BEC 6 - Process Management and IT Flashcards
BPM activities
1) Design
2) Modeling: what if analysis
3) Execution: changes are implemented
4) Monitoring: comparing actual vs expected performance
5) Optimization
The general technique/approach to process management
- Define (the process)
- Measure: determine the indicators that will show a change in the process
- Analyze
- Improve
- Control
Gap Analysis
Determines the gap, or difference, between industry best practices and the current practices of the organization
Lean Manufacturing
Using only those resources required to meet the requirements of customers
Demand Flow
Manages resources by using customer demand as the basis for resource allocation
Theory of Constraints (TOC)
Organizations are impeded from achieving objectives by the existence of one or more constraints. Can either work around or leverage the constraint
5 Steps of TOC
1) Identification of the constraint
2) Exploitation of the constraint
3) Subordinate every other decision to the ones above
4) Elevate the constraint: add capacity to overcome the constraint
5) Return to first step
Steering Committees
Responsible for the oversight of the infromation systems function. Responsible for developing and communicating strategic goals, reviewing the IT budget and allocation of IT costs, and providing ongoing guidance
AIS relationship to DSS and EIS
Data in an AIS is often processed and aggregated to become inputs to a DSS and EIS
5 dimensions of big data
1) Volume
2) Velocity: speed of data accumulation
3) Variety: structured, unstructured, semi structured
4) Veracity: reliability, quality or integrity of the data
5) Value
Types of Data Analytics
1) Descriptive Analytics - tells what happened. Uses summary statistics and sorting
2) Diagnostic Analytics - tells why an event happened. Uncovers correlations, patterns, and relationships by performing a drill down, correlation analysis, sequence checks
3) Predictive Analytics - transforms insight into foresight. Uses regression analysis, classification analysis, and decision trees
4) Prescriptive Analytics - tells how to achieve a desired event. Uses AI and what if analysis
Security life cycle
1) Identify - what assets exist, identify and document the risks
2) Assess - Determine the likelihood of the risk and the potential impact
3) Protect - Mitigation strategies
4) Monitor - Continually monitor new and existing risks
Types of IT Threats
1) Natural and Political disasters
2) Errors in software and equipment malfunctions
3) Accidental actions
4) Intentional actions
3 Objectives to successfully manage risk
1) Integrate the management of IT risk into the overall risk management of the enterprise
2) Make well informed decisions about risk appetite, tolerance, etc.
3) Develop a response to risk
Categories of IT controls
1) General IT controls - ensure that an organizations control environment is stable and well managed
2) Application controls - controls built into typical business processes that use computer applications. Ensure that data processed through computer applications are accurate, complete, valid, and authorized