Technology Management Flashcards

1
Q

Big Data

A

A collection of data that is huge in volume–making more informed, evidece based decisions

*Can help HR by collecting new data, using existing data more effectively, and allowing for better strategic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three Features of Big Data

A

Volume: datasets have grown so large that new tools are required to store, access, and analyze them (AMOUNT)

Velocity: Data can flow into a system so quickly that its currency becomes an issue, so data must be updated frequently (SPEED)

Variety: Data is not only numbers now–it may be still images, videos, or audio recordings (DIVERSE FORMS)

*Big Data makes it more possible to see patterns and trends, to create models that isolate possible causes and predict outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information System (IS)

A

A way to collect, organize, store, analyze, and share data–they feature 4 Basic Components: Presentation Tier, Logic Tier, Data Tier, Communication Tier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Basic Components of Information Systems (4)

A
  1. Presentation Tier: the user interface with the system, the point at which the user can enter requests and receive responses, allows for control of access
  2. Logic Tier: system software that enables operation.
  3. Data Tier: stores the info that will be used by the application tier to respond to user queries
  4. Communication Tier: enables sharing of data and applications by networking a computer with other computer or servers. (VPNs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Enterprise Resrource Planning (ERP)

A

Designed to allow the different parts of an orgz to access the same data and perform more efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HRIS

A

A type of technology that supports HR functions and enables HR to gather, store, maintain, retrieve, revise, analyze, and report HR data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Best of Breed

A

The best system in its referenced niche.

*Designed to serve unique situations or satisfy specific preferences–it may NOT communicate with an orgz database successfully

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Scalability

A

Big data has created an issue with scalability–how to increase the amount of data stored without increasing processing time and how to manage capacity.

Increased processing time is a tech issue
Increased capacity is a economic issue

This is why cloud computing is an option but the risks are security and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security

A

When acquiring technology, users may be concernced about:

  1. Security vulnerabilities (access only to what is needed)
  2. Managing users’ security levels (access levels)
  3. Governance (document all transactions)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HR Technology Applications

A

The software products can:

  1. Automate complex processes (payroll)
  2. Produce data that can be used for other applications (integration)
  3. Support data analysis (metrics)
  4. Support compliance related activities (ATS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SaaS

A

Software that is owned, delivered, and managed remotely by one or more providers

A customer can order additional capacity, add on’s, or features

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Artificial Intelligence (AI)

A

The ability of a computer to imitate human thought and behavior

  1. can improve the experience of customer help lines
  2. may be equipped with optical and speech recognition
  3. virtualization may allow the creation of aural or visual representatives who can communicate easily w users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Manager Self Service Technologies

A

Provide managers with access to current data on their EEs and budgets and allow them to perform for themselves transactions that previously required HRs implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Developing a Process for Purchasing Technology

A

Assess Needs>Prioritize Requirements>Identify and Assess Providers>Create a Business Case>Implement and Assess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Developing a Process for Purchasing Technology ‘Assess Needs’

A

You need to assess:

  1. HR’s Needs: What will we need?
  2. Users Needs: What will they need?
  3. Orgz Needs: What does the orgz need?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Developing a Process for Purchasing Technology ‘Prioritize Technology Requirements’

A

What will meet our needs?

  • Do we need it on the premises or the cloud?
  • Will we own it, lease it, license it, or subscribe?

Cloud offers no direct control
On premises offers complete control

17
Q

Developing a Process for Purchasing Technology ‘Identify and Assess Providers’

A
  1. Do an internet search and review websites
  2. Review analyst reports
  3. Ask for recommendations from HR colleagues
  4. Contact existing vendors and ask if they offer the product
  5. Attend HR professional meetings and tech trade shows
18
Q

Developing a Process for Purchasing Technology ‘Create a Business Case’

A

Leaders will be interested in how:

  1. The purchase aligns strategically with the orgz and HRs objectives
  2. What capabilities are being added
  3. How it affects the orgz level of risk
  4. What type of ROI the orgz will receive
19
Q

Developing a Process for Purchasing Technology ‘Implement and Assess New Technology’

A

Can be done through:

Test: introduced to one part of the orgz before going broadly
Correct: opportunities to correct the product and strengthen the training
Change: there will be resistance, but show the benefits of the change
Feedback: gather continous feedback
Assess: assess against the original criteria

20
Q

Data and System Security General Security Protections Involve:

A
  1. Limiting physical access to databases and systems
  2. Ecncrypting data transmitted over the Internet or stored on system services
  3. Protecting against hacking and social engineering
21
Q

Limiting Logical and Physical Access to Data and Systems

A

Access to databases can be restricted with firewalls, which are software and/or hardware intended to filter incoming and outgoing communication according to preset rules

22
Q

Encryption

A

Encryption is the conversion of data into a format that protects or hides its natural presentation or intended meaning

23
Q

Hacking

A

The act of attempting to access data without permission:

  1. Phishing
  2. Fake e-cards or job opening information
  3. Phony security alerts
  4. Click this link scams
24
Q

GDPR and HR Practices

A

This protects European data–EU citizen information specifically

25
Q

Managing Collaboration Risks

A
  1. Providing the host of a meeting with full control over the tech tools
  2. Using passcodes to ensure that only invitees have access
  3. Including legal disclaimers in all docs that outline the rights and responsibilities of the participants
26
Q

A BYOD policy might

A
  1. Restrict the use of personal devices while the EE is working in the workplace during the EEs work hours
  2. State which devices will be supported by IT and the requirements for using the device
  3. Clarify financial arrangements
  4. Define security measures
27
Q

Approaches to Technology Delivery (3)

A
  1. On-Premise: purchasing hardware or software internally
  2. Hosted: located @ vendor site
  3. Software as a Service: subscription to software–cloud based
28
Q

Define Performance Objectives

A

what is the budget?

date for launching?

what capabilities will the technology provide?

what are the responsibilities of HR, the orgz, vendor?