Home
Library
Contact Us
|
Arts
Architecture
Drawing
Fashion
Sculpture
Business
Advertising
Costing
Human Resource Management
Investing
Management
Marketing
Certifications
GRE
GMAT
IELTS
Commerce
Accounting
Auditing
Banking
eCommerce
Finance
Taxation
Computer Science
Database Management
e-Commerce
Graphics Designing and Multimedia
Maya
Hardware
Information Technology
Networking
Wireless Networking
Operating Systems
Programming Languages
C++
JAVA
Oracle
PHP
Software Engineering
Web Design and Development
Earth Sciences
Geography
Climatology
Engineering
Bioengineering
Chemical Engineering
Electrical Engineering
Electronics Engineering
VHDL
Mechanical Engineering
Software Engineering
Telecommunication Engineering
English
Grammer
Language
Literature
Writing
IELTS
Linguistics
Stories and Novels
Formal Sciences
Computer Science
Mathematics
Statistics
Health Sciences
Neurology
Pediatrics
Management
Marketing
Mass Comm
Natural Sciences
Biology
Chemistry
Physics
Space Science - Astronomy
Political Science
International Relations
Public Administration
Social Sciences
Anthropology
Economics
Psychology
Sociology
|
SiteMap
Links
Table of Contents
>>
This part of ZeePedia is being updated, Please try again later.
Sorry for inconvenience. Thanks
Table of Contents:
Need for information, Sources of Information: Primary, Secondary, Tertiary Sources
Data vs. Information, Information Quality Checklist
Size of the Organization and Information Requirements
Hierarchical organization, Organizational Structure, Culture of the Organization
Elements of Environment: Legal, Economic, Social, Technological, Corporate social responsibility, Ethics
Manual Vs Computerised Information Systems, Emerging Digital Firms
Open-Loop System, Closed Loop System, Open Systems, Closed Systems, Level of Planning
Components of a system, Types of Systems, Attributes of an IS/CBIS
Infrastructure: Transaction Processing System, Management Information System
Support Systems: Office Automation Systems, Decision Support Systems, Types of DSS
Data Mart: Online Analytical Processing (OLAP), Types of Models Used in DSS
Organizational Information Systems, Marketing Information Systems, Key CRM Tasks
Manufacturing Information System, Inventory Sub System, Production Sub System, Quality Sub system
Accounting & Financial Information Systems, Human Resource Information Systems
Decision Making: Types of Problems, Type of Decisions
Phases of decision-making: Intelligence Phase, Design Phase, Choice Phase, Implementation Phase
Planning for System Development: Models Used for and Types of System Development Life-Cycle
Project lifecycle vs. SDLC, Costs of Proposed System, Classic lifecycle Model
Entity Relationship Diagram (ERD), Design of the information flow, data base, User Interface
Incremental Model: Evaluation, Incremental vs. Iterative
Spiral Model: Determine Objectives, Alternatives and Constraints, Prototyping
System Analysis: Systems Analyst, System Design, Designing user interface
System Analysis & Design Methods, Structured Analysis and Design, Flow Chart
Symbols used for flow charts: Good Practices, Data Flow Diagram
Rules for DFD’s: Entity Relationship Diagram
Symbols: Object-Orientation, Object Oriented Analysis
Object Oriented Analysis and Design: Object, Classes, Inheritance, Encapsulation, Polymorphism
Critical Success Factors (CSF): CSF vs. Key Performance Indicator, Centralized vs. Distributed Processing
Security of Information System: Security Issues, Objective, Scope, Policy, Program
Threat Identification: Types of Threats, Control Analysis, Impact analysis, Occurrence of threat
Control Adjustment: cost effective Security, Roles & Responsibility, Report Preparation
Physical vs. Logical access, Viruses, Sources of Transmissions, Technical controls
Antivirus software: Scanners, Active monitors, Behavior blockers, Logical intrusion, Best Password practices, Firewall
Types of Controls: Access Controls, Cryptography, Biometrics
Audit trails and logs: Audit trails and types of errors, IS audit, Parameters of IS audit
Risk Management: Phases, focal Point, System Characterization, Vulnerability Assessment
Control Analysis: Likelihood Determination, Impact Analysis, Risk Determination, Results Documentation
Risk Management: Business Continuity Planning, Components, Phases of BCP, Business Impact Analysis (BIA)
Web Security: Passive attacks, Active Attacks, Methods to avoid internet attacks
Internet Security Controls, Firewall Security SystemsIntrusion Detection Systems, Components of IDS, Digital Certificates
Commerce vs. E-Business, Business to Consumer (B2C), Electronic Data Interchange (EDI), E-Government
Supply Chain Management: Integrating systems, Methods, Using SCM Software
Using ERP Software, Evolution of ERP, Business Objectives and IT
ERP & E-commerce, ERP & CRM, ERP– Ownership and sponsor ship
Ethics in IS: Threats to Privacy, Electronic Surveillance, Data Profiling, TRIPS, Workplace Monitoring