5.9 Management Information Systems (HL) Flashcards

1
Q

Data analytics

A

is the management process of examining and scrutinising raw data to find meaningful trends and patterns to support business decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data overload

A

means there is too much data available for managers to know what to do. This causes ineffiencies and therefore delays management decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Descriptive data analytics

A

is a type of data analytics that examines what has happened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Diagnostic data analytics

A

is a type of data analytics that examines why something has happened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Predictive data analytics

A

is a type of data analytics that examines what is likely to happen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Prescriptive data analytics

A

is a type of data analytics that examines what should be done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data breach

A

refers to the loss or theft of important data, usually due to an inefficient database system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data security

A

Is the protection of data against disclosure, damage, theft, or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Database

A

is an organized collection of data stored and retrieved electronically using a local computer or networked computer server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information

A

Refers to the organization and interpretation of facts or statistics from the given data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cybercrime

A

refers to any form of illegal activity carried out using electronic methods to deliberately and maliciously attack computer hardware or software, including computer networks, devices, and critical infrastructures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Investing in cybersecurity advantages

A

1) Data protection - Safeguards sensitive data from unauthorized access and breaches.
2) Customer trust - Enhances trust and confidence amongst customers, clients, and other stakeholders.
3) Business continuity - Protects against disruptions and ensures continuous business operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cybersecurity

A

-Refers to a firm’s policies, processes, and procedures used to safeguard its computer systems and networks from unwarranted attacks, such as information disclosure, data theft, or physical damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Critical Infrastructures

A

are the crucial computer systems, structures, networks, and facilities required for the effective functioning of an organization in the modern and digital corporate world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Artificial neural networks (ANN)

A

are a feature of critical infrastructure and refer to the use of learning algorithms that can learn things, solve problems, and make decisions independently by processing new data as these are received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud computing

A

is a virtual, computer generated online space that enables businesses to store, organize, manage, process, and retrieve data in safe and efficient ways.

17
Q

Virtual reality

A

Is an artificial, computer-generated environment or world accessible to businesses and consumers in a seemingly real world way.

18
Q

Data centre

A

This is a physical facility or that support organisations systems.

19
Q

Advantages of virtual reality

A

-Helps to reduce wastage and accidents in the workplace. It creates a safer working environment for employees to train and develop their skills to perform better at their jobs.
-Is highly flexible and can be used for a very broad range of training purposes.
-Training in VR enables employees to be 100% focused on the task at hand.

20
Q

Disadvantages of virtual reality

A

The accelerating pace of VR means that it can be challenging for a business to keep up with technological advances. Equipment can also become obsolete quite quickly.

Investing in the latest VR hardware and software means the cost can be expensive.

No guarantee that the investment will be successful or whether customers have a desire and willingness to adopt VR technologies.

Research has shown that some employees suffer from motion sickness when putting on VR headsets. This limits the effectiveness and potentially wide-reaching applications of VR for the organization.

21
Q

The Internet of Things

A

Refers to any Internet-enabled device that enables people to store, share, and transfer data with other electronic devices that uses embedded sensors.

22
Q

Artificial Intelligence

A

is an area of computer science that develops the ability of smart machines to perform tasks rather than natural or human intelligence, such as motion or voice activated commands on smart devices.

23
Q

Big data

A

-Refers to large sets of structured and unstructured data used by AI for analysis and decision-making.

24
Q

Chatbots

A

-Are AI-powered virtual assistants that simulate human conversations, often used for customer service and online interactions.

25
Machine learning
is the use of computer systems, algorithms, and statistical models to enable electronic devices to memorize and adapt on their own, thereby imitating intelligent human behaviour and decision making.
26
Value
-Refers to the extent to which big data are useful for problem solving and decision making.
27
Customer loyalty
-Measures the extent to which customers consistently repurchase products from the same business. Loyal customers also choose the goods and services of the business over its competitors.
28
Customer loyalty programmes
-These are marketing strategies designed to retain customers by using a rewards programme that give loyal customers direct benefits, such as reward points that can be redeemed for purchases at discounted prices
29
Digital Taylorism
-Refers to the use of management information systems (MIS) to monitor the behaviour and performance of employees. -It describes the management approach that relies on digital technologies to improve productivity by managing and monitoring employees and the tasks they perform in the most systematic and methodical ways
30
Work from Home
-It has become the new normal for many people and businesses in the post-COVID era, a growing number of employers have started to make use of data to manage and monitor their employees as it may not be possible to accurately measure how much work is being done otherwise.
31
Advantages of Digital Taylorism
Efficiency - Digital Taylorism can significantly improve efficiency in the production of goods and improved service processes. Cost savings - It can lead to cost savings in the long term by automating repetitive tasks, reducing the need for extensive manual labour, and minimizing errors in production processes. Precision and accuracy - Automation through digital technologies ensures precision and accuracy in tasks, minimizing human errors and inconsistencies in production or service delivery.
32
Disadvantages of Digital Taylorism
Monotony - The division and automation of tasks can cause monotony so reduce job satisfaction, resulting in lower productivity and higher labour turnover. Skills erosion - The focus and reliance on automating tasks can lead to less emphasis on developing diverse skills among workers, potentially eroding the overall expertise and skills set of the workforce. Resistance to change - Workers may resist the implementation of digital Taylorism due to concerns about job security, loss of control over tasks, being micromanaged, and fear of being replaced by machines
33
Data mining
Is the management process of using data for predictive analysis and forecasting purposes. Use of management information systems to find trends, patterns, and correlations from large data sets, and using the findings to make predictions about future situations.
34
Advantages of data mining
They help manager and decision makers to predict future situations. Effective use of data allows businesses to understand their customers better, which helps to improve customer relations. Being able to make more informed decisions enable businesses to increase sales revenue. Improved risk management as data mining can be used to detect fraudulent activities and unusual financial transactions.
35
Disadvantages of data mining
Privacy issues are a growing concern due to the increasing amount of data about private individuals on platforms, such as social networks and e-commerce. Security issues surrounding hackers gaining access to big data of customers, including data on personal and financial information, credit card fraud, and identity theft. Personal data can be collected and misused, including the unethical sale of private information to third parties. The information can be used unethically to take advantage of vulnerable people or to discriminate against a group of people.
36
Technological innovation
-Refers to the partial or full replacement of an existing technology by one that improves a firm's productivity, its product quality, and competitiveness in the market.
37
Benefits of Management Information Systems on Business decision-making and stakeholders
Improved decision making - Using advanced computer technologies such as artificial intelligence enables a business to automate and improve decision-making. Better operational efficiency - MIS and technological innovations can be used to streamline processes and reduce costs due to the improved operational efficiency. Improved customer services - MIS and technological innovations can be used to track customer data, such as purchasing habits and preferences, thereby providing vast amounts of data.
38
Risks of MIS
1) Cybercrime 2) Set-up and maintenance costs 3) Regulatory compliances 4) Providing ongoing cybersecurity training for managers and employees on the use of the data security systems and cybersecurity measures.