Study Guide – Midterm
MIS 5003
IS Concepts – Ch. 1, lecture notes
-
Define: information system, system, data, information,
batch processing, on-line processing, transaction
-
Distinguish between information, data and knowledge
-
Discuss the components and benefits of an information
system
-
Discuss the characteristics of information across hierarchical
levels
Strategy and IS – Ch. 2, 5, lecture notes
-
Describe the roles of business, organizational and
IS strategy
-
Compare and contrast: Porter’s three generic strategies
model, D’Aveni’s hypercompetion model, and Brandenburger and Nalebuff’s
co-opetition model
-
Describe the major components and apply the value chain,
competitive forces and strategic thrusts models
-
Discuss risks of IS success
-
Discuss eras of IT use
Electronic Commerce – Ch. 6, lecture notes
-
Define: internet,TCP/IP, protocol, packet switching,
WWW, NAP, Information Superhighway, B2B, B2C, ASP, EDI, Cryptography, digital
ID, key, digital signature, hash coding, hash algorithm, message digest,
private key, public key, CERT
-
Describe major characteristics of the Internet
-
Describe the role of protocols for the Internet
-
Describe major characteristics of the World Wide Web
-
Describe major drivers of the Net/Web
-
Describe major models in the New Economy
-
Distinguish between Internet, intranet and extranet
-
Give characteristics of EDI
-
Discuss benefits of EDI, as well as barriers to its
implementation
-
Describe how EDI works, and how it is moving to the
Internet
-
Contrast common (ANSI) EDI with Internet EDI
-
Discuss the advantages of net advertising
-
Discuss the multifaceted approaches of advertising
-
Discuss the use of log files, DoubleClick and tags
as methods for gathering advertising statistic
-
Discuss the use of web banners
-
Discuss the use of the web for retailing
-
Discuss changes in internet-based retailing approaches
-
Discuss affiliation programs
-
Discuss the roles encryption and certificates play
-
Contrast symmetric and asymmetric encryption
-
Discuss key activities in certification management
-
Discuss protecting intranets with firewalls and corporate
servers against being attacked through the Internet
-
Discuss the role Secure Socket Layer, Secure HTTP,
and Secure Electronic Transaction protocols play in protecting e-commerce
Organizational Impacts of IT Use – Ch. 3, lecture notes
-
Define virtual teams
-
Describe the characteristics, advantages and disadvantages
of organizational structures
-
Describe the impact of IS on organizational structure
-
Describe the impact of IS on control activities
-
Distinguish between virtual organizations and corporations
-
Describe the stages in the development of interorganizational
relationships
IT and the Design of Work – Ch. 4, lecture notes
-
Define telecommuting, electronic immigration, outsourcing
-
Describe the demand for IT workers and how employers
are meeting the demand
-
Describe what is meant by virtual workers and discuss
the reasons for hiring them
-
Compare supervision and evaluation using traditional
and newer approaches
-
Discuss the benefits, disadvantages, and issues related
to telecommuting
-
Describe the productivity paradox