Information system today managing in the digital world 8th by valacih

564 383 0
Information system today managing in the digital world 8th by valacih

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

EIGHTH EDITION INFORMATION SYSTEMS TODAY Pearson MyLab TM MANAGING IN THE DIGITAL WORLD Valacich Schneider Improving Results A proven way to help individual students achieve the goals that educators set for their course Engaging Experiences Dynamic, engaging experiences that personalize and activate learning for each student INFORMATION SYSTEMS TODAY MA N A GING IN THE DIGI TA L W OR L D An Experienced Partner From Pearson, a long-term partner with a true grasp of the subject, excellent content, and an eye on the future of education www.pearsonhighered.com ISBN-13: 978-0-13-463520-0 ISBN-10: 0-13-463520-5 0 0 780134 635200 EIGHTH EDITION Joseph Valacich Christoph Schneider MIS: Engage, Apply, Empower • Dynamic Study Modules—help students learn the language of MIS by continuously assessing their activity and performance in real time by adapting to the student's knowledge and confidence on each concept These are available as graded assignments prior to class, and accessible on smartphones, tablets, and computers COMMUNICATION DECISION MAKING TEAMWORK ABILITY TO APPLY KNOWLEDGE NEWE HIR • CRITICAL THINKING • PROBLEM SOLVING • Office 2016 Grader Projects—Students complete projects in Excel and Access to demonstrate problem solving, critical thinking, and data analysis skills Projects are automatically graded and include feedback Integrity tokens in each project prevent and detect cheating • Branching, Decision-Making Simulations—students take on the role of manager as they make a series of decisions based on a realistic business challenge, fostering decision making and problem solving skills The simulations change and branch based on their decisions, creating various scenario paths At the end of each simulation, students receive a grade and a detailed report of the choices they made with the associated consequences included • Writing Space—Better writers make better communicators— who become better managers Designed to help develop and assess concept mastery and critical thinking, the Writing Space offers auto-graded writing assignments, and assisted auto-graded writing assignments so students can receive meaningful, personalized feedback quickly and easily And because of Intergration with Turnitin , Writing Space can check students’ work for improper citation or plagiarism ® Learning Catalytics™—is an interactive, student response tool that uses students’ smartphones, tablets, or laptops to engage them in more sophisticated tasks and critical thinking as well as collaboration with other class members Included with MyLab with eText, Learning Catalytics enables you to generate classroom discussion, guide your lecture, and promote peer-to-peer learning with real-time analytics Reporting Dashboard—View, analyze, and report learning outcomes clearly and easily, and get the information needed to keep students on track throughout the course with the new Reporting Dashboard Available via the MyLab Gradebook and fully mobile-ready, the Reporting Dashboard presents student performance data at the class, section, and program levels in an accessible, visual manner • Enhanced eText—keeps students engaged in learning on their own time, while helping them achieve greater conceptual understanding of course material The embedded videos, simulations, and activities bring learning to life to apply the very concepts they are reading about Combining resources that illuminate content with accessible self-assessment, MyLab with Enhanced eText provides students with a complete digital learning experience—all in one place Information systems have become pervasive Mobile devices, social media, • Accessibility (ADA)—Pearson is working toward WCAG 2.0 AA The Internet and cloud computing have transformed organizations andLevel society and Section 508 standards, as expressed in the Pearson Guidelines for of Things can generate a wealth of potentially useful Big Data The rapid Accessible Educational Web Media Moreover, our products support development transportation and telecommunication technologies, customers inof meeting their obligation to comply with the Americans with national Disabilities Act (ADA) by providing access to learning technology programs and global infrastructures, and information systems as well as a host of other for users disabilities factors haswith created a number of pressing societal issues that tremendously influence the world we live in.Team These issues include demographic changes, Please email our Accessibility at disability.support@pearson.com for the most up-to-date information urbanization, shifts in economic power, resource scarcity, and climate change As a consequence, sustainable development will become an ever increasingly important aspect for organizations Throughout this revision, we discuss how organizations can harness radical innovations and other technological as well as the role of information systems in influencing and • LMS Integration—You can developments, now link from Blackboard Learn, Brightspace by D2L, Canvas, or Moodle to MyISLab Professors can acess assignments, rosters, addressing pressing societal issues; further, we added a new chapter element and resources, and synchronize grades with your LMS gradebook about the role of Green IT We designed the book’s cover to emphasize how Single sign-on provides students access to all the personalized IT studying resides within and influences various societal issues learning resources that make more efficient and effective ALWAYS LEARNING • Dynamic Study Modules—help students learn the language of MIS by continuously assessing their activity and performance in real time by adapting to the student's knowledge and confidence on each concept These are available as graded assignments prior to class, and accessible on smartphones, tablets, and computers • • Learning Catalytics™—is an interactive, student response tool that uses students’ smartphones, tablets, or laptops to engage them in more sophisticated tasks and critical thinking as well as collaboration with other class members Included with MyLab with eText, Learning Catalytics enables you to generate classroom discussion, guide your lecture, and promote peer-to-peer learning with real-time analytics Reporting Dashboard—View, analyze, and report learning outcomes clearly and easily, and get the information needed to keep students on track throughout the course with the new Reporting Dashboard Available via the MyLab Gradebook and fully mobile-ready, the Reporting Dashboard presents student performance data at the class, section, and program levels in an accessible, visual manner • Enhanced eText—keeps students engaged in learning on their own time, while helping them achieve greater conceptual understanding of course material The embedded videos, simulations, and activities bring learning to life to apply the very concepts they are reading about Combining resources that illuminate content with accessible self-assessment, MyLab with Enhanced eText provides students with a complete digital learning experience—all in one place • Accessibility (ADA)—Pearson is working toward WCAG 2.0 Level AA and Section 508 standards, as expressed in the Pearson Guidelines for Accessible Educational Web Media Moreover, our products support customers in meeting their obligation to comply with the Americans with Disabilities Act (ADA) by providing access to learning technology programs for users with disabilities Please email our Accessibility Team at disability.support@pearson.com for the most up-to-date information • LMS Integration—You can now link from Blackboard Learn, Brightspace by D2L, Canvas, or Moodle to MyISLab Professors can acess assignments, rosters, and resources, and synchronize grades with your LMS gradebook Single sign-on provides students access to all the personalized learning resources that make studying more efficient and effective ALWAYS LEARNING A02_VALA5200_08_SE_FM.indd 12/7/16 1:37 PM This page intentionally left blank A01_LO5943_03_SE_FM.indd iv 04/12/15 4:22 PM EIGHTH EDITION INFORMATION SYSTEMS TODAY MANAGING IN THE DIGITAL WORLD Joseph Valacich University of Arizona Christoph Schneider City University of Hong Kong 330 Hudson Street, NY NY 10013 A02_VALA5200_08_SE_FM.indd 12/7/16 1:37 PM VP Editorial Director: Andrew Gilfillan Senior Portfolio Manager: Samantha Lewis Content Development Team Lead: Laura Burgess Program Monitor: Ann Pulido/SPi Global Editorial Assistant: Madeline Houpt Product Marketing Manager: Kaylee Carlson Project Manager: Katrina Ostler/ Cenveo® Publisher Services Text Designer: Cenveo® Publisher Services Cover Designer: Brian Malloy/ Cenveo® Publisher Services Cover Art: Kanate/Shutterstock; Zera93/Shutterstock; Maglara/Shutterstock; iDesign/Shutterstock; Fine Art/ Shutterstock Full-Service Project Management: Cenveo® Publisher Services Composition: Cenveo® Publisher Services Printer/Binder: RR Donnelley/Menasha Cover Printer: Phoenix Color Text Font: 10/12 Times LT Pro Unattributed figures in text: Joseph Valacich, Christoph Schneider, Information Systems Today, 8Ed., © 2018 Pearson Education, Inc., New York, NY Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published as part of the services for any purpose All such documents and related graphics are provided “as is” without warranty of any kind Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from the services The documents and related graphics contained herein could include technical inaccuracies or typographical errors Changes are periodically added to the information herein Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time Partial screen shots may be viewed in full within the software version specified Microsoft® Windows®, and Microsoft Office® are registered trademarks of the Microsoft corporation in the U.S.A and other countries This book is not sponsored or endorsed by or affiliated with the Microsoft corporation Copyright © 2018, 2016, 2014 by Pearson Education, Inc., All rights reserved Manufactured in the United States of America This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise For information regarding permissions, request forms and the appropriate contacts within the Pearson Education Global Rights & Permissions department, please visit www.pearsoned.com/permissions/ Acknowledgements of third party content appear on the appropriate page within the text, which constitutes an extension of this copyright page Unless otherwise indicated herein, any third-party trademarks that may appear in this work are the property of their respective owners and any references to third-party trademarks, logos or other trade dress are for demonstrative or descriptive purposes only Such references are not intended to imply any sponsorship, endorsement, authorization, or promotion of Pearson’s products by the owners of such marks, or any relationship between the owner and Pearson Education, Inc or its affiliates, authors, licensees or distributors Library of Congress Cataloging-in-Publication Data On file with the Library of Congress ISBN 10:    0-13-463520-5 ISBN 13: 978-0-13-463520-0 A02_VALA5200_08_SE_FM.indd 12/7/16 1:37 PM Dedication To my mother Mary, you are the best —Joe To Birgit for your love and support —Christoph A02_VALA5200_08_SE_FM.indd 12/7/16 1:37 PM This page intentionally left blank A01_LO5943_03_SE_FM.indd iv 04/12/15 4:22 PM About the Authors Joseph (Joe) Valacich is an Eller Professor of MIS within the Eller College of Management at the University of Arizona, a Fellow of the Association for Information Systems (2009), and the Chief Science Officer (CSO) of Neuro-ID, Inc He was previously on the faculty at Indiana University, Bloomington, and Washington State University, Pullman He has had visiting faculty appointments at City University of Hong Kong, Buskerud College (Norway), the Helsinki School of Economics and Business, the Norwegian University of Life Sciences, and Riga Technical University (Latvia) He received a PhD degree from the University of Arizona (MIS) and MBA and BS (Computer Science) degrees from the University of Montana Prior to his academic career, Dr Valacich worked in the software industry in Seattle in both large and startup organizations Dr Valacich has served on various national task forces designing model curricula for the information systems discipline, including IS ‘97, IS 2002, and IS 2010: The Model Curriculum and Guidelines for Undergraduate Degree Programs in Information Systems, where he was co-chairperson He also served on the task force that designed MSIS 2000 and 2006: The Master of Science in Information Systems Model Curriculum He served on the executive committee, funded by the National Science Foundation, to define the IS Program Accreditation Standards and served on the board of directors for CSAB (formally the Computing Sciences Accreditation Board) representing the Association for Information Systems (AIS) He was the general conference co-chair for the 2003 International Conference on Information Systems (ICIS) and the 2012 Americas Conference on Information Systems (AMCIS); both were held in Seattle Dr Valacich has conducted numerous corporate training and executive development programs for organizations, including AT&T, Boeing, Dow Chemical, EDS, Exxon, FedEx, General Motors, Microsoft, and Xerox He has served in a variety of editorial roles within various academic journals and conferences His primary research interests include human–computer interaction, deception detection, technology-mediated collaboration, mobile and emerging technologies, and e-business He is a prolific scholar, having published more than 200 scholarly articles in numerous prestigious journals and conferences, including: MIS Quarterly, Information Systems Research, Management Science, Academy of Management Journal, Journal of MIS, Decision Sciences, Journal of the AIS, Communications of the ACM, Organizational Behavior and Human Decision Processes, and Journal of Applied Psychology He is a coauthor of the leading textbooks Modern Systems Analysis and Design (8th ed.) and Essentials of Systems Analysis and Design (6th ed.), both published by Pearson In 2016, Dr Valacich was awarded the University of Arizona, Tech Launch Arizona, “Innovation & Impact Award” for Information Technology He was awarded the “Distinguished Alumnus Award” from the University of Montana Alumni Association in 2012 and the “Outstanding Alumnus Award” from the University of Montana’s School of Business Administration in 2009 Dr Valacich is also ranked as one of the most prolific authors in the history of MIS Quarterly—his discipline’s top journal—over the life of the journal (1977–2016) (see misq.org) Throughout his career, he has also won numerous teaching, service, and research awards Christoph Schneider is an assistant professor in the Department of Information Systems at City University of Hong Kong and previously held a visiting faculty appointment at Boise State University He earned a Swiss Higher Diploma in Hotel Management at the University Centre César Ritz in Brig, Switzerland, a BA in Hotel and Restaurant Administration at Washington State University, and a PhD in Business Administration (Management Information Systems) at Washington State University His teaching interests include the management of information systems and web design vii A02_VALA5200_08_SE_FM.indd 12/7/16 1:37 PM viii    ABOUT THE AUTHORS Dr Schneider is an active researcher His primary research interests include human–computer interaction, electronic commerce, and computer-mediated collaboration His research has appeared in peer-reviewed journals, such as Information Systems Research, Management Information Systems Quarterly, Management Science, and IEEE Transactions on Professional Communication; further, he has presented his research at various international conferences, such as the International Conference on Information Systems, the European Conference on Information Systems, and the Hawaii International Conference on System Sciences He serves as a member of the International Steering Committee of the International Conference on Information Systems Development (ISD) and as senior editor at Information Systems Journal A02_VALA5200_08_SE_FM.indd 12/7/16 1:37 PM www.downloadslide.net 520  Subject Index Database management systems (DBMSs), 97, 231–232 Database of Intentions, 33–34 Databases, 96 ad hoc queries and reports of, 235–236 advanced models of, 483 advantages of, 232 application software and, 229–230 as BI application inputs, 229–230, 261 business processes supported by, 96–98 competitive advantage from, 96–98 data marts, 239 data warehouses, 238 designing, 366 electronic commerce and, 97, 229–230 entering and querying, 234–235 foundation concepts of, 231 informational systems and, 237 interactive websites using, 230–231 IoT and, 232–234 management of, 234, 478–483 master data management, 234 MySQL, 359 NoSQL, 233–234, 483 online transaction processing, 236–237 operational systems of, 237 organizations using, 97–98 privacy and, 33–34 sample table of, 231 types of, 232–234 Data centers, 111–112, 116, 271, 350 Data center security, 425 Data cleansing, 238 Data dictionary, 234 Data-driven organization, 236 Data entry form, 367 Data flows, 364 Data marts, 239 Data mining, 246, 247, 261 Data mining agent, 252 Data models, 234 Data packet, 464 Data privacy statements, 35 Data quality, 18 Data reduction, 246 Data redundancy, 483 Data science, 245 Data structures, 480 Data type, 234 Data warehouses, 25, 238, 239 DBMSs See Database management systems Deceptive business practices, 253 Decision making GIS used in, 257–259 IT investment, 354–355 managerial level, 51–52 organizational level, 50 Decision support systems (DSSs), 240 Dedicated grid, 127 Z06_VALA5200_08_SE_SIDX.indd 520 Deep web, 108, 136  Defense Advanced Research Projects Agency (DARPA), 472 Demand fluctuations, 115–116 Demographic changes, Denial-of-service (DoS) attacks, 398 Density, 449 Desktop videoconferencing, 187 Desktop virtualization, 105 Destructive agents, 252 Detective controls, 416 Developing countries, 94 Developmental testing, 368 Device drivers, 100 Dial-up, 475 Differentiation strategy, 57 Digital dashboards, 51, 242–243, 331 Digital divide, 6–7 Digital infrastructure, 93 Digital media, 36 Digital nomads, 62 Digital products, 141 Digital rights management (DRM), 169–170 Digital signals, 475 Digital subscriber line (DSL), 476 Digital video discs, 449 Digital watermark, 170 Digital world business models in, 61–69 payments secured in, 163–168 radical innovations in, 10–16 revenue models in, 62–65 social commerce in, 148–149 societal issues in, 7–10 technological changes in, 4–7, 37 Digitized, 446 Dimensions, 241 Directory services, 459 Disaster planning, 417–418 Disaster recovery plan, 417 Discount rate, 352 Discriminating algorithms, 334 Discussion forums, 186–187 Disintermediation, 66, 143, 146, 172 Disk-based storage media, 103 Display advertising, 156 Disruptive growth engine, 76 Disruptive innovation cycle, 76–77 Disruptive innovations, 69 Distinctive competency, 58 Distributed computing, 458–459 Distribution planning, 318 DIWO See Do-it-with-others DIY See Do-it-yourself DNA testing, 431 DNS See Domain Name System Document analysis, 363 Documentation, 368 Do-it-with-others (DIWO), 344 Do-it-yourself (DIY), 344 Domain names, 107–108 Domain Name System (DNS), 474 DoS See Denial-of-service attacks Downstream information flow, 279, 283, 336 Doxing, 404 Drill-down, 236, 241 Drill-down report, 236 Drive-by hacking, 422 Driverless cars, 298 DRM See Digital rights management Drone technology, 224–225, 270, 341 DSL See Digital subscriber line DSSs See Decision support systems Dumb terminals, 458 Dumpster diving, 394 DVD-ROM (digital versatile disc-readonly memory), 449 Dynamic pricing models, 148 E e-auctions, 162, 172 e-business, EC See Electronic commerce EC2 See Elastic Compute Cloud e-commerce, 97, 143–151 Economic opportunities, 77 Economics, ECPA See Electronic Communications Privacy Act EDI See Electronic Data Interchange Education, 80 EEG See Electroencephalogram Effectiveness, 51 Efficiency, 50 e-finance, 142–143 EFT See Electronic funds transfer e-government, 141–142 EHR See Electronic health record EKG See Electrocardiogram Elastic Compute Cloud (EC2), 118 Electric cars, 298 Electric delivery vans, 164 Electrocardiogram (EKG), 260 Electroencephalogram (EEG), 260 Electromagnetic interference (EMI), 467 Electronic bill pay, 143 Electronic commerce (EC), 140 B2B, 308–309, 320–321 C2B, 162–163 C2C, 161–162 click-and-mortar business strategy in, 144–145 database technology and, 97, 229–230 legal issues in, 168–171, 172 with mobile devices, 140–141 online, 153–154 payments secured in, 163–168 systems for, 27 taxation in, 168–169 types of, 140–141 02/12/16 4:31 pm www.downloadslide.net Subject Index  521  Electronic Communications Privacy Act (ECPA), 34, 406 Electronic Data Interchange (EDI), 309 Electronic devices, 31 Electronic funds transfer (EFT), 165 Electronic health record (EHR), 45 Electronic meeting system, 186–187 Electronics, dissolvable, 191 e-mail, 62, 400–401 addresses, 168 confirmation, 36 marketing, 156–157 privacy, 34–35 productivity loss from, 346–347 Sarbanes-Oxley Act and, 430 Embedded systems, 99 EMI See Electromagnetic interference Employee portals, 109, 188–190 Employee self-service, 190 Enabling technologies, 77 Encryption, 423–424 Encyclopaedia Britannica, 191 End-to-end encryption, 424 Energy, 116 Energy consumption, 188 Enterprise-level systems, 277 Enterprise license, 377 Enterprise marketing management, 330–331 Enterprise resource planning (ERP), 288 business requirements in, 290, 299 choosing, 289 compliance and regulatory demands in, 289 core components of, 290–292 extended components in, 291 installation of, 294 limitations of, 294 make-to-stock/order process in, 293 mobile devices and, 295 order-to-cash process in, 292 procure-to-pay process in, 292–293 Enterprise search, 189 Enterprise software, 285 Enterprise systems, 26, 281, 299 achieving success in, 294–295 benefits and costs of, 287–288 in business processes, 284–288 executive sponsorship of, 295–296 implementing, 295, 296–298 information integration from, 281 outside experts assisting, 296 rise of, 280–281 user training of, 296 Enterprise WAN, 460 Enterprise-wide information systems, 270–271, 281 Entertainment industry, 170 Entity, 231 Entity-relationship diagram (ERD), 364, 481 Z06_VALA5200_08_SE_SIDX.indd 521 Environment, 426 green computing and, 129–130, 277 green supply chain and, 317 online shopping influencing, 164 renewable energy and, 188 sustainable business practices and, 314 technological costs to, 31 technologies impact on, 16 underwater data center and, 350 U.S Navy and, 59 ERD See Entity-relationship diagram ERP See Enterprise resource planning ERP core components, 290 ERP extended components, 291 e-tailing, 144, 172 benefits of, 149–151 disintermediation in, 146 drawbacks of, 151 group buying in, 148 long tail in, 146–147 mass customization in, 147–148 revenue and pricing models in, 148 social commerce in, 148–149 Ethernet, 464 Ethernet card, 464 Ethics AI, 252 app development, 356 code of conduct, 37–38 computer, 32, 37–38 CRM with concerns of, 335 cyberwar and, 410 digital divide and, of discriminating algorithms, 334 electronic device use, 31 in IS, 32–38 online product reviews and, 211 reputation management and, 150 in sharing economy, 68 of software piracy, 405–406 of sustainable business practices, 314 of text mining, 248 of unauthorized IT use, 427 Evaluation criteria, 377 Evernote, 201 Exception reports, 236 Executable, 452 Executive level, 52 Executive sponsorship, 295–296 Exit rate, 158 Expedia, 192 Expenditures, non-capital, 351 Explicit knowledge assets, 254 Extensible Business Reporting Language (XBRL), 320 Extensible Markup Language (XML), 319–320 External acquisition, 373–378, 381 Externally focused systems, 283 Extraction, transformation, and loading, 238 Extranet, 109–111 eXtreme Programming (XP), 373 F Facebook Live, 198 Facility security, 426–427 Fact, 241 Facts, arguments based on, 351 Fair Information Practice Principles, 35 Faith, arguments based on, 349–350 Fear, arguments based on, 350–351 Federal laws, 406–407 Fiber-optic cable, 468–469 Fiber to the home (FTTH), 477 Fiber to the premises, 477 Filter bubble, 206 Financial flow, 320 Financial management, 290–291 Financial services, 143 Financial transactions, 320–321 Fingerprint readers, 421 Fintech, 143 FireChat, 439 Firefox browser, 136, 157, 204, 358, 402 Firewall, 108, 422 First-call resolution, 323 First-mover advantage, 56 Five dimensions (5D), Flappy Bird, 362 Flash animation, 456 Flash drive, 449 Flash memory, 448 Flat-file databases, 482 Flickr, 192 Folksonomy, 199 Ford Model T, 147 Forecasting, 317 Foreign Intelligence Surveillance Act, 265 Foreign key, 479 Forms, 235 Foursquare, 192 Foxconn, 312 Fraud, 168 Freecycling, 162 Freemium models, 62, 64–65 FTTH See Fiber to the home Fulfillment centers, 271 Functional area information system, 52–53 Functional convenience, 152–153 Fuzzy logic, 250 G G2B See Government-to-business G2C See Government-to-citizen G2G See Government-to-government Gamergate, 207 Gaming, 29 GB See Gigabytes Generation gap, 210 Generic top-level domains (gTLDs), 107 02/12/16 4:31 pm www.downloadslide.net 522  Subject Index Geneva Conventions, 410 Geographical information system (GIS), 257–259 Geographic information, 257 Geospatial metadata, 198, 258 Geotag, 198–199 GFS See Google File System Ghz See Gigahertz Gigabytes (GB), 448 Gigahertz (Ghz), 446 Gig economy, 66 GIS See Geographical information system Global culture, 38 Globalization challenges to, 8–9 education, 80 organizational challenges of, 9, 227 skills needed in, 38 societal issues in, 7–10 software piracy and, 405–406 terrorism and, 340 Global network, 461 Global positioning system (GPS), 6, 159, 203, 311 Global supply chain, 340 Gmail, 14, 91, 121, 141, 190, 439 Google Adwords, 156, 178 Google Alerts, 333 Google Apps, 27, 201 Google Calendar, 14 Google Docs, 14, 91 Google File System (GFS), 387 Google Glass, 70 Google Gmail, 91 Google Hangouts, 8, 128–129 Google Maps, 97, 192, 199, 257, 259 Google Play, 86 Google Scholar, 439 Google Chromecast, 86 Google Street View, 97 Google Wallet, 163 Government-to-business (G2B), 142 Government-to-citizen (G2C), 142 Government-to-government (G2G), 142 GPS See Global positioning system Graphical user interface (GUI), 236, 243, 453 Green computing, 129–130, 396 Green IT, 16, 116, 277, 314, 350 Green shopping, 164 Green supply chain, 317 Grid computing, 106, 125–127, 458 Group buying, 148 Groupon, 85 Groupware, 185, 186–187 gTLDs See Generic top-level domains GUI See Graphical user interface H Hackers, 78, 126, 152, 253, 392, 409, 422 Hacktivist, 390–392 Z06_VALA5200_08_SE_SIDX.indd 522 Hadoop cluster, 483 Hadoop Distributed File System (HDFS), 358, 387 Hard drives, 103, 447–448 Hardware, 16, 19 in information systems, 98–100 obsolescence and, 112–115 software cycle with, 114 Hashtag, 196 HCI See Human-computer interface HD See High-definition HDFS See Hadoop Distributed File System Head crash, 448 Healthcare, 16, 45, 184, 260 Healthcare IS, 16 Health Insurance Portability and Accountability Act (HIPAA), 122 Heartbleed security bug, 402 Hedge funds, 144 Help desks, 329 High-definition (HD), 72–73 High-frequency radio signals, 469–470 HIPAA See Health Insurance Portability and Accountability Act HITs See Human intelligence tasks Home automation, 13 Honeypot, 430 Hootsuite, 333 Hot backup site, 418 Hot-button issues, 356–357 HP Supplier portal, 310 HSPA+ (High Speed Packet Access), 470 HTML See Hypertext Markup Language HTML editors, 454 HTML tags, 454–455 HTTP See Hypertext Transfer Protocol Human-based computing, 205 Human body movement, 352 Human communication, 103–104 Human-computer interface (HCI), 366–367 Human controls, 427 Human intelligence tasks (HITs), 205 Human resource activities, 278 Human resource management, 290 Hurricanes, 244 Hyper-stimulation, 28 Hyperlink, 106 Hypertext, 106 Hypertext Markup Language (HTML), 106, 319, 454 Hypertext Transfer Protocol (HTTP), 106–107 I IaaS See Infrastructure as a Service IAFIS See Integrated Automated Fingerprint Identification System IBM Connections, 195 ICANN See Internet Corporation for Assigned Names and Numbers ICPs See Internet content providers IDENT See Automated Biometric Identification System Identification, 419 Identity theft, 163, 403 IIoT See Industrial Internet of Things Impact Team, 253 Impression-based models, 157 In-app purchases, 65 Inbound logistics activities, 276 Incident handling procedures, 417 Incident response, 430 Indiegogo, 79 Industrial espionage, 393 Industrial Internet of Things (IIoT), 13, 69 Industrial Revolution, Industry automobile, 298 corrections, 297 entertainment, 170 GIS used in, 258 movie, 130 pharmaceutical, 191 using data warehouses, 238 Influencers, on social media, 333 Information, 13 customer, 235 digital dashboards representing, 242–243 downstream flow of, 279 enterprise systems integrating, 281 integrated, 226 from mobile devices, 160–161 organization flow of, 283 real-time access to, 189 scanners inputting, 444 from social media, 266 standalone systems with flow of, 280 upstream flow of, 279, 283 visualization of, 242–244, 261 Information Age data in, 15 privacy in, 32 responsible computer use in, 37–38 Informational systems, 237 Information flow, 279, 283, 319, 320 Information privacy, 32–36 Information property, 33–34 Information Sharing and Analysis Centers (ISAC), 428 Information system audit, 429 Information system risk assessment, 414 Information systems (IS), 4, 16 acquiring, 373–380 approaches to building, 371–373 auditing of, 429 automation with, 53 business case arguments for, 349–354 business value from, 53, 307 career opportunities in, 19–25 competitive advantage with, 30–31 02/12/16 4:31 pm www.downloadslide.net Subject Index  523  components of, 18–19 core competencies in, 21 data in, 18 defining, 16–17 development in, 359–361, 365 dual nature of, 29–31 enterprise-wide, 270–271, 281 ethics in, 32–38 geographical, 257–259 hardware in, 98–100 healthcare, 16 job titles and descriptions in, 21 maintenance of, 369–371 measuring productivity of, 347–348 mobile devices and, 99 networking in, 103–111 occupations using, organizational functions, 54 organizational strategy with, 56 organizations using, 26, 55–56 organizing functions of, 27–28 personnel value in, 20 quantifying productivity gains from, 346–348 risk assessment of, 414–416 touchpoints in, 145 types of, 25–27 users in, 23–25 value chain analysis, 60–61 Information systems architecture, 95 Information systems controls, 416 Information systems infrastructure, 93 analog for securing, 397, 419 components of, 131 data centers, 111–112 demand fluctuations in, 115–116 energy needs in, 116 facility security of, 426–427 hardware in, 98–100 influence of, 93–95 issues managing, 112–116, 131 networking, 103–111 overview, 92–96 storage in, 102–103 system software in, 100–102 Information systems planning, 362 Information systems risk assessment, 414 Information systems security, 413 access-control software in, 421–422 biometrics in, 421 cloud computing and, 122–123 controls for, 418–428 data center security for, 425 disaster planning for, 417–418 encryption in, 423–424 firewalls for, 422 human controls for, 427 incident response in, 430 MDM and, 427 monitoring, 428–431 physical access restrictions in, 419–420 strategy for, 416–418 Z06_VALA5200_08_SE_SIDX.indd 523 systems development control in, 427 threats to, 396–397, 412–414 training for, 428 two-factor authentication in, 421 VPNs in, 422 WLANs and, 422 Information technology (IT), 17 businesses alignment with, 61 consumerization of, 12, 114 ethics of unauthorized use of, 427 green, 16, 116, 277, 314, 350 investment decision making in, 354–355 Infrared line of sight, 469 Infrastructure, 92 Infrastructure activities, 277–278 Infrastructure as a Service (IaaS), 120, 131 Initial public offering (IPO), 177 In-memory computing, 241, 297 Innovations, 69 competitive advantage through, 74 difficult choices in, 73 in digital world, 10–16 disruptive, 69, 76–77 investments in radical, 69, 77–78 open, 73 organizational requirements for, 71, 74–75 process of, 75–77 riskiness of, 72–73 risk tolerance in, 75 value of, 69–71 The Innovator’s Solution (Christensen and Raynor), 76 Input technologies, 443 Insider threats, 394 Instant messaging, 196 Intangible benefits, 351 Intangible costs, 351 Integrated Automated Fingerprint Identification System (IAFIS), 386 Integrated information, 226 Integrated services digital network (ISDN), 475–476 Intel Core i7 Extreme CPU, 114 Intellectual property (IP), 36–37, 169 Intelligent agent, 252–254 Intelligent systems, 251–252 Interactive voice response (IVR), 444 Interexchange carriers, 477 Internal communications, 184 Internally focused systems, 281 International Space Station (ISS), 315 Internet, 106 anonymous behaviors on, 207 backbone, 468, 475 broad access to, 119 businesses connecting to, 477 characteristics of, 111 competitive forces influenced by, 57 connecting to, 474–477 domain names on, 107–108 as global network, 106 Heartbleed bug on, 402 management of, 473–474 marketing, 154–159 marketing performance on, 157–159 mobile device traffic on, 117 net neutrality on, 170–171 network connections in, 472–473 networking and, 103 payment models on, 157 renewable energy and, 117 roots of, 472 TCP/IP used for, 463–464 terrorism changed by, 410–411 text mining of, 248–249 Web 2.0 and, 190–191 Internet backbone, 468 Internet content providers (ICPs), 439 Internet Corporation for Assigned Names and Numbers (ICANN), 107 Internet exchange points (IXPs), 475 Internet hoax, 399 Internet hosts, 477–478 Internet of Everything (IoE), 13 Internet of Things (IoT), 12, 53, 99, 141, 228, 259 Big Data and, 229 databases and, 232–234 data expanding in, 247, 387 enterprise software and, 285 green IT and, 16 maker movement and, 344–345 physical objects networked in, 12–13 service-based model in, 67–68 servitization through, 15 supply chain indicators in, 321 wearable technology, 10 Internet over satellite (IoS), 476–477 Internet protocol (IP) addresses, 107–108 convergence, 124, 128 Internet service providers (ISP), 439 Internet Tax Freedom Act, 169 Internet troll, 207 Internetworking, 26 InterNIC, 474 Interorganizational systems, 283 Interpreters, 452 Interviews, 363 Intranet, 108–109, 111, 188–190 Inventory management systems, 50 Investments comparing competing, 353–354 for competitive advantage, 69–70 IT decision making for, 354–355 in radical innovations, 69, 77–78 IoE See Internet of Everything iOS, 100, 161, 203 IoS See Internet over satellite IoT See Internet of Things IP, 463 See also Intellectual property; Internet protocol IP address, 107 02/12/16 4:31 pm www.downloadslide.net 524  Subject Index IP convergence, 128 IP datagram, 464 IPO See Initial public offering IPv6, 474 IS See Information systems ISAC See Information Sharing and Analysis Centers ISDN See Integrated services digital network ISS See International Space Station IVR See Interactive voice response IXPs See Internet exchange points J JAD See Joint Application Design Jailbreaking, 396, 427 Java, 455 JavaScript, 456 JD Edwards EnterpriseOne, 291 JIT See Just in time Job titles and descriptions, 21 Joint Application Design (JAD), 363 Journalism, 195 Just-in-time (JIT), 312–313 K Kbps See Kilobits per second Key generator, 405 Key-indicator reports, 236 Keyloggers, 394 Key performance indicators (KPIs), 51–52 Kickstarter, 79–80 Kilobits per second (Kbps), 105 Knowledge, 18 Knowledge assets, 254 Knowledge economy, Knowledge management, 254–257 Knowledge management systems, 255–257 Knowledge portals, 256 Knowledge society, 5–6 Knowledge workers, 5–6 KPIs See Key performance indicators Kunming Train Station, 439 L LAN See Local area network Languages, 38, 451–457 HTML, 106, 319, 454 SQL, 235 XBRL, 320 XML, 319–320 Law of unintended consequences, 75 Layers, 257 LCD See Liquid crystal display Learning, organizational, 55–56 Learning management systems, 202 Leased lines, 477 Least permissions, 416 Z06_VALA5200_08_SE_SIDX.indd 524 Least privileges, 416 Legacy systems, 280 Legal issues, 168–171, 172 Licensing, of software, 377–378 Like farming, 219 Linux operating system, 100, 204, 358 Liquid crystal display (LCD), 450 Loading, 238 Loan application process, 54–55 Local area network (LAN), 105, 106, 460, 462 Location analytics, 257 Location-aware, 203 Location-based services, 159–160 Logic bombs, 398 Long tail, 146–147 Lotus Notes, 27, 186 Low-cost leadership strategy, 57 M Machine language, 452 Machine learning, 248, 249–250 Magnetic ink character recognition, 443 Maharajas, 23 Mahout, 387 Mainframes, 98 Mainstream wants, 146–147 Maintenance, 369–371 Maker movement, 344–345 Make-to-order process, 274, 293 Make-to-stock process, 274, 293 Making the business case, 346 arguments for, 348–354 objectives in, 346 productivity paradox in, 346–348 Malicious software, 24, 371, 374 Malware, 397 analog equipment not influenced by, 397, 419 attackers using, 78 car hacking using, 126 clickbait, 219 computer crime and, 397–403 mobile devices infected by, 371 phishing, 400–403 ransomware as, 398 zombie computers spreading, 398 Management See also Customer relationship management business process, 61, 286–287 change request, 370 of cloud computing, 121–123 of databases, 234, 478–483 digital rights, 169–170 enterprise marketing, 330–331 financial, 290–291 hot-button issues of, 356–357 human resource, 290 of internet, 473–474 of IS infrastructure issues, 112–116, 131 knowledge, 254–257 master data, 234 mobile device, 427 operations, 290 reputation, 150 software asset, 377 supply chain, 283, 308–310, 312–317, 336 Total Quality, 287 Management Information Systems (MIS), 25, 278 Managerial level, 51–52 Managers, 51, 360–361 Manufacturing activities, 276 Manufacturing process, 335 MapReduce, 387 Marginal costs, 64 Marketing activities, 176 affiliate, 62 e-mail, 156–157 enterprise, 330–331 internet, 154–159 Internet and performance of, 157–159 mobile, 157 search, 155 social media, 157 viral, 208, 212 Marketplace Fairness Act, 169 Marketplaces, 138–139, 163, 169, 310 Markets, 146, 311 Mashups, 191–192 Mass customization, 147–148, 172 Massively open online courses (MOOCs), 80 Mass market, 146 Master data, 234 Master data management, 234 Mbps See Megabit per second McAfee Labs, 398 MDM See Mobile device management measured service, 120 Measures, 241 metropolitan area network, 106 Media access control, 466 Media sharing, 197–198 Megabit per second (Mbps), 105 Megatrends, 7, 10–11 Megaupload.com, 390 Memory, 447 Memory, non-volatile, 447 Memory crystals, Menu-driven pricing models, 148 Mesh network, 466 Metadata, 198 Metropolitan area network, 106, 460 Microblogging, 195–196, 211 Microprocessor, 445 Microsoft Access, 236, 366 Microsoft Cortana, 252 Microsoft Dynamics, 289, 292, 333 Microsoft Exchange, 27 Microsoft HoloLens, 70 Microsoft.NET, 455 Microsoft Office, 27, 96, 289, 320, 357 02/12/16 4:31 pm www.downloadslide.net Subject Index  525  Microsoft Office 365, 201 Microsoft OneNote, 201 Microsoft Outlook, 27, 105 Microsoft SharePoint, 202, 203 Microsoft web service, 371 Microsoft Xbox, 29 Micro-task marketplaces, 163, 205 Microwave transmission, 471 Midlevel managers, 51 Mirror, 418 MIS See Management Information Systems Mobile apps, creating, 362 Mobile banking, 143, 165 Mobile business intelligence, 244 Mobile commerce (m-commerce), 141, 159–160, 172 Mobile CRM, 330 Mobile device management (MDM), 427 Mobile devices, 182 app development ethics for, 356 backdoors to, 408 businesses depending on, 69 in China, 159 click-and-mortar approach, 144–145 CRM on, 330 cybercrime on, 371, 404 data generation of, 243 EC with, 140–141 e-finance on, 142–143 ERP systems embracing, 295 geographic information and, 257 growth in, information from, 160–161 internet traffic from, 117 IS infrastructure and, 99 malicious software infecting, 371 management of, 427 in networking, 103, 106 payments using, 165 product sales on, 161 QR codes, 154 security threats on, 396–397 social networking on, 205–208 supply networks on, 311–312 trends in, 11–12 video calls on, 187 webcasts on, 197 wireless media for, 469–471 Yelp on, 203 Mobile marketing, 157 Mobile operating system, 24, 100 Mobile payments, 94 Mobile technology, 62 Mobile wireless, 477 Modeling, predictive, 250–251, 331 Modeling data, 364 Models, 240 cloning business, 178 data, 234 dynamic pricing, 148 freemium, 62, 64–65 Z06_VALA5200_08_SE_SIDX.indd 525 impression based, 157 internet payment, 157 menu-driven pricing, 148 payment, 157 pay-per-click, 156, 157 platform-based business, 65–67 pricing, 148, 251, 380 revenue, 62–65 revenue and pricing, 148, 380 service, 120 service-based business, 67–68 service-oriented business, 15 technology-enabled business, 48–49 utility computing, 118 Modem (MOdulator/DEModulator), 475–476 Modules, 284 Monitoring and sensing agent, 252 Monitoring security, 428–431 Monitors, 449–450 MOOCs See Massively open online courses Moodle, Moore’s law, 73, 113–114, 313, 410, 468 Motherboard, 445 Movie industry, 130 Mule herder, 403 Multichannel retailing, 145 Multi-core processor, 446 MyBoeingFleet, 310 MyDoom, 398 MySQL database, 359 N Nanoscale laser, National Science Foundation (NSF) 472 National Science Foundation Network (NSFNET), 472 National Security Agency (NSA), 265– 266 Nation primary key, 479 Near-field communication (NFC), 165, 171 Nest Learning Thermostat, 13 Netflix, Net neutrality, 170–171 Net-present-value analysis, 352 Netscape browser, 424 Network, 105 Network adapter, 464 Network effect, 12 Networking cables, 466–469 computer, 104 evolution of, 457–459 hardware, 467 human communication in, 103–104 in information systems, 103–111 internet and, 103 mobile devices in, 103, 106 physical objects in, 12–13 servers, clients and peers in, 105–106 Network interface card (NIC), 464 Networks bus, 466 client-server, 105 computer, 105 content delivery, 124, 127 global, 461 Internet as global, 106 internet connecting independent, 472– 473 local area, 105–106 mesh, 466 neural, 250–251 P2P, 105–106 personal area, 106 ring, 465–466 social, 196, 205–206, 211–212 standards and protocols of, 462–466 star, 464–465 technology, 466–471 telecommunications, 16–17 types of, 106, 459–462 virtual private, 109, 189, 422 wide area, 106 Wi-Fi (wireless fidelity), 106, 159 wireless local area, 106, 422 Network services, 459 Network topology, 464–466 Neural networks, 250–251 Next Generation Identification (NGI), 386 NFC See Near-field communication NGI See Next Generation Identification NIC See Network interface card Niche market, 146 Nintendo Wii, 29 Non-capital expenditure, 351 Non-recurring costs, 351 Nonvolatile memory, 447 Normalization, 482–483 NoSQL, 233, 483 NoSQL databases, 233–234, 483 NSA See National Security Agency O Object-oriented language, 452–453 Observations, 363 Obsolescence, 112–115 Occupational Outlook Handbook, 19 Oculus Rift, 70 Office automation systems, 27 Off-the-shelf software, 284, 357–358 OLAP See Online analytical processing OLAP cube, 241 OLAP server, 241 OLED See Organic light-emitting diodes Omni-channel retailing, 145 Onboard systems, 126 On-demand services, 49 Online advertising, 380 Online analytical processing (OLAP), 241 02/12/16 4:31 pm www.downloadslide.net 526  Subject Index Online banking, 143 Online brokerage, 143 Online classifieds, 162 Online community, 191 Online conversations, 332 Online predators, 404 Online privacy, 35–36 Online product reviews, 211 Online shopping, 164, 167 Online transaction processing, 236–237 Online travel, 213 Open innovation, 3, 73 Open source software, 204, 358–359 Open Systems Interconnection (OSI) model, 463 Opentable, 192 Operating systems, 100, 445 Android, 24, 100, 119, 161, 259, 358, 439 functions of, 101–102 iOS, 100, 161, 203, 456 Linux, 100, 204, 358, 456 mobile, 24, 100 OS X, 100 types of, 451 Ubuntu, 100 Windows 10, 24, 100, 114 Windows XP, 114 Operational CRM, 326–331 Operational expenditure, 351 Operational level, 50 Operational systems, 236, 237 Operation Darknet, 391 Operations and manufacturing activities, 276 Operations management, 290 Optical character recognition, 443 Optical disks, 449 Optical mark recognition, 443 Opt in, 35 Opt out, 35 OpWhales campaign, 396 Order-to-cash process, 272–273, 275, 292 Organic light-emitting diodes (OLED), 450 Organizational activities, 274–278 Organizational context, 209 Organizational learning, 55–56 Organizational level decision making, 50 Organizational strategy, 56, 58 Organizations Big Data available to, 227–228 business processes of, 299 continuous planning of, 228–230 customer-focused, 332 databases used by, 97–98 data-driven, 226–227 decision making of, 50 executive level, 52 extranets benefiting, 110–111 functional areas in, 52–53 globalization challenges to, 9, 227 information flows of, 283 innovation requirements of, 71, 74–75 Z06_VALA5200_08_SE_SIDX.indd 526 IS functions in, 54 IS strategy of, 56 IS used in, 26, 55–56 social media issues of, 208–211 social networks used by, 206 technology in, 28–29, 61 using knowledge portals, 256 value chain activities of, 60, 274–278 value chain connecting, 279 OSI See Open Systems Interconnection model Outbound logistics activities, 276 Output technologies, 449–450 Outsourcing, 8, 381 communication costs influencing, companies, cost savings from, in systems development, 378–380 Ownership, 67 P P2P See Peer-to-peer networks Paas See Platform as a Service Package delivery system, 270 Packaged software, 284 Packet sniffers, 394 Packet switching, 462 Paid inclusion, 156 Paid search, 156 PAN See Personal area network Pandora, PAPA See Privacy, accuracy, property, and accessibility Parental Intelligence System, 356 Passive tags, 100 Passwords, 420 Patch management systems, 370 Patents, 404–405 Patriot hackers, 409 Pay by fingerprint system, 171 Payment Card Industry Data Security Standard, 122 Payment models, 157 Payments digital world securing, 163–168 internet models for, 157 mobile, 94 ransom, 152 systems for, 171 using mobile devices, 165 PayPal, 371 Pay-per-click models, 156, 157 PBX See Private branch exchange PCs See Personal computers Peer, 105 Peer production, 202 Peers, 105–106 Peer-to-peer (P2P) networks, 105–106 PEP See Priority Enforcement Program Perfective maintenance, 369 Peripherals, 100 Personal area network (PAN), 106, 461 Personal computers (PCs), 99 Personalization, of websites, 32 Personalized communications, 335 Personnel, qualified, 23 Pharmaceutical industry, 191 Phishing, 400–403 PHP, 456 Physical access restrictions, 419–420 Physical objects, IoT networking, 12–13 Physician’s Desk Reference, 260 PIN numbers, 420 Piracy, 139, 390 Plain old telephone service (POTS), 475 Planned obsolescence, 114 Platform, 65 Platform as a Service (PaaS), 120–121, 131 Platform-based business models, 65–67 Playstation, 29, 30 PLCs See Programmable logic controllers Podcast, 197 Point-of-sale inventory system, 171 Policies, 171, 417 Porn bot, 233 Port, 449 Portals, 309 customer, 310–311 employee, 109, 188–190 HP Supplier, 310 knowledge, 256 supplier, 310 in supply chain management, 309–310 POTS See Plain old telephone service Power supply, 449 Predictive modeling, 250–251, 331 Preventive controls, 416 Preventive maintenance, 369 Price-matching policy, 171 Pricing models, 148, 251, 380 Primary key, 479 Primary storage, 447 Printers, 449 Priority Enforcement Program (PEP), 386 Privacy cloud computing and, 122–123 of consumers, 35–36 databases and, 33–34 e-mail, 34–35 information, 32–36 in Information Age, 32 online, 35–36 security debate versus, 408 tracking devices and, 282 Privacy, accuracy, property, and accessibility (PAPA), 32 Private branch exchange (PBX), 460 Private cloud, 121 Problem decomposition, 360 Processing logic, 364–365 Processing technologies, 445 Procurement activities, 278 Procure-to-pay process, 273, 292–293 Product flow, 318–319 02/12/16 4:31 pm www.downloadslide.net Subject Index  527  Production scheduling, 318 Productivity loss, 346–347 Productivity paradox, 346, 347, 348 Product recalls, 313–314 Products delivery and return of, 151 digital, 141 mobile devices sales of, 161 websites offering, 149–150 Programmable logic controllers (PLCs), 99 Programmers, 232, 367–368, 373, 402, 430, 451–452 Programming languages, 451–457 Project manager, 360–361 Project Natick, 350 Propagation delay, 471 Proprietary software systems, 280 Propulsion systems, 59 Protocols, 104, 462–463 Prototyping, 372 Proxy variables, 355–356 Pseudocode, 364 PSTN See Public switched telephone network Public cloud, 121 Public key encryption, 424 Public switched telephone network (PSTN), 475 Pulling sequence, 274 Pushing sequence, 274 Q QR codes, 154, 161 Quadcopters, 224 Quantified self, 10 Query, 235 Questionnaires, 363 R RAD See Rapid Application Development Radical innovations, 69, 77–78 Radio frequency identification (RFID), 99 171, 282 overview of, 99–100 tags, 100 Radio stations, 380 RAID See Redundant array of independent disks Random-access memory (RAM), 447 Range International Information Hub, 350 Ransom payments, 152 Ransomware, 24, 374, 398 Rapid Application Development (RAD), 373 Raspberry Pi, 344 RDBMSs See Relational database management systems Read-only memory (ROM), 447 Read/write heads, 448 Z06_VALA5200_08_SE_SIDX.indd 527 Record, 231 Recovery point objectives, 418 Recovery time objectives, 418 Recurring costs, 351 Redistribution, 348 Redundant array of independent disks (RAID), 448 Registers, 447 Regulatory demands, 289 Reintermediation, 146 Relational database design, 478–481 Relational database management systems (RDBMSs), 232, 235 Relational database model, 481–482 Relationships, 479–480 Reliability, 122 Removable storage media, 448–449 Renewable energy, 59, 109, 117, 188 Report generators, 235 Reports, 235–236 Representational delight, 152–154 Reputation management, 150 Request for proposal (RFP), 375–376 Requirements collection, 363 Research and development, 2–3 Resources, 58, 119–120 Resource scarcity, 10 Responsible computer use, 37–38 Retailing, 171 Revenue and pricing models, 148, 380 Revenue models, 62–65 Reverse engineering, 405 Reverse logistics, 318, 319 RFID tag, 100 RFP See Request for proposal Ride-sharing platforms, 162 Ring network, 465–466 Riot Games, 111 Risk B2C transaction, 166–168 innovation and tolerance of, 75 of innovations, 72–73 IS and assessment of, 414–416 Risk acceptance, 415 Risk avoidance, 415 Risk reduction, 415 Risk transference, 415 Robotics, 15 Roll up, 241 ROM See Read-only memory Router, 463, 472 RSS (Real Simple Syndication), 197 S S3 See Simple Storage Service SaaS See Software as a Service Safety stock planning, 318 Sakai, Sales activities, 276 Sales beacons, 145 Sales force automation (SFA), 327–328 Samsung Galaxy, 127, 159 Samsung Galaxy Gear, 10 Sarbanes-Oxley Act, 102, 122, 211, 289, 429–430 Satellite transmission, 471–472, 476–477 Scalability, 121–122, 233 Scammers, 219 Scanners, 394, 444 Scheduled reports, 236 Schengen Agreement, 340 SCM See Supply chain management Scripting languages, 455 SDLC See Systems development life cycle SDSL See Symmetric digital subscriber line Search advertising, 156 Search engine optimization (SEO), 155–156 Search engines, 92–93, 206–207 Search marketing, 155 Secondary keys, 479 Secondary storage, 447–448 Secure Sockets Layer (SSL), 424 Secure tunnel, 422 Security cloud, 424 cloud computing with privacy and, 122–123 data center, 425 facility, 426–427 IS and analog, 397, 419 mobile devices threats of, 396–397 monitoring, 428–431 privacy debate versus, 408 social media, 211 Security policy, 417 Security strategy, 416–418 Security threats, 374 Self-driving cars, 249 Semantic web, 193–194 Semistructured data, 228 Semistructured decisions, 51 Sensitivity analysis, 240 Sensors, 12 Sentiment analysis, 248 SEO See Search engine optimization Sequence discovery, 246 Serverless computing, 121 Servers, 98, 105–106 Service, 124 Service-based business models, 67–68 Service industries, 278 Service-level agreements (SLAs), 123 Service models, 120 Service-oriented architecture (SOA), 124–125 Service-oriented business models, 15 SFA See Sales force automation Sharing economy, 15, 66–67, 68 Shifts in economic power, Shopping bot, 252 Shopping, tax-free, 169 Shoulder surfing, 394 02/12/16 4:31 pm www.downloadslide.net 528  Subject Index Showrooming, 161, 171 Shrink-wrap licenses, 377 Simple Storage Service (S3), 118, 135 Sina Weibo, 439 Skype, 8, 371 SLAs See Service-level agreements Slicing and dicing, 241 Smart cards, 444 Smart home technology, 13 Smartphones See Mobile devices Smart technology, 75 Smartwatches, 10 SnapChat, 196 SOA See Service-oriented architecture Social bookmarking, 199 Social cataloging, 199 Social commerce, 148–149 Social CRM, 332 Social engineering, 394 Social intelligence, 266–267 Social intranets, 190 Social media, 12, 148, 158, 205, 356 algorithms prioritization on, 218–219 Big Data generated by, 192 bookmarking on, 199 cataloging on, 199 collaboration enhanced on, 201–202, 214 communications enhanced using, 194–196, 214 connections enhanced by, 205–208, 214 cooperation enhanced by, 197–200, 214 critical mass on, 209–210 dangers of, 211–213 generation gap on, 210 geotagging on, 198–199 impact of, 212–213 influencers on, 333 information from, 266 marketing, 157 media sharing on, 197–198 organizational issues, 208–211 security, 211 tagging on, 198 terrorism battle on, 200 web 2.0 and, 192, 214 workspace using, 193 Social Media Listening Command Center, 333 Social media monitoring, 332–333 Social network analysis, 255–256 Social networking, 196, 205–206, 211–212 Social online communities, 205 Social search, 206, 207, 208 Social Security number, 394, 403 Social Software, 192 Societal issues, in digital world, 7–10 Society for Worldwide Interbank Financial Telecommunication (SWIFT), 78 Z06_VALA5200_08_SE_SIDX.indd 528 Software, 16, 19, 131, 450 access-control, 421–422 application, 96, 124–129, 229–230, 280, 324, 356 best practices, 285–286 commercial, 290 commercial off-the-shelf, 358, 359 conversion strategies for, 368–369 corrections industry error of, 297 custom, 284, 357–358 custom compared to off-the-shelf, 357–358 customization of, 284–285 customized or vanilla version of, 284– 285 enterprise, 285 hardware cycle with, 114 licensing of, 377–378 malicious, 24, 371, 374 obsolescence of, 114–115 off-the-shelf, 284, 357–358 open source, 204, 358–359 packaged, 284 programming and testing, 367–368 proprietary systems of, 280 system, 100–102, 451 in systems development process, 357– 359 text recognition, 443 third-party, 427 upgrading, 290 voice-to-text, 444 Software as a Service (SaaS), 121 Software asset management, 377 Software bug, 361 Software piracy, 404–406 Solar energy, 93 Solid-state drive (SSD), 448 SoLoMo, 203 Source code, 452 Sourcing plan, 318 Space Exploration Technologies Corporation (SpaceX), 315 Spam, 399–401 Spam filters, 399 Spear phishing, 400–401 Speech recognition, 444 Spiral development approach, 372 Sponsored search, 156 Spotify, Sprints, 372 Spyware, 398–399 SQL See Structured Query Language Square Reader, 79, 163–164 SSD See Solid-state drive SSL See Secure Sockets Layer Standalone applications, 280 Star network, 464–465 Startups, 78–79 Stickiness, 249 Storage, 7, 102–103, 115, 118, 135 types of, 446–449 Strategic, 30 Strategic necessity, 61, 348 Strategic planning, 56 Streaming audio, 445 Streaming media, 445 Streaming video, 86, 445 Structural firmness, 152 Structured data, 228 Structured decisions, 50 Structured Query Language (SQL), 235 Stuxnet, 409 Subscription-based services, 48–49 Supercomputers, 98, 125 Supplier portals, 310 Supply chain, 275, 308, 316, 402–403 augmented reality and, 322 defining, 308 global, 340 green, 317 IoT indicators of, 321 terrorism influencing, 340 Supply chain analytics, 321 Supply chain effectiveness, 316 Supply chain efficiency, 316 Supply chain execution, 318–321 Supply chain management (SCM) system, 283, 308, 314 B2B processes improved by, 336 benefits of, 312–314 developing strategies in, 316–317 optimizing, 314–316 portals in, 309–310 Supply chain planning, 317–318 Supply chain visibility, 321 Supply network, 308–311 managing, 311–312 on mobile devices, 311–312 optimizing, 315 Support activities, 275, 277 Surface web, 108, 136 Surge pricing mechanism, 251 Sustainable business practices, 314 Sustainable development, 10 SWIFT See Society for Worldwide Interbank Financial Telecommunication Switch, 467 Symmetric digital subscriber line (SDSL), 476 Symmetric encryption, 424 Synchronous, 184 Synchronous communications, 185 System clock, 446 System conversion, 368 Systems analysis, 360, 363 Systems analysis and design, 357 Systems analyst, 357 Systems benchmarking, 376 Systems competency, 22–23 Systems design, 366–367 Systems development controls, 361, 427 Systems development life cycle (SDLC), 361, 381 02/12/16 4:31 pm www.downloadslide.net Subject Index  529  Systems development process, 357–359 outsourcing in, 378–380 project managers in, 360–361 steps in, 361–369 users in, 361 Systems implementation, 367–369 Systems integration, 26–27, 359 Systems maintenance, 369–371 System software, 100–102, 451 Systems planning and selection, 362–363 T T1 lines, 477 T3 lines, 477 Tables, 231, 480–481 Tablets, 159 Tacit knowledge assets, 254 Tag, 198 Tag cloud, 198 Tangible benefits, 351 Tangible costs, 351 Taobao Marketplace, 138–139 Tapes, 449 Taxation, 168–169 Tax-free shopping, 169 TB See Terabytes TCO See Total cost of ownership TCP, 464 See Transmission Control Protocol/Internet Protocol Technical competency, 22 Technological integration, 210–211 Technology, 59 See also Information technology algorithms prioritization and, 218–219 businesses changing through, 23 competitive advantage and investments in, 69–70 digital world changes in, 4–7, 37 drone, 224–225, 270, 341 enabling, 77 environmental and social costs of, 31 environmental impact of, 16 input, 443 memory crystals, mobile, 62 networks, 466–471 new, 72 in organizations, 28–29, 61 output, 449–450 processing, 445 RFID, 99–100, 171, 282 smart, 75 smart home, 13 streaming video, 86 3D, 431 virtual hold, 329 wearable, 10 Technology development activities, 278 Technology-enabled business models, 48–49 Telecommunication lines, 478 Telecommunications, 127–128 Z06_VALA5200_08_SE_SIDX.indd 529 Telecommunications networks, 16–17 Telegram, 196 Television stations, 380 Ten Types of Innovation (Keeley), 69 Terabytes (TB), 448 Terminals, 458 Terrorism, 200, 340, 410–411 Text mining, 248–249 Text recognition software, 443 Thin clients, 105 Third-party software, 427 Threats, 414 3D printing, 37, 335, 345 3D technology, 431 Time bomb, 398 Time lags, 348 Token passing, 466 Top-level domain, 107 Tor (The Onion Router), 136 Total cost of ownership (TCO), 351 Total Quality Management, 287 Touchpoints, IS, 145 Touch screen, 450 TPS See Transaction processing systems Tracking devices, 282 Trademarks, 169 Training employee, 326 of enterprise systems, 296 for information system security, 428 of users, 368–369 Transaction patterns, 168 Transaction processing systems (TPS), 25 Transactions, 50 Transformation, 238 Transmission Control Protocol/Internet Protocol (TCP/IP), 108, 463–464 Transmission media, 104 Transportation planning, 318 Travel, online, 213 Trending, 196 Trojan horses, 397–398 Trolling, 207 Trust, 151 Tumblr, 196 Tunneling, 422 Twisted-pair cable, 466–467 Twitter, 195–196 Twitterbots, 233 Two-factor authentication, 421 U UAVs See Unmanned aerial vehicles Ubuntu Linux, 100 Unauthorized access, 394–395 Unauthorized data modification, 395 Underwater data center, 350 Unicode, 446 Uniform Resource Locator (URL), 107 Unmanned aerial vehicles (UAVs), 341 Unstructured data, 228, 248 Unstructured decisions, 52 Upstream information flow, 279, 283 Urbanization, URL See Uniform Resource Locator Usability, 367 User agents, 252 User-generated content, 190 User policy, 417 Users, IS, 23–25 User training, 368–369 Use tax, 169 Utilities, 451 Utility computing, 118 Utility programs, 451, 452 V Value-added networks (VANs), 460 Value chain, 60 core activities in, 275–276 multiple organizations connected in, 279 organizational activities along, 60, 274–278 in service industries, 278 Value chain analysis, 60 Value creation, 58 Value proposition, 61 Value system, 279 Vanilla version, 284–285 VANs See Value-added networks Vendor-managed inventory (VMI), 313 Vendor selection, 377 Vertical markets, 311 Viber, 196 Video, 444 Videoconferencing, 187–188 Videoconferencing over IP, 128–129 Video data, 445 Vine, 196 Viral marketing, 208, 212 Viral meeting, 184 Virtual companies, 144 Virtual hold technology, 329 Virtualization, 105, 129 Virtual meetings, 185 Virtual private networks (VPNs), 109, 189, 422 Virtual reality (VR) headsets, 69, 70, 298 Virtual teams, 184–185 Virus, 397 Virus prevention, 425 Visual analytics, 243–244 Visual Basic.NET, 454 Visual data discovery, 244 Visualization, 242–244, 261 Visual programming languages, 452, 453, 454 VMI See Vendor-managed inventory Voice over IP (VoIP), 128 Voice recognition, 144 Voice-to-text software, 444 VoIP See Voice over IP Volatile memory, 447 02/12/16 4:31 pm www.downloadslide.net 530  Subject Index Volume license, 377 VPNs See Virtual private networks VR See Virtual reality headsets Vulnerability, 414 Vulnerability scanners, 394 W WAN See Wide area network Warez, 405 Watermark, 170 Wearable technology, 10 Web 2.0, 190–191 capabilities of, 191–192 social media and, 192, 214 Web 3.0, 194 Web analytics, 159, 177 Web-based collaboration, 202 Web browsers, 106 Webcam, 187 Webcasts, 197 Web content mining, 248–249 Web crawler, 248, 252 Web development languages, 452 WebMD, 260 Web page builders, 454 Web pages, 106 Websites, 25, 106, 191 consumer needs met by, 152–154 databases used by interactive, 230–231 EC on, 153–154 Z06_VALA5200_08_SE_SIDX.indd 530 monitoring of, 36 personalization of, 32 products offered by, 149–150 representational delight of, 152–154 SEO of, 155–156 Web server, 106 Web spiders, 252 Web usage mining, 249 Web vandalism, 409 WeChat, 164, 196 Weighted multicriteria analysis, 353 What-if analysis, 240 WhatsApp, 8, 12, 196, 371, 423 White-collar productivity, 346 Wide area network (WAN), 460 Wide area networks, 106 Wi-Fi hotspots, 126, 245, 427 Wi-Fi networks, 159 Wi-Fi (wireless fidelity) networks, 106 Wiki, 204 WikiLeaks, 391, 395 Wikipedia, 192 Windows 10, 24, 100, 114 Windows Azure, 120–121 Windows XP, 114 Wireless access point, 467 Wireless broadband, 477 Wireless controller, 467 Wireless LAN control, 422 Wireless local area networks (WLANs), 106, 422, 470 Wireless media, 469–471, 472 WLANs See Wireless local area networks Workspace, 193 Workstations, 99 World Wide Web (WWW), 106–107, 108 Worm, 397 Wunderlist, 201 WWW See World Wide Web X XaaS, 67 XBRL See Extensible Business Reporting Language XML See Extensible Markup Language XML tag, 319 XP See eXtreme Programming Y Yammer, 206 Yelp, 203 Z Zero-day, 395 Zettabytes, 14 Zombie computers, 398–399, 402 Zotero, 199–200 Zuse Z1 Computer, 113 02/12/16 4:31 pm www.downloadslide.net This page intentionally left blank A01_LO5943_03_SE_FM.indd iv 04/12/15 4:22 PM www.downloadslide.net This page intentionally left blank A01_LO5943_03_SE_FM.indd iv 04/12/15 4:22 PM www.downloadslide.net MIS: Engage, Apply, Empower • Dynamic Study Modules—help students learn the language of MIS by continuously assessing their activity and performance in real time by adapting to the student's knowledge and confidence on each concept These are available as graded assignments prior to class, and accessible on smartphones, tablets, and computers COMMUNICATION DECISION MAKING TEAMWORK ABILITY TO APPLY KNOWLEDGE NEWE HIR • CRITICAL THINKING • PROBLEM SOLVING • Office 2016 Grader Projects—Students complete projects in Excel and Access to demonstrate problem solving, critical thinking, and data analysis skills Projects are automatically graded and include feedback Integrity tokens in each project prevent and detect cheating • Branching, Decision-Making Simulations—students take on the role of manager as they make a series of decisions based on a realistic business challenge, fostering decision making and problem solving skills The simulations change and branch based on their decisions, creating various scenario paths At the end of each simulation, students receive a grade and a detailed report of the choices they made with the associated consequences included • Writing Space—Better writers make better communicators— who become better managers Designed to help develop and assess concept mastery and critical thinking, the Writing Space offers auto-graded writing assignments, and assisted auto-graded writing assignments so students can receive meaningful, personalized feedback quickly and easily And because of Intergration with Turnitin , Writing Space can check students’ work for improper citation or plagiarism ® Learning Catalytics™—is an interactive, student response tool that uses students’ smartphones, tablets, or laptops to engage them in more sophisticated tasks and critical thinking as well as collaboration with other class members Included with MyLab with eText, Learning Catalytics enables you to generate classroom discussion, guide your lecture, and promote peer-to-peer learning with real-time analytics Reporting Dashboard—View, analyze, and report learning outcomes clearly and easily, and get the information needed to keep students on track throughout the course with the new Reporting Dashboard Available via the MyLab Gradebook and fully mobile-ready, the Reporting Dashboard presents student performance data at the class, section, and program levels in an accessible, visual manner • Enhanced eText—keeps students engaged in learning on their own time, while helping them achieve greater conceptual understanding of course material The embedded videos, simulations, and activities bring learning to life to apply the very concepts they are reading about Combining resources that illuminate content with accessible self-assessment, MyLab with Enhanced eText provides students with a complete digital learning experience—all in one place Information systems have become pervasive Mobile devices, social media, • Accessibility (ADA)—Pearson is working toward WCAG 2.0 AA The Internet and cloud computing have transformed organizations andLevel society and Section 508 standards, as expressed in the Pearson Guidelines for of Things can generate a wealth of potentially useful Big Data The rapid Accessible Educational Web Media Moreover, our products support development transportation and telecommunication technologies, customers inof meeting their obligation to comply with the Americans with national Disabilities Act (ADA) by providing access to learning technology programs and global infrastructures, and information systems as well as a host of other for users disabilities factors haswith created a number of pressing societal issues that tremendously influence the world we live in.Team These issues include demographic changes, Please email our Accessibility at disability.support@pearson.com for the most up-to-date information urbanization, shifts in economic power, resource scarcity, and climate change As a consequence, sustainable development will become an ever increasingly important aspect for organizations Throughout this revision, we discuss how organizations can harness radical innovations and other technological as well as the role of information systems in influencing and • LMS Integration—You can developments, now link from Blackboard Learn, Brightspace by D2L, Canvas, or Moodle to MyISLab Professors can acess assignments, rosters, addressing pressing societal issues; further, we added a new chapter element and resources, and synchronize grades with your LMS gradebook about the role of Green IT We designed the book’s cover to emphasize how Single sign-on provides students access to all the personalized IT studying resides within and influences various societal issues learning resources that make more efficient and effective ALWAYS LEARNING www.downloadslide.net EIGHTH EDITION INFORMATION SYSTEMS TODAY Pearson MyLab TM MANAGING IN THE DIGITAL WORLD Valacich Schneider Improving Results A proven way to help individual students achieve the goals that educators set for their course Engaging Experiences Dynamic, engaging experiences that personalize and activate learning for each student INFORMATION SYSTEMS TODAY MA N A GING IN THE DIGI TA L W OR L D An Experienced Partner From Pearson, a long-term partner with a true grasp of the subject, excellent content, and an eye on the future of education www.pearsonhighered.com ISBN-13: 978-0-13-463520-0 ISBN-10: 0-13-463520-5 0 0 780134 635200 EIGHTH EDITION Joseph Valacich Christoph Schneider ... Chapter Managing in the Digital World MANAGING IN THE DIGITAL WORLD: Open Innovation  Information Systems Today The Emergence of the Digital World Globalization and Societal Issues in the Digital. .. by creating new and innovative business models Chapter 3: Managing the Information Systems Infrastructure and Services—With the ever-increasing complexity of maintaining a solid information systems... by the “IS 2010 Curriculum Guidelines for Undergraduate Degree Programs in Information Systems”1; these guidelines, written by prominent information systems scholars, define the information systems

Ngày đăng: 24/10/2018, 08:28

Từ khóa liên quan

Mục lục

  • Information System Today managing in the Digital World 8th by Valacih_1

    • Cover

    • Title Page

    • Copyright Page

    • Dedication

    • About the Authors

    • Brief Contents

    • Contents

    • Preface

    • Chapter 1: Managing in the Digital World

      • Managing in the Digital World: Open Innovation

      • Information Systems Today

        • The Emergence of the Digital World

        • Globalization and Societal Issues in the Digital World

        • Coming Attractions: Memory Crystals

        • Five IT Megatrends That Shape the Digital Future

        • Who's Going Mobile: Wearable Technologies

        • Green IT: The Green Internet of Things

        • Information Systems Defined

          • Data: The Root and Purpose of Information Systems

          • Hardware, Software, and Telecommunications Networks: The Components of Information Systems

          • People: The Builders, Managers, and Users of Information Systems

          • Security Matters: Ransomware

          • Organizations: The Context of Information Systems

Tài liệu cùng người dùng

Tài liệu liên quan