Term
|
Definition
Reports created due to unplanned information requests in which information is gathered to support a nonroutine decision |
|
|
Term
|
Definition
A display delivering summary information to managers and executives |
|
|
Term
|
Definition
Reports that provide details behind the summary values on a key indicator or exception report |
|
|
Term
Executive Information system (EIS) |
|
Definition
An information system designed to provide information in a highly aggregated form so that managers at the executive level of the organization can quickly scan it for trends and anomalies |
|
|
Term
|
Definition
Report that highlights situations that are out of the normal range |
|
|
Term
Fully automated data entry |
|
Definition
data entry into an information system that does not require any human intervention |
|
|
Term
|
Definition
reports that provide a summary of critical information on a recurring schedule |
|
|
Term
Management Information Systems (MIS) |
|
Definition
1) a field of study that encompasses the development use, management, and study of computer-based information systems in organizations. 2)An information system designed to support the management of organizational functions at the managerial level of the organization. |
|
|
Term
|
Definition
A person enters information by hand into an information system |
|
|
Term
|
Definition
reports produced at predefined intervals- daily, monthly - to support the routine informational needs of managerial-level decision making |
|
|
Term
|
Definition
Documents that seve as a stimulus to a transaction processing system from some external source |
|
|
Term
Transaction processing system (TPS) |
|
Definition
An information system designed to process day-to-day business event data at the operational level of the organization. |
|
|
Term
|
Definition
Science of enabling information tech. to simulate human intelligence, such as resoning and learning as well as gaining sensing capabilities (seeing, hearing,walking, talking, and feeling) |
|
|
Term
Decision Support system (DSS) |
|
Definition
A special-purpose information system designed to support organizational decision making |
|
|
Term
|
Definition
A special pirpose information system designed to mimic human expertise by manipulating knowledge- understanding acquired through ex[erience and extensive learning- rather than simply information. |
|
|
Term
Functional area Information System |
|
Definition
A cross- orgainizational-level information system designed to support a specific functional area. |
|
|
Term
Geographic Information Systems |
|
Definition
a system for creating, storing, analyzing and managing geographically referenced information. |
|
|
Term
|
Definition
software that enables people to work together more effectively |
|
|
Term
|
Definition
a program that works in the background to provide some service when a specific event occurs. |
|
|
Term
|
Definition
specific portals used to share knowledge collected into a repository with employees, with customers and suppliers or the general public |
|
|
Term
|
Definition
Work teams from different organizations and locations that perform and disband as needed. |
|
|
Term
|
Definition
the display of complex data relationships using a variety of graphical methods |
|
|
Term
|
Definition
intelligent agents that continuously browse the web for for specific information . also known as web spiders |
|
|
Term
Customer Relationship management (CRM) |
|
Definition
A corporative level strategy designed to create and maintain lasting relationships with customers bu concentrating on the downstream information flows, through the into of reliable systems, processes and procedures. |
|
|
Term
|
Definition
enterprise portals that automate the business processes involved in selling, or distributing, products from a single supplier to multiple buyers |
|
|
Term
|
Definition
Information systems that provide a single point of access to secured, propietary information, which may be dispersed throughout an organization. |
|
|
Term
Extensible Business Reporting Language |
|
Definition
An XML- based specification for publishing financial information |
|
|
Term
Extensible Markup Language (XML |
|
Definition
A data presentation standard that allows designers to create customized features that enable datta to be more easily shared between applications and organizations. |
|
|
Term
|
Definition
Enterprise portals that automate the business processes involved in purchasing, or procuring products between a single buyer and multiple suppliers. |
|
|
Term
Radio frequency identification |
|
Definition
The use of electomagnetic waves in the RF portion of the electromagnetic spectrum in order to transmit signals; an RFID system uses a transceiver and antenna to transfer information to processing device or RFID tag |
|
|
Term
Sales force automation (SFA) |
|
Definition
CRM systmes to support the day-to-day sales activbities of an organization |
|
|
Term
Supply chain management (SCM |
|
Definition
Information systems focusing on improving upstream information flows with two main objectives- to accelerate product development and to reduce costs associated with procuring raw materials, components and services from suppliers |
|
|
Term
|
Definition
A website where multiple buyers and sellers come together to conduct business; also called an electronic marketplace |
|
|
Term
|
Definition
A market comprised of firms within a specific industry sector |
|
|
Term
Adaptive/Corrective/Perfective/Preventive maintenance |
|
Definition
Making changes to an information system to make its functionality meet changing business needs or to migrate it to a different operating environment |
|
|
Term
|
Definition
Testing performed by the development organization to assess whether the entire system meets the design requirements of teh users |
|
|
Term
|
Definition
Testing performed by actual system users, who test the capabilities of the system with actual data in their work environment |
|
|
Term
|
Definition
Data moving through an organization or within an information system |
|
|
Term
Graphical User Interface (GUI) (p. 374) |
|
Definition
Computer interface that enables the user to select pictures, icons, and menus to send instructions to the computer |
|
|
Term
Joint application design (JAD) (p. 370) |
|
Definition
A special type of group meeting in which all (or most) users meet with the analyst to jointly define and agree on system requirements or designs. |
|
|
Term
Processing logic (p. 372) |
|
Definition
The steps by which data is transformed or moved, as well as a description of the events that trigger these steps |
|
|
Term
Software engineering (p. 363) |
|
Definition
A disciplined approach for constructing information systems therough the use of common methods, techniques or tools. |
|
|
Term
Systems analysis and design (p. 363) |
|
Definition
The second phase of the systems development life cycle, in whichthe current ways of doing business are studied and alternative replacement systems are proposed |
|
|
Term
|
Definition
The primary person responsible for performing systems analysis and design activities. |
|
|
Term
Systems Development Life Cycle (SDLC) (p. 366) |
|
Definition
describes the life of an information system from conception to retirement. |
|
|
Term
|
Definition
A systems development method whereby users in the organization develop, test, and maintain their own applications |
|
|
Term
|
Definition
The process of purchasing an exisiting information system from an external organization or vendor |
|
|
Term
Object-Oriented Analysis and Design (OOA&D) |
|
Definition
Systems development methodologies and techniques based on objects rather than on data and processes. |
|
|
Term
|
Definition
An iterative systems development process in which requiremnets are converted into a working system that is contunually revised through close work between analysts and users. |
|
|
Term
Request for proposal (RFP) |
|
Definition
A communication tool indicating buyer requirements for a given system and requesting information from potential vendors. |
|
|
Term
|
Definition
A broad range of issues and standards of conduct that have emerged through the use and proliferation of information systems |
|
|
Term
|
Definition
the knowledge of how to operate a computer |
|
|
Term
|
Definition
the dubious practice of registering a domain name, then trying to sell the name to the person, company, or orgaization most likely to want it. |
|
|
Term
|
Definition
the gap between those individuals in our society who are computer literate and have access to information resources like the internet and those who do not. |
|
|
Term
|
Definition
Stealing another persons social security number, credit card number, and other personal information for the purpose of using the victim's credit rating to borrow money, buy merchandise and otherwise run up debts that are never repaid |
|
|
Term
Information accessibility |
|
Definition
An ethical issue that focuses on defining what information a person or organization has the right to obtain about others and how this information can be accessed and used. |
|
|
Term
|
Definition
an ethical issue concerned with the authticity and fidelity of information as well as identifying who is reponsible for information errors that harm people |
|
|
Term
|
Definition
an ethical issue that is concerned with what information an individual should have to reveal to others through the course of employment or through other transactions such as online shopping |
|
|
Term
|
Definition
An ethical issue that focuses on who owns information about individuals and how informaion can be sold and exchanged |
|
|
Term
|
Definition
The use of a computer to commit an illegal act |
|
|
Term
|
Definition
Cracker: An individual who breaks into computer system with the intention of doing damage or committing a crime Hacker: Individuals who gain unauthorized access to computer systems. |
|
|
Term
|
Definition
the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals or any segment of society to attain politcal, religious, or ideological goals. |
|
|
Term
|
Definition
an organized attempt by a country's military to disrupt or destroy information and communications systems of another country |
|
|
Term
|
Definition
A type of computer crime where the data going into or out of a computer is altered |
|
|
Term
|
Definition
Attempts to trick finanicial account and credit card holders into giving away their authorization information, usually by sending spam messages to literally millions of email accounts. |
|
|
Term
|
Definition
Crimes committed against telephone company computers with the goal of making free long distance calls, impersonating directory assistance or other operator services, diverting calls to numbers of the perpatrators choice, or otherwise disrupting telephone services for subscribers. |
|
|
Term
|
Definition
A form of data diddling that occurs when a person shaves a small amounrs from financial accounts and deposits them into a personal account |
|
|
Term
Social Engineering or Masquerading |
|
Definition
Misrepresenting oneself in order to steal equipment or to trick others into revealing sensitive information |
|
|
Term
|
Definition
A type of computer crime where individuals make illegal copies of software protected bu copyright laws. |
|
|
Term
|
Definition
A destructive computer code whose instructions reamin hidden to the user because the computer appears to function normally, but, in fact, it is performing underlying functions dictated by the intrusive code. |
|
|