Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

MANAGEMENT

INFORMATION SYSTEMS
MANAGING THE DIGITAL FIRM

FIFTEENTH EDITION

GLOBAL EDITION

Kenneth C. Laudon
New York University

Jane P. Laudon
Azimuth Information Systems
Brief Contents

PART ONE Organizations, Management, and the Networked


Enterprise 29
Chapter 1 Information Systems in Global Business Today 30
Chapter 2 Global E-business and Collaboration 68
Chapter 3 Information Systems, Organizations, and Strategy 106
Chapter 4 Ethical and Social Issues in Information Systems 150

PART TWO Information Technology Infrastructure 191


Chapter 5 IT Infrastructure and Emerging Technologies 192
Chapter 6 Foundations of Business Intelligence: Databases and Information
Management 238
Chapter 7 Telecommunications, the Internet, and Wireless Technology 276
Chapter 8 Securing Information Systems 320

PART THREE Key System Applications for the Digital Age 363
Chapter 9 Achieving Operational Excellence and Customer Intimacy: Enterprise
Applications 364
Chapter 10 E-commerce: Digital Markets, Digital Goods 398
Chapter 11 Managing Knowledge 444
Chapter 12 Enhancing Decision Making 480

PART FOUR Building and Managing Systems 513


Chapter 13 Building Information Systems 514
Chapter 14 Managing Projects 554
Chapter 15 Managing Global Systems 588

Glossary 619

Indexes 631

4
Complete Contents

PART ONE Organizations, Management, and the Networked


Enterprise 29
Chapter 1 Information Systems in Global Business Today 30
Opening Case: Rugby Football Union Tries Big Data 31
1-1 How are information systems transforming business, and why are they so
essential for running and managing a business today? 33
How Information Systems Are Transforming Business 34 • What's New in
Management Information Systems? 35
Interactive Session: Management The Mobile Pocket Office 37
Globalization Challenges and Opportunities: A Flattened World 39 • The
Emerging Digital Firm 40 • Strategic Business Objectives of Information
Systems 41
1-2 What is an information system? How does it work? What are its
management, organization, and technology components? Why are
complementary assets essential for ensuring that information systems
provide genuine value for organizations? 44
What Is an Information System? 44 • Dimensions of Information Systems 46
Interactive Session: Technology Digital Transformation of Healthcare at
Singapore's JurongHealth Services 51
It Isn't Just Technology: A Business Perspective on Information
Systems 52 • Complementary Assets: Organizational Capital and the Right
Business Model 54
1-3 What academic disciplines are used to study information systems,
and how does each contribute to an understanding of information
systems? 56
Technical Approach 56 • Behavioral Approach 57 • Approach of This Text:
Sociotechnical Systems 58
Review Summary 59 • Key Terms 60 • Review Questions 60 • Discussion
Questions 61
Hands-On MIS Projects 61
Collaboration and Teamwork Project 62
Case Study: Are Farms Becoming Digital Firms? 62
References: 66

5
6 Contents

Chapter 2 Global E-business and Collaboration 68


Opening Case: Enterprise Social Networking Helps ABB Innovate and Grow 69
2-1 What are business processes? How are they related to information
systems? 71
Business Processes 71 • How Information Technology Improves Business
Processes 73
2-2 How do systems serve the different management groups in a business,
and how do systems that link the enterprise improve organizational
performance? 74
Systems for Different Management Groups 74 • Systems for Linking the
Enterprise 79
Interactive Session: Organizations New Systems Help Plan International
Manage Its Human Resources 80
E-business, E-commerce, and E-government 84
2-3 Why are systems for collaboration and social business so important, and
what technologies do they use? 85
What Is Collaboration? 85 • What Is Social Business? 86 • Business Benefits
of Collaboration and Social Business 87 • Building a Collaborative Culture and
Business Processes 87 • Tools and Technologies for Collaboration and Social
Business 89
Interactive Session: Technology Collaborating the Glasscubes Way 91
2-4 What is the role of the information systems function in a business? 95
The Information Systems Department 96 • Organizing the Information Systems
Function 97
Review Summary 98 • Key Terms 99 • Review Questions 99 • Discussion
Questions 100
Hands-On MIS Projects 100
Collaboration and Teamwork Project 101
Case Study: Social Business: Full Speed Ahead or Proceed with Caution? 101
References: 104

Chapter 3 Information Systems, Organizations, and Strategy 106


Opening Case: Tate & Lyle Devise a Global IT Strategy 107
3-1 Which features of organizations do managers need to know about to
build and use information systems successfully? 109
What Is an Organization? 110 • Features of Organizations 112
3-2 What is the impact of information systems on organizations? 117
Economic Impacts 117 • Organizational and Behavioral Impacts 118
Interactive Session: Management Can Technology Replace Managers? 120
The Internet and Organizations 122 • Implications for the Design and
Understanding of Information Systems 122
Contents 7

3-3 How do Porter's competitive forces model, the value chain model,
synergies, core competencies, and network economics help companies
develop competitive strategies using information systems? 123
Porter's Competitive Forces Model 123 • Information System Strategies for
Dealing with Competitive Forces 125 • The Internet's Impact on Competitive
Advantage 128 • The Business Value Chain Model 129
Interactive Session: Technology Smart Products, Smart Companies 130
Synergies, Core Competencies, and Network-Based Strategies 134
3-4 What are the challenges posed by strategic information systems, and
how should they be addressed? 138
Sustaining Competitive Advantage 138 • Aligning IT with Business
Objectives 139 • Managing Strategic Transitions 140
Review Summary 140 • Key Terms 141 • Review Questions 141 • Discussion
Questions 142
Hands-On MIS Projects 142
Collaboration and Teamwork Project 143
Case Study: Deutsche Bank: The Cost of Legacy Systems 144
References: 147

Chapter 4 Ethical and Social Issues in Information Systems 150


Opening Case: The Dark Side of Big Data 151
4-1 What ethical, social, and political issues are raised by information
systems? 153
A Model for Thinking About Ethical, Social, and Political Issues 155 • Five Moral
Dimensions of the Information Age 156 • Key Technology Trends that Raise
Ethical Issues 156
4-2 What specific principles for conduct can be used to guide ethical
decisions? 158
Basic Concepts: Responsibility, Accountability, and Liability 159 • Ethical
Analysis 160 • Candidate Ethical Principles 160 • Professional Codes of
Conduct 161 • Some Real-World Ethical Dilemmas 161
4-3 Why do contemporary information systems technology and the Internet
pose challenges to the protection of individual privacy and intellectual
property? 162
Information Rights: Privacy and Freedom in the Internet Age 162 • Property
Rights: Intellectual Property 169
4-4 How have information systems affected laws for establishing
accountability and liability and the quality of everyday life? 172
Computer-Related Liability Problems 173 • System Quality: Data Quality and
System Errors 174 • Quality of Life: Equity, Access, and Boundaries 174
Interactive Session: Technology Monitoring in the Workplace 178
Health Risks: RSI, CVS, and Cognitive Decline 180
Interactive Session: Organizations Are We Relying Too Much on Computers to
Think for Us? 181
Review Summary 183 • Key Terms 184 • Review Questions 184 • Discussion
Questions 185
Hands-On MIS Projects 185
8 Contents

Collaboration and Teamwork Project 186


Case Study: Facebook Privacy: What Privacy? 186
References: 190

PART TWO Information Technology Infrastructure 191


Chapter 5 IT Infrastructure and Emerging Technologies 192
Opening Case: EasyJet Flies High with Cloud Computing 193
5-1 What is IT infrastructure, and what are the stages and drivers of IT
infrastructure evolution? 195
Defining IT Infrastructure 195 • Evolution of IT Infrastructure 197 • Technology
Drivers of Infrastructure Evolution 201
5-2 What are the components of IT infrastructure? 206
Computer Hardware Platforms 207 • Operating System Platforms 208
• Enterprise Software Applications 208 • Data Management and Storage 209
• Networking/Telecommunications Platforms 209 • Internet Platforms 209
• Consulting and System Integration Services 210
5-3 What are the current trends in computer hardware platforms? 210
The Mobile Digital Platform 210
Interactive Session: Technology Wearable Computers Change How We Work 211
Consumerization of IT and BYOD 212 • Quantum Computing 213
• Virtualization 213 • Cloud Computing 213
Interactive Session: Organizations Glory Finds Solutions in the Cloud 216
Green Computing 219 • High-Performance and Power-Saving Processors 220
5-4 What are the current computer software platforms and trends? 220
Linux and Open Source Software 220 • Software for the Web: Java, HTML, and
HTML5 221 • Web Services and Service-Oriented Architecture 222 • Software
Outsourcing and Cloud Services 224
5-5 What are the challenges of managing IT infrastructure and management
solutions? 226
Dealing with Platform and Infrastructure Change 226 • Management and
Governance 227 • Making Wise Infrastructure Investments 227
Review Summary 230 • Key Terms 231 • Review Questions 232 • Discussion
Questions 232
Hands-On MIS Projects 232
Collaboration and Teamwork Project 233
Case Study: BYOD: Business Opportunity or Big Headache? 234
References: 237

Chapter 6 Foundations of Business Intelligence: Databases


and Information Management 238
Opening Case: BAE Systems 239
6-1 What are the problems of managing data resources in a traditional file
environment? 241
Contents 9

File Organization Terms and Concepts 242 • Problems with the Traditional File
Environment 243
6-2 What are the major capabilities of database management systems
(DBMS), and why is a relational DBMS so powerful? 245
Database Management Systems 245 • Capabilities of Database Management
Systems 248 • Designing Databases 250 • Non-relational Databases and
Databases in the Cloud 253
6-3 What are the principal tools and technologies for accessing information
from databases to improve business performance and decision
making? 254
The Challenge of Big Data 254 • Business Intelligence Infrastructure 255
Interactive Session: Organizations Data-Driven Crime Fighting Goes Global
256
Analytical Tools: Relationships, Patterns, Trends 260 • Databases and the Web 263
6-4 Why are information policy, data administration, and data quality
assurance essential for managing the firm's data resources? 264
Establishing an Information Policy 264 • Ensuring Data Quality 265
Interactive Session: Management Societe Generale Builds an Intelligent
System to Manage Information Flow 267
Review Summary 268 • Key Terms 269 • Review Questions 270 • Discussion
Questions 270
Hands-On MIS Projects 270
Collaboration and Teamwork Project 272
Case Study: Lego's Enterprise Software Spurs Growth 272
References: 275

Chapter 7 Telecommunications, the Internet, and Wireless


Technology 276
Opening Case: Wireless Technology Makes Dundee Precious Metals Good as
Gold 277
7-1 What are the principal components of telecommunications networks and
key networking technologies? 279
Networking and Communication Trends 279 • What is a Computer
Network? 280 • Key Digital Networking Technologies 282
7-2 What are the different types of networks? 285
Signals: Digital Versus Analog 285 • Types of Networks 285 • Transmission
Media and Transmission Speed 287
7-3 How do the Internet and Internet technology work, and how do they
support communication and e-business? 287
What is the Internet? 288 • Internet Addressing and Architecture 288
Interactive Session: Organizations The Battle over Net Neutrality 291
Internet Services and Communication Tools 293
Interactive Session: Management Monitoring Employees on Networks:
Unethical or Good Business? 296
The Web 298
10 Contents

7-4 What are the principal technologies and standards for wireless
networking, communication, and Internet access? 306
Cellular Systems 306 • Wireless Computer Networks and Internet
Access 307 • RFID and Wireless Sensor Networks 309
Review Summary 312 • Key Terms 313 • Review Questions 314 • Discussion
Questions 314
Hands-On MIS Projects 314
Collaboration and Teamwork Project 315
Case Study: RFID Propels the Angkasa Library Management System 316
References: 319

Chapter 8 Securing Information Systems 320


Opening Case: Hackers Attack Singapore's Telecom Infrastructure 321
8-1 Why are information systems vulnerable to destruction, error, and
abuse? 323
Why Systems are Vulnerable 323 • Malicious Software: Viruses, Worms, Trojan
Horses, and Spyware 326 • Hackers and Computer Crime 329 • Internal
Threats: Employees 333 • Software Vulnerability 334
8-2 What is the business value of security and control? 335
Legal and Regulatory Requirements for Electronic Records Management 335
• Electronic Evidence and Computer Forensics 336
8-3 What are the components of an organizational framework for security
and control? 337
Information Systems Controls 337 • Risk Assessment 338
Interactive Session: Organizations Stuxnet and the Changing Face of
Cyberwarfare 339
Security Policy 341 • Disaster Recovery Planning and Business Continuity
Planning 342 • The Role of Auditing 343
8-4 What are the most important tools and technologies for safeguarding
information resources? 343
Identity Management and Authentication 344 • Firewalls, Intrusion
Detection Systems, and Antivirus Software 346 • Securing Wireless
Networks 348 • Encryption and Public Key Infrastructure 348 • Ensuring
System Availability 350 • Security Issues for Cloud Computing and the Mobile
Digital Platform 351 • Ensuring Software Quality 352
Interactive Session: Technology BYOD: A Security Nightmare? 353
Review Summary 354 • Key Terms 355 • Review Questions 356 • Discussion
Questions 357
Hands-On MIS Projects 357
Collaboration and Teamwork Project 358
Case Study: Information Security Threats and Policies in Europe 358
References: 361
Contents 11

PART THREE Key System Applications for the Digital Age 363
Chapter 9 Achieving Operational Excellence and Customer Intimacy:
Enterprise Applications 364
Opening Case: Alimentation Couche-Tard Competes Using Enterprise Systems
365
9-1 How do enterprise systems help businesses achieve operational
excellence? 367
What are Enterprise Systems? 368 • Enterprise Software 369 • Business Value
of Enterprise Systems 370
9-2 How do supply chain management systems coordinate planning,
production, and logistics with suppliers? 371
The Supply Chain 371 • Information Systems and Supply Chain
Management 372 • Supply Chain Management Software 373 • Global Supply
Chains and the Internet 375 • Business Value of Supply Chain Management
Systems 376
9-3 How do customer relationship management systems help firms achieve
customer intimacy? 377
What is Customer Relationship Management? 377
Interactive Session: Management Unilever Unifies Globally with Enhanced
ERP 378
Customer Relationship Management Software 381 • Operational and Analytical
CRM 383
Interactive Session: Organizations DP World Takes Port Management to the
Next Level with RFID 385
Business Value of Customer Relationship Management Systems 387
9-4 What are the challenges that enterprise applications pose, and how are
enterprise applications taking advantage of new technologies? 387
Enterprise Application Challenges 387 • Next-Generation Enterprise
Applications 388
Review Summary 390 • Key Terms 391 • Review Questions 391 • Discussion
Questions 392
Hands-On MIS Projects 392
Collaboration and Teamwork Project 393
Case Study: Customer Relationship Management Helps Celcom Become Number
One 394
References: 397

Chapter 10 E-commerce: Digital Markets, Digital Goods 398


Opening Case: Uber Storms Europe: Europe Strikes Back 399
10-1 What are the unique features of e-commerce, digital markets, and digital
goods? 401
12 Contents

E-commerce Today 402 • The New E-commerce: Social, Mobile, Local 403
• Why E-commerce is Different 405 • Key Concepts in E-commerce: Digital
Markets and Digital Goods in a Global Marketplace 408
10-2 What are the principal e-commerce business and revenue models? 412
Types of E-commerce 412 • E-commerce Business Models 412 • E-commerce
Revenue Models 415
10-3 How has e-commerce transformed marketing? 417
Behavioral Targeting 418 • Social E-Commerce and Social Network
Marketing 422
Interactive Session: Technology Getting Social with Customers 424
10-4 How has e-commerce affected business-to-business transactions? 426
Electronic Data Interchange (EDI) 426 • New Ways of B2B Buying and
Selling 427
10-5 What is the role of m-commerce in business, and what are the most
important m-commerce applications? 429
Location-Based Services and Applications 430
Interactive Session: Organizations Can Instacart Deliver? 431
Other Mobile Commerce Services 433
10-6 What issues must be addressed when building an e-commerce
presence? 433
Develop an E-Commerce Presence Map 434 • Develop a Timeline:
Milestones 435
Review Summary 435 • Key Terms 436 • Review Questions 437 • Discussion
Questions 437
Hands-On MIS Projects 437
Collaboration and Teamwork Project 438
Case Study: Walmart and Amazon Duke It Out for E-commerce Supremacy 439
References: 442

Chapter 11 Managing Knowledge 444


Opening Case: Fiat: Real Time Management with Business Intelligence 445
11-1 What is the role of knowledge management systems in business? 447
Important Dimensions of Knowledge 448 • The Knowledge Management Value
Chain 449 • Types of Knowledge Management Systems 452
11-2 What types of systems are used for enterprise-wide knowledgge
management, and how do they provide value for businesses? 453
Enterprise Content Management Systems 453
Interactive Session: Organizations ECM in the Cloud Empowers New Zealand
Department of Conservation 454
Locating and Sharing Expertise 456 • Learning Management Systems 456
11-3 What are the major types of knowledge work systems, and how do they
provide value for firms? 457
Knowledge Workers and Knowledge Work 457 • Requirements of Knowledge
Work Systems 457 • Examples of Knowledge Work Systems 458
11-4 What are the business benefits of using intelligent techniques for
knowledge management? 460
Contents 13

Capturing Knowledge: Expert Systems 460


Interactive Session: Technology Will Robots Replace People in Manufacturing?
461
Organizational Intelligence: Case-Based Reasoning 464 • Fuzzy Logic
Systems 465 • Machine Learning 467 • Intelligent Agents 470 • Hybrid AI
Systems 471
Review Summary 472 • Key Terms 473 • Review Questions 473 • Discussion
Questions 474
Hands-On MIS Projects 474
Collaboration and Teamwork Project 475
Case Study: Knowledge Management and Collaboration at Tata Consulting
Services 475
References: 479

Chapter 12 Enhancing Decision Making 480


Opening Case: Roche: Managing Diabetes with Big Data and Mobile Apps 481
12-1 What are the different types of decisions, and how does the decision-
making process work? 483
Business Value of Improved Decision Making 483 • Types of
Decisions 483 • The Decision-Making Process 485
12-2 How do information systems support the activities of managers and
management decision making? 486
Managerial Roles 486 • Real-World Decision Making 488 • High-Velocity
Automated Decision Making 489
12-3 How do business intelligence and business analytics support decision
making? 490
What is Business Intelligence? 490 • The Business Intelligence
Environment 491 • Business Intelligence and Analytics Capabilities 492
Interactive Session: Technology Singapore Sports Institute Uses Analytics for
SEA Games 495
Management Strategies for Developing BI and BA Capabilities 497
Interactive Session: Management Britain's National Health Service Jettisons
Choose and Book System 498
12-4 How do different decision-making constituencies in an organization
use business intelligence, and what is the role of information
systems in helping people working in a group make decisions more
efficiently? 500
Decision Support for Operational And Middle Management 500 • Decision
Support for Senior Management: Balanced Scorecard and Enterprise
Performance Management Methods 503 • Group Decision-Support Systems
(GDSS) 504
Review Summary 505 • Key Terms 506 • Review Questions 506 • Discussion
Questions 507
Hands-On MIS Projects 507
Collaboration and Teamwork Project 507
Case Study: GE Bets on the Internet of Things and Big Data Analytics 508
References: 512
14 Contents

PART FOUR Building and Managing Systems 513


Chapter 13 Building Information Systems 514
Opening Case: Angostura Builds a Mobile Sales System 515
13-1 How does building new systems produce organizational change? 517
Systems Development and Organizational Change 517 • Business Process
Redesign 519
13-2 What are the core activities in the systems development process? 522
Systems Analysis 523 • Systems Design 524 • Completing the Systems
Development Process 525
13-3 What are the principal methodologies for modeling and designing
systems? 528
Structured Methodologies 528 • Object-Oriented Development 530
• Computer-Aided Software Engineering 532
13-4 What are alternative methods for building information systems? 532
Traditional Systems Life Cycle 533 • Prototyping 534 • End-User
Development 535 • Application Software Packages, Software Services, and
Outsourcing 536
Interactive Session: Organizations Fujitsu Selects a SaaS Solution to Simplify
the Sales Process 537
13-5 What are new approaches for system building in the digital firm era? 540
Rapid Application Development (RAD), Agile Development, and DevOps 541 •
Component-Based Development and Web Services 542 • Mobile Application
Development: Designing for A Multiscreen World 542
Interactive Session: Technology Developing Mobile Apps: What's Different 544
Review Summary 545 • Key Terms 547 • Review Questions 547 • Discussion
Questions 548
Hands-On MIS Projects 548
Collaboration and Teamwork Project 549
Case Study: ConAgra's Recipe for a Better Human Resources System 550
References: 553

Chapter 14 Managing Projects 554


Opening Case: Intuit Counts on Project Management 555
14-1 What are the objectives of project management, and why is it so
essential in developing information systems? 557
Runaway Projects and System Failure 557 • Project Management
Objectives 558
14-2 What methods can be used for selecting and evaluating information
systems projects and aligning them with the firm's business goals? 559
Management Structure for Information Systems Projects 559 • Linking Systems
Projects to The Business Plan 560 • Information Requirements and Key
Performance Indicators 562 • Portfolio Analysis 562 • Scoring Models 563
14-3 How can firms assess the business value of information systems? 564
Information System Costs and Benefits 564 • Capital Budgeting for Information
Systems 565 • Limitations of Financial Models 566
Contents 15

14-4 What are the principal risk factors in information systems projects, and
how can they be managed? 566
Dimensions of Project Risk 566 • Change Management and the Concept of
Implementation 567
Interactive Session: Management Can the National Health Service Go
Paperless? 568
Controlling Risk Factors 571
Interactive Session: Technology Hilti AG: Putting Things Together with New
Project Management Tools 575
Designing for the Organization 577 • Project Management Software Tools 577
Review Summary 578 • Key Terms 579 • Review Questions 579 • Discussion
Questions 580
Hands-On MIS Projects 580
Collaboration and Teamwork Project 581
Case Study: A Shaky Start for Healthcare.gov 581
References: 585

Chapter 15 Managing Global Systems 588


Opening Case: The Bel Group: Laughing All the Way to Success 589
15-1 What major factors are driving the internationalization of business? 591
Developing an International Information Systems Architecture 592 • The Global
Environment: Business Drivers and Challenges 593 • State of the Art 596
15-2 What are the alternative strategies for developing global businesses? 597
Global Strategies and Business Organization 597 • Global Systems to Fit the
Strategy 598 • Reorganizing the Business 599
15-3 What are the challenges posed by global information systems and
management solutions for these challenges? 600
A Typical Scenario: Disorganization on a Global Scale 600 • Global Systems
Strategy 601 • The Management Solution: Implementation 603
15-4 What are the issues and technical alternatives to be considered when
developing international information systems? 604
Computing Platforms and Systems Integration 605 • Connectivity 605
Interactive Session: Organizations Indian E-commerce: Obstacles to
Opportunity 607
Software Localization 608
Interactive Session: Management Steelcase Designs Goes for Global Talent
Management 609
Review Summary 611 • Key Terms 612 • Review Questions 612 • Discussion
Questions 612
Hands-On MIS Projects 613
Collaboration and Teamwork Project 614
Case Study: Crocs Clambers to Global Efficiency 614
References: 618
Glossary 619
Indexes 631
Business Cases And Interactive Sessions
Here are some of the business firms you will find described in the cases and Interactive Sessions
of this book:

Chapter 1: Information Systems in Global Business Today


Rugby Football Union Tries Big Data
The Mobile Pocket Office
Digital Transformation of Healthcare at Singapore's JurongHealth Services
Are Farms Becoming Digital Firms?

Chapter 2: Global E-Business and Collaboration


Enterprise Social Networking Helps ABB Innovate and Grow
New Systems Help Plan International Manage Its Human Resources
Collaborating the Glasscubes Way
Social Business: Full Speed Ahead or Proceed with Caution?

Chapter 3: Information Systems, Organizations, and Strategy


Tate & Lyle Devise a Global IT Strategy
Can Technology Replace Managers?
Smart Products, Smart Companies
Deutsche Bank: The Cost of Legacy Systems

Chapter 4: Ethical and Social Issues in Information Systems


The Dark Side of Big Data
Monitoring in the Workplace
Are We Relying Too Much on Computers to Think for Us?
Facebook Privacy: What Privacy?

Chapter 5: IT Infrastructure and Emerging Technologies


EasyJet Flies High with Cloud Computing
Wearable Computers Change How We Work
Glory Finds Solutions in the Cloud
BYOD: Business Opportunity or Big Headache?

Chapter 6: Foundations of Business Intelligence: Databases and Information Management


BAE Systems
Data-Driven Crime Fighting Goes Global
Societe Generale Builds an Intelligent System to Manage Information Flow
Lego's Enterprise Software Spurs Growth

Chapter 7: Telecommunications, the Internet and Wireless Technology


Wireless Technology Makes Dundee Precious Metals Good as Gold
The Global Battle over Net Neutrality
Monitoring Employees on Networks: Unethical or Good Business?
RFID Propels the Angkasa Library Management System

16
Business Cases and Interactive Sessions 17

Chapter 8: Securing Information Systems


Hackers Attack Singapore's Telecom Infrastructure
Stuxnet and the Changing Face of Cyberwarfare
BYOD: A Security Nightmare?
Information Security Threats and Policies in Europe

Chapter 9: Achieving Operational Excellence and Customer Intimacy: Enterprise


Applications
Alimentation Couche-Tard Competes Using Enterprise Systems
Unilever Unifies Globally with Enhanced ERP
DP World Takes Port Management to the Next Level with RFID
Customer Relationship Management Helps Celcom Become Number One

Chapter 10: E-commerce: Digital Markets, Digital Goods


Uber Storms Europe: Europe Strikes Back
Getting Social with Customers
Can Instacart Deliver?
Walmart and Amazon Duke It Out for E-commerce Supremacy

Chapter 11: Managing Knowledge


Fiat: Real Time Management with Business Intelligence
ECM in the Cloud Empowers New Zealand Department of Conservation
Will Robots Replace People in Manufacturing?
Knowledge Management and Collaboration at Tata Consulting Services

Chapter 12: Enhancing Decision Making


Roche: Managing Diabetes with Big Data and Mobile Apps
Singapore Sports Institute Uses Analytics for SEA Games
Britain's National Health Service Jettisons Choose and Book System
GE Bets on the Internet of Things and Big Data Analytics

Chapter 13: Building Information Systems


Angostura Builds a Mobile Sales System
Fujitsu Selects a SaaS Solution to Simplify the Sales Process
Developing Mobile Apps: What’s Different
ConAgra’s Recipe for a Better Human Resources System

Chapter 14: Managing Projects


Intuit Counts on Project Management
Can the National Health Service Go Paperless?
Hilti AG: Putting Things Together with New Project Management Tools
A Shaky Start for Healthcare.gov

Chapter 15: Managing Global Systems


The Bel Group: Laughing All the Way to Success
Indian E-commerce: Obstacles to Opportunity
Steelcase Designs Goes for Global Talent Management
Crocs Clambers to Global Efficiency
Glossary

3-D printing Uses machines to make solid objects, layer by layer, attribute A piece of information describing a particular entity.
from specifications in a digital file. Also known as additive augmented reality (AR) A technology for enhancing
manufacturing. visualization. Provides a live direct or indirect view of a physical
3G networks Cellular networks based on packet-switched real-world environment whose elements are augmented by
technology with speeds ranging from 144 Kbps for mobile users virtual computer-generated imagery.
to more than 2 Mbps for stationary users, enabling users to authentication The ability of each party in a transaction to
transmit video, graphics, and other rich media in addition to ascertain the identity of the other party.
voice. automation Using the computer to speed up the performance of
4G networks The next evolution in wireless communication is existing tasks.
entirely packet switched and capable of providing between 1 Mbps backward chaining A strategy for searching the rule base in an
and 1 Gbps speeds; up to 10 times faster than 3G networks. expert system that acts like a problem solver by beginning with a
acceptable use policy (AUP) Defines acceptable uses of the hypothesis and seeking out more information until the
firm’s information resources and computing equipment, hypothesis is either proved or disproved.
including desktop and laptop computers, wireless devices, balanced scorecard method Framework for operationalizing a
telephones, and the Internet, and specifies consequences for firm’s strategic plan by focusing on measurable financial,
noncompliance. business process, customer, and learning and growth outcomes of
acceptance testing Provides the final certification that the system firm performance.
is ready to be used in a production setting. bandwidth The capacity of a communications channel as measured
accountability The mechanisms for assessing responsibility for by the difference between the highest and lowest frequencies
decisions made and actions taken. that can be transmitted by that channel.
advertising revenue model Website generating revenue by behavioral models Descriptions of management based on
attracting a large audience. behavioral scientists’ observations of what managers actually do
affiliate revenue model An e-commerce revenue model in which in their jobs.
websites are paid as “affiliates” for sending their visitors to other behavioral targeting Tracking the click-streams (history of clicking
sites in return for a referral fee. behavior) of individuals across multiple websites for the purpose
agency theory Economic theory that views the firm as a nexus of of understanding their interests and intentions, and exposing
contracts among self-interested individuals who must be them to advertisements which are uniquely suited to their
supervised and managed. interests.
agent-based modeling Modeling complex phenomena as systems benchmarking Setting strict standards for products, services, or
of autonomous agents that follow relatively simple rules for activities and measuring organizational performance against
interaction. those standards.
agile development Rapid delivery of working software by breaking best practices The most successful solutions or problem-solving
a large project into a series of small sub-projects that are methods that have been developed by a specific organization or
completed in short periods of time using iteration and continuous industry.
feedback. big data Data sets with volumes so huge that they are beyond the
analytic platform Preconfigured hardware-software system that is ability of typical relational DBMS to capture, store, and analyze.
specifically designed for high-speed analysis of large datasets. The data are often unstructured or semi-structured.
analytical CRM Customer relationship management applications biometric authentication Technology for authenticating system
dealing with the analysis of customer data to provide information users that compares a person’s unique characteristics such as
for improving business performance. fingerprints, face, or retinal image against a stored set profile of
Android A mobile operating system developed by Android, Inc. these characteristics.
(purchased by Google) and later the Open Handset Alliance as a bit A binary digit representing the smallest unit of data in a
flexible, upgradeable mobile device platform. computer system. It can only have one of two states, representing
antivirus software Software designed to detect, and often 0 or 1.
eliminate, malware from an information system. blog Popular term for “weblog,” designating an informal yet
application controls: Specific controls unique to each structured website where individuals can publish stories,
computerized application that ensure that only authorized data opinions, and links to other websites of interest.
are completely and accurately processed by that application. blogosphere Totality of blog-related websites.
application server Software that handles all application operations Bluetooth Standard for wireless personal area networks that can
between browser-based computers and a company’s back-end transmit up to 722 Kbps within a 10-meter area.
business applications or databases. botnet A group of computers that have been infected with bot
apps Small pieces of software that run on the Internet, on your malware without users’ knowledge, enabling a hacker to use
computer, or on your cell phone and are generally delivered over the amassed resources of the computers to launch distributed
the Internet. denial-of-service attacks, phishing campaigns, or spam.
artificial intelligence (AI) The effort to develop computer-based broadband High-speed transmission technology. Also designates a
systems that can behave like humans, with the ability to learn single communications medium that can transmit multiple
languages, accomplish physical tasks, use a perceptual apparatus, channels of data simultaneously.
and emulate human expertise and decision making. bugs Software program code defects.

619
620 Glossary

bullwhip effect Distortion of information about the demand for a chief security officer (CSO) Heads a formal security function for
product as it passes from one entity to the next across the supply the organization and is responsible for enforcing the firm’s
chain. security policy.
business continuity planning Planning that focuses on how the choice Simon’s third stage of decision making, when the individual
company can restore business operations after a disaster strikes. selects among the various solution alternatives.
business driver A force in the environment to which businesses Chrome OS Google’s lightweight computer operating system for
must respond and that influences the direction of business. users who do most of their computing on the Internet; runs on
business ecosystem Loosely coupled but interdependent networks computers ranging from netbooks to desktop computers.
of suppliers, distributors, outsourcing firms, transportation churn rate Measurement of the number of customers who stop
service firms, and technology manufacturers. using or purchasing products or services from a company. Used
business functions Specialized tasks performed in a business as an indicator of the growth or decline of a firm’s customer base.
organization, including manufacturing and production, sales and classical model of management Traditional description of
marketing, finance and accounting, and human resources. management that focused on its formal functions of planning,
business intelligence Applications and technologies to help users organizing, coordinating, deciding, and controlling.
make better business decisions. click fraud Fraudulently clicking on an online ad in pay per click
business model An abstraction of what an enterprise is and how advertising to generate an improper charge per click.
the enterprise delivers a product or service, showing how the client The user point-of-entry for the required function in client/
enterprise creates wealth. server computing. Normally a desktop computer, workstation, or
business performance management (BPM) Attempts to laptop computer.
systematically translate a firm’s strategies (e.g., differentiation, client/server computing A model for computing that splits
low-cost producer, market share growth, and scope of operation) processing between clients and servers on a network, assigning
into operational targets. functions to the machine most able to perform the function.
business process management (BPM) An approach to business cloud computing Model of computing in which computer processing,
which aims to continuously improve and manage business storage, software, and other services are provided as a shared pool of
processes. virtualized resources over a network, primarily the Internet.
business process redesign Type of organizational change in collaboration Working with others to achieve shared and explicit
which business processes are analyzed, simplified, and goals.
redesigned. community provider A website business model that creates a
business processes The unique ways in which organizations digital online environment where people with similar interests
coordinate and organize work activities, information, and can transact (buy and sell goods); share interests, photos, videos;
knowledge to produce a product or service. communicate with like-minded people; receive interest-related
business-to-business (B2B) electronic commerce Electronic information; and even play out fantasies by adopting online
sales of goods and services among businesses. personalities called avatars.
business-to-consumer (B2C) electronic commerce Electronic communities of practice (COPs) Informal social networks of
retailing of products and services directly to individual professionals and employees within and outside the firm who
consumers. have similar work-related activities and interests and share their
BYOD Stands for “bring your own device,”and refers to employees knowledge.
using their own computing devices in the workplace. competitive forces model Model used to describe the interaction
byte A string of bits, usually eight, used to store one number or of external influences, specifically threats and opportunities, that
character in a computer system. affect an organization’s strategy and ability to compete.
cable Internet connections Internet connections that use digital complementary assets Additional assets required to derive value
cable lines to deliver high-speed Internet access to homes and from a primary investment.
businesses. component-based development Building large software systems
capital budgeting The process of analyzing and selecting various by combining preexisting software components.
proposals for capital expenditures. computer abuse The commission of acts involving a computer
carpal tunnel syndrome (CTS) Type of RSI in which pressure on that may not be illegal but are considered unethical.
the median nerve through the wrist’s bony carpal tunnel computer crime The commission of illegal acts through the use of
structure produces pain. a computer or against a computer system.
case-based reasoning (CBR) Artificial intelligence technology computer forensics The scientific collection, examination,
that represents knowledge as a database of cases and solutions. authentication, preservation, and analysis of data held on or
change agent In the context of implementation, the individual retrieved from computer storage media in such a way that the
acting as the catalyst during the change process to ensure information can be used as evidence in a court of law.
successful organizational adaptation to a new system or computer hardware Physical equipment used for input,
innovation. processing, and output activities in an information system.
change management Managing the impact of organizational computer literacy Knowledge about information technology,
change associated with an innovation, such as a new information focusing on understanding of how computer-based technologies
system. work.
chat Live, interactive conversations over a public network. computer software Detailed, preprogrammed instructions that
chatbot Software agent designed to simulate a conversation with control and coordinate the work of computer hardware
one or more human users via textual or auditory methods. components in an information system.
chief data officer (CDO) Responsible for enterprise-wide computer virus Rogue software program that attaches itself to
governance and utilization of information to maximize the value other software programs or data files in order to be executed,
the organization can realize from its data. often causing hardware and software malfunctions.
chief information officer (CIO) Senior manager in charge of the computer vision syndrome (CVS) Eyestrain condition related to
information systems function in the firm. computer display screen use; symptoms include headaches,
chief knowledge officer (CKO) Senior executive in charge of the blurred vision, and dry and irritated eyes.
organization’s knowledge management program. computer-aided design (CAD) Information system that
chief privacy officer (CPO) Responsible for ensuring the automates the creation and revision of designs using
company complies with existing data privacy laws. sophisticated graphics software.
Glossary 621

computer-aided software engineering (CASE) Automation of information policy, data planning, maintenance of data
step-by-step methodologies for software and systems dictionaries, and data quality standards.
development to reduce the amounts of repetitive work the data cleansing Activities for detecting and correcting data in a
developer needs to do. database or file that are incorrect, incomplete, improperly
consumer-to-consumer (C2C) Consumers selling goods and formatted, or redundant. Also known as data scrubbing.
services electronically to other consumers. data definition DBMS capability that specifies the structure and
consumerization of IT New information technology originating in content of the database.
the consumer market that spreads to business organizations. data dictionary An automated or manual tool for storing and
controls All of the methods, policies, and procedures that organizing information about the data maintained in a database.
ensure protection of the organization’s assets, accuracy data element A field.
and reliability of its records, and operational adherence to data flow diagram (DFD) Primary tool for structured analysis
management standards. that graphically illustrates a system’s component process and the
conversion The process of changing from the old system to the flow of data between them.
new system. data governance Policies and processes for managing the
cookies Tiny file deposited on a computer hard drive when an availability, usability, integrity, and security of the firm’s data.
individual visits certain websites. Used to identify the visitor and data inconsistency The presence of different values for same
track visits to the website. attribute when the same data are stored in multiple locations.
cooptation Bringing the opposition into the process of designing data management technology Software governing the
and implementing a solution without giving up control of the organization of data on physical storage media.
direction and nature of the change. data manipulation language A language associated with a
copyright A statutory grant that protects creators of intellectual database management system that end users and programmers
property against copying by others for any purpose for a use to manipulate data in the database.
minimum of 70 years. data mart A small data warehouse containing only a portion of
core competency Activity at which a firm excels as a world-class the organization’s data for a specified function or population of
leader. users.
core systems Systems that support functions that are absolutely data mining Analysis of large pools of data to find patterns and
critical to the organization. rules that can be used to guide decision making and predict
cost transparency The ability of consumers to discover the actual future behavior.
costs merchants pay for products. data quality audit A survey and/or sample of files to determine
counterimplementation A deliberate strategy to thwart the accuracy and completeness of data in an information system.
implementation of an information system or an innovation in an data redundancy The presence of duplicate data in multiple data
organization. files.
cross-selling Marketing complementary products to customers. data visualization Technology for helping users see patterns and
crowdsourcing Using large Internet audiences for advice, market relationships in large amounts of data by presenting the data in
feedback, new ideas, and solutions to business problems. Related graphical form.
to the “wisdom of crowds” theory. data warehouse A database, with reporting and query tools, that
culture The set of fundamental assumptions about what products stores current and historical data extracted from various
the organization should produce, how and where it should operational systems and consolidated for management reporting
produce them, and for whom they should be produced. and analysis.
customer lifetime value (CLTV) Difference between revenues data workers People such as secretaries or bookkeepers who
produced by a specific customer and the expenses for acquiring process the organization’s paperwork.
and servicing that customer minus the cost of promotional database A group of related files.
marketing over the lifetime of the customer relationship, database (rigorous definition) A collection of data organized to
expressed in today’s dollars. service many applications at the same time by storing and
customer relationship management (CRM) Business and managing data so that they appear to be in one location.
technology discipline that uses information systems to coordinate database administration Refers to the more technical and
all of the business processes surrounding the firm’s interactions operational aspects of managing data, including physical database
with its customers in sales, marketing, and service. design and maintenance.
customer relationship management systems Information database management system (DBMS) Special software to
systems that track all the ways in which a company interacts create and maintain a database and enable individual business
with its customers and analyze these interactions to optimize applications to extract the data they need without having to
revenue, profitability, customer satisfaction, and customer create separate files or data definitions in their computer
retention. programs.
customization The modification of a software package to meet an database server A computer in a client/server environment that is
organization’s unique requirements without destroying the responsible for running a DBMS to process SQL statements and
package software’s integrity. perform database management tasks.
customization In e-commerce, changing a delivered product or decisional roles Mintzberg’s classification for managerial roles
service based on a user’s preferences or prior behavior. where managers initiate activities, handle disturbances, allocate
cybervandalism Intentional disruption, defacement, or destruction resources, and negotiate conflicts.
of a website or corporate information system. decision-support systems (DSS) Information systems at the
cyberwarfare State-sponsored activity designed to cripple and organization’s management level that combine data and
defeat another state or nation by damaging or disrupting its sophisticated analytical models or data analysis tools to support
computers or networks. semi-structured and unstructured decision making.
data Streams of raw facts representing events occurring in deep packet inspection (DPI) Technology for managing
organizations or the physical environment before they have been network traffic by examining data packets, sorting out low-
organized and arranged into a form that people can understand priority data from higher priority business-critical data, and
and use. sending packets in order of priority.
data administration A special organizational function for demand planning Determining how much product a business
managing the organization’s data resources, concerned with needs to make to satisfy all its customers’ demands.
622 Glossary

denial-of-service (DoS) attack Flooding a network server or web dynamic pricing Pricing of items based on real-time interactions
server with false communications or requests for services in between buyers and sellers that determine what a item is worth
order to crash the network. at any particular moment.
design Simon’s second stage of decision making, when the e-government Use of the Internet and related technologies to
individual conceives of possible alternative solutions to a digitally enable government and public sector agencies’
problem. relationships with citizens, businesses, and other arms of
DevOps Organizational strategy to create a culture and environment government.
to promote rapid and agile development practices by emphasizing efficient customer response system System that directly links
close collaboration between software developers and the IT consumer behavior back to distribution, production, and supply
operational staff. chains.
digital asset management systems Classify, store, and distribute electronic business (e-business) The use of the Internet and
digital objects such as photographs, graphic images, video, and digital technology to execute all the business processes in the
audio content. enterprise. Includes e-commerce as well as processes for the
digital certificate An attachment to an electronic message to internal management of the firm and for coordination with
verify the identity of the sender and to provide the receiver with suppliers and other business partners.
the means to encode a reply. electronic commerce (e-commerce) The process of buying and
digital dashboard Displays all of a firm’s key performance selling goods and services electronically involving transactions
indicators as graphs and charts on a single screen to provide using the Internet, networks, and other digital technologies.
one-page overview of all the critical measurements necessary to electronic data interchange (EDI) The direct computer-to-
make key executive decisions. computer exchange between two organizations of standard
digital divide Large disparities in access to computers and the business transactions, such as orders, shipment instructions, or
Internet among different social groups and different locations. payments.
digital firm Organization where nearly all significant business email The computer-to-computer exchange of messages.
processes and relationships with customers, suppliers, and employee relationship management (ERM) Software dealing
employees are digitally enabled, and key corporate assets are with employee issues that are closely related to CRM, such as
managed through digital means. setting objectives, employee performance management,
digital goods Goods that can be delivered over a digital network. performance-based compensation, and employee training.
Digital Millennium Copyright Act (DMCA) Adjusts copyright encryption The coding and scrambling of messages to prevent
laws to the Internet Age by making it illegal to make, distribute, their being read or accessed without authorization.
or use devices that circumvent technology-based protections of end-user development The development of information systems
copyrighted materials. by end users with little or no formal assistance from technical
digital subscriber line (DSL) A group of technologies providing specialists.
high-capacity transmission over existing copper telephone lines. end-user interface The part of an information system through
direct cutover strategy A risky conversion approach where the which the end user interacts with the system, such as online
new system completely replaces the old one on an appointed screens and commands.
day. end users Representatives of departments outside the information
direct goods Goods used in a production process. systems group for whom applications are developed.
disaster recovery planning Planning for the restoration of enterprise applications Systems that can coordinate activities,
computing and communications services after they have been decisions, and knowledge across many different functions, levels,
disrupted. and business units in a firm. Include enterprise systems, supply
disintermediation The removal of organizations or business chain management systems, and knowledge management
process layers responsible for certain intermediary steps in a systems.
value chain. enterprise content management (ECM) Help organizations
disruptive technologies Technologies with disruptive impact on manage structured and semi-structured knowledge, providing
industries and businesses, rendering existing products, services, corporate repositories of documents, reports, presentations, and
and business models obsolete. best practices and capabilities for collecting and organizing email
distributed denial-of-service (DDoS) attack Numerous and graphic objects.
computers inundating and overwhelming a network from enterprise software Set of integrated modules for applications
numerous launch points. such as sales and distribution, financial accounting, investment
documentation Descriptions of how an information system works management, materials management, production planning, plant
from either a technical or end-user standpoint. maintenance, and human resources that allow data to be used by
domain name English-like name that corresponds to the unique multiple functions and business processes.
32-bit numeric Internet Protocol (IP) address for each computer enterprise systems Integrated enterprise-wide information
connected to the Internet. systems that coordinate key internal processes of the firm.
Domain Name System (DNS) A hierarchical system of servers enterprise-wide knowledge management systems
maintaining a database enabling the conversion of domain names General-purpose, firmwide systems that collect, store, distribute,
to their numeric IP addresses. and apply digital content and knowledge.
domestic exporter Form of business organization characterized by entity A person, place, thing, or event about which information
heavy centralization of corporate activities in the home county of must be kept.
origin. entity-relationship diagram A methodology for documenting
downtime Period of time in which an information system is not databases illustrating the relationship between various entities in
operational. the database.
drill down The ability to move from summary data to lower and ergonomics The interaction of people and machines in the work
lower levels of detail. environment, including the design of jobs, health issues, and the
drive-by download Malware that comes with a downloaded file a end-user interface of information systems.
user intentionally or unintentionally requests. e-tailer Online retail stores from the giant Amazon to tiny local
due process A process in which laws are well-known and stores that have websites where retail goods are sold.
understood and there is an ability to appeal to higher authorities ethical no-free-lunch rule Assumption that all tangible and
to ensure that laws are applied correctly. intangible objects are owned by someone else, unless there is a
Glossary 623

specific declaration otherwise, and that the creator wants Gantt chart Visually representats the timing, duration, and
compensation for this work. resource requirements of project tasks.
ethics Principles of right and wrong that can be used by individuals general controls Overall control environment governing the
acting as free moral agents to make choices to guide their design, security, and use of computer programs and the security
behavior. of data files in general throughout the organization’s information
evil twins Wireless networks that pretend to be legitimate to entice technology infrastructure.
participants to log on and reveal passwords or credit card genetic algorithms Problem-solving methods that promote the
numbers. evolution of solutions to specified problems using the model of
exchange Third-party Net marketplace that is primarily transaction living organisms adapting to their environment.
oriented and that connects many buyers and suppliers for spot geoadvertising services Delivering ads to users based on their
purchasing. GPS location.
executive support systems (ESS) Information systems at the geographic information system (GIS) System with software
organization’s strategic level designed to address unstructured that can analyze and display data using digitized maps to enhance
decision making through advanced graphics and planning and decision-making.
communications. geoinformation services Information on local places and things
expert system Knowledge-intensive computer program that based on the GPS position of the user.
captures the expertise of a human in limited domains of geosocial services Social networking based on the GPS location of
knowledge. users.
explicit knowledge Knowledge that has been documented. global culture The development of common expectations, shared
Extensible Markup Language (XML) General-purpose language artifacts, and social norms among different cultures and peoples.
that describes the structure of a document and can perform Golden Rule Putting oneself in the place of others as the object of a
presentation, communication, and storage of data, allowing data decision.
to be manipulated by the computer. Gramm-Leach-Bliley Act Requires financial institutions to ensure
external integration tools Project management technique that the security and confidentiality of customer data.
links the work of the implementation team to that of users at all green computing (green IT) Refers to practices and technologies
organizational levels. for designing, manufacturing, using, and disposing of computers,
extranet Private intranet that is accessible to authorized outsiders. servers, and associated devices such as monitors, printers, storage
Fair Information Practices (FIP) A set of principles originally devices, and networking and communications systems to
set forth in 1973 that governs the collection and use of minimize impact on the environment.
information about individuals and forms the basis of most U.S. group decision-support system (GDSS) An interactive
and European privacy laws. computer-based system to facilitate the solution to unstructured
fault-tolerant computer systems Systems that contain extra problems by a set of decision makers working together as a
hardware, software, and power supply components that can back group.
a system up and keep it running to prevent system failure. hacker A person who gains unauthorized access to a computer
feasibility study As part of the systems analysis process, the way network for profit, criminal mischief, or personal pleasure.
to determine whether the solution is achievable, given the Hadoop Open source software framework that enables distributed
organization’s resources and constraints. parallel processing of huge amounts of data across many
feedback Output that is returned to the appropriate members of the inexpensive computers.
organization to help them evaluate or correct input. hertz Measure of frequency of electrical impulses per second, with
field A grouping of characters into a word, a group of words, or a 1 Hertz equivalent to 1 cycle per second.
complete number, such as a person’s name or age. HIPAA Law outlining rules for medical security, privacy, and the
File Transfer Protocol (FTP) Tool for retrieving and transferring management of healthcare records.
files from a remote computer. hotspot A specific geographic location in which an access point
file A group of records of the same type. provides public Wi-Fi network service.
firewall Hardware and software placed between an organization’s HTML5 Next evolution of HTML, which makes it possible to embed
internal network and an external network to prevent outsiders images, video, and audio directly into a document without add-on
from invading private networks. software.
foreign key Field in a database table that enables users find related hubs Very simple devices that connect network components,
information in another database table. sending a packet of data to all other connected devices.
formal control tools Project management technique that helps hybrid AI systems Integration of multiple AI technologies into a
monitor the progress toward completion of a task and fulfillment single application to take advantage of the best features of these
of goals. technologies.
formal planning tools Project management technique that hybrid cloud Computing model where firms use both their own IT
structures and sequences tasks, budgeting time, money, and infrastructure and also public cloud computing services.
technical resources required to complete the tasks. Hypertext Markup Language (HTML) Page description
forward chaining A strategy for searching the rule base in an language for creating web pages.
expert system that begins with the information entered by the Hypertext Transfer Protocol (HTTP) The communications
user and searches the rule base to arrive at a conclusion. standard used to transfer pages on the web. Defines how
franchiser Form of business organization in which a product is messages are formatted and transmitted.
created, designed, financed, and initially produced in the home identity management Business processes and software tools for
country, but for product-specific reasons relies heavily on foreign identifying the valid users of a system and controlling their
personnel for further production, marketing, and human access to system resources.
resources. identity theft Theft of key pieces of personal information, such as
free/fremium revenue model An e-commerce revenue model in credit card or Social Security numbers, in order to obtain
which a firm offers basic services or content for free while merchandise and services in the name of the victim or to obtain
charging a premium for advanced or high-value features. false credentials.
fuzzy logic Rule-based AI that tolerates imprecision by using Immanuel Kant’s categorical imperative A principle that states
nonspecific terms called membership functions to solve that if an action is not right for everyone to take it is not right for
problems. anyone.
624 Glossary

implementation All the organizational activities surrounding the intelligence The first of Simon’s four stages of decision making,
adoption, management, and routinization of an innovation, such when the individual collects information to identify problems
as a new information system. occurring in the organization.
in-memory computing Technology for very rapid analysis intelligent agent Software program that uses a built-in or learned
and processing of large quantities of data by storing the data knowledge base to carry out specific, repetitive, and predictable
in the computer’s main memory rather than in secondary tasks for an individual user, business process, or software
storage. application.
indirect goods Goods not directly used in the production process, intelligent techniques Technologies that aid human decision
such as office supplies. makers by capturing individual and collective knowledge,
inference engine The strategy used to search through the rule discovering patterns and behaviors in large quantities of data, and
base in an expert system; can be forward or backward chaining. generating solutions to problems that are too large and complex
information Data that have been shaped into a form that is for human beings to solve on their own.
meaningful and useful to human beings. internal integration tools Project management technique that
information asymmetry Situation where the relative bargaining ensures that the implementation team operates as a cohesive
power of two parties in a transaction is determined by one party unit.
in the transaction possessing more information essential to the international information systems architecture The basic
transaction than the other party. information systems required by organizations to coordinate
information density The total amount and quality of information worldwide trade and other activities.
available to all market participants, consumers, and merchants. Internet Global network of networks using universal standards to
information policy Formal rules governing the maintenance, connect millions of different networks.
distribution, and use of information in an organization. Internet of Things Pervasive web in which each object or machine
information requirements A detailed statement of the has a unique identity and is able to use the Internet to link with
information needs that a new system must satisfy; identifies who other machines or send data. Also known as the Industrial
needs what information, and when, where, and how the Internet.
information is needed. Internet Protocol (IP) address Four-part numeric address
information rights The rights that individuals and organizations indicating a unique computer location on the Internet.
have with respect to information that pertains to themselves. Internet service provider (ISP) A commercial organization with
information system Interrelated components working together to a permanent connection to the Internet that sells temporary
collect, process, store, and disseminate information to support connections to subscribers.
decision making, coordination, control, analysis, and Internet2 Research network with new protocols and transmission
visualization in an organization. speeds that provides an infrastructure for supporting high-
information systems audit Identifies all the controls tht govern bandwidth Internet applications.
individual information systems and assesses their effectiveness. interorganizational systems Information systems that automate
information systems department The formal organizational the flow of information across organizational boundaries and link
unit that is responsible for the information systems function in a company to its customers, distributors, or suppliers.
the organization. interpersonal roles Mintzberg’s classification for managerial roles
information systems literacy Broad-based understanding of where managers act as figureheads and leaders for the
information systems that includes behavioral knowledge about organization.
organizations and individuals using information systems as well intranet An internal network based on Internet and World Wide
as technical knowledge about computers. Web technology and standards.
information systems managers Leaders of the various specialists intrusion detection system Tools to monitor the most
in the information systems department. vulnerable points in a network to detect and deter unauthorized
information systems plan A road map indicating the direction intruders.
of systems development: the rationale, the current situation, the iOS Operating system for the Apple iPad, iPhone, and iPod Touch.
management strategy, the implementation plan, and the IPv6 New IP addressing system using 128-bit IP addresses. Stands for
budget. Internet Protocol version 6.
information technology (IT) All the hardware and software IT governance Strategy and policies for using information
technologies a firm needs to achieve its business objectives. technology within an organization, specifying the decision rights
information technology (IT) infrastructure Computer and accountabilities to ensure that information technology
hardware, software, data, storage technology, and networks supports the organization’s strategies and objectives.
providing a portfolio of shared IT resources for the organization. iterative A process of repeating over and over again the steps to
informational roles Mintzberg’s classification for managerial roles build a system.
where managers act as the nerve centers of their organizations, Java Programming language that can deliver only the software
receiving and disseminating critical information. functionality needed for a particular task, such as a small applet
informed consent Consent given with knowledge of all the facts downloaded from a network; can run on any computer and
needed to make a rational decision. operating system.
input The capture or collection of raw data from within the joint application design (JAD) Process to accelerate the
organization or from its external environment for processing in generation of information requirements by having end users and
an information system. information systems specialists work together in intensive
instant messaging Chat service that allows participants to create interactive design sessions.
their own private chat channels so that a person can be alerted just-in-time strategy Scheduling system for minimizing inventory
whenever someone on his or her private list is online to initiate by having components arrive exactly at the moment they are
a chat session with that particular individual. needed and finished goods shipped as soon as they leave the
intangible benefits Benefits that are not easily quantified; they assembly line.
include more efficient customer service or enhanced decision key field A field in a record that uniquely identifies instances of
making. that record so that it can be retrieved, updated, or sorted.
intellectual property Intangible property created by individuals key performance indicators Measures proposed by senior
or corporations that is subject to protections under trade secret, management for understanding how well the firm is performing
copyright, and patent law. along specified dimensions.
Glossary 625

keylogger Spyware that records every keystroke made on a market creator An e-commerce business model in which firms
computer to steal personal information or passwords or to launch provide a digital online environment where buyers and sellers
Internet attacks. can meet, search for products, and engage in transactions.
knowledge Concepts, experience, and insight that provide a market entry costs The cost merchants must pay to bring their
framework for creating, evaluating, and using information. goods to market.
knowledge base Model of human knowledge that is used by expert marketspace A marketplace extended beyond traditional
systems. boundaries and removed from a temporal and geographic
knowledge discovery Identification of novel and valuable patterns location.
in large databases. mashups Composite software applications that depend on high-
knowledge management The set of processes developed in an speed networks, universal communication standards, and open
organization to create, gather, store, maintain, and disseminate source code.
the firm’s knowledge. mass customization The capacity to offer individually tailored
knowledge management systems Systems that support the products or services using mass production resources.
creation, capture, storage, and dissemination of firm expertise massive open online course (MOOC) Online course made
and knowledge. available via the web to very large numbers of participants.
knowledge workers People such as engineers or architects who menu costs Merchants’ costs of changing prices.
design products or services and create knowledge for the metropolitan area network (MAN) Network that spans a
organization. metropolitan area, usually a city and its major suburbs. Its
knowledge work systems Information systems that aid geographic scope falls between a WAN and a LAN.
knowledge workers in the creation and integration of new microblogging Blogging featuring very short posts, such as using
knowledge into the organization. Twitter.
learning management system (LMS) Tools for the micropayment systems Payment for a very small sum of money,
management, delivery, tracking, and assessment of various types often less than $10.
of employee learning. middle management People in the middle of the organizational
legacy system A system that has been in existence for a long time hierarchy who are responsible for carrying out the plans and
and that continues to be used to avoid the high cost of replacing goals of senior management.
or redesigning it. minicomputer Middle-range computer used in systems for
legitimacy The extent to which one’s authority is accepted on universities, factories, or research laboratories.
grounds of competence, vision, or other qualities. mobile commerce (m-commerce) The use of wireless devices,
liability The existence of laws that permit individuals to recover the such as smartphones or tablets to conduct both business-to-
damages done to them by other actors, systems, or organizations. consumer and business-to-business e-commerce transactions over
Linux Reliable and compactly designed operating system that is an the Internet.
offshoot of UNIX and that can run on many different hardware mobile web app Internet-enabled app with specific functionality
platforms and is available free or at very low cost. Used as for mobile devices that is accessed through a mobile device’s web
alternative to UNIX. browser.
local area network (LAN) A telecommunications network that mobile website Version of a regular website that is scaled down in
requires its own dedicated channels and that encompasses a content and navigation for easy access and search on a small
limited distance, usually one building or several buildings in mobile screen.
close proximity. modem A device for translating a computer’s digital signals into
location-based services GPS map services available on analog form for transmission over analog networks or for
smartphones. translating analog signals back into digital form for reception by a
location analytics Ability to gain insights from the location computer.
(geographic) component of data, including loation data from Moore’s Law Assertion that the number of components on a chip
mobile phones, output from sensors or scanning devices, and doubles each year.
data from maps. multicore processor Integrated circuit to which two or more
long tail marketing Refers to the ability of firms to profitably processors have been attached for enhanced performance,
market goods to very small online audiences, largely because of reduced power consumption, and more efficient simultaneous
the lower costs of reaching very small market segements (people processing of multiple tasks.
who fall into the long tail ends of a Bell curve). multinational Form of business organization that concentrates
machine learning Study of how computer programs can improve financial management, and control out of a central home base
their performance without explicit programming. while decentralizing production, sales and marketing.
mainframe Largest category of computer, used for major business multitiered (N-tier) client/server architecture Client/server
processing. network which the work of the entire network is balanced over
maintenance Changes in hardware, software, documentation, or several different levels of servers.
procedures to a production system to correct errors, meet new multitouch Interface that features the use of one or more finger
requirements, or improve processing efficiency. gestures to manipulate lists or objects on a screen without using a
malware Malicious software programs such as computer viruses, mouse or keyboard.
worms, and Trojan horses. nanotechnology Technology that builds structures and processes
managed security service provider (MSSP) Company that based on the manipulation of individual atoms and molecules.
provides security management services for subscribing clients. native advertising Placing ads within social network newsfeeds or
management information systems (MIS) Specific category of traditional editorial content, such as a newspaper article.
information system providing reports on organizational native app Standalone application designed to run on a specific
performance to help middle management monitor and control platform and device and is installed directly on the mobile device
the business. near field communication (NFC) Short-range wireless
management information systems (MIS): The study of connectivity standard that uses electromagnetic radio fields to
information systems focusing on their use in business and enable two compatible devices to exchange data when brought
management. within a few centimeters of each other.
managerial roles Expectations of the activities that managers net marketplace A single digital marketplace based on Internet
should perform in an organization. technology linking many buyers to many sellers.
626 Glossary

network The linking of two or more computers to share data or organization (technical definition) A stable, formal, social
resources, such as a printer. structure that takes resources from the environment and
network economics Model of strategic systems at the industry processes them to produce outputs.
level based on the concept of a network where adding another organizational and management capital Investments
participant entails zero marginal costs but can create much larger in organization and management such as new business
marginal gains. processes, management behavior, organizational culture, or
network operating system (NOS) Special software that routes training.
and manages communications on the network and coordinates organizational impact analysis Study of the way a proposed
network resources. system will affect organizational structure, attitudes, decision
networking and telecommunications technology Physical making, and operations.
devices and software that link various computer hardware organizational learning Creation of new standard operating
components and transfer data from one physical location to procedures and business processes that reflect organizations’
another. experience.
neural network Hardware or software that attempts to emulate the output The distribution of processed information to the people who
processing patterns of the biological brain. will use it or to the activities for which it will be used.
non-relational database management system Database outsourcing The practice of contracting computer center
management system for working with large quantities of operations, telecommunications networks, or applications
structured and unstructured data that would be difficult to development to external vendors.
analyze with a relational model. packet switching Technology that breaks messages into small,
nonobvious relationship awareness (NORA) Technology that fixed bundles of data and routes them in the most economical
can find obscure hidden connections between people or other way through any available communications channel.
entities by analyzing information from many different sources to paradigm shift Radical reconceptualization of the nature of the
correlate relationships. business and the nature of the organization.
normalization The process of creating small stable data structures parallel strategy A safe and conservative conversion approach
from complex groups of data when designing a relational where both the old system and its potential replacement are run
database. together for a time until everyone is assured that the new one
object Software building block that combines data and the functions correctly.
procedures acting on the data. particularism Making judgments and taking action on the basis of
object-oriented development Approach to systems development narrow or personal characteristics, in all its forms (religious,
that uses the object as the basic unit of systems analysis and nationalistic, ethnic, regionalism, geopolitical position).
design. The system is modeled as a collection of objects and the partner relationship management (PRM) Automation of
relationship between them. the firm’s relationships with its selling partners using customer
offshore outsourcing Outsourcing systems development work or data and analytical tools to improve coordination and customer
maintenance of existing systems to external vendors in another sales.
country. password Secret word or string of characters for authenticating
on-demand computing Firms off-loading peak demand for users so they can access a resource such as a computer system.
computing power to remote, large-scale data processing centers, patch Small pieces of software to repair the software flaws without
investing just enough to handle average processing loads and disturbing the proper operation of the software.
paying for only as much additional computing power as the patent A legal document that grants the owner an exclusive
market demands. Also called utility computing. monopoly on the ideas behind an invention for 20 years; designed
online analytical processing (OLAP) Capability for to ensure that inventors of new machines or methods are rewarded
manipulating and analyzing large volumes of data from multiple for their labor while making widespread use of their inventions.
perspectives. peer-to-peer Network architecture that gives equal power to all
online transaction processing Transaction processing mode in computers on the network; used primarily in small networks.
which transactions entered online are immediately processed by personal area network (PAN) Computer network used for
the computer. communication among digital devices that are close to one
open source software Software that provides free access to its person.
program code, allowing users to modify the program code to personalization Ability of merchants to target marketing messages
make improvements or fix errors. to specific individuals by adjusting the message for a person’s
operating system Software that manages the resources and name, interests, and past purchases.
activities of the computer. PERT chart Network diagram depicting project tasks and their
operational CRM Customer-facing applications, such as sales force interrelationships.
automation, call center and customer service support, and pharming Phishing technique that redirects users to a bogus web
marketing automation. page, even when an individual enters the correct web page
operational intelligence Business analytics that delivers insight address.
into data, streaming events and business operations. phased approach Introduces the new system in stages either by
operational management People who monitor the day-to-day functions or by organizational units.
activities of the organization. phishing Form of spoofing involving setting up fake websites or
opt-in Model of informed consent permitting prohibiting an sending email messages that resemble those of legitimate
organization from collecting any personal information unless the businesses that ask users for confidential personal data.
individual specifically takes action to approve information pilot study strategy A strategy to introduce the new system to a
collection and use. limited area of the organization until it is proven to be fully
opt-out Model of informed consent permitting the collection of functional; only then can the conversion to the new system
personal information until the consumer specifically requests across the entire organization take place.
that the data not be collected. pivot table Spreadsheet tool for reorganizing and summarizing two
organization (behavioral definition) A collection of rights, or more dimensions of data in a tabular format.
privileges, obligations, and responsibilities that are delicately platform Business providing information systems, technologies,
balanced over a period of time through conflict and conflict and services that thousands of other firms in different industries
resolution. use to enhance their own capabilities.
Glossary 627

podcasting Publishing audio broadcasts via the Internet so that protocol A set of rules and procedures that govern transmission
subscribing users can download audio files onto their personal between the components in a network.
computers or portable music players. prototype The preliminary working version of an information
portal Web interface for presenting integrated personalized content system for demonstration and evaluation purposes.
from a variety of sources. Also refers to a website service that prototyping The process of building an experimental system
provides an initial point of entry to the web. quickly and inexpensively for demonstration and evaluation so
portfolio analysis An analysis of the portfolio of potential that users can better determine information requirements.
applications within a firm to determine the risks and benefits, public cloud A cloud maintained by an external service provider,
and to select among alternatives for information systems. accessed through the Internet, and available to the general
post-implementation audit Formal review process conducted public.
after a system has been placed in production to determine how public key encryption Uses two keys: one shared (or public) and
well the system has met its original objectives. one private.
predictive analytics The use of data mining techniques, historical public key infrastructure (PKI) System for creating public and
data, and assumptions about future conditions to predict private keys using a certificate authority (CA) and digital
outcomes of events, such as the probability a customer will certificates for authentication.
respond to an offer or purchase a specific product. pull-based model Supply chain driven by actual customer orders
predictive search Part of a search alogrithm that predicts what a or purchases so that members of the supply chain produce and
user query is looking as it is entered based on popular searches. deliver only what customers have ordered.
price discrimination Selling the same goods, or nearly the same push-based model Supply chain driven by production master
goods, to different targeted groups at different prices. schedules based on forecasts or best guesses of demand for
price transparency The ease with which consumers can find out products, and products are “pushed” to customers.
the variety of prices in a market. quantum computing Use of principles of quantum physics to
primary activities Activities most directly related to the represent data and perform operations on the data, with the
production and distribution of a firm’s products or services. ability to be in many different states at once and to perform
primary key Unique identifier for all the information in any row of many different computations simultaneously.
a database table. query language Software tool that provides immediate online
privacy The claim of individuals to be left alone, free from answers to requests for information that are not predefined.
surveillance or interference from other individuals, organizations, radio frequency identification (RFID) Technology using tiny
or the state. tags with embedded microchips containing data about an item
private cloud A proprietary network or a data center that ties and its location to transmit short-distance radio signals to special
together servers, storage, networks, data, and applications as a RFID readers that then pass the data on to a computer for
set of virtualized services that are shared by users inside a processing.
company. ransomware Malware that extorts money from users by taking
private exchange Another term for a private industrial network. control of their computers or displaying annoying pop-up
private industrial networks Web-enabled networks linking messages.
systems of multiple firms in an industry for the coordination of Rapid Application Development (RAD) Process for
trans-organizational business processes. developing systems in a very short time period by using
process specifications Describe the logic of the processes prototyping, state-of-the-art software tools and close teamwork
occurring within the lowest levels of a data flow diagram. among users and systems specialists.
processing The conversion, manipulation, and analysis of raw rationalization of procedures The streamlining of standard
input into a form that is more meaningful to humans. operating procedures, eliminating obvious bottlenecks, so that
product differentiation Competitive strategy for creating brand automation makes operating procedures more efficient.
loyalty by developing new and unique products and services that record A group of related fields.
are not easily duplicated by competitors. referential integrity Rules to ensure that relationships between
production The stage after the new system is installed and the coupled database tables remain consistent.
conversion is complete; during this time the system is reviewed relational DBMS A type of logical database model that treats data
by users and technical specialists to determine how well it has as if they were stored in two-dimensional tables. It can relate data
met its original goals. stored in one table to data in another as long as the two tables
production or service workers People who actually produce the share a common data element.
products or services of the organization. Repetitive stress injury (RSI) Occupational disease that occurs
profiling The use of computers to combine data from multiple when muscle groups are forced through repetitive actions with
sources and create electronic dossiers of detailed information on high-impact loads or thousands of repetitions with low-impact
individuals. loads.
program-data dependence The close relationship between data Request for proposal (RFP) A detailed list of questions
stored in files and the software programs that update and submitted to vendors of software or other services to determine
maintain those files. Any change in data organization or format how well the vendor’s product can meet the organization’s
requires a change in all the programs associated with those files. specific requirements.
programmers Highly trained technical specialists who write responsibility Accepting the potential costs, duties, and obligations
computer software instructions. for the decisions one makes.
programming The process of translating the system specifications responsive web design Ability of a website to automatically
prepared during the design stage into program code. change screen resolution and image size as a user switches to
project Planned series of related activities for achieving a specific devices of different sizes, such as a laptop, tablet computer, or
business objective. smartphone. Eliminates the need for separate design and
project management Application of knowledge, tools, and development work for each new device.
techniques to achieve specific targets within a specified budget revenue model A description of how a firm will earn revenue,
and time period. generate profits, and produce a return on investment.
project portfolio management Helps organizations evaluate richness Measurement of the depth and detail of information that a
and manage portfolios of projects and dependencies among business can supply to the customer as well as information the
them. business collects about the customer.
628 Glossary

risk assessment Determining the potential frequency of the service-oriented architecture (SOA) Software architecture of a
occurrence of a problem and the potential damage if the firm built on a collection of software programs that communicate
problem were to occur. Used to determine the cost/benefit of a with each other to perform assigned tasks to create a working
control. software application
Risk aversion principle Principle that one should take the action shopping bot Software with varying levels of built-in intelligence to
that produces the least harm or incurs the least cost. help electronic commerce shoppers locate and evaluate products
router Specialized communications processor that forwards packets or service they might wish to purchase.
of data from one network to another network. six sigma A specific measure of quality, representing 3.4 defects
routines Precise rules, procedures and practices that have been per million opportunities; used to designate a set of
developed to cope with expected situations. methodologies and techniques for improving quality and
RSS Technology using aggregator software to pull content from reducing costs.
websites and feed it automatically to subscribers’ computers. smart card A credit-card-size plastic card that stores digital
safe harbor Private self-regulating policy and enforcement information and that can be used for electronic payments in
mechanism that meets the objectives of government regulations place of cash.
but does not involve government regulation or enforcement. smartphone Wireless phone with voice, text, and Internet
sales revenue model Selling goods, information, or services to capabilities.
customers as the main source of revenue for a company. sniffer Type of eavesdropping program that monitors information
Sarbanes-Oxley Act Law passed in 2002 that imposes traveling over a network.
responsibility on companies and their management to protect social business Use of social networking platforms, including
investors by safeguarding the accuracy and integrity of Facebook, Twitter, and internal corporate social tools, to engage
financial information that is used internally and released employees, customers, and suppliers.
externally. social CRM Tools enabling a business to link customer
scalability The ability of a computer, product, or system to expand conversatins, data, and relationships from social networking sites
to serve a larger number of users without breaking down. to CRM processes.
scope Defines what work is and is not included in a project. social engineering Tricking people into revealing their passwords
scoring model A quick method for deciding among alternative by pretending to be legitimate users or members of a company in
systems based on a system of ratings for selected objectives. need of information.
search costs The time and money spent locating a suitable product social graph Map of all significant online social relationships,
and determining the best price for that product. comparable to a social network describing offline relationships.
search engine A tool for locating specific sites or information on social networking sites Online community for expanding users’
the Internet. business or social contacts by making connections through their
search engine marketing Use of search engines to deliver in their mutual business or personal connections.
results sponsored links, for which advertisers have paid. social search Effort to provide more relevant and trustworthy
search engine optimization (SEO) The process of changing a search results based on a person’s network of social contacts.
website’s content, layout, and format in order to increase the social shopping Use of websites featuring user-created web pages
ranking of the site on popular search engines and to generate to share knowledge about items of interest to other shoppers.
more site visitors. sociotechnical design Design to produce information systems that
Secure Hypertext Transfer Protocol (S-HTTP) Protocol used blend technical efficiency with sensitivity to organizational and
for encrypting data flowing over the Internet; limited to human needs.
individual messages. sociotechnical view Seeing systems as composed of both technical
Secure Sockets Layer (SSL) Enables client and server computers and social elements.
to manage encryption and decryption activities as they Software as a service (SaaS) Services for delivering and
communicate with each other during a secure web session. providing access to software remotely as a web-based service.
security Policies, procedures, and technical measures used to software-defined networking (SDN) Using a central control
prevent unauthorized access, alteration, theft, or physical damage program separate from network devices to manage the flow of
to information systems. data on a network.
security policy Statements ranking information risks, identifying software-defined storage (SDS) Software to manage provisioning
acceptable security goals, and identifying the mechanisms for and management of data storage independent of the underlying
achieving these goals. hardware.
semantic search Search technology capable of understanding software localization Process of converting software to operate in
human language and behavior. a second language.
semi-structured decisions Decisions in which only part of the software package A prewritten, precoded, commercially available
problem has a clear-cut answer provided by an accepted set of programs that eliminates the need to write software
procedure. programs for certain functions.
senior management People occupying the topmost hierarchy in spam Unsolicited commercial email.
an organization who are responsible for making long-range spoofing Tricking or deceiving computer systems or other
decisions. computer users by hiding one’s identity or faking the identity of
sensitivity analysis Models that ask “what-if” questions repeatedly another user on the Internet.
to determine the impact of changes in one or more factors on the spyware Technology that aids in gathering information about a
outcomes. person or organization without their knowledge.
sentiment analysis Mining text comments in an email message, SQL injection attack Attacks against a website that take
blog, social media conversation, or survey form to detect advantage of vulnerabilities in poorly coded SQL (a standard and
favorable and unfavorable opinions about specific subjects. common database software application) applications in order to
server Computer specifically optimized to provide software and introduce malicious program code into a company’s systems and
other resources to other computers over a network. networks.
service level agreement (SLA) Formal contract between strategic transitions A movement from one level of sociotechnical
customers and their service providers that defines the specific system to another. Often required when adopting strategic
responsibilities of the service provider and the level of service systems that demand changes in the social and technical
expected by the customer. elements of an organization.
Glossary 629

streaming A publishing method for music and video files that flows tangible benefits Benefits that can be quantified and assigned a
a continuous stream of content to a user’s device without being monetary value; they include lower operational costs and
stored locally on the device. increased cash flows.
structure chart System documentation showing each level of taxonomy Method of classifying things according to a
design, the relationship among the levels, and the overall place in predetermined system.
the design structure; can document one program, one system, or teams Formal groups whose members collaborate to achieve specific
part of one program. goals.
structured Refers to the fact that techniques are carefully drawn teamware Group collaboration software that is customized for
up, step by step, with each step building on a previous one. teamwork.
structured decisions Decisions that are repetitive and routine and technology standards Specifications that establish the
have a definite procedure for handling them. compatibility of products and the ability to communicate in a
structured knowledge Knowledge in the form of structured network.
documents and reports. telepresence Telepresence is a technology that allows a person to
Structured Query Language (SQL) The standard data give the appearance of being present at a location other than his
manipulation language for relational database management or her true physical location.
systems. Telnet Network tool that allows someone to log on to one computer
subscription revenue model Website charging a subscription fee system while doing work on another.
for access to some or all of its content or services on an ongoing test plan Prepared by the development team in conjunction with
basis. the users; it includes all of the preparations for the series of tests
supply chain Network of organizations and business processes for to be performed on the system.
procuring materials, transforming raw materials into testing The exhaustive and thorough process that determines
intermediate and finished products, and distributing the finished whether the system produces the desired results under known
products to customers. conditions.
supply chain execution systems Systems to manage the flow of text mining Discovery of patterns and relationships from large sets
products through distribution centers and warehouses to ensure of unstructured data.
that products are delivered to the right locations in the most token Physical device similar to an identification card that is
efficient manner. designed to prove the identity of a single user.
supply chain management systems Information systems that total cost of ownership (TCO) Designates the total cost of
automate the flow of information between a firm and its owning technology resources, including initial purchase costs,
suppliers in order to optimize the planning, sourcing, the cost of hardware and software upgrades, maintenance,
manufacturing, and delivery of products and services. technical support, and training.
supply chain planning systems Systems that enable a firm to total quality management (TQM) A concept that makes quality
generate demand forecasts for a product and to develop sourcing control a responsibility to be shared by all people in an
and manufacturing plans for that product. organization.
support activities Activities that make the delivery of a firm’s touch point Method of firm interaction with a customer, such as
primary activities possible. Consist of the organization’s telephone, email, customer service desk, conventional mail, or
infrastructure, human resources, technology, and procurement. point-of-purchase.
switch Device to connect network components that has more trade secret Any intellectual work or product used for a
intelligence than a hub and can filter and forward data to a business purpose that can be classified as belonging to that
specified destination. business, provided it is not based on information in the public
switching costs The expense a customer or company incurs in lost domain.
time and expenditure of resources when changing from one transaction costs Costs incurred when a firm buys on the
supplier or system to a competing supplier or system. marketplace what it cannot make itself.
system testing Tests the functioning of the information system as a transaction cost theory Economic theory stating that firms grow
whole in order to determine if discrete modules will function larger because they can conduct marketplace transactions
together as planned. internally more cheaply than they can with external firms in the
systems analysis The analysis of a problem that the organization marketplace.
will try to solve with an information system. transaction fee revenue model An online e-commerce revenue
systems analysts Specialists who translate business problems and model where the firm receives a fee for enabling or executing
requirements into information requirements and systems, acting transactions.
as liaison between the information systems department and the transaction processing systems (TPS) Computerized systems
rest of the organization. that perform and record the daily routine transactions necessary
systems design Details how a system will meet the information to conduct the business; they serve the organization’s operational
requirements as determined by the systems analysis. level.
systems development The activities that go into producing an transborder data flow The movement of information across
information systems solution to an organizational problem or international boundaries in any form.
opportunity. Transmission Control Protocol/Internet Protocol (TCP/IP)
systems life cycle A traditional methodology for developing an Dominant model for achieving connectivity among different
information system that partitions the systems development networks. Provides a universally agreed-on method for
process into formal stages that must be completed sequentially breaking up digital messages into packets, routing them to the
with a very formal division of labor between end users and proper addresses, and then reassembling them into coherent
information systems specialists. messages.
T lines High-speed guaranteed service level data lines leased from transnational Truly global form of business organization with no
communications providers, such as T-1 lines (with a transmission national headquarters; value-added activities are managed from a
capacity of 1.544 Mbps). global perspective without reference to national borders,
tablet computer Mobile handheld computer that is larger than a optimizing sources of supply and demand and local competitive
mobile phone and operated primarily by touching a flat screen. advantage.
tacit knowledge Expertise and experience of organizational Trojan horse A software program that appears legitimate but
members that has not been formally documented. contains a second hidden function that may cause damage.
630 Glossary

tuple A row or record in a relational database. war driving Technique in which eavesdroppers drive by buildings
two-factor authentication Validating user identity with two or park outside and try to intercept wireless network traffic.
means of identification, one of which is typically a physical Web 2.0 Second-generation, interactive Internet-based services that
token, and the other of which is typically data. enable people to collaborate, share information, and create new
Unified communications Integrates disparate channels for voice services online, including mashups, blogs, RSS, and wikis.
communications, data communications, instant messaging, Web 3.0 Future vision of the web where all digital information is
email, and electronic conferencing into a single experience woven together with intelligent search capabilities.
where users can seamlessly switch back and forth between web beacons Tiny objects invisibly embedded in email messages
different communication modes. and web pages that are designed to monitor the behavior of the
unified threat management (UTM) Comprehensive security user visiting a website or sending email.
management tool that combines multiple security tools, web browser An easy-to-use software tool for accessing the World
including firewalls, virtual private networks, intrusion detection Wide Web and the Internet.
systems, and web content filtering and anti-spam software. web hosting service Company with large web server computers to
uniform resource locator (URL) The address of a specific maintain the websites of fee-paying subscribers.
resource on the Internet. web mining Discovery and analysis of useful patterns and
unit testing The process of testing each program separately in the information from the World Wide Web.
system. Sometimes called program testing. web server Software that manages requests for web pages on the
Unix Operating system for all types of computers, which is machine computer where they are stored and that delivers the page to the
independent and supports multiuser processing, multitasking, user’s computer.
and networking. Used in high-end workstations and servers. web services Set of universal standards using Internet technology
unstructured decisions Nonroutine decisions in which the for integrating different applications from different sources
decision maker must provide judgment, evaluation, and insights without time-consuming custom coding. Used for linking systems
into the problem definition; there is no agreed-upon procedure of different organizations or for linking disparate systems within
for making such decisions. the same organization.
user interface The part of the information system through which website All of the World Wide Web pages maintained by an
the end user interacts with the system; type of hardware and the organization or an individual.
series of on-screen commands and responses required for a user Wi-Fi Stands for “wireless fidelity” and refers to the 802.11 family of
to work with the system. wireless networking standards.
user-designer communications gap The difference in wide area network (WAN) Telecommunications network that
backgrounds, interests, and priorities that impede spans a large geographical distance. May consist of a variety of
communication and problem solving among end users and cable, satellite, and microwave technologies.
information systems specialists. wiki Collaborative website where visitors can add, delete, or modify
utilitarian principle Principle that assumes one can put values in content, including the work of previous authors.
rank order of utility and understand the consequences of various WiMax Popular term for IEEE Standard 802.16 for wireless
courses of action. networking over a range of up to 31 miles with a data transfer
value chain model Model that highlights the primary or support rate of up to 75 Mbps. Stands for Worldwide Interoperability for
activities that add a margin of value to a firm’s products or Microwave Access.
services where information systems can best be applied to Windows Microsoft family of operating systems for both network
achieve a competitive advantage. servers and client computers.
value web Customer-driven network of independent firms who use Windows 10 Most recent Microsoft Windows client operating
information technology to coordinate their value chains to system.
collectively produce a product or service for a market. Wintel PC Any computer that uses Intel microprocessors
virtual company Organization using networks to link people, (or compatible processors) and a Windows operating system.
assets, and ideas to create and distribute products and services wireless sensor networks (WSNs) Networks of interconnected
without being limited to traditional organizational boundaries or wireless devices with built-in processing, storage, and radio
physical location. frequency sensors and antennas that are embedded into the
virtual private network (VPN) A secure connection between physical environment to provide measurements of many points
two points across the Internet to transmit corporate data. over large spaces.
Provides a low-cost alternative to a private network. wisdom The collective and individual experience of applying
Virtual Reality Modeling Language (VRML) A set of knowledge to the solution of problems.
specifications for interactive three-dimensional modeling on the wisdom of crowds The belief that large numbers of people can
World Wide Web. make better decisions about a wide range of topics or products
virtual reality systems Interactive graphics software and than a single person or even a small committee of experts.
hardware that create computer-generated simulations that World Wide Web A system with universally accepted standards for
provide sensations that emulate real-world activities. storing, retrieving, formatting, and displaying information in a
virtualization Presenting a set of computing resources so that they networked environment.
can all be accessed in ways that are not restricted by physical worms Independent software programs that propagate themselves
configuration or geographic location. to disrupt the operation of computer networks or destroy data
visual web Refers to web linking visual sites such as Pinterest and other programs.
where pictures replace text socuents and where users search on zero-day vulnerabilities Security vulnerabilities in software,
pictures and visual characteristics. unknown to the creator, that hackers can exploit before the
Voice over IP (VoIP) Facilities for managing the delivery of voice vendor becomes aware of the problem.
information using the Internet Protocol (IP).
Index

Name Index L Organizations Index


Lamonica, Sam, 235
Lezon, Joe, 544
A A
Assante, Michael, 339 M ABB, 69–72, 461
Mathieson, S. A., 568 Accenture, 119, 210, 395
B McAfee, Andrew P., 179 Acronis, 342
Bradley, KC, 551 McConnell, Mike, 340 Advanced Micro Design (AMD), 39, 207
Brin, Sergey, 300 Mehta, Apoorva, 431 Airbnb, 135, 400, 404, 415, 430
Bryant, Beverley, 499 Metcalfe, Robert, 203 AirWatch, 354
Brynjolfsson, Erik, 179 Minihan, Colin, 354 Alcoa, 370–371
Mintzberg, Henry, 116, 487–488 Alex and Ani, 544–545
C Modi, Narendra, 607 Alimentation Couche-Tard, 365
Camp, Garrett, 399 Montgomery, Tom, 120 Allianze University College of Medical Sciences
Carr, Nicholas, 181 Moore, Gordon, 201 (AUCMS), 316-318
Carson, Ryan, 120 Allot Communications, 350
Cortadellas, Xavi, 131 N Amazon, 300, 331, 411, 413, 414, 429, 433,
Cox, Michael, 64 Nadella, Satya, 425 439–441, 467, 511, 522, 607
Cross, Michael, 569 Ng, Andrew Y., 468 Amazon.com, 73, 123, 201
Cryan, John, 145 American Airlines, 138, 334
O American Bar Association (ABA), 161
D Obama, Barack, 340, 581 American Medical Association (AMA), 161
Dean, Jeff, 468 Olson, Sara, 64 American National Insurance Company
Deming, W. Edwards, 518 Oxley, Michael, 336 (ANCO), 522
Dymond, Duncan, 498 America Online (AOL), 168, 294, 413, 419
P Angostura, 515–517
E Page, Larry, 300 Ann Taylor, 136
Ellison, Larry, 101 Pick, Lucinda, 610 Apache, 209, 220, 299, 389
Porter, Michael, 123 Apache Software Foundation, 258
F Apple Inc., 42, 126, 138, 171, 208, 219, 226, 411,
Fayol, Henri, 487 Q 429, 591–592
Filo, David, 299 Quy Huy, 121 Armani Exchange, 433
Ford, Henry, 86 ARM Holdings, Inc., 207
Friedman, Thomas, 39 R Association for Computing Machinery (ACM),
Rees, Andrew, 616 161
G Routh, Jim, 354 Association of Information Technology Profes-
Ganenthiran, Nilam, 432 sionals (AITP), 161
Gates, Bill, 86 S AT&T, 280, 288, 456
Goelman, Aitan, 341 Sarbanes, Paul, 336 Audi, 462
Gauguier, Yves, 590 Schinelli, Bruce, 545
Sidhu, Suresh, 394 B
H Simon, H. A., 485 BAE Systems, 239-241, 429
Hawkins, Dave, 537 Soards, Susan, 544 Ball State University, 350
Hammonds, Kim, 145 Sutherland, Stuart, 92 Bank of America, 134, 433, 456
Hevesi, Patrick, 354 Bank of New York, 134
Howes, Rick, 278 T Barclays, 494, 513
Hsieh, Tony, 120 Torvalds, Linus, 221 Barnes & Noble, 258
Hunt, Jeremy, 568 Bayer Material Sciences, 102–103
W BCBGMAXAZRIAGROUP, 353
I Watson, Michael, 120
Bear Stearns, 489
Immelt, Jeffrey, 511 Wheeler, Tom, 291
Bel Group, 589–591
Berg biopharmaceutical company, 151
J Y
Best Buy, 433
Jobs, Steve, 86 Yang, Jerry, 299
Bite Footwear, 614
Juran, Joseph, 518 Yarbrough, Brian, 439
BJ’s Wholesale Club, 431
Black & Veatch, 501
K Z
Blackburn Rovers Football Club, 178-179
Kalanick, Travis, 399 Zuckerberg, Mark, 187
Blockbuster, 115
Khan, Iftekhar, 235
Blogger.com, 304

631
632 Index

BlueNile.com, 414 Enron, 336 Hulu.com, 411


BMW, 425, 462 Epinions, 417 Hunch.com, 494
Boeing Corp., 429 ePolicy Institute, 296 Hyundai, 425
BP plc, 510 E*Trade, 417
British Medical Association (BMA), 568 Exostar, 429 I
Expedia, 403, 414 i2 Technologies, 388, 470
C IBM, 31-33, 90, 201, 209, 215, 221, 370, 451, 455,
Cable News Network (CNN), 594 F 468, 476 511, 522, 605
Cablevision, 280, 295 Facebook, 34–35, 101, 103, 167, 186–189, 212, IBM Global Business Services, 210
Caesars Entertainment, 262 219, 264, 299, 302, 389, 403, 405, 413, 415, IDS Scheer, 516
California Pizza Kitchen, 501 416, 422–424, 430, 470, 492 IKEA, 425
Canadian Tire, 474 Famous Footwear, 253 Infogix, 267
Carlo’s Bake Shop, 103 Farmobile LLC, 64 Infor Global Solutions, 370
Cass Information Systems, 235 Federal Aviation Administration Information Builders, 535
Caterpillar Corp., 425, 597 (FAA), 181 Infosys, 210
Celcom Axiata Berhad, 394–396 Federal Communications Commission (FCC), InnovationNet, 135
Cenoric Projects, 353 291–292 Instacart, 400, 431–432
CenterPoint Properties, 295 Federal Trade Commission, 419 Instagram, 405, 415
Champion Technologies, 342 FedEx, 138, 493 Institute of Electrical and Electronics
Charles Schwab, 262 Fiat Chrysler, 127, 445–447 Engineers (IEEE), 309
Chef Boyardee, 550 Fidelity Financial Services, 414 Intel Corp., 90, 207, 433, 597
Chelsea Hotel, 235 Fidelity National Information Services, 494 International Data Center, 255
Chicago Police Department, 151 Flextronics, 117 International Data Corp., 171, 201, 207
Chrysler Corp., 117, 127, 445, 597 Food Network, 431 Internet Architecture Board (IAB), 290, 313
Chubbies, 120 Ford Motor Company, 117, 425, 519 Internet Corporation for Assigned Names and
Cisco Systems, 90, 117, 505 Foursquare, 430, 432 Numbers (ICANN), 290
Citibank, 43, 138 Foxconn, 592 Intrawest, 78
Citigroup, 154 Frito Lay, 594 Intuit, 555–556
Coca-Cola, 370, 456 Fujitsu Network Communications, 537–538 itCampus consultants, 516
Colgate-Palmolive Co., 456
Comcast, 280 G J
ComScore, 422 Games.com, 413 Javelin Strategy & Research, 331
ConAgra Foods Inc., 107, 550–552 Gap.com, 416 JCB Laboratories, 461
Consumer Reports, 416 Gartner Inc., 265 JDA Software, 378-468, 395
Con Way Transportation, 464 Gatorade, 129–131 J.D. Power, 562
Countrywide Financial Corp., 134 GE Capital Financial services, 508 Jibbitz, 614
Crocs, Inc., 614–616 Genealogy.com, 416 JPMorgan Chase, 134, 433
CVM Solutions, 456 General Electric (GE), 90, 129, 469, 496, 508–511 Junglee.com, 607
General Motors Corp. (GM), 117, 210, 420, Juniper Networks, 209, 348
D 424–425, 540, 597 Jurong Health Services, 51-52
Dassault Systemes, 240, 278 GettyImages.com, 413
Deere & Co., 63–64, 129 Glasscubes, 91-92 K
Dell Inc., 117, 221 GlaxoSmithKline, 154 Kaboodle, 423
Deloitte Consulting LLP, 152 Glory Global Solutions, 216-217 Kaspersky Labs, 339
Delta Airlines, 456 GMI Insurance Services, 296–297 Kazaa, 171
Deutsche Bank, 144-146, 343 Go2Paper, 429 Kennametal, 388
Digital Equipment Corporation Goddard Space Flight Center, 102 KFC, 597
(DEC), 197 Google, 90, 126, 138, 167, 201, 208, 219, 226, Kickstarter.com, 415, 425
Digitec, 456 299–300, 303, 411, 430, 433, 467–468, 489, Kiehl Stores, 433
Dieguez Fridman, 458 511 Kmart, 388
Dollar General Corp., 61 Google +, 302, 422 Knight Capital, 490
Dollar Rent A Car, 223 Granular Inc., 64 Kodak, 118
Dow Chemical Co., 64 Grokster, 171
DP World, 385–386 Grower Information Services, 64 L
Dropbox, 38, 92, 212, 218, 236, 353 GUESS, 136 Lego Group, 272-274
Drugstore.com, 414 Lehman Brothers, 489
Dundee Precious Metals, 277-279 H Levi Strauss, 136
DuPont, 63, 459 Handy, 400 LexisNexis Risk Solutions, 158
Harrah’s Entertainment, 262 LG Electronics, 378–379
E Heinz, 90 Li & Fung, 136
EarthLink, 288 Hewlett Packard (HP), 145, 208, 210, Lilly Pulitzer, 433
Eastman Chemical Company, 118 221, 605 LinkedIn, 389, 415, 422
EasyJet, 193–195 Hilti AG, 575-576 LLBean.com, 416
eBay, 126, 138, 331, 414, 607 Hilton Hotels, 127, 433 Lloyds Banking Group, 459
eHarmony, 416 Hitachi, 471 Lockheed Martin, 429
Electronic Privacy Information Center Home Depot, 433 Lowe’s, 424
(EPIC), 188 Homejoy, 400 Lyft, 400, 430
Elemica, 412–413 Honda, 118
EMC Corp. (Documentum), 455 Hon Hai Group, 592 M
Index 633

Macy’s, 310–311, 433 Pepsico, 90, 231, 425, 433 Sun Microsystems, 221
Maersk, 594 Photobucket.com, 413 Super Fresh, 431
Mandarin Oriental, 42 Pinterest, 405, 422–423 Sybase, 209
MasterCard, 158, 342 Piper Jaffray Cos., 64
Match.com, 416 The Pirate Bay, 171 T
Matsushita, 471 Pixar Animation Studios, 305 Taco Bell, 501
McAfee, 327 Plan International, 80–81 TAL Apparel Ltd., 43
McDonalds, 597 Plex Systems, 389 Target, 173, 388, 394–396
McKinsey & Company, 87, 583 Ponemon Institute, 330–331, 353 Tasty Baking Company, 369
Megaupload, 171 Priceline.com, 414 Tata Consultancy Services, 475–477
Mercedes-Benz, 461–462 PricewaterhouseCoopers (PwC), 551 Tate & Lyle, 107-109
Metal Office Furniture Company, 609 Privi Organics, Ltd., 45 TCS, 216
MetLife, 254 Procter & Gamble (P&G), 135, 373, 433, 456, Tenaris, 456
Michelin North America, 235 470–471 Texas Instruments (TI), 115
Microsoft Corp., 137, 193–194, 201, 209, 299, Progressive Insurance, 502–503 ThomasNet.com, 264
370, 456, 508, 511 Proofpoint, 297 TIBCO, 522
Mitsubishi, 471 Tidal Trade, 614
Mitsubishi Heavy Industries, 466 Q Time Warner, 288, 295
MobileIron, 235–236 Qualcomm, 456 T-Mobile, 138, 143, 306
Mobiquity, 544 Quantcast, 167 Tower Records, 115
Monsanto, 63–64 Toyota, 117, 123
Morpheus, 171 R Trader Joe’s, 431
Mosaic, 415 Raytheon, 429 Travelocity, 129
Motorola, 138 Red Hat, 221 Treehouse Island Inc., 120–121
Mozilla Foundation, 168 Reebok, 136 Trend Micro, 352
Mrs. Fields Cookies, 597 Renault, 461 TTX, 545
MSN, 413, 433 Ricoh, 471 Tumblr, 415, 422
MyPoints, 417 Roche, 481–482 Twitter, 304, 389, 415, 422
Rolls-Royce PLC, 429 TypePad.com, 304
N Rosendin Electric, 235–236
Napster, 171 Rugby Football Union (RFU), 31–33 U
NASA, 102 Uber, 135, 399–401, 415, 430
National Cyber Security Center S Under Armour, 129–131
(NCSC), 305 Sabre Holdings, 254 United Parcel Service (UPS), 49–50, 497
National Health Service (NHS), 498–499, 568 SAC Capital, 154 United States International Trade Commission,
Nestlé, 375 Safeway, 431 171
Netflix, 40, 174, 291, 411, 416, 467 SalesForce.com, 201, 211, 215, 218, 225, 381, United States Patent and Trademark Office, 170
Network Advertising Initiative, 164, 168 389, 415, 590 United States Telecom Association, 292
NetZero, 288 Samsung Electronics, 138, 171, 207, 429 Universal Robots, 461
New York City, 255–257, 431, 459 Sanyo, 471 UPS Supply Chain Solutions, 375
New York Times, 416 SAP, 108, 273, 366, 370, 381, 388–389, 394, 482, U.S. Cyber Command (CYBERCOM), 333
New Zealand Department of Commerce, 508, 516, 609–610 U.S. Department of Commerce, 165
454–455 Schneider National, 375, 519 U.S. Department of Defense, 284, 288, 331, 333
NextBio, 258 7-Eleven, 440 U.S. Department of Defense Advanced
Nike, 126, 129–130, 371–372 Shopkick, 433 Research Projects Agency (DARPA), 284
Nissan, 433 Six Flags, 84 U.S. Department of Homeland Security, 305
Nordstrom, 354 SKF, 37 U.S. Federal Highway Administration, 451
Novell, 200, 281, 286 Skype, 90, 295, 505 U.S. Forest Service, 497
Snapchat, 418, 424 U.S. Internal Revenue Service, 75
O SNCF (French rail service), 494 U.S. National Institute of Standards and
Ocean Minded, 614 Snyders of Hanover, 61 Technology (NIST), 214
1-800-Flowers, 433 Societe Generale, 267-268 U.S. Patent and Trademark Office, 170
Open Handset Alliance, 208 The Software Alliance, 171 U.S. Postal Service (USPS), 255
OpenSignal, 234 Sonic Automotive, 37 U.S. Securities and Exchange Commission, 301
OpenSource.org, 220 Sony, 332 U.S. Social Security Administration, 75
Open Text Corp., 455 Southern Co., 211
Oracle Corp., 101, 201, 208, 209, 216, 221, 366, Southern Valve & Fitting USA (SVF), 93 V
381, 388, 394, 445–446, 455, 508, 522, 582, Southwest Airlines, 223 Vail Resorts, 78
605 Sports Authority, 433 Valiant Entertainment, 353
Orville Redenbacher, 550 Sportsvite, 415 Verizon, 280
Overstock.com, 388 Spotify, 172, 292, 417 Vestas Wind Systems, 494
Sprint, 138, 306 VEVO, 411
P Stanford University, 203, 299, 468 Virgin Entertainment Group, 295
Panda Security, 328 Staples, 414 Visa, 158, 468
Pandora, 172, 416 Starbucks, 127, 425, 492, 497 Vita Coco, 353
Panorama Consulting Solutions, 387 Starhub, 321–322 VmAirWatch, 354
PayPal, 126, 331 Statoil Fuel and Retail, 365-367 Volkswagen, 154, 427, 462
Penguin, 303 Steelcase Designs, 609–610 Volkswagen Group, 177
PeopleSoft, 224 SunGard Availability Services, 342
634 Index

W alert system, 256 bandwidth, 287, 291, 505


Wall Street Journal, 408, 416 algorithms, 303 Bangle Bartenders, 544
Walmart Inc., 42, 123, 125–126, 138, 310, 331, genetic, 469–470, 469f, 472 beacon programs, 418–419
376, 394, 414, 433, 439–441 Hummingbird search, 300–301 behavioral approach, 57–58
Walt Disney World Resort, 211 Altair 8800, 115 behavioral models, 487
Washio, 400 Amazon Alexa, 440 behavioral targeting, 418–422
Waze, 430 Amazon Prime, 439 behavioral view, of organization, 111f
WebEx, 90 Amazon Relational Database Service, 254 benchmarking, 132
Webvan, 431 Amazon Web Service (AWS), 215f, 218 best-of-breed software, 499
Whole Foods, 431 ambient data, 337 best practices, 132
Wipro Technologies, 210 analog signal, 285 BI. See business intelligence
World Bank, 451 analog versus digital, 285 bias, 181
WorldCom, 336 analytical CRM, 383–386, 384f big data
World Wide Web Consortium (W3C), 290 analytic platforms, 259–260 analysis of, 31-33, 493–494, 494t
WSJ.com, 413 analytic software, 33 challenge of, 254–255
Ancestry.com, 416 Internet source of, 262–263
X Android operating system, 208, 226, 234, 353 management and, 153
Xanga.com, 304 Angkasa Library Management system, 316-318 for operational intelligence, 496–497
antivirus software, 347, 355 privacy and, 151–153, 183–184
Y AOL Instant Messenger, 294 revolution in, 256
Yahoo!, 299–300, 416 Apache, 299 Bing, 299
Yellow Pages (YP), 535 Apache Open for Business (OFBiz), 389 biometric authentication, 345
Yelp, 417 App Internet, 306 bit, 242
YouTube, 389 Apple Apps, 226 bits per second (bps), 287
Yumprint, 440 Apple iOS, 470 blast-and-scatter advertising, 421
Apple iPad, 37, 38f, 171, 226, 470, 492, 516 BLE. See Bluetooth Low Energy
Z Apple iPhone, 37, 38f, 138, 171, 226, 470, 492, blogosphere, 304
Zappos.com, 120, 130 591f blogroll, 304
ZEAL Network SE, 493 Apple iPod, 126, 171, 226 blogs, 304
Zillow.com, 226 Apple iTunes, 42, 73, 123, 126, 172, 411 bluetooth, 307–308, 307f, 325
ZipRealty, 226 Apple Safari, 221 bookstore processes, 520–522, 520f, 521f
Apple Watch, 211 botnet, 329–330, 358
application controls, 337 bot networks, 177
application layer, 284 BPM. See business performance management
Subject Index application proxy filtering, 347 BPR. See business process reengineering
applications bps. See bits per second
A international information systems devel- break-even point, 501
acceptable use policy (AUP), 296, 341 oping, 603 bring your own device (BYOD), 212–213,
acceptance testing, 526 knowledge, 451 234–236, 353–354
access points, 325 location-based service, 430–433 broadband connections, 280, 288
access rules, 342f of MIS, 501t broadcast model, 408
accountability, 156, 159, 184 of social business, 87t Brown Bag Software v. Symantec Corp, 170
accounting practices, 596 software, 225–226, 536–538 BSS. See business support system
addressing and architecture, 288 application server, 199 bugs, 334
ad hoc query, 493 apps, 225–226 bullwhip effect, 373, 374f
Ad Network, 419 AR. See augmented reality business. See also industry; organizations
Adobe Acrobat Reader, 38 architecture and governance, 290–292, 290f collaboration in, 85–86
Adobe Connect, 90 artificial intelligence (AI), 302, 460, 471 common user requirements of, 603
Adobe Creative Suite, 210 as-is process, 520, 520f customers retained by, 125
Adobe Flash Player, 327 asset management systems, 456 global system strategies of, 597–599, 597t,
Adobe Illustrator, 225 associations, 261 598f
advertising, 187, 303. See also marketing ATMs. See automated teller machines information policy established by, 264–265
blast-and-scatter, 421 attribute, 243 information value chain of, 53, 54f
display, 403 auditing, 343, 344f Internet as tool for, 296
Google’s revenues from, 35 augmented reality (AR), 459 IS perspective of, 52–54, 59
on mobile devices, 433 AUP. See acceptable use policy IS role in, 95–101, 577
native, 421 authentication, 344–345 IS transforming, 33–35, 59
networks, 421f automated teller machines (ATMs), 43 IT infrastructure impacting, 196f
online, 419 automation, 517 process changes of, 603
online marketing and, 418t avatars, 90, 415 reorganizing, 599
pivot table used for, 502f AWS. See Amazon Web Service restructuring of, 489
revenue model, 415–416 Azure cloud service, 193–196 risk assessments in, 338–341, 341t
affiliate revenue model, 417 security policies of, 341–342
agency theory, 118 B software spending of, 224f
agent-based modeling, 470 B2B. See Business-to-business supply chain of, 371–372
agile development, 541, 546 B2C. See Business-to-consumer using social networking, 34–35, 101–102
AI. See artificial intelligence BA. See business analytics value chain model in, 129–133, 132f
air travel, 181 backward chaining, 462–464 business analytics (BA), 490, 497–499, 505–506
balanced scorecard method, 503–504, 503f Business ByDesign, 389
Index 635

business challenges, 595–596 cash-on-delivery (COD), 607 hybrid, 219


business continuity planning, 343 CAT. See consolidated audit trail on Internet, 200–201
business drivers, 592–594 CBR. See case-based reasoning models compared in, 219t
business ecosystems, 136–138, 137f CDMA. See Code Division Multiple Access platforms, 214f
business functions, 47, 48t CDO. See chief data officer private and public, 218
business intelligence (BI), 76, 78–79, 255, cell phone standards, 306 SaaS used in, 214–215
259–260, 259f cellular systems, 306–307 security in, 351
BA and, 505–506 centralization, 390 service, 174, 454
from data, 491 centralized systems, 599 service types in, 215
data mining in, 490 central systems group, 600 software, 225, 536
decision making analytics and, 491f CGI. See Common Gateway Interface Cloud Security Alliance (CSA), 351
DSS delivering, 77, 501 change. See also organizational change cloud software service, 536
elements of, 491–492 agent, 567 cloud streaming, 291, 411
in enterprise applications, 390 business processes, 603 CLTV. See customer lifetime value
information streams for, 490 business process redesign, 519 clustering, 261
management strategies for, 497–499 digital market, 411t COD. See cash-on-delivery
production reports in, 492t in IT infrastructure, 226–227 Code Division Multiple Access (CDMA), 306,
users of, 500f management, 567, 615 313
business models, 42, 412–415 MIS technology, 35–39, 36t codes of conduct, 161
business objectives organizations resistance to, 121–122 coercive goals, 116
competitive advantage as, 42 record, 526f cognitive failures, 181
of IS, 41–44 chatbots, 470 cognitive functioning, 182–183
with IT, 139 chat systems, 294 collaboration, 447
Business One (SAP), 389 Chatter, 103 benefits of, 87, 88t
business performance management (BPM), 504 checkout counters, 44, 45f in business, 85–86, 91-92
business processes, 47–48, 71–73 chief data officer (CDO), 96 in business processes, 87–89
change, 603 chief information officer (CIO), 96, 599 cloud services for, 90
collaboration in, 87–89 chief knowledge officer (CKO), 96 management selecting tools for, 93–95
core, 40 chief operating officer (COO), 79 mobile employees and, 505
enterprise applications and, 387 chief privacy officer (CPO), 96 requirements in, 88f
enterprise systems and, 369t chief security officer (CSO), 96 in software development, 541–542
functional, 72 Children’s Online Privacy Protection Act software investment steps for, 95
in IT, 73 (COPPA), 163 software products for, 90–93
order fulfillment in, 72–73, 73f China technologies used for, 89–90
routines in, 112, 113f globalization in, 39 time/space matrix of, 94f
business process management (BPM), 519, 522, Internet use in, 608 using e-mail, 89, 93, 98, 102
601–602 product differentiation in, 126 websites for, 304–305
business process redesign supply chain of, 371 command and control, 87–89
existing processes analysis in, 519–520 choice, 485 Common Gateway Interface (CGI), 264
new processes design in, 520–522, 521f Choose and Book system, 498–499 common user requirements, 603
in organizational change, 518 Chrome operating system, 208 communications. See also telecommunications
processes to be changed in, 519 Chrome web browser, 220–221 technologies
business process reengineering (BPR), 571 chromosomes, 469 analog versus digital signals in, 285
business solutions, 71f churn rate, 387 encrypted, 297–298
business support system (BSS), 394 CIO. See chief information officer gap, 570, 570t
Business-to-business (B2B), 412, 426, 427–429, circuit-switched networks, 283 Internet costs of, 204, 205f
436 CISC. See complex instruction set computing near field, 311
Business-to-consumer (B2C), 412 Cisco Networks, 209 network trends in, 279–280
business value Citrix Podio, 577 unified, 295–297
of decision making, 483, 484t CKO. See chief knowledge officer communities of practice (COPs), 451
of enterprise systems, 370–371 Clarizen, 577 community providers, 415
of SCM, 376–377 class, 530–531, 531f competition
BYOD. See bring your own device classical model of management, 487 time-based, 175
byte, 242 classifications, 261 traditional, 124
Clean Air Act, U.S., 177 competitive advantage, 32, 139, 431, 596
C click fraud, 332 competitive forces model for, 123
C2C. See Consumer-to-consumer click-throughs, 303, 389 core competencies and, 135
cable Internet connections, 288 client computers, 199 decision making and, 43
cable modems, 285 client/server computing, 282–283 in globalization, 138
cable networks, 103, 173, 280 client/server era, 199–200 Internet impacted by, 128–129, 128t
CAD. See computer-aided design cloud-based software, 389, 538 Internet technology as, 50
CAN-SPAM Act, U.S., 177 cloud collaboration services, 90 IT products providing, 127
capital budgeting, 565–566 cloud computing, 38, 193–196, 227, 306 knowledge and, 449
capital investments, 34f, 117, 195, 565 characteristics of, 214–215 outsourcing and, 539
carpal tunnel syndrome (CTS), 180 CRM and, 218 as strategic business objective, 42
CASE. See computer-aided software databases in, 253–254 sustaining, 138
engineering data management and, 216-217, 254, 351 transnational strategy and, 598
case-based reasoning (CBR), 464–465, 465f enterprise systems, 389 competitive forces model, 123, 124f, 140–141,
cash flow, 566 era of, 200–201 229–230, 229f
636 Index

cloud computing (continued) in-memory, 258–259 CPO. See chief privacy officer
competitive strategies, 129–133 malicious software in, 326–328, 327t CPQ. See configure, price and quote
Compiere, 389 mobile, 200–201, 210, 227, 234, 236 credit cards, 134, 520
complacency, from computing, 181–182 on-demand, 218 data from, 127, 157–158
complementary assets, 54–56 personal, 197 digital certificate system for, 350
complex instruction set computing (CISC), 207 quantum, 213 ethical issues of, 156–158
component-based development, 542 service-oriented, 542 hackers obtaining, 173
CompStat, 256 social, 297 hotspots and, 309
computer abuse, 176–177 standards in, 205t identity theft from, 331
computer-aided design (CAD), 452, 458, 472 system performance in, 174 Internet adoption of, 607–608
computer-aided software engineering terms and concepts in, 242–243 mobile devices managing, 433
(CASE), 532 wearable devices for, 210–212 neural networks for, 467–469
computer crimes, 176–177, 330t. See also Conficker (malware), 359 personal information from, 157
malware; security configure, price and quote (CPQ), 537–538 predictive analytics for, 493
botnets, 329–330 connectivity, 605–608 security systems for, 341
click fraud, 332 consumerization, of IT, 212–213 weblining and, 188
cyber, 330–331 Consumer Reports, 416 crime fighting, 256
cybervandalism, 329 consumers Crime Strategies Unit (CSU), 256
cyberwarfare, 333, 339–340 B2C, 412 CRM. See customer relationship management
data breaches, 332t disintermediation benefiting, 409–410, crop yields, 63
DDoS attack, 329 409f cross-channel capabilities, 394
DoS attack, 329 technologies relationships with, 130 cross-functional systems, 611
e-mails for fighting, 256 Consumer-to-consumer (C2C), 412 cross-selling, 382
evil twins, 331 content providers, 414 crowdsource funding, 415, 425
hackers, 329 ContentWorx, 454–455 CryptoLocker, 328
identity theft, 331–332 continuous measurement, 521 Crystal Reports, 250
keyloggers, 328 continuous quality improvement, 518 CSA. See Cloud Security Alliance
legislation, 331–332 controls, 323 CSO. See chief security officer
pharming, 331 control weaknesses, 344f CSU. See Crime Strategies Unit
phishing, 331 conversational commerce, 403–405 CT. See computerized tomography
spoofing and sniffing, 329 conversations, 86 CTS. See carpal tunnel syndrome
computer forensics, 336 conversion, in systems development, 527 culture, 48, 86
Computer Fraud and Abuse Act, 331 conversion rates, 394 global, 593
computer hardware COO. See chief operating officer information laws and, 595
microprocessing power in, 220 cookies, 166–167, 166f, 184 of organizations, 112–113
platforms, 207–208 cooptation, 604 currency fluctuations, 596
telecommunications, 49, 59 COPPA. See Children’s Online Privacy customer intimacy, 390
trends in, 230 Protection Act customer lifetime value (CLTV), 386
computerized hiring, 152 COPs. See communities of practice customer relationship management
computerized tomography (CT), 459 copyright law, 170, 184 (CRM), 83, 127, 380f, 589–591
computer literacy, 46 core business processes, 40 analytical, 383–386, 384f
computer networks, 280–282, 280f, 312 core competency, 135, 140–141 capabilities of, 383f
computers core systems, 601–602, 601f, 608–611 cloud computing and, 218
client, 199 corporate assets, 40 customer intimacy from, 390
enterprise, 200 corporations customer service with, 381–382
fault-tolerant, 350 enterprise applications of, 81–83 defining, 377–380
hardware platforms for, 207–208 firewalls for, 346–347, 346f direct-marketing campaigns
health risks, 180–183 network infrastructure of, 282f and, 382, 382f
Internet abuses by, 176–177 networks in large, 281–282 enterprise applications and, 387–388
mainframe, 197 patchwork international systems of, 596 operational, 383–386
networks and networking, 280–282, 280f, strategies of, 41–42 sales force automation in, 381
312 costs social networking using, 389
personal, 197, 199, 206, 329–330 of cybercrime, 330–331 software capabilities of, 383f
server, 199, 263–264, 281 Internet communications, 204, 205f software for, 381
software, 49 of IS, 564–565, 565t customers, 126
tablet, 210 leadership’s low, 126 businesses retaining, 125
viruses, 326 of magnetic storage device, 204f loyalty map, 384f
Wintel PC, 199, 206 menu, 409 social networking with, 424–425
Computer Software Copyright Act, 170 of microprocessor chips, 201, 202f supplier’s relationship with, 42–43, 127
computer-to-computer exchange, 426 negative social, 174–175 customer service, 49, 381–382
computer vision syndrome (CVS), 182 of offshore outsourcing, 540f customization
computing. See also cloud computing; operating, 144 in e-commerce, 407–408
operating systems of ownership, 228, 228t, mass, 126
client/server, 282–283 231, 565 in software packages, 538
complacency from, 181–182 project management considering, 559 CVS. See computer vision syndrome
data hierarchy in, 242f switching, 127 cyberbullying, 175
decentralized client-server in, 175 transaction, 117, 405 cybercrime, 330–331
green, 219 cost transparency, 407 cybervandalism, 329
health risks of, 180–183 counterimplementation, 574 cyberwarfare, 333, 339–340
Index 637

cycles per second, 287 Data Protection Directive, 595 digital subscriber line (DSL), 288, 312
data quality, 265–266 digital versus analog, 285
D data transfer rate, 286 direct cutover strategy, 527
DARPA. See Department of Defense Advanced data visualization, 492 direct goods, 427–428
Research Projects Agency data warehouse, 499 Directive on Data Protection, 164
data, 44, 509 data workers, 47 direct-marketing campaigns, 382, 382f, 384
ambient, 337 DBMS. See database management system disaster recovery planning, 342–343
business intelligence from, 491 DDoS. See distributed denial-of-service disintermediation, 409–410, 409f
from checkout counters, 45f debugging, 352 display ads, 403
cleansing or scrubbing, 266 decentralized client-server, 175 disruptive technologies, 114–116, 115t
from credit cards, 127, 157–158 decentralized systems, 599 distributed denial-of-service (DDoS), 321–323,
database quality of, 265–266 decisional role, 487–488 329
definition, 248 decision making distribution center, 394
dictionary, 248 automated high-speed, 489–490 distribution model, 410–411
Europe’s protection of, 164–165 BI analytics for, 491f DMCA. See Digital Millennium Copyright Act
hierarchy, 242f business value of, 483, 484t DNS. See Domain Name System
inconsistency, 244 competitive advantage and, 43 documentation, 526–527
knowledge from, 448–449 digital dashboard for, 79f Dodd-Frank Wall Street Reform and Consumer
managing resources of, 241–245 DSS and, 98, 506 Protection Act, 44
mart, 257–258, 269 enterprise systems improving, 370–371 domain name, 288
mining, 261–262 fairness in, 160 Domain Name System (DNS), 288–289, 289f,
MIS TPS, 76f improving, 43 313
multidimensional model of, 260f information required in, 484f domestic exporter, 597
personal information collection of, 165 IT influencing, 118–121, 119f Do Not Track system, 164, 169, 421
program dependence on, 244 managements role in, 486–487 DoS. See denial-of-service attack
redundancy, 244 MIS role in, 500–501 DoubleClick, 158, 166–168, 419, 421f
relational DBMS grouping of, 251 pivot tables used for, 502 downstream, supply chain, 372
from RFID tags, 46 process of, 485–486 DPI. See deep packet inspection
sales, 77f, 125f real world, 488 drill down, 493, 504
sharing of, 54–245 rent-versus-buy, 227 drive-by downloads, 327
warehouse, 255–258, 269 stages of, 486f driving habits, 151
data administration, 265 technologies and, 496 Dropbox, 92, 212, 218, 353
data analysis, 157 types of, 483–485, 505 DSL. See digital subscriber line
database management system (DBMS) value-added activities in, 54 DSL modems, 285
capabilities of, 248–250 decision-support systems (DSS), 78f DSS. See decision-support systems
designing, 250–251 BI delivered by, 77, 501 due process, 159
Microsoft Access in, 250f decision making and, 98, 506 duplicated systems, 599
multiple views of, 246f group, 504–506 dynamic pricing, 409
non-relational, 253–254 deep packet inspection (DPI), 350
relational, 246–248, 247f, 249f, 251, 254, Delivery Information Acquisition Device E
268 (DIAD), 53f Earthlink, 288
software, 245 delivery platform, 492 easy-to-handle pieces, 556
traditional environment of, 245–246 demand planning, 374 e-business, 84
databases, 245 denial-of-service (DoS) attack, 329, 354 EC2. See Elastic Compute Cloud
administration, 265 Department of Defense, 288 ECM. See enterprise content management
as alert system, 256 Department of Defense Advanced Research e-commerce, 35, 41, 607–608. See also digital
in cloud computing, 253–254 Projects Agency (DARPA), 284 markets; Internet
information accessed in, 269 deregulation, 164 behavioral targeting in, 418–422
Internet and, 263–264, 263f design considerations, 122–123, 485 big data analysis in, 493–494
NoSQL, 253 developing countries, 606 business models for, 412–415
quality of data in, 265–266 DevOps, 541–542, 546 commitment to, 440
querying of, 248–250, 250f DFD. See data flow diagram conversational, 403–405
server for, 263–264 DIAD. See Delivery Information Acquisition customization in, 407–408
software for, 209 Device goods and service purchased in, 401–402
data breaches, 332t digital asset management systems, 456 growth of, 402–404, 402f
data brokers, 152, 418–419 digital certificates, 349f, 350 information density in, 407
data flow, transborder, 595 digital dashboard, 79, 79f, 493 interactivity in, 407
data flow diagram (DFD), 528, 529f digital divide, 180 key concepts in, 408–410
data governance, 265, 267 digital firm, 40, 137f management challenges of, 433
data management, 268–269, 495 digital goods, 410–411, 435 marketing transformed by, 417–426, 435
cloud-based, 254 digital information, 157 mobile, 412, 430f
cloud computing and, 254, 351 digital markets, 435 through mobile devices, 405
data quality in, 265–266 flexibility and efficiency of, 408–409 personalization in, 407–408
IS and, 59–60 Internet changing, 411t presence map, 434, 434f, 435t
IT infrastructure and, 195–196, 206–207 traditional markets and, 410t revenue models, 415–417, 435
storage and, 209 Digital Millennium Copyright Act (DMCA), 172 revenues, 403
technology, 49, 144–145, 152 digital networks, 171 richness in, 407
data manipulation language, 248 digital signal, 285 social, 422–423, 423t
data mining, 261–262, 269, 417, 452, 460, 490 digital strategies, 107–108, 110 technology and power of, 405–408
638 Index

technology features of, 406t interface, 492, 535 E*Trade, 417


types of, 412 IS interface for, 558 EU. See European Union
universal standards in, 406–407 overcoming resistance of, 572–574 Europe, 595–596
economic impacts, of IS, 117–118 role of, 524–525 data protection in, 164–165
economic value, 135 Energetic Bear (malware), 340 Facebook users in, 188
economies of scale, 204–206 enterprise applications, 81–83, 571 Internet use in, 606f
ecosystem strategic model, 137f architecture of, 82f spam regulations in, 177
EDI. See Electronic Data Interchange BI in, 390 European Commission, 164, 329, 359
efficiency, 408–409 business processes and, 387 European Union (EU), 164, 177, 447, 595
efficient customer response system, 126 challenges facing, 387–388 evil twins, 331
e-government, 84 CRM and, 387–388 evolutionary approach, 602
eHarmony, 416 next-generation, 388–390 exchanges, 429
802.11 wireless standards, 308–309 social networking tools as, 93, 94t executive support systems (ESS), 78, 503–504,
EIM. See enterprise information management software packages in, 208–209, 224, 506
Elastic Compute Cloud (EC2), 215 369–370, 390 expert systems, 460–464, 463f
electronic business. See e-business enterprise computers, 200 explicit knowledge, 448
electronic commerce. See e-commerce enterprise content management (ECM), exports, 39, 597
Electronic Data Interchange (EDI), 426, 427f, 453–456, 453f extensible markup language (XML), 222, 222t,
611, 614 enterprise resource planning (ERP) systems, 542
electronic document retention policy, 82, 365-367, 394–395, 515–516, 614–615 external integration tools, 572
336–337 SAP, 516, 609 extranets, 50, 84
Electronic Privacy Information Center (EPIC), scoring model for, 563, 564t
188 XML and, 222 F
electronic records management, 335–337 enterprise software, 208–209, 224, 272-274, Facebook, 34–35, 101, 103, 167, 186–189, 212,
electronic surveillance, 296 369–370, 390 219, 264, 299, 302, 389, 403, 405, 413, 415,
e-mail, 122, 434 enterprise solutions, 388 416, 422–424, 430, 470, 492
cellular systems and, 306–307 enterprise suites, 388 Facebook Chat, 294
collaboration using, 89, 93, 98, 102 enterprise systems, 79–83, 365–367, 368f facial recognition software, 187, 302, 345
computer abuse through, 176–177 business processes and, 369t factors of production, 594
crime fighting using, 256 business value of, 370–371 Fair Information Practices (FIP), 162, 163t
digital strategies and, 107–108, 110 centralization from, 390 farm equipment, 63–64
employee monitoring and, 178-179, 296 cloud-based, 389 fault-tolerant computer systems, 350
federal law and, 35 decision making improved by, 370–371 feasibility study, 523–524
free web-based, 167 defining, 368–369 federal laws, 35, 163t
incompatibility of, 600 software for, 208–209, 224, 369–370, 390 Federal Trade Commission (FTC), 163–164,
as Internet service, 293 stand alone, 388 163t, 188
malicious software and, 326–327 enterprise-wide knowledge management feedback, 45f, 46
mobile digital platforms with, 210 systems, 452 Festi, 177
organization retention of, 44 entity, 243 field, 242
phishing, 331 entity-relationship diagram, 252–253, 253f FieldScripts, 63–64
privacy and, 169 Environmental Protection Agency file organization, 242–243
sentiment analysis from, 262 (EPA), 178 files, 242, 243f
spoofing, 329 environmental scanning, 114 file-sharing services, 171, 325
as unified communications, 295 EPA. See Environmental Protection Agency File Transfer Protocol (FTP), 293
vulnerabilities of, 324–325 EPIC. See Electronic Privacy Information Center filtering software, 177
wearable computing with, 211 ergonomics, 576 financial models, 566
web-based, 167 ERM. See employee relationship management financial services, 195
employee relationship management (ERM), ERP. See enterprise resource planning systems deregulation of, 164
381 ESS. See executive support systems electronic records management for, 336
employment e-tailers, 413–414 laws protecting, 164
e-mail monitoring in, 178-179, 296 ethanol, 124 multinational strategies in, 597
global, 80, 609 ethernet, 286 predictive analysis in, 493
internal threats in, 333–334 ethical analysis, 160 system availability in, 350
IS and IT, 97 ethical and moral issues transaction brokers for, 414
IS influencing, 161–162 computer health risks and, 180–183 Financial Services Modernization Act, 336
in MIS, 97 of credit cards, 156–158 fingerprint identification devices, 345
mobile, 505 of intellectual property, 169–172 FIP. See Fair Information Practices
payroll processing in, 75f IS and, 153–155, 154t, 155f, 159–162, 183 Firefox web browser, 220–221
reengineering work in, 179–180 management facing, 153–155 firewalls, 346–347, 346f, 355
technologies influencing, 179–180 of networks and networking, 156–158 Flash, 221
in U.S., 39–40 of privacy, 165–169 flash cookies, 167
encrypted communications, 297–298 of technologies, 156–158, 157t flexibility, 244, 408–409
encryption, 348–349, 349f, 355 ethical dilemma, 153, 161–162 FlipSide video, 424
encyclopedia industry, 128 ethical no-free-lunch rule, 161 forecasting, 261, 493
Endomondo, 130 ethics foreign key, 247
end-users, 97, 569 concepts of, 159–160 foreign trade, 39
communication gap with, 570, 570t defining, 154–155 formal control tools, 572
development, 535–536, 546 no-free-lunch rule in, 161 formal planning tools, 572
graphical interface, 610 principles of, 160–161 forward chaining, 462
Index 639

4G networks, 306 group decision-support systems (GDSS), incremental approach, 602


Foursquare service, 430, 432 504–506 independent software developers, 138
FPX software, 537 GSM. See Global System for Mobile Independent Software Vendor (ISV), 537
franchisers, 597–598, 599 Communications indirect goods, 428–429
free/freemium revenue model, 416–417 Industrial Internet, 509
FTC. See Federal Trade Commission H industrial revolution, 39
FTP. See File Transfer Protocol Hackers, 321, 325, 329, 354, 358–360 industry
fuzzy logic systems, 465–466, 466f, 472 smartphones attacked by, 327 encyclopedia, 128
Hadoop, 209, 259, 269 healthcare, 335
G Hadoop Distributed File System movie, 411
Galaxy 5, 171 (HDFS), 258 oil and gas, 509
Gantt chart, 572, 573f, 577 hard disk drives, 115, 203 recording, 172, 410–411
GDP. See gross domestic product HCM. See human capital management travel agency, 128
GDSS. See group decision-support systems HD. See high-definition TV inference engine, 462, 463f
Genealogy.com, 416 HDFS. See Hadoop Distributed File System information, 44
general controls, 337, 338t Healthbox, 131 asymmetry, 408
general practitioner, 568 healthcare industry, 51-52, 335, 481-483 business intelligence streams of, 490
genetic algorithms, 469–470, 469f, 472 Health Insurance Portability and Accountabil- culture and laws on, 595
geoadvertising services, 430 ity Act (HIPAA), 164, 335 data mining for, 261–262
geographical information system (GIS), 497 health risks, 180–183 decision making and required, 484f
geoinformation services, 430 heartbleed bug, 334 pivot tables used for, 502
geosocial services, 430 hertz, 287 policy established for, 264–265
GIS. See geographical information system HFTs. See high-frequency traders quality of, 488, 489t
The Glass Cage: Automation and Us (Carr), 181 high-performance processors, 220 requirements, 524, 562
global culture, 593 high-speed Internet, 309 rights, 156, 162–164
global information systems. See international HIPAA. See Health Insurance Portability and society, 155f
information systems Accountability Act value chain, 53, 54f
globalization host country system units, 599 information age, 156
challenges and opportunities of, 39–40 hotspots, 309 informational role, 487
in China, 39 HR. See human resources information density, in e-commerce, 407
competitive advantages in, 138 HTML. See hypertext markup language information resources, 341, 355
local services and, 594 HTML5, 221 information systems (IS), 33f. See also inter-
MIS and, 40 HTTP. See hypertext transfer protocol national information systems; systems
particularism influencing, 39 hubs, 281 development
supply chain in, 375, 591f Huddle, 577 alternative methods in, 546
global markets, 594 human interface design, 608–610 audit, 343
global networks, 288 human resources (HR), 80–81, 243–244, 246f, behavioral study of, 57–58
Global Positioning System (GPS), 63, 430 550, 556 benefits of, 32–33
global supply chain, 375 Hummingbird search algorithm, 300–301 business and role of, 95–101, 577
Global System for Mobile Communications hybrid AI systems, 471 business objectives of, 41–44
(GSM), 306, 313 hybrid cloud computing, 219 business perspective on, 52–54, 59
global systems, 603 HyperPlant, 459 business solutions and, 71f
global telecommunications, 598–599 hypertext markup language (HTML), 221–222, business transformed by, 33–35, 59
global threats, 333 263, 298, 313 capital budgeting for, 565–566
global workforce, 80, 609 hypertext transfer protocol (HTTP), 298 communications gap on, 570, 570t
Golden Rule, 160 competitive strategies using, 129–133
goods and service, 401–402 I controls in, 337–338
Google, 35, 167, 299 IaaS. See infrastructure as a service cost and benefits of, 564–565, 565t
Google +, 90, 302, 415, 422 IAC. See Intuit Analytics Cloud counterimplementation in, 574
Google AdSense, 167 IBM Connections, 93, 102 data management and, 59–60
Google Apps, 90, 212, 215 IBM Notes, 93 defining, 44–46
Google Chrome, 208 IBM PureData System, 259 department of, 96–97
Google Docs, 90, 92 IBM TryTracker, 31-33 dependence on, 176
Google Drive, 90, 92, 218, 353 IBM WebSphere, 223 design considerations of, 122–123
Google Gmail, 167, 212 IDC. See International Data Center dimensions of, 46–47, 47f
Google Hangouts, 90, 92, 294 identity management, 341, 344–345 economic impacts of, 117–118
Google Maps, 126, 516 identity theft, 331–332 employment in, 97
Google Play, 226, 353–354 IF-THEN-ELSE rules, 465–466 employment influenced by, 161–162
Google Search, 167, 301f, 467, 489 IIS. See Internet Information Services end users relationship in, 569–570
Google Sites, 90, 92 IM. See instant messaging ethical and moral issues and, 153–155,
governance, 97, 265, 267, 290–292, 290f IMB. See Intelligent Mail bar code system; 154t, 155f, 159–162, 183
GPS. See Global Positioning System Internet Movie Database financial services availability of, 350
Gramm-Leach-Bliley Act, 164, 336 implementation, 485–486 functions of, 45f
grand design approach, 602 counter, 574 implementation of, 531–532
graphical user interface, 610 international information systems, 603–604 liability problems from, 173
green computing, 219 of IS, 531–532 literacy, 46
green IT, 219 in project management, 567–569 management decisions from, 505
grocery delivery, 432 imports, 39 management structures for, 559–560
gross domestic product (GDP), 447 In-a-Snap Snapchat, 424 managerial roles in, 488t
640 Index

managers, 96 copyright laws on, 170 connectivity, 605–608


occupations in, 97 patents on, 170–171 countries use of, 606f
organizational resistance and, 122f privacy and, 169–172 credit card adoption on, 607–608
organization interdependence and, 41f trade secrets in, 169 cyberwarfare on, 333
in organizations, 47–49 intelligence, 485 databases and, 263–264, 263f
organizations planning of, 577t intelligent agent software, 302, 470–472, 471f developing countries infrastructure for, 606
organizing functions of, 97–98 intelligent techniques digital markets changed by, 411t
outsourcing in, 539–540 AI in, 302, 460, 471 DNS of, 288–289, 289f
plan, 560–562, 561t CBR in, 464–465, 465f Double-Click on, 158
SCM and, 372–373 data mining in, 261–262, 269, 417, 452, 460 e-mail service on, 293
study of, 57f expert systems in, 460–464, 463f encrypted communications on, 297–298
systems integration of, 605 fuzzy logic in, 465–466, 466f, 472 Europe’s use of, 606f
systems life cycle in, 533 genetic algorithms, 469–470, 469f, 472 as global network, 288
technical study of, 56–57 knowledge management with, 452, 452f global supply chain influenced by, 375
user interface of, 558 neural networks in, 467–469, 468f, 472 high-speed, 309
vulnerability of, 323–324 organizational benefits from, 460 industrial, 509
information systems project interactivity, in e-commerce, 407 information asymmetry on, 408
change management in, 567 interfaces, 264, 325 Internet 30 and, 293
end users resistance to, 572–574 for core systems, 608–611 IPV6 for, 292–293
management commitment to, 570 end-user, 492, 535 long tail marketing on, 417
risk factors in, 571, 576–577 graphical user, 610 marketing on, 594
technical complexity of, 571–572 human designed, 608–610 media distribution by, 410–411
information technology (IT), 44 IS user, 558 mobile device users on, 429–430
business objectives with, 139 multitouch, 208 organizations and, 122
business processes in, 73 network layer, 285 platforms, 209–210
capital investments in, 34f internal integration tool, 571–572 podcasting on, 414
competitive advantage from, 127 internal rate of return (IRR), 566 privacy challenges of, 165–169
components of, 49–52 internal supply chain processes, 372 satellite connections to, 288
consumerization of, 212–213 International Data Center (IDC), 255 self-regulation of, 168
decision making influenced by, 118–121, international information systems S-HTTP over, 348
119f alternative strategies in, 611 smartphones accessing, 306, 403
employment in, 97 application development for, 603 supply chain driven by, 377f
in farm equipment, 63–64 approach benefits stated for, 602–603 TCP/IP reference model for, 284f
global telecommunications and, 598–599 architecture of, 592–593, 592f TCP/IP used for, 200
governance of, 97 business challenges in, 595–596 user content generation on, 408
green, 219 business drivers in, 593–594 U.S. use of, 606f
hierarchies flattened by, 118–121, 119f business process changes for, 603 value web on, 133, 134f
investments in, 55f, 56f business reorganization for, 599 VoIP over, 294–295
negative social costs of, 174–175 challenges to, 595t, 606t VPN on, 298f
organizations interaction with, 109–110, connectivity in, 605–608 vulnerabilities of, 325
109f, 140 core systems in, 601, 601f Web 2.0, 304–305
socially responsible use of, 159–160 developmental approach of, 602 Web 3.0, 305–306
information technology (IT) infrastructure, global strategies for, 597–599, 597t, 598f Internet 2, 293
50, 196f identifying core systems in, 601–602 Internet-based marketing, 594
changes in, 226–227 implementation management of, 603–604 Internet Explorer, 221
competitive forces model for, 229–230, local user support for, 604 Internet Information Services (IIS), 299
229f management challenges of, 592, 600–601, Internet layer, 284
components of, 206–210, 230 600t Internet of People (IoP), 305
data management and, 195–196, 206–207 quality architectures for, 596 Internet of Things (IoT), 35, 129, 305, 311, 322,
ecosystem of, 206f systems integration of, 605 327–328, 481, 511
evolution of, 197–201, 230 technical alternatives to, 611–612 Internet Protocol (IP), 284, 288
investments in, 227–230 Internet, 49. See also networks and networking; Internet Protocol version 34 (IPv6), 292–293
management of, 227 web browsers; websites Internet service providers (ISPs), 172, 288, 291
scalability of, 227 addressing and architecture of, 288 Internet services, 293–294, 293t
stages of, 198f App, 306 interorganizational system, 83
informed consent, 165 architecture and governance of, 290–292, interpersonal role, 487
infrastructure as a service (IaaS), 215 290f intranets, 50, 69, 84
inheritance, 530–531, 531f big data source of, 262–263 intrusion detection systems, 347
in-memory computing, 258–259 broadband connections of, 280 Intuit Analytics Cloud (IAC), 555–556
input, 45 as business tool, 296 investments
input controls, 337 cable connections to, 288 capital, 34f, 117, 195, 565
Inside+, 69–71 China’s use of, 608 in IT, 55f, 56f
Instagram, 101, 415 client/server architecture on, 294f in IT infrastructure, 227–230
instant messaging (IM), 89, 294, 325 cloud computing on, 200–201 return on, 566
in-store experience, 440 communications costs with, 204, 205f social, 55
insurance rates, 151 competitive advantage from, 50 steps in software, 95
intangible benefits, 564 competitive advantage impacting, in technology, 64
intellectual property rights, 414 128–129, 128t IoP. See Internet of People
challenges to, 171–172 computer abuses on, 176–177 iOS (Apple), 208
Index 641

IoT. See Internet of Things information, 595 employee relationship, 381


IP. See Internet Protocol on information, 595 enterprise content, 453–456, 453f
IPv6. See Internet Protocol version 34 leadership, low-cost, 126 ethical issues facing, 153–155
IRR. See internal rate of return lean production systems, 596 filters, 488–489
IS. See information systems learning management system (LMS), 456, 550 groups, 74–79
ISPs. See Internet service providers legacy systems, 210, 571 identity, 341, 344–345
ISV. See Independent Software Vendor legal liability, 335 information systems project commitment
IT. See information technology legislation, 336 of, 570
item number, 266 computer crime, 331–332 international information systems chal-
iterative process, 534 Do Not Track and, 165 lenges for, 592, 600–601, 600t
IVM. See Information Value Management personal information protected by, 164 international information systems imple-
privacy, 163–164 mentation by, 603–604
J safe harbor and, 165 IS and roles of, 488t
JAD. See joint application design self-regulation and, 168 IS for decisions from, 505
Java, 221 legitimacy, 603 of IT infrastructure, 227
jobs. See employment leisure time, 175 operational, 47, 485
joint application design (JAD), 541, 546 liability, 159, 173 partner relationship, 381
Junglee.com, 607 LinkedIn, 415, 422 patch, 334
Juniper Networks, 209 link farms, 303 senior, 47, 89, 154t, 485, 504
just-in-time, 175, 373 Linux, 208, 220–221 strategic systems analysis by, 139
liquified natural gas (LNG), 509 structures, 559–560
K LMS. See learning management system total quality, 518, 545
Kaboodle, 423 LNG. See liquified natural gas unified threat, 348
Kant’s categorical imperative, 160 local area networks (LAN), 286, 308–309, 312, Management Information Systems (MIS)
key field, 247 325 applications of, 501t
keyloggers, 328 local services, 594 decision making and, 500–501
key performance indicators (KPIs), 102, local systems, 601f employment in, 97
503–504, 562 local user support, 604 field of, 46
keywords, 167, 221, 299–300, 303, 416, 456 location analytics, 497 globalization and, 40
Kindle reader, 73, 522, 543 location-based services, 430–433 study of, 58
KMS. See knowledge management systems logical view, 245 technology changes and, 35–39, 36t
knowledge long tail marketing, 417 TPS data in, 76f
acquisition, 450 Long Term Evolution (LTE), 307 transaction processing systems and, 76
application, 451 LTE. See Long Term Evolution managerial roles, 487
base, 462, 594 manual labor, 461
competitive advantage and, 449 M manufacturing, 461–462
from data, 448–449 MacBooks, 171 MapMyFitness, 130
data mining discovering, 460 machine learning, 467 MapReduce, 258
dimensions of, 448t MAEs. See metropolitan area exchanges market creator, 414–415
discovery, 460 magnetic resonance imaging (MRI), 459 marketing
dissemination, 451 magnetic storage device, 203, 204f campaigns of direct, 382, 382f, 384
expert systems capturing, 464 mainframe computers, 197, 207 CRM campaigns of, 382, 382f
explicit, 448 main memory (RAM), 258 e-commerce transforming, 417–426, 435
storage, 450–451 maintenance, in systems development, 527 Internet-based, 594
structured, 453 MakeMyTrip.com, 607 long tail, 417
tacit, 448 malicious software, 326–328, 327t online, 418t
workers, 47, 457 malware, 334 personal information used in, 158
knowledge management systems (KMS), 83, computer viruses and, 326 search engine, 303–304
475–477 drive-by downloads, 327 in social networking, 422–426
enterprise-wide, 239-241, 452 keyloggers, 328 wisdom of crowds in, 423
with intelligent techniques, 452, 452f ransomware, 328 marketing campaigns, 158, 382–383, 383f
organizational learning and, 449 spyware, 167, 328, 347 market niche, 126–127, 137
role of, 447, 472 SQL injection attacks, 328 marketplace, 124, 594
types of, 452, 452f, 472 Trojan horse, 328, 347 market space, 405
in value chain, 449, 450f worms, 326, 347 mashups, 225–226
knowledge work systems (KWS), MAN. See metropolitan area network mass customization, 126
452, 457–459 managed security service providers (MSSPs), 351 massive open online courses (MOOCs), 456
KPIs. See key performance indicators management, 49 Match.com, 416
KWS. See knowledge work systems BA and BI strategies of, 497–499 m-commerce, 429–430, 433, 436
big data and, 153 MDM. See master data management
L capital, 55 measurement, continuous, 521
LAN. See local area networks change, 567, 615 media, transmission, 287
language, data manipulation, 248 classical model of, 487 media distribution, 410–411
Law of Mass Digital Storage, 203 collaboration tools selected by, 93–95 menu costs, 409
laws, 201–203 customer loyalty map for, 384f Metcalfe’s Law, 203
copyright, 170, 184 data resource, 241–245 metropolitan area exchanges (MAEs), 290
federal, 35, 163t decision making’s role of, 486–487 metropolitan area network (MAN), 286, 312
financial services protected by, 164 e-commerce challenges of, 433 microblogging, 304
electronic records, 335–337 microeconomics, 110f
642 Index

micromarketing, 594 structured methodologies in, 528–530 computer, 280–282, 280f, 312
micropayment systems, 416 subscription revenue, 416 corporation infrastructure of, 282f
microprocessing power, 201–203, 202f, 220 system design and, 546 digital, 171
microprocessor chips, 201, 202f transaction fee revenue, 417 economies of scale and, 204–206
Microsoft Access, 246, 250f value chain, 129–133, 132f, 140 ethical issues of, 156–158
Microsoft Cortana, 470 walled garden, 353 global, 288
Microsoft Excel, 502 modems, 285 international challenges of, 606t
Microsoft. NET platform, 223 functions of, 285f in large corporations, 281–282
Microsoft Office, 470, 536 types of, 286f local area, 286
Microsoft OneDrive, 92 MOOCs. See massive open online courses modems in, 285, 285f, 286f
Microsoft Project, 577 Moore’s Law, 201–203, 202f operating systems, 209
Microsoft SharePoint, 70, 92–93 moral dimensions, 156 packet switching of, 283, 283f
Microsoft SQL, 309 moral issues. See ethical and moral issues peer-to-peer, 286, 295, 325
Microsoft Xbox Live, 416 MOST, 37 private industrial, 427, 428f
middle management, 47, 89, 485 movie industry, 411 routers for, 281
millions of instructions per second (MIPS), 201 MRI. See magnetic resonance imaging software-defined, 281
MIMO. See multiple input multiple output MSN, 413 switches in, 127, 281
minicomputers, 197 MSSPs. See managed security service providers TCP/IP in, 284–285
minority groups, 180 multicore processors, 220 TCP/IP reference model for, 284f
MIPS. See millions of instructions per second multidimensional data model, 260f telephone, 279
Mirai (malware), 321–322, multinational company, 600 3G and 4G, 306
MIS. See Management Information Systems multinational strategy, 597 transmission media used in, 287
MLB. See Major League Baseball multiple input multiple output (MIMO), 309 types of, 285–287, 312
MLS. See multiple listing service multiple listing service (MLS), 226 unified communications in, 295–297
mobile apps, developing, 543–545 multitiered client/server architecture, 199, VPNs in, 297–298, 298f, 313, 348, 505
mobile computing, 210, 227, 234 200f, 293, 294f, 324 WANs, 286, 454
era of, 200–201 multitouch interface, 208 Wi-Fi, 308–309, 313
security of, 236 MyFitnessPal, 130 WSNs, 311, 313
mobile device management (MDM), 235 MyPoints, 417 NetZero, 288
mobile devices, 35–38, 324 My Recipe, 550–551 neural networks, 467–469, 468f, 472
advertising on, 433 MySQL, 246 neurofuzzy systems, 471
BYOD, 212–213, 234–236, 353–354 New York Times, 416
credit cards managed through, 433 N NFC. See near field communication
e-commerce through, 405 NAI. See Network Advertising Initiative NIC. See network interface controller
Internet users on, 429–430 nanotechnology, 203 NikeFuel, 130
malware on, 327 nanotubes, 203 NIST. See National Institute of Standards and
privacy issues of, 158 NAPs. See network access points Technology
security for, 325, 352, 354 NAT. See Network Address Translation nitrogen oxide (NOx), 178
mobile digital platforms, 35–36, 38–39, 210 National Information Infrastructure Protection NLP. See Neighborhood Liaison Program
mobile e-commerce, 412, 430f Act, 331 nonobvious relationships awareness (NORA),
mobile employees, 505 National Institute of Standards and Technology 158, 159f
MobileIron, 236 (NIST), 214 non-relational DBMS, 253–254
Mobile Sales App, 516–517 native advertising, 421 NORA. See nonobvious relationships awareness
mobile search, 300 native app, 543 normalization, 251, 251f, 252f
mobile web app, 543 near field communication (NFC), 311 normative goals, 116
mobile website, 543 negative social costs, 174–175 NOS. See network operating system
models. See also standards Netflix, 411, 416 NoSQL databases, 253
advertising revenue, 415–416 net marketplaces, 427–428, 428f Novell Netware, 200
affiliate revenue, 417 net neutrality, 291–292 NOx. See nitrogen oxide
agent-based, 470 Netscape.com, 402 N-tier. See multitiered client/server architecture
behavioral, 487 network access points (NAPs), 290
broadcast, 408 Network Address Translation (NAT), 347 O
business, 42, 412–415 Network Advertising Initiative (NAI), 168 objective techniques, 563
classical management, 487 network-based strategies, 135–138 object-oriented development, 530–532
cloud computing compared in, 219t network economics, 135–136, 203 object-oriented programming language, 222
competitive forces, 123, 124f, 140–141, networked systems, 599 observations, passive, 182
229–230, 229f network interface controller (NIC), 325 OFBiz. See Apache Open for Business
distribution, 410–411 Network interface layer, 285 Office 393, 70
ecosystem strategic, 137f network operating system (NOS), 281 offline media, 434
ERP scoring, 564t networks and networking, 49. See also telecom- offshore outsourcing, 539, 540f
financial, 566 munications technologies oil and gas industry, 509
free/freemium revenue, 416–417 advertising, 421f OLAP. See online analytical processing
multidimensional data, 260f bandwidth in, 287, 291, 505 OMS. See Order Management System
object-oriented development in, 530–532 bluetooth, 307–308, 307f, 325 on-demand computing, 218
opt-in and opt-out, 168 bot, 177 on-demand economy, 400–401, 415
pull-based and push-based, 376, 376f, 439 cable, 103, 173, 280 online advertising, 419
revenue, 415–417, 435 circuit-switched, 283 online analytical processing (OLAP), 260–261,
sales revenue, 416 client/server computing in, 282–283 384, 490
scoring, 563, 564t communication trends and, 279–280 online dating sites, 416
Index 643

online marketing, 418t software, 225 Internet, 209–210


Online Privacy Alliance, 168 Microsoft. NET, 223
online retail stores, 413–414 P mobile digital, 35–36, 38–39, 210
online transaction processing, 350 P2LU. See Pick to the Last Unit Oracle Cloud, 536
OnQ system, 127 PaaS. See platform as a service real-time bidding, 420
ooVoo, 90 package tracking system, 50, 138 service, 197
Open Handset Alliance, 208 packet filtering, 347 software trends of, 231
open source software, 220–221, 389 packet switching, 283, 283f podcasting, 414
operating costs, 144 Pandora, 172 point-of-sale terminals, 126, 395
operating systems PANs. See personal area networks Point-to-Point Tunneling Protocol (PPTP), 298
Android, 208, 226, 234, 353 paperless system, 569 political issues, 155f, 183
Apple’s, 208 paradigm shift, 519 politics, of organizations, 489
Chrome, 208 parallel strategy, 527 pollution-control technology, 178
Linux, 220–221 parameterized reports, 492 portal, 78, 412–413
network, 209 particularism, 595 Porter, Michael, 124f
Windows, 200, 206, 208 partner relationship management (PRM), 381 Porter’s competitive forces model, 123
Windows 38, 208, 226, 544 passive observation, 182 portfolio analysis, 562–563
operational CRM, 383–386 passwords, 344 POS. See point-of-sale terminals
operational intelligence, 494–497 patches, 334 post-implementation audit, 527
operational management, 47, 485 patch management, 334 postindustrial organizations, 119–122
Operation Green Rights, 329 patents, 170–171 PPTP. See Point-to-Point Tunneling Protocol
OPM. See Office of Personnel Management patient records, 568 precision agriculture, 63–64
opt-in model, 168 Patriot Act, 175 predictive analysis, 493
opt-out model, 168 pattern recognition, 468 predictive policing, 151, 152
Oracle Cloud platform, 536 pay-per-click, 332 predictive search, 301
Oracle Database, 246, 454 payroll processing, 75f, 527, 530f Predix, 509
Oracle WebCenter Content, 454 PCs. See personal computers prescriptive planting, 63–64
order fulfillment, 72–73, 73f peer-to-peer networks, 286, 295, 325 presence map, 434, 434f, 435t
order processing, 341t Penguin, 303 price discrimination, 407
organizational capital, 55 performance indicators, 79f PriceGrabber, 302
organizational change, 545 personal area networks (PANs), 307, 307f price transparency, 407
business process redesign in, 518 personal computers (PCs), 197, 199, 206, pricing, dynamic, 409
risks and rewards in, 518f 329–330 pricing methods, 291
systems development and, 517–519 personal identification number (PIN), 345 primary activities, 131
types of, 517 personal information, 595 primary key, 247
organizational impact analysis, 576 behavioral targeting of, 418 printing, 3-D, 458–459
organizational intelligence, 464–465 from credit cards, 157 print publishers, 173
organizational learning, 449 data collection and, 165 privacy. See also ethical and moral issues;
organizations Facebook and, 186–189 personal information
behavioral view of, 111f Google and, 167 big data and, 151–153, 183–184
change resistance of, 121–122 identity theft and, 331–332 e-mail and, 169
characteristics of, 112–117 malicious software and, 328 ethical and moral issues of, 165–169
culture of, 112–113 marketing campaigns using, 158 Europe’s protection of, 164–165
defining, 110–111 opt-in and opt-out models involving, 168 Facebook and, 186–189
e-mail retention by, 44 privacy legislation protecting, 164 federal laws on, 163t
environment of, 113–114 websites and, 166 information rights and, 162–164
hierarchies in, 48f personalization, 407–408, 420 intellectual property rights and, 169–172
inertia and politics of, 489 personnel system, 342f Internet challenges to, 165–169
intelligent techniques benefiting, 460 PERT charts, 572, 574f, 577 legislation, 163–164
Internet and, 122 pharming, 331 mobile devices issues of, 158
IS and interdependence of, 41f phased approach strategy, 527 personal information legislation
IS and resistance of, 122f phishing, 331 protecting, 164
IS in, 47–49 physical transmission media, 287t technical solutions to, 169
IS planning of, 576t physical view, 245 in U.S., 168
IT flattening, 118–121, 119f Pick to the Last Unit (P2LU), 311 website’s policies of, 168
IT interaction with, 109–110, 109f, 140 pilot study strategy, 527 Privacy Act of 1974, 162
microeconomic definition of, 110f PIN. See personal identification number Privacy Shield, 595
politics of, 112 Pinterest, 302, 422–423 private cloud, 218
postindustrial, 119–122 pipeline-management software, 510 private exchange, 427
reciprocal relationships in, 114f pivot table, 502, 502f private industrial networks, 427, 428f
structure of, 116, 116t Pixar wiki, 305 PRM. See partner relationship management
output, 46 PKI. See public key infrastructure problem solving activities, 523
output controls, 337 platform as a service (PaaS), 215, 218 processing, 45
outsourcing, 546 platforms, 50, 69 processing controls, 337
competitive advantage and, 539 analytic, 259–260 process specifications, 530
costs of offshore, 540f business ecosystems and, 136–138 product differentiation, 125, 126
in IS, 539–540 cloud computing, 214f production, in systems development, 527
offshore, 539 computer hardware, 207–208 production reports, 492, 492t
of security, 351 delivery, 492 production workers, 47
644 Index

product number, 266 Really Simply Syndication (RSS), 304, 313 SAP NetWeaver, 516
products, substitute, 124 real-time bidding platforms (RTB), 420 Sarbanes-Oxley Act, 44, 336
professional work, 85 reciprocal relationships, 114f satellite Internet connections, 288
profiling, 158 record, 242 scalability, 227
program-data dependence, 244 record change, 526f SCM. See supply chain management
Program Evaluation and Review Technique. See recording industry, 172, 410–411 scope, 559
PERT charts records management, 335–337 scoring models, 563, 564t
programmatic ad buying, 420 reduced instruction set computing (RISC), 207 SDN. See software-defined networking
programmers, 96, 539 reengineering work, 179–180, 571 SDS. See software-defined storage
programming, 215, 525 referential integrity, 252 search engine marketing, 303–304
HTML and HTML5, 221–222 referral fees, 417 search engine optimization (SEO), 303
Java in, 221 Refining Dashboard, 79 search engines, 299–300, 301f
open source, 220–221 regional distribution, 502f Second Life, 90
XML, 222–223 regional systems, 599, 601f Secure Hypertext Transfer Protocol (S-HTTP),
project, 558 registration system, 529f 348
project management, 558f regulations, 335–336 Secure Sockets Layer (SSL), 348
cost considerations in, 559 relational DBMS, 246, 247f, 249f, 254, 268 security, 323, 348, 355. See also computer
implementation in, 567–569 data grouping in, 251 crimes; malicious software; malware
objectives of, 558–559, 577 operations of, 247–248 breaches, 321, 353
risk dimensions in, 566–567 rent-versus-buy decisions, 227 in cloud computing, 351
scoring models and, 563 repetitive stress injury (RSI), 180–182, 183f credit card systems for, 341
software tools for, 576–577 request for proposal (RFP), 537, 538 in electronic records management,
systems control in, 560f research and development (R&D), 135 336–337
of technical complexity, 571–572 responsibility, 159 IoT challenges of, 327–328
of technologies, 567 responsive web design, 543 lack of, 244
Project Management Institute, 570 Retail Link system, 42 legal liability and, 335
project portfolio management software, 577 return on investment (ROI), 566 of mobile computing, 236
project structure, 567 revenue for mobile devices, 325, 352, 354
property rights, 156, 169–172 e-commerce, 403 outsourcing of, 351
protocol, 284 Google’s advertising, 35 policy, 341–342
prototyping, 546 mobile e-commerce, 430f of smartphones, 324
pros and cons of, 535 models for, 415–417, 435 threats, 333–334, 358–360
steps in, 534–535, 534f RFID. See radio frequency identification tags vulnerabilities of, 324f
in systems development, 534–535 RFP. See request for proposal wireless networks challenges of, 325
public cloud, 218 richness, in e-commerce, 407 self-regulation, 168
public key encryption, 348–349, 349f ride-sharing service, 399–400 sellers, third-party, 440
public key infrastructure (PKI), 350 RightMedia, 419 semantic search, 300–301
pull-based model, 376, 376f, 439 RISC. See reduced instruction set computing semi-structured decisions, 493, 501–503
push-based model, 376, 376f, 439 risk, 559 senior management, 47, 89, 154t, 485, 504
Pushdo, 330 assessment, 338–341, 341t sensitivity analysis, 501f
Python, 222 aversion principle, 161 sensor-generated data, 509
health, 180–183 sentiment analysis, 262
Q information systems project, 571, 576–577 SEO. See also search engine optimization
quality, 559 in organizational change, 518f sequences, 261
architectures, 596 project management dimensions of, server computers, 199, 263–264, 281
data, 265–266 566–567 service level agreements (SLA), 225, 351
of information, 488 robots, 461–462 service-oriented architecture (SOA), 222–223,
of life, 174 ROI. See return on investment 388
of software, 352 routers, 281 service-oriented computing, 542
system, 156, 174 routines, 112, 113f service platform, 197
TQM for, 518, 545 RSI. See repetitive stress injury services, substitute, 124
quantum computing, 213 RSS. See Really Simply Syndication service set identifiers (SSIDs), 325
querying, of database, 248–250, 250f RTB. See real-time bidding platforms service workers, 47
query language, 535 Ruby, 222 SFA. See sales force automation
runaway projects, 557–558 Shaft Align, 37
R sharing economy, 415
racial divides, 180 S shopping bots, 302
racial profiling, 151 S3. See Simple Storage Service S-HTTP. See Secure Hypertext Transfer Protocol
RAD. See rapid application development SaaS. See software as a service Shutterstock, 255
radio frequency identification (RFID) tags, 46, safe harbor, 165 SIG. See Special Interest Group
211–212, 277, 313, 316-318, 385–386 safety stock, 373 SIIA. See Software and Information Industry
functioning of, 310f sales data, 77f, 125f Association
through supply chain, 309–311 sales force automation (SFA), 381 Silverlight, 221
wireless networks with, 278–279 Salesforce Chatter, 93, 103 SimpleDB, 253
RAM. See main memory Salesforce.com, 225 Simple Storage Service (S3), 215
ransomware, 328 sales revenue model, 416 SIMs. See subscriber identity modules
rapid application development (RAD), 541, 546 sandboxing, 353 SIMS. See Sonic Inventory Management System
rationalization of procedures, 518 SAP ERP, 108, 516, 609 simulation, 452
R&D. See research and development SAP HANA, 108, 482 Siri. See Speech Interpretation and Recognition
Index 645

Interface collaboration in development of, 541–542 cell phone, 306


six sigma, 518 collaboration products, 90–93 in computing, 205t
SKF Data Collection, 37 computer, 49 e-commerce universal, 406–407
SKUs. See stock-keeping units coordinating release of, 604 802.11 wireless, 308–309
Skype, 90, 295, 505 for CRM, 381 technology, 204–206
SLA. See service level agreements customization of, 538 stateful inspection, 347
slippery slope rule, 161 database, 209 stock-keeping units (SKUs), 615
smart-cap bottle, 131 data cleansing, 266 storage
smart cards, 345 DBMS, 245 data management and, 209
smart companies, 130–131 debugging, 352 knowledge, 450–451
smartphones, 35–38, 175, 210, 223, 292. See also enterprise, 208–209, 224, 369–370, 390 magnetic, 203, 204f
mobile devices; wireless networks facial recognition, 187, 302, 345 software-defined, 213
apps for, 226 filtering, 177 strategic business objective, 42
biometric authentication on, 345 FPX, 537 strategic systems analysis, 139, 141
BYOD for, 234–236, 353–354 human interface design of, 608–610 strategic transitions, 140
cellular systems for, 306–307 independent developers of, 138 streaming, 291, 372, 411, 414, 490
growth of, 403–405 integration, 210 structure chart, 530, 530f
hackers attacking, 327 intelligent agent, 302, 470–472, 471f structured decisions, 484
Internet accessible on, 306, 403 localization of, 608–611 structured knowledge, 453
Java for, 221 malicious, 326–328, 327t structured methodologies, 528–530
Linux for, 220–221 mashups, 225–226 Structured Query Language (SQL), 248
location-based services used by, 430–433 networks and networking, 281 Stuxnet (malware), 339–340,
security of, 324 open source, 220–221, 389 subject matter experts (SMEs), 615
websites on screens of, 543 outsourcing, 225 subscriber identity modules (SIMs), 394
smart products, 129, 130–131 package, 224 subscription revenue model, 416
SMEs. See subject matter experts pipeline-management, 510 substitute products and services, 124
Snapchat, 418 piracy, 171 SuccessFactors system, 80–81, 551, 610
sniffer programs, 325, 326f, 329 platform trends of, 231 super cookies, 167
SOA. See service-oriented architecture products, 90–93, 173 suppliers, 42–43, 125, 127
social business, 86 programmers, 96, 539 supply and demand, 134f
applications of, 87t project management tools of, 576–577 supply chain
benefits of, 87, 88t project portfolio management, 577 of businesses, 371–372
software products for, 90–93, 173 quality of, 352 of China, 371
technologies used for, 89–90 runaway projects, 557–558 demand-driven, 375–376
time/space matrix of, 94f for SCM, 373–375 downstream, 372
social computing, 297 sentiment analysis, 262 global, 375
social CRM, 389 for social business, 90–93, 173 in globalization, 375, 591f
social e-commerce, 422–423, 423t Trojan horse, 328 intelligent agent software in, 471f
social engineering, 333 virtualization, 213 internal processes of, 372
social graph, 422 voice recognition, 161 Internet-driven, 377f
social investments, 55 vulnerabilities of, 334–335 planning systems, 373
socially responsibility, 159–160 Software and Information Industry Association push and pull-based models of, 376f
social media, 434 (SIIA), 172 RFID systems in, 309–311
social networking, 305, 408, 415, 432 software as a service (SaaS), 59, 254, 306, 415, upstream, 372
businesses using, 34–35, 101–102 539 supply chain execution systems, 374
COPs in, 451 cloud computing using, 214–215 supply chain management (SCM), 83, 371,
CRM used for, 389 cloud software, 536 378–379, 390
with customers, 424–425 Salesforce.com as, 225 business value of, 376–377
malware and, 327 software-defined networking (SDN), 281 IS and, 372–373
marketing in, 422–426 software-defined storage (SDS), 213 software for, 373–375
social business using, 86–87 Sonic Inventory Management System (SIMS), support activities, 131
technology for, 102 37 surveillance, electronic, 296
tools, 93, 94t space shifting, 40 switches, 281
social search, 301–302 spam, 176–177 switching costs, 127
social shopping, 423 Special Interest Group (SIG), 379 symmetric key encryption, 348
sociotechnical design, 576 Spector 360, 178 synergies, 134, 140
sociotechnical systems, 58, 140 SpeedForm Gemini 30 Record Equipped, 131 system design, 524, 525t, 546, 570t
software, 207. See also applications; computer spoofing, 329 system integration services, 210
hardware; computing SportWatch GPS, 130 system portfolio, 563f
agile development of, 541 Spotify, 172 system quality, 156, 174
analytic, 33 spyware, 167, 328, 347 systems analysts, 96, 523–524
antivirus, 347, 355 SQL. See Structured Query Language systems control, 560f
applications, 225–226, 536–538 SQL commands, 250, 250f systems development. See also project
best-of-breed, 499 SQL injection attacks, 328 management
business’s spending on, 224f SSIDs. See service set identifiers CASE in, 532
capabilities of CRM, 383f SSL. See Secure Sockets Layer communications gap and, 570
cloud-based, 389, 538 stand alone enterprise systems, 388 conversion in, 527
cloud computing, 225, 536 standard operating procedures, 112 core activities of, 528t
collaboration and investment in, 95 standards end-user development in, 535–536, 546
646 Index

software, (continued) telephone networks, 279 Clean Air Act in, 177, 178
end users in, 524–525 telephone systems, 173 employment in, 39–40
information requirements in, 524 telepresence, 90 federal privacy laws in, 163t
maintenance in, 527 Telnet, 293 imports and exports of, 39
object-oriented development, 530–532 temperature controls, 466f Internet use in, 606f
organizational change and, 517–519 terminals, point-of-sale, 126, 395 privacy in, 168
problem solving activities in, 523 testing, in systems development, 525–526 unit testing, 526
process of, 523f, 545–546 test plan, 526, 526f universal standards, in e-commerce,
production in, 527 text mining, 262–263, 269 406–407
programming in, 525 third-party sellers, 440 Unix, 208
prototyping in, 534–535 Third World, 594 unstructured decisions, 484
sociotechnical design in, 576 3-D printing, 458–459 upstream, supply chain, 372
structured methodologies in, 528–530 3G networks, 306 URL. See uniform resource locator
systems analysts in, 523–524 three-dimensional (3D) systems, 457 U.S. See United States
testing in, 525–526 three-dimensional (3D) Web, 305 user attention, of websites, 416
systems integration, 605 time-based competition, 175 user content generation, 408
systems life cycle, 533 time shifting, 40 user-designer communications gap, 570
system testing, 526 time/space matrix, 94f utilitarian principle, 161
TLS. See Transport Layer Security UTM. See unified threat management
T TMT. See Thirty Meter Telescope
T1 lines, 288 token, 344 V
tablet computers, 210 total cost of ownership (TCO), 228, 228t, 231, value-added activities, 54
tacit knowledge, 448 565 value chain, 449, 450f
tag suggest, 302 total quality management (TQM), 518, 545 value chain model, 129–133, 132f, 140
tangible benefits, 564 touch point, 380, 384, 434 value web, 133, 134f, 137
tap-and-go services, 311 Toxic Substances Control Act, 43 vehicle identification number (VIN), 37
taxi service, 399–401 TPS. See transaction processing systems Veriato Investigator, 296
taxonomy, 455 TQM. See total quality management VEVO website, 411
TCO. See total cost of ownership trackbacks, 304 video streaming, 291, 411
TCP. See Transmission Control Protocol tracking files, 167 VIN. See vehicle identification number
TCP/IP. See Transmission Control Protocol/ tractors, 63 virtual company, 136
Internet Protocol trade secrets, 169 virtualization, 213, 219
teams, 85 traditional markets, 410t Virtual Lot, 37
Teamwork Projects, 577 transaction brokers, 414 virtual meeting systems, 90
technical approach, 56–57 transaction cost theory, 117, 405 virtual private network (VPN), 297–298, 298f,
technical complexity, 571–572 transaction fee revenue model, 417 313, 348, 505
technical solutions, to privacy, 169 transaction processing systems (TPS), 74–76, virtual reality (VR), 452, 459
technology, 203 75f, 76f, 267-268 Virtual Reality Modeling Language (VRML),
cognitive functioning and, 182–183 transborder data flow, 595 459
collaboration using, 89–90 Transmission Control Protocol (TCP), 284 virtual worlds, 90
competitive advantage from, 50 Transmission Control Protocol/Internet visitor tracking, 419f, 421
consumer relationships with, 130 Protocol (TCP/IP), 200, 282, 284–285, 284f visual search, 302
data management, 49, 144–145, 152 transmission media, 287 visual web, 302
decision making and, 496 transnational strategy, 598 VMware, 213
disruptive, 114–116, 115t transnational systems, 599, 602 voice over IP (VoIP), 294–295, 325
e-commerce features of, 406t transport layer, 284 voice recognition software, 161
e-commerce’s power from, 405–408 Transport Layer Security (TLS), 348 VoIP. See voice over IP
employment influenced by, 179–180 travel agency industry, 128 voyage-estimating systems, 77–78, 78f
ethical issues of, 156–158, 157t Trojan horse, 328, 347 VPN. See virtual private network
information resources protected by, 341, TRUSTe, 168 VR. See virtual reality
355 Tumblr, 415, 422 VRML. See Virtual Reality Modeling
investing in, 64 tunneling, 298 Language
MIS and changes in, 35–39, 36t tuples, 247
pollution-control, 178 Twitter, 101, 103, 212, 304, 415, 422, 424, 425, W
project management of, 567 492 walkthrough, 352
social business using, 89–90 two-factor authentication, 345 walled garden model, 353
for social networks, 102 two-tiered client/server architecture, 199 Wall Street Journal, 416, 432, 439
standards, 204–206 WANs. See wide area networks
TCO, 228, 228t, 231 U war driving, 325
telecommunications, 49, 59, 209, 280, Ubimax, 211 Warehouse Management System (WMS),
294–295, 325 ubiquity, 405 374–375
telecommunications technologies, 209, 280. See unified communications, 295–297 warehouses, 441
also international inerformation systems; unified threat management (UTM), 348 waterfall approach, 533
networks and networking; radio frequency uniform resource locator (URL), 299 Waze service, 430
identification tags United Kingdom, 193 wearable computing devices, 210–212
computer hardware in, 49, 59 United States (U.S.) Web 2.0, 304–305
global, 598–599 CAN-SPAM Act in, 177 Web 3.0, 305–306
VoIP, 294–295, 325 cell phone standards in, 306 web-based e-mail, 167
Index 647

web beacons, 167, 168 WSNs. See wireless sensor networks


web browsers, 169 W3C. See World Wide Web Consortium
Firefox and Chrome, 220–221
search engines of, 299–300 X
URL’s used by, 298–299 XML. See extensible markup language
web bugs, 167
web design, 543 Y
WebFOCUS, 535 Yahoo!, 299, 413
web hosting service, 209 Yahoo! Messenger, 294
weblining, 188 Yammer, 69–70, 93
web mining, 262–263, 269 Yatra.com, 607
web search tools, 413 Yet Another Hierarchical Officious
web server, 199, 299 Oracle. See Yahoo!
web services, 215f, 222–223, 223f, 542, 546 YouTube, 389
websites, 34–35, 434 YP analytics, 535
collaborative, 304–305
cookies and, 166f Z
HTML basis of, 221–222, 298 zero-day vulnerabilities, 334
liability of, 173 zero defects, 334
m-commerce, 433 zero-rating practices, 292
mobile, 543 Zeus Trojan, 328
personal information and, 166 Zoho Projects, 577
personalization of, 420 zombie PCs, 329–330
privacy policies of, 168 Zoom, 90
searches tracked by, 166
SEO for, 303
on smartphone screen, 543
social search, 301–302
user attention of, 416
using beacon programs, 418–419
VEVO, 411
visitor tracking of, 419f, 421
wikis, 89–90
WEP. See Wired Equivalent Privacy
what-if analysis, 501, 510
WHP. See Wildfire Hazard Potential
wide area networks (WANs), 286, 454
Wi-Fi networks, 308–309, 313
wikis, 89–90, 304
Wildfire Hazard Potential (WHP), 497
WiMax, 309
Windows 10, 208, 226, 544
Windows operating system, 200, 206, 208
Wintel PC computers, 199, 206
Wired Equivalent Privacy (WEP), 348
wireless modems, 285
wireless networks, 33, 108. See also mobile
devices
bluetooth for, 307–308, 307f, 325
cellular systems and, 306–307
hotspots in, 309
PKI on, 350
with RFID tags, 278–279
security challenges of, 325
sniffer programs on, 325, 326f, 329
WEP for, 348
Wi-Fi, 308–309, 313
WiMax, 309
wireless sensor networks (WSNs), 311, 313
wisdom, 448
wisdom of crowds, 423
WMS. See Warehouse Management System
WordPress, 304
World Intellectual Property Organization
Treaty, 172
World Wide Web, 50
World Wide Web Consortium (W3C), 222
worms, 326, 347

You might also like