This class was created by Brainscape user Emily nield. Visit their profile to learn more about the creator.

Decks in this class (19)

Chapter 1: Data Introduction
Internet of things,
Information age,
Machine to machine m2m
26  cards
Chapter 1: Competitive Advantage and Stakeholders
Business strategy,
Stakeholder,
Government
11  cards
Chapter 1: SWOT
Purpose of swot analysis,
Strengths,
Weaknesses
5  cards
Chapter 1: Porter's Five Forces
What is the purpose of the five f...,
1 buyer power,
Switching costs
10  cards
Chapter 1: Porter's Three Generic Strategies
The three generic strategies obje...,
Broad market and low cost,
Broad market and high cost
8  cards
Chapter 1: Value Chain Analysis
Value chain analysis objective,
Business process,
Value chain analysis
5  cards
Chapter 2: Making Business Decisions
What are the six steps in the dec...,
1 problem identification,
2 data collection
15  cards
Chapter 2: Measuring Business Decisions
Project,
Metrics,
Critical success factors csfs
11  cards
Chapter 2: Using MIS to Make Business Decisions
Model,
How do models help managers,
Transaction processing system tps
17  cards
Chapter 2: Using AI to Make Business Decisions
Artificial intelligence ai,
Intelligent system,
Machine learning
9  cards
Chapter 2: Business Process Modeling
Customer facing process,
Business facing process,
Business process model and notati...
7  cards
Chapter 2: Automation
Operational business processes,
Operationalized analytics,
Business process improvement
9  cards
Chapter 4: Information Ethics
Copy right,
Intellectual property,
Patent
12  cards
Chapter 4: Information Management Policies
What are the six e policies,
1 ethical computer use policy,
Competitive click fraud
12  cards
Chapter 4: Ethical Guidelines for Information Management
Information secrecy,
Information management,
Information property
5  cards
Chapter 4: Internet Monitoring Technologies
Key logger or key trapper software,
Hardware key logger,
Cookie
7  cards
Chapter 4: Hackers
Downtime,
Information security,
Hackers
21  cards
Chapter 4: People Authentication and Authorization
Social engineering,
Dumpster diving,
Pretexting
11  cards
Chapter 4: Data, Prevention and Resistance
Privilege escalation,
Encryption,
Certificate authority
5  cards

More about
OMIS 5110

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Emily nield's OMIS 5110 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Make Flashcards