This class was created by Brainscape user Emily nield. Visit their profile to learn more about the creator.

Decks in this class (19)

Chapter 1: Data Introduction
Internet of things 1,
Information age 2,
Machine to machine m2m 3
26  cards
Chapter 1: Competitive Advantage and Stakeholders
Business strategy 1,
Stakeholder 2,
Government 3
11  cards
Chapter 1: SWOT
Purpose of swot analysis 1,
Strengths 2,
Weaknesses 3
5  cards
Chapter 1: Porter's Five Forces
What is the purpose of the five f...,
1 buyer power 2,
Switching costs 3
10  cards
Chapter 1: Porter's Three Generic Strategies
The three generic strategies obje...,
Broad market and low cost 2,
Broad market and high cost 3
8  cards
Chapter 1: Value Chain Analysis
Value chain analysis objective 1,
Business process 2,
Value chain analysis 3
5  cards
Chapter 2: Making Business Decisions
What are the six steps in the dec...,
1 problem identification 2,
2 data collection 3
15  cards
Chapter 2: Measuring Business Decisions
Project 1,
Metrics 2,
Critical success factors csfs 3
11  cards
Chapter 2: Using MIS to Make Business Decisions
Model 1,
How do models help managers 2,
Transaction processing system tps 3
17  cards
Chapter 2: Using AI to Make Business Decisions
Artificial intelligence ai 1,
Intelligent system 2,
Machine learning 3
9  cards
Chapter 2: Business Process Modeling
Customer facing process 1,
Business facing process 2,
Business process model and notati...
7  cards
Chapter 2: Automation
Operational business processes 1,
Operationalized analytics 2,
Business process improvement 3
9  cards
Chapter 4: Information Ethics
Copy right 1,
Intellectual property 2,
Patent 3
12  cards
Chapter 4: Information Management Policies
What are the six e policies 1,
1 ethical computer use policy 2,
Competitive click fraud 3
12  cards
Chapter 4: Ethical Guidelines for Information Management
Information secrecy 1,
Information management 2,
Information property 3
5  cards
Chapter 4: Internet Monitoring Technologies
Key logger or key trapper software 1,
Hardware key logger 2,
Cookie 3
7  cards
Chapter 4: Hackers
Downtime 1,
Information security 2,
Hackers 3
21  cards
Chapter 4: People Authentication and Authorization
Social engineering 1,
Dumpster diving 2,
Pretexting 3
11  cards
Chapter 4: Data, Prevention and Resistance
Privilege escalation 1,
Encryption 2,
Certificate authority 3
5  cards

More about
OMIS 5110

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Emily nield's OMIS 5110 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Make Flashcards