ABI begrippen Flashcards

1
Q

IT

A

All the hardware and software that a firm needs to use in order to achieve its business objectives

Computer machine storage devices, software (windows), other computer programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Bluetooth

A

Useful for creating a small personal area network (PAN’s). It links up to 8 devices within a 10 meter area, using low power, radio based communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Point

A

a box consisting of a radio receiver/transmitter and antennas that links to a wired network router of hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hotspot

A

Locations with one or more access points providing wireless internet access and are often in public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data

A

Streams of raw facts representing events occurring in organisations before they have been organised and arranged into a form that people can understand and use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information

A

Data that has been shaped into a form that is meaningful and useful for humans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information System (IS) Explanation

A

An important instrument for creating value to a firm. It can increase its revenue or decrease costs by providing information that helps managers making a better decision or that improves the execution of business processes. IS provides real economic value to a business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information System (IS) =

A

A set of interrelated components working together to collect, process, store, and distribute information to support decision making en control in a firm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Input

A

Collect raw data from in the firm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Processing

A

Converting raw data into a meaningful form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Output

A

Transfer the processed data to the people who use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IS from a business perspective

A

Part of series value adding activities for acquiring, transforming and distributing information that managers can use to improve decision making and enhance the organisations performance and increase the profitability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Computer literacy

A

Focuses primarily on knowledge of information technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Complementary Assets Explanation

A

Investing in IT does not automatically guarantee good returns, they have to be accompanied by complementary assets.

Those assets required to derive value from primary investments. In addition, research indicates that firms support their technology investments with investments in complementary assets.

Such as: new business models, organisational culture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Complementary Assets =

A

Assets required to derive value from a primary investment.

Example: for a pomp station –> roads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the economic impact of information system organisations? Explanation + 4 examples

A

Online and interactive tools deeply involved in the daily operations and decision making of large organisations.

The economic impact:
- IT changes relative costs of capital investment and labor.
- IT effects the cost ad quality of information and changes economics of information.
- IT helps a firm expand in size because it can reduce costs (of participating markets).
-Outsourcing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

6 challenges of information systems

A
  1. It required extensive organisational change, transition from one technical level to another (strategic transition = difficult)
  2. Not all strategic systems are profitable.
  3. Expensive to build.
  4. Easily copies by other firms + always a strategic advantage is not always sustainable.
  5. Difficult to align with the business objectives.
  6. People do no support (staff), do not try to understand the new technology.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Runways

A

Projects that far exceed the original schedule and budget and fail to perform (between 30-40%).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The user interface

A

Part of the system which end users interact.

Example: key board and mouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Objectives project management + why essential in developing information systems? 3 examples

A
  1. There is high failure rate among IS
  2. It takes more time and money than anticipated.
  3. Good project management is essential for ensuring that systems are delivered on time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

7 Project management activities

A
  1. Planning the work
  2. Accessing the risk
  3. Acquiring recourses
  4. Organising work
  5. Directing
  6. Executing
  7. Analysing results
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

5 variables of information systems

A
  1. Scope: What work is or is not included in the project.
  2. Time: Amount of time required to complete the project.
  3. Cost: Based on the time to complete a project multiplied by cost of HR required to complete the project.
  4. Quality: How well the end result of a project satisfies the objectives specified by management
  5. Risk: Potential problems that would threaten the success of a project.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

5 (+ explanation) consequences of poor management are:

A
  1. Cost overruns
  2. Time slippage
  3. Technical shortfalls impacting performance
  4. Failure to obtain anticipated benefits

–> without proper management a system development project takes longer to complete and most often exceed the allocated budget.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Project

A

A planned series of related activities for achieving a specific business objective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Project management
Application of knowledge and skills to achieve a target within budget and time.
26
Scope
What work is or is not included in a project.
27
4 reasons why you should perform a strategy analysis?
- To better understand the strategy and value proposition. - To get a clear picture of the current situation. - To understand how each process contributes to the strategy. - To define the most value adding processes that support the strategy and be able to measure their performance.
28
What is the role of the IS (department) function in a business? + 8 functions
The formal organisational unit responsible for IT services. This is responsible for maintaining the hardware, software, data storage, and networks that compromise the firms IT's infrastructure. 1. Programmers 2. System Analysts 3. IS managers 4. CIO 5. CSO 6. CPO 7. CKO 8. CDO
29
Programmers
Technical specialist who write the software instructions for computers.
30
System analysts
Translates business problems and requirements into information requirements and systems.
31
Information systems managers
Leader of the teams of programmers and analysts, project managers enzovoorts.
32
CIO = Chief Information Officer
Head of ID departments, senior manager who oversees the use of IT in the firm.
33
CSO = Chief Security Officer
In charge of the overall security of data and prevents cyber.
34
CPO = Chief Privacy Officer
Responsible for ensuring that the company complies with existing data privacy laws.
35
CKO = Chief Knowledge Officer
Responsible for the knowledge of management programs of the firm. Helps design programs and systems.
36
CDO = Chief Data Officer
Responsible for utilisation of information to maximise the value the organisation can realise.
37
4 Information system strategies for dealing with competitive forces.
1. Low cost leadership (Walmart): produce products and services at lower price than the competition. 2. Product differentiation (Google, Nike, Apple): enable new products and services, greatly change customer convenience and mass experience (customisation). 3. Focus on market niche (specialisation) (Hilton hotel system): Use IS to enable a focused strategy on a single market niche. 4. Strengthen customer and supplier intimacy (Amazon, Starbucks): Use IS to develop strong ties and loyalty with customers and suppliers (increase switching costs)
38
Efficient customer response system
Directly links customers behaviour to distribution and supply chains.
39
Mass Customisation
The ability to offer individually tailored products and services using the same production recourses as mass production.
40
Switching costs
Costs switching from one product to a competing product.
41
Porters value chain
The value that is created and captured by a company is the profit margin. - The more value the more profit - When you provide value to your customers = competitive advantage.
42
Profit Margin
Value created and cost of creating that value.
43
Competitive Strategy
How to compete in the area the firm operates in. define how a firm creates a competitive advantage with respect to the competition.
44
Value Chain
A set of activities that a firm carries out to create value for it customers. Tool to make you understand sources of value for you company.
45
5 Primary activities + explanation
They relate to the physical creation, sale maintenance support of a product . 1. Inbound logistics: Storing and distributing 2. Operations: Change inputs into outputs that are sold to customers. 3. Outbound logistics: Delivery of products to customers. 4. Marketing and Sales: Persuade clients to make a purchase. 5. Service: Activities related to maintain value.
46
4 Supporting activities
1. Producement: Purchasing --> what the firm does to get the recourses needed and finding the best price. 2. HR: recruits and hires. 3. Technical development/ Technology: Managing and processing information and protecting companies knowledge base. 4. Infrastructure: Support systems that allow it to maintain daily operations.
47
Benchmarking
Involves comparing the efficiency and effectiveness of your business processes against strict standards and then measuring performance against this standard.
48
Value web
Is a collection of independent firms that use IT to coordinate their value chains to a product or service.
49
Software Outsourcing
Enables a firm to contract custom software development.
50
SLA = Service Level Agreement
Contract between customers and service provider that defines responsibility and service expected.
51
Total Cost Ownership (228)
Actual cost of owning technology recourses --> analyse direct and indirect costs.
52
TCO = Total Cost Ownership
Purchase price + cost incurred during the useful life (direct and indirect costs together).
53
2 Ways to reduce TCO
- Having a centralised hardware platform - Switch to cloud service.
54
Project Risk (3 influences)
1. Project Size: The larger the project the greater the risk. 2. Project structure: Undefined goals can result in higher risk. 3. Experience technology: Project team has to have technical expertise.
55
KPI's = Key Performance Indicators
Measure of performance over time for a specific objective. Shaped by the industry Goals
56
Knowledge Management
The set of processes developed in an organisation to create, gather, store, maintain, and disseminate the firms knowledge.
57
Tacit Knowledge
Knowledge residing in the minds of employees that has not been documented yet.
58
Explicit Knowledge
Knowledge that has been documented.
59
4 Important dimensions of knowledge
1. Knowledge is a firm asset (intangible). 2. Knowledge has different forms (knowing why, not only when). 3. Knowledge has a location (hard to move). 4. Knowledge is situational (know the procedure, related to context).
60
3 Reasons why IT flattens organisations
1. By providing managers with information to supervise larger numbers of employees. 2. By giving lower-level employees more decisions-making authority. 3. Managers receive much more timely and accurate informations, they become faster at making decisions thus requiring less managers.
61
3 Types of decisions
1. Structured: Are repetitive and routine, can be handled the same each time. 2. Unstructured: Decisions without any routine, no procedure. 3. Semi-structured: have elements of both structured and unstructured.
62
Data
Flow of events of transactions captured by an organisations system. If a company wants to know which products are most popular and who is the most profitable customer, the answer lies in the data.
63
Big Data
These data sets have a volume so huge that they are beyond the ability of typical DBMS (data base management systems) to capture, store, and analyse. - massive sets of unstructured/semi-structured data from web traffic, social media, sensors and so on. - Can reveal more patterns and relationships but required new tools and technologies to manage and analyse.
64
Volume
Scale of data
65
Variety
Different forms of data
66
Velocity
Analysis of data
67
Veracity
Uncertainty of data
68
HADOOP
Collection of inexpensive computers. It breaks big data down and distributes it into 1000 inexpensive computers and then combines results into smaller data seps which makes it easier to analyse.
69
4 types of Technology's impact on a business
1. Every company can use IT, making it easy for rivals to compete and for new competitors to enter the market. 2. Because information is available for everyone, the internet raises the bargaining power of customers, who can quickly find the lowest cost provider on the web. 3. Internet nearly distorted some industries and has threatened more. 4. Internet created also new markets and provided new opportunities for building brands with very large and loyal customer bases.
70
Data Marts
Subset of data warehouse in which a summarised or highly focused portion of the organisations data is placed in a separate database for a specific population of users.
71
Data warehouse (tools facilitating big data analysis)
A data base that stores current and historical data of potential interests to decision makers throughout the organisation.
72
3 Types of information stores that you can find in data warehouses
1. Company historical data. 2. Company actual data. 3. Relevant external data.
73
HADOOP (tools facilitating big data)
HADOOP enables distributed parallel processing of big data across inexpensive computers.
74
In memory computing ( tools facilitating big data)
relies on computer main memory (RAM) for data storage: faster and more predictable outcome.
75
Analytical Platforms (tools facilitating big data)
Full featured technology solution. Joins different tools and analytical systems together. Designed for high speed analysis of large data sets.
76
OLAP = Online Analytical Processing
Tool that enables users to view the same data in different ways using multiple dimensions. - Product - Pricing - Cost - Region - Time period
77
Data Mining
Discovery driven. Finds hidden patterns in customers buying behaviour to predict future behaviour of customers.
78
5 types of information obtainable form data mining
1. Associations 2. Sequence 3. Classifications 4. Clusters 5. Forecasts
79
Associations
Occurrences linked to one single event.
80
Sequences
Events that are linked over time.
81
Classifications
Recognises patterns that describe the group to which an item belongs by examining existing items that have been classified and by inferring a set of sources.
82
Clustering
Works in a manner of similar to classifications when no group yet has been defined.
83
Forecasting
Uses predictions in a different way that other ones. It uses a set of existing values to forecast what other values will be.
84
Text mining
Able to extract key elements for unstructured big data sets, discovers patterns and trends (+summarises the information) (structured data)
85
Sentiment Analysis
Mine text comments in mails enzovoorts to detect favourable and unfavourable opininos.
86
Web Mining
Analysis of extracting knowledge from the content of webpages.
87
Web structured mining
Examines data related to the structure of a particular website.
88
Web usage mining
Examines user interaction data recovered by a web whenever request for a website resources are received.
89
Privacy
The claim of individuals to be left alone, free from surveillance or interference from other individuals or organisations. Customers must provide their informed consent before any company can legally use data about them and they have the right to access that information, correct it, and request that no further data can be collected.
90
DFD = Data Flow Diagram
The primary tool for representing a system component process and the flow between data.
91
Structured methodologies TOP DOWN (principals methodology for modelling and designing systems)
Used to document, analyse, and design information systems. Structured methodologies are top-down. Process orientated, focusing primarily on modelling the process/actions that capture, store, manipulate, and distribute data as data flows through the system.
92
Object oriented development (principals methodology for modelling and designing systems)
Addresses the modelling of data issues that structured methods cannot handle well. The object-oriented design phase describes how the object will behave and how they will interact with on another .
93
Computer aided software engineering CASE (principals methodology for modelling and designing systems)
CASE provides software tools to automate the methodologies to reduce the amount of repetitive work the developer needs to do. CASE tools try to increase productivity and quality by: - Improving communication between users and specialists.
94
Business Intelligence
Apps and technology to help users make better business decisions.
95
Implementation
All organisational activities of the business adopt, manage, routinise a new innovation (IS).
96
IT
All software and hardware technologies an business needs in order to achieve its business objectives.
97
Mashup
Different sources that produce a new work that is greater than the sum of its parts (personalised FB page).
98
IC/IT GAP analysis
A GAP analysis is a method of assessing the differences in performance between a business information system of software applications. It determines whether business requirements are being met and, if not, when steps should be taken to ensure they are met successfully. GAP TABLE = (desired stat, current state, GAP, negative consequence)
99
Computer hardware platforms
All the devices constitute the computer hardware platform for corporate and personal computing worldwide (PC's, laptops, phones, tablets).
100
Network Service Platforms
Are typically provided by telecommunications/telephone service companies that offer voice and data connectivity, wide area networking, wireless services and internet access.
101
Internet Platforms
Include hardware, software and management service to support a firms website, including web hosting services, routers and cabling or wireless equipment.
102
Consultants and system integration services
System integrators help with the change of business processes, procedures, trainings, software integration.
103
RFID = Radio Frequency Identification
Uses low-powered radio transmitters to read data stored in a tag at distances tanging from 1 inch to 100 feet. The reader captures the data from the tag and sends them over a network to host computers for processing.
104
BYOD = Bring Your Own Device
Allowing employees to use their personal mobile device in the workplace.
105
Consumerisation of IT
New It that first emerges in the consumer market which spreads into business organisations.
106
Quantum computing
A model of computing in which computer processing, storage, and the other services are provided as a shared pool of virtualised resources over a network, primarily the internet.
107
IaaS = Infrastructure as a Service (3 services of cloud computing)
Customers use processing, storage, networking, and other computing resources from cloud service providers to run their information systems.
108
PaaS = Platform as a Service (3 services of cloud computing)
Customers use software hosted by the vendor on the vendors cloud infrastructure and delivered as a service over a network. Users access these applications from a web browser and the data and software are maintained on the providers remote servers.
109
Saas = Software as a Service (3 services of cloud computing)
Customers use infrastructure and programming tools supported by the cloud service provider to develop their own application.
110
5 Characteristics of cloud computing
1. On demand self service 2. Ubiquitous network access: can be accessed using standard network and internet devices including mobile platforms 3. Location independent resources pooling 4. Rapid elasticity 5. Measured service
111
What is the business value of security and control?
Businesses must protect not only their own information assets but also those of customers, employees and business partners. Failure to do so may open the firm to costly litigations for data exposure or theft.
112
A sound security and control framework that protects business information
Assets can produce a high return on investment. Strong security and control also increase employee productivity and lower operational costs.
113
Computer Forensics
Is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that information can be used as evidence in a court law.
114
Computer Forensics deals with:
- Recovering data - Secure strong of recovery data - Finding significant information - Presenting information to a court of law
115
HIPAA = Health Insurance Portability Accountability Act
It requires members of the health car industry to retain patients information for 6 years and ensure the confidentially of those records.
116
Sarbaned-Oxley act
It imposes the responsibility on companies and their management to safe guard the accuracy and integrity of financial information that is used internally and released externally.
117
Gramm-Leach-Bliley act
Required financial institutions to ensure security and confidentially of consumer data.
118
4 Tools and technology for safeguarding information resources
1. Identity management (digital identity) 2. Authentication (passwords, smart card, biometric, two-factor) 3. Firewalls 4. Encryption (cannot be read by anyone but the sender and receiver of information)
119
SSL = Secure Socket Layer TSL = Transport Layer Security (two methods for encrypting network traffic)
Enables client en server computers to manage encryption and decryption activities as they communicate with each other during a secure session.
120
S-HTTP = Secure Hypertext Transformed Protocol (two methods for encrypting network traffic)
Protocol used for encrypting data flowing over the internet, but it is limited to individual messages whereas SLL and TSL are designed to establish a secure connection between 2 computers.
121
Digital Certificates
Data files used to establish the identity of users and electronic assets for production of online transactions.
122
The internets impact on competitive advantage
Internet technology is based on universal standards that any company can use. Making it easy for rivals to compete on price alone and for new competitors to enter the market. Because information is available to everyone, the internet raises the bargaining power of customers, who can quickly find the lowest-cost provider on the web.
123
IoT = Internet Of Things
The growing use of sensors in industrial and customer products, is an excellent example of how the internet is changing competition within industries and creating new products and services.
124
Porters 5 forces + explanation
Helps analyse an industry and identifies its attractiveness (determine competitive intensity) 1. Competitive rivalry 2. The threat of new entrants 3. The threat of substitutes 4. The power of buyers The power of suppliers --> evaluate the root cause of profitability in an industry --> task environment interacts with each other
125
Competitive Rivalry =
Organisations targeting the same customers --> competitors.
126
Competitive Rivalry explanation (all forces effect the potential profit)
Determines by number or size of competitors, exit barriers. High when competitors are similar in size and power. (no differentiation)
127
High exit barriers
Forcing companies to remain in industry even though the profit margins are low. Due to long term loan agreement --> results to price wars.
128
The threat of new entrants (all forces effect the potential profit)
New entrants bring new capacity, but pressure on prices and costs. You will have to share the pie with more players. This depends on entry barrier. The higher the barrier the smaller the change of competition. Example: High customer loyalty, large capital requirements and governmental policies.
129
The threat of substitutes (all forces effect the potential profit)
Substitute products fulfil the same need, even though they may not look identical. Customers can switch to alternatives. Example: Coffee and energy drinks keep people awake, so if one price goes down than people might switch.
130
The power of buyers (all forces effect the potential profit)
To what extend customers can put the company under pressure. By demanding better quality this results in higher costs for the company. Customers have a lot of power when they are with more people, or when they have many alternatives. Customers can compare products online because of the internet. By implementing loyalty programs or product differentiation companies can lower this power.
131
The power of suppliers (all forces effect the potential profit)
How much power has a supplier to potentially raise its price, or reduce quality of service. The fewer suppliers there are, the more power they have.
132
Switching costs
Costs that a customer gets as a result of switching of brand.
133
How do CRM = Customer Relationship Management help a firm achieve customer intimacy?
What kind of information would you need to build and nurture strong, long lasting relationships with customers; who your customers are, how to contact them, and whether they are costly to service and sell to. What kind of products and services are they interested in?
134
Validity (information quality dimensions)
Degree to which data is within defined requirements, data values fall within defined ranges.
135
Accuracy (information quality dimensions)
Degree to which data represents reality.
136
Timeliness (information quality dimensions)
Degree to which the data is available at the time it is needed.
137
Completeness (information quality dimensions)
Degree to which necessary data is available for use.
138
Uniqueness (information quality dimensions)
Degree to which data is unique and cannot be mistaken for other entries.
139
Consistency (information quality dimensions)
Degree to which data is equal within and between data sets.
140
Predictive analytics (analytics)
Uses statistical analysis, data mining techniques, historical data, and assumptions about future conditions to predict future trend and behaviour patterns.
141
Big data analytics (analytics)
predictive analytics are starting to use bog data from both private and public sectors including data from social media, customer transactions, and output from sensors and machines.
142
Municipalities (analytics)
Adding more data captured through sensors, location data from phones and targeted smartphones.
143
Operation intelligence and analytics (analytics)
Largely operational decisions.
144
Customer relationship management helps achieve customer intimacy 3 examples
1. Integrate and automate customers facing processes in sales, marketing, and customer service. Use this information when interacting with customers, provide better service identify unprofitable customers, opportunities to reduce churn rate. 2. Provide capabilities for operational and analytical CRM. 3. Include models for managing relationships with selling partners and employees relationship management.
145
Touch Point
A method of interaction with the customer, such as a telephone, email, customer service desk, conventional mail, facebook, twitter, website enzovoorts.
146
Operating system software
Software that manages the resources of a computer.
147
Churn Rate
Measurement of number of customers who stop using or purchasing products or services from a company.
148
Web Beacons
Tiny software programs that keep a record of users online click streams.
149
Cookies
Small text files deposited on a computers hard drive when a user visits a website. Website can customise its content for each visitor.
150
Opt-Out model
Permits the collection of personal information until the customer specifically requests the data not to be collected.
151
Opt-In model
A business is prohibited from collecting any personal information unless the customer specifically takes action to approve information collection and use.
152
BI = Business Intelligence
The promise to deliver correct nearly real time information to decision makers and analytic tools help them quickly understanding the information and take action.
153
Intellectual Property
Tangible and intangible products of the mind created by individuals or corporations.
154
RFID = Radio Frequency Identification
System provides a powerful technology for tracking the movement of good throughout the supply chain.
155
NFC = Near Field Communication
Short range wireless connectivity standard that used electromagnetic radio fields to enable 2 compatible devices to exchange data when brought within a few centimetres of each other.
156
WSN = Wireless Sensor Networks
Networks of interconnected wireless that are embedded in the physical environment to prove measurement of many points over longer spaces.
157
Enterprise Applications
Involve complex pieces of software that are very expensive to purchase and implement. --> high switching costs
158
Encryption
Process of transforming plain text into cipher text that cannot be read by anyone other than the sender and the intended receiver.
159
Symmetric encryption
Both sender and receiver have the same key.
160
Public encryption
More secure, it uses two keys. On shared key and one private key.