Term
|
Definition
Refers to the principles of right and wrong that individuals, acting as free moral agents use to make choices to guide their behaviors. Info Systems raise new ethical questions for both individuals and soceities because they create opportunities for inter social change |
|
|
Term
Information rights and obligations |
|
Definition
What information rights do individuals and organizations possess with respect to themselves? What can they protect? What obliga- tions do individuals and organizations have concerning this information? |
|
|
Term
Property rights and obligations |
|
Definition
How will traditional intellectual property rights be protected in a digital society in which tracing and accounting for ownership are difficult and ignoring such property rights is so easy? |
|
|
Term
Accountability and control |
|
Definition
Who can and will be held accountable and liable for the harm done to individual and collective information and property rights? |
|
|
Term
|
Definition
What standards of data and system quality should we demand to protect individual rights and the safety of society? |
|
|
Term
|
Definition
What values should be preserved in an information- and knowledge- based society? Which institutions should we protect from violation? Which cultural values and practices are supported by the new information technology? |
|
|
Term
|
Definition
|
|
Term
|
Definition
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals |
|
|
Term
nonobvious relationship awareness (NORA) |
|
Definition
NORA can take information about people from many disparate sources, such as employment applications, telephone records, customer listings, and “wanted” lists, and correlate relationships to find obscure hidden connections that might help identify criminals or terrorists |
|
|
Term
|
Definition
means that you accept the potential costs, duties, and obligations for the decisions you make. |
|
|
Term
|
Definition
is a feature of systems and social institutions: It means that mechanisms are in place to determine who took responsible action, who is responsible. |
|
|
Term
|
Definition
feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations. |
|
|
Term
|
Definition
related feature of law-governed societies and is a process in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly. |
|
|
Term
Identify and describe clearly the facts. |
|
Definition
Find out who did what to whom, and where, when, and how. In many instances, you will be surprised at the errors in the initially reported facts, and often you will find that simply getting the facts straight helps define the solution. It also helps to get the opposing parties involved in an ethical dilemma to agree on the facts. |
|
|
Term
Define the conflict or dilemma and identify the higher-order values involved. |
|
Definition
Ethical, social, and political issues always reference higher values. The parties to a dispute all |
|
|
Term
Identify the stakeholders |
|
Definition
Every ethical, social, and political issue has stakeholders: players in the game who have an interest in the outcome, who have invested in the situation, and usually who have vocal opinions. Find out the identity of these groups and what they want. This will be useful later when designing a solution. |
|
|
Term
Identify the options that you can reasonably take |
|
Definition
You may find that none of the options satisfy all the interests involved, but that some options do a better job than others. Sometimes arriving at a good or ethical solution may not always be a balancing of consequences to stakeholders. |
|
|
Term
Identify the potential consequences of your options. |
|
Definition
Some options may be ethically correct but disastrous from other points of view. Other options may work in one instance but not in other similar instances. Always ask yourself, “What if I choose this option consistently over time?” |
|
|
Term
What are the ethical rules one should use when making a decision. |
|
Definition
Golden rule,(Immanuel Kant’s Categorical Imperative). Ask yourself, “If everyone did this, could the organization, or society, survive?”,(Descartes’ rule of change)An action may bring about a small change now that is acceptable, but if it is repeated, it would bring unacceptable changes in the long run. In the vernacular, it might be stated as “once started down a slippery path, you may not be able to stop.”,Take the action that achieves the higher or greater value (Utilitarian Principle),(Risk Aversion PrincipleSome actions have extremely high failure costs of very low probability (e.g., building a nuclear generating facility in an urban area) or extremely high failure costs of moderate probability (speeding and automobile accidents). Avoid these high-failure-cost actions, paying greater attention to high-failure-cost potential of moderate to high probability.(This is the ethical “no free lunch” rule.) If something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. |
|
|
Term
|
Definition
s the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state. Claims to privacy are also involved at the workplace: Millions of employees are subject to electronic and other forms of high-tech surveillance (Ball, 2001). Information technology and systems threaten individual claims to privacy by making the invasion of privacy cheap, profitable, and effective. |
|
|
Term
Fair Information Practices (FIP) |
|
Definition
first set forth in a report written in 1973 by a federal government advisory com- mittee (U.S. Department of Health, Education, and Welfare, 1973). FIP is a set of principles governing the collection and use of information about individuals. FIP principles are based on the notion of a mutuality of interest between the record holder and the individual. The individ- ual has an interest in engaging in a transaction, and the record keeper—usually a business or government agency—requires information about the individual to support the transaction. Once information is gathered, the individual maintains an interest in the record, and the record may not be used to support other activities without the individual’s consent. |
|
|
Term
|
Definition
In Europe, privacy protection is much more stringent than in the United States. Unlike the United States, European countries do not allow businesses to use personally identifiable information without consumers’ prior consent. |
|
|
Term
|
Definition
can be defined as consent given with knowledge of all the facts needed to make a rational decision. EU member nations must translate these principles into their own laws and cannot transfer personal data to countries, such as the United States, that do not have similar privacy protection regulations. |
|
|
Term
|
Definition
is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legisla- tion but does not involve government regulation or enforcement. U.S. businesses would be allowed to use personal data from EU countries if they develop privacy protection policies that meet EU standards. Enforcement would occur in the United States using self-policing, regulation, and government enforcement of fair trade statutes. |
|
|
Term
|
Definition
are small text files deposited on a computer hard drive when a user visits Web sites. Cookies identify the visitor’s Web browser software and track visits to the Web site. When the visitor returns to a site that has stored a cookie, the Web site software will search the visitor’s computer, find the cookie, and know what that person has done in the past |
|
|
Term
|
Definition
tiny graphic files embedded in e-mail messages and Web pages that are designed to monitor who is reading the e-mail message or Web page and transmit that information to another computer. |
|
|
Term
|
Definition
can secretly install itself on an Internet user’s computer by piggybacking on larger applications. Once installed, the spyware calls out to Web sites to send banner ads and other unsolicited material to the user, and it can also report the user’s movements on the Internet to other computers. |
|
|
Term
|
Definition
permits the collection of personal information until the consumer specifically requests that the data not be collected. |
|
|
Term
|
Definition
in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use. |
|
|
Term
|
Definition
provides a standard for communicating a Web site’s privacy policy to Internet users and for comparing that policy to the user’s preferences or to other standards, such as the FTC’s FIP guidelines or the European Directive on Data Protection. |
|
|
Term
|
Definition
is considered to be intangible property created by individuals or corporations. Information technology has made it difficult to protect intellectual property because computerized information can be so easily copied or distributed on networks. Intellectual property is subject to a variety of protections under three different legal traditions: trade secrets, copyright, and patent law. |
|
|
Term
|
Definition
provided it is not based on informa- tion in the public domain. Protections for trade secrets vary from state to state. In general, trade secret laws grant a monopoly on the ideas behind a work product, but it can be a very tenuous monopoly. |
|
|
Term
|
Definition
s a statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author’s death. For corporate-owned works, copyright protection lasts for 95 years after their initial creation. Congress has extended copyright protection to books, periodicals, lectures, dramas, musical compositions, maps, drawings, artwork of any kind, and motion pictures. The intent behind copyright laws has been to encourage creativity and authorship by ensuring that creative people receive the financial and other benefits of their work. |
|
|
Term
|
Definition
In general, courts appear to be following the reasoning of a 1989 case—Brown Bag Software vs. Symantec Corp.—in which the court dissected the elements of software alleged to be infringing. The court found that similar concept, function, general functional features (e.g., drop-down menus), and colors are not protectable by copyright law (Brown Bag Software vs. Symantec Corp., 1992). |
|
|
Term
|
Definition
grants the owner an exclusive monopoly on the ideas behind an invention for 20 years. The congressional intent behind patent law was to ensure that inventors of new machines, devices, or methods receive the full financial and other rewards of their labor and yet make widespread use of the invention possible by providing detailed diagrams for those wishing to use the idea under license from the patent’s owner. |
|
|
Term
|
Definition
The Fifth Annual Global Software Piracy Study conducted by the International Data Corporation and the Business Software Alliance found that 38 percent of the software installed in 2007 on PCs worldwide was obtained illegally, representing $48 billion in global losses from software piracy. Worldwide, for every two dollars of software purchased legitimately, one dollar’s worth was obtained illegally (Business Software Alliance, 2008). |
|
|
Term
Digital Millennium Copyright Act (DMCA) |
|
Definition
of 1998 is providing some copyright protection. The DMCA implemented a World Intellectual Property Organization Treaty that makes it illegal to circumvent technol- ogy-based protections of copyrighted materials. Internet service providers (ISPs) are required to take down sites of copyright infringers that they are hosting once they are notified of the problem. |
|
|
Term
|
Definition
is the commission of illegal acts through the use of a computer or against a computer system. Computers or computer systems can be the object of the crime (destroy- ing a company’s computer center or a company’s computer files), as well as the instrument of a crime (stealing computer lists by illegally gaining access to a computer system using a home computer). Simply accessing a computer system without authorization or with intent to do harm, even by accident, is now a federal crime. |
|
|
Term
|
Definition
is the commission of acts involving a computer that may not be illegal but that are considered unethical. The popularity of the Internet and e-mail has turned one form of computer abuse—spamming—into a serious problem for both individuals and businesses. |
|
|
Term
|
Definition
is junk e-mail sent by an organization or individual to a mass audience of Internet users who have expressed no interest in the product or service being marketed. |
|
|
Term
|
Definition
exists in U.S. schools, with schools in high-poverty areas less likely to have computers, high-quality educational technology programs, or Internet access availability for their students. Left uncorrected, the digital divide could lead to a society of information haves, computer literate and skilled, versus a large group of information have-nots, computer illiterate and unskilled. |
|
|
Term
repetitive stress injury (RSI) |
|
Definition
RSI occurs when muscle groups are forced through repetitive actions often with high-impact loads(such as tennis) or tens of thousands of repetitions under low-impact loads (such as working at a computer keyboard). |
|
|
Term
carpal tunnel syndrome (CTS) |
|
Definition
in which pressure on the median nerve through the wrist’s bony structure, called a carpal tunnel, produces pain. The pressure is caused by constant repetition of keystrokes: in a single shift, a word processor may perform 23,000 keystrokes. Symptoms of carpal tunnel syndrome include numbness, shoot- ing pain, inability to grasp objects, and tingling. Millions of workers have been diagnosed with carpal tunnel syndrome. |
|
|
Term
Computer vision syndrome (CVS) |
|
Definition
refers to any eyestrain condition related to computer display screen use. Its symptoms, which are usually temporary, include headaches, blurred vision, and dry and irritated eyes. |
|
|
Term
|
Definition
which is stress induced by computer use. Its symptoms include aggravation, hostility toward humans, impatience, and fatigue. According to experts, humans working continuously with computers come to expect other humans and human institutions to behave like computers, providing instant responses, attentiveness, and an absence of emotion. |
|
|
Term
Why are systems Vulnenerable? |
|
Definition
Networks can be hacked and mistakes can be made by granting access to wrong individuals. Information over the internet is even more vunerable because everryone has access to it. file sharing can also expose a computer. |
|
|
Term
|
Definition
methods, policies and orginizational procedures that ensure the safety of the orginization's assets. |
|
|
Term
|
Definition
the policies, procedures and technical measures used to prevent unautherized access, alteration, theft, or phisical damage to information systems. |
|
|
Term
|
Definition
eavesdroppers drive by buildings or park outsufr and try to intercept wirelesss network traffic. |
|
|
Term
|
Definition
malicious software programs. include viruses, worms, and trojan Horses. |
|
|
Term
|
Definition
Independent computer programs that copy themselves from one computer to another over a network. These can spread faster then a virus since they are not dependent upon human behavior. |
|
|
Term
|
Definition
roughe software that attaches itself to other software programs and data files in order to be executed. |
|
|
Term
|
Definition
Opens up a way for other malware to enter a computer or network. |
|
|
Term
|
Definition
The Largest Malware threat. take advantage of vulnerabilities in poorly coed web application softwareto introduce malicious program code into a company's network. |
|
|
Term
|
Definition
Act as malicious software. These small programs install themselves surreptitiously on computers to monitor web surfing and serve up advertisement. |
|
|
Term
|
Definition
Record every keystroke made on a computer to steal serial numbers for software, to launch internet attacks, to gain access to email accounts, to obtain passwords to protected computer systems, or to pick up personal info like credit card numbers or social security numbers. |
|
|
Term
|
Definition
redirecting a web link to an adress different then the intended one. the website may be an imitation of another website in order to steak debit card numbers and other valuable information. This is known as phasing, a type of spoofing. |
|
|
Term
|
Definition
Type of eavesdropper program that monitors information traveling over a network. Can be damaging and difficult to detect. |
|
|
Term
|
Definition
Hackers flood a network server or web server with thousands of false communications or requestsfor services in order to crash a network. |
|
|
Term
distributed denial of service |
|
Definition
attack uses numerous computers to indundate and overwhelm the network from numerous launchpoints. Costly for e commerce. |
|
|
Term
|
Definition
redirects users to a bogus webpage. Even when individuals types the correct webpage |
|
|
Term
|
Definition
Occurs when individual or computer programs fradulantly clicks on an online ad without |
|
|
Term
|
Definition
defects in software. Virtually impossibly to eliminate every single one. |
|
|
Term
|
Definition
small pieces of software that will eliminate some bugs. |
|
|
Term
|
Definition
Outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of healthcare data between healthcare providers, payers and plans. This requires health care members to retain patient info for six years and ensure confidentiality. |
|
|
Term
|
Definition
designed to protect investors after the financial scandals of enron, worldcom, and other public companies. Imposes responsibility on companies and management to safeguard the accuracy and integrity of financial information. |
|
|
Term
|
Definition
Scientific collection, examination, authenticity, preservation and analysis of data held on or retrieved from computer storage media in such a way that the info can be presented in a court trial. |
|
|
Term
|
Definition
gvern design, security, and use of computer programs and the security files in general throughout the orgibization's information technology infrastructure |
|
|
Term
|
Definition
specific controls unique to each computerized application such as payroll and or ordering processing. They can be both automated and manual procedures that ensure that only autherized data are completely and accurately processed by application. Classified as input, processing and output controls. |
|
|
Term
|
Definition
determines the level of risk to the firm if a specific activity or process is not properly controlled. Not all can be measured but most businesses will aquire knowledge of their risks. |
|
|
Term
|
Definition
Consists of statemets ranking information risks, identifying security goals, and identifying the mechanisms for achieving those goals. What is a corporations most important assets? |
|
|
Term
Acceptable use policy (AUP) |
|
Definition
Defines acceptable uses of the firms information resources. |
|
|
Term
|
Definition
Determine different levels of access to info assets for different levels of users. |
|
|
Term
Authorization management systems |
|
Definition
establish where and when a user is permited to access certain parts of a website or corporate database. |
|
|
Term
Disaster Recovery planning |
|
Definition
Devises plans for the restoration of computing and communication services after they have been disrupted. Focus primarily on the technical issues involved. in keeping systems up and running. |
|
|
Term
Business Continuity planning |
|
Definition
Focuses on how the company can restore its business operations after a disaster strikes. |
|
|
Term
|
Definition
Examines the firm's overall security environment as well as controls governing individual information systems. |
|
|
Term
|
Definition
consists of all the policies and procedures a company uses to prevent improper access to systems autherized by insiders and outsiders. |
|
|
Term
|
Definition
Ability to know that a person is who they claim to be. |
|
|
Term
|
Definition
A physiscal device, similar to an identification card designed to prove the identity of a single use. |
|
|
Term
|
Definition
prevent unautherized users from accessing private networks. Combination of hardware and software that controls the flow of incoming and outgoing network traffic. |
|
|
Term
Intrusion detection systems |
|
Definition
feature full-time monitoring tools placed at the most vulnerable points or "hot spots" |
|
|
Term
|
Definition
Designed tp check computer sistems and drives for the presence of viruses. Often eliminates the virus. |
|
|
Term
Unified threat management systems. |
|
Definition
Although initially aimed at small and medium sized businesses. |
|
|
Term
|
Definition
the process of transforming plain text or data into cipher text that cannot be read by anyone other then the sender and the intended reciever. |
|
|
Term
|
Definition
and it s successor Transport layer security enable client and server computers to manage encryption and decryption as they communicate with each other during a secure web session. |
|
|
Term
secure hypertext transfer protocol |
|
Definition
another protocol used for encrypting data flowing over the internet but limited to individual messages. |
|
|
Term
|
Definition
uses two keys one shared and one public. The keys are mathematically related so that data encrypted with one key can be desiphered with another. |
|
|
Term
|
Definition
data files used to establish the identity of users and electronic assets for protection of online transactions. |
|
|
Term
Public key infrastructure (PKI) |
|
Definition
the use of public key cryptography working with a certificate authority, is now widely used in e-commerce. |
|
|
Term
Online transaction processing |
|
Definition
transactions entered onlune are immediately processed by a computer. multitudinous changes to data bases, reporting, and requests for info occur each instant. |
|
|
Term
Fault-tolerant computer systems. |
|
Definition
contain redundant hardware software and power supply components that create an environment that provides continoius service |
|
|
Term
high availability computing |
|
Definition
similar to fault tolerant except tries to minimize downtime. |
|
|
Term
|
Definition
period of time in which computer is not functional. |
|
|
Term
deep packet inspection (DPI) |
|
Definition
examines data files and sorts out low priority online material while assigning higher priority to business critical files. |
|
|
Term
managed security service providers |
|
Definition
monitor network activitynand peform vulnerability testing and intrusion detection. |
|
|
Term
|
Definition
sinformation sustems which allow users to see information from all departments of a company. |
|
|
Term
|
Definition
built around thousands of predefined business processes that reflect the best processes. |
|
|
Term
|
Definition
network of organizations, business processes for procuring raw materials, transforming these materials into intermediate and finished products. |
|
|
Term
supply chain planning systems |
|
Definition
enable firm to model its existting supply chain, generate demand forecasts for products and develop optimal sourcing and manufacturing plans. |
|
|
Term
|
Definition
determines how much product a business needs to satisfy all of its customers demands. |
|
|
Term
supply chain execution systems |
|
Definition
manage the flow of products through the distribution centers and warehouses to ensure the products are delivered tothe right locations in the most effecient manners |
|
|
Term
|
Definition
earlier supply chain models were driven by this. Production master schedules are based on forecasts or best guesses of demand for products, and products are pushed to customers |
|
|
Term
|
Definition
also known as demand driven model or built to order, actual purchases trigger events. |
|
|
Term
|
Definition
is a method of interaction with the customer with the customer through telephone, email, customer service desk, email, |
|
|
Term
partner relationship management (PRM) and employee relationship management |
|
Definition
uses many of the same data, tools and systems as customer relationship management to enhance collaboration between a company and customers. ERM deals with employee issues related to CRM. sets objectives and examines performance. |
|
|
Term
|
Definition
is the marketing of complementary products to customers. |
|
|
Term
|
Definition
Includes customer facing applications, such as tools for sales force automation, call center and customer service support and marketing automation. |
|
|
Term
|
Definition
Includes applications that analyze customer data generated by operational CRM applications to provide info to improve business practices. |
|
|
Term
Customer Lifetime Value (CLTV) |
|
Definition
Based on the relationship between the revnue produced by a specific customer and the expected life of the relationship between the customer and consumer. |
|
|
Term
|
Definition
measures the number of customers who stop using or purchasing products or services from a company. |
|
|
Term
|
Definition
integrates multiple applications from multiple business functions, business units or business partners to deliver a seamless experience for the customer, employee, manager or business partner. |
|
|
Term
|
Definition
the cost of participating in a market |
|
|
Term
|
Definition
the cost merchants must pay to simply bring their goods to the market |
|
|
Term
|
Definition
the complexity and content of a message. |
|
|
Term
|
Definition
total amount and quality of information available to consumers and producers |
|
|
Term
|
Definition
ease with which prices are found on the internet |
|
|
Term
|
Definition
ability of consumers to see the actual cost to make a product |
|
|
Term
|
Definition
selling the same good at different prices to different consumers. |
|
|
Term
|
Definition
adjusting marketing to a specific person. |
|
|
Term
|
Definition
delivering products based on specific consumer preference. |
|
|
Term
|
Definition
one party in a transaction has more info that is important for the transaction then the other party. |
|
|
Term
|
Definition
merchant's cost of changing prices |
|
|
Term
|
Definition
the price of a product varies depending on the demand characteristic of the consumer or supply situation of the seller. |
|
|
Term
|
Definition
removal of the middle man |
|
|
Term
|
Definition
goods delivered over a digital networl. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
all forms of human expression that can be put into a tangible medium such as texts, CDs, DVDs or stored in any digital media. |
|
|
Term
|
Definition
method of publishing vieo broadcats through the internet. |
|
|
Term
|
Definition
describes how tge firm will earn revenue, generate profits and produce superior return on investment. |
|
|
Term
|
Definition
build digital environments in which buyers and sellers can meet. |
|
|
Term
|
Definition
sites that create digital online environments where people with similar interests can transact. |
|
|
Term
|
Definition
provide content providers with a cost effective method for high volumes of very small monetary transactions. |
|
|
Term
|
Definition
provides a service for free and demands a payment for a premium service |
|
|
Term
transaction fee revenue model |
|
Definition
a company recieves a fe for enabling or executing a transaction |
|
|
Term
|
Definition
priceline.com. sends you to a different website that has the loweest price |
|
|
Term
|
Definition
you can swap ideas with others about shopping |
|
|
Term
|
Definition
large numbers of people can better decisions about a wide range of topics then a single person |
|
|
Term
|
Definition
companies ask people or a group of people to solve their problem. |
|
|
Term
|
Definition
betting markets where peers make betts on certain market incomes. |
|
|
Term
|
Definition
markeing enable by the internet |
|
|
Term
|
Definition
tracking browser history and advertising based on it. |
|
|
Term
Electronic data interchange (EDI) |
|
Definition
electronic data interchange enables computer to computerexchange between two orginizations of standard transactions such as invoices, bills of lading, shipment schedules, or purchase orders. |
|
|
Term
|
Definition
invloves not only purchasing goods and materials but sourcing and negotiating with suppliers, paying for goods, and making deliveriy arrangements. |
|
|
Term
private industrial networks. |
|
Definition
Typically consists of a large firm using extranet to link to its suppliers and key business partners |
|
|
Term
|
Definition
another term for industrial network |
|
|
Term
|
Definition
sometimes called e-hubs, provide a single digital market place based pn technology for many different buyers. They are industry owned or operate as independent intermediaries between buyers and sellers. |
|
|
Term
|
Definition
independently owned thirds-party net marketplaces that connect thousands of suppliers and buyers for spot purchasing. |
|
|
Term
|
Definition
your firm purchases or leases a web server but locates the server in a vendors facility. |
|
|
Term
|
Definition
those in which the decision maker must provide judgement, evlauation and insight to solve a problem. |
|
|
Term
|
Definition
repetetive and routine decisions |
|
|
Term
|
Definition
only part of the problem has a clear cut answer. |
|
|
Term
|
Definition
consistes of discovering, identifying, and understanding the problems occuring in the organization |
|
|
Term
|
Definition
invloves identifying and exploring various solutions to the problem. |
|
|
Term
|
Definition
consists of choosing among solution alternatives |
|
|
Term
|
Definition
involves making the chosen alternative work and continuing to monitor how well the solute is working. |
|
|
Term
|
Definition
expert systems, case based reasoning, genetic algorythims, neural networksm fuzzy logic, and intelligent agents. |
|
|
Term
|
Definition
suport semistructured decisons. |
|
|
Term
|
Definition
collection of current or historical data from a numver of applications or gtoups. |
|
|
Term
|
Definition
contains the software tolls that are used for data analysis. |
|
|
Term
|
Definition
an abstract representation that illustrates the components or relationships of a phenomenon. |
|
|
Term
|
Definition
asks what if questions repeateadly to determine the impact on outcomes and changes in one or more factors. |
|
|
Term
|
Definition
displays two or more dimensons of data in a convenient format. |
|
|
Term
|
Definition
tools help users see patternsand relationships in large amounts of data. |
|
|
Term
geographic information systems |
|
Definition
are a special category of DSS that use data vizualization technology to analyze and display data for planning and decision making the form of digitalized maps. |
|
|
Term
customer decision support systems |
|
Definition
support the decision making process of an existing or potential customer. |
|
|
Term
|
Definition
moving from a piece of summary data to lower and lower levels of data. |
|
|
Term
group decision support system |
|
Definition
an interactive computer based systems for facilitating the solute of unstructured problems by a set of fecision mere working together as a group in the same location or different locations. |
|
|
Term
|
Definition
consists of computer based systems, both hardware and software, which emmulatehuman behavior and thought patterns. |
|
|
Term
|
Definition
captures human expertise in a limited domain of knowledge. |
|
|
Term
|
Definition
a set of rules that expert systems use o model human knowledge. |
|
|
Term
|
Definition
strategy used to search through the collection of rules and formulate conclusions. |
|
|
Term
|
Definition
knowledge and past experiences of human specialists are represented as cases and stored in a database for later retrieval when the user encounters a new case with similar parameters. |
|
|
Term
|
Definition
rule based technology that represents such imprecision by creating rules that approximate or subjective rules. |
|
|
Term
|
Definition
used for solving complex, poorly understood proble,s find patterns that are too complicated for humans to identity. |
|
|
Term
|
Definition
related to AI technology focusing on algorythims and techniques allowing computers to "learn" by extracting info using statistics. |
|
|
Term
|
Definition
useful for finding the optimal solution for a specific problem by examining very large number of alternative solutions for that problem. |
|
|
Term
|
Definition
software programs work in the background without direct human interventionto carry out specific, repetitve and predictable tasks for an individual user,business process, or software app. |
|
|
Term
|
Definition
refers to the set of business processes in an organization to create, store, transfer and apply knowledge. |
|
|
Term
|
Definition
knowledge not written down. |
|
|
Term
enterprise-wide knowledge management systems |
|
Definition
deal with all three types of knowledge to make firm wide decisions. |
|
|
Term
|
Definition
is explicit knowledge that exists in formal documents, as well asin formal rules that orginizations derive by observing experts and decision making behaviors. |
|
|
Term
digital asset management systems |
|
Definition
help them classfy, store and distribute these digital objects. |
|
|
Term
knowledge network systems. |
|
Definition
adress the problem that arises when inapropriate knowledgein not in the for of a digital document but instead resides in the memory of expertindividuals in the firm. |
|
|
Term
|
Definition
makes it easier to search for and share info by allowing users to save their bookmarks to web pages to web pages on a public website and tag these bookmarks with keywords. |
|
|
Term
learning management systems |
|
Definition
provides tools for the management, delivery, tracking and assesment of various types of emloyee learning and training. |
|
|
Term
|
Definition
specialized systems for scientists to store info that will integrate the info into the firm to optimize profits. |
|
|
Term
virtual reality modeling language (VRML) |
|
Definition
specifications for 3d modeong. |
|
|
Term
|
Definition
leverage the knowledge and time of its brokers, traders and portfolio mangers. |
|
|
Term
|
Definition
who needs what info when, where and how. |
|
|
Term
|
Definition
determines whether each proposed solution is feasable, and achievable from a financial, technical and orginizational standpoint. |
|
|
Term
|
Definition
shows how the chosen solution should be realized. |
|
|
Term
|
Definition
shows how the system works from a technical and end user standpoint. |
|
|
Term
|
Definition
replaces the old system entirely on a givem day. |
|
|
Term
|
Definition
after the new system is completely installed, it is said to be in this phase. |
|
|
Term
system development lifecycle. (SDLC) |
|
Definition
oldest method for building info systems. Has detailed stages. |
|
|
Term
request for proposal (RFP) |
|
Definition
detailed list pf questions submitted to externavendors to see how well they meet the requirenments for the proposed system. |
|
|
Term
Rapid application development. |
|
Definition
create workable systems in a short period of time. |
|
|
Term
|
Definition
techniques are step by step. |
|
|
Term
|
Definition
offers a logical model for info flow. |
|
|
Term
|
Definition
descrie the transformationoccuring within the lowest level of the data flow diagram, showing logic for each process. |
|
|
Term
|
Definition
top-down chart shoing each level of design. its relationship to other levels, and its place inthe overall design structure. |
|
|
Term
object oriented development. |
|
Definition
uses the object as the basic unit of analysis. combines data and the specific processon those data sets. |
|
|
Term
component based development. |
|
Definition
combines commercially available components for shopping carts, user authentication, search engines, and catalogs wit pieces of software for their own unique business requirements. |
|
|
Term
Computer aided software engineering |
|
Definition
sometimes called computer aided systems engineering. Provedies softare tools to automate the mthodologies we have just described to reduce the amount of repetitive work. |
|
|
Term
|
Definition
will help evaluate alternative systems projects. |
|
|
Term
|
Definition
lists project activities and their corresponding start and completion dates. |
|
|
Term
|
Definition
program evaluation and review technique. Graphically depicts project tasks and their interrelationships. |
|
|