Quiz 6 Flashcards

1
Q

business process

A

A business process, therefore, is a process that is focused on achieving a goal for a business. Processes are something that businesses go through every day in order to accomplish their mission. The better their processes, the more effective the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Business Process Modeling Notation (BPMN)

A

The objective of BPMN is to support business process documentation by providing intuitive notations for business rules. The flowchart style diagrams in BPMN can provide detailed specifications business processes from start to end. However, BPMN is short of the ability of system decomposition for large information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Flow Diagram (DFD)

A

The central concept of DFD is a top-down approach to understanding a system. The top-down approach is consistent with the system concept that views a system in a holistic manner and concerns an understanding of a system by examining the components and their interactions within the system. More importantly, while describing a business process by using DFD, the data stores used in the process and generated data flows in the process are also defined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unified Modeling Language (UML)

A

The Unified Modeling Language (UML) is a general-purpose modeling tool in the field of software engineering for constructing all types of computerized systems. UML includes a set of various types of diagrams with different subjects of modeling and diversified graphics styles. The diversified diagrams in UML can provide detailed specifications for software engineering in many perspectives for construction of information systems, but could be too complicated for documenting business processes from the perspective of business process management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

diagramming tools

A

A diagramming tool for documentation of business process is a formalized visual language that provides systems analysts with the ability to describe the business processes unambiguously, to visualize the business processes for systematic understanding, and to communicate the business process for business process management. Natural languages (e.g., English) are incapable to explain complex business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

document management system

A

A document management system stores and tracks documents and supports the following functions.
• Versions and timestamps. The document management system will keep multiple versions of documents. The most recent version of a document is easy to identify and will be considered the default.
• Approvals and workflows. When a process needs to be changed, the system will manage both access to the documents for editing and the routing of the document for approval.
• Communication. When a process changes, those who implement the process need to be made aware of the changes. The document management system will notify the appropriate people when a change to a document has been approved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ERP Programs

A

Computer program. The system is a computer program, which means that it has been developed with specific logic and rules behind it. It is customized and installed to work specifically for an individual organization.

Centralized database. All data in an ERP system is stored in a single, central database

Used to run an entire company. An ERP can be used to manage an entire organization’s operations.

when an organization implements an ERP, it also gets improved best practices as part of the deal. One of the criticisms of ERP systems has been that they commoditize business processes, driving all businesses to use the same processes and thereby lose their uniqueness. The good news is that ERP systems also have the capability to be configured with custom processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Business process management

A

Business process management (BPM) can be thought of as an intentional effort to plan, document, implement, and distribute an organization’s business processes with the support of information technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key benefits of BPM

A

Empowering employees.
Built-in reporting.
Enforcing best practices.
Enforcing consistency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business process re-engineering (Michael Hammer)

A

simply automating a bad process does not make it better. Instead, companies should “blow up” their existing processes and develop new processes that take advantage of the new technologies and concepts. BPR is fully understanding the goals of a process and then dramatically redesigning it from the ground up to achieve dramatic improvements in productivity and quality.

Unfortunately, business process re-engineering got a bad name in many organizations. This was because it was used as an excuse for cost cutting that really had nothing to do with BPR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Guidelines for BPR

A

Organize around outcomes, not tasks
Have those who use the outcomes of the process perform the process.
Merge information processing work into the real work that produces the information (part of company that created the information also processes it)
Treat geographically dispersed resources as though they were centralized
Link parallel activities instead of integrating their results.
Put the decision points where the work is performed, and build controls into the process.
Capture information at the source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISO certs

A

ISO is an acronym for International Standards Organization. This body defines quality standards that organizations can implement to show that they are, indeed, managing business processes in an effective way
In its most simple form, the auditors perform the following review.
• Tell me what you do (describe the business process).
• Show me where it says that (reference the process documentation).
• Prove that this is what happened (exhibit evidence in documented records).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Systems analyst

A

The systems analyst straddles the divide between identifying business needs and imagining a new or redesigned system to fulfill those needs.
Prior to analyzing the problem or the system of concern, the analyst needs to a) clearly identify the problem, b) gain approval for the project, c) identify the stakeholders, and d) develop a plan to monitor the project.

A systems analyst generally is not the one who does the actual development of the information system. It is vital for analysts to clearly understand the purpose of the business of interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

analysis phase of the project steps

A
  1. Seek out and identify the details
  2. Specify requirements
  3. Decide which requirements are most important
  4. Create a dialog showing how the user interacts with the existing system
  5. Ask users to critique the list of requirements that have been developed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Design phase steps

A
  1. Design the hardware environment
  2. Design the software
  3. Design how the new system will interface with the users
  4. Design hardware interfaces
  5. Design database tables
  6. Design system security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Programmer/developer

A

In the case of systems development, programmers generally attempt to fulfill the design specifications given to them by a systems analyst/ designer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

computer engineer

A

Computer engineers design the computing devices that are used every day. Different types include:
Hardware engineer. A hardware engineer designs hardware and test components such as microprocessors, memory devices, routers, and networks.
Software engineer. Software engineers tend to focus on a specific area of software such as operating systems, networks, applications, or databases.
Systems engineer. A systems engineer takes the components designed by other engineers and makes them all work together, focusing on the integration of hardware and software.
Network engineer. A network engineer understands the networking requirements of an organization and then designs a communications system to meet those needs, using the networking hardware and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Computer operator

A

A computer operator is the person who oversees the mainframe computers and data centers in organizations. Some of their duties include keeping the operating systems up to date, ensuring available memory and disk storage, providing for redundancy (think electricity, connectivity to the Internet, and database backups), and overseeing the physical environment of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Database administrator

A

A Database Administrator (DBA) is the person who designs and manages the databases for an organization. This person creates and maintains databases that are used as part of applications or the data warehouse. The DBA also consults with systems analysts and programmers on projects that require access to or the creation of databases.

20
Q

Help desk/support analyst

A

The help desk is the first line of support for computer users in the company. Computer users who are having problems or need information can contact the help desk for assistance.

21
Q

Chief information officer

A

This person aligns the plans and operations of the information systems with the strategic goals of the organization. Tasks include budgeting, strategic planning, and personnel decisions for the information systems function. The CIO must also be the face of the IT department within the organization.

Interestingly, the CIO position does not necessarily require a lot of technical expertise. While helpful, it is more important for this person to have good management skills and understand the business.

22
Q

functional manager

A

These functional managers’ report to the CIO and manage the employees specific to their function. For example, in a large organization there are a group of systems analysts who report to a manager of the systems analysis function.

23
Q

ERP management

A

EPR managers make sure that the ERP system is completely up to date, work to implement any changes to the ERP that are needed, and consult with various user departments on needed reports or data extracts.

24
Q

project managers

A

A project manager is responsible for keeping projects on time and on budget. This person works with the stakeholders of the project to keep the team organized and communicates the status of the project to management.
A project manager does not have authority over the project team. Instead, the project manager coordinates schedules and resources in order to maximize the project outcomes. This leader must be a good communicator and an extremely organized person. A project manager should also have good people skills.

25
Q

Information security officer

A

An information security officer is in charge of setting
information security policies for an organization and then overseeing the implementation of those policies. This person may have one or more people reporting to them as part of the information security team. The information security officer must ensure that the organization’s information remains secure from both internal and external threats.

26
Q

Where in the Organization Should IS Be?

A

In some organizations a matrix reporting structure developed in which IT personnel were placed within a department and reported to both the department management and the functional management within IS. The advantages of dedicated IS personnel for each department must be weighed against the need for more control over the strategic information resources of the company.
For many companies, these questions are resolved by the implementation of the ERP system

27
Q

Network based organization

A

The increased ability to communicate and share information has led to a “flattening” of the organizational structure due to the removal of one or more layers of management.
In a network- based organizational structure, groups of employees can work somewhat independently to accomplish a project. People with the right skills are brought together for a project and then released to work on other projects when that project is over. These groups are somewhat informal and allow for all members of the group to maximize their effectiveness.

28
Q

Technology adoption user types

A

the adoption rate started slowly and then dramatically increased once adoption hit a certain point. He identified five specific types of technology adopters: innovators- Innovators are willing to take risks, are the youngest in age, have the highest social class, have great financial liquidity, are very social, and have the closest contact with scientific sources and interaction with other innovators
early adopters- These individuals have the highest degree of opinion leadership among the other adopter categories, which means that these adopters can influence the opinions of the largest majority.
early majority- This group tends to be slower in the adoption process, has above average social status, has contact with early adopters, and seldom holds positions of opinion leadership in a system
late majority- The late majority will adopt an innovation after the average member of the society. These individuals approach an innovation with a high degree of skepticism, have below average social status, very little financial liquidity, are in contact with others in the late majority and the early majority, and show very little opinion leadership.
laggards- individuals in this category show no opinion leadership. These individuals typically have an aversion to change agents and tend to be advanced in age

29
Q

globalization

A

Globalization refers to the integration of goods, services, and culture among the nations of the world. Globalization is not necessarily a new phenomenon. Further advances in telecommunication and transportation technologies accelerated globalization. The advent of the worldwide Internet has made all nations virtual next-door neighbors.

30
Q

3 eras of globalization

A

“Globalization 1.0′′ occurred from 1492 until about 1800. In this era globalization was centered around countries.
“Globalization 2.0′′ occurred from about 1800 until 2000, interrupted only by the two World Wars. In this era, the dynamic force driving change was multinational companies.
“Globalization 3.0′′ is our current era, beginning in the year 2000. The convergence of the personal computer, fiber- optic Internet connections, and software has created a “flat- world platform” that allows small groups and even individuals to go global.

31
Q

Specific tech leading to globalization 3.0

A

Graphical user interface for the personal computer popularized in the late 1980s.
Build-out of the Internet infrastructure during the dot- com boom during the late-1990s.
Introduction of software to automate and integrate business processes

32
Q

advantages of the global firm

A

Ability to locate expertise and labor around the world.
Ability to operate 24 hours a day.
Larger market for their products.

33
Q

challenges of the global firm

A
Infrastructure differences
Labor laws and regulations
Legal restrictions. 
Language, customs, and preferences.
International shipping.
34
Q

The digital divide

A

As the Internet continues to make inroads across the world, it is also creating a separation between those who have access to this global network and those who do not. This separation is called the “digital divide” and is of great concern.

Broken up into three stages: the economic
divide (virtually solved), the usability divide, and the empowerment divide (Many people will limit what they can do online by accepting the basic, default settings of their computer and not work to understand how they can truly be empowered).

Other concerns: Social mobility. Lack of computer education works to the disadvantage of children with lower socioeconomic status.
• Democracy.
• Economic growth. Greater use of the Internet in developing countries could provide a shortcut to economic advancement.

35
Q

The focus on the continuing digital divide has led the European Union to create an initiative known as The European 2020 Strategy.

A

Five major areas are being targeted: a) research and development, b) climate/ energy, c) education, d) social inclusion, and e) poverty reduction.

when thinking about the digital divide is that the researchers found that, in order to be effective, they had to customize their technology and tailor their implementation to the specific group they were trying to reach

36
Q

Information system ethics

A

The introduction of new technology can have a profound effect on human behavior. New technologies give us capabilities that we did not have before, which in turn create environments and situations that have not been specifically addressed in an ethical context. Those who master new technologies gain new power while those who cannot or do not master them may lose power. The term ethics means “a set of moral principles” or “the principles
of conduct governing an individual or a group.

37
Q

Code of ethics

A

A code of ethics outlines a set of acceptable behaviors for a professional or social group. Generally, it is agreed to by all members of the group. The document details different actions that are considered appropriate and inappropriate.

A code of ethics can also have some drawbacks. First, a code of ethics does not have legal authority. Another possible disadvantage of a code of ethics is that there is always a chance that important issues will arise that are not specifically addressed in the code. Finally, a code of ethics could also be a disadvantage in that it may not entirely reflect the ethics or morals of every member of the group.

38
Q

Intellectual property

A

Digital technologies have driven a rise in new intellectual property claims and made it much more difficult to defend intellectual property. Intellectual property is defined as “property (as an idea, invention, or process) that derives from the work of the mind or intellect.
Instead, intellectual property laws are written to protect the tangible results of an idea. In other words, just coming up with a song in your head is not protected, but if you write it down it can be protected.
Protection of intellectual property is important because it gives people an incentive to be creative.

39
Q

Copyright

A

Under the terms of copyright, the author of a work controls what can be done with the work, including:
• Who can make copies of the work.
• Who can make derivative works from the original work.
• Who can perform the work publicly.
• Who can display the work publicly.
• Who can distribute the work.
Many times, a work is not owned by an individual but is instead owned by a publisher with whom the original author has an agreement. In return for the rights to the work, the publisher will market and distribute the work and then pay the original author a portion of the proceeds.

40
Q

First sales doctrine

A

The first sale doctrine, codified at 17 U.S.C. § 109, provides that an individual who knowingly purchases a copy of a copyrighted work from the copyright holder receives the right to sell, display or otherwise dispose of that particular copy, notwithstanding the interests of the copyright owner.

41
Q

Fair use

A

Fair use is a limitation on copyright law that allows for the use of protected works without prior authorization in specific cases.
Fair use is a well-known and respected concept and will only be challenged when copyright holders feel that the integrity or market value of their work is being threatened. The following four factors are considered when determining if something constitutes fair
use:
1. The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes;
2. The nature of the copyrighted work;
3. The amount and substantiality of the portion used in relation to the copyrighted work as a whole;
4. The effect of the use upon the potential market for, or value of, the copyrighted work.

42
Q

The Digital Millennium

Copyright Act

A

In 1998, the US Congress passed the Digital Millennium Copyright Act (DMCA), which extended copyright law to take into consideration digital technologies. Two of the best-known provisions from the DMCA are the anti-circumvention provision and the “safe harbor” provision.
The anti-circumvention provision makes it illegal to create technology to circumvent technology that has been put in place to protect a copyrighted work.
The “safe harbor” provision limits the liability of online service providers when someone using their services commits copyright infringement.
Many think that the DMCA goes too far and ends up limiting our freedom of speech.
Creative Commons is a nonprofit organization that provides legal tools for artists and authors. By using a Creative Commons license, authors can control the use of their work while still making it widely accessible.

43
Q

Patent

A

A patent creates protection for someone who invents a new product or process. Once a patent is granted it provides the inventor with protection from others infringing on his or her patent. A patent holder has the right to “exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States for a limited time
Patents must be: Must be original. Must be non-obvious. Must be useful

44
Q

Patent troll

A

A patent troll is a person or organization who gains the rights to a patent but does not actually make the invention that the patent protects. Instead, the patent troll searches for those who are illegally using the invention in some way and sues them. In many cases the infringement being alleged is questionable at best.

45
Q

Two types of trademarks

A

Two types of trademarks exist – a common law trademark and a registered trademark. As with copyright, an organization will automatically receive a trademark if a word, phrase, or logo is being used in the normal course of business (subject to some restrictions, discussed below). A common law trademark is designated by placing “TM” next to the trademark. A registered trademark is one that has been examined, approved, and registered with the trademark office, such as the Patent and Trademark Office in the US. A registered trademark has the circle-R (®) placed next to the trademark.

46
Q

privacy

A

privacy will mean the ability to control information about oneself. The ability to maintain our privacy has eroded substantially in the past decades, due to information systems.

47
Q

NORA

A

This process of collecting large quantities of a variety of information and then combining it to create profiles of individuals is known as Non-Obvious Relationship Awareness, or NORA.
In some settings NORA can bring many benefits such as in law enforcement. But these advantages come at a price, namely, our privacy.
Do Not Track is a technology and policy proposal that enables users to opt out of tracking by websites they do not visit, including analytics services, advertising networks, and social platforms.
US- opt out (default is to share) Europe is opt in (default is to not share)