Term
|
Definition
| independent computer programs that copy themselves from one computer to othercomputers over a network. Unlike a virus, they can operate on their own without attaching to other computer program files and rely less on human behavior in order to spread from computer to computer. |
|
|
Term
|
Definition
| a software program that appears to be benign but then does something other than expected. It is not itself a virus bc it does not replicate but is often a way for viruses or other malicious code to be introduced to a computer system. |
|
|
Term
|
Definition
| record every keystroke made on a computer to steal serial numbers for software, to launch internet attacks, gain access to email accounts, obtain passwords to protected computer systems, or to pick up personal info such as credit card numbers. |
|
|
Term
|
Definition
| the intentional disruption, defacement or even destruction of a Web site or corporate info system. |
|
|
Term
|
Definition
| invovle redirecting a web link to an address different from the intended one, with the site masquerading as the intended destination. |
|
|
Term
|
Definition
| a type of eavesdropping program that monitors info traveling overa network. It helps these people identify potential network trouble spots or criinal activity on networks, but when used for criminal purposes, they can be damagning and very difficult to detact. |
|
|
Term
|
Definition
| hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network. |
|
|
Term
|
Definition
| attack uses numerous computers to inundate and overwhelm the network from numerous launch points. Ex. during the 09 iranian election protests, foreign activits trying to help the opposition engaged in DDos attacks against Iran's government. |
|
|
Term
|
Definition
| involves setting up fake web sites or sending email or text messages that look like those of legitimate businesses to ask users for confidential personal data. The message instructs recipients to update or confirm records by providing social security numbers, bank and credit card info and other confidential data either by responding to the email message, by entering the information at a bogus web site or by calling a telephone number. |
|
|
Term
|
Definition
| are wireless networks taht pretend to offer trustworthy wifi connections to the internet such as those in airport lounges, hotels or coffee shops. |
|
|
Term
|
Definition
| redirects users to a bogus web page even when the individual types the correct web page into his or her browser. |
|
|
Term
|
Definition
| occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase. |
|
|
Term
|
Definition
| requires financial institutions to ensure the security and confidentiality of customer data. Data must be stored on a secure medium, and special security measures must be enforced to protect such data on storage media and during transmittal. |
|
|
Term
|
Definition
| govern the design, security, and use of computer programs adn the security of data files in general throughout the organization's info technology infrastructure. General controls apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. |
|
|
Term
|
Definition
| check data for accuracy and completeness when they enter the system. there are sepcific input controls for input authorization, data conversion, data editing, and error handling. |
|
|
Term
|
Definition
| establish that data are complete and accurate during updating. |
|
|
Term
|
Definition
| ensure that the results of computer processing are accurate, complete and properly distributed. |
|
|
Term
|
Definition
| monitor the use of system software and prevent unauthorized access of software programs, system software, and computer programs. |
|
|
Term
|
Definition
| ensure that computer hardware is physically secure, and check for equipment malfunction. |
|
|
Term
| computer operations control |
|
Definition
| oversee the work of teh computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data. |
|
|
Term
|
Definition
| ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage. |
|
|
Term
|
Definition
| audit the systems development process at various points to ensure that the process is properly controlled and managed. |
|
|
Term
|
Definition
| formalize standards, rules, procedures and control disciplines to ensure that the organization's general and application controls are properly executed and enforced. |
|
|
Term
|
Definition
| defines acceptable uses of the firm's info resources and computing equipment, including desktop and laptop computers, wireless devices telephones and internet |
|
|
Term
|
Definition
| determine differing levels of access to info assets for different levels of users. |
|
|
Term
| authriation management systems |
|
Definition
| establish where and when a user is permitted to access certain parts of a web site or corporate database. Such systems allow each user access to those portions of a system that person is permitted to tenter, based on info esstablished by a set of access rules. |
|
|
Term
|
Definition
| built around thousands of predefined business processes that reflect best practices. |
|
|
Term
|
Definition
| a network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products and distributing the finished products to customers. |
|
|
Term
|
Definition
| Identify the problem gathers information, devise alternative solutions, and make a decision about the best solution. |
|
|
Term
|
Definition
| shows how the chosen solution should be realized. The system design is the model or blueprint for an information system solution and consists of all the specifications that will deliver the functions identified during systems analysis. These specifications should address all of the technical, organization, and people |
|
|
Term
| Hardware selection and acquisition- |
|
Definition
| System builders select appropriate hardware for the application. They would either purchase the necessary computers and networking hardware or lease them from a technology provider. |
|
|
Term
| Software development and programming- |
|
Definition
| Software is custom programmed in house or purchased from an external source, such as an outsourcing vendor, an application software package vendor, or an application service provider. |
|
|
Term
|
Definition
| the system is thoroughly tested to ensure it produces the right results. |
|
|
Term
|
Definition
| The testing process requires detailed testing of individual computer programs |
|
|
Term
|
Definition
| tests the performance of the information system as a whole. |
|
|
Term
|
Definition
| provides the final certification that the system is ready to be used in a production setting. Information systems tests are evaluated by users and reviewed by management. |
|
|
Term
|
Definition
| process of changing from the old system to the new system. There are three main conversion strategies: the parallel strategy, the direct cutover strategy, and the phased approach strategy. |
|
|
Term
|
Definition
| both the old system and its potential replacement are run together for a time until everyone is assured that the new one functions correctly. |
|
|
Term
|
Definition
| replaces the old system entirely with the new system on an appointed day, carrying the risk that there is no system to fall back on if problems arise. |
|
|
Term
| Phased approach strategy- |
|
Definition
| introduces the system in stages (such as first introducing the modules for ordering Girl Scout cookies and then introducing the modules for transmitting orders and instructions to the cookie factory and shipper). |
|
|
Term
|
Definition
| After the new system is installed and conversion is complete. During this stage, users and technical specialists review the solution to determine how well it has met its original objectives and to decide whether any revisions or modifications are in order. |
|
|
Term
|
Definition
| changes in hardware, software, documentation, or procedures to a production system to correct errors, meet new requirements, or improve processing efficiency. |
|
|
Term
|
Definition
| model human knowledge as a set of rules that collectively are called the knowledge base. can have from 200 to 10,000 of these rules, depending on the complexity of the decision program. |
|
|
Term
|
Definition
| consists of building an experimental system rapidly and inexpensively for end users to interact with and evaluate. It is refined and enhanced until users are satisfied that it includes all of their requirements and can be used as a template to create the final system. |
|
|
Term
| Application software packages- |
|
Definition
| eliminate the need for writing software programs when developing an info system. |
|
|
Term
|
Definition
| consists of using an external vendor to build or operate a firms information systems. If it is properly managed, outsourcing can save application development costs or enable firms to develop apps without an internal info systems staff. |
|
|
Term
|
Definition
| provide analytical models or tools for analyzing large quantities of data and supportive interactive queries for middle managers who face semi structured decision situations. |
|
|
Term
|
Definition
| is a collection of current or historical data from a number of applications or groups. It may be a small database residing on a PC that contains a subset of corporate data that has been downloaded and possibly combined with external data. |
|
|
Term
|
Definition
| contains the software tools that are used for data analysis. It may contain various OLAP tools, data mining tools, or a collection of mathematical and analytical models that easily can be made accessible to the DSS user. |
|
|
Term
|
Definition
| models ask what if questions repeatedly to determine the impact on outcomes of changes in one or more factors. What if analysis-working forward from known or assumed conditions-allows the user to vary certain values to test results to better predict outcomes if changes occur in those values. |
|
|
Term
|
Definition
| are based on a suite of integrated software modules and a common central database. The database collects data from many different divisions and departments in a firm, and from a large number of key business processes in manufacturing and production, finance, and accounting, sales and marketing, and human resources, making the data available for applications that support nearly all of an organizations internal business activates. |
|
|
Term
|
Definition
| is built around thousands of predefined business processes that reflect best practices. |
|
|
Term
|
Definition
| any of the aspects of a business that are identified as vital for successful targets to be reached and maintained. Critical success factors are usually identified in such areas as production processes, employee and organization skills, functions, techniques, and technologies |
|
|
Term
|
Definition
| includes customer facing applications, such as tools for sales force automation, call center and customer service support and marketing automation. |
|
|
Term
|
Definition
| includes applications that analyze customer data generated by operational CRM applications to provide information for improving business performances. They are based on data warehouses that consolidate the data from operational CRM systems and customer touch points for use with online analytical processing, data mining, and other data analysis. |
|
|
Term
| Computer aided software engineering- |
|
Definition
| provides software tools to automate the methodologies we have just described to reduce the amount of repetitive work in systems development. These tools provide automated graphics facilities for producing charts and diagrams, screen and report generators and documentation generators. |
|
|
Term
|
Definition
| refers to the complexity and content of a message. Traditional markets, national sales forces, and small retail stores have great richness: they are able to provide personal, face to face service using aural and visual cues when making a sale. |
|
|
Term
|
Definition
| they allow two way communications between merchant and consumer. It allows an online merchant to engage a consumer in ways similar to a face to face experience but on a massive, global scale. |
|
|
Term
|
Definition
| the total amount and quality of information available to all market participants, consumers, and merchants alike. |
|
|
Term
|
Definition
| refers to the ease with which consumers can find out the variety of prices in a market; cost transparency refers to the ability of consumers to discover the actual costs merchants pay for products. |
|
|
Term
|
Definition
| selling the same goods, or nearly the same goods, to different targeted groups at different prices. |
|
|
Term
| Personalization/Customization- |
|
Definition
| Merchants can target their marketing messages to specific individuals by adjusting the message to a persons name, interests, and past purchases. |
|
|
Term
|
Definition
| the internet and e-commerce technologies have evolved to be much more social by allowing users to create and share their personal friends content in the form of text, videos, music or photos. |
|
|
Term
|
Definition
| are used for solving complex, poorly understood problems for which large amounts of data have been collected. They find patterns and relationships in massive amounts of data that would be too complicated and difficult for a human being to analyze. |
|
|
Term
|
Definition
| a combination of hardware and software that prevents unauthorized users from accessing private networks. |
|
|
Term
| Electronic data interchange |
|
Definition
| enables the computer to computer exchange between two organizations of standard transactions such as invoices, bills of landing, shipment schedules, or purchase orders. |
|
|
Term
|
Definition
| is the price of a product varies depending on the demand characteristics of the customer or the supply situation of the seller. |
|
|
Term
|
Definition
| Exists when one party in a transaction has more information that is important for the transaction than the other party. That information helps determine their relative bargaining power. |
|
|
Term
|
Definition
| consists of computer based systems both hardware and software that attempt to emulate human behavior and thought patterns. These include expert systems; case based reasoning, fuzzy logic, neural networks, genetic algorithms and intelligent agents. |
|
|
Term
|
Definition
| information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain. |
|
|
Term
|
Definition
| The removal of organizations or business process layers responsible for intermediary steps in a value chain. It affects the market for services. |
|
|
Term
|
Definition
| a term used in stock trading (especially on the Internet), refers to ownership in companies that focus on and specialize in a particular product or service area to the exclusion of other market opportunities in order to obtain a large market share and brand identity i |
|
|
Term
|
Definition
| the strategy used to search through the collection of rules and formulate conclusions. This works by searching through the rules and firing those rules that are triggered by facts gathered and entered by the user. |
|
|
Term
|
Definition
| Rule-based systems, as defined above, are adaptable to a variety of problems. In some problems, information is provided with the rules and the AI follows them to see where they lead. |
|
|
Term
|
Definition
| a goal is specified and the AI must find a way to achieve that specified goal. |
|
|
Term
|
Definition
| is a situation in which channel partners have to compete against one another or the vendor's internal sales department. |
|
|
Term
| Rapid application development- |
|
Definition
| refers to the process of creating workable systems in a very short period of time. |
|
|
Term
| Joint application design (JAD) - |
|
Definition
| WILL BE USED TO ACCELERATE THE GENERATION OF INFO REQUIREMENTS AND TO DEVELOP THE INITIAL SYSTEMS DESIGN. |
|
|
Term
|
Definition
| refers to the many techniques used to bring about successful change in a business. Nearly all info systems require change in the firms business processes, and therefore changes in what hundreds or even thousands of employees do every day. |
|
|
Term
|
Definition
| is useful for finding the optimal solution for a specific problem by examining a very large number of alternative solutions for that problem. They are based on techniques inspired by evolutionary biology such as inheritance, mutation, selection and crossover. |
|
|
Term
| interorganization system= |
|
Definition
| supply chain management is one type of this because they automate the flow of info across organizational boundaries. |
|
|
Term
| Business process management- |
|
Definition
| is an approach to business which aims to continuously improve business processes. uses a variety of tools and methodologies to understand existing processes, design new processes, and optimize those processes. |
|
|
Term
|
Definition
| is the marketing of complementary products to customers. Ex. In financial services, a customer with a checking account might be sold a money market or home improvement loan. |
|
|
Term
|
Definition
| A sales strategy where the seller will provide opportunities to purchase related products or services, often for the sole purpose of making a larger sale. |
|
|
Term
|
Definition
| are sometimes called e-hubs; provide a single, digital marketplace based on Internet technology for many different buyers and sellers. Industrial networks use an extranet to link its suppliers and other key business partners. |
|
|
Term
| Private industrial networks- |
|
Definition
| typically consist of a large firm using an extranet to link to its suppliers and other key business partners. |
|
|
Term
|
Definition
| can be quantified and assigned a monetary value. |
|
|
Term
|
Definition
| more efficient customer service or enhanced decision making, cannot be immediately quantified. Systems that produce mainly intangible benefits may still be good investments if they produce quantifiable gains in the long run. |
|
|
Term
|
Definition
| govern the design, security, and use of computer programs and the security of data files |
|
|
Term
|
Definition
| monitor the use of system software and prevent unauthorized access of software programs, systems software and computer programs. |
|
|
Term
|
Definition
| ensure that computer hardware is physically secure, and check for equipment malfunction. Organizations that are critically dependent on their computers also must make provisions for backup or continued organizations to maintain constant service. |
|
|
Term
| Computer operations control- |
|
Definition
| oversees the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data. They include controls over the setup of computer processing jobs and backup and recovery procedures for processing that ends abnormally. |
|
|
Term
|
Definition
| makes sure that valuable business data files are on a disk or tape so they are not subject to unauthorized access change, or destruction while they are in use or storage. |
|
|
Term
|
Definition
| audit the systems development process at various points to ensure that the process is properly controlled and managed. |
|
|
Term
|
Definition
| formalize standards, rules, procedures and control disciplines to ensure that the organizations general and application controls are properly executed and enforced. |
|
|
Term
|
Definition
| are specific controls unique to each computerized application, such as payroll or order processing. |
|
|
Term
|
Definition
| CHECK DATA FOR ACCURACY AND COMPLETENESS WHEN THEY ENTER THE SYSTEM. |
|
|
Term
|
Definition
| establish that data are complete and accurate during updating. |
|
|
Term
|
Definition
| ensure that the results of computer processing are accurate, complete and properly distributed. |
|
|
Term
| Intrusion Detection systems |
|
Definition
| -monitor hot spots on corporate networks to detect and deter intruders. -Examine events as they are happening to discover attacks in progress. |
|
|
Term
| Antivirus and antispyware software: |
|
Definition
| check computers for presence of malware and can often eliminate it as well. Needs to update continuously. |
|
|
Term
| Supply chain planning systems- |
|
Definition
| help the firm to model its existing supply chain, generate demand forecasts for products, and develop optimal sourcing and manufacturing plans. |
|
|
Term
| Supply chain execution systems- |
|
Definition
| manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner. |
|
|
Term
|
Definition
| production master schedules are based on forecasts or best guesses of demand for products, and products are pushed to customers. |
|
|
Term
|
Definition
| also known as a demand driven model or build to order, actual customer orders or purchases trigger events in the supply chain. |
|
|
Term
| Partner relationship management- |
|
Definition
| uses many of the same data, tools, and systems as customer relationship management to enhance collaboration between a company and its selling partners. |
|
|
Term
| Employee Relationship Management- |
|
Definition
| deals with employee issues that are closely related to CRM, such as setting objectives, employee performance, management, performance based compensation and employee training. |
|
|
Term
|
Definition
| includes customer facing applications, such as tools for sales force automation, call center and customer service support and marketing automation. |
|
|
Term
|
Definition
| includes applications that analyze customer data generated by operational CRM applications to provide information for improving business performances. |
|
|
Term
| Transaction Fee Revenue Model- |
|
Definition
| a company receives a fee for enabling or executing a transaction. Ex. EBay provides an online auction marketplace and receives a small transaction fee from a seller if the seller is successful in selling an item. |
|
|
Term
|
Definition
| send visitors to other web sites in return for a referral fee or percentage of the revenue from any resulting sales. |
|
|
Term
|
Definition
| electronic commerce involves retailing products and services to individual shoppers. Ex. Barnes and Noble is an example of B2C Ecommerce. |
|
|
Term
|
Definition
| electronic commerce involves sales of goods and services among businesses. Ex. ChemConnects web site for buying and selling chemicals and plastics. |
|
|
Term
|
Definition
| electronic commerce involves consumers selling directly to consumers. Ex. EBay enables people to sell their goods to other customers by auctioning their merchandise off to the highest bidder or for a fixed price. |
|
|
Term
|
Definition
| Unstructured, decide entrance or exit from markets approve capital budget decide long term goals. |
|
|
Term
|
Definition
| Design a marketing plan, develop a departmental budget, design a new corporate web site. |
|
|
Term
|
Definition
| determines overtime eligibility, restock inventory, offer credit to customers, and determine special offers to customers. |
|
|
Term
|
Definition
| those in which the decision maker must provide judgment, evaluation, and insight to solve the problem. Each of these decisions is novel, important, and no routine, and there is no well-understood or agreed-on procedure for making them. |
|
|
Term
|
Definition
| only part of the problem has a clear cut answer provided by an accepted procedure. In general, structured decisions are more prevalent at lower organizational levels, whereas unstructured problems are more common at higher levels of the firm. |
|
|
Term
|
Definition
| are repetitive and routine, and they involve a definite procedure for handling them so that they do not have to be treated each time as if they were new. |
|
|
Term
|
Definition
| consists of discovering, identifying, and understanding the problems occurring the organization-why is there a problem, where and what effects it is having on the firm. |
|
|
Term
|
Definition
| involves identifying and exploring various solutions to the problem. |
|
|
Term
|
Definition
| consists of choosing among solution alternatives. |
|
|
Term
|
Definition
| involves making the chosen alternative work and continuing to monitor how well the solution is working. |
|
|
Term
|
Definition
| helps managers monitor and control the business by providing information on the firms performance. They typically produce fixed, regularly scheduled reports based on data extracted and summarized from the firms underlying transaction processing systems. |
|
|
Term
| Geographic information systems- |
|
Definition
| are a special category of DSS that use data visualization technology to analyze and display data for planning and decision making in the form of digitized maps. The software assembles, stores, manipulates, and displays geographically referenced information, tying data to points, lines, and areas on a map |
|
|
Term
|
Definition
| is the oldest method for building info systems. The approach maintains a formal division of labor between end users and information systems specialists. |
|
|
Term
|
Definition
| unit testing, system testing, acceptance testing |
|
|
Term
|
Definition
| requires detailed testing of individual computer programs. |
|
|
Term
|
Definition
| tests the performance of the info system as a whole. |
|
|
Term
|
Definition
| provides the final certification that the system is ready to be used in a production setting. |
|
|
Term
|
Definition
| consists of building an experimental system rapidly and inexpensively for users to evaluate. It is a working version of an info system or part of the system, but it is intended as only a preliminary model. |
|
|
Term
|
Definition
| allows end users with little or no formal assistance from technical specialists, to create simple info systems, reducing the time and steps required to produce a finished application. Using fourth generation languages, graphics languages and PC software tools, end users can access data, create reports, and develop entire info systems on their own, with little or no help from professional systems analysts or programmers. |
|
|
Term
|
Definition
| refers to the ability of consumers to discover the actual costs merchants pay for products. |
|
|
Term
|
Definition
| refers to the ability of firms to profitably market goods to very small online audiences, largely because of the lower costs of reaching very small market segements. |
|
|
Term
|
Definition
| refers to tracking the click streams of indiiduals on thousands of web sites for the purpose of understanding their interests and intentions, and exposing them to advertisements which are uniquely suited to their behavior. |
|
|
Term
|
Definition
| intelligence, design, choice, implementation. |
|
|
Term
|
Definition
| tools thelp users see patterns and relationships in large amounts of data that would be difficult to discern if the data were presented as traditional lists of text. |
|
|
Term
| Customer decision support systems |
|
Definition
| support the decision making process of an existing or potential customer. |
|
|
Term
|
Definition
| moving from a piece of summary data to lower and lower levels of detail. |
|
|
Term
|
Definition
| expert systems model human knowledge as a set of rules. |
|
|
Term
|
Definition
| a related AI technology focusing on algorithms and techniques allowing computers to learn by extracting info using computation and statistical methods. |
|
|
Term
|
Definition
| refers to the set of business processes developed in an organization to create, store, transfer and apply knowledge. Increases the ability of the organization to learn from its environment and to incorporate knowledge into its business processes and decision making. |
|
|
Term
| enterprise wide knowledge management systems |
|
Definition
| deal with all three types of knowldge. They are general purpose, firmwide system that collect, store, distribute and apply digital content and knowledge. |
|
|
Term
| enterprise content management systems |
|
Definition
| help organizations manage both types of information. |
|
|
Term
| knowldge networks systems |
|
Definition
| known as expertise location and management systems, address the problem that arises when the appropriate knowledge is not in the form of a digital document but instead resides in the memory of expert individuals in the firm. |
|
|
Term
|
Definition
| are specialized systems for engineers, scientists, and other knowldge workers that are designed to promote the creation of knowledge and to ensure that new knowlege and technical expertise are properly integrated into the business. |
|
|
Term
| learning management system |
|
Definition
| provides tools for the management, delivery, tracking and assessment of various types of employee learning and training. |
|
|
Term
| virtual reality modeling language |
|
Definition
| is a set of specifications for interactive, three dimensional modeling on the WWW that organize multiple media types including animation, images, and audio to put users in a simulated real world environment. |
|
|
Term
|
Definition
| leverage the knowledge and time of its brokers, traders, and portfolio managers. |
|
|
Term
|
Definition
| is a detailed list of questions submitted to external vendors to see how well they meet the rewquirements for the proposed system. |
|
|
Term
|
Definition
| offers a logical graphic model of information flow, partitioning a system into modules that show managable levels of dtail. |
|
|
Term
|
Definition
| describe the transformation occuring within the lowest level of the data flow diagrams, showing the logic for each process. |
|
|
Term
| component based development |
|
Definition
| to further expedite software creation, groups of objects have been assembled into components for common functions such as graphical user interface or online ordering capapbility, and these components can be combined to create large scale business applications. |
|
|
Term
|
Definition
| refers to the application of knowledge, skills, tools and techniques to achieve specific targets within specified budget and time constraints. Activities include planning the work, assessing the risk, estimating resources required to accomplish the work, organizing the work, acquiring human and material resources, assigning tasks, directing activites, controlling project execution, reporting progress and analyzing the results. |
|
|