Principles of Information Systems , 10th ed.

Licensed to: iChapters User
Licensed to: iChapters User
TENTH
EDITION
Principles of Information Systems
Tenth Edition
Ralph M. Stair
Professor Emeritus, Florida State University
George W. Reynolds
Instructor, Strayer University
Australia • Canada • Mexico • Singapore • Spain • United Kingdom • United States
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
Principles of Information Systems,
Tenth Edition
Ralph M. Stair & George W. Reynolds
Executive Vice President and Publisher:
Jonathan Hulbert
Executive Vice President of Editorial, Business:
Jack W. Calhoun
Publisher: Joe Sabatino
Sr. Acquisitions Editor: Charles McCormick, Jr.
Sr. Product Manager: Kate Mason
Sr. Content Project Manager: Jill Braiewa
Marketing Manager: Adam Marsh
Sr. Marketing Communications Manager:
Libby Shipp
Marketing Coordinator: Suellen Ruttkay
Editorial Assistant: Nora Heink
Media Editor: Chris Valentine
Sr. Art Director: Stacy Jenkins Shirley
Print Buyer: Julio Esperas
Cover Designer: cmiller design
Cover Photos: © Getty Images
Compositor: Value Chain
Copyeditor: Mary Kemper
Proofreader: Green Pen Quality Assurance
Indexer: Alexandra Nickerson
© 2012 Course Technology, Cengage Learning
ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored
or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying,
recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval
systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior
written permission of the publisher.
For product information and technology assistance, contact us at
Cengage Learning Customer & Sales Support, 1-800-354-9706
For permission to use material from this text or product, submit all
requests online at www.cengage.com/permissions
Further permissions questions can be emailed to
permissionrequest@cengage.com
Student Edition:
ISBN-13: 978-0-538-47829-8
ISBN-10: 0-538-47829-2
Instructor’s Edition:
ISBN-13: 978-1-111-53109-6
ISBN-10: 1-111-53109-9
Course Technology
20 Channel Center Street
Boston, MA 02210
USA
Some of the product names and company names used in this book have been used for identification purposes only
and may be trademarks or registered trademarks of their respective manufacturers and sellers.
Any fictional data related to persons or companies or URLs used throughout this book is intended for instructional
purposes only. At the time this book was printed, any such data was fictional and not belonging to any real persons
or companies.
Course Technology, a part of Cengage Learning, reserves the right to revise this publication and make changes from
time to time in its content without notice.
Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil and Japan. Locate your local office at:
www.cengage.com/global
Cengage Learning products are represented in Canada by Nelson Education, Ltd.
To learn more about Course Technology, visit www.cengage.com/coursetechnology
Purchase any of our products at your local college store or at our preferred online store www.cengagebrain.com
Printed in the United States of America
1 2 3 4 5 6 7 16 15 14 13 12 11 10
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
For Lila and Leslie
—RMS
To my grandchildren: Michael, Jacob, Jared, Fievel, Aubrey, Elijah, Abrielle, Sofia, Elliot
—GWR
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
BRIEF
CONTENTS
PART 1
PART 2
PART 3
Overview
Chapter 1
An Introduction to Information Systems
Chapter 2
Information Systems in Organizations
Information Technology Concepts
Chapter 3
Hardware: Input, Processing, and Output Devices
Chapter 4
Software: Systems and Application Software
Chapter 5
Database Systems, Data Centers, and Business Intelligence
Chapter 6
Telecommunications and Networks
Chapter 7
The Internet, Web, Intranets, and Extranets
Business Information Systems
Chapter 8
Electronic and Mobile Commerce
Chapter 9
Enterprise Systems
Chapter 10 Information and Decision Support Systems
Chapter 11 Knowledge Management and Specialized Information Systems
PART 4
Systems Development
Chapter 12 Systems Development: Investigation and Analysis
Chapter 13 Systems Development: Design, Implementation, Maintenance, and
Review
PART 5
Information Systems in Business and Society
Chapter 14 The Personal and Social Impact of Computers
Glossary
Index
iv
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
CONTENTS
Preface
xvii
PART 1
Overview 1
Chapter 1
An Introduction to Information Systems
Braskem S.A., Brazil 3
2
Information Concepts 5
Data, Information, and Knowledge 5
The Characteristics of Valuable Information 7
The Value of Information 8
System Concepts 8
System Performance and Standards 9
What Is an Information System? 10
Input, Processing, Output, Feedback 11
Manual and Computerized Information Systems 12
Computer-Based Information Systems 12
Business Information Systems 18
Information Systems @ Work: Hilton Hospitality in the Palm of Your Hand 19
Electronic and Mobile Commerce 20
Enterprise Systems: Transaction Processing Systems and Enterprise
Resource Planning 21
Information and Decision Support Systems 22
Specialized Business Information Systems: Knowledge Management,
Artificial Intelligence, Expert Systems, and Virtual Reality 25
Systems Development 28
Systems Investigation and Analysis 29
Systems Design, Implementation, and Maintenance and Review 30
Information Systems in Society, Business, and Industry 30
Security, Privacy, and Ethical Issues in Information Systems and the
Internet 30
Ethical and Societal Issues: Who Is Interested in Your Social Network
Updates? 31
Computer and Information Systems Literacy 32
Information Systems in the Functional Areas of Business 33
Information Systems in Industry 34
Global Challenges in Information Systems 34
Case One: Effectively Managing Resources at Aéroports de Paris 40
Case Two: Information System as an Effective Force Against H1N1 Pandemic 41
Chapter 2
Information Systems in Organizations 44
Marriott International, Inc., United States 45
Organizations and Information Systems 47
Information Systems @ Work: Aldra Manages Workflow to Support
Customization 51
v
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
Organizational Structures 52
Organizational Culture and Change 55
Reengineering and Continuous Improvement 57
User Satisfaction and Technology Acceptance 59
Quality
60
Outsourcing, On-Demand Computing, and Downsizing 60
Competitive Advantage 62
Factors that Lead Firms to Seek Competitive Advantage 62
Ethical and Societal Issues: The New Corporate Mantra: Social and Environmental
Responsibility 63
Strategic Planning for Competitive Advantage 64
Performance-based Information Systems 67
Productivity 67
Return on Investment and the Value of Information Systems 68
Risk 69
Careers in Information Systems 70
Roles, Functions, and Careers in IS 71
Typical IS Titles and Functions 74
Other IS Careers 75
Working in Teams 76
Finding a Job in IS 76
Case One: Creativity Moves Up the Value Chain 81
Case Two: Media Companies Centralize and Outsource to Survive 82
PART 2
Information Technology Concepts 85
Chapter 3
Hardware: Input, Processing, and Output Devices
Turboinštitut d.d., Slovenia 87
86
Computer Systems: Integrating the Power of Technology 89
Hardware Components 90
Hardware Components in Action 91
Processing and Memory Devices: Power, Speed, and Capacity 92
Processing Characteristics and Functions 92
Memory Characteristics and Functions 94
Multiprocessing 96
Parallel Computing 97
Secondary Storage 98
Access Methods 98
Secondary Storage Devices 99
Enterprise Storage Options 101
Input and Output Devices: The Gateway to Computer Systems 103
Characteristics and Functionality 104
Input Devices 104
Output Devices 110
Information Systems @ Work: Handheld Computers Streamline National
Inventory 111
vi
Computer System Types 117
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
Portable Computers 118
Nonportable Single-User Computers 119
Multiple-User Computer Systems 121
Ethical and Societal Issues: Electronics Manufacturers Face the Global E-Waste
Problem 125
Green Computing 126
Case One: Union Pacific Retires Its Big Iron 132
Case Two: Pepsi Bottler Goes Virtual 133
Chapter 4
Software: Systems and Application Software 136
Rheinmetall AG 137
An Overview of Software 139
Systems Software 139
Application Software 139
Supporting Individual, Group, and Organizational Goals 139
Systems Software 141
Operating Systems 141
Current Operating Systems 145
Information Systems @ Work: Blended Platforms at LinkedIn 148
Workgroup Operating Systems 150
Enterprise Operating Systems 151
Operating Systems for Small Computers, Embedded Computers, and
Special-Purpose Devices 152
Utility Programs 153
Middleware 156
Application Software 156
Overview of Application Software 157
Personal Application Software 159
Mobile Application Software 165
Workgroup Application Software 165
Enterprise Application Software 167
Application Software for Information, Decision Support, and Specialized
Purposes 168
Programming Languages 168
The Evolution of Programming Languages 168
Visual, Object-Oriented, and Artificial Intelligence Languages 169
Software Issues and Trends 171
Software Bugs 171
Ethical and Societal Issues: Software-Driven Cars 172
Copyrights and Licenses 173
Freeware and Open-Source Software 173
Software Upgrades 175
Global Software Support 175
Case One: BlueStar Profits from SOA and Open Source 181
Case Two: Office Depot Gets SaaSy 182
vii
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
Chapter 5
Database Systems, Data Centers, and Business Intelligence 186
Aquent, United States 187
Data Management 189
The Hierarchy of Data 189
Data Entities, Attributes, and Keys 190
Data Modeling and Database Characteristics 193
Data Center 194
Data Modeling 195
Ethical and Societal Issues: Mega Data Centers and Their Environmental
Impact 196
The Relational Database Model 197
Database Management Systems 201
Overview of Database Types 202
Providing a User View 203
Creating and Modifying the Database 203
Storing and Retrieving Data 205
Manipulating Data and Generating Reports 206
Database Administration 208
Popular Database Management Systems 209
Special-Purpose Database Systems 210
Selecting a Database Management System
Using Databases with Other Software
Database Applications
210
211
211
Linking the Company Database to the Internet 212
Data Warehouses, Data Marts, and Data Mining 212
Business Intelligence 216
Information Systems @ Work: The Database that Drives the Austrian
Turnpike 217
Distributed Databases 218
Online Analytical Processing (OLAP)
219
Object-Relational Database Management Systems 220
Visual, Audio, and Other Database Systems 221
Case One: Managing International Trades with Powerful Database Systems 227
Case Two: Using Databases to Map Human Migration 227
Chapter 6
Telecommunications and Networks 230
Procter & Gamble, United States 231
An Overview of Telecommunications 233
Basic Telecommunications Channel Characteristics 234
Short-Range Wireless Options 238
Medium-Range Wireless Options 239
Wide Area Wireless Network Types 240
Ethical and Societal Issues: Building Out the Broadband Infrastructure in the
United States 242
Networks and Distributed Processing 246
Network Types 246
viii
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
Basic Processing Alternatives 248
Client/Server Systems 249
Telecommunications Hardware 250
Telecommunications Software 254
Securing Data Transmission 254
Virtual Private Network (VPN) 256
Telecommunications Services and Network Applications 256
Cellular Phone Services 256
Linking Personal Computers to Mainframes and Networks 258
Voice Mail 258
Home and Small Business Networks 258
Electronic Document Distribution 259
Call Centers 259
Telecommuting and Virtual Workers and Workgroups 260
Electronic Meetings 260
Electronic Data Interchange 261
Unified Communications 262
Global Positioning System Applications 262
Information Systems @ Work: Henny Penny Moves to Unified
Communications 263
Case One: NFC Provides True Self-Service in Zurich Switzerland 268
Case Two: Adidas Turns to Cellular Network for Inventory Data 269
Chapter 7
The Internet, Web, Intranets, and Extranets
Avon, USA 273
272
Use and Functioning of the Internet 275
How the Internet Works 277
Accessing the Internet 279
Cloud Computing 281
Ethical and Societal Issues: Danger in the Cloud 283
The World Wide Web 284
How the Web Works 284
Web Programming Languages 288
Web Services 289
Developing Web Content and Applications 289
Internet and Web Applications 291
Online Information Sources 291
Search Engines and Web Research 296
Web Portals 300
Communication and Collaboration 300
Web 2.0 304
Blogging and Podcasting 306
Online Media and Entertainment 307
Shopping Online 312
Travel, Geolocation, and Navigation 314
Information Systems @ Work: Selling Real Estate with Google Maps 316
ix
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
Internet Utilities 317
Intranets and Extranets 317
Case One: Kiva Uses Web to Alleviate Poverty 324
Case Two: Barriers to Enterprise 2.0 325
PART 3
Business Information Systems 329
Chapter 8
Electronic and Mobile Commerce 330
Tommy Hilfiger, United States 331
An Introduction to Electronic Commerce 332
Business-to-Business (B2B) E-Commerce 333
Business-to-Consumer (B2C) E-Commerce 333
Consumer-to-Consumer (C2C) E-Commerce 335
e-Government 335
Multistage Model for E-Commerce 336
E-Commerce Challenges 338
Defining an Effective E-Commerce Model and Strategy 339
Dealing with Consumer Privacy Concerns 339
Overcoming Consumers’ Lack of Trust 340
Overcoming Global Issues 341
An Introduction to Mobile Commerce 341
Mobile Commerce in Perspective 342
M-Commerce Web Sites 342
Advantages of Electronic and Mobile Commerce 343
Electronic and Mobile Commerce Applications 343
Retail and Wholesale 343
Manufacturing 344
Marketing 345
Advertising 346
Investment and Finance 348
Banking 348
E-Boutiques 349
Threats to Electronic and Mobile Commerce 350
Security 350
Information Systems @ Work: Virtual Models Sell Clothes at Sears.com 351
Theft of Intellectual Property 352
Fraud
352
Invasion of Consumer Privacy 353
Lack of Internet Access 353
Legal Jurisdiction 354
Taxation 354
Strategies for Successful E-Commerce and M-Commerce 354
Defining the Web Site Functions 354
Establishing a Web Site 355
Building Traffic to Your Web Site 355
Maintaining and Improving Your Web Site 356
x
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
Ethical and Societal Issues: North Face Web Site Mixes Business,
Philanthropy, and Humanity 357
Technology Infrastructure Required to Support E-Commerce and
M-Commerce 358
Hardware 358
Web Server Software 359
E-Commerce Software 359
Mobile Commerce Hardware and Software 360
Electronic Payment Systems 360
Case One: Mazda Provides Dealers with Customized E-Commerce Sites 368
Case Two: Wrangler Sells Direct Online 369
Chapter 9
Enterprise Systems 372
FedEx, United States 373
An Overview of Transaction Processing Systems 374
Traditional Transaction Processing Methods and Objectives 375
Transaction Processing Systems for Small and Medium-Size Enterprises
(SMEs) 379
Transaction Processing Activities 380
Data Collection 380
Data Editing 381
Data Correction 381
Data Manipulation 382
Data Storage 382
Document Production and Reports 382
Enterprise Resource Planning and Customer Relationship Management 382
An Overview of Enterprise Resource Planning 383
Advantages of ERP 383
Information Systems @ Work: Kabbani Integrates and Secures
Information with ERP 384
Disadvantages of ERP Systems 386
Leading ERP Systems 388
ERP for Small and Medium-Size Enterprises (SMEs) 388
Supply Chain Management (SCM) 389
Financial and Managerial Accounting and ERP 392
Business Intelligence and ERP 392
Customer Relationship Management 393
Hosted Software Model for Enterprise Software 396
International Issues Associated with Enterprise Systems 397
Different Languages and Cultures 397
Disparities in Information System Infrastructure 397
Varying Laws and Customs Rules 398
Multiple Currencies 398
Ethical and Societal Issues: Google Pulls Out of China 399
Case One: Skullcraft Goes Big Time with ERP 404
Case Two: Dubai Bank Improves Customer Satisfaction with CRM 404
xi
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
Chapter 10
Information and Decision Support Systems
Tru-Test, New Zealand 409
408
Decision Making and Problem Solving 410
Decision Making as a Component of Problem Solving 411
Programmed versus Nonprogrammed Decisions 412
Optimization, Satisficing, and Heuristic Approaches 413
The Benefits of Information and Decision Support Systems 414
An Overview of Management Information Systems 415
Management Information Systems in Perspective 415
Ethical and Societal Issues: Southwest Airlines Applies MIS to
Customer Service 417
Inputs to a Management Information System 418
Outputs of a Management Information System 418
Characteristics of a Management Information System 420
Functional Aspects of the MIS 420
Financial Management Information Systems 421
Manufacturing Management Information Systems 424
Marketing Management Information Systems 427
Human Resource Management Information Systems 430
Other Management Information Systems 433
An Overview of Decision Support Systems 434
Characteristics of a Decision Support System 434
Capabilities of a Decision Support System 436
Information Systems @ Work: Amenities Inc. Gets a Grip on Pachinko
Information 437
A Comparison of DSS and MIS 438
Components of a Decision Support System 438
The Database 438
The Model Base 439
The User Interface or Dialogue Manager 440
Group Support Systems 441
Characteristics of a GSS that Enhance Decision Making
442
GSS Software 444
GSS Alternatives 445
Executive Support Systems 446
Executive Support Systems in Perspective 446
Capabilities of Executive Support Systems 447
Case One: 3D Digital City Model Assists Vancouver City Officials
and Departments 454
Case Two: Accurate Reports Place Umbrella over Arts 455
Chapter 11
Knowledge Management and Specialized Information
Systems 458
Capgemini, France 459
Knowledge Management Systems 460
Overview of Knowledge Management Systems 461
xii
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
Data and Knowledge Management Workers and Communities of Practice
462
Obtaining, Storing, Sharing, and Using Knowledge 462
Technology to Support Knowledge Management 463
An Overview of Artificial Intelligence 465
Artificial Intelligence in Perspective 465
The Nature of Intelligence 465
The Brain Computer Interface 467
The Major Branches of Artificial Intelligence 467
Expert Systems 468
Robotics 468
Information Systems @ Work: WebEx Uses AI-Powered Analytics to Focus
Salesforce 469
Vision Systems 471
Natural Language Processing and Voice Recognition 471
Learning Systems 472
Neural Networks 472
Other Artificial Intelligence Applications 473
An Overview of Expert Systems 474
When to Use Expert Systems 474
Components of Expert Systems 475
The Inference Engine 477
The Explanation Facility 477
The Knowledge Acquisition Facility 477
The User Interface 478
Participants in Developing and Using Expert Systems 478
Ethical and Societal Issues: Austin Energy First to Implement a Smart Grid 480
Expert Systems Development Tools and Techniques 481
Multimedia and Virtual Reality 482
Overview of Multimedia 482
Overview of Virtual Reality 485
Interface Devices 486
Forms of Virtual Reality 486
Virtual Reality Applications 487
Specialized Systems 490
Case One: MITRE Taps the Brain Trust of Top U.S. Experts 498
Case Two: JEA Uses AI to Optimize Water Delivery 498
PART 4
Systems Development 503
Chapter 12
Systems Development: Investigation and Analysis
LEGO, Denmark 505
504
An Overview of Systems Development 506
Participants in Systems Development 507
Individual Systems Developers and Users 509
Initiating Systems Development 510
xiii
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
Ethical and Societal Issues: U.S. Federal Government IS Project
to Save Billions 512
Information Systems Planning and Aligning Corporate and IS Goals 513
Information Systems @ Work: Hess Information Systems Take the Long View 515
Establishing Objectives for Systems Development 516
Systems Development Life Cycles 519
The Traditional Systems Development Life Cycle 520
Prototyping 521
Rapid Application Development, Agile Development, and Other Systems
Development Approaches 523
Outsourcing and On-Demand Computing 524
Factors Affecting Systems Development Success 526
Degree of Change 526
The Importance of Planning 527
Use of Project Management Tools 528
Use of Computer-Aided Software Engineering (CASE) Tools 529
Object-Oriented Systems Development 530
Systems Investigation 531
Initiating Systems Investigation 531
Participants in Systems Investigation 531
Feasibility Analysis 532
Object-Oriented Systems Investigation 533
The Systems Investigation Report 533
Systems Analysis 534
General Considerations 534
Participants in Systems Analysis 534
Data Collection 534
Data Analysis 536
Requirements Analysis 540
Object-Oriented Systems Analysis 542
The Systems Analysis Report 542
Case One: BMW Streamlines IS with App Virtualization 549
Case Two: Hotwire.com Gains Control of Hotel Partner Information 549
Chapter 13
Systems Development: Design, Implementation, Maintenance, and
Review 554
Ryder, United States 555
Systems Design 557
Logical and Physical Design 557
Object-Oriented Design 558
Interface Design and Controls 559
Design of System Security and Controls 559
Environmental Design Considerations 563
Generating Systems Design Alternatives 564
Evaluation Techniques 566
Freezing Design Specifications 568
xiv
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
The Contract 569
The Design Report 569
Systems Implementation 570
Acquiring Hardware from an IS Vendor 571
Acquiring Software: Make or Buy? 572
Ethical and Societal Issues: Medical Center Moves Patient Records to Cloud 573
Acquiring Database and Telecommunications Systems 575
User Preparation 576
IS Personnel: Hiring and Training 576
Site Preparation 576
Data Preparation 577
Installation 577
Testing 577
Start-Up 578
User Acceptance 579
Systems Operation and Maintenance 580
Information Systems @ Work: Tasty Baking Moves Data Center 581
Reasons for Maintenance 582
Types of Maintenance 582
The Request for Maintenance Form 582
Performing Maintenance 582
The Relationship Between Maintenance and Design 583
Systems Review 584
Types of Review Procedures 584
System Performance Measurement 585
Case One: Russian Sporting Goods Chain Scales Up Budgeting System 591
Case Two: Honeywell Building Next Gen UPS Device 592
PART 5
Information Systems in Business and Society 595
Chapter 14
The Personal and Social Impact of Computers
Facebook, United States 597
596
Computer Waste and Mistakes 599
Computer Waste 599
Computer-Related Mistakes 600
Preventing Computer-Related Waste and Mistakes 600
Establishing Policies and Procedures 600
Implementing Policies and Procedures 601
Monitoring Policies and Procedures 602
Reviewing Policies and Procedures 602
Computer Crime 603
The Computer as a Tool to Commit Crime 604
Cyberterrorism 604
Identity Theft 605
Internet Gambling 605
The Computer as a Tool to Fight Crime 605
Recovery of Stolen Property 605
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
xv
Licensed to: iChapters User
Monitoring Sex Offenders 606
Use of Geographic Information Systems 606
The Computer as the Object of Crime 607
Illegal Access and Use 607
Spyware 609
Information and Equipment Theft 609
Information Systems @ Work: Data Theft: An Ongoing Concern for Businesses 610
Safe Disposal of Personal Computers 611
Patent and Copyright Violations 611
Computer-Related Scams 612
International Computer Crime 613
Preventing Computer-Related Crime 613
Crime Prevention by State and Federal Agencies 613
Crime Prevention by Corporations 613
Crime Prevention for Individuals and Employees 616
Privacy Issues 618
Privacy and the Federal Government 618
Privacy at Work 619
E-Mail Privacy 619
Instant Messaging Privacy 620
Privacy and Personal Sensing Devices 620
Privacy and the Internet 620
Internet Libel Concerns 621
Filtering and Classifying Internet Content 622
Fairness in Information Use 622
Electronic Communications Privacy Act 624
Individual Efforts to Protect Privacy 626
The Work Environment 626
Health Concerns 627
Ethical and Societal Issues: Is the Internet Eating Our Brains? 628
Avoiding Health and Environmental Problems 629
Ethical Issues in Information Systems 630
Case One: The ‘My SHC Community’ Privacy Disaster 635
Case Two: U.S. Fights Fraud with Personal Certificates 636
Glossary 639
Index 653
xvi
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
PREFACE
As organizations continue to operate in an increasingly competitive and global marketplace,
workers in all business areas including accounting, customer service, finance, human resources, information systems (IS), logistics, marketing, manufacturing, and research and
development must be well prepared to make the significant contributions required for success.
Regardless of your future role, even if you are an entrepreneur, you need to understand what
information systems can and cannot do and be able to use them to help you accomplish your
work. You will be expected to discover opportunities to use information systems and to
participate in the design of solutions to business problems employing information systems.
You will be challenged to identify and evaluate information systems options. To be successful,
you must be able to view information systems from the perspective of business and organizational needs. For your solutions to be accepted, you must recognize and address their impact
on co-workers, customers, suppliers, and other key business partners. For these reasons, a
course in information systems is essential for students in today’s high-tech world.
Principles of Information Systems, Tenth Edition, continues the tradition and approach of
the previous editions. Our primary objective is to provide the best information systems text
and accompanying materials for the first information systems course required of all business
students. We want you to learn to use information systems to ensure your personal success
in your current or future job and to improve the success of your organization. Through
surveys, questionnaires, focus groups, and feedback that we have received from current and
past adopters, as well as others who teach in the field, we have been able to develop the
highest-quality set of teaching materials available to help you achieve these goals.
Principles of Information Systems, Tenth Edition, stands proudly at the beginning of the
IS curriculum and remains unchallenged in its position as the only IS principles text offering
the basic IS concepts that every business student must learn to be successful. In the past,
instructors of the introductory course faced a dilemma. On one hand, experience in business
organizations allows students to grasp the complexities underlying important IS concepts.
For this reason, many schools delayed presenting these concepts until students completed a
large portion of the core business requirements. On the other hand, delaying the presentation
of IS concepts until students have matured within the business curriculum often forces the
one or two required introductory IS courses to focus only on personal computing software
tools and, at best, merely to introduce computer concepts.
This text has been written specifically for the introductory course in the IS curriculum.
Principles of Information Systems, Tenth Edition, treats the appropriate computer and IS concepts together with a strong managerial emphasis on meeting business and organizational
needs.
APPROACH OF THE TEXT
Principles of Information Systems, Tenth Edition, offers the traditional coverage of computer
concepts, but it places the material within the context of meeting business and organizational
needs. Placing information system concepts in this context and taking a general management
perspective has always set the text apart from general computer books, thus making it appealing not only to MIS majors but also to students from other fields of study. The text isn’t
overly technical, but rather deals with the role that information systems play in an organization and the key principles a manager needs to grasp to be successful. These principles of
IS are brought together and presented in a way that is both understandable and relevant. In
addition, this book offers an overview of the entire IS discipline, while giving students a solid
foundation for further study in advanced IS courses such as programming, systems analysis
and design, project management, database management, data communications, Web site and
systems development, electronic commerce and mobile commerce applications, and decision
xvii
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
support. As such, it serves the needs of both general business students and those who will
become IS professionals.
The overall vision, framework, and pedagogy that made the previous editions so popular
have been retained in the tenth edition, offering a number of benefits to students. We continue to present IS concepts with a managerial emphasis. While the fundamental vision of
this market-leading text remains unchanged, the tenth edition more clearly highlights established principles and draws out new ones that have emerged as a result of business,
organizational, and technological change.
IS Principles First, Where They Belong
Exposing students to fundamental IS principles is an advantage for students who do not later
return to the discipline for advanced courses. Since most functional areas in business rely on
information systems, an understanding of IS principles helps students in other course work.
In addition, introducing students to the principles of information systems helps future business managers and entrepreneurs employ information systems successfully and avoid mishaps
that often result in unfortunate consequences. Furthermore, presenting IS concepts at the
introductory level creates interest among general business students who may later choose
information systems as a field of concentration.
Author Team
Ralph Stair and George Reynolds have teamed up again for the tenth edition. Together, they
have more than sixty years of academic and industrial experience. Ralph Stair brings years of
writing, teaching, and academic experience to this text. He wrote numerous books and a
large number of articles while at Florida State University. George Reynolds brings a wealth
of computer and industrial experience to the project, with more than thirty years of experience
working in government, institutional, and commercial IS organizations. He has written numerous college IS texts and has taught the introductory IS course at the University of
Cincinnati, the College of Mount St. Joseph, and Strayer University. The Stair and Reynolds
team brings a solid conceptual foundation and practical IS experience to students.
GOALS OF THIS TEXT
Because Principles of Information Systems, Tenth Edition, is written for all business majors, we
believe it is important not only to present a realistic perspective on IS in business but also to
provide students with the skills they can use to be effective business leaders in their organization. To that end, Principles of Information Systems, Tenth Edition, has four main goals:
1.
To provide a core of IS principles with which every business student should be
familiar
2. To offer a survey of the IS discipline that will enable all business students to understand the relationship of IS courses to their curriculum as a whole
3. To present the changing role of the IS professional
4. To show the value of the discipline as an attractive field of specialization
By achieving these goals, Principles of Information Systems, Tenth Edition, will enable students,
regardless of their major, to understand and use fundamental information systems principles
so that they can function more efficiently and effectively as workers, managers, decision
makers, and organizational leaders.
IS Principles
Principles of Information Systems, Tenth Edition, although compre-hensive, cannot cover every
aspect of the rapidly changing IS discipline. The authors, having recognized this, provide
students an essential core of guiding IS principles to use as they face the career challenges
ahead. Think of principles as basic truths or rules that remain constant regardless of the
xviii
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
situation. As such, they provide strong guidance in the face of tough deci-sions. A set of IS
principles is highlighted at the beginning of each chapter. The application of these principles
to solve real-world problems is driven home from the opening vignettes to the end-of-chapter
material. The ultimate goal of Principles of Information Systems is to develop effective, thinking, action-oriented employees by instilling them with principles to help guide their decision
making and actions.
Survey of the IS Discipline
This text not only offers the traditional coverage of computer concepts but also provides a
broad framework to impart students with a solid grounding in the business uses of technology.
In addition to serving general business students, this book offers an overview of the entire IS
discipline and solidly prepares future IS professionals for advanced IS courses and their careers
in the rapidly changing IS discipline.
Changing Role of the IS Professional
As business and the IS discipline have changed, so too has the role of the IS professional.
Once considered a technical specialist, today the IS professional operates as an internal consultant to all functional areas of the organization, being knowledgeable about their needs and
competent in bringing the power of information systems to bear throughout the organization.
The IS professional views issues through a global perspective that encompasses the entire
organization and the broader industry and business environment in which it operates.
The scope of responsibilities of an IS professional today is not confined to just his or her
employer but encompasses the entire interconnected network of employees, suppliers, customers, competitors, regulatory agencies, and other entities, no matter where they are located.
This broad scope of responsibilities creates a new challenge: how to help an organization
survive in a highly interconnected, highly competitive global environment. In accepting that
challenge, the IS professional plays a pivotal role in shaping the business itself and ensuring
its success. To survive, businesses must now strive for the highest level of customer satisfaction
and loyalty through innovative products and services, competitive prices, and ever- improving
product and service quality. The IS professional assumes the critical responsibility of determining the organization’s approach to both overall cost and quality performance and
therefore plays an important role in the ongoing survival of the organization. This new duality
in the role of the IS employee—a professional who exercises a specialist’s skills with a generalist’s perspective—is reflected throughout the book.
IS as a Field for Further Study
Despite the deep recession and effects of outsourcing, a survey of Human Resources professionals still puts technology and health care as the top fields of study. And business
administration and computer science remain among the most sought after majors by employers. Indeed, the long-term job prospects for skilled and business savvy information
systems professionals is optimistic. Employment of such workers is expected to grow faster
than the average for all occupations through the year 2018.
A career in IS can be exciting, challenging, and rewarding! It is important to show the
value of the discipline as an appealing field of study and that the IS graduate is no longer a
technical recluse. Today, perhaps more than ever before, the IS professional must be able to
align IS and organizational goals and to ensure that IS investments are justified from a business perspective. The need to draw bright and interested students into the IS discipline is
part of our ongoing responsibility. Upon graduation, IS graduates at many schools are among
the highest paid of all business graduates. Throughout this text, the many challenges and
opportunities available to IS professionals are highlighted and emphasized.
xix
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
CHANGES IN THE TENTH EDITION
We have implemented a number of exciting changes to the text based on user feedback on
how to align the text even more closely with current IS principles and concepts courses. The
following list summarizes these changes:
•
All new opening vignettes. All of the chapter-opening vignettes are new and continue to raise actual issues from foreign-based or multinational companies.
•
All new Information Systems @ Work special interest boxes. Highlighting current
topics and trends in today’s headlines, these boxes show how information systems
are used in a variety of business career areas.
•
All new Ethical and Societal Issues special interest boxes. Focusing on ethical issues
today’s professionals face, these boxes illustrate how information systems professionals confront and react to ethical dilemmas.
•
All new case studies. Two new end-of-chapter cases provide a wealth of practical information for students and instructors. Each case explores a chapter concept or
problem that a real-world company or organization has faced. The cases can be
assigned as individual homework exercises or serve as a basis for class discussion.
•
Extensive changes and updates in each chapter. The authors worked hard to provide
the most current information available in this latest edition. Over 800 new references
and all new examples of organizations using information systems are included in this
new edition. The full extent of these updates makes it impractical to cover them
completely in this forward, however, please see our Web site at www.cengage.com/
mis/stairreynolds.com for a detailed listing of the changes. The following list summarizes these changes:
Chapter 1, An Introduction to Information Systems includes over 80 new references, examples, and material on how organizations can convert raw data into useful information.
Topics include high-frequency trading, knowledge workers and knowledge management
systems, and organizational efficiency and effectiveness. We updated the material on computer-based information systems, EDR, operating systems such as Android by Google and
Mobile 6.5 by Microsoft, database systems, social networking sites, intranets and extranets,
corporate IS usage, and chief information officers (CIOs). We also updated coverage of ERP
systems, information and decision support systems, special-purpose systems, the business use
of multimedia, robotics and expert systems, systems development, and social issues.
Chapter 2, Information Systems in Organizations includes more than 90 new references,
examples, and material on the use of information systems in today’s business organizations
to deliver the right information to the right person at the right time. Specific topics include
supply chain management and customer relationship management, employee empowerment,
organizational change, reengineering, outsourcing, utility computing, and return on investment. We also have new information on organizational structure and change, virtual teams,
social networking sites in business organizations, and competitive advantage. In addition, we
provide new coverage of performance-based information systems, software that reduces costs
and increases IS performance, and information systems that improve productivity. Other
updates cover quality control, careers in information systems, the H-1B program, the best
places to work in the information systems field, the U.S. federal government’s CIO position,
IS entrepreneurs, professional organizations and users groups, and guidelines for finding a
good IS job.
Chapter 3, Hardware: Input, Processing, and Output Devices includes over 60 new
references and examples of organizations using the latest hardware devices to obtain substantial business benefits. Updates cover the latest hardware developments such as chip sets
and graphics processors, fuel cells that replace batteries in portable devices, and smaller and
less energy-consuming processors. We highlight the latest developments in netbooks, nettop
xx
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
computers, and popular smartphones. We also compare the relative power usage of plasma,
LCD, and OLED monitors, and discuss how server manufacturers are competing to reduce
power requirements and are citing “performance per watt” to differentiate their products.
We provide the latest information on the world’s most powerful supercomputers. A new
section titled “Green Computing” examines the efficient and environmentally responsible
design, manufacture, operation, and disposal of IS-related products.
Chapter 4, Software: Systems and Application Software includes new examples and
material on mobile applications, PC software, server software, and mainframe software. We
provide new material, figures, and photos on the latest business software, rich Internet applications, software for smartphones and other mobile devices, touch display interfaces and
spoken commands, Windows 7, application programming interfaces (APIs), software development kits (SDKs), Mac OS X Snow Leopard, Linux-based Chrome OS from Google, and
enterprise-scale systems such as z/OS and HP-UX. We also explore Ford Sync, utility programs, virtualization software, application service providers (ASPs), software as a Service
(SaaS), cloud computing, and software suites from Microsoft and others.
Chapter 5, Database Systems, Data Centers, and Business Intelligence has a new title,
new material, and updated examples on data centers in today’s organizations, including
modular data centers built in shipping containers packed with racks of prewired servers. We
highlight new database applications, the effort to collect data on the damage caused by the
2010 oil spill disaster, the importance of database security in database administration, relational database management techniques and vendors, the Unified Database of Places, popular
database management systems, open source database systems, databases as a service (DaaS),
and a variety of database applications for mobile devices, PCs, workgroup systems, and
mainframe computers. We provide new material on middleware, data warehouses, data
marts, data mining, predictive analysis, online transaction processing, distributed databases,
Online Analytical Processing (OLAP), and Object-Relational Database Management
Systems.
Chapter 6, Telecommunications and Networks includes new material and examples of
circuit switching and packet switching networks, the practical use of 10 Gigabit Ethernet,
broadband over power lines, Near Field Communications, Bluetooth communications, ultra
wideband communications, infrared, Zigbee, Wi-Fi, and satellite communications. We trace
the evolution of 3G and 4G networks and cover the latest developments in 3G and 4G
communications, including China Mobil (the world’s largest 3G network), AT&T’s planned
expansion of a 4G network based on LTE technology, and the Clearwire Communications
4G WiMAX network. We provide new examples of networks that achieve business benefits,
including personal area networks, local area networks, metropolitan area networks, and wide
area networks. Other new examples illustrate the use of remote network monitoring, virtual
private networks, voice over Internet protocol (VoIP), electronic document distribution, call
centers, telecommuting, video conferencing, electronic data interchange, and unified communications. We also expanded coverage of smartphones, smartphone applications, and
global positioning satellites.
Chapter 7, The Internet, Web, Intranets, and Extranets includes a wealth of new examples and material on the Internet, intranets, and extranets, and the transformation of the
Web to a platform for computing and community. We revamped many sections to reflect
today’s developments, including the material on cloud computing, the World Wide Web,
how the Web works, Web programming languages, and developing Web content and applications. We reorganized the section on Internet and Web applications to make it easier to
understand and retain the material, including sections on “Online Information Sources,”
“Search Engines and Web Research,” ”Communication and Collaboration,” “Web 2.0,”
“Blogging and Podcasting,” “Online Media and Entertainment,” “Shopping Online,”
“Travel and Navigation,” and “Internet Utilities.”
Chapter 8, Electronic and Mobile Commerce discusses how these technologies have
grown and affect the economy. We introduce the concepts of buy-side and sell-side e-commerce. New tables summarize the primary differences between B2B, B2C, and C2C; list the
top-rated m-commerce retail Web sites; and compare the top-rated B2C Web sites based on
the use of the American Consumer Satisfaction Index. We discuss Google Product Search
xxi
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
and Frucall as two popular mobile price comparison services. We expanded the coverage of
mobile advertising to discuss mobile advertising networks, including blind networks, premium blind networks, and premium networks. We explain the controversy behind Google’s
purchase of Admob. We provide new examples of phishing, click fraud, and online fraud.
The discussion of PayPal now reflects more recent estimates of transaction volume and PayPal’s acquisition of Bill Me Later. We discuss how the p-card can streamline traditional
purchase order and invoice payment processes. We updated the section on using mobile
phones for payment and discuss new services and modes of payments such as Obopay and
Boku.
Chapter 9, Enterprise Systems now includes dozens of new examples of organizations
that have implemented transaction processing systems or ERP systems to improve their operations. The “Control and Management Issues” section is removed from this chapter and
covered in Chapter 13. We cite Waste Management and online retailer Overstock.com as
examples of organizations that had significant problems implementing their ERP systems.
We added a new section that identifies and describes the leading ERP systems from SAP,
Oracle, Infor, and Microsoft. The section titled “Production and Supply Chain Management” in the previous edition is retitled “Supply Chain Management.” We define the term
supply chain management and describe the business processes in SCM. We moved the material on Financial and Accounting into this section as most organizations that adopt ERP
include these important business processes within the scope of the ERP implementation.
Chapter 10, Information and Decision Support Systems includes more than 80 new
references and new material, including a potential data security breakthrough in the section
on the intelligence stage of decision making. We also discuss the importance of cost reduction,
saving money, and preserving cash reserves. Among the many new examples of management
information systems are a children’s hospital that monitored and then reduced the death rate
for its patients by improving its information systems and a company that used optimization
to assign medical personnel to home healthcare patients in Sweden. Other examples include
how many drug manufacturing companies use JIT to produce flu vaccinations just before
the flu season and how Chrysler uses FMS to quickly change from manufacturing diesel
minivans with right-hand drive to gasoline minivans with left-hand drive. We completely
updated the DSS section, providing new material and examples, such as a California software
company executive that used his cell phone to get rapid feedback on corporate financial
performance and timely reports on the performance of his key executives; Organic’s use of a
team of economists and statisticians to develop models that predicted the effectiveness of
advertising alternatives; and a new pilot program from IBM that allows companies to analyze
data and make strategic decisions on the fly.
Chapter 11, Knowledge Management and Specialized Information Systems includes
about 80 new references, examples, and material on knowledge management and specialized
business information systems, artificial intelligence, expert systems, multimedia, virtual reality, and many other specialized systems. A study of a large information systems consulting
firm found a return of $18.60 on every dollar invested in its knowledge management system,
representing over 1,000 percent return on investment (ROI). We also updated the material
on communities of practice, the brain computer interface (BCI), robotics, voice recognition,
neural networks, expert systems, and virtual reality. The section on virtual reality now includes a new section on multimedia.
Chapter 12, Systems Development: Investigation and Analysis includes about 80 new
references, examples, and material on systems development. We included a new section on
individual systems developers and users that covers developing applications for Apple’s applications store (App Store), BlackBerry’s App World, and Google’s Android Market store.
The section on long-range planning in systems development projects has new material and
examples. We also have new examples in the section on IS planning and aligning corporate
and IS goals and systems development failure.
Chapter 13, Systems Development: Design, Implementation, Maintenance, and
Review includes more than 70 new references, examples, and material on systems design and
implementation. We updated the section on disaster recovery with new material and references. We discuss the failover approach, including SteelEye’s LifeKeeper and Continuous
xxii
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
Protection by NeverFail. We have new material and examples on environmental design (green
design) including systems development efforts that slash power consumption, take less physical space, and result in systems that can be disposed of without harming the environment.
We updated the sections on systems implementation and maintenance and review to include
new references, material, or examples.
Chapter 14, The Personal and Social Impact of Computers includes all new examples
and updated statistics. We quote CIA Director Leon Panetta and FBI Director Robert
Mueller to illustrate the increasing concern about potential cyberterrorist attacks. We present
new information about the potential of Internet gambling as an untapped source of income
for state and federal governments. We added a new section called “The Computer as a Tool
to Fight Crime,” which provides examples of systems used by law enforcement. We reorganized the material in the “Computer as the Object of Crime” section to consolidate
information about types of computer crimes and criminals, and now discuss all the tools and
measures to prevent crime in the “Preventing Computer-Related Crime” section. A single
table now summarizes the common types of malware. We also discuss vishing (a variation
on phishing), explain that Google is involved in the largest copyright infringement case in
history, and cover HTC and Apple as examples of competing organizations that sue each
other over patent infringement. We also discuss money laundering with an example of one
person arrested for laundering over $500 million.
WHAT WE HAVE RETAINED FROM
THE NINTH EDITION
The tenth edition builds on what has worked well in the past; it retains the focus on IS
principles and strives to be the most current text on the market.
•
Overall principle. This book continues to stress a single all-encompassing theme:
The right information, if it is delivered to the right person, in the right fashion, and
at the right time, can improve and ensure organizational effectiveness and efficiency.
•
Information systems principles. Information systems principles summarize key
concepts that every student should know. These principles are highlighted at the
start of each chapter and covered thoroughly in the text.
•
Global perspective. We stress the global aspects of information systems as a major
theme.
•
Learning objectives linked to principles. Carefully crafted learning objectives are
included with every chapter. The learning objectives are linked to the Information
Systems Principles and reflect what a student should be able to accomplish after
completing a chapter.
•
Opening vignettes emphasize international aspects. All of the chapter-opening vignettes raise actual issues from foreign-based or multinational companies.
•
Why Learn About features. Each chapter has a “Why Learn About” section at the
beginning of the chapter to pique student interest. The section sets the stage for
students by briefly describing the importance of the chapter’s material to the
students—whatever their chosen field.
•
Information Systems @ Work special interest boxes. Each chapter has an entirely
new “Information Systems @ Work” box that shows how information systems are
used in a variety of business career areas.
•
Ethical and Societal Issues special interest boxes. Each chapter includes an “Ethical
and Societal Issues” box that presents a timely look at the ethical challenges and the
societal impact of information systems
xxiii
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
•
Current examples, boxes, cases, and references. As in each edition, we take great
pride in presenting the most recent examples, boxes, cases, and references throughout
the text. Some of these were developed at the last possible moment, literally weeks
before the book went into publication. Information on new hardware and software,
the latest operating systems, mobile commerce, the Internet, electronic commerce,
ethical and societal issues, and many other current developments can be found
throughout the text. Our adopters have come to expect the best and most recent
material. We have done everything we can to meet or exceed these expectations.
•
Summary linked to principles. Each chapter includes a detailed summary, with each
section of the summary tied to an associated information systems principle.
•
Self-assessment tests. This popular feature helps students review and test their understanding of key chapter concepts.
•
Career exercises. End-of-chapter career exercises ask students to research how a topic
discussed in the chapter relates to a business area of their choice. Students are encouraged to use the Internet, the college library, or interviews to collect information
about business careers.
•
End-of-chapter cases. Two end-of-chapter cases provide students with an opportunity to apply the principles covered to real-world problems from actual organizations.
The cases can be assigned as individual homework exercises or serve as a basis for
class discussion.
•
Integrated, comprehensive, Web case. The Altitude Online case at the end of each
chapter provides an integrated and comprehensive case that runs throughout the
text. The cases follow the activities of two individuals employed at the fictitious
Altitude Online consulting firm as they are challenged to complete various IS-related
projects. The cases provide a realistic fictional work environment in which students
may imagine themselves in the role of systems analyst. Information systems problems
are addressed using the state-of-the-art techniques discussed in the chapters.
STUDENT RESOURCES
CourseMate
The more you study, the better the results. Make the most of your study time by accessing
everything you need to succeed in one place. Read your textbook, take notes, review flashcards, and take practice quizzes—online with CourseMate. Principles of Information Systems,
Tenth Edition CourseMate includes:
•
An interactive eBook with highlighting, note taking, and an interactive glossary
•
Interactive learning tools, including:
•
Quizzes
•
Flashcards
•
PowerPoint presentations
•
Classic cases
•
Links to useful Web sites
•
and more!
xxiv
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
PowerPoint Slides
Direct access is offered to the book’s PowerPoint presentations that cover the key points from
each chapter. These presentations are a useful study tool.
Classic Cases
A frequent request from adopters is that they’d like a broader selection of cases to choose
from. To meet this need, a set of over 200 cases from the fifth, sixth, seventh, eighth, and
ninth editions of the text are included here. These are the authors’ choices of the “best cases”
from these editions and span a broad range of companies and industries.
Links to Useful Web Sites
Chapters in Principles of Information Systems, Tenth Edition reference many interesting Web
sites. This resource takes you to links you can follow directly to the home pages of those sites
so that you can explore them. There are additional links to Web sites that the authors think
you would be interested in checking out.
Hands-On Activities
Use these hands-on activities to test your comprehension of IS topics and enhance your skills
using Microsoft® Office applications and the Internet. Using these links, you can access three
critical-thinking exercises per chapter; each activity asks you to work with an Office tool or
do some research on the Internet.
Quizzes
This tool allows you to access 20 multiple-choice questions for each chapter; test yourself
and then submit your answers. You will immediately find out what questions you got right
and what you got wrong. For each question that you answer incorrectly, you are given the
correct answer and the page in your text where that information is covered.
Glossary of Key Terms
The glossary of key terms from the text is available to search.
Online Readings
This feature provides you access to a computer database that contains articles relating to hot
topics in Information Systems.
INSTRUCTOR RESOURCES
The teaching tools that accompany this text offer many options for enhancing a course. And,
as always, we are committed to providing one of the best teaching resource packages available
in this market.
CourseMate
Cengage Learning’s Principles of Information Systems, Tenth Edition’s CourseMate brings
course concepts to life with interactive learning, study, and exam preparation tools that support the printed textbook. Watch student comprehension soar as your class works with the
printed textbook and the textbook-specific Web site. CourseMate goes beyond the book to
deliver what you need! Learn more at cengage.com/coursemate.
xxv
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
•
Engagement Tracker
How do you assess your students' engagement in your course? How do you know
your students have read the material or viewed the resources you've assigned? How
can you tell if your students are struggling with a concept? With CourseMate, you
can use the included Engagement Tracker to assess student preparation and engagement. Use the tracking tools to see progress for the class as a whole or for individual
students. Identify students at risk early in the course. Uncover which concepts are
most difficult for your class. Monitor time on task. Keep your students engaged.
•
Interactive Teaching and Learning Tools
CourseMate includes interactive teaching and learning tools:
•
Quizzes
•
Flashcards
•
Games
•
and more
These assets enable students to review for tests, prepare for class, and address the
needs of students’ varied learning styles.
•
Interactive eBook
In addition to interactive teaching and learning tools, CourseMate includes an interactive eBook. Students can take notes, highlight, search for, and interact with
embedded media specific to their book. Use it as a supplement to the printed text,
or as a substitute—the choice is your students’ with CourseMate.
Instructor’s Manual
An all-new Instructor’s Manual provides valuable chapter overviews; highlights key principles
and critical concepts; offers sample syllabi, learning objectives, and discussion topics; and
features possible essay topics, further readings and cases, and solutions to all of the end-ofchapter questions and problems, as well as suggestions for conducting the team activities.
Additional end-of-chapter questions are also included. As always, we are committed to providing the best teaching resource packages available in this market.
Sample Syllabus
A sample syllabus for both a quarter and semester-length course are provided with sample
course outlines to make planning your course that much easier.
Solutions
Solutions to all end-of-chapter material are provided in a separate document for your
convenience.
Test Bank and Test Generator
ExamView® is a powerful objective-based test generator that enables instructors to create
paper-, LAN- or Web-based tests from test banks designed specifically for their Course
Technology text. Instructors can utilize the ultra-efficient QuickTest Wizard to create tests
in less than five minutes by taking advantage of Course Technology’s question banks or
customizing their own exams from scratch. Page references for all questions are provided so
you can cross-reference test results with the book.
PowerPoint Presentations
A set of impressive Microsoft PowerPoint slides is available for each chapter. These slides
are included to serve as a teaching aid for classroom presentation, to make available to
students on the network for chapter review, or to be printed for classroom distribution. Our
xxvi
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
presentations help students focus on the main topics of each chapter, take better notes, and
prepare for examinations. Instructors can also add their own slides for additional topics they
introduce to the class.
Figure Files
Figure files allow instructors to create their own presentations using figures taken directly
from the text.
ACKNOWLEDGMENTS
A book of this scope and undertaking requires a strong team effort. We would like to thank
all of our fellow teammates at Course Technology for their dedication and hard work. We
would like to thank Charles McCormick, our Sr. Acquisitions Editor, for his overall leadership and guidance on this effort. Special thanks to Kate Mason, our Product Manager. Our
appreciation goes out to all the many people who worked behind the scenes to bring this
effort to fruition including Abigail Reip, our photo researcher. We would like to acknowledge
and thank Lisa Ruffolo, our development editor, who deserves special recognition for her
tireless effort and help in all stages of this project. Thanks also to Jill Braiewa, our Sr. Content
Project Manager, who shepherded the book through the production process.
We are grateful to the salesforce at Cengage Learning whose efforts make this all possible.
You helped to get valuable feedback from current and future adopters. As Cengage Learning
product users, we know how important you are.
We would especially like to thank Ken Baldauf for his excellent help in writing the boxes
and cases and revising several chapters for this edition. Ken also provided invaluable feedback
on other aspects of this project.
Ralph Stair would like to thank the Department of Management and its faculty members
in the College of Business Administration at Florida State University for their support and
encouragement. He would also like to thank his family, Lila and Leslie, for their support.
George Reynolds would like to thank his wife, Ginnie, for her patience and support in
this major project.
To Our Previous Adopters and Potential New Users
We sincerely appreciate our loyal adopters of the previous editions and welcome new users
of Principles of Information Systems, Tenth Edition. As in the past, we truly value your needs
and feedback. We can only hope the Tenth Edition continues to meet your high expectations.
OUR COMMITMENT
We are committed to listening to our adopters and readers and to developing creative solutions to meet their needs. The field of IS continually evolves, and we strongly encourage your
participation in helping us provide the freshest, most relevant information possible.
We welcome your input and feedback. If you have any questions or comments regarding
Principles of Information Systems, Tenth Edition, please contact us through Course Technology
or your local representative, or via the Internet at www.cengage.com/mis/stairreynolds.com.
xxvii
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
GLOSSARY
acceptance testing Conducting any
tests required by the user.
accounting MIS An information system
that provides aggregate information on
accounts payable, accounts receivable,
payroll, and many other applications.
ad hoc DSS A DSS concerned with
situations or decisions that come up only
a few times during the life of the
organization.
alpha testing Testing an incomplete or
early version of the system.
antivirus program Software that runs in
the background to protect your computer
from dangers lurking on the Internet and
other possible sources of infected files.
application flowcharts Diagrams that
show relationships among applications or
systems.
attribute A characteristic of an entity.
auditing Analyzing the financial
condition of an organization and
determining whether financial statements
and reports produced by the financial
MIS are accurate.
backbone One of the Internet’s highspeed, long-distance communications
links.
batch processing system A form of data
processing whereby business transactions
are accumulated over a period of time and
prepared for processing as a single unit or
batch.
benchmark test An examination that
compares computer systems operating
under the same conditions.
best practices The most efficient and
effective ways to complete a business
process.
application program interface (API)
An interface that allows applications to
make use of the operating system.
beta testing Testing a complete and
stable system.
application service provider (ASP) A
company that provides software, support,
and the computer hardware on which to
run the software from the user’s facilities
over a network.
blade server A server that houses many
individual computer motherboards that
include one or more processors,
computer memory, computer storage,
and computer network connections.
arithmetic/logic unit (ALU) The part
of the CPU that performs mathematical
calculations and makes logical
comparisons.
Bluetooth A wireless communications
specification that describes how cell
phones, computers, faxes, personal digital
assistants, printers, and other electronic
devices can be interconnected over
distances of 10–30 feet at a rate of about
2 Mbps.
ARPANET A project started by the U.S.
Department of Defense (DoD) in 1969
as both an experiment in reliable
networking and a means to link the DoD
and military research contractors,
including many universities doing
military-funded research.
artificial intelligence (AI) A field in
which the computer system takes on the
characteristics of human intelligence.
artificial intelligence systems People,
procedures, hardware, software, data, and
knowledge needed to develop computer
systems and machines that demonstrate
the characteristics of intelligence.
asking directly An approach to gather
data that asks users, stakeholders, and
other managers about what they want and
expect from the new or modified system.
brainstorming A decision-making
approach that consists of members
offering ideas “off the top of their heads.”
bridge A telecommunications device
that connects two LANs together using
the same telecommunications protocol.
broadband communications A relative
term but generally means a
telecommunications system that can
exchange data very quickly.
business intelligence (BI) The process
of gathering enough of the right
information in a timely manner and
usable form and analyzing it to have a
positive impact on business strategy,
tactics, or operations.
business-to-business (B2B)
e-commerce A subset of e-commerce in
which all the participants are
organizations.
business-to-consumer (B2C)
e-commerce A form of e-commerce in
which customers deal directly with an
organization and avoid intermediaries.
byte (B) Eight bits that together
represent a single character of data.
cache memory A type of high-speed
memory that a processor can access more
rapidly than main memory.
Cascading Style Sheet (CSS) A markup
language for defining the visual design of
a Web page or group of pages.
CASE repository A database of system
descriptions, parameters, and objectives.
central processing unit (CPU) The
part of the computer that consists of three
associated elements: the arithmetic/logic
unit, the control unit, and the register
areas.
centralized processing An approach to
processing wherein all processing occurs
in a single location or facility.
certificate authority (CA) A trusted
third-party organization or company that
issues digital certificates.
certification A process for testing skills
and knowledge, which results in a
statement by the certifying authority that
confirms an individual is capable of
performing particular tasks.
change model A representation of
change theories that identifies the phases
of change and the best way to implement
them.
channel bandwidth The rate at which
data is exchanged, usually measured in
bits per second (bps).
character A basic building block of most
information, consisting of uppercase
letters, lowercase letters, numeric digits,
or special symbols.
chief knowledge officer (CKO) A toplevel executive who helps the organization
use a KMS to create, store, and use
knowledge to achieve organizational
goals.
639
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
640
Glossary
|
chip-and-PIN card A type of card that
employs a computer chip that
communicates with a card reader using
radio frequencies; it does not need to be
swiped at a terminal.
choice stage The third stage of
decision making, which requires
selecting a course of action.
circuit switching network A network
that sets up a circuit between the sender
and receiver before any
communications can occur; this circuit
is maintained for the duration of the
communication and cannot be used to
support any other communications
until the circuit is released and a new
connection is set up.
click fraud A problem arising in a payper-click online advertising
environment where additional clicks
are generated beyond those that come
from actual, legitimate users.
clickstream data The data gathered
based on the Web sites you visit and the
items you click.
client/server architecture An
approach to computing wherein
multiple computer platforms are
dedicated to special functions, such as
database management, printing,
communications, and program
execution.
compact disc read-only memory
(CD-ROM) A common form of
optical disc on which data cannot be
modified once it has been recorded.
consumer-to-consumer (C2C)
e-commerce A subset of e-commerce
that involves consumers selling directly
to other consumers.
competitive advantage A significant
and ideally long-term benefit to a
company over its competition.
contactless card A card with an
embedded chip that only needs to be
held close to a terminal to transfer its
data; no PIN number needs to be
entered.
competitive intelligence One aspect
of business intelligence limited to
information about competitors and the
ways that knowledge affects strategy,
tactics, and operations.
compiler A special software program
that converts the programmer’s source
code into the machine-language
instructions, which consist of binary
digits.
computer literacy Knowledge of
computer systems and equipment and
the ways they function; it includes the
knowledge of equipment and devices
(hardware), programs and instructions
(software), databases, and
telecommunications.
computer network The
communications media, devices, and
software needed to connect two or more
computer systems or devices.
computer programs Sequences of
instructions for the computer.
clock speed A series of electronic
pulses produced at a predetermined rate
that affects machine cycle time.
computer-aided software
engineering (CASE) Tools that
automate many of the tasks required in
a systems development effort and
encourage adherence to the SDLC.
cloud computing A computing
environment where software and
storage are provided as an Internet
service and are accessed with a Web
browser.
computer-assisted manufacturing
(CAM) A system that directly controls
manufacturing equipment.
code of ethics A code that states the
principles and core values that are
essential to a set of people and that
therefore govern their behavior.
cold site A computer environment
that includes rooms, electrical service,
telecommunications links, data storage
devices, and the like; also called a shell.
command-based user interface A
user interface that requires you to give
text commands to the computer to
perform basic activities.
computer-based information system
(CBIS) A single set of hardware,
software, databases,
telecommunications, people, and
procedures that are configured to
collect, manipulate, store, and process
data into information.
content streaming A method for
transferring large media files over the
Internet so that the data stream of voice
and pictures plays more or less
continuously as the file is being
downloaded.
continuous improvement
Constantly seeking ways to improve
business processes to add value to
products and services.
control unit The part of the CPU that
sequentially accesses program
instructions, decodes them, and
coordinates the flow of data in and out
of the ALU, the registers, the primary
storage, and even secondary storage and
various output devices.
coprocessor The part of the computer
that speeds processing by executing
specific types of instructions while the
CPU works on another processing
activity.
cost center A division within a
company that does not directly generate
revenue.
cost/benefit analysis An approach
that lists the costs and benefits of each
proposed system. After they are
expressed in monetary terms, all the
costs are compared with all the benefits.
counterintelligence The steps an
organization takes to protect
information sought by “hostile”
intelligence gatherers.
creative analysis The investigation of
new approaches to existing problems.
computer-integrated manufacturing
(CIM) Using computers to link the
components of the production process
into an effective system.
criminal hacker (cracker) A
computer-savvy person who attempts
to gain unauthorized or illegal access to
computer systems to steal passwords,
corrupt files and programs, or even
transfer money.
concurrency control A method of
dealing with a situation in which two or
more users or applications need to
access the same record at the same time.
critical analysis The unbiased and
careful questioning of whether system
elements are related in the most
effective ways.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
critical path Activities that, if delayed,
would delay the entire project.
critical success factors (CSFs) Factors
that are essential to the success of a
functional area of an organization.
cross-platform development A
software development technique that
allows programmers to develop
programs that can run on computer
systems having different hardware and
operating systems, or platforms.
culture A set of major understandings
and assumptions shared by a group.
customer relationship management
(CRM) system A system that helps a
company manage all aspects of
customer encounters, including
marketing and advertising, sales,
customer service after the sale, and
programs to retain loyal customers.
cybermall A single Web site that offers
many products and services at one
Internet location.
cyberterrorist Someone who
intimidates or coerces a government or
organization to advance his political or
social objectives by launching
computer-based attacks against
computers, networks, and the
information stored on them.
data Raw facts, such as an employee
number, total hours worked in a week,
inventory part numbers, or sales orders.
data administrator A nontechnical
position responsible for defining and
implementing consistent principles for
a variety of data issues.
data analysis The manipulation of
collected data so that the development
team members who are participating in
systems analysis can use the data.
data center A climate-controlled
building or set of buildings that house
database servers and the systems that
deliver mission-critical information and
services.
data correction The process of
reentering data that was not typed or
scanned properly.
Glossary
data store Representation of a storage
location for data.
data definition language (DDL) A
collection of instructions and
commands used to define and describe
data and relationships in a specific
database.
data warehouse A large database that
collects business information from
many sources in the enterprise, covering
all aspects of the company’s processes,
products, and customers, in support of
management decision making.
data dictionary A detailed description
of all the data used in the database.
database An organized collection of
facts and information.
data editing The process of checking
data for validity and completeness.
database administrator (DBA) A
skilled IS professional who directs all
activities related to an organization’s
database.
data entry Converting humanreadable data into a machine-readable
form.
data input Transferring machinereadable data into the system.
data item The specific value of an
attribute.
database approach to data
management An approach to data
management whereby a pool of related
data is shared by multiple information
systems.
data loss prevention (DLP) Systems
designed to lock down—to identify,
monitor, and protect—data within an
organization.
database management system
(DBMS) A group of programs that
manipulate the database and provide an
interface between the database and the
user of the database and other
application programs.
data manipulation The process of
performing calculations and other data
transformations related to business
transactions.
data-flow diagram (DFD) A model of
objects, associations, and activities that
describes how data can flow between
and around various objects.
data manipulation language
(DML) A specific language, provided
with a DBMS, which allows users to
access and modify the data, to make
queries, and to generate reports.
data-flow line Arrows that show the
direction of data element movement.
data mart A subset of a data
warehouse, used by small and mediumsized businesses and departments
within large companies to support
decision making.
data mining An information-analysis
tool that involves the automated
discovery of patterns and relationships
in a data warehouse.
data model A diagram of data entities
and their relationships.
data cleanup The process of looking
for and fixing inconsistencies to ensure
that data is accurate and complete.
data preparation, or data
conversion Making sure all files and
databases are ready to be used with new
computer software and systems.
data collection Capturing and
gathering all data necessary to complete
the processing of transactions.
data storage The process of updating
one or more databases with new
transactions.
decentralized processing An
approach to processing wherein
processing devices are placed at various
remote locations.
decision room A room that supports
decision making, with the decision
makers in the same building,
combining face-to-face verbal
interaction with technology to make
the meeting more effective and
efficient.
decision support system (DSS) An
organized collection of people,
procedures, software, databases, and
devices used to support problemspecific decision making.
decision-making phase The first part
of problem solving, including three
stages: intelligence, design, and choice.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
641
Licensed to: iChapters User
642
Glossary
|
delphi approach A decision-making
approach in which group decision
makers are geographically dispersed;
this approach encourages diversity
among group members and fosters
creativity and original thinking in
decision making.
direct access A retrieval method in
which data can be retrieved without the
need to read and discard other data.
demand report A report developed to
give certain information at someone’s
request rather than on a schedule.
direct conversion (also called plunge
or direct cutover) Stopping the old
system and starting the new system on
a given date.
design report The primary result of
systems design, reflecting the decisions
made and preparing the way for systems
implementation.
direct observation Directly observing
the existing system in action by one or
more members of the analysis team.
design stage The second stage of
decision making, in which you develop
alternative solutions to the problem and
evaluate their feasibility.
desktop computer A relatively small,
inexpensive, single-user computer that
is highly versatile.
dialogue manager A user interface
that allows decision makers to easily
access and manipulate the DSS and to
use common business terms and
phrases.
digital audio player A device that can
store, organize, and play digital music
files.
digital camera An input device used
with a PC to record and store images
and video in digital form.
digital certificate An attachment to an
e-mail message or data embedded in a
Web site that verifies the identity of a
sender or Web site.
digital rights management (DRM)
Refers to the use of any of several
technologies to enforce policies for
controlling access to digital media such
as movies, music, and software.
digital subscriber line (DSL) A
telecommunications service that
delivers high-speed Internet access to
homes and small businesses over the
existing phone lines of the local
telephone network
digital video disc (DVD) A storage
medium used to store software, video
games, and movies.
direct access storage device
(DASD) A device used for direct access
of secondary storage data.
disaster recovery The
implementation of the disaster plan.
disk mirroring A process of storing
data that provides an exact copy that
protects users fully in the event of data
loss.
distributed database A database in
which the data can be spread across
several smaller databases connected via
telecommunications devices.
distributed processing An approach
to processing wherein processing
devices are placed at remote locations
but are connected to each other via a
network.
document production The process of
generating output records and reports.
documentation Text that describes a
program’s functions to help the user
operate the computer system.
domain The allowable values for data
attributes.
domain expert The person or group
with the expertise or knowledge the
expert system is trying to capture
(domain).
downsizing Reducing the number of
employees to cut costs.
drill-down report A report providing
increasingly detailed data about a
situation.
dumpster diving Going through the
trash cans of an organization to find
secret or confidential information,
including information needed to access
an information system or its data.
e-commerce Any business transaction
executed electronically between
companies (business-to-business, or
B2B), companies and consumers
(business-to-consumer, or B2C),
consumers and other consumers
(consumer-to-consumer, or C2C),
business and the public sector, and
consumers and the public sector.
economic feasibility The
determination of whether the project
makes financial sense and whether
predicted benefits offset the cost and
time needed to obtain them.
economic order quantity (EOQ)
The quantity that should be reordered
to minimize total inventory costs.
effectiveness A measure of the extent
to which a system achieves its goals; it
can be computed by dividing the goals
actually achieved by the total of the
stated goals.
efficiency A measure of what is
produced divided by what is consumed.
e-Government The use of
information and communications
technology to simplify the sharing of
information, speed formerly paperbased processes, and improve the
relationship between citizens and
government.
electronic business (e-business)
Using information systems and the
Internet to perform all business-related
tasks and functions.
electronic cash An amount of money
that is computerized, stored, and used
as cash for e-commerce transactions.
electronic commerce Conducting
business activities (e.g., distribution,
buying, selling, marketing, and
servicing of products or services)
electronically over computer networks.
electronic document distribution A
process that enables the sending and
receiving of documents in a digital form
without being printed (although
printing is possible).
electronic exchange An electronic
forum where manufacturers, suppliers,
and competitors buy and sell goods,
trade market information, and run
back-office operations.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
electronic retailing (e-tailing) The
direct sale of products or services by
businesses to consumers through
electronic storefronts, typically
designed around an electronic catalog
and shopping cart model.
environmental design Also called
green design, it involves systems
development efforts that slash power
consumption, require less physical
space, and result in systems that can be
disposed of in a way that doesn’t
negatively affect the environment.
empowerment Giving employees and
their managers more responsibility and
authority to make decisions, take
certain actions, and have more control
over their jobs.
ergonomics The science of designing
machines, products, and systems to
maximize the safety, comfort, and
efficiency of the people who use them.
encryption The process of converting
an original message into a form that can
be understood only by the intended
receiver.
encryption key A variable value that is
applied (using an algorithm) to a set of
unencrypted text to produce encrypted
text or to decrypt encrypted text.
end-user systems development Any
systems development project in which
the primary effort is undertaken by a
combination of business managers and
users.
enterprise data modeling Data
modeling done at the level of the entire
enterprise.
enterprise resource planning (ERP)
system A set of integrated programs
capable of managing a company’s vital
business operations for an entire
multisite, global organization.
enterprise sphere of influence The
sphere of influence that serves the needs
of the firm in its interaction with its
environment.
enterprise system A system central to
the organization that ensures
information can be shared across all
business functions and all levels of
management to support the running
and managing of a business.
event-driven review A review
triggered by a problem or opportunity
such as an error, a corporate merger, or
a new market for products.
exception report A report
automatically produced when a
situation is unusual or requires
management action.
execution time (E-time) The time it
takes to execute an instruction and store
the results.
executive support system (ESS)
Specialized DSS that includes all
hardware, software, data, procedures,
and people used to assist senior-level
executives within the organization.
expert system A system that gives a
computer the ability to make
suggestions and function like an expert
in a particular field.
explanation facility Component of
an expert system that allows a user or
decision maker to understand how the
expert system arrived at certain
conclusions or results.
Extensible Markup Language
(XML) The markup language
designed to transport and store data on
the Web.
external auditing Auditing performed
by an outside group.
entity A general class of people, places,
or things for which data is collected,
stored, and maintained.
extranet A network based on Web
technologies that allows selected
outsiders, such as business partners and
customers, to access authorized
resources of a company’s intranet.
entity symbol Representation of
either a source or destination of a data
element.
feasibility analysis Assessment of the
technical, economic, legal, operational,
and schedule feasibility of a project.
entity-relationship (ER)
diagrams Data models that use basic
graphical symbols to show the
organization of and relationships
between data.
feedback Output that is used to make
changes to input or processing
activities.
Glossary
field Typically a name, number, or
combination of characters that
describes an aspect of a business object
or activity.
file A collection of related records.
File Transfer Protocol (FTP) A
protocol that provides a file transfer
process between a host and a remote
computer and allows users to copy files
from one computer to another.
final evaluation A detailed
investigation of the proposals offered by
the vendors remaining after the
preliminary evaluation.
financial MIS An information system
that provides financial information for
executives and for a broader set of
people who need to make better
decisions on a daily basis.
five-forces model A widely accepted
model that identifies five key factors
that can lead to attainment of
competitive advantage, including (1)
the rivalry among existing competitors,
(2) the threat of new entrants, (3) the
threat of substitute products and
services, (4) the bargaining power of
buyers, and (5) the bargaining power of
suppliers.
flat organizational structure An
organizational structure with a reduced
number of management layers.
flexible manufacturing system
(FMS) An approach that allows
manufacturing facilities to rapidly and
efficiently change from making one
product to making another.
forecasting Predicting future events to
avoid problems.
front-end processors Special-purpose
computers that manage
communications to and from a large
computer serving hundreds or even
thousands of users.
full-duplex channel A
communications channel that permits
data transmission in both directions at
the same time; a full-duplex channel is
like two simplex channels.
game theory The use of information
systems to develop competitive
strategies for people, organizations, or
even countries.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
643
Licensed to: iChapters User
644
Glossary
|
Gantt chart A graphical tool used for
planning, monitoring, and
coordinating projects.
gateway A telecommunications device
that serves as an entrance to another
network.
genetic algorithm An approach to
solving large, complex problems in
which many related operations or
models change and evolve until the best
one emerges.
geographic information system
(GIS) A computer system capable of
assembling, storing, manipulating, and
displaying geographic information, that
is, data identified according to its
location.
gigahertz (GHz) Billions of cycles per
second, a measure of clock speed.
Global System for Mobile
Communications (GSM) A globally
accepted standard for digital cellular
communications.
graphical user interface (GUI) An
interface that displays pictures (icons)
and menus that people use to send
commands to the computer system.
graphics processing unit (GPU) A
specialized processor that offloads the
tasks associated with 3D graphics
rendering from the CPU.
green computing A program
concerned with the efficient and
environmentally responsible design,
manufacture, operation, and disposal of
IS related products.
grid chart A table that shows
relationships among the various aspects
of a systems development effort.
group support system (GSS)
Software application that consists of
most elements in a DSS, plus software
to provide effective support in group
decision making; also called group
support system or computerized
collaborative work system.
identity theft Someone using your
personally identifying information
without your permission to commit
fraud or other crimes.
hacker A person who enjoys computer
technology and spends time learning
and using computer systems.
image log A separate file that contains
only changes to applications.
half-duplex channel A
communications channel that can
transmit data in either direction, but
not simultaneously.
handheld computer A single-user
computer that provides ease of
portability because of its small size.
IF-THEN statements Rules that
suggest certain conclusions.
implementation stage A stage of
problem solving in which a solution is
put into effect.
incremental backup A backup copy
of all files changed during the last few
days or the last week.
hardware The physical components of
a computer that perform the input,
processing, storage, and output
activities of the computer.
inference engine Part of the expert
system that seeks information and
relationships from the knowledge base
and provides answers, predictions, and
suggestions similar to the way a human
expert would.
heuristics “Rules of thumb,” or
commonly accepted guidelines or
procedures that usually find a good
solution.
informatics A specialized system that
combines traditional disciplines, such
as science and medicine, with computer
systems and technology.
hierarchy of data Bits, characters,
fields, records, files, and databases.
information A collection of facts
organized and processed so that they
have additional value beyond the value
of the individual facts.
highly structured problems
Problems that are straightforward and
require known facts and relationships.
hot site A duplicate, operational
hardware system or immediate access to
one through a specialized vendor.
HTML tags Codes that tell the Web
browser how to format text—as a
heading, as a list, or as body text—and
whether images, sound, and other
elements should be inserted.
information center A support
function that provides users with
assistance, training, application
development, documentation,
equipment selection and setup,
standards, technical assistance, and
troubleshooting.
information service unit A miniature
IS department attached and directly
reporting to a functional area in a large
organization.
grid computing The use of a
collection of computers, often owned
by multiple individuals or
organizations, to work in a coordinated
manner to solve a common problem.
human resource MIS (HRMIS) An
information system that is concerned
with activities related to previous,
current, and potential employees of an
organization, also called a personnel
MIS.
information system (IS) A set of
interrelated components that collect,
manipulate, store, and disseminate data
and information and provide a feedback
mechanism to meet an objective.
group consensus Decision making by
a group that is appointed and given the
responsibility of making the final
evaluation and selection.
hyperlink Highlighted text or
graphics in a Web document, that,
when clicked, opens a new Web page
containing related content.
information systems literacy
Knowledge of how data and
information are used by individuals,
groups, and organizations.
group consensus approach A
decision-making approach that forces
members in the group to reach a
unanimous decision.
Hypertext Markup Language
(HTML) The standard page
description language for Web pages.
information systems
planning Translating strategic and
organizational goals into systems
development initiatives.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
infrared transmission A form of
communications that sends signals at a
frequency of 300 GHz and above—
higher than those of microwaves but
lower than those of visible light.
input The activity of gathering and
capturing raw data.
insider An employee, disgruntled or
otherwise, working solo or in concert
with outsiders to compromise corporate
systems.
installation The process of physically
placing the computer equipment on the
site and making it operational.
instant messaging A method that
allows two or more people to
communicate online in real time using
the Internet.
institutional DSS A DSS that handles
situations or decisions that occur more
than once, usually several times per year
or more. An institutional DSS is used
repeatedly and refined over the years.
instruction time (I-time) The time it
takes to perform the fetch-instruction
and decode-instruction steps of the
instruction phase.
integrated development
environments (IDEs) A development
approach that combines the tools
needed for programming with a
programming language into one
integrated package.
integration testing Testing all related
systems together.
intellectual property Includes works
of the mind such as books, films, music,
processes, and software, which are
unique and are owned or created by a
single entity.
intelligence stage The first stage of
decision making, in which you identify
and define potential problems or
opportunities.
intelligent agent Programs and a
knowledge base used to perform a
specific task for a person, a process, or
another program; also called intelligent
robot or bot.
intelligent behavior The ability to
learn from experiences and apply
knowledge acquired from those
experiences, handle complex situations,
solve problems when important
information is missing, determine what
is important and to react quickly and
correctly to a new situation, understand
visual images, process and manipulate
symbols, be creative and imaginative,
and use heuristics.
internal auditing Auditing performed
by individuals within the organization.
Internet The world’s largest computer
network, consisting of thousands of
interconnected networks, all freely
exchanging information.
Internet Protocol (IP) A
communication standard that enables
computers to route communications
traffic from one network to another as
needed.
Internet service provider (ISP) Any
organization that provides Internet
access to people.
intranet An internal network based on
Web technologies that allows people
within an organization to exchange
information and work on projects.
intrusion detection system (IDS)
Software that monitors system and
network resources and notifies network
security personnel when it senses a
possible intrusion.
Glossary
key-indicator report A summary of
the previous day’s critical activities,
typically available at the beginning of
each workday.
knowledge The awareness and
understanding of a set of information
and ways that information can be made
useful to support a specific task or reach
a decision.
knowledge acquisition facility Part
of the expert system that provides a
convenient and efficient means of
capturing and storing all the
components of the knowledge base.
knowledge base The collection of
data, rules, procedures, and
relationships that must be followed to
achieve value or the proper outcome.
knowledge engineer A person who
has training or experience in the design,
development, implementation, and
maintenance of an expert system.
knowledge user The person or group
who uses and benefits from the expert
system.
laptop computer A personal
computer designed for use by mobile
users; it is small and light enough to sit
comfortably on a user’s lap.
IP address A 64-bit number that
identifies a computer on the Internet.
LCD display Flat display that uses
liquid crystals—organic, oil-like
material placed between two
polarizers—to form characters and
graphic images on a backlit screen.
Java An object-oriented programming
language from Sun Microsystems based
on the C++ programming language,
which allows applets to be embedded
within an HTML document.
learning systems A combination of
software and hardware that allows the
computer to change how it functions or
reacts to situations based on feedback it
receives.
joining Manipulating data to combine
two or more tables.
legal feasibility The determination of
whether laws or regulations may
prevent or limit a systems development
project.
just-in-time (JIT) inventory An
inventory management approach in
which inventory and materials are
delivered just before they are used in
manufacturing a product.
kernel The heart of the operating
system, which controls its most critical
processes.
key A field or set of fields in a record
that is used to identify the record.
linking Data manipulation that
combines two or more tables using
common data attributes to form a new
table with only the unique data
attributes.
local area network (LAN) A network
that connects computer systems and
devices within a small area, such as an
office, home, or several floors in a
building.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
645
Licensed to: iChapters User
646
Glossary
|
logical design A description of the
functional requirements of a system.
megahertz (MHz) Millions of cycles
per second, a measure of clock speed.
machine cycle The instruction phase
followed by the execution phase.
magnetic disk A direct-access storage
device, with bits represented by
magnetized areas.
meta tag An HTML code, not visible
on the displayed Web page, that
contains keywords representing your
site’s content, which search engines use
to build indexes pointing to your
Web site.
magnetic stripe card A type of card
that stores a limited amount of data by
modifying the magnetism of tiny ironbased particles contained in a band on
the card.
metropolitan area network (MAN)
A telecommunications network that
connects users and their computers in a
geographical area that spans a campus
or city.
magnetic tape A type of sequential
secondary storage medium, now used
primarily for storing backups of critical
organizational data in the event of a
disaster.
microcode Predefined, elementary
circuits and logical operations that the
processor performs when it executes an
instruction.
mainframe computer A large,
powerful computer often shared by
hundreds of concurrent users
connected to the machine via terminals.
maintenance team A special IS team
responsible for modifying, fixing, and
updating existing software.
make-or-buy decision The decision
regarding whether to obtain the
necessary software from internal or
external sources.
management information system
(MIS) An organized collection of
people, procedures, software, databases,
and devices that provides routine
information to managers and decision
makers.
market segmentation The
identification of specific markets to
target them with advertising messages.
marketing MIS An information
system that supports managerial
activities in product development,
distribution, pricing decisions,
promotional effectiveness, and sales
forecasting.
massively parallel processing A form
of multiprocessing that speeds
processing by linking hundreds or
thousands of processors to operate at
the same time, or in parallel, with each
processor having its own bus, memory,
disks, copy of the operating system, and
applications.
material requirements planning
(MRP) A set of inventory-control
techniques that help coordinate
thousands of inventory items when the
demand of one item is dependent on the
demand for another.
middleware Software that allows
various systems to communicate and
exchange data.
MIPS Millions of instructions per
second, a measure of machine cycle
time.
mission-critical systems Systems that
play a pivotal role in an organization’s
continued operations and goal
attainment.
mobile commerce (m-commerce)
The use of mobile, wireless devices to
place orders and conduct business.
model base Part of a DSS that allows
managers and decision makers to
perform quantitative analysis on both
internal and external data.
model management software
(MMS) Software that coordinates the
use of models in a DSS.
multicore microprocessor A
microprocessor that combines two or
more independent processors into a
single computer so they can share the
workload and improve processing
capacity.
multimedia Text, graphics, video,
animation, audio, and other media that
can be used to help an organization
efficiently and effectively achieve its
goals.
multiplexer A device that combines
data from multiple data sources into a
single output signal that carries
multiple channels, thus reducing the
number of communications links
needed and lowering
telecommunications costs.
multiprocessing The simultaneous
execution of two or more instructions
at the same time.
natural language processing
Processing that allows the computer to
understand and react to statements and
commands made in a “natural”
language, such as English.
Near Field Communication (NFC)
A very short-range wireless connectivity
technology designed for cell phones and
credit cards.
netbook computer The smallest,
lightest, least expensive member of the
laptop computer family.
nettop computer An inexpensive
desktop computer designed to be
smaller, lighter, and consume much less
power than a traditional desktop
computer.
modem A telecommunications
hardware device that converts
(modulates and demodulates)
communications signals so they can be
transmitted over the communication
media.
network operating system (NOS)
Systems software that controls the
computer systems and devices on a
network and allows them to
communicate with each other.
monitoring stage The final stage of
the problem-solving process, in which
decision makers evaluate the
implementation.
network-attached storage (NAS)
Hard disk storage that is set up with its
own network address rather than being
attached to a computer.
Moore’s Law A hypothesis stating that
transistor densities on a single chip will
double every two years.
networking protocol A set of rules,
algorithms, messages, and other
mechanisms that enable software and
hardware in networked devices to
communicate effectively.
MP3 A standard format for
compressing a sound sequence into a
small file.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
network-management
software Software that enables a
manager on a networked desktop to
monitor the use of individual
computers and shared hardware (such
as printers); scan for viruses; and ensure
compliance with software licenses.
networks Computers and equipment
that are connected in a building, around
the country, or around the world to
enable electronic communications.
neural network A computer system
that can act like or simulate the
functioning of a human brain.
nominal group technique A decisionmaking approach that encourages
feedback from individual group
members, and the final decision is made
by voting, similar to the way public
officials are elected.
nonprogrammed decision A decision
that deals with unusual or exceptional
situations.
notebook computer Smaller than a
laptop computer, an extremely
lightweight computer that weighs less
than 6 pounds and can easily fit in a
briefcase.
object-oriented database A database
that stores both data and its processing
instructions.
object-oriented database
management system (OODBMS) A
group of programs that manipulate an
object-oriented database and provide a
user interface and connections to other
application programs.
object-oriented systems development
(OOSD) An approach to systems
development that combines the logic of
the systems development life cycle with
the power of object-oriented modeling
and programming.
object-relational database
management system (ORDBMS) A
DBMS capable of manipulating audio,
video, and graphical data.
off-the-shelf software Software massproduced by software vendors to
address needs that are common across
businesses, organizations, or
individuals.
on-demand computing Contracting
for computer resources to rapidly
respond to an organization’s varying
workflow. Also called on-demand
business and utility computing.
online analytical processing
(OLAP) Software that allows users to
explore data from a number of
perspectives.
online transaction processing
(OLTP) A form of data processing
where each transaction is processed
immediately, without the delay of
accumulating transactions into a batch.
open-source software Software that is
distributed, typically for free, with the
source code also available so that it can
be studied, changed, and improved by
its users.
operating system (OS) A set of
computer programs that controls the
computer hardware and acts as an
interface with applications.
operational feasibility The measure
of whether the project can be put into
action or operation.
optical storage device A form of data
storage that uses lasers to read and write
data.
optimization model A process to find
the best solution, usually the one that
will best help the organization meet its
goals.
organic light-emitting diode (OLED)
display Flat display that uses a layer of
organic material sandwiched between
two conductors, which, in turn, are
sandwiched between a glass top plate
and a glass bottom plate so that when
electric current is applied to the two
conductors, a bright, electroluminescent light is produced directly
from the organic material.
organization A formal collection of
people and other resources established
to accomplish a set of goals.
organizational change How forprofit and nonprofit organizations plan
for, implement, and handle change.
organizational culture The major
understandings and assumptions for a
business, corporation, or other
organization.
Glossary
organizational learning The
adaptations to new conditions or
adjustments based on experience and
ideas over time.
organizational structure
Organizational subunits and the way
they relate to the overall organization.
output Production of useful
information, usually in the form of
documents and reports.
outsourcing Contracting with outside
professional services to meet specific
business needs.
packet switching network A network
in which no fixed path is created
between the communicating devices
and the data is broken into packets,
with each packet transmitted
individually and capable of taking
various paths from sender to recipient.
parallel computing The simultaneous
execution of the same task on multiple
processors to obtain results faster.
parallel start-up Running both the
old and new systems for a period of time
and comparing the output of the new
system closely with the output of the old
system; any differences are reconciled.
When users are comfortable that the
new system is working correctly, the old
system is eliminated.
password sniffer A small program
hidden in a network or a computer
system that records identification
numbers and passwords.
patch A minor change to correct a
problem or make a small enhancement.
It is usually an addition to an existing
program.
p-card (procurement card or
purchasing card) A credit card used to
streamline the traditional purchase
order and invoice payment processes.
perceptive system A system that
approximates the way a person sees,
hears, and feels objects.
personal area network (PAN) A
network that supports the
interconnection of information
technology within a range of 33 feet
or so.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
647
Licensed to: iChapters User
648
Glossary
|
personal productivity software The
software that enables users to improve
their personal effectiveness, increasing
the amount of work and quality of work
they can do.
personal sphere of influence The
sphere of influence that serves the needs
of an individual user.
personalization The process of
tailoring Web pages to specifically
target individual consumers.
phase-in approach Slowly replacing
components of the old system with
those of the new one; this process is
repeated for each application until the
new system is running every application
and performing as expected; also called
a piecemeal approach.
phishing A practice that entails
sending bogus messages purportedly
from a legitimate institution to pry
personal information from customers
by convincing them to go to a “spoofed”
Web site.
physical design The specification of
the characteristics of the system
components necessary to put the logical
design into action.
pilot start-up Running the new
system for one group of users rather
than all users.
pipelining A form of CPU operation
in which multiple execution phases are
performed in a single machine cycle.
pixel A dot of color on a photo image
or a point of light on a display screen.
planned data redundancy A way of
organizing data in which the logical
database design is altered so that certain
data entities are combined, summary
totals are carried in the data records
rather than calculated from elemental
data, and some data attributes are
repeated in more than one data entity
to improve database performance.
point evaluation system An
evaluation process in which each
evaluation factor is assigned a weight, in
percentage points, based on
importance. Then each proposed
system is evaluated in terms of each
factor and given a score ranging from 0
to 100. The scores are totaled, and the
system with the greatest total score is
selected.
point-of-sale (POS) device A
terminal used to enter data into the
computer system.
policy-based storage
management Automation of storage
using previously defined policies.
portable computer A computer small
enough to carry easily.
predictive analysis A form of data
mining that combines historical data
with assumptions about future
conditions to predict outcomes of
events, such as future product sales or
the probability that a customer will
default on a loan.
preliminary evaluation An initial
assessment whose purpose is to dismiss
the unwanted proposals; begins after all
proposals have been submitted.
primary key A field or set of fields that
uniquely identifies the record.
primary storage (main memory;
memory) The part of the computer
that holds program instructions and
data.
private branch exchange (PBX) A
telephone switching exchange that
serves a single organization.
problem solving A process that goes
beyond decision making to include the
implementation stage.
procedures The strategies, policies,
methods, and rules for using a CBIS.
plasma display A type of display using
thousands of smart cells (pixels)
consisting of electrodes and neon and
xenon gases that are electrically turned
into plasma (electrically charged atoms
and negatively charged particles) to
emit light.
process A set of logically related tasks
performed to achieve a defined
outcome.
Platform for Privacy Preferences
(P3P) A screening technology in Web
browsers that shields users from Web
sites that don’t provide the level of
privacy protection they desire.
processing Converting or
transforming data into useful outputs.
process symbol Representation of a
function that is performed.
productivity A measure of the output
achieved divided by the input required.
profit center A department within an
organization that focuses on generating
profits.
Program Evaluation and Review
Technique (PERT) A formalized
approach for developing a project
schedule.
programmed decision A decision
made using a rule, procedure, or
quantitative method.
programmer A specialist responsible
for modifying or developing programs
to satisfy user requirements.
programming languages Sets of
keywords, commands, and symbols and
a system of rules for constructing
statements by which humans can
communicate instructions to a
computer.
project deadline The date the entire
project is to be completed and
operational.
project milestone A critical date for
the completion of a major part of the
project.
project organizational structure A
structure centered on major products or
services.
project schedule A detailed
description of what is to be done.
projecting Manipulating data to
eliminate columns in a table.
proprietary software One-of-a-kind
software designed for a specific
application and owned by the
company, organization, or person that
uses it.
prototyping An iterative approach to
the systems development process in
which at each iteration requirements
and alternative solutions to a problem
are identified and analyzed, new
solutions are designed, and a portion of
the system is implemented.
quality The ability of a product or
service to meet or exceed customer
expectations.
quality control A process that ensures
that the finished product meets the
customers’ needs.
questionnaires A method of gathering
data when the data sources are spread
over a wide geographic area.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
Radio Frequency Identification
(RFID) A technology that employs a
microchip with an antenna to broadcast
its unique identifier and location to
receivers.
random access memory (RAM) A
form of memory in which instructions
or data can be temporarily stored.
rapid application development
(RAD) A systems development
approach that employs tools,
techniques, and methodologies
designed to speed application
development.
read-only memory (ROM) A
nonvolatile form of memory.
record A collection of data fields all
related to one object, activity, or
individual.
redundant array of independent/
inexpensive disks (RAID) A method
of storing data that generates extra bits
of data from existing data, allowing the
system to create a “reconstruction map”
so that if a hard drive fails, the system
can rebuild lost data.
reengineering (process redesign)
The radical redesign of business
processes, organizational structures,
information systems, and values of the
organization to achieve a breakthrough
in business results.
register A high-speed storage area in
the CPU used to temporarily hold small
units of program instructions and data
immediately before, during, and after
execution by the CPU.
relational model A database model
that describes data in which all data
elements are placed in two-dimensional
tables, called relations, which are the
logical equivalent of files.
release A significant program change
that often requires changes in the
documentation of the software.
reorder point (ROP) A critical
inventory quantity level that calls for
more inventory to be ordered for an
item when the inventory level drops to
the reorder point or critical level.
replicated database A database that
holds a duplicate set of frequently used
data.
Glossary
report layout A technique that allows
designers to diagram and format
printed reports.
scheduled report A report produced
periodically, such as daily, weekly, or
monthly.
request for maintenance form A
form authorizing modification of
programs.
schema A description of the entire
database.
request for proposal (RFP) A
document that specifies in detail
required resources such as hardware and
software.
requirements analysis The
determination of user, stakeholder, and
organizational needs.
return on investment (ROI) One
measure of IS value that investigates the
additional profits or benefits that are
generated as a percentage of the
investment in IS technology.
revenue center A division within a
company that generates sales or
revenues.
reverse 911 service A
communications solution that delivers
emergency notifications to users in a
selected geographical area.
rich Internet application (RIA)
Software that has the functionality and
complexity of traditional application
software, but does not require local
installation and runs in a Web browser.
robotics The development of
mechanical or computer devices that
perform tasks requiring a high degree of
precision or that are tedious or
hazardous for humans.
router A telecommunications device
that forwards data packets across two or
more distinct networks toward their
destinations, through a process known
as routing.
rule A conditional statement that links
conditions to actions or outcomes.
satisficing model A model that will
find a good—but not necessarily the
best—solution to a problem.
scalability The ability to increase the
processing capability of a computer
system so that it can handle more users,
more data, or more transactions in a
given period.
schedule feasibility The
determination of whether the project
can be completed in a reasonable
amount of time.
screen layout A technique that allows
a designer to quickly and efficiently
design the features, layout, and format
of a display screen.
script bunny A cracker with little
technical savvy who downloads
programs called scripts, which
automate the job of breaking into
computers.
search engine A valuable tool that
enables you to find information on the
Web by specifying words that are key to
a topic of interest, known as keywords.
secondary storage Devices that store
large amounts of data, instructions, and
information more permanently than
allowed with main memory.
Secure Sockets Layer (SSL) A
communications protocol used to
secure sensitive data during ecommerce.
security dashboard Software that
provides a comprehensive display on a
single computer screen of all the vital
data related to an organization’s
security defenses, including threats,
exposures, policy compliance and
incident alerts.
selecting Manipulating data to
eliminate rows according to certain
criteria.
semistructured or unstructured
problems More complex problems in
which the relationships among the
pieces of data are not always clear, the
data might be in a variety of formats,
and the data is often difficult to
manipulate or obtain.
sequential access A retrieval method
in which data must be accessed in the
order in which it is stored.
sequential access storage device
(SASD) A device used to sequentially
access secondary storage data.
server A computer used by many users
to perform a specific task, such as
running network or Internet
applications.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
649
Licensed to: iChapters User
650
Glossary
|
service-oriented architecture (SOA)
A modular method of developing
software and systems that allows users
to interact with systems and systems to
interact with each other.
simplex channel A communications
channel that can transmit data in only
one direction and is seldom used for
business telecommunications.
single-user license A software license
that permits only one person to use the
software, typically on only
onecomputer.
site preparation Preparation of the
location of a new system.
slipstream upgrade A minor
upgrade—typically a code adjustment
or minor bug fix—not worth
announcing. It usually requires
recompiling all the code and, in so
doing, it can create entirely new bugs.
smart card A credit card–sized device
with an embedded microchip to
provide electronic memory and
processing capability.
smartphone A phone that combines
the functionality of a mobile phone,
personal digital assistant, camera, Web
browser, e-mail tool, and other devices
into a single handheld device.
social engineering Using social skills
to get computer users to provide
information that allows a hacker to
access an information system or its data.
software The computer programs that
govern the operation of the computer.
Software as a Service (SaaS) A service
that allows businesses to subscribe to
Web-delivered business application
software by paying a monthly service
charge or a per-use fee.
software piracy The act of
unauthorized copying or distribution of
copyrighted software.
software suite A collection of single
programs packaged together in a
bundle.
source data automation Capturing
and editing data where it is initially
created and in a form that can be
directly input to a computer, thus
ensuring accuracy and timeliness.
speech-recognition
technology Input devices that
recognize human speech.
spyware Software that is installed on a
personal computer to intercept or take
partial control over the user’s
interaction with the computer without
knowledge or permission of the user.
stakeholders People who, either
themselves or through the organization
they represent, ultimately benefit from
the systems development project.
start-up The process of making the
final tested information system fully
operational.
statistical sampling Selecting a
random sample of data and applying the
characteristics of the sample to the
whole group.
steering committee An advisory
group consisting of senior management
and users from the IS department and
other functional areas.
storage area network (SAN) A
special-purpose, high-speed network
that provides high-speed connections
among data-storage devices and
computers over a network.
storage as a service Storage as a service
is a data storage model where a data
storage service provider rents space to
individuals and organizations.
storefront broker A company that
acts as an intermediary between your
Web site and online merchants who
have the products and retail expertise.
strategic alliance (or strategic
partnership) An agreement between
two or more companies that involves
the joint production and distribution of
goods and services.
strategic planning Determining longterm objectives by analyzing the
strengths and weaknesses of the
organization, predicting future trends,
and projecting the development of new
product lines.
structured interview An interview
where the questions are written in
advance.
supercomputers The most powerful
computer systems with the fastest
processing speeds.
supply chain management (SCM) A
system that includes planning,
executing, and controlling all activities
involved in raw material sourcing and
procurement, converting raw materials
to finished products, and warehousing
and delivering finished product to
customers.
switch A telecommunications device
that uses the physical device address in
each incoming message on the network
to determine to which output port it
should forward the message to reach
another device on the same network.
syntax A set of rules associated with a
programming language.
system A set of elements or
components that interact to accomplish
goals.
system performance
measurement Monitoring the
system— the number of errors
encountered, the amount of memory
required, the amount of processing or
CPU time needed, and other problems.
system performance products
Software that measures all components
of the computer-based information
system, including hardware, software,
database, telecommunications, and
network systems.
system performance standard A
specific objective of the system.
system testing Testing the entire
system of programs.
systems analysis The systems
development phase involving the study
of existing systems and work processes
to identify strengths, weaknesses, and
opportunities for improvement.
systems analyst A professional who
specializes in analyzing and designing
business systems.
systems controls Rules and
procedures to maintain data security.
systems design The systems
development phase that defines how the
information system will do what it must
do to obtain the solution.
systems development The activity of
creating or modifying business systems.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
systems implementation The systems
development phase involving the
creation or acquisition of various system
components detailed in the systems
design, assembling them, and placing
the new or modified system into
operation.
systems investigation The systems
development phase during which
problems and opportunities are
identified and considered in light of the
goals of the business.
systems investigation report A
summary of the results of the systems
investigation and the process of
feasibility analysis and
recommendation of a course of action.
systems maintenance A stage of
systems development that involves
checking, changing, and enhancing the
system to make it more useful in
achieving user and organizational goals.
systems maintenance and
review The systems development
phase that ensures the system operates
and modifies the system so that it
continues to meet changing business
needs.
systems operation Use of a new or
modified system.
systems request form A document
filled out by someone who wants the IS
department to initiate systems
investigation.
technology acceptance model
(TAM) A model that describes the
factors leading to higher levels of
acceptance and usage of technology.
making and authority flows from the
strategic management at the top down
to operational management and
nonmanagement employees.
technology diffusion A measure of
how widely technology is spread
throughout the organization.
transaction Any business-related
exchange, such as payments to
employees, sales to customers, and
payments to suppliers.
technology infrastructure All the
hardware, software, databases,
telecommunications, people, and
procedures that are configured to
collect, manipulate, store, and process
data into information.
technology infusion The extent to
which technology is deeply integrated
into an area or department.
telecommunications The electronic
transmission of signals for
communications; enables organizations
to carry out their processes and tasks
through effective computer networks.
telecommunications medium Any
material substance that carries an
electronic signal to support
communications between a sending
and receiving device.
telecommuting The use of computing
devices and networks so that employees
can work effectively away from the
office.
systems review The final step of
systems development, involving the
analysis of systems to make sure that
they are operating as intended.
thin client A low-cost, centrally
managed computer with essential but
limited capabilities and no extra drives
(such as CD or DVD drives) or
expansion slots.
tablet computer A portable,
lightweight computer with no keyboard
that allows you to roam the office,
home, or factory floor carrying the
device like a clipboard.
time-driven review Review
performed after a specified amount of
time.
team organizational structure A
structure centered on work teams or
groups.
technical documentation Written
details used by computer operators to
execute the program and by analysts
and programmers to solve problems or
modify the program.
technical feasibility Assessment of
whether the hardware, software, and
other system components can be
acquired or developed to solve the
problem.
Glossary
total cost of ownership (TCO) The
sum of all costs over the life of an
information system, including the costs
to acquire components such as the
technology, technical support,
administrative costs, and end-user
operations.
traditional approach to data
management An approach to data
management whereby each distinct
operational system used data files
dedicated to that system.
traditional organizational
structure An organizational structure
in which the hierarchy of decision
transaction processing cycle The
process of data collection, data editing,
data correction, data manipulation,
data storage, and document
production.
transaction processing system
(TPS) An organized collection of
people, procedures, software, databases,
and devices used to perform and record
business transactions.
Transmission Control Protocol
(TCP) The widely used Transportlayer protocol that most Internet
applications use with IP.
tunneling The process by which
VPNs transfer information by
encapsulating traffic in IP packets over
the Internet.
ultra wideband (UWB) A form of
short-range communications that
employs extremely short
electromagnetic pulses lasting just 50 to
1,000 picoseconds that are transmitted
across a broad range of radio frequencies
of several gigahertz.
Uniform Resource Locator (URL) A
Web address that specifies the exact
location of a Web page using letters and
words that map to an IP address and a
location on the host.
unit testing Testing of individual
programs.
unstructured interview An interview
where the questions are not written in
advance.
user acceptance document A formal
agreement signed by the user that states
that a phase of the installation or the
complete system is approved.
user documentation Written
descriptions developed for people who
use a program; shows how the program
can and should be used, in easy to
understand language.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
651
Licensed to: iChapters User
652
Glossary
|
user interface The element of the
operating system that allows you to
access and command the computer
system.
user preparation The process of
readying managers, decision makers,
employees, other users, and
stakeholders for new systems.
users People who will interact with the
system regularly.
utility program Program that helps to
perform maintenance or correct
problems with a computer system.
value chain A series (chain) of
activities that includes inbound
logistics, warehouse and storage,
production, finished product storage,
outbound logistics, marketing and
sales, and customer service.
version A major program change,
typically encompassing many new
features.
videoconferencing A set of interactive
telecommunications technologies
which enable people at multiple
locations to communicate using
simultaneous two-way video and audio
transmissions.
virtual organizational structure A
structure that uses individuals, groups,
or complete business units in
geographically dispersed areas; these
groups can last for a few weeks or years,
often requiring telecommunications
and the Internet.
virtual private network (VPN) A
private network that uses a public
network (usually the Internet) to
connect multiple remote locations.
virtual reality The simulation of a real
or imagined environment that can be
experienced visually in three
dimensions.
virtual reality system A system that
enables one or more users to move and
react in a computer-simulated
environment.
virtual tape A storage device for less
frequently needed data so that it appears
to be stored entirely on tape cartridges,
although some parts of it might actually
be located on faster hard disks.
virtual workgroups Teams of people
located around the world working on
common problems.
vision systems The hardware and
software that permit computers to
capture, store, and manipulate visual
images.
voice mail Technology that enables
users to send, receive, and store verbal
messages to and from other people
around the world.
voice mail-to-text service A service
that captures voice mail messages,
converts them to text, and sends them
to an e-mail account.
volume testing Testing the
application with a large amount of data.
Web Server and client software, the
hypertext transfer protocol (http),
standards, and mark-up languages that
combine to deliver information and
services over the Internet.
Web 2.0 The Web as a computing
platform that supports software
applications and the sharing of
information among users.
Web application framework Web
development software that provides the
foundational code—or framework—
for a professional, interactive Web site,
allowing developers to customize the
code to specific needs.
Web browser Web client software
such as Internet Explorer, Firefox,
Chrome, Safari, and Opera used to view
Web pages.
Web log (blog) A Web site that people
can create and use to write about their
observations, experiences, and opinions
on a wide range of topics.
Web portal A Web page that
combines useful information and links
and acts as an entry point to the Web—
they typically include a search engine, a
subject directory, daily headlines, and
other items of interest. Many people
choose a Web portal as their browser’s
home page (the first page you open
when you begin browsing the Web).
wide area network (WAN) A
telecommunications network that
connects large geographic regions.
Wi-Fi A medium-range wireless
telecommunications technology brand
owned by the Wi-Fi Alliance.
wireless mesh A form of
communication that uses multiple WiFi access points to link a series of
interconnected local area networks to
form a wide area network capable of
serving a large campus or entire city.
workgroup Two or more people who
work together to achieve a common
goal.
workgroup application software
Software that supports teamwork,
whether team members are in the same
location or dispersed around the world.
workgroup sphere of influence The
sphere of influence that serves the needs
of a workgroup.
workstation A more powerful
personal computer used for
mathematical computing, computeraided design, and other high-end
processing, but still small enough to fit
on a desktop.
Worldwide Interoperability for
Microwave Access (WiMAX) The
common name for a set of IEEE 802.16
wireless metropolitan area network
standards that support various types of
communications access.
ZigBee A form of wireless
communications frequently used in
security systems and heating and
cooling control systems.
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
INDEX
Subject
Note: A boldface page number indicates a key term and the location of its definition in the text.
Numbers
Numbers
3D printers, 114
3G wireless communications, 243–244
4G wireless communications, 242, 244, 280
5GLs (fifth-generation languages), 170
A
acceptance testing, 577
access
to data for decision making, 383
illegal, to computers, 607–609
Internet, 279–281, 353
secondary storage, 98–99
system resources and security, 144
access BPL, 237
accessing the Internet, 279–281
accounting, enterprise resource planning, 392
accounting MISs, 433
accounting systems, 378
accredited domain name registrars, 278–279
ACDs (automatic call distributors), 259
activating software, 173
activity modeling, 537–538
actors in use case diagrams, 533
ad hoc DSSs, 436
Adaptive Software Development (ASD), 524
Address Verification System, 350
ADSL (asymmetric DSL), 257
advertising, 346–348, 489
advice and support, online, 294–295
aggregator software, 306
agile development, 523–524
AI. See artificial intelligence (AI)
AJAX (Asynchronous JavaScript and XML), 288
Al-Awar, Mahmoud Kassim, 384
alpha testing, 578
ALU (arithmetic/logic unit), 90
American Recovery and Reinvestment Act, 25
animation, 484
anomalies, 201
antivirus programs, 616, 616–617
API (application programming interface), 143
applets, 288
application flowcharts, 538, 539
application programming interface (API), 143
application service providers (ASPs), 158, 159
application software, 14, 139, 140, 156–168
enterprise, 167–168
for information, decision support, and specialized purposes,
168
mobile, 165, 166
off-the-shelf, 157–158
personal, 159–165
proprietary, 157
workgroup, 165–167
arithmetic/logic unit (ALU), 90
ARPANET, 276, 277
artificial intelligence (AI), 25, 25–27, 465–474
applications, 468–474
Brain Computer Interface, 467
expert systems, 468
major branches, 467–468
nature of intelligence, 465–467
artificial intelligence systems, 465
ASD (Adaptive Software Development), 524
asking directly, 540
aspect ratio, 112
ASPs (application service providers), 158, 159
assistive technology, 490
asymmetric DSL (ADSL), 257
Asynchronous JavaScript and XML (AJAX), 288
ATM (automated teller machine) devices, 108
attached storage, 101
attributes, 190
auctions, online, 313–314
fraud, 353
audio, 483–484
streaming, 483
audio books, 311
auditing, 424
augmented reality, 487
AUSFTA (Australia-United States Free Trade Agreement), 35
Australia-United States Free Trade Agreement (AUSFTA), 35
automated teller machine (ATM) devices, 108
automatic call distributors (ACDs), 259
automobiles, software-driven, 172
autonomic computing, 580
B
backbone, 277
back-end applications, 211
background, 144
Baker, Simon, 316
banking, 348–349
bar-code scanners, 109
Baron, Robert, 12
batch processing systems, 375, 375–376
B2B (business-to-business) e-commerce, 20, 333
B2C (business-to-consumer) e-commerce, 20, 333,
333–334, 337, 338
BCI (Brain Computer Interface), 467
benchmark tests, 567
Berners-Lee, Tim, 284
best practices, 385
beta testing, 578
BI. See business intelligence (BI)
bioinformatics, 492
biometric devices, 562
blade servers, 122
bloggers, 306
blogging, 303, 306
blogosphere, 306
blogs, 16, 306, 306–307
Blue Gene, 13
Bluetooth, 238
bots, 474
BPL (broadband over power lines), 236, 237
Brain Computer Interface (BCI), 467
brainstorming, 442
bridges, 254
broadband communications, 234
653
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
654
Index
|
infrastructure, 242
broadband over power lines (BPL), 236, 237
Brown, Paul, 241
Bs (bytes), 94
bugs, software, 171
bulk e-mail, 302
Bumpus, Rick, 63
Burke, John, 90
business. See also e-business (electronic business); e-commerce
(electronic commerce); m-commerce (mobile commerce)
virtual reality, 488–489
business continuity, 560
business information, online, 294
business information systems, 18–28
business intelligence (BI), 216, 218, 463
enterprise resource planning, 392–393
reasons to study, 188
business-to-business (B2B) e-commerce, 20, 333
business-to-consumer (B2C) e-commerce, 20, 333,
333–334, 337, 338
buy-side e-commerce, 333
bytes (Bs), 94
C
CA (certificate authority), 361
Cable Act of 1992, 625
cable modems, 252
cache memory, 95, 95–96
CAD. See computer-assisted design (CAD)
CAFTA (Central American Free Trade Agreement), 35
call centers, 259
CAM (computer-assisted manufacturing), 33, 164
cameras, digital, 105–106
Cameron, Bobby, 515
Cameron, James, 112
CAN-SPAM Act, 599
Capability Maturity Model (CMM), 528
Card Verification Number, 350
careers in information systems, 70–76
finding jobs, 76
project teams, 76
carpal tunnel syndrome (CTS), 627
Carr, Nicholas, 628
cars, software-driven, 172
Cascading Style Sheets (CSSs), 286, 287
CASE repositories, 539
CASE (computer-aided software engineering) tools, 529,
529–530, 539
cash, electronic, 361
cathode-ray tubes (CRTs), 110
CBISs (computer-based information systems), 12, 12–17
C2C (consumer-to-consumer) e-commerce, 20, 335
CDMA (Code-Division Multiple Access), 243
CD-R (CD-recordable), 100
CD-recordable (CD-R), 100
CD-rewritable (CD-RW), 100
CD-ROM (compact disc read-only memory), 100
CD-RW (CD-rewritable), 100
Cell Broadband Engine Architecture, 93
cell phones, making payments, 363
cellular modems, 252
cellular phone services, 256–257
Central American Free Trade Agreement (CAFTA), 35
central processing unit (CPU), 90, 93–94
centralized processing, 248
certificate authority (CA), 361
certification, 75
Chalmers Matthew, 238
change management, systems development, 527
change models, 56, 56–57
channel bandwidth, 234
channels, telecommunications, 234
characters, 189
charge cards, 361, 362
chief information officers (CIOs), 17, 74–75
chief knowledge officers (CKOs), 462
chief technology officers (CTOs), 74–75
Child Online Protection Act of 1998, 622
Children’s Internet Protection Act of 2000 (CIPA), 622
Children’s Online Privacy Protection Act of 1998 (COPPA), 621
chip sets, 90
chip-and-pin cards, 107
choice stage (decision making), 412
Chrome OS, 150
CIM (computer-integrated manufacturing), 33, 426
CIOs (chief information officers), 17, 74–75
CIPA (Children’s Internet Protection Act of 2000), 622
circuit switching networks, 235
CIX (Commercial Internet Exchange), 277
CKOs (chief knowledge officers), 462
cladding, 237
clearinghouses, online, 313
click fraud, 353
click through rate (CTR), 346
clickstream data, 353
client/server architecture, 249, 249–250
Clinger-Cohen Act of 1996, 74
clip art, 162
clock speed, 92
cloud computing, 15, 28–29, 158–159, 281, 281–284
globalization, 273–274
healthcare, 573
shortcomings, 283
systems development, 510
CMM (Capability Maturity Model), 528
Coatney, Mike, 393
coaxial cable, 236, 238
Cockburn, Alistair, 524
Code-Division Multiple Access (CDMA), 243
codes of ethics, 630
cold sites, 561
collaborative software, 165
collaborative work, 55
collaborative work systems, computerized. See group support
systems (GSSs)
Collins, Jim, 62
command-based user interfaces, 142
commerce. See business;
e-commerce (electronic commerce);
m-commerce (mobile
commerce)
Commercial Internet Exchange (CIX), 277
commercial off-the-shelf (COTS) development process, 572
Communications Decency Act of 1996, 621, 622
communications satellites, 240–241
communities of practice (COP), 462
community cloud service, 282
compact disc read-only memory (CD-ROM), 100
competitive advantage, 62, 64–66
factors leading firms to seek, 62, 64
strategic planning for, 64–66
systems development, 514, 516
competitive intelligence, 218
compilers, 170
computational biology, 492
computed fields, 189
Computer Abuse Amendments Act of 1994, 625
computer downsizing, 122
Computer Fraud and Abuse Act of 1986, 613
computer literacy, 33
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
Computer Matching and Privacy Act of 1988, 625
computer networks, 246. See also networks
computer programs, 139. See also application software; software;
systems software
computer systems. See system entries
computer waste, 599–600
preventing, 600–603
computer-aided software engineering (CASE) tools, 529,
529–530, 539
computer-assisted design (CAD), 33, 164
manufacturing MISs, 424
computer-assisted manufacturing (CAM), 33, 426
computer-based information systems (CBISs), 12, 12–17
computer-integrated manufacturing (CIM), 33, 426
computerized collaborative work systems. See group support
systems (GSSs)
computer-related mistakes, 600
preventing, 600–603
computers
disposal of, 611
special-purpose, 117, 123
concurrency control, 205
concurrent-user licenses, 173
conferencing, online, 303–304
consulting firms, 75
consumer-to-consumer (C2C) e-commerce, 20, 335
contactless cards, 107
containers, 202
content streaming, 307
continuous improvement, 45, 58, 58–59
systems development, 526–527
contracts, systems design, 569
control unit, 90
convertible tablet PCs, 119
COP (communities of practice), 462
COPPA (Children’s Online Privacy Protection Act of 1998), 621
coprocessors, 96
copyrights
software, 173
violations, 611–612
corporate culture, globalization, 45–46
corporate portals, 300
corporations
crime prevention by, 613–616
privacy policies, 624–626
cost centers, 423
cost leadership, competitive advantage and, 65
cost objectives, systems development, 518
cost per action (CPA), 346
cost per click (CPC), 346
cost per thousand (CPM), 346
cost-benefit analysis, 567
COTS (commercial off-the-shelf) development process, 572
counterintelligence, 218
coupons, m-commerce, 347–348
CPA (cost per action), 346
CPC (cost per click), 346
CPM (cost per thousand), 346
CPU (central processing unit), 90, 93–94
crackers, 608
creative analysis, 514
creativity, 467
credit cards, 361, 362
Crier, Catherine, 622
crime, computer as tool to fight, 605–607
crime, computer, 603
computer as tool to commit, 604–605
computers as objects of, 607–613
international, 613
prevention, 613–618
Index
criminal hackers, 608
critical analysis, 516
critical path, 528
critical success factors (CSFs), 516, 540
CRM. See customer relationship management (CRM)
cross-platform development, 575
crowd sourcing, 298
CRTs (cathode-ray tubes), 110
Crystal Methodologies, 524
CSFs (critical success factors), 516, 540
CSSs (Cascading Style Sheets), 286, 287
CTOs (chief technology officers), 74–75
CTR (click through rate), 346
CTS (carpal tunnel syndrome), 627
cultural challenges, globalization and, 35, 341, 397
culture, 55
organizational, 55
currency challenges, globalization and, 35, 341, 398
customer relationship management (CRM), 49–50, 282
customer relationship management (CRM) systems, 393,
393–396
customer resource management (CRM), globalization,
555–556
customization, competitive advantage and, 66
customized manufacturing, 51
customs rules, globalization and, 398
cutover, 578–579
cybermalls, 343, 343–344
cyberterrorists, 604
D
DaaS (Database as a Service), 209–210, 575
DARPA Grand Challenge, 470
DASDs (direct access storage devices), 99
dashboards, 300
data, 5, 460
clickstream, 353
hierarchy of, 190
human- and machine-readable, 104
manipulating, 198–200
theft, 609–611
turning into information, 6–7
types, 6
data administrators, 209
data analysis, 536, 536–539
data centers, 194, 194–195, 196
environmental impact, 196
reasons to study, 188
data cleanup, 200, 200–201, 387
data collection, 380, 380–381
systems analysis, 534–536
data conversion, 577
data correction, 381
data definition languages (DDLs), 203
data dictionaries, 203, 203–205
data editing, 381
data entry, 104
data input, 104
data items, 190
data loading, 387
data loss prevention (DLP), 218
data manipulation, 382
data manipulation languages (DMLs), 206
data mapping, 387
data marts, 214, 214–215
data mining, 215, 215–216, 220, 463
data modeling, 195, 197, 536–537
data models, 197
data preparation, 577
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
655
Licensed to: iChapters User
656
Index
|
data redundancy, planned, 195
data storage, 382
data store, 538
data synchronization, 218
data warehouses, 212, 212–214
data workers, 462
database administrators (DBAs), 189, 208–209
database approach to data management, 192, 193
Database as a Service (DaaS), 209–210, 575
database controls, systems design, 562
database management systems (DBMSs), 24, 189, 192, 201–211
administration, 208–209
creating and modifying databases, 203–205
manipulating data and generating reports, 206–208
object-oriented, 220
object-relational, 220
popular, 209–210
selecting, 210–211
special-purpose, 210
storing and retrieving data, 205
types, 202–203
user view, 203
using with other software, 211
database normalization, 201
database software, 160, 161–162
databases, 15, 186–223. See also database management systems
(DBMSs)
applications, 211–221
approaches, 192–193
data centers, 194, 194–195, 196
data modeling, 195, 197
decision support systems, 438–439
distributed, 218, 218–219
linking to Internet, 212
object-oriented, 220
reasons to study, 188
relational model, 197, 197–201
replicated, 218
virtual, 575
data-driven DSSs, 438–439
data-entry operators, 71
data-flow diagrams (DFDs), 538
data-flow line, 538
Datler, Bernd, 217
Davis, Tom, 331, 332
DBAs (database administrators), 189, 208–209
DBMSs. See database management systems (DBMSs)
DDLs (data definition languages), 203
DDR SDRAM (double data rate synchronous dynamic random
access memory), 95
debit cards, 361, 362
decentralized processing, 248
decision making, 410–415
approaches, 413–414
as component of problem solving, 411–412
data access, 383
decision support systems. See decision support systems
(DSSs)
group support systems. See group support systems (GSSs)
information and decision support systems, 414–415
programmed versus nonprogrammed decisions,
412–413
decision room, 445, 446
decision support systems (DSSs), 23–25, 24, 433–440
ad hoc, 436
benefits, 414–415
capabilities, 436
characteristics, 434–435
components, 438–440
data-driven, 438–439
ESSs, 446, 446–448
institutional, 436
MISs compared, 438
model-driven, 439–440
reasons to study, 410
decision-making phase (decision making), 411
delphi approach, 442
demand management, 390
demand reports, 419, 419–420
demodulation, 251
design report, 569
design stage (decision making), 411, 411–412
desktop computers, 117, 120
desktop publishing (DTP) software, 160
detailed scheduling, 390
development teams, 507
DFDs (data-flow diagrams), 538
dialogue manager, 438, 440
dial-up Internet connections, 280
differentiation, competitive advantage and, 65
digital audio players, 115, 115–116
digital cameras, 105, 105–106
digital certificates, 361
digital divide, 353
digital rights management (DRM), 153, 308, 352
Digital Subscriber Line (DSL), 252, 257
digital video discs (DVDs), 100
Digital Video Interface (DVI), 113
direct access, 99
direct access storage devices (DASDs), 99
direct conversion, 578
direct cutover, 578
direct observation, 535, 535–536
disaster planning, 560–561
disaster recovery, 560, 560–561
disintermediation, 334
disk mirroring, 99
display monitors, 110, 112–113
disruptive changes, 56
distance challenges, globalization and, 35, 341
distance education, 293
distributed databases, 218, 218–219
distributed processing, 248
distributions, 149
DLP (data loss prevention), 218
DMLs (data manipulation languages), 206
DNS (Domain Name System), 278
document production, 382
documentation, 139
domain, 198
domain expert, 479
Domain Name System (DNS), 278
domain names, 278–279
dot pitch, 113
double data rate synchronous dynamic random access memory
(DDR SDRAM), 95
downsizing, 62
downstream management, 48
DRAM (dynamic random access memory), 95
drill-down reports, 420
drilling down, 212
DRM (digital rights management), 352, 153308
DSL (Digital Subscriber Line), 252, 257
DSL Access Multiplexer (DSLAM), 257
DSLAM (DSL Access Multiplexer), 257
DSSs. See decision support systems (DSSs)
DTP (desktop publishing) software, 160
dual booting, 147
dumpster diving, 604
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
DVDs (digital video discs), 100
DVI (Digital Video Interface), 113
dynamic programming, 472
dynamic random access memory (DRAM), 95
E
e-books, 116, 310–311
e-boutiques, 349–350
EBs (exabytes), 94
e-business (electronic business), 20. See also e-commerce
(electronic commerce); m-commerce (mobile commerce)
e-commerce (electronic commerce), 20, 20–21, 332,
332–341
advantages, 343
applications, 343–350
B2B, 333
B2C, 333, 333–334
buy-side, 333
C2C, 335
challenges, 338–341
consumer privacy, 339–340
consumers’ lack of trust, 340–341
e-government, 335, 335–336
global issues, 341
globalization, 331–332
multistage model, 336–338
sell-side, 333
software, 359–360
successful, strategies for, 354–358
technology infrastructure requirements, 358–363
threats to, 350, 352–354
virtual models, 351
Web sites, 354–358
e-commerce Web sites, 354–358
building traffic, 355–356
defining functions, 354–355
establishing, 355
maintaining and improving, 356, 358
economic feasibility, 532
economic order quantity (EOQ), 425, 425–426
EDI (Electronic Data Interchange), 261–262
e-discovery (electronic discovery), 562
EDRs (event data recorders), 13–14
education
online, 292–294
virtual reality, 488
EEPROM (electrically erasable programmable read-only
memory), 95
effectiveness, 9
efficiency, 9
EFT (electronic funds transfer), 262
e-government, 335, 335–336
E-Government Act of 2002, 625
EHRS (electronic health record system), 573
Einstein, Albert, 514
EISs (executive information systems), 24–25, 446–448
electrically erasable programmable read-only memory
(EEPROM), 95
electronic business (e-business), 20. See also e-commerce
(electronic commerce); m-commerce (mobile commerce)
electronic cash, 361
electronic commerce. See e-commerce (electronic commerce)
Electronic Communications Privacy Act of 1986, 624,
625
Electronic Data Interchange (EDI), 261–262
Electronic Device Recycling Research and Development, 125
electronic discovery (e-discovery), 562
Index
electronic document distribution, 259
electronic exchanges, 314, 344, 344–345
electronic funds transfer (EFT), 262
Electronic Funds Transfer Act of 1979, 625
electronic health record system (EHRS), 573
electronic meetings, 260–261
electronic payment systems, 360–363
electronic procurement (e-procurement), 20
Electronic Product Environmental Assessment Tool (EPEAT),
126–127, 564
electronic records management (ERM) systems, 5–6
electronic retailing, 343, 343–344
e-mail, 300–302
privacy, 619
unwanted, 30
embedded operating systems (embedded systems), 152
empowerment, 53
encryption, 255
keys, 255
End-User License Agreements (EULAs), 139
end-user systems development, 510
Energy Star standards, 126, 196, 564
Enterprise 2.0, 305
enterprise data modeling, 197
enterprise operating systems, 151
enterprise resource planning systems (ERPs), 3, 22,
167–168, 373, 382–393
advantages, 383, 385–386
available systems, 388
business intelligence, 392
disadvantages, enterprise resource planning (ERP)
advantages 386–387
financial accounting, 392
GSSs, 444
managerial accounting, 392
overview, 383
for small and medium-size enterprises, 388–389
supply chain management, 389–391
enterprise software, hosted software model, 396–397
enterprise sphere of influence, 140
enterprise storage, 101–103
enterprise systems, 21–22, 372–401, 374
customer relationship management systems, 393–396
enterprise resource planning. See enterprise resource
planning systems (ERP)
globalization, 373
hosted software model, 396–397
transaction processing. See transaction processing systems
(TPSs)
entertainment, virtual reality, 489
entities, 190
entity symbol, 538
entity-relationship (ER) diagrams, 197, 199, 536–537
environmental design, 563, 563–569
contracts, 569
design report, 569
evaluation techniques, 566–568
generating systems design alternatives, 564–566
environmental impact, data centers, 196
environmental responsibility, 63
EOQ (economic order quantity), 425, 425–426
EPEAT (Electronic Product Environmental Assessment Tool),
126–127, 564
e-procurement (electronic procurement), 20
EPROM (erasable programmable read-only memory), 95
ER (entity-relationship) diagrams, 197, 199, 536–537
erasable programmable read-only memory (EPROM), 95
ergonomic keyboards, 105
ergonomics, 629
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
657
Licensed to: iChapters User
658
Index
|
ERM (electronic records management) systems, 5–6
ERPs. See enterprise resource planning systems (ERPs)
errors
computer-related mistakes, 599–603
preventing, detecting, and correcting, 560
software bugs, 171
ESSs (executive support systems; executive information systems),
24–25, 446, 446–448
e-tailing, 343–344
ethical issues, 32, 630
e-time (execution time), 91
EULAs (End-User License Agreements), 139
European Union (EU), 35
Directive 2002/95/EC, 126
Directive 95/96/EC of 1998, 398
evaluating systems design, 565–568
Evans, Mark, 260–261
event data recorders (EDRs), 13–14
event-driven review, 584, 584–585
e-waste, 125
exabytes (EBs), 94
exception reports, 420
execution time (e-time), 91
executive information systems (EISs), 24–25, 446–448
executive support systems (executive information systems; ESSs),
24–25, 446, 446–448
capabilities, 447–448
expert system shells, 481
expert systems, 27, 468, 474–482
components, 475–477
development tools and techniques, 481–482
explanation facility, 477
inference engine, 477
knowledge acquisition facility, 477, 477–478
participants in developing and using, 478–479
user interface, 478
when to use, 474–475
explanation facility, 477
explicit knowledge, 461
explicit personalization, 358
Extensible Markup Language (XML), 287, 289
external auditing, 424
extranets, 16, 17, 318
extreme programming (XP), 523, 524
F
failover, 561
Fair and Accurate Credit Transactions Act of 2003, 625
Fair Credit Reporting Act of 1970, 625
fairness in information use, 622–623
Family Education Privacy Act of 1974, 625
FDD (Feature-Driven Development), 524
feasibility analysis, 532
feasibility studies, 533
Feature-Driven Development (FDD), 524
Federal Information Security Management Act of 2002, 557
federated database systems, 221
feedback, 11, 11–12
feedback mechanisms, 8
FeRAM, 95
fiber-optic cable, 236, 237
fields, 189
fifth-generation languages (5GLs), 170
file compression, multimedia, 485
file conversion, multimedia, 484
file management, operating systems, 144–145
file server systems, 249
File Transfer Protocol (FTP), 317
file-compression utilities, 154
files, 190
filtering software, 622
final evaluation, 565
finance services, m-commerce, 348
financial accounting, 392
financial management software, 160
financial MISs, 421, 421–424
FiOS, 237
firewalls, 32
five-forces model, 62
fixed WiMAX, 245
Flash, 288
flash drives, 101
flat files, 202
flat organizational structure, 53
Fletcher, Brad, 263
flexible manufacturing systems (FMSs), 426
FMSs (flexible manufacturing systems), 426
Food Allergen and Consumer Protection Act of 2006, 206
forecasting, 12
foreground, 144
fraud
click, 353
Internet, 352–353
freeware, 173–174
freezing design specifications, 568
Friedman, Thomas, 34–35
front-end applications, 211
front-end processors, 253
FTP (File Transfer Protocol), 317
fuel cells, 92
full-duplex channels, 234
functional requirements, 542
G
gambling, online, 311
game theory, 491, 491–492
games, online, 311–312
Gantt charts, 528
gateways, 254
G2B (government-to-business) e-commerce, 335, 336
GBs (gigabytes), 94
G2C (government-to-citizen) e-commerce, 335–336
Genachowski, Julius, 242
general-purpose computers, 117
genetic algorithms, 473
geographic information systems (GISs), 315, 433, 433–434
in law enforcement, 606–607
geolocation tools, online, 314–316
geostationary satellites, 241
geo-tagging, 315
G2G (government-to-government) e-commerce, 335, 336
GHz (gigahertz), 92
gigabytes (GBs), 94
gigahertz (GHz), 92
GISs. See geographic information systems (GISs)
Global Positioning System (GPS), 262, 264
global software support, 175
global supply management (GSM), 314
Global System for Mobile (GSM), 243
globalization, 34–35
e-commerce, 341
enterprise systems, 397–398
international computer crime, 613
Internet, 275–276
GNU (GNU General Public License), 149, 174
GNU General Public License (GPL), 149, 174
goals, information system, aligning with corporate goals,
513–514
Godin, Seth, 305
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
Gonzales, Albert, 608, 610
Good to Great (Collins), 62
government, systems development, 511, 512
government-to-business (G2B) e-commerce, 335, 336
government-to-citizen (G2C) e-commerce, 335–336
government-to-government (G2G) e-commerce, 335, 336
GPS (Global Positioning System), 262, 264
Grable, Betty, 12
Gramm-Leach-Bliley Act of 1999, 624, 625, 626
Grant, Pauline, 189
graphical user interfaces (GUIs), 142
graphics, 482–483
graphics processing units (GPUs), 97
graphics software, 160
green computing, 126, 126–127
green death, 564
green design. See environmental design
grid charts, 538, 538–539
grid computing, 97, 153
group consensus, 567
group consensus approach, 442
group decision support systems. See group support systems
(GSSs)
group support systems (GSSs), 24, 441, 441–446
alternatives, 445–446
characteristics enhancing decision making, 442–443
software, 444–445
groupthink, 443
groupware, 165, 444, 463
GSM. See global supply management (GSM);
Global System for Mobile (GSM)
GSSs. See group support systems (GSSs)
guided transmission media, 235, 236
GUIs (graphical user interfaces), 97, 142
Index
information system use, 34
Medicaid, 29
performance-based information systems, 67, 69
robotics, 470
special-purpose systems, 490
systems development, 510
transaction processing systems, 376
virtual reality, 488
The Heart of Change (Kotter), 57
help desk, 580
help facilities, 559
heuristics, 414, 467
hierarchical structure, 52–53
hierarchy of data, 190
highly structured problems, 436
Highsmith, James, 524
high-speed Internet services, 280
HMDs (head-mounted displays), 28, 486
Holographic Versatile Discs (HVDs), 100
home networks, 258–259
hosted software model, enterprise software, 396–397
hosts, 277
hot sites, 561
HP-UX, 151
HRMISs (human resource MISs), 430, 430–433
HTML (Hypertext Markup Language), 284, 284–286
Huber, George, 411
human resource MISs (HRMISs), 430, 430–433
Hurd, Mark, 194
HVDs (Holographic Versatile Discs), 100
hybrid cloud service, 282
hydropower, globalization, 87–88
hyperlinks, 284
Hypertext Markup Language (HTML), 284, 284–286
Hypertext Preprocessor (PHP), 288
Hypertext Transport Protocol, 278
H
hackers, 608
Hahn, Dave, 118
half-duplex channels, 234
handheld computers, 111, 117, 118
haptic interfaces, 486
hard copy, 113
hard disks, 99
Hardin, Michael, 106
hardware, 13, 13–14, 86–129. See also specific hardware
components
components, 90–91
computer system types, 117–124
e-commerce, 358–359
green computing, 126–127
input devices. See input devices
m-commerce, 359–360
memory characteristics and functions, 94–96
multiprocessing, 96–97
operating system independence from, 143
output devices. See output devices
parallel computing, 97
processing characteristics and functions, 92–94
reasons to study, 88
secondary storage. See secondary storage
telecommunications, 250–254
head-mounted displays (HMDs), 28, 486
health concerns, workplace, 627
healthcare
artificial intelligence, 467
cloud computing, 573
databases, 212, 215
ERM systems, 5–6
I
IaaS (Infrastructure as a Service), 512
ICANN (Internet Corporation for Assigned Names and
Numbers), 278–279, 341
identity theft, 340, 605
prevention, 616
IDEs (integrated development environments), 171, 575
IDSs (intrusion detection systems), 614
IF-THEN statements, 476
image logs, 561
imagination, 467
IMAP (Internet Message Access Protocol), 301
immersive virtual reality, 485
implementation stage (problem solving), 412
implicit personalization, 358
incremental backup, 561
individual systems developers, 509, 510
individual users, 509–510
industry
altering structure, competitive advantage and, 65
information system use, 34
inference engines, 477
informatics, 492
information, 5, 460
described, 5–7
fairness in use of, 622–623
theft, 609–611
valuable, characteristics, 7–8
value of, 8
information centers, 73
“Information Resources Operating Values” (Wilson), 45
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
659
Licensed to: iChapters User
660
Index
|
information service units, 73
information systems (ISs), 4. See also specific types of information
systems
benefits, 414–415
components and processes, 10–17
in global economy, 3–4, 409–410
globalization, 459
reasons to study, 4, 46, 410
value, 68–69
information systems literacy, 33
information systems planning, 513
infrared transmission, 239
Infrastructure as a Service (IaaS), 512
infrastructure challenges, globalization and, 35, 341, 397
inkjet printers, 114
innovation, competitive advantage and, 66
in-premise BPL, 237
input controls, systems design, 562
input devices, 103–110
inputs, 8, 11
data, 104
GSSs, 443
MISs, 418
insiders, 608
installation, 577
instant messaging, 302
privacy, 620
institutional DSSs, 436
instruction time (I-time), 91
integrated application packages, 164
integrated development environments (IDEs), 171, 575
integration testing, 577
intellectual property, 352
intelligence stage (decision making), 411
intelligent agents, 474
intelligent behavior, 465, 465–466
intelligent robots, 474
interactive voice response (IVR) systems, 105
interface devices, virtual reality, 486
internal auditing, 424
Internet, 15, 272–284. See also Web
access, 353
accessing, 279–281
cloud computing, 15, 28–29, 158–159, 281–284
communication and collaboration, 300–304
dependence on, 628
development, 276–277
filtering and classifying content, 622
international scope, 275–276
libel concerns, 621–622
linking company database to, 212
media and entertainment, 307–312
operation, 277–279
personal and social impact, reasons to study, 598
privacy, 620–621
utilities, 317
Internet careers, 75
Internet Corporation for Assigned Names and Numbers
(ICANN), 278–279, 341
Internet Message Access Protocol (IMAP), 301
Internet protocol (IP), 276
Internet Service Providers (ISPs), 280, 280–281
Internet utilities, 155
interpreters, 170
interviews, structured and unstructured, 535
intranets, 16, 317–318
intrusion detection systems (IDSs), 614
investment, m-commerce, 348
IP (Internet protocol), 276
IP addresses, 278
IS personnel, hiring and training, 576
IS plan, 540
IS vendors, 571
ISPs (Internet Service Providers), 280, 280–281
ISs. See information systems (ISs)
I-time (instruction time), 91
IVR (interactive voice response) systems, 105
J
Java, 288
JIT (just-in-time) inventory, 48, 426
job search sites, 295
“John Doe” lawsuits, 621–622
joining, 199
just-in-time (JIT) inventory, 48, 426
K
Kaminsky, Daniel, 70
kasumi encryption code, 256
KBs (kilobytes), 94
kernel, 142
key-indicator reports, 419
keys, 191
encryption, 255
primary, 191
Kilar, Jason, 309
kilobytes (KBs), 94
kiosks, 5, 12, 108
KMSs. See knowledge management systems (KMSs)
knowledge, 6, 460
explicit and tacit, 461
knowledge acquisition facility, 477, 477–478
knowledge base, 27
expert systems, 476–477
knowledge engineers, 479
knowledge management systems (KMSs), 6, 25, 460–464
communities of practice, 462
globalization, 459
obtaining, storing, sharing, and using knowledge,
462–463
personnel, 462
technology to support, 463–464
knowledge maps, 463
knowledge repositories, 463
knowledge users, 479
knowledge workers (KWs), 6, 70, 462
Korean-United States Free Trade Agreement (KORUSFTA), 35
KORUSFTA (Korean-United States Free Trade Agreement), 35
Kotter, John, 57
Kundra, Vivek, 74, 512
Kurzweil, Ray, 465
KWs (knowledge workers), 6, 70, 462
L
LAN (local area network) administrators, 75
LAN servers, 279
language challenges, globalization and, 35, 341, 397
Lanier, Jaron, 485
LANs (local area networks), 246, 246–247
LAP (logical access paths), 205
laptop computers, 117, 118
Large Hadron Collider (LHC), 153
laser printers, 114
laws. See also specific laws
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
e-commerce, 354
globalization and, 35, 341, 398
LCD displays, 112
LCG (LHC Computing Grid) project, 153
LDP (Lean Document Production) solutions, 68
Leadership in Energy and Environmental Design (LEED) rating
system, 563
Leading Change (Kotter), 57
Lean Document Production (LDP) solutions, 68
Lean Software Development, 524
learning, organizational, 57, 57
learning management systems (LMSs), 305
learning systems, 472, 472
LEED (Leadership in Energy and Environmental Design) rating
system, 563
legacy systems, maintenance, 580
legal feasibility, 532
LEO (low earth orbit) satellite systems, 241
Lepecki, Stefan Lanna, 3
Lewin, Kurt, 56
LHC (Large Hadron Collider), 153
LHC Computing Grid (LCG) project, 153
libel, Internet, 621–622
licenses, software, 173
Limbaugh, Rush, 307
linking, 199
Linux, 149, 151
proprietary systems based on, 152–153
LMSs (learning management systems), 305
local area decision network, 445
local area network (LAN) administrators, 75
local area networks (LANs), 246, 246–247
Loebner Prize, 465–466
logic bombs, 608
logical access paths (LAP), 205
logical design, 195, 557
Long Term Evolution (LTE), 244
lookup tables, 559
low earth orbit (LEO) satellite systems, 241
lower-CASE tools, 530
LTE (Long Term Evolution), 244
M
Mac OS, 146–147
Mac OS X Server, 151
machine cycle, 91
machine cycle time, 92
magnetic disks, 99
magnetic ink character recognition (MICR) devices, 107
magnetic stripe cards, 107
magnetic tape, 99
magnetoresistive random access memory (MRAM), 95
main memory, 91, 94–96
mainframe computers, 117, 122, 122–123
linking personal computers to, 258
mainframe utilities, 155
maintenance teams, 583
make-or-buy decision, 572, 574–575
malware, 608
malware attacks, prevention, 616–617
managed security service providers (MSSPs), 615–616
management information systems (MISs), 22, 22–23,
415–434
accounting, 433
characteristics, 420
DSSs compared, 438
financial, 421, 421–424
geographic, 433, 433–434
globalization, 409–410
Index
human resource, 430, 430–433
inputs, 418
manufacturing, 424–426
marketing, 427, 427–430
outputs, 418–420
managerial accounting, 392
Managing at the Speed of Change (Conner Partners), 57
MANs (metropolitan area networks), 247
manufacturing, electronic exchanges, 344, 344–345
manufacturing MISs, 424–426
manufacturing, repair, and operations (MRO) goods and
services, 344
mapping tools, online, 314–316
Marean, Browning, 118
market segmentation, 346
marketing
globalization, 187–188
m-commerce, 345–346
marketing MISs, 427, 427–430
marketplaces, online, 313
Marriott, J. W., Jr., 45
Marriott, J. Willard, 45
mashups, 315
massively multiplayer online role-playing games (MMORPGs),
311
massively parallel processing, 97
material requirements planning (MRP), 390, 426
MBs (megabytes), 94
McCarthy, John, 465
McCaw, Craig, 245
McDermott, Jim, 605
m-commerce (mobile commerce), 20, 341–343, 360
advantages, 343
applications, 343–350
successful, strategies for, 354–358
technology infrastructure requirements, 358–363
threats to, 350, 352–354
Web sites, 342
Medicaid, 29
medical informatics, 492
medium-range wireless telecommunications, 239–240
megabytes (MBs), 94
megahertz (MHz), 92
memory, 91
main (primary), 91, 94–96
operating system management of, 143–144
storage capacity, 94
types, 94–96
menu-driven systems, 559
meta tags, 356
metropolitan area networks (MANs), 247
MHz (megahertz), 92
MICR (magnetic ink character recognition) devices, 107
microblogging, 303
microcode, 92
microloans, 421–422
microwave transmission, 240–241
middleware, 156
Miggo, Scott, 122
millions of instructions per second (MIPS), 92
MILNET, 276
MIPS (millions of instructions per second), 92
MISs. See management information systems (MISs)
mission-critical systems, 516
MMORPGs (massively multiplayer online role-playing games),
311
MMS (model management software), 440
MMSs (model management systems), 24
mobile application software, 165, 166
mobile commerce. See m-commerce (mobile commerce)
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
661
Licensed to: iChapters User
662
Index
|
mobile telephone subscriber office (MTSO), 257
mobile WiMAX, 245
model base, 439, 439–440
model management software (MMS), 440
model management systems (MMSs), 24
model-driven DSSs, 439–440
modems, 251, 251–252
modulation, 251
monitoring stage (problem solving), 412
Moore, Gordon, 93
Moore’s Law, 93
Motion Pictures Experts Group-Layer 3 (MP3) format, 115, 154
movies, online, 309–310
MP3 (Motion Pictures Experts Group-Layer 3) format, 115, 154
MRAM (magnetoresistive random access memory), 95
MRO (manufacturing, repair, and operations) goods and
services, 344
MRP (material requirements planning), 390, 426
MS-DOS, 145
MSSPs (managed security service providers), 615–616
MTSO (mobile telephone subscriber office), 257
Mueller, Robert, 604
multicore microprocessors, 96
multimedia, 27–28, 482, 482–485
designing applications, 485
multiple-user computer systems, 117, 121–124
multiple-user database management systems, 203
multiplexers, 252. 252–253
multiprocessing, 96, 96–97
multitasking, 144
multiuser licenses, 173
music, online, 308–309
N
NAFTA (North American Free Trade Agreement), 35, 398
nanoseconds, 92
Nanotouch technology, 109
NAS (network-attached storage), 101, 101–102, 103
National Do Not Call Registry, 259
National ePrescribing Patient Safety Initiative, 67, 69
National LambdaRail (NLR), 276, 277
National Medal of Technology and Innovation, 13
natural language processing, 26, 471
natural languages, 170
near field communication (NFC), 238
netbook computers, 117, 118, 118–119
nettop computers, 117, 120
network neutrality, 242
network nodes, 246
network operating systems (NOSs), 254
network service providers (NSPs), 277
network utilities, 155
network-attached storage (NAS), 101, 101–102, 103
networking, operating system capabilities, 144
networking protocols, 233, 233–234
network-management software, 254
networks, 15, 246–256
circuit switching, 235
client/server systems, 249–250
home and small business, 258–259
linking personal computers to, 258
neural, 472, 472–473
packet switching, 235
processing alternatives, 248–249
reasons to study, 232
securing data transmission, 254–256
telecommunications hardware, 250–254
telecommunications software, 254
types, 246–248
neural networks, 26, 472, 472–473
Newmark, Craig, 75–76
news feeds, 303
news services, online, 291–292
Newton, Isaac, 514
NFC (near field communication), 238
niche strategy, competitive advantage and, 65
Nickerson, Chris, 604
NLR (National LambdaRail), 276, 277
nominal group technique, 442
nonoperational prototypes, 521
nonprogrammed decisions, 412, 412–413
normalization, databases, 201
North American Free Trade Agreement (NAFTA), 35, 398
NOSs (network operating systems), 254
notebook computers, 117, 118
NSPs (network service providers), 277
O
Obama, Barack, 13, 212, 604
Object Data Standard, 220
Object Database Management Group, 220
object-oriented database management systems (OODBMSs),
220
object-oriented databases, 220
object-oriented design, 558–559
object-oriented programming languages, 169–170
object-oriented systems analysis, 542
object-oriented systems development (OOSD), 530
object-oriented systems investigation, 533
object-relational database management systems (ORDBMSs),
220
objects, 169
observe, orient, decide, and act (OODA) approach, 437
OCR (optical character recognition), 106
off-the-shelf software, 157
OLAP (online analytical processing), 219, 219–220
OLEDs (organic light-emitting diodes), 112
OLTP (online transaction processing), 212, 213, 214, 376,
376–377
O’Malley, Brendan H., 581
OMR (optical mark recognition), 106
on-demand business and utility computing, 61–62
on-demand computing, 61, 61–62
systems development, 525
One Laptop per Child, 13
online analytical processing (OLAP), 219, 219–220
online auctions, 313–314
fraud, 353
online games, 311–312
online information services, 291–295
online profiling, 353
online transaction processing (OLTP), 212, 213, 214, 376,
376–377
OODA (observe, orient, decide, and act) approach, 437
OODBMSs (object-oriented database management systems),
220
OOSD (object-oriented systems development), 530
Open Web Application Security Project (OWASP), 209
open-source software, 174, 174–175
operating systems (OSs), 141
activities performed by, 142–145
current, 145–150
enterprise, 151
network, 254
preferences, 148
for small computers, embedded computers, and specialpurpose devices, 152–153
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
workgroup, 150–151
operational feasibility, 532
operational prototypes, 521
operations, careers, 71
optical character recognition (OCR), 106
optical data readers, 106
optical mark recognition (OMR), 106
optical storage devices, 100
optimization, 160
optimization model, 413
ORDBMSs (object-relational database management systems),
220
order processing systems, 378
organic light-emitting diodes (OLEDs), 112
organizational change, 55, 55–57, 463
organizational culture, 55
organizational learning, 57, 463
organizational structure, 52, 52–55
types, 52–55
organizations, 44–78, 47
general model, 47
OSs. See operating systems (OSs)
outplacement, 433
output controls, systems design, 562
output devices, 103–104, 110, 112–116
outputs, 8, 11
MISs, 418–420
outsourcing, 60, 60–61
systems development, 524–526
OWASP (Open Web Application Security Project), 209
P
PaaS (Platform as a Service), 512
packet switching networks, 235
packets, 277
Palmer, Brad, 123
Panetta, Leon, 604
PANs (personal area networks), 246
PAP (physical access path), 205
parallel communication, GSSs, 443
parallel computing, 97
parallel start-up, 579
password sniffers, 609
patches, 582
patent violations, 611–612
PATN (Postal Advanced Telecommunications Network), 256
Payment Card Industry (PCI) security standard, 350
PBs (petabytes), 94
PBXs (private branch exchanges), 253, 253–254
p-cards, 362, 362–363
PC-DOS, 145
PCI (Payment Card Industry) security standard, 350
PCM (phase change memory), 95
PDCA (plan-do-check-act) approach, 437
pen input devices, 108, 109
perceptive systems, 467
performance objectives, systems development, 516–518
performance-based information systems, 67–69
personal advice and support, online, 294–295
personal area networks (PANs), 246
personal computers, linking to mainframes and networks, 258
Personal Genome Project (PGP), 102
personal information management (PIM) software, 163
personal productivity software, 140, 159–165
personal sensing devices, privacy, 620
personal sphere of influence, 140
personalization, 358
personnel controls, systems design, 562
personnel MISs, 430–433
Index
PERT (Program Evaluation and Review Technique), 528
petabytes (PBs), 94
Petan, Ales, 87
petrochemical industry, globalization, 3–4
PGP (Personal Genome Project), 102
PGP Encryption, 255
phase change memory (PCM), 95
phase-in approach, 578
phishing, 352, 352–353, 612
PHP (Hypertext Preprocessor), 288
physical access path (PAP), 205
physical design, 195, 557, 557–558
picocells, 257
picoseconds, 92
piecemeal approach, 578
pilot start-up, 579
PIM (personal information management) software, 163
pipelining, 91
pixels, 110
plan-do-check-act (PDCA) approach, 437
planned data redundancy, 195
planning, systems development, 527–528
plasma displays, 112
Platform as a Service (PaaS), 512
Platform for Privacy Preferences (P3P), 621
plotters, 115
plug-ins, 284
plunge, 578
podcasts, 307
point evaluation, 568
point-of-sale (POS) devices, 107, 107–108
policies, preventing computer-related waste and mistakes,
600–603
policy-based storage management, 103
POP (Post Office Protocol), 301
Poppendieck, Mary and Tom, 524
portable computers, 117, 118, 118–119
Porter, Michael, 48, 62, 64–65, 67
POS (point-of-sale) devices, 107, 107–108
Post Office Protocol (POP), 301
Postal Advanced Telecommunications Network (PATN), 256
Power Usage Effectiveness (PUE), 196
P3P (Platform for Privacy Preferences), 621
predictive analysis, 216
preliminary evaluation, 565
presence, 262
presentation graphics software, 160
price comparison, m-commerce, 347
primary key, 191
primary memory, 91, 94–96
primary storage, 91
printers, 113––115
privacy, 30–31, 32, 618–622
e-commerce, 339–340
e-mail, 619
federal laws regarding, 618–619, 622–624, 625, 626
individual efforts to protect, 626
instant messaging, 620
Internet, 620–621
online profiling, 353
personal sensing devices, 620
workplace, 619
Privacy Act of 1974, 32, 623
private branch exchanges (PBXs), 253, 253–254
private cloud computing, 15, 282
problem solving, 412
DSSs, 436
intelligence, 466
procedures, 17
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
663
Licensed to: iChapters User
664
Index
|
preventing computer-related waste and mistakes,
600–603
process redesign, 57, 57–58, 59
process symbol, 538
processes, 6
work, improving, 385
processing, 11
characteristics and functions, 92–94
transaction processing systems. See transaction processing
systems (TPSs)
processing controls, systems design, 562
processing mechanisms, 8
procurement cards, 362, 362–363
production, 390
productivity, 67, 67–68
products
existing, competitive advantage and, 66
globalization and, 35
new, competitive advantage and, 66
professional advice and support, online, 294–295
profiling, online, 353
profit centers, 423
program code, 168
Program Evaluation and Review Technique (PERT), 528
programmable read-only memory (PROM), 95
programmed decisions, 412
programmers, 507
programming languages, 168, 168–171
evolution, 168–169
expert systems, 481
Web, 288–289
Project Change Management (Conner Partners), 57
project deadline, 528
Project Gutenberg, 116
project management software, 160
project managers, 507
project milestones, 528
project organizational structure, 53
project schedule, 528
project teams, 76
projecting, 198
projects, 507
unplanned, 514
PROM (programmable read-only memory), 95
proprietary software, 157
prototyping, 521, 521–523
public cloud computing, 15, 282
PUE (Power Usage Effectiveness), 196
purchasing, 390
purchasing cards, 362, 362–363
purchasing systems, 378
push e-mail, 301
Q
QBE (Query-By-Example), 206
qualitative analysis, DSSs, 438
quality, 60
quality control, 426
quantitative analysis, DSSs, 439, 439–440
Query-By-Example (QBE), 206
questionnaires, 536
RAID (redundant array of independent disks), 99, 99–100
RAM (random access memory), 94, 94–95
random access memory (RAM), 94, 94–95
rapid application development (RAD), 519, 523
Rational Unified Process (RUP), 524
RDF (Resource Description Framework), 212
read-only memory (ROM), 95
real estate, selling using Google Maps, 316
Real Simple Syndication (RSS), 306
recordkeeping, GSSs, 443
records, 189, 189–190
redundant array of independent disks (RAID), 99, 99–100
reengineering, 57, 57–58, 59
systems development, 526–527
registering software, 173
registers, 90
Reinforcement Learning, 472
relational model, 197, 197–201
releases, 582
reorder point (ROP), 426
repetitive stress injury (RSI), 629–630
replicated databases, 218
Repliee Q1 and Q2 robots, 471
report layout, 541
reports
DBMSs, 208
MISs, 419–420
request for maintenance forms, 582
request for proposal (RFP), 565
requirements analysis, 540, 540–542
tools, 542
rescue disks, 141
research, online, 296–299
Resource Description Framework (RDF), 212
Restriction on the Use of Hazardous Substances (RoHS), 125
return on investment (ROI), 68
revenue centers, 423
reverse 911 service, 258
RFID. See Radio Frequency Identification (RFID)
RFP (request for proposal), 565
RIAs (rich Internet applications), 288
Rich, Barnaby, 628
rich Internet applications (RIAs), 139, 288, 305–306, 306
Richards, Keith, 12
Right to Financial Privacy Act of 1978, 625
risk, 69
Robertson, Tom, 373
robotics, 468, 470–471
Rochelle, Jonathan, 283
RoHS (Restriction on the Use of Hazardous Substances), 125
ROI (return on investment), 68
rolling up, 212
ROM (read-only memory), 95
rootkits, 608
ROP (reorder point), 426
Rothbaum, Barbara, 488
routers, 254
RSI (repetitive stress injury), 629–630
RSS (Real Simple Syndication), 306
rules, 476
rules of thumb, 414
RUP (Rational Unified Process), 524
S
R
RAD (rapid application development), 519, 523
Radio Frequency Identification (RFID), 109, 109–110, 213,
381, 491
privacy issues, 620
SaaS (Software as a Service), 158, 159, 282, 512, 574
sales and operations plans (S&OPs), 389
sales forecasting, 389
sales growth, competitive advantage and, 66
sales ordering, 390
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
SANs (storage area networks), 101, 102, 102–103
SASDs (sequential access storage devices), 99
satisficing model, 414
scalability, 121, 144, 517
scaling out, 121
scaling up, 121
scams, 612, 617–618
scanning devices, 106
scenarios, 558
schedule feasibility, 532
scheduled reports, 419
Schein, Edwin, 56
schemas, 203, 204
Schroeder, Scott, 575
SCM (supply chain management), 48–49, 389, 389–391
screen layout, 541
script bunnies, 608
scripts, 608
SDLCs. See system development life cycles (SDLCs)
SDSL (symmetric DSL), 257
search engine optimization (SEO), 297
search engines, 296, 296–297
secondary storage, 98, 98–103
access methods, 98–99
enterprise storage options, 101–103
storage devices, 99–101
secure shell (SSH), 317
Secure Socket Layer (SSL), 361
security, 30–32
data transmission, 254–256
e-commerce, 350, 352
systems design, 559–561
wireless networks, 255–256
security dashboards, 615
security testing, 578
security utilities, 154
selecting, 198
sell-side e-commerce, 333
semantic Web, 212
semistructured problems, 436
SEO (search engine optimization), 297
sequential access, 98
sequential access storage devices (SASDs), 99
server farms, 121
server utilities, 155
server virtualization software, 155
servers, 117, 121, 121–122
service set identifier (SSID), 255
service-oriented architecture (SOA), 156
services
existing, competitive advantage and, 66
globalization and, 35
new, competitive advantage and, 66
sex offenders, monitoring, 606
shared electronic calendars, 444
Shatner, William, 20
shells, 561
shopping, online, 312–314
short-range wireless telecommunications, 238–239
sign-on procedure, 559
Silverlight, 288
Simon, Herbert, 411
Simple Object Access Protocol (SOAP), 289
simplex channels, 234
single-user computer systems, 117
nonportable, 117, 119–121
portable, 117, 118–119
single-user database management systems, 203
single-user licenses, 173
The Singularity is Near (Kurzweil), 465
Index
site licenses, 173
site preparation, 576, 576–577
Six Sigma, 60, 61
slate computers, 119
slipstream upgrades, 582
small and medium-size enterprises (SMEs)
enterprise resource planning, 388–389
transaction processing systems, 379–380
small business networks, 258–259
smart cards, 361, 362
smartphones, 118, 250–251, 301
customer relationship management systems, 394
malware, 609
operating systems, 152
SMEs. See small and medium-size enterprises (SMEs)
Smith, Brad, 283
SOA (service-oriented architecture), 156
SOAP (Simple Object Access Protocol), 289
social engineering, 604
social networking, globalization, 137–138, 273–274,
597–598
social networking sites, 32, 33, 55, 304–305
customer relationship management systems, 394
harvesting of information, 31
social responsibility, 63
software, 14, 136–178
aggregator, 306
antivirus, 616–617
application. See application software
in automobiles, 172
bugs, 171
copyrights and licenses, 173
e-commerce, 359–360
filtering, 622
freeware, 173–174
global support, 175
make-or-buy decision, 572, 574–575
m-commerce, 360
model management, 440
network-management, 254
off-the-shelf, 157
open-source, 174, 174–175
operating systems. See operating systems (OSs)
programming languages. See programming languages
proprietary, 157
reasons to study, 138
spheres of influence, 139–140
systems. See systems software
upgrades, 175
using databases with other software, 211
workgroup, 444
Software as a Service (SaaS), 158, 159, 282, 512, 574
software piracy, 611
software suites, 163, 163–164, 165
solid state storage devices (SSDs), 101
S&OPs (sales and operations plans), 389
source data automation, 104
spam, 302, 599–600
spam filters, 599–600
spam-filtering utilities, 154
spatial data technology, 221
special-purpose computers, 117, 123
special-purpose database systems, 210
special-purpose systems, 490–492
speech-recognition technology, 105
spheres of influence, 139–140
The Spirit to Serve (Marriott), 45
spreadsheet software, 160, 161
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
665
Licensed to: iChapters User
666
Index
|
spyware, 609
SQL (Structured Query Language), 206–207
SRAM (static random access memory), 95
SSDs (solid state storage devices), 101
SSH (secure shell), 317
SSID (service set identifier), 255
SSL (Secure Socket Layer), 361
stakeholders, 507
start-up, 578, 578–579
static random access memory (SRAM), 95
statistical sampling, 536
status updates, online, 303
steering committees, 533, 533–534
Steinhorn, Jeff, 515
stock trading, 12
stolen property, recovery of, 605–607
storage, 11
cost comparisons, 98
network-attached, 101, 101–102, 103
primary, 91
secondary, 98, 98–103
storage area networks (SANs), 101, 102, 102–103
storage as a service, 103
storefront brokers, 355
strategic alliance (strategic partnership), 65
strategic planning, 447
streaming audio, 483
streaming video, 484
Strickling, Larry, 242
striping, 99
structured interviews, 535
Structured Query Language (SQL), 206–207
Sullivan, Ted, 509
supercomputers, 117, 123, 123–124
supply chain management (SCM), 48–49, 389, 389–391
support, careers, 73
sustaining change, 56
switches, 254
Symbian, 152
symbols, intelligence, 467
symmetric DSL (SDSL), 257
syntax, 168
system controls, 561, 561–562
system development life cycles (SDLCs), 519–526
approaches, 523–524
on-demand computing, 525
outsourcing, 524–525
prototyping, 521, 521–523
RAD, 519, 523
systems analysis phase. See systems analysis
systems investigation phase, 531–534
traditional, 520–521
system maintenance, design related, 583–584
system operators, 71
system performance measurement, 585
system performance products, 585
system performance standards, 9
system request forms, 531
system software, 14
system testing, 577
system unit, 92
systems, 8, 8–10
definition, 8
performance and standards, 9–10
types, 117–124
systems analysis, 29–30, 520, 534–543
data analysis, 536, 536–539
data collection, 534–536
object-oriented, 542
participants, 534
report, 542–543
requirements analysis, 540, 540–542
systems analysis reports, 542–543
systems analysts, 71, 507, 508
systems design, 30, 520, 557, 557–562
interface design and controls, 559
logical and physical, 557–558
maintenance related, 583–584
object-oriented, 558–559
system security and controls, 559–562
systems developers, individual, 509, 510
systems development, 28, 28–30, 504–546
aligning corporate and IS goals, 513–514
careers, 71–72
competitive advantage, 514, 516
end-user, 510
factors affecting success, 526–530
globalization, 505–506
individual developers and users, 509–510
information systems planning, 513
initiating, 510–511
life cycles. See system development life cycles (SDLCs);
systems analysis
objectives, 516–518
object-oriented, 530
participants, 507–508
reasons to study, 506
systems implementation, 30, 520, 570, 570–579
acquiring database and telecommunications systems, 575
acquiring hardware from IS vendors, 571
data preparation, 577
hiring and training personnel, 576
installation, 577
make-or-buy decision, 572, 574–575
site preparation, 576, 576–577
start-up, 578, 578–579
testing, 577–578
user acceptance document, 579
user preparation, 576
systems investigation, 29, 520, 531–534
feasibility analysis, 532
initiating, 531
object-oriented, 533
participants, 531–532
report, 533–534
systems investigation reports, 533
systems maintenance, 580, 582–584
systems maintenance and review, 30, 520, 521
systems operation, 580
systems review, 584, 584–585
performance measurement, 585
procedure types, 584–585
systems software, 139, 140
Szygenda, Ralph, 262
T
tablet computers, 117, 119
tacit knowledge, 461
TAM (technology acceptance model), 59
Task-Technology Fit (TTF), 60
Tax Reform Act of 1976, 625
taxes, e-commerce, 354
Taylor, Fred, 417
TBs (terabytes), 94
TCO (total cost of ownership), 69
TCP (Transmission Control Protocol), 277
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
TD-SCDMA (Time-Division Synchronous Code Division
Multiple Access) technology, 244
team organizational structure, 53
technical documentation, 575
technical feasibility, 532
technology acceptance model (TAM), 59
technology diffusion, 59, 59–60
technology infrastructure, 12
upgrading, 385–386
technology infusion, 59, 59–60
technology transfer, 35
telecommunications, 15, 233–245
cellular phone services, 256–257
channel characteristics, 234–238
definition, 233
medium-range wireless options, 239–240
reasons to study, 232
short-range wireless options, 238–239
voice mail, 258
wide area wireless network types, 240–245
telecommunications controls, systems design, 562
telecommunications media, 233, 235
telecommuting, 260
teleconferencing, 445
telemarketing, 259
Telephone Consumer Protection Act of 1991, 625
telepresence, globalization, 231–232
telepresence systems, 303
television, online, 309–310
Telnet, 317
Tennant, Robert S., 386
terabytes (TBs), 94
terminals, 106
testing in systems implementation, 577–578
text, 482
TFTs (thin-film transistors), 112
theft
of hardware and data, prevention, 616
identity, prevention, 616
of information, 609–611
thin clients, 117, 119, 119–120
thin-film transistors (TFTs), 112
Tiller, Rob, 612
time challenges, globalization and, 35, 341
Time-Division Synchronous Code Division Multiple Access
(TD-SCDMA) technology, 244
time-driven review, 585
Torvalds, Linus, 149
total cost of ownership (TCO), 69
total quality management (TQM), 60, 61
touch-sensitive screens, 108–109
toxic heavy materials, 125
TPSs. See transaction processing systems (TPSs)
TQM (total quality management), 60, 61
trade agreements, 35, 398
traditional approach to data management, 192, 193
traditional organizational structure, 52, 52–53
training
online, 292–294
virtual reality, 488
transaction processing cycle, 380
transaction processing systems (TPSs), 21, 21–22, 374–382
activities, 380–382
for small and medium-size enterprises, 379–380
traditional, 375–379
transactions, 21
transborder data flow, 247–248
Transmission Control Protocol (TCP), 277
travel Web sites, 314
Tribes (Godin), 305
Index
trigger points, 420
Trojan horses, 608
trust, lack of, in online purchasing, 340–341
TTF (Task-Technology Fit), 60
tunneling, 318
Turing, Alan, 465
Turing Test, 465–466
twisted-pair wire, 235–236
U
UCAVs (unmanned combat air vehicles), 470
UDDI (Universal Discovery Description and Integration), 289
Ulevitch, David, 70
ultra wideband (UWB), 239
UML (Unified Modeling Language), 533
UMTS (Universal Mobile Telephone System), 243
unattended systems, 258
unified communication, GSSs, 443
unified communications, 262, 263
Unified Modeling Language (UML), 533
Uniform Resource Locators (URLs), 278
unit testing, 577
Uniting and Strengthening America by Providing Appropriate
Tools Required to Intercept and Obstruct Terrorism Act of
2001, 624, 625
Universal Discovery Description and Integration (UDDI), 289
Universal Mobile Telephone System (UMTS), 243
UNIX, 150
unmanned combat air vehicles (UCAVs), 470
unplanned projects, 514
unstructured interviews, 535
unstructured problems, 436
upgrades, software, 175
upper-CASE tools, 530
upstream management, 48
URLs (Uniform Resource Locators), 278
USA Patriot Act of 2001, 624, 625
use case diagrams, 533
use interface, expert systems, 478
user acceptance documents, 579
user documentation, 575
user interfaces, 142
command-based, 142
DSSs, 438, 440
user preparation, 576
user software, 159–165
users, 507
individual, 509–510
utility programs, 153, 153–156
utility software, categories, 156
UWB (ultra wideband), 239
V
value added, 8
value chain, 48
variants, 608
versions, 582
very small aperture terminal (VSAT), 241
video, 484
online, 309–310
streaming, 484
video logs, 306
Video Privacy Act of 1988, 625
videoconferencing, 260, 260–261
virtual database systems, 221
virtual databases, 575
virtual memory, 144
virtual models, 351
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
667
Licensed to: iChapters User
668
Index
|
virtual organizational structure, 53, 53–55
virtual private cloud (VPC) service, 282
virtual private networks (VPNs), 256, 282, 318
virtual reality, 27, 485–489
applications, 487–489
forms, 486–487
immersive, 485
interface devices, 486
virtual reality systems, 485
virtual tape, 100
virtual tape servers, 100
virtual workgroups, 445
virtualization, 570
viruses, 608
visa programs, 71
vishing, 612
vision systems, 471
visual programming, 169
vitual workers, 260
vlogs, 306
voice mail, 258
voice mail-to-text service, 258
voice recognition, 472
volume testing, 577
VPC (virtual private cloud) service, 282
VPNs (virtual private networks), 256, 282, 318
VSAT (very small aperture terminal), 241
W
Walters, Dean, 103
WANs. See wide area networks (WANs)
war driving, 256
warehouse management software, 213
Waste Electrical and Electronic Equipment (WEEE), 125
Watowich, Stan, 97
Web, 16, 284, 284–289
blogging, 306–307
communication and collaboration, 300–304
content and application development, 289–291
e-commerce Web sites, 354–358
geolocation, 314–316
mapping, 314–316
media and entertainment, 307–312
mobile commerce sites, 342
online information services, 291–295
operation, 284–287
podcasting, 307
search engines and Web research, 296–299
shopping, 312–314
travel sites, 314
Web 2.0, 304–306
Web portals, 300
Web programming languages, 288–289
Web services, 289
Web 2.0, 16, 304, 304–306
rich Internet applications, 139, 288, 305–306, 306
social network sites, 304–305
Web analytics software, 297
Web application frameworks, 290
Web browsers, 284
Web logs, 16, 306, 306–307
Web plug-ins, 284
Web portals, 300
Web server software, e-commerce and m-commerce, 359
Web services, 289
Web Services Description Language (WSDL), 289
WEEE (Waste Electrical and Electronic Equipment), 125
WEP (wired equivalent privacy), 255
wide area decision networks, 445
wide area networks (WANs), 247, 247–248
wireless, 240–245
Wi-Fi, 239, 239–240, 280
Wi-Fi Protected Access (WPA), 255
wikis, 297–298
Wilson, Carl, 45, 46
WiMAX (Worldwide Interoperability for Microwave Access),
245
Windows 7, 145–146
Windows Embedded, 152
Windows Server, 150
Windows Server 2008, 150
Windows Vista, 145
Windows XP, 145
wired equivalent privacy (WEP), 255
wireless communications, 237–238
medium-range, 239–240
short-range, 238–239
wide area wireless network types, 240–245
wireless mesh, 243
wireless networks
security, 255–256
wide area, 240–245
word processing software, 160, 161
Work Community Grid project, 97
work stressors, 629–630
workgroup application software, 165, 165–167
workgroup software, 444
workgroup sphere of influence, 140
workgroups, 140, 260
virtual, 445
workplace, 626, 629–630
avoiding health and environmental problems, 629–630
health concerns, 627
privacy, 619
workstations, 117, 121
The World is Flat (Friedman), 34–35
World Wide Web (WWW). See Web entries
Worldwide Interoperability for Microwave Access (WiMAX),
245
worms, 608
WPA (Wi-Fi Protected Access), 255
WSDL (Web Services Description Language), 289
WWW. See Web entries
X
XHTML, 287
XML (Extensible Markup Language), 287, 289
XP (extreme programming), 523, 524
XXAgile Modeling, 523–524
XXCrystal, 523–524
XXDynamic Systems Development Method, 523–524
Y
Yoshida, Kazuo, 437
Z
ZigBee, 239
z/OS, 151
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
Index
Company Names
Numbers
8coupons, 347
7-Eleven, 248
1-800-flowers.com, 214
3M Company, 337
37signals, 281
1StopTireShop, 343
A
ABC, 309, 622
ABI Research, 342
Accenture, 75, 76, 525, 571
AccuFund, 379
AccuWeather, 439
ACE Electric, 362
Acer, 119, 611
Achmea, 385
ACME, 393
AdMob, Inc., 347, 427
AdModa/Adultmoda, 347
Adobe, 14, 148, 159, 160, 164, 165, 281, 288, 289, 291, 305,
353, 463, 482–483, 484, 611
Advanced Research Projects Agency (ARPA), 276
Advent, 25, 461
Advertising.com/AOL, 347
Aéroports de Paris, 40–41
Aetna, 610
Aldra Fenester und Türen GmbH, 51
Allstate Insurance Company, 440
Aloft, 240
Alterian, 31
Amazon.com, 59, 75, 103, 116, 210, 212, 215, 282, 289, 308,
310, 312, 325, 333, 338, 344, 417, 510, 512, 525
Amazon Grocery, 312
AMC, 309
AMD, 96, 120, 571
Amdocs, 396
Amenities Inc., 437
American Airlines, 216
American Diversified Holdings, 65
American Express, 107, 361, 610
American National Standards Institute (ANSI), 206
American Psychiatric Association, 628
America Online (AOL), 296, 300, 302, 308, 310, 313, 616, 622
AMR Research, 356, 386
Amtrak, 74
Amusitronics, 486
AOK, 151
Apache, 359, 388
APL Global Container Transport, 132
Appirio, 273, 274
Apple Computer, 13, 16, 19, 20, 28, 66, 97, 115, 116, 118,
119, 120, 125, 127, 145, 146–147, 150, 155, 160, 164, 165,
210, 244, 245, 250, 251, 281, 304, 307, 308, 309, 310, 334,
352, 394, 429, 484, 490, 506, 509, 517, 571, 611, 612, 621,
629
Apple User Groups, 76
Applicor, 396
Applied Mathematics, 439
Applix, 219
Apptio, 67
Aquafil, 390
Aquent, 187–188
Archaeology Technologies Laboratory, 488
Ardexus, 396
Arts Umbrella, 455
Ascendant Technology, 480
ASFINAG Maut Service GmbH, 218
Asia Pacific Breweries Singapore, 243
Ask.com, 296, 297
Associated Press, 15, 292
Association for Computer Machinery (ACM), 76, 630
Association of Information Technology Professionals (AITP), 76
Asus, 119, 611
ATG, 331–332, 428
Atlanta, GA, 418
AT&T, 103, 150, 239, 243, 244, 245, 250, 251, 256, 264,
277, 280, 281, 341
Attensity, 31
Atwatch, 155
Audi, 439
Austar, 103
Austin Energy, 480
Autodesk, 27, 444, 454–455, 483
Autumn Leaves, 81
Avendra, 345
Avent, 356
Aviva, 103
Avon Products, 15, 273–274, 344, 353
B
Baidu, 296
Ball Aerospace, 48
Bank of America, 16, 349, 575
Baptist Health Organization, 239
Barloworld Handling UK, 385–386
Barnes and Noble, 116, 333, 342, 353
Barracuda Networks, 154
Baxter Healthcare Corporation, 303
BBC, 292
B2B Computer Products, 333
BBVA, 57, 58
Bebo, 621
Bell South, 622
Berje, 391
Berkeley Graduate School of Journalism, 292
Bertelsmann AG, 255
Best Buy, 334, 342, 404, 571
Betawave, 428
Beth Israel Deaconess Medical Center, 15, 510, 573
Better Business Bureau, 340, 341, 626
Bidzcom, 335
Billerud, 434
Bing, 295, 296, 297, 314, 315
Bioshell, 390
Bit Defender, 616
Blackbaud, Inc., 455
Blancco, 580
Blue Moon Beads, 81
Blue Mountain Resort, 219
Blue Sky Studios, 121
BlueStar Energy Services, 181–182
BMG, 308
BMI, 308
BMW, 427, 549
Boehringer Ingelheim, 420
Boeing, 15, 27, 424, 488
Boku, 363
Borders, 338
Borland, 160
BOSaNOVA, 120
Boston College, 490
Boston Dynamics, 470
Boston Medical Center, 100
Box.net, 103
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
669
Licensed to: iChapters User
670
Index
|
Braskem S.A., 3–4
BRE Bank, 517
Brightkite, 202, 427
British Retail Consortium, 602
British Sky Broadcasting, 483
British Telecom (BT), 196, 232, 277, 622
BroadSpire, 355
Brooks Brothers, 215
Bruce Power, 601
Buchner Motorex, 395
Burger King, 429
Burt’s Bees, 389
Business Objects, 219
Business Software Alliance (BSA), 611
BuzzCity, 347
BVGARI, 45
C
Cablevision, 236
Caldera, 149
Calpella, 245
Camp Logan Cement, 379–380
Canadian Press, 82
Canon, 106
Capgemini, 459
Carbonetworks, 564
Carbonite, 103
CareerBuilder.com, 76
Carnegie Mellon Robotics Institute, 470
Carnegie Mellon University, 468, 528
Cartoon Network, 410
Casio, 106
CBS, 309
CDW, 334
Cellfire, 347
Cengage Learning, 317
Center for Open Sustainable Learning, 293
Center for the Study of the Presidency and Congress, 146
CERN, 153, 284
Certiport, 293–294
Charles Schwab & Co., 349
Charlotte County, Florida Public School District, 236
Charm Boutique, 349
CheapTickets, 355
CheckFree, 339
Chevron, 491
Chicago Mercantile Exchange, 517, 518
Chicago & Northwestern Railroad, 132
Chico’s FAS, Inc., 221, 391
China Datang Corporation, 248
China Mobile, 244
Chrysler, 426, 440
CIA, 117, 604
CIM National Bank, 464
Cingular, 341
Circuit City, 404
Cisco Systems, 154, 231, 303, 325–326, 412, 509
Citibank, 352, 361
Citysearch, 342
Classmates, 621
Clear Channel Communications, 307
ClearContext, 302
Clearwire Corporation, 245
Clicker.com, 309
ClubCorp, 345
C2Net, 175
CNN, 309, 410, 622
CNN International, 620
Coca-Cola, 98, 491
Code Green, 218
Cognos, 219, 418, 591
Columbian Retirement Home, 603
Comcast, 31, 236, 245, 280, 281, 585
Comic Relief, 188
Commerce One, 621
Compiere, 388
Computer Associates, 472, 523
Computer Emergency Response Team (CERT), 613
Computerjobs.com, 76
Continental Airlines, 126
Convergys, 49
Conversion, 31
Corel, 160, 163, 164, 222
CortexPro, 464
Corus Automotive Engineering Group, 282
Coty Fragrance, 12
Council of Better Business Bureaus, 621
Counterpane, 615
Courtyard, 45
Cox Communications, 236
Craig’s List, 75–76, 314, 335, 342
Crate and Barrel, 342
Cray, 124
Creative, 115
Creativity Inc., 81–82
Crop in Style, 81
CrossView, 351
Cuil, 297
CVS Caremark, 618–619
CVS Corporation, 221, 389
D
Dallas Cowboys, 393
Danger, Inc., 283
Dartmouth Smokehouse, 602
Dassault Systems, 27
Data Synch Systems, 254
Dean Health Plan (DHP), 376
Defense Advanced Research Projects Agenct (DARPA), 276, 470
Defense Information Systems Agency (DISA), 260
DEKA, 468
Dell Computer, 22–23, 66, 75, 115, 119, 120, 122, 127, 132,
133, 149, 239, 244, 245, 312, 333, 424, 564, 571, 611
Del Monte Foods, 615
Deloitte, 232
Deloitte & Touche, 424
Delphi Group, 464
Denver & Rio Grande Western Railroad, 132
DHL, 337, 389
Dice.com, 76
Digg, 292
Digital Insight, 63
Direct Marketing Association, 626
DLA Piper, 118
DND, 81
Docklands Light Railway, 246
Dooney & Bourke, 342
Doster Construction Company, 119
DoubleClick, 635
Doubletree Hotels, 19
Dow Chemical, 3
Dragon Hotel, 362
Drew Shoe Corporation, 355
Dropbox, 282
Drugstore.com, 396
DTR Research, 120
Dubai Bank, 404–405
Duke Energy, 49
Dunkin’ Donuts, 418
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
E
E!, 309
eBay, 75, 150, 191, 212, 232, 289, 313, 314, 334, 335, 342,
353, 354, 361, 580, 605, 611
eBid, 335
eClinicalWorks, 573
Eclipse Foundation, 575
Eddie Bauer, 118
EDS, 75
Educational Credit Management Corp. (ECMC), 610
eHarmony.com, 212
eHow, 293
El Camino Hospital, 158
Electronic Data Systems, 525
Electronic Visualization Laboratory, 486
Element, 240
Embarcadero, 529
Embassy Suites, 19
EMC, 103, 561, 564
Emergency Medical Associates (EMA), 41
Emory University, 488
Empire Online, 311
Endeca Technologies, Inc., 24
ePier, 335
Epinions, 304
Epson, 571
Equifax, 508, 626
Ericsson, 341, 621
Estee Lauder, 427
Etailers Mall, 343–344
Etsy, 335
European Organization for Nuclear Research, 284
Excite, 334
Exeros, 439
Expedia, 199, 314, 355
Experian, 626
Exsys, 482
ExxonMobile, 3, 238
EZ-Xpert, 482
Index
Fossil, 342
Four Seasons Hotels and Resorts, 240
FOX, 309
Fox News Channel, 622
Free Software Directory, 174
Free Software Foundation, 173
Frucall, 347
Fujitsu, 245, 611
G
Gartner, 555
Gazelle, 30
G-Data, 616
Geek Squad, 75, 580
Genalytics, 216
Genentech, 517
General Electric, 66, 473, 557, 572
General Mills, 70
General Motors, 132, 262, 490
Genetech, 70
Gensym, 499
Geospatial, 336
Getco, 8
Ghana Investment Promotion Center, 61
Gillette, 62
Gilt, 349–350
G&J Pepsi-Cola Bottling Company, 133
Gmail, 301
GoDaddy, 399
Goodwill, 396
Google, 14, 19, 75, 103, 140, 141, 150, 152, 154, 158, 160,
164, 166–167, 171, 194, 202, 210, 212, 232, 245, 251, 264,
281, 282, 283, 288, 289, 292, 295, 296, 297, 300, 302, 304,
305, 306, 310, 311, 314, 315, 316, 334, 347, 353, 399, 417,
427, 433, 434, 459, 471, 509, 512, 574, 597, 609, 612, 636
Government Accountability Office, 111
Green Electronics Council, 126
Greenpeace, 125
Grupo AMSA SA, 247
Guardent, 615
F
Fab Lab, 14, 490
Facebook, 16, 31, 32, 33, 55, 76, 137, 273–274, 281, 283,
288, 303, 304–305, 315, 325, 353, 410, 441–442, 444,
597–598, 621, 635
Fairfield, 45
Fairmont Hotels, 345
Fandango, 353
Fannie Mae, 584
FBI, 490, 604, 608, 636
Federal Financial Institutions Examination Council, 352
Federal Reserve Board, 605
FedEx (Federal Express), 5, 16, 17, 337, 338, 373–374, 375,
379, 389, 419–420
FGI Research, 343
Financial Accounting Standards Board, 392
Financial Industry Regulatory Authority, 513
First Fidelity, 525
Firstwave, 396
Fiserv, 339
Flambeau, 383
Flickr, 281, 288, 304, 315
Florida, State of, 526
Florida State University, 304
Fluid, 357
Flypaper, 281
Ford Motor Company, 153, 172, 427, 430, 490
ForeSee Results, 343
Forrester Research, 158, 164, 515, 555
H
Hackensack University Medicine, 411
Hamilton County, Ohio, 606
Hands, 347
Harris Corporation, 111
Harris Interactive, 560
Hayes, 251
HCL Technologies Ltd, 82
Healthland, 25
Healthways Inc., 259
Heartland Payment Systems, 209, 339, 340, 610
Henny Penny, 263
Hess Corporation, 515
Hewlett Packard, 73
Hi5, 621
Hilton Hotels, 19
Hilton Worldwide, 19
Hip in a Hurry, 81
Hitachi Data Systems Corporation, 103
Holiday Inn Express, 19
Home Depot, 221
Honda Italia, 213
Honda Motors, 26, 27, 429, 467
Honeywell, 592
HopeLab, 27
HostWay, 355
HotJobs, 274
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
671
Licensed to: iChapters User
672
Index
|
Hotmail, 301
Hotwire.com, 549–550
HP (Hewlett-Packard), 103, 114, 119, 120, 121, 127, 132,
133, 141, 145, 149, 150, 151, 155, 175, 194, 195, 303, 338,
418, 445, 525, 564, 571, 585, 611
HPShopping.com, 344
HTC Corporation, 251, 612
HughesNet, 280
Hulu, 281, 309
Humane Society of the United States, 574
Hyatt, 345
Hybrid Assistive Limb (HAL) Laboratory, 470
Hyundai Motor America, 427
I
IAG Research, 429
Ibidfree, 335
IBM, 13, 40, 57, 75, 81, 87, 93, 96–97, 103, 122, 123, 124,
132, 137–138, 140, 145, 146, 149, 150, 151, 155, 166, 175,
195, 198, 203, 209, 220, 221, 222, 228, 237, 259, 295, 304,
351, 357, 368–369, 393, 418, 430, 438–439, 444, 463, 472,
476, 480, 490, 506, 523, 524, 525, 529, 532, 570, 571, 574,
576, 580, 581, 585, 591, 611, 615–616, 622
IBM Research Laboratory, 206
IBS, 591
Idaho National Laboratory, 150
Identity Guard, 616
ID Watchdog, 616
iHealthRecord, 439
Illinois State University, 252–253
Imbee, 621
Imprint Business Systems, 482
IMS Health, 216
Incheon, South Korea, 454–455
Indian Ministry of External Affairs, 609
Infor Corporation, 51, 219
Infor Global Solutions, 396
Informix, 288
ING DIRECT Canada, 16
InMobi, 347
Innovative Marketing, 603
Institute for Policy Innovation, 611
Institute of Electrical and Electronic Engineers (IEEE), 233
Intacct, 396
Intel, 13, 90, 93, 94, 96, 119, 120, 121, 146, 147, 149, 245,
490, 571, 625
Intelitek, 468
IntelliVid, 157
Intercontinental Hotels Group, 345
Internal Revenue Service, 22, 392, 498
International Broadband Electric Communications, 237
International Energy Agency (IEA), 188
International Multilateral Partnership Against Cyber Terrorism,
604
International Telecommunication Union (ITU), 233–224
International Trade Commission, 612
International Underwriting Association (IUA), 221
Internaxx, 227
Internet Conga Line, 304
Internet Content Rating Association (ICRA), 622
Internet Corporation for Assigned Names and Numbers
(ICANN), 278–279, 341
Internet Society (ISOC), 277
Intuit Corporation, 63, 160, 168, 210, 379–380
Invent Pharma, 65
I-O Display Systems, 486
Iomega, 115
Iridium Communications Inc., 241
IRobot, 468
ISM, Inc., 396
ITSM Academy, 395
J
JasperSoft, 393
JCPenny, 158, 313
JDA Software, 391
JD Edwards, 387, 388, 409
JEA, 498–499
Jet Blue, 427
Jigsaw, 394
Jive Software, 420
JM Family Enterprises, 70
Johns Hopkins University, 470
Johnson & Johnson, 429
JP Morgan Chase, 508
Jubilations Cheesecake, 395
JumpStart.com, 293
Jumptap, 347
Jupiter Research, 611
K
Kabbani Construction Group (KCG), 384
Kashi, 294
Kaspersky Lab, 616
Keane, Inc., 525
Kennedy Space Center, 442
Kijjiji, 335
Kindred Healthcare, 572
Kiva, 324–325, 421
Kmart, 630
KnowledgeBase, 464
Knowledge Management Consortium International, 464
Knowledge Management Resource Center, 464
Knowledge Management Solutions, Inc., 464
Knowledge Management Web Directory, 464
Kodak, 64, 68, 525
Kroger, 248, 334
L
Laplink, 155
Laps Care, 60
Last.fm, 308
Law Clip Knowledge Manager, 464
Layar, 315
Leads Online, 605–606
Legato Systems, Inc., 103
LEGO, 505–506
Lenovo, 149, 245, 611, 614
LexisNexis, 299, 463
LG Phillips, 113
Library of Congress, 94, 311
Life Lock, 616
LimeWire, 611–612
Linde Group, 203
LinkedIn.com, 76, 148, 303, 304, 444
Lions Gate Entertainment, 429, 621
LLBean.com, 344, 360
Lloyd’s of London Insurance, 12, 221
Lockheed Martin, 603
Logica, 196
LoJack Corporation, 355
Loopt, 427, 433
Los Angeles, City of, 283
Lotus, 163, 164
Louisiana Bucket Brigade, 188
Lyons Bakeries, 167
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
M
MAA Bozell, 61
Madhouse, 347
Magnify, 216
Mahalo, 296
Mandalay Bay Hotel & Casino, 239
Mantis Development Corporation, 488
MapQuest, 314
Marin Municipal Water District, California, 385
Marketing Architects, 101
Marriott, 19
Marriott International, Inc., 45–46, 345, 413, 429
Massachusetts General Hospital, 467
Massachusetts Institute of Technology (MIT), 5, 293, 294, 490
MasterCard, 107, 361, 363
Mayo Clinic, 627
Mazda, 368–369
McAfee, 154, 580, 616
McDonalds, 280
McMaster-Carr, 344
Media Grid, 485
Metacafe, 310
Microcom, 251
Micro Focus, 583
Microsoft, 14, 73, 75, 76, 103, 105, 108, 133, 140, 141, 142,
145, 147, 148, 150, 152, 153, 154, 155, 158, 159, 160, 161,
162, 163, 164, 165, 167, 168, 169, 171, 175, 194, 196, 198,
202, 203, 207, 209, 210, 212, 215, 219, 222, 231, 232, 239,
250, 281, 282, 283, 288, 289, 290, 291, 296, 297, 304, 305,
306, 308, 311, 315, 359, 384, 388, 393, 396, 399, 405, 414,
418, 437, 440, 444, 463, 483, 484, 491, 512, 528, 529, 532,
549, 555, 571, 572, 575, 611, 621, 622, 629, 636
Microsoft Mobile Advertising, 347
MicroStrategy, 219
Millennial Media, 347
Minardos Group, 380
Mindjet, 140
Mine Safety and Health Administration, 600
Mint Software, 424
Missouri-Kansas-Texas Railroad, 132
Missouri Pacific Railroad, 132
MITRE Corporation, 498
Mobileye, 490
Mobil Mammoth, 342
Monsanto, 70
Monster.com, 76, 274, 433
Motion Picture Association of America (MPAA), 352
Motorola, 61, 115, 146, 245, 251, 264, 341, 592
Mozilla, 285
Mozy, 103
MSI, 119
MSN, 297, 300, 301, 302, 313
mTLD (Top Level Domain Ltd.), 341
MTV, 309
MWEB, 616
MWH Global, 441, 462
MyOwnDB, 210
MySpace, 16, 31, 32, 33, 76, 98, 273, 303, 304, 342, 410, 441,
444, 597, 621
My Virtual Model, 312, 351
Index
National Infrastructure Protection Center, 604
National Oceanic and Atmospheric Administration (NOAA), 89
National Public Radio, 307
National Telecommunications and Information Administration
(NTIA), 242
National Weather Service, 241
Nationwide Auto Insurance, 122
Natural Selection, 66, 473
NCR Teradata, 216
NEATO, 387
Nestlé, 156
Netflix, 344
Net Suite, 158
NetSuite, 396
Network Solutions, 355
NeverFail, 561
Nevsun Resources, 507
Newcastle Permanent Building Association, 375
Newegg.com, 334, 344
Newmont Leeville Gold Mine, 109
News Corp UK, 82
Newsvine, 292
New York City, 335–336
New York City Police Department, 218
New York Stock Exchange (NYSE), 15, 68, 558
New York Yankees, 3
Next Generation Data, 196
Nickelodeon, 311
Nielsen, 31, 346, 601
Nikon, 106
Nissan Motor Company, 26, 563
Nokia, 125, 152, 239, 245, 341
Nokia Interactive Advertising, 347
North Carolina State Employees’ Credit Union, 89
North Coast Electric Company, 63
North Face, 357
Novell, 254
Nuance Communications, Inc., 472
Nvidia, 14, 471
O
Objectivity, 220
Obopay, 363
Office Depot, 182–183, 334, 343
OfficeMax, 334, 342
Olympus, 106
On with Nature, 355
OpenBravo, 388
Open Courseware Consortium, 293
OpenDNS, 70
OpenPro, 379
OpenSteetMap, 298
Optima Technologies, 396
Optimum Energy, 564
Oracle, 41, 49, 156, 158, 164, 198, 203, 209, 210, 211, 213,
216, 219, 220, 222, 288, 387, 388, 393, 396, 409–410, 439,
523, 529, 571, 575, 580, 585
Orbitz, 199, 355
Organization of Petroleum Exporting Countries (OPEC), 188
Overstock.com, 386
Oxford Archaeology, 149
N
Namesdatabase, 621
Napster, 308
NASA, 117
NASA Ames Research Center, 56
NASA Jet Propulsion Laboratory, 474
National Football League, 483
National Geographic, 227–228
P
PacifiCare, 525
Pagemasters, 82
Palm, 19, 118, 250
Panasonic, 106, 245, 304
Pandora, 281, 308
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
673
Licensed to: iChapters User
674
Index
|
Papa Johns, 303, 489
ParaScale, 103
PARC (Palo Alto Research Center), 142
PartyGaming, 311
PayPal, 325
PBS, 309
PC Pinpoint, 580
Peapod, 312
Penril/Bay Networks, 251
Penske Truck Leasing, 16
Pentaho, 393
Pentax, 106
PeopleSoft, 387, 388
Pepsi, 82
Performance Management Institute, 25
PersonalHealthKey, 439
Pfizer, 29, 524
PFSWeb, 334
Pick n Pay, 22
Pitney Bowes, 221
Pixar, 484, 485
Podcast Alley, 309
Point360, 99–100
Popkin Software, 529
Porche, 65, 66
Porter Adventist Hospital, 470
Portfolio Monkey, 424
Portland, Oregon, City of, 584
PostgreSQL, 220
Precise Software Solutions, 585
PriceGrabber, 334
Priceline.com, 19, 314, 355
PricewaterhouseCoopers, 424
Privacy Rights Clearinghouse, 339
Privacy Study Commission, 623
Pro BTP, 259
Procter & Gamble, 55, 210, 231–232, 334, 424, 440, 442
Progressive Insurance Company, 517
Prosper, 422
Protect My ID, 616
Providence Washington Insurance Company, 418
Pudding Media, 347
Puma North America, 216
Purdue Employees Federal Credit Union, 352
Q
Quadstone, 216
Qualcomm, 239, 341
Qualys, 574
Quantivo Corporation, 469
Quark, 160
Quattro Wireless, 347
QVC.com, 344
R
Rabble+Rouser, 575
Radian6, 31
Raiffeisen Informatik GmbH, 218
Rapid Advance, 158
Razorfish, 210
REA Group, 316
RealSpace Vision Communication Inc., 487
Recording Industry Association of America, 611–612
Red Brick Systems, 216
Red Hat Software, 149, 151, 175, 259, 572, 612
Redwing, 379
Reebok, 393
REI Mobile, 342
Relavis, 396
Renaissance, 45
RentCell, 55
Residence Inn, 45
ResMed, 151, 202
ReSTART, 628
ResumePlanet.com, 312
Reuters, 292
Rhapsody, 308
Rheinmetal, 137–138
Right Group, 384
RIM, 19, 152
Riptech, 615
RiteAid, 389
Ritz-Carlton, 45
Robot Learning Laboratory, 468
Rockford, Illinois, City of, 606
RockYou, 340
Rolex, 65
Roundarch, 109
RSA, 218
Rural Utilities Service (RUS), 242
Ryder Levett Bucknall, 260–261
Ryder System, Inc., 555–556
S
Sabre Airline Solutions, 524
Sacramento Municipal Utility District, 419
Safend, 218
Sage, 379, 380, 396
SalesForce, 14, 49, 158, 159, 273–274, 282, 305, 396, 427,
550, 555–556
Salespage Technologies, 396
Salzburg, Austria, 454–455
Samsung, 115, 116, 125, 245, 304
Sandia National Laboratories, 482
San Diego Gas and Electric, 70
SanDisk, 13, 101, 571
Santa Cruz Operations, 150
SAP, 3, 23, 41, 137, 158, 187, 219, 388, 391, 393, 395, 396,
404, 437, 463, 505–506, 515, 580, 602
SAS Institute, 216, 440
SBC Fulfillment, 389
SBI Funds Management, 105
SCAN, 53
ScanScout, 429
Schumacher Group, 439
Scitor, 160
Seagate, 102
Seaport Hotel, 90
Sears, 149, 158, 351, 630
Sears Canada, 156
Sears Holding Corporation, 334, 630–631
Second Life, 304, 427, 428, 488–489
Securian Financial Group, 70
Securities and Exchange Commission (SEC), 392, 412
Sendmail, Inc., 175
Serco Docklands, 246
Serena, 24, 434, 441–442
Seriosity, 302
SGI, 124
Shermag, 8, 413
ShopLaTiDa, 349
Shopzilla, 334
Shutterfly.com, 344
Siebel Systems, 387, 388
Sightward, 216
Singularity University, 56
Sirius XM Radio, 575
SkillSoft, 293
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Licensed to: iChapters User
|
Skullcraft, 404
Skype, 220, 304
Smith Drug, 491
Société Générale, 602
Society for Information Management, 74
Software AG, 215
Software Engineering Institute, 528
Sonic Restaurants, 221
Sony, 93, 106, 115, 116, 152, 404, 427, 571, 611
Sony Music, 308
Sophos, 218
Southern Pacific Railroad, 132
Southwest Airlines, 417, 575
Sovereign Bank, 395
Spartan Foods of America, 392
Speak with a Geek, 75
Sportmaster Group, 591–592
Sprint, 277, 280, 310
Sprint Nextel, 243, 245, 264, 341
SPSS, 216, 440
St. Peters, Missouri Police Department, 106
Stanford University, 490
Staples, 26, 334, 353
Staples Inc., 433
Starbucks, 159, 313
Starwood Hotels, 240, 625
StatoilHydro, 413
StayInFront, 396
SteelEye, 561
Strayer University, 234
Success Factors, 158
SugarSync, 103, 282
Sunglass Hut, 342
Sun Microsystems, 147, 150, 151, 160, 163, 165, 288, 291
Sunoco, 74
Sun Trust Mortgage, 619
SuSE, 151
Swedish Medical Center, 157, 262
Sybase, 175, 198, 203, 209, 215, 216
Symantec, 103, 153, 154, 160, 218, 414, 615, 616
Sysco, 49, 429
T
Tactician Corporation, 433
Tagged, 621
Tandem, 216
Target, 313, 334, 342, 348, 389, 404, 424
Tasty Baking Company, 581
TD Ameritrade, 605
Teamspace, 55
Technology Research Institute, 194
TeleNav, 264
Teliasonera, 244
TELUS Corporation, 123
Tesla, 109
Texas, State of, 194
TheLadders.com, 76
The Rivers, 108
The Shack, 571
Thinkfree, 164
Ticketmaster Entertainment, 20, 248
Tickets, 20
TigerDirect.com, 344
Time Warner, 236, 245, 410, 427
TJX Companies, 209
T-Mobile, 243, 244, 264, 280, 283
Tokio Marine and Nichido Fire Insurance Company, 120
Tommy Hilfiger, 331–332
TopCoder, 72
Toronto Star, 82
Index
Toshiba, 92, 93, 119, 245, 611, 614
Touch Bionics, 490
Toyota, 172, 429
Toyota Material Handling USA (TMHU), 378
Trackvia, 210
Tradus, 335
Transco, 482
Transplace, 61
Transportation Security Agency (TSA), 584
TransUnion, 67, 625, 626
TravelCell, 55
Travelocity, 199, 314, 355
Trend Micro, 218
Trimac Corporation, 376–377
TRUSTe, 340, 341, 626
Trusted ID, 616
Tru-Test, 409–410
Turboinstitute, 87–88
Tween Brands, 439
TweetPhoto, 427
Twitter, 16, 32, 76, 137, 202, 273, 283, 303, 304, 305, 315,
342, 351, 427, 444, 584, 585, 620
U
Ubid, 335
UNAIDS, 233
Unesco, 311
Unilever, 427
Union Pacific (UP), 132
United Nations, 188, 234
United Parcel Service (UPS), 62, 337, 375, 389, 417, 574, 592,
625
U.S. Air Force, 66, 470, 473
U.S. Army, 27, 241, 474, 579
U.S. Bureau of Labor Statistics, 70
U.S. Census Bureau, 111
U.S. Civil Service Commission, 623
U.S. Coast Guard, 439
U.S. Cyber Consequences Unit, 584
U.S. Department of Defense, 215, 276, 498, 613, 623
U.S. Department of Energy, 123, 564
U.S. Department of Health and Human Services, 619
U.S. Department of Homeland Security, 106, 498, 604
U.S. Department of Justice, 599
U.S. Department of Veterans Affairs, 498, 610
U.S. Environmental Protection Agency, 125, 126, 196, 563
U.S. Federal Aviation Administration, 498
U.S. Federal Bureau of Investigation, 190
U.S. Federal Communication Commission (FCC), 242, 292
U.S. Federal Trade Commission (FTC), 259, 427, 616,
618–619, 635
U.S. General Services Administration, 482, 512
U.S. Geological Survey, 600
U.S. Green Building Council, 563
U.S. Livermore National Laboratories, 13
U.S. Marines, 488
U.S. Navy, 439
U.S. Patent Office, 612
U.S. Postal Service, 256, 626
U.S. Robotics, 251
U.S. Supreme Court, 622
Univa UD, 282
Universal Music, 308
University Corporation for Advanced Internet Development
(UCAID), 276
University of Alabama, 71
University of California Los Angeles (UCLA), 488
University of Florida-Gainesville, 610
University of Maryland, 628
University of Miami, 70
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
675
676
Index
|
University of Pennsylvania, 70
University of Texas Medical Branch (UTMB), 97
University of Warwick Digital Lab, 486
UNIX Systems Lab, 150
Upland International, 423
Upper Big Branch Mine, 600
Uptrends, 155
Urbanspoon, 210, 282
USAA, 70
Utah Division of Wildlife, 359
UUNet, 622
V
Valero Energy, 446
Valpak, 348
Vancouver, Canada, 454–455
Varolii Corporation, 417
Veripark, 405
VeriSign, 56
Veritas Software Corporation, 103
Verizon, 61, 70, 237, 243, 244, 245, 251, 264, 277, 280, 341,
622
Vermont, State of, 195
Versant, 220
Viacom, 76
VictoriaSecret.com, 344
Village Books, 303
Virgin Blue, 61
Virginia Housing Development Authority, 163
Virtual Realities, 486
Visa, 107, 350, 361, 610, 625
Visa Canada, 107
Visible Systems Corporation, 529
Visible Technologies, 31
VistaPrint, 563
VMware, 133
Vocollect, Inc., 491
Vodaphone, 66, 251, 524, 578
Voltaic Generator, 564
Warner Music, 308
Waste Management, Inc., 386
Weber Grills, 575
WebEx, 445, 469
WebMD, 439
Wells Fargo, 62
Western Pacific Railroad, 132
Westrim Crafts, 81
Weta Digital, Ltd, 121
Wetpaint, 298
Widget Software, 155
Wi-Fi Alliance, 239
Wikimedia, 298
Wikipedia, 297–298, 299, 304, 325, 342, 498, 622
Wikispaces, 298
Windstream Communication, 346
Winn-Dixie, 122
Wipro Technologies Ltd., 9, 49, 53, 74, 82, 525, 563
Workday, 396
World Digital Library (WDL), 311
World Wide Web Consortium (W3C), 212, 284, 621
Wrangler Jeans, 368–369
Wyse, 120
x
Xcerion, 305
Xerox, 68, 142, 413
Xiotech, 103
Xobni, 302
XuQa, 621
Y
Yahoo!, 75, 232, 281, 292, 295, 296, 297, 300, 302, 308, 310,
313, 334, 353, 424, 508, 597
YOC Group, 347
YourTechOnline.com, 580
YouTube, 281, 292, 304, 310, 325, 410, 427
Yowza, 347
YuMeNetworks, 429
W
Waldenbooks, 333
Walgreens, 62, 342, 389, 439
Wall Street Systems, 121
Wal-Mart, 8, 49, 65, 149, 158, 167, 192, 308, 313, 334, 343,
345, 389, 424, 575
Walt Disney Internet Group, 625
Ward Systems Group, 473
Z
Zavers, 347
Znode, 355
Zobrist Consulting Group, 357
Zoho, 159, 164, 281, 298
Zynga, 305
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.