click below
click below
Normal Size Small Size show me how
MIS Final
Terms
| Question | Answer |
|---|---|
| Productivity Paradox | Given the vast number of potential systems and technologies that could be developed or acquired, a strong business case aids the decision making process and helps direct resources in more strategic ways |
| System Effectiveness | Result of the biggest increase in productivity |
| System Efficiency | Accomplishing things faster at lower costs |
| Redistribution | A new type of system may be beneficial for individual firms but not for a particular industry or the economy as a whole |
| Mismanagement | A system is implemented but not managed well |
| Managers use the 3 F's when making a successful business case | Faith,Fear,Fact |
| TCO | Total Cost of Ownership One goal of a cost-benefit analysis |
| Nonrecurring Costs | one-time costs that are not expected to continue after the system is implemented |
| Recurring Costs | Ongoing Costs that occur throughout the life of a system |
| Tangible Costs | Relatively easy to quantify |
| Intangible Costs | Will not easily fit into quantitative analysis but should be accounted for |
| Break-Even Analysis | type of Cost-benefit analysis to identify at what point tangible benefits equal tangible costs |
| Net-Present-Value Analysis | Cost-benefit analysis relevent to cash flow steams associated with the system at the organization's dicount rate |
| Discount Rate | The rate of return used by an organization to compute the present value of futre cash flows |
| Systems Analysis and Design | The process of designing, building, and maintaining information systems |
| Systems Analyst | Performs the process of designing, building, and maintaining information systems |
| Project Manager | Oversees the system analyst and responsible for ensuring that the system is successful |
| SDLC | Systems Development Life Cycle, Describes the lifespan of an information system |
| System Planning and Selection | Formal process mainly to identify, plan, and select a development project from all possible projects that can be performed |
| Systems Analysis | Designers gain a full understanding of the organizations current systems and then decide which new info system will be constructed |
| Pseudocode | Used by systems analysts to express the way in data is transformed |
| Data Flows | Represents the movement of data through an organization or within an info system |
| System Design Elements | Human-Computer interface,Databases and files,Processing and logic |
| HCI | Human-Computer Interface, the point of contact between a system and a user |
| Designing Processing and Logic | Steps and procedures that transform raw data inputs into new or modified information |
| Order of Phases of the Systems Development Life Cycle | Systems Planning and Selection,Systems analysis,Systems Design,Systems Implementation and Operation,Systems Maintnenance |
| Making a Business Case | Refers to the process of identifying, quantifying, and presenting the value provided by a system |
| Weighted Multicriteria Analysis | Method for deciding among different IS investments or when considering alternative designs for a system |
| Proxy Variables | Alternative measures of outcomes when it is not easy to quantify the impact of an investment |
| Patch Management Systems | System that uses the internet to to check for available patchs and/or updates |
| Prototyping | Alternative to SDLC, which uses a trial-and-error approach for discovering how a system should operate |
| Corrective Maintenance | Making changes to an information system to repair flaws in the design, coding, and implementation |
| Adaptive Maintenance | Making changes to accommodate changes in business needs |
| Perfective Maintenance | Making enhancements to improve processing performance or interface |
| Preventive Maintenance | Making changes to a system to reduce the chance of future system failure |
| End-User Development | Individuals within organizations build increasingly complex and useful applications after the system has already been implemented |
| External Acquisition | Purchasing an existing system from an outside vendor such as IBM, HP Enterprise Services, or Accenture |
| RFP | Request For Proposal A document that is used to tell vendors what an organizations requirements are |
| Systems Benchmarking | Used to standardize performance tests to facilitate comparison between systems |
| Shrink-Wrap Licenses | Contract is activated when the shrink wrap on the packaging is removed |
| Click-Wrap Licenses | A license primarily used for downloaded software |
| Enterprise License | License that usually contain limitations of liability and warranty disclaimers |
| Computer Crime | The act of using a computer to commit an illegal act |
| Hackers | Individuals who are knowledgeable enough to gain access to a computer system without authorization |
| Hacktivists | Computer crimminals that attempt to break into systems or deface websites to promote political or idealogical goals |
| Crackers | Individuals who break into computer systems with the intention of doing damage or committing a crime |
| Information Modification | Occurs when someone accesses electronic information and then changes the information |
| Malware | short for "malicious software" Refers to harmful Viruses, Worms, and Trojan horses |
| Virus | Desructive program that disrupts the normal functioning of computer systems |
| Worm | A variation of a Virus that is targeted at networks ultimately denying intenet access to users |
| Trojan Horse | Destructive program like a virus, but does not copy itself |
| Logic Bombs or Time Bombs | Variations of Trojan horses that lie in wait for unsuspecting computer users to perform a triggering operation |
| Zombie Computers | Intruders infect computers located in homes, schools, and business with viruses or worms |
| Spyware | Any software that covertly gathers information about a user through an Intenet connection |
| Adware | Free software paid for by advertisements appearing during the use of the software |
| Spam | Electronic junk mail or junk newsgroup postings |
| Phishing | Used by spam e-mail to trick financial accounts and credit card holders into giving away their authorization information |
| CAPTCHA | Completely Automated Public Turning Test to Tell Computers and Humans Apart |
| Cookies | A message passed to a Web browser on a user's computer by a Web server to be stored as a text file on the computer |
| Cybersquating | Dubious practice of registering a domain name and then trying to sell the name for money to the person, company, or organization that wants it |
| Intellectual Property | Software for patent and copyright laws applied to works used in commerce |
| Patents | Refers to process, machine, or material inventions |
| Copyrights | Refers to creations of the mind such as music, literature, or software |
| Warez | Slang term for stolen software |
| Information System Security | Refers to precautions taken to keep all aspects of information systems safe |
| Risk Analysis | process in which you access the value of the assets being protected |
| Risk Reduction | Active countermeasures to protect your systems |
| Risk Acceptance | Implementing no countermeasures and simply absorbing any damages that occur |
| Risk Transference | Having someone else absorb the risk |
| Biometrics | Sophisticated form of authentication used to govern access to systems, data, and/or facilities |
| Access-Control Software | Special software used to keep stored information secure |
| VPN | Virtual Private Network A network connection that is constructed dynamically within an existing network Also known as a secure tunnel |
| Firewall | A part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network |
| Encryption | Process of encoding messages before they enter the network to be securley transfered to the intended recipient |
| Secure Sockets Layer | Popular public key encryption method used on the internet, created by Netscape |
| Audit-Control Software | Used to keep track of computer activity so that auditors can spot suspicious activity and take action |
| Backups | Important files saved to external hard drives |
| Cold Backup Site | Empty warehouse with all necessary connections for power and communication |
| Hot Backup Site | Fully equiped backup facility with exact replication of the most current data |
| Mirrored | Everything is stored synchronously on two independent systems |
| Closed-Circuit Television | Systems that monitor for physical intruders such as video cameras |
| Collocation Facilities | Rented space for backup storage for only a few servers |
| Computer Forensics | Use of formal invesitgative techniques to evalute digital information for judicial review |
| Honeypot | A computer, data, or network site that is designed to lure crackers |
| Information System Audit | Helps organizations assess the state of their IS controls to determine necessary changes and to help ensure the information system's availability, confidentiality, and integrity |
| Sarbanes-Oxley Act | Government regulations on the requirement of controls in place to prevent misuse or fraud, controls to detect problem, and effective measures to correct problems |
| Botherder | A criminal that has a botnet residing on a collection of zombie computers |
| Requirements Collection | Process of gathering and organizing information from users, managers, customers, business processes, and documents to understand how an IS should function |
| Developmental Testing | Testing the correctness of individual modules and the integration of multiple modules performed by the programmer |
| Alpha Testing | Testing of overall system to see whether it meets design requirements Performed by Software Tester |
| Beta Testing | Testing of the capabilities of the system in the user enviroment with actual data Performed by actual system users |
| Recovery Time Objectives | Specifies the maximum time allowed to recover from a catastrophic event |
| Recovery Point Objectives | Specifies how current the back data should be |
| 3 Authentication Forms | Something You Have- Ex. Keys,Something You Know- Ex. Password,Something You Are- Ex. Fingerprint |
| Acceptable Use Policies | Policies for people within the organization, with clearly spelled out penalties for noncompliance |