Create an account
ERP Core components
traditional components included in most ERP systems and they primarily focus on internal operations; Accounting and finance, production and materials management, and human resource
ERP extended components
extra components that meet the organizational needs not covered by the core components and primarily focus on external operations; business intelligence, customer relationship management, supply chain management, and e-business
Customer relationship management CRM
- Involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability
Supply Chain Management SCM
Involves the management of information flows between and among stages in a supply chain to maximize total supply chain effectiveness and profitability
several different types of software that sit in the middle of and provide connectivity between two or more software applications.
Represents a new approach t by packaging together commonly used functionality, such as providing prebuilt links to popular enterprise applications, which reduces the time necessary to develop solutions that integrate applications from multiple vendors
an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of Information
- involves shared participation in business processes such as workflow in which knowledge is hardcoded as rules (process collaboration)
includes document exchange, shared whiteboards, discussion forums, and e-mail (information collaboration
content management system
provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment
tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed
studying and analyzing right from wrong; good from bad (building blocks of successful business)
a method for confirming users' identities; Something the user knows, Something the user has, Something that is part of the user
- If there is an information security breach and the information was encrypted, the person stealing the information would be unable to read it
If there is an information security breach and the information was encrypted, the person stealing the information would be unable to read
. the assurance that messages and information are available only to those who are authorized to view them
information security policies
the protection of information from accidental or intentional misuse by persons inside or outside an organization
number of distinct types of creations of the mind for which a set of exclusive rights are recognized—and the corresponding fields of law
a type of software piracy that occurs when fake copies of software are produced in such a way that they appear to be authentic
act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques
legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
Information security lines of defense
People (information security policy & plan; 5 steps of security plan: Develop the information security policies, Communicate the information security policies, Identify critical information assets and risks, Test and reevaluate risks, Obtain stakeholder support) and Technology (3 primary info security areas- Authentication and authorization, Prevention and resistance, Detection and response)
unsolicited e-mail (accounts for 40% to 60% of most organizations' email, and costs U.S. businesses over $14 billion in 2005)
prevention and resistance
downtime can be costly; Technologies available to help prevent and build resistance to attacks include: Content filtering, Encryption, Firewalls
- hardware and/or software that guards a private network by analyzing the information leaving and entering the network
When data are processed, organized, structured or presented in a given context so as to make them useful, they are called Information.
the duplication of information or storing the same information in multiple places (primary problem: inconsistency)
maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses); stores information in the form of logically related two-dimensional tables
physical vs logical
deals with the physical storage of information on a storage device vs. focuses on how users logically access information
a person, place, thing, transaction, or event about which information is stored (The rows in each table contain the entities)
field or attribute
characteristics or properties of an entity class (The columns in each table contain the attributes)
purpose of a primary key- foreign key
a field (or group of fields) that uniquely identifies a given entity in a table; a primary key of one table that appears an attribute in another table and acts to provide a logical relationship among the two tables
a logical collection of information - gathered from many different operational databases - that supports business analysis activities and decision-making tasks
the process of analyzing data to extract information not offered by the raw data alone. Helps users uncover business intelligence
broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions. BI applications include the activities of decision support systems, query and reporting, online analytical processing (OLAP), statistical analysis, forecasting, and data mining
ETL- Extract Transform Load
a process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse
the aggregation of information, and allows simple "roll-ups" (combinations) of interrelated information.
the study of the impact that changes in one part of a model have on other parts of the model.
special-purposed knowledge-based information system that accomplishes specific tasks on behalf of its users
AI (Artificial Intelligence) systems and their commercial applications
simulates human intelligence such as the ability to reason and learn; intelligent system- various commercial applications of artificial intelligence
- attempts to emulate the way the human brain works; Fuzzy logic - a mathematical method of handling imprecise or subjective information
an artificial intelligent system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem
computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems
Decision Support System DSS,
models information to support managers and business professionals during the decision-making process (models used: Sensitivity analysis, What-if analysis, Goal-seeking analysis)
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together