WGU C724- Information Systems Management What are the 6 components of Information Systems? Which ones just belong to Information Systems - ✔1. People 2. Processes 3. Networks 4. Software 5. Hardware 6. Data People and processes only belong to information systems Executive Support Systems (ESS) - ✔a type of management support system that facilitates and supports senior executive information and decision-making needs. It provides easy access to internal and external information relevant to organizational goals What is EIS - "Executive Information Systems?" - ✔a specific class of DSS that support the strategic decision-making process of top-level executives. These systems incorporate summarized information from decision support systems and management information systems, along with external factors to forecast and analyze trends. What is DSS - "Decision Support Systems?" - ✔focuses on supporting all phases of specific decision-making processes and procedures for arriving at a solution. They are often developed to handle unstructured problems at all levels. What is MIS - "Management Information Systems?" - ✔represent a category of IS that serve lower to middle managers. They provide performance reports based on the results from transaction processing systems, such as product cost data, sales data, and expense data. What is TPS - "Transaction Processing Systems?" - ✔collect, store, update, and retrieve transaction data within an organization. Common business transactions include: employee payroll, customer sales, and supplier payments. Developed to: decrease costs, decrease processing time, and increase accuracy. Achieve these benefits by: automating and recording routine business transactions that are too tedious and monotonous for front-line employees to process manually in an effective and efficient manner What is Information Systmes? - ✔The purpose is to get useful information to the right people within an organization to support decision making and operations. Effective information systems can help companies streamline business processes and planning, as well as help with data storage, data management, and data security. Identify the 7 major reasons firms invest in information systems - ✔1. Achieve operational excellence 2. Develop new products and services 3. Attain customer
intimacy and service 4. Improve decision making 5. Promote competitive advantage 6. Ensure long-term survival 7. Develop strong relationships with suppliers What is data? An example. - ✔Data - Unorganized data that lacks meaning. Example: The number of people below the poverty line in the region is 50,000 What is information? An example. - ✔Information - Data that has been organized in a meaningful manner. Example: The number of people below the poverty line increases between 2010 and 2018 What is knowledge? An example. - ✔Knowledge - The practical application of information. Example: The number of people below the poverty line has increased due to stagnating wages and cuts to social programs What does the functional area Human Resources do? - ✔Recruiting, training, and maintaining employees and their records What does the functional area Production, Operations & Quality Control do? ✔Functions range from receiving raw material to shipping finished goods or from production itself to equipment maintenance What does the functional area Sales/Marketing do? - ✔Planning, promoting, and selling of goods and services to satisfy customer needs and the objectives of the organization What does the functional area Accounting & Finance do? - ✔Managing financial assets and maintaining financial records Accounts payable, accounts receivable Budgeting, general ledgers, payroll Cash flow financial transactions What are Porter's 5 Forces? - ✔1. Threat of New Entrants 2. Threat of Substitutes 3. Bargaining Power of Customers (Buyers) 4. Bargaining Power of Suppliers 5. Competitive Rivalry RAID " Redundant Array of Independent Disks" - ✔storage uses multiple disks in order to provide fault tolerance, to improve overall performance, and to increase storage capacity in a system Cloud Computing - ✔is facilitated by many computers meshed or connected together in what is termed "cloud fabric," which provides common resources to service providers. Benefits include redundancy, reliability, and scalability. Organizations that provide cloud computing are known as cloud operators, which employ fabric controllers to administer operations within the fabric of computer resources
Strategic-Oriented Evaluation - ✔the determination of whether the information system outputs enable management to make strategic decisions that will help develop and achieve the future mission and vision of the organization Function-Oriented Evaluation - ✔examines the performance of data, hardware, software, networks, and human resources System-Oriented Evaluation - ✔the ability of an information system to discriminate between files or data that are relevant to a user query, and those which are not relevant Direct Implementation - ✔the system is implemented and tested to ensure it performs properly. Then the old system is removed and the new one put in its place without any overlap or limited roll out Service-Oriented Architecture (SOA) - ✔is a software development model for distributed application components that incorporates discovery, access control, data mapping and security features Parallel Adoption - ✔a method of hardware or software migration that involves using the existing and new systems simultaneously until the implementation is judged to be complete and satisfactory Network Economics - ✔The cost of adding another business participant to a business venture is small, the potential gain is great Virtual Company Model - ✔Networks of people and resources join together to provide a service or create a product without the traditional storefront boundaries Business Ecosystems - ✔Network of businesses involved in delivering a product through mutual cooperation Describe synergy. How does it benefit the business? - ✔The cooperation between several businesses to produce a better product or service than would be possible if each business worked independently. When several businesses combine their expertise, they can offer better products for lower costs and higher profits. Star Topology - ✔all computers and devices are connected to a main hub or switch. The hub or switch amasses and disburses the flow of data within the network. Star topology is the most common type of network and follows the Ethernet standard Bus Topology - ✔in this arrangement computers and devices are connected to a single linear cable called a trunk. The trunk is also referred to as the backbone or a segment. Each end of the trunk must be discharged to prevent the signal from rebounding back up the cable
Ring Topology - ✔computers and devices are connected to a closed loop cable. Here there are no terminating ends so if one system crashes the entire network goes down. Each computer functions as a repeater and charges the signal before sending it to the next station Mesh Topology - ✔A network setup where each computer and network device is interconnected with one another, allowing for most transmissions to be distributed even if one of the connections go down. It is a topology commonly used for wireless networks CRM - "Customer Relationship Management" - ✔allow companies to directly interact and close the feedback loop with customers, gauge customer interest, respond to incidents, and, ultimately, to improve customer intimacy KM - "Knowledge Management" - ✔these systems provide tools to help manage organizational knowledge and create value to meet business requirements and strategic goals SCM - "Supply Chain Management" - ✔system works to increase the efficiency of the process of getting materials developed into the products and pushed out to the customer Static Data - ✔is data that does not change after being recorded. It is a fixed data set. In contrast, dynamic data may change after it is recorded, and has to be continually updated Variable - ✔a data type that's a classification of data which tells the compiler or interpreter how the programmer intends to use the data; can become incompatible with data warehouse design ERP - "Enterprise Resource Planning" - ✔involves utilizing computer technology to link various aspects of a business; a very complex resource planning system that spans the entire business; companies often have difficulty implementing the system Rapid Application Development (RAD) - ✔is an iterative alternative to the conventional waterfall model of software development. The RAD approach to software development focuses on the development's process, with limited emphasis on the planning process. The RAD approach emphasizes the need to adjust project requirements as the project progresses. The RAD approach frequently uses prototypes in lieu of predetermined specifications. End-User Development - ✔is a largely informal method of solutions development by end users, made possible by the availability of fourth-generation languages that enable end users to develop systems and solutions with little or no assistance from professional technical specialists.
GIS - "Geographic Information Systems" - ✔using connections to numerous databases containing data concerning locations, crimes, taxes, traffic, votes, and environments and life science data, geospatial analysis can help government administrators to understand demographic trends, population density changes, attribute concentrations CIO - "Chief Information Officer" - ✔a business leader who analyzes internal business processes such as payroll and billing, reshapes the physical infrastructure and network purchases to meet business goals, and lead the workforce to implement critical IT internal projects; responsible for IS strategic thinking and planning CTO - "Chief Technology Officer" - ✔has ultimate responsibility for all technology implementation, maintaining technology compliance regulations, and identifying technology risks for the company Systems Analyst - ✔A change agent who uses design and analysis techniques to solve organizational problems using information technology; they report about system development and keep others informed; should understand overall business processes; focuses on analysis, design, and implementation Database Administrator - ✔Responsible for the creation and management of the entire database management system (DBMS). Data Administrator - ✔Responsible for determining and monitoring employees' access to the company's database management system (DBMS). Programmer (or Developer) - ✔write code to instruct computers to perform certain tasks Network/System Administrator - ✔install and repair computer systems, as well as identify and fix network issue Security Analyst - ✔Their goal is to ensure that data and systems are secure to prevent breaches. Web Developer - ✔responsible for creating and maintain a company's website Describe the communication style: Synchronous - ✔two way communications such as audio/video teleconference and instant messaging Describe the communication style: Asynchronous - ✔one way communication, such as email and global overnight mail ITIL - "Information Technology Infrastructure Library" - ✔common set of best practices widely used by businesses to give guidance to companies on how to use IT as a tool for implementing change
Agile - ✔an operational method by which software developers iteratively gather requirements, plan, design, develop, test, and implement software External Environmental Pressure: Political & Legal - ✔organizations respond to these pressures by enacting policies, complying to standards, and allying with experienced partners External Environmental Pressure: Cultural - ✔organizations respond to these pressures by using ethical business practices, building strong cultural ties with their stakeholders, being socially responsible, and enacting sustainable business policies and practices. External Environmental Pressure: Technological - ✔organizations respond to these pressures by planning for improvements to reduce or manage complexity, creating faster and more accurate models to make better decisions, and innovating to sustain competitive advantages, to keep up with competitors External Environmental Pressure: Economic - ✔organizations respond to these pressures by realizing the need to plan for or react to a changing workforce, powerful suppliers, customers, and/or competitors Challenges in Obsolesce: Time - ✔the time allotted to complete the scheduled tasks of the project Challenges in Obsolesce: Scope - ✔the specifically defined output or deliverable(s) intended at the end of the project Challenges in Obsolesce: (Resources) Cost - ✔the necessary human (laborer's), capital (equipment), and liquid (cash) assets necessary to complete the project's output Challenges in Obsolesce: Quality - ✔the degree of satisfaction by which each of the above components is satisfied Project Risks: Risk Assessment - ✔assessing the impact if that risk would have if event occurred Project Risks: Cost/Benefit Analysis - ✔evaluating the cost/benefit analysis to avoid or transfer the risk WPA2 - ✔offers stronger security standards, is already replacing WPA as the latest standard Wi-Fi encryption protocol. All Wi-Fi networks are packet-switched digital networks
VoIP - ✔"Voice over Internet Protocol" - is a modern telecommunications technology that offers convergence between voice and data networks Project Risks: Vulnerability Assessment - ✔determining the vulnerability Project Risks: Implementation - ✔implementing the plan What is risk acceptance? Example. - ✔Accepting that a risk will occur and doing nothing to avoid or prevent it. An example would be accepting that a baseball will pass through a window facing the park and planning to replace the window when it occurs. Acceptance can be active or passive. What are the definitions of each? - ✔1. Active acceptance is understanding the risk and making a plan of action when it occurs. 2. Passive acceptance is understanding the risk and doing nothing to plan for recovery. What is risk avoidance.? Example. - ✔Developing an alternative plan for achieving objectives by avoiding a specific risk or risk category. For example, finding a path around traffic congestion might include taking surface roads versus the expressway during rush-hour traffic. Flowcharts - ✔can be used to diagram a logical model Unified Modeling Language (UML) - ✔a general-purpose modeling language designed to provide a standard method to represent the design of a system.3 UML helps visualize and analyze an information system architecture. UML also helps model systems by using static structures and dynamics as well as the behavior of systems Work Breakdown Structure (WBS) - ✔a broken down list of all deliverables showing what the customer will get at the end of a project Pseudocode - ✔an informal high-level description of the operating principle of a computer program or other algorithm. It uses the structural conventions of a normal programming language, but is intended for human reading rather than machine reading What is risk sharing? Example. - ✔Partnering with groups or individuals who have more experience and who will accept or absorb some or all of the risk involved. For example, when planning a community event, partners are often sought to help sponsor a venue or service in order to reduce financial risk. What is risk reduction? Example. - ✔Acting to reduce the potential for a risk to occur or affect damage to the project. An example would be the installation of a pre-action fire suppression system to protect sensitive electronics, where non-reactive gas is used to smother a fire before a traditional water suppression system is activated.
What is risk transference? Example. - ✔Shifting risk to another party. For example, in a case where risk cannot be avoided, shared, or reduced to an acceptable non-damaging level, insurance can be purchased to provide restorative reimbursement for damaged equipment or services and, potentially, lost revenue. What is Information Management? - ✔is concerned with collecting, managing, manipulating, organizing and reorganizing, and distributing information from a variety of sources to a variety of audiences. What is Information Technology Management? - ✔is concerned with the management of resources that facilitate access to information. What is offshoring? - ✔Sending operations to other countries What is outsourcing? - ✔sending operations to other companies What is Cultural particularism? - ✔societal norms instilled in populations that tie them emotionally to local brands or habits. For example, many American citizens prefer products with the Made in the USA label. Define decentralized development - ✔developers in different locations develop their own solutions independently Define duplicated systems development - ✔where developers in the centralized location develop information systems and tools, which are then intended to be operated on similar systems at each of the international locations Define networked development - ✔where development and operations are planned, combined, and coordinated between international locations What is Moore's Law? - ✔Gordon Moore said that processor speeds and power would double every two years Joint Application Design - ✔is a process used in the life cycle area of the dynamic systems development method (DSDM) to collect business requirements while developing new information systems for a company Hierarchical Database - ✔is a type of database that connects tables in a master/slave, leader/follower, or primary/replica format Computer-Assisted Software Engineering - ✔is the use of computer methods to organize and manage software development in information systems.
CASE software can be classified into three categories or hierarchies: tools, workbenches, and environments. o Tools support specific steps in the software development life cycle and can be divided into two categories: Upper CASE and Lower CASE. Upper CASE tools support system analysis and modeling Lower CASE tools support development activities such as design, testing, debugging, and maintenance. o Workbenches combine several tools for software development to achieve a simple, consistent interface, and a seamless integration of data and control. o Environments combine multiple tools or workbenches to support the complete software cycle. Define FORTRAN - ✔computer-based language in the 40 and 50 - used for math, engineering, and scientific calculations Define COBOL - ✔English like language in the 60s - first software for business How do IS and IT enhance organizational effectiveness? - ✔ What are Input Devices? - ✔provide input into the processing unit that include peripherals such as the keyboard, mouse, microphone (audio input), sensors and document or visual scanners What are Output Devices? - ✔include internal storage devices or processes, as well as external peripherals such as monitor screens (visual output), speakers (audio output), and printers (physical output). Types of Storage: Primary - ✔also known as CPU and RAM. It a Volatile flash memory. Information storage is temporary and can only be stored until power is removed. It's faster than secondary storage. Historically has been much more expensive than secondary. Example: flash memory chips Types of Storage: Secondary - ✔is accessed only through a system's input/output bus. Slower than primary storage. Costs less than primary. Examples: magnetic hard disk drives, nonvolatile flash storage, CD/DVD discs, flash drives Types of Storage: Portable - ✔flash drives Component-based Development - ✔is a procedure that accentuates the design and development of computer-based systems with the help of reusable software components. With CBD, the focus shifts from software programming to software system composing.
Personal Computer (PC) - ✔small systems are used on an individual basis and include traditional multicomponent desktop systems (monitor, computer, keyboard, mouse) and integrated systems, such as laptops and tablet computers Workstation - ✔a more powerful system used by individuals in order to run more resource-intensive applications Server - ✔a system used to provide services to other systems. They don't need to be powerful computers, They may be used on personal computers, but are usually built on more resilient and reliable components Mainframe - ✔a high-capacity, high-performance system built for large organizations and used to quickly process large volumes of data Supercomputer - ✔the fastest category of computer available and are built to hand vast amounts of information very quickly Software Categories: System Software - ✔operating system software like Microsoft Windows, UNIX, Linux or Mac OS X Software Categories: Utility Software - ✔calculators, text editing tools, games and hybrid applications Software Categories: Application Software - ✔can be classified as individualized applications and enterprise applications, which allows the user to create something like a document or spreadsheet. Collaboration Software - ✔provides tools and resources used to connect and facilitate electronic communication and collaboration between users. Examples include Microsoft Outlook, Skype, and IBM Notes Sentiment Analysis - ✔the process of computationally identifying and categorizing opinions expressed in a piece of text, especially in order to determine whether the writer's attitude towards a particular topic, product, etc. is positive, negative, or neutral Horizontal Enterprise Applications - ✔are more popular and general purpose, such as word processing, spreadsheets, and presentation software. Vertical Enterprise Applications - ✔designed for a specific function, department, or industry. Examples of vertical or enterprise applications include accounting systems and simulation software.
Types of Software: Proprietary - ✔software where the source-code and development are controlled by the developer or a licensee. Example: Microsoft Windows, Mac OS X, UNIX Types of Software: Open-Source - ✔software whose source-code is freely available to developers and users. Example: Linux - Red Hat and Ubuntu Tuples - ✔are ordered lists of values and are used for grouping and organizing data. Tuples can be used to represent related data that belong together, such as student records, and are used in database relational models Software Life Cycle - ✔Software is typically introduced to the market, grows in demand, matures as it is overcome by newer technology or tools, and declines in popularity and rate of adoption. Software Licensing - ✔Licensing fees are likely cheaper than litigation costs for piracy or for violating copyright, so organizations will often require their IT managers to keep track of and optimize the use of software licenses within the organization. IaaS - Infrastructure as a Service - ✔A service provider provides a cloud fabric, or pooled services, including server space, servers, storage, and all other aspects of the computing platform, with the exception of the operating system and applications, which the client organization would install and manage. PaaS - Platform as a Service - ✔A service provider provides server space, the server, virtualization, operating system, database, and development environment in a platform that can be used for application development. SaaS - Software as a Service - ✔Software licensed and hosted on centralized or distributed servers that belong to a service provider. Users access this software using a connection to the Internet and a web browser. Database - ✔a set or collection of data that is centrally located in an electronic format, organized in tables, and easily searchable Entity - ✔a person, item, event, etc., for which an organization collects data Field - ✔an attribute of an entity, such as a name, address, or student ID Record - ✔a set of related fields, also called a tuple, that describe one occurrence of an entity, such as a customer Table - ✔a collection of related records
Primary Key - ✔a field uniquely identifies a record, such as customer ID or student ID Foreign Key - ✔a common field that exists in multiple tables that is used to form a relationship Schema - ✔the complete definition of a database, including the tables, records, fields, and relationships Object-Oriented Database - ✔Object databases are used when media or other types of files are required because multimedia files and diagrams or blueprints such as those generated by computer aided design (CAD) are more complex and not easily sorted by columns and rows Relational Database - ✔are one of the most common database models in use today and are based upon the relational model of data, which is a method of structuring data using relationships, in rows and columns Post Office Protocol (POP) - ✔used to retrieve email from a mail server File Transfer Protocol (FTP) - ✔used to transfer files from one computer to another Point-to-Point Protocol (PPP) - ✔used to ensure the privacy of the content being communicated Transmission Control Protocol/Internet Protocol (TCP/IP) - ✔the standard communication rule of the internet Analytical Database - ✔includes determining the purpose of the database, gathering an organizing the data, specifying primary keys, establishing the table relationships, and applying the normalization rules OLAP - ✔stands for "online analytical processing" and are analytical, fixed databases containing data that are used for making decisions OLTP - ✔stands for "online transaction processing" and is a database design used for browsing and manipulating business transaction activity Cloud-based Database - ✔that the model is more flexible, it is both easy and inexpensive to add Internet access to the database, data can be stored in multiple locations, and the database can handle large volumes of structured and unstructured data Clickstream Analysis - ✔an application that records the location on the screen in which a user clicks while browsing the Internet. These clicks are recorded and saved in web
server log files. These data, if dumped into a database, can be "mined" for information, which could lead to the discovery of user intent. This user intent could then be used for targeted marketing Conceptual data modules - ✔highest level model, containing the least amount of detail within the data Conceptual data models map the scope of the enterprise data architecture model and help support system and documentation requirements. This model is typically used in developing master reference data, such as in an enterprisewide database Logical data modules - ✔contains more detail than a conceptual data model, often defining operational and transactional entities for the database Physical data modules - ✔may exist within the logical data model, containing greater detail, such as database tables and key indexes Predictive Analysis - ✔is to offer statistical or probability trends that can influence business practices or business strategic decision making Tool: Decision Tree - ✔a tool used in decision analysis and is another tool used to represent the entity-relationship model. Visio is a vector tool for drawing decision trees and flow charts in order to outline processes that could be used to develop the entity relationship model. In entity-relationship models pointers, or linked lines, are used to signal relationships. Cardinality refers to the numeric relationship between two entities. Crow's foot notion is often used to describe the relationship between entities. One and only one - ✔two vertical lines None to many - ✔circle and crow's foot One to many - ✔Line perpendicular to the line connecting the tables and a crow's foot (3 lines radiating from the line connecting the tables) Purpose of Normalization - ✔involves correctly defining keys, tables, columns, and relationships Firewall - ✔a part of a computer system or network which is designed to block unauthorized access while permitting outward communication Antimalware - ✔a type of software program designed to prevent, detect and remove malicious software (malware) on IT systems, as well as individual computing devices Encryption - ✔the process of converting information or data into a code, especially to prevent unauthorized access
Biometrics - ✔the measurement and analysis of unique physical or behavioral characteristics (such as fingerprint or voice patterns) especially as a means of verifying personal identity Rolling Code (hopping code) - ✔used in keyless entry systems to prevent replay attacks, where an eavesdropper records the transmission and replays it at a later time to cause the receiver to 'unlock'. Such systems are typical in garage door openers and keyless car entry systems Group Support System (GSS) - ✔a collection of applications aimed at facilitating group work and communication similar to groupware 1NF - ✔There is no repeating data or group of data. For example, having a person's name in the database in two different tables. Using Primary and Foreign keys to link the tables is the means why which you eliminate the need to list someone's name in two different tables. 3NF - ✔All fields in a table must be connected by and associated with a primary key. 2NF - ✔All fields in a record must be connected with a primary key. Referential integrity - ✔Data inconsistency is prevented by using referential integrity rules that ensure that the relationships of data between tables is consistent. Referential integrity rules prevent a user from adding a record to a table containing a foreign key unless there is a similar record in the linked table. Changes that are made to the linked table must also be made to the primary table through a referential integrity technique known as cascading update. A row value in a table only exists if an equal value exists in a referenced table. Tables in databases form relationships using keys, and referential integrity means that for an entity or object to exist in a table, an equal value must exist in referenced table Data Warehouse - ✔Data warehouses are central libraries of data that are combined from one or more sources and organized by subject to support organizational managers o Three main types of data warehouse applications include: Information processing Analytic processing Data mining Data Mart - ✔a smaller subset database from a data warehouse typically focused on a single area or function Components of A Data Warehouse Source Systems, Data Quality, Data Governance, & Metadata - ✔
Digital Signiture - ✔type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate Malware - ✔software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system Private Industrial Networks - ✔are web based networks that manage the interactions between definite companies in all belongings of the whole supply chain - from suppliers over the wholesaler to the retailers and finally to the customer - from the manufacturer to the end customer Virtual Private Network (VPN) - ✔a method employing encryption to provide secure access to a remote computer over the Internet Freemium - ✔a pricing strategy by which a product or service (typically a digital offering or an application such as software, media, games or web services) is provided free of charge, but money (premium) is charged for additional features, services, or virtual goods. System-Level Security - ✔Consists of the architecture (layers), policy, and process levels. Convergence - ✔the ability for a telecommunication network to carry voice, data, and video Critical Path Method (CPM) - ✔step-by-step process planning technique that defines the critical and noncritical tasks within a project in order to reduce or minimize process delays and time-related problems. Copyright - ✔legal right given to the creator of an original work allowing the exclusive right for sale and distribution of that work for a period of time. Data Mining - ✔is the process of identifying hidden patterns and relationships in large databases and applying rules to that data in order to predict future behavior System Development Life Cycle (SDLC) - ✔Analysis Phase 1. Identify problems, root cause, opportunities, and objectives 2. Determining information requirements (most important) 3. Analyzing system needs and develop a solution Design Phase
4. Designing the recommended system 5. Developing and documenting software Implementation Phase 6. Testing and maintaining the system 7. Implementing and evaluating the system Management Information Systems (MIS) - ✔represent a category of IS that serve lower to middle managers. They provide performance reports based on the results from transaction processing systems, such as product cost data, sales data, and expense data