Find study materials for any course. Check these out:
Browse by school
Make your own
To login with Google, please enable popups
To login with Google, please enable popups
Don’t have an account?
To signup with Google, please enable popups
To signup with Google, please enable popups
Sign up withor
(DSS) models information to support managers and business professionals during the decision making process. 3 quantitative model typically used by DSS:
what if analysis
(EIS) a sppecialized DSS that supports senior-level executives within the organization. An EIS differs from a SSS because an EIS typically containd data from external sources as well as data from internal sources. some capabilities: consolidation
slice and dice
special purpose knowledge based info systems that accomplish
specific tasks on the behalf of its users
market basket analysis
time series information
-segment customers by servicing needs
-customize logistics networks
-listen to signals of market demand & plan accordingly
-differentiate products closer to customer
-strategically manage supply sources
-develop a supply chain infor tech strategy
-adopt performance evaluation measures
supports traditional transactional processing for day-to-day front office operations or systems that deal directly with the customers
primary user-sale, marketing, customer srv
primary benefits-sales forecasting, sales strategies, marketing campaigns
primary users-customers, resellers, partners, suppliers, distributors
primary benefits-market demand, resource and capacity constraints, real-time scheduling
primary users-accounting, finance, logistics, production
primary benefits-forcasting, planing purchasing, material management, warehousing, inventory, distribution
a. logical solution to incompatible applications
b. addresses needs for global info sharing and reporting
c. avoids the pain and expense of fixed legacy systems
a new way of doing things taht does not meet the needs of existing customers; tend to open new markets and destroy old ones. ex.
-Sony's transistor based consumer electronics
-Charles Schwab's onine brokerage
-IBM's personal computers
-Intel's low-end microprocessors
-Intuit's Quickbooks, TurboTax, and Quicken software
-Microsoft's internet based computing. operating system software
produces an improved product customers are eager to buy; such as a faster car or lager hard drive; tend to provide better, faster, cheaper producsts in established markets
World Wide Web (WWW)
a. Tim Berner-Lee built the 1st website August 6, 1991
b. Marc Andreesen developed NCSA Mosaic and gave it away
B2C E-Business Model Example
Carfax has been in the vehicle history report business for 20 years. Common B2C e-business models include e-shops and e-mails.
a. Transaction fees
b. License fees
c. Subscription fees
d. Fees for value-added servicese. Advertising fees
Knowledge Management Systems
Workflow Management Systems
a. Universal access to information and applications
b. The automation of business processes
c. User convenience, timeliness, and ability to conduct business 24x7x365
Three Wireless Techniques Influencing Business Mobility
Radio Frequency Identification (RFID)
a. technologies use active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers.
a. Slash the budget
b. If it doesn’t work, kill it
c. Keep requirements to a minimum
d. Test and deliver frequently
e. Assign non-IT executives to software projects
b. Costc. Scope
a. Information Technology (>50%)
b. Human Resources (~ 40%)
c. Facilities Management (~40%)
d. Finance and Accounting (~20%)
e. Marketing/Sales (~7%)
a. Product-centricity to customer-centricity
b. Mass production to mass customization
c. The value in material things to the value of knowledge and intelligence
a. Something the User Knows such as a User ID and Password
b. Something the user has such as a Smart Card or Token
c. Something that is part of the user such as a fingerprint or voice signature
technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.
Growing SCM Components
Supply chain event management (SCEM)
Selling chain management
Collaborative demand planning
enables an organization to react more quickly to resolve supply chain issues.
applies technology to the activities in the order life cycle from inquiry to sale
helps organizations reduce their investment in inventory, while improving customer satisfaction through product availability.
a. Integrate financial information
b. Integrate customer order information
c. Standardize and speed up manufacturing processes
d. Reduce inventory
e. Standardize human resource information
It is important to understand the primary risk associated with an ERP implementation – Cost. These costs can include software, consulting fees, process rework, customization of the ERP, integration and testing, training, and data warehouse integration and data conversion.
a. online ad
b. pop-up ad
c. associate programs (affiliate programs)
d viral marketing
e. mass customization
h. real simple syndications (RSS)
j. search engine optimization (SEO)
allow businesses to generate commissions or royalties from an Internet site.
(the contraction of “Web log”) – is a Web site in which items are posted on a regular basis and displayed in reverse chronological order.
the distribution of audio or video files, such as radio programs or music videos, over the Internet to play on mobile devices and personal computers.
Online Business Payments
Electronic Data Interchange (EDI)
a standard electronic process for B2B market purchase payments.
Effectiveness Web Site Metrics
a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser.
Phase 1: Planning
Phase 2: Analysis
Phase 3: Design
Phase 4: Development
Phase 5: Testing
Phase 6: Implementation
Phase 7: Maintenance
involves establishing a high-level plan of the intended project and determining project goals. The three primary activities involved in the planning phase are:
a. Identify and select the system for development
b. Assess project feasibility
c. Develop the project plan
involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system. The three primary activities involved in the analysis phase are:
a. Gather business requirements
b. Create process diagrams
c. Perform a buy versus build analysis
involves describing the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation. The two primary activities involved in the design phase are:
a. Design the IT infrastructure
b. Design system models
involves taking all of the detailed design documents from the design phase and transforming them into the actual system. The two primary activities involved in the development phase are:
a. Develop the IT infrastructure
b. Develop the database and programs
involves bringing all the project pieces together into a special testing environment to test for errors, bugs, and interoperability, in order to verify that the system meets all the business requirements defined in the analysis phase. The two primary activities involved in the testing phase are:
a. Write the test conditions
b. Perform the system testing
i. Write detailed user documentation
ii. Determine implementation method
iii. Provide training for the system users
having only a small group of people use the new system until it is evident that the new system performs correctly and then adding the remaining people to the new system.
discarding the old system completely and immediately using the new system.
a. Build a help desk to support the system users
b. Perform system maintenance
c. Provide an environment to support system changes
1. the application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectation from a project.
i. S – Specific
ii. M Measurable
iii. A – Agreed upon
iv. R – Realistic
v. T – Time frames
1. PERT (Program Evaluation and Review Technique) chart
2. Gantt chart
a graphical network model that depicts a project’s task and the relationships between those tasks. PERT chart’s frequently display a project’s critical path (a path from the start to the finish that passes through all the tasks that are critical to completing the project in the shortest amount of time)
Sign up for free and study better.
Get started today!