Term
|
Definition
| Reports created due to unplanned information requests in which information is gathered to support a nonroutine decision |
|
|
Term
|
Definition
| A display delivering summary information to managers and executives |
|
|
Term
|
Definition
| Reports that provide details behind the summary values on a key indicator or exception report |
|
|
Term
| Executive Information system (EIS) |
|
Definition
| An information system designed to provide information in a highly aggregated form so that managers at the executive level of the organization can quickly scan it for trends and anomalies |
|
|
Term
|
Definition
| Report that highlights situations that are out of the normal range |
|
|
Term
| Fully automated data entry |
|
Definition
| data entry into an information system that does not require any human intervention |
|
|
Term
|
Definition
| reports that provide a summary of critical information on a recurring schedule |
|
|
Term
| Management Information Systems (MIS) |
|
Definition
1) a field of study that encompasses the development use, management, and study of computer-based information systems in organizations. 2)An information system designed to support the management of organizational functions at the managerial level of the organization. |
|
|
Term
|
Definition
| A person enters information by hand into an information system |
|
|
Term
|
Definition
| reports produced at predefined intervals- daily, monthly - to support the routine informational needs of managerial-level decision making |
|
|
Term
|
Definition
| Documents that seve as a stimulus to a transaction processing system from some external source |
|
|
Term
| Transaction processing system (TPS) |
|
Definition
| An information system designed to process day-to-day business event data at the operational level of the organization. |
|
|
Term
|
Definition
| Science of enabling information tech. to simulate human intelligence, such as resoning and learning as well as gaining sensing capabilities (seeing, hearing,walking, talking, and feeling) |
|
|
Term
| Decision Support system (DSS) |
|
Definition
| A special-purpose information system designed to support organizational decision making |
|
|
Term
|
Definition
| A special pirpose information system designed to mimic human expertise by manipulating knowledge- understanding acquired through ex[erience and extensive learning- rather than simply information. |
|
|
Term
| Functional area Information System |
|
Definition
| A cross- orgainizational-level information system designed to support a specific functional area. |
|
|
Term
| Geographic Information Systems |
|
Definition
| a system for creating, storing, analyzing and managing geographically referenced information. |
|
|
Term
|
Definition
| software that enables people to work together more effectively |
|
|
Term
|
Definition
| a program that works in the background to provide some service when a specific event occurs. |
|
|
Term
|
Definition
| specific portals used to share knowledge collected into a repository with employees, with customers and suppliers or the general public |
|
|
Term
|
Definition
| Work teams from different organizations and locations that perform and disband as needed. |
|
|
Term
|
Definition
| the display of complex data relationships using a variety of graphical methods |
|
|
Term
|
Definition
| intelligent agents that continuously browse the web for for specific information . also known as web spiders |
|
|
Term
| Customer Relationship management (CRM) |
|
Definition
| A corporative level strategy designed to create and maintain lasting relationships with customers bu concentrating on the downstream information flows, through the into of reliable systems, processes and procedures. |
|
|
Term
|
Definition
| enterprise portals that automate the business processes involved in selling, or distributing, products from a single supplier to multiple buyers |
|
|
Term
|
Definition
| Information systems that provide a single point of access to secured, propietary information, which may be dispersed throughout an organization. |
|
|
Term
| Extensible Business Reporting Language |
|
Definition
| An XML- based specification for publishing financial information |
|
|
Term
| Extensible Markup Language (XML |
|
Definition
| A data presentation standard that allows designers to create customized features that enable datta to be more easily shared between applications and organizations. |
|
|
Term
|
Definition
| Enterprise portals that automate the business processes involved in purchasing, or procuring products between a single buyer and multiple suppliers. |
|
|
Term
Radio frequency identification |
|
Definition
| The use of electomagnetic waves in the RF portion of the electromagnetic spectrum in order to transmit signals; an RFID system uses a transceiver and antenna to transfer information to processing device or RFID tag |
|
|
Term
Sales force automation (SFA) |
|
Definition
| CRM systmes to support the day-to-day sales activbities of an organization |
|
|
Term
Supply chain management (SCM |
|
Definition
| Information systems focusing on improving upstream information flows with two main objectives- to accelerate product development and to reduce costs associated with procuring raw materials, components and services from suppliers |
|
|
Term
|
Definition
| A website where multiple buyers and sellers come together to conduct business; also called an electronic marketplace |
|
|
Term
|
Definition
| A market comprised of firms within a specific industry sector |
|
|
Term
Adaptive/Corrective/Perfective/Preventive maintenance |
|
Definition
| Making changes to an information system to make its functionality meet changing business needs or to migrate it to a different operating environment |
|
|
Term
|
Definition
| Testing performed by the development organization to assess whether the entire system meets the design requirements of teh users |
|
|
Term
|
Definition
| Testing performed by actual system users, who test the capabilities of the system with actual data in their work environment |
|
|
Term
|
Definition
| Data moving through an organization or within an information system |
|
|
Term
| Graphical User Interface (GUI) (p. 374) |
|
Definition
| Computer interface that enables the user to select pictures, icons, and menus to send instructions to the computer |
|
|
Term
| Joint application design (JAD) (p. 370) |
|
Definition
| A special type of group meeting in which all (or most) users meet with the analyst to jointly define and agree on system requirements or designs. |
|
|
Term
Processing logic (p. 372) |
|
Definition
| The steps by which data is transformed or moved, as well as a description of the events that trigger these steps |
|
|
Term
Software engineering (p. 363) |
|
Definition
| A disciplined approach for constructing information systems therough the use of common methods, techniques or tools. |
|
|
Term
| Systems analysis and design (p. 363) |
|
Definition
| The second phase of the systems development life cycle, in whichthe current ways of doing business are studied and alternative replacement systems are proposed |
|
|
Term
|
Definition
| The primary person responsible for performing systems analysis and design activities. |
|
|
Term
| Systems Development Life Cycle (SDLC) (p. 366) |
|
Definition
| describes the life of an information system from conception to retirement. |
|
|
Term
|
Definition
| A systems development method whereby users in the organization develop, test, and maintain their own applications |
|
|
Term
|
Definition
| The process of purchasing an exisiting information system from an external organization or vendor |
|
|
Term
| Object-Oriented Analysis and Design (OOA&D) |
|
Definition
| Systems development methodologies and techniques based on objects rather than on data and processes. |
|
|
Term
|
Definition
| An iterative systems development process in which requiremnets are converted into a working system that is contunually revised through close work between analysts and users. |
|
|
Term
| Request for proposal (RFP) |
|
Definition
| A communication tool indicating buyer requirements for a given system and requesting information from potential vendors. |
|
|
Term
|
Definition
| A broad range of issues and standards of conduct that have emerged through the use and proliferation of information systems |
|
|
Term
|
Definition
| the knowledge of how to operate a computer |
|
|
Term
|
Definition
| the dubious practice of registering a domain name, then trying to sell the name to the person, company, or orgaization most likely to want it. |
|
|
Term
|
Definition
| the gap between those individuals in our society who are computer literate and have access to information resources like the internet and those who do not. |
|
|
Term
|
Definition
| Stealing another persons social security number, credit card number, and other personal information for the purpose of using the victim's credit rating to borrow money, buy merchandise and otherwise run up debts that are never repaid |
|
|
Term
| Information accessibility |
|
Definition
| An ethical issue that focuses on defining what information a person or organization has the right to obtain about others and how this information can be accessed and used. |
|
|
Term
|
Definition
| an ethical issue concerned with the authticity and fidelity of information as well as identifying who is reponsible for information errors that harm people |
|
|
Term
|
Definition
| an ethical issue that is concerned with what information an individual should have to reveal to others through the course of employment or through other transactions such as online shopping |
|
|
Term
|
Definition
| An ethical issue that focuses on who owns information about individuals and how informaion can be sold and exchanged |
|
|
Term
|
Definition
| The use of a computer to commit an illegal act |
|
|
Term
|
Definition
Cracker: An individual who breaks into computer system with the intention of doing damage or committing a crime Hacker: Individuals who gain unauthorized access to computer systems. |
|
|
Term
|
Definition
| the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals or any segment of society to attain politcal, religious, or ideological goals. |
|
|
Term
|
Definition
| an organized attempt by a country's military to disrupt or destroy information and communications systems of another country |
|
|
Term
|
Definition
| A type of computer crime where the data going into or out of a computer is altered |
|
|
Term
|
Definition
| Attempts to trick finanicial account and credit card holders into giving away their authorization information, usually by sending spam messages to literally millions of email accounts. |
|
|
Term
|
Definition
| Crimes committed against telephone company computers with the goal of making free long distance calls, impersonating directory assistance or other operator services, diverting calls to numbers of the perpatrators choice, or otherwise disrupting telephone services for subscribers. |
|
|
Term
|
Definition
| A form of data diddling that occurs when a person shaves a small amounrs from financial accounts and deposits them into a personal account |
|
|
Term
| Social Engineering or Masquerading |
|
Definition
| Misrepresenting oneself in order to steal equipment or to trick others into revealing sensitive information |
|
|
Term
|
Definition
| A type of computer crime where individuals make illegal copies of software protected bu copyright laws. |
|
|
Term
|
Definition
| A destructive computer code whose instructions reamin hidden to the user because the computer appears to function normally, but, in fact, it is performing underlying functions dictated by the intrusive code. |
|
|