Strategies for information Flashcards

1
Q

The benefits of a proposed information system

A

The benefits of a proposed information system should be evaluated against the cost. Several factors need to be considered. These include the following:

Increased revenue
Improved marketing and use of data analytics can help organisations achieve a
competitive advantage.

Cost reduction
Automated production, computer aided manufacturing and improved stock
control may improve profitability.

Enhanced service
Computerised systems may improve reliability and CRM systems can help to
manage customer relationships.

Improved decision-making
Accurate and up-to-date information can aid forecasting and scenario planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Development and implementation of a new information system

A

Stages to follow when developing and implementation a new information system

Analysis
Identify the needs of the new system

Design
Design a system that needs those needs

Programming
Outline specifications to programmers

Testing
Ensure that requirements have been met

Conversion
Existing data is migrated to the system

Implementation
User training and on-going maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Digital disruption

A

Digital disruption refers to the rapid change that is happening in many industries as
organisations move to digital transformation. This is through the use of technological
advances to challenge the status quo and create value in new ways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital technology has been used to disrupt many industries, including:

A

 Transport e.g. Uber taking on traditional taxi firms
 Accommodation e.g. Airbnb competing against hotels
 Advertising e.g. social media influencers competing with traditional advertising
agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data analytics

A

Data analytics is the process of collecting, organising and analysing
large sets of data to discover patterns and other information which an
organisation can use for future decisions.

Collection of data
Organisations have access to greater
quantities of data available from a number
of internal and external sources.

Organisation of data
Once the data has been captured it needs
to be organised and stored for future use,
often using data warehousing facilities.

Analysis of data
Data mining software uses statistical
algorithms to discover correlations and
patterns to create useful information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Big Data

A

Big Data is a term that describes large volumes of data that inundate a
business on a day-to-day basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The key features of Big Data are described as the 4Vs:

A

Volume
Considers the
amount of data fed
into the organisation
 Does the organisation have the resources
available to store and manage this data?
 Or does it have the financial resources
required to invest in or upgrade IT/IS?

Velocity
Considers the speed
that data is fed into
the organisation
 Are systems able to capture and process
‘real time’ data?
 Does the organisation have the skills to
provide timely analysis of this data?

Variety
Considers the
various formats of
data received
 Are systems compatible and capable of
accepting various forms of data?
 Legally, is the data owned by the
organisation or by the third party?

Veracity
Considers the
reliability of the data
being received
 Can the organisation challenge data
received from third parties?
 Is the data received fully representative of
the whole data population?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Barriers and limitations of Big Data

A

 Data overload
 Ability to verify the data
 Representative data
 Shortage of talent to analyse the data
 Fear of cyber attack
 Legal and regulatory compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cognitive technologies (also known as intelligent systems)

A

Computer-based systems that represent, reason about and interpret
data. In doing so they learn about the structure of the data and analyse
it to extract patterns and meaning.
They then derive new information and identify strategies and
behaviours built upon the results of their analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Artificial intelligence

A

 Increasing use of computers to perform tasks thought to require human
intelligence such as learning and reasoning, including:
– Medical diagnosis through interpretation of medical images
– Home assistants learn our language and habits to better predict and
understand our requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Machine learning

A

 Is a subset of AI that applies algorithms or other techniques to data to give
computers the ability to learn without being explicitly programmed to do so.
Performance can be improved with experience of repeating processes.
– This can reduce costs, improve efficiency and reduce dependence on
human intervention
– For example: computer speech recognition to translate audio into text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Automation

A

 The creation of technology and its application to control and monitor activities
without human interference. Cognitive technologies and artificial
intelligence facilitate the process of automation.
– Benefits include more productivity, accuracy, consistency and availability
– Challenges include the investment required, lack of operating skills and
potential redundancies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Internet of things

A

This describes the inter-connection via the internet of computing devices embedded
in every-day objects, enabling them to send and receive data.
This has benefits for individuals (e.g. a heating system that responds to the changes
in weather) and also for businesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Digital assets

A

A digital asset is any text or data file that is formatted into a binary
source which includes the right to use it; digital files that do not carry
this right are not considered digital assets.

A business needs to protect and manage their digital assets in the same way they
would manage their tangible assets. If a logo was wrongly altered and then used
within an advertisement it could damage the reputation of the company.
Businesses use methods such as encoding, encryption and watermarks to protect
digital assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two common types of digital asset are:

A

 Media assets (images and multimedia)
 Textual content (documents, PDF files)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Implementing a digital asset management strategy

A

This requires the consideration of a number of practical issues:

Infrastructure capabilities and storage needs – this may need to be outsourced
to a digital management company if the business does not have the capability

Management support – implementing a new strategy will be disruptive and
expensive and will need management support

Selection of supplier – needs to be able to retrieve the assets on a timely basis
and provide the necessary support

17
Q

Blockchain technology

A

A blockchain has been described as a decentralised, distributed and
public digital ledger that is used to record transactions across many
computers so that the record cannot be altered without the consensus
of all involved parties.
The main benefit of blockchain is that is gives added security in the digital era.
As new transactions take place, they form a block which gets added to the chain; the
chain is never broken and so the transaction is permanently recorded and cannot be
altered retrospectively. One of its main uses is to provide security for cryptocurrency

18
Q

Cryptocurrency

A

A form of digital currency designed to facilitate the virtual exchange of
transactions

19
Q

Cryptocurrencies are not controlled by a central banking mechanism, which has led
to the value fluctuating dramatically. Companies looking to accept cryptocurrency as
a form of payment need to consider the following:

A

Impact on reputation – as cryptocurrencies can be sent anonymously they have been used by criminals as a way to transfer proceeds of crimes, leading to a
negative reputation associated with it.

Capabilities required – the infrastructure to collect cryptocurrency needs to be in place. Intermediaries exist to collect currency such as Bitcoin and exchange for sterling. There is a charge for this service due to the fluctuations in value.

NOTE: These developments in technology do not necessarily provide a company
with a competitive advantage as they are widely available. Combining components
with experience and rapidly learning from the technology is what presents a
competitive advantage.

20
Q

Types of knowledge

A

Knowledge is the potential for action based on data, information,
intuition and experience.

Explicit knowledge is knowledge that the company knows it has.

Tacit knowledge is personal knowledge and expertise held by people
within the organisation that has not been formally documented.

21
Q

Purpose of knowledge management

A

Knowledge management is a range of strategies and tools that
capture all of the knowledge that is valuable to an organisation, and
deliver it to the people in such a way that it can be acted on quickly, to
the competitive advantage of the business.

22
Q

Knowledge management considers the process of collecting, storing and using the
knowledge held within an organisation. This includes the following

A

Designing and installing techniques and processes to create, protect and use
explicit knowledge.

Designing and creating environments and activities to discover and release
tacit knowledge.

23
Q

Knowledge management strategy
Stages to follow when implementing a knowledge management strategy

A

Identify the knowledge that exists
within the organisation

Capture and document existing
knowledge

Disseminate knowledge to appropriate
people

Determine ways that knowledge can be
developed and tracked

Ensure that key strategic knowledge is
kept secure and confidential

24
Q

Cyber security risks

A

Cyber security is the protection of systems, networks and data in cyberspace. Cyber
risk is any risk of financial loss, disruption or damage to the reputation of an
organisation from some sort of failure of its IT systems.

Human threats – hackers may be able to get into the organisation’s internal
network, either to steal data or to damage the system

Fraud – the theft of funds by dishonest use of a computer system

Deliberate sabotage – commercial espionage or malicious damage or industrial
action

Viruses and other corruptions – these can spread through the network to all of
the organisation’s computers

Denial of Service (DoS) – an attempt by hackers to prevent legitimate use of a
service. This is likely to result in frustrated customers and lost sales

25
Q

IT Risk management procedures

A

Ensuring appropriate systems development and maintenance takes place

Have back-up servers

Have access controls, data encryption, firewalls in place for payments and data

Quality controls in place for other companies in the systems chain, that share
information

Hire individuals with the specialist skills and expertise.