MIS - Exam 3 Flashcards

(69 cards)

1
Q

2 Key Activities of Collaboration

A
  1. Communication

2. Iteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Collaboration

A

A group of people working together to achieve common objectives via communication and iteration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Objectives of the Collaboration Process

A

Effectiveness:
•Product Objective - Succccessful Output
•Team Objective - Growth in Team Capability
•Individual Objective - Meaningful and Satisfying Experience

Efficiency:
•Time and; Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

5 Key Components of a Collaboration IS (HSDPP)

A
  1. Hardware - Cloud servers
  2. Software - Google Drive/MS Sharepoint
  3. Data - Project Data and; Metadata
  4. Procedures - Implicit or Assumed
  5. People - Vary in time/place/abilities/motivation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 2 Types of Communication (think team meetings)

A
  1. Synchronous Communication - team meets at the same time.
  2. Asynchronous Communication - team does not meet at the same time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 Ways Collaboration IS Support the Iterating Activity? (increasing the degree of content control). Think doc mgt

A
  1. No Iteration Control -
    •Email with attachments or
    •Shared file server.
  2. Iteration Management -
    •Google Drive
    •Microsoft SkyDrive.
  3. Iteration Control -
    •Permissions - Limit Activity
    •Document Checkout
    •Version History
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How Can Collaboration IS Support Business Processes (Think Slack)

A
  1. The Project Management Processes-
    •Project Team Collaboration via MS Project
  2. The Workflow Process - via MS Sharepoint
    •Sequential
    •Parallel
  3. Supporting New Processes with Collaboration IS
    •New online training processes
    •Knowledge storage processes
    •Find-an-expert processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Power Curve

A

Training time required via product power curve - the power curve of a Comprehensive collaboration toolset has a longer flat spot in the beginning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social Media

A

Any web application that supports the creation and sharing of user-generated content (UGC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Social Media Information Systems

A

Support the creation and sharing of user-generated content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Are the Objectives of the Social Media Process

A

Effectiveness:
•Users - Belongingness and Communication.
•Businesses - Support Strategy
•App Providers - Market share and; Revenue

Efficiency:
•Time and; Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

5 Key Components of a Social Media IS (HSDPP)

A
1. Hardware - 
    •Cloud servers and other devices
2. Software
    •Free, fun, frequently change, little business input
3. Data
    •Content and connection data
4. Procedures
    •Informal for users
    •Governed by policy for business
5. People
    •Freedom for users
    •Business users should follow policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

2 Ways Social Media IS Support Social Media Activities?

A
1. Creating
    •Rewards/incentives
    •Mashups/Viral content
    •Convenience
2. Sharing
    •Search
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How Can Social Media IS Support Business Processes?

A
  1. The Promotion Process
    •Increase awareness and brand
  2. The Customer Service Process
    •Increase communication to/from customers
  3. Supporting New Processes with Social Media IS
    •Improve service, promotion, quality of feedback, participation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social Capital

A

Investment in social relations with the expectation of returns in the marketplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3 Objectives of the Process of Building Social Capital

A
  1. Increase the Number of Relationships
  2. Increase the Strength of Relationships
  3. Connect to Those with More Assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

4 Risks of Social Media

A
1.  Management Risks
    •Overestimate ROI, labor costs, privacy, dependence on social media provider
2. Employee Communication Risks
    •Social Media Policy
3. User-Generated Risks
    •Junk and crackpots
    •Unfavorable reviews
    •Mutinous movements
4. Responding to User Content Problems
    •Leave it
    •Respond to it
    •Delete it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Business Intelligence

A

Process of acquiring, analyzing, and publishing data with an objective of discovering patterns in data that will inform a business person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

3 Objectives of the BI Process (API)

A

Effectiveness -
•Assess, Predict, Inform

Efficiency -
•Time and cost

Assessment- To be informed by current conditions.

Prediction- To be informed about the likelihood of future events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

4 Key Attributes of BI Information Systems

A
  1. Scalable
  2. Ease of use
  3. Data warehouse dependency
  4. Dependence on user knowledge and collaboration skills
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The 3 Business Intelligence Activities

A
1. Acquiring -
    •Obtain data
    •Cleanse data
    •Organize and relate data
    •Catalog data
2.Analyzing -
    •Reporting -
          •Interactive = OLAP & Slice & Dice
          •Non-Interactive = RFM, 
    •Datamining -
          •Regression
          •Market Basket Analysis (MBA)
          •Supervised and Unsupervised = Data Models and hypothesis
3.Publishing -
    •Visualizations, Self Service, Dashboards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is RFM analysis

A

Recently, Frequency, Money (how much)

Used to analyze and rank customers according to their purchasing patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Regression

A

The impact of a set of variables on another variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Market Basket Analysis (MBA)

A

Determines sales patterns. What items do people purchase together?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
2 Ways BI Information Systems Can Support Business Processes?
1. Support existing processes | 2. Support new processes
26
3 Attributes of Big Data (3V's)
1. Volume 2. Velocity 3. Variety Greater than a petabyte Generated and accessed rapidly Load balanced data
27
Map Reduce Technique
Used to harness the power of thousands of servers working in parallel. 1. Map Phase - Data broken down into tasks/processes and gleaned for data of interest. 2. Reduce Phase - The culmination of results of the map phase.
28
SAP HANA Technique
An in-memory solid state fast database.
29
3 Processes (Industry Segments) Supported by Big Data BI IS
1. Continuous Auditing 2. Counter Terrorism 3. Cancer Treatment
30
2 Risks of Business Intelligence
1. Data Problems - •Dirty Data - can be worse than no data at all because they bias the analysis. •Data Silos - Data without primary/foreign key relationships. •Wrong Granularity - The level of detail of the data can be too fine (filter out non-essential data (summing & grouping) or too course. 2. People Problems - •Users - User resistance due to changing their job, require new knowledge they don't posses, distract from their primary work or job duties. •Analysts - Scope creep on projects, asking wrong questions •Leaders - Bad communication, not understanding statistics, overselling
31
Business Objects (BOBJ)
A popular set of SAP analysis tools.
32
What is Business Process Management (BPM) (Think Weird Science)
A cyclical process for systematically monitoring, modeling, creating, and implementing.
33
5 Activities of the SDLC (Systems Development Lifecycle) aka Waterfall (DRCIM)
``` 1. Define the system - •Goals and scope •Feasibility = $, schedule, technical, organizational •Project Team •Project Plan 2.Determine the requirements - •Interview •Review current system •Determine new reports/queries/forms •Determine new features and functions •Security •Create data model •Consider 5 components 3.Create Components - •Hardware specs •Program specs •Design the database •Design procedures •Design job definitions 4. Implement the system - •Build system components •Conduct unit testing •Integrate components •Convert to new system 5.Maintain the system •Change Requests •Prioritize Requests •Fix failures ```
34
4 Types of System Conversion (4 P's)
1. Pilot Installation - limited portion of the business 2. Phases Installation - Installed in phases. 3. Parallel Installation - Old + new run together 4. Plunge Installation - Old is turned off, new is turned on.
35
5 Attributes of Scrum
1. Prioritize requirements 2. Chose requirements to deliver 3. Stand up 4. Do work 5. Deliver and reflect
36
When is a Scrum Project complete?
* Runs of out time * Runs out of money * Accepts current level of completion
37
What is Information Systems Security
Process of preventing unauthorized access to an IS or modification of its data.
38
4 Attributes of IS Security Threat/Loss Scenario (TVST)
``` 1. Threat - •Human Error •Computer Crime •Natural Event or Disaster 2. Vulnerability 3. Safeguards 4. Target ```
39
Challenges of IS Security
1. Attackers dont have to follow the rules. 2. Data was designed to be copied and shared easily. 3. Newer technologies = less secure
40
4 Principles of IS (CAIA)
1. Confidentiality - Info can be obtained by only those who are authorized to access it. 2. Authenticity - Info truly comes from the source it claims to come from. 3. Integrity - Information has not been altered. 4. Availability - A service or resource is available when it is supposed to be.
41
3 Ways to respond to security threats
1. Security Policy 2. Risk Management 3. Defense in Layers
42
3 Types of Safeguards (TDH)
``` 1. Technical safeguards - •ID and; authorization •Encryption •Firewalls •Malware protection 2. Data safeguards - •Policys •Passwords •Encryption •Backup and recovery •Physical security 3. Human safeguards - •Trust but verify •Position definitions •Hiring and; Screening •Dissemination and; enforcement •Termination ```
43
4 Types of Authentication
1. Something the user is (biometric) 2. Something the user has (smart card, PIN) 3. Something the user does (speech/signature) 4. Something the user knows (password)
44
Cooperation
A process where a group of people work together all doing essentially the same type of work to accomplish the job.
45
Camaraderie
Part of the group that’s achievements couldn’t be achieved by the sole individual.
46
2 Types of Project Data
1. Project Data - Data that is part of the collaborations work product. 2. Project Metadata - Data that is used to manage the project.
47
Project Mgt
The process of applying principles and techniques for planning, organizing, and managing temporary endeavors.
48
The Workflow Process
A sequence of activities by which original content is created and subsequently acted upon by others within the organization.
49
MOOC
Massive open online courses
50
3 Sets of Collaboration Tools -
1. Minimal 2. Good 3. Comprehensive - Office 365
51
Folksonomy
A content structure that has emerged from the processing of many tags.
52
Mashup Content
Content that combines data from 2 or more web services/platforms.
53
Viral
Extremely popular content in a short period of time and is difficult to predict.
54
Promotion
The process of sharing data about a product or service with the objective to improve awareness and sales.
55
Customer Service
A series of activities before, during, and after a sale with a goal of increasing customer satisfaction.
56
Crowdsourcing
Outsourcing a task to a large number of users.
57
Define Capital and what are the 3 Types
The investment of resources for future profit 1. Traditional Capital - investment in resources (factories, equipment) 2. Human Capital - human knowledge and skills for future profit. 3. Social Capital- investing in social relationships with the expectations of returns in the marketplace.
58
Social Media Policy
A statement that delineates employees rights and responsibilities and limits employee risk.
59
3 Responses to Social Media Posts
1. Leave it 2. Respond to it 3. Delete it
60
SOMO
Social Media on Mobile Devices
61
OLTP
Online Transactional Processing Systems (Operational Database)
62
OLAP (Slice & Dice)
Online Analytical Processing External = data warehousing
63
Difference between Unsupervised and Supervised Datamining?
Unsupervised = No model/hypothesis is formed before analysis Supervised = A model/hypothesis IS formed before running the analysis.
64
4 Ways a Business IS Support’s Business Processes
1. Decision making process - Google Instant Search 2. Knowledge management (KM) process - Expert System (IF/Then Rules) 3. Next Best Offer (NBO) - propose product based upon user history and preferences. 4. Online sales - Google analytics
65
Conversion Rate
The ratio of number of customers who eventually purchased divided by the number who visited the website.
66
System Development
The process of creating and maintaining an IS
67
Social Engineering
When employees are manipulated into divulging data or bypassing security on behalf of others.
68
Pre-Texting / Spoofing
When someone deceives by pretending to be someone else.
69
Advanced Persistent Threat (APT)
A sophisticated and potentially long-running computer hack that is perpetuated by a large, well funded organization such a foreign government.