Final Exam Prep Flashcards

1
Q

What is organizational strategy?

A
  • Planned approach an organization takes to achieve its goals and mission statement.
  • IT is used in operationalizing the organizational strategy.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is competitive advantage?

A

Advantage over competitors in some measure (quality, cost, speed) that ensures that an organization can survive. It creates control over market and profit generation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a business process?

A

Collection of related activities that together, produce a product/service of value to the organization, its business partners, and its internal/external customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three elements of business processes?

A
  • Inputs: Materials, services, information that flows and is transformed during business process activities.
  • Resources: People, equipment that allow the processes to take place.
  • Outputs: Products and services created by the processes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do business processes balance?

A

Effectiveness - Achieving the desired outcome and creating outputs of value

Efficiency - Doing things without wasting resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are cross-functional processes?

A

Processes where multiple organizational areas work together to produce a single output. The processes are coordinated and collaborative.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give examples of cross-functional processes.

A
  • Procurement

- Fulfillment`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of IS in business processes?

A
  • Executing the process: Informing employees, providing data, producing tools to complete the task.
  • Capturing and storing process data, giving ‘real-time feedback’.
  • Monitoring the process performance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What characterizes an excellent business process?

A
  • Customer satisfaction
  • Cost reduction
  • Cycle and fulfillment time reduction
  • Quality
  • Differentiation
  • Productivity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is business process reengineering (BPR)?

A
  • Radical top-down redesign of business processes;
  • Takes a ‘clean sheet’ perspective to examine business processes;
  • Propelled by unique capabilities of IT - automation, standardization, communication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is BPR difficult to implement?

A

The strategy is…

  • Difficult;
  • Radical;
  • High cost;
  • High-risk;
  • Length;
  • Comprehensive.

This makes it overwhelming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When should BPR be used?

A

When BPI is no longer effective, and/or when there is significant change in the business environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is business process improvement (BPI)?

A
  • Incremental, bottom up approach to move an organization towards business-process-centred operations.
  • Focuses on reducing variation in process outputs: Identifies the underlying cause of variation and generates quantifiable results.
  • Low-risk, low-cost, time-efficient.
  • All employees are trained.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To what extent should BPI be used?

A

Until such that employees are not overstressed, disinterested.
Managers need to be able to focus their efforts and effectively manage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Six Sigma?

A

Popular BPI methodology using statistical analysis to ensure that business processes have less than or equal to 3.4 defects per million outputs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the basic phases of successful BPI?

A
  1. Define: Document ‘as-is’ process activities, resources, inputs, outputs, customers. Describe the problem.
  2. Measure: Define the ‘baseline’, identify metrics, collect data, combine process data.
  3. Analyze: Examine the process map and metrics. Identify root causes using process simulation software.
  4. Improve: Identify possible solutions, map ‘to-be’ process alternatives, select and implement the solution that eliminates irrelevant activities.
  5. Control: Re-measure using the established metrics, monitor improvement.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What advantages do process simulation software bring?

A
  • Quick way to simulate for a specific amount of time;
  • Estimates process performance;
  • Allows for multi-scenario analysis;
  • Identifies bottlenecks, cycle times, resource allocation;
  • Risk-free, inexpensive.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is business process management (BPM)?

A

Management technique that consists of the tools and methods that support the design, implementation, and optimization of core business processes over time.

BPM integrates different BPI initiatives, ensuring a consistent strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the two components of BPM?

A
  • Process modelling: Graphical depiction of BP steps, relationships, IS, information
  • Business activity modelling: ‘Real-time’ measurements of business processes –> Create process reports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a business process management suite (BPMS)?

A

An integrated set of applications used for BPM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why is BPM advantageous?

A

Short-term: Profits, cost advantage.

Long-term: Competitive advantage, flexibility, customer satisfaction, compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the business environment?

A

Social, economic, legal, physical, political factors in which businesses conduct operations.

Change in a single factor creates business pressures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are market pressures?

A
  • Globalization
  • Changing workforce
  • Powerful customers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are technological pressures?

A
  • Technological innovations and obsolescence
  • Information overload
  • Digital divide
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are social/political/legal pressures?

A
  • Sustainability
  • Government regulations and deregulation compliance
  • Protection against terrorist attacks
  • Ethical issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How do organizations respond to business pressures?

A
  • Strategic systems
  • Customer-centred approach
  • Continuous improvement efforts ERP
  • Business process restructuring
  • Intelligent data management
  • On-demand mass customization
  • Business alliances
  • E-commerce
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a competitive strategy?

A

Statement that identifies how a business plans to compete, what its goals are, and the policies and plans that it undertakes to pursue those goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Why are IS strategic in nature?

A

They provide a competitive advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the five forces in Porter’s model that determine competitive advantage?

A
  • Threat of entry of new competitors
  • Bargaining power of suppliers
  • Bargaining power of customers
  • Threat of substitutes
  • Rivalry
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a value change?

A

The sequence of activities through which inputs are transformed into valuable outputs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

In Porter’s value chain model, what are primary activities and support activities?

A

PRIMARY
-Inbound logistics, operations, outbound logistics, marketing and sales, services

SUPPORT
-Administration, management, HR, R & D, procurement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What competitive advantage strategies can businesses take?

A
  • Cost leadership
  • Differentiation
  • Innovation
  • Opperational effectiveness
  • Customer orientation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is Business-IT alignment?

A

Tight integration of IT functions in the organizational strategy and the ensuing mission and goals. In this case, IT directly supports business objectives, by being an ‘engine of innovation’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Why is Business-IT alignment challenging?

A

Differing organizational and IT objectives;

Lack of recognition of expertise of each department;

Poor communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is IT governance?

A

Processes that ensure the effective and efficient use of IT, enable an organization to achieve its goals.

It is spearheaded by the CIO and the IT steering committee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are ethics?

A

Principles of right and wrong that guide people’s conduct and decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are the five primary ethical frameworks?

A
  • Utilitarian: The ethical decision is the one that produces the most good, does the least harm.
  • Rights: Recognizes that humans have fundamental rights that must be considered and fulfilled when making an ethical decision.
  • Justice: The ethical decision is the one that leads to fairness or equal profit.
  • Common good: Recognizes that as part of a community, one has an obligation to safeguard the basic conditions.
  • Deontology: The ethical decision is the one respecting the duties and obligations imposed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the traditional approach to resolving ethical issues?

A
  1. Recognize.
  2. Collect facts.
  3. Evaluate alternative actions.
  4. Make & test the decision.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the giving voices to values (GVV) approach to resolving ethical issues?

A
  1. Identify.
  2. Purpose & Choice.
  3. Stakeholder Analysis.
  4. Powerful Response.
  5. Scripting, Coaching.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the code of ethics?

A

Collection of principles intended to guide an organization’s members’ decision-making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the fundamental tenets of ethics?

A
  • Responsibility: Accepting consequences of decisions and actions.
  • Accountability: Determining who is responsible for decisions and actions.
  • Liability: Right to recover damage done by other individuals, organizations, systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is privacy?

A

Right (balanced against social needs) of people, groups, institutions to be left alone, free of unreasonable personable intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is information privacy?

A

RIght to determine when and to what extent information can be gathered and communicated to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What are threats to privacy?

A
  • Data aggregators, digital dossiers, profiling
  • Electronic surveillance
  • Personal information stored in databases
  • Information released on internet bulletin boards, in newsgroups, on social networking sites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

How is privacy protected?

A
  • Privacy codes and policies
  • Informed consent, using an opt-in model that prohibits information collection until specifically authorized, or an opt-out model that stops collecting information when specifically requested.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is a platform for privacy preferences (P3P)?

A

Protocol that automatically communicates privacy policies between a website and its visitors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the importance of high-quality information privacy?

A
  • Protects brand image and reputation.
  • Helps maintain and enhance trust, promotes confidence.
  • Helps achieve competitive advantage.
  • Ensures that legal requirements are met.
  • Reduces administrative and data handling costs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is information security?

A

Processes and policies that are designed to protect an organization’s information and IS from unauthorized access, use, disclosure, disruption, modification, or destruction.

Its goal is to minimize vulnerability and the potential exposure threat for information resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What factors increase the vulnerability of information resources?

A
  • Interconnectedness of today’s world
  • Access to cheaper, portable, faster computer devices and storage mediums
  • Decreasing skills needed to become a hacker
  • Organized crime
  • Lack of management support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What are human mistakes?

A

Unintentional errors resulting from carelessness, opening questionable emails, poor password selection and use.

Especially important when employees are high level and have high access privileges –> IT and HR departments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is social engineering?

A

Attack in which the perpetrator uses social skills to trick/manipulate a legitimate into providing confidential information, by…

  • Tailgating: Entering restricted areas;
  • Shoulder-surfing: Watching computer screens.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What are the types of deliberate attacks to IS?

A
  • Espionage/Trespass
  • Information Extortion
  • Sabotage/Vandalism
  • Theft of Equipment/Information
  • Identity Theft
  • Compromise to Intellectual Property
  • Software Attacks
  • SCADA Attacks: Attacks to specific sensors that control physical, chemical, transport systems.
  • Cyberterrorism
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What are the types of software attacks?

A

Malware: ‘Infection’
Virus: Attaching malicious segments to another program.
Worm: Spreading malicious segments.
Trojan horse: Reveals designated behaviour when activated.
Phishing attack: Deceptive communications.
Distributed denial-of-service attacks: Hijacking computers to form a ‘botsnet’, to flood internet traffic and preventing access to sites and services, by crashing the system.
Backdoor: Creating an unique password that allows without-security access.
Ransomware: Using encryption to deny access.
Alien software: Adware, spyware, spamware, cookies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is risk?

A

Probability that a threat will impact an information resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is risk management?

A

Identifying, controlling, minimizing the impacts of threats, thus reducing risk to an acceptable level.

Consists of risk analysis, risk mitigation, and controls evaluation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How can organizations ensure risk mitigation?

A
  • Acceptance
  • Limitation
  • Transference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What types of controls help minimize threats to information security?

A

-Physical controls

  • Access controls:
    (a) Authentication, using something the person is/has/does/knows, and
    (b) Authorization, by identifying privileges.

-Communication controls: Firewalls, anti-malware systems, whitelisting/blacklisting, encryption, VPN, Transport Layer Security, Employee Monitoring Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What are application controls?

A

Security countermeasures for specific functional area applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Where do password controls need to be supported?

A
  • Control environment - Enforce proper management
  • General controls - Login
  • Application controls - Specific passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is business continuity planning (BCP)?

A

Chain of events linking planning to protection to recovery, ensuring that critical systems are available and operating upon a disaster, and that normal operations can be restored ASAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

How is BCP implemented?

A

Using a hot site, warm site, and cold site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is information systems auditing?

A

The examination of IS, inputs, outputs, processing, efficiency, effectiveness.

Produces a report using established criteria and standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Why is data difficult to manage?

A
  • Amount of data increases exponentially: High volumes of Big Data
  • Data is scattered, dispersed
  • Data comes from many sources
  • Data becomes outdated
  • Data media rots
  • Data security, quality, integrity are critical, and can be compromised
  • Legal requirements need to be met
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is data governance?

A

The management of information across the entire organization, to generate a ‘single version of the truth’.
It involves a formal set of business processes and policies, a master plan for prevention and recovery.
It requires for well-defined, unambiguous manual and IT rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is master data management?

A

Strategic subset for implementing data governance. A process spanning across all business processes and applications.

Creates a master blueprint to store, maintain, exchange, and synchronize data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is transactional data?

A

Activities and events captured by operating systems, stored in transaction files, or as tables in a database.

High in volume, dynamic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is master data?

A

Core, static data spanning the entire organization’s information systems, applied to multiple transactions. It is stored in a master file, or as tables in a database.
It is used to categorize, aggregate, evaluate transactional data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What are database management systems (DBMS)?

A

Tools that help create and manage databases, minimizing redundancy, isolation, and inconsistency, while maximizing security, integrity, and independence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What does the data hierarchy consist of?

A

Bit: Single binary digit.
Byte: Group of 8 bits, representing a single character (letter, number, symbol).
Field: Logical grouping of characters that form a word, small group of words, or an identification number. It may contain multimedia.
Record: Logical grouping of related fields.
Data file/table: Collection of logically-related records that an application requires.
Database: Logical grouping of related data files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is a data model?

A

Diagram representing entities (records) in their databases, and the relationships ensuing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Each entity for which information is maintained is characterized by ___ and ___.

A

Instances and attributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What are primary, secondary, foreign keys?

A

Primary: Unique identifiers, for each record.
Secondary: Identifier that may or may not be unique.
Foreign: Field in one table that uniquely identifies a record in another table, enforcing and establishing a link between two tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is structured data?

A

Organized data in fixed fields, found in data repositories such as relational databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is Big Data?

A

Diverse, high-volume, high-velocity information assets require sophisticated information systems to enable enhanced decision-making, discovery, and process optimization. It is about making predictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Why is Big Data advantageous?

A
  • High volume of information

- Configured to self-improve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What does Big Data consist of?

A

Traditional enterprise data
Machine-generated sensor data
Social data
Images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What are the risks associated with Big Data?

A

It can come from untrusted sources;
It is dirty (inaccurate, incomplete, incorrect, duplicate, erroneous;
It changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is the value of Big Data?

A

It can be distributed to stakeholders, used to conduct experiments, used to microsegment customers, used to create new business models, and used to analyze further data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is Query by example (QBE)?

A

Query language that allows users to fill out a grid/template, constructing a sample/description of the data that needs to be extracted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What are the advantages of data marts/warehouses, over databses?

A
  • Search-friendly
  • Read-only (no extra processing)
  • Access multiple records simultaneously (consolidated data)
  • Can be used for extensive user analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What is a data warehouse?

A

Repository of historical data, organized by subject, used to support decision-making. It is used by large companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What is a data mart?

A

Scaled-down data warehouse, that means the needs of Strategic Business Units. Allows for local control and an eased implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What characterizes data warehouses and data marts?

A
  • Organized by subjects
  • Uses Online Analytical Processing (LAP)
  • Integrated data
  • Time-variant: Historical and recent data
  • Non-volatile data
  • Multidimensional structures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What does a data warehouse environment include?

A
  • Source systems that provide data
  • Data integration technology that processes and prepares data for use
  • Data storing architecture
  • Metadata
  • Business Intelligence governance
  • Users (information consumers and producers)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What is a data lake?

A

A central repository storing all organization data, regardless of its source, format, structure, and degree of consistency.

Uses ‘schema-on-read’ architecture, not transforming data until it is actually used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What is knowledge management?

A

A process that helps organizations manipulate important knowledge that forms an organization’s memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What is knowledge?

A

Actionable, relevant, contextual information (Intellectual capital), consisting of both explicit and implicit/tacit knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What are knowledge management systems (KMS)?

A

The use of modern IT to systematize, enhance, and expedite intrafirm and interfirm knowledge management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What is the KMS cycle?

A

Rationale: Knowledge is dynamically refined over time.

Create –> Capture –> Refine –> Store –> Manage –> Disseminate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What is a structured query language?

A

Tool that allows users to perform complicated searches, using relatively simple statements/keywords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What is normalization?

A

Method for analyzing and reducing a relational database to its most streamlined form, minimizing redundancy, maximizing data integrity, and ensuring best processing performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What is e-commerce?

A

The process of buying, selling, transferring, or exchanging products, services, and information via computer networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What is e-business?

A

Broader definition of e-commerce that also includes customer service, partner collaboration, e-learning, and intraorganizational e-transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What is an organization’s degree of digitization?

A
  1. Brick and mortar: Purely physical organizations in which both product and delivery agents are physical.
  2. Virtual: Pure-play, digital-only organizations using e-commerce exclusively.
  3. Click and mortar: Partial use of e-commerce, but use of showrooming.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

What types of e-commerce exist?

A

B2B, C2C, B2C, B2E, G2C (E-government), M-Commerce, Social Commerce, Conversational (Chat) Commerce.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What are the primary e-commerce business models?

A
  • Online direct marketing
  • E-tendering systems (B2B - Reverse auctions)
  • Name-your-own-price
  • Find-the-best-price
  • Affiliated marketing
  • Viral marketing
  • Group purchasing
  • Online auctions
  • Product customization
  • E-marketplaces, e-exchanges
  • Online bartering
  • Deep discounters
  • Membership-based access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What are the primary e-commerce mechanisms?

A
  • E-catalogues: ‘Backbone’ of e-commerce sites, including a database, a directory, search capabilities, and a presentation function
  • E-auctions: Competitive selling/buying where prices are determined by competitive bidding. When conducted electronically, the cycle time is reduced, administrative costs are eliminated, and there is a bigger customer base. Forward auctions occur when sellers solicit bids from potential buyers, whereas reverse auctions occur when a buying company solicits bids from potential suppliers, through a ‘Request for Quotation’.
  • E-storefronts: Websites that represent a single store.
  • E-malls: Consolidated collection of individual shops.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What are the various forms of e-payment?

A
  • E-cheques (used in B2B)
  • Electronic credit cards
  • Purchasing cards (used in B2B, equivalent of e-credit cards)
  • Stored value money cards
  • EMV smart cards
  • Payment gateways
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What are the pros of e-commerce?

A
  • Accessibility to national, international markets
  • Cost savings
  • Accessibility to vast products and services
  • 24/7 availability
  • Delivers to all areas, including developing and rural ones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What are the limitations to e-commerce?

A
  • Lack of universally-accepted standards
  • Insufficient telecommunications bandwidth, expensive Internet access in developing countries
  • Perception that e-commerce is insecure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What is the primary challenge in B2B?`

A

Large number of buyers, small number of sellers, abundant transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

What is e-tailing?

A

Direct sale of products and services through e-storefronts/e-malls, using e-catalogues and e-auctions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Why is e-tailing advantageous to retailing?

A

It allows for easy comparison, detailed product information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What is long-tailing?

A

Selling a large number of unique items, each in small quantity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

What issues arise in e-tailing?

A

Channel conflicts, when manufacturers disintermediate their channel partners, by selling products directly to consumers over the internet.

Multichannelling, which causes potential difference prices in offline and online channels.

Supply chain issues during order fulfillment, including locating the product to be shipped, packaging the product, arranging for speedy customer delivery, and handling returns.

Personalized pricing, where items are priced based off consumers’ willingness to pay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

What is the online services industry?

A

The industry that consists of fintech, online securities trading, online jobs markets, travel services, and online advertising.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What various methods are used for online advertising?

A

Banners, pop-up ads, pop-under ads, permission marketing, viral marketing/spanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

What the primary B2B business models?

A
  • Sell-side marketplaces: Organizations that sell to other organizations electronically, using their own e-marketplace of that of a third party. Use of forward auctions, e-catalogues, and third-party auction sites.
  • Buy-side marketplaces: Organizations buying from other organizations electronically, using reverse auctions and group purchasing.
  • Electronic exchanges:
    (a) Private: Many sellers, one buyer;
    (b) Public: Third-party exchanges, as initial points of contact between business partners. They can be vertical (within-industry), horizontal (across-industry), and functional (as-needed).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

What are ethical and legal issues pertinent to e-commerce?

A
  • Threats to privacy
  • Job loss
  • Internet fraud
  • Domain name competition
  • Cybersquatting: Registering, trafficking, using an Internet domain name with bad faith intent, to profit from the goodwill of a trademark belonging to someone else
  • Domain tasting
  • Collection of taxes and other fees
  • Copyright
110
Q

What is meant by ‘wireless’?

A

Refers to telecommunications in which electromagnetic waves, rather than wires/cables, carry signals between communicating devices.

Contrasts from ‘mobile’, which means something that changes location over time.

111
Q

What is mobile computing?

A

Real-time, wireless connection between a mobile device and other computing environments.

112
Q

What is mobile commerce?

A

E-commerce transactions that are conducted using a mobile device.

113
Q

What is the Internet of Things?

A

Scenario in which objects, animals, people are provided with unique identifiers and are granted the ability to automatically transfer data over a network, without requiring for human-to-human or human-to-computer interaction.

114
Q

Wireless technologies include…

A

Wireless devices and wireless transmission media.

115
Q

Why are wireless devices advantageous?

A
  • Small enough to carry/wear;
  • Sufficient computing power to perform productive tasks;
  • Communicate wirelessly with the Internet, and other devices.
116
Q

What is dematerializaiton?

A

Found in modern smartphones, the process that occurs when functions of many physical devices are included in a single physical device.

117
Q

What is the risk posed by the use of smartphones?

A

Information confidentiality.

118
Q

What are the three types of wireless transmission media?

A

Microwave - Electromagnetic waves

Satellite - Communication satellites

Radio - Radio wave frequencies

119
Q

What are the pros/cons to microwave wireless transmission media?

A

Pros: High-volume, large-distance

Cons: Environmental interference, line-of-sight required

120
Q

What are the pros/cons to satellite wireless transmission media?

A

Pros: High bandwidth, large coverage area

Cons: Line-of sight required, expensive, incurs a propagation delay, encryption is used for security

121
Q

What are the pros/cons to radio wireless transmission media?

A

Pros: Signals travel through office walls, inexpensive, easy to install, data passes at high speeds

Cons: Electrical interference, susceptibility to snooping

122
Q

What are the three types of satellites circling the Earth?

A

Geostationary-earth-orbit (GEO): Few satellites for global coverage, transmission delay, expensive to build and launch, long orbital life, used in TV signals. Stationary relative to point on Earth.

Medium-earth-orbit (MEO): Moderate number of satellites for global coverage, requires medium-powered transmitters, negligible transmission delay, less expensive, used in GPS. Move relatively to point on Earth.

Low-earth-orbit (LEO): Satellites move rapidly, large number needed for global coverage, least expensive, used for telephones.

123
Q

What are global positioning systems (GPS)?

A

Wireless systems that use satellites, from which users can determine their position anywhere on Earth.

Used for navigation, 911, mapping, surveying.

Supported by MEO satellites shared worldwide.

124
Q

What is Internet over Satellite (IoS)?

A

Allows for Internet connection without cables. An inexpensive means wherein users access Internet from GEO satellites, using a dish mounted on the side of their homes.

125
Q

What is commercial imaging?

A

A satellite application using nanosatellites.

Generates Earth images used for tracking moving objects, zooming in on physical objects, and examining land and sky.

126
Q

What is satellite (digital) radio?

A

Offers uninterrrupted, near-CD quality transmission beamed to your radio, from space?

127
Q

What is Google Loon?

A

Ballons providing Internet access, by creating aerial wireless networks.

128
Q

What are Internet blimps?

A

SuperTowers providing the functionality of cellular towers, but with a larger footprint.

129
Q

What are the different types of wireless network threats?

A
  • Rogue access point: Unauthorized access point
  • Evil twin attack, that may use a hotspotter
  • War driving
  • Eavesdropping
  • Radio frequency (RF) jamming
130
Q

What are the varying types of short-range wireless networks?

A
  • Bluetooth: Creates personal-area networks used for communications among computer devices, located to one person.
  • Ultra-wideband
  • Near-field communication
131
Q

What are the types of medium-range wireless networks?

A

Wireless local area networks (WLANs)

(a) Wi-Fi: The transmitter’s antenna is used as a ‘wireless access point’, with it being the ‘hotspot’ that services users in a small geographical perimeter.
(b) Wi-Fi Direct: Peer-to-peer communication within a hotspot, without a wireless access point.
(c) Mi-Fi: Small, portable wireless device providing users with a permanent Wi-Fi hotspot.
(d) Visible communications system using light to transmit data and position.

132
Q

What are the types of wide-area wireless networks?

A
  • Cellular radio

- Wireless broadband (WiMAX)

133
Q

What is throughput?

A

The actual amount of bandwidth available for use.

134
Q

What are the characteristics and value-added attributes of mobile computing?

A

Characteristics: Mobility & broad reach

Value-added characteristics: Ubiquity, convenience, instant connectivity, customization, localization

135
Q

What are the drivers of m-commerce?

A
  • Widespread availability of mobile devices;
  • Declining prices of devices;
  • Bandwidth improvement.
136
Q

What are the various types of m-commerce applications?

A
  • Financial services
  • Location-based applications and services
  • Mobile advertising
  • Intrabusiness applications
  • Information access
  • Telemetry (remote sensors)
137
Q

What is the underlying technology to the Internet of Things?

A

Wireless sensors: Autonomous devices that monitor its own condition, as well as physical and environmental conditions around it, collecting data from many points over an extended space.

138
Q

What is radio-frequency identification (RFID) technology?

A

Technology that allows manufacturers to tag product with antennas and computer chips, to then track movement using radio signals/

Active RFID tags use internal batteries for powers and and broadcast radio waves to a reader, over greater distances.

Passive RFID tags rely entirely on readers for power.

139
Q

Why were bar codes replaced by RFID?

A
  • Require line-of-sight;
  • Paper can be ripped, lost, soiled;
  • Identifies the product and manufacturer, not the actual item.
140
Q

Why are QR codes better than bar codes?

A
  • Store much more data;
  • Store many types of data;
  • Smaller in size (horizontal and vertical info);
  • Can be read from any direction/angle;
  • Resistant to damage.
141
Q

Where is IoT used?

A

Smart home, digital twins, health care, automotive industry, SMC, environmental monitoring, infrastructure and energy management, agriculture, transportation, farming.

142
Q

What is a transaction processing system (TPS)?

A

System that supports the monitoring, collection, and processing of data generated from basic business transactions.

143
Q

How can TPS process data?

A
  • Batch processing: Data is collected in real time, grouped in batches, and processed periodically.
  • Online transaction processing (OLTP): Data is collected in real time, processed instanteously.
144
Q

What characterizes TPS?

A
  • Continuous, real-time data collection;
  • Critical in nature, by supporting core operations;
  • Efficiently handle high volume, varied data;
  • Inputs to FAIS, BI systems, business operations;
  • Avoid errors and downtimes;
  • Records results accurately and securely, generating detailed reports.
145
Q

What are functional area information systems (FAIS)?

A

IS supporting particular functional areas, increasing that area’s efficiency and effectiveness, conveying information in a variety of reports.

146
Q

In which functional areas are FAIS employed?

A

Accounting and finance, marketing, operations, HR management.

147
Q

What is the product life-cycle management?

A

A business strategy that enables manufacturers to share product-related data that supports product design, development, and supply chain operations, all using web-based technologies.

148
Q

What different types of reports can be generated?

A
  • Routine
  • Ad-hoc (on-demand): Drill-down, key indicator, comparative
  • Exception
149
Q

What are enterprise resource planning (ERP) systems?

A

Systems correcting the lack of communication among FAIS. ERP systems tightly integrate FAIS through a common database, enabling communication to flow seamlessly among them.

150
Q

What are ERP II Systems?

A

Interorganizational ERP systems providing web-enabled links among a company’s key business systems and its customers, suppliers, distributors, etc by integrating internal-facing ERP applications with externally-focused SCM and CRM.

151
Q

What are the core ERP modules?

A
  • Accounting and Financial Management
  • Operations Management
  • HR Management
152
Q

What are extended ERP modules?

A
  • CRM
  • SCM
  • Business Analytics
  • E-Business
153
Q

What are the pros to ERP?

A
  • Organizational flexibility and agility
  • Decision support tools
  • Improved business processes
154
Q

What are the limitations of ERP?

A
  • May need to change business processes, to fit the pre-defined ones in the ERP software
  • Could result in loss of competitive advantage
  • Complexity, costs, and time in implementation
155
Q

Why does ERP implementation fail?

A
  • Failure to involve affected employees in planning, developing, managing change
  • Doing too much, too fast when converting
  • Insufficient training
  • Failure to properly convert data and test
156
Q

How are ERPs implemented on-premise?

A
  • Vanilla approach: Standard ERP package, built in configuration options
  • Custom approach: Specifically-developed functions
  • Best-of-breed approach: Mixes and matches ERP modules from various suppliers.
157
Q

How can ERPs be implemented off-premise?

A

Software-as-a-Service vendors that rent out ERP systems, with this vendor assuming responsibility for maintenance and updates.

158
Q

What are the pros to cloud-based ERP systems?

A
  • Can be used from any location (secure VPN)
  • Avoidance of initial hardware, software expenses
  • Scalable solution (new ERP modules can be purchased)
159
Q

What is an alternative to ERP systems?

A

Enterprise Application Systems (EAI), integrating existing systems using software as the ‘middleware’ to connect multiple applications.

160
Q

What business processes do ERP systems support?

A

Cross-functional processes, including procurement, fulfillment, production.

161
Q

What is ERP Supply Chain Management?

A

A system with the capability to place automatic purchase requests from suppliers.

162
Q

What is ERP Customer Chain Management?

A

System that forecasts analyses of product consumption, based on critical variables.

163
Q

What is customer relationship management (CRM)?

A

Customer-focused, customer-driven organizational strategy that aims to maximize a customer’s lifetime value and minimize customer churn.
Assesses customer requirement to provide a high-quality, responsive customer experience, creating customer intimacy.
Uses IT systems and applications.

164
Q

What are the steps in the CRM process?

A
  1. Solicit prospects
  2. Turn prospects into customers
  3. Turn customers into repeat customers
  4. Identify high and low value repeat customers
165
Q

What is customer churn?

A

The process by which organizations inevitably lose a certain % of their customers.

166
Q

What are CRM systems?

A

IS designed to support an organization’s CRM strategy, providing the infrastructure for doing so.
Consists of two components: Operational and analytical CRM systems.
Implementation can be done on-premise, or on-demand.

167
Q

What differentiates high and low-end CRM systems?

A

Low-end CRM systems are designed for enterprises with many small customers.
High-end CRM systems are designed for enterprises with a few large customers.

168
Q

What characterizes successful CRM policies?

A
  • Identifies many types of customer touchpoints, the interactions between organizations and customers.
  • Consolidates customer data using a data warehouse, providing a 360 degree view.
169
Q

What are collaborative CRM systems?

A

Systems providing effective and efficient, interactive communication with the customer, such as direct feedback.

170
Q

What is customer identity management?

A

In the setting of large businesses that have several offerings and brands, knowing who customers are, and how relationships with them have evolved.

171
Q

What are operational CRM systems?

A

Systems that support front-office processes by using a unified repository to store customer information, deals and leads.

Includes both customer-facing and customer-touching applications.

172
Q

What are the advantages of operational CRM systems?

A
  • Provide efficient, personalized marketing, sales, service;
  • Ensures customer satisfaction and profit maximization, by enabling a 360 degree customer view;
  • Builds effective relationships by granting employees access to historical customer information.
173
Q

What are customer-facing applications?

A
  • Applications in which sales/service/field representatives interact directly with customers.
  • Includes Customer Service and Support, Call Centres;
  • Includes Salesforce Automation, which automatically records sale transaction data;
  • Includes Campaign Management;
  • Includes Marketing, to cross-sell, up-sell, bundle products.
174
Q

What are customer-touching applications (e-CRM)?

A

Technologies through which customers interact directly with applications themselves.

Includes search & comparison, customization of products/services, personalized pages, FAQs, technical/other information, emails & automated responses, loyalty programs.

175
Q

What are analytical CRM systems?

A

Systems that analyze customer behaviour and perceptions, providing actionable business intelligence.

176
Q

What are the goals of analytical CRM systems?

A
  • Designing, and executing targeted marketing campaigns;
  • Increasing customer acquisition, cross-selling, upselling;
  • Providing input into decisions related to products and services;
  • Providing financial forecasting and customer profitability analysis.
177
Q

What is on-demand CRM?

A

CRM systems hosted by an external vendor, in that vendor’s data centre. While it resolves the expenses, time, and flexibility concerns with on-premise CRM systems, the vendor may be unreliable, and the organization does not have control over the system, meaning it cannot change it, and may be subject to privacy/security breaches.

178
Q

What is mobile CRM?

A

Interactive CRM systems enabling organizations to conduct sales, marketing, and customer service activities using a mobile medium.

179
Q

What are open-source CRM systems?

A

Systems whose source code are available to developers and users. While they offer favourable pricing, customization, systems maintenance and upgrade, and support information, they are subject to poor quality control.

180
Q

What are social CRM systems?

A

Systems using social media technology and services to enable organizations to engage customers in a collaborative conversation. This provides mutually-beneficial value, in a trusted, transparent manner.

181
Q

What are real-time CRM systems?

A

CRM systems that respond to customer product searches, requests, complaints, and comments in real time, 24/7/365.

182
Q

What are supply chains?

A

The flow of materials, information, finances (money), and services, from raw material suppliers, through factories and warehouses, to end customers.

183
Q

Why are trust and collaboration important in supply chains?

A

Visibility - Ability for all organizations to access/view relevant data on purchased materials and outbound goods.

Inventory Velocity - Speed of product and service delivery, upon receiving input material.

184
Q

What are the segments of supply chains?

A

Upstream flows, sourcing and procuring from external suppliers.

Downstream flows, distributing and delivering products to customers.

Internal flows, packaging, assembling, and manufacturing products.

Reverse flows, for product returns.

185
Q

What are the three supplier tiers?

A

1 - Integrated components;

2 - Subassemblies;

3 - Basic products

186
Q

What is supply chain management (SCM)?

A

SCM has the function of planning, organizing, and optimizing the various activities performed along the supply chain, to improve business processes.

187
Q

What are the steps in SCM?

A
  1. Plan: Develop metrics that monitor the efficiency, quality, value, and costs of supply chains;
  2. Source: Choose suppliers to deliver input materials;
  3. Make: Establish production, testing, packaging, and delivery processes; Assess using quality, production, worker productivity metrics;
  4. Deliver: Coordinate orders, develop warehouse networks, select carriers, create invoicing systems.
  5. Return: Receive and support defective, unwanted, excess products.
188
Q

What are the advantages to SCM?

A
  • Reduce costs of routine business transactions;
  • Improve quality, transfer, and processing of information flow;
  • Compresses cycle time;
  • Eliminates paper processing;
  • Reduce uncertainty and risk.
189
Q

What is the push model?

A

Made-to-stock model in which mass production is based on a forecast.

190
Q

What is the pull model?

A

Make-to-order model in which production begins only after a customer order is received. Mass customization model.

191
Q

What are typical supply chain problems?

A
  • Poor customer service
  • Poor product quality
  • Untimely delivery
  • High inventory costs
  • Loss of revenues
  • Bullwhip effect: Erratic shifts in order quantity, up and down the supply chain.
192
Q

How do organizations overcome supply chain issues?

A
  • Vertical integration: Business strategy in which a company purchases its upstream suppliers, to ensure that there is consistent availability.
  • Just-in-time inventory system (JIT): Minimize inventory on hand by delivering only the required amount of work-in-process inventory to allow for assembly.
  • Information sharing, using Vendor-Managed Inventory (VMI).
193
Q

What technologies support SCM?

A
  • Electronic Data Interchanges (EDI): Communication standards enabling business partners to exchange routine documents electronically. This minimizes errors, maximizes security, efficiency, productivity, customer service. However, business processes may need to be restructured to fit EDI standards, and the initial investment is large.
  • Extranets: Use of VPN technologies to link business partners over the Internet.
  • Corporate portals, for procurement/distribution.
194
Q

What is business analytics (BA)?

A

Process of developing actionable decisions/recommendations based on insight generated from historical data.

Uses a variety of tools, formulates descriptive/predictive/prescriptive analytics models, and communicates results to organizational decision-makers.

195
Q

What is business intelligence (BI)?

A

Applications, technologies, and processes that gather, store, grant access to, and analyze data, with the goal of enabling better decision-making.

196
Q

What is management?

A

Process by which an organization achieves its goals, using its resources.

197
Q

What is productivity?

A

Measure of success - ratio between the inputs and outputs a manager is responsible for.

198
Q

What are the manager’s three basic roles (Mintzberg)?

A
  • Interpersonal
  • Informational
  • Decisional
199
Q

What is a decision?

A

A diverse, continuous choice made between two or more alternatives.

200
Q

What are the phases to the decision-making process?

A
  • Intelligence: Examining the situation and identifying the problem/opportunity.
  • Design: Constructing a simplified model using assumptions and relationships. Evaluating the model and other alternatives, using test data and set criteria.
  • Choice: Selecting the solution/course of action that is best suited.
201
Q

Why do managers need IT support?

A
  • Increased number of alternatives available;
  • Increased time pressures for decision-making;
  • Increased complexity of decisions;
  • Geographically-dispersed people, information.
202
Q

What is the framework for computerized decision analysis?

A

A framework that places all problems on two dimensions:

  1. Degree of problem structure;
  2. Nature of decision-making (operational, management, strategic)?
203
Q

How are analytics used in organizations?

A
  • Departmental needs: Analytical applications
  • Enterprise-wide needs: Infrastructure
  • Organizational needs: Business strategy/model
204
Q

What are the steps in the business analytics process?

A
  1. Define the business problems/organizational pain points;
  2. Collect and manage data using the Extract, Transform, Load (ETL) process, sending the data to the warehouse;
  3. Use descriptive, predictive, and/or prescriptive analytics;
  4. Present findings using presentation tools;
  5. Take actionable business decisions, or recommend actions.
205
Q

What technologies enable business analytics?

A
  • Increasingly powerful chips (GPUs);
  • Cheaper, high-volume storage;
  • Increasingly faster broadband internet;
  • Neural networks;
  • Machine learning;
  • Deep learning.
206
Q

What are descriptive analytics?

A

Summarizes past occurrences, and uses them as learning opportunities.

207
Q

What BI applications are used for descriptive analytics?

A
  • Excel and other statistical procedures
  • OLAP - Online Analytical Processing
  • Data mining
  • Decision Support Systems (DSS) that perform ‘What-If’, Sensitivity, and Goal Seeking Analysis.
208
Q

What are predictive analytics?

A

Examines recent and historical data to detect patterns and predict future outcomes and trends.

209
Q

Where are data mining applications used?

A

Retailing and sales, banking, manufacturing and prorduction, insurance, police work, health care, marketing, politics, weather, and social good.

210
Q

What are prescriptive analytics?

A

Recommends one or more courses of actions and identifies, quantitatively, the outcome of each decision.

211
Q

What prescriptive analytics tools do organizations use?

A

Simulation, decision trees, optimization.

212
Q

What are dashboards?

A

User-friendly, graphics-supported presentation tool that provides easy access to timely information and management reports.

Enables management to examine exception reports and to drill down into detailed data.

213
Q

What capabilities do dashboards have?

A
  • Drilling down;
  • Identifying critical success factors (CSFs) and key performance indicators (KPIs);
  • Providing for status access (real-time information);
  • Trend analysis methods;
  • Exception reporting.
214
Q

What are geographic information systems?

A

Computer-based systems for capturing, manipulating, and displaying data using digitized maps (geocoding).

215
Q

What is an application portfolio?

A

A generalized, prioritized list of both existing and potential IT applications that the organization wants to add and modify as needed.

216
Q

How do organizations plan and justify IT application acquisition?

A
  • They must assess whether the IT application is needed;

- The application needs to be justified in terms of its costs and benefits.

217
Q

What is IT planning?

A

The first step in the acquisition process, where strategically, the organization’s objectives and resources are modified to match changing markets and opportunities.

218
Q

What is the organizational strategic plan?

A

The plan that identifies the organization’s mission, goals, and how it will achieve its goals.

219
Q

What is IT architecture?

A

The technical and managerial information resources that an organisation possesses to accomplish its mission.

220
Q

What is the IT strategic plan?

A

The set of long-term goals that describe IT infrastructure. The plan identifies the major IT initiatives needed to achieve organizational goals.

The IT strategic plan must be aligned with the organization’s strategic plan, provide for an IT architecture that seamlessly networks users/applications/databases, and efficiently allocate IS development resources among competing projects to ensure that these projects can be completed on time and within budget.

221
Q

Who does the IT steering committee comprise?

A

Managers and staff that represent various organizational units.

222
Q

What is the role of the IT steering committee?

A

Establish IT priorities and ensure the MIS function meets organizational needs.

223
Q

What is the IS operational plan?

A

The clear set of projects that an IS department and functional area managers will execute, in support of the IT strategic plan.

It includes the mission statement of the IS function, the IT environment, the objectives/constraints of the IT function, the application portfolio, and resource allocation/project management.

224
Q

Why are costs difficult to assess in IT investments?

A
  • Fixed costs are hard to allocate among differing IT projects;
  • Continuous costs for maintenance, debugging, and system improvement need to be predicted.
225
Q

Why are benefits of an IT investment difficult to assess?

A
  • Benefits are often intangible;

- Organizations use IT for multiple purposes.

226
Q

How can cost-benefit analysis for an IT investment be done?

A
  • Net Present Value (NPV)
  • Return on Investment: Net income generated / Resources invested
  • Break-Even Analysis
  • Business Case
227
Q

What are the four decisions in choosing an IT application strategy?

A

How much code to write?
How to pay for the application?
Where to run the application?
Where to originate the application?

228
Q

Why are pre-written applications advantageous?

A
  • Many different types of off-the-shelf software available;
  • Companies can test out software before purchasing;
  • No time needed to build the application;
  • No special project personnel hired.
229
Q

What are the cons to pre-written applications?

A
  • The application may not need the company’s exact needs;
  • The software may be difficult to modify or require changes in the business processes, to implement;
  • The company may not have control ofter software improvements, and the priorities of the vendor may be misaligned;
  • It is difficult to integrate purchased applications with existing systems;
  • Vendors could suddenly discontinue a product, or go out of business;
  • Knowledge is not gained as to the functionality of the software.
230
Q

When should pre-written applications NOT be customized?

A
  • Expensive software;
  • Software will become obsolete soon;
  • Software is difficult to customize.
231
Q

Who are application service providers (ASPs)?

A

Vendors assemble software needed by organizations and package it with related services (development, operations, maintenance). The customer accesses the software over the Internet.

232
Q

Who are Software-as-a-Service (SaaS) vendors?

A

‘Hosts’ for applications, that provide service over a network.

Used by SME that cannot invest abundantly.

233
Q

What is the 80/20 rule?

A

When a software meets 80% of a company’s needs, the company should consider modifying its business processes so that the remaining 20% can be used.

234
Q

What is continuous application development?

A

Strategy by which new computer code is steadily added to a software project.

235
Q

What is the systems development life cycle (SDLC)?

A

The traditional method for developing in-house software, through which….

  1. Systems investigation –> Feasiblility study
  2. Systems analysis
  3. Systems design
  4. Programming and testing
  5. Implementation through direct/pilot/phased/parallel conversion
  6. Operations and maintenance
236
Q

What is scope creep?

A

Adding in functions upon initiation of a project, which then may risk for the project to go over its anticipated budget and time frame.

237
Q

How are users and developers involved in the SDLC?

A

They are most involved in the investigation and operations/maintenance phases.

238
Q

Who is involved in SDLC?

A

Users, system analysts, programmers, technical specialists, and system stakeholders.

239
Q

What are the pros of SDLC?

A
  • Control
  • Accountability
  • Error detection
  • Completeness
240
Q

What are the cons to SDLC?

A
  • Excessive documentation
  • Time
  • Costs
  • User’s lack of willingness to study the specifications
  • Difficulty describing requirements
  • Inflexibility
241
Q

What is Joint Application Design?

A

Group-based application development approach in which both developers and users meet and agree upon system requirements.

242
Q

What are the pros to JAD?

A
  • Involves many users;
  • Saves time;
  • Generates greater user support;
  • Improves quality;
  • Lower training costs;
  • Easy to implement
243
Q

What are cons to JAD?

A

It may be hard to get all to attend the JAD meetings.

244
Q

What is rapid application development (RAD)?

A

Systems development method combining JAD, prototyping, and iCASE tools, producing a high-quality system rapidly.

Iterative development process in which requirements, designs, and systems are done up rapidly, then improved.

Only produces the functional components to final systems.

245
Q

What are the advantages to RAD?

A
  • Speeds up the system development;
  • Extensively involves users, right from the start;
  • Improves the process of rewriting legacy applications.
246
Q

What is agile development?

A

Systems development method that delivers functionality in rapid iterations (weeks).

It requires for frequent communication, development, testing and delivery.

Additional user requirements are met as they emerge.

247
Q

What is the scrum approach?

A

An agile development approach.

248
Q

Why is end-user development advantageous?

A

It bypasses the delays that could be caused by the IT department;
The user controls the applications and implements changes as needed;
It directly meets user requirements;
It frees up IT resources.

249
Q

What issues are associated with end-user development?

A
  • IS department may eventually need to perform maintenance;
  • Inadequate documentation;
  • Poor quality control;
  • May not easily be integrated;
  • Vulnerabilities associated with by-passing IT department security.
250
Q

What is DevOps?

A

A development strategy that brings together users and developers, to meet the increased business pressures of the current state of business.

This reduces deployment time, increases the usability of the final product, and lowers the cost of development.

251
Q

What is prototyping?

A

An approach that first defines a list of user requirements, builds a model upon this, and refines the system in several iterations, based off user feedback.

252
Q

What are the pros to prototyping?

A
  • Clarifies user requirements;
  • Verifies design feasibility;
  • Promotes user participation and develops relationships between developers and users;
  • Works well for ill-defined problems;
  • Produces parts of the final systems.
253
Q

Why could prototyping be disadvantageous?

A
  • It may inadequately analyze the problem;
  • Impractical, when there are an extensive number of users;
  • Incomplete system - Lower quality;
  • Users may not want to give the system up when implemented.
254
Q

What are integrated computer-assisted software engineering tools (iCASE tools)

A

Upper CASE tools automate the early SDLC stages, while lower CASE tools automate the later SDLC stages.

255
Q

What are the advantages of iCASE tools?

A

Systems that employ iCASE tools have longer operational life, better meet user requirements, have a faster development process, are more flexible/adaptive to changing business conditions, and provide for excellent documentation.

256
Q

What are the cons to iCASE tools?

A

They are difficult to build and maintain;
User requirements must be well-defined;
It is difficult to customize the end product.

257
Q

What is computer-based development?

A

The use of standard components to build applications, meaning that less programming is required, simply more assembly.

258
Q

What is object-oriented development?

A

Computer programming model that organizes software design around data/objects, rather than functions/logic.

259
Q

What are containers?

A

A method of software development that runs independently of the base server operating system.

The technology is developed, tested, and deployed analogously, in practice and in testing/

260
Q

What is low-code development?

A

Use of virtual interface platforms to develop applications, rather than traditional procedural hand-coding.

261
Q

What are challenges faced by traditional IT departments that use on-premise computing?

A
  • Costs
  • Capacity use
  • Data management
  • Responsiveness
262
Q

What is cloud computing?

A

Computing delivering convenient, on-demand, pay-as-you-go access to multiple customers, to a shared pool of configurable computing resources that can rapidly and easily be accessed over the Internet.

263
Q

How has IT infrastructure evolved?

A
  1. Standalone mainfames
  2. Mainframe and dumb terminals
  3. Standalone personal computers
  4. Local area networks
  5. Enterprise computing
  6. Cloud/mobile computing
264
Q

What characterizes cloud computing?

A
  • On-demand self-service
  • Grid computing: Multiple computers that are geographically dispersed but connected by networks operate simultaneously, working together to jointly accomplish tasks.
  • Utility computing: Third-party service providers make computing resources and infrastructure management available as needed to customers, charging a per-use rate, rather than a flat fee.
  • Broader network access, as any computing device can be used (open configuration).
  • Pooled computing resources.
  • Service virtualization: Use of software-based partitions to create multiple virtual servers on a single physical server (server farm), bringing task allocation.
265
Q

Why is grid computing advantageous?

A
  • Uses computing resources efficiently;
  • Applications run faster;
  • Provides fault tolerance and redundancy;
  • Easy scalability.
266
Q

What are the advantages to cloud computing?

A
  • No need to procure, configure, maintain IT infrastructure;
  • No need to scramble to meet evolving application development needs;
  • Reduced upfront capital expenses, operational costs;
  • Less maintenance, easy management;
  • Organizational flexibility and competitiveness.
267
Q

What concerns and risks are associated with cloud computing?

A
  • Legacy IT systems are not transferable to the cloud;
  • Reliability, privacy, security;
  • Regulatory and legal environments;
  • Criminal use of cloud computing.
268
Q

What are the types of clouds?

A
  • Public: Shared, easily-accessible and multi-customer IT infrastructure, available non-exclusively to any entity in the general public;
  • Private: IT infrastructure that can be accessed exclusively, over an intranet;
  • Hybrid: Public and private clouds that retain their unique entities;
  • Vertical: Industry-specific clouds.
269
Q

What is infrastructure-as-a-service?

A

In which the customer controls its operating system, applications, and data.

The supplier takes care of the server, virtualization, storage, and networking.

270
Q

What is platform-as-a-service?

A

In which the customer controls applications and data.

The supplier manages the operating system, the server, virtualization, storage, and networking.

271
Q

What is software-as-a-service?

A

The customer lets the supplier oversee applications, data, operating system, server, virtualization, storage, and networking.