Technology Management Flashcards
3 Components of Big Data
- Volume
- Velocity
- Variety
Volume in big data
Data sets have grown so large that new tools are required to store, access, and analyze
Velocity in big data
Data can flow into systems quickly - real-time info is needed for analysis
Variety in big data
Systems must be capable of taking in and integrating diverse forms of data - not only numbers, but images, video, audio, etc.
3 Ways Big Data can help HR
- Collecting new data
- Using existing data more effectively
- Better strategic analysis
4 Components of information systems
- Presentation tier
- Logic tier
- Data tier
- Communications tier
User interface with the system, point at which user can enter requests/receive responses - traditional computer monitor or mobile device
Presentation Tier
Composed of system software and application software that enable operations
Logic Tier
Stores info that will be used by the application to respond to user queries
Data Tier
Enables sharing of data and applications by networking a computer with other computers or servers
Communications Tier
Allow different parts of an org to access the same data and perform more efficiently
Enterprise Resource Planning (ERP) systems
Advantages and Risks of the Cloud
Advantages - flexibility and cost savings for scalability of data
Risks - loss of data, unauthorized access of data
Software that is owned, delivered, and managed remotely by one or more providers and delivered over the internet
SaaS
A part of AI that is focused on improving accuracy and identifying patterns
Machine Learning
Benefits of self service and manager service tools
Help reduce transactional work of HR, allowing HR to be seen as a strategic resource
What must be balanced for effective information management?
Openness (easy access to a large amount of info) and security (from those who would misuse it)
5 Steps to technology acquisition process
- identify needs and requirements
- evaluate offerings
- develop business case
- implement change
- evaluate new technology’s contribution
3 Approaches to deliver technology
- on premises
- hosted (located at vendor’s site)
- SaaS (accessed through cloud)
Best approach to launch new technology
Implement through test in one part of the org to correct the product and strengthen the training
3 Protections for data and system security
- limiting logical and physical access to data and systems
- encrypting data that is being transmitted over the internet or stored on system servers
- protecting against hacking and social engineering
Attempting to access data without permission
Hacking
Tricking a user into sharing info that can be used to access systems
Social Engineering
Way to protect data privacy
Implement a compliance audit of all the processes using employee/applicant data
Best approach to monitoring employee’s emails, browser history, etc.
Tell employees ahead of time that their communications may be tracked