Midterm Flashcards

1
Q

Information Technology

A

any computer-based tool that people use to work with information and to support the information and information-processing needs of an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information System

A

collects, processes, stores, analyzes, and disseminates information for a specific purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the purpose of an IS

A

to get the right information to the right people at the right time in the right amount and in the right format to support business processes and desicion making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

data

A

is sorted, processed or assembled to create information

when people apply learned criteria or learned expertise to information they create knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

organizational strategy

A

a planned approach that the organization takes to achieve its goals and its mission statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

competitive advantage

A

is an advantage over competitors in some measure such as cost, quality, or speed; leads to control of a market and to larger-than-ever profits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

business process

A

a collection of related activities that produce a product or service of value to the organization, its business partners and/or its customers

example:
accounting: managing accounts payable and receivable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

cross-functional process

A

a process that involves multilple divisions, each of which makes its part of the entire company workflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

business process excellence (3)

A

Business process reengineering is a radical strategy for improving the efficiency and effectiveness of an organization’s business processes - clean slate

business process improvement is a more incremental approach, with lower risk and cost than BPR. - six sigma

business process management is a management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

5 successful phases of BPI (Business process improvement)

A
define
measure
analyze
improve
control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BPI (Business Process Improvement) vs BPR (Business Process Reengineering)

A
Low risk / low cost
Incremental change
Bottom-up approach
Takes less time
Quantifiable results
All employees trained in BPI
High risk / high cost
Radical redesign
Top-down approach
Time consuming
Impacts can be overwhelming
High failure rate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

competitive strategy

A

document’s a business’s approach to compete and how it will accomplish those goals, for example, in increasing market share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Porter’s competitive forces model

A

new competitors

bargaining power of suppliers

bargaining power of customers

threat of substitute products or services

rivalry among firms in industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

business-information technology

A

alignment is the tight integration of the IT function with the organization’s strategy, mission, and goals of the organization

the IT function directly supports the business objectives of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

data governance

A

an approach to managing information across an entire organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

data security

A

databases must have extremely high security meaures in place to deter mistakes and attacks since data is stored in one place

17
Q

data integrity

A

data must meet certain constraints, such as no alphabetic characters in a social insurance number field

no mistakes in data

18
Q

data independence

A

applications and data are not linked to each other so that all applications are able to access the same data

19
Q

Database Management Systems maximize

A

data security, data integrity, data independence

20
Q

Entity

A

is a person, place, thing, or event about which an organization maintains information. A record describes an entity.

21
Q

Primary key is

A

a field that uniquely identifies a record. Note that every record MUST have a primary key.

22
Q

Secondary keys are

A

other identifying fields that typically do not identify the file with complete accuracy.

23
Q

Foreign key field(s) are

A

used to uniquely identify a row of another table that is linked to the current table

24
Q

Big Data

A

data so large and complex it cannot be managed by traditional systems

Volume: computer-generated from many sources

Velocity: flows rapidly to/from within the organization

Variety: in addition to numbers and text, it includes images, sound, web-based content and others

25
Q

Knowledge management (KM):

A

a process that helps organizations manipulate important knowledge that is part of the organization’s memory

26
Q

Utilitarian

A

provides the most good or does the least harm

27
Q

rights

A

best protects and respects the moral rights of the affected parties

28
Q

fairness

A

treat all humans equally, or if unequally, then fairly, based on some defensible standard

29
Q

common good

A

respect and compassion for all others is the basis for ethical actions

30
Q

code of ethics

A

a collection of principles that are intended to guide decision making by members of an organization

31
Q

privacy, information privacy, privacy rights

A

Privacy is the right to be left alone and to be free of unreasonable personal intrusions.

Information privacy is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others.

Privacy rights apply to individuals, groups, and institutions.

32
Q

Privacy policies/codes

A

are an organization’s guidelines for protecting the privacy of its customers, clients and employees

33
Q

Privacy in Canada: PIPEDA

A

basic principles:

accountability, identifying purposes, consent, limiting collection, limiting use, accuracy, etc.

34
Q

information security

A

refers to all of the processes and policies designed to protect and organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction

35
Q

human error

A

the higher the level of employee, the greater the threat he of she poses to information security

employees in two areas of the organization pose especially significant threats to information security: human resources and IS

36
Q

social engineering

A

an attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information such as passwords

impersonation
tailgating
shoulder surfing

37
Q

intellectual property

A

is property created by individuals or corporations which is protected under trade secret, patent or copyright laws

38
Q

risk management 3 processes

A

risk analysis

risk mitigation

controls evaluation