Front Back
supply chain
commonly used to refer to a collection of companies and processes invloved in moving a product from the supplier of raw material to the suppilers of intermediate components, to final production, to customer. 
supply network
various interrelated parties involved in moving raw materials to intermediate components and finally to end product within production process. 
just in time
optimize ordering quantites of raw materials when they are needed. 
vendor managed inventory
business model in which the suppliers to a manufactturer manage the manufacture's inventory. 
bullwhip effect
major problem affecting supply chains are ripple effects. 
supply chain management
improve the coordination of suppliers, product or service production, and distribution. 
supply chain planning
development of various resourse plans to support the efficent and effective production of goods and services. 
supply chain execution
puts supply chain management planning into motion and reflects the processes involved in improving the collaboration of all members of the supply chain-suppliers, producers, distributors, and customers. 
product flow
movement of goods from the supplier to production, from production to distribution, to customer. 
information flow
movement of information along the supply chain, such as order processing and delivery status updates. 
financial flow
movement of financial assets throughout the supply chain. 
supply chain visilbility
abiltiy to track products as they move through the supply chain and also to foresee external events. 
supply chain analytics
use of key performance indicators to monitor performance of the entire supply chain including, planning, production, and distribution. 
supply chain efficency
extent to which a company's supply chain is focusing on minimizing procurement, production, and transportation coats, sometimes by sacrifing excellent customer service. 
supply chain effectiveness
extent to which a company's supply chain is focusing on maximixing customer service regardless of prourement, production, and transportation. 
extensible markup language
data presentation standards first specified by the word wide web consortium, and international consortium of companies whose purpose is to develope open standards of the web. 
xml tag
command that is inserted into an xlm document in order to specify how the document or a portion of the document should be interpreted and/or used. 
extensible business reporting lanaguage
an xlm based specification for publishing finanical information, 
radio frequency indentification
which is starting to replace the standard barcodes you find on almost every product. 
radio frequency i.d. tag
use of the elctromagnetic energy to transmit information between a reader and processing device. 
first-call resloution
addressing customer's issues during the first call, can help to save cost tremendously while increasing customer satisfaction. 
customer relationship management
when customer has relationshop with management. 
opertational crm
includes systems used to enable customers interaction and service. 
sales force automation
refers to systems to support the day to day sales activites of an organization. 
customer service and support
systems that automate service request, complaints, product returns, and information request. 
customer interaction center
using multiple communication to support the communication preferences of customers, such as facebook, face to face, and phone. 
enterprice marketing management
improving the management of promtional campaigns. 
analytical customer relationship management
focuses on analyzing customer behavior and perceptions in order to provide the business intelligence necessary to identify new opportunities and to provide superior customer service. 
collaborative customer relationship management
refers to systems for providing effective and efficent communication with the customers from the entire organization. 
making the business case
process of identifying, quantifying, and presenting the value provided by the system. 
productivity paradox
The observation that productivity increases at a rate that is lower than expected when new technologies are introduced. 
system effectiveness
extent to which a system enables people and/or the firm to accomplish goals or task well. 
system efficiency
extent to which a system enables people and/or the firm to do things faster, at lower costs, or with relatively little time and effort. 
total cost of ownership
focused on understanding not only the total cost of acquisition but also all costs associated with ongoing use and maintenance of a system. 
nonrecurring costs
one time costs that are not expected to continue after the system is implemented. 
recurring costs
costs that reoccur after the system is implemented. 
tangible costs
relatively easy to quantify 
non tangible costs
not relatively easy to quanify. 
tangible benefits
can be measured in dollars 
intangible benefits
Benefits that are not easily quantified; they include more efficient customer service or enhanced decision making. 
cost benefit analysis
economic model that compares the marginal costs and marginal benefits of a decision 
break even analysis
type cost benefit analysis to identify at what point tangible benefits equal tangible costs. 
net present value analysis
relevant cash flow streams associated with the system at the organizations discount rate. 
discount rate
rate of return used by an organiztion to complete the present value of future cash flows. 
weighted multicriteria analysis
one method for deciding among different IS investments, or when considering alternative designs for a given system. 
proxy variables
help clarify what the impact on the firm will be. 
systems analysis and design
process of designing, building, and maintaining information systems. 
system analyst
person who performs designing, building, and maintaining task. 
project manager
systems analyst needs a diverse set of management, leadership, technical, conflict management, and customer relationship skills. 
system development life cycles
describes the life of an information system from conception to retirement. 
systems planning and selection
understanding that it can work on only a limited number of projects at a given time because of limited resources, an organization must take care that only those projects that are critical to enabling the organizations' mission, goals, and objectives are undertaken. 
information systems planning
whereby a senior manager, a business group, an IS manger, or a steering committee identifies and assesses all possible systems development projects that an organization could undertake. 
system analysis
one purpose of the systems analysis phase is for designers to gain a thorough understanding of an organization's current way of doing things in the area for which the new information systems will be constructed. 
requirements collection
process of gathering and organizing information from users, mangers, customers, business processes, and documents to understand how a proposed information system should function. 
joint application design
a group meeting-based process for requirements collection. 
data flows
represents the movement of data through an organization or within an information system. 
processing logic
represents the way in which data are transformed. 
pseudocode
independent of the actual programming language being used. 
systems design
it is during this phase that the proposed system is designed; that is, the details of the chosen approach are elaborated. 
human-computer interface
the point of contact between a system and its users. 
systems implementation
one group of activities focuses on transforming the system design into a working information system. 
development, alpha, beta testing
a broad of tests are conducted before a system is completed. 
system conversion
process of decommissioning the current way of doing things and installing the new system in the organization. 
systems maintenance
process parallels the process used for the initial development of the information system. 
adaptive, perfective, preventive maintenance
are lover than corrective maintenance 
corrective maintenance
deals with repairing flaws in the system. 
patch management systems
to facilitate the different forms of software maintenance for the user; patch management systems use the internet to check the software vendor's web site for available patches and/or updates. 
prototyping
which uses a trial and error approach for discovering how a system should operate. 
end-user development
beyond systems development by trained professionals, some individuals within organizations build increasingly complex and useful applications. 
external acquisition
purchasing an existing system from an outside vendor such as IBM, HP enterprise services, or accenture. 
request for proposal
simply a document that is used to tell vendors what your requirements are and to invite them to provide information about how they might be able to meet those requirements. 
systems benchmarking
which is the use of standardized performance tests to facilitate comparison between systems. 
shrink wrap licenses and click wrap licenses
accompany the software and are used primarily for genetic, off the shelf application and systems software. 
enterprise licenses
can vary greatly and are usually negotiated. 
software asset management
help organizations to avoid such negative problems. 
computer crime
criminal act committed through the use of a computer, such as getting into someone else's system and changing information or creating a 
hacker
a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism 
cracker
a programmer who 'cracks' (gains unauthorized access to) computers, typically to do malicious things 
hacktivists
break into computer systems to promote political or ideological goals 
unauthorized access
the use of a computer or network without permission 
information modification
occurs when someone accesses electronic information and then changes the information in some way 
malware
software designed to infiltrate or damage a computer system without the user's informed consent 
virus
a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer 
worm
a software program capable of reproducing itself that can spread from one computer to the next over a network 
trojan horse
a program that appears desirable but actually contains something harmful 
logic bomb
A computer program or part of a program that lies dormant until it is triggered by a specific logical event. 
time bomb
a bomb that has a detonating mechanism that can be set to go off at a particular time 
denial of service attacks
occur when electronic intruders deliberately attempt to prevent legitimate users of a service from using that service, often by using up all of a systems resources 
zombie computers
infected computers that are located in homes, schools, and businesses, with viruses or worms 
spyware
computer software that is designed to collect personal info about users without their informed consent 
adware
forces unwanted advertising onto your computer screen. 
spam
unwanted e-mail (usually of a commercial nature sent out in bulk) 
spam filters
A device that catches unwanted email and filters it out before it gets delivered internally. The filtering is done based on rules that are established (block email coming from certain IP addresses, email that contains particular words in the subject line, and the like). They usually scan …
phishing
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail 
spim
Spam over Internet Messaging 
captcha
A distorted image of letters and numbers used to prevent automated use of websites 
cookie
a short line of text that a web site puts on your computer's hard drive when you access the web site 
botnets
take over computers and track key strokes 
bot herder
an attacker who controls several botnets 
identity theft
When someone uses your name, Social Security number, credit card number, and other personal information without your permission. 
internet hoax
false message circulated online about new viruses 
cybersquatting
registering domain names in the hope of selling them later at a higher price 
cyberharassment
The use of a computer to communicate obscene, vulgar, or threatening content to a person 
cyberstalking
stalking or harassment using electronic communications 
cyberbullying
using the Internet to inflict emotional or psychological harm 
online predators
Those who target vulnerable people, usually the young or old, for sexual or financial purposes 
software piracy
the illegal copying or use of computer programs 
warez
downloading and selling bootlegs or software violating their license 
intellectual property
The ownership of intangible and non-physical goods. This includes ideas, names, designs, symbols, artwork, writings, and other creations. 
patents
licenses that give an inventor the exclusive right to make, use, or sell an invention for a set period of time 
copyrights
rights that protect an idea or expression 
cyberwar
an assault on electronic communication networks 
web vandalism
The act of defacing Web sites 
patriot hackers
Independent citizens or supporters of a country that perpetrate attacks on perceived or real enemies 
cyberterrorism
the use of the computer to commit one or more terrorist acts 
information systems security
precautions taken to keep all aspects of information systems safe from unauthorized use or access 
risk analysis
The process of evaluating the possible problems of a technology compared to the expected advantages. 
risk reduction
Reduce risk to acceptable levels. 
risk acceptance
a strategy in which the organization accepts the potential risk, continues to operate with no controls, and absorbs any damages that occur 
risk transference
A risk response planning technique that shifts the impact of a threat to a third party, together with ownership of the response. 
authentication
a method for confirming users' identities 
biometrics
statistical analysis of biologic data 
access control software
may allow computer users access only to those files related to their work 
drive by hacking
an attackers accesses the network, intercepts data from it, and even uses network services and/or sends instructions to it without entering the home, office, or organization that owns the network 
virtual private network
A private data network that creates secure connections, or "tunnels," over regular Internet lines 
tunneling
narrow channel or passage with opening on both ends 
firewall
(computing) a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers 
encryption
Process of converting readable data into unreadable characters to prevent unauthorized access. 
certificate authority
A trusted third party, such as VeriSign, that validates user identities by means of digital certificates 
secure sockets layer
Technology that secures a Web site by encrypting information and providing authentication. 
virus prevention
a set of activities for detecting and preventing computer viruses 
audit control software
Applications that monitor and record computer transactions as they happen so auditors can trace and identify suspicious computer activity after the fact. 
backups
copies of files that you can use to replace the originals if they are lost or damaged 
backup sites
a company's office in a temporary location 
cold backup site
nothing more than an empty warehouse with all necessary connections for power and communication but nothing else 
hot backup site
A fully equipped backup facility, having everything from hardware, software, current data, and office equipment. 
mirrored
like or characteristic of a mirrored image 
collocation facilities
where organizations can rent space for their servers 
computer forensics
Using technology to search for computer evidence of a crime 
honeypot
A server intended to trap or trick attackers. 
acceptable use policies
Used to protect a network and the users on that network and provide guidelines to how a network can and should be used 
information systems security plan
involves assessing risks, planning ways to reduce risk, implementing the plan, and ongoing monitoring 
business continuity plan
Provides procedures for emergency responses, extended backup operations, and post-disaster recovery 
disaster recovery plan
A written document that details the process for restoring IT resources following an event that causes a significant disruption in service 
recovery time objectives
Maximum tolerance for loss of certain business function, basis of strategy 
recovery point objectives
specify how current the backup data should be 
information systems controls
the procedures, devices, or software aimed at preventing a compromise to a system 
information systems audit
purpose of this audit is to review and evaluate the internal controls that protect the system 
computer assisted auditing tools
Specific software that tests applications and data using test data or simulations

Access the best Study Guides, Lecture Notes and Practice Exams

Login

Join to view and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?