MIS 301 Final Flashcards
decision tree analysis
a technique used to create hierarchical if/then rules using several variables to predict a class of a record, for example use on data, income, gender, homeownership, to predict good/bad risk
cluster analysis
a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible, ex: data driven profiling using many variables to generate clusters of records
association detection
reveals the degree to which variables are related, and the nature and frequency of these relationships in the information
statistical analysis
performs such functions as correlations, distributions, calculations, variance analysis, and regression
classification
asign records to one of a predefined set of classes
estimation
determine values for an unknown continuous variable behaviour or estimated future value
affinity grouping
determine which things go together
clustering
segment a heterogeneous population of records into a number of more homogenous subgroups
Richard Hackthorn’s graphic on value of BI
[order is important] data latency, analysis latency, decision latency, action taken. this is the time it takes to make an action and why business intelligence is useful
quantifiable benefits
working time saved in producing reports, selling info to suppliers, etc. [ex. moet and chandon reducing from .30 to .15 per bottle]
indirectly quantifiable benefits
can be evaluated through indirect evidence - improved customer service means new business from the same customer and differentiated service brings new customers. [ex: owens and minor cited that extranet access to the data warehouse as the primary reason for giving 44m in new bsiness]
unpredictable benefits
are the result of discoveries made by creative users [ex. volkswagen discovering that audi customers and vw customers behave differently based on socioeconomic profiles]
intangible benefits
include improved communication throughout the enterprise, improved job satisfaction of empowered users, and improved knowledge sharing
forecast
predictions made based on time series information
time series info
time stamp information collected at a particular frequency
statistical analysis
performs such functions as information correlations, distributoins, calculations, and variance analysis [ex regression] includes forecast and time series information
OLAP
online analytical processing is the manipulation of information to create busienss intelligence in support of strategic decision making (executive end)
OLTP
online transaction processing is the capture of transaction and event information using technology to process the information according to designed business rules, store the info, and update existing info
ETL
extraction, transformation, loading / a process that extracts information from internal and external databases, transforms info using a common set of enterprise definitions, and loads the informatino to a data warehouse
dimensions
the who, what, where, when and how criteria of a query [ex: store 123 product abc promo 123]
facts
the sales number in each cell at the intersection of dimension values
multidimensional analysis
a pivot table is an example of multidim analysis, the columns fields, rows fields, and page fields are dimensions. the data in the center is a fact
info security
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization [ex: 38% of security incidents originate within the org]
phishing
a technique to gain personal information for the purpose of identity theft or bank information
social engineering
using social skills to trick people into revealing info
token
small electronic device that changes user passwords automatically
smart card
a device size of credit card containing embedded technologies that can store info and small amounts of software to perform some limited processing
biometrics
narrowly definied/ the identification of a user based on physical characteristics such as fingerprints, iris, face, voice, or handwriting. can be costly and intrusive.
pharming
re-routes requests for legitimate websites to false websites
authentication
a method for confirming users’ identities / once a system determines the authentication of a user it can then determine the access priveliges, or authorization for that user
authorization
the process of providing a user with permission including access levesl and abilites such as file acces, hours of access, and amount of allocated storage space
firewall
a hardware and or software that guards a private network by analyzing incoming and outgoing information for the correct markings
content filtering
occurs when orgs use software that filters content such as emails to prevent the accidental or malicious transmission of unauthorized information
what are technologies available to help prevent and build resistance to attacks?
content filtering, encryption, and firewalls
public key encryption (PKE)
uses two keys: a public key that everyone can have and a private key for only the recipient. the org provides the pubic key to all customers whether end consumers or other businesses. when it arrives at its destination the org uses the private key to unscramble it.
DDoS/DoS attack
denial of service attack: floods a website with so many request for service that it slows down or crashes the site // distributed denial of service attack: attacks from multple computers flooding websites with requests
black hat hacker
breaks into other peoples computers
white hat hacker
work at the request of system owners to find system vulnerabilities and plug the holes
worm
spreads itself not only file to file but also computer to computer. the difference between virus and worm: virus must attach to something. worms do not need to attach to anything to spread and can tunnel themselves into computers. they also replicate themselves.
script kiddies/bunnies
find hacking code on the internet and click and point their way into systems causing damage or spreading viruses
porter’s 3 generic strategies
- broad cost leadership 2. broad differentiation 3. focus strategy [ex: mercedes benz would find itself facing the dilemna of attempting to market and sell a highly specialized and expensive product at a discounted price] competitive scope and cost strategy
porter’s 5 forces
- threat of substitute products or services 2. buyer power 3. rivalry amongst existing competitors 4. threat of new entrance 5. supplier power [rivalry amongst existing compettitors in the center]
value chain analysis
views a firm as a series of business procsses that each add value to the product or serivice
environmental scanning
organiztions watch their competition through enviro scanning
business process
a standardized set of activities that accomplish a specific task such as processing a customer’s order
organizational strategy
a leadership plan that achieves a specific set of goals or objectives, such as developing new products/services, entering new markets, increasing customer loyalty, attracting new customers, and increasing sales
first mover advantage
occurs when an org can significantly impact its market share by being first to market with a competitive advantage
IT strategy
organizational strategy, articulates how the company will make/sustain profits in face of competition. IT strategy developed by senior IT mangers articulates how IT will contribute to the realization of organizational strategy.
buyer power
the ability of buyers as a group to directly impact the price they are wiling to pay for an item. measured by # customers, size of orders, sensitivity to price
switching costs
costs that can make customers reluctant to switch to another product or service, i.e. loyalty programs
supplier power
the supplier’s ability to influence the prices they charge for supplies
supply chain
consists of all parties involved in the procurement of a product or raw material
threat of substitute
high when there are many alternatives to aproduct or service and low when there are few
how to properly identify a primary key and a foreign key
a primary key gets underlined; a foreign key gets dotted underlined
referential integrity
states that every non-null foreign key value must match an existing primary key value. this ensures the consistency of the cross references among tables.
redundancy
the duplication of information or storing same info in multiple places; can result in inconsistencies
what does a table, row, and column represent
table: data sheet.
row: contains all data for a single record
column: a specific data value called a field; all records have the same fields
aggregate functions
(total functions) sum, minimum, maximum, average, count, variance, standard deviations. aggregate functions operate on a group of rows with a common criterion.