Term
| transfers information stored on legacy systems to a new, integrated computing platform, which typically comes in the form of ERP applications |
|
Definition
|
|
Term
| the locus of control over the computing systems and decision making regarding ERP systems |
|
Definition
|
|
Term
| corporate level strategy to create and maintain through the introduction of reliable systems processes and procedures lasting customer relationships; concentrate on downstream information flow |
|
Definition
| Customer Relationship Management (CRM) |
|
|
Term
| 3 components of the architecture of a CRM |
|
Definition
| operational, analytical, collaborative |
|
|
Term
| purpose to automate the fundamental business processes (marketing sales and support) |
|
Definition
|
|
Term
| components of operational/Front Office CRM |
|
Definition
| sales force automation, Customer service support (with CIC), and enterprise marketing managment (EMM) |
|
|
Term
| analyze customer behavior and perceptions |
|
Definition
| Analytical/Back Office CRM |
|
|
Term
| effective and efficient communication with the customer; lower communication barriers, greater customer focus, increased information integration |
|
Definition
|
|
Term
| producers of supplies that a company uses |
|
Definition
| Supply Chain/Supply Network |
|
|
Term
| integrating the value chains of a company and its suppliers; upstream flow and externally focused |
|
Definition
| Supply Chain Management (SCM) applications |
|
|
Term
| Information systems focusing on improving upstream information flows to accelerate product development and to reduce costs associated with procuring raw materials and to improve the coordination of suppliers, production , and distribution |
|
Definition
|
|
Term
| development of resource plans for efficient production |
|
Definition
|
|
Term
| components of SCM architecture |
|
Definition
| supply chain planning, supply chain execution |
|
|
Term
|
Definition
| information flow, financial flow, product flow |
|
|
Term
| extent to which a company’s supply chain is focusing on minimizing procurement, production, and transportation costs |
|
Definition
|
|
Term
| extent to which a company’s supply chain is focusing on maximizing customer service |
|
Definition
| supply chain EFFECTIVENESS |
|
|
Term
| an alternative to proprietary supply linkages |
|
Definition
|
|
Term
| business to business marketplaces |
|
Definition
|
|
Term
| provide a single point of access to information that may dispersed throughout an organization |
|
Definition
|
|
Term
| two types of enterprise portals |
|
Definition
| distribution portals and procurement portals |
|
|
Term
| describes someone who knows how to use a computer |
|
Definition
|
|
Term
| decommissioning the old system and installing the new system |
|
Definition
|
|
Term
| operated by third party vendors, meaning they are built and maintained by a particular company |
|
Definition
|
|
Term
| describes the practice of registering a domain name and then selling the domain name for large sums of money to an organization |
|
Definition
|
|
Term
| legal purchase of one copy of a software followed by the illegal copying and distribution of that same software |
|
Definition
|
|
Term
| systems that communicate across organizational boundaries |
|
Definition
| interorganizational systems |
|
|
Term
| enhancing the system to increase processing performance or interface usability or adding desired but not required features |
|
Definition
|
|
Term
| 3 core components when choosing an ERP system |
|
Definition
| Internal activities: financial management, operations management, and human resource management |
|
|
Term
|
Definition
| corrective, adaptive, perfective, preventative |
|
|
Term
| Ensuring of the authenticity and fidelity of information |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Text file storing Web browsing activity |
|
Definition
|
|
Term
| Software used for data collection without the users’ knowledge |
|
Definition
|
|
Term
| The practice of registering a domain name and later reselling it |
|
Definition
|
|
Term
| Technology solution to control digital content |
|
Definition
| digital rights management (DRM) |
|
|
Term
| Developed by the government to monitor all cyber communication |
|
Definition
|
|
Term
| states that Breaking into any electronic communication service is a crime |
|
Definition
| Electronic Communications Privacy Act of 1986 |
|
|
Term
| Investigators may monitor voice communication |
|
Definition
|
|
Term
| Use of formal investigative techniques to evaluate digital information |
|
Definition
|
|
Term
| used to entice and catch hackers and crackers |
|
Definition
|
|
Term
| sites that FBI puts up to entice hackers to catch them |
|
Definition
|
|
Term
Individuals gaining unauthorized access Motivated by curiosity No intentions to do harm |
|
Definition
|
|
Term
| Break into computers with the intention of doing harm |
|
Definition
|
|
Term
| Break into computer systems to promote political or ideological goals |
|
Definition
|
|
Term
| Four groups of computer criminals |
|
Definition
| People with technical knowledge committing crimes for personal gain, current or former employees, Career criminals using computers to assist them in crimes, Outside crackers hoping to find information of value |
|
|
Term
| changing electronic data before or after it is entered on computers |
|
Definition
|
|
Term
| breaking into telephone systems to make free long-distance calls or for other purposes |
|
Definition
|
|
Term
| offering stolen proprietary software |
|
Definition
| warez peddling (illegal software piracy) |
|
|
Term
| factors that influence piracy: |
|
Definition
| economic factors, perception of intellectual property, lack of public awareness |
|
|
Term
| Does not destroy files and brings computers down by clogging memory |
|
Definition
|
|
Term
| Designed to copy and send itself |
|
Definition
|
|
Term
| Does not copy itself and often remains hidden to the user |
|
Definition
|
|
Term
| Variations of Trojan horse that do not disrupt computer function until triggering event/operation |
|
Definition
|
|
Term
to the use of a computer to communicate: Obscene, vulgar, or threatening content |
|
Definition
|
|
Term
| Making false accusations that damage reputation |
|
Definition
|
|
Term
| Gaining information on a victim by monitoring online activities or using the Internet to encouraging other to harass a victim |
|
Definition
|
|
Term
| Attacking data and equipment of a victim or using the Internet to place false goods or orders |
|
Definition
|
|
Term
| The deliberate cause of emotional distress to a victim |
|
Definition
|
|
Term
| Military’s attempt to disrupt or destroy other country’s information and communication systems |
|
Definition
|
|
Term
| Goal is to diminish opponent’s communication capabilities |
|
Definition
|
|
Term
| independent citizens that attack perceived enemies of the state |
|
Definition
|
|
Term
| Goal is to cause fear, panic, and destruction |
|
Definition
|
|
Term
| Process of designing, building, and maintaining information systems |
|
Definition
| systems analysis and design |
|
|
Term
|
Definition
| Systems development life cycle |
|
|
Term
|
Definition
| systems planning and selection |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| systems implementation and operation |
|
|
Term
| Evaluation Criteria for Systems Projects |
|
Definition
| strategic alignment, potential benefits, potential costs and resource availability, project size and duration, technical difficulty and risks |
|
|
Term
| components of SDLC phase 2 |
|
Definition
| collecting requirements, modeling data, modeling processes and logic |
|
|
Term
| System requirements collection techniques: |
|
Definition
| interviews, questionnaires, observations, document analysis |
|
|
Term
| System requirements collection techniques: |
|
Definition
| interviews, questionnaires, observations, document analysis |
|
|
Term
| Something that must go well to ensure success |
|
Definition
| CSF (Critical Success Factor) |
|
|
Term
|
Definition
|
|
Term
| Special type of group meeting that reduces time for requirements collection |
|
Definition
|
|
Term
|
Definition
| entity-relationship diagram |
|
|
Term
| The way in which data are transformed |
|
Definition
|
|
Term
| components of SDLC phase 3 |
|
Definition
| human-computer interface, database and files, processing and logic |
|
|
Term
| Transforming the system design into a working computer system |
|
Definition
|
|
Term
| types of test conducted before system completion |
|
Definition
|
|
Term
| testing of overall system to see whether it meets design requirements (by software tester) |
|
Definition
|
|
Term
| testing of the capabilities of the system in the user environment with actual data |
|
Definition
|
|
Term
| old and new systems are used at the same time |
|
Definition
|
|
Term
| types of system conversion |
|
Definition
| direct, parallel, pilot, phased |
|
|
Term
| old system discontinued one day, new system used the next |
|
Definition
|
|
Term
| parts of the new system are implemented over time |
|
Definition
|
|
Term
| entire system is used in one location |
|
Definition
|
|
Term
| 2 types of documentation: |
|
Definition
| user-related, information system |
|
|
Term
| Transformation of design into a working information system |
|
Definition
| system implementation and operation |
|
|
Term
| the largest part of the system development effort occurs at what stage |
|
Definition
|
|
Term
| what type of maintenance is given the highest priority? |
|
Definition
|
|
Term
| types of software maintenance |
|
Definition
| corrective, adaptive, preventative, perfective |
|
|
Term
| making changes to an information system to repair any flaws in design, coding, or implementation |
|
Definition
|
|
Term
| making changes to an information system to evolve its functionality, to accommodate changing business needs, or to migrate it to a different operating environment |
|
Definition
|
|
Term
| making enhancements to improve processing performance or interface usability, or adding desired but not necessarily required system features |
|
Definition
|
|
Term
| making changes to a system to reduce the chance of future system failure |
|
Definition
|
|
Term
| Used for development of less structured information systems; use trial and error |
|
Definition
|
|
Term
|
Definition
| Rapid Application Development |
|
|
Term
|
Definition
Requirements planning User design Construction Move to the new system |
|
|
Term
|
Definition
| Object Oriented Analysis and Design |
|
|
Term
| the process of gathering and organizing information from users, managers, business processes, and documents to understand how a proposed information system should function |
|
Definition
|
|