Information Technology (17%) Flashcards
(102 cards)
Cloud Based Systems Applications
- IaaS
- PaaS
- SaaS
- Infrastructure as a service - use cloud to access virtual hardware such as computers and storage.
- Platform as a service - creating cloud-based software and programs.
- Software as a service - remote access to software. Office 365 is an example of SaaS.
An Enterprise Resource Planning (ERP) system’s main purpose is to?
Integrate data from all aspects of an organization’s activities. An ERP system is a comprehensive system that integrates all business processes.
Organizational Structure of a Segregated IT Department (ASC)
ASC functions must be strictly segregated!
- Applications Development
- Systems Administration and Programming
- Computer Operations
Functions in these three areas should be strictly segregated. (This is a bit like the “cannibals and missionaries” problem from computer science and artificial intelligence.) In particular:
- Computer operators and data entry personnel – Should never be allowed to?
- Systems programmers – Should never have?
- Data administrators – Should never have?
- Application programmers and systems analysts – Should not?
- Application programmers and systems analysts – Should not?
- Computer operators and data entry personnel – Should never be allowed to act as programmers.
- Systems programmers – Should never have access to application program documentation.
- Data administrators – Should never have access to computer operations (“live” data).
- Application programmers and systems analysts – Should not have access to computer operations (“live” data).
- Application programmers and systems analysts – Should not control access to data, programs, or computer resources.
Data Conversion occurs at this stage:
Implementation - The process of moving from the old to the new system occurs at this stage.
At this stage, we purchase hardware:
Design and Development - Technical architecture specification and a systems model occur at the design stage. During development, programmers use the design specifications to develop the program and data files.
The requirements definition document is signed at this stage:
Analysis - Systems analysts work with end users to understand and document business processes and system requirements at this stage. All parties sign off on the requirements definition to signify their agreement with the projects goals and processes at this stage.
General Controls in an IT Environment
- Personnel Policies: provides for proper SOD and use of computerized accounts that provide users with passwords, etc. to prevent unauthorized access.
-
File Security Policies: safeguard files from accidental or intentional errors or abuse.
- External/Internal file labels
- Backups of critical files
- Lockout procedures
- File Protection
-
Hardware Controls: built into computer equipment to ensure proper functioning.
- Parity Checks - verifies all bytes of data are stored as an even number of bits
- Echo Checks - data that is transmitted is then sent back to verify that it was received correctly.
The following controls are what type of controls?
- Missing Data Check
- Field Check
- Limit Test (Range and Sign)
- Valid Code Test
- Check Digit
- Reasonableness Check
- Sequence Check
- Key Verification
- Closed Loop Verification
- Batch Control Totals (See card)
- Default Values
- Automated Data Capture
Input Controls - control over data entry and data origination process
Input Controls - Batch Control Totals
- Record Count - total number of entries made (i.e. total number of employees entered into a payroll program)
- Financial Totals - sum of a column of numbers expressed in dollar form (such as total value of all of the checks)
- Non-Financial totals - meaningful sum of a column of numbers expressed in some type of unit other than dollars.
- Hash Totals - meaningless sum of a column of numbers (such as the sum of employee ID numbers)
File Types
-
Master File - updated by postings to transaction files
- Standing Data - part of Master file, consists of infrequently changing master files (fixed assets, supplier names, etc.)
- Detail File - a file listing a group of transactions that can be used to update the master file.
File Controls
- Parity Check - A zero or one included in a byte of information that makes the sum of bits either odd or even. A parity check is designed to detect errors in data transmission.
- Read after write check
- Echo check - verifies transmission between devices by echoing back.
- Error reporting and resolution
- Boundary protection - computer “traffic cop.”
- Internal labels (header and trailer)
- External labels
- Version control
- File access and updating controls
Output Controls
Ensure that computer reports are accurate and are distributed only as authorized.
- Spooling - docs sent to printer that cannot be immediately printed are stored to a disk.
- Disposal of aborted print jobs
- Disruption of reports
- End user (one-to-one checking)
- Logging and archiving of forms
- Record retention and disposal
E-Business vs. E-Commerce
E-Business is a generic name for any business process that relies on electronic dissemination of information or on automated transaction processing.
E-Commerce is a narrower term used to refer to transactions between the organization and its trading partners.
Types of E-Commerce
(remember that a requisite for EC is the trust between two parties conducting the transaction(s))
Business-to-business (B2B) - Involves electronic processing of transactions between businesses and includes electronic data interchange (EDI), supply chain management (SCM) and electronic funds transfer (EFT).
Business-to-consumer (B2C) - Involves selling goods and services directly to consumers, almost always using the Internet and web-based technology. B2C e-commerce relies heavily on intermediaries or brokers to facilitate the sales transaction.
Business-to-employee (B2E) - Involves the use of web-based technology to share information with, and interact, with an organization’s employees, e.g., through portals and intranets.
Business-to-government (B2G) - Involves the growing use of web-based technologies to provide, and support, governmental units, e.g., providing property tax data online, paying parking tickets online, online contract bidding.
E-Commerce Risks
Using EC Risks
- System Availibility / Security / Confidentiality
- Authentication
- Nonrepudiation
- Integrity
Not Using EC Risks
- Customers find online prices are cheaper
- Limited Growth
- Limited markets exposure
E-Commerce Applications
- Customer Relationship Management (CRM) - used to manage relationships with clients, store information about existing and potential customers, etc.
- Electronic Data Interchange (EDI) - computer to computer exchange of business data (purchase orders, confirmations, invoices, etc.). EDI reduces handling costs and speeds transaction processing vs. traditional paper processing.
- Electronic Funds Transfer (EFT)
- Supply Chain Management (SCM) - Supply chain management incorporates all activities from the purchase and storage of raw materials, through the production process into finished goods through to the point-of-consumption.
- Computer Networks - essencial to e-business, e-commerce and social computing.
Electronic Data Interchange (EDI)
- EDI requires that all transactions be submitted in a specified format.
- Translation software is required to convert data between transactions and EDI formats.
- The most common specification in the United States is the American National Standards Institute format ANSI X.12; internationally, the United Nations EDI for Administration, Commerce and Transport (UN/EDIFACT) format is the dominant standard.
- EDI can be implemented using direct links between the trading partners, through communication intermediaries (called “service bureaus”), through value-added networks (VANs), or over the Internet.
- The well-established audit trails, controls, and security provided for EDI transactions by VAN are the principal reasons for their continued popularity.
EDI Costs
- Costs of Change - Costs associated with locating new business partners who support EDI processing; legal costs associated with modifying and negotiating trading contracts with new and existing business partners and with the communications provider; costs of changing internal policies and procedures to support the new processing model (process reengineering) and employee training.
- Hardware costs
- Costs of translation software
- Costs of data transmission
- Costs of security, audit and control procedures
What below is not an EFT?
- Direct deposit of payroll payments into the employee’s bank account
- Cash Cards
- Automated teller machine (ATM) transactions
- Credit card payment initiated from Point-of-Sale (POS) terminal
Cash Cards
Cash cards do not involve bank clearing processes and are not considered to be EFT transactions.
System Types by Activity
-
Operational Systems - supports day-to-day activities of business operations
- Transaction processing systems (TPS)
- Process financial and non-financial transactions
- Generate debit and credit entries
- Management Information Systems (MIS) - see card
- Decision Support Systems (DSS) - see card
- Knowledge Work Systems
- ERP Systems - entire lesson on this one
MIS (Internal Data)
Management Information Systems - systems designed to support routine management problems based primarily on data from transaction processing systems.
- MISs take planning information (budgets, forecasts, etc.) data and compare it to actual results in periodic management reports (summary reports, variance reports, and exception reports).
- Accounting information systems (AISs) – AISs take the financial data from transaction processing systems and use it to produce financial statements and control reports for management (e.g., accounts receivable aging analysis, product cost reports, etc.); AISs are a subset of MISs.
DSS (External Data)
Decision Support Systems
- Unlike MISs, DSSs frequently include external data in addition to summarized information from the TPS and include significant analytical and statistical capabilities.
- Data driven DSSs such as Data Warehousing and Data Mining systems are common examples of data-driven DSSs.
- Model-driven DSS - used to predict outcomes for management.
- Executive support systems (ESSs) or strategic support systems (SSSs) - especially designed for forecasting and LRP’s.
DSS vs. ESS
Executive Support Systems are:
- are a subset of DSS that are especially designed for forecasting and making long-range, strategic decisions, and they place greater emphasis on external data.
