Essentials of management information systems 11e laudon

506 1.8K 0
Essentials of management information systems 11e laudon

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

www.downloadslide.com www.downloadslide.com Integrating Business with Technology By completing the projects in this text, students will be able to demonstrate business knowledge, application software proficiency, and Internet skills These projects can be used by instructors as learning assessment tools and by students as demonstrations of business, software, and problem-solving skills to future employers Here are some of the skills and competencies students using this text will be able to demonstrate: Business Application skills: Use of both business and software skills in real-world business applications Demonstrates both business knowledge and proficiency in spreadsheet, database, and Web page/blog creation tools Internet skills: Ability to use Internet tools to access information, conduct research, or perform online calculations and analysis Analytical, writing and presentation skills: Ability to research a specific topic, analyze a problem, think creatively, suggest a solution, and prepare a clear written or oral presentation of the solution, working either individually or with others in a group * Dirt Bikes Running Case in MyMISLab Business Application Skills Business Skills Software Skills Chapter Spreadsheet charts Chapter 2* Spreadsheet formulas Spreadsheet downloading and formatting Chapter 10 Pricing hardware and software Spreadsheet formulas Chapter Technology rent vs buy decision Total Cost of Ownership (TCO) Analysis Spreadsheet formulas Chapter 5* Analyzing telecommunications services and costs Spreadsheet formulas Chapter Risk assessment Spreadsheet charts and formulas Chapter Database design Database querying and reporting Chapter 12* Analyzing supplier performance and pricing Spreadsheet date functions Data filtering Database functions Chapter Inventory management Importing data into a database Database querying and reporting Chapter Bill of materials cost sensitivity analysis Spreadsheet data tables Spreadsheet formulas Chapter 11* Sales trend analysis Database querying and reporting Chapter Customer reservation system Customer sales analysis Database querying and reporting Database design Chapter Marketing decisions Spreadsheet pivot tables Chapter 11 Customer profiling Database design Database querying and reporting Chapter 6* Finance and Accounting Financial statement analysis Human Resources Employee training and skills tracking Manufacturing and Production Sales and Marketing www.downloadslide.com Customer service analysis Database design Database querying and reporting Chapter Sales lead and customer analysis Database design Database querying and reporting Chapter 12 Blog creation and design Blog creation tool Chapter Internet Skills Using online software tools for job hunting and career development Chapter Using online interactive mapping software to plan efficient transportation routes Chapter Researching product information Evaluating Web sites for auto sales Chapter Using Internet newsgroups for marketing Chapter Researching travel costs using online travel sites Chapter Searching online databases for products and services Chapter Using Web search engines for business research Chapter Researching and evaluating business outsourcing services Chapter Researching and evaluating supply chain management services Chapter Evaluating e-commerce hosting services Chapter 10 Using shopping bots to compare product price, features, and availability Chapter 11 Analyzing Web site design Chapter 12 Analytical, Writing, and Presentation Skills * Business Problem Chapter Management analysis of a business Chapter Value chain and competitive forces analysis Business strategy formulation Chapter Formulating a corporate privacy policy Chapter Employee productivity analysis Chapter Disaster recovery planning Chapter Locating and evaluating suppliers Chapter Developing an e-commerce strategy Chapter 10 www.downloadslide.com Essentials of Management Information Systems Eleventh Edition Kenneth C Laudon New York University Jane P Laudon Azimuth Information Systems Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo i www.downloadslide.com Editor in Chief: Stephanie Wall Executive Editor: Bob Horan Program Manager Team Lead: Ashley Santora Program Manager: Denise Vaughn Editorial Assistant: Kaylee Rotella Executive Marketing Manager: Anne K Fahlgren Project Manager Team Lead: Judy Leale Project Manager: Karalyn Holland Operations Specialist: Michelle Klein Creative Director: Blair Brown Sr Art Director: Janet Slowik Cover Designer: John Christiana Cover Image: Photobank Gallery / Shutterstock VP, Director of Digital Strategy & Assessment: Paul Gentile Digital Editor: Brian Surette Digital Development Manager: Robin Lazrus MyLab Project Manager: Joan Waxman Digital Project Manager: Alana Coles Media Project Manager: Lisa Rinaldi Full-Service Project Management: Azimuth Interactive, Inc Composition: Azimuth Interactive, Inc Printer/Binder: Courier/Kendallville Cover Printer: Lehigh-Phoenix Color/Hagerstown Text Font: 10.5/12.5 Times LT Std, 9.5pt Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on the appropriate page within text Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published as part of the services for any purpose All such documents and related graphics are provided “as is” without warranty of any kind Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from the services The documents and related graphics contained herein could include technical inaccuracies or typographical errors Changes are periodically added to the information herein Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time Partial screen shots may be viewed in full within the software version specified Microsoft® and Windows®, and Microsoft Office® are registered trademarks of the Microsoft Corporation in the U.S.A and other countries This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation Copyright © 2015, 2013, 2011 by Pearson Education, Inc., One Lake Street, Upper Saddle River, New Jersey 07458 All rights reserved Manufactured in the United States of America This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to 201-236-3290 Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps Library of Congress Cataloging-in-Publication Data is Available 10 ISBN 10: 0-13-357684-1 ISBN 13: 978-0-13-357684-9 www.downloadslide.com About the Authors Kenneth C Laudon is a Professor of Information Systems at New York University’s Stern School of Business He holds a B.A in Economics from Stanford and a Ph.D from Columbia University He has authored twelve books dealing with electronic commerce, information systems, organizations, and society Professor Laudon has also written over forty articles concerned with the social, organizational, and management impacts of information systems, privacy, ethics, and multimedia technology Professor Laudon’s current research is on the planning and management of large-scale information systems and multimedia information technology He has received grants from the National Science Foundation to study the evolution of national information systems at the Social Security Administration, the IRS, and the FBI Ken’s research focuses on enterprise system implementation, computer-related organizational and occupational changes in large organizations, changes in management ideology, changes in public policy, and understanding productivity change in the knowledge sector Ken Laudon has testified as an expert before the United States Congress He has been a researcher and consultant to the Office of Technology Assessment (United States Congress), Department of Homeland Security, and to the Office of the President, several executive branch agencies, and Congressional Committees Professor Laudon also acts as an in-house educator for several consulting firms and as a consultant on systems planning and strategy to several Fortune 500 firms At NYU’s Stern School of Business, Ken Laudon teaches courses on Managing the Digital Firm, Information Technology and Corporate Strategy, Professional Responsibility (Ethics), and Electronic Commerce and Digital Markets Ken Laudon’s hobby is sailing Jane Price Laudon is a management consultant in the information systems area and the author of seven books Her special interests include systems analysis, data management, MIS auditing, software evaluation, and teaching business professionals how to design and use information systems Jane received her Ph.D from Columbia University, her M.A from Harvard University, and her B.A from Barnard College She has taught at Columbia University and the New York University Stern School of Business She maintains a lifelong interest in Oriental languages and civilizations The Laudons have two daughters, Erica and Elisabeth, to whom this book is dedicated iii www.downloadslide.com Brief Contents Preface I xi Information Systems in the Digital Age 1 Business Information Systems in Your Career Global E-business and Collaboration 36 Achieving Competitive Advantage with Information Systems 74 Ethical and Social Issues in Information Systems 108 II Information Technology Infrastructure 145 IT Infrastructure: Hardware and Software Foundations of Business Intelligence: Databases and Information Management 184 Telecommunications, the Internet, and Wireless Technology Securing Information Systems 258 146 218 III Key System Applications for the Digital Age Achieving Operational Excellence and Customer Intimacy: Enterprise Applications 10 E-commerce: Digital Markets, Digital Goods 328 11 Improving Decision Making and Managing Knowledge 368 IV Building and Managing Systems 12 References iv 405 Building Information Systems and Managing Projects Glossary G-1 Index 297 I-1 R-1 406 298 www.downloadslide.com Complete Contents I Information Systems in the Digital Age Collaboration and Teamwork Project 32 Business Problem-Solving Case A New Look at Electronic Medical Records 33 Business Information Systems in Your Career 2 Chapter-Opening Case: The San Francisco Giants Win Big with Information Technology Chapter-Opening Case: TELUS Embraces Social Learning Interactive Session: People Meet the New Mobile Workers 37 Organizing a Business: Basic Business Functions 39 Business Processes 40 • Managing a Business and Firm Hierarchies 42 • The Business Environment 43 • The Role of Information Systems in a Business 44 2.2 Types of Business Information Systems 45 Systems for Different Management Groups 45 Globalization Challenges and Opportunities: A Flattened World 10 • Business Drivers of Information Systems 11 1.2 Perspectives on Information Systems and Information Technology 13 What Is an Information System? 13 • It Isn’t Simply Interactive Session: Organizations Vail Ski Resorts Goes High-Tech for High Touch 49 Interactive Session: People Piloting Procter and Gamble from Decision Cockpits 51 Systems for Linking the Enterprise 52 • E-Business, E-Commerce, and E-Government 55 Technology: The Role of People and Organizations 15 • Dimensions of Information Systems 15 1.3 Understanding Information Systems: A Business Problem-Solving Approach 18 The Problem-Solving Approach 18 2.3 Systems for Collaboration and Social Business 56 What Is Collaboration? 56 • What Is Social Business? 57 • Business Benefits of Collaboration and Social Business 58 • Building a Collaborative Culture and Business Processes 58 • Tools and Technologies for Collaboration and Social Business 60 Interactive Session: Technology UPS Competes Globally with Information Technology 19 A Model of the Problem-Solving Process 21 • The Role of Critical Thinking in Problem Solving 23 • The Connection Between Business Objectives, Problems, and Solutions 24 1.4 Information Systems and Your Career 36 2.1 Components of a Business 39 1.1 The Role of Information Systems in Business Today How Information Systems Are Transforming Business • What’s New in Management Information Systems? Global E-business and Collaboration 25 How Information Systems Will Affect Business Careers 25 • Information Systems and Your Career: Wrap-Up 28 • How This Book Prepares You For the Future 28 Review Summary 29 • Key Terms 30 • Review Questions 30 • Discussion Questions 31 • Hands-On MIS Projects 31 Management Decision Problems 31 • Improving Decision Making: Using Databases to Analyze Sales Trends 32 • Improving Decision Making: Using the Internet to Locate Jobs Requiring Information Systems Knowledge 32 2.4 The Information Systems Function in Business 65 The Information Systems Department 65 • Information Systems Services 66 Review Summary 66 • Key Terms 67 • Review Questions 68 • Discussion Questions 69 • Hands-On MIS Projects 69 Management Decision Problems 69 • Improving Decision Making: Using a Spreadsheet to Select Suppliers 69 • Achieving Operational Excellence: Using Internet Software to Plan Efficient Transportation Routes 70 Collaboration and Teamwork Project 70 Business Problem-Solving Case Should Companies Embrace Social Business? 70 Achieving Competitive Advantage with Information Systems 74 v www.downloadslide.com Basic Concepts: Responsibility, Accountability, and Liability 117 • Ethical Analysis 118 • Candidate Ethical Principles 118 • Professional Codes of Conduct 119 • Some Real-World Ethical Dilemmas 119 Chapter-Opening Case: Can Walmart Stay on Top? 75 3.1 Using Information Systems to Achieve Competitive Advantage 77 Porter’s Competitive Forces Model 78 • Information System Strategies for Dealing with Competitive Forces 79 • The Internet’s Impact on Competitive Advantage 82 • The Business Value Chain Model 83 Interactive Session: Technology Auto Makers Become Software Companies 85 4.3 The Moral Dimensions of Information Systems 120 Information Rights: Privacy and Freedom in the Internet Age 120 Interactive Session: Technology Big Data Gets Personal: Behavioral Targeting Property Rights: Intellectual Property 127 • Accountability, Liability, and Control 130 • System Quality: Data Quality and System Errors 131 • Quality of Life: Equity, Access, and Boundaries 132 Synergies, Core Competencies, and Network-Based Strategies 87 • Disruptive Technologies: Riding the Wave 89 3.2 Competing on a Global Scale 90 The Internet and Globalization 91 • Global Business and System Strategies 92 • Global System Configuration 92 3.3 Competing on Quality and Design 93 What Is Quality? 93 • How Information Systems Improve Quality 94 3.4 Competing on Business Processes 96 What is Business Process Management? 96 Interactive Session: Organizations New Systems and Business Processes Put MoneyGram “On the Money” 99 Review Summary 101 • Key Terms 102 • Review Questions 102 • Discussion Questions 103 • Hands-On MIS Projects 103 Management Decision Problems 103 • Improving Decision Making: Using a Database to Clarify Business Strategy 104 • Improving Decision Making: Using Web Tools to Configure and Price an Automobile 104 Collaboration and Teamwork Project 104 Business Problem-Solving Case Can This Bookstore Be Saved? 105 Ethical and Social Issues in Information Systems 108 Chapter-Opening Case: Content Pirates Sail the Web 109 Interactive Session: People Wasting Time: The New Digital Divide 136 Review Summary 138 • Key Terms 139 • Review Questions 139 • Discussion Questions 140 • Hands-On MIS Projects 140 Management Decision Problems 140 • Achieving Operational Excellence: Creating a Simple Blog 141 • Improving Decision Making: Using Internet Newsgroups for Online Market Research 141 Collaboration and Teamwork Project 142 Business Problem-Solving Case Facebook: It’s About the Money 142 II Information Technology Infrastructure 145 4.2 Ethics in an Information Society 117 vi IT Infrastructure: Hardware and Software 146 Chapter-Opening Case: The Army Recasts Its IT Infrastructure 147 5.1 IT Infrastructure: Computer Hardware 149 Infrastructure Components 150 • Types of Computers 151 • Storage, Input, and Output Technology 154 • Contemporary Hardware Trends 154 4.1 Understanding Ethical and Social Issues Related to Systems 111 A Model for Thinking About Ethical, Social, and Political Issues 113 • Five Moral Dimensions of the Information Age 114 • Key Technology Trends That Raise Ethical Issues 114 124 Interactive Session: Technology The Greening of the Data Center 160 5.2 IT Infrastructure: Computer Software 162 www.downloadslide.com Operating System Software 162 • Application Software and Desktop Productivity Tools 164 • HTML and HTML5 167 • Web Services 167 • Software Trends 168 5.3 Managing Hardware and Software Technology 170 Capacity Planning and Scalability 170 • Total Cost of Ownership (TCO) of Technology Assets 171 • Using Technology Service Providers 171 • Managing Mobile Platforms 173 Interactive Session: People The Pleasures and Pitfalls of BYOD 174 Managing Software Localization for Global Business 175 Review Summary 176 • Key Terms 177 • Review Questions 178 • Discussion Questions 178 • Hands-On MIS Projects 179 Management Decision Problems 179 • Improving Decision Making: Using a Spreadsheet to Evaluate Hardware and Software Options 179 • Improving Decision Making: Using Web Research to Budget for a Sales Conference 180 Collaboration and Teamwork Project 180 Business Problem-Solving Case Is It Time for Cloud Computing? 180 Foundations of Business Intelligence: Databases and Information Management 184 Chapter-Opening Case: Better Data Management Helps the Toronto Globe and Mail Reach Its Customers 185 6.1 The Database Approach to Data Management 187 Entities and Attributes 188 • Organizing Data in a Relational Database 188 • Establishing Relationships 190 6.2 Database Management Systems 193 Operations of a Relational DBMS 194 • Capabilities of Database Management Systems 194 • Non-Relational Databases and Databases in the Cloud 196 6.3 Using Databases to Improve Business Performance and Decision Making 198 The Challenge of Big Data 198 • Business Intelligence Infrastructure 198 • Analytical Tools: Relationships, Patterns, Trends 200 Interactive Session: Organizations Business Intelligence Helps the Cincinnati Zoo Know Its Customers 204 Databases and the Web 205 6.4 Managing Data Resources 207 Establishing an Information Policy 207 • Ensuring Data Quality 207 Review Summary 208 Interactive Session: People American Water Keeps Data Flowing 209 Key Terms 211 • Review Questions 211 • Discussion Questions 212 • Hands-On MIS Projects 212 Management Decision Problems 212 • Achieving Operational Excellence: Building a Relational Database for Inventory Management 213 • Improving Decision Making: Searching Online Databases For Overseas Business Resources 213 Collaboration and Teamwork Project 213 Business Problem-Solving Case Does Big Data Bring Big Rewards? 214 Telecommunications, the Internet, and Wireless Technology 218 Chapter-Opening Case: RFID and Wireless Technology Speed Up Production at Continental Tires 219 7.1 Telecommunications and Networking in Today’s Business World 221 Networking and Communication Trends 221 • What is a Computer Network? 222 • Key Digital Networking Technologies 223 7.2 Communications Networks 226 Signals: Digital vs Analog 226 • Types of Networks 227 • Transmission Media and Transmission Speed 228 7.3 The Global Internet 228 What Is the Internet? 228 • Internet Addressing and Architecture 229 Interactive Session: Organizations The Battle over Net Neutrality 232 Internet Services and Communication Tools 233 Interactive Session: People Monitoring Employees on Networks: Unethical or Good Business? 236 The Web 238 7.4 The Wireless Revolution 246 vii www.downloadslide.com Index Procter & Gamble (P&G), 50, 51-52, 88, 236, 306, 359, 391-392 Profit by Outsourcing, 418 Progressive Insurance, 383 Proofpoint Plus, 236 Purina, 309 Qantas, 179 Qcue, Quantcast, 125 Rakbank, 268 RAND Corp., 34 Random House, 106 Rasgas, 293, 294 Raytheon, 356 Readsoft, 325 Real Time Crime Center, 214 Red Robin, 72 RedEnvelope.com, 342 Redwood, 325 Reebok, 89 Remedy, 325 Research in Motion (RIM), 130 Rhapsody, 110 Rolls-Royce, 356 Royal Dutch/Shell Group, 152 Sabre Holdings, 197 Sabrix, 325 Safe Horizon, Inc., 182 Salesforce.com, 159, 286, 313, 343, 425 Sam’s Club, 76 Samsung Electronics, 91, 128-129, 356, 394 San Francisco Giants, 3-4, 13, 24 San Jose State University, 403 SAP AG, 60, 300, 303, 308, 313, 319, 320, 375, 384 SAS Institute, 375 Schneider Logistics Services, 308 Science Applications International Corp., 441-442 Sears, 80, 215, 216, 334 Securities and Exchange Commission, 288 ServiceMax Inc., 7-Eleven, 63 Sharp Electronics, 91 Shopkick, 359 Shoprite Supermarkets, 309 Shutterstock, 198 Siemens, 112 Simple Shoes, 420 Six Flags, 55 Skype, 232 Snyders of Hanover, 31 Social Security Administration, 46 Sony, 92, 271 Spamhaus, 267 SpectorSoft Corp., 236 Sports Authority, 359 Sportsvision, Spotify, 110, 129, 345, 346 Sprint, 246 Standish Group, 425 Stanford University, 137, 239, 240, 403, 404 I-3 Staples.com, 342 Starbucks, 82, 92, 377, 379 State Street Bank, 181 STMicroelectronics, 91 Stylehive, 347 Sun Microsystems, 164, 179 Sundia, 91-92 SunGard Availability Services, 278 Symantec Corp., 128, 236, 265, 284, 286, 287 Syrian Electronic Army, 266 T-Mobile, 103, 246 TAL Apparel Ltd., 12 Tampa Bay Devil Rays, 369 Target, 215 Tasty Baking Co., 303 Technodyne, 442 TELUS, 37-39 Telvent, 294 Teva, 420 Texas A&M University, 317 Texas Instruments, 91 ThisNext, 347 Thomas Register, 206 ThomasNet.com, 206 Tibco, 98 Time Warner, 229, 237 TiVo, 271 TJX, 271 Toyota Corp., 77, 81, 82, 91 Travelocity, 82, 358, 359 Trend Micro, 286 TripAdvisor, 359, 367 Troy Lee Designs, 95 Tumblr, 5, 245, 344, 347, 352, 366 Twitter, 7, 57, 117, 124, 130, 155, 165, 198, 199, 237, 244, 245, 256, 264, 266, 320, 334, 342, 344, 352, 357, 362, 365-367, 376, 380, 420 UBS Financial Services, 397 Udacity, 403 UGG Australia, 420 Unilever, 277 United Airlines, 358 United Parcel Service (UPS), 5, 16, 17, 18, 19-20 University of Akron, 402 University of California, Berkeley, 403 University of Pittsburgh Medical Center (UPMC), 179 University of Texas, 403 University of Virginia, 394 UPS, 42, 86, 379 UPS Supply Chain Solutions, 308 U.S Army, 147-148, 149, 158 U.S Bancorp., 293 U.S Centers for Disease Control and Prevention, 215 U.S Cyber Command (CYBERCOM), 295 U.S Department of Defense, 147148, 149, 228, 272 U.S Department of Defense Advanced Research Projects Agency (DARPA), 225 U.S Department of Homeland Security, 244 U.S Federal Trade Commission, 273 U.S Forest Service, 110 U.S Internal Revenue Service, 46 U.S National Aeronautics and Space Administration (NASA), 23 U.S National Institute of Standards and Technology (NIST), 158 U.S National Marine Fisheries Service (NMFS), 379 U.S National Oceanic and Atmospheric Administration (NOAA), 204 U.S National Security Agency (NSA), 116, 117 U.S Navy, 294, 433 U.S Patent and Trademark Office, 128 U.S Pharma Corp., 400 U.S Veterans Affairs Dept., 33-34, 271 USA Network, 109 USAA, 420 USAA Federal Savings Bank, 420 Vail Ski Resort, 48, 49-50 Vantage Learning, 402 Verizon Corp., 12, 90, 221, 233, 246, 247 Vestas, 214 Virgin Entertainment Group, 237 Visa Inc., 116, 268-269 Visa International, 389-390 Vistaprint, 366-367 VMWare, 160 Vodafone Group Plc, 325-326 Volkswagen Group, 354 VW Group Supply, 354 Waldenbooks, 105 Walgreens, 271 Wall Street Journal, 294, 337, 345 Walmart Inc., 11, 75-77, 80, 82, 84, 112, 215, 249, 270, 334, 338, 342, 359, 378, 394 Warm and Toasty Heating Oil Co., 439 Washington Mutual, 88 Websense, 287 Wedbush Securities, 236 Wellesley College, 403 Wells Fargo, 293 Westpac Bank, 265 Whole Foods, 330 Wikitude.me, 357 World Wide Web Consortium (W3C), 167, 231, 245, 251 WorldCom, 274 Wrigleyville Sports, 366 WSJ.com, 342 Yahoo! Inc., 112, 117, 123, 124, 126, 132, 155, 160, 169, 199, 239-240, 243, 244, 294, 333, 334, 341, 342, 359, 418 Yelp, 256, 345, 366, 380 YouTube, 82, 110, 232, 236, 243, 256, 320, 330, 334, 352, 420 Zynga, 142, 181, 182 Subject Index acceptable use policy (AUP), 277 acceptance testing, 413 access, equity in access in digital world, 135 Access (Microsoft), 166, 186, 193, 194, 196, 408 accountability, 117, 131 accounting, information systems jobs in, 5, 30 Ad Network (AOL), 349 ad networks, 349 additive manufacturing, 95 administrative controls, 276 AdMob (Google), 357-358 Adobe Connect, 61 Adobe Dreamweaver, 167 Adobe Flash, 418 Adobe Flex, 418 Adobe Illustrator, 169 Adobe InDesign, 165 AdSense (Google), 126, 255, 344 advanced planning and optimization (APO), 300 advertising e-commerce, 348-351 Internet advertising, 6, 25, 334 mobile advertising, 256, 357358 search engine marketing, 240241, 349 advertising exchanges, 351 advertising managers, 26 advertising networks, 351 advertising revenue model, 344 AdWords (Google), 255, 344 AeroScout MobileView (software), 220 AES See automated essay scoring AFE See authorization for expenditure (AFE) document affiliate revenue model, 345 affiliate Web sites, 345 AI See artificial intelligence Alfresco ECM system, 393 Amazon, 11, 42, 77, 81, 82, 105, 106, 122, 123, 131, 132, 158, 165, 180-181, 182, 215, 244, 270, 286, 331, 332, 334, 338, 340, 342, 343, 344, 345, 346, 352, 356, 359, 419 Amazon Cloud Formation, 180 Amazon Elastic Compute Cloud (EC2), 159 Amazon Kindle, 7, 105, 129, 155, 341, 356 Amazon Kindle Fire, 256, 358 Amazon Relational Database Service (Amazon RDS), 197 Amazon Silk, 167 Amazon Simple Storage Service (S3), 159 Amazon SimpleDB, 197 www.downloadslide.com I-4 Amazon Web Services (AWS), 159, 179, 182, 197 ambient data, 275 American Recovery and Reinvestment Act, 34 analog signal, 225 analytic platforms, 200 analytical customer relationship management (CRM), 316, 321 Android devices, 358, 419 Android OS, 163, 169, 255, 266, 287, 419 Android phones, 6, 7, 8, 124-125, 151, 154-155, 170, 173, 255, 256, 286, 287, 333, 358 Annual Cost of Cyber Crime Study, 267 antispyware software, 282, 289 antivirus software, 282, 289 AOL Ad Network, 349 Apache Hadoop, 199-200, 214, 215, 216 Apache HTTP Server, 239 Apache HTTP Web Server, 164 Apache Open for Business (OF Biz), 320 APO See advanced planning and optimization “App Internet”, 245 Apple Facetime, 61 Apple iAd platform, 357 Apple iCloud, 174 Apple Inc., 11, 57, 81, 82, 91, 106, 122, 124-125, 128, 129, 132, 255-256, 334, 340, 343, 347, 357 Apple iPad, 7, 8, 105, 129, 151, 155, 161, 173, 247, 255, 256, 286, 287, 341, 343, 358 Apple iPhone, 6, 7, 8, 91, 124-125, 129, 151, 154-155, 161, 162163, 170, 173, 232, 247, 255, 256, 286, 287, 333, 343, 356, 358, 376, 419 Apple iPod, 80, 81, 89, 129, 136, 255, 343, 358 Apple iTunes, 42, 44, 77, 81, 82, 110, 129, 340, 342, 344, 346, 359 Apple OS X, 163, 176 Apple Safari, 167, 419 application controls, 275 Application layer, 225 Application proxy filtering, 282 application server, 153 application software, 150, 164-165, 176, 417, 437 apps, 170 APT1 (group), 294 AR See augmented reality artificial intelligence (AI), 385 “as-is” process, 96-97 associations (data analysis), 202 AT&T Park, ATMs, 12, 90, 131 Attensity Analyze, 203 attributes, 188 audio input, 156 audio output, 156 Index auditing data quality audit, 208 security audits, 279, 289 augmented reality (AR), 395, 397 AUP See acceptable use policy authentication, 280-281, 289 authorization for expenditure (AFE) document, 421 auto industry, 85-86 automated essay scoring (AES), 402-404 autonomic computing, 161 Azure (Microsoft), 425 Azure SQL Database (Microsoft), 197 B2B e-commerce, 333, 341, 343, 353-356, 362 B2C e-commerce, 341 BackRub (search engine), 255 balanced scorecard method, 383 bandwidth, 228 banks, 88 bar codes, 156 baseball, case study, 369-370 behavioral targeting, 121, 124-125, 126, 348-349 benchmarking, 84, 94 best practices, 84 BI See business intelligence Big Data, 6, 7, 198, 203, 214-215, 251, 378-379 Big Data analytics, 378-379 Bing (Microsoft), 239, 240, 341, 342 biometric authentication, 280, 281, 289 BitTorrent (software), 110 BlackBerry, 6, 8, 130, 151, 155, 170, 174, 286, 333, 356, 376 BlackPearl (K2), 421 “blast and scatter” advertising, 351 Blogger (service), 243 blogging, 58, 243, 345 blogosphere, 243 blogroll, 243 blogs, 58, 243, 264 Bluetooth, 246-247, 252, 263, 266 book retailing, 96-98, 100, 105-106 bot networks, 134 botnets, 133, 267 bots, intelligent agent shopping bots, 243 boundaries, maintaining boundaries: family, work, and leisure, 132-133 Box (software), 287 BPM See business performance management; business process management BPR See business process reengineering branding, social media for, 352 “bricks-and-clicks”, 342 broadband connections, 222, 229, 334 bRobots, 293 Brown Bag Software v Symantec Corp., 128 browsers See Web browsers build-to-order model, 310 build-to-stock model, 310 bullwhip effect, 306 business business environment, 43-44, 66 business functions, 39-40 business models, 11, 44, 341344, 362 business processes, 16, 40-42, 66 changing nature of work, 56 changing organization of firms, 56 changing scope of the firm, 57 data quality, 132, 139, 207-208, 211 defined, 39, 66 disruptive technologies, 89-90 efficiency of, 42 enhancing core competencies, 88, 101 global business, 90-93 growth of professional work, 56 information systems (IS) and, 42, 44, 66 innovation and, 57 management hierarchies, 42-43 network-based strategies, 88-89, 101 programming languages for, 164-165, 176 protection of customer privacy, 126 social business, 7, 57-58 synergies, 87-88, 101 value chain, 83-87, 101 value web, 86-87, 101 See also business information systems; business intelligence; e-business; e-commerce business analytics (BA), 375, 376 Big Data analytics, 378-379 functionalities, 377 location analytics, 379 predictive analytics, 377-378 reports, 377, 398 Business ByDesign (SAP), 320 business continuity planning, 278279 business environment, 43-44, 66 business functions, 39-40 business information systems, 42, 44-45, 67 for business intelligence, 46, 50 for collaboration and teamwork, 56-65 customer relationship management (CRM) systems, 54, 67, 81, 84, 312-318 decision-support systems (DSS), 47-68, 67 enterprise applications, 52-55, 67 enterprise systems, 53, 301304, 321 executive support systems (ESS), 50, 67 intranets and extranets, 55, 67 knowledge management systems (KMS), 54-55, 67 supply chain management (SCM) systems, 53-54, 67, 84, 250, 304-312, 319, 321 transaction processing systems (TPS), 45-46, 67 business intelligence (BI) about, 46, 50, 67, 374-385 analytical tools, 200-205 data mining, 116, 201-203, 375 decision support, 381-385, 398 defined, 375, 376 delivery platform, 376 in enterprise applications, 321 functionalities, 377 infrastructure, 376 online analytical processing (OLAP), 201, 210, 316, 375 reports, 377, 398 text mining, 203 user interface, 376 users, 381, 382 Web mining, 203-204 See also decision making; decision support Business Intelligence Enterprise Edition (Oracle), 321 business intelligence infrastructure, 198-200 analytic platforms, 200 data marts, 199 data warehouses, 186, 187, 199, 214, 317 Hadoop, 199-200, 214, 215, 216 in-memory computing, 200 business models defined, 11 for e-commerce, 341-344, 362 technology and, 44 Business Objects (SAP), 321 Business Objects Web Intelligence (SAP), 209 Business One Cloud (SAP), 320 business performance management (BPM), 384 business problems dimensions of, 22 See also problem solving business process management (BPM), 96, 102 business process reengineering (BPR), 100-101 business processes, 16, 40-42, 66 collaborative, 58-60 competing on, 96-98 information systems (IS) and, 42 Business Suite (SAP), 320 business-to-business electronic commerce See B2B e-commerce business-to-consumer electronic commerce See B2C e-commerce business value co-creation of, www.downloadslide.com Index of customer relationship management (CRM) systems, 318 of decision making, 371, 372 of enterprise systems, 303-304 of information systems security, 273-274 of security and control, 273275, 289 of supply chain management (SCM) systems, 311-312 business value chain model, 83-87, 101 BusinessObjects Dashboards (SAP), 300, 301, 317 BusinessObjects Web Intelligence (SAP), 301 BYOD, 155, 173, 174-175, 286, 287-288, 421 C (programming language), 164, 176 C++ (programming language), 164, 176 C2C e-commerce, 341 Cable Communications Policy Act of 1984, 120 cable companies, 222 cable Internet connections, 229, 251 cable modems, 226 CAD See computer-aided design call centers, 27 campus area networks (CANs), 227 CANs See campus area networks capacity planning, 170-171 car rental companies, 168, 214 carpal tunnel syndrome (CTS), 138 CASE See computer-aided software engineering case-based reasoning (CBR), 387, 388, 398 Categorical Imperative, 118 CBD system See Custom Board Design CBR See case-based reasoning CD-ROM (compact disc read-only memory), 154 CD-RW discs (CD-ReWritable discs), 154 CDMA (Code Division Multiple Access), 246, 252 cellular systems, 246, 252 See also smartphones centralized processing, 152 centralized systems, 92-93, 132 certificate authority (CA), 283-284 CGI script, 206 change management, 23, 432-436 chat, 234 Chatter (Salesforce), 63, 72 chief information officer (CIO), 65 Chief information security officer (CISO), 65 chief knowledge officer (CKO), 65-66 Chief privacy officer (CPO), 65 chief security officer (CSO), 65 Child Pornography Act, 270 I-5 Children’s Online Privacy Protection Act (COPPA) of 1998, 120, 121 China, cyberwarfare and, 271-272, 294 chip and PIN system, 268 choice, 373 Chrome (Google), 163, 167, 169 churn rate, 318 CIO See chief information officer circuit-switched networks, 224 CIRRUS network, 12 Cisco Telepresence, 51 Cisco WebEx, 61 CISO See Chief information security officer CKO See chief knowledge officer class, 424 classification (data analysis), 202 click fraud, 271 client, 152, 153, 176 client/server computing, 152, 224, 227, 238 cloud-based data management services, 197 cloud-based software services and tools, 169-170 cloud collaboration services, 61-62 cloud computing about, 6, 7, 158-161, 180-182 appeal of, 172 cloud databases, 197 cloud infrastructure as a service, 158-159 cloud platform as a service, 159 hybrid cloud, 172 IS system development and, 425, 437 for IT infrastructure, 172, 176 private cloud, 159 public cloud, 159 security, 285-286, 287, 289 cloud databases, 197 CLTV See customer lifetime value clustering (data analysis), 202 coaxial cable, 228, 229 COBOL (programming language), 164, 176 Code Division Multiple Access See CDMA Cognos Business Intelligence (IBM), 204 collaboration benefits of, 58, 59 building collaborative culture, 58-60 customer service, 59 defined, 56, 67 financial performance and, 59 importance of, 56-57 innovation and, 59 productivity and, 59 quality and, 59 requirements for, 59 social business platforms and, 61-63 tools and technologies, 60-63, 67 collaboration tools and technologies, 60-65, 67, 394 collaborative culture, 58-60 collaborative shopping, 352 columns (database), 188 “command and control” organizations, 58, 59 Common Gateway Interface See CGI script communication Bluetooth, 246-247, 252, 263, 266 trends in, 221-222 unified communications, 237238 See also social networking; telecommunications technology communities, 58 communities of users, 89 community providers, 342, 343344 competition business value chain model, 83-87, 101 global, 90-93, 101 information systems and, 77-90 Internet and, 82-83 Porter’s competitive forces model, 78-79, 83, 101 strategies for, 79-82 time-based competition, 132 competitive advantage, as business objective, 12, 101 competitive forces model, 78-79, 101 Compiere (software), 320 component-based development, 425 computer abuse, 134 computer-aided design (CAD), 95, 395, 396-397 computer-aided software engineering (CASE), 425 computer crime about, 266, 267-270 botnet attacks, 133, 267 case study, 268-269 click fraud, 271 computers as instruments of crime, 269 computers as targets of crime, 269 cost of, 133 cybervandalism, 266 cyberwarfare, 271-272, 293296 data breaches, 259-270, 270, 271, 287 defined, 133 denial-of-service (DoS) attacks, 267, 288-289 European legislation, 270 global threats, 271-272 identity theft, 270-271 insider abuse, 133 internal threats from employees, 272 malware, 133 pharming, 270 phishing fraud, 133, 270 sniffing, 267, 280 social engineering, 272, 280 spamming, 134-135, 267 spoofing, 266-267 U.S legislation, 270-271 See also Internet security threats Computer Crime and Security Survey, 133 computer forensics, 274-275 Computer Fraud and Abuse Act, 270 computer hardware See hardware computer literacy, 15 Computer Matching and Privacy Protection Act of 1988, 120 computer mouse, 156 computer networks See networks and networking computer operation controls, 276 computer-related liability problems, 130-131 Computer Security Act of 1987, 120 computer software See software Computer Software Copyright Act, 128 computer viruses, 263, 264, 265, 289 computer vision syndrome (CVS), 138 computers about, 14-15 Bluetooth, 246-247, 252, 263, 266 computer-related liability problems, 130-131 digital divide, 135, 136 as instruments of crime, 269 laptop computers, 149 mainframes, 152, 176 netbooks, 155 personal computers (PCs), 90, 151 repetitive stress injury, 137-138 server computers, 151-152 supercomputers, 152 tablet computers, 155, 240, 341, 360 as targets of crime, 269 types, 151-152, 176 Wi-Fi, 247-248, 252, 263, 264, 266, 283, 289 workstations, 151, 176 “zombie” PCs, 267 See also computer crime; computing; hardware; networks and networking; servers; software computing autonomic computing, 161 balancing power in decision making, 132 boundaries: family, work, and leisure, 132-133 carpal tunnel syndrome (CTS), 138 centralized vs decentralized, 132 www.downloadslide.com I-6 client/server computing, 152, 224, 227, 238 computer operation controls, 276 computer vision syndrome (CVS), 138 dependence and vulnerability, 133, 261-263, 288 green computing, 159, 160-161 grid computing, 152 health risks of, 137-138 in-memory computing, 200 nanotechnology, 156-157 on-demand computing, 159 quantum computing, 157 recovery-oriented computing, 285 repetitive stress injury, 137-138 storage technology, 154, 176 technostress, 138 virtualization, 149, 157-158, 160 See also cloud computing; computer crime; computers; mobile digital platform; networks and networking Conficker (malware), 265 conflict, 16 Connect (Adobe), 61 consumer-to-consumer electronic commerce See C2C e-commerce consumerization of IT, 155 contact point, 312 content pirating, 109-111, 129 content provider, 342-343 control, business value of, 273-275, 289 controls, in information systems, 261, 275, 276 “conversations”, 57, 333 conversion, 414 cookies, 123, 125 COPPA See Children’s Online Privacy Protection Act (COPPA) of 1998 copyright, 128, 130 core competencies, 88, 101 corporate security policy, 277-278, 289 cost transparency, 337, 362 CPO See Chief privacy officer cracker (hacker), 266 Craigslist (Web site), 341 credit scoring, 378 crime See computer crime criminal fraud, 111, 112 critical thinking, 23-24 CRM systems See customer relationship management (CRM) systems cross-functional systems, 45 cross-selling, 314 crowdsource funding markets, 343 crowdsourcing, 57, 58, 348, 362 CSO See chief security officer CTS See carpal tunnel syndrome Custom Board Design (CBD) system (Fireware Surfboard), 396 Index Customer Intelligence software (SAS), 49 customer intimacy, as organizational objective, 11-12, 81, 82 customer lifetime value (CLTV), 316 customer loyalty, CRM support of, 315, 316 customer relationship management, 312-313, 320 customer relationship management (CRM) software, 313-316, 320, 321 customer relationship management (CRM) systems, 54, 67, 81, 84, 312-318, 321 customer service collaboration and, 59 CRM system support of, 314 improving, 95 Customer Value Intelligence (SAP), 318 customers, 79, 83 customization of application software packages for system design, 417 of e-commerce, 335, 337 CVS See computer vision syndrome Cyber Corps (Iran), 293, 294 cybercrime See computer crime cyberlockers, 61 cyberterrorism, 271 cybervandalism, 266 cyberwarfare, 271-272, 293-296 cycle time, 94, 304 Dark Seoul (malware), 294 dashboards, 7, 50, 53, 300, 376, 377, 398 data Big Data, 6, 7, 198, 203, 214215, 251, 378-379 business intelligence, 375-376 data security controls, 276 defined, 13, 14 mobile device security, 286, 287-288 WPA2 (Wi-Fi Protected Access 2), 283 See also digital information data administration, 207 data analysis case study, 370 multidimensional data analysis, 201, 202, 382 online analytical processing (OLAP), 201, 210, 316, 375, 382 data analysis technology, 116 data analytics, data breaches, 259-270, 270, 271, 287 data centers, 149, 160 data cleansing, 208 data definition, 194 data dictionary, 194 data-driven management, 50 data flow diagram (DFD), 422 data management case study, 85-187 databases for, 187-193 data management software, 151, 165-166 data management technology, 17 data manipulation language, 194 data marts, 198 data mining, 116, 201-203, 375 data quality, 132, 139, 211 audit, 208 ensuring, 207-208 data resources information policy, 207, 210 managing, 207-216 data scrubbing, 208 Data Security and Breach Notification Act, 271 data security controls, 276 data visualization, 376 data warehouses, 186, 187, 199, 214, 317 database administration, 207 database management systems (DBMS), 193-197, 208, 210 capabilities, 194-196 cloud-based, 197 non-relational DBMS, 196 querying, 194, 196 relational DBMS, 194 reporting, 196 databases, 187-193 case study, 185-187 cloud databases, 197 data quality, 207-208 defined, 187 in enterprise software, 321 entities and attributes, 188 entity-relationship diagram, 190, 193, 208 growth of jobs involving, 28 non-relational databases, 196197, 208 normalization, 191, 208 referential integrity rules, 191 relational database, 188-190, 208 relational DBMS, 194, 195 relationships, 190-193 Web and, 205-206 See also database management systems DB2 (software), 193, 194 DDoS attacks See distributed denial-of-service (DDoS) attacks debugging, 131-132, 288 decentralized systems, 92-93, 93, 132 Decision Cockpits, 51, 52 decision making balancing power in IS decision making, 132 business value of, 371, 372 centralized vs decentralized systems, 132 high velocity automated decision making, 374-375 information systems and, 12 in management hierarchy, 56 process, 373 stages in, 373, 374, 398 types of decisions, 371-373, 398 See also business analytics; business intelligence decision support, 381-385 balanced scorecard method, 383 business performance management (BPM), 384 case-based reasoning (CBR), 387, 388, 398 executive support systems (ESS), 50, 67, 383-384 expert systems, 385-387 fuzzy logic, 387-389, 398 genetic algorithms, 390-391, 398 group decision-support system (GDSS), 385, 398 intelligent agents, 391-392 intelligent techniques for, 385392, 398 neural networks, 389-390, 398 pivot table, 382, 383 for semistructured decisions, 381-382 decision-support systems (DSS), 47-68, 67, 381, 398 decisions quality of, 374, 375 types of, 371-372 See also decision making; decision support deep packet inspection (DPI), 285 “deep Web”, 238 Delicious (Web site), 394 Delivery Information Acquisition Device (DIAD), 19, 20 demand-drive supply chains, 310311 demand-driven model, 310 demand planning, 307-308 Demantra Demand Management software (Oracle), 309 denial-of-service (DoS) attacks, 267, 288-289 dependence, computing and, 133 Descartes’ rule of change, 118-119 desktop productivity tools, 165, 176 DFD See data flow diagram DIAD See Delivery Information Acquisition Device Dictionary.com, 125 Digg (Web site), 394 digital asset management systems, 393 digital certificates, 283-284, 289 digital dashboard, 7, 50, 53, 300, 376, 377, 398 digital divide, 135, 136 digital goods, 338-340 digital information Big Data, 6, 7, 198, 203, 214215, 251, 378-379 growth of, records retention, 6, 12-13 See also data digital markets, 339, 362 www.downloadslide.com Index digital media, 338-340 digital divide, 135, 136 intellectual property rights, 129 Digital Millennium Copyright Act of 1998 (DMCA), 130 digital networks See networks and networking digital photography, 90 digital scanners, 156 digital signal, 226 digital subscriber line See DSL direct cutover strategy, 414 direct goods, 355 direct marketing, 378 disaster recovery planning, 277279 disintermediation, 338, 339 display ads, 349, 351 disruptive technologies, 89-90 distributed denial-of-service (DDoS) attacks, 267, 293 distributed processing, 152 distribution systems, mobile apps for, DMCA See Digital Millennium Copyright Act of 1998 DNS See Domain Name System Do Not Track list, 121, 127 Do-Not-Track Online Act of 2011, 122 documentation, 413, 433 Dodd-Frank Act (2010), 13 domain extensions, 230 domain name, 230, 239 Domain Name System (DNS), 230, 251 domestic exporter strategy, 92, 93 domestic outsourcing, 417 Doostang (social network), 344 DOS attacks See denial-of-service (DoS) attacks dot-com bubble, 332 DoubleClick (Google), 115, 123, 255, 344, 349 Downadup (malware), 265 downstream portion (of supply chain), 305-306 downtime, 285 Downup (malware), 265 DPI See deep packet inspection Dreamweaver (Adobe), 167 drill-down capabilities, 384 drive-by downloads, 264 Driver’s Privacy Protection Act of 1994, 120 Dropbox, 155, 287, 342 DSL (digital subscriber line), 229, 251 DSL modems, 226 DSS See decision-support systems due process, 117 duplicated systems, 93 DuPont HyperPlant, 397 Duqu (worm), 293 DVDs (digital video discs), 154 dynamic pricing, 338 dynamic ticket pricing, Dynamics Suite (Microsoft), 320 e-book readers See e-readers I-7 e-books, 105-106 e-business, 55 E-Business Suite (Oracle), 99, 320 e-business suites, 320 e-commerce about, 55, 331-333, 362 advertising revenue model, 344 affiliate revenue model, 345 B2B e-commerce, 333, 341, 343, 353-356, 362 B2C e-commerce, 341 building a presence, 360-361, 362 business models, 341-344, 362 C2C e-commerce, 341 case study, 329-330 community provider model, 342, 343-344 content provider, 342-343 crowdsourcing, 57, 58, 348, 362 disintermediation, 338, 339 dynamic pricing, 338 e-tailer, 342 features of, 335-336 freemium revenue model, 345, 346-347 growth of, 6, 331-332, 334, 340-341 history of, 331-332 key concepts in, 337-340 location-based services, 124, 357 m-commerce, 333, 341, 356359, 362 market creator model, 342, 343 marketing, 348-351, 362 portals, 341-342 rapid application development (RAD) for, 421, 437 revenue models for, 362 sales revenue model, 344 sales statistics, 331, 332 service provider model, 342, 343 social e-commerce, 351-353 social media and, 360-361 social networking and, 342, 343-344, 347-348 social shopping, 347 subscription revenue model, 345 transaction broker model, 342, 343 transaction fee revenue model, 345 types of, 341 Web site visitor tracking, 349350 e-commerce presence, 360-361, 362 e-commerce revenue models, 344347 e-government, 55 E-Government Act of 2002, 120 e-mail, 234 as collaboration tool, 60 as electronic evidence, 274 as marketing tool, 349 security challenges of, 263 spamming, 134-135, 267 viruses and, 264, 265, 289 E-Mail Threats and Harassment Act, 270 e-Rater See Electronic Essay Rater e-readers, 105, 155 e-tailer, 342 EC2 (Amazon), 159 ECM See enterprise content management Economic Espionage Act, 270 EDI See electronic data exchange EdX, 402-404 efficient customer response system, 80 Elastic Compute Cloud (Amazon), 159 electronic business See e-business electronic commerce See e-commerce Electronic Communications Privacy Act of 1986, 120, 270 electronic data exchange (EDI), 354 Electronic Essay Rater (e-Rater), 402 electronic evidence, 274 electronic medical records system (EMR system), 33-35 electronic payment systems, 280 electronic records management, 273-274, 289 employee relationship management (ERM), 313, 321 employees computer crime by, 272 mobile device security, 286 monitoring Internet behavior, 119, 120, 234-235, 236-237 employment See jobs; work EMV technology, 268, 269 encryption, 283-284, 286, 289 end-user development, 416-417 end users, 66 enterprise applications, 52-55, 67 business intelligence in, 321 challenges, 319, 322 customer relationship management (CRM) systems, 54, 67, 81, 84, 312-318, 321 defined, 52 enterprise systems, 53 intranets and extranets, 55, 67 knowledge management systems (KMS), 54-55, 67 new technologies, 320-321, 322 social CRM, 320 supply chain management (SCM) systems, 53-54, 67, 84, 250, 304-312, 319, 321 enterprise content management (ECM) systems, 392-393, 398 enterprise resource planning (ERP) systems, 53 enterprise social networking tools, 63 enterprise software, 302-303, 321 enterprise solutions, 320 enterprise suites, 320 enterprise systems, 53, 301-304, 321 business value of, 303-304 defined, 301-302 enterprise-wide knowledge management systems, 392, 398 entertainment, online, 334 entities, 188 entity-relationship diagram, 190, 193, 208 equity, in access in digital world, 135 ergonomics, 436 ERM See employee relationship management ERP systems See enterprise resource planning (ERP) systems ESS See executive support systems Ethernet, 227 ethical analysis, 117-118 ethical and moral issues ethical analysis, 117-118 information systems and, 111113, 138 judgment lapses by senior managers, 111-112 liability, 114, 130-131 monitoring employee Internet behavior, 119, 120, 234-235, 236-237 quality of life, 114, 132-138 safe harbor, 122-123 spyware, 125, 266, 271 technology trends that raise ethical issues, 114-117 ethical “no free lunch” rule, 119 ethical principles, 118-119, 138 ethics basic concepts, 117-118 defined, 112 principles, 118-119, 138 professional codes of conduct, 119 See also ethical and moral issues European Directive on Data Protection, 122-123 European legislation privacy laws, 120, 122 spamming, 134 evil twins, 270 Exalytics (Oracle), 200 Excel (Microsoft), 165, 166, 186, 382 exchanges, 356 executive support systems (ESS), 50, 67, 383-384 expert systems, 385-387 exports, globalization and, 10 Extensible Markup Language See XML extranets, 17, 55, 67 “eyeballs”, 333 Facebook, 5, 7, 57, 70, 82, 86, 117, 119, 124, 130, 136, 142-144, 155, 160, 165, 170, 198, 199, www.downloadslide.com I-8 206, 236, 237, 242, 244, 245, 255-257, 264, 320, 333, 334, 335, 341, 342, 344, 347, 352, 357, 359, 362, 365-367, 376, 380, 420 Facebook Graph Search, 242, 257 Facebook “Spam King”, 135 Facebook Sponsored Stories, 256 Facebook Tag Suggest, 242 Facetime (Apple), 61 facial recognition technology, 242, 280 Fair credit Reporting Act of 1970, 120 Fair Information Practices (FIP), 120-121 families, maintaining boundaries: family, work, and leisure, 132-133 Family Educational Rights and Privacy Act of 1974, 120 “family” time, 132-133 fault-tolerant computer systems, 285 feasibility study, 411 Federal Managers Financial Integrity Act of 1982, 120 feedback, 13, 14 fiber-optic cable, 229 field, 188 Fieldf/x (video system), file sharing, 58, 129 File Transfer Protocol See FTP finance, information systems jobs in, 25, 30 Financial Modernization Act of 1999 (Gramm-Leach-Bliley Act), 120, 122, 274 financial performance, collaboration and, 59 financial services, 88 e-commerce model, 343 Gramm-Leachy-Bliley Act, 120, 122 investment workstations, 397 fingerprints, for identity management, 280 FIP See Fair Information Practices Firefox (Mozilla), 164, 167 firewalls, 281-282, 289 Fireware Surfboard Custom Board Design (CBD) system, 396 first mover status, 90 Flame (worm), 293 Flash (plug-in), 167 Flash cookies, 125 flash drives, 154 Flickr (Web site), 243, 345 folksonomies, 394 Ford Immersive Virtual Environment, 395 forecasting (data analysis), 202 foreign key, 189 formal planning and tools, 433, 437 4G networks, 246 Foxbase Pro, 186 franchisers, 92, 93 Freedom of Information Act of 1966, 120 Index freemium revenue model, 345, 346-347 FTP (File Transfer Protocol), 234 functional systems, 45 Fusionware (Oracle), 320 fuzzy logic, 387-389, 398 Gantt chart, 433, 434, 437 GDSS See group decision-support system general controls, 275 genetic algorithms, 390-391, 398 geoadvertising services, 357, 362 geographic information systems See GIS geoinformation services, 357, 362 geosocial service, 357, 362 Girl Scout Cookies, case study, 407-414, 431, 432 GIS (geographic information systems), 379 global business Internet and, 90-92 localization of software for, 175 system strategies and, 92-93 systems configurations, 92-93 global competition, 90-93, 101 global reach, of e-commerce, 335, 336 Global Study on Mobility Risks, 287 global supply chain, 308, 310 Global System for Mobile Communications See GSM globalization, 10-11, 29 global supply chain, 308, 310 Internet and, 91-92 IS project development on a global scale, 436 Gmail, 126, 155, 287 Golden Rule, 118 Gondad exploit kit, 294 Google, 6, 77, 82, 105, 110, 117, 122, 124, 125, 126, 129, 132, 160, 163, 165, 169, 180, 215, 239-242, 244, 245, 255-257, 294, 332, 333, 334, 340, 341, 342, 343, 344, 345, 352, 357, 359, 373 Google +, 5, 61-62, 245, 256, 330, 342, 344, 347, 352, 366 Google+ Hangouts, 61, 62 Google +1, 242 Google AdMob, 357-358 Google AdSense, 126, 255, 344 Google AdWords, 255, 344 Google Apps, 7, 61, 155, 159, 166, 170, 342 Google Chat, 61 Google Chrome, 163, 167, 169 Google Docs, 61 Google DoubleClick, 115, 123, 255, 344, 349 Google Drive, 61, 287 Google Flu Trends, 215 Google Glass, 397 Google Insights for Search, 203 Google iRiver Story, 105 Google MapReduce, 199 Google Maps, 80, 170, 256 Google Penguin (algorithm), 241 Google Produce Search, 243 Google Search, 126 Google Sites, 7, 61 Google Talk, 234 Google Trends, 203 Gramm-Leach-Bliley Act (Financial Modernization Act of 1999), 120, 122, 274 Graph Search (Facebook), 242 graphical user interface (GUI), 162 green computing, 159, 160-161 grid computing, 152 group decision-support system (GDSS), 385, 398 groupware, 62 GSM (Global System for Mobile Communications), 246, 252 GUI See graphical user interface hacking, 259-260, 266, 288-289 botnet attacks, 133, 267 denial-of-service (DoS) attacks, 267, 288-289 on mobile devices, 287 smartphones and, 264, 287 sniffers, 267, 280 spamming, 134-135, 267 spoofing, 266-267 wireless networks and, 263 Hadoop (Apache), 199-200, 214, 215, 216 Hadoop Distributed File System (HDFS), 199 Hadoop MapReduce, 199 HANA See High Performance Analytics Appliance handheld devices See mobile devices handwriting-recognition devices, 156 Hangouts, 61 hard drives, 154 hardware, 149-151 about, 17 capacity planning, 170-171 controls, 276 hubs, 223 microprocessors, 159, 161 modems, 226 for networking, 223, 226 routers, 223 scalability, 171 security challenges, 262 servers, 151-152, 153, 176, 227 system design and development, 413 trends in, 154-162, 176 See also computers HBase (Hadoop), 199 HDFS See Hadoop Distributed File System health information, HIPPA legislation, 120, 122, 274 Health Insurance Portability and Accountability Act of 1996 (HIPAA), 120, 122, 274 health risks of computing, 137-138 hertz, 228 high-level structure chart, 423 High Performance Analytics Appliance (SAP), 200 high velocity automated decision making, 374-375 HIPAA See Health Insurance Portability and Accountability Act of 1996 Hong Kong, cyberwarfare by, 272 hotspots, 247 HTML (Hypertext Markup Language), 167, 176, 238 HTML5, 167, 419 HTTP (Hypertext Transfer Protocol), 238-239 hubs, 223 hybrid cloud, 172 HyperPlant (DuPont), 397 Hypertext, 238-239 Hypertext Markup Language See HTML Hypertext Transfer Protocol See HTTP iAd platform (Apple), 357 IBM Cognos Business Intelligence, 204 IBM Connections, 63 IBM InfoSphereBigInsights, 214 IBM Lotus Connections, IBM Lotus Notes, 60, 62-63, 64, 243 IBM Lotus Quickr, 62 IBM Lotus Sametime, 62 IBM My MobileHub, 174 IBM Netezza, 200 IBM Sametime, 234 IBM SmartCloud Application Services, 159 IBM SmartCloud for Social Business, 63 IBM WebSphere, 168, 427 iCloud (Apple), 174 identity management, 277, 280281, 289 identity theft, 270-271 Illustrator (Adobe), 169 ILOVEYOU (malware), 265 IM See instant messaging Immanuel Kant’s Categorical Imperative, 118 implementation, 373 change management, 23, 432436 conversion, 414 defined, 432 new system design and development, 413-414 in problem solving, 23 implementation controls, 276 imports, globalization and, 10 Improving Critical Infrastructure Cyber Security Executive Order, 293 in-memory computing, 200 Incentive Compensation module (Oracle), 99 InDesign (Adobe), 165 India cyberwarfare and, 271-272, 294 www.downloadslide.com Index outsourcing to, 418 indirect goods, 355 Indonesia, cyberwarfare in, 294 Industrial Revolution, 10 inference engine, 386 InfoFree (website), 140 information defined, 13, 14 searching the Web, 239-240 See also data Information Age, moral dimensions of, 114 information asymmetry, 338 Information Builders WEBFOCUS, 416 information density, of e-commerce, 335, 337 information policy, 207, 210 information requirements, 410 information rights, 114, 120-127 See also privacy; property rights information systems (IS) about, 5-6, 29 auditing, 279, 289 balancing power in IS decision making, 132 business objectives and, 11-13, 101 business processes and, 42 business roles of, 44-45 business uses of, 6-7, 67 BYOD, 155, 173, 174-175, 286, 287-288, 421 careers in, 25-28, 30 competition and, 77-90 controls, 275, 276 criminal fraud, 111, 112 customer and supplier intimacy, 11-12, 81, 82 data flow diagram (DFD), 422 and decision making, 12 defined, 13 described, 13-15 design and development See information systems development designing and building new systems, 410-436 employment in, 10 ethical and moral issues and, 111-113, 138 functions of, 14, 65-66, 67 globalization and, 10-11, 29 literacy, 15 low-cost leadership and, 80, 82 market niche and, 81, 82 organizations and, 15, 16, 29 people and, 15, 16-17, 29 performance level, 131-132 problem solving in, 18, 21-24 product differentiation, 80-81, 82 for quality improvement, 94-96 quality of life, 114, 132-138 risk assessment, 275-277, 289 security See information systems (IS) security security policy, 277-278, 289, 290 I-9 supply chain management and, 306 system availability, 285 system quality, 114, 131-132 systems-building approaches, 410-419 systems development lifecycle (SDLC), 414-415, 436-437 technology and, 15, 17, 29 information systems audit, 279, 289 information systems controls, 275, 276 information systems department, 65-66 information systems (IS) development on a global scale, 436 application software packages for, 417, 437 cloud-based platforms, 425, 437 component-based development, 425 computer-aided software engineering (CASE), 425 data flow diagram (DFD), 422 end-user development, 416-417 evaluating and choosing solutions, 411, 437 feasibility study, 411 implementation, 412-414 information requirements, 410 information systems plan, 429, 430 mobile applications, 419-421 organizational impact analysis, 436 outsourcing, 27, 172, 417-419, 437 problem solving, 409-419, 436 project benefits, 428, 429 project costs, 428-429 project management, 425-436, 437 project risk, 431, 433 prototyping, 415-416, 437 structured methodologies, 422423 system testing, 413 systems development lifecycle (SDLC), 414-415, 436-437 information systems literacy, 15 information systems managers, 65 information systems plan, 429, 430 information systems (IS) security auditing, 279, 289 authentication, 280-281, 289 business continuity planning, 278-279 business value of, 273-274 BYOD, 155, 173, 174-175, 286, 287-288, 421 cloud computing, 285-286, 287, 289 data breaches, 259-260, 259270 disaster recovery planning, 277-279 encryption, 283-284, 286, 289 ensuring system availability, 285 firewalls, 281-282, 289 hackers, 259-260, 263, 264, 266, 288-289 identity management, 277, 280281, 289 information systems controls, 275, 276 intrusion detection systems, 282, 289 mobile platforms, 286, 287-288 outsourcing, 285 passwords, 259-260, 280, 289 public key infrastructure (PKI), 284 risk assessment, 275-277, 289 security challenges, 262 security policy, 277-278, 289, 290 smartphones, 286, 287 tools for protecting information resources, 279-285, 289 Unified Threat Management (UTM) systems, 282-283 vulnerability, 133, 261-263, 288 Wi-Fi networks, 263, 264, 266, 283, 289 wireless networks, 263, 283 WPA2 (Wi-Fi Protected Access 2), 283 information technology (IT), 13 business objectives and, 79 BYOD, 155, 173, 174-175, 286, 287-288, 421 consumerization of, 155-156 ethics and, 111-113 information technology (IT) infrastructure about, 17-18, 148 autonomic computing, 161 capacity planning, 170-171 case study, 147-148 cloud computing, 6, 7, 158159, 160-161, 176, 180-182 cloud services, 172 components, 150-151, 176 data centers, 149, 160 data management technology, 151 green computing, 159, 160-161 input and output devices, 154, 156 nanotechnology, 156-157 networking and telecommunications technology, 151 outsourcing, 27, 172 quantum computing, 157 scalability, 171 storage technology, 154, 176 technology services, 151 total cost of ownership (TCO), 171, 177 using technology service providers, 171-172 virtualization, 149, 157-158, 160 See also computers; computing; hardware; information systems; information systems security; software informed consent, 122 InfoSphereBigInsights (IBM), 214 inheritance, 424 innovation, 57, 59 InnovationNet (intranet), 88 input, 13, 14 input controls, 275 input devices, 154, 156 Insights for Search (Google), 203 Instagram, 245 instant messaging (IM), 60, 234, 263 intangible benefits, 428 intellectual property, 127, 338, 342-343 intellectual property rights, 114, 127-130, 139 challenges to, 129 copyright, 128, 130 patents, 128-129 trade secrets, 127 intelligence, 373 intelligent agent shopping bots, 243 intelligent agents, 391-392 intelligent techniques for decision support, 385-392, 398 interactive dashboards, 7, 50, 53, 300, 376, 377 interactivity, of e-commerce, 335, 336 interface technologies, 162-163 internal supply chain, 306 Internet, 228-245 about, 17, 228-229, 251 “App Internet”, 245 architecture and governance, 231, 232 blogging, 58, 243 competition and, 82-83 copyright and, 129 cyberterrorism and cyberwarfare, 271-272, 293-296 Domain Name System (DNS), 230, 251 as example of client/server computing, 224 future of, 233, 245 global supply chain, 308, 310 globalization and, 91-92 growth of, 5-6 HTML, 167, 176, 238 HTTP, 238-239 hypertext, 238-239 information asymmetry, 338 intellectual property rights and, 129, 139 Internet connection methods, 229 “Internet of Things”, 245, 251 Internet2, 233 IPv6, 233 ISPs, 228-229, 232 mobile devices, 155 monitoring employee Internet behavior, 119, 120, 234-235, 236-237 music, video, TV services, 90 www.downloadslide.com I-10 net neutrality, 232-233 privacy and, 123, 125-127 search engines, 238-239, 244245 security challenges and vulnerabilities, 262-263, 288 supply chain and, 311 URL, 239 use statistics, 332 virtual private networks (VPNs), 238, 252 Wi-Fi, 247-248, 252, 263, 264, 266, 283, 289 wikis, 58, 60, 243-244, 264 See also e-commerce; social networking; Web; Web sites Internet advertising, 6, 25, 334 Internet-driven supply chain, 311 Internet Explorer (Microsoft), 126, 167 Internet Information Services (Microsoft), 239 Internet IP addresses, 229-230, 251, 281 Internet layer, 226 “Internet of Things”, 245, 251 Internet Protocol addresses See IP addresses Internet Protocol version See IPv6 Internet security threats botnet attacks, 133, 267 click fraud, 271 cyberwarfare, 271-272, 293296 denial-of-service (DoS) attacks, 267, 288-289 global threats, 271-272 hackers, 259-260, 263, 264, 266, 288-289 identity theft, 270-271 internal threats from employees, 272 keyloggers, 266 malicious software (malware), 263-266 pharming, 270 sniffing, 267, 280 software bugs, 131-132, 272273, 289 software vulnerability, 272-273 spamming, 134-135, 267 spoofing, 266-267 spyware, 125, 266, 271 SQL injection attacks, 266 Trojan horses, 265-266, 294 vulnerabilities, 261-263, 288 war driving, 263 worms, 263-264, 265, 289 See also computer crime Internet service providers See ISPs Internet services, 233-238, 251 Internet2, 233 interorganizational systems, 54 intersection relation, 190 intranets, 17, 55, 67 intrusion detection systems, 282, 289 Intuit QuickBase for Corporate Workgroups, 408 Index inventory forecasting, 300 inventory management, 309 investment workstations, 397 iOS, 163, 420 IP addresses, 229-230, 251, 281 iPad (Apple), 7, 8, 105, 129, 151, 155, 161, 173, 247, 255, 256, 286, 287, 341, 343, 358 iPhone (Apple), 6, 7, 8, 91, 124125, 129, 151, 154-155, 161, 162-163, 170, 173, 232, 247, 255, 256, 287, 296, 333, 343, 356, 358, 376, 419 iPhone Keychain, 287 iPod (Apple), 80, 81, 89, 129, 136, 255, 343, 358 IPv6 (Internet Protocol version 6), 233 Iran, cyberwarfare and, 293, 294, 295 iRiver Story (Google), 105 IS See information systems ISPs (Internet service providers), 228, 232 Israel, cyberwarfare and, 293 IT See information technology Itsoknoproblembro (malware), 293 iTunes (Apple), 42, 44, 77, 81, 82, 110, 129, 340, 342, 344, 346, 359 Izzad-Din al-Qassam Cyber Fighters, 293 JAD See joint application design Japan, cyberwarfare by, 271-272 Java (programming language), 164-165, 167, 176 JD Edwards EnterpriseOne ERP system (Oracle), 309 Jive (software), 63, 71 jobs globalization and, 10, 29 in information systems, 25-28 outsourcing and offshoring, 27, 172 reengineering job loss, 135 See also work join operation (relational DBMS), 194 join table, 190 joint application design (JAD), 421, 437 just-in-time strategy, 5, 306 K2 BlackPearl, 421 Kaboodle, 347 Kaspersky (software), 286 Kazakhstan, cyberwarfare by, 272 key field, 188-189 key performance indicators (KPIs), 383-384 keyboard, 156 keyloggers, 266 “kickbucks”, 359 Kickstarter.com, 343, 348 Kindle (Amazon), 7, 105, 129, 155, 341, 356 Kindle Fire (Amazon), 256, 358 knowledge base, 386 knowledge management (KM), 392 knowledge management systems (KMS), 54-55, 67, 392-397 enterprise content management (ECM) systems, 392-393, 398 knowledge network systems, 393-394, 398-399 knowledge work systems (KWS), 394-395, 399 knowledge network systems, 393394, 398-399 knowledge work systems (KWS), 394-395, 399 knowledge workers, 43 KPIs See key performance indicators laptop computers, 149 Latvia, cyberwarfare by, 272 law of diminishing returns, 88 lead generation, 349 learning management systems (LMS), 394 legacy systems, 151 legal issues computer forensics, 274-275 content pirating, 109-111 electronic evidence, 274 liability, 114, 117, 130-131, 273 privacy, 120-127 legislation See European legislation; U.S legislation leisure, maintaining boundaries: family, work, and leisure, 132-133 liability, 114, 117, 130-131 computer-related liability problems, 130-131 of inadequate security and control, 273 “link farms”, 241 LinkedIn, 244, 259-261, 264, 320, 334, 344, 347, 352 Linux, 13, 152, 157, 163, 164, 176, 223 LMS See learning management systems local area networks (LANs), 150, 227-228, 247, 251, 252 local marketing, 333 localization, of software for global business, 175 location analytics, 379 location-based services, 124, 357 logical view, 193 long tail marketing, 348 Long Term Evolution See LTE Longitude (software), 245 “look and feel” copyright infringement, 128 Lotus Connections (IBM), Lotus Notes (IBM), 60, 62-63, 64, 243 Lotus Quickr (IBM), 62 Lotus Sametime (IBM), 62 low-cost leadership, 80, 82 LTE (Long Term Evolution), 246 Lync (Microsoft), 61 m-commerce about, 333, 341, 356-359, 362 growth of, 356 smartphones, 333, 341, 356359, 360 tablets, 360 magnetic disks, 154 magnetic tape storage, 154 mainframe computers, 152, 176 maintenance, 414 malware (malicious software), 133, 263-266 antisypware, 282 antivirus software, 282, 289 cyberwarfare, 293 drive-by downloads, 264 keyloggers, 266 for smartphones, 264 spyware, 125, 266, 271 SQL injection attacks, 277 Trojan horses, 265-266, 294 viruses, 263, 264, 265, 289 for Wi-Fi, 263, 264, 266 for wireless networks, 263 worms, 263-264, 265, 289 managed security service providers (MSSPs), 285 management information systems jobs in, 26 levels of, 43 management hierarchies, 42-43 management information systems (MIS) about, 46-47, 67, 398 defined, 15, 46 globalization and, 10-11, 29 what’s new in, 6-7 managers, 16-17 Manager’s Briefcase (iPad app), MANs See metropolitan area networks MapReduce, 199 market creator model, 342, 343 market entry costs, 335 market niche, 81, 82 marketing about, 333, 366 CRM system support of, 314315 direct marketing, 378 e-commerce, 348-351, 362 information systems jobs in, 25, 30 local marketing, 333 long tail marketing, 348 mobile marketing, 333 online marketing, 333, 335 search engine marketing, 240241, 349 social marketing, 58, 333 social media for, 352 targeted marketing, 204 marketing managers, 26 marketspace, 335 mashups, 169-170, 243 mass customization, 81 massive open online courses (MOOCs), 394, 402-404 master boot record (MBR), 293, 294 www.downloadslide.com Index MBR See master boot record McAfee (software), 264, 286 MDM software See mobile device management (MDM) software media, interactive models of, 334 media consumption, academic performance and, 136-137 medical records, electronic medical record systems (EMR), 33-35 Melissa (malware), 265 membership functions, 387 menu costs, 338 metrics, 288 metropolitan area networks (MANs), 227, 228, 251, 252 MICR (magnetic ink character recognition), 156 microblogging, 243 micropayment systems, 344 microprocessor chips, 90 microprocessors, 159, 161 Microsoft, 7, 57, 90, 117, 124, 125, 126, 128, 132, 160, 168, 179, 180, 200, 233, 242, 244, 303, 359, 375 Microsoft Access, 166, 186, 193, 194, 196, 408 Microsoft Advertising, 123 Microsoft Azure, 425 Microsoft Azure SQL Database, 197 Microsoft Bing, 239, 240, 341, 342 Microsoft Dynamics suite, 320 Microsoft Excel, 165, 166, 186, 382 Microsoft Internet Explorer, 167 Microsoft Internet Explorer 10, 126 Microsoft Internet Information Services (IIS), 239 Microsoft Lync, 61 Microsoft NET, 168 Microsoft Office, 13, 166 Microsoft Office Project, 435 Microsoft Outlook, 166 Microsoft PowerPoint, 166 Microsoft SharePoint, 62, 72 Microsoft SharePoint Server 2010, 38 Microsoft SharePoint Services, Microsoft Silverlight, 167, 418 Microsoft SkyDrive, 61 Microsoft SQL Server, 193, 194, 197 Microsoft Windows, 152, 163, 164, 176 Microsoft Windows Server, 163, 223, 228 Microsoft Word, 165, 166, 169 Microsoft Xbox Live, 345 Microsoft Yammer, 63, 72 middle management, 43, 58 business intelligence systems for, 46, 376 decision making by, 373 decision support for, 381 military services, IT infrastructure, 147-148 I-11 MIS See management information systems mobile advertising, 256, 357-358 mobile applications, business use of, 8-9 mobile commerce See m-commerce Mobile Device Management (AirWatch), mobile device management (MDM) software, 173, 175 mobile devices, 6, 7, 154-155 growth of, 6, 255 m-commerce, 333, 341, 356359 malware and, 264 search, 240 security, 286, 287-288 security challenges, 262 mobile digital platform, 6, 7, 154155 developing apps for, 419 IS design for multiscreen world, 419-421 managing, 173, 175 mobile workers, 8-9 search, 240 security, 262, 286, 287-288 mobile e-commerce See m-commerce mobile marketing, 333 mobile technologies, wireless sensor networks, 248, 250-251, 252 mobile Web apps, 419 mobile Web site, 419 mobile workers, 8-9 modeling, object-oriented, 424, 437 modems, 226, 227 money transfer companies, 99-100 MongoDBopen source NoSQL database, 197 monitors, 156 MOOCs See massive open online courses moral issues in the Information Age, 114, 120-138 See also ethical and moral issues mouse (computer), 156 movie industry, 340 Mozilla Firefox, 164, 167 MSSPs See managed security service providers multicore processor, 161 multidimensional data analysis, 201, 202, 382 multinational strategy, 92, 93 multitiered client-server networks, 153 multitouch interface, 162-163 music industry, 44, 129, 346-347 My MobileHub (IBM), 174 MyDoom A (malware), 265 MyFord Touch interface, 85 MySimon (shopping bot), 243 MySpace, 334, 347 MySQL (software), 193, 197 N-tier client-server networks, 153 NAI See Network Advertising Initiative nanotechnology, 156-157 NAT See Network Address Translation National Information Infrastructure Protection Act of 1996, 270 native apps, 419 net marketplaces, 354-355, 362 net neutrality, 232-233 netbooks, 155 Netezza (IBM), 200 Netflix, 109, 129, 131, 232, 233, 236, 331, 340, 345, 348, 378 Netscape.com, 331 NetSuite (software), 320 NetWeaver (SAP), 317 Network Address Translation (NAT), 282 Network Advertising Initiative (NAI), 126 network-based strategies, 88-89, 101 network economics, 88-89 network interface controller (NIC), 263 Network Interface layer, 226 network notification, 352 network operating system (NOS), 223 network service providers, 231 network switches, 223 networked systems, 93 networks and networking about, 17, 152-153, 221, 222223, 251 bandwidth, 228 Bluetooth, 246-247, 252, 263, 266 broadband connections, 222, 229 centralized processing, 152 circuit-switched networks, 224 client/server computing, 152, 224, 227, 238 components of simple network, 222, 251 controlling network traffic, 285 data breaches, 259-270, 270, 271, 287 deep packet inspection (DPI), 285 defined, 222 digital vs analog signal, 226 distributed processing, 152 employees and computer crime, 272 encryption, 283-284, 286, 289 hotspots, 247 in large companies, 223, 224 local area networks (LANs), 150, 227-228, 247, 251, 252 metropolitan area networks (MANs), 227, 228, 251, 252 packet switching, 224-225 personal area networks (PANs), 246, 252 RFID, 220, 221, 248-250, 252 storage area networks (SANs), 154, 155, 176 storage networking, 154 TCP/IP, 225-226, 251 technologies for, 223-226 transmission media, 228, 229, 251 transmission speed, 228 trends in, 221-226 types of networks, 227-228, 251 virtual private networks (VPNs), 238, 252 VoIP, 235, 237, 252, 262 Web servers, 153 Wi-Fi, 247-248, 252, 263, 264, 266, 283, 289 wide area networks (WANs), 227, 228, 251 WiMax, 246, 248, 252 wireless networks, 246-251, 252, 263 wireless sensor networks, 248, 250-251, 252 See also computer crime; Internet; Internet security threats; Web neural networks, 389-390, 398 newsgroups, 234 newspapers, 5, 334 Nexus (Google), 105 Nexus tablet, 256 NIC See network interface controller Nilson Report, 267 “no free lunch” rule, 119 non-relational database management systems, 196 non-relational databases, 196-197, 208 nonobvious relationship awareness (NORA), 116 Nook (e-reader), 105 NORA See nonobvious relationship awareness normalization, 191, 208 North Korea, cyberwarfare and, 294-295 NOS See network operating system NoSQL Database (Oracle), 197 “NoSQL” non-relational-database technology, 196 Novell Open Enterprise Server, 223 object, 164 object-oriented development, 423425 Odad.a (malware), 266 OF Biz (Open for Business), 320 Office (Microsoft), 13, 166 Office Project (Microsoft), 435 offshore outsourcing, 27, 172, 418419 OLAP See online analytical processing OMS See order management system on-demand computing, 159 www.downloadslide.com I-12 online advertising, 6, 25, 334 online analytical processing (OLAP), 201, 210, 316, 375, 382 online auction markets, 343 online collaboration, 6, online entertainment, 334 online marketing, 333, 335 online meeting tools, 61 Online Privacy Alliance, 126 online transaction processing, 285 ooVoo, 61 Open Enterprise Server (Novell), 223 Open for Business (OF Biz), 320 open source software, 164, 169, 320 Openbravo (software), 320 OpenEdX, 404 OpenOffice (software), 166 operating system, 163-164, 176 operating system software, 162164, 176, 227 operational customer relationship management (CRM), 316, 321 operational excellence, as organizational objective, 11 operational management, 43, 373, 376, 381 operations management, information systems jobs in, 26, 30 opt-in policy, 121, 126 opt-out policy, 121, 126 optical character recognition, 156 optical discs, 154 Oracle Business Intelligence Enterprise Edition, 321 Oracle Database, 193, 194, 197 Oracle Database Cloud Services, 197 Oracle Demantra Demand Management software, 309 Oracle E-Business Suite, 99, 320 Oracle Exalytics, 200 Oracle Fusionware, 320 Oracle Incentive Compensation module, 99 Oracle JD Edwards EnterpriseOne ERP system, 309 Oracle NoSQL Database, 197 Oracle Transportation Management system, 308, 310 order fulfillment, business processes, 41-42 order management system (OMS), 19 organization perspective, in problem solving, 24 organizational culture, 16 organizational dimension of information systems, 15, 16, 29 organizational impact analysis, 436 organizational politics, 16 organizations businesses processes, 16 culture of, 16 hierarchy in, 16 information systems and, 15, 16 Index OS X (Apple), 163, 176 outcomes measurement, about, 23 Outlook (Microsoft), 166 output, 13, 14 output controls, 275 output devices, 154, 156 outsourcing about, 27, 172, 285, 417-419, 437 domestic outsourcing, 417 offshore outsourcing, 27, 172, 418-419 PaaS See Platform as a Service packet filtering, 282 PageRank System (Google), 90, 240 Pandora, 85, 129, 236, 345, 346347 Pandora One, 346 PANs See personal area networks parallel strategy, 414 parametrized reports, 377 partner relationship management (PRM), 313, 321 passwords, 259-260, 280, 289 patches, 273 patents, 128-129 payload (viruses), 263 payment processing infrastructure, security and, 268-269 payroll processing case study, New York City, 441-442 high-level structure chart for, 423 transaction processing system for, 45-46 peer-to-peer architecture, 227, 228, 263 pen-based input, 156 Penguin (algorithm), 241 people dimension of information systems, 15, 16-17, 29 people perspective, in problem solving, 24 People’s Liberation Army (P.L.A., China), 294 peripheral devices, 154 personal area networks (PANs), 246, 252 personal computers (PCs), 90, 151 personal information business value of security, 273 data breaches, 259-270, 270, 271, 287 identity theft, 270 privacy legislation, 120-122 personalization, of e-commerce, 335, 337, 350 PERT charts, 433, 435, 437 pharming, 270 phased approach, 414 phishing, 133, 270 photography, 44, 90 physical view, 193 Pinterest, 243, 245, 329-330, 347, 352 The Pirate Bay (website), 110 pirated content See content pirating pivot table, 382, 383 Pixar Wiki, 244 PKI See public key infrastructure platform, 17 Platform as a Service (PaaS), 425 Plex Online (software), 320 podcasting, 343 Point-to-Point Tunneling Protocol See PPTP Poland, cyberwarfare by, 272 political issues in an information society, 113114, 138 See also ethical and moral issues portal (in executive support system), 50 portals (e-commerce), 341-342 Porter’s competitive forces model, 78-79, 83, 101 portfolio analysis, 429, 431 Post Sales Order Management System (UPS), 19 power, balancing power in IS decision making, 132 Power Usage Effectiveness (PUE), 160 Power4Merch (iPhone app), PowerPoint (Microsoft), 166 PPTP (Point-to-Point Tunneling Protocol), 238 prediction markets, 348 predictive analytics, 377-378 presence technology, 237 presentation graphics software, 166 price discrimination, 337 price transparency, 337, 362 primary activities, business value chain model, 83 primary key, 188 printers, 156 PRISM, 117-118 privacy, 120-127, 139 behavioral targeting, 121, 124125, 126, 348-349 cookies, 123, 125 Facebook and, 143 Internet challenges to, 123, 125-127 monitoring employee behavior, 119, 120, 234-235, 236-237 profiling, 115 spyware, 125, 266, 271 tracking files, 115, 123, 125 Web tracking, 125 Privacy Act of 1974, 120 Privacy Protection Act of 1980, 120 private cloud, 159 private exchange, 354 private industrial networks, 354, 355 PRM See partner relationship management problem, model of problem-solving process, 21-23, 30 problem solving about, 18, 409 approach, 18, 21 critical thinking in, 23-24 system building and, 409-419, 436 See also systems analysis process specifications, 423 processing, 13 processing controls, 275 processors, 159, 161 procurement, 354 product differentiation, 80-81, 82 production, 414 production reports, 377 production workers, 43 productivity, collaboration and, 59 productivity tools, 165 professional codes of conduct, 119 professional jobs, 56 Professionals Against Machine Scoring of Student Essays in High-Stakes Assessment, 402 profiling, 115 programmers, 65 programming, outsourcing and offshoring, 27, 172 programming languages, for business, 164-165, 176 project, defined, 427 project costs, 428-429 project management, 425-436, 437 case study, 426-427 change management, 23, 432436 defined, 427 documentation, 413, 433 Gantt chart, 433, 434, 437 overcoming user resistance, 435 PERT charts, 433, 435, 437 project risk, 431, 433 scope, 428 software for, 435 project operation (relational DBMS), 194 project risk, 431, 433 property rights See intellectual property rights protocols, 225 prototyping, 415-416, 437 public cloud, 159 Public Company Accounting Reform and Investor Protection Act of 2002, 274 public key encryption, 283, 284 public key infrastructure (PKI), 284 PUE See Power Usage Effectiveness pull-based model, 310, 311 push-based model, 310, 311 Python (programming language), 165 quality benchmarking, 94 collaboration and, 59 cycle time and, 94 data quality, 132, 139, 207-208, 211 of decisions, 374, 375 www.downloadslide.com Index defined, 93 information systems to improve, 94-95 six sigma, 94 system errors, 131-132 system quality, 131-132 total quality management (TQM), 94 quality of life, 114, 132-138 quantum computing, 157 Quark Xpress, 165 QuickBase for Corporate Workgroups (Intuit), 408 RAD See rapid application development radio frequency identification See RFID rapid application development (RAD), 421, 437 real estate Web sites, 170 record industry, 339-340 records retention, 6, 12-13 recovery-oriented computing, 285 Reddit, 330 referential integrity rules, 191 referral capacity, 330 relational database, 188-190, 208 relational database management systems, 194, 195 Relational Database Service (Amazon), 197 relations (database), 188 Reloaded Games (software), 291 remote work programs, repetitive stress injury (RSI), 137138 report generator, 196 Request for Proposal (RFP), 417 responsibility, 117 responsive Web design, 419 retailing, 76 reusable software components, 425, 437 revenue models, for e-commerce, 344-347, 362 RFID (radio frequency identification), 220, 221, 248-250, 252 RFP See Request for Proposal Rhapsody, 110 rich media, for marketing, 349 richness, of e-commerce, 335, 336 Right to Financial Privacy Act of 1978, 120 RightMedia (Yahoo), 349 risk, health risks of computing, 137-138 risk assessment, 275-277, 289 Risk Aversion Principle, 119 Rocket (e-reader), 105 Romania, cyberwarfare by, 272 routers, 223 rows (database), 188 RSI See repetitive stress injury RSS, 243 Ruby (programming language), 165 rule of change, 118-119 Russia cyberwarfare by, 272 I-13 outsourcing to, 418 S-HTTP (Secure Hypertext Transfer Protocol), 283 S3 (Amazon), 159 SaaS See Software as a Service Safari browser, 167, 419 safe harbor, 122-123 sales force automation (SFA), 313314 sales revenue model, 344 Salesforce Chatter, 63, 72 Salesforce CRM, 72 SANs See storage area networks SAP APO system, 300, 301 SAP Business ByDesign, 320 SAP Business Objects, 321 SAP Business Objects Web Intelligence, 209 SAP Business One Cloud, 320 SAP Business Suite, 320 SAP BusinessObjects Dashboards, 300, 301, 317 SAP BusinessObjects Web Intelligence, 301 SAP Customer Value Intelligence, 318 SAP High Performance Analytics Appliance (HANA), 200 SAP NetWeaver, 317 SAP NetWeaver BW, 186 Sarbanes-Oxley Act (2002), 13, 154, 274 SAS Customer Intelligence software, 49 Sasser.ftp (malware), 265 Saudi Arabia, cyberwarfare and, 293, 294 scalability, 171 SCM systems See supply chain management (SCM) systems scope, 428 scorecards, 377 scoring models, 429-430 SDLC See systems development lifecycle SDN See software-defined networking search mobile devices, 240, 242 Semantic Search, 242, 244 social search, 242, 352 search costs, 335 search engine marketing, 240-241, 349 search engine optimization (SEO), 241 search engines, 238-239, 244-245 Second Life (virtual world), 60 second mover status, 90 Secure Hypertext Transfer Protocol See S-HTTP Secure Sockets Layer (SSL), 283 security business value of, 273-275, 289 defined, 261 outsourcing, 285 smartphones, 286, 287 wireless networks, 283 See also computer crime; information systems (IS) security; Internet security threats; malicious software (malware) security audits, 279, 289 security policy, 277-278, 289 select operation (relational DBMS), 194 Semantic Search, 242, 244 Semantic Web, 244-245 semistructured decisions, 372, 381382, 398 senior management, 43, 60 in collaborative culture, 60 decision making by, 373, 376 decision-making needs of, 45, 50 decision support for, 381, 383384 executive support systems (ESS), 50, 67 functions of, 45 sensitivity analysis, 381-382 sensors, 156 sentiment analysis software, 203 SEO See search engine optimization sequences (data analysis), 202 server computers, 151-154 servers, 151-152, 153, 176, 227 service level agreement (SLA), 172, 286 service-oriented architecture (SOA), 168, 322 service provider model, 342, 343 service set identifiers See SSIDs service workers, 43 SFA See sales force automation Shamoon (virus), 293 ShapeLogic Design-to-Order Live For NX, 396 shared workspaces, 58 SharePoint (Microsoft), 62, 72 SharePoint Server 2010 (Microsoft), 38 SharePoint Services (Microsoft), Sherlock (software), 62-63 shopping bots, 243 signals, digital vs analog signal, 226 SIIA See Software and Information Industry Association Silk (Amazon), 167 silos, 56 Silverlight (Microsoft), 167, 418 Simple Storage Service (Amazon), 159 SimpleDB (Amazon), 197 Siri, 256 six sigma, 94 SkyDrive (Microsoft), 61 Skype, 61, 232 SLA See service level agreement small world theory, 352 smart cards, 280, 289 “smart cities”, 379, 380, 381 SmartCloud Application Services (IBM), 159 SmartCloud for Social Business (IBM), 63 smartphones about, 246, 247, 333 behavioral targeting, 124-125 hackers and, 264 location-based services, 124, 357 m-commerce, 333, 341, 356359, 360 mobile search, 240, 242 security, 286, 287 time devoted to, 136 Web sites on, 419 sniffers, 267, 280 SOA See service-oriented architecture Sobig.F (malware), 265 social bookmarking, 394 social business about, 7, 57-58, 67 applications of, 57-58 benefits of, 58, 59 case studies, 70-72 tools and technologies, 61-65, 67 social business platforms, 61-63 social commerce, 58 social customer relationship management (CRM), 320 social e-commerce, 351-353 social engineering, 272, 280 social graph, 351-352 social issues in an information society, 113114, 138 See also ethical and moral issues social marketing, 58, 333 social media for branding and marketing, 352 customer data and, 367 e-commerce and, 360-361 growth of, 5-6 Social Media Protection Flash Poll (2011), 236 social networking about, 6, 7, 58, 244 crowdsourcing, 57, 58, 348 e-commerce and, 342, 343-344, 347-348 enterprise social networking tools, 63, 67 Facebook, 5, 7, 57, 70, 82, 86, 117, 119, 124, 130, 136, 142144, 155, 160, 165, 170, 198, 199, 206, 236, 237, 242, 244, 245, 255-257, 264, 320, 333, 334, 335, 341, 342, 344, 347, 352, 359, 365-367, 376, 380, 420 Google+, 5, 61-62, 245, 256, 330, 342, 344, 347, 352 growth of, 334 Kaboodle, 347 LinkedIn, 244, 259-261, 264, 320, 334, 344, 347, 352 malicious software, 264 MySpace, 334, 347 www.downloadslide.com I-14 Pinterest, 243, 245, 329-330, 347, 352 statistics, 70 Tumblr, 5, 245, 344, 347, 352, 366 Twitter, 7, 57, 117, 124, 130, 155, 165, 198, 199, 237, 244, 245, 256, 264, 266, 320, 334, 342, 344, 352, 357, 362, 365367, 376, 380, 420 “wisdom of crowds”, 57, 347348, 362 Yelp, 256, 345, 366, 380 social networking software, 334 social relationships, maintaining boundaries: family, work, and leisure, 132-133 social search, 242, 352 social shopping, 347 social technology about, 6, of e-commerce, 335, 337 software, 140, 162-175 about, 17 antispyware software, 282, 289 antivirus software, 282, 289 application software, 150, 164165, 176, 417, 437 automated essay scoring (AES), 402-404 blogging software, 243 bugs in, 131-132, 272-273, 289 for business intelligence, 375 capacity planning, 170-171 cloud-based software services and tools, 169-170 computer-aided design (CAD), 95, 395, 396-397 controls, 276 copyright, 128 customer relationship management (CRM) software, 313316, 320, 321 data management software, 151, 165-166 database management systems (DBMS), 193-197, 208, 210 debugging, 131-132, 288 desktop productivity tools, 165, 176 enterprise software, 302-303, 321 facial recognition software, 242 Hadoop, 199-200, 214 HTML and HTML5, 167, 176, 238, 419 intellectual property rights, 129 intrusion detection systems, 282, 289 liability issues involving, 131 localization for global business, 175 malicious software (malware), 263-266 mashups and apps, 169-170, 243 metrics, 288 mobile device management (MDM), 173, 175 mobile software, 255 Index network operating system (NOS), 223 for networking, 223 open source software, 164, 169, 320 operating system software, 162-164, 176 packages, 165 patches, 273 patents, 128 presentation graphics software, 166 project management software, 435 quality of, 288 relational DBMS, 194, 195 RFID-reading software, 250, 252 scalability, 171 sentiment analysis software, 203 social networking software, 334 Software as a Service (SaaS), 7, 169, 245, 343 software-defined networking (SDN), 223 software suites, 66 spreadsheet software, 165, 166 supply chain management (SCM) software, 307-308, 321 system quality and, 131-132 system software, 150, 162, 176 testing, 272-273, 288 trends in, 168-170, 177 types, 162, 176 use in automobile industry, 85-86 Web browser software, 166167, 238-239 Web servers, 153, 239 as Web service, 90 Web services, 167-168, 177, 425 wiki software, 244 word processing software, 165 zero defects, 272 Software and Information Industry Association (SIIA), 130 Software as a Service (SaaS), 7, 169, 245, 343 software bugs, 131-132, 272-273, 289 software-defined networking (SDN), 223 software localization, 175 software metrics, 288 software packages, 165 software patches, 273 software quality, 288 software suites, 66 solid state drives (SSDs), 154 Solutionary Security Engineering Research Team (SERT), 282 South Korea, cyberwarfare by, 271272 spamming, 134-135, 267 spear phishing, 270 spoofing, 266-267 sports, dynamic ticket pricing, Sportsvite (social network), 344 Spotify, 110, 129, 345, 346 SPOTLight (iPad app), 8-9 spreadsheet software, 165, 166 spreadsheets, 382 spyware, 125, 266, 271 See also antispyware software SQL (Structured Query Language), 194 SQL injection attacks, 277 SQL Server (Microsoft), 193, 194, 197 SSDs See solid state drives SSIDs (service set identifiers), 263 SSL See Secure Sockets Layer State of Mobile Security Report, 287 State of Mobility Report, 287 “stickiness”, 344 storage area networks (SANs), 154, 155, 176 storage networking, 154 storage technology, 154, 176 Storm (malware), 265 strategic choice, 39-40 streaming, 343, 346 structure chart, 423 structured decisions, 372-373, 398 structured knowledge, 392 structured methodologies, 422-423 Stuxnet (worm), 293, 294 subscription revenue model, 345 substitute products and services, 78-79, 83 Sun Java Virtual Machine, 165 Sun Microsystems Java, 164-165 “super cookies”, 125 supercomputers, 152 supplier intimacy, as organizational objective, 11-12, 81, 82 suppliers, 79, 81, 83 supply chain, 304-306 supply chain management, 5, 19-20 supply chain management software, 307-308, 321 supply chain management (SCM) systems, 31, 53-54, 67, 84, 250, 304-312, 319, 417 supply chain network, 391 supply chain planning systems, 307 support activities, business value chain model, 83 surface Web, 238 survival, as business objective, 12-13 switches, 223 switching costs, 81, 338 synergies, 87-88, 101 system maintenance programming, outsourcing and offshoring, 27, 172 system quality, 114, 131-132 system software, 150, 162, 176 system testing, 413 systems analysis, 409 systems analysts, 65 systems design, 412 See also information systems development systems development lifecycle (SDLC), 414-415, 436-437 T1 lines, 229 T3 lines, 229 tablet computers, 155, 240, 341, 360 tacit knowledge, 392 Tag Suggest (Facebook), 242 tangible benefits, 428 targeted marketing, 204 targeting, 121, 124-125, 126, 348349 “taste graph”, 378 TCP/IP (Transmission Control Protocol/Internet Protocol), 225-226, 251 Teambox (software), 287 teams, 56 teamwork importance of, 56 See also collaboration technology business models and, 44 business objectives and, 101 disruptive technologies, 89-90 for networks and networking, 223-226 presence technology, 237 trickle-down technology, 135 unified communications technology, 237-238 technology dimension of information systems, 15, 17, 29 technology perspective, in problem solving, 24 technostress, 138 telecommunications technology about, 17, 221, 251 Bluetooth, 246-247, 252, 263, 266 cellular systems, 246 hotspots, 247 RFID, 220, 221, 248-250, 252 unified communications, 237238 VoIP (Voice over IP), 235, 237, 252, 262 Wi-Fi, 247-248, 252, 263, 264, 266, 283, 289 WiMax, 246, 248, 252 wireless sensor networks, 248, 250-251, 252 See also networks and networking telephone systems about, 221 as circuit-switched networks, 224 liability issues and, 131 security challenges, 262 Telepresence (Cisco), 51 telepresence technology, 7, 61 television industry, pirated content, 109-111 telework, Telnet, 234 test plan, 413 testing, system design and development, 413 www.downloadslide.com Index text messaging, as collaborative tool, 60 text mining, 203 3-D printing, 95-96 3G networks, 246 ticketing systems, 4, 13-14 tokens, 280, 289 total cost of ownership (TCO), 171, 177, 326 total quality management (TQM), 94 touch pads, 156 touch point, 312 touch screen, 156 Toxic Substances Control Act (1976), 12-13 TPS See transaction processing systems TQM See total quality management trackbacks, 243 trackballs, 156 tracking files, 115, 123, 125 trade secrets, 127 transaction broker, 342, 343 transaction costs, 335 transaction fee revenue model, 345 transaction processing systems (TPS), 45-46, 67 Transmission Control Protocol/ Internet Protocol See TCP/IP transmission media, 228, 229, 251 transmission speed, 228 transparency, 57, 337, 362 Transport layer, 225 Transportation Management system (Oracle), 308, 310 travel services, e-commerce model, 343 trickle-down technology, 135 Trojan horses, 265-266, 294 TRUSTe seal, 126 Tumblr, 5, 245, 344, 347, 352, 366 tunneling, 238 tuples, 188 twisted pair wire, 229 Twitter, 7, 57, 117, 124, 130, 155, 165, 198, 199, 237, 244, 245, 256, 264, 266, 320, 334, 342, 344, 352, 357, 362, 365-367, 376, 380, 420 two-tiered client/server architecture, 153 TypePad.com, 243 ubiquity, of e-commerce, 335, 336 Ukraine, cyberwarfare by, 272 unified communications, 237-238 Unified Threat Management (UTM) systems, 282-283 unit testing, 413 universal standards, of e-commerce, 335, 336 UNIX, 163-164, 176 unstructured decisions, 372, 373, 398 upstream portion (of supply chain), 305 URL (uniform resource locator), 239 U.S CAN-SPAM Act of 2003, 134-135 I-15 U.S economy, globalization and, 10, 29 U.S legislation computer crime, 270-271 copyright, 128, 130 electronic records management, 273-274, 289 privacy laws, 120-121 spamming, 134-135 trade secrets, 127 USB flash drives, 154 user-designer communications gap, 433 user resistance, 435 Utilitarian Principle, 119 UTM systems See Unified Threat Management (UTM) systems value chain model, 83-87, 101 value web, 86-87, 101 Verizon Mobile Hotspot, 247 VEVO (Web site), 340 video for marketing, 349 streaming, 343 video conferencing, Video Privacy Protection Act of 1988, 120 video streaming, 232 videoconferencing, 61 virtual companies, 89 virtual meeting systems, 7, 61 virtual organizations, 89 virtual private networks (VPNs), 238, 252 Virtual Reality Modeling Language (VRML), 397 virtual reality systems, 395 virtual worlds, as collaborative tool, 60 virtualization, 149, 157-158, 160 viruses, 263, 264, 265, 289 VistA (software), 33 Visual Basic (programming language), 164, 265 Visual Web, 245 VMWare (software), 157 voice recognition software, 119 VoIP (Voice over IP), 235, 237, 252 voyage-estimating decision-support systems, 48 VPN See virtual private networks VRML See Virtual Reality Modeling Language vulnerability, computing and, 133, 261-262, 288 W3C See World Wide Web Consortium walkthrough, 288 WANs See wide area networks war driving, 263 warehouse management system (WMS), 308 Web, 238-245 “App Internet”, 245 blogging, 58, 243, 345 corporate databases and, 206 databases and, 205-206 “deep Web”, 238 future of, 245 HTML (Hypertext Markup Language), 167, 176, 238 hypertext, 238-239 “Internet of Things, “, 245, 251 portals, 341-342 search engines, 238-239, 244245 Semantic Web, 244-245 as source of unstructured Big Data, 203 surface Web, 238 URL, 239 visual Web, 245 Web 2.0, 243, 251 Web 3.0, 244 See also e-commerce; Internet; social networking Web 2.0, 243, 251 Web 3.0, 244 Web beacons, 125 Web browser software, 166-167, 238-239 Web browsers, 166-167 Web bugs, 125, 126, 127 Web conferencing, 7, 61 Web hosting service, 172 Web mashups, 170 Web mining, 203-204 Web servers, 153, 239 Web services, 167-168, 177, 425 Web sites, 238 affiliate Web sites, 345 behavioral targeting, 349 e-commerce, 360-361 for mobile platform, 419 personalization, 350 responsive Web design, 419 social bookmarking, 394 visitor tracking, 349-350 Web tracking, 125 WebEx (Cisco), 61 WEBFOCUS (Information Builders), 416 Weblogs See blogs WebSphere (IBM), 168, 427 WEP, 283 Wi-Fi, 247-248, 252, 263, 264, 266, 283, 289 Wi-Fi Alliance, 283 Wi-Fi Protected Access See WPA2 wide area networks (WANs), 227, 228, 251 Wikipedia, 60, 125, 357 wikis about, 58, 243-244 as collaborative tool, 60 security of, 264 WiMax (Worldwide Interoperability for Microwave Access), 246, 248, 252 Windows (Microsoft), 152, 157 Windows 7, 163, 273 Windows 8, 163, 176, 419 Windows domain network model, 228 Windows Live Messenger, 234 Windows Server (Microsoft), 163, 223, 228 Wiper (malware), 293, 294 Wire Fraud Act, 270 wireless LANs, 247-248 wireless modems, 226 wireless networks, 246-251, 252 Bluetooth, 246-247, 252, 263, 266 cellular systems, 246 security, 283 security challenges, 263 Wi-Fi, 247-248, 252, 263, 266, 283, 289 wireless Internet access, 247248 wireless sensor networks (WSNs), 248, 250-251, 252 wireless transmission media, 229 Wiretap Act, 270 “wisdom of crowds”, 57, 347-348, 362 WMS See warehouse management system Wolfram Alpha, 256 Word (Microsoft), 165, 166, 169 word processing software, 165 WordPress (software), 243 work changing nature of, 56 growth of professional work, 56 maintaining boundaries: family, work, and leisure, 132-133 reengineering job loss, 135 See also jobs workgroup network model, 228 workstations, 151, 176 World Intellectual Property Organization Treaty, 130 World Wide Web about, 17, 90, 234 intellectual property rights and, 129 World Wide Web Consortium (W3C), 167, 231, 245, 251 Worldwide Interoperability for Microwave Access See WiMax worms, 263-264, 265, 289 WPA2 (Wi-Fi Protected Access 2), 283 WSNs See wireless sensor networks Xanga.com, 243 Xbox Live (Microsoft), 345 XML (Extensible Markup Language), 167-168, 425 Yahoo!, 112, 117, 123, 124, 126, 132, 155, 160, 169, 199, 239240, 243, 244, 294, 333, 334, 341, 342, 359, 418 Yahoo! Messenger, 234 Yahoo RightMedia, 349 Yammer (Microsoft), 63, 72 YouSendIt, 287 YouTube, 82, 110, 232, 236, 243, 256, 320, 330, 334, 352, 420 zero defects, 272 Zillow.com, 170 ZipRealty (Web site), 170 “zombie” PCs, 267 Zooin, 61 www.downloadslide.com This page intentionally left blank www.downloadslide.com BUSINESS CASES AND INTERACTIVE SESSIONS Here are the cases and Interactive Sessions you’ll find in the eleventh edition of Essentials of Management Information Systems These cases and Interactive Sessions cover new developments in information systems and real-world company applications of systems Chapter 1: Business Information Systems in Your Career The San Francisco Giants Win Big with Information Technology Meet the New Mobile Workers UPS Competes Globally with Information Technology A New Look at Electronic Medical Records Chapter 2: Global E-business and Collaboration TELUS Embraces Social Learning Vail Ski Resorts Goes High-Tech for High Touch Piloting Procter and Gamble from Decision Cockpits Should Companies Embrace Social Business? Chapter 3: Achieving Competitive Advantage with Information Systems Can Walmart Stay on Top? Auto Makers Become Software Companies New Systems and Business Processes Put MoneyGram “On the Money” Can This Bookstore Be Saved? Chapter 4: IT Ethical and Social Issues in Information Systems Content Pirates Sail the Web Big Data Gets Personal: Behavioral Targeting Wasting Time: The New Digital Divide Facebook: It’s About the Money Chapter 5: IT Infrastructure: Hardware and Software The Army Recasts Its IT Infrastructure The Greening of the Data Center The Pleasures and Pitfalls of BYOD Is It Time for Cloud Computing? Chapter 6: Foundation of Business Intelligence: Databases and Information Management Better Data Management Helps the Toronto Globe and Mail Reach Its Customers Business Intelligence Helps the Cincinnati Zoo Know Its Customers American Water Keeps Data Flowing Does Big Data Bring Big Rewards? ... Challenges of Using Business Information Systems Organizing the Information Systems Function Chapter 3: Achieving Competitive Advantage with Information Systems Challenges of Using Information Systems. .. Enterprise Systems 301 What are Enterprise Systems? 301 • Enterprise Software 302 • Business Value of Enterprise Systems 303 9.2 Supply Chain Management Systems 304 The Supply Chain 304 • Information Systems. .. Chapter 10 www.downloadslide.com Essentials of Management Information Systems Eleventh Edition Kenneth C Laudon New York University Jane P Laudon Azimuth Information Systems Boston Columbus Indianapolis

Ngày đăng: 18/05/2017, 13:55

Từ khóa liên quan

Mục lục

  • Cover

  • Title Page

  • Copyright Page

  • About the Authors

  • Preface

  • Acknowledgments

  • Contents

  • I: Information Systems in the Digital Age

    • 1 Business Information Systems in Your Career

      • Chapter-Opening Case: The San Francisco Giants Win Big with Information Technology

      • 1.1 The Role of Information Systems in Business Today

      • Interactive Session: People: Meet the New Mobile Workers

      • 1.2 Perspectives on Information Systems and Information Technology

      • 1.3 Understanding Information Systems: A Business Problem-Solving Approach

      • Interactive Session: Technology: UPS Competes Globally with Information Technology

      • 1.4 Information Systems and Your Career

      • Review Summary

      • Key Terms

      • Review Questions

      • Discussion Questions

      • Hands-On MIS Projects

      • Collaboration and Teamwork Project

Tài liệu cùng người dùng

Tài liệu liên quan