Term
|
Definition
Gordon Moore is one of the founders of Intel Corporation, which makes 75 percent of the integrated processors used in personal computers. In 1965, Moore predicted that computer-processing power would double and its cost would drop by 50 percent about every 2 years. |
|
|
Term
|
Definition
|
|
Term
|
Definition
useful data that can influence someone’s choices and behavior. |
|
|
Term
|
Definition
The strategic advantage that companies earn by being first to use information technology to substantially lower costs or differentiate a product |
|
|
Term
Sustaining A Competitive Advantage |
|
Definition
The key to sustaining a competitive advantage is not faster computers or better technology. The key is using information technology to continuously improve and support the core functions of a business. |
|
|
Term
Characteristics of Useful Information |
|
Definition
Accurate
Complete
Relevant
Timely |
|
|
Term
Costs of Useful Information |
|
Definition
Acquisition costs
Processing costs
Storage costs
Retrieval costs
Communication costs |
|
|
Term
|
Definition
Bar codes
Radio frequency identification (RFID) tags
Electronic scanners optical character recognition |
|
|
Term
|
Definition
Transforming raw data into meaningful information that can be applied to business decision making. |
|
|
Term
|
Definition
The process of discovering patterns and relationships in large amounts of data. Can be supervised or unsupervised |
|
|
Term
|
Definition
|
|
Term
|
Definition
Association (affinity)
Sequence
Predictive
Data clusters |
|
|
Term
Association or affinity patterns |
|
Definition
occur when two or more database elements tend to occur together in a significant way |
|
|
Term
|
Definition
occur when two or more database elements occur together in a significant pattern in which one of the elements precedes the other. Whereas association or affinity patterns look for database elements that seem to go together, |
|
|
Term
|
Definition
help identify database elements that are different. |
|
|
Term
|
Definition
occur when three or more database elements occur together (i.e., cluster) in a significant way. |
|
|
Term
|
Definition
Process of ensuring that data are reliably and consistently retrievable in a usable format for authorized users but no one else. |
|
|
Term
Two critical steps are required to make sure that data can be accessed by authorized users and no one else. |
|
Definition
Authentication Authorization |
|
|
Term
|
Definition
that is, making sure potential users are who they claim to be |
|
|
Term
|
Definition
that is, granting authenticated users approved access to data, software, and systems. |
|
|
Term
|
Definition
such as fingerprint recognition or iris scanning, users are identified by unique, measurable body features. Of course, since some fingerprint scanners can be fooled by fingerprint molds, some companies take security measures even further by requiring users to simultaneously scan their fingerprint and insert a secure, smart card containing a digital file of their fingerprint. This is another form of two-factor authentication. Unfortunately, stolen or cracked passwords are not the only way for hackers and electronic thieves to gain access to an organization’s computer resources. Unless special safeguards are put in place, every time corporate users are online there’s literally nothing between their personal computers and the Internet (home users with high-speed DSL or cable Internet access face the same risks). Hackers can access files, run programs, and control key parts of computers if precautions aren’t taken |
|
|
Term
|
Definition
hardware or software devices that sit between the computers in an internal organizational network and outside networks, such as the Internet. Firewalls filter and check incoming and outgoing data. They prevent company insiders from accessing unauthorized sites or from sending confidential company information to people outside the company. Firewalls also prevent outsiders from identifying and gaining access to company computers and data. If a firewall is working properly, the computers behind the company firewall literally cannot be seen or accessed by outsiders. Another way of protecting information is to encrypt sensitive data |
|
|
Term
|
Definition
transforms data into complex, scrambled digital codes that can be unencrypted only by authorized users who possess unique decryption keys. Although firewalls can protect personal computers and network servers connected to the corporate network, people away from their offices (e.g., salespeople, business travelers, telecommuters who work at home) who interact with their company networks via the Internet face a security risk. Because Internet data are not encrypted, packet sniffer software easily allows hackers to read everything sent or received except files that have been encrypted before sending. Previously, the only practical solution was to have employees dial into secure company phone lines for direct access to the company network. Of course, with international and long-distance phone calls, the costs quickly added up. |
|
|
Term
virtual private networks (VPNs) |
|
Definition
have solved this problem by using software to encrypt all Internet data at both ends of the transmission process. Instead of making long-distance calls, employees connect to the Internet. But, unlike typical Internet connections in which Internet data packets are unencrypted, the VPN encrypts the data sent by employees outside the company computer network, decrypts the data when they arrive within the company network, and does the same when data are sent back to the computer outside the network. |
|
|
Term
secure sockets layer (SSL) encryption |
|
Definition
to provide secure off-site access to data and programs. If you’ve ever entered your credit card in a Web browser to make an online purchase, you’ve used SSL technology to encrypt and protect that information. SSL encryption is being used if a gold lock (Internet Explorer) or a gold key (Netscape) appears along the bottom of your Web browser page. SSL encryption works the same way in the workplace. Managers and employees who aren’t at the office simply connect to the Internet, open a Web browser, and then enter a user name and password to gain access to SSL-encrypted data and programs |
|
|
Term
|
Definition
collaboration tools customizable email accounts presence awareness instant messaging simultaneous access to files |
|
|
Term
executive information system (EIS) |
|
Definition
uses internal and external sources of data to provide managers and executives the information they need to monitor and analyze organizational performance. The goal of an EIS is to provide accurate, complete, relevant, and timely information to managers. Intranets are private company networks that allow employees to easily access, share, and publish information using Internet software. |
|
|
Term
|
Definition
websites are just like external websites, but the firewall separating the internal company network from the Internet permits only authorized internal access. Corporate portals are a hybrid of executive information systems and intranets. While an EIS provides managers and executives with the information they need to monitor and analyze organizational performance, and intranets help companies distribute and publish information and forms within the company |
|
|
Term
|
Definition
allow managers and employees to access customized information and complete specialized transactions using a web browser. |
|
|
Term
External Access & Sharing |
|
Definition
Electronic data interchange (EDI)
Web services
Extranet |
|
|
Term
electronic data interchange, or EDI |
|
Definition
two companies convert purchase and ordering information to a standardized format to enable direct electronic transmission of that information from one company’s computer system to the other company’s system |
|
|
Term
|
Definition
are another way for companies to directly and automatically transmit purchase and ordering information from one company’s computer system to another company’s computer system. Web services use standardized protocols to describe and transfer data from one company in such a way that those data can automatically be read, understood, transcribed, and processed by different computer systems in another company. |
|
|
Term
|
Definition
allows companies to exchange information and conduct transactions by purposely providing outsiders with direct, Web–based access to authorized parts of a company’s intranet or information system. Typically, user names and passwords are required to access an extranet. |
|
|
Term
Sharing Knowledge & Expertise |
|
Definition
Knowledge Decision support system (DSS)
Expert systems |
|
|
Term
decision support system (DSS) |
|
Definition
helps managers understand problems and potential solutions by acquiring and analyzing information with sophisticated models and tools. |
|
|
Term
|
Definition
systems are created by capturing the specialized knowledge and decision rules used by experts and experienced decision makers. They permit nonexpert employees to draw on expert knowledge base to make decisions. Most expert systems work by using a collection of “if–then” rules to sort through information and recommend a course of action. |
|
|