Chapter 15 Flashcards
TPS
Transaction processing system
A transaction processing system ensure that all the day to day transactions are routinely processed to enable reporting by management.
Transaction processing systems are used by managers to report to board level and to enable decision making
An example of a TPS would be an accounting system which maintains all of the financial data of an organisation
MIS
Management information Systems
Collects and presents information to managers of a business in order to facilitate it’s control
Main function is to satisfy all the needs of management.
Provides regular formal information which is gleaned from TPS
DSS
Decision support system
Used to evaluate ‘what if’ type decisions. They work by using strategic planning tools to analyse a database of core information. They can be used to help the manager reach a decision
EIS
Executive information systems
This involves the management information presented in a user friendly concise format. Often more focused on KPI’s and don’t involve all the level of detail as some DSS
ES
Expert systems
These are used to simulate the advice provided by a professional such as a tax advisor. It allows people who are not experts to look at the system and recommend decisions based on the information it holds
Volume (Big Data)
The quantity of generated and stored data. The size of the data determines the value and potential insight, whether it can be considered big data or not
Variety (Big data)
The type and nature of the data. This helps people who analyse it to effectively use the resulting insight. Big data draws from text, images, audio, video and it can complete missing parts through data fusion
Velocity
In this context. The speed at which the data is generated and processed to meet the demand and challenges that lie in the path of growth and development. Big data is often available in real time. Compared to small data, big data are the frequency of generation and the frequency of handling, recording and publishing
Veracity
Whilst not a characteristic as such it is often necessary to consider the reliability, accuracy and quality of big data, particularly given the variety of sources
Data mining (Use of big data)
Analysis of data to identify hidden patterns.
Text analytics/Voice analytics
Analysis of text data by scanning
Statistical analytics
Identification of trends
Malware
Software designed to cause damage to computer
Phishing
Where an attacker encourages a user to take harmful action such as opening an infected document
Denial of service
Where an attacker tries to stop a service being offered through an attack of brute force e.g sending too much traffic to a website to slow or stop it