Information Systems today managing in the digital world 7th global edition by valacich

530 379 0
Information Systems today managing in the digital world 7th global edition by valacich

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Information Information Systems today managing in the digital world 7th global edition by valacich today managing in the digital world 7th global edition by valacich Giáo trình Information Systems today managing in the digital world 7th global edition by valacich Giáo trình Information Systems today managing in the digital world 7th global edition by valacich Giáo trình Information Systems today managing in the digital world 7th global edition by valacich Giáo trình Information Systems today managing in the digital world 7th global edition by valacich Giáo trình Information Systems today managing in the digital world 7th global edition by valacich

Full-Circle Learning MyLab™: Learning Full Circle for Marketing, Management, Business Communication, Intro to Business, and MIS BEFORE CLASS DSM's, pre-lecture homework, eText AFTER CLASS Writing Space,Video Cases, Quizzes/Tests MyLab Decision Sims,Videos, and Learning Catalytics DURING CLASS This page intentionally left blank MyMisLab : Improves Student Engagement Before, During, and After Class ™ Prep and Engagement • Video exercises – engaging videos that bring business concepts to life and explore business topics related to the theory students are learning in class Quizzes then assess students’ comprehension of the concepts covered in each video • Learning Catalytics – a “bring your own device” student engagement, assessment, and classroom intelligence system helps instructors analyze students’ critical-thinking skills during lecture • Dynamic Study Modules (DSMs) – through adaptive learning, students get personalized guidance where and when they need it most, creating greater engagement, improving knowledge retention, and supporting subject-matter mastery Also available on mobile devices • Business Today – bring current events alive in your classroom with videos, discussion questions, and author blogs Be sure to check back often, this section changes daily • Decision-making simulations – place your students in the role of a key decision-maker The simulation will change and branch based on the decisions students make, providing a variation of scenario paths Upon completion of each simulation, students receive a grade, as well as a detailed report of the choices they made during the simulation and the associated consequences of those decisions Decision Making Critical Thinking • Writing Space – better writers make great learners—who perform better in their courses Providing a single location to develop and assess concept mastery and critical thinking, the Writing Space offers automatic graded, assisted graded, and create-your-own writing assignments, allowing you to exchange personalized feedback with students quickly and easily Writing Space can also check students’ work for improper citation or plagiarism by comparing it against the world’s most accurate text comparison database available from Turnitin • Additional Features – included with the MyLab are a powerful homework and test manager, robust gradebook tracking, comprehensive online course content, and easily scalable and shareable content http://www.pearsonmylabandmastering.com This page intentionally left blank SEVENTH EDITION Information Systems Today Managing in the Digital World GLOBAL EDITION Joseph Valacich University of Arizona Christoph Schneider City University of Hong Kong Boston Columbus Indianapolis New York San Francisco Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editor-in-Chief: Stephanie Wall Acquisitions Editor: Nicole Sam Program Manager Team Lead: Ashley Santora Program Manager: Denise Vaughn Editorial Assistant: Daniel Petrino Vice President, Product Marketing: Maggie Moylan Director of Marketing, Digital Services and Products: Jeanette Koskinas Executive Product Marketing Manager: Anne Fahlgren Field Marketing Manager: Lenny Ann Raper Senior Strategic Marketing Manager: Erin Gardner Project Manager Team Lead: Judy Leale Project Manager: Karalyn Holland Operations Specialist: Diane Peirano Creative Director: Blair Brown Senior Art Director: Janet Slowik Cover Designer: Lumina Datamatics Ltd Cover Image: hunthomas/123RF Vice President, Director of Digital Strategy & Assessment: Paul Gentile Manager of Learning Applications: Paul Deluca Digital Editor: Brian Surette Digital Studio Manager: Diane Lombardo Digital Studio Project Manager: Robin Lazrus Digital Studio Project Manager: Alana Coles Digital Studio Project Manager: Monique Lawrence Digital Studio Project Manager: Regina DaSilva Senior Manufacturing Controller, Global Edition: Trudy Kimber Manager, Media Production, Global Edition: M Vikram Kumar Acquisitions Editor, Global Edition: Debapriya Mukherjee Assistant Project Editor, Global Edition: Priyanka Shivadas Full-Service Project Management and Composition: S4Carlisle Publishing Services Printer/Binder: Vivar Printing Cover Printer: Vivar Printing Text Font: Times LT Std, 10/12 Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published as part of the services for any purpose All such documents and related graphics are provided “as is” without warranty of any kind Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from the services The documents and related graphics contained herein could include technical inaccuracies or typographical errors Changes are periodically added to the information herein Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time Partial screen shots may be viewed in full within the software version specified ® ® ® Microsoft Windows , and Microsoft Office are registered trademarks of the Microsoft corporation in the U.S.A and other countries This book is not sponsored or endorsed by or affiliated with the Microsoft corporation Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world Visit us on the World Wide Web at: www.pearsonglobaleditions.com © Pearson Education Limited 2016 The rights of Joseph S.Valacich and Christoph Schneider to be identified as the authors of this work have been asserted by them in accordance with the Copyright, Designs and Patents Act 1988 Authorized adaptation from the United States edition, entitled Information Systems Today: Managing in the Digital World, 7/e, Global Edition, ISBN 9780-133-94030-5, by Joseph S.Valacich and Christoph Schneider, published by Pearson Education © 2016 All rights reserved No part of this publication may be reproduced, stored in a retrieval system, or transmittedin any form or by any means, electronic, mechanical, photocopying, recording or otherwise, withouteither the prior written permission of the publisher or a license permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, LondonEC1N 8TS All trademarks used herein are the property of their respective owners.The use of any trademark in thistext does not vest in the author or publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or endorsement of this book by such owners ISBN 10: 1-292-09806-6 ISBN 13: 9781-292-09806-7 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library 14 13 12 11 10 Typeset by S4Carlisle Publishing Services in Times LT Std, 10/12 pt Printed in Malaysia Dedication To my mother Mary, you are the best —Joe To Birgit for your love and support —Christoph This page intentionally left blank About the Authors Joe Valacich is an Eller Professor at the University of Arizona, Eller College of M ­ anagement He was previously on the faculty at Indiana University, Bloomington, and Washington State University, Pullman He has had visiting faculty appointments at City University of Hong Kong, Buskerud College (Norway), the Helsinki School of Economics and Business, and the Norwegian University of Life Sciences He currently teaches in a program for Riga ­Technical ­University (Latvia) He received a PhD degree from the University of Arizona (MIS) and MBA and BS (Computer Science) degrees from the University of Montana Prior to his academic career, Dr. Valacich worked in the software industry in Seattle in both large and startup organizations Dr Valacich has served on various national task forces designing model curricula for the information systems discipline, including IS ‘97, IS 2002, and IS 2010: The Model Curriculum and Guidelines for Undergraduate Degree Programs in Information Systems, where he was cochairperson He also served on the task force that designed MSIS 2000 and 2006: The Master of Science in Information Systems Model Curriculum He served on the executive committee, funded by the National Science Foundation, to define the IS Program Accreditation Standards and served on the board of directors for CSAB (formally, the Computing Sciences Accreditation Board) representing the Association for Information Systems (AIS) He was the general conference co-chair for the 2003 International Conference on Information Systems (ICIS) and the 2012 Americas Conference on Information Systems (AMCIS); both were held in Seattle Dr Valacich has conducted numerous corporate training and executive development programs for organizations, including AT&T, Boeing, Dow Chemical, EDS, Exxon, FedEx, General Motors, Microsoft, and Xerox He is currently co-editor-in-chief of the Association for Information Systems journals Transactions on Human-Computer Interaction and Transactions on ­Replication Research His primary research interests include human–computer interaction, d­ eception ­detection, ­technology-mediated collaboration, mobile and emerging technologies, e-business, and distance education He has published more than 100 scholarly articles in numerous prestigious j­ournals, ­including MIS Quarterly, Information Systems Research, Management Science, Academy of ­Management Journal, Journal of MIS, Decision Sciences, Journal of the AIS, Communications of the ACM, Organizational Behavior and Human Decision Processes, and Journal of Applied ­Psychology He is a coauthor of the leading textbooks Modern Systems Analysis and Design (7th ed.) and Essentials of Systems Analysis and Design (6th ed.), both published by Prentice Hall Dr Valacich was awarded the 2012 Distinguished Alumnus Award from the University of Montana Alumni Association and the 2009 Outstanding Alumnus Award from the University of Montana’s School of Business Administration Dr Valacich is also ranked as one of most prolific scholars in the history of MIS Quarterly over the life of the journal (1977–2014) (see www.misq​ org) In 2009, he was named a Fellow of the Association for Information Systems Throughout his career, he has won numerous teaching, service, and research awards Christoph Schneider is an assistant professor in the Department of Information Systems at City University of Hong Kong and previously held a visiting faculty appointment at Boise State University He earned a Swiss Higher Diploma in Hotel Management at the University Centre César Ritz in Brig, Switzerland, and a BA in Hotel and Restaurant Administration at Washington State University Following extensive experience in the international hospitality industry, he studied information systems at the Martin Luther University in Halle, Germany, before joining the information systems department at Washington State University to earn his PhD degree His teaching interests include the management of information systems and Web design www.downloadslide.net organizaTion index   513  MCI, 472 McKinsey, 44 Men’s Warehouse, 360 Microsoft, 40, 53, 54, 91, 99, 107, 117, 121, 129, 132, 136, 142, 144, 202, 204, 216, 217, 221, 223, 242, 255, 267, 269, 275, 296, 297, 299, 301, 309, 329, 342, 347, 352, 358, 359, 360, 367, 371, 392, 396, 421, 435, 448, 450 MicroStrategy, 267 Military Air Transport Service, 162 MIT, 108 Money, 48 Morgan Stanley, 248, 426 Motile, 168 Motion Picture Association of America, 389 Motorola, 32, 107, 189, 352 M-Pesa, 120 Munich Re, 96 MVP.com, 79 MySpace, 207, 223 N NASA, 158 National Association of Colleges and Employers, 49 National Foundation for the Investigation of Lost and Kidnapped Children, 289 National Institute of Standards and Technology (NIST), 140, 142 National Public Radio, 212 National Quality Research Center, 330 National Security Agency (NSA), 158, 393 NATO, 406 Nature, 98 NBC News, 113 NBC TV, 208 NBC Universal, 276, 322 Nestlé, 96, 97, 204 Netcraft, 360 Netflix, 92, 93, 114, 138, 142, 257, 285, 358 Netscape, 420 New York City Police Department (NYPD), 226 The New York Times, 210, 226, 399, 434 NewEgg, 195 Newton Systems Group, 31 Nielsen, 218 Nike, 81, 132, 166 Nikon, 343 Nintendo, 59 Nissan, 305 Nokia, 91, 107, 189 Nordstrom, 85, 93 North Carolina State University, 267 Norton, 93 O Oak Ridge National Laboratory, 147 Oculus VR, 41, 211 OfficeMax, 316 Omniture, 276 One Laptop per Child (OLPC), 73 Opel, 147 Open Source Initiative (OSI), 386 Opentable.com, 206 Oracle, 40, 139, 267, 297, 298, 308, 309, 329, 342, 352, 360, 453 Orbitz, 227 Outback Steakhouse, 142 Overstock, 195 P Panasonic, 403 Pandora, 211 Panorama Consulting Solutions, 295, 302 Patent and Trademark Office, 158 Path Intelligence, 261 PayPal, 93, 113, 184, 186, 195, 322, 325, 326, 386, 389, 398 PC Gamer, 98 PC Magazine, 376 Pearson Prentice Hall, 219 PeopleSoft, 297 Pets.com, 79 PGA, 176 PharmaMaster, 373 Pinterest, 358 Pixar, 152 Plan Ceibal, 73 Popular Mechanics, 101 Porsche, 85, 96 Posies Cafe, 94 Posterous, 148 Priceline, 167, 227 PriceWaterhouseCoopers, 67, 100 Procter & Gamble, 96, 315, 392 Prudential PLC, 44 R Rackspace, 148 Recording Industry Association of America, 389 Research in Motion, 117 Rockstar North, 371 Rottentomatoes, 168 Row 44, 87 Ryanair, 226 S Safeway, 248 Salesforce.com, 329, 330, 342, 344 Samsung, 32, 41, 91, 105, 107, 149, 178, 189, 317 Samsung Electronics, 233, 352 San Francisco Chronicle, 210 SAP, 267, 296, 297, 301, 303, 308, 310, 329, 342 SAS, 267 Saudi Arabia Patent Office, 403 Scientific American, 98 Scottrade, 93 Sears, 103 Securities and Exchange Commission, 158, 325 Shopify, 172 Shutterstock, 182 Siebel CRM, 297 Siemens, 107 Sirius Radio, 467 Skechers, 148 Skype, 151, 188, 201, 203, 441 SlideShare, 211 Sony, 59, 97, 98, 99, 100, 317, 343 Sophos, 113 Soulja Boy, 322 Southwest Airlines, 359 Stanford Research Institute, 468 Stanford University, 108, 181, 212 Starbucks, 35, 56, 184, 226, 328 Starwood, 392 Sugar CRM, Inc., 329, 360 Suning.com, 194 Sun Microsystems, 448, 450 Sundance Film Festival, 152 Symantec, 93, 398, 421 T Taobao, 161 Target, 189, 248, 279, 427 The Telegraph, 74 Tencent Holdings, 215 Tesco, 180 Texas Instruments, 317 3Com, 107 TigerDirect, 195 Timbuk2, 451 Tmall, 194 T-Mobile, 44, 248 Toshiba, 99 Toyota, 96, 147, 248, 318 Travelocity.com, 227, 421 TrendMicro, 38, 421 Tripadvisor, 226, 253 Tumblr, 213 www.downloadslide.net 514    organizaTion index Turkish Airlines, 223 Turner Entertainment, 217 Twitter, 32, 40, 42, 64, 176, 177, 198, 210, 213, 215, 224, 226, 227, 233, 241, 252, 284, 327, 334, 336, 337, 344, 349, 367, 407, 435 U UC Berkley, 108 UN Economic Commission, 314 Unilever, 97 United Airlines, 167, 253 United States Computer Emergency Readiness Team, 425 Universal Music Group, 322, 389 Universal Studios, 152 University of Arizona, 417 University of British Columbia, 148 University of California, 468 University of Cambridge, 292 University of Illinois, 212 University of Pennsylvania, 245 University of Utah, 468 Unix, 447, 459 UPS, 32, 34, 134, 247, 421, 423 U.S Air Force, 162 U.S Bureau of Labor Statistics, 48, 52, 358 U.S Census Bureau, 162, 314 U.S Congress, 404 U.S Customs and Border Protection, 417 U.S Customs Department, 404 U.S Defense Advanced Research Projects Agency, 468 U.S Department of Commerce, 162, 404 U.S Department of Defense, 405 U.S Department of Justice, 389, 427, 434 U.S Drug Enforcement Administration (DEA), 275 U.S Federal Trade Commission (FTC), 61, 63, 168 U.S Food and Drug Administration (FDA), 262, 263 U.S Immigration and Customs Enforcement Agency (ICE), 385 U.S Internal Revenue Service, 53, 163 U.S National Oceanic and Atmospheric Administration, 158 U.S National Science Foundation (NSF), 468, 470 U.S National Security Agency (NSA), 237, 275, 434 U.S News, 48, 358 U.S Postal Service, 196, 267, 404 U.S Secret Service, 404 U.S Treasury Department, 404 USAA, 183 V Verizon, 107, 338 Viacom, 74 Vimeo, 211 VIP.com, 194 VISA, 185, 389 Volkswagen, 305 Volvo Trucks, 223 W Walgreens, 32, 248 Wall Street Journal, 35 Walmart, 32, 85, 103, 187, 234, 247, 248, 253, 263, 269, 276, 313, 315, 321 Warner Bros., 285 The Washington Post, 434 The Washington Times, 210 WebEx, 201 Webvan.com, 79 Wells Fargo Bank, 132, 400 Wendy’s, 148 Westlaw, 158 Weta Digital, 152 Wharton School of Business, 108 WhatsApp, 358 WikiLeaks, 389 Wikipedia, 38, 158, 187, 198, 201, 206, 207, 219, 223, 225, 234, 322 Williams-Sonoma, 248 Wipro, 46 Wired Magazine, 93 Wordpress, 195 Workscape, Inc., 205 The World Bank, 343 World Economic Forum, 73 World Trade Organization, 43 WorldCom, 425 X Xerox Corporation, 460 Xing, 221 XM Radio, 467 Y Yahoo!, 93, 94, 95, 96, 132, 139, 172, 175, 275, 360, 386, 399, 435, 441, 451 Yazaki, 305 Yelp, 168, 179, 218, 268 YouTube, 42, 57, 61, 74, 96, 113, 117, 138, 188, 205, 207, 211, 223, 225, 226, 227, 322, 334, 337, 344, 408, 435, 441 Z Zales Jewelers, 30 Zappos, 134, 224, 276 Zoho, 217 ZTE, 107 Zuse, 135 Zynga, 58, 92, 134, 145, 157 www.downloadslide.net Subject Index Key terms and the page numbers where they are defined appear in boldface A Acceptable use policies, 413 Access-control software, 417–418 Access restrictions, 415–416 Accounting, 83, 256 Account management policy, 414 Acronyms, 485–487 Active tags, 324 Adaptive maintenance, 370 Ad hoc query, 249 Administrative activities, 285 AdSense (Google), 117 Advanced Research Agency Network (ARPANET), 468 Advertising freeconomics, 96 Internet marketing, 173–178 Web, 169, 171 Adware, 397 AdWords (Google), 175 Affiliate marketing, 92, 167 Algorithm, 251 Alpha testing, 368 Amateurization of journalism, 210 American Life Project, 180 American Standard Code for Information Interchange (ASCII), 441 Analog signals, 471 Analytical CRM, 331, 334–336 Android, 386, 447 Anti-Cybersquatting Consumer Protection Act, 403 Anti-Phishing Consumer Protection Act, 132 Antivirus software, 421, 447 App development ethics, 358 Applet, 450 Application software, 121 Apps, 37 Architectural value, of IS infrastructure, 90–91 Archival data, 127 Arithmetic logic unit (ALU), 441 AroundMe, 268 Artificial intelligence (AI), 256 ASCII (American Standard Code for Information Interchange), 441 Association, 474–475 Association discovery, 251–252 Asymmetric digital subscriber line (ADSL), 471 Asynchronous communication, 201 Attribute, 242 Audience, business case, 356–357 Audio input, 440 Audit-control software, 413 Auditing, 411, 425 Augmented reality, 259 Authentication, 415, 416 Authentication service, 455 Automated Biometric Identification System (IDENT), 385 Automated development environments, 451–452 Automating, 84 Automobile industry, 305 AVATAR, 417 B Backbone, 464 Backdoors, 393 BackRub, 221 Backup, 126, 414 Backup policy, 413 Backup site, 414 Backup software, 447 Bacteria, 212 Bandwidth, 128 Banking industry, 183 Bar code reader, 439, 440 Basic input/output system (BIOS), 443 Basic relationships, 379 Batch data, 439 Batch processing, 439 Benchmark programs, 376 Benefits business case, 353–354, 357 conversion to monetary terms, 357 Best-cost provider strategy, 86 Best practices, 260–261, 293 Beta testing, 368 Bid process, 374 Bid shielding, 182 Big Data databases and, 123 open source software and, 386 overview, 40, 239 storage needs, 138 Billing addresses, 185 Binary code, 441 Biometric devices, 440 Biometrics, 415, 416–417 Biostorage, 212 Bit, 441 Bitcoin, 195 Blog, 209–210 Blogging, 209–210 Blue Frog (Blue Security), 373 Bluetooth, 457 Bot, 258 Bot herder, 400 Botnet, 400 Bounce rate, 172 Break-even analysis, 354 Brick-and-mortar business strategy, 165 Bricks-and-clicks business strategy, 165 Broadband access, 470, 472 Broadcasting industry, 380 Brokerage, 183 Bullwhip effect, 319 Business analytics 515 www.downloadslide.net 516    subject index decision support systems, 254 defined, 254 intelligent systems, 256–259 knowledge management systems, 259–263 overview, 254 Business careers, outlook for, 67 Business case, making See Making the business case Business competency, 52 Business continuity, 421 Business continuity plan, 414 Business intelligence ad hoc queries/reports, 249–250 analytical CRM and, 331, 334–336 Big Data, 239 business analytics, 254 continuous planning process, 239–240 dashboards, 263–265 data mining, 251–252 decision support systems, 254 defined, 238 geographic information systems, 266–269 information/knowledge discovery, 249–254 information visualization, 263–269 inputs into applications, 240–249 intelligent systems, 256–259 key players, 267 knowledge management systems, 259–263 need for, 238–240 online analytical processing, 250–251 operational systems and, 247 threats/opportunities, responding to, 238–239 unstructured data analysis, 252–254 visual analytics, 265–266 Business/IT alignment, 90 Business models, 92–97 freeconomics, 93–96 international business strategies, 96–97 revenue models, 92, 93 Business processes administrative, 285 core, 280–282 core activities, 283–285 customer service, 284–285 defined, 80 enterprise systems and, 288–295 ERP core components, 298 human resource, 285 inbound logistics, 284 industry specific, 301 infrastructure, 285 marketing and sales, 284 operations and manufacturing, 284 outbound logistics, 284 procurement, 286 technological development, 286 of terrorists, 407 types of, 280–287 value chains and, 280–287 Business process management (BPM), 90, 293 Business process reengineering (BPR), 293 Business rules, 244 Business strategies electronic commerce, 164–165 international, 96–97 Business-to-business (B2B), 162, 325–326 Business-to-business electronic commerce, 314–317 Business-to-business marketplace, 316–317 Business-to-consumer (B2C) defined, 162 electronic commerce, 162–163 e-tailing, 168–170 managing risks, 184–186 Web sites, 170–178 Bus network, 460, 461 Buyer agent, 258 BYOD (bring your own device), 38 Byte, 441 Bytes per inch, 445 C Cable media, 462–464 Cable modem, 470, 471, 472 Cache, 441, 442 Call center, 333 Call recording, 255 Campus area network (CAN), 129, 456 CAN-SPAM Act, 404 Capabilities, 87 CAPTCHA, 399 Carbon nanocomputers, 181 Card Verification Value (CVV2), 184 Careers business, 67 information systems, 49–50 Carrier sense multiple access/collision avoidance (CSMA/CA), 462 Cascading style sheets (CSS), 450 Cathode ray tube, 446 CD-R (compact disc–recordable), 444 CD-ROMs, 444 CD-RW (compact disc– rewritable), 444 Cell, 465 Cellular phone, 465 See also Smartphone Censorship, 435 Centralized computing, 453–454 Central processing unit (CPU), 441 Certificate authority, 420 Change request management, 370–371 Characters per inch, 445 Chargebacks, 184–185 Chatter (Salesforce), 330, 344 China, 42, 435 Chrome (Google), 117 Classification, 252 Classification System for Serial Criminal Patterns, 427 Click-and-mortar business strategy, 165 Click fraud, 178 Click-only business strategy, 165 Clickstream data, 253 Click-through rate, 177 Click-wrap license, 377 Client, 129 Client-server network, 129 Clock speed, 441, 442 Clock tick, 442 Closed-circuit television, 422 Cloud-based collaboration tools, 216 Cloud computing advances of, 32–33 characteristics of, 141–142 communications using, 58 computing/telecommunications convergence, 149–150 costs, 145 defined, 39 external acquisition through, 377–378 grid computing, 147–149 managing the cloud, 143–145 openness, 145 overview, 139–141 service models, 142–143 types of clouds, 143 Cloud security, 420 Clustering, 252 Coalition Against Domain Name Abuse, Inc (CADNA), 132 Coaxial cables, 463 Cold backup site, 414 Collaboration See also Supply chain management (SCM) defined, 200 intranet and, 205 need for, 200 www.downloadslide.net subject index   517  social media and, 215–220 tools, 201–205 Collaboration systems, 54 Collaborative computing, 455 Collaborative CRM, 331, 337–338 Collective intelligence, 218 Collector, 400 Collocation facility, 423 Combination primary key, 474 Commercial off-the-shelf (COTS) software, 360 Communication, social media, 206–207 Comparison shopping, 168–169 Competition, industry, 352 Competitive advantage business processes and, 290 defined, 58 Porter’s five-force model of competition, 88, 352 sources of, 86–88 Competitive intelligence, 252 Compiler, 447–448 Compliance, 92, 144, 296 Computer Abuse Amendments Act, 404 Computer-aided design (CAD), 339 Computer-aided software engineering (CASE), 452, 453 Computer-assisted auditing tool, 425 Computer crime cyberbullying, 401 cyberharassment, 401 cybersquatting, 403 cyberstalking, 401 federal/state laws for, 403–404 hacking/cracking, 390, 418 Internet hoaxes, 398 malware, 373, 394, 405, 421, 427 overview, 390 software piracy, 401–403 types of criminals/crimes, 390 Computer ethics, 59 Computer fluency, 42 Computer forensics, 426 Computer Fraud and Abuse Act of 1986, 403–404 Computer literacy, 41 Computer networking, 99 See also Networking Computer networks See Network Computers characteristics, 124 components of, 123–134 contagion, 373 history of, 135 processing, 441–442 responsible use of, 66 telecommunications convergence with, 149–150 Computer security See Information systems security Computer viruses, 394 Connections, social media, 220–223 Consumerism, 37–38, 136 Consumerization of IT, 38 Consumers, hierarchy of needs, 173 Consumer-to-business (C2B), 163, 182 Consumer-to-consumer (C2C), 162, 180–182 Content, 216–217 Content delivery network, 145–146, 149 Content management system, 216–217 Context, 225 Contextual advertising, 176 Continuous planning process, 239–240 Control objectives for information related technology (COBIT), 426 Control unit, 441 Conversion rate, 170–171, 177 Cookie, 64, 399–400 Cooperation, 211–215 Copyright, 402 Copyright Act, 404 Core activities, 283 Corporate culture, 223–224 level, DSS uses for, 256 social responsibility, 319 Corrective controls, 412 Corrective maintenance, 370 Cost-benefit analysis, 354 Counterfeit items, 182 Counterfeit products, 292 Coupons, 79 CPU (central processing unit), 441 Cracker, 390, 391, 400 Credit cards, 184, 185 Critical mass, Enterprise 2.0, 225 CRM See Customer relationship management (CRM) CRM 2.0, 344 Cross docking, 313 Cross subsidies, 96 Crowdfunding, 208 Crowdsourcing, 219–220, 285 Culture challenges of operating in the digital world, 45 Enterprise 2.0, 223–224 globalization and, 42 Customer engagement center (CEC), 333–334 Customer portal, 316 Customer relationship management (CRM) applications, 329 architecture, 331–338 benefits of, 329 defined, 328 ethics and, 338 key players, 330 mobile, 334 overview, 54, 291, 326–330 social media and, 336–337 strategies for, 330–331 successful implementations of, 330 Customer service activities, 284–285 Customer service and support (CSS), 333–334 Customization, 292 Custom software, 291, 358–359 Cyberattack supply chain, 400 Cyberbullying, 401 Cybercops, 427 Cybercriminals, 427 Cyberharassment, 401 Cybersquatting, 403 Cyberstalking, 401 Cyberterrorism, 405, 406–408 Cyberwar, 405–406 D DarkMarket, 426 Dashboards, 254, 263–265, 334, 336 Data See also Big Data; Databases defined, 47 exchanging in supply networks, 314–317 in information systems, 47–48 integration to integrate applications, 295–296 organizational, 121 privacy and, 122 storage of, 126–127, 138 Data analysis, 252–254 Databases See also Database management system (DBMS) advantages of, 242–243 costs/risks of, 243 data marts, 248–249 data warehouses, 247–248 entering/querying data, 244–246 foundation concepts, 241–242 as inputs into business intelligence applications, 240–249 interactive Web sites using, 240–241 management of, 244 master data management, 247 www.downloadslide.net 518    subject index Databases (cont.) online transaction processing, 246 operational systems and business intelligence, 247 overview, 122–123 types of, 244 Database design, 367 Database management system (DBMS) associations, 474–476 defined, 122, 241–242 entity-relationship diagramming, 476 normalization, 477–478 relational database design, 473–478 relational models, 476–477 Database of Intentions, 61 Data centers, 134, 139, 421 Data cleansing, 248 Data compression utilities, 447 Data dictionary, 244 Data-driven organizations, 238 Data flows, 365, 366 Data mart, 248–249 Data mining, 54, 246, 251–252 Data mining agent, 258 Data model, 244, 364–365 Data privacy statement, 63 Data reduction, 251 Data type, 244 Data warehouse, 247–249 DBMS See Database management system (DBMS) Debit cards, 184 Decision making decision support systems, 254–256 intelligent systems, 256–259 knowledge management systems, 259–263 organizational levels of, 80–82 overview, 254 Decision support systems (DSS), 54, 254–255 Dedicated grid, 148–149 Defense Advanced Research Projects Agency, 468 Demand, 138 Demand forecast, 323 Denial-of-service attack, 368, 396 Density, 445 Desktop videoconferencing, 203 Desktop virtualization, 129 Destructive agent, 258 Detective controls, 412 Developmental testing, 368 Device drivers, 447 Dial-up service, 470, 471 Differentiation strategy, 85 Diffusion of Innovations (Rogers), 102 Digital cameras, 440–441 Digital dashboard, 263–265, 334, 336 Digital divide, 34–35, 73 Digital rights management (DRM), 188 Digital signals, 471 Digital subscriber line (DSL), 470, 471 Digital video disc, 444 Digital world Apple product evolution, 31 business processes in, 279 concept of, 34 e-commerce in, 161 ecosystems evolution in, 347 freeconomics in, 95–96 globalization in, 44–45 Google service evolution, 117–118 intelligence gathering in, 237 international business strategies in, 96–97 merging groups and coupons, 79 online piracy, 389 operating challenges in, 45 social media in, 199 supply chains in, 313 Dimension, 250 Directory service, 455 Disaster recovery plan, 414 Discount rate, 354 Discovery, 249–254 Discussion forum, 202 Disintermediation, 166–167 Disk and data recovery utilities, 447 Displaced technologies, 103 Display advertising, 176 Disruptive growth engine, 105 Disruptive innovation, 103, 105–106 Disruptive innovation cycle, 106 Distinctive competency, 87 Distributed access control, 461 Distributed computing, 454 Document analysis, 364 Documentation, system conversion, 368 Domain name, 130, 403 Domain Name System (DNS), 469 Domestic company, 96 Downstream information flow, 287 Drill down, 250 Drill-down report, 249 Drive-by hacking, 418 Dumpster diving, 392 DVD-ROM (digital versatile ­ disc–read-only memory), 444 Dynamics ERP System (Microsoft), 297, 299, 301 E Earthquakes, 134 e-auction, 180, 181–182 e-banking, 183 e-business revenue models, 93 EC (electronic commerce) See Electronic commerce (EC) Economic opportunity, 106 Economic value, of IS infrastructure, 90 Economies and globalization, 42 Economies of scale, 79 Education, 108 Effectiveness, 81 Efficiency, 80 e-filing, 163 e-Government, 163–164 Elasticity, 141 Electronic bill pay, 183 Electronic commerce (EC) See also Business-to-consumer (B2C) business strategies, 164–165 business-to-business (B2B), 162, 325–326 consumer-to-business (C2B), 163, 182 consumer-to-consumer (C2C), 162, 180–182 defined, 162 digital rights management, 188 e-banking, 183 Internet/WWW capabilities, 165–168 legal issues, 187–188 mobile commerce, 163, 176–177 overview, 54, 162 payments, 183–184 revenue models, 167 supply networks and, 314–317 taxation, 187 Web sites for, 170–178 Electronic Communications Privacy Act (ECPA) of 1986, 62, 403–404 Electronic communication tools, 201 Electronic conferencing tools, 201 Electronic Data Interchange (EDI), 314 Electronic funds transfer (EFT), 184 Electronic meeting systems (EMSs), 202–203 Electronic patient records, 269 e-mail marketing, 176 privacy, 62–63 productivity and, 348 Sarbanes-Oxley Act and, 426 Embedded system, 360 Embedded systems, 123 Emerging technologies, 106 www.downloadslide.net subject index   519  Employee portal, 132, 205 Employee self-service, 205 Enabling technology, 106 Encryption, 420 Energy consumption, 138 Enterprise 2.0, 209, 223–227 See also Social media Enterprise license, 377 Enterprise marketing management (EMM), 334 Enterprise resource planning (ERP) systems business requirements, 297–298 choosing, 296–298 compliance and regulatory demands, 296 control, 297 core components, 298 data integration with applications, 295–296 defined, 54, 295 extended components, 298 installation, 301 key players, 297 limitations, 302 mobile applications, 301 SaaS and, 330 satisfaction with, 319 Enterprise Search (Microsoft), 204–205 Enterprise systems, 54 benefits/costs of, 294–295 defined, 288 executive sponsorship, 302 implementation of, 288, 302–305 rise of, 287–288 software for, 291–295 Enterprise System (SAP), 287–295 Enterprise WAN, 456 Enterprise-wide information systems, 260 See also Enterprise systems Entities, 242 Entity-relationship diagrams (ERDs), 364, 476 Environmental awareness, 139 Environmental threats, protection from, 423 ERP See Enterprise resource planning (ERP) systems ERP core components, 298 ERP extended components, 298 e-tailing benefits, 168–170 defined, 164 disintermediation, 166–167 drawbacks, 170 group buying, 167 mass customization, 166 revenue and pricing models, 167 social commerce, 168 Ethernet, 460 Ethics app development, 358 code of conduct, 66 of consumer tracking, 261 customer relationship management and, 337–338 human cost of technology and, 65 industrial espionage and, 392 information systems, 59–66 online privacy and, 122 reputation management and, 168 RFID technology and, 289 social media and, 222 software piracy and, 404 underground gaming and, 98 e-voting, 163 Exception report, 249 Executable, 447 Executive/strategic level decision making, 82 Exit rate, 172 Expert system (ES), 257–258 Explicit knowledge asset, 260 Extensible Business Reporting Language (XBRL), 325 Extensible Markup Language (XML), 324–325 External acquisition, 374–378 Externally focused system, 290 Extraction, transformation, and loading, 248 Extranet, 132–134, 203–205, 338 F Fabbing, 339 Facts, 250 Facts, arguments based on, 351, 353–356 Failures, 59 Fair Information Practice Principles, 63 Faith, arguments based on, 350–351 Fear, arguments based on, 351, 352–353 Fiber-optic cables, 464 Fiber to the home (FTTH), 470, 472 Fiber to the premises, 472 File conversion utilities, 447 File defragmentation utilities, 447 Files, design of, 367 Finance, 83, 256 Financial flow, 325 Financial Privacy Act, 404 Firewall, 132 Firewall, 419–420 First-call resolution, 328 First mover advantage, 86 Five-force model of competition, 88, 352 Flappy Bird, 363 Flash (Adobe), 451 Flash drive, 126, 442, 444 Flash memory, 444 Folksonomy, 213 Footpath technology, 261 Foreign key, 475 Form, 244 Forward auction, 164 4G technology, 466 Fraud indicators, 186 Freeconomics, 93–96 Freecycling, 182 Freemium, 95–96 Functional area information system, 54, 82 Functional convenience, 173 Fuzzy logic, 258 G Gaming, 98, 349, 371 Generation gaps and Enterprise 2.0, 225 Generation Y, 207 Geoeconomics, 45 Geographic information system (GIS), 54, 266–269 Geospatial data, 267 Geotagging, 215 Gift economies, 96 Global business strategy, 97 Global elite, 107 Global information dissemination, 166 Globalization business skills and, 67 defined, 42 in the digital world, 44–45 evolution of, 42–46 factors of, 42 geoeconomics and, 45 government and, 45 software piracy and, 402–403 terrorism and, 408 Global network, 457 Global Positioning System (GPS), 178–179 Glossary, 489–506 Gmail (Google), 117 Golden Shield Project, 435 Google Apps, 216 Google Checkout, 186 Google Earth, 268 Google Finance, 117 Google Images, 117 www.downloadslide.net 520    subject index Google Maps geotagging, 215 privacy issues, 122 Google News, 117 Google Now!, 258, 260 Google Project Loon, 125 Google Scholar, 117 Google Search Appliance, 204 Google Translate, 117 Government, 163 Government and globalization, 45 Government-to-business (G2B), 164, 164 Government-to-citizen (G2C), 163 Government-to-government (G2G), 164, 164 GPS (Global Positioning System), 178–179 Graphical user interface (GUI), 449 Great Firewall of China, 435 Green computing, 151, 319 Grid computing, 147–149 Group buying, 167 Groups, 79 Groupware, 201–203 H Hacker, 390, 418 Hacktivist, 390 Hadoop, 386 Hard drive, 127, 442, 443 Hardware defined, 46 information systems, 48, 123–124 input technologies, 439–441 networking, 461, 462 output technologies, 445–446 processing technologies, 441–445 Hashtag, 211 Head crash, 443 Health care industry, 269–270 Healthcare IS, 41 Health Insurance Portability and Accountability Act (HIPPA), 144 Heartbleed, 395 Help desk, 333 Hierarchy of consumer needs, 173 organizational, 225 High-frequency radio, 464–466 Home-replication strategy, 96–97 Honeypot, 426 Hot backup site, 414 HTML (Hypertext Markup Language), 130, 450–451 HTML editor, 450 HTML tag, 450 HTTP (Hypertext Transfer Protocol), 130 Human-computer interface (HCI), 367 Human resources management business process, 285 decision support systems, 256 information systems and, 83 Hurricanes, 134 Hurricane Sandy, 241, 263 Hyperlink, 130 Hypertext, 130 Hypertext Markup Language (HTML), 130, 450–451 Hypertext Transfer Protocol (HTTP), 130 I Identity theft, 183, 400–401 Inbound logistics activities, 284 See also Supply chain management (SCM) Incident handling procedures, 414 Industrial espionage, 392 Inferencing, 258 Information, 47–48 Information age competition, 34 defined, 36 IT megatrends in, 37–42 overview, 35–36 Informational systems, 247 Information discovery, 249–254 Information flow, 324 Information literacy, 41 Information modification, 393, 394 Information policy, 413 Information privacy, 59, 61–64 Information property, 61–62 Information systems (IS) acquiring, 373–380 for automating, 84 careers in, 49–50, 67 components of, 48, 123–134 data in, 47–48 defined, 46 dual nature of, 56–59 ethics, 59–66 necessity of, 58 organizations and, 53–56, 84–85 organizing, 55–56 outsourcing of, 44 for strategy, 85–86 in today’s society, 32–42 types of, 53–55 use in organizations, 55, 56 in value chain analysis, 88–89 Information systems audit, 425 Information systems controls, 412 Information systems infrastructure activities, 285 application software, 121 builders, managers, and users of, 48–53 databases, 122–123 data centers, 134, 139 defined, 118–119 hardware, 48, 123–124 issues managing, 134–138 key players, 148 networking, 127–134 operating systems, 124, 125–126, 446–447 overview, 118–121 peripherals, 124 purpose of, 116 securing, 421 storage, 126–127 system software, 124–126, 446–447 value assessment, 90–92 Information systems planning, 363 Information systems risk assessment, 411 Information systems security auditing, 411, 425 business continuity, 421 cloud, 144 computer forensics, 426 in the digital world, 389 disaster planning, 414 Enterprise 2.0, 223–227 human safeguards, 423–424 implementing controls and training, 415–424 key players in, 421 mobile, 405 online payments, 183–184 overview, 409 plan development, 412–415 policies and procedures, 412–414 risk assessment, 411–412 strategy development, 412–415 systems development controls, 423 technological safeguards, 415 threats to, 390–404 Information technology, 46, 135–137 Information visualization, 263–269 Infrared line of sight, 464 Infrastructure, 118 See also Information systems infrastructure Infrastructure activities, 285 Infrastructure as a service (IaaS), 142 In-memory computing, 250 www.downloadslide.net subject index   521  Innovations decision making on, 105 difficult choices, 100 dilemmas of, 102–108 fleeting, 99 implementing, 105–106 need for constant, 98–99 organizational requirements for, 100–101 overview, 98 predicting, 101–102 risk, 99–100 successful, 99–100 The Innovator’s Solution (Christensen), 105 Innovator’s dilemma, 102–108, 105 Input technologies, 439–441 Insider threats, 393, 434 Instant messaging (IM), 211, 426, 434 Intangible benefits, 353–354 Intangible costs, 353 Integrated Automated Fingerprint Identification System (IAFIS), 385 Integrated services digital network (ISDN), 470, 471 Intellectual property, 64–66 Intelligent agent, 258–259 Intelligent system, 54, 257 Interactive communication, 176 Interactive voice response, 440 Interception, 404 Interexchange carrier, 472 Internally focused systems, 290 International business strategy, 96–97 Internet broadcasting industry and, 380 browsers, 40, 130 business connectivity to, 472–473 characteristics of, 133 in China, 435 countries with largest number of users, 72 defined, 130 electronic commerce and, 165–168 for everyone, 125 heartbleed bug, 395 history of, 468 management, 469–470 marketing, 173–178 networking, 130–134, 468–469 overview, 468 productivity and, 348–349 terrorism and, 407 usage growth, 473 Internet Assigned Numbers Authority, 469 Internet backbone, 470 Internet Corporation for Assigned Names and Numbers, 470 Internet exchange point (IXP), 470 Internet hoax, 398 Internet host, 473 Internet of Things, 38–39, 60 Internet over satellite (IoS), 472 Internet service providers (ISPs), 470 Internet Tax Freedom Act, 187 Internetworking, 54, 468 InterNIC, 470 Interorganizational system (IOS), 290 Interpreter, 448 Interviews, 364 Intranet, 132–133, 203–205 iOS (Apple), 447 iPad (Apple), 32, 317 IP address, 131 IP convergence, 146, 149 IP datagram, 460 iPhone (Apple), 317 IPv6, 470 IT asset disposition, 151 J Jailbreaking, 394 Java, 450 JavaScript, 451 Joint application design (JAD), 364 Just-in-time (JIT) production, 318 K Key generator, 402 Key-indicator report, 249 Keyloggers, 396 Key performance indicator (KPI), 81, 82 Kindle (Amazon), 282 Kinect (Microsoft), 347 Knowledge, 48 Knowledge asset, 260 Knowledge discovery, 249–254 Knowledge management, 259 Knowledge management system, 54, 259–263, 261 Knowledge portal, 262 Knowledge society, 33 Knowledge worker, 33 Kony 2012, 241 L Labor exchange, 96 Law enforcement, 427 Layer, 266, 268 Learning management systems, 217 Least permissions, 412 Least privileges, 412 Legacy system, 243, 288 Licensing fees, 167 Linux operating system, 447, 453 Liquid crystal display (LCD), 446 Lisa (Apple), 59 Local area network (LAN), 129, 456 Location-based services, 178–179 Logic bomb, 396 Long Tail, 169–170 Long-term evolution (LTE), 466 Low-cost leadership strategy, 85 M Machine language, 447–448 Machine learning, 256–257 Macintosh television, 59 Mac OS, 447 Magnetic ink character recognition, 439, 440 Magnetic tapes, 127 Mainframe, 123 Make-to-order process, 282, 300 Make-to-stock process, 282, 300 Making the business case arguments for, 350–356 defined, 348 objectives, 348 presenting, 356–358 productivity paradox, 349 Malware mobile, 373 phishing, 391 security software for, 421 types of, 394–401 Management information system, 54 Management science, 256 Managerial/tactical level, 80–81 Manufacturing industry, 339 Many-to-many relationships, 475 Marginalized technology, 103 Marketing career outlook for, 67 DSS uses for, 256 information systems for, 83 Internet, 173–178 sales activities and, 284 Web 2.0 and, 225–227 Marketplace Fairness Act, 187 Markets and globalization, 45 Mashup, 206 Mass customization, 166, 166 Master data, 247 Master data management, 247 m-commerce, 163, 178–179 Measure, 250 Media access control, 461–462 Media player utilities, 447 www.downloadslide.net 522    subject index Media sharing, 211–213 Menu-driven pricing, 167 Mesh network, 460, 461 Metadata, 213 Metropolitan area network (MAN), 129, 456 Microblogging, 226 Microblogging tools, 210–211 Microprocessor, 441 Microsoft.NET, 450–451 Microwave transmissions, 466–467 Midlevel managers, 81 Millennials, 207 Mirrored data, 415 Mismanagement and productivity, 350 MMORPGs (massively multiplayer online role-playing games), 98 Mobile banking, 183 Mobile business intelligence, 265 Mobile commerce, 163, 176–177 Mobile CRM, 334 Mobile devices apps for, 180, 363 banking and, 183 ERP systems and, 301 evolution of, 32–35 information age and, 37–38 malware and, 373 patents and, 352 payments using, 184 security and, 405 social media and, 218 Mobile marketing, 176–177 Mobile Social Networking, 180 Mobile wireless, 472 Model, 255 Modeling data, 364–365 Modem, 471, 472 Module, 291 Monitoring and sensing agent, 258 Monitors, 445–446 Moore’s Law, 100, 135–136, 318 Motherboard, 441 Movie industry, 152 mturk (mechanical turk) applications, 220 Mule herder, 400 Multidomestic business strategy, 97 MySQL, 360 N National Science Foundation (NSF), 468–469 National Science Foundation Network (NSFNET), 468 National Security Agency (NSA), 275 Near-field communication (NFC), 184, 189 Net neutrality, 188–189 Net-present-value analysis, 354 Network See also Networking; Social networking cloud computing and access to, 141 connecting independent, 468–469 defined, 129 global, 457 neural, 257, 259 overview, 128–129 services of, 455 supply, 314–317 types of, 129, 130, 455–457 Network click fraud, 178 Network effect, 40, 79, 225 Networking See also Network; Social networking evolution of, 453–455 hardware, 460, 462 human communication and, 127–128 Internet, 130–134, 468–469 intranets/extranets, 131–134, 203–205, 338 packet switching, 457–458 protocols, 458–460 standards, 458 technologies, 462–467 Network interface card (NIC), 460 Network topology, 460–461 Neural network, 257, 259 Newton, 59 Next Generation Identification (NGI), 385 No Electronic Theft Act, 404 Non-protective open source software, 378 Non-recurring cost, 353 Nonvolatile memory, 443 Normalization, 477–478 NoSQL, 244 O Object-oriented language, 449 Observations, 364 Obsolescence, 135–137 Occupational Outlook Handbook, 48 Office 365 (Microsoft), 216 Office automation system (OAS), 54 Offshore outsourcing, 43–44 Off-the-shelf software, 291, 358–359 OLAP (online analytical processing), 250 OLAP cube, 250 OLAP server, 250 On-demand self-service, 141 One-to-many relationships, 475 One-to-one relationships, 475 Online analytical processing (OLAP), 250 Online banking, 183 Online classifieds, 180, 182 Online investing, 183 Online piracy, 389 Online predator, 401 Online product reviews, 226 Online transaction processing (OLTP), 246 Online travel, 227–228 Onshore (domestic) outsourcing, 43 Open innovation, 220 Open source software, 360, 452–453 Open Systems Interconnection (OSI) model, 458–459 Operating system, 124, 441, 447 Operational CRM, 331–334 Operational data, 126 Operational level decision making, 80 Operational systems, 246 Operational value, of IS infrastructure, 91 Operation Darknet, 389 Operation Payback, 389 Operations and manufacturing activities, 284 Optical carrier (OC) lines, 473 Optical character recognition, 439, 440 Optical disk, 442, 444 Optical mark recognition, 439, 440 Opt-in, 63 Opt-out, 63 Order-to-cash process, 280–281, 299 Organic light-emitting diode (OLED), 446 Organizational learning, 84 Organizational strategy, 85 Organizations decision-making levels in, 80–82 Enterprise 2.0 strategies, 223–225 functional areas of, 82 information systems in, 53–56 innovation requirements, 100–101 Outbound logistics activities, 284 Output technologies, 445–446 Outsourcing, 43–44, 378–379 P Packaged software, 291 Packet sniffer, 391 Packet switching, 457–458 Paid inclusion, 175 Passive tags, 324 Patch management system, 371 www.downloadslide.net subject index   523  Patent, 352, 401–402 PATRIOT Act, 404 Patriot hacker, 406 Pay by Fingerprint, 189 Payment Card Industry Data Security Standard, 144 Payments mobile, 184 securing, 183–184 services for, 186 PayPal, 195 Pay-per-click, 177 Peer, 129 Peer production, 218 Peer-to-peer (P2P) networks, 129 Perfective maintenance, 370 Peripherals, 124 Personal area network (PAN), 129, 457 Personal Computer (PC), 123 Personal digital assistants (PDAs), 59 Personnel, IS, 50 Phisher, 400 Phishing, 391, 398 Physical access restrictions, 415–416 Pippin, 59 Piracy, software, 401–403 Plain old telephone service (POTS), 471 Planet Earth, 95 Planned obsolescence, 137 Platform as a service (PaaS), 142–143 Podcast, 212 Podcasting, 211 Port, 445 Portal, 315 Post-PC devices, 32 Post-PC era, 32 PowerMac G4 Cube, 59 Power supply, 445 Predictive modeling, 254 Preferred relationships, 379 Preventive controls, 412 Preventive maintenance, 370 Pricing models, 167 Primary key, 474 Primary storage, 442–443 Printer, 445 Privacy of the cloud, 144 e-mail, 62–63 information, 59, 61–64 maintaining, 63–64 online, 63–64, 122 RFID technology and, 289 Private branch exchanges (PBXs), 455–456 Private cloud, 143 Processing logic, 365, 366 Processing technologies, 441–445 Procurement activities, 286 Procurement portal, 315 Procure-to-pay process, 281, 299–300 Product flow, 323–324 Production/operations, 83, 256 Production plan, 323 Productivity measurement, 349–350 Productivity paradox, 349 Product recalls, 319 Programmer, 400 Programming languages, 448–449 Project Glass, 102 Project manager, 362 Propagation delay, 467 Proposal evaluation, 375–376 Proprietary software, 377, 378 Protective open source software, 378 Protocols, 128, 458–460 Prototyping, 372–373 Proxy variables, 357 Pseudocode, 365, 367 Public cloud, 143 Public domain software, 378 Public switched telephone network (PSTN), 471 Puck mouse, 59 Q QR code, 171 Questionnaires, 364 R Radio frequency identification (RFID) technology explanation of, 324 future retailing, 189 privacy and, 289 smart cards, 440 Random access control, 462 Random-access memory (RAM), 442 Ransomware, 396 RDBMS (Relational database management system), 244 Read-only memory (ROM), 443 Read/write head, 443 Real Simple Syndication (RSS), 212–213 Record, 242 Recovery plans, 414–415 Recovery point objective, 415 Recovery time objective, 414 Recurring cost, 353 Redistribution and productivity, 350 Redundant array of independent disks (RAID), 443 Redundant data centers, 414–415 Regulations, ERP, 296 Regulatory/compliance value, 92 Reintermediation, 167 Relational database design, 473–478 Relational database management system (RDBMS), 244 Relational database model, 477 Relationship, 474–475 Removable storage media, 444–445 Report, 245, 249–250 Report generator, 245 Representational delight, 173 Reputation management, 168 Request for proposal (RFP), 375 Requirements collection, 364 Resources, 87, 142 Retail industry, 189 Revenue model, 92, 493 Reverse engineering, 402 Reverse pricing, 167 RFID See Radio frequency identification (RFID) technology RFID tags, 324 Right to Financial Privacy Act, 404 Ring network, 460, 461 Risk acceptance, 412 Risk avoidance, 412 Risk management, 184–186 Risk reduction, 412 Risk transference, 412 Rivalry, industry, 352 Roll up, 250 Router, 460, 462, 468 RSS (Real Simple Syndication), 212–213 Rule, 258 S Salaries, IS professionals, 50 Sales Cloud (Salesforce), 330 Sales force automation (SFA), 331–333 Sarbanes–Oxley Act (S-OX), 126, 144, 296, 425–426 Satellite connections, 470, 472 Satellite microwave systems, 467 Scalability, 143, 144 Scanners, 439, 440 Scheduled report, 249 SCM See Supply chain management (SCM) Scripting language, 451 Search advertising, 174 Search engine optimization (SEO), 175–176 www.downloadslide.net 524    subject index Search marketing, 174–175 Secondary key, 474 Secondary storage, 442, 443–444 Secure Communities, 385 Secure data centers, 421 Secure Sockets Layer, 420 Security See Information systems security Security and Enterprise 2.0, 225 Security breaches, 414, 421–423, 426 Security of the cloud, 144 Security policies, 413 Security screening, 417 Security software, 421 Semantic Web, 207–208 Semistructured data, 239 Semistructured decision, 81 Sentiment analysis, 252 Sequence discovery, 252 Server, 123 Service, 146 measured, 142 outsourcing of, 43 service-oriented architecture and, 146 Service Cloud (Salesforce), 330 Service industry value chain activities, 286 Service-level agreement, 145 Service-oriented architecture, 145–146 SharePoint (Microsoft), 217 Shielded twisted pair (STP) cables, 463 Shill bidding, 182 Shipping addresses, 185 Shopping Bot, 258 Shoulder surfing, 392 Showrooming, 179 Shrink-wrap license, 377 Signature detection, 185, 195 Slicing and dicing, 250–251 Smart card, 439–440 Smartphones convergence and, 149 of the future, 179 m-commerce and, 178–179 mobile marketing with, 176–177 RFID technology and, 440 social media and, 215 Social bookmarking, 213 Social cataloging, 213 Social commerce, 163, 168 Social CRM, 337 Social engineering, 392 Social games, 157 Social media collaboration, 215–220 communication, 206–207 connections, 220–223 cooperation with, 211–215 CRM and, 336–337 defined, 206 ethics and, 222 marketing, 176 mobile, 221 overview, 38 value of, 233 Social Media Listening Command Center, 227, 337 Social media monitoring, 337 Social network analysis, 262 Social networking productivity and, 348–349 with social media, 220 Web 2.0, 226 Social online community, 220 Social presence tools, 210 Social search, 221–222 Social software, 26, 206 Software See also specific types automated development environments, 451–452 customized vs off-the-shelf, 358–359 defined, 46 licensing, 377 obsolescence, 136–137 open source, 360 overview, 446–447 as part of information systems, 48 patents, 352 programming and testing, 367–368, 448–449 service, 309 Software as a service (SaaS), 143, 330, 377 Software asset management, 377 Software Forensic Tool Kit, 427 Software piracy, 401–403 Solid-state drives (SSDs), 444 SoLoMo, 218 Source code, 447 Sourcing plan, 323 Sourcing portal, 315 Spam, 397–399 Spam filter, 398 Spear phishing, 398 Speech recognition, 440 Sponsored search, 174 Spyware, 396–397, 447 Stakeholder, making IS investment decisions, 356 Standalone application, 287 Standards, network, 458–462 Star network, 460, 461 Statewide Network of Agency Photos (SNAP), 427 Stickiness, 253 Storage, 126–127, 138, 442–445 Strategic choices, 58 Strategic necessity, 90, 350 Strategic planning, 85 Strategic relationships, 379 Streaming audio, 441 Streaming media, 441 Streaming video, 114, 441 Structural firmness, 172, 173 Structured data, 239 Structured decision, 80 Structured Query Language (SQL), 245–246 Stuxnet, 406 Subscription fees, 167 Supercomputer, 123, 147 Supplier portal, 315–316 Supply chain, 282 See also Supply chain management (SCM) cyberattack, 400 defined, 314 make-to-stock/make-to-order, 282 Supply chain analytics, 326 Supply chain effectiveness, 321, 321 Supply chain efficiency, 321, 321 Supply chain execution (SCE), 323–326 Supply chain havoc, 343 Supply chain management (SCM) architecture, 331–338 benefits, 317–319 IS systems used for, 54, 291 key technologies, 323–326 overview, 314, 319–320 strategy development, 321–322 Supply chain planning (SCP), 322–323 Supply chain visibility, 326 Supply network, 314 Support activities, 285–286 Sustainable business practices, 319 Switch, 462 Symmetric digital subscriber line (SDSL), 471 Synchronous communication, 201 System clock, 442 System conversion, 368–369 System documentation, 368–369 Systems analysis, 364–365 Systems analysis and design, 358 Systems analyst, 358, 362 Systems benchmarking, 376 Systems competency, 52 Systems design, 365–367 Systems development life cycle (SDLC), 362 www.downloadslide.net subject index   525  Systems development process documentation, 368–369 outsourcing, 378–379 overview, 358 role of users in, 362 software, 358–361 steps in, 362–369 system conversion, 368–369 systems maintenance, 369–372 system support, 368–369 training, 368–369 Systems implementation, 367–369, 367 Systems integration, 54 Systems maintenance, 369–372 System software, 124–126, 446–447 Systems planning and selection, 363 System support, 368–369 T T1 line, 472–473 T3 line, 472–473 Table, 242 Tablets, 32, 176–177, 178 Tacit knowledge assets, 260 Tag cloud, 214 Tagging, 213–214 Tangible benefit, 353–354 Tangible cost, 353 Tape, 445 Taxation, 187 Technical competency, 50–51 Technological inertia, 225 Technological integration, 225 Technology See also specific technologies enabling, 457 globalization and, 42 human cost of, 65 Technology development activities, 286 Telecommunications networks, 32 defined, 46 infrastructure, 127 as part of information systems, 48 Telephone Consumer Protection Act (TCPA), 404 Television, 59, 422 Temporary Mobile Subscriber Identifier (TMSI), 261 Terminal, 453 Terrestrial microwaves, 466 Terrorism, 407, 408 Text mining, 252–253 Text recognition software, 439 Thailand, 343 Thematic maps, 269 Thin client, 129 The Third Wave (Toffler), 35–36 Threats, 411 Threats and business intelligence, 238–239 3D bioprinting, 327 3D crime scenes, 409 3D printing, 64–65 3G technology, 466 Time bomb, 396 Time lags and productivity, 350 Top-level domain, 130 Total cost of ownership (TCO), 353 Touch screen, 446 Trade secret, 378 Traditional sales, 167 Training CRM strategy, 330 enterprise systems, 303 security policies and plans, 424 system conversion, 368–369 Transaction, 80 Transaction fees, 167 Transaction patterns, 186 Transaction processing systems (TPS), 53–54 Transmission Control Protocol/ Internet Protocol (TCP/IP), 131, 458, 459–460 Transmission media, 128 Transnational business strategy, 97 Transportation plan, 323 Trending, 211 Trojan horse, 395–396 Tunneling, 419 Twisted-pair (TP) cables, 462–463 Twitter, 210 U Unauthorized access, 392–393 Underground gaming economy, 98 Unicode, 442 Uniform Resource Locators (URLs), 130 Uninterruptible power supply, 423 Unix, 447 Unshielded twisted pair (UTP) cables, 462–463 Unstructured data, 239, 252–254 Unstructured decision, 82 Update Service (Windows), 371 Upstream information flow, 286–287 Usability, 367 USA PATRIOT Act, 404 U.S Copyright Act, 404 Use policy, 413 User agent, 258 Users as content creator, 217 documentation for, 368–369 information systems, 53 role of in systems development process, 362 Utilities, 446–447 Utility computing, 140 Utility program, 446–447 V Value-added network (VAN), 456 Value assessment, 90–92 Value chain, 88–89, 282–286 Value chain analysis, 89 Value creation, 87 Value proposition, 92, 95 Value system, 286–287 Vanilla version, 292 Vendor-managed inventory (VMI), 318–319 Vendor selection, 376 Vertical market, 317 Viability, cloud, 144 Video (input), 440, 441 Videoconferencing, 203 Videoconferencing over IP, 151 Viral marketing, 222–223 Virtual company, 165 Virtual hold technology, 333–334 Virtual meeting, 201 Virtual private network (VPN), 132, 418–419 Virtual team, 200–201 Virtual world, 211 Virus, 394 Virus prevention, 420 Visual analytics, 265–266 Visual data discovery, 265 Visualization, 263 Visualization systems, 54 Visual programming language, 449–450 Voice input, 440 Voice over IP (VoIP), 150–151 Voice-to-text software, 440 Volatile memory, 442 Volume license, 377 Vulnerabilities, 411 Vulnerability scanner, 391 W Warez peddling, 402 Watermark, 188 Waves of change, Toffler’s, 35–36 Wearable technology, 41 Web, deep, 158 www.downloadslide.net 526    subject index Web 2.0, 202, 205, 225–227 Web 3.0, 208–209 Web addresses, 131 Web advertising, 169, 171 Web analytics, 172, 276 Web browser, 40, 130 Webcam, 203, 440–441 Webcast, 212 Webcasting, 211 Web content mining, 252–253 Web crawler, 252, 258 Web development languages, 450–452 Web page, 130 Web page builder, 450 Web server, 130 Web site defined, 130 designing, 172–173 for electronic commerce, 170–178 interactive using databases, 240–241 Web spider, 258 Web usage mining, 253–254 Web vandalism, 406 Weighted multicriteria analysis, 354 What-if analysis, 254–255 Wide area network (WAN), 129, 456 Wi-Fi, 466 Wi-Fi network (wireless fidelity), 129 Wiki, 219 Windows, 378, 447, 459 Windows operating system, 447 Windows Update Service, 343 Wireless access point, 462 Wireless broadband, 470, 472 Wireless controller, 462 Wireless LAN control, 418 Wireless local area network (WLAN), 129, 466 Wireless media, 464–467 Workforce and globalization, 45 Workstation, 123 World Wide Web, 130, 165–168 Worm, 395 X XML (Extensible Markup Language), 324–325 XML tag, 325 Z Zero marginal cost, 96 Zombie computer, 396 z/OS, 447 www.downloadslide.net OTHER MIS TITLES OF INTEREST Full-Circle Learning MyLab™: Learning Full Circle for Marketing, Management, Business Communication, Intro to Business, and MIS Introductory MIS Systems Analysis and Design Managing Information Technology, 7/e Brown, DeHayes, Hoffer, Martin & Perkins ©2012 Modern Systems Analysis and Design, 7/e Hoffer, George & Valacich ©2014 SharePoint for Students Cole, Fox & Kroenke ©2012 Systems Analysis and Design, 9/e Kendall & Kendall ©2014 Experiencing MIS, 5/e Kroenke ©2015 Essentials of Systems Analysis and Design, 6/e Valacich, George & Hoffer ©2015 Using MIS, 7/e Kroenke ©2015 Decision Support Systems MIS Essentials, 4/e Kroenke ©2015 Management Information Systems, 13/e Laudon & Laudon ©2014 BEFORE CLASS Essentials of Management Information Systems, 11/e Laudon & Laudon ©2015 DSM's, pre-lecture homework, eText IT Strategy, 3/e McKeen & Smith ©2015 Processes, Systems, and Information: An Introduction to MIS, 2/e McKinney & Kroenke ©2015 Essentials of Processes, Systems, and Information: With SAP Tutorials McKinney & Kroenke ©2014 AFTER CLASS Writing Space,Video Cases, Quizzes/Tests MyLab Information Systems Today, 7/e Valacich & Schneider ©2016 Introduction to Information Systems, 2/e Wallace ©2015 Decision Sims,Videos, and Learning Catalytics Database DURING CLASS Hands-on Database, 2/e Conger ©2014 Modern Database Management, 11/e Hoffer, Ramesh & Topi ©2013 Essentials of Database Management Hoffer, Topi & Ramesh ©2014 Database Systems: Introduction to Databases and Data Warehouses Jukic, Vrbsky & Nestorov ©2014 Database Concepts, 7/e Kroenke & Auer ©2015 Database Processing, 13/e Kroenke & Auer ©2014 Business Intelligence, 3/e Sharda, Delen & Turban ©2014 Decision Support and Business Intelligence Systems, 10/e Sharda, Delen & Turban ©2014 Data Communications & Networking Applied Networking Labs, 2/e Boyle ©2014 Digital Business Networks Dooley ©2014 Business Driven Data Communications Gendron ©2013 Business Data Networks and Security, 10/e Panko & Panko ©2015 Electronic Commerce E-Commerce: Business, Technology, Society, 11/e Laudon & Traver ©2015 E-Commerce Essentials Laudon & Traver ©2014 Electronic Commerce 2012 Turban, King, Lee, Liang & Turban ©2012 Enterprise Resource Planning Enterprise Systems for Management, 2/e Motiwalla & Thompson ©2012 Project Management Project Management: Process, Technology, and Practice Vaidyanathan ©2013 Security Applied Information Security, 2/e Boyle ©2014 Corporate Computer Security, 4/e Boyle & Panko ©2015 ... at Information Systems Journal Brief Contents Preface  19 Chapter Managing in the Digital World 30 Chapter Gaining Competitive Advantage Through Information Systems 78 Chapter Managing the Information. .. in the Digital World 30 MANAGING IN THE DIGITAL WORLD: Apple 31 Information Systems Today 32 The Rise of the Information Age 35 ◾ BRIEF CASE: Technology at Starbucks 35 Five IT Megatrends in the. .. Chapter Enhancing Business Intelligence Using Information Systems 236 Chapter Enhancing Business Processes Using Enterprise Information Systems 278 Chapter Strengthening Business-to-Business Relationships

Ngày đăng: 25/04/2019, 14:54

Từ khóa liên quan

Mục lục

  • Cover

  • Title Page

  • Copyright Page

  • About the Authors

  • Contents

  • Preface

  • Chapter 1 Managing in the Digital World

    • MANAGING IN THE DIGITAL WORLD: Apple

    • Information Systems Today

      • The Rise of the Information Age

      • BRIEF CASE: Technology at Starbucks

      • Five IT Megatrends in the Information Age

      • WHO’S GOING MOBILE: Wearable Technology

      • Evolution of Globalization

        • The Rise of Outsourcing

        • Opportunities and Challenges of Operating in the Digital World

        • KEY PLAYERS: Wipro and Infosys—The Global Outsourcing Leaders

        • Information Systems Defined

          • Data: The Root and Purpose of Information Systems

          • Hardware, Software, and Telecommunications Networks: The Components of Information Systems

          • People: The Builders, Managers, and Users of Information Systems

          • Organizations: The Context of Information Systems

          • The Dual Nature of Information Systems

            • Case in Point: An Information System Gone Awry: Computer Glitch Grounds Flights

            • Case in Point: An Information System That Works: FedEx

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan