Home >>
Computer Science
|
Information Systems |
|
Table of Contents
|
Need for information, Sources of Information: Primary, Secondary, Tertiary Sources
|
Data vs. Information, Information Quality Checklist
|
Size of the Organization and Information Requirements
|
Hierarchical organization, Organizational Structure, Culture of the Organization
|
Elements of Environment: Legal, Economic, Social, Technological, Corporate social responsibility, Ethics
|
Manual Vs Computerised Information Systems, Emerging Digital Firms
|
Open-Loop System, Closed Loop System, Open Systems, Closed Systems, Level of Planning
|
Components of a system, Types of Systems, Attributes of an IS/CBIS
|
Infrastructure: Transaction Processing System, Management Information System
|
Support Systems: Office Automation Systems, Decision Support Systems, Types of DSS
|
Data Mart: Online Analytical Processing (OLAP), Types of Models Used in DSS
|
Organizational Information Systems, Marketing Information Systems, Key CRM Tasks
|
Manufacturing Information System, Inventory Sub System, Production Sub System, Quality Sub system
|
Accounting & Financial Information Systems, Human Resource Information Systems
|
Decision Making: Types of Problems, Type of Decisions
|
Phases of decision-making: Intelligence Phase, Design Phase, Choice Phase, Implementation Phase
|
Planning for System Development: Models Used for and Types of System Development Life-Cycle
|
Project lifecycle vs. SDLC, Costs of Proposed System, Classic lifecycle Model
|
Entity Relationship Diagram (ERD), Design of the information flow, data base, User Interface
|
Incremental Model: Evaluation, Incremental vs. Iterative
|
Spiral Model: Determine Objectives, Alternatives and Constraints, Prototyping
|
System Analysis: Systems Analyst, System Design, Designing user interface
|
System Analysis & Design Methods, Structured Analysis and Design, Flow Chart
|
Symbols used for flow charts: Good Practices, Data Flow Diagram
|
Rules for DFD’s: Entity Relationship Diagram
|
Symbols: Object-Orientation, Object Oriented Analysis
|
Object Oriented Analysis and Design: Object, Classes, Inheritance, Encapsulation, Polymorphism
|
Critical Success Factors (CSF): CSF vs. Key Performance Indicator, Centralized vs. Distributed Processing
|
Security of Information System: Security Issues, Objective, Scope, Policy, Program
|
Threat Identification: Types of Threats, Control Analysis, Impact analysis, Occurrence of threat
|
Control Adjustment: cost effective Security, Roles & Responsibility, Report Preparation
|
Physical vs. Logical access, Viruses, Sources of Transmissions, Technical controls
|
Antivirus software: Scanners, Active monitors, Behavior blockers, Logical intrusion, Best Password practices, Firewall
|
Types of Controls: Access Controls, Cryptography, Biometrics
|
Audit trails and logs: Audit trails and types of errors, IS audit, Parameters of IS audit
|
Risk Management: Phases, focal Point, System Characterization, Vulnerability Assessment
|
Control Analysis: Likelihood Determination, Impact Analysis, Risk Determination, Results Documentation
|
Risk Management: Business Continuity Planning, Components, Phases of BCP, Business Impact Analysis (BIA)
|
Web Security: Passive attacks, Active Attacks, Methods to avoid internet attacks
|
Internet Security Controls, Firewall Security SystemsIntrusion Detection Systems, Components of IDS, Digital Certificates
|
Commerce vs. E-Business, Business to Consumer (B2C), Electronic Data Interchange (EDI), E-Government
|
Supply Chain Management: Integrating systems, Methods, Using SCM Software
|
Using ERP Software, Evolution of ERP, Business Objectives and IT
|
ERP & E-commerce, ERP & CRM, ERP– Ownership and sponsor ship
|
Ethics in IS: Threats to Privacy, Electronic Surveillance, Data Profiling, TRIPS, Workplace Monitoring
|
|
|
Related Documents:
|