BEM 251 Final Flashcards

(33 cards)

1
Q

Business Value of Improved Decision Making

A

improving many “small” decisions can add up to large annual value for business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of Business Decisions

A

Unstructured: decision maker must provide judgement, evaluation, and insight to solve problems
- each decision is new, important, and unique
Semi-Structured: only part of problem has clear answer with procedure
Structured: repetitive and routine, defined procedure so not new issue

Senior managers make unstructured
Middle semi-structured
Operational mangers tend to be more structured, common issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reasons why investments in I/S does not produce results

A
  1. Informational Quality: high quality decisions need high quality information
  2. Management Filters: managers have selective attention and biases that reject information that doesn’t line up with information
  3. Organizational Inertia and Politics: strong forces within org resists decision for major changes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

High Velocity Automated Decision Making

A

are made possible with computer algorithms, highly structured decision
- eliminate humans
- require safeguards + monitoring for proper operation and regulation
ex: trading programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Algorithm

A
  • sequence of unambiguous rules to solve a problem
  • use to obtain output for inputs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Business Intelligence

A
  • term used to describe info used to help make decisions
  • five component framework, everything
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Business Analytics

A

hardware, software, data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Business Intelligence Vendors

A

create business intelligence infrastructure purchased by firm
ex: Microsoft, IBM, Oracle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Big Data

A

combination of massive amounts of structured, semi-structured, and unstructured data
- used for machine learning and targeting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Types

A

Structured Data: easy to analyze, predefined data
(usually in like Excel formats)

Unstructured Data: information without predefined data model, not organized just large amounts of data

Semi-Structured Data: form of structured data without formal structure but has some hierarchy structure

Metadata: data about data, information about specific set of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Six Big V’s of Data

A
  • Volume: amount of data from different sources
  • Variety: types of data
  • Velocity: speed big data is generated
  • Veracity: degree big data can be trusted
  • Value: business value of data
  • Variability: ways big data can be used and formatted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Lake

A
  • large pool of unprocessed data stored in original format
  • highly scalable, hold all data types
  • no planning/ analysis, that will happen later
  • largely used for analysts and data scientists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Warehouse

A
  • hold summarized data by business type
    ex: OLTP (Online Transaction Processing)
  • traditional data warehouses use Extract Transform Load (ETL), mapped from source to tables
  • data can be accessed by not altered
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Mart

A

subset of data warehouse
- summarized/highly focused part of firm’s data for a specific population
- single subject focus, for specific purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Knowledge Management

A

business processes developed for creating, storing, transferring, and applying knowledge
- increase ability to learn from environ. + put into business use
- collection of system to support management info
- knowledge is important to set apart from other companies

Knowledge Transfer (KT): distribution of org. knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ERD (Entry Relationship Diagram)

A
  • Entities: type of things with instances
    each instance is a row (an occurrence)
  • Attributes: fields about entities
    columns in a row
    PK: Primary Key) 100% unique, no sensitive, and must exist at time of entry
    FK (Foreign Key): attribute in one table, PK in another
  • Relationships: meaningful association between entities, not a process
    One-to-one: one instance only go to one instance
    One-to-many
    Many-to-many: cannot be put into databases, need an associative entity in the middle

Cardinality (0 or 1): minimum and maximum also the three pongs mean many

17
Q

Relational Database

A

database that organizes data into structured data that can relate to others on defined relationships
ex. SQL

18
Q

SQL

A

Structured Query Language, speaks to the database

19
Q

Why are systems vulnerable?

A
  • large amounts of data electronically
  • accessibility to communication networks
    Hardware Problems: (breakdowns, configurations, damage)
    Software Problems: (programming errors, installation, unprotected, unauthorized)
  • disasters
  • loss/theft
  • use of networks/computers outside of control
20
Q

Internet Vulnerabilities

A
  • global internet
  • large size
  • fixed IP are fixed targets
  • unencrypted data sent across, can be intercepted
  • transmission of sensitive information can be intercepted
21
Q

Malware (Malicious Software)

A

Viruses: software that attaches itself to programs/files, modify other programs and infects by inserting code
Worms: independent program that replicates itself to spread with computer networks
Trojan Horses: software that appears benign to cover its malicious
Spyware: install onto computers to track behviour, info and pass information, can also transmit other viruses
Keyloggers: track keystrokes, effective reconnaissance to collect info, precursor to larger attack
Remote Administration Tools (RATs): give full remote control over system
Ransomware: infect computer and locks info demanding fee to be unlocked

22
Q

Hackers

A

exploit weaknesses to gain system
“ethical hackers”
System damage and intrusion
Cyberwarfare, Cyberterrorism, Hackitvism
Cybervandalism: intentionally disrupt, destroy, deface

23
Q

DOS and DDOS

A

Denial of Service (DOS) - flood server with requests to crash server/network
Distributed Denial of Service (DDOS) - use lots of computers as DoS botnets (infected computers)

24
Q

Internal Threats

A

employees - social engineering to get employees to give up information to gave access to company
- weakest link

25
Protect Information
Identity Management Software - keeps track of users and privileges, control access (ex. Microsoft Active Directory) Authentication - verify identity, three types of info Something you know, have, are know - passwords have - tokens, fobs, phones are - fingerprint, face, eye, voice Two-factor authenication General rule: more forms + varieties is more secure Firewall: combination of hardware + software, prevents users from entering - scans and identifies traffic DMZ: (perimeter network): physical sub-network that contains outward facing internet Intrusion Detection Systems: monitor hot spots to detect and deter intruders Anti-Virus/Malware Protection: scans and monitor computers for malware and eliminates, needs regular updates Unified Threat Management (UTM) - security - firewall, vpn, monitor network traffic controls bandwidth, ensure quality of service
26
VPN
Virtual Private Network - tunnel wraps information with encryption and sends it across the public info
27
Encryption
transform data into unreadable using a code, numerical code - encryption key that codes and decodes SSL(Secure Sockets Layer) and successor TLS (Transport Layer Security) are protocols between computers HTTPS(Hypertext Transfer Protocol Secure) establishes secure communication over network, encrypted with TLS Methods of Encryption Symmetric Key Encryption: single agreed upon key Asymmetric (Public) Key Encryption: related keys, a public and private, sends messages with public key and decrypts with private key
28
System Development Life Cycle
Planning - Analysis - Design - Implementation - It is a cycle - designing new systems can require redesigning org. - consider effects of business processes and org. - most common IT change is automation look at the problem and possible solutions
29
SDLC: Planning
1. Project Initiation - - develop system request - business need and value - feasibility test - technical, economic, organizational 2. Project Management - develop work plan, staff, control and direct project deliverable = project plan Why should we build the system?
30
SDLC: Analysis
1. Develop analysis strategy - look at legacy system for new ideas 2. Gather Requirements - interviews, questionnaire, user 3. Develop system proposal = deliverable Who will use the system? What should the system do? Where and when will it be used?
31
SDLC: Design
1. Develop design strategy - in-house, consulting, off-the-shelf 2. Design architecture and interface - hardware, software, networking 3. Develop databases and file specifications - 4. Develop program design - software needed/create deliverable = system specification How will the system operate?
32
SDLC: Implementation
1. Construct system 2. Install system Conversion: process of changing from old system to new - Parallel - run old and new at the same time - Pilot - test run for a portion of the org. - Phased - slowly roll out - Plunge - just cut off and change have a training plan 3. Establish a support plan - how to handle changes? new system and maintain plan = deliverable Build the system!!!
33
Methodology
formalized approach to implementing the SDLC - steps and deliverable Well-known methodologies: - Structured development (waterfall: finish each step before moving onto next, few changes but can take a long time and need to finish design before programming) - rapid application development (phased: runs through analysis, design, and implementation until system works. quick delivery, add requirements, but not all functions implemented in) (prototyping: make a prototype, quick and can refine req's, poor first designs and issues not seen early) - agile development (scrum: make list of req's and with 1-4 week sprints where team decides how much they can complete and they do that within the time, daily standing meetings. team leader job is to solve issues)