Flashcards in MIS - Exam 3 Deck (69):
2 Key Activities of Collaboration
A group of people working together to achieve common objectives via communication and iteration.
Objectives of the Collaboration Process
•Product Objective - Succccessful Output
•Team Objective - Growth in Team Capability
•Individual Objective - Meaningful and Satisfying Experience
•Time and; Cost
5 Key Components of a Collaboration IS (HSDPP)
1. Hardware - Cloud servers
2. Software - Google Drive/MS Sharepoint
3. Data - Project Data and; Metadata
4. Procedures - Implicit or Assumed
5. People - Vary in time/place/abilities/motivation
What are the 2 Types of Communication (think team meetings)
1. Synchronous Communication - team meets at the same time.
2. Asynchronous Communication - team does not meet at the same time.
3 Ways Collaboration IS Support the Iterating Activity? (increasing the degree of content control). Think doc mgt
1. No Iteration Control -
•Email with attachments or
•Shared file server.
2. Iteration Management -
3. Iteration Control -
•Permissions - Limit Activity
How Can Collaboration IS Support Business Processes (Think Slack)
1. The Project Management Processes-
•Project Team Collaboration via MS Project
2. The Workflow Process - via MS Sharepoint
3. Supporting New Processes with Collaboration IS
•New online training processes
•Knowledge storage processes
Training time required via product power curve - the power curve of a Comprehensive collaboration toolset has a longer flat spot in the beginning.
Any web application that supports the creation and sharing of user-generated content (UGC)
Social Media Information Systems
Support the creation and sharing of user-generated content
What Are the Objectives of the Social Media Process
•Users - Belongingness and Communication.
•Businesses - Support Strategy
•App Providers - Market share and; Revenue
•Time and; Cost
5 Key Components of a Social Media IS (HSDPP)
1. Hardware -
•Cloud servers and other devices
•Free, fun, frequently change, little business input
•Content and connection data
•Informal for users
•Governed by policy for business
•Freedom for users
•Business users should follow policies
2 Ways Social Media IS Support Social Media Activities?
How Can Social Media IS Support Business Processes?
1. The Promotion Process
•Increase awareness and brand
2. The Customer Service Process
•Increase communication to/from customers
3. Supporting New Processes with Social Media IS
•Improve service, promotion, quality of feedback, participation
Investment in social relations with the expectation of returns in the marketplace
3 Objectives of the Process of Building Social Capital
1. Increase the Number of Relationships
2.Increase the Strength of Relationships
3.Connect to Those with More Assets
4 Risks of Social Media
1. Management Risks
•Overestimate ROI, labor costs, privacy, dependence on social media provider
2. Employee Communication Risks
•Social Media Policy
3. User-Generated Risks
•Junk and crackpots
4. Responding to User Content Problems
•Respond to it
Process of acquiring, analyzing, and publishing data with an objective of discovering patterns in data that will inform a business person
3 Objectives of the BI Process (API)
•Assess, Predict, Inform
•Time and cost
Assessment- To be informed by current conditions.
Prediction- To be informed about the likelihood of future events.
4 Key Attributes of BI Information Systems
2. Ease of use
3. Data warehouse dependency
4. Dependence on user knowledge and collaboration skills
The 3 Business Intelligence Activities
1. Acquiring -
•Organize and relate data
•Interactive = OLAP & Slice & Dice
•Non-Interactive = RFM,
•Market Basket Analysis (MBA)
•Supervised and Unsupervised = Data Models and hypothesis
•Visualizations, Self Service, Dashboards
What is RFM analysis
Recently, Frequency, Money (how much)
Used to analyze and rank customers according to their purchasing patterns.
The impact of a set of variables on another variable
Market Basket Analysis (MBA)
Determines sales patterns. What items do people purchase together?
2 Ways BI Information Systems Can Support Business Processes?
1. Support existing processes
2. Support new processes
3 Attributes of Big Data (3V's)
Greater than a petabyte
Generated and accessed rapidly
Load balanced data
Map Reduce Technique
Used to harness the power of thousands of servers working in parallel.
1. Map Phase - Data broken down into tasks/processes and gleaned for data of interest.
2. Reduce Phase - The culmination of results of the map phase.
SAP HANA Technique
An in-memory solid state fast database.
3 Processes (Industry Segments) Supported by Big Data BI IS
1. Continuous Auditing
2. Counter Terrorism
3. Cancer Treatment
2 Risks of Business Intelligence
1. Data Problems -
•Dirty Data - can be worse than no data at all because they bias the analysis.
•Data Silos - Data without primary/foreign key relationships.
•Wrong Granularity - The level of detail of the data can be too fine (filter out non-essential data (summing & grouping) or too course.
2. People Problems -
•Users - User resistance due to changing their job, require new knowledge they don't posses, distract from their primary work or job duties.
•Analysts - Scope creep on projects, asking wrong questions
•Leaders - Bad communication, not understanding statistics, overselling
Business Objects (BOBJ)
A popular set of SAP analysis tools.
What is Business Process Management (BPM) (Think Weird Science)
A cyclical process for systematically monitoring, modeling, creating, and implementing.
5 Activities of the SDLC (Systems Development Lifecycle) aka Waterfall (DRCIM)
1. Define the system -
•Goals and scope
•Feasibility = $, schedule, technical, organizational
2.Determine the requirements -
•Review current system
•Determine new reports/queries/forms
•Determine new features and functions
•Create data model
•Consider 5 components
3.Create Components -
•Design the database
•Design job definitions
4. Implement the system -
•Build system components
•Conduct unit testing
•Convert to new system
5.Maintain the system
4 Types of System Conversion (4 P's)
1. Pilot Installation - limited portion of the business
2.Phases Installation - Installed in phases.
3. Parallel Installation - Old + new run together
4. Plunge Installation - Old is turned off, new is turned on.
5 Attributes of Scrum
1. Prioritize requirements
2. Chose requirements to deliver
3. Stand up
4. Do work
5. Deliver and reflect
When is a Scrum Project complete?
•Runs of out time
•Runs out of money
•Accepts current level of completion
What is Information Systems Security
Process of preventing unauthorized access to an IS or modification of its data.
4 Attributes of IS Security Threat/Loss Scenario (TVST)
1. Threat -
•Natural Event or Disaster
Challenges of IS Security
1. Attackers dont have to follow the rules.
2. Data was designed to be copied and shared easily.
3. Newer technologies = less secure
4 Principles of IS (CAIA)
1. Confidentiality - Info can be obtained by only those who are authorized to access it.
2. Authenticity - Info truly comes from the source it claims to come from.
3. Integrity - Information has not been altered.
4. Availability - A service or resource is available when it is supposed to be.
3 Ways to respond to security threats
1. Security Policy
2. Risk Management
3. Defense in Layers
3 Types of Safeguards (TDH)
1. Technical safeguards -
•ID and; authorization
2. Data safeguards -
•Backup and recovery
3. Human safeguards -
•Trust but verify
•Hiring and; Screening
•Dissemination and; enforcement
4 Types of Authentication
1. Something the user is (biometric)
2.Something the user has (smart card, PIN)
3.Something the user does (speech/signature)
4.Something the user knows (password)
A process where a group of people work together all doing essentially the same type of work to accomplish the job.
Part of the group that’s achievements couldn’t be achieved by the sole individual.
2 Types of Project Data
1. Project Data - Data that is part of the collaborations work product.
2. Project Metadata - Data that is used to manage the project.
The process of applying principles and techniques for planning, organizing, and managing temporary endeavors.
The Workflow Process
A sequence of activities by which original content is created and subsequently acted upon by others within the organization.
Massive open online courses
3 Sets of Collaboration Tools -
3. Comprehensive - Office 365
A content structure that has emerged from the processing of many tags.
Content that combines data from 2 or more web services/platforms.
Extremely popular content in a short period of time and is difficult to predict.
The process of sharing data about a product or service with the objective to improve awareness and sales.
A series of activities before, during, and after a sale with a goal of increasing customer satisfaction.
Outsourcing a task to a large number of users.
Define Capital and what are the 3 Types
The investment of resources for future profit
1. Traditional Capital - investment in resources (factories, equipment)
2. Human Capital - human knowledge and skills for future profit.
3. Social Capital- investing in social relationships with the expectations of returns in the marketplace.
Social Media Policy
A statement that delineates employees rights and responsibilities and limits employee risk.
3 Responses to Social Media Posts
1. Leave it
2. Respond to it
3. Delete it
Social Media on Mobile Devices
Online Transactional Processing Systems (Operational Database)
OLAP (Slice & Dice)
Online Analytical Processing
External = data warehousing
Difference between Unsupervised and Supervised Datamining?
Unsupervised = No model/hypothesis is formed before analysis
Supervised = A model/hypothesis IS formed before running the analysis.
4 Ways a Business IS Support’s Business Processes
1. Decision making process - Google Instant Search
2. Knowledge management (KM) process - Expert System (IF/Then Rules)
3. Next Best Offer (NBO) - propose product based upon user history and preferences.
4. Online sales - Google analytics
The ratio of number of customers who eventually purchased divided by the number who visited the website.
The process of creating and maintaining an IS
When employees are manipulated into divulging data or bypassing security on behalf of others.
Pre-Texting / Spoofing
When someone deceives by pretending to be someone else.