Terminology and Most Important Things Flashcards

(117 cards)

1
Q

Six major objectives of IS

A
  • operational excellence
  • new products, services, and business models
  • customer/supplier intimacy
  • improved decision making
  • competitive advantage
  • (day-to-day) survival
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems

A

technical perspective, an IS collects, stores, and distributes information from an organization’s environment to support organisational functions, decision making, communication, coordination, control, analysis, and visualisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

technical approach to IS

A

computer science, management science, operations research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

behavioral approach to IS

A

psychology, sociology, economics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

sociotechnical view of systems

A

considers both technical and social features of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is new in managing IS?

A
  • IT innovations (IoT, cloud computing, big data, etc.)
  • New Business Models (e.g. Netflix)
  • E-commerce expansion
  • Management changes (going mobile, remote, etc.)
  • Changes in firms (less hierarchy, flattened)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Generative AI

A

a type of AI that can create new content and ideas, including conversations, stories, images, videos, and music
- information output can be incorrect even though it sounds correct called: hallucinating
- danger of Deepfakes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Globalization

A
  • jobs move across borders
  • IS expanding rapidly
  • customers shop worldwide
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital Firm

A
  • nearly all important business operations and relationship are accomplished digitally or through digital networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Six major objectives of IS

A
  • operational excellency
  • new products, services, business models
  • customer/supplier intimacy
  • improved decision making
  • competitive advantage
  • (day to day) survival
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Functions of an IS

A
  • input (collects raw data)
  • processing (make raw data into usable information)
  • output (distribute meaningful information)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three management levels of an organisation?

A
  • Senior management (makes executive decisions, makes long-term strategic decisions)
  • Middle management (execute tasks and goals -> reduced through IS)
  • Operational management (execution of day-to-day operations such as f.e. payroll)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business process

A
  • logically related set of activities
  • IS automate parts of business processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Transaction processing system (TPS)

A
  • serves operational management
  • track the flow of daily tasks/routines
  • payroll etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Management Information Systems (MIS)

A
  • serves middle management
  • produces reports based on TPS
  • have little analytical value
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Decision-support system (DSS)

A
  • support management decision making
  • use internal information from TPS & MIS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Executive support system (ESS)

A
  • serves senior management
  • shows data, information via digital dashboard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Enterprise applications

A
  • coordinate multiple functions and business processes
  • integrate key business processes into a single software
  • SCM, CRM, KMS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Supply chain management (SCM)

A
  • helps firms manage relationship w suppliers to optimise, sourcing, manufacturing, and delivery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Customer relationship management (CRM)

A
  • coordinate business processes to surrounding firm’s customers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Knowledge management system

A
  • enables firms to optimise the creation, sharing, and distribution of knowledge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Collaboration

A

working with others to achieve shared and explicit goals
- often receive better result than when done alone (wisdom of crowds)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Social business

A

is the use of internal and external social networking platforms to further engage employees, customers, and suppliers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Business Intelligence (BI)

A

term for for data and software tools for organising, analysing, and providing access to data to help decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Time/Space collaboration and social tool matrix
- same time/same place: face-to-face interactions - same time/different place: remote interactions (video calls) - different time/same place: continuous task (project management) - different time/different place: communication & coordination (e-mails)
26
IS and organisations influence each other through
- environment - culture - structure - business processes - politics - management decisions
27
Technical microeconomic view of the organization
- social structure that processes resources from the environment to produce outputs - how inputs are combined to create outputs
28
Behavioral view of the organization
- emphasizes people, relationships, values, culture - basically the environment
29
Disruptive technologies
sweeps away the systems or habits it replaces because it has attributes that are recognizably superior - streaming over purchasing f.e.
30
Flattening Organizations
- IS can reduce the number of levels (management levels) - providing managers with information to supervise larger number of employees - giving lower-level employees more decision-making authority
31
Resistance to change/organizational resistance
- if implementation of IS fails, it is often not the technology but the resistance to change organisationally or politically
32
Porter's Competitive Five Forces Model
strategic position of the firm is not only determined by it's immediate - competitors but also - Substitute products - new-market entrants - suppliers - customers
33
Strategies for dealing with the five forces (Porter)
1. Low Cost leadership (lower price than competitor: LIDL) 2. Product Differentiation (Tesla; innovative, electric cars) 3. Focus on niche market (making food products vegan) 4. Strengthen customer-supplier intimacy
34
Value chain model
Primary and support activities of a firm along the value chain - suppliers' suppliers - suppliers - firm - distributors - customers
35
Ethics
principles of right and wrong - core values integrated into corporate culture at best - IS raise new ethical questions
36
Five moral dimensions
- information rights and obligations - property rights and obligations - system quality - quality of life - accountability and control
37
Technology trends that raise ethical issues
- computing power doubles every 18 months (Moore's Law) - data storage costs rapidly decline; more data available on you (Law of Mass Digital Storage) - mobile device tracking
38
Advances in data analysis techniques
- profiling: combine data from multiple sources to create detailed information - NORA (non-obvious relationship awareness): combining data from different sources to find obscure, non-obvious relationships (applicant shares same phone number as known criminal)
39
Basic concepts of ethical IS
1. Responsibility (accept costs, duties, obligations) 2. Accountability (who is responsible) 3. Liability (cover damages done) 4. Due process (law applied correctly)
40
5 step ethical analysis
a. identify and clearly describe the facts (who is involved, what do they do) b. define the conflict or dilemma and identify the higher order values c. identify the stakeholders d. identify the options that you can reasonably take e. identify the potential consequences of your options
41
Golden rule
do unto others as you would have them do unto you
42
Immanuel Kant's categorical imperative
if an action is not good for everyone, it is not good for anyone
43
Slippery slope rule
if an action cannot be done repeatedly it should be done at all
44
Utilitarian principle
always strive for the action that generates the highest value outcome
45
Risk aversion principle
take the action that produces the least harm
46
Ethical "no free lunch" rule
assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise
47
IT infrastructure
- includes hardware, software, and services - shared technology resources
48
Five stages of IT infrastructure evolution
- mainframe/mini computing era (1959) - personal computer era (1981) - client/server era (1983) - enterprise computing era (1991) - cloud and mobile computing era (2000)
49
Moore's Law
- increase in processing power and decline of cost - every 18 months the power of microprocessors doubles and the price of computing falls in half - still applicable but not really accurate
50
Law of Mass Digital Storage
- exponential decrease in the cost of storing data
51
Metcalfe's Law
a network's value to participants grows exponentially as the network takes on more members
52
IT Infrastructure ecosystem/components
- Data Management and Storage - Internet Platforms - Computer Hardware Platforms - Operating System Platforms - Enterprise Software Applications - Networking/Telecommunications - Consultants and Sytem Integrators
53
Current trends in computer hardware platforms
- mobile digital platform - customization and BYOD (IT devices/trends emerge within consumer first and the firm has to adapt, as the employee uses their own device) - quantum computing (uses quantum mechanics) - cloud computing - edge computing
54
Total cost of ownership (TCO)
- total cost of a product during its lifecycle
55
Traditional file management
- makes it difficult for organizations to keep track of all pieces of data as different areas and groups were allowed to develop their own file independently
56
Traditional file management creates problems such as
- data redundancy - data inconsistency - program dependence - poor flexibility - poor security - lack of data sharing and availability
57
DBMS (database management system)
- permits centralisation of data - combats problems of traditional file management
58
Data hierarchy
Bit - Byte - Field - Record - File - Database
59
Relational DBMS
type of logical database that organises data in form of 2-dimensional tables
60
SQL (Structured Query Language)
SQL is used to add, change, and retrieve data in the database
61
Non-relational DBMS
(no SQL) - use a more flexible data model and are designed for managing large data sets across many distributed machines and for easily scaling up and down
62
Data warehouses (BI Infrastructure)
- database that stores current & historical data of potential interest
63
Data Marts (BI Infrastructure)
- subset of Data Warehouses, decentralised warehouses with highly focused portion of the data for specific populations of users
64
Hadoop (BI Infrastructure)
used for big data and big quantities - in-memory computing, used for Big Data Analysis
65
Analytic Platforms (BI Infrastructure)
high speed, good for large data sets
66
Analytical Tools for BI
- Online Application Processing (OLAP) - Data Mining (discover in data) - Text Mining (analyse texts/trusted computing) - Web mining (analyse WWW)
67
Network
two or more connected computers
68
Client/server computing
model for computing that splits processing between clients and servers on a network, assigning functions to the machine most able to perform the function
69
Packet switching
data are grouped into small packets, which are transmitted along different communication channels and reassembled at their final destination - used to optimise the channel capacity
70
TCP (Transmission Control Protocol)/IP (internet protocol) reference model
1. Application layer 2. Transport layer 3. Internet layer 4. Network Interface layer
71
Types of Networks
- LAN (local area network: up to 500m) - CAN (campus area network: up to 1,000 meters) - MAN (Metropolitan area network: city or metropolitan area) - WAN (wide area network: regional, transcontinental, or global area)
72
What is often used for high-capacity Internet connections
- DSL (digital subscriber line) - cable internet connections - T1 lines (twisted copper)
73
DNS (domain name system)
converts domain names into IP addresses
74
VPN (virtual private networks)
secure, encrypted, private network within the Internet
75
Hypertext
- webpages are based on HTML (hypertext markup language), which formats documents and incorporates dynamic links
76
Types of Search
- Mobile search (from smartphone) - Semantic search (understanding the meaning behind words) - Social search (related to social media) - Visual search (for visual media)
77
Radio Frequency Identification (RFID)
- using low-powered radio transmitters to read data stored in a tag
78
Digital data are vulnerable to
- destruction - misuse - error - fraud - hardware & software failure
79
Denial-of-Service Attacks (DoS)
- attacks that make systems inaccessible or render them out of operation - bombarding a server with so many requests that the system can no longer function as intended
80
Types of Malware (malicious software)
- computer virus (software program that attaches itself to other programs or data files to be executed) - worms (independent programs that copy themselves from one computer to another) - trojan horse (seemingly benign software programs that do unexpected things) - spyware (small programs that install themselves to monitor activity) - ransomware (tries to exert money from user by taking control of computer) - keyloggers (record every keystroke made on computer to steal personal data) - drive-by-downloads: malware that comes with a dowloaded file
81
Types of Computer crime
- spoofing (hacker hides identity) - sniffing (eavesdropping program) - identity theft - phishing (setting up fake website or e-mail that looks real to obtain personal information) - evil twins (wireless networks that pretend to offer wi-fi by seeming like the real one) - pharming (redirects user to a bogus page) - click fraud (individual or computer program that click on pay-per-click ad or boosts page ranking
82
Internal threats
- employees (doing security protocols sloppily)
83
Information system audit
examines the firm's overall security environment and control governing individual information systems
84
Tools to safeguard IS
- identity management (IdM): tools for identifying the valid user of the system (password, token, authentication, etc.) - firewalls: prevent unauthorised users from accessing private networks - intrusion detection systems (alarm) - anti-malware software
85
Encryption
is the process of transforming plain text/data into cipher text that can only be read by sender receiver - SSL (secure sockets layer) enable client and server computers to manage encryption and decryption
86
Public key encryption
- a method of encrypting or signing data with two different keys and making one of the keys - Data encrypted with the public key can only be decrypted with the private key
87
Digital certificates
- help establish the identity of people or electronic assets - protect online transactions
88
Enterprise software
integrated enterprise-wide information systems that coordinate key internal processes of the firm
89
SCM (supply chain management)
coordinate planning, production, and logistics with suppliers and - automate information flow among members of the supply chain so they can make better decisions - includes software for supply chain planning and supply chain execution - makes supply chain leaner
90
Types of SCM
- push-based model (build-to-stock) (old one): earlier SCM systems, schedules based on best guesses and demands - pull-based model (demand-driven): contemporary, web-based, customer orders trigger events in supply chain
91
Upstream vs Downstream supply chain
- Upstream: from the suppliers to the firm - Downstream: from the firm to the customers (through distributors, retailers)
92
The bullwhip effect
minor fluctuations in demand can cause higher fluctuation in supply and overstocking - info of product demand gets distorted along the supply chain
93
Global supply chain issues
- greater geographical distances - different time zones - different country performance standards & legal requirements - internet does help manage global complexities
94
Customer Relationship Management (CRM) systems
integrate and automate customer-facing processes in sales, marketing, and customer service, providing an enterprise-wide view of customers
95
Types of CRM
- operational CRM (customer facing applications) - analytical CRM (analysis of customer data to improve business performance) - social CRM (incorporating social networking technique, internally and externally)
96
Churn rate
- number of customers who stop purchasing products or services - indicator of growth or decline
97
Unique technology features of e-commerce
- ubiquity (meaning common) (everywhere, everyone) - global reach - universal standards - richness (supports video, audio, and text messages) - interactivity - information density - personalization/customization - social technology
98
Benefits of digital markets
- more transparent than traditional markets - reduced information asymmetry - lower search cost, transaction costs, and menu costs - the ability to change prices dynamically based on market conditions - foster market segmentation - stronger network effects
99
Major types of E-Commerce
- B2C (e.g. any online store) - B2B (e.g. Slack) - C2C (e.g. eBay)
100
principal e-commerce revenue models are
- advertising - sales - subscription - free/fremium (free services for basic services but charging for ‘premium’) - transaction fee - affiliate (websites are paid as ‘affiliates’ for sending their visitors to other sites in return of a referral fee)
101
Long-tail marketing
- ability to reach a large audience inexpensively - strategy of targeting a large number of niche markets with a product or service (example rec. on amazon)
102
Behavioral targeting
- tracking online behaviour of individuals on thousands of websites and within apps - thus privacy concerns - programming ad buying - native advertising
103
Native advertising
- placing ads within social network/ newsfeed or traditional editorial content , such as newspaper article
104
M-Commerce’s main areas of growth
- mass market retailing (amazon, eBay, etc.) - sales of digital content (music, tv, etc.) - in-app sales to mobile devices
105
Most important challenges of building e-commerce presence
- developing clear understanding of business objectives - knowing how to choose the right technology to achieve those goals
106
E-Commerce presence includes 4 areas
- websites - email - social media - offline media
107
S-Commerce (social e-commerce)
- shoppers make their purchases within social media platforms - intrinsically connected with social media marketing
108
Grand vision and realistic vision of what AI is
- Grand vision: computer hardware and software systems that are as 'smart' as humans - Realistic vision: systems that take data inputs, process them, and produce outputs and that can perform many complex tasks that would be difficult or impossible for humans to perform
109
Machine Learning
- can identify patterns and relationships in very large data sets without explicit programming although with significant human training
110
Neural networks
- algorithms loosely based on the processing patterns of the biological brain that can be trained to classify objects into known categories based on data inputs
111
Deep learning networks
- subset of machine learning - makes use of neural engine
112
Genetic algorithms
- problem-solving methods that promote the evolution of solutions to specified programs using the model of living organisms adapting to their environment
113
Natural Language Processing (NLP)
- enables computers to understand natural language as humans do. Whether the language is spoken or written, natural language processing uses artificial intelligence to take real-world input, process it, and make sense of it in a way a computer can understand (e.g. Siri, Alexa)
114
Computer vision systems
- Computer vision is a field of artificial intelligence (AI) that enables computers and systems to derive meaningful information from digital images, videos and other visual inputs — and take actions or make recommendations based on that information (e.g. passport control at airports)
115
Robotics
- design, construction, and operation of machines that can substitute for humans in many factory, office, and home applications (e.g. smart vacuums)
116
Artificial intelligence
- systems that perform activities that we associate with human thinking, activities such as decision-making, problem solving, learning
117
Hybrid intelligence
ability to achieve complex goals by combining humans and artificial intelligence, thereby reaching superior results, and continuously learning from each other” (e.g. my bachelor thesis)