MIS - Exam 3 Flashcards

1
Q

2 Key Activities of Collaboration

A
  1. Communication

2. Iteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Collaboration

A

A group of people working together to achieve common objectives via communication and iteration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Objectives of the Collaboration Process

A

Effectiveness:
•Product Objective - Succccessful Output
•Team Objective - Growth in Team Capability
•Individual Objective - Meaningful and Satisfying Experience

Efficiency:
•Time and; Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

5 Key Components of a Collaboration IS (HSDPP)

A
  1. Hardware - Cloud servers
  2. Software - Google Drive/MS Sharepoint
  3. Data - Project Data and; Metadata
  4. Procedures - Implicit or Assumed
  5. People - Vary in time/place/abilities/motivation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 2 Types of Communication (think team meetings)

A
  1. Synchronous Communication - team meets at the same time.
  2. Asynchronous Communication - team does not meet at the same time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 Ways Collaboration IS Support the Iterating Activity? (increasing the degree of content control). Think doc mgt

A
  1. No Iteration Control -
    •Email with attachments or
    •Shared file server.
  2. Iteration Management -
    •Google Drive
    •Microsoft SkyDrive.
  3. Iteration Control -
    •Permissions - Limit Activity
    •Document Checkout
    •Version History
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How Can Collaboration IS Support Business Processes (Think Slack)

A
  1. The Project Management Processes-
    •Project Team Collaboration via MS Project
  2. The Workflow Process - via MS Sharepoint
    •Sequential
    •Parallel
  3. Supporting New Processes with Collaboration IS
    •New online training processes
    •Knowledge storage processes
    •Find-an-expert processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Power Curve

A

Training time required via product power curve - the power curve of a Comprehensive collaboration toolset has a longer flat spot in the beginning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social Media

A

Any web application that supports the creation and sharing of user-generated content (UGC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Social Media Information Systems

A

Support the creation and sharing of user-generated content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Are the Objectives of the Social Media Process

A

Effectiveness:
•Users - Belongingness and Communication.
•Businesses - Support Strategy
•App Providers - Market share and; Revenue

Efficiency:
•Time and; Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

5 Key Components of a Social Media IS (HSDPP)

A
1. Hardware - 
    •Cloud servers and other devices
2. Software
    •Free, fun, frequently change, little business input
3. Data
    •Content and connection data
4. Procedures
    •Informal for users
    •Governed by policy for business
5. People
    •Freedom for users
    •Business users should follow policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

2 Ways Social Media IS Support Social Media Activities?

A
1. Creating
    •Rewards/incentives
    •Mashups/Viral content
    •Convenience
2. Sharing
    •Search
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How Can Social Media IS Support Business Processes?

A
  1. The Promotion Process
    •Increase awareness and brand
  2. The Customer Service Process
    •Increase communication to/from customers
  3. Supporting New Processes with Social Media IS
    •Improve service, promotion, quality of feedback, participation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social Capital

A

Investment in social relations with the expectation of returns in the marketplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3 Objectives of the Process of Building Social Capital

A
  1. Increase the Number of Relationships
  2. Increase the Strength of Relationships
  3. Connect to Those with More Assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

4 Risks of Social Media

A
1.  Management Risks
    •Overestimate ROI, labor costs, privacy, dependence on social media provider
2. Employee Communication Risks
    •Social Media Policy
3. User-Generated Risks
    •Junk and crackpots
    •Unfavorable reviews
    •Mutinous movements
4. Responding to User Content Problems
    •Leave it
    •Respond to it
    •Delete it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Business Intelligence

A

Process of acquiring, analyzing, and publishing data with an objective of discovering patterns in data that will inform a business person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

3 Objectives of the BI Process (API)

A

Effectiveness -
•Assess, Predict, Inform

Efficiency -
•Time and cost

Assessment- To be informed by current conditions.

Prediction- To be informed about the likelihood of future events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

4 Key Attributes of BI Information Systems

A
  1. Scalable
  2. Ease of use
  3. Data warehouse dependency
  4. Dependence on user knowledge and collaboration skills
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The 3 Business Intelligence Activities

A
1. Acquiring -
    •Obtain data
    •Cleanse data
    •Organize and relate data
    •Catalog data
2.Analyzing -
    •Reporting -
          •Interactive = OLAP & Slice & Dice
          •Non-Interactive = RFM, 
    •Datamining -
          •Regression
          •Market Basket Analysis (MBA)
          •Supervised and Unsupervised = Data Models and hypothesis
3.Publishing -
    •Visualizations, Self Service, Dashboards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is RFM analysis

A

Recently, Frequency, Money (how much)

Used to analyze and rank customers according to their purchasing patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Regression

A

The impact of a set of variables on another variable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Market Basket Analysis (MBA)

A

Determines sales patterns. What items do people purchase together?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

2 Ways BI Information Systems Can Support Business Processes?

A
  1. Support existing processes

2. Support new processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

3 Attributes of Big Data (3V’s)

A
  1. Volume
  2. Velocity
  3. Variety

Greater than a petabyte
Generated and accessed rapidly
Load balanced data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Map Reduce Technique

A

Used to harness the power of thousands of servers working in parallel.

  1. Map Phase - Data broken down into tasks/processes and gleaned for data of interest.
  2. Reduce Phase - The culmination of results of the map phase.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

SAP HANA Technique

A

An in-memory solid state fast database.

29
Q

3 Processes (Industry Segments) Supported by Big Data BI IS

A
  1. Continuous Auditing
  2. Counter Terrorism
  3. Cancer Treatment
30
Q

2 Risks of Business Intelligence

A
  1. Data Problems -
    •Dirty Data - can be worse than no data at all because they bias the analysis.
    •Data Silos - Data without primary/foreign key relationships.
    •Wrong Granularity - The level of detail of the data can be too fine (filter out non-essential data (summing & grouping) or too course.
  2. People Problems -
    •Users - User resistance due to changing their job, require new knowledge they don’t posses, distract from their primary work or job duties.
    •Analysts - Scope creep on projects, asking wrong questions
    •Leaders - Bad communication, not understanding statistics, overselling
31
Q

Business Objects (BOBJ)

A

A popular set of SAP analysis tools.

32
Q

What is Business Process Management (BPM) (Think Weird Science)

A

A cyclical process for systematically monitoring, modeling, creating, and implementing.

33
Q

5 Activities of the SDLC (Systems Development Lifecycle) aka Waterfall (DRCIM)

A
1. Define the system -
    •Goals and scope
    •Feasibility = $, schedule, technical, organizational
    •Project Team
    •Project Plan
2.Determine the requirements -
    •Interview
    •Review current system
    •Determine new reports/queries/forms
    •Determine new features and functions
    •Security
    •Create data model
    •Consider 5 components
3.Create Components -
    •Hardware specs
    •Program specs
    •Design the database
    •Design procedures
    •Design job definitions
4. Implement the system -
    •Build system components
    •Conduct unit testing
    •Integrate components
    •Convert to new system
5.Maintain the system
    •Change Requests
    •Prioritize Requests
    •Fix failures
34
Q

4 Types of System Conversion (4 P’s)

A
  1. Pilot Installation - limited portion of the business
  2. Phases Installation - Installed in phases.
  3. Parallel Installation - Old + new run together
  4. Plunge Installation - Old is turned off, new is turned on.
35
Q

5 Attributes of Scrum

A
  1. Prioritize requirements
  2. Chose requirements to deliver
  3. Stand up
  4. Do work
  5. Deliver and reflect
36
Q

When is a Scrum Project complete?

A
  • Runs of out time
    • Runs out of money
    • Accepts current level of completion
37
Q

What is Information Systems Security

A

Process of preventing unauthorized access to an IS or modification of its data.

38
Q

4 Attributes of IS Security Threat/Loss Scenario (TVST)

A
1. Threat - 
    •Human Error
    •Computer Crime
    •Natural Event or Disaster
2. Vulnerability
3. Safeguards
4. Target
39
Q

Challenges of IS Security

A
  1. Attackers dont have to follow the rules.
  2. Data was designed to be copied and shared easily.
  3. Newer technologies = less secure
40
Q

4 Principles of IS (CAIA)

A
  1. Confidentiality - Info can be obtained by only those who are authorized to access it.
  2. Authenticity - Info truly comes from the source it claims to come from.
  3. Integrity - Information has not been altered.
  4. Availability - A service or resource is available when it is supposed to be.
41
Q

3 Ways to respond to security threats

A
  1. Security Policy
  2. Risk Management
  3. Defense in Layers
42
Q

3 Types of Safeguards (TDH)

A
1. Technical safeguards -
    •ID and; authorization
    •Encryption
    •Firewalls
    •Malware protection
2. Data safeguards -
    •Policys
    •Passwords
    •Encryption
    •Backup and recovery
    •Physical security
3. Human safeguards - 
    •Trust but verify
    •Position definitions
    •Hiring and; Screening
    •Dissemination and; enforcement
    •Termination
43
Q

4 Types of Authentication

A
  1. Something the user is (biometric)
  2. Something the user has (smart card, PIN)
  3. Something the user does (speech/signature)
  4. Something the user knows (password)
44
Q

Cooperation

A

A process where a group of people work together all doing essentially the same type of work to accomplish the job.

45
Q

Camaraderie

A

Part of the group that’s achievements couldn’t be achieved by the sole individual.

46
Q

2 Types of Project Data

A
  1. Project Data - Data that is part of the collaborations work product.
  2. Project Metadata - Data that is used to manage the project.
47
Q

Project Mgt

A

The process of applying principles and techniques for planning, organizing, and managing temporary endeavors.

48
Q

The Workflow Process

A

A sequence of activities by which original content is created and subsequently acted upon by others within the organization.

49
Q

MOOC

A

Massive open online courses

50
Q

3 Sets of Collaboration Tools -

A
  1. Minimal
  2. Good
  3. Comprehensive - Office 365
51
Q

Folksonomy

A

A content structure that has emerged from the processing of many tags.

52
Q

Mashup Content

A

Content that combines data from 2 or more web services/platforms.

53
Q

Viral

A

Extremely popular content in a short period of time and is difficult to predict.

54
Q

Promotion

A

The process of sharing data about a product or service with the objective to improve awareness and sales.

55
Q

Customer Service

A

A series of activities before, during, and after a sale with a goal of increasing customer satisfaction.

56
Q

Crowdsourcing

A

Outsourcing a task to a large number of users.

57
Q

Define Capital and what are the 3 Types

A

The investment of resources for future profit

  1. Traditional Capital - investment in resources (factories, equipment)
  2. Human Capital - human knowledge and skills for future profit.
  3. Social Capital- investing in social relationships with the expectations of returns in the marketplace.
58
Q

Social Media Policy

A

A statement that delineates employees rights and responsibilities and limits employee risk.

59
Q

3 Responses to Social Media Posts

A
  1. Leave it
  2. Respond to it
  3. Delete it
60
Q

SOMO

A

Social Media on Mobile Devices

61
Q

OLTP

A

Online Transactional Processing Systems (Operational Database)

62
Q

OLAP (Slice & Dice)

A

Online Analytical Processing

External = data warehousing

63
Q

Difference between Unsupervised and Supervised Datamining?

A

Unsupervised = No model/hypothesis is formed before analysis

Supervised = A model/hypothesis IS formed before running the analysis.

64
Q

4 Ways a Business IS Support’s Business Processes

A
  1. Decision making process - Google Instant Search
  2. Knowledge management (KM) process - Expert System (IF/Then Rules)
  3. Next Best Offer (NBO) - propose product based upon user history and preferences.
  4. Online sales - Google analytics
65
Q

Conversion Rate

A

The ratio of number of customers who eventually purchased divided by the number who visited the website.

66
Q

System Development

A

The process of creating and maintaining an IS

67
Q

Social Engineering

A

When employees are manipulated into divulging data or bypassing security on behalf of others.

68
Q

Pre-Texting / Spoofing

A

When someone deceives by pretending to be someone else.

69
Q

Advanced Persistent Threat (APT)

A

A sophisticated and potentially long-running computer hack that is perpetuated by a large, well funded organization such a foreign government.