply chain management systems (SCM)* | Help suppliers, pruchasing firms, distributors, and logistics companies share information about orders, production, inventory levels, and delivery of products and services so that they can source, produce, and deliver goods and services efficiently. |
| Customer relationship management (CRM)* | Sales, Marketing, Customer Service: • Unified view of customers • Consistent message of customers • End-to-end customer care • Long-term customer relationship • Identification of best customers |
| Knowledge Management System (KMS)* | enable organizations tter manage processes for capturing and applying knowledge and expertise by collecting all relevant knowledge and experience in the firm and make i available to all - they also link to external sources of knowledge. |
| interorganizational system* | automate the flow of information across organization boundaries like SCM - making it possible for firms to link electronically to customers and to outsource their work to other companies |
| How can we categorize these collaboration technologies? (p 67)* | – Cross-functional collaboration – Project-based collaboration – Inter-organizational collaboration |
| What are different roles in an IS department (p68+)* | Staffing an IS Department is challenging – Systems Analysts – Systems Developers – Programmers – IS Managers – Network Engineers |
| What role does a CIO play in the organization?* | Sr manger who oversees the use of it in the firm - responsible for integrating technology into the firm's business strategy |
| Chief Security Officer (CSO)* | enforcing firm's information secruity policy |
| Chief privacy officer (CPO)* | ensuring that the compnay complies with existing data privacy laws |
| Chief Knowledge Officer (CKO)* | helps design prograsm and systems to find new sources of knowledge or to make better use of existing knowledge in organizations and management process |
| • What is an organization? (p 82, definition of slide is enough) | A stable, formal structure – Takes resources from environment – Processes these resources – Produces outputs for the environment |
| What are the mediating factors between organizations and information technology? (p84+)* | Environment Culture Structure Business Process Politics Management Decisions Management -> Inputs from the environs -> Transformation of production or process -> out puts to environ -> Management |
| Why does IT flatten organizations? (p91)* | removes layers of management |
| What are the three basic ways to organize IS in an organization and what are their advantages?* | Centralized IS dept - Singular approach to IS Decentralized IS dept - Flexibility, localization, possible disconne Info Center approach - Local IS satellites in functions or location - Flexibility with strong ties to Central IS |
| Explain Porter's competitive forces model and competitive strategies. Be able to apply themodel to examples. (p94+)* | The strategic position of the firm and its strategies are determined not only by competition with its tradional direct competitors but also by four other forces in the industry's environment: |
| Why is it important to align IT with business objectives? (p111) | the more profitable it will be |
| ethics | Principles of right and wrong used by individuals as free moral agents to guide their behavior |
| Explain the basic concepts, responsibility, accountability, liability, and due process.* | Responsibility = accepting consequences of your decisions Accountability - legal mechinisms for assinging responsiblity Liability - recovery of damages from reponsible parties Due process - correct application of laws and appeals |
| how have been ethical choices been affected by IT?* | Computing power doubles Use of computing progresses vital to organizations – Reduced cost of data storage and advances in data mining and individual profiling techniques – Advances in communications infrastructure and applications (esp. Internet) |
| What are the four big ethical issues? Understand the problems and challenges for each ethicalissue.* | Privacy Accuracy Property Access |
| Privacy* | Privacy deals with the collection and use or misuse of computer-stored data. |
| Accuracy* | there have been numerous problems caused by inaccurate data stored in computer-based information systems. |
| Property* | Intellectual property rights concern the ownership and use of information. Intellectual Property: Intangible creations protected by law Trade Secret: Intellectual work or product belonging to business, not in public domain Copyright: |
| Access* | The issue of access deals with the ability of individuals to gain entry to information and information systems. |
| What are the components of an IT infrastructure? (175+)* | Computer hardware/software platforms - Enterprise software applications Data management and storage Networking/telecommunications platforms Internet platforms Consulting and system integration services - Legacy systems |
| Evolution of IT infrastructure (p166+)* | Mainframe / Minicomputer 1959 - Present Personal Computers 1981 - Present Client Server 1983 - Present Enterprise Computing 1992 - Present Cloud Computing 2000 - Present |
| Explain the changes in IT infrastructure with regards to microprocessor performance, computingcost, storage capacity, and internet communication costs? (p171+)* | Exponential Increase in Microprocessor Performance (moore's law) and Storage capacity per $ spent Exponential Decrease in Computing Cost and in Internet Communications Costs |
| Why do systems become more valuable with more participants? (p173)* | Metcalf’s Law: "value of compatibly communicating devices grows as the square of their #. |
| What are current software platform trends? (p181+)* | Software Platform Trends • Linux and open-source software • Software for the Web - Java, Ajax, etc. • Web services and service- oriented architecture • Mashups & Apps • Software outsourcing - Software packages and Software as a Serv |
| What is total cost of ownership and what are its components? (p195+)* | total cost of ownership of technology assets: - Hardware acquisition - Software acquisition - Installation - Training - Support - Maintenance - Infrastructure requirements - Downtime - Space and energy |
| The data hierarchy (p209)* | Bit -> byte -> Field --> Record --> File --> Database |
| The traditional file systems and disadvantages of the traditional file system (p209+)* | - Program-data dependence - Data redundancy - Data inconsistency - Lack of flexibility - Poor Security - Lack of data sharing & availability |
| data redundancy, | presence of duplicate data in multiple data files so that the same data are stored in more than one place or location |
| What is a database? | collection of data organized to serve many applications efficiently by centralizing the data and controllling redundent data |
| What are entities? What are attributes? (p213+)* | Entity - person, place, thing or event on which we store and maintain information Attribute - each characteristic or quality describing a particular entity Student_ID, course, data and grade are attributes of the entity COURSE. |
| What is an ERD? (p221)* | entity-relationshiip diagram - data model illustrating the relationship between entities |
| What are the tasks of database administration?* | Defines & organizes database structure and content • Develops security procedures • Develops database documentation • Maintains DBMS Establishes an Information Policy Ensures Data Quality |
| What is a data warehouse? (p222+)* | database that stores current and historical data of potential interest to decision makers |
| What are some current database trends?* | Linking Internal Databases to the Web GIS - Geographical info system data visualization cloud computing Hypermedia databases Multidimensional Data Analysis |
| What is a Computer Network? (p247+)* | two or more connected computers |
| What are the different types of telecommunication carriers? (no need to remember details ornumbers listed on the slides) (p255+)* | twisted wire, coaxial cable, fiber optics media for wireless transmission line of sight microwaves, satelites, radiowaves |
| What are the basic network typologies? (p254)* | Star - single hub, bus - one station transmits signal in either direction along a single transmission segment ring - connects network components in a closed loop, going from computer to computer, one station transmitting at a time |
| What are the main network types? (p253+* | Local Area Network (LAN) Backbone Network Metropolitan Area Network Wide Area Network (WAN) |
| What is packet switching and what is the relevance of TCP/IP for the Internet?* | Breaking data down to manageable size and reassembling at other end using transmission pathways when available making more efficient use of resources |
| Describe the basic Internet Architecture (p260)* | backbone connects to regional netwroks, which provide access to ISP, large firms and government insts. Naps and Maes are hubs where the backbone intersects regional and local networks and where backbone owners connect with one another |
| Describe the Client/Server architecture on the Internet* | running web browser and other software can access an array of services on servers over the internet - these services may all run on a single server or on multiple specialized servers. |
| What are the contemporary security challenges and vulnerabilities? (p293+)* | The architecture of a web-based application typically includes a web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. |
| What is social engineering? (p302)* | malicious intruders seeking system access sometimes trick employees into revealing their passwrods by pretending to be legitimate members of the company in need of information. |
| Potter more | New Market Entrants - how easy, brand recognition Substitute Products and services - the more substitue,less you can control price, Customers - if little product differentiation,, Suppliers - more suppiers, greater control it can exercise over supplier |
| dbms | DBMS - software that permits organization to cetnralize data, mange them efficiently and provide access to the stored data by application programs. |
| TCP/IP | TCP = handles movement of data between computers , sequencing transfer of packets and acknowledge package sent IP responsible for the delivery of packets and disassembling and reassembling of packets during transmission |
| What are the contemporary security vulnerabilities? | Client (user) - unauthorized access, errors Comunication lines - tapping, sniffing, alt msg, theft and fraud, radiation Corporate servers - hacking, malware, theft/fraud, vandalism, DOS attacks Corp syst - theft, copy, alt of data, Hard/software |
| virus | Virus - rogue software program that attaches itself to other software programs or data files in order to be executed, usually without user knowledge or permission. Deliver payload and spread computer to computer. |
| Worms | independent computer programs that copy themselves from one computer to another over a network, operate on their own w/o attaching to other computer program files and rely less on human. Destroy data and programs and disrupt/halt operation |
| Trojan horse | benign appearing software program that does something other than expected - a way for viruses and other malicious code to be introduced. |
| security threat 1 | Encryption: coding & scrambling messages to deny unauthorized access • Authentication: ability to identify another party - Message integrity - Digital signature - Digital certificat |
| security threat 2 | Security is a chain; it's only as secure as the weakest link. Errors in the operating system Back door in the firewall Poorly chosen user password Unlocked door Unlogged-out account |
| security threat 3 | Passwords - Not a fail-safe, as passwords are often picked poorly. - Require password changes regularly Authorization Controls - Based on user-IDs, restrict access to systems and data, and restrict actions that people may take once in the sys |
| Potter more | New Market Entrants - how easy, brand recognition Substitute Products and services - the more substitue,less you can control price, Customers - if little product differentiation,, Suppliers - more suppiers, greater control it can exercise over supplier |
| How do we categorize collaboration technologies? | Face to face: singly display groupware Continuous task - team rooms, large public display, project management Remote interactions - video confering, IM, shared screens Communication and Coordination - email, bulletin boards, blogs, workflows, wikis |
| Hardware Platform Trends | Cloud Computing & the Computing Utility Green Computing Autonomic computing Multicore Processors The Emerging Mobile Digital Platform Grid computing Virtualization and Multicore Processors |
| data inconsistency (p211)* | where the same attribute may have different values |
| The role of information system | – Efficiency – Effectiveness – Innovation / Transformation Information systems make things possible … and also things that otherwise cannot be done |
| Business Process | The ways in which organizations coordinate and organize work activities, information, and knowledge to produce a product or service. |
| Collaboration Technologies | • E-mail & Instant Messaging • Social Networking • Wikis • Virtual Worlds • Virtual meeting Systems • Cloud-based Applications |
| Business Processes/Procedures | – Rules and procedures developed to achieve organizational goals. – Obtaining inputs, production or transformation processes, delivering outputs, etc. – Rules and procedures developed to deal with expected situations. |
| IS Impact on the Organization | Microeconomic: lower amount of capital & labor needed to produce. Transaction cost: lower costs of all types of bus. transactions. Agency: Firm is nexus of contracts among parties requiring supervision. IS lowers the costs of managing these age |
| Striving for Competitive Advantage | Creating barriers to competitor’s entry Building up customers’ switching costs or operational dependence. Changing basis of competition by offering new services, products, or information. Changing nature or environment of the business. |