This site is 100% ad supported. Please add an exception to adblock for this site.

k201

Terms

undefined, object
copy deck
ethics
principles and standards that guide our behavior towards others
intellectual property
intangible creative work thats embodied in physical form
copyright
legal protection afforded an expression of an idea
fair use doctrine
its legal to use copyrighted materials sometimes
epolicies
policies and procedure that address the ethical use of computers and internet usage in business environment
opt-in
only contact people who agreed to receive promotions and marketing material via email
ethical computer use policy
general principles to guide computer user behavior i.e. dont play computer games while during work hours
information privacy policy
using information for only intended purpose. classic misuse: social security number (retirement benefits --> many uses)
acceptable use policy (AUP)
user must agree to term to be able to use internet/network
nonrepudiation
contract stipulation that e-businesses dont try to deny their online actions
email private policy
email system owner can read anything he wants; so users need to consent to the amount of intrusion
internet use policy
to limit offensive material, for example
information technology monitoring
tracking ppl's activities like # of keystrokes, error rt, and number of transactions processed
employee monitoring policies
says when, how, and where company is monitoring employees
key logger, key trapper
records every keystroke and mouse click
hardware key logger
records keystrokes on their journey from keyboard to motherboard
cookie
small file deposited on hard drive by web site allowing them to know when ppl come/go
adware
generates ads that install themselves on a computer while you're doing other things
spyware
comes in free downloads that tracks online movements, gets info, or uses your CPU
web log
online line of info for every visitor to a website
clickstream
records info about a someones web surfing whereabouts (how long visit was, ads views, purchases)
information security
protection of info from accidental or intentional misuse by ppl
insiders
legitimate users who accidentally/intentionally misuse access to info and cause incidents; ie ppl who write passwords on post-its
social engineering
using ones social sills to trick people into revealing access credentials or other valuable info
IDS
intrusion detection software
phishing
technique to gain personal info for identity via email asking for id/password confirmations
tokens
change passwords everytime the token is used to be entered in
biometrics
identification of a user via physical characteristic i.e. fingerprint, voice, iris
content filtering
filtering software to prevent transmission of unauthorized info; can apply to spam
encryption
scrambles info that needs a key/password to be read
PKE
public key encryption - 2 keys i.e. user sends credit info via email uses 1 key to scramble, organization uses 2nd key to unscramble and read
firewall
hardware/software that guards a private network by analyzing info going/coming from the network
antivirus software
detect and find who/what is responsible
worm
spreads from computer to computer; viruses need and executable file
enterprise architecture
plans for how an organization will build, deploy, use and share its data, processes and IT assets
EA
enterprise architect - person grounded in tech, fluent in business; bridge between IT and business
information architecture
where and how important info is maintained and secured
infrastructure architecture
hardware, software, and telecommunications equipment that provide underlying foundation to support organization goals
application architecture
determines how applications integrate and relate to each other
fault tolerance
computer system designed that in case of a failure a backup component can be integrated w/o loss of service
failover
backup where the functions of a failed computer component get taken over by a secondary system
hot site
separate and fully equipped facility where company can move immediately after a disaster and resume business
cold site
separate facility that doesnt have computer stuff but people can go there after a disaster
disaster recovery cost curve
money vs. time from disaster to recovery - intersection = optimal disaster recovery plan in terms of cost and time
scalability
how well a system can adapt to increased demands
capacity planning
future IT infrastructure requirements for new equipment and additional network capacity
web services
repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services
interoperability
capability of 2 or more computer systems to share data and resources
open system
nonproprietary IT hardware/software - allow for information sharing
SDLC
systems development life cycle - planning, analysis, design, development, testing, implementation, maintenance
waterfall methodology
sequential, activity-based process in which each phase is performed sequentially
RAD
rapid application development - extensive user involvement in the rapid and evolutionary construction of working prototypes
XP
extreme programming methodology - project separated into tiny phases and cannot continue onto next phase until 1st phase complete
agile methodology
form of XP - aims for customer satisfaction via early and continuous delivery of useful software components
ITIL
information technology infrastructural ibrary - framework of best practice approaches to deliver high quality IT services
scope creep
scope of project increases
feature creep
developers add extra features that were not part of the initial requirements
project management
application of knowledge, skills, tools, and techniques to project activities; time + cost + scope = quality
hierarchical database model
info organized into tree like structure, one parent-multiple children, allows repeating info, cannot have too many relationships
network database model
multiple parents-multiple children, lattice structure
relational database model
logically related 2D tables
physical view
info on a storage device like a hard disk
logical view
users logically access info to meet business needs
relational integrity constraints
rules that enforce basic information-based constraints i.e. not allowing someone to create an order for a nonexistent person
business-critical integrity constraints
important for a business to survive i.e. Kroger not accepting returns after 15 days post delivery
DBMS
database management system - software through which users and application programs interact with a database
data-driven web site
constantly updated and relevant to the needs of its customers via a database
integration
allows separate systems to communicate directly with each other i.e. customer info --> order entry, billing, sales, order fulfillment
forward integration
sales --> order entry --> order fulfillment --> billing
backwards integration
billing --> order fulfillment --> order entry --> sales
ETL
extraction, transformation, loading - gets info from external/internal databases, standardize info, upload into data warehouse
data mart
subset of data warehouse
data mining
analyzing data to extract info not offered by raw data alone
cube
multidimensional database
data-mining tools
i.e. query, reporting, statistical tools, etc.
info cleansing/scrubbing
finds and fixes or discards info thats inconsistent, incorrect or incomplete
BI
business intelligence - applications and technologies used to gather, provide access, and analyze data to support decision-making efforts
info levels
individual, enterprise, department
info formats
document, presentation, spreadsheet, database
info granularities
detail (fine), summary aggregates (coarse)
transactional information
i.e. airline ticket, sales receipt, packing slip - support performing of daily operational tasks
analytical information
i.e. product stats, sales projections, future growth, trends (organizational info) - supports performing of managerial analysis tasks
SCM
supply chain management - management of info flows between and among stages in a supply chain to maximize effectiveness and profitability
CRM
customer relationship management - managing customer-organization relationship to increase customer loyalty, retention, and profitability
BPR
business process reengineering - redesign of workflow within and between enterprises
ERP
enterprise resource planning - integrates all departments and functions in an organization into a single IT system.
KPI
key performance indicators - metrics
efficiency IT metrics
measure performance of the IT system; throughput, speed, and availability
effectiveness IT metrics
measure impact IT has on business processes/activities; customer satisfaction, conversion rates.
balanced scorecard
provides feedback around internal/external outcomes to continuously improve strategic performance and results
CIO
chief information officer - reports to CEO, oversees IT uses and alignment with business goals
CTO
chief technology officer - ensure throughput, speed, accuracy, availability and reliability.
CPO
chief privacy officer - ensure ethical and legal use of info w/ in an organization
CKO
chief knowledge officer - collecting maintaining and distributing the organizations knowlege
information partnership
two or more organizations cooperate by integrating their IT systems so customers can have best of both worlds
collaboration system
IT-based set of tools that supports the work of teams by facilitating the sharing and flow of info
unstructured collaboration
includes document exchange, shared whiteboards, discussion forums, email
structure collaboration
shared participation in business processes - workflow
KM
knowledge management - capturing, classifying, evaluating, retrieving and sharing info assets in a way that provides context for effective decisions and actions
KMS
knowledge management systems
explicit knowledge
stuff that can be documented, archived, and codified
tacit knowledge
stuff in ppls heads
SNA
social networking analysis - mapping a groups contacts to ID who works with who

Deck Info

103

janejhe

permalink