MIS Tuttle #3

STUDY
PLAY

Terms in this set (...)

data warehouse
large database repository that helps unite information from an organization
data mining
-show relationship in data
-discovery of correlation in data
(EX people with bad credit get's in more wrecks)
knowledge management system
-collect and share human knowledge
-create value from intellectual capital
(Like a wiki for a specific job)
expert system
-produce if/then rules
-encapsulates experts knowledge

-EX: WebMD & Longevity game
Legacy system
-limited access to data, can't fit the needs of business and makes mergers difficult
Market based analysis / association rules
-data mining technique for determining sales patterns
-shows products customers tend to buy together
lift
-how much more likely it is that a person who buys products A & B together than the likelihood that anyone who walks into the store will buy product B
-confidence/BM (BM = % that happens overall)
confidence
likelihood that a person buying product A will also buy product B
3 V's that describe Big Data
volume, variety, and velocity
analytics
-the extensive use of data
-statistical and quantitative analysis, explanatory and predictive models
data visualization
-Making a visual representation of data like the twitter maps.
business intelligence systems
use data created by other systems to provide information for improving decision making
-data that helps companies make decisions
clustering analysis
-descriptive method
-helps us see patterns and groupings in data based on different field of value
-helps predict trends in business
classification tree
-predictive
-like a flow chart of data
descriptive methods
-way to understand your data
predictive methods
-look for patterns and relationships to anticipate events
business process management
-systematic way of creating, assessing, and altering business processes as needed
-many methods but concept stays the same
5 steps of business process management
1) create picture of current process; known as the as-is
2)identify areas where process is constraining strategy
3) redesign process or problematic portion of the process to help strategy be better realized; Known as the "to-be" (I.T can be leveraged here)
4)implement process change
5)Adjust and repeat Cycle create policy for ongoing effectiveness
Why care about bpm
-in order for businesses to evolve and adapt, we must understand how we do things and make them better

Process comes before Info System
automation of process of Information Systems
-moves work from the *human side to the
technology side*
-technology side = hardware & software
-human side = process & people
-processes are turned into code
transformation of processes of Information Systems
-transformation changes the human side to fit the technology side
-processes are redesigned and restructured to fit the logic within software
business process improvement
-to change slight parts of the process
business process innovation
-to completely redesign the process
organizational inertia
-companies that stay stagnant and do not improve or change
-bad for companies because they are ensuring a faster death
dis-economies of scale
-as development teams grow, average contribution per worker decreases and project is harder to manage
-too many cooks in the kitchen
iterative development
-easier to achieve than waterfall process because all goes live at the end
prototyping
-creating a model/mock up of a product
scope creep
-exploring different avenues for scope of project
-triangle where if you increase scope, you must increase time or resources
Quality assurance/ testing
-confirm it all works as expected
-catch bugs before they get to the users
-CRITICAL to success
Direct/Big Bang Installation
install new process/software and discontinue old
implementation/production phase
-convert business activity from old system to new
-methods of implementing = pilot(limited users have access to system) & phased(new system installed in phases)
analysis phase
-determine and document features and functions
-less expensive to change system in this phase
-closer to "go-live" an issue is found, harder and more expensive to change
design phase
-develop and evaluate alternatives
-hardware design determined by project teams
-software design depends on source
-database is designed
-job descriptions created for users and operations personnel
incremental development
-build parts at a time
inception phase
-define system goals
-determine project scope
-assess feasibility of project/proof of concept
maintenance phase
-fixing or adapting system
-need method to track system failures and enhancements
parallel installation
-test new system running in parallel with old system
-expensive and time consuming
phased installation
-steadily move in, or install in several phases/parts
pilot installation
limited users have access to new system
resistance to change
-biggest factor when it comes to failure
contract manufacturing
-signing a contract to mass produce a product you are hoping will be successful
-placing a big bet of huge order
just-in-time manufacturing
-producing small batches of a product
Vertical integration
-control all parts of value chain like outbound and inbound logistics, operations, marketing etc.
-ZARA
horizontal integration
- don't own all parts of value chain, only have control on certain parts
-GAP
Point-of-scale (POS) system
-way to gather information about what is selling, and not selling
-how ZARA tracks their fitting rooms opposed to how traditional retail does
push demand
-produce to stock
-customer at end of chain, focus on promotions, driven by mass market large inventory
pull demand
-produce on order
-customer at beginning of chain
-info substitutes inventory
-small batches and more customization
bull whip effect
variability in order size and oder timing increase at each stage up the supply chain
disintermediation
-let all participants have access to consumer-demand info
-consider vertical integration
-consider shortening supply chain through cutting out middle man(disintermediation)
offshoring outsourcing
same company doing the work, just in a location abroad
onshoring
company relocating to a different location in the same country
outsourcing
-arrangement in which work is done by people from outside your company, usually by a company that is expert in that type of work
in house
-no third party company hired, all the same company doing their own work
core competency
-think what make company truly unique
transaction costs
-coordination costs
-contracting costs
-integration costs
-risk costs
-loss of resource control
-operating risks
production costs
-lower wages in offshore
-economies of scale
-production efficiency
-process specialization
total costs
= production savings/(gains +transaction costs)
white hat hacker
hack for good, do not exploit information
black hat hacker
-bad hacker
-spreading viruses and infected software
hacktivist
-hack to protest government websites or other organization
phishing
-click on something or open an email with a virus or bad software
-trying to tap into personal info
social engineering
Look on tuttle's website
-try to get personal information to hack into accounts.
-through email, phone, or social media
malware
-dangerous software that helps hackers
dumpster diving
-sifting through trash to find valuable data like credit card numbers, social security numbers or other personal info
shoulder surfing
-looking over someones shoulder to view their password or other proprietary info
detailed logging
-logs all activity on a server
disaster recovery planning & business continuity planning
-often include provisions to back up systems and data to off-site locations to protect operation and provide a fall back in the case of a disaster
biggest risk to IT security
HUMANS
different ways to mitigate the threats
-technical safeguards
-data safeguards
-human safeguards
most threats come from
inside the company
• A person not working with Company A is looking to gain access to sensitive information that Company A posses. He does not have access to the company nor any knowledge of individuals working with Company A. What method is he most likely to use to gain access?
-dumpster diving
• BPM provides strategies for managing??
o "Business processes from an end-to-end perspective." This is because process management deals with all parts of Porter's Value Chain. With each part,you can utilize BPM to improve it
• To achieve the desired level of process performance and deliver customer value, business process metrics must
o Be monitored and controlled." This is because you must have a standard process that is organized and structured to be able to receive data and be free from any interference that can contaminate the process and/or products.
o One of the members of your team is sick, and on that same day, the client adds more objectives to the project. As team manager, you would
ask the client to extend the deadline
o What was not an issue in the ERP implementation article?
the project in idaho experienced scope creep
o What makes development difficult?
high probability in misinterpretation between the client and developer
• Zara negates the risk of maintaining high inventory by:
having limited production runs
• Zara's staff members regularly collect data from customers at its stores. This data is used to:
-plan styles and issue rebuy orders
o Zara is a clothing retailer based from Spain and has a branch in NYC, New York, USA that employs American citizens and still under Zara control. What is the NY branch an example of
• A. In-house, Off-shoring. Since the branch is still under Zara control, it is considered in-house instead of outsourcing (hiring an outside company to do work for your company)
o Company A has hired your IT consulting company. During the consulting meeting, Company A wants you to add additional features to the base package software that it will implement to manage supply inventory. What is this an example of?
scope creep
Business Process
Look up on Tuttle's slides
What are the 5 parts of and Information System
-Hardware
-Software
-Data
-Pocess
-People
What parts of Information System model is the hardest to change
Process & people (The Human Side)
How Did Progressive Grow It's profit
-Decreased the time to get the claim process going
-Lowered the price
-24hr time to set up inspection
-Showed competitors prices
What are ways to innovate
- Look for role models outside your company
-Defy constraining assumptions
Inventory =
Death
In House Offshoring
Work inside the company, but have a separate branch in another country. Ex Wal-mart Japan Branch
Reasons to consider Outsourcing
Saves cost on infrastructure
Quickly gain expertise you don't have in house
Less people to manage
Refocus on what you're good at doing.
Share opertational risk to another org
Reasons not to Outsource
- Less managerial control
-You can get locked in by that company
-Some things can be secret to the compay
-What do you do if someone mess something up?
Reasons to consider Offshoring
Look at slides
Reasons not to Offshore
Look at slides
What are some trends companies are seeing
-Software applications moving to web
-Outside access to company networks increasing (Working from home, consumer who wants to get their data)
-Many employees are not educated on types of attacks and become vulnerabilities
-BYOD(Bring Your Own Device)
-Employees using their own devices now to connect to your systems
What are some impacts of being hacked
-Loss of Customer Trust
-Impact to financial
-Lawsuit
CIA Framework
Confidentiality
Integrity
Availability
Confidentiality
Look on tuttle's website
Integrity
*Look on tuttle's website
Accessibility
Look on tuttle's website
Integrity Vulnerabilities
-Sql injections
Look on tuttle's website
Accessibility Integrity Vulnerabilities
Look on tuttle's website
Confidentially Vulnerabilities
Look on tuttle's website
SETA(Security, Education, Training and Awareness)
...
What is DDOS
*Look on CH 13 in TX book
A flooding of a server making it fail
What is Business Continuity Planning
- Think of all the things that can go wrong, and how probable it is to happen.
_If so how can we prevent it.
-How will your business continue in light of a disaster?
Script Kiddies
-Term to describe unskilled hackers who can use easily downloadable tools to create DOS attacks

(Ut student using Ion cannon to attack registar )
Firewall
Combo of Hardware/software intended to prevent unauthorized access to a company internal computer systems
What is the relationship between transactional / operational data and Business Intelligence?
...