MIS Exam One Flashcards
What is MIS?
the management and use of information systems that help organizations achieve their strategies
Information
Data converted into a meaningful and useful context. People perceive data, and then conceive that data into information.
Characteristics of Data
- Accurate- correct and complete
- Timely- available when decisions need to be made
- Relevant- useful to management to make decisions
- Worth its cost
- Just Sufficient
What is the Primary Collaborative System we use in MIS?
Microsoft Teams
Bell’s law
a new computer class forms roughly each decade establishing a new industry
Nielson’s Law
network connection speeds for high-end users will increase by 50% per year
Metcalfe’s law
the value of a network is equal to the square of the number of users connected to it
Moore’s Law
The number of transistors per square inch on an integrated chip doubles every 18 months
Kryder’s Law
Storage capacity is increasing exponentially. The cost of storing data is approaching zero.
Components of Every Information System
Hardware, Software, Data, Procedures, People.
It is harder to implement change in people, but easier to do so in hardware.
Characteristic of a Strong Password
- must contain at least 12+ characters
- Must not contain a whole dictionary word.
- Contains both upper and lower-case letters, numbers, and special characters (@#><.,)
- Must be different from other passwords
- Doesn’t contain whole personal info (names, birthdays, company names).
What is the primary function of IT & IS in Collaboration?
Communication and Content Sharing
Collaboration
a group of people working together to achieve a common goal via a process of feedback and iteration
Cooperation
a group of people working together, all doing essentially the same type of work, to accomplish a job
Why are Iteration and Feedback key characteristics for Collaboration?
They provide constructive criticism and learning opportunities for members in a group.
Collaboration Needs for Decision Making
Strategic, Managerial, Operational. Strategic requires the most collaboration, while operational is more structured and therefore requires less.
Strategic Decisions
decisions that support broad-scope, organizational issues
Managerial Decisions
decisions about the allocation and utilization of resources
Operational Decisions
those that support operational, day-to-day activities
5 Forces that determine Industry Structure
- Bargaining power of customers
- Threat of substitutions
- Bargaining power of suppliers
- Threat of new entrants
- Rivalry
Competitive Advantage
- Lowest Cost Across Industry
- Better product/service across Industry
- Lowest Cost within an industry segment
- Better product/service within an industry segment
Buyer Power
One of Porter’s Five forces; measures the ability of buyers to affect the price they must pay for an item. High when customers have many choices and low when customers have few choices.
Supplier Power
One of Porter’s Five Forces; measures the suppliers’ ability to influence the prices they charge for supplies (including materials, labor, and services). High when customers have fewer options and low when customers have many options.
Threat of Substitue Products/Services
One of Porter’s Five Forces; High when alternatives to an organization’s product or service is available. Customers will generally (ignoring brand loyalty) choose between cost or quality when deciding to buy an item.
Threat of New Entrants
One of Porter’s Five Forces; The threat of more competitors entering a market. Low when duplicating a company’s product/service is difficult.
Focus Strategies
Used to ensure the threat of new entrants remains low.
Rivalry Among Existing Competitors
One of Porter’s five forces; High when competitors occupy the same marketplace position and low when there are few competitors. (EX: Google and Bing, Apple and Microsoft, etc.)
Inbound Logistics
Primary Activity of Value Chain; The area of logistics that involves bringing raw materials, packaging, other goods and services, and information from suppliers to producers.
Outbound Logistics
Primary Activity of Value Chain; area of logistics that involves shipping finished products out to stores and warehouses to be sold.
Customer Service
Primary Activity of Value Chain; ability of company to handle customer complaints and questions, as well as provide maintenance for sold products in a timely, accurate, and relevant manner.
Business Processes
A workflow for a company/activity; Used by a company to identify key areas to make decisions that would affect the value of a product. An activity or set of activities that accomplish a specific organizational goal.
What is RPA?
Robotic Process Automation - software robot employees. Used to automate a task
Intelligent Automation
the combination of using RPA to automate business processes and AI to improve decision making
How do information systems provide competitive advantages?
Information systems aid companies in competing with other competitors by maintaining low costs, differentiating products or services, focusing on a market niche, strengthening ties with customers and suppliers, and increasing market entry barriers (via a focus strategy).
Digital Revolution
the conversion from mechanical and analog devices to digital devices
Information Age
a period in history where the production, distribution, and control of information is the primary driver of the economy
Digital Divide
the gulf between those who have ready access to computers and the Internet, and those who do not. (the information rich and information poor)
Computer Literacy
basic knowledge of hardware, software, internet, collaboration tools
Information Literacy
understanding the role of information in generating and using business intelligence.
IT components
Hardware + Software + Data
IS Components
IT + Procedures + People. (Data is input and information is output)
Brute Force Attack
An attack on passwords or encryption that tries every possible password or encryption key.
Hashing
transforming plaintext of any length into a short code called a hash. Used to scramble passwords, makes brute force attacks harder.
Rainbow Table
A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system’s encrypted password file.
Salts
added to the end of a password before it is hashed, this can reinforce weak passwords that would have been cracked easily. Usually multiple characters.
Pepper
1 single character added to a password, isn’t stored, even on host website.
Sales and Marketing
Primary Activity of Value Chain; Advertising your product to customers to increase sale of product.