Data Warehouse
obtain, cleanse, organize,relate, and catalog data. In large organizations, a group of people manage and run this.
Datamart
same as data warehouse; except they are smaller and typically focus on a certain area/department.
Business Intelligence
info containing patterns, relationships, and trends of various forms of data. Activities in the Process: Aquire Data, Perform Analysis, and Publish Results.
Pull Publishing Delivery
requires the user to request business intelligence results
Push Publishing Delivery
delivers BI according to a schedule or as a result of an event or particular data condition
Knowledge Management
process of creating value for intellectual capital and sharing that knowledge with employees, managers, supplier, customers, and others who need that capital. Why companies create FAQ lists. These companies often use expert systems and content management
Big Data
data being produced at a very high rate of speed and volume.
Decision Tree
hierarchical arrangement of criteria that predict a classification or a value.
-Used to select variables that are then used by other types of data mining tools
Map Reduce
technique for harnessing power of thousands of computers working in parallel.
Hadoop
open source language which allows a person to analyze big data. Includes a query language titled Pig to create reports.
OLAP(Online Analytical Processing)
very dynamic and allows user to report format in real time. Has measures(ex: average cost) and dimensions(ex: sales region). A dimension in this report: a characteristic of a measure. More dynamic than RFM reports
RFM
analysis is a way if analyzing and ranking customers according to their purchasing patterns.
Data Mining
fundamental category of BI analysis.
Operational Data
Because of the various problems with it, large organizations choose to extract it and typically create and staff a group of people who manage and run a data warehouse. Problematic operational data is termed as dirty data.
BI servers
use metadata to determine what results to send to which users. Extend alert/RSS functionality to support user subscriptions.
Email Spoofing
or phishing, is a technique used to obtain unauthorized data via email.
threat
is a person or organization that seeks to obtain or alter data or other IS assets illegally without permission.
Wardrivers
take computers with WIRELESS connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks.
Sniffing
technique for intercepting computer communications through a PHYSICAL connection to a network or without a physical connection in the case of wireless networks. technique example: Adware
Hacking
breaking into computes, servers, or networks to steal data. Result: an unauthorized transaction from a user's credit card.
Intrusion detection system(IDS)
senses when another computer program attempts to scan or access the computer or network.
Brute Force Attack
when every possible source of characters is tried in an attempt to break the password. Why you need a complex password.
Cookies
small files that your browser receives when you visit. Supposed to be harmless.
Virus
program that replicates itself.
Trojan
horses appear to be useful programs but they are not.
Technical Safeguards
safeguards for hardware and software: smart cards, biometric authentication, encryption, firewalls, latest antivirus, malware protection, application design, identification and authorization.
Biometric Authentication and Smart cards
uses personal physical characteristics. Smart cards are plastic cards like credit cards that have a microchip and has to have a PIN to be authenticated.
Encryption
process of transforming clear text into coded, unintelligible text for security. Symmetric: sam key is used to code and decode. Asymmetric: two different keys used
Firewall
computing device that prevents unauthorized network access. Perimeter firewall sits outside organization. Internal:sits inside organization. Packet-filtering: examines each part of a message and determines to let it pass or not. A firewall can be a softwa
Malware
category of software includes viruses, spyware, and adware
Data Safeguards
protect databases and other organizational data. Data administers are in charge. EX: Passwords, encryption, backup and recovery, physical security, data rights and responsibilities
Human Safeguards
involve people and procedure components of info systems. EX: hiring, training, education, assessment, compliance, accountability, administration
Information System Department
developing, operating, maintaining an organizations computing infrastructure.
CIO
principal manager of the IT department and representative of the IS and IT issues within the executive staff
CTO
evaluates new technologies, new ideas, and new capabilities. Advises CIO, executive group, and project managers
Data Admin Group
protects data and info assets by establishing data standards and data management practices and policies.
Operations
manges computing infrastructure as well as monitors users experience and responds to user problems.
Development group
manages creation of new info systems as well as maintains existing ones. Size of this group depends on if company develops projects in-house or outsources those projects. If don't do it in house then the IS department will be staffed largely by business a
Outsourcing relations
exists if organization has outsourced contracts.
Business Analyst IT job
work with business leaders and planners to develop processes and systems that implement business strategy and goals
System Analyst IT job
work with users to determine system requirements, design and develop job descriptions and procedures, help determine system test plans
Tech Suport Engineer
help users solve problems, provide training.
Consultant IT job
wide range or activities: programming, testing, database design, communications and networks, project management, security and risk managements, social media, strategic planning
Project Manager, IT job
initiate, plan, manage, monitor, and close down projects
Manager, IT
manage teams or technical workers and manage the implementation of new systems
Sterring Committee
group of senior managers form the major business functions that works with CIO to set the info systems(IS) priorities and decide among major IS projects and alternatives. Meetings are conducted by IS department
Rights of users of Information Systems(IS)
right to receive effective training, properly prioritized problem fixes and resolutions, reliable systems development and maintenance, prompt attention to problems, concerns, and complaints, secure computing environment, protection from viruses, reliable
Responsibilities of users of IS
following security and backup procedures, learn basic computer skills, learn standard techniques and procedures, protect your password, install only authorized programs, avoid reporting trivial problems, apply software patches and fixes when directed to d
Business Process
one or more activities(collections or related tasks that receive inputs and outputs) that interact to accomplish a business function. Some activities in this process may use IS. There are developmental processes for these activities: BPM, SDLC, scrum
Business Process Management (BPM)
technique used to create new business processes and to manage changes in existing ones. An as-is model documents the existing processes. Once this model is created, next step that team must take is to look for improvement opportunities. Steps in BPM cycle
Business Process Modeling Notation (BPMN)
standard set of terms and graphical notations for documenting business processes. As-is models can be represented using this. In a digram, dotted arrows depict data flow of messages and data in process, while solid arrows depict control flow or sequence o
Systems Development Life Cycle (SDLC)
waterfall method, is a process that can be used develop bot info systems and applications. Traditional Process for developing info. Phases: Defining they system, determining requirements, design system components (determines hardware and program specifica
Dimensions of Feasibilty
cost, schedule, technical and organizational feasibility.
Organizational Feasibility
concerns whether the new system fits within the organizations, customs, or legal requirements
Test Plan
formal description of system's response to use and misuse scenarios.
System conversion
activity of installing the new system after it passed testing in the implementation phase.
Pilot installation
During implementation phase. implements the entire new system/business processes on a limited portion of the business. It limits exposure to business is system fails
Phased Installation
During implementation phase. organization installs the next piece of the system only after the previous piece works. Each piece installed and tested.
Parallel Installation
During implementation phase. The new system runs alongside the old one until it has been tested and fully operational. Very safe but expensive
Plunge Installation
During implementation phase. riskiest installation because the old system is shut down and the new one is introduced. Only used if new system not vital to company operations.
Key to successful SDLC projects?
work breakdown structure
Gantt chart
shows tasks, dates and dependencies for tasks of a project
Critical path
sequence of activities that determine earlier date by which a project can be completed
Trade-off
involves balancing three critical factors: requirements, cost, and time. EX: if project is late, adding more ppl creates diseconomies of scale which is a situation that occurs when adding more resources creates inefficiencies. According to Brooks' Law, ad
Final Work Breakdown Scale (WBS)
shows planned tasks, dependencies, durations, and resource assignments. It is denoted as baseline WBS.
Scrum
new development process that was partly created to assist with the problems in SDLC. It is generic enough to be used in the development of business processes, info systems, and applications.