MGMT 345: FINAL EXAM
149 Cards in this Set
Front | Back |
---|---|
supply chain
|
commonly used to refer to a collection of companies and processes invloved in moving a product from the supplier of raw material to the suppilers of intermediate components, to final production, to customer.
|
supply network
|
various interrelated parties involved in moving raw materials to intermediate components and finally to end product within production process.
|
just in time
|
optimize ordering quantites of raw materials when they are needed.
|
vendor managed inventory
|
business model in which the suppliers to a manufactturer manage the manufacture's inventory.
|
bullwhip effect
|
major problem affecting supply chains are ripple effects.
|
supply chain management
|
improve the coordination of suppliers, product or service production, and distribution.
|
supply chain planning
|
development of various resourse plans to support the efficent and effective production of goods and services.
|
supply chain execution
|
puts supply chain management planning into motion and reflects the processes involved in improving the collaboration of all members of the supply chain-suppliers, producers, distributors, and customers.
|
product flow
|
movement of goods from the supplier to production, from production to distribution, to customer.
|
information flow
|
movement of information along the supply chain, such as order processing and delivery status updates.
|
financial flow
|
movement of financial assets throughout the supply chain.
|
supply chain visilbility
|
abiltiy to track products as they move through the supply chain and also to foresee external events.
|
supply chain analytics
|
use of key performance indicators to monitor performance of the entire supply chain including, planning, production, and distribution.
|
supply chain efficency
|
extent to which a company's supply chain is focusing on minimizing procurement, production, and transportation coats, sometimes by sacrifing excellent customer service.
|
supply chain effectiveness
|
extent to which a company's supply chain is focusing on maximixing customer service regardless of prourement, production, and transportation.
|
extensible markup language
|
data presentation standards first specified by the word wide web consortium, and international consortium of companies whose purpose is to develope open standards of the web.
|
xml tag
|
command that is inserted into an xlm document in order to specify how the document or a portion of the document should be interpreted and/or used.
|
extensible business reporting lanaguage
|
an xlm based specification for publishing finanical information,
|
radio frequency indentification
|
which is starting to replace the standard barcodes you find on almost every product.
|
radio frequency i.d. tag
|
use of the elctromagnetic energy to transmit information between a reader and processing device.
|
first-call resloution
|
addressing customer's issues during the first call, can help to save cost tremendously while increasing customer satisfaction.
|
customer relationship management
|
when customer has relationshop with management.
|
opertational crm
|
includes systems used to enable customers interaction and service.
|
sales force automation
|
refers to systems to support the day to day sales activites of an organization.
|
customer service and support
|
systems that automate service request, complaints, product returns, and information request.
|
customer interaction center
|
using multiple communication to support the communication preferences of customers, such as facebook, face to face, and phone.
|
enterprice marketing management
|
improving the management of promtional campaigns.
|
analytical customer relationship management
|
focuses on analyzing customer behavior and perceptions in order to provide the business intelligence necessary to identify new opportunities and to provide superior customer service.
|
collaborative customer relationship management
|
refers to systems for providing effective and efficent communication with the customers from the entire organization.
|
making the business case
|
process of identifying, quantifying, and presenting the value provided by the system.
|
productivity paradox
|
The observation that productivity increases at a rate that is lower than expected when new technologies are introduced.
|
system effectiveness
|
extent to which a system enables people and/or the firm to accomplish goals or task well.
|
system efficiency
|
extent to which a system enables people and/or the firm to do things faster, at lower costs, or with relatively little time and effort.
|
total cost of ownership
|
focused on understanding not only the total cost of acquisition but also all costs associated with ongoing use and maintenance of a system.
|
nonrecurring costs
|
one time costs that are not expected to continue after the system is implemented.
|
recurring costs
|
costs that reoccur after the system is implemented.
|
tangible costs
|
relatively easy to quantify
|
non tangible costs
|
not relatively easy to quanify.
|
tangible benefits
|
can be measured in dollars
|
intangible benefits
|
Benefits that are not easily quantified; they include more efficient customer service or enhanced decision making.
|
cost benefit analysis
|
economic model that compares the marginal costs and marginal benefits of a decision
|
break even analysis
|
type cost benefit analysis to identify at what point tangible benefits equal tangible costs.
|
net present value analysis
|
relevant cash flow streams associated with the system at the organizations discount rate.
|
discount rate
|
rate of return used by an organiztion to complete the present value of future cash flows.
|
weighted multicriteria analysis
|
one method for deciding among different IS investments, or when considering alternative designs for a given system.
|
proxy variables
|
help clarify what the impact on the firm will be.
|
systems analysis and design
|
process of designing, building, and maintaining information systems.
|
system analyst
|
person who performs designing, building, and maintaining task.
|
project manager
|
systems analyst needs a diverse set of management, leadership, technical, conflict management, and customer relationship skills.
|
system development life cycles
|
describes the life of an information system from conception to retirement.
|
systems planning and selection
|
understanding that it can work on only a limited number of projects at a given time because of limited resources, an organization must take care that only those projects that are critical to enabling the organizations' mission, goals, and objectives are undertaken.
|
information systems planning
|
whereby a senior manager, a business group, an IS manger, or a steering committee identifies and assesses all possible systems development projects that an organization could undertake.
|
system analysis
|
one purpose of the systems analysis phase is for designers to gain a thorough understanding of an organization's current way of doing things in the area for which the new information systems will be constructed.
|
requirements collection
|
process of gathering and organizing information from users, mangers, customers, business processes, and documents to understand how a proposed information system should function.
|
joint application design
|
a group meeting-based process for requirements collection.
|
data flows
|
represents the movement of data through an organization or within an information system.
|
processing logic
|
represents the way in which data are transformed.
|
pseudocode
|
independent of the actual programming language being used.
|
systems design
|
it is during this phase that the proposed system is designed; that is, the details of the chosen approach are elaborated.
|
human-computer interface
|
the point of contact between a system and its users.
|
systems implementation
|
one group of activities focuses on transforming the system design into a working information system.
|
development, alpha, beta testing
|
a broad of tests are conducted before a system is completed.
|
system conversion
|
process of decommissioning the current way of doing things and installing the new system in the organization.
|
systems maintenance
|
process parallels the process used for the initial development of the information system.
|
adaptive, perfective, preventive maintenance
|
are lover than corrective maintenance
|
corrective maintenance
|
deals with repairing flaws in the system.
|
patch management systems
|
to facilitate the different forms of software maintenance for the user; patch management systems use the internet to check the software vendor's web site for available patches and/or updates.
|
prototyping
|
which uses a trial and error approach for discovering how a system should operate.
|
end-user development
|
beyond systems development by trained professionals, some individuals within organizations build increasingly complex and useful applications.
|
external acquisition
|
purchasing an existing system from an outside vendor such as IBM, HP enterprise services, or accenture.
|
request for proposal
|
simply a document that is used to tell vendors what your requirements are and to invite them to provide information about how they might be able to meet those requirements.
|
systems benchmarking
|
which is the use of standardized performance tests to facilitate comparison between systems.
|
shrink wrap licenses and click wrap licenses
|
accompany the software and are used primarily for genetic, off the shelf application and systems software.
|
enterprise licenses
|
can vary greatly and are usually negotiated.
|
software asset management
|
help organizations to avoid such negative problems.
|
computer crime
|
criminal act committed through the use of a computer, such as getting into someone else's system and changing information or creating a
|
hacker
|
a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism
|
cracker
|
a programmer who 'cracks' (gains unauthorized access to) computers, typically to do malicious things
|
hacktivists
|
break into computer systems to promote political or ideological goals
|
unauthorized access
|
the use of a computer or network without permission
|
information modification
|
occurs when someone accesses electronic information and then changes the information in some way
|
malware
|
software designed to infiltrate or damage a computer system without the user's informed consent
|
virus
|
a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
|
worm
|
a software program capable of reproducing itself that can spread from one computer to the next over a network
|
trojan horse
|
a program that appears desirable but actually contains something harmful
|
logic bomb
|
A computer program or part of a program that lies dormant until it is triggered by a specific logical event.
|
time bomb
|
a bomb that has a detonating mechanism that can be set to go off at a particular time
|
denial of service attacks
|
occur when electronic intruders deliberately attempt to prevent legitimate users of a service from using that service, often by using up all of a systems resources
|
zombie computers
|
infected computers that are located in homes, schools, and businesses, with viruses or worms
|
spyware
|
computer software that is designed to collect personal info about users without their informed consent
|
adware
|
forces unwanted advertising onto your computer screen.
|
spam
|
unwanted e-mail (usually of a commercial nature sent out in bulk)
|
spam filters
|
A device that catches unwanted email and filters it out before it gets delivered internally. The filtering is done based on rules that are established (block email coming from certain IP addresses, email that contains particular words in the subject line, and the like). They usually scan …
|
phishing
|
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail
|
spim
|
Spam over Internet Messaging
|
captcha
|
A distorted image of letters and numbers used to prevent automated use of websites
|
cookie
|
a short line of text that a web site puts on your computer's hard drive when you access the web site
|
botnets
|
take over computers and track key strokes
|
bot herder
|
an attacker who controls several botnets
|
identity theft
|
When someone uses your name, Social Security number, credit card number, and other personal information without your permission.
|
internet hoax
|
false message circulated online about new viruses
|
cybersquatting
|
registering domain names in the hope of selling them later at a higher price
|
cyberharassment
|
The use of a computer to communicate obscene, vulgar, or threatening content to a person
|
cyberstalking
|
stalking or harassment using electronic communications
|
cyberbullying
|
using the Internet to inflict emotional or psychological harm
|
online predators
|
Those who target vulnerable people, usually the young or old, for sexual or financial purposes
|
software piracy
|
the illegal copying or use of computer programs
|
warez
|
downloading and selling bootlegs or software violating their license
|
intellectual property
|
The ownership of intangible and non-physical goods. This includes ideas, names, designs, symbols, artwork, writings, and other creations.
|
patents
|
licenses that give an inventor the exclusive right to make, use, or sell an invention for a set period of time
|
copyrights
|
rights that protect an idea or expression
|
cyberwar
|
an assault on electronic communication networks
|
web vandalism
|
The act of defacing Web sites
|
patriot hackers
|
Independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies
|
cyberterrorism
|
the use of the computer to commit one or more terrorist acts
|
information systems security
|
precautions taken to keep all aspects of information systems safe from unauthorized use or access
|
risk analysis
|
The process of evaluating the possible problems of a technology compared to the expected advantages.
|
risk reduction
|
Reduce risk to acceptable levels.
|
risk acceptance
|
a strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur
|
risk transference
|
A risk response planning technique that shifts the impact of a threat to a third party, together with ownership of the response.
|
authentication
|
a method for confirming users' identities
|
biometrics
|
statistical analysis of biologic data
|
access control software
|
may allow computer users access only to those files related to their work
|
drive by hacking
|
an attackers accesses the network, intercepts data from it, and even uses network services and/or sends instructions to it without entering the home, office, or organization that owns the network
|
virtual private network
|
A private data network that creates secure connections, or "tunnels," over regular Internet lines
|
tunneling
|
narrow channel or passage with opening on both ends
|
firewall
|
(computing) a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers
|
encryption
|
Process of converting readable data into unreadable characters to prevent unauthorized access.
|
certificate authority
|
A trusted third party, such as VeriSign, that validates user identities by means of digital certificates
|
secure sockets layer
|
Technology that secures a Web site by encrypting information and providing authentication.
|
virus prevention
|
a set of activities for detecting and preventing computer viruses
|
audit control software
|
Applications that monitor and record computer transactions as they happen so auditors can trace and identify suspicious computer activity after the fact.
|
backups
|
copies of files that you can use to replace the originals if they are lost or damaged
|
backup sites
|
a company's office in a temporary location
|
cold backup site
|
nothing more than an empty warehouse with all necessary connections for power and communication but nothing else
|
hot backup site
|
A fully equipped backup facility, having everything from hardware, software, current data, and office equipment.
|
mirrored
|
like or characteristic of a mirrored image
|
collocation facilities
|
where organizations can rent space for their servers
|
computer forensics
|
Using technology to search for computer evidence of a crime
|
honeypot
|
A server intended to trap or trick attackers.
|
acceptable use policies
|
Used to protect a network and the users on that network and provide guidelines to how a network can and should be used
|
information systems security plan
|
involves assessing risks, planning ways to reduce risk, implementing the plan, and ongoing monitoring
|
business continuity plan
|
Provides procedures for emergency responses, extended backup operations, and post-disaster recovery
|
disaster recovery plan
|
A written document that details the process for restoring IT resources following an event that causes a significant disruption in service
|
recovery time objectives
|
Maximum tolerance for loss of certain business function, basis of strategy
|
recovery point objectives
|
specify how current the backup data should be
|
information systems controls
|
the procedures, devices, or software aimed at preventing a compromise to a system
|
information systems audit
|
purpose of this audit is to review and evaluate the internal controls that protect the system
|
computer assisted auditing tools
|
Specific software that tests applications and data using test data or simulations
|