Upgrade to remove ads
CIS2700 Final WMU
Terms in this set (77)
A new way of doing things that initially does not meet the needs of existing customers
produces an improved product customers are eager to buy
A massive network that connects computers all over the world using TCP/IP technology and allows them to communicate with one another
Internal to the organization. Private accessible to people in the organization.
Organizational internal network extended to business partners such as suppliers. Private network for selected users.
Business value of disintermediation
fewer or no middlemen
occurs when a business sells directly to the customer online and cuts out the intermediary.
Business value of disintermediation for customer
the conduction of business on the internet including, not only in buying and selling, but also serving customers and collaborating with business partners.
The buying and selling of goods and services over the internet.
E-business vs E-commerce
E-business is broader
Applies to businesses buying from and selling to each other over the internet. (wholesale, sellers and buyers are both organizations) (google search marketing)
Applies to any business that sells its products or services to consumers over the internet. (brick and mortar, click and mortar, pure-play) (Progressive insurance, best buy)
Applies to any consumer that sells its products or service to a business over the internet. (sellers and buyers are both individuals) (eBay, Amazon)
Applies to sites primarily offering goods and services to assist consumers interacting with each other over the internet. (sellers are individuals and buyers are organizations) (eBay, Amazon)
Brick & Mortar
physical store without an internet. Not so many today. (local book store)
Click & Mortar
Both physical and internet. (barnes and noble)
Internet only without a physical store. (Amazon)
Benefits of E-Business
Lower cost, increase in sales, expand reach
Challenges of E-Business
security and privacy
gives users a live connection via satellite or radio transmitters
the technology can travel with the user, but it is not necessarily in real-time.
two or more computer connected to share resources and information/data
any device connected on a network that has an address and can receive or send signals/messages
Types of wireless networks
PAN, WLAN, WMAN, WWAN
Personal Area Network (PAN)
provide communication over a short distance that is intended for use with devices that are owned and operated by a single user.
Wireless Local Area Network (WLAN)
uses radio signals to transmit and receive data over distances of a few hundred feet.
Wireless Metropolitan Area Network (WMAN)
a WMAN that uses radio signals to transmit and receive data.
Wireless Wide Area Network (WWAN)
a WWAN that uses radio signals to transmit and receive data.
difference between the types of networks
a satellite based navigation system providing extremely accurate position, time, and speed information.
consists of hardware, software, and data that provide location information for display on a multidimensional map.
Different types of network security
Firewalls, Intrusion Detection System IDS, and Virtual Private Network VPN
devices that provide secure connection between external and internal networks. Can be hardware or software or both. Gatekeepers, between public and private networks, preventing unauthorized users from accessing a private network.
Use sophisticated statistical techniques to recognize and disable network attacks.
creates secure private connection between remote user and organization's internal network.
Reasons for new software development
obsolete system, collaboration with business partners, and gaining a competitive advantage.
the old/current system
Conversion from legacy system
the process of transferring information from a legacy to a new system
modifying software to meet specific business or user requirements.
Off-the-Shelf application software
supports general business processes.
Systems development life cycle. (The overall process for developing information systems from planning and analysis through implementation and maintenance)
7 phases of SDLC
Testing in the SDLC
done before the system is implemented
Maintenance in the SDLC
an ongoing process, that takes place after implementation
Two types of maintenance
corrective & preventive
repairs current errors
reduces the chances of future system failure
two main components of implementation
user documentation and training
highlights how to use the system and how to troubleshoot issues or problems.
different types of trainings
online & workshop
intranet/internet, CD or DVD
held in a classroom setting and led by an instructor
criterion for selecting the type of training
complexity of software
four types of system implementation methods
plunge, parallel, passed, and pilot
replaces the legacy system
Disadvantages: high risk, no backup
uses both systems for a period of time.
Advantages: backup system, lower risk
Disadvantages: expensive, users ay not use it fully
installs new systems in phases or gradually.
advantages: corrects problems through each department
Assigns a small group of people to use the new system.
Advantages: corrects problems before full implementation
Disadvantages: iteration can be time consuming
Criteria for implementation method selection
complexity of software, timeframe, and budget allocated.
concept of iteration
repetition of the same process and it can be a disadvantage in pilot implementation method. can be very time consuming.
why is it critical to involve non-IT executives in the SDLC process because
non-IT people will be using the software day-to-day and they need to be able to understand how to use it.
SDLC can either be a failure or a success
can either increase or decrease revenue. repair or damage to brand reputation. prevent or incur liabilities. increase or decrease productivity.
a temporary endeavor undertaken to accomplish a specific purpose such as developing a new software to increase sales. should have a unique objective. is temporary with a definite timeframe. requires knowledge from various areas.
a formal, approved document that manages and controls project execution. should be; easy to understand and read, communicated to all key participants, appropriate to the project's size, complexity, and criticality, and prepared by the team rather than by the individual project manager.
the application of knowledge, skills, tolls, and techniques to project activities to meet project requirements.
Function of a project manager
defines plan to ensure the project is completed on time and on budget.
easy to quantify and typically measured to determine the success or failure of a project such as increased sales.
difficult to quantify or measure such as improved decision making.
the measure of tangible and intangible benefits
different types of feasibility
economic, operational, technical, political, schedule, and legal
project management interdependent variables
scope, resources/cost, and time
using the professional expertise within an organization to develop and maintain the organizations information technology systems.
an organization provides a service or services for another organization that chooses not to perform them in-house.
Three different forms of outsourcing
onshore, near-shore, and offshore
3 main reasons why companies outsource
core competencies, financial savings, rapid growth
major challenges of outsourcing
length of contract, loss of confidentiality, threat to competitive advantage.
YOU MIGHT ALSO LIKE...
CIS251- Chapter 3, 7, & 8
IS Midterm 3
Chapters 8, 3, & 7 Vocab
MGIS EXAM 3
OTHER SETS BY THIS CREATOR
14 management principles Toyota Way
EDMM1500 Exam 1
GPS 1500 Final Exam
GPS 1500 Exam 2