Mis Review From Book
Mis Review From Book
CHAPTER 6
6-1 What are the problems of managing data resources in a traditional file
environment?
• Entity: A person, place, thing, or event about which information is maintained (e.g.,
customers, employees).
• Attributes: Characteristics of entities (e.g., customer name, employee ID).
• Key Fields: Unique identifiers for records in a table (e.g., customer ID).
• Data Redundancy and Inconsistency: Multiple copies of the same data, leading to
inconsistencies.
• Program-Data Dependence: Changes in data require changes to the application
program.
• Inflexibility: Difficulty in adapting to new information needs.
• Poor Security: Hard to enforce security standards across different systems.
• Lack of Data Sharing and Availability: Data is isolated in separate files and not easily
accessible across the organization.
6-2 What are the major capabilities of database management systems (DBMS),
and why is a relational DBMS so powerful?
Database: A collection of organized data that allows for easy access, management, and updating.
Capabilities of a DBMS:
• Organizes data into two-dimensional tables (relations) consisting of rows (records) and
columns (attributes).
• Supports easy data retrieval and manipulation using key fields.
• Allows combining tables through shared data elements (e.g., foreign keys).
6-3 What are the principal tools and technologies for accessing information from
databases to improve business performance and decision making?
Big Data: Large volumes of structured, unstructured, and semi-structured data that businesses
analyze for insights.
Data Mart: A smaller, more focused subset of a data warehouse used for specific business units
or functions.
Hadoop: A framework that allows the distributed processing of large data sets across clusters of
computers using a simple programming model.
In-Memory Computing: Stores data in the computer's RAM, enabling faster data processing
and analysis.
Clustering (in Data Mining): Grouping a set of objects in such a way that objects in the same
group (called a cluster) are more similar to each other than to those in other groups.
Sentiment Analysis: Technique used to determine the emotional tone behind a body of text,
often used by businesses to gauge customer feedback.
6-4 Why are data governance and data quality assurance essential for managing
the firm’s data resources?
Data Governance: The policies and procedures used to manage the availability, usability,
integrity, and security of the data in an organization.
CHAPTER 7
7-1 What are the principal components of telecommunications networks and key
networking technologies?
• Analog signal: Continuous waves that transmit information by altering the amplitude and
frequency of the waves.
• Digital signal: Discrete, binary pulses used for communication, representing data as 0s
and 1s.
• Types of networks:
o Local Area Network (LAN): Connects PCs and other devices within a 500-meter
radius.
o Metropolitan Area Network (MAN): Spans a single urban area.
o Wide Area Network (WAN): Spans broad geographical distances, often
managed privately.
7-3 How do the Internet and Internet technology work, and how do they support
communication and e-business?
• Internet definition: A worldwide network of networks using the client/server model and
TCP/IP.
• How it works: Every computer on the Internet has a unique numeric IP address, and the
Domain Name System (DNS) converts these IP addresses into user-friendly domain
names.
• Principal Internet services:
o Email, newsgroups, chatting, instant messaging, Telnet, FTP, and the web.
• VoIP (Voice over IP): Technology for voice transmission over the Internet.
• Virtual Private Networks (VPNs): Low-cost alternatives to private WANs, allowing
secure communication over the public Internet.
• Ways of locating information on the web:
o Search engines, website directories, and RSS technology.
7-4 What are the principal technologies and standards for wireless networking,
communication, and Internet access?
CHAPTER 8
8-1 Why are information systems vulnerable to destruction, error, and abuse?
8-3 What are the components of an organizational framework for security and
control?
• General Controls:
o General controls include policies, procedures, and activities that provide overall
security for the organization’s IT infrastructure. Types of general controls:
Access controls: Ensuring only authorized users have access to systems.
Backup and recovery procedures: Ensuring data can be restored after a
disaster.
Security monitoring: Ongoing surveillance to detect and respond to
threats.
• Application Controls:
o These are specific to software applications and aim to ensure the accuracy,
integrity, and security of data. Types of application controls:
Input controls: Ensuring data entered into a system is accurate.
Processing controls: Ensuring data is processed correctly.
Output controls: Ensuring outputs are valid and secure.
• Risk Assessment:
o Risk assessment evaluates the security of information systems by identifying
potential vulnerabilities, control points, and weaknesses, and determines the most
cost-effective security measures to mitigate risks.
• Security Policy, Acceptable Use Policy, and Identity Management:
o Security Policy: A document outlining an organization's security goals,
strategies, and rules for protecting information assets.
o Acceptable Use Policy: A set of rules defining acceptable behaviors and
activities for users of the organization's IT systems.
o Identity Management: A system for identifying and authenticating users to
ensure they have appropriate access to resources.
• Information Systems Auditing:
o Information systems auditing involves reviewing and evaluating an organization's
security practices and controls to ensure their effectiveness.
8-4 What are the most important tools and technologies for safeguarding
information resources?
• Tokens in Authentication:
o Tokens are physical devices (or software-based) used to authenticate users by
providing a unique identifier or password.
• Two-Factor Authentication:
o Two-factor authentication (2FA) improves security by requiring two forms of
verification: something the user knows (password) and something the user has
(token or smartphone).
• Intrusion Detection System (IDS):
o An IDS monitors network traffic for suspicious activity or potential threats and
alerts administrators when an intrusion attempt is detected.
• Unified Threat Management System:
o A unified threat management (UTM) system integrates multiple security functions
(firewall, antivirus, intrusion detection, etc.) into a single platform to provide
comprehensive protection against threats.
• Digital Certificates:
o Digital certificates authenticate a user's identity and are used to establish secure,
encrypted communications, ensuring data integrity and trustworthiness in
transactions.
• Managed Security Service Providers (MSSPs):
o MSSPs offer outsourced security services, which is particularly beneficial for
small businesses that may lack the resources to maintain an in-house security
team.
• Software Metrics:
o Software metrics help improve software reliability and quality by measuring
performance, identifying bugs, and guiding development efforts to create secure,
high-quality systems.
CHAPTER 9
• Real-time data availability: Enterprise systems provide real-time data that supports
immediate decision-making and enhances visibility across different departments.
• Improved data accuracy: With standardized data management across departments,
decision-making becomes more reliable and effective.
• Performance evaluation: The firm-wide data generated by enterprise systems enables
managers to evaluate organizational performance, identify inefficiencies, and make
informed strategic decisions.
• Upstream: Involves the processes related to obtaining raw materials, parts, and
components needed for production (e.g., suppliers, manufacturers).
• Downstream: Focuses on the distribution and delivery of finished products to the end
customer (e.g., retailers, logistics, customers).
One of the most important and complex aspects of supply chain planning:
1. In-store interactions: Customers interacting directly with retail staff during a visit.
2. Website or mobile app: Online platform where customers can browse, order, and
interact with services.
3. Customer service calls: Phone or chat support for customer inquiries or complaints.
A touchpoint is any interaction a customer has with a business, whether it be direct or indirect,
that provides an opportunity to gather insights or enhance the customer experience.
• Sales Force Automation (SFA) is a system that automates sales processes like lead
management, order processing, and customer interactions. It helps sales teams be more
efficient and effective by providing them with the tools to track customer interactions,
improve lead conversion, and manage relationships.
9-4 What are the challenges that enterprise applications pose, and how are
enterprise applications taking advantage of new technologies?
How enterprise applications are taking advantage of cloud computing and business
intelligence:
• Social CRM involves using social media platforms to engage with customers, build
relationships, and gain insights. CRM systems are integrating with social media tools to
track customer interactions, respond to inquiries, and tailor marketing and service
strategies based on customer feedback from social networks.
CHAPTER 10
10-1: What are the unique features of e-commerce, digital markets, and digital
goods?
• Eyeballs: The term "eyeballs" refers to the number of people viewing a website or
advertisement. However, it is no longer an effective way of engaging customers because
simply attracting viewers doesn’t guarantee that they will take action or make a purchase.
• Two areas of traditional media losing ground:
1. Print advertising (newspapers, magazines)
2. Television advertising
• Marketplace vs. Marketspace:
o Marketplace: Traditional physical or digital venues where buyers and sellers
engage in transactions (e.g., physical stores).
o Marketspace: A virtual marketplace where buyers and sellers meet online (e.g.,
Amazon, eBay).
10-2: What are the principal e-commerce business and revenue models?
• Portals: Portals are more than just gateways because they provide integrated services like
search engines, email, news, and other resources, which make them valuable hubs for
users to access a variety of content and services.
• Value proposition of e-tailers: E-tailers offer convenience, a wide selection of products,
and often lower prices compared to traditional retail stores. They provide an accessible,
24/7 shopping experience.
• Importance of micropayment systems: Micropayment systems are important because
they allow businesses to process small transactions (such as paying for digital content)
that would otherwise be too costly to handle using traditional payment systems.
• Electronic Data Interchange (EDI): EDI refers to the electronic exchange of business
documents between companies in a standardized format. It continues to be important
because it increases efficiency, reduces errors, and speeds up transactions.
• Private Industrial Networks: These are private networks that link a firm with its
suppliers and other strategic business partners. They are used to develop highly efficient
and responsive supply chains, facilitating real-time communication and collaboration.
10-5: What is the role of m-commerce in business, and what are the most
important m-commerce applications?
In traditional file environments, data is often stored in separate files managed by different
departments, which can lead to several issues:
• Data Redundancy and Inconsistency: The same piece of data may be duplicated across
different files, leading to inconsistencies and errors when updates are not uniformly
applied.
• Lack of Data Integration: Separate files are not connected, which makes it hard to
integrate data from various sources.
• Data Isolation: Data cannot be easily accessed or combined across systems due to
differences in file formats and storage methods.
• Program-Data Dependence: Programs are closely tied to the structure of the data,
meaning any changes to data structure require program modifications.
• Limited Data Sharing: In traditional environments, sharing data between departments is
challenging, reducing overall efficiency and collaboration.
• Poor Security: Managing security across multiple systems increases the likelihood of
unauthorized access or loss of data.
DBMS are software systems that handle the creation, storage, retrieval, and updating of data in a
structured way. They provide:
• Data Abstraction and Independence: DBMS abstracts the details of data storage,
allowing users to interact with data without knowing the underlying file structure.
• Reduced Data Redundancy: DBMS centralize data storage, minimizing duplication
across different departments.
• Data Integrity and Consistency: The use of constraints and rules helps ensure that the
data remains accurate and consistent across the organization.
• Improved Data Security: Centralized control allows for robust security measures to be
put in place.
• Backup and Recovery: Most DBMS include backup and recovery tools to protect
against data loss.
• Concurrency Control: DBMS allow multiple users to access data concurrently without
compromising the integrity of the data.
Relational DBMS
A relational DBMS (RDBMS) organizes data into tables (or relations) that can be linked based
on common data points. It is powerful due to:
• Simple Data Structure: Data is represented in rows and columns, which is intuitive and
flexible.
• Data Independence: Users can query the data using SQL without knowing the physical
layout of the data.
• Data Integrity: RDBMS enforce integrity constraints, such as primary keys and foreign
keys, to maintain consistent and accurate data relationships.
• Powerful Querying Capabilities: SQL (Structured Query Language) allows complex
queries to retrieve, insert, update, and delete data efficiently.
• Switches: Devices that connect multiple communication paths and route information.
• Routers: Devices that manage traffic between networks by directing data packets.
• Transmission Media: Physical media like copper wires, fiber-optic cables, and wireless
signals transmit data across networks.
Types of Networks
• LAN (Local Area Network): A network covering a small geographic area, such as a
building or campus.
• WAN (Wide Area Network): A network that spans large geographic areas, often linking
multiple LANs.
• MAN (Metropolitan Area Network): A network that covers a city or a large campus.
• PAN (Personal Area Network): A network for individual devices like smartphones and
laptops.
• Malicious Software: Viruses, worms, trojans, and spyware can damage systems or steal
sensitive data.
• Hackers and Cybercrime: Unauthorized individuals may exploit system weaknesses to
access or manipulate data.
• Internal Threats: Employees may intentionally or unintentionally cause data breaches.
• Software Vulnerabilities: Bugs and flaws in software can be exploited by attackers to
gain access to systems.
Enterprise systems integrate core business processes, allowing departments to share data and
improve decision-making. These systems include:
• Enterprise Resource Planning (ERP): Integrates functions such as finance, HR, and
production into a unified system.
• Supply Chain Management (SCM): Coordinates the flow of goods, information, and
finances between suppliers, manufacturers, and customers.
• Customer Relationship Management (CRM): Helps manage customer interactions to
improve satisfaction and retention.
• Ubiquity: E-commerce is accessible anywhere and anytime via the internet, removing
geographic limitations.
• Global Reach: E-commerce technology allows transactions across national boundaries,
creating a global market.
• Interactivity: E-commerce platforms allow real-time interaction between the business
and the customer, improving engagement.
• Personalization and Customization: E-commerce systems can tailor marketing
messages and products based on user preferences and behaviors.
• Information Density: The internet reduces information costs and increases the richness
of available information for both buyers and sellers.
• Social Technology: Social media platforms play a significant role in influencing buying
decisions and promoting products.
• Behavioral Targeting: Businesses use data about a customer’s online behavior to target
ads and promotions effectively.
• Social E-commerce: Social networks are integral to e-commerce, allowing businesses to
market directly through platforms like Facebook and Instagram, leveraging user
interactions and recommendations.
• Personalization: E-commerce platforms personalize shopping experiences based on
browsing history and past purchases.
• Electronic Data Interchange (EDI): This allows businesses to exchange documents like
invoices and purchase orders electronically.
• New B2B Models: Marketplaces and platforms facilitate procurement and reduce
transaction costs for businesses.
• Location-Based Services: Apps use GPS to provide services such as nearby store
locations, promotions, and local offers.
• Mobile Payment Systems: Technologies like Apple Pay and Google Wallet allow users
to make purchases directly from their phones.
• Other M-commerce Services: Mobile banking, ticket purchases, and on-demand
services (like Uber) are also key parts of m-commerce.
Building an E-commerce Presence
• E-commerce Presence Map: This involves planning for web presence across different
platforms like mobile, social media, and traditional websites.
• Timeline and Milestones: Developing an e-commerce site involves a structured timeline
with phases such as planning, design, development, testing, and launch.