Term
* A business process is a network of activities |
|
Definition
resources, facilities, and information that interact to achieve some business function. |
|
|
Term
|
Definition
facilities are structures used within the business process. (ex. Inventories and databases) |
|
|
Term
* information is knowledge derived from data |
|
Definition
where data is defined as recorded facts or figures. |
|
|
Term
* Good information is accurate |
|
Definition
|
|
Term
* Information needs to be sufficient for the purpose for which it is generated |
|
Definition
|
|
Term
* For information to be worth its cost |
|
Definition
An appropriate relationship must exist between the cost of information and its value. |
|
|
Term
- five forces model- According to this model |
|
Definition
five competitive forces determine industry profitability: bargaining power of customers, threat of substitutions, bargaining power of suppliers, threat of new entrants, and rivalry among existing firms. The intensity of each of the five forces determines the characteristics of the industry, how profitable it is, and how sustainable that profitability will be. |
|
|
Term
- primary activities: marketing and sales |
|
Definition
in-bound logistics, operations, out-bound logistics, and service. |
|
|
Term
- Support activities- in the generic value chain contribute indirectly to the production |
|
Definition
sale, and service of the product. They include human resources, accounting and infrastructure, and technology. They add value indirectly but also have costs. |
|
|
Term
- Porters model of business activities includes linkages |
|
Definition
which are interactions across value activities. Linkages are important sources of efficiencies and are readily supported by information systems. |
|
|
Term
- Organizations gain a competitive advantage by creating new products or services |
|
Definition
by enhancing existing products or services, and by differentiating their products and services from those of their competitors |
|
|
Term
- Because business processes are critical |
|
Definition
complex, and dynamic in structure, well-managed organizations practice business process management (BPM).BPM is the systematic process of creating, assessing, and altering business processes. |
|
|
Term
- BPM varies in scope through functional processes |
|
Definition
cross-functional processes, and interorganizational processes |
|
|
Term
|
Definition
cross-functional processes involve activities among several, or even many, business departments. A classic example is the customer relationship management (CRM) process, which involves the activities of various departments, such as sales, marketing, operations, and customer support. |
|
|
Term
- The order-processing example at REI is an interorganizational process. It includes activities at REI of course |
|
Definition
but it also includes activities at the company that processes your credit card transactions and activities at the shipper. |
|
|
Term
|
Definition
a software-industry standards organization called the Object Management Group (OMG) created a standard set of terms and graphical notations for documenting business processes. That standard, called Business Process Modeling Notation (BPMN), is documented at www.bpmn.org. |
|
|
Term
- According to Porters model |
|
Definition
one should add cost to a value chain (here, the business process) if the change generates value greater than its cost |
|
|
Term
|
Definition
information systems developers studied best-of-practice techniques and from these developed a design philosophy known as service-oriented architecture (SOA).SOA was originally used to design interacting computer programs. More recently, systems designers have applied SOA principles to business process activities, whether those activities are manual, partly automated, or fully automated |
|
|
Term
- When the logic for some service is isolated in this way |
|
Definition
the logic is said to be encapsulated in the service. Encapsulation places the logic in one place, which is desirable; all other services go to that one place for that service. |
|
|
Term
|
Definition
which stands for the eXtensible Markup Language, is used to model and structure data. |
|
|
Term
|
Definition
which are metadata that name and identify data items |
|
|
Term
- Two other standards are important for service-oriented architecture. SOAP (which |
|
Definition
oddly enough, is not an acronym) is a protocol for exchanging messages encoded in XML. A SOAP message can include metadata that specifies how the message is to be routed, what services need to process it, how security and encryption are to be handled, and so forth |
|
|
Term
- Web Services Description Language (WSDL). . To expose a service or services to the world |
|
Definition
the designer of the service creates a WSDL document that describes, in a standard way, the particular features that the service provides and the data that need to be sent or that will be returned from the service |
|
|
Term
* Problems in security threats can be unauthorized data disclosure |
|
Definition
incorrect data modification, faculty service, denial of service, and loss of infrastructure. |
|
|
Term
* Three sources of security threats are human error and mistakes |
|
Definition
malicious human activity, and natural events and disasters. |
|
|
Term
* Natural events and disasters are the third source of security problems. This category includes fires |
|
Definition
floods, hurricanes, earthquakes, tsunamis, avalanches, and other acts of nature |
|
|
Term
* Spoofing is another term for someone pretending to be someone else. If you pretend to be your professor |
|
Definition
you are spoofing your professor. IP spoofing occurs when an intruder uses another sites IP address as if it were that other site. Email spoofing is a synonym for phishing. |
|
|
Term
* Sniffing is a technique for intercepting computer communications. With wired networks |
|
Definition
sniffing requires a physical connection to the network |
|
|
Term
|
Definition
no such connection is required: Drive-by sniffers simply take computers with wireless connections through an area and search for unprotected wireless networks. |
|
|
Term
* The third problem category |
|
Definition
faulty service, includes problems that result because of incorrect system operation. Usurpation occurs when unauthorized programs invade a computer system and replace legitimate programs |
|
|
Term
* The user name identifies the user (the process of identification) |
|
Definition
and the password authenticates that user (the process of authentication). |
|
|
Term
* A smart card is a plastic card similar to a credit card. The microchip |
|
Definition
which holds far more data than a magnetic strip, is loaded with identifying data |
|
|
Term
* Biometric authentication uses personal physical characteristics such as fingerprints |
|
Definition
facial features, and retinal scans to authenticate users |
|
|
Term
|
Definition
worms, Trojan horses, spyware, and adware |
|
|
Term
* Database administration refers to a function that pertains to a particular database. The ERP |
|
Definition
CRM, and MRP databases each have a database administration function. |
|
|
Term
* One potential problem with stored data |
|
Definition
|
|
Term
* the key might be lost or that disgruntled or terminated employees might destroy it. Because of this possibility |
|
Definition
when data are encrypted, a trusted party should have a copy of the encryption key. This safety procedure is sometimes called key escrow. |
|
|
Term
* Human safeguards involve the people and procedure components of information systems. Human safeguards include position definitions |
|
Definition
hiring and screening, dissemination and enforcement, and termination. |
|
|
Term
* Given appropriate job descriptions |
|
Definition
user accounts should be defined to give users the least possible privilegeneeded to perform their jobs |
|
|
Term
* Account administration includes account management |
|
Definition
password management, and help desk policies |
|
|
Term
|
Definition
in contrast, provide office space, but customers themselves provide and install the equipment needed to continue operations. |
|
|
Term
* Collaboration occurs when two or more people work together to achieve a common goal |
|
Definition
|
|
Term
* content management. When multiple users are contributing and changing documents |
|
Definition
schedules, task lists, assignments, andso forth, one users work might interfere with anothers. |
|
|
Term
* Workflow control is the third key driver of effective collaboration. A workflow is a process or procedure by which content is created |
|
Definition
edited, used, and disposed |
|
|
Term
|
Definition
the team increases in capability. Working together becomes easier and more effective. |
|
|
Term
|
Definition
a network of activities, resources, facilities, and information that interact to achieve some business function. |
|
|