Chapter 14 Flashcards

1
Q

What does strategic level information system serve

A

senior managers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does management level information system serve

A

middle managers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does knowledge level information system serve

A

knowledge and data workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does operational level information system serve

A

operational managers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are
sales and marketing
manufacturing
finance
accounitng
HR

A

functional areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is described
derived in and external
summarised
LT focus
concerned with whole organisation
ad hoc
quant and qualitative
uncertain

A

strategic information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is described
mostly internally
summarised at lower level
short and medium term
concerned with activities or departments
prepared routinely and regularly
quantitative measures

A

tactical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is described
internal
detailed
relevant to immediate team
task specific
frequent
quantitative

A

operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Qualities of good information
ACCURATE

A

Accurate
Complete
Cost benefit
User targeted
relevant
authoritative
timely
easy to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is defined
all systems and procedures involved in collecting, storing producing and distributing information

A

information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What factors should be considered to quantify benefits from proposed information systesm

A

increase revenue
cost reduction
enhanced service
improved decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can systems improve decision making

A

forecasting
develop scenarios
market analysis
project implications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A system with low business value and low technical quality what do

A

dispose of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

system with high business value and low technical quality

A

invest in (renew)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

System high technical quality low business value should be

A

reassessed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

High quality system with high business value should be

A

maintained and enhanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is strategic importance of big data

A

enhanced transparency
enhanced performance
market segmentation & customisation
improved decision making
new products and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are criticisms of big data

A

‘buzzword’
correlation v causation
data overload
ability to verify
sustainable advantage
representative data

19
Q

What are the barriers to introducing big data

A

unknown destination
tech challenges
lack of holistic approach
shortage of talent
fear of cyber attack
difficulty building business case
reg and legal compliance
need for customer data

20
Q

What is knowledge

A

potential for action based on data, information, intuition and experience

21
Q

What is explicit knowledge

A

knowledge the company knows that it has, facts transactions and events that can be stored and stated

22
Q

What is tacit knowledge

A

personal knowledge held by employees

23
Q

what is knowledge management

A

range of strategies and tools that capture knowledge that is valuable to an organisation and deliver it so it can be acted on quickly to advantage of business

24
Q

What are three risks of IT/IS

A

Risk of inadequacy
risk of breakdown
risk of excess expense

25
Q

Steps in the implementation process

A

Analysis
Design
Programming
Testing
Conversion
Implementation

26
Q

Three theories to explain user resisentece

A

people oriented
system oriented
interaction

27
Q

How does people oriented theory apply to user resistence

A

caused by factors internal to users as individuals or as a group

28
Q

How does system oriented theory apply to user resistance

A

user resistance caused by factors inherent in the new system design related to ease of use and functionality

29
Q

How does interaction theory apply to user resistance

A

User resistance is caused by the interaction of people and the system

30
Q

Five common risks from IT systems

A

Natural threats
non-compliance with regs
data systems integrity
accidents
cyber security risks

31
Q

Define cyber security

A

the protection of systems, networks and data in cyberspace

32
Q

Significant cyber risks an organisations IT system may encounter (5)

A

Human threat
Fraud
Deliberate sabotage
viruses and other corruption
Denial of Service attack

33
Q

What is defined
an attempt by attackers to prevent legitimate users of service from using that service

A

denial of service attack

34
Q

IT Security controls
six

A

prevention
detection
deterrence
recovery procedures
correction procedures
threat avoidance

35
Q

what is defined
if a threat occurs, its consequences can be contained

A

recovery proceduresw

36
Q

what is defined
ensures the vulnerability in the system is dealt with

A

correction procedures

37
Q

Combating IT risk and security
10

A

Business continuity planning
system access control
system development & maintenance
physical security
compliance
personnel security
security organisation
computer and network management
asset classification and control
security policy

38
Q

Combating IT risks
what is defined
measures to ensure that if major failures or disasters occur, business will not be completely unable to function

A

Business Continuity Planning

39
Q

Combating IT risks what is defined
includes protection of information, information systems, networked services, detection of unauthorised activities and security when using the systems

A

systems access control

40
Q

Combating IT risks what is defined
should be clear who has responsibility for the various aspects of information security. additional considerations will apply if facilities and assets are accessed by third parties or responsibility for information processing has been outsourced

A

security organisation

41
Q

Combating IT risks what is defined
ensuring continuity of operations, minimising risk of systems failure, protecting integrity of systems and safeguarding information, particularly when exchanged between organisations

A

computer network management

42
Q

What is blockchain

A

technology that allows people who do not know each other to trust a shared record of events

43
Q
A