Final Flashcards

(72 cards)

1
Q

business process

A

a series of logically related business activities or tasks that accomplish a specific business goal
- a collection (flow) of related (linked or structured) activities, resources, or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

business process reengineering

A

organization’s activities that do not add value should be removed not accelerated through automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Seven principles of Business Process Reengineering

A
  1. organize around outcomes not tasks
  2. link parallel activities in the workflow instead of just integrating their results
  3. put the decision point where the work is performed and build control of the process
  4. treat geographically dispersed resources as though they were centralized
  5. integrate information processing work into the real work that produces the info
  6. capture info once and at the source
  7. identify all the organizations processes and prioritize them in order of redesign urgency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Problem Solving Process

A
  1. recognize the problem or question
  2. review previous findings
  3. model the situation and select the variables
  4. collect the data
  5. analyze the data
  6. present and act on findings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what do critics of BPR say

A
  • bpr is too expensive

- bpr is a way to dehumanize the work place, increase managerial control and justify downsizing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

unified modeling language (uml)

A

a standard set of diagramming techniques (visual language) for object oriented systems
-the object management group (omg) accepted UML as the standard for all object developers in 1997

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

structure diagram

A

class, object, package, deployment, component, composite structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Behaviour Diagram

A

activity, sequence, communication, interaction overview, timing, use-case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

example of cross industry innovations

A

the restaurant with the suitcase belt

the egg casing for wine bottles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Does innovation have to be new technology?

A

no, just have to use technology in a new way

a new innovative way to benefit the consumer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

focus of innovation

A

performance improvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

sustaining innovation

A

maintains or rejuvinates the current rate of performance improvements of the products and services that use them
-facilitates replacement of previous generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

disruptive innovation

A
  • different set of attributes than the current technology
  • initially not as good as current performance
  • performance improvement rate (slope) is higher then the rate demanded by the market
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

characteristics of disruptive innovation

A
  1. disruptive technology must MEET MARKET NEEDS ON CRITICAL PERFORMANCE dimensions in time
  2. NOVEL ATTRIBUTES of the disruptive technology may become a source of positive differentiation
  3. many disruptive innovations come from outside the established industry
  4. continued attention towards the most aggressive customers needs induces
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is innovation

A
  1. enabled by and dependent upon the CONNECTION OF STRATEGY, PROCESS, STRUCTURE AND CAPABILITY
  2. innovative enterprises achieve stronger growth and success
  3. enterprises that gain market share and increasing profitability are those that are innovative
  4. a critical enabler or significant barrier to an organizations ability to innovate remain its culture
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

4 ways in creating space for innovation

A
  1. connections: give people dedicated time, forums and physical space to make connections with people from across the organization
  2. ownership: establish processes and feedback loops that encourage people to contribute ideas
  3. confidence: people will dedicate time, energy, creativity, sweat if they believe that what they are doing will come to fuitition
  4. management examples: truly innovative cultures start at the top and get dramatically accelerated and amplified by middle managment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

steps in preventing project failure

A
  1. Feasibility
  2. assumptions
  3. implementation
  4. testing
  5. evaluation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

4 types of feasibility studies

A
  1. technical feasibility
  2. organizational feasibility
  3. economic feasibility
  4. schedule feasibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

technical feasibility

A
  1. familiarity with technology (can we use the technology to develop or modify it)
  2. project size
  3. compatibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

economic feasibility

A
  1. benefits
  2. development costs
  3. operating costs
  4. intangible costs
  5. cost benefit analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

organizational (operational) feasibility

A
  1. strategic alignment
  2. senior management support
  3. project champion(s) support (head of department using it)
  4. users
  5. other stakeholders
    - project needs support from all these people
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

schedule feasibility

A
  1. time constraint: project needs to be done by a certain time
  2. factors that affect schedule feasibility
  3. risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

the 3 dimensions achieved to create the quality that meets the expectation of all stakeholders in project management

A
  1. time
  2. cost
  3. scope
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

project charter

A

a document issued by the project initiator or sponsor that formally authorizes the existence of a project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what does a project charter contain?
1. project scope (tech, feasibility) 2. project objectives (cost benefit analysis) 3. project constraints (time constraints, economic feasibility) 4. project assumptions
26
project scope
``` set by defining the work that must be completed to deliver a product with specific features and functions -smart criteria Specific Measurable Agreed upon Realistic Time bound ```
27
project manager
- job is to manage people | - needs to talk to everyone so they have the same view
28
key focus points for project manager
communication and people managment that leads to change management
29
types of system development projects
1. waterfall 2. iterative 3. agile 4. incremental
30
waterfall model
-sequential design process used in software development in which progress is seen flowing steadily downwards (like a waterfall) through the phases of conception, initiation, analysis, design, construction, testing, production and maintenance. phase by phase: 1. analysis 2. design 3. Coding 4. Testing
31
Iterative Model
for a small set of functionality analysis and design will be completed first before preceding to coding and testing within same iteration - ex. analysis and design must be completed and then coding and testing - all seperate pieces and development models
32
Agile Model
- Analysis, design, code, testing and delivery of small functional pieces in iterations with short duration - move to second module only when the first module is finished
33
ways to convert old to new systems
1. parallel 2. pilot 3.phased 4. plunge (the diagrams are in notebook)
34
avoidance attitude toward usage (change management)
ill use it when im forced to
35
acceptance attitude of usage (change managment)
just tell me what to do and ill do it
36
Enthusiasm attitude toward usage (change management)
this is neat! ive got some thoughts for other uses of this and how to make it even better
37
technology acceptance model
1. perceived usefulness and perceived ease of use 2. intention to use 3. actual use
38
web 2.0
- brings multi way communication - its active - people participate - community/interest-centric
39
semantic web (3.0)
- based on your search history, what your search engine knows about you, the search will give you a certain answer - customizes search for best personal fit - face recognition
40
mash ups
a web application or website that uses content/service from more than one source
41
social media
- the media designed to be shared - open to anybody to post and posts are meant to be shared - social media in web 2.0 opens places for people to post to public and share with everyone
42
web generated contents
users are now publishers aswell there is no value without users -the value is zero with no place to post
43
what websites encompass all publishing, sharing, discussing, and networking
facebook and twitter
44
Do you have privacy with social media?
no
45
what does PIPEDA stand for
personal information protection and electronic documents act
46
10 principles of PIPEDA
1. accountability 2. identifying process 3. consent 4. limiting collection 5. limiting use, disclosure, and retention 6. accuracy 7. safeguards 8. openness 9. individual access 10. challenging compliance
47
what does PIPEDA do?
its a canadian law relating to data privacy -it governs how private sector organizations collect, use, and disclose personal information in the course of commercial business
48
Internet Security
- in the early stage, security was not a significant issue - only few experts were allowed (or able to) use computers - physical controls were needed to limit access to authorized personnel
49
how has the internet changed computer security
by bringing millions of computer networks into communication with eachother - and many of them are unsecure - ability to secure each computer now influenced by the security on every computer to which it is connected - weakest link
50
how did computer security evolve
from physical security into complex, multi-facilitated environment called into security
51
information security
the protection of information and its critical elements that use store and transmit information
52
elements of information security
1. software - application and operating system 2. hardware 3. people 4. data 5. procedures
53
security process ( what a successful process has)
1. people (executing) 2. policy: guidelines and direction 3. technology: the tools and materials
54
social engineering
tricking people into revealing their passwords by pretending to be legitimate users or members of a company in need of info
55
Encryption
``` 1. Sender (encrypt with a public key) 2. scrambled message (decrypt with private key) 3.recipient ```
56
what does Encryption do
- protects data from people with unauthorized access to computer - protect data in transit - deter and detect changes to data - authenticate the author of the data
57
what does Encryption not do
1. prevent deletion of data 2. be a complete defence - attacker gets keys or modifies encryption 3. be completely secure - attacker may find weakness in encryption 4. protect files before encryption
58
Corporate governance
the system of rules, practices, and processes by which a company is directed and controlled corporate governance essentially involves balancing the interests of many stakeholders in the company - these include its shareholders, management, customers, suppliers, financiers, government and the community
59
Cobit 4.0,4.1 it governance focus area
1. strategic allignment 2. value delivery 3. resource management 4. risk management 5. performance measurement
60
5 principles of Cobit 5.0
1. meeting stakeholders needs - governance is about negotiating and deciding amongst different stakeholders values and interest 2. Covering the enterprise end to end - integrates governance of enterprise IT into enterprise governance 3. applying a single integrated framework - Cobit 5 aligns with the latest relevent other standards and framworks used by enterprises 4. enabling a holistic approach 5. separating governance from management
61
Sarbanes Oxley
- as a reaction to high profile corporate fraud case (Enron and world com) - drafted by us Senator Paul Sarbanes
62
Section 404 of Sarbanes Oxley states
1. the responsibility of management for establishing and maintaining an adequate internal control structure and procedures for financial reporting 2. contain an assessment (yearly) of the effectiveness of the internal control structure and procedures of the issuer for financial reporting - includes documentation of control procedures related to it - the most expensive and time consuming section
63
operational risk
the risk of loss resulting from inadequate or failed internal processes, people, and systems or from external events (basel 2)
64
basel 3
- an international regulatory framework for banks - comprehensive set of reform measures, developed by the basel committee on banking supervision and risk management of the banking sector - compared to basel 2 with its major focus on operational risk, the basel 3 requirements cover a wider range of topic areas including the banks capital, liquidity, and risk management
65
3 approaches to funding IS
1. chargeback 2. allocation 3. showback
66
charge back
- the direct billing of IS resources and services to the function or department that uses them - grounded in the pay-per-use principle - charge back mechanisms are perceived as fair by the organization - they create accountability for both users and the IS function
67
allocation
- based on fairly stable indicators such as size, revenues, and number of users - seeks to strike a balance between pay-per-use fairness and the high cost of the chargeback method - the allocation approach creates more predictable department expenses
68
show back
- an it department does not preform any chargeback - however, it sends dummy invoices that each function or department would end up paying if chargeback was in place - internal control of IT expenses
69
outsourcing
- used as a means of funding information systems operated by engaging outside providers - the process of acquiring products or services that used to be created internally by the organization from an outside provider - information systems outsourcing is the process of contracting with an outside firm to obtain information systems services
70
outsourcing drivers
1. improving strategic focus 2. access to superior talent 3. reducing cost 4. financial appeal
71
risks of outsourcing
1. deceptive role of is a 2. the outsourcing paradox 3. hidden coordination costs 4. changing requirements
72
offshoring
process of engaging a foreign provider to supply the products or services the firms no longer intend to produce internally