| DFD Level | Purpose | Key Feature |
|---|---|---|
| Context Diagram | Highest-level view of the entire system | Shows system as a single process; shows external entities & boundaries only |
| Diagram 0 | Zooms into context diagram | Shows major internal processes, data flows, & data stores |
| Lower-level DFDs | Decomposes each process further | More detail per process |
| Relationship | Meaning | Example |
|---|---|---|
| <<include>> | A use case always invokes another use case | "Login" always includes "Verify Password" |
| <<extend>> | A use case optionally extends another | "Print Receipt" optionally extends "Withdraw Cash" |
| Generalization | One use case/actor inherits from another | Admin is a specialization of User |
| Feature | RDBMS (Relational) | NoSQL (Non-Relational) |
|---|---|---|
| Structure | Tables, rows, columns (structured) | Flexible — documents, key-value, graphs |
| Best for | ERP, Payroll, Banking, Finance | Real-time analytics, IoT, Social media, AI |
| Strength | Strong data integrity, ACID transactions | Massive volume, high-speed ingestion, flexible schema |
| Examples | Oracle DB, SQL Server, SAP HANA, MySQL | MongoDB, Cassandra |
| BI Technique | Description | Example |
|---|---|---|
| Reporting Analysis | Sorting, grouping, summing, filtering structured data | Monthly sales reports, performance dashboards |
| Data Mining | Applying statistical techniques to discover patterns & relationships | Market basket analysis, fraud detection, loan defaults |
| Big Data | Extremely large/complex datasets (Volume, Velocity, Variety) | Google searches, IoT sensor data, social media |
| Feature | Data Warehouse | Data Mart |
|---|---|---|
| Scope | Enterprise-wide, large central repository | Smaller, department-focused subset |
| Users | Data specialists/analysts | Business users in a specific domain (e.g., Sales, HR) |
| Analogy | Distributor in supply chain | Retail store in supply chain |
| BI Technology | Purpose |
|---|---|
| Hadoop | Open-source framework for managing massive distributed data sets. Handles structured, semi-structured, and unstructured data. |
| MapReduce | Programming model: Map (break data into chunks, process in parallel) → Reduce (combine into final output) |
| Push Publishing | BI results delivered automatically (email, notifications) — system pushes to users |
| Pull Publishing | Users request BI results when needed (dashboards, queries) — user-driven |
| Architecture | Description | Best For | Key Advantage | Key Limitation |
|---|---|---|---|---|
| Two-Tier | Client + Server only (data & application combined) | SMEs | Simple, lower cost | Tight dependency; not scalable for large orgs |
| Three-Tier | Web Tier → Application Tier → Data Tier | Large enterprises | Scalable, better security, easier maintenance | Higher complexity & initial cost |
| Web-Based | Three-tier with web browser replacing desktop client | SMEs & large enterprises | Anywhere access, no complex install | Internet dependency, security concerns |
| SOA | Loosely coupled, modular independent services | Large enterprises with complex IT | High integration & flexibility, reusable services | Complex, costly to implement |
| Cloud-Based | ERP hosted entirely in cloud | Distributed global teams | Scalable, pay-as-you-go, auto-updates | Data security, limited customization |
| Protocol | Type | Format | Use Case |
|---|---|---|---|
| SOAP | Strict, secure | XML | Banking, telecom, financial transactions — where security & reliability are critical |
| REST | Lightweight, flexible | JSON (also XML, HTML) | Real-time updates, mobile apps, logistics tracking (e.g., DHL) |
| Model | Who Trades | Example |
|---|---|---|
| B2C | Business → Consumer | Shopee, Amazon |
| B2B | Business → Business | Alibaba, SAP Ariba |
| C2C | Consumer → Consumer | eBay, Facebook Marketplace |
| C2B | Consumer → Business | Upwork, Shutterstock (freelancers) |
| B2G | Business → Government | E-Gov Procurement Portals |
| G2C | Government → Consumer | Online tax filing (IRS Free File) |
| G2G | Government → Government | ITDS international trade data sharing |
| Revenue Model | How It Works | Example |
|---|---|---|
| Advertising | Large audience; earn from displaying ads | Facebook, Google, Yahoo |
| Sales (Merchant) | Directly sells goods/services; owns inventory | Amazon, Gap.com |
| Subscription | Recurring fee (monthly/yearly) for access | Netflix, Wall Street Journal, McAfee |
| Free/Freemium | Basic free; premium features paid | Google, Pandora |
| Transaction Fee | Fee per transaction between buyers/sellers | eBay, E*Trade |
| Brokerage | Connects buyers & sellers; earns commission | Airbnb, Uber, Alibaba |
| Affiliate | Referral fee for directing users to another site | Amazon affiliate, MyPoints |
| Infomediary | Collects consumer/business data; sells to marketers | Bizrate |
| Mixed Model | Multiple revenue streams | Amazon (subscriptions + sales) |
| Flow Type | Direction | Example |
|---|---|---|
| Materials Flow | Downstream ↓ (supplier → customer) | Raw materials → finished goods → consumer |
| Information Flow | Upstream ↑ (customer → supplier) | Customer orders → retailer orders → distributor orders → manufacturer |
| Financial Flow | Upstream ↑ | Receipts → invoices → billing to suppliers |
| SCM Driver | Impact | Trade-off |
|---|---|---|
| Facilities | Location & capacity of plants/warehouses | Centralized = cost efficient; Decentralized = faster delivery |
| Inventory | Raw materials, WIP, finished goods | High inventory = better responsiveness but higher holding cost |
| Transportation | Movement between supply chain stages | Air = fast but expensive; Sea = cheap but slow |
| Information | Data on orders, demand, inventory | Best driver for both responsiveness & efficiency (RFID, ERP, IoT) |
| Moral Dimension | Core Question | Example |
|---|---|---|
| Information Rights | Who controls personal data? | Data privacy |
| Property Rights | Who owns information? | Software piracy |
| Accountability | Who is responsible for IS failures or harms? | AI errors |
| System Quality | What standards protect individual rights and safety? | Data breaches |
| Quality of Life | Is technology improving society? | Job loss, digital stress |
| IP Protection | Covers | Duration |
|---|---|---|
| Copyright | Creative works (books, music, software) | Life of author + 70 years |
| Patent | Inventions, methods, software ideas | 20 years |
| Trademark | Symbols, logos, brand names | Renewable indefinitely |
| Trade Secret | Formulas, algorithms, processes not publicly disclosed | As long as kept secret |
| Malware Type | How It Works | Key Feature |
|---|---|---|
| Virus | Attaches to other programs/files; spreads when humans take action (email attachments, downloads) | Requires human action to spread; delivers payload |
| Worm | Independent program; copies itself across networks without attaching to files | Spreads without human behavior; can halt networks |
| Trojan Horse | Appears benign but executes unexpected malicious actions. Does NOT replicate. | Often delivers viruses. Example: ZeuS steals banking credentials |
| Ransomware | Takes control of computer, blocks files, demands payment | Proliferating on desktop and mobile |
| Spyware | Secretly installs on computer; monitors web activity; serves ads; resets homepages | Infringes on privacy; slows performance |
| SQL Injection | Exploits poorly coded web apps; sends rogue SQL queries to access/plant code in database | Targets input validation errors in web forms |
| Attack / Crime | Description |
|---|---|
| Cybervandalism | Intentional disruption, defacement, or destruction of a website or corporate IS |
| Spoofing | Redirecting a web link to a different address; site masquerades as the intended destination |
| Sniffer | Eavesdropping program that monitors network traffic; steals emails, files, confidential reports |
| DoS Attack | Floods server with false requests to crash it; makes site unavailable to legitimate users |
| DDoS Attack | DoS using numerous computers to overwhelm from multiple launch points |
| Identity Theft | Imposter obtains personal info (SSN, credit card) to impersonate someone else |
| Phishing | Fake websites/emails mimicking legitimate businesses to steal confidential data |
| Spear Phishing | Targeted phishing; message appears to come from a trusted source within the company |
| Evil Twins | Bogus Wi-Fi networks (airports, hotels) that look identical to legitimate networks |
| Pharming | Redirects users to bogus website even when correct address is typed; exploits ISP address data |
| Click Fraud | Fraudulently clicks online ads without intent; serious problem for pay-per-click advertising |
| Social Engineering | Tricking employees into revealing passwords by pretending to be legitimate company members |
| Method | Description |
|---|---|
| Password | Basic authentication; vulnerable to hacking — weakest method |
| Token | Physical device (key ring) displaying frequently changing passcodes |
| Smart Card | Credit-card-sized device with chip containing access permissions and data |
| Biometric | Reads individual human traits (fingerprints, irises, voices) to grant/deny access |
| Two-Factor Authentication | Combines two forms of identification (e.g., smart card + PIN). Significantly more secure. |