CIS 3010 2nd Set Study Guide
CIS 3010 2nd Set Study Guide
Popular in Computer Information Systems in Business
Popular in Department
This 14 page Study Guide was uploaded by Notetaker on Wednesday June 8, 2016. The Study Guide belongs to at California State University Los Angeles taught by in Spring 2016. Since its upload, it has received 157 views.
Reviews for CIS 3010 2nd Set Study Guide
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 06/08/16
Computer Information Systems in Business Spring 2016 Study Guide Chapter 7 ____________________________________________________________________________ This section’s summary: Enterprise Systems Each department has their own IS (ex: sales & marketing: lead generation/tracking) Problems and Solution of Silos ____________________________________________________________________________ Information Systems By Scope (4 levels) 1. Personal Information Systems a. Single User b. Procedures Simple c. Easy to manage change d. Drug Salesperson 2. Workgroup IS a. 10100 users b. Procedures/ problem solutions understood and worked within group c. Facilitate activities of a group of ppl. d. Physicians’ partnership: Doctors, nurses, and staff manage patient appointments Departmental IS a. Workgroup IS support a department b. Accounts payable system Functional IS a. Prospect tracking application Computer Information Systems in Business Spring 2016 Study Guide 3. Enterprise IS a. 1001Ks users b. Span an organization and support activities of people in multiple departments c. Procedures formalized, problem solutions affect enterprise d. Hospitals: Doctors, pharmacy, the kitchen 4. Interenterprise IS a. 1,000+ users b. Shared by two or more independent organizations c. Problem solutions affect multiple organizations d. Patients, healthcare providers, health clubs, insurance companies have an interest in individual performance data Information silo data are isolated in separated IS Comes into existence as entities at one organization level create IS that meet only their particular needs One department has several applications that support each Sales: Lead generation, tracking, customer management Operations: Order entry, management, inventory Manufacturing: Planning, Scheduling, Ops. Customer Service: Order and account tracking HR: Assessment, Recruiting, Compensation Accounting: General ledger, Cost accounting, AR, AP, Cash management What are the problems in Silos? (Five) One department develop IS solely for its own needs Computer Information Systems in Busine s Spring 2016 Study Guide Applications isolated, business processes disjointed 1. Data inconsistencydata integrity problem 2. Disjointed processes 3. Limited info and lack of integrated info 4. Isolated decisions→ Organizational inefficiencies 5. Increased Expenses $$$ Solution: Allow the isolation, but manage it to avoid problems + Enterprisewide (CRM, ERP, EAI) applications integrate isolated data + Distributed systems using Web services tech in the cloud Business process reengineering: a ctivities of altering existing and designing new business processes to take advantage of new information systems Problems: Expensive, took lots of time Develop applications inhouse Personnel did not know if they were using the new, old, or hacked up version of the system Solution: Inherent processes: Predesigned procedures(license) for using software products 1. CRM: Lead Management, Sales Applications, Relationship Management Applications, Customer Support a. Customer life cycle: Computer Information Systems in Business Spring 2016 Study Guide i. Marketing→ Customer acquisition→ relationship management→ Loss/churn(win back high valued customers) 2. ERP: Consolidating business operations into a single platform a. HR Applications, Inventory, Manufacturing, Accounting b. SAPworldwide leader of ERP vendors 3. EAI: a. Connects system islands via a new layer of software b. Enables existing applications to communicate and share data c. Leverages existing systems d. Gradual move to ERP Challenges Enterprise Systems(4) 1. Collaborate Management 2. Requirement Gaps 3. Transition 4. Employee Resistance: a. Selfefficacies Employee can be successful at the job ____________________________________________________________ Chapter 8 Notes: ____________________________________________________________________________ This section’s moral of the story: Social Media IS Principles, conceptual frameworks, models If you are not paying, then you are the product (rent your eyeballs to ads) Computer Information Systems in Busine s Spring 2016 Study Guide ____________________________________________________________________________ Chapter 08: SMIS SMIS IS that supports the sharing of content among network of users Roles: 1. Social Media Providers: a. Facebook, Google, LinkedIn b. Psych, Sociology, CS, MIS, Marketing, Organizational Theory→ Social Media 2. Users: Individuals and orgs use SM sites to build social relationships 3. Communities(groups of ppl w/common interests): a. Viral Hook: Some inducement for passing communications SMIS Components: Hardware: a. Elastic, cloudbased servers, b. User computing devices Software: a. Application, NoSQL, b. User: Browser, iOS, Android Data: Content and connection data for rapid retrieval Procedures: a. Run and maintain application Computer Information Systems in Busi ess Spring 2016 Study Guide b. User: Create and manage content People Social Media and 1. Sales and Marketing: a. Social CRM: Organization and customers create and process content b. P2P sales 2. Customer Service: a. P2P support 3. Inbound Logistics: a. Problem solving 4. Outbound Logistics: a. Problem solving 5. Manufacturing and operations: a. Crowdsourcing: Userguided design b. B2C: Industry relationships i. B2B c. Operational efficiencies 6. HR: a. SharePoint Capital: Investment of resources for future profits Human capital Investment in Human Knowledge and skills Social Capital Investment in social relations with expectation of returns in the marketplace AKA SC = # of relationship X Relationship Strength X Entity Resources Computer Information Systems in Business Spring 2016 Study Guide 1. Information about opportunities 2. Influence 3. Social Cred 4. Personal reinforcement Value of Social Capital: # of social network relationships Strength of a relationship: Likelihood that the other entity will benefit the org SM Revenues: Payperclick Freemium: Basic service for free, but charges for upgrades SMIS Security Concerns: SM Policy Employees’ rights and responsibilities 1. Disclose 2. Protect 3. Common Sense UGC Content on SM site that is contributed by users Problems of UGC: 1. Junk and crackpot 2. Inappropriate content 3. Unfavorable reviews 4. Mutinous Movements Responses to SM Probs: 1. Leave it 2. Respond 3. Delete Computer Information Systems in Business Spring 2016 Study Guide ____________________________________________________________ Chapter 9 ____________________________________________________________________________ Bottom line: BI is a critical skill, understand analytics(raw data→ better business decisions) 3 phrases of BI Analysis ____________________________________________________________________________ BI systems: IS that process operational data to analyze past performance(make predictions) + Project Management + Problem Solving + Deciding + Informing Amazon: “Customer who bought...also bought”= Identifying changes in Purchasing Patterns Predictive policing: A nalyze data on past crimes BI Process(3 activities): Computer Information Systems in Business Spring 2016 Study Guide 1. BI analysis: Create BI a. Reporting b. Data mining c. BigData 2. PuBlish results: BI to knowledge workers a. Push Publishing Deliver BI results to User b. Pull Publishing User Requests BI results Data Warehouses: 1. Obtain Data 2. Change 3. Organise and relate data 4. Catalog Data Mart Data collection that address the needs of a particular department or functional area of the business Processing BI Data : 1. Reporting: Sorting, formatting structured data(data in rows and columns) 2. Data Mining: Classify and Predict a. Unsupervised: do not create a model before analysis i. Cluster analysis: Identify entity groups that have similar characteristics b. Supervised: Apply stat techniques to data to estimate parameters of the model Computer Information Systems in Business Spring 2016 Study Guide i. Regression: Measure impact of a set of variables on another variable 3. BigData: Huge volume, rapid velocity, great variety data collections a. MapReduce: Harnessing power of thousands of computers working in parallel b. Hadoop: Manages 1K computers, drive the process of finding and counting Google search terms, Query language: Pig BI Publishing server alternatives Email Static Manual Web Server Static/ Alert/RSS Dynamic Reports: BI Documents that are updated at the time they are requested SharePoint Static/Dyn Alert BI Server Dynamic Subscription Web Server User requests for application that is particular BI purposebuilt for results on a publishing of BI particular schedule or in response to events Computer Information Systems in Business Spring 2016 Study Guide ____________________________________________________________ Chapter 10: Security ____________________________________________________________________________ Bottom line: ● Be aware of threats to computer security ● Use Strong Passwords ____________________________________________________________________________ Security Threat ● Threat person/org that seeks to obtain data illegally ● Vulnerability Opportunity for threats to gain access to assets ● Safeguard measure taken to block threat from obtaining asset ● Target Asset desired by threat Sources of Threats 1. Human Error: Accidental probs 2. Computer Crime: Intentionally destroy data or syst. Components (Hackers) a. Pretexting Phone Caller pretends to be from a credit card company b. Phishing Pretends to be a legit co. and sends an email requesting confidential data c. SpoofingPretend to be someone else i. IP spoofing when an intruder uses another site’s IP address to masquerade d. Sniffing intercept computer communications Computer Information Systems in Business Spring 2016 Study Guide i. WarDrivers Take Computers with wireless connections thru an area and search for unprotected wireless networks ii. Adware iii. Spyware e. Hacking breaking into computers, servers, or netowrks to steal data such as customer lists f. Usurpation computer crimes invade a computer system and replace legit programs with their own unauthorized ones that shut down legit applications g. DoS shut down a Web server by starting a computationally intensive application 3. Natural Disasters ● APT(Advanced Persistent Threat) cyber warfare and cyberespionage used by governments Respond to Security Threats: IDS Computer program that senses when another computer is attempting to scan or access a computer Brute force attack Password cracker tries every possible combination of characters Cookies Small files that your browser receives, enable access Web sties w/o having to sign in every time you visit Safeguards: Technical: Hardware & Software a. Identification(username) & authorization(who you claim to be) Computer Information Systems in Business Spring 2016 Study Guide b. Firewalls c. Malware Protection d. Application Design Data: Data rights and responsibilities a. Passwords b. Encryptions c. Backup and recovery d. Physical security Human: Procedures & People a. Education, Training, Administration, Assessment ____________________________________________________________ Chapter 12 ____________________________________________________________________________ This section’s summary: Protect yourself, have less victims Companies distinguish themselves from their competitors either by cost or qualit ____________________________________________________________________________ Chapter 12: Security Don’t use the same passwords for different websites, combination of something Example: first two letters of someone important, Main reason: Convenience Using cookies: browsers use file saved to spy on you, what products you are interested in Computer Information Systems in Business Spring 2016 Study Guide Cookie is a program that saves your stuff Update antivirus software, virus change regularly How should organizations respond to security threats? Encrypt data make readable data by scrambling it. Simple data algorithm. How can technical safeguards protect against security threats? Symmetric: Asymmetric: One Key to Encrypt, One Key to Decrypt FireWalls: First layer that you hit, break the package Viruses: Payload Source code that replicates Symptoms: Lots of popups Slowdown computer Cursor moving without you moving it Music playing without knowing the source Shutdown of computer
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'