Operations Management

Counterintelligence – – the steps an organization takes to protect information sought by "hostile" intelligence gatherers
data – raw unsummarized, and unanalyzed facts.
Project-Oriented Scope – Deliverables that support the project management and IT development processes defined in the Information Technology Project Methodology (ITPM).
Examples:
Business case, project charter and project plan, etc.
Definition Tools: DDT & DSC
intelligent character recognition (ICR) – software that can interpret handprinted text written on paper forms.
Employee confidentiality agreement: – Employee awareness program
Pandora – "It's impoossible to overstate the smartphone," says ______'s founder.
Google – Your search terms reveal your current interest, and ________ developed the Adwords program to serve small, text-only ads related to your search in a list of sponsored links.
Little’s Law states: .  Customers walk into a bank at an average rate of 25 per hour.  On average, there are 5 people waiting in line or being served.  How long does the average customer spend in line and then being served?
Cause and effect diagram aka fishbone diagram – common quality improvement tools used for risk management purposes. Problem is placed in a box on the right side of diagram, a horizontal line is drawn and diagonal lines resembling ribs are added to connect the boxes above and below the main horizontal line (or backbone) Each box contains a different category. eX: People, materials, equipment, methods. Usually 4 categories. Brainstorming the root causes for each category. Purpose is to permit the team to explore, identify, and graphically display all of the root causes of a problem.
disruptive innovations – Economist Joseph Schumpeter used the term creative destruction to describe what happens in an industry when _____________________ threaten the stablished players.
Conceptual DM= – High threshold of Amb and INTUITION
A group of processes that determine the appropriateness of medical services is ? – Utilization management
A threat to data security is: – Malware
protocol – in healthcare, a detailed plan of care for a specific medical condition based on investigative studies in medical research, a rule or procedure to be followed in a clinical trial; in a computer network, a protocol is used to address and ensure delivery of data
Little’s Lаw stаtes: .  Custоmers wаlk intо a bank at an average rate оf 25 per hour.  On average, there are 5 people waiting in line or being served.  How long does the average customer spend in line and then being served?
Bluetooth – personal area network to connect consumer devices
Adjustment recommendations – Recommending changes to the system.

This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply