Managing Information Flashcards
Explain the strategic importance of information
The first company to use new information technology to substantially lower costs or differentiate products
or services often gains first-mover advantage, higher profits, and larger market share. Creating a firstmover
advantage can be difficult, expensive, and risky, however. According to the resource-based view of
information technology, sustainable competitive advantage occurs when information technology adds
value, is different across firms, and is difficult to create or acquire
Describe the characteristics of useful information (that is, its value and costs).
Raw data are facts and figures. Raw data do not become information until they are in a form that can affect decisions and behavior. For information to be useful, it has to be reliable and valid (accurate), of sufficient quantity (complete), pertinent to the problems you’re facing (relevant), and available when you need it (timely). Useful information does not come cheaply.
The five costs of obtaining good information
are the costs of acquiring, processing, storing, retrieving, and communicating information.
Explain the basics of capturing, processing, and protecting information.
Electronic data capture (bar codes, radio frequency identification [RFID] tags, scanners, and optical
character recognition) is much faster, easier, and cheaper than manual data capture. Processing
information means transforming raw data into meaningful information that can be applied to business
decision making. Data mining helps managers with this transformation by discovering unknown patterns
and relationships in data. Supervised data mining looks for patterns specified by managers, while
unsupervised data mining looks for four general kinds of data patterns: association/affinity patterns,
sequence patterns, predictive patterns, and data clusters. Protecting information ensures that data are
reliably and consistently retrievable in a usable format by authorized users, but no one else.
Authentication and authorization, firewalls, antivirus software for PCs and corporate email and network
servers, data encryption, virtual private networks, and Web-based secure sockets layer (SSL) encryption
are some of the best ways to protect information.
Be careful with wireless networks, which are easily compromised even when security and encryption
protocols are in place.
Describe how companies can access and share information and knowledge.
Executive information systems, intranets, and corporate portals facilitate internal sharing and access to
company information and transactions. Electronic data interchange and the Internet allow external groups,
like suppliers and customers, to easily access company information. Both decrease costs by reducing or
eliminating data entry, data errors, and paperwork and by speeding up communication. Organizations use
decision support systems and expert systems to capture and share specialized knowledge with
non-expert employees.
What is a first-mover advantage?
The strategic advnatge that companies earn by being the first to use new information techology to substantially lower costs or to make a product or service different from that of competitors.
Differentiate between raw data and useful information.
Raw data is fast and figures, where as useful informationr efers to data that can influence peoples choices and behavior.
According to the resource-based view of information technology, what are the three critical issues that
companies need to addressing order to sustain a competitive advantage through information technology?
- Does the information technology create value?
- Is the information technology different across competing firms?
- Is it difficult for another firm to create or buy the information technology?
Define data mining. Briefly describe the two general approaches to data mining
Data mining is the process of discovering patterns and relationships in large amounts of data. Data mining works by using complex algorithms such as neural networks, rule induction, and decision stress.
Data mining typically splits a data set in half, finds a pattern in one half, and then tests the validity of those patterns by trying to find them again in the second half of the dataset. the data typically comes from a data warehouse that stores huge amounts of data that have been prepared for data mining analysis by being cleaned of errors and redundancy. the data in a data warehouse can then be analyzed using two types of data mining:
- Supervised data mining - the progress when the user tells the data mining software to look and test for specific pattern and relationship in a data set.
- Unsupervised data mining - The process when the user simply tells the data mining software to uncover whatever patterns and relationships it can find in a data set.