100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ISA 235 MIAMI UNIVERSITY EXAM 1 (CH. 1- 4) WITH COMPLETE SOLUTIONS

Rating
-
Sold
-
Pages
30
Grade
A+
Uploaded on
20-01-2025
Written in
2024/2025

ISA 235 MIAMI UNIVERSITY EXAM 1 (CH. 1- 4) WITH COMPLETE SOLUTIONS "business intelligence (BI) - Correct Answer information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyze patterns, trends, and relationship for strategic decision making" "analytics - Correct Answer the science of fact-based decision making" "internet of things - Correct Answer a world where interconnected, internet-enabled devices or "things" can collect & share data without human intervention" "intelligent agent - Correct Answer a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users" "augmented reality - Correct Answer the viewing of the physical world of computer-generated layers of information added to it" "dynamic process - Correct Answer a continuously changing process that provides business solutions to ever-changing business operations" "workflow - Correct Answer includes the tasks, activities, and responsibilities required to execute each step in a business process" "workflow control systems - Correct Answer monitor processes to ensure tasks, activities, and responsibilities are executed as specified" "machine to machine (M2M) - Correct Answer devices that connect directly to other devices" "data - Correct Answer raw facts that describe the characteristics of an event or object" "structured data - Correct Answer data that has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address" "machine-generated data - Correct Answer data created by a machine without human intervention" "human-generated data - Correct Answer data that humans, in interaction with computers, generate" "unstructured data - Correct Answer data that is not defined and does not follow a specified format and is typically free-form text such as emails, Twitter tweets, and text messages" "big data - Correct Answer a collection of rare, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods & tools" "snapshot - Correct Answer a view of data at a particular moment in time" "Data example - Correct Answer order date, amount sold, customer number, quantity ordered" "information example - Correct Answer best-selling product, best customer, worst-selling product, worst customer" "business intelligence example - Correct Answer lowest sales per week compared with the economic interest rates, best-selling product by month compared to sports season and city team wins and losses" "knowledge example - Correct Answer choosing not to fire a sales representative who is underperforming knowing that person is experiencing family problems, listing products that are about to expire first on the menu or creating them as a daily special to move the product" "information - Correct Answer data converted into a meaningful and useful context" "report - Correct Answer a document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information" "static report - Correct Answer a report created once based on data that does not change" "dynamic report - Correct Answer a report that changes automatically during creation" "variable - Correct Answer a data characteristic that stands for a value that changes or varies over time" "predictive analytics - Correct Answer extracts information from data and uses it to predict future trends and identify behavioral patterns" "behavior analytics - Correct Answer uses data about people's behaviors to understand intent and predict future actions" "knowledge - Correct Answer skills, experience, and expertise coupled with information and intelligence that creates a person's intellectual resources" "knowledge worker - Correct Answer individuals values for their ability to interpret and analyze information" "accounting - Correct Answer records, measures, and reports monetary transactions" "finance - Correct Answer deals with strategic financial issues including money, banking, credit, investments, and assets" "human resources - Correct Answer maintains policies, plans, and procedures for the effective management of employees" "marketing - Correct Answer supports sales by planning, pricing, and promoting goods or services" "operations management - Correct Answer manages the process of converting or transforming or resources into goods or services" "sales - Correct Answer performs the function of selling goods or services" "system - Correct Answer a collection of parts that link to achieve a common purpose" "goods - Correct Answer material items or products that customers will buy to satisfy a want or need. clothing, groceries, cell phones, and cards are all examples of goods that people buy to fulfill their needs" "service - Correct Answer tasks that customers will buy to satisfy a want or need" "productivity - Correct Answer the rate at which goods and services are produced based upon total output given total inputs" "production - Correct Answer there process where a business takes raw materials and processes them or converts them into a finished product for its goods or services" "systems thinking - Correct Answer a way of monitoring the entire system by viewing multiple inputs being processed or transformed to product outputs while continuously gathering feedback on each part" "feedback - Correct Answer information that returns to its original transmitter (input, transform, or output) and modifies the transmitter's actions" "management information systems (MIS) - Correct Answer a business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making & problem solving" "chief information officer (CIO) - Correct Answer responsible for: 1) overseeing all uses of MIS and 2) ensuring that MIS strategically aligns with business goals and objectives" "chief data officer - Correct Answer responsible for determining the types of information the enterprise will capture, retain, analyze, and share" "chief technology officer (CTO) - Correct Answer responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology" "chief security officer (CSO) - Correct Answer responsible for ensuring the security of MIS systems and developing strategies and MIS safeguards against attacks from hackers and viruses" "chief privacy officer (CPO) - Correct Answer responsbile for ensuring the ethical and legal use of information within a company" "chief knowledge officer (CKO) - Correct Answer responsbile for collecting, maintaining, and distributing company knowledge" "chief intellectual property officer - Correct Answer manage and defend intellectual property, copyrights, and patens" "chief automation officer - Correct Answer determines if a person or business process can be replaced by a robot or software" "chief user experience officer - Correct Answer create the optimal relationship between user and technology" "MIS skills gap - Correct Answer the difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies" "business strategy - Correct Answer a leadership plan that achieves a specific set of goals or objectives such as increasing sales, decreasing costs, entering new markets, or developing new products or services" "stakeholder - Correct Answer a person or group that has an interest or concern in an organization" "competitive advantage - Correct Answer a feature of a product or service on which customers place a greater value than on similar offerings from competitors" "first-mover advantage - Correct Answer an advantage that occurs when a company can significantly increase its market share by being first to market with a competitive advantage" "competitive intelligence - Correct Answer the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed" "SWOT analysis - Correct Answer evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies" "Porter's 5 Forces Model - Correct Answer a model for analyzing the competitive forces within the environment in which a company operates, to assess the potential for profitability in an industry" "buyer power - Correct Answer the ability of buyers to affect the price they must pay for an item" "switching costs - Correct Answer costs that make customers reluctant to switch to another product or service" "loyalty program - Correct Answer a program to reward customers based on spending" "supply chain - Correct Answer all parties involved, directly or indirectly, in obtaining raw materials or a product" "rivalry among existing competitors - Correct Answer one of porter's 5 forces; high when competition is fierce in a market and low when competitors are more complacent" "product differentiation - Correct Answer an advantage that occurs when a company develops unique differences in its products with the intent to influence demand" "porter's 3 generic strategies - Correct Answer generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service" "support value activities - Correct Answer firm infrastructure, human resource management, technology development (and R&D), procuremtn" "primary value activities - Correct Answer receive and store raw materials, make the product or service, deliver the product or service, market and sell the product or service, service after the sale" "business process - Correct Answer standardized set of activities that accomplish a specific task" "value chain analysis - Correct Answer views a firm as a series of business processes that each add value to the product or service" "primary value activities - Correct Answer found at the bottom of the value chain, these include business processes that acquire raw materials and manufacture, deliver, market, sell, ad provide after-sales services" "support value activities - Correct Answer found along the top of the value chain and includes business processes, such as firm infrastructure, human resource management, technology development, and procurement that support the primary value activities" "operational level - Correct Answer employees develop, control, and maintain core business activities required to run the day-to-day operations" "structured decision - Correct Answer involves situations where established processes offer potential solutions" "managerial decision-making challenges - Correct Answer 1) managers need to analyze large amounts of information 2) managers must make decisions quickly 3) manager's must apply sophisticated analysis techniques, such as porter's strategies or forecasting, to make strategic decisions" "decision-making process - Correct Answer 1) problem identification 2) data collection 3) solution generation 4) solution test 5) solution selection 6) solution implementation" "common company structure - Correct Answer operational (structured decisions) ---> managerial level (semistructured decisions) ---> strategic level (unstructured decisions)" "managerial level - Correct Answer employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change" "semistructured decision - Correct Answer occurs in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision" "strategic level - Correct Answer managers develop overall business strategies, goals, and objectives as part of the company's strategic plan" "unstructured decision - Correct Answer occurs in situations in which no procedures or rules exist to guide decision makers toward the correct choice" "project - Correct Answer temporary activity a company undertakes to create a unique product, service or result" "metrics - Correct Answer measurements that evaluate results to determine whether a project is meeting its goals" "critical success factors (CSFs) - Correct Answer crucial steps companies perform to achieve their goals and objectives and implement their strategies" "key performance indicators (KPIs) - Correct Answer quantifiable metrics a company uses to evaluate progress towards critical success factors" "market share - Correct Answer the proportion of the market that a firm captures" "CSF examples - Correct Answer -create high-quality products -retain competitive advantages -reduce product costs -increase customer satisfaction -hire and retain the best business professionals" "KPI examples - Correct Answer -turnover rates of employees -percentage of help desk calls answered in the first minute -number of product returns -number of new customers -average customer spending" "return on investment (ROI) - Correct Answer indicates the earning power of a project" "best practices - Correct Answer the most successful solutions or problem-solving methods that have been developed by a specific organization or industry" "efficiency metrics - Correct Answer -throughput -transaction speed -system availability -information accuracy -response time" "effectiveness metrics - Correct Answer -usability -customer satisfaction -conversion rates -financial" "throughput - Correct Answer the amount of information that can travel through a system at any point in time" "transaction speed - Correct Answer the amount of time a system takes to perform a transaction" "system availability - Correct Answer the number of hours a system is available for users" "information accuracy - Correct Answer the extent to which a system generates the correct results when executing the same transaction numerous times" "response time - Correct Answer the time it takes to respond to user interactions such as a mouse click" "usability - Correct Answer the easy with which people perform transactions and/or find information" "customer satisfaction - Correct Answer measured by satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer" "efficiency MIS metrics - Correct Answer measure the performance of MIS itself such as throughput, transaction speed, and system availability" "benchmark - Correct Answer baseline values the system seeks to attain" "benchmarking - Correct Answer a process of continuously measuring system results, comparing those results to optimal system performance (benchmark values), and identifying steps and procedures to improve system performance" "model - Correct Answer a simplified representation or abstraction of reality" "transactional information - Correct Answer encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational or structured decisions" "online transaction processing (OLTP) - Correct Answer the capturing of transaction and event information using technology to: 1) process the information according to defined business rules 2) store the information 3) update existing information to reflect the new information" "transaction processing system (TPS) - Correct Answer the basic business system that serves the operational level (analysts) and assists in making structured decisions" "analytical information - Correct Answer encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis or semistructured decisions" "online analytical processing (OLAP) - Correct Answer the manipulation of information to create business intelligence in support of strategic decision making" "decision support system (DSS) - Correct Answer model information using OLAP, which provides assistance in evaluating and choosing among different courses of action" "executive information system (EIS) - Correct Answer a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation, and insight" "granularity - Correct Answer refers to the level of detail in the model or the decision-making process" "visualization - Correct Answer produces graphical displays of patterns and complex relationships in large amounts of data" fact - Correct Answer the confirmation or validation of an event or object" "information age - Correct Answer the present time, during which infinite quantities of facts are widely available to anyone who can use a computer" "digital dashboard - Correct Answer tracks KPIs and CSFs by compiling information from multiple sources and tailoring to meet user needs" "artificial intelligence (AI) - Correct Answer simulates human thinking and behavior such as the ability to reason and learn" "intelligent system - Correct Answer various commercial applications of artificial intelligence" "expert system - Correct Answer computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems" "neural network - Correct Answer a category of AI that attempts to emulate the way the human brain works" "digital dashboard analytical capabilities - Correct Answer consolidation, drill-down, slice-and-dice, pivot" "consolidation - Correct Answer the aggregation of data from simple roll-ups to complex groupings of interrelated information" "drill-down - Correct Answer enables users to view details, and details of details, of information. (the reverse of consolidation)" "slice-and-dice - Correct Answer the ability to look at information from different perspectives" "pivot - Correct Answer rotates data to display alternative presentations of the data" "fuzzy logic - Correct Answer a mathematical method of handling imprecise or subjective information" "genetic algorithm - Correct Answer an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem" "mutation - Correct Answer the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome" "types of artificial intelligence - Correct Answer -expert systems (playing chess) -neural networks (credit card companies checking for fraud) -genetic algorithms (investment companies in trading decisions) -intelligent agents (environmental scanning and competitive intelligence) -virtual reality (working virtually around the globe)" "shopping bot - Correct Answer software that will search several retailer websites and provide a comparison of each retailer's offerings including price and availability" "virtual reality - Correct Answer a computer-simulated environment that can be a simulation of the real world or an imaginary world" "customer-facing process - Correct Answer results in a product or service that is received by an organization's external customer" "business-facing process - Correct Answer invisible to the external customer but essential to the effective management of the business; they include goal setting, day-to-day planning, giving performance feedback and rewards, and allocating resources" "business process patent - Correct Answer a patent that protects a specific set of procedures for conducting a particular business activity" "core process - Correct Answer business processes, such as manufacturing goods, selling products, and providing service that make up the primary activities in a value chain" "static process - Correct Answer a systematic approach in attempt to improve business effectiveness and efficiency" "5 steps in the order-to-delivery business process - Correct Answer 1) marketing (create campaign/check inventory) 2) sales (place order, notify production, check credit) 3) operations management (manufacture goods) 4) accounting & finance (deliver goods, bill customer) 5) customer service (support sale)" "business process modeling (or mapping) - Correct Answer the activity of creating a detailed flowchart or process map of a work process tasks, and activities in a structured sequence" "as-is process model - Correct Answer represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes" "to-be process model - Correct Answer shows the results of applying change improvement opportunities to to the current (as-is) process model" "customer-facing processes - Correct Answer -order processing -customer service -sales process -customer billing -order shipping" "industry-specific customer facing processes - Correct Answer -banking: loan processes -insurance: claims processing -government: grant allocation -hotel: reservation handling -airline: baggage handling" "business-facing processes - Correct Answer -strategic planning -tactical planning -budget forecasting -training -purchasing raw materials" "swim lane - Correct Answer layout arranges the steps of a business process into a set of rows depicting the various elements" "BPMN event - Correct Answer anything that happens during the course of a business process. -represented by a circle -includes customer requests, time requests, or the end of the process" "BPMN activity - Correct Answer a task in a business process -any work that is being performed in a process -represented by a rounded-corner rectangle -includes checking availability, picking up the customers, and confirming the booking" "BPMN gateway - Correct Answer -used to control the flow of a process -handle the forking, merging, and joining of paths within a process -represented by a diamond shape -includes determining availability status or accepting/declining the request" "BPMN flows - Correct Answer -display the path in which the process flows -represented by arrows -show the path the customer takes through the taxi cab booking process" "operational business processes - Correct Answer static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes" "business process improvement - Correct Answer attempts to understand and measure the current process and make performance improvements accordingly" "automation - Correct Answer involves computerizing manual tasks making them more efficient and effective and dramatically lowering operational costs" "managerial business processes - Correct Answer semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements" "streamlining - Correct Answer improves business processes efficiencies simplifying or eliminating unnecessary steps" "bottleneck - Correct Answer occurs when resources reach full capacity and cannot handle any additional; they limit throughput and impede operations" "redundancy - Correct Answer occurs when a task or activity is unnecessarily repeated" "cycle time - Correct Answer the time required to process an order" "strategic business processes - Correct Answer dynamic, nonroutine, long-term, business processes such as financial planning, expansion strategies, and stakeholder interactions" "steps in business process improvement - Correct Answer -document as-is process -establish measures -follow process -measure performance -identify and implement improvements" "business process reengineering (BPR) - Correct Answer the analysis and redesign of workflow within and between enterprises" "business process reengineering model - Correct Answer 1) set project scope 2) study competition 3) create new processes 4) implement solution" "digital darwinism - Correct Answer implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction" "disruptive technology - Correct Answer a new way of doing things that initially does not meet the needs of existing customers" "sustaining technology - Correct Answer produces an improved product customers are eager to buy, such as a faster car or larger hard drive" "internet - Correct Answer a massive network that connects computers all over the world and allows them to communicate with one another" "web 1.0 (or business 1.0) - Correct Answer refers to the world wide web during its first few years or operation between 1991 and 2003" "ecommerce - Correct Answer the buying and selling of goods and services over the internet" "ebusiness - Correct Answer includes commerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real-time information" "paradigm shift - Correct Answer occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave" "information richness - Correct Answer refers to the depth and breadth of details contained in a piece of textual, graphic, audio or video information" "information reach - Correct Answer measures the number of people a firm can communicate with all over the world" "mass customization - Correct Answer the ability of an organization to tailor its products or services to the customers' specifications" "personalization - Correct Answer occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions" "long tail - Correct Answer referring to the tail of a typical sales curve" "intermediaries - Correct Answer agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together" "disintermediation - Correct Answer occurs when a business sells direct to the customer online and cuts out the intermediary" "ebusiness advantages - Correct Answer -expanding global reach -opening new markets -reducing costs -improving operations -improving effectiveness" "reintermediation - Correct Answer steps are added to the value chain as new players find ways to add value to the business process" "cybermediation - Correct Answer refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness" "interactivity - Correct Answer measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisements" "clickstream data - Correct Answer exact pattern of a consumer's navigation through a site" "business model - Correct Answer a plan that deals how a company creates, delivers, and generates revenues" "ebusiness model - Correct Answer a plan that details how a company creates, delivers, and generates revenues on the internet" "dot-com - Correct Answer the original term for a company operating on the Internet" "business-to-business (B2B) - Correct Answer applies to businesses buying from and selling to each other over the internet" "business-to-consumer (B2C) - Correct Answer applies to any business that sells its products or services directly to consumers online" "eshop (estore or etailer) - Correct Answer an online version of a retail store where customers can shop at any hour" "consumer-to-business (C2B) - Correct Answer applies to any consumer who sells a product or service to a business on the Internet" "consumer-to-consumer (C2C) - Correct Answer applies to customers offering goods and services to each other on the internet" "adwords - Correct Answer keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages" "search engine - Correct Answer website software that finds other pages based on keyword matching" "search engine ranking - Correct Answer evaluates variables that search engines use to determine where a URL appears on the list of search results" "search engine optimization (SEO) - Correct Answer combines art along with science to determine how to make URLs more attractive to search engine, resulting in higher search engine ranking" "pay-per-click - Correct Answer generates revenue each time a user clicks on a link to a retailer's website" "pay-per-call - Correct Answer generates revenue each time users click on a link that takes them directly to an online agent waiting for a call" "pay-per-conversion - Correct Answer generates revenue each time a website visitor is converted to a customer" "ebusiness revenue model - Correct Answer advertising fees, license fees, subscription fees, transaction fees, value-added service fees" "internet service (ISP) - Correct Answer a company that provides access to the internet for a monthly fee" "real-time communication - Correct Answer occurs when a system updates information at the same rate it receives it" "instant messaging (IM or IMing) - Correct Answer a service that enables "instant" or real-time communication between people" "podcasting - Correct Answer converts an audio broadcast to a digital music plauer" "video-conference - Correct Answer allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards" "ebusiness tools - Correct Answer -email -content management system -web conferencing -videoconferencing -podcasting -instant messaging" "web conferencing (webinar) - Correct Answer blends videoconferencing with document-sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants" "content management system (CMS) - Correct Answer helps companies manage the creation, storage, editing, and publication of their website content" "taxonomy - Correct Answer the scientific classification of organisms into groups based on similarities of structure or origin" "information architecture - Correct Answer the set of ideas about how all information in a given context should be organized" "challenges facing Ebusiness - Correct Answer -identifying limited market segments -ensuring consumer protection -managing consumer trust -adhering to taxation rules" "web 2.0 (or business 2.0) - Correct Answer the next generation of internet use--a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free" "open system - Correct Answer consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system" "source code - Correct Answer contains instructions written by a programmer specifying the actions to be performed by computer software" "closed source - Correct Answer any proprietary software licensed under exclusive legal right of the copyright holder" "open source - Correct Answer refers to any software whose source code is made available free for any third party to review and modify" "user-contributed content (also referred to as user-generated content) - Correct Answer content created and updated by many users for many users" "native advertising - Correct Answer an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement" "reputation system - Correct Answer where buyers post feedback on sellers" "collaboration system - Correct Answer a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information" "collective intelligence - Correct Answer collaborating and tapping into the core knowledge of all employees, partners, and customers" "knowledge management (KM) - Correct Answer involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions" "knowledge management system (KMS) - Correct Answer supports the capturing, organization, and dissemination of knowledge (I.e. know-how) throughout an organization" "explicit knowledge - Correct Answer consists of anything that can be documented, archives, and codified, often with the help of MIS" "tacit knowledge - Correct Answer the knowledge contained in people's heads" "crowdsourcing - Correct Answer refers to the wisdom of the crowd" "crowdfunding - Correct Answer sources capital for a project by raising many small amounts from a large number of individuals, typically via the internet" "asynchronous communication - Correct Answer communication such as email in which the message and the response do not occur at the same time" "synchronous communication - Correct Answer communications that occur at the same time such as IM or chat" "social media - Correct Answer refers to websites that rely on user participation and user-contributed content" "social network - Correct Answer an application that connects people by matching profile information" "social netowrking - Correct Answer the practice of expanding your business and/or social contacts by constructing a personal network" "social networking analysis (SNA) - Correct Answer maps group contacts identifying who knows each other and who works together" "social graphs - Correct Answer represent the interconnection of relationships in a social network" "tag - Correct Answer specific keywords or phrases incorporated into website content for means of classification or taxonomy" "social tagging - Correct Answer describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search" "hashtag - Correct Answer a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#)" "folksonomy - Correct Answer similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system" "website bookmark - Correct Answer a locally stored URL or the address of a file or internet page saved as a shortcut" "social bookmarking - Correct Answer allows users to share, organize, search, and manage bookmarks" "blog, or web log - Correct Answer an online journal that allows users to post their own comments, graphics, and video" "microblogging - Correct Answer the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages" "real simple syndication (RSS) - Correct Answer a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video in a standardized format" "wiki - Correct Answer a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required" "network effect - Correct Answer describes how products in a network increase in value to users as the number of users increases" "mashup - Correct Answer a website or web application that uses content from more than one source to create a completely new product or service" "application programming interface (API) - Correct Answer a set of routines, protocols, and tools for building software applications" "mashup editor - Correct Answer WYSIWYGs or what you see is what you get tools" "challenges of business 2.0 - Correct Answer technology dependence, information vandalism, violations of copyright and plagiarism" "semantic web - Correct Answer a component of web 3.0 that describes things in a way that computers can understand" "egovernment - Correct Answer involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government" "mobile business (or mbusiness, mcommerce) - Correct Answer the ability to purchase goods and services through a wireless internet-enabled device" "copyright - Correct Answer the legal protection afforded an expression of an idea, such as a song, book, or video game" "intellectual property - Correct Answer intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents" "patent - Correct Answer an exclusive right to make, use, and sell an invention granted by a government to the inventor" "ethics - Correct Answer the principles and standards that guide our behavior toward other people" "privacy - Correct Answer the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent" "confidentiality - Correct Answer the assurance that messages and information remain available only to those authorized to view them" "information ethics - Correct Answer govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies)" "pirated software - Correct Answer the unauthorized use, duplication, distribution, or sale of copyrighted software" "counterfeit software - Correct Answer software that is manufactured to look like the real thing and sold as such" "digital rights management - Correct Answer a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution" "information secrecy - Correct Answer the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity" "information governance - Correct Answer a method or system of government for information management or control" "information compliance - Correct Answer the act of conforming, acquiescing, or yielding information" "information management - Correct Answer examines the organizational resource of information and regulates its definitions, uses, value, and distribution, ensuring that it has the types of data/information required to function and grow effectively" "information property - Correct Answer an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged" "ediscovery - Correct Answer refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry" "child online protection act (COPA) - Correct Answer a law that protects minors from accessing inappropriate material on the internet" "epolicies - Correct Answer policies and procedures that address information management along with the ethical use of computers and the internet in the business environment" "cyberbullying - Correct Answer threats, negative remarks, or defamatory comments transmitted via the internet or posted on a website" "threat - Correct Answer an act or object that poses a danger to assets" "click-fraud - Correct Answer the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser" "competitive click-fraud - Correct Answer a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link" "ethical computer use policy - Correct Answer contains general principles to guide computer user behavior" "bring your own device (BYOD) policy - Correct Answer allows employees to use their personal mobile derives and computer to access enterprise data and applications" "information privacy policy - Correct Answer contains general principles regarding information privacy" "4 basic options of BYOD policies - Correct Answer -unlimited access for personal devices -access only to nonsensitive systems and data -access, but with IT control over personal devices, apps, and stored data -access, but preventing local storage of data on personal devices" "overview of epolicies - Correct Answer ethical computer use, email privacy policy, information privacy policy, social media policy, acceptable use policy, workplace monitoring policy" "fair information practices - Correct Answer a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy" "acceptable use policy (AUP) - Correct Answer a policy that a user must agree to follow to be provided access to corporate email, information systems, and the internet" "nonrepudiation - Correct Answer a contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions" "internet use policy - Correct Answer contains general principles to guide the proper use of the internet" "cybervandalism - Correct Answer the electronic defacing of an existing website" "typosquatting - Correct Answer a problem that occurs when someone registers purposely misspelled variations of well0known domain names" "website name stealing - Correct Answer the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner" "internet censorship - Correct Answer government attempts to control internet traffic, thus preventing some material from being viewed by a country's citizens" "email privacy policy - Correct Answer details the extent to which email messages may be read by others" "mail bomb - Correct Answer sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning" "anti-spam policy - Correct Answer simply states that email users will not send unsolicited emails (spam)" "teergrubing - Correct Answer anti-spamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam" "social media policy - Correct Answer outlines the corporate guidelines or principles governing employee online communications" "social media monitoring - Correct Answer the process of monitoring and responding to what is being said about a company, individual, product, or brand" "social media manager - Correct Answer a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand" "physical security - Correct Answer tangible protection such as alarms, guards, fireproof doors, fences, and vaults" "workplace MIS monitoring - Correct Answer tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processes" "employee monitoring policy - Correct Answer states explicitly how, when and where the company monitors its employees" "key logger, or key trapper, software - Correct Answer a program that records every keystroke and mouse click" "hardware key logger - Correct Answer a hardware device that captures keystrokes on their journey from the keyboard to the motherboard" "cookie - Correct Answer a small file deposited on a hard drive by a website containing information about customers and their web activities. cookies allow websites to record the comings and goings of customers, usually without their knowledge or consent" "adware - Correct Answer software that generates ads that install themselves on a computer when a person downloads some other program from the internet" "spyware (sneakware or stealthware) - Correct Answer software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about" "web log - Correct Answer consists of one line of information for every visitor to a website and is usually stored on a web server" "clickstream - Correct Answer records information about a customer during a web surfing session such as what websites were visited, how long the visit was, what ads were viewed, and what was purchased" "downtime - Correct Answer refers to a period of time when a system is unavailable" "information security - Correct Answer a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization" "hackers - Correct Answer experts in technology who use their knowledge to break into computers and computer networks, either for profit or motivated by the challenge" "drive-by hacking - Correct Answer a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network" "virus - Correct Answer software written with malicious intent to cause annoyance or damage" "worm - Correct Answer spreads itself not from file to file but also from computer to computer" "black-hat hackers - Correct Answer break into other people's computer systems and may just look around or may steal and destroy information" "crackers - Correct Answer have criminal intent when hacking" "cyberterrorists - Correct Answer seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction" "hactivists - Correct Answer have philosophical and political reasons for breaking into systems and will often deface the website as a protest" "script kiddies or script bunnies - Correct Answer find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses" "white-hat hackers - Correct Answer work at the request of the system owners to find system vulnerabilities and plug the holes" "spyware - Correct Answer a special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission" "ransomware - Correct Answer a form of malicious software that infects your computer and asks for money. simple locker is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys" "backdoor programs - Correct Answer open a way into the network for future attacks" "denial-of-serivce attack (DoS) - Correct Answer floods a website with so many requests for a service that it slows down or crashes the site" "distributed denial-of-service attack (DDoS) - Correct Answer attacks from multiple computers that flood a website with so many requests for service that it slows down or crashes. a common type is the Ping of Death, in which thousands of computers try to access a website at the same time, overloading it and shutting it down" "polymorphic viruses and worms - Correct Answer change their form as they propagate" "trojan-horse virus - Correct Answer hides inside other software, usually as an attachment or a downloadable file" "insiders - Correct Answer legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident" "social engineering - Correct Answer hackers use their social skills to trick people into revealing access credentials or other valuable information" "dumpster diving - Correct Answer looking through people's trash, another way hackers obtain information" "pretexting - Correct Answer a form of social engineering in which one individual lies to obtain confidential data about another individual" "information security policies - Correct Answer identify the rules required to maintain information security, such as requrig users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days" "information security plan - Correct Answer details how an organization will implement the information security policies" "destructive agents - Correct Answer malicious agents designed by spammers and other internet attackers to farm email addresses off websites or deposit spyware on machines" "identity theft - Correct Answer the forging of someone's identity for the purpose of fruad" "phishing - Correct Answer a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that looks as though they came from legitimate sources" "phishing expedition - Correct Answer a masquerading attack that combines spam with spoofing" "spear phishing - Correct Answer a phishing expedition in which the emails are carefully designed to target a particular person or organization" "vishing (voice phishing) - Correct Answer a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information" "pharming - Correct Answer reroutes requests for legitimate websites to false websites" "zombie - Correct Answer a program that secretly takes over another computer for the purpose of launching attacks on other computers" "zombie farm - Correct Answer a group of computers on which a hacker has planted zombie programs" "pharming attack - Correct Answer uses a zombie farm, often by an organized crime association, to launch a massive phishing attack" "authentication - Correct Answer a method for confirming users' identities" "authorization - Correct Answer the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amounts of allocated storage space" "password - Correct Answer string of alphanumeric characters used to authenticate a user and provide access to a system" "tokens - Correct Answer small electronic devices that change user passwords automatically" "smart card - Correct Answer a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing" "biometrics - Correct Answer the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting" "voiceprint - Correct Answer a set of measurable characteristics of a human voice that uniquely identifies an individual" "single-factor authentication - Correct Answer the traditional security process, which requires a username and password" "two-factor authentication - Correct Answer requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token)" "multifactor authentication - Correct Answer requires more than two means of authentication such as what the user knows (password)" "privilege escalation - Correct Answer a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications" "vertical privilege escalation - Correct Answer attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data" "horizontal privilege escalation - Correct Answer attackers grant themselves the same access levels they already have but assume the identity of another user" "time bombs - Correct Answer computer viruses that wait for a specific date before executing instructions" "content filtering - Correct Answer occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information" "encryption - Correct Answer scrambles information into an alternative form that requires a key or password to decrypt" "decrypt - Correct Answer decodes information and is the opposite of encrypted" "cryptography - Correct Answer the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them" "advanced encryption standard (AES) - Correct Answer introduced by the national institute of standards and technology (NIST), AES is an encryption standard designed to keep government information secure" "public key encryption (PKE) - Correct Answer uses two keys: a public key that everyone can have and a private key for only the recipient" "certificate authority - Correct Answer a trusted third party, such as VeriSign, that validates user identities by means of digital certificatees" "digital certificate - Correct Answer a data file that identifies individuals or organizations online and is comparable to a digital signature" "firewall - Correct Answer hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings" "antivirus software - Correct Answer scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware" "cyberwar - Correct Answer an organized attempt by a country's military to disrupt or destroy information and communication systems for another country" "cyberterrorism - Correct Answer the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals" "intrusion detection software (IDS) - Correct Answer features full-time monitoring tools that search for patterns in network traffic to identify intruders" "In a SWOT analysis, ___________ and ___________ originate OUTSIDE an organization - Correct Answer opportunities & threats" "_______________________ executes the business strategy - Correct Answer value chain analysis" "_______________________ is a standardized set of activities that accomplish a specific task - Correct Answer business process" "internet of things vs. internet - Correct Answer the difference is that Internet requires humans while internet of things does not require human intervention" "GIGO - Correct Answer garbage in, garbage out" "efficiency - Correct Answer doing things right" "effectiveness - Correct Answer doing the right things" "_________________ typically occurs during strategic business process improvement - Correct Answer reengineering" "business processes should _________ MIS choices & should be based on business strategies & goals - Correct Answer drive" "the time is right to initiate a business process change when: - Correct Answer 1) the market being served makes a distinctive shift 2) the company is below industry benchmarks on its core processes 3) new technology is introduced 4) the company must leapfrog competition on key decisions to regain it's competitive advantage" "_____________ improves managerial level business processes - Correct Answer streamlining" "what is the primary goal of the as-is model? - Correct Answer to simplify, eliminate (steps), and improve the to-be processes" "running payroll is an example of a ____________ process - Correct Answer static" "examples of customer-facing processes - Correct Answer -order processing -customer service -sales process -customer billing -order shipping" "examples of business-facing processes - Correct Answer -tactical planning -strategic planning -budget forecasting -training -purchasing raw materials" "integration - Correct Answer information systems used as part of the manual process" "dashed line in LucidChart - Correct Answer data flow" "solid line in LucidChart - Correct Answer sequence flow (activity to activity)" "reasons for explosive growth of the World Wide Web - Correct Answer -the speed, convenience, and low cost of e-mail -the microcomputer revolution made it possible for an average person to own a computer -basic web pages are easy to create & extremely flexible" "online companies may hire an information architect to create a well planned website ______________ to help ensure that the search and navigation functions are easy to use and user-friendly - Correct Answer taxonomy" "web 1.0 - Correct Answer static-based information websites" "web 2.0 - Correct Answer user-generated content" "web 3.0 - Correct Answer machine-based learning & reasoning, intelligent applications" "________________ software cannot be SOLD - Correct Answer open source" "why did Polaroid go bankrupt - Correct Answer they put too much focus into sustaining technology instead of disruptive technologies" "difference between ebusiness & ecommerce - Correct Answer ebusiness includes commence and ecommerce deals with transactions while ebusiness includes a lot more" "ways to generate revenue on the internet - Correct Answer -banner ads -pop-up ads -associate/affiliate programs -viral marketing" "ebusiness revenue models - Correct Answer -advertising fees -license fees -subscription feeds -transaction fees -value-added service feeds" "business 2.0 tools for collaborating - Correct Answer blog, wiki, mashup" "supplier power - Correct Answer one of porter's 5 forces; measures the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services)" "threat of substitute products or services - Correct Answer one of porter's 5 forces, high when there are many alternatives to a product or service and low when there are few alternatives from which to choose" "threat of new entrants - Correct Answer one of porter's 5 forces, high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market" "entry barrier - Correct Answer a feature of a product or service that customers have come to expect and entering competitors must offer the same for survival" "conversion rates - Correct Answer the number of customers an organization touches for the first time and persuades to purchase its products or services. this is a popular metric for evaluating the effectiveness of banner, pop-up, and pop-under ads on the internet" "effectiveness MIS metrics - Correct Answer measure the impact MIS has on business processes and activities including customer satisfaction and customer conversion rates" "source document - Correct Answer describes the original transaction record along with details such as its date, purpose, and amount spent and includes cash receipts, canceled checks, invoices, customer refunds, employee time sheet, etc." "business process model

Show more Read less
Institution
Module










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Module

Document information

Uploaded on
January 20, 2025
Number of pages
30
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ISA 235 MIAMI UNIVERSITY EXAM 1 (CH. 1- 4)
WITH COMPLETE SOLUTIONS
"business intelligence (BI) - Correct Answer information collected from multiple sources such as
suppliers, customers, competitors, partners, and industries that analyze patterns, trends, and
relationship for strategic decision making"

"analytics - Correct Answer the science of fact-based decision making"

"internet of things - Correct Answer a world where interconnected, internet-enabled devices or
"things" can collect & share data without human intervention"

"intelligent agent - Correct Answer a special-purpose knowledge-based information system that
accomplishes specific tasks on behalf of its users"

"augmented reality - Correct Answer the viewing of the physical world of computer-generated layers
of information added to it"

"dynamic process - Correct Answer a continuously changing process that provides business solutions
to ever-changing business operations"

"workflow - Correct Answer includes the tasks, activities, and responsibilities required to execute each
step in a business process"

"workflow control systems - Correct Answer monitor processes to ensure tasks, activities, and
responsibilities are executed as specified"

"machine to machine (M2M) - Correct Answer devices that connect directly to other devices"

"data - Correct Answer raw facts that describe the characteristics of an event or object"

"structured data - Correct Answer data that has a defined length, type, and format and includes
numbers, dates, or strings such as Customer Address"

"machine-generated data - Correct Answer data created by a machine without human intervention"

"human-generated data - Correct Answer data that humans, in interaction with computers, generate"

"unstructured data - Correct Answer data that is not defined and does not follow a specified format
and is typically free-form text such as emails, Twitter tweets, and text messages"


1|Page

,"big data - Correct Answer a collection of rare, complex data sets, including structured and
unstructured data, which cannot be analyzed using traditional database methods & tools"

"snapshot - Correct Answer a view of data at a particular moment in time"

"Data example - Correct Answer order date, amount sold, customer number, quantity ordered"

"information example - Correct Answer best-selling product, best customer, worst-selling product,
worst customer"

"business intelligence example - Correct Answer lowest sales per week compared with the economic
interest rates, best-selling product by month compared to sports season and city team wins and losses"

"knowledge example - Correct Answer choosing not to fire a sales representative who is
underperforming knowing that person is experiencing family problems, listing products that are about to
expire first on the menu or creating them as a daily special to move the product"

"information - Correct Answer data converted into a meaningful and useful context"

"report - Correct Answer a document containing data organized in a table, matrix, or graphical format
allowing users to easily comprehend and understand information"

"static report - Correct Answer a report created once based on data that does not change"

"dynamic report - Correct Answer a report that changes automatically during creation"

"variable - Correct Answer a data characteristic that stands for a value that changes or varies over
time"

"predictive analytics - Correct Answer extracts information from data and uses it to predict future
trends and identify behavioral patterns"

"behavior analytics - Correct Answer uses data about people's behaviors to understand intent and
predict future actions"

"knowledge - Correct Answer skills, experience, and expertise coupled with information and
intelligence that creates a person's intellectual resources"

"knowledge worker - Correct Answer individuals values for their ability to interpret and analyze
information"

"accounting - Correct Answer records, measures, and reports monetary transactions"


2|Page

, "finance - Correct Answer deals with strategic financial issues including money, banking, credit,
investments, and assets"

"human resources - Correct Answer maintains policies, plans, and procedures for the effective
management of employees"

"marketing - Correct Answer supports sales by planning, pricing, and promoting goods or services"

"operations management - Correct Answer manages the process of converting or transforming or
resources into goods or services"

"sales - Correct Answer performs the function of selling goods or services"

"system - Correct Answer a collection of parts that link to achieve a common purpose"

"goods - Correct Answer material items or products that customers will buy to satisfy a want or need.
clothing, groceries, cell phones, and cards are all examples of goods that people buy to fulfill their
needs"

"service - Correct Answer tasks that customers will buy to satisfy a want or need"

"productivity - Correct Answer the rate at which goods and services are produced based upon total
output given total inputs"

"production - Correct Answer there process where a business takes raw materials and processes them
or converts them into a finished product for its goods or services"

"systems thinking - Correct Answer a way of monitoring the entire system by viewing multiple inputs
being processed or transformed to product outputs while continuously gathering feedback on each
part"

"feedback - Correct Answer information that returns to its original transmitter (input, transform, or
output) and modifies the transmitter's actions"

"management information systems (MIS) - Correct Answer a business function, like accounting and
human resources, which moves information about people, products, and processes across the company
to facilitate decision making & problem solving"

"chief information officer (CIO) - Correct Answer responsible for:
1) overseeing all uses of MIS and
2) ensuring that MIS strategically aligns with business goals and objectives"




3|Page

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Andreas4114 Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
28
Member since
10 months
Number of followers
1
Documents
809
Last sold
1 week ago

4.7

3 reviews

5
2
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions