Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES
IT Environment IT strategy IT infrastructure IT function Systems development process
Business Strategy and the Value Chain Alternative strategies IT and value-chain management
IT and Multi-User Systems Terminal emulation File-server approach Client-server systems
E-Business E-business basics Static and dynamic Web pages for e-business applications Client tier Middle tier Bottom tier
E-Business E-business and business processes Interacting with customers Interacting with suppliers Internal operations
Organizing and Analyzing Data Data warehousing Integrated data Nonvolatile data Summary and detailed data Multi-dimensional data Data mining E-commerce and data mining
Integrating Business Processes, Data, and Applications Enterprise resource planning (ERP) systems Magnitude and scope of ERP systems Selection and use of ERP Integration of the supply chain through e-commerce
Integrating Business Processes, Data, and Applications XML (Extensible Markup Language) Relational databases and data integrity Customer relationship management systems
IT and Business Processes: Risks and Controls Privacy Data collection User control Privacy policies Secure transactions Encryption and authentication Digital signatures, hashing, and message integrity Digital certificates Timestamping
IT and Business Processes: A Role for Accountants Assurance services Analyze IT investments Design and implement IT solutions Enhance value of current services
K E Y T E R M S Asymmetric key encryption Bottom tier Classification tree Client-server system Client tier Cookie Customer relationship management (CRM) system Data mining
K E Y T E R M S Data warehouse Dynamic Web pages E-business E-commerce Electronic data interchange (EDI) Enterprise resource planning (ERP) system
K E Y T E R M S Extranets File server Firewall Genetic algorithm HTML (Hypertext Markup Language) Information technology (IT) environment
K E Y T E R M S Internet protocol (IP) address Intranet IT function IT infrastructure IT strategy Local area network (LAN)
K E Y T E R M S Middle tier Multi-dimensional analysis Neural nets OLTP OLAP Personally identifiable information Static Web pages
K E Y T E R M S Statistical analysis Symmetric key encryption Systems development process Terminal emulation Three-tier, client-server architecture
K E Y T E R M S Value chain Wide area networks (WAN) XML (Extensible Markup Language) XML Schema XSL (Extensible Style Sheet Language)