Term
|
Definition
independent computer programs that copy themselves from one computer to othercomputers over a network. Unlike a virus, they can operate on their own without attaching to other computer program files and rely less on human behavior in order to spread from computer to computer. |
|
|
Term
|
Definition
a software program that appears to be benign but then does something other than expected. It is not itself a virus bc it does not replicate but is often a way for viruses or other malicious code to be introduced to a computer system. |
|
|
Term
|
Definition
record every keystroke made on a computer to steal serial numbers for software, to launch internet attacks, gain access to email accounts, obtain passwords to protected computer systems, or to pick up personal info such as credit card numbers. |
|
|
Term
|
Definition
the intentional disruption, defacement or even destruction of a Web site or corporate info system. |
|
|
Term
|
Definition
invovle redirecting a web link to an address different from the intended one, with the site masquerading as the intended destination. |
|
|
Term
|
Definition
a type of eavesdropping program that monitors info traveling overa network. It helps these people identify potential network trouble spots or criinal activity on networks, but when used for criminal purposes, they can be damagning and very difficult to detact. |
|
|
Term
|
Definition
hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network. |
|
|
Term
|
Definition
attack uses numerous computers to inundate and overwhelm the network from numerous launch points. Ex. during the 09 iranian election protests, foreign activits trying to help the opposition engaged in DDos attacks against Iran's government. |
|
|
Term
|
Definition
involves setting up fake web sites or sending email or text messages that look like those of legitimate businesses to ask users for confidential personal data. The message instructs recipients to update or confirm records by providing social security numbers, bank and credit card info and other confidential data either by responding to the email message, by entering the information at a bogus web site or by calling a telephone number. |
|
|
Term
|
Definition
are wireless networks taht pretend to offer trustworthy wifi connections to the internet such as those in airport lounges, hotels or coffee shops. |
|
|
Term
|
Definition
redirects users to a bogus web page even when the individual types the correct web page into his or her browser. |
|
|
Term
|
Definition
occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase. |
|
|
Term
|
Definition
requires financial institutions to ensure the security and confidentiality of customer data. Data must be stored on a secure medium, and special security measures must be enforced to protect such data on storage media and during transmittal. |
|
|
Term
|
Definition
govern the design, security, and use of computer programs adn the security of data files in general throughout the organization's info technology infrastructure. General controls apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. |
|
|
Term
|
Definition
check data for accuracy and completeness when they enter the system. there are sepcific input controls for input authorization, data conversion, data editing, and error handling. |
|
|
Term
|
Definition
establish that data are complete and accurate during updating. |
|
|
Term
|
Definition
ensure that the results of computer processing are accurate, complete and properly distributed. |
|
|
Term
|
Definition
monitor the use of system software and prevent unauthorized access of software programs, system software, and computer programs. |
|
|
Term
|
Definition
ensure that computer hardware is physically secure, and check for equipment malfunction. |
|
|
Term
computer operations control |
|
Definition
oversee the work of teh computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data. |
|
|
Term
|
Definition
ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage. |
|
|
Term
|
Definition
audit the systems development process at various points to ensure that the process is properly controlled and managed. |
|
|
Term
|
Definition
formalize standards, rules, procedures and control disciplines to ensure that the organization's general and application controls are properly executed and enforced. |
|
|
Term
|
Definition
defines acceptable uses of the firm's info resources and computing equipment, including desktop and laptop computers, wireless devices telephones and internet |
|
|
Term
|
Definition
determine differing levels of access to info assets for different levels of users. |
|
|
Term
authriation management systems |
|
Definition
establish where and when a user is permitted to access certain parts of a web site or corporate database. Such systems allow each user access to those portions of a system that person is permitted to tenter, based on info esstablished by a set of access rules. |
|
|
Term
|
Definition
built around thousands of predefined business processes that reflect best practices. |
|
|
Term
|
Definition
a network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products and distributing the finished products to customers. |
|
|
Term
|
Definition
Identify the problem gathers information, devise alternative solutions, and make a decision about the best solution. |
|
|
Term
|
Definition
shows how the chosen solution should be realized. The system design is the model or blueprint for an information system solution and consists of all the specifications that will deliver the functions identified during systems analysis. These specifications should address all of the technical, organization, and people |
|
|
Term
Hardware selection and acquisition- |
|
Definition
System builders select appropriate hardware for the application. They would either purchase the necessary computers and networking hardware or lease them from a technology provider. |
|
|
Term
Software development and programming- |
|
Definition
Software is custom programmed in house or purchased from an external source, such as an outsourcing vendor, an application software package vendor, or an application service provider. |
|
|
Term
|
Definition
the system is thoroughly tested to ensure it produces the right results. |
|
|
Term
|
Definition
The testing process requires detailed testing of individual computer programs |
|
|
Term
|
Definition
tests the performance of the information system as a whole. |
|
|
Term
|
Definition
provides the final certification that the system is ready to be used in a production setting. Information systems tests are evaluated by users and reviewed by management. |
|
|
Term
|
Definition
process of changing from the old system to the new system. There are three main conversion strategies: the parallel strategy, the direct cutover strategy, and the phased approach strategy. |
|
|
Term
|
Definition
both the old system and its potential replacement are run together for a time until everyone is assured that the new one functions correctly. |
|
|
Term
|
Definition
replaces the old system entirely with the new system on an appointed day, carrying the risk that there is no system to fall back on if problems arise. |
|
|
Term
Phased approach strategy- |
|
Definition
introduces the system in stages (such as first introducing the modules for ordering Girl Scout cookies and then introducing the modules for transmitting orders and instructions to the cookie factory and shipper). |
|
|
Term
|
Definition
After the new system is installed and conversion is complete. During this stage, users and technical specialists review the solution to determine how well it has met its original objectives and to decide whether any revisions or modifications are in order. |
|
|
Term
|
Definition
changes in hardware, software, documentation, or procedures to a production system to correct errors, meet new requirements, or improve processing efficiency. |
|
|
Term
|
Definition
model human knowledge as a set of rules that collectively are called the knowledge base. can have from 200 to 10,000 of these rules, depending on the complexity of the decision program. |
|
|
Term
|
Definition
consists of building an experimental system rapidly and inexpensively for end users to interact with and evaluate. It is refined and enhanced until users are satisfied that it includes all of their requirements and can be used as a template to create the final system. |
|
|
Term
Application software packages- |
|
Definition
eliminate the need for writing software programs when developing an info system. |
|
|
Term
|
Definition
consists of using an external vendor to build or operate a firms information systems. If it is properly managed, outsourcing can save application development costs or enable firms to develop apps without an internal info systems staff. |
|
|
Term
|
Definition
provide analytical models or tools for analyzing large quantities of data and supportive interactive queries for middle managers who face semi structured decision situations. |
|
|
Term
|
Definition
is a collection of current or historical data from a number of applications or groups. It may be a small database residing on a PC that contains a subset of corporate data that has been downloaded and possibly combined with external data. |
|
|
Term
|
Definition
contains the software tools that are used for data analysis. It may contain various OLAP tools, data mining tools, or a collection of mathematical and analytical models that easily can be made accessible to the DSS user. |
|
|
Term
|
Definition
models ask what if questions repeatedly to determine the impact on outcomes of changes in one or more factors. What if analysis-working forward from known or assumed conditions-allows the user to vary certain values to test results to better predict outcomes if changes occur in those values. |
|
|
Term
|
Definition
are based on a suite of integrated software modules and a common central database. The database collects data from many different divisions and departments in a firm, and from a large number of key business processes in manufacturing and production, finance, and accounting, sales and marketing, and human resources, making the data available for applications that support nearly all of an organizations internal business activates. |
|
|
Term
|
Definition
is built around thousands of predefined business processes that reflect best practices. |
|
|
Term
|
Definition
any of the aspects of a business that are identified as vital for successful targets to be reached and maintained. Critical success factors are usually identified in such areas as production processes, employee and organization skills, functions, techniques, and technologies |
|
|
Term
|
Definition
includes customer facing applications, such as tools for sales force automation, call center and customer service support and marketing automation. |
|
|
Term
|
Definition
includes applications that analyze customer data generated by operational CRM applications to provide information for improving business performances. They are based on data warehouses that consolidate the data from operational CRM systems and customer touch points for use with online analytical processing, data mining, and other data analysis. |
|
|
Term
Computer aided software engineering- |
|
Definition
provides software tools to automate the methodologies we have just described to reduce the amount of repetitive work in systems development. These tools provide automated graphics facilities for producing charts and diagrams, screen and report generators and documentation generators. |
|
|
Term
|
Definition
refers to the complexity and content of a message. Traditional markets, national sales forces, and small retail stores have great richness: they are able to provide personal, face to face service using aural and visual cues when making a sale. |
|
|
Term
|
Definition
they allow two way communications between merchant and consumer. It allows an online merchant to engage a consumer in ways similar to a face to face experience but on a massive, global scale. |
|
|
Term
|
Definition
the total amount and quality of information available to all market participants, consumers, and merchants alike. |
|
|
Term
|
Definition
refers to the ease with which consumers can find out the variety of prices in a market; cost transparency refers to the ability of consumers to discover the actual costs merchants pay for products. |
|
|
Term
|
Definition
selling the same goods, or nearly the same goods, to different targeted groups at different prices. |
|
|
Term
Personalization/Customization- |
|
Definition
Merchants can target their marketing messages to specific individuals by adjusting the message to a persons name, interests, and past purchases. |
|
|
Term
|
Definition
the internet and e-commerce technologies have evolved to be much more social by allowing users to create and share their personal friends content in the form of text, videos, music or photos. |
|
|
Term
|
Definition
are used for solving complex, poorly understood problems for which large amounts of data have been collected. They find patterns and relationships in massive amounts of data that would be too complicated and difficult for a human being to analyze. |
|
|
Term
|
Definition
a combination of hardware and software that prevents unauthorized users from accessing private networks. |
|
|
Term
Electronic data interchange |
|
Definition
enables the computer to computer exchange between two organizations of standard transactions such as invoices, bills of landing, shipment schedules, or purchase orders. |
|
|
Term
|
Definition
is the price of a product varies depending on the demand characteristics of the customer or the supply situation of the seller. |
|
|
Term
|
Definition
Exists when one party in a transaction has more information that is important for the transaction than the other party. That information helps determine their relative bargaining power. |
|
|
Term
|
Definition
consists of computer based systems both hardware and software that attempt to emulate human behavior and thought patterns. These include expert systems; case based reasoning, fuzzy logic, neural networks, genetic algorithms and intelligent agents. |
|
|
Term
|
Definition
information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain. |
|
|
Term
|
Definition
The removal of organizations or business process layers responsible for intermediary steps in a value chain. It affects the market for services. |
|
|
Term
|
Definition
a term used in stock trading (especially on the Internet), refers to ownership in companies that focus on and specialize in a particular product or service area to the exclusion of other market opportunities in order to obtain a large market share and brand identity i |
|
|
Term
|
Definition
the strategy used to search through the collection of rules and formulate conclusions. This works by searching through the rules and firing those rules that are triggered by facts gathered and entered by the user. |
|
|
Term
|
Definition
Rule-based systems, as defined above, are adaptable to a variety of problems. In some problems, information is provided with the rules and the AI follows them to see where they lead. |
|
|
Term
|
Definition
a goal is specified and the AI must find a way to achieve that specified goal. |
|
|
Term
|
Definition
is a situation in which channel partners have to compete against one another or the vendor's internal sales department. |
|
|
Term
Rapid application development- |
|
Definition
refers to the process of creating workable systems in a very short period of time. |
|
|
Term
Joint application design (JAD) - |
|
Definition
WILL BE USED TO ACCELERATE THE GENERATION OF INFO REQUIREMENTS AND TO DEVELOP THE INITIAL SYSTEMS DESIGN. |
|
|
Term
|
Definition
refers to the many techniques used to bring about successful change in a business. Nearly all info systems require change in the firms business processes, and therefore changes in what hundreds or even thousands of employees do every day. |
|
|
Term
|
Definition
is useful for finding the optimal solution for a specific problem by examining a very large number of alternative solutions for that problem. They are based on techniques inspired by evolutionary biology such as inheritance, mutation, selection and crossover. |
|
|
Term
interorganization system= |
|
Definition
supply chain management is one type of this because they automate the flow of info across organizational boundaries. |
|
|
Term
Business process management- |
|
Definition
is an approach to business which aims to continuously improve business processes. uses a variety of tools and methodologies to understand existing processes, design new processes, and optimize those processes. |
|
|
Term
|
Definition
is the marketing of complementary products to customers. Ex. In financial services, a customer with a checking account might be sold a money market or home improvement loan. |
|
|
Term
|
Definition
A sales strategy where the seller will provide opportunities to purchase related products or services, often for the sole purpose of making a larger sale. |
|
|
Term
|
Definition
are sometimes called e-hubs; provide a single, digital marketplace based on Internet technology for many different buyers and sellers. Industrial networks use an extranet to link its suppliers and other key business partners. |
|
|
Term
Private industrial networks- |
|
Definition
typically consist of a large firm using an extranet to link to its suppliers and other key business partners. |
|
|
Term
|
Definition
can be quantified and assigned a monetary value. |
|
|
Term
|
Definition
more efficient customer service or enhanced decision making, cannot be immediately quantified. Systems that produce mainly intangible benefits may still be good investments if they produce quantifiable gains in the long run. |
|
|
Term
|
Definition
govern the design, security, and use of computer programs and the security of data files |
|
|
Term
|
Definition
monitor the use of system software and prevent unauthorized access of software programs, systems software and computer programs. |
|
|
Term
|
Definition
ensure that computer hardware is physically secure, and check for equipment malfunction. Organizations that are critically dependent on their computers also must make provisions for backup or continued organizations to maintain constant service. |
|
|
Term
Computer operations control- |
|
Definition
oversees the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data. They include controls over the setup of computer processing jobs and backup and recovery procedures for processing that ends abnormally. |
|
|
Term
|
Definition
makes sure that valuable business data files are on a disk or tape so they are not subject to unauthorized access change, or destruction while they are in use or storage. |
|
|
Term
|
Definition
audit the systems development process at various points to ensure that the process is properly controlled and managed. |
|
|
Term
|
Definition
formalize standards, rules, procedures and control disciplines to ensure that the organizations general and application controls are properly executed and enforced. |
|
|
Term
|
Definition
are specific controls unique to each computerized application, such as payroll or order processing. |
|
|
Term
|
Definition
CHECK DATA FOR ACCURACY AND COMPLETENESS WHEN THEY ENTER THE SYSTEM. |
|
|
Term
|
Definition
establish that data are complete and accurate during updating. |
|
|
Term
|
Definition
ensure that the results of computer processing are accurate, complete and properly distributed. |
|
|
Term
Intrusion Detection systems |
|
Definition
-monitor hot spots on corporate networks to detect and deter intruders. -Examine events as they are happening to discover attacks in progress. |
|
|
Term
Antivirus and antispyware software: |
|
Definition
check computers for presence of malware and can often eliminate it as well. Needs to update continuously. |
|
|
Term
Supply chain planning systems- |
|
Definition
help the firm to model its existing supply chain, generate demand forecasts for products, and develop optimal sourcing and manufacturing plans. |
|
|
Term
Supply chain execution systems- |
|
Definition
manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner. |
|
|
Term
|
Definition
production master schedules are based on forecasts or best guesses of demand for products, and products are pushed to customers. |
|
|
Term
|
Definition
also known as a demand driven model or build to order, actual customer orders or purchases trigger events in the supply chain. |
|
|
Term
Partner relationship management- |
|
Definition
uses many of the same data, tools, and systems as customer relationship management to enhance collaboration between a company and its selling partners. |
|
|
Term
Employee Relationship Management- |
|
Definition
deals with employee issues that are closely related to CRM, such as setting objectives, employee performance, management, performance based compensation and employee training. |
|
|
Term
|
Definition
includes customer facing applications, such as tools for sales force automation, call center and customer service support and marketing automation. |
|
|
Term
|
Definition
includes applications that analyze customer data generated by operational CRM applications to provide information for improving business performances. |
|
|
Term
Transaction Fee Revenue Model- |
|
Definition
a company receives a fee for enabling or executing a transaction. Ex. EBay provides an online auction marketplace and receives a small transaction fee from a seller if the seller is successful in selling an item. |
|
|
Term
|
Definition
send visitors to other web sites in return for a referral fee or percentage of the revenue from any resulting sales. |
|
|
Term
|
Definition
electronic commerce involves retailing products and services to individual shoppers. Ex. Barnes and Noble is an example of B2C Ecommerce. |
|
|
Term
|
Definition
electronic commerce involves sales of goods and services among businesses. Ex. ChemConnects web site for buying and selling chemicals and plastics. |
|
|
Term
|
Definition
electronic commerce involves consumers selling directly to consumers. Ex. EBay enables people to sell their goods to other customers by auctioning their merchandise off to the highest bidder or for a fixed price. |
|
|
Term
|
Definition
Unstructured, decide entrance or exit from markets approve capital budget decide long term goals. |
|
|
Term
|
Definition
Design a marketing plan, develop a departmental budget, design a new corporate web site. |
|
|
Term
|
Definition
determines overtime eligibility, restock inventory, offer credit to customers, and determine special offers to customers. |
|
|
Term
|
Definition
those in which the decision maker must provide judgment, evaluation, and insight to solve the problem. Each of these decisions is novel, important, and no routine, and there is no well-understood or agreed-on procedure for making them. |
|
|
Term
|
Definition
only part of the problem has a clear cut answer provided by an accepted procedure. In general, structured decisions are more prevalent at lower organizational levels, whereas unstructured problems are more common at higher levels of the firm. |
|
|
Term
|
Definition
are repetitive and routine, and they involve a definite procedure for handling them so that they do not have to be treated each time as if they were new. |
|
|
Term
|
Definition
consists of discovering, identifying, and understanding the problems occurring the organization-why is there a problem, where and what effects it is having on the firm. |
|
|
Term
|
Definition
involves identifying and exploring various solutions to the problem. |
|
|
Term
|
Definition
consists of choosing among solution alternatives. |
|
|
Term
|
Definition
involves making the chosen alternative work and continuing to monitor how well the solution is working. |
|
|
Term
|
Definition
helps managers monitor and control the business by providing information on the firms performance. They typically produce fixed, regularly scheduled reports based on data extracted and summarized from the firms underlying transaction processing systems. |
|
|
Term
Geographic information systems- |
|
Definition
are a special category of DSS that use data visualization technology to analyze and display data for planning and decision making in the form of digitized maps. The software assembles, stores, manipulates, and displays geographically referenced information, tying data to points, lines, and areas on a map |
|
|
Term
|
Definition
is the oldest method for building info systems. The approach maintains a formal division of labor between end users and information systems specialists. |
|
|
Term
|
Definition
unit testing, system testing, acceptance testing |
|
|
Term
|
Definition
requires detailed testing of individual computer programs. |
|
|
Term
|
Definition
tests the performance of the info system as a whole. |
|
|
Term
|
Definition
provides the final certification that the system is ready to be used in a production setting. |
|
|
Term
|
Definition
consists of building an experimental system rapidly and inexpensively for users to evaluate. It is a working version of an info system or part of the system, but it is intended as only a preliminary model. |
|
|
Term
|
Definition
allows end users with little or no formal assistance from technical specialists, to create simple info systems, reducing the time and steps required to produce a finished application. Using fourth generation languages, graphics languages and PC software tools, end users can access data, create reports, and develop entire info systems on their own, with little or no help from professional systems analysts or programmers. |
|
|
Term
|
Definition
refers to the ability of consumers to discover the actual costs merchants pay for products. |
|
|
Term
|
Definition
refers to the ability of firms to profitably market goods to very small online audiences, largely because of the lower costs of reaching very small market segements. |
|
|
Term
|
Definition
refers to tracking the click streams of indiiduals on thousands of web sites for the purpose of understanding their interests and intentions, and exposing them to advertisements which are uniquely suited to their behavior. |
|
|
Term
|
Definition
intelligence, design, choice, implementation. |
|
|
Term
|
Definition
tools thelp users see patterns and relationships in large amounts of data that would be difficult to discern if the data were presented as traditional lists of text. |
|
|
Term
Customer decision support systems |
|
Definition
support the decision making process of an existing or potential customer. |
|
|
Term
|
Definition
moving from a piece of summary data to lower and lower levels of detail. |
|
|
Term
|
Definition
expert systems model human knowledge as a set of rules. |
|
|
Term
|
Definition
a related AI technology focusing on algorithms and techniques allowing computers to learn by extracting info using computation and statistical methods. |
|
|
Term
|
Definition
refers to the set of business processes developed in an organization to create, store, transfer and apply knowledge. Increases the ability of the organization to learn from its environment and to incorporate knowledge into its business processes and decision making. |
|
|
Term
enterprise wide knowledge management systems |
|
Definition
deal with all three types of knowldge. They are general purpose, firmwide system that collect, store, distribute and apply digital content and knowledge. |
|
|
Term
enterprise content management systems |
|
Definition
help organizations manage both types of information. |
|
|
Term
knowldge networks systems |
|
Definition
known as expertise location and management systems, address the problem that arises when the appropriate knowledge is not in the form of a digital document but instead resides in the memory of expert individuals in the firm. |
|
|
Term
|
Definition
are specialized systems for engineers, scientists, and other knowldge workers that are designed to promote the creation of knowledge and to ensure that new knowlege and technical expertise are properly integrated into the business. |
|
|
Term
learning management system |
|
Definition
provides tools for the management, delivery, tracking and assessment of various types of employee learning and training. |
|
|
Term
virtual reality modeling language |
|
Definition
is a set of specifications for interactive, three dimensional modeling on the WWW that organize multiple media types including animation, images, and audio to put users in a simulated real world environment. |
|
|
Term
|
Definition
leverage the knowledge and time of its brokers, traders, and portfolio managers. |
|
|
Term
|
Definition
is a detailed list of questions submitted to external vendors to see how well they meet the rewquirements for the proposed system. |
|
|
Term
|
Definition
offers a logical graphic model of information flow, partitioning a system into modules that show managable levels of dtail. |
|
|
Term
|
Definition
describe the transformation occuring within the lowest level of the data flow diagrams, showing the logic for each process. |
|
|
Term
component based development |
|
Definition
to further expedite software creation, groups of objects have been assembled into components for common functions such as graphical user interface or online ordering capapbility, and these components can be combined to create large scale business applications. |
|
|
Term
|
Definition
refers to the application of knowledge, skills, tools and techniques to achieve specific targets within specified budget and time constraints. Activities include planning the work, assessing the risk, estimating resources required to accomplish the work, organizing the work, acquiring human and material resources, assigning tasks, directing activites, controlling project execution, reporting progress and analyzing the results. |
|
|