MIS - Exam 3 Flashcards Preview

Chads Decks > MIS - Exam 3 > Flashcards

Flashcards in MIS - Exam 3 Deck (69):
1

2 Key Activities of Collaboration


1. Communication
2. Iteration

2

Collaboration

A group of people working together to achieve common objectives via communication and iteration.

3

Objectives of the Collaboration Process

Effectiveness:
•Product Objective - Succccessful Output
•Team Objective - Growth in Team Capability
•Individual Objective - Meaningful and Satisfying Experience

Efficiency:
•Time and; Cost

4

5 Key Components of a Collaboration IS (HSDPP)

1. Hardware - Cloud servers
2. Software - Google Drive/MS Sharepoint
3. Data - Project Data and; Metadata
4. Procedures - Implicit or Assumed
5. People - Vary in time/place/abilities/motivation

5

What are the 2 Types of Communication (think team meetings)

1. Synchronous Communication - team meets at the same time.
2. Asynchronous Communication - team does not meet at the same time.

6

3 Ways Collaboration IS Support the Iterating Activity? (increasing the degree of content control). Think doc mgt

1. No Iteration Control -
•Email with attachments or
•Shared file server.

2. Iteration Management -
•Google Drive
•Microsoft SkyDrive.

3. Iteration Control -
•Permissions - Limit Activity
•Document Checkout
•Version History

7

How Can Collaboration IS Support Business Processes (Think Slack)

1. The Project Management Processes-
•Project Team Collaboration via MS Project
2. The Workflow Process - via MS Sharepoint
•Sequential
•Parallel
3. Supporting New Processes with Collaboration IS
•New online training processes
•Knowledge storage processes
•Find-an-expert processes

8

Power Curve

Training time required via product power curve - the power curve of a Comprehensive collaboration toolset has a longer flat spot in the beginning.

9

Social Media

Any web application that supports the creation and sharing of user-generated content (UGC)

10

Social Media Information Systems

Support the creation and sharing of user-generated content

11

What Are the Objectives of the Social Media Process

Effectiveness:
•Users - Belongingness and Communication.
•Businesses - Support Strategy
•App Providers - Market share and; Revenue

Efficiency:
•Time and; Cost

12

5 Key Components of a Social Media IS (HSDPP)

1. Hardware -
•Cloud servers and other devices
2. Software
•Free, fun, frequently change, little business input
3. Data
•Content and connection data
4. Procedures
•Informal for users
•Governed by policy for business
5. People
•Freedom for users
•Business users should follow policies

13

2 Ways Social Media IS Support Social Media Activities?

1. Creating
•Rewards/incentives
•Mashups/Viral content
•Convenience
2. Sharing
•Search

14

How Can Social Media IS Support Business Processes?

1. The Promotion Process
•Increase awareness and brand
2. The Customer Service Process
•Increase communication to/from customers
3. Supporting New Processes with Social Media IS
•Improve service, promotion, quality of feedback, participation

15

Social Capital

Investment in social relations with the expectation of returns in the marketplace

16

3 Objectives of the Process of Building Social Capital

1. Increase the Number of Relationships
2.Increase the Strength of Relationships
3.Connect to Those with More Assets

17

4 Risks of Social Media

1. Management Risks
•Overestimate ROI, labor costs, privacy, dependence on social media provider
2. Employee Communication Risks
•Social Media Policy
3. User-Generated Risks
•Junk and crackpots
•Unfavorable reviews
•Mutinous movements
4. Responding to User Content Problems
•Leave it
•Respond to it
•Delete it

18

Business Intelligence

Process of acquiring, analyzing, and publishing data with an objective of discovering patterns in data that will inform a business person

19

3 Objectives of the BI Process (API)

Effectiveness -
•Assess, Predict, Inform

Efficiency -
•Time and cost

Assessment- To be informed by current conditions.

Prediction- To be informed about the likelihood of future events.

20

4 Key Attributes of BI Information Systems

1. Scalable
2. Ease of use
3. Data warehouse dependency
4. Dependence on user knowledge and collaboration skills

21

The 3 Business Intelligence Activities

1. Acquiring -
•Obtain data
•Cleanse data
•Organize and relate data
•Catalog data
2.Analyzing -
•Reporting -
•Interactive = OLAP & Slice & Dice
•Non-Interactive = RFM,
•Datamining -
•Regression
•Market Basket Analysis (MBA)
•Supervised and Unsupervised = Data Models and hypothesis
3.Publishing -
•Visualizations, Self Service, Dashboards

22

What is RFM analysis

Recently, Frequency, Money (how much)

Used to analyze and rank customers according to their purchasing patterns.

23

Regression

The impact of a set of variables on another variable

24

Market Basket Analysis (MBA)

Determines sales patterns. What items do people purchase together?

25

2 Ways BI Information Systems Can Support Business Processes?

1. Support existing processes
2. Support new processes

26

3 Attributes of Big Data (3V's)

1. Volume
2. Velocity
3. Variety

Greater than a petabyte
Generated and accessed rapidly
Load balanced data

27

Map Reduce Technique

Used to harness the power of thousands of servers working in parallel.

1. Map Phase - Data broken down into tasks/processes and gleaned for data of interest.

2. Reduce Phase - The culmination of results of the map phase.

28

SAP HANA Technique

An in-memory solid state fast database.

29

3 Processes (Industry Segments) Supported by Big Data BI IS

1. Continuous Auditing
2. Counter Terrorism
3. Cancer Treatment

30

2 Risks of Business Intelligence

1. Data Problems -
•Dirty Data - can be worse than no data at all because they bias the analysis.
•Data Silos - Data without primary/foreign key relationships.
•Wrong Granularity - The level of detail of the data can be too fine (filter out non-essential data (summing & grouping) or too course.

2. People Problems -
•Users - User resistance due to changing their job, require new knowledge they don't posses, distract from their primary work or job duties.
•Analysts - Scope creep on projects, asking wrong questions
•Leaders - Bad communication, not understanding statistics, overselling

31

Business Objects (BOBJ)

A popular set of SAP analysis tools.

32

What is Business Process Management (BPM) (Think Weird Science)

A cyclical process for systematically monitoring, modeling, creating, and implementing.

33

5 Activities of the SDLC (Systems Development Lifecycle) aka Waterfall (DRCIM)

1. Define the system -
•Goals and scope
•Feasibility = $, schedule, technical, organizational
•Project Team
•Project Plan
2.Determine the requirements -
•Interview
•Review current system
•Determine new reports/queries/forms
•Determine new features and functions
•Security
•Create data model
•Consider 5 components
3.Create Components -
•Hardware specs
•Program specs
•Design the database
•Design procedures
•Design job definitions
4. Implement the system -
•Build system components
•Conduct unit testing
•Integrate components
•Convert to new system
5.Maintain the system
•Change Requests
•Prioritize Requests
•Fix failures

34

4 Types of System Conversion (4 P's)

1. Pilot Installation - limited portion of the business
2.Phases Installation - Installed in phases.
3. Parallel Installation - Old + new run together
4. Plunge Installation - Old is turned off, new is turned on.

35

5 Attributes of Scrum

1. Prioritize requirements
2. Chose requirements to deliver
3. Stand up
4. Do work
5. Deliver and reflect

36

When is a Scrum Project complete?

•Runs of out time
•Runs out of money
•Accepts current level of completion

37

What is Information Systems Security

Process of preventing unauthorized access to an IS or modification of its data.

38

4 Attributes of IS Security Threat/Loss Scenario (TVST)

1. Threat -
•Human Error
•Computer Crime
•Natural Event or Disaster
2. Vulnerability
3. Safeguards
4. Target

39

Challenges of IS Security

1. Attackers dont have to follow the rules.
2. Data was designed to be copied and shared easily.
3. Newer technologies = less secure

40

4 Principles of IS (CAIA)

1. Confidentiality - Info can be obtained by only those who are authorized to access it.
2. Authenticity - Info truly comes from the source it claims to come from.
3. Integrity - Information has not been altered.
4. Availability - A service or resource is available when it is supposed to be.

41

3 Ways to respond to security threats

1. Security Policy
2. Risk Management
3. Defense in Layers

42

3 Types of Safeguards (TDH)

1. Technical safeguards -
•ID and; authorization
•Encryption
•Firewalls
•Malware protection
2. Data safeguards -
•Policys
•Passwords
•Encryption
•Backup and recovery
•Physical security
3. Human safeguards -
•Trust but verify
•Position definitions
•Hiring and; Screening
•Dissemination and; enforcement
•Termination

43

4 Types of Authentication

1. Something the user is (biometric)
2.Something the user has (smart card, PIN)
3.Something the user does (speech/signature)
4.Something the user knows (password)

44

Cooperation

A process where a group of people work together all doing essentially the same type of work to accomplish the job.

45

Camaraderie

Part of the group that’s achievements couldn’t be achieved by the sole individual.

46

2 Types of Project Data

1. Project Data - Data that is part of the collaborations work product.

2. Project Metadata - Data that is used to manage the project.

47

Project Mgt

The process of applying principles and techniques for planning, organizing, and managing temporary endeavors.

48

The Workflow Process

A sequence of activities by which original content is created and subsequently acted upon by others within the organization.

49

MOOC

Massive open online courses

50

3 Sets of Collaboration Tools -

1. Minimal
2. Good
3. Comprehensive - Office 365

51

Folksonomy

A content structure that has emerged from the processing of many tags.

52

Mashup Content

Content that combines data from 2 or more web services/platforms.

53

Viral

Extremely popular content in a short period of time and is difficult to predict.

54

Promotion

The process of sharing data about a product or service with the objective to improve awareness and sales.

55

Customer Service

A series of activities before, during, and after a sale with a goal of increasing customer satisfaction.

56

Crowdsourcing

Outsourcing a task to a large number of users.

57

Define Capital and what are the 3 Types

The investment of resources for future profit

1. Traditional Capital - investment in resources (factories, equipment)

2. Human Capital - human knowledge and skills for future profit.

3. Social Capital- investing in social relationships with the expectations of returns in the marketplace.

58

Social Media Policy

A statement that delineates employees rights and responsibilities and limits employee risk.

59

3 Responses to Social Media Posts

1. Leave it
2. Respond to it
3. Delete it

60

SOMO

Social Media on Mobile Devices

61

OLTP

Online Transactional Processing Systems (Operational Database)

62

OLAP (Slice & Dice)


Online Analytical Processing

External = data warehousing

63

Difference between Unsupervised and Supervised Datamining?

Unsupervised = No model/hypothesis is formed before analysis

Supervised = A model/hypothesis IS formed before running the analysis.

64

4 Ways a Business IS Support’s Business Processes

1. Decision making process - Google Instant Search
2. Knowledge management (KM) process - Expert System (IF/Then Rules)
3. Next Best Offer (NBO) - propose product based upon user history and preferences.
4. Online sales - Google analytics

65

Conversion Rate

The ratio of number of customers who eventually purchased divided by the number who visited the website.

66

System Development

The process of creating and maintaining an IS

67

Social Engineering

When employees are manipulated into divulging data or bypassing security on behalf of others.

68

Pre-Texting / Spoofing

When someone deceives by pretending to be someone else.

69

Advanced Persistent Threat (APT)

A sophisticated and potentially long-running computer hack that is perpetuated by a large, well funded organization such a foreign government.