Terminology and Most Important Things Flashcards

1
Q

Six major objectives of IS

A
  • operational excellence
  • new products, services, and business models
  • customer/supplier intimacy
  • improved decision making
  • competitive advantage
  • (day-to-day) survival
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information Systems

A

technical perspective, an IS collects, stores, and distributes information from an organization’s environment to support organisational functions, decision making, communication, coordination, control, analysis, and visualisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

technical approach to IS

A

computer science, management science, operations research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

behavioral approach to IS

A

psychology, sociology, economics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

sociotechnical view of systems

A

considers both technical and social features of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is new in managing IS?

A
  • IT innovations (IoT, cloud computing, big data, etc.)
  • New Business Models (e.g. Netflix)
  • E-commerce expansion
  • Management changes (going mobile, remote, etc.)
  • Changes in firms (less hierarchy, flattened)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Generative AI

A

a type of AI that can create new content and ideas, including conversations, stories, images, videos, and music
- information output can be incorrect even though it sounds correct called: hallucinating
- danger of Deepfakes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Globalization

A
  • jobs move across borders
  • IS expanding rapidly
  • customers shop worldwide
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital Firm

A
  • nearly all important business operations and relationship are accomplished digitally or through digital networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Six major objectives of IS

A
  • operational excellency
  • new products, services, business models
  • customer/supplier intimacy
  • improved decision making
  • competitive advantage
  • (day to day) survival
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Functions of an IS

A
  • input (collects raw data)
  • processing (make raw data into usable information)
  • output (distribute meaningful information)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three management levels of an organisation?

A
  • Senior management (makes executive decisions, makes long-term strategic decisions)
  • Middle management (execute tasks and goals -> reduced through IS)
  • Operational management (execution of day-to-day operations such as f.e. payroll)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business process

A
  • logically related set of activities
  • IS automate parts of business processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Transaction processing system (TPS)

A
  • serves operational management
  • track the flow of daily tasks/routines
  • payroll etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Management Information Systems (MIS)

A
  • serves middle management
  • produces reports based on TPS
  • have little analytical value
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Decision-support system (DSS)

A
  • support management decision making
  • use internal information from TPS & MIS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Executive support system (ESS)

A
  • serves senior management
  • shows data, information via digital dashboard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Enterprise applications

A
  • coordinate multiple functions and business processes
  • integrate key business processes into a single software
  • SCM, CRM, KMS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Supply chain management (SCM)

A
  • helps firms manage relationship w suppliers to optimise, sourcing, manufacturing, and delivery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Customer relationship management (CRM)

A
  • coordinate business processes to surrounding firm’s customers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Knowledge management system

A
  • enables firms to optimise the creation, sharing, and distribution of knowledge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Collaboration

A

working with others to achieve shared and explicit goals
- often receive better result than when done alone (wisdom of crowds)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Social business

A

is the use of internal and external social networking platforms to further engage employees, customers, and suppliers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Business Intelligence (BI)

A

term for for data and software tools for organising, analysing, and providing access to data to help decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Time/Space collaboration and social tool matrix

A
  • same time/same place: face-to-face interactions
  • same time/different place: remote interactions (video calls)
  • different time/same place: continuous task (project management)
  • different time/different place: communication & coordination (e-mails)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

IS and organisations influence each other through

A
  • environment
  • culture
  • structure
  • business processes
  • politics
  • management decisions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Technical microeconomic view of the organization

A
  • social structure that processes resources from the environment to produce outputs
  • how inputs are combined to create outputs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Behavioral view of the organization

A
  • emphasizes people, relationships, values, culture
  • basically the environment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Disruptive technologies

A

sweeps away the systems or habits it replaces because it has attributes that are recognizably superior
- streaming over purchasing f.e.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Flattening Organizations

A
  • IS can reduce the number of levels (management levels)
  • providing managers with information to supervise larger number of employees
  • giving lower-level employees more decision-making authority
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Resistance to change/organizational resistance

A
  • if implementation of IS fails, it is often not the technology but the resistance to change organisationally or politically
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Porter’s Competitive Five Forces Model

A

strategic position of the firm is not only determined by it’s immediate
- competitors
but also
- Substitute products
- new-market entrants
- suppliers
- customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Strategies for dealing with the five forces (Porter)

A
  1. Low Cost leadership (lower price than competitor: LIDL)
  2. Product Differentiation (Tesla; innovative, electric cars)
  3. Focus on niche market (making food products vegan)
  4. Strengthen customer-supplier intimacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Value chain model

A

Primary and support activities of a firm along the value chain
- suppliers’ suppliers
- suppliers
- firm
- distributors
- customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Ethics

A

principles of right and wrong
- core values integrated into corporate culture at best
- IS raise new ethical questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Five moral dimensions

A
  • information rights and obligations
  • property rights and obligations
  • system quality
  • quality of life
  • accountability and control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Technology trends that raise ethical issues

A
  • computing power doubles every 18 months (Moore’s Law)
  • data storage costs rapidly decline; more data available on you (Law of Mass Digital Storage)
  • mobile device tracking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Advances in data analysis techniques

A
  • profiling: combine data from multiple sources to create detailed information
  • NORA (non-obvious relationship awareness): combining data from different sources to find obscure, non-obvious relationships (applicant shares same phone number as known criminal)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Basic concepts of ethical IS

A
  1. Responsibility (accept costs, duties, obligations)
  2. Accountability (who is responsible)
  3. Liability (cover damages done)
  4. Due process (law applied correctly)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

5 step ethical analysis

A

a. identify and clearly describe the facts (who is involved, what do they do)
b. define the conflict or dilemma and identify the higher order values
c. identify the stakeholders
d. identify the options that you can reasonably take
e. identify the potential consequences of your options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Golden rule

A

do unto others as you would have them do unto you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Immanuel Kant’s categorical imperative

A

if an action is not good for everyone, it is not good for anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Slippery slope rule

A

if an action cannot be done repeatedly it should be done at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Utilitarian principle

A

always strive for the action that generates the highest value outcome

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Risk aversion principle

A

take the action that produces the least harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Ethical “no free lunch” rule

A

assume that virtually all tangible and intangible objects are owned by someone unless there is a specific declaration otherwise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

IT infrastructure

A
  • includes hardware, software, and services
  • shared technology resources
48
Q

Five stages of IT infrastructure evolution

A
  • mainframe/mini computing era (1959)
  • personal computer era (1981)
  • client/server era (1983)
  • enterprise computing era (1991)
  • cloud and mobile computing era (2000)
49
Q

Moore’s Law

A
  • increase in processing power and decline of cost
  • every 18 months the power of microprocessors doubles and the price of computing falls in half
  • still applicable but not really accurate
50
Q

Law of Mass Digital Storage

A
  • exponential decrease in the cost of storing data
51
Q

Metcalfe’s Law

A

a network’s value to participants grows exponentially as the network takes on more members

52
Q

IT Infrastructure ecosystem/components

A
  • Data Management and Storage
  • Internet Platforms
  • Computer Hardware Platforms
  • Operating System Platforms
  • Enterprise Software Applications
  • Networking/Telecommunications
  • Consultants and Sytem Integrators
53
Q

Current trends in computer hardware platforms

A
  • mobile digital platform
  • customization and BYOD (IT devices/trends emerge within consumer first and the firm has to adapt, as the employee uses their own device)
  • quantum computing (uses quantum mechanics)
  • cloud computing
  • edge computing
54
Q

Total cost of ownership (TCO)

A
  • total cost of a product during its lifecycle
55
Q

Traditional file management

A
  • makes it difficult for organizations to keep track of all pieces of data as different areas and groups were allowed to develop their own file independently
56
Q

Traditional file management creates problems such as

A
  • data redundancy
  • data inconsistency
  • program dependence
  • poor flexibility
  • poor security
  • lack of data sharing and availability
57
Q

DBMS (database management system)

A
  • permits centralisation of data
  • combats problems of traditional file management
58
Q

Data hierarchy

A

Bit - Byte - Field - Record - File - Database

59
Q

Relational DBMS

A

type of logical database that organises data in form of 2-dimensional tables

60
Q

SQL (Structured Query Language)

A

SQL is used to add, change, and retrieve data in the database

61
Q

Non-relational DBMS

A

(no SQL)
- use a more flexible data model and are designed for managing large data sets across many distributed machines and for easily scaling up and down

62
Q

Data warehouses (BI Infrastructure)

A
  • database that stores current & historical data of potential interest
63
Q

Data Marts (BI Infrastructure)

A
  • subset of Data Warehouses, decentralised warehouses with highly focused portion of the data for specific populations of users
64
Q

Hadoop (BI Infrastructure)

A

used for big data and big quantities
- in-memory computing, used for Big Data Analysis

65
Q

Analytic Platforms (BI Infrastructure)

A

high speed, good for large data sets

66
Q

Analytical Tools for BI

A
  • Online Application Processing (OLAP)
  • Data Mining (discover in data)
  • Text Mining (analyse texts/trusted computing)
  • Web mining (analyse WWW)
67
Q

Network

A

two or more connected computers

68
Q

Client/server computing

A

model for computing that splits processing between clients and servers on a network, assigning functions to the machine most able to perform the function

69
Q

Packet switching

A

data are grouped into small packets, which are transmitted along different communication channels and reassembled at their final destination
- used to optimise the channel capacity

70
Q

TCP (Transmission Control Protocol)/IP (internet protocol) reference model

A
  1. Application layer
  2. Transport layer
  3. Internet layer
  4. Network Interface layer
71
Q

Types of Networks

A
  • LAN (local area network: up to 500m)
  • CAN (campus area network: up to 1,000 meters)
  • MAN (Metropolitan area network: city or metropolitan area)
  • WAN (wide area network: regional, transcontinental, or global area)
72
Q

What is often used for high-capacity Internet connections

A
  • DSL (digital subscriber line)
  • cable internet connections
  • T1 lines (twisted copper)
73
Q

DNS (domain name system)

A

converts domain names into IP addresses

74
Q

VPN (virtual private networks)

A

secure, encrypted, private network within the Internet

75
Q

Hypertext

A
  • webpages are based on HTML (hypertext markup language), which formats documents and incorporates dynamic links
76
Q

Types of Search

A
  • Mobile search (from smartphone)
  • Semantic search (understanding the meaning behind words)
  • Social search (related to social media)
  • Visual search (for visual media)
77
Q

Radio Frequency Identification (RFID)

A
  • using low-powered radio transmitters to read data stored in a tag
78
Q

Digital data are vulnerable to

A
  • destruction
  • misuse
  • error
  • fraud
  • hardware & software failure
79
Q

Denial-of-Service Attacks (DoS)

A
  • attacks that make systems inaccessible or render them out of operation
  • bombarding a server with so many requests that the system can no longer function as intended
80
Q

Types of Malware (malicious software)

A
  • computer virus (software program that attaches itself to other programs or data files to be executed)
  • worms (independent programs that copy themselves from one computer to another)
  • trojan horse (seemingly benign software programs that do unexpected things)
  • spyware (small programs that install themselves to monitor activity)
  • ransomware (tries to exert money from user by taking control of computer)
  • keyloggers (record every keystroke made on computer to steal personal data)
  • drive-by-downloads: malware that comes with a dowloaded file
81
Q

Types of Computer crime

A
  • spoofing (hacker hides identity)
  • sniffing (eavesdropping program)
  • identity theft
  • phishing (setting up fake website or e-mail that looks real to obtain personal information)
  • evil twins (wireless networks that pretend to offer wi-fi by seeming like the real one)
  • pharming (redirects user to a bogus page)
  • click fraud (individual or computer program that click on pay-per-click ad or boosts page ranking
82
Q

Internal threats

A
  • employees (doing security protocols sloppily)
83
Q

Information system audit

A

examines the firm’s overall security environment and control governing individual information systems

84
Q

Tools to safeguard IS

A
  • identity management (IdM): tools for identifying the valid user of the system (password, token, authentication, etc.)
  • firewalls: prevent unauthorised users from accessing private networks
  • intrusion detection systems (alarm)
  • anti-malware software
85
Q

Encryption

A

is the process of transforming plain text/data into cipher text that can only be read by sender receiver
- SSL (secure sockets layer) enable client and server computers to manage encryption and decryption

86
Q

Public key encryption

A
  • a method of encrypting or signing data with two different keys and making one of the keys
  • Data encrypted with the public key can only be decrypted with the private key
87
Q

Digital certificates

A
  • help establish the identity of people or electronic assets
  • protect online transactions
88
Q

Enterprise software

A

integrated enterprise-wide information systems that coordinate key internal processes of the firm

89
Q

SCM (supply chain management)

A

coordinate planning, production, and logistics with suppliers and
- automate information flow among members of the supply chain so they can make better decisions
- includes software for supply chain planning and supply chain execution
- makes supply chain leaner

90
Q

Types of SCM

A
  • push-based model (build-to-stock) (old one): earlier SCM systems, schedules based on best guesses and demands
  • pull-based model (demand-driven): contemporary, web-based, customer orders trigger events in supply chain
91
Q

Upstream vs Downstream supply chain

A
  • Upstream: from the suppliers to the firm
  • Downstream: from the firm to the customers (through distributors, retailers)
92
Q

The bullwhip effect

A

minor fluctuations in demand can cause higher fluctuation in supply and overstocking
- info of product demand gets distorted along the supply chain

93
Q

Global supply chain issues

A
  • greater geographical distances
  • different time zones
  • different country performance standards & legal requirements
  • internet does help manage global complexities
94
Q

Customer Relationship Management (CRM) systems

A

integrate and automate customer-facing processes in sales, marketing, and customer service, providing an enterprise-wide view of customers

95
Q

Types of CRM

A
  • operational CRM (customer facing applications)
  • analytical CRM (analysis of customer data to improve business performance)
  • social CRM (incorporating social networking technique, internally and externally)
96
Q

Churn rate

A
  • number of customers who stop purchasing products or services
  • indicator of growth or decline
97
Q

Unique technology features of e-commerce

A
  • ubiquity (meaning common) (everywhere, everyone)
  • global reach
  • universal standards
  • richness (supports video, audio, and text messages)
  • interactivity
  • information density
  • personalization/customization
  • social technology
98
Q

Benefits of digital markets

A
  • more transparent than traditional markets
  • reduced information asymmetry
  • lower search cost, transaction costs, and menu costs
  • the ability to change prices dynamically based on market conditions
  • foster market segmentation
  • stronger network effects
99
Q

Major types of E-Commerce

A
  • B2C (e.g. any online store)
  • B2B (e.g. Slack)
  • C2C (e.g. eBay)
100
Q

principal e-commerce revenue models are

A
  • advertising
  • sales
  • subscription
  • free/fremium (free services for basic services but charging for ‘premium’)
  • transaction fee
  • affiliate (websites are paid as ‘affiliates’ for sending their visitors to other sites in return of a referral fee)
101
Q

Long-tail marketing

A
  • ability to reach a large audience inexpensively
  • strategy of targeting a large number of niche markets with a product or service (example rec. on amazon)
102
Q

Behavioral targeting

A
  • tracking online behaviour of individuals on thousands of websites and within apps
  • thus privacy concerns
  • programming ad buying
  • native advertising
103
Q

Native advertising

A
  • placing ads within social network/ newsfeed or traditional editorial content , such as newspaper article
104
Q

M-Commerce’s main areas of growth

A
  • mass market retailing (amazon, eBay, etc.)
  • sales of digital content (music, tv, etc.)
  • in-app sales to mobile devices
105
Q

Most important challenges of building e-commerce presence

A
  • developing clear understanding of business objectives
  • knowing how to choose the right technology to achieve those goals
106
Q

E-Commerce presence includes 4 areas

A
  • websites
  • email
  • social media
  • offline media
107
Q

S-Commerce (social e-commerce)

A
  • shoppers make their purchases within social media platforms
  • intrinsically connected with social media marketing
108
Q

Grand vision and realistic vision of what AI is

A
  • Grand vision: computer hardware and software systems that are as ‘smart’ as humans
  • Realistic vision: systems that take data inputs, process them, and produce outputs and that can perform many complex tasks that would be difficult or impossible for humans to perform
109
Q

Machine Learning

A
  • can identify patterns and relationships in very large data sets without explicit programming although with significant human training
110
Q

Neural networks

A
  • algorithms loosely based on the processing patterns of the biological brain that can be trained to classify objects into known categories based on data inputs
111
Q

Deep learning networks

A
  • subset of machine learning
  • makes use of neural engine
112
Q

Genetic algorithms

A
  • problem-solving methods that promote the evolution of solutions to specified programs using the model of living organisms adapting to their environment
113
Q

Natural Language Processing (NLP)

A
  • enables computers to understand natural language as humans do. Whether the language is spoken or written, natural language processing uses artificial intelligence to take real-world input, process it, and make sense of it in a way a computer can understand (e.g. Siri, Alexa)
114
Q

Computer vision systems

A
  • Computer vision is a field of artificial intelligence (AI) that enables computers and systems to derive meaningful information from digital images, videos and other visual inputs — and take actions or make recommendations based on that information (e.g. passport control at airports)
115
Q

Robotics

A
  • design, construction, and operation of machines that can substitute for humans in many factory, office, and home applications (e.g. smart vacuums)
116
Q

Artificial intelligence

A
  • systems that perform activities that we associate with human thinking, activities such as decision-making, problem solving, learning
117
Q

Hybrid intelligence

A

ability to achieve complex goals by combining humans and artificial intelligence, thereby reaching superior results, and continuously learning from each other” (e.g. my bachelor thesis)