Exam 1 Review MIS 2003 Fall 2015

Chapters 1, 2, 4, 8, Mod A, and IT Ethics

(Note: This review sheet is designed to summarize the terminology covered in the above stated chapters and not to represent all material covered in the lectures.)

Chapter 1 and Mod A 1. Information Age 23. Management Information System (MIS) 2. Knowledge Worker o Periodic, Summarized, Exception, 3. MIS Comparative, Ad Hoc Reports 4. Telecommuting 24. Workgroup Support System (WSS) or 5. Information, IT, and people Collaboration System 6. Data 25. Decision Support System (DSS) 7. Information 26. Artificial Intelligence (AI) 8. Business Intelligence 27. Executive Information System (EIS) 9. Knowledge 10. Dimensions of Information Chapter 2 o Time, Location, Form, Validity 28. SCM system o Upward, Downward, Horizontal, o Just-in-time Outward/Inward flow of info. o Inter-modal transportation o Internal, External, Objective, o RFID (Radio frequency Subjective info. identification) 11. Information Granularity 29. CRM system 12. Strategic, Tactical, Operational Mgmt o Multi-channel service delivery Levels o Sales-force automation (SFA) 13. Technology-literate knowledge worker systems 14. Information-literate knowledge worker o Software-as-a-service (SaaS) 15. Ethics 30. Enterprise Resource Planning (ERP) 16. Information Technology 31. Social Media – 5 types 17. Hardware o 5 C’s: Capture, Convey, Create, IT Ethics Cradle, Communicate 32. Moral o Input, Output, CPU, RAM, 33. Ethic Storage, Telecommunications, 34. Law Connecting 35. PAPA (Privacy, Accuracy, Property, 18. Software Access) o Application software o Operating system software o Utility software 19. Online Analytical Processing (OLAP) 20. Online Transaction Processing (OLTP) 21. Transaction Processing System (TPS) 22. Customer Integrated System (CIS) or Customer Self-Service System Chapter 8 Chapter 4 36. Intellectual Property 67. Phases of Decision Making – 37. Copyright Intelligence, Design, Choice, 38. Fair Use Doctrine Implementation 39. Pirated Software 68. Unstructured/nonstructured Decision 40. Key logger (key trapper) software 69. Structured Decision 41. Screen capture programs 70. Semi-structured Decision 42. Hardware key logger 71. Recurring 43. Event Data Recorders (EDR) 72. Nonrecurring 44. Identity Theft 73. DSS 45. Phishing o Data mgmt 46. Spear phishing o Model mgmt 47. Whaling o User interface mgmt 48. Pharming 74. Geographic information system (GIS) 49. Cyberslacking 75. Predictive analytics 50. Cookie 76. Text analytics 51. Spam 77. Endless analytics 52. Adware / Trojan Horse Software 78. Artificial Intelligence (AI) 53. Spyware / Sneakware 79. Expert System (ES) 54. Web log o People 55. Clickstream i. Domain expert 56. Hacker ii. Knowledge engineer 57. Computer Virus iii. Knowledge worker 58. Worm o Information 59. Denial-of-service attack i. Problem facts 60. Anti-virus software ii. Domain expertise 61. Anti-spyware / -adware software iii. “Why” information 62. Spam protection software o IT 63. Anti-phishing software i. Knowledge acquisition 64. Firewall ii. Knowledge base 65. Encryption iii. Inference engine 66. Biometrics iv. User interface v. Explanation module 80. Neural Network (NN) 81. Fuzzy Logic 82. Genetic Algorithm (GA) 83. Intelligent Agent: 4 types 84. Multi-agent Systems