Term
|
Definition
| Refers to the principles of right and wrong that individuals, acting as free moral agents use to make choices to guide their behaviors. Info Systems raise new ethical questions for both individuals and soceities because they create opportunities for inter social change |
|
|
Term
| Information rights and obligations |
|
Definition
| What information rights do individuals and organizations possess with respect to themselves? What can they protect? What obliga- tions do individuals and organizations have concerning this information? |
|
|
Term
| Property rights and obligations |
|
Definition
| How will traditional intellectual property rights be protected in a digital society in which tracing and accounting for ownership are difficult and ignoring such property rights is so easy? |
|
|
Term
| Accountability and control |
|
Definition
| Who can and will be held accountable and liable for the harm done to individual and collective information and property rights? |
|
|
Term
|
Definition
| What standards of data and system quality should we demand to protect individual rights and the safety of society? |
|
|
Term
|
Definition
| What values should be preserved in an information- and knowledge- based society? Which institutions should we protect from violation? Which cultural values and practices are supported by the new information technology? |
|
|
Term
|
Definition
|
|
Term
|
Definition
| The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals |
|
|
Term
| nonobvious relationship awareness (NORA) |
|
Definition
| NORA can take information about people from many disparate sources, such as employment applications, telephone records, customer listings, and “wanted” lists, and correlate relationships to find obscure hidden connections that might help identify criminals or terrorists |
|
|
Term
|
Definition
| means that you accept the potential costs, duties, and obligations for the decisions you make. |
|
|
Term
|
Definition
| is a feature of systems and social institutions: It means that mechanisms are in place to determine who took responsible action, who is responsible. |
|
|
Term
|
Definition
| feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations. |
|
|
Term
|
Definition
| related feature of law-governed societies and is a process in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly. |
|
|
Term
| Identify and describe clearly the facts. |
|
Definition
| Find out who did what to whom, and where, when, and how. In many instances, you will be surprised at the errors in the initially reported facts, and often you will find that simply getting the facts straight helps define the solution. It also helps to get the opposing parties involved in an ethical dilemma to agree on the facts. |
|
|
Term
| Define the conflict or dilemma and identify the higher-order values involved. |
|
Definition
| Ethical, social, and political issues always reference higher values. The parties to a dispute all |
|
|
Term
| Identify the stakeholders |
|
Definition
| Every ethical, social, and political issue has stakeholders: players in the game who have an interest in the outcome, who have invested in the situation, and usually who have vocal opinions. Find out the identity of these groups and what they want. This will be useful later when designing a solution. |
|
|
Term
| Identify the options that you can reasonably take |
|
Definition
| You may find that none of the options satisfy all the interests involved, but that some options do a better job than others. Sometimes arriving at a good or ethical solution may not always be a balancing of consequences to stakeholders. |
|
|
Term
| Identify the potential consequences of your options. |
|
Definition
| Some options may be ethically correct but disastrous from other points of view. Other options may work in one instance but not in other similar instances. Always ask yourself, “What if I choose this option consistently over time?” |
|
|
Term
| What are the ethical rules one should use when making a decision. |
|
Definition
| Golden rule,(Immanuel Kant’s Categorical Imperative). Ask yourself, “If everyone did this, could the organization, or society, survive?”,(Descartes’ rule of change)An action may bring about a small change now that is acceptable, but if it is repeated, it would bring unacceptable changes in the long run. In the vernacular, it might be stated as “once started down a slippery path, you may not be able to stop.”,Take the action that achieves the higher or greater value (Utilitarian Principle),(Risk Aversion PrincipleSome actions have extremely high failure costs of very low probability (e.g., building a nuclear generating facility in an urban area) or extremely high failure costs of moderate probability (speeding and automobile accidents). Avoid these high-failure-cost actions, paying greater attention to high-failure-cost potential of moderate to high probability.(This is the ethical “no free lunch” rule.) If something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. |
|
|
Term
|
Definition
| s the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state. Claims to privacy are also involved at the workplace: Millions of employees are subject to electronic and other forms of high-tech surveillance (Ball, 2001). Information technology and systems threaten individual claims to privacy by making the invasion of privacy cheap, profitable, and effective. |
|
|
Term
| Fair Information Practices (FIP) |
|
Definition
| first set forth in a report written in 1973 by a federal government advisory com- mittee (U.S. Department of Health, Education, and Welfare, 1973). FIP is a set of principles governing the collection and use of information about individuals. FIP principles are based on the notion of a mutuality of interest between the record holder and the individual. The individ- ual has an interest in engaging in a transaction, and the record keeper—usually a business or government agency—requires information about the individual to support the transaction. Once information is gathered, the individual maintains an interest in the record, and the record may not be used to support other activities without the individual’s consent. |
|
|
Term
|
Definition
| In Europe, privacy protection is much more stringent than in the United States. Unlike the United States, European countries do not allow businesses to use personally identifiable information without consumers’ prior consent. |
|
|
Term
|
Definition
| can be defined as consent given with knowledge of all the facts needed to make a rational decision. EU member nations must translate these principles into their own laws and cannot transfer personal data to countries, such as the United States, that do not have similar privacy protection regulations. |
|
|
Term
|
Definition
| is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legisla- tion but does not involve government regulation or enforcement. U.S. businesses would be allowed to use personal data from EU countries if they develop privacy protection policies that meet EU standards. Enforcement would occur in the United States using self-policing, regulation, and government enforcement of fair trade statutes. |
|
|
Term
|
Definition
| are small text files deposited on a computer hard drive when a user visits Web sites. Cookies identify the visitor’s Web browser software and track visits to the Web site. When the visitor returns to a site that has stored a cookie, the Web site software will search the visitor’s computer, find the cookie, and know what that person has done in the past |
|
|
Term
|
Definition
| tiny graphic files embedded in e-mail messages and Web pages that are designed to monitor who is reading the e-mail message or Web page and transmit that information to another computer. |
|
|
Term
|
Definition
| can secretly install itself on an Internet user’s computer by piggybacking on larger applications. Once installed, the spyware calls out to Web sites to send banner ads and other unsolicited material to the user, and it can also report the user’s movements on the Internet to other computers. |
|
|
Term
|
Definition
| permits the collection of personal information until the consumer specifically requests that the data not be collected. |
|
|
Term
|
Definition
| in which a business is prohibited from collecting any personal information unless the consumer specifically takes action to approve information collection and use. |
|
|
Term
|
Definition
| provides a standard for communicating a Web site’s privacy policy to Internet users and for comparing that policy to the user’s preferences or to other standards, such as the FTC’s FIP guidelines or the European Directive on Data Protection. |
|
|
Term
|
Definition
| is considered to be intangible property created by individuals or corporations. Information technology has made it difficult to protect intellectual property because computerized information can be so easily copied or distributed on networks. Intellectual property is subject to a variety of protections under three different legal traditions: trade secrets, copyright, and patent law. |
|
|
Term
|
Definition
| provided it is not based on informa- tion in the public domain. Protections for trade secrets vary from state to state. In general, trade secret laws grant a monopoly on the ideas behind a work product, but it can be a very tenuous monopoly. |
|
|
Term
|
Definition
| s a statutory grant that protects creators of intellectual property from having their work copied by others for any purpose during the life of the author plus an additional 70 years after the author’s death. For corporate-owned works, copyright protection lasts for 95 years after their initial creation. Congress has extended copyright protection to books, periodicals, lectures, dramas, musical compositions, maps, drawings, artwork of any kind, and motion pictures. The intent behind copyright laws has been to encourage creativity and authorship by ensuring that creative people receive the financial and other benefits of their work. |
|
|
Term
|
Definition
| In general, courts appear to be following the reasoning of a 1989 case—Brown Bag Software vs. Symantec Corp.—in which the court dissected the elements of software alleged to be infringing. The court found that similar concept, function, general functional features (e.g., drop-down menus), and colors are not protectable by copyright law (Brown Bag Software vs. Symantec Corp., 1992). |
|
|
Term
|
Definition
| grants the owner an exclusive monopoly on the ideas behind an invention for 20 years. The congressional intent behind patent law was to ensure that inventors of new machines, devices, or methods receive the full financial and other rewards of their labor and yet make widespread use of the invention possible by providing detailed diagrams for those wishing to use the idea under license from the patent’s owner. |
|
|
Term
|
Definition
| The Fifth Annual Global Software Piracy Study conducted by the International Data Corporation and the Business Software Alliance found that 38 percent of the software installed in 2007 on PCs worldwide was obtained illegally, representing $48 billion in global losses from software piracy. Worldwide, for every two dollars of software purchased legitimately, one dollar’s worth was obtained illegally (Business Software Alliance, 2008). |
|
|
Term
| Digital Millennium Copyright Act (DMCA) |
|
Definition
| of 1998 is providing some copyright protection. The DMCA implemented a World Intellectual Property Organization Treaty that makes it illegal to circumvent technol- ogy-based protections of copyrighted materials. Internet service providers (ISPs) are required to take down sites of copyright infringers that they are hosting once they are notified of the problem. |
|
|
Term
|
Definition
| is the commission of illegal acts through the use of a computer or against a computer system. Computers or computer systems can be the object of the crime (destroy- ing a company’s computer center or a company’s computer files), as well as the instrument of a crime (stealing computer lists by illegally gaining access to a computer system using a home computer). Simply accessing a computer system without authorization or with intent to do harm, even by accident, is now a federal crime. |
|
|
Term
|
Definition
| is the commission of acts involving a computer that may not be illegal but that are considered unethical. The popularity of the Internet and e-mail has turned one form of computer abuse—spamming—into a serious problem for both individuals and businesses. |
|
|
Term
|
Definition
| is junk e-mail sent by an organization or individual to a mass audience of Internet users who have expressed no interest in the product or service being marketed. |
|
|
Term
|
Definition
| exists in U.S. schools, with schools in high-poverty areas less likely to have computers, high-quality educational technology programs, or Internet access availability for their students. Left uncorrected, the digital divide could lead to a society of information haves, computer literate and skilled, versus a large group of information have-nots, computer illiterate and unskilled. |
|
|
Term
| repetitive stress injury (RSI) |
|
Definition
| RSI occurs when muscle groups are forced through repetitive actions often with high-impact loads(such as tennis) or tens of thousands of repetitions under low-impact loads (such as working at a computer keyboard). |
|
|
Term
| carpal tunnel syndrome (CTS) |
|
Definition
| in which pressure on the median nerve through the wrist’s bony structure, called a carpal tunnel, produces pain. The pressure is caused by constant repetition of keystrokes: in a single shift, a word processor may perform 23,000 keystrokes. Symptoms of carpal tunnel syndrome include numbness, shoot- ing pain, inability to grasp objects, and tingling. Millions of workers have been diagnosed with carpal tunnel syndrome. |
|
|
Term
| Computer vision syndrome (CVS) |
|
Definition
| refers to any eyestrain condition related to computer display screen use. Its symptoms, which are usually temporary, include headaches, blurred vision, and dry and irritated eyes. |
|
|
Term
|
Definition
| which is stress induced by computer use. Its symptoms include aggravation, hostility toward humans, impatience, and fatigue. According to experts, humans working continuously with computers come to expect other humans and human institutions to behave like computers, providing instant responses, attentiveness, and an absence of emotion. |
|
|
Term
| Why are systems Vulnenerable? |
|
Definition
| Networks can be hacked and mistakes can be made by granting access to wrong individuals. Information over the internet is even more vunerable because everryone has access to it. file sharing can also expose a computer. |
|
|
Term
|
Definition
| methods, policies and orginizational procedures that ensure the safety of the orginization's assets. |
|
|
Term
|
Definition
| the policies, procedures and technical measures used to prevent unautherized access, alteration, theft, or phisical damage to information systems. |
|
|
Term
|
Definition
| eavesdroppers drive by buildings or park outsufr and try to intercept wirelesss network traffic. |
|
|
Term
|
Definition
| malicious software programs. include viruses, worms, and trojan Horses. |
|
|
Term
|
Definition
| Independent computer programs that copy themselves from one computer to another over a network. These can spread faster then a virus since they are not dependent upon human behavior. |
|
|
Term
|
Definition
| roughe software that attaches itself to other software programs and data files in order to be executed. |
|
|
Term
|
Definition
| Opens up a way for other malware to enter a computer or network. |
|
|
Term
|
Definition
| The Largest Malware threat. take advantage of vulnerabilities in poorly coed web application softwareto introduce malicious program code into a company's network. |
|
|
Term
|
Definition
| Act as malicious software. These small programs install themselves surreptitiously on computers to monitor web surfing and serve up advertisement. |
|
|
Term
|
Definition
| Record every keystroke made on a computer to steal serial numbers for software, to launch internet attacks, to gain access to email accounts, to obtain passwords to protected computer systems, or to pick up personal info like credit card numbers or social security numbers. |
|
|
Term
|
Definition
| redirecting a web link to an adress different then the intended one. the website may be an imitation of another website in order to steak debit card numbers and other valuable information. This is known as phasing, a type of spoofing. |
|
|
Term
|
Definition
| Type of eavesdropper program that monitors information traveling over a network. Can be damaging and difficult to detect. |
|
|
Term
|
Definition
| Hackers flood a network server or web server with thousands of false communications or requestsfor services in order to crash a network. |
|
|
Term
| distributed denial of service |
|
Definition
| attack uses numerous computers to indundate and overwhelm the network from numerous launchpoints. Costly for e commerce. |
|
|
Term
|
Definition
| redirects users to a bogus webpage. Even when individuals types the correct webpage |
|
|
Term
|
Definition
| Occurs when individual or computer programs fradulantly clicks on an online ad without |
|
|
Term
|
Definition
| defects in software. Virtually impossibly to eliminate every single one. |
|
|
Term
|
Definition
| small pieces of software that will eliminate some bugs. |
|
|
Term
|
Definition
| Outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of healthcare data between healthcare providers, payers and plans. This requires health care members to retain patient info for six years and ensure confidentiality. |
|
|
Term
|
Definition
| designed to protect investors after the financial scandals of enron, worldcom, and other public companies. Imposes responsibility on companies and management to safeguard the accuracy and integrity of financial information. |
|
|
Term
|
Definition
| Scientific collection, examination, authenticity, preservation and analysis of data held on or retrieved from computer storage media in such a way that the info can be presented in a court trial. |
|
|
Term
|
Definition
| gvern design, security, and use of computer programs and the security files in general throughout the orgibization's information technology infrastructure |
|
|
Term
|
Definition
| specific controls unique to each computerized application such as payroll and or ordering processing. They can be both automated and manual procedures that ensure that only autherized data are completely and accurately processed by application. Classified as input, processing and output controls. |
|
|
Term
|
Definition
| determines the level of risk to the firm if a specific activity or process is not properly controlled. Not all can be measured but most businesses will aquire knowledge of their risks. |
|
|
Term
|
Definition
| Consists of statemets ranking information risks, identifying security goals, and identifying the mechanisms for achieving those goals. What is a corporations most important assets? |
|
|
Term
| Acceptable use policy (AUP) |
|
Definition
| Defines acceptable uses of the firms information resources. |
|
|
Term
|
Definition
| Determine different levels of access to info assets for different levels of users. |
|
|
Term
| Authorization management systems |
|
Definition
| establish where and when a user is permited to access certain parts of a website or corporate database. |
|
|
Term
| Disaster Recovery planning |
|
Definition
| Devises plans for the restoration of computing and communication services after they have been disrupted. Focus primarily on the technical issues involved. in keeping systems up and running. |
|
|
Term
| Business Continuity planning |
|
Definition
| Focuses on how the company can restore its business operations after a disaster strikes. |
|
|
Term
|
Definition
| Examines the firm's overall security environment as well as controls governing individual information systems. |
|
|
Term
|
Definition
| consists of all the policies and procedures a company uses to prevent improper access to systems autherized by insiders and outsiders. |
|
|
Term
|
Definition
| Ability to know that a person is who they claim to be. |
|
|
Term
|
Definition
| A physiscal device, similar to an identification card designed to prove the identity of a single use. |
|
|
Term
|
Definition
| prevent unautherized users from accessing private networks. Combination of hardware and software that controls the flow of incoming and outgoing network traffic. |
|
|
Term
| Intrusion detection systems |
|
Definition
| feature full-time monitoring tools placed at the most vulnerable points or "hot spots" |
|
|
Term
|
Definition
| Designed tp check computer sistems and drives for the presence of viruses. Often eliminates the virus. |
|
|
Term
| Unified threat management systems. |
|
Definition
| Although initially aimed at small and medium sized businesses. |
|
|
Term
|
Definition
| the process of transforming plain text or data into cipher text that cannot be read by anyone other then the sender and the intended reciever. |
|
|
Term
|
Definition
| and it s successor Transport layer security enable client and server computers to manage encryption and decryption as they communicate with each other during a secure web session. |
|
|
Term
| secure hypertext transfer protocol |
|
Definition
| another protocol used for encrypting data flowing over the internet but limited to individual messages. |
|
|
Term
|
Definition
| uses two keys one shared and one public. The keys are mathematically related so that data encrypted with one key can be desiphered with another. |
|
|
Term
|
Definition
| data files used to establish the identity of users and electronic assets for protection of online transactions. |
|
|
Term
| Public key infrastructure (PKI) |
|
Definition
| the use of public key cryptography working with a certificate authority, is now widely used in e-commerce. |
|
|
Term
| Online transaction processing |
|
Definition
| transactions entered onlune are immediately processed by a computer. multitudinous changes to data bases, reporting, and requests for info occur each instant. |
|
|
Term
| Fault-tolerant computer systems. |
|
Definition
| contain redundant hardware software and power supply components that create an environment that provides continoius service |
|
|
Term
| high availability computing |
|
Definition
| similar to fault tolerant except tries to minimize downtime. |
|
|
Term
|
Definition
| period of time in which computer is not functional. |
|
|
Term
| deep packet inspection (DPI) |
|
Definition
| examines data files and sorts out low priority online material while assigning higher priority to business critical files. |
|
|
Term
| managed security service providers |
|
Definition
| monitor network activitynand peform vulnerability testing and intrusion detection. |
|
|
Term
|
Definition
| sinformation sustems which allow users to see information from all departments of a company. |
|
|
Term
|
Definition
| built around thousands of predefined business processes that reflect the best processes. |
|
|
Term
|
Definition
| network of organizations, business processes for procuring raw materials, transforming these materials into intermediate and finished products. |
|
|
Term
| supply chain planning systems |
|
Definition
| enable firm to model its existting supply chain, generate demand forecasts for products and develop optimal sourcing and manufacturing plans. |
|
|
Term
|
Definition
| determines how much product a business needs to satisfy all of its customers demands. |
|
|
Term
| supply chain execution systems |
|
Definition
| manage the flow of products through the distribution centers and warehouses to ensure the products are delivered tothe right locations in the most effecient manners |
|
|
Term
|
Definition
| earlier supply chain models were driven by this. Production master schedules are based on forecasts or best guesses of demand for products, and products are pushed to customers |
|
|
Term
|
Definition
| also known as demand driven model or built to order, actual purchases trigger events. |
|
|
Term
|
Definition
| is a method of interaction with the customer with the customer through telephone, email, customer service desk, email, |
|
|
Term
partner relationship management (PRM) and employee relationship management |
|
Definition
| uses many of the same data, tools and systems as customer relationship management to enhance collaboration between a company and customers. ERM deals with employee issues related to CRM. sets objectives and examines performance. |
|
|
Term
|
Definition
| is the marketing of complementary products to customers. |
|
|
Term
|
Definition
| Includes customer facing applications, such as tools for sales force automation, call center and customer service support and marketing automation. |
|
|
Term
|
Definition
| Includes applications that analyze customer data generated by operational CRM applications to provide info to improve business practices. |
|
|
Term
| Customer Lifetime Value (CLTV) |
|
Definition
| Based on the relationship between the revnue produced by a specific customer and the expected life of the relationship between the customer and consumer. |
|
|
Term
|
Definition
| measures the number of customers who stop using or purchasing products or services from a company. |
|
|
Term
|
Definition
| integrates multiple applications from multiple business functions, business units or business partners to deliver a seamless experience for the customer, employee, manager or business partner. |
|
|
Term
|
Definition
| the cost of participating in a market |
|
|
Term
|
Definition
| the cost merchants must pay to simply bring their goods to the market |
|
|
Term
|
Definition
| the complexity and content of a message. |
|
|
Term
|
Definition
| total amount and quality of information available to consumers and producers |
|
|
Term
|
Definition
| ease with which prices are found on the internet |
|
|
Term
|
Definition
| ability of consumers to see the actual cost to make a product |
|
|
Term
|
Definition
| selling the same good at different prices to different consumers. |
|
|
Term
|
Definition
| adjusting marketing to a specific person. |
|
|
Term
|
Definition
| delivering products based on specific consumer preference. |
|
|
Term
|
Definition
| one party in a transaction has more info that is important for the transaction then the other party. |
|
|
Term
|
Definition
| merchant's cost of changing prices |
|
|
Term
|
Definition
| the price of a product varies depending on the demand characteristic of the consumer or supply situation of the seller. |
|
|
Term
|
Definition
| removal of the middle man |
|
|
Term
|
Definition
| goods delivered over a digital networl. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| all forms of human expression that can be put into a tangible medium such as texts, CDs, DVDs or stored in any digital media. |
|
|
Term
|
Definition
| method of publishing vieo broadcats through the internet. |
|
|
Term
|
Definition
| describes how tge firm will earn revenue, generate profits and produce superior return on investment. |
|
|
Term
|
Definition
| build digital environments in which buyers and sellers can meet. |
|
|
Term
|
Definition
| sites that create digital online environments where people with similar interests can transact. |
|
|
Term
|
Definition
| provide content providers with a cost effective method for high volumes of very small monetary transactions. |
|
|
Term
|
Definition
| provides a service for free and demands a payment for a premium service |
|
|
Term
| transaction fee revenue model |
|
Definition
| a company recieves a fe for enabling or executing a transaction |
|
|
Term
|
Definition
| priceline.com. sends you to a different website that has the loweest price |
|
|
Term
|
Definition
| you can swap ideas with others about shopping |
|
|
Term
|
Definition
| large numbers of people can better decisions about a wide range of topics then a single person |
|
|
Term
|
Definition
| companies ask people or a group of people to solve their problem. |
|
|
Term
|
Definition
| betting markets where peers make betts on certain market incomes. |
|
|
Term
|
Definition
| markeing enable by the internet |
|
|
Term
|
Definition
| tracking browser history and advertising based on it. |
|
|
Term
| Electronic data interchange (EDI) |
|
Definition
| electronic data interchange enables computer to computerexchange between two orginizations of standard transactions such as invoices, bills of lading, shipment schedules, or purchase orders. |
|
|
Term
|
Definition
| invloves not only purchasing goods and materials but sourcing and negotiating with suppliers, paying for goods, and making deliveriy arrangements. |
|
|
Term
| private industrial networks. |
|
Definition
| Typically consists of a large firm using extranet to link to its suppliers and key business partners |
|
|
Term
|
Definition
| another term for industrial network |
|
|
Term
|
Definition
| sometimes called e-hubs, provide a single digital market place based pn technology for many different buyers. They are industry owned or operate as independent intermediaries between buyers and sellers. |
|
|
Term
|
Definition
| independently owned thirds-party net marketplaces that connect thousands of suppliers and buyers for spot purchasing. |
|
|
Term
|
Definition
| your firm purchases or leases a web server but locates the server in a vendors facility. |
|
|
Term
|
Definition
| those in which the decision maker must provide judgement, evlauation and insight to solve a problem. |
|
|
Term
|
Definition
| repetetive and routine decisions |
|
|
Term
|
Definition
| only part of the problem has a clear cut answer. |
|
|
Term
|
Definition
| consistes of discovering, identifying, and understanding the problems occuring in the organization |
|
|
Term
|
Definition
| invloves identifying and exploring various solutions to the problem. |
|
|
Term
|
Definition
| consists of choosing among solution alternatives |
|
|
Term
|
Definition
| involves making the chosen alternative work and continuing to monitor how well the solute is working. |
|
|
Term
|
Definition
| expert systems, case based reasoning, genetic algorythims, neural networksm fuzzy logic, and intelligent agents. |
|
|
Term
|
Definition
| suport semistructured decisons. |
|
|
Term
|
Definition
| collection of current or historical data from a numver of applications or gtoups. |
|
|
Term
|
Definition
| contains the software tolls that are used for data analysis. |
|
|
Term
|
Definition
| an abstract representation that illustrates the components or relationships of a phenomenon. |
|
|
Term
|
Definition
| asks what if questions repeateadly to determine the impact on outcomes and changes in one or more factors. |
|
|
Term
|
Definition
| displays two or more dimensons of data in a convenient format. |
|
|
Term
|
Definition
| tools help users see patternsand relationships in large amounts of data. |
|
|
Term
| geographic information systems |
|
Definition
| are a special category of DSS that use data vizualization technology to analyze and display data for planning and decision making the form of digitalized maps. |
|
|
Term
| customer decision support systems |
|
Definition
| support the decision making process of an existing or potential customer. |
|
|
Term
|
Definition
| moving from a piece of summary data to lower and lower levels of data. |
|
|
Term
| group decision support system |
|
Definition
| an interactive computer based systems for facilitating the solute of unstructured problems by a set of fecision mere working together as a group in the same location or different locations. |
|
|
Term
|
Definition
| consists of computer based systems, both hardware and software, which emmulatehuman behavior and thought patterns. |
|
|
Term
|
Definition
| captures human expertise in a limited domain of knowledge. |
|
|
Term
|
Definition
| a set of rules that expert systems use o model human knowledge. |
|
|
Term
|
Definition
| strategy used to search through the collection of rules and formulate conclusions. |
|
|
Term
|
Definition
| knowledge and past experiences of human specialists are represented as cases and stored in a database for later retrieval when the user encounters a new case with similar parameters. |
|
|
Term
|
Definition
| rule based technology that represents such imprecision by creating rules that approximate or subjective rules. |
|
|
Term
|
Definition
| used for solving complex, poorly understood proble,s find patterns that are too complicated for humans to identity. |
|
|
Term
|
Definition
| related to AI technology focusing on algorythims and techniques allowing computers to "learn" by extracting info using statistics. |
|
|
Term
|
Definition
| useful for finding the optimal solution for a specific problem by examining very large number of alternative solutions for that problem. |
|
|
Term
|
Definition
| software programs work in the background without direct human interventionto carry out specific, repetitve and predictable tasks for an individual user,business process, or software app. |
|
|
Term
|
Definition
| refers to the set of business processes in an organization to create, store, transfer and apply knowledge. |
|
|
Term
|
Definition
| knowledge not written down. |
|
|
Term
| enterprise-wide knowledge management systems |
|
Definition
| deal with all three types of knowledge to make firm wide decisions. |
|
|
Term
|
Definition
| is explicit knowledge that exists in formal documents, as well asin formal rules that orginizations derive by observing experts and decision making behaviors. |
|
|
Term
| digital asset management systems |
|
Definition
| help them classfy, store and distribute these digital objects. |
|
|
Term
| knowledge network systems. |
|
Definition
| adress the problem that arises when inapropriate knowledgein not in the for of a digital document but instead resides in the memory of expertindividuals in the firm. |
|
|
Term
|
Definition
| makes it easier to search for and share info by allowing users to save their bookmarks to web pages to web pages on a public website and tag these bookmarks with keywords. |
|
|
Term
| learning management systems |
|
Definition
| provides tools for the management, delivery, tracking and assesment of various types of emloyee learning and training. |
|
|
Term
|
Definition
| specialized systems for scientists to store info that will integrate the info into the firm to optimize profits. |
|
|
Term
| virtual reality modeling language (VRML) |
|
Definition
| specifications for 3d modeong. |
|
|
Term
|
Definition
| leverage the knowledge and time of its brokers, traders and portfolio mangers. |
|
|
Term
|
Definition
| who needs what info when, where and how. |
|
|
Term
|
Definition
| determines whether each proposed solution is feasable, and achievable from a financial, technical and orginizational standpoint. |
|
|
Term
|
Definition
| shows how the chosen solution should be realized. |
|
|
Term
|
Definition
| shows how the system works from a technical and end user standpoint. |
|
|
Term
|
Definition
| replaces the old system entirely on a givem day. |
|
|
Term
|
Definition
| after the new system is completely installed, it is said to be in this phase. |
|
|
Term
| system development lifecycle. (SDLC) |
|
Definition
| oldest method for building info systems. Has detailed stages. |
|
|
Term
| request for proposal (RFP) |
|
Definition
| detailed list pf questions submitted to externavendors to see how well they meet the requirenments for the proposed system. |
|
|
Term
| Rapid application development. |
|
Definition
| create workable systems in a short period of time. |
|
|
Term
|
Definition
| techniques are step by step. |
|
|
Term
|
Definition
| offers a logical model for info flow. |
|
|
Term
|
Definition
| descrie the transformationoccuring within the lowest level of the data flow diagram, showing logic for each process. |
|
|
Term
|
Definition
| top-down chart shoing each level of design. its relationship to other levels, and its place inthe overall design structure. |
|
|
Term
| object oriented development. |
|
Definition
| uses the object as the basic unit of analysis. combines data and the specific processon those data sets. |
|
|
Term
| component based development. |
|
Definition
| combines commercially available components for shopping carts, user authentication, search engines, and catalogs wit pieces of software for their own unique business requirements. |
|
|
Term
| Computer aided software engineering |
|
Definition
| sometimes called computer aided systems engineering. Provedies softare tools to automate the mthodologies we have just described to reduce the amount of repetitive work. |
|
|
Term
|
Definition
| will help evaluate alternative systems projects. |
|
|
Term
|
Definition
| lists project activities and their corresponding start and completion dates. |
|
|
Term
|
Definition
| program evaluation and review technique. Graphically depicts project tasks and their interrelationships. |
|
|