CINS Final Flashcards
Reasons for Productivity Paradox (4)
Measurement, time lags, redistribution, mismanagement
Reason for productivity paradox #1: Measurement
firms are measuring the wrong things. They are measuring system efficiency when they should be measuring system effectiveness.
system efficiency
to extent to which a system enables a firm to do things faster or cheaper
system effectiveness
to extent to which a system enables a firm to accomplish goals and tasks well
Reason for productivity paradox #2: Time Lags
benefits are felt long after initial investment
Reason for productivity paradox #3: Redistribution
when looking from a large scale, IS systems don’t seem to enhance the overall picture. But the new IS may benefit one firm, but not the market as a whole. (Some slices are getting bigger, but the whole pie’s not.)
Reason for productivity paradox #4: Mismanagement
Mismanagement
strategic necessity
something an organization must do in order to survive
competitive pressures
force managers to invest in IS systems
Why do you need a business case?
A strong business case aids the decision-making process and helps direct resources in more strategic ways.
3 arguments of an IS business case
Faith, fear, facts
Faith
no hard data, should clearly describe the firm’s mission and strategy. Based on beliefs about organizational strategy, comparative advantage, market share, etc.
fear
competition and rivalry in the industry, strategic necessities
fact
cost-benefit analysis
Cost-benefit analysis
- identifying costs (nonrecurring vs recurring) (tangible vs. intangible.)
- identifying benefits (tangible vs. intangible)
- perform cost-benefit analysis (break-even, net present-value)
TCO
total cost of ownership (acquisition, use, maintenance)
Weighted multicriteria analysis
a method for deciding among different investments
How to present the business case
- Know your audience
- Convert benefits to monetary terms
- Use proxy variables (alternative measures of outcomes)
- used to measure changes in terms of their perceived value to the organization
- increases and decreases - Measure what is important to management
Systems analysis and design
the process of designing, building, and maintaining IS
Customized software
meets specific needs. Advantage is problem specificity (you only pay for what’s needed)
Off-the-shelf software
for common business processes. Less costly, faster, higher quality and less risky
analysts and users must work together for a successful project
analysts and users must work together for a successful project
SDLC
Systems Development Life Cycle
Steps of SDLC (5)
- Systems planning and selection
- Systems analysis
- Systems design
- Systems implementation and operation
- Systems maintenance
Steps to Systems Analysis
- Determine requirements- requirements collection
- Modeling data- what data the IS needs to accomplish tasks
- Modeling processes and logic- data flows, processing logic
- Develop several different approaches (designs)
requirements collection
the process of gathering info to understand how the system should function
Joint Application Design (JAD)
a group meeting based process
data flows
represent the movement of data through an organization or within an IS
processing logic
represents the way in which data is transformed (expressed in pseudocode)
Systems Design
an approach is chosen and its details are elaborated
3 parts of systems design
- human-computer interface
- databases and files
- designing processes and logic
2 parts of systems implementation and operation
- Software programming and testing- transforming the system design into a working computer system and then testing it
- System Conversion, documentation, training, and support-
system conversion: switching from old to new (parallel, direct, phased, pilot/single location)
documentation: user guides, etc
Types of software tests (3)
- developmental: tests modules
- Alpha: overall system
- Beta: capabilities of user end
Types of Systems Maintenance (4)
- Corrective: repairing flaws
- Adaptive: evolve functionality
- Perfective: improving (adding bells and whistles)
- Preventative: reduces chance of system failure
Patch-management system:
use the Internet to check for updates
prototyping
trial-and-error development (alternative to SDLC)
end-user development
non-professional (alternative to SDLC)
2 options for out-of-house IS acquisition
- external acquisition: purchasing an IS
- SaaS (Software as a Service) also an option - outsourcing systems development
systems benchmark
tests for a system
software licensing types
- shrink-wrap/ click-wrap: generic
2. enterprise/volume: negotiated
software asset management
helpful for firms with several software licenses
the management of an outsourcing alliance is super important
the management of an outsourcing alliance is super important
Primary threats to IS
natural disasters, accidents, employees and consultants, links to outside business contacts, outsiders
computer crime
using a computer to commit an illegal act
-has declined
2 main federal laws against computer crime
computer fraud and abuse act, electronic communications privacy act
hackers
individuals who are knowledgeable enough to gain access to computer systems without authorization
crackers
those who break into computer systems with the intention of doing damage
hacktivists
those who break into systems/deface websites to promote political or ideological goals
4 groups of computer crimals
- current or former employees
- people committing crimes for personal gain
- career criminals using computers to assist them in crimes
- outside crackers hoping to find valuable info
information modification
ex. employee breaks into system and gives herself a raise
malware
malicious software: viruses, worms, Trojan horses
virus
destructive program that disrupts the normal functioning of software. Can reproduce and spread through downloads/email attachments
worm
variation of a virus that is targeted at networks and takes advantage of security holes
trojan horse
does not replicate, but causes damage. Codes are hidden
logic bombs/time bombs
variations of trojan horses. Time bombs: set off by specific dates. Logic bombs: set off by certain types of operations
denial of service attack
attackers prevent legit users from accessing services
zombie computers
created by viruses or worms. Used to attack web sits and make their servers crash because of the increased load.
spyware
hidden within freeware or shareware or web sites. gathers info about user. eats up computer’s memory
adware
free software paid by advertisements, collects info for banner ad custimization
spam
electronic junk mail
spim
spam in text message form
phishing (spoofing)
attempts to trick users into giving away credit card numbers. Duplicates of legit web sites.
CAPTCHA
Completely Automated Turing Test to Tell Computers and Humans Apart
cookies
messages passed to a Web browser from a Web server. Stored in text file, used for web site customization, may contain sensitive info
botnet
a collection of zombie computers connected to the internet
bot herder
botnet manager
identity theft
fastest growing information crime
internet hoaxes
false messages circulated online about new viruses that don’t exist.
cybersquatting
registering a domain name and later reselling it
Anti-Cybersquatting Protection Act
prevents cybersquatting
cyber harrassment
crime that broadly refers to the use of a computer to harrass
cyber stalking
repeated cyber harrassment
cyber bullying
the deliberate cause of emotional distress to a victim