midterms sem 1a Flashcards

1
Q

moores law

A

size of transitor keeps getting smaller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

bells law

A

volume of computers keep getting smaller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

metcalfes law

A

platform becomes more valuable when more people are connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

nielsens law

A

internet connection keeps getting faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

kryders law

A

cost of data storage will reach zero

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

marketable skills

A

abstract reasoning, systems thinking, collaboration, ability to experiment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

abstract reasoning

A

construct a model or representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

systems thinking

A

model system components and show how each component’s input and outputs relate to one another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

collaboration

A

develop plan and ideas together, provide and receive critical feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is MIS

A

achieving strategies, manage, use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ability to experiment

A

create and test promising new alternatives, consistent with available resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business process

A

network of activities for accomplishing business functions e.g. marketing, accounting, sales. Make sure that IS is align with other hardwares to help the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

start

A

circle with thin line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

end

A

circle with thick line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

rectangle

A

activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

rectangle with plus sign

A

subprocess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

jajargenjang

A

data repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

diamond

A

decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

dotted arrow

A

data flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

arrow

A

control flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

subprocess

A

the activity is complicated enough that it can use another business process model to explain it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

process efficiency is shown by

A

less cost, same benefit or more benefit, same cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

process efficiency can be done by

A

reducing number of repository and adding more data flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

example of process efficiency

A

two repositories are more likely to create process inefficiency
while having a single repository is less costly, generates fewer errors, and is just as effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
process effectiveness
able to accomplish the strategy or not, no methods can be used to tackle effectiveness in the model, we all assume that the process is going smooth but having problems in the speed of accomplishment
25
5 IS components
computer side : hardware (actors), software (instructors), data (bridge) human side : people (actors), procedure (instructors), data (bridge) automation moves from the human side to the computer side
26
information is
data but presented in a meaningful content, a higher class than data
27
quality information
based on who is using the information and their system thinking skill level
28
5 characteristics of quality information
1. accurate : humans are the no 1 source of incorrect data, have to know the circumstance of getting incorrect data 2. timely : present data in time 3. just barely sufficient : sufficient for the purpose, can't use too much data, decide which data to ignore 4. worth its cost : the data collected justifies the cost (cost to develop, maintain, and operate the data) 5. relevant : relevant to the purpose of using the data and who is using the data (relevant to the context and subject of the data)
29
ability to experiment
create and test new promising alternatives, efficient with available resources
30
porter's 5 forces is to
determine the profitability of an industry
31
porter's 5 forces (industry structure)
competition forces : threat of new entries, degree of rivalry, threat of substitutes forces related to supply chain bargaining power : bargaining power of suppliers, bargaining power of consumers
32
how does organizational strategy determine information systems structure
industry structure determines competitive strategy, competitive strategy determines value chains, value chains determines business processes, business processes determines information systems
33
other factors to consider while determining weak or strong 5 forces
1. switching cost 2. buyer-supplier ratio 3. dependance 4. substitute availability
34
porters 4 competitive strategy (competitive strategy)
1. industry-wide a. cost : lowest price across the industry b. differentiation : best products/services across the industry 2. focus a. cost : lowest price within an industry segment (a target customer) b. differentiation : best products/services within an industry segment
35
value chain
network of value-creating primary and support activities
36
rumus total margin value chain
margin = value - cost total margin = total margin primary + total margin support
37
primary activities in value chain
1. inbound logistics : receiving, storing, and disseminating inputs to the product 2. operations / manufacturing : transforming inputs to the final product 3. outbound logistics : collecting, storing, and distributing products to buyers 4. sales and marketing : inducing buyers to purchase the products and providing a means for them to do so 5. customer service : assisting customers' use of the product, thus maintaining and enhancing the products' value
38
support activities in value chain
1. technology : research & development, new techniques, methods, and procedures 2. procurement : raw materials 3. human resources : training, recruitment, and compensation 4. firm infrastructure : general management, finance, accounting, legal, and governement affairs
39
how do value chains determine business processes and information systems?
1. business processes implement value chains or a portion of a value chain 2. each value chain is supported by 1 or more business processes
40
how do information systems provide competitive advantages
1. product implementations - create new product/services - enhance product/services - differentiate product/services 2. process implementations - lock in customers/buyers - lock in suppliers --> supply chain management system - raise barriers to market entry - establish alliances - reduce cost
41
what do business professionals need to know about software?
categories : - horizontal market application --> provide capabilities that are common across all organizations and industries (ex : microsoft excel, browser) --> off-the-shelf - vertical market application --> serve the needs of a spesific industry (ex : canvas, atm system, airline booking system) --> off the shelf and then customized - one-of-a-kind application --> developed for a spesific, unique need (ex : national military system) --> custom developed
42
purpose of database
organize and keep track of different kind of datas, ex : customer data, sales data, HR data, accounting record
43
what is a database
self-describing collection of integrated records
44
other name for table
file
45
other name for column
field
46
other name for row
record
47
components of a database
makes a database more meaningful ex : data of customer personal data linked with a data of sales transaction
48
database equation
tables or files + relationship between rows in tables + metadata (additional info about a data) = database
49
primary key
a column or group of columns that uniquely identifies a row in a table (every table has to have a PK) --> every row has a different key
50
foreign key
a primary key that appears in another table to create a relationship (not every table has a FK)
51
what is a database management system (DBMS)?
a program that is used to create, process, and administer a database
52
process of database
user --> database applications (forms, reports, queries, applications, programs) --> database management systems (create, process, administer database) --> database (tables, relationships, metadata) (usually these are sold in a package, customized, or tailor-made)
53
4 dbms operations
1. read --> read/extract student info 2. insert --> add new student record 3. modify --> change tutorial class 4. delete data --> drop/withdraw a student
54
structured query language (SQL)
international standard to communicate with relational databases and used by most popular DBMS (ex : select SID, name, score from the test)
55
why are database application programs needed?
they are double sided between the customer-side (browser and internet) and server-side (dbms and database) code (becomes the medium)
56
the components of entity-relationship data model
1. entity (table) --> something that users wants to track 2. attribute (fields) --> describes the characteristic of an entity 3. identifier (primary key) --> uniquely identifies one entity instance from another instance
57
example of department, adviser, and student entities and relationships
1 : N --> 1 department can have many advisers, one adviser can only work for 1 department N : M --> 1 adviser can advise many students, 1 student can have more than 1 adviser
58
entity relationship diagram (arrows)
stripe --> mandatory circle --> optional stripe --> one branch --> many
59
how is data model transformed into database design
1. normalization - transforming poorly-structured table into two or more well-structured tables - purpose : creating tables with data about a single theme/entity - goal : minimize data integrity problems 2. data integrity problems - producing incorrect or inconsistent information, users lose confidence in the information, the system has a bad reputation - this can only occur if the data is duplicated
60
key points of smart banking
- connectivity - any time/where/device - self-service/customer-centered service
61
benefits of self service instead of serving customers
time and cost benefit, the employees can do more important and harder tasks
62
5 features of smart banking
1. growth 2. payments transformation 3. compliance and risk management 4. data management 5. cybersecurity
63
growth
1. invest in customer analytics 2. leveraging digital technologies to elevate the customer experience in both business and retail banking 3. determining whether or not prudent underwriting standards are overlooked 4. learning from non bank technological firms and establishing exclusive partnership to create innovative and competitive edge
64
payments transformation
--> contactless payment, so banks may want to : - seek innovative ways to leverage customer spending data for specialized promotions and services - look for new ways to become top of the wallet and differentiate the customer experience
65
compliance and risk management
--> meeting regulatory expectations will require management to extend its focus from improving spesific processes to fully integrating risk management, compliance and ethics. banks may want to : - reinforce a strong "tone at the top" - encourage the board to challenge senior management's activities - empower chief risk officers to pursue collaborations with business lines - integrate risk management and compliance responsibilities into performance management programmes and employee training
66
data management
--> institutions should shift to a proactive stance to ward off further regulatory pressure. banks should consider : - creating a central regulatory management office to drive greater efficiencies - relying on chief data officers to establish tigther connections with front office functions and derive greater value from data assets
67
cybersecurity
--> banks will be forced to devote more reources into enhancing their security, vigilance, and resilience of their cybersecurity and should consider : - adopting new methods, such as war gaming, attracting specialized talents, and increasing collaborations with other members - beefing up their intelligence apparatus to detect new threats in a timely manner - expanding the role of CISO to include clear and prompt communications with the board
68
what is smart e-payment?
payment methods for online purchases --> credit card, direct debit from bank accounts (FPS), Stored Value Facilities (SVF) --> alipay, wechat pay, paypal, octopus direct debit --> the purchase amount is debited directly from the bank account and no need to apply for credit (EPS), (PPS), (FPS)
69
Business Inteligence (BI) refers to
the technologies, applications, and practices for the collection, integration, analysis, and presentation of business information
70
how do organizations use BI systems
to support decision making by using BI and DDDSS (data-driven decision support system) other than that : - project management - problem solving - deciding - informing
71
business intelligence means
- timely - accurate - high-value - actionable
72
insights from internal or external data
acquire data from operational databases, purchased data, and social data to be analysed by business intelligence applications by reporting, data mining, and using big data, to be published by business intelligence to knowledge workers.
73
BI capabilities should include
- past - present - future - unknown (broad question)
74
typical uses of BI
1. identifying changes in purchase patterns --> major life events causes customers to change what they buy 2. digging for gold (golden insights) --> ex : market basket analysis --> know what products customers are likely to buy together 3. BI for entertainment --> amazon and netflix 4. predictive policing
75
how would BI help with smart banking?
data from different interactions, ex : transactions from branch, ATM, phone banking, e-banking, and fax
76
big data consists of
- volume scale of data - velocity analysis of streaming data - variety of different forms of data - veracity uncertainty of data
77
how do organizations use data warehouses or data marts to acquire data
acquire data from operational databases, purchased data, and social data --> ETL (extract, transform, load) --> data warehouse DBMS --> either to data warehouse database or data warehouse metadata --> business intelligence tools --> business inteligence users
78
ETL
extract --> information from internal and external data source transform --> data using common sets of enterprise definition load --> data/information into data warehouses
79
data warehouse vs data mart
1. holds multiple subject areas --> usually only holds one subject area 2. holds very detailed information --> may only hold summarized data 3. works on integrating all data sources --> concentrates on integrating information from a given subject area or set of source system 4. does not nessecarily needs a dimensional model but feeds dimensional model --> is built focused on a dimensional model called star schema 5. implement time is relatively long (months, years) --> implement time is moderate (months)
80
common BI techniques
- multidimensional analysis - cluster analysis - association detection
81
multidimensional analysis
is a BI tool that can create a multidimensional view of a data : - dimension --> attribute of data - cube --> common term for a representation of multidimensional information (cube of information can slice & dice) online analytical processing (OLAP) is a reporting technology that can perform multidimensional analysis
82
cluster analysis
--> technique that divides an information set to mutually exclusive groups such as : - intra-cluster are data that are close to one another - inter-cluster are data that are far away from one another we can analyze data's proximity to find out potential groups/clusters
83
association detection
- reveals the relationships between variables and the nature and frequency of the relationships - determines the likelihood of events occuring together at a particular time - market basket analysis --> analyze items such as the cashier scanner to gather the customer's buying behavior and predict future behaviors --> cross selling
84
Project Management Professional (PMP)
- industry-recognized certificate for project managers - 4-year degree + 3 or more years of project management experience + exam - recognized certificate issued by PMI
85
project management qualifications
- project management professional (PMP) - project management qualification - domain knowledge
86
domain knowledge
- initiating the project - planning the project - executing the project - monitoring and controlling the project - closing the project
87
initiating the project
- perform project assesment - meeting with sponsors (internal/external) - conduct risk and benefits analysis - obtain project charter
88
planning the project
- asses and review detailed project requirements, constraints, and assumptions - define scope - develop a budget plan, project schedule, and HR management plan
89
executing the project
- acquiring resources outlined in the planning phase - executing tasks defined by your company or others - implement approved changes (ex : training, knowledge sharing, and meeting)
90
monitoring and controlling the project
- measure project performance - ensure project deliverables conform to quality standards
91
closing the project
- obtain final acceptance - transfer ownership - obtain financial, legal, and admin closure
92
5 phases of SDLC
system development life cycle business planning process --> system need 1. system definition --> project plan 2. requirements analysis --> approved user requirement 3. component design --> system design 4. implementation --> system users --> problem or need for change 5. system maintenance --> system definition
93
change management
vital component of IS development and implementation projects to increase the chance of success of a project
94
when managing change, special attention should be paid to
- resistance to change - organizational culture - project participants (or stakeholders)
95
vision and goals for change
- set and agree on objectives : setting and manage objectives so that they are linked with the vision and purpose of change - devise plans : planning details and required resources - implement and monitor : impementing the plan with continuous monitoring - review : possible adjusment to the plan or modifications of actions to ensure the achievement of the objectives
96
why is system development difficult and risky?
- most projects are never finished and are 200-300 % over the budget - some projects finish within the budget and schedule but don't accomplish goals
97
major challenges of system development
1. difficulty of requirement determination - requirements analysis in SDLC - what does the system do? how? - business analysts/project managers uses diagrams to illustrate key features of the new systems and supplements with detailed spesifications 2. changing requirement - they determine what changes can still be made within the resources constraint 3. scheduling and budgeting difficulties - they calculate all of this and report the ROI (return on investment) to management 4. changing technology - they carry out the impact analysis and determine if the new tech should be incorporated 5. diseconomies of scale - they plan carefully the team sizes and timelines
98
what is social media information systems (SMIS)
- the use of IS to support sharing content with a network of users - enables communities, tribes, or hives - people related by a common interest
99
3 roles of SMIS
- social media providers : instagram, facebook, twitter - users : individuals/organizations - communities : share a mutual interest, forums
100
SMIS costs
to develop, implement, and manage social networking procedures and direct labor cost
101
social media is by
nature and dynamic --> unstructured business process --> unstructured value chains
102
social media &
sales and marketing activity, inbound and outbound logistics, operations and manufacturing, human resources, customer service
103
social media & sales and marketing activity
- social customer relationship management (CRM) - each customer actively crafts a relationship, no longer in a passive position downside : - loss of credibility - poor PR
104
social media & customer service
- product users' are amazingly willing to help each other solve problems, with or without pay downside : - the risk of loss of control --> customers may recommend competitor's products in the focal business' support forum
105
social media & inbound and outbound logistics
- numerous solution ideas and rapid evaluation of logistics --> different solutions for complex supply chain problems downsides : - loss of privacy --> open discussion about problem definitions, causes, and solution constraints, and problem solving in front of competitors
106
social media & operations and manufacturing
- externally with customers (product design and redesign, create brand awareness in business to customer (B2C)) - internally within the organization (ex : enterpirse social networking service)
107
crowdsourcing
obtaining information from a large group of people via the internet
108
social media & human resources
- finding employee prospoects, recruiting candidates, and candidates evaluation - internal communication - ex : Yamer, myprofile, mysite in sharepoint downsides : - making erroneous conclusions about potential employees - becoming a defender of belief or pushing unpopular management messages
109
social network is a combination of
- social network size - relationship strength - resources possesed by those in the network
110
value of social capital
1. information --> opportunities, alternatives, problems, and other factors important personally and profesionally 2. influence --> influence decision-makers that are important to our success 3. social credibility --> linked to a network with highly-regarded contacts 4. reinforcement --> connections reinforce identity, status, and image in organization/company
111
social networks can be used to
- increase the strength of relationships - connect with those that has more resources
112
how to strengthen relationships
through increasing and frequent interactions
113
revenue models for social media
1. advertising - pay per click - use increases value (more people use the website --> the website becomes more valuable --> more people visits the website --> more ads 2. freemium --> the platform has a reguler feature, but has a premium version that lets the customer pay for it 3. sales --> affiliate commissions, donations, apps and virtual goods
114
how does organizations develop an effective SMIS
1. create relationships that the organization, employee, partners, and customers perceive and gain value 2. transform interactions that are organization-centric to mutually satisfying humane, community relationship 3. premeditated alignment of SMIS to the organization's chosen strategy
115
social media strategic goals
1. increased brand awareness --> the brand is recognized in social media 2. increased conversion rate --> increase the frequency of a user doing a desired act 3. increased web traffic --> increase the quantity, frequency, duration and depth of visits in the website 4. increased user engagement --> increase the extent to which a customer interacts in a website
116
vanity metrics
--> the goal is to increase user engagement (only seeing the number of followers) --> cannot reflect the performance of user engagement
117
ESN
Enterprise Social Network --> specialized enterprise social software that is designed to be employed inside an organization
118
goal of ESN is to improve
- collaboration - communication - problem solving - knowledge sharing - decision making
119
what is digital marketing
- search marketing - seo (search engine optimization) - youtube - forum - mobile ad - social media ad
120
digital marketing vs traditional media
- more measurable - more adjustable/dynamic - higher chance to convert (from potential customer to actual customer) - cheaper
121
digital marketing consists of
- social media ads : retargeting --> drive customers back to your website - search engine marketing : 1. unpaid --> search engine optimization (SEO) 2. paid --> pay per click - customer analytics : tracking, monitoring, and measuring customer's behaviour (how much time they spent on the website and where they come from) - qualifications : ex : google workshop
122
IT/IS auditing are not
- accounting control/ financial auditing - out of scope - compliance testing
123
corporate governance
a collection of mechanisms and processes to control and operate a firm
124
challenges to corporate governance
- BYOD (bring your own device) --> allows employees to bring their own device (risk : hard to manage the environment/platform used (virus/hack and illegal website) - data proliferation (data explosion) - privacy
125
COBIT
Control objectives of information and related technologies : reference framework for professionals to manage the risks related to information systems (designed by ISACA (information systems audit and control association)
126
how to be an IS auditor
- passed the CISA (certified information systems auditor) exam - 5 years of work experience in the fields of IS auditing, control, assurance, or security - a working experience waiver is available
127
how to maintain CISA certification
- continuing professional education (CPE) - annual maintenance fee - random selection of annual CPE audit
128
goal of information systems security
cost (safeguard) vs risk (loss)
129
elements of threat/loss
1. threat --> when an individual/organization wants to obtain/alter data/IS assets illegaly 2. vulnerability --> opportunity for threats to gain access to individual/organization assets 3. safeguard --> a measure taken by individual/ogranizations to block the threats from obtaining assets 4. target --> asset desired by threats
130
sources of threats
- human error - computer crime - natural events/disaster
131
types of security loss
- unauthorized data disclosure (threats obtain data that is supposed to be protected) - incorrect data modification (hacking/typo) - faulty service (they replace the applications with their own to spy) - denial on service (blocking people from using the application) - distributed denial on service attack (blocking multiple sources from using the application so it cannot be saved from a single source)
132
technical safeguard
- identification and autenthication - encryption - firewall - malware protection
133
identification & authentication
username & password
134
encryption
process of transforming clear text into coded unintelligible text for secure storage and communication (use key to lock or unlock message) assymetric and symmetric key - symmetric --> same key for incrypting and decrypting message - assymetric --> public key for locking, private key for unlocking
135
firewall types
- internal firewall --> sits inside an organizations network - peremeter firewall --> sits outside an organizations network - firewall --> a computing device that prevents unauthorized network access
136
malware protection
- viruses : computer programmes that can replicate themselves to corrupt computer systems and destroy data - spyware : resides in the background and monitor user activity, then reports to the corresponding organization - adware : mostly harmless but produce popup ads
137
business continuity planning
1. enables businesses to continue offering critical services 2. to survive disastrous interruptions 3. rigorous planning and commitment to resources
138
when there is a sudden disastrous interuption, an IS auditor should (after)
1. identify which critical services they should continue to offer after interruption 2. help planning resources and procedures to recover client's business in the shortest time possible
139
disasters or other disruptive events
1. natural disasters 2. others --> electricity outage, hacker attack, etc
140
data center cite selection
place far away from natural disasters, etc
141
IS auditor's tasks before sudden interruptions
- reviewing BCP, BC teams - evaluating prior test results and offsite storage - interviewing key personnel - evaluating security at an offsite facility - reviewing alternative processing contracts and insurance coverage
142
technology related issues because of not following information ethics
- copyright - fair use doctrine - pirated software - conterfeit software
143
what can be done to reduce technology related issues
- government should implement and enforce laws related to information ethics - the office of the privacy commisioner for personal data (PCPD) aims to secure the privacy of an individual through promotion, monitoring and supervision of compliance with the personal data ordinance
144