BCIS 3610 Exam 3

Data Warehouse

obtain, cleanse, organize,relate, and catalog data. In large organizations, a group of people manage and run this.

Datamart

same as data warehouse; except they are smaller and typically focus on a certain area/department.

Business Intelligence

info containing patterns, relationships, and trends of various forms of data. Activities in the Process: Aquire Data, Perform Analysis, and Publish Results.

Pull Publishing Delivery

requires the user to request business intelligence results

Push Publishing Delivery

delivers BI according to a schedule or as a result of an event or particular data condition

Knowledge Management

process of creating value for intellectual capital and sharing that knowledge with employees, managers, supplier, customers, and others who need that capital. Why companies create FAQ lists. These companies often use expert systems and content management

Big Data

data being produced at a very high rate of speed and volume.

Decision Tree

hierarchical arrangement of criteria that predict a classification or a value.
-Used to select variables that are then used by other types of data mining tools

Map Reduce

technique for harnessing power of thousands of computers working in parallel.

Hadoop

open source language which allows a person to analyze big data. Includes a query language titled Pig to create reports.

OLAP(Online Analytical Processing)

very dynamic and allows user to report format in real time. Has measures(ex: average cost) and dimensions(ex: sales region). A dimension in this report: a characteristic of a measure. More dynamic than RFM reports

RFM

analysis is a way if analyzing and ranking customers according to their purchasing patterns.

Data Mining

fundamental category of BI analysis.

Operational Data

Because of the various problems with it, large organizations choose to extract it and typically create and staff a group of people who manage and run a data warehouse. Problematic operational data is termed as dirty data.

BI servers

use metadata to determine what results to send to which users. Extend alert/RSS functionality to support user subscriptions.

Email Spoofing

or phishing, is a technique used to obtain unauthorized data via email.

threat

is a person or organization that seeks to obtain or alter data or other IS assets illegally without permission.

Wardrivers

take computers with WIRELESS connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks.

Sniffing

technique for intercepting computer communications through a PHYSICAL connection to a network or without a physical connection in the case of wireless networks. technique example: Adware

Hacking

breaking into computes, servers, or networks to steal data. Result: an unauthorized transaction from a user's credit card.

Intrusion detection system(IDS)

senses when another computer program attempts to scan or access the computer or network.

Brute Force Attack

when every possible source of characters is tried in an attempt to break the password. Why you need a complex password.

Cookies

small files that your browser receives when you visit. Supposed to be harmless.

Virus

program that replicates itself.

Trojan

horses appear to be useful programs but they are not.

Technical Safeguards

safeguards for hardware and software: smart cards, biometric authentication, encryption, firewalls, latest antivirus, malware protection, application design, identification and authorization.

Biometric Authentication and Smart cards

uses personal physical characteristics. Smart cards are plastic cards like credit cards that have a microchip and has to have a PIN to be authenticated.

Encryption

process of transforming clear text into coded, unintelligible text for security. Symmetric: sam key is used to code and decode. Asymmetric: two different keys used

Firewall

computing device that prevents unauthorized network access. Perimeter firewall sits outside organization. Internal:sits inside organization. Packet-filtering: examines each part of a message and determines to let it pass or not. A firewall can be a softwa

Malware

category of software includes viruses, spyware, and adware

Data Safeguards

protect databases and other organizational data. Data administers are in charge. EX: Passwords, encryption, backup and recovery, physical security, data rights and responsibilities

Human Safeguards

involve people and procedure components of info systems. EX: hiring, training, education, assessment, compliance, accountability, administration

Information System Department

developing, operating, maintaining an organizations computing infrastructure.

CIO

principal manager of the IT department and representative of the IS and IT issues within the executive staff

CTO

evaluates new technologies, new ideas, and new capabilities. Advises CIO, executive group, and project managers

Data Admin Group

protects data and info assets by establishing data standards and data management practices and policies.

Operations

manges computing infrastructure as well as monitors users experience and responds to user problems.

Development group

manages creation of new info systems as well as maintains existing ones. Size of this group depends on if company develops projects in-house or outsources those projects. If don't do it in house then the IS department will be staffed largely by business a

Outsourcing relations

exists if organization has outsourced contracts.

Business Analyst IT job

work with business leaders and planners to develop processes and systems that implement business strategy and goals

System Analyst IT job

work with users to determine system requirements, design and develop job descriptions and procedures, help determine system test plans

Tech Suport Engineer

help users solve problems, provide training.

Consultant IT job

wide range or activities: programming, testing, database design, communications and networks, project management, security and risk managements, social media, strategic planning

Project Manager, IT job

initiate, plan, manage, monitor, and close down projects

Manager, IT

manage teams or technical workers and manage the implementation of new systems

Sterring Committee

group of senior managers form the major business functions that works with CIO to set the info systems(IS) priorities and decide among major IS projects and alternatives. Meetings are conducted by IS department

Rights of users of Information Systems(IS)

right to receive effective training, properly prioritized problem fixes and resolutions, reliable systems development and maintenance, prompt attention to problems, concerns, and complaints, secure computing environment, protection from viruses, reliable

Responsibilities of users of IS

following security and backup procedures, learn basic computer skills, learn standard techniques and procedures, protect your password, install only authorized programs, avoid reporting trivial problems, apply software patches and fixes when directed to d

Business Process

one or more activities(collections or related tasks that receive inputs and outputs) that interact to accomplish a business function. Some activities in this process may use IS. There are developmental processes for these activities: BPM, SDLC, scrum

Business Process Management (BPM)

technique used to create new business processes and to manage changes in existing ones. An as-is model documents the existing processes. Once this model is created, next step that team must take is to look for improvement opportunities. Steps in BPM cycle

Business Process Modeling Notation (BPMN)

standard set of terms and graphical notations for documenting business processes. As-is models can be represented using this. In a digram, dotted arrows depict data flow of messages and data in process, while solid arrows depict control flow or sequence o

Systems Development Life Cycle (SDLC)

waterfall method, is a process that can be used develop bot info systems and applications. Traditional Process for developing info. Phases: Defining they system, determining requirements, design system components (determines hardware and program specifica

Dimensions of Feasibilty

cost, schedule, technical and organizational feasibility.

Organizational Feasibility

concerns whether the new system fits within the organizations, customs, or legal requirements

Test Plan

formal description of system's response to use and misuse scenarios.

System conversion

activity of installing the new system after it passed testing in the implementation phase.

Pilot installation

During implementation phase. implements the entire new system/business processes on a limited portion of the business. It limits exposure to business is system fails

Phased Installation

During implementation phase. organization installs the next piece of the system only after the previous piece works. Each piece installed and tested.

Parallel Installation

During implementation phase. The new system runs alongside the old one until it has been tested and fully operational. Very safe but expensive

Plunge Installation

During implementation phase. riskiest installation because the old system is shut down and the new one is introduced. Only used if new system not vital to company operations.

Key to successful SDLC projects?

work breakdown structure

Gantt chart

shows tasks, dates and dependencies for tasks of a project

Critical path

sequence of activities that determine earlier date by which a project can be completed

Trade-off

involves balancing three critical factors: requirements, cost, and time. EX: if project is late, adding more ppl creates diseconomies of scale which is a situation that occurs when adding more resources creates inefficiencies. According to Brooks' Law, ad

Final Work Breakdown Scale (WBS)

shows planned tasks, dependencies, durations, and resource assignments. It is denoted as baseline WBS.

Scrum

new development process that was partly created to assist with the problems in SDLC. It is generic enough to be used in the development of business processes, info systems, and applications.