k201
Terms
undefined, object
copy deck
- ethics
- principles and standards that guide our behavior towards others
- intellectual property
- intangible creative work thats embodied in physical form
- copyright
- legal protection afforded an expression of an idea
- fair use doctrine
- its legal to use copyrighted materials sometimes
- epolicies
- policies and procedure that address the ethical use of computers and internet usage in business environment
- opt-in
- only contact people who agreed to receive promotions and marketing material via email
- ethical computer use policy
- general principles to guide computer user behavior i.e. dont play computer games while during work hours
- information privacy policy
- using information for only intended purpose. classic misuse: social security number (retirement benefits --> many uses)
- acceptable use policy (AUP)
- user must agree to term to be able to use internet/network
- nonrepudiation
- contract stipulation that e-businesses dont try to deny their online actions
- email private policy
- email system owner can read anything he wants; so users need to consent to the amount of intrusion
- internet use policy
- to limit offensive material, for example
- information technology monitoring
- tracking ppl's activities like # of keystrokes, error rt, and number of transactions processed
- employee monitoring policies
- says when, how, and where company is monitoring employees
- key logger, key trapper
- records every keystroke and mouse click
- hardware key logger
- records keystrokes on their journey from keyboard to motherboard
- cookie
- small file deposited on hard drive by web site allowing them to know when ppl come/go
- adware
- generates ads that install themselves on a computer while you're doing other things
- spyware
- comes in free downloads that tracks online movements, gets info, or uses your CPU
- web log
- online line of info for every visitor to a website
- clickstream
- records info about a someones web surfing whereabouts (how long visit was, ads views, purchases)
- information security
- protection of info from accidental or intentional misuse by ppl
- insiders
- legitimate users who accidentally/intentionally misuse access to info and cause incidents; ie ppl who write passwords on post-its
- social engineering
- using ones social sills to trick people into revealing access credentials or other valuable info
- IDS
- intrusion detection software
- phishing
- technique to gain personal info for identity via email asking for id/password confirmations
- tokens
- change passwords everytime the token is used to be entered in
- biometrics
- identification of a user via physical characteristic i.e. fingerprint, voice, iris
- content filtering
- filtering software to prevent transmission of unauthorized info; can apply to spam
- encryption
- scrambles info that needs a key/password to be read
- PKE
- public key encryption - 2 keys i.e. user sends credit info via email uses 1 key to scramble, organization uses 2nd key to unscramble and read
- firewall
- hardware/software that guards a private network by analyzing info going/coming from the network
- antivirus software
- detect and find who/what is responsible
- worm
- spreads from computer to computer; viruses need and executable file
- enterprise architecture
- plans for how an organization will build, deploy, use and share its data, processes and IT assets
- EA
- enterprise architect - person grounded in tech, fluent in business; bridge between IT and business
- information architecture
- where and how important info is maintained and secured
- infrastructure architecture
- hardware, software, and telecommunications equipment that provide underlying foundation to support organization goals
- application architecture
- determines how applications integrate and relate to each other
- fault tolerance
- computer system designed that in case of a failure a backup component can be integrated w/o loss of service
- failover
- backup where the functions of a failed computer component get taken over by a secondary system
- hot site
- separate and fully equipped facility where company can move immediately after a disaster and resume business
- cold site
- separate facility that doesnt have computer stuff but people can go there after a disaster
- disaster recovery cost curve
- money vs. time from disaster to recovery - intersection = optimal disaster recovery plan in terms of cost and time
- scalability
- how well a system can adapt to increased demands
- capacity planning
- future IT infrastructure requirements for new equipment and additional network capacity
- web services
- repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
- interoperability
- capability of 2 or more computer systems to share data and resources
- open system
- nonproprietary IT hardware/software - allow for information sharing
- SDLC
- systems development life cycle - planning, analysis, design, development, testing, implementation, maintenance
- waterfall methodology
- sequential, activity-based process in which each phase is performed sequentially
- RAD
- rapid application development - extensive user involvement in the rapid and evolutionary construction of working prototypes
- XP
- extreme programming methodology - project separated into tiny phases and cannot continue onto next phase until 1st phase complete
- agile methodology
- form of XP - aims for customer satisfaction via early and continuous delivery of useful software components
- ITIL
- information technology infrastructural ibrary - framework of best practice approaches to deliver high quality IT services
- scope creep
- scope of project increases
- feature creep
- developers add extra features that were not part of the initial requirements
- project management
- application of knowledge, skills, tools, and techniques to project activities; time + cost + scope = quality
- hierarchical database model
- info organized into tree like structure, one parent-multiple children, allows repeating info, cannot have too many relationships
- network database model
- multiple parents-multiple children, lattice structure
- relational database model
- logically related 2D tables
- physical view
- info on a storage device like a hard disk
- logical view
- users logically access info to meet business needs
- relational integrity constraints
- rules that enforce basic information-based constraints i.e. not allowing someone to create an order for a nonexistent person
- business-critical integrity constraints
- important for a business to survive i.e. Kroger not accepting returns after 15 days post delivery
- DBMS
- database management system - software through which users and application programs interact with a database
- data-driven web site
- constantly updated and relevant to the needs of its customers via a database
- integration
- allows separate systems to communicate directly with each other i.e. customer info --> order entry, billing, sales, order fulfillment
- forward integration
- sales --> order entry --> order fulfillment --> billing
- backwards integration
- billing --> order fulfillment --> order entry --> sales
- ETL
- extraction, transformation, loading - gets info from external/internal databases, standardize info, upload into data warehouse
- data mart
- subset of data warehouse
- data mining
- analyzing data to extract info not offered by raw data alone
- cube
- multidimensional database
- data-mining tools
- i.e. query, reporting, statistical tools, etc.
- info cleansing/scrubbing
- finds and fixes or discards info thats inconsistent, incorrect or incomplete
- BI
- business intelligence - applications and technologies used to gather, provide access, and analyze data to support decision-making efforts
- info levels
- individual, enterprise, department
- info formats
- document, presentation, spreadsheet, database
- info granularities
- detail (fine), summary aggregates (coarse)
- transactional information
- i.e. airline ticket, sales receipt, packing slip - support performing of daily operational tasks
- analytical information
- i.e. product stats, sales projections, future growth, trends (organizational info) - supports performing of managerial analysis tasks
- SCM
- supply chain management - management of info flows between and among stages in a supply chain to maximize effectiveness and profitability
- CRM
- customer relationship management - managing customer-organization relationship to increase customer loyalty, retention, and profitability
- BPR
- business process reengineering - redesign of workflow within and between enterprises
- ERP
- enterprise resource planning - integrates all departments and functions in an organization into a single IT system.
- KPI
- key performance indicators - metrics
- efficiency IT metrics
- measure performance of the IT system; throughput, speed, and availability
- effectiveness IT metrics
- measure impact IT has on business processes/activities; customer satisfaction, conversion rates.
- balanced scorecard
- provides feedback around internal/external outcomes to continuously improve strategic performance and results
- CIO
- chief information officer - reports to CEO, oversees IT uses and alignment with business goals
- CTO
- chief technology officer - ensure throughput, speed, accuracy, availability and reliability.
- CPO
- chief privacy officer - ensure ethical and legal use of info w/ in an organization
- CKO
- chief knowledge officer - collecting maintaining and distributing the organizations knowlege
- information partnership
- two or more organizations cooperate by integrating their IT systems so customers can have best of both worlds
- collaboration system
- IT-based set of tools that supports the work of teams by facilitating the sharing and flow of info
- unstructured collaboration
- includes document exchange, shared whiteboards, discussion forums, email
- structure collaboration
- shared participation in business processes - workflow
- KM
- knowledge management - capturing, classifying, evaluating, retrieving and sharing info assets in a way that provides context for effective decisions and actions
- KMS
- knowledge management systems
- explicit knowledge
- stuff that can be documented, archived, and codified
- tacit knowledge
- stuff in ppls heads
- SNA
- social networking analysis - mapping a groups contacts to ID who works with who