Upgrade to remove ads
BEC 6-Process Management and Information Techology
Terms in this set (31)
Business Process Management(BPM)
A management approach that seeks to coordinate the function of an organization toward an ultimate goal of continuous improvement in customer satisfaction.
Business Process Management Activities can be grouped into 5 categories:
Process Management also has been commonly referred to as PDCA:
-Act(Repeat)to reassess the degree of improvement
Business Process Reengineering(BPR):
Refer to techniques to help organizations rethink how work is done to dramatically improve customer satisfaction and service, cut costs of operations and enhance competitiveness.
Differences between Business Process Management and Business process Reengineering:
Just-in Time (JIT)
Scheduling the deployment of resources just-in-time to meet customer or production requirements.
*Benefits: Elimination of non-value adding operations.
Total Quality Management (TQM)
Represents an organizational commitment to customer-focused performance that emphasizes both quality and continuous improvement.
Theory of Constraints (TOC)
States that organizations are impeded from achieving objectives by the existence of one or more constraints.
Uses a scientific methodology in the evaluation of goal achievement that involves the following steps: Define, Measure, Analyze, Improve, and Control (DMAIC).
IT is a strategic driver, making the IT governance function even more crucial and elevating it to the executive and board levels.
5 Areas of Focus in IT Governance
Electric Data Interchange (EDI)
Process of sending data from one computer to another by telephone line or cable.
Information Technology Steering Committee
Should be formed to guide and oversee systems development and acquisition.
Customer Relationship Management System(CRM)
Provides sales force automation and customer services in an attempt to manage customer relationship.
Enterprise Resource Planning (ERP)
a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.
*Support what you doing based on your strategic.
*Designed to integrate data from all aspects of an organization's activities.
Supply Chain Management Systems (SCM)
Concerned with the 4 important characteristics of every sale: What, When, Where and How Much?
Overall Objectives of SCM: Achieving flexibility and responsiveness in meeting the demands of customers and business partners.
Application Service Providers (ASP)
Provide access to application programs on a rental basis
Backup of systems that
be shut down
Files or databases have changed since the last backup (or just all data) can be backed up, using the son-father-grandfather or similar concept.
Backup of systems that Do Not shut down
Applying a transaction log and reapplying those transactions to get back to the point immediately before the failure.
disaster recovery plan
Consists of an entity's plan for restoring and continuing operations in the event of the destruction of program and data files, as well as processing capability.
Internally developed system: determine system requirements, design the overall system, determine type of network needed
purchased system: integrate with existing applications, provide training
Write and/or maintaining application programs.
Install, support(troubleshooting),monitor, and maintain the operating systems.
Schedule and run processing jobs.
Manage the functions and responsibilities of the IT department.
Store and protect programs from damage and unauthorized use.
Maintain the entity's data and ensures that production data is released only to authorized individuals when needed.
Responsible for the assignment of initial passwords and often the maintenance of those passwords.
Database Administrator (DBA)
Responsible for maintaining and supporting the database software and performing certain security functions.
Primary objective of data security controls:
To ensure that storage media are subject to authorization prior to access, change, or destruction.
4 general types of risks associated with information technology systems, whether the system is in development or in use.
Sets with similar terms
B6 Process Mgmt
Ch. 10 MIS
IS 300 - Chapter 10
Other sets by this creator
BEC STUDY GUIDE
BEC 1-Internal Control Frameworks
GSC Final Exam
Acc 400 Final Exam
Other Quizlet sets
Poetry Quiz 3
anat 10 (part 3)