Licensed to: iChapters User Licensed to: iChapters User TENTH EDITION Principles of Information Systems Tenth Edition Ralph M. Stair Professor Emeritus, Florida State University George W. Reynolds Instructor, Strayer University Australia • Canada • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User Principles of Information Systems, Tenth Edition Ralph M. Stair & George W. Reynolds Executive Vice President and Publisher: Jonathan Hulbert Executive Vice President of Editorial, Business: Jack W. Calhoun Publisher: Joe Sabatino Sr. Acquisitions Editor: Charles McCormick, Jr. Sr. Product Manager: Kate Mason Sr. Content Project Manager: Jill Braiewa Marketing Manager: Adam Marsh Sr. Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Editorial Assistant: Nora Heink Media Editor: Chris Valentine Sr. Art Director: Stacy Jenkins Shirley Print Buyer: Julio Esperas Cover Designer: cmiller design Cover Photos: © Getty Images Compositor: Value Chain Copyeditor: Mary Kemper Proofreader: Green Pen Quality Assurance Indexer: Alexandra Nickerson © 2012 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or product, submit all requests online at www.cengage.com/permissions Further permissions questions can be emailed to permissionrequest@cengage.com Student Edition: ISBN-13: 978-0-538-47829-8 ISBN-10: 0-538-47829-2 Instructor’s Edition: ISBN-13: 978-1-111-53109-6 ISBN-10: 1-111-53109-9 Course Technology 20 Channel Center Street Boston, MA 02210 USA Some of the product names and company names used in this book have been used for identification purposes only and may be trademarks or registered trademarks of their respective manufacturers and sellers. Any fictional data related to persons or companies or URLs used throughout this book is intended for instructional purposes only. At the time this book was printed, any such data was fictional and not belonging to any real persons or companies. Course Technology, a part of Cengage Learning, reserves the right to revise this publication and make changes from time to time in its content without notice. Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil and Japan. Locate your local office at: www.cengage.com/global Cengage Learning products are represented in Canada by Nelson Education, Ltd. To learn more about Course Technology, visit www.cengage.com/coursetechnology Purchase any of our products at your local college store or at our preferred online store www.cengagebrain.com Printed in the United States of America 1 2 3 4 5 6 7 16 15 14 13 12 11 10 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User For Lila and Leslie —RMS To my grandchildren: Michael, Jacob, Jared, Fievel, Aubrey, Elijah, Abrielle, Sofia, Elliot —GWR Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User BRIEF CONTENTS PART 1 PART 2 PART 3 Overview Chapter 1 An Introduction to Information Systems Chapter 2 Information Systems in Organizations Information Technology Concepts Chapter 3 Hardware: Input, Processing, and Output Devices Chapter 4 Software: Systems and Application Software Chapter 5 Database Systems, Data Centers, and Business Intelligence Chapter 6 Telecommunications and Networks Chapter 7 The Internet, Web, Intranets, and Extranets Business Information Systems Chapter 8 Electronic and Mobile Commerce Chapter 9 Enterprise Systems Chapter 10 Information and Decision Support Systems Chapter 11 Knowledge Management and Specialized Information Systems PART 4 Systems Development Chapter 12 Systems Development: Investigation and Analysis Chapter 13 Systems Development: Design, Implementation, Maintenance, and Review PART 5 Information Systems in Business and Society Chapter 14 The Personal and Social Impact of Computers Glossary Index iv Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User CONTENTS Preface xvii PART 1 Overview 1 Chapter 1 An Introduction to Information Systems Braskem S.A., Brazil 3 2 Information Concepts 5 Data, Information, and Knowledge 5 The Characteristics of Valuable Information 7 The Value of Information 8 System Concepts 8 System Performance and Standards 9 What Is an Information System? 10 Input, Processing, Output, Feedback 11 Manual and Computerized Information Systems 12 Computer-Based Information Systems 12 Business Information Systems 18 Information Systems @ Work: Hilton Hospitality in the Palm of Your Hand 19 Electronic and Mobile Commerce 20 Enterprise Systems: Transaction Processing Systems and Enterprise Resource Planning 21 Information and Decision Support Systems 22 Specialized Business Information Systems: Knowledge Management, Artificial Intelligence, Expert Systems, and Virtual Reality 25 Systems Development 28 Systems Investigation and Analysis 29 Systems Design, Implementation, and Maintenance and Review 30 Information Systems in Society, Business, and Industry 30 Security, Privacy, and Ethical Issues in Information Systems and the Internet 30 Ethical and Societal Issues: Who Is Interested in Your Social Network Updates? 31 Computer and Information Systems Literacy 32 Information Systems in the Functional Areas of Business 33 Information Systems in Industry 34 Global Challenges in Information Systems 34 Case One: Effectively Managing Resources at Aéroports de Paris 40 Case Two: Information System as an Effective Force Against H1N1 Pandemic 41 Chapter 2 Information Systems in Organizations 44 Marriott International, Inc., United States 45 Organizations and Information Systems 47 Information Systems @ Work: Aldra Manages Workflow to Support Customization 51 v Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User Organizational Structures 52 Organizational Culture and Change 55 Reengineering and Continuous Improvement 57 User Satisfaction and Technology Acceptance 59 Quality 60 Outsourcing, On-Demand Computing, and Downsizing 60 Competitive Advantage 62 Factors that Lead Firms to Seek Competitive Advantage 62 Ethical and Societal Issues: The New Corporate Mantra: Social and Environmental Responsibility 63 Strategic Planning for Competitive Advantage 64 Performance-based Information Systems 67 Productivity 67 Return on Investment and the Value of Information Systems 68 Risk 69 Careers in Information Systems 70 Roles, Functions, and Careers in IS 71 Typical IS Titles and Functions 74 Other IS Careers 75 Working in Teams 76 Finding a Job in IS 76 Case One: Creativity Moves Up the Value Chain 81 Case Two: Media Companies Centralize and Outsource to Survive 82 PART 2 Information Technology Concepts 85 Chapter 3 Hardware: Input, Processing, and Output Devices Turboinštitut d.d., Slovenia 87 86 Computer Systems: Integrating the Power of Technology 89 Hardware Components 90 Hardware Components in Action 91 Processing and Memory Devices: Power, Speed, and Capacity 92 Processing Characteristics and Functions 92 Memory Characteristics and Functions 94 Multiprocessing 96 Parallel Computing 97 Secondary Storage 98 Access Methods 98 Secondary Storage Devices 99 Enterprise Storage Options 101 Input and Output Devices: The Gateway to Computer Systems 103 Characteristics and Functionality 104 Input Devices 104 Output Devices 110 Information Systems @ Work: Handheld Computers Streamline National Inventory 111 vi Computer System Types 117 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User Portable Computers 118 Nonportable Single-User Computers 119 Multiple-User Computer Systems 121 Ethical and Societal Issues: Electronics Manufacturers Face the Global E-Waste Problem 125 Green Computing 126 Case One: Union Pacific Retires Its Big Iron 132 Case Two: Pepsi Bottler Goes Virtual 133 Chapter 4 Software: Systems and Application Software 136 Rheinmetall AG 137 An Overview of Software 139 Systems Software 139 Application Software 139 Supporting Individual, Group, and Organizational Goals 139 Systems Software 141 Operating Systems 141 Current Operating Systems 145 Information Systems @ Work: Blended Platforms at LinkedIn 148 Workgroup Operating Systems 150 Enterprise Operating Systems 151 Operating Systems for Small Computers, Embedded Computers, and Special-Purpose Devices 152 Utility Programs 153 Middleware 156 Application Software 156 Overview of Application Software 157 Personal Application Software 159 Mobile Application Software 165 Workgroup Application Software 165 Enterprise Application Software 167 Application Software for Information, Decision Support, and Specialized Purposes 168 Programming Languages 168 The Evolution of Programming Languages 168 Visual, Object-Oriented, and Artificial Intelligence Languages 169 Software Issues and Trends 171 Software Bugs 171 Ethical and Societal Issues: Software-Driven Cars 172 Copyrights and Licenses 173 Freeware and Open-Source Software 173 Software Upgrades 175 Global Software Support 175 Case One: BlueStar Profits from SOA and Open Source 181 Case Two: Office Depot Gets SaaSy 182 vii Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User Chapter 5 Database Systems, Data Centers, and Business Intelligence 186 Aquent, United States 187 Data Management 189 The Hierarchy of Data 189 Data Entities, Attributes, and Keys 190 Data Modeling and Database Characteristics 193 Data Center 194 Data Modeling 195 Ethical and Societal Issues: Mega Data Centers and Their Environmental Impact 196 The Relational Database Model 197 Database Management Systems 201 Overview of Database Types 202 Providing a User View 203 Creating and Modifying the Database 203 Storing and Retrieving Data 205 Manipulating Data and Generating Reports 206 Database Administration 208 Popular Database Management Systems 209 Special-Purpose Database Systems 210 Selecting a Database Management System Using Databases with Other Software Database Applications 210 211 211 Linking the Company Database to the Internet 212 Data Warehouses, Data Marts, and Data Mining 212 Business Intelligence 216 Information Systems @ Work: The Database that Drives the Austrian Turnpike 217 Distributed Databases 218 Online Analytical Processing (OLAP) 219 Object-Relational Database Management Systems 220 Visual, Audio, and Other Database Systems 221 Case One: Managing International Trades with Powerful Database Systems 227 Case Two: Using Databases to Map Human Migration 227 Chapter 6 Telecommunications and Networks 230 Procter & Gamble, United States 231 An Overview of Telecommunications 233 Basic Telecommunications Channel Characteristics 234 Short-Range Wireless Options 238 Medium-Range Wireless Options 239 Wide Area Wireless Network Types 240 Ethical and Societal Issues: Building Out the Broadband Infrastructure in the United States 242 Networks and Distributed Processing 246 Network Types 246 viii Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User Basic Processing Alternatives 248 Client/Server Systems 249 Telecommunications Hardware 250 Telecommunications Software 254 Securing Data Transmission 254 Virtual Private Network (VPN) 256 Telecommunications Services and Network Applications 256 Cellular Phone Services 256 Linking Personal Computers to Mainframes and Networks 258 Voice Mail 258 Home and Small Business Networks 258 Electronic Document Distribution 259 Call Centers 259 Telecommuting and Virtual Workers and Workgroups 260 Electronic Meetings 260 Electronic Data Interchange 261 Unified Communications 262 Global Positioning System Applications 262 Information Systems @ Work: Henny Penny Moves to Unified Communications 263 Case One: NFC Provides True Self-Service in Zurich Switzerland 268 Case Two: Adidas Turns to Cellular Network for Inventory Data 269 Chapter 7 The Internet, Web, Intranets, and Extranets Avon, USA 273 272 Use and Functioning of the Internet 275 How the Internet Works 277 Accessing the Internet 279 Cloud Computing 281 Ethical and Societal Issues: Danger in the Cloud 283 The World Wide Web 284 How the Web Works 284 Web Programming Languages 288 Web Services 289 Developing Web Content and Applications 289 Internet and Web Applications 291 Online Information Sources 291 Search Engines and Web Research 296 Web Portals 300 Communication and Collaboration 300 Web 2.0 304 Blogging and Podcasting 306 Online Media and Entertainment 307 Shopping Online 312 Travel, Geolocation, and Navigation 314 Information Systems @ Work: Selling Real Estate with Google Maps 316 ix Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User Internet Utilities 317 Intranets and Extranets 317 Case One: Kiva Uses Web to Alleviate Poverty 324 Case Two: Barriers to Enterprise 2.0 325 PART 3 Business Information Systems 329 Chapter 8 Electronic and Mobile Commerce 330 Tommy Hilfiger, United States 331 An Introduction to Electronic Commerce 332 Business-to-Business (B2B) E-Commerce 333 Business-to-Consumer (B2C) E-Commerce 333 Consumer-to-Consumer (C2C) E-Commerce 335 e-Government 335 Multistage Model for E-Commerce 336 E-Commerce Challenges 338 Defining an Effective E-Commerce Model and Strategy 339 Dealing with Consumer Privacy Concerns 339 Overcoming Consumers’ Lack of Trust 340 Overcoming Global Issues 341 An Introduction to Mobile Commerce 341 Mobile Commerce in Perspective 342 M-Commerce Web Sites 342 Advantages of Electronic and Mobile Commerce 343 Electronic and Mobile Commerce Applications 343 Retail and Wholesale 343 Manufacturing 344 Marketing 345 Advertising 346 Investment and Finance 348 Banking 348 E-Boutiques 349 Threats to Electronic and Mobile Commerce 350 Security 350 Information Systems @ Work: Virtual Models Sell Clothes at Sears.com 351 Theft of Intellectual Property 352 Fraud 352 Invasion of Consumer Privacy 353 Lack of Internet Access 353 Legal Jurisdiction 354 Taxation 354 Strategies for Successful E-Commerce and M-Commerce 354 Defining the Web Site Functions 354 Establishing a Web Site 355 Building Traffic to Your Web Site 355 Maintaining and Improving Your Web Site 356 x Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User Ethical and Societal Issues: North Face Web Site Mixes Business, Philanthropy, and Humanity 357 Technology Infrastructure Required to Support E-Commerce and M-Commerce 358 Hardware 358 Web Server Software 359 E-Commerce Software 359 Mobile Commerce Hardware and Software 360 Electronic Payment Systems 360 Case One: Mazda Provides Dealers with Customized E-Commerce Sites 368 Case Two: Wrangler Sells Direct Online 369 Chapter 9 Enterprise Systems 372 FedEx, United States 373 An Overview of Transaction Processing Systems 374 Traditional Transaction Processing Methods and Objectives 375 Transaction Processing Systems for Small and Medium-Size Enterprises (SMEs) 379 Transaction Processing Activities 380 Data Collection 380 Data Editing 381 Data Correction 381 Data Manipulation 382 Data Storage 382 Document Production and Reports 382 Enterprise Resource Planning and Customer Relationship Management 382 An Overview of Enterprise Resource Planning 383 Advantages of ERP 383 Information Systems @ Work: Kabbani Integrates and Secures Information with ERP 384 Disadvantages of ERP Systems 386 Leading ERP Systems 388 ERP for Small and Medium-Size Enterprises (SMEs) 388 Supply Chain Management (SCM) 389 Financial and Managerial Accounting and ERP 392 Business Intelligence and ERP 392 Customer Relationship Management 393 Hosted Software Model for Enterprise Software 396 International Issues Associated with Enterprise Systems 397 Different Languages and Cultures 397 Disparities in Information System Infrastructure 397 Varying Laws and Customs Rules 398 Multiple Currencies 398 Ethical and Societal Issues: Google Pulls Out of China 399 Case One: Skullcraft Goes Big Time with ERP 404 Case Two: Dubai Bank Improves Customer Satisfaction with CRM 404 xi Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User Chapter 10 Information and Decision Support Systems Tru-Test, New Zealand 409 408 Decision Making and Problem Solving 410 Decision Making as a Component of Problem Solving 411 Programmed versus Nonprogrammed Decisions 412 Optimization, Satisficing, and Heuristic Approaches 413 The Benefits of Information and Decision Support Systems 414 An Overview of Management Information Systems 415 Management Information Systems in Perspective 415 Ethical and Societal Issues: Southwest Airlines Applies MIS to Customer Service 417 Inputs to a Management Information System 418 Outputs of a Management Information System 418 Characteristics of a Management Information System 420 Functional Aspects of the MIS 420 Financial Management Information Systems 421 Manufacturing Management Information Systems 424 Marketing Management Information Systems 427 Human Resource Management Information Systems 430 Other Management Information Systems 433 An Overview of Decision Support Systems 434 Characteristics of a Decision Support System 434 Capabilities of a Decision Support System 436 Information Systems @ Work: Amenities Inc. Gets a Grip on Pachinko Information 437 A Comparison of DSS and MIS 438 Components of a Decision Support System 438 The Database 438 The Model Base 439 The User Interface or Dialogue Manager 440 Group Support Systems 441 Characteristics of a GSS that Enhance Decision Making 442 GSS Software 444 GSS Alternatives 445 Executive Support Systems 446 Executive Support Systems in Perspective 446 Capabilities of Executive Support Systems 447 Case One: 3D Digital City Model Assists Vancouver City Officials and Departments 454 Case Two: Accurate Reports Place Umbrella over Arts 455 Chapter 11 Knowledge Management and Specialized Information Systems 458 Capgemini, France 459 Knowledge Management Systems 460 Overview of Knowledge Management Systems 461 xii Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User Data and Knowledge Management Workers and Communities of Practice 462 Obtaining, Storing, Sharing, and Using Knowledge 462 Technology to Support Knowledge Management 463 An Overview of Artificial Intelligence 465 Artificial Intelligence in Perspective 465 The Nature of Intelligence 465 The Brain Computer Interface 467 The Major Branches of Artificial Intelligence 467 Expert Systems 468 Robotics 468 Information Systems @ Work: WebEx Uses AI-Powered Analytics to Focus Salesforce 469 Vision Systems 471 Natural Language Processing and Voice Recognition 471 Learning Systems 472 Neural Networks 472 Other Artificial Intelligence Applications 473 An Overview of Expert Systems 474 When to Use Expert Systems 474 Components of Expert Systems 475 The Inference Engine 477 The Explanation Facility 477 The Knowledge Acquisition Facility 477 The User Interface 478 Participants in Developing and Using Expert Systems 478 Ethical and Societal Issues: Austin Energy First to Implement a Smart Grid 480 Expert Systems Development Tools and Techniques 481 Multimedia and Virtual Reality 482 Overview of Multimedia 482 Overview of Virtual Reality 485 Interface Devices 486 Forms of Virtual Reality 486 Virtual Reality Applications 487 Specialized Systems 490 Case One: MITRE Taps the Brain Trust of Top U.S. Experts 498 Case Two: JEA Uses AI to Optimize Water Delivery 498 PART 4 Systems Development 503 Chapter 12 Systems Development: Investigation and Analysis LEGO, Denmark 505 504 An Overview of Systems Development 506 Participants in Systems Development 507 Individual Systems Developers and Users 509 Initiating Systems Development 510 xiii Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User Ethical and Societal Issues: U.S. Federal Government IS Project to Save Billions 512 Information Systems Planning and Aligning Corporate and IS Goals 513 Information Systems @ Work: Hess Information Systems Take the Long View 515 Establishing Objectives for Systems Development 516 Systems Development Life Cycles 519 The Traditional Systems Development Life Cycle 520 Prototyping 521 Rapid Application Development, Agile Development, and Other Systems Development Approaches 523 Outsourcing and On-Demand Computing 524 Factors Affecting Systems Development Success 526 Degree of Change 526 The Importance of Planning 527 Use of Project Management Tools 528 Use of Computer-Aided Software Engineering (CASE) Tools 529 Object-Oriented Systems Development 530 Systems Investigation 531 Initiating Systems Investigation 531 Participants in Systems Investigation 531 Feasibility Analysis 532 Object-Oriented Systems Investigation 533 The Systems Investigation Report 533 Systems Analysis 534 General Considerations 534 Participants in Systems Analysis 534 Data Collection 534 Data Analysis 536 Requirements Analysis 540 Object-Oriented Systems Analysis 542 The Systems Analysis Report 542 Case One: BMW Streamlines IS with App Virtualization 549 Case Two: Hotwire.com Gains Control of Hotel Partner Information 549 Chapter 13 Systems Development: Design, Implementation, Maintenance, and Review 554 Ryder, United States 555 Systems Design 557 Logical and Physical Design 557 Object-Oriented Design 558 Interface Design and Controls 559 Design of System Security and Controls 559 Environmental Design Considerations 563 Generating Systems Design Alternatives 564 Evaluation Techniques 566 Freezing Design Specifications 568 xiv Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User The Contract 569 The Design Report 569 Systems Implementation 570 Acquiring Hardware from an IS Vendor 571 Acquiring Software: Make or Buy? 572 Ethical and Societal Issues: Medical Center Moves Patient Records to Cloud 573 Acquiring Database and Telecommunications Systems 575 User Preparation 576 IS Personnel: Hiring and Training 576 Site Preparation 576 Data Preparation 577 Installation 577 Testing 577 Start-Up 578 User Acceptance 579 Systems Operation and Maintenance 580 Information Systems @ Work: Tasty Baking Moves Data Center 581 Reasons for Maintenance 582 Types of Maintenance 582 The Request for Maintenance Form 582 Performing Maintenance 582 The Relationship Between Maintenance and Design 583 Systems Review 584 Types of Review Procedures 584 System Performance Measurement 585 Case One: Russian Sporting Goods Chain Scales Up Budgeting System 591 Case Two: Honeywell Building Next Gen UPS Device 592 PART 5 Information Systems in Business and Society 595 Chapter 14 The Personal and Social Impact of Computers Facebook, United States 597 596 Computer Waste and Mistakes 599 Computer Waste 599 Computer-Related Mistakes 600 Preventing Computer-Related Waste and Mistakes 600 Establishing Policies and Procedures 600 Implementing Policies and Procedures 601 Monitoring Policies and Procedures 602 Reviewing Policies and Procedures 602 Computer Crime 603 The Computer as a Tool to Commit Crime 604 Cyberterrorism 604 Identity Theft 605 Internet Gambling 605 The Computer as a Tool to Fight Crime 605 Recovery of Stolen Property 605 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. xv Licensed to: iChapters User Monitoring Sex Offenders 606 Use of Geographic Information Systems 606 The Computer as the Object of Crime 607 Illegal Access and Use 607 Spyware 609 Information and Equipment Theft 609 Information Systems @ Work: Data Theft: An Ongoing Concern for Businesses 610 Safe Disposal of Personal Computers 611 Patent and Copyright Violations 611 Computer-Related Scams 612 International Computer Crime 613 Preventing Computer-Related Crime 613 Crime Prevention by State and Federal Agencies 613 Crime Prevention by Corporations 613 Crime Prevention for Individuals and Employees 616 Privacy Issues 618 Privacy and the Federal Government 618 Privacy at Work 619 E-Mail Privacy 619 Instant Messaging Privacy 620 Privacy and Personal Sensing Devices 620 Privacy and the Internet 620 Internet Libel Concerns 621 Filtering and Classifying Internet Content 622 Fairness in Information Use 622 Electronic Communications Privacy Act 624 Individual Efforts to Protect Privacy 626 The Work Environment 626 Health Concerns 627 Ethical and Societal Issues: Is the Internet Eating Our Brains? 628 Avoiding Health and Environmental Problems 629 Ethical Issues in Information Systems 630 Case One: The ‘My SHC Community’ Privacy Disaster 635 Case Two: U.S. Fights Fraud with Personal Certificates 636 Glossary 639 Index 653 xvi Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User PREFACE As organizations continue to operate in an increasingly competitive and global marketplace, workers in all business areas including accounting, customer service, finance, human resources, information systems (IS), logistics, marketing, manufacturing, and research and development must be well prepared to make the significant contributions required for success. Regardless of your future role, even if you are an entrepreneur, you need to understand what information systems can and cannot do and be able to use them to help you accomplish your work. You will be expected to discover opportunities to use information systems and to participate in the design of solutions to business problems employing information systems. You will be challenged to identify and evaluate information systems options. To be successful, you must be able to view information systems from the perspective of business and organizational needs. For your solutions to be accepted, you must recognize and address their impact on co-workers, customers, suppliers, and other key business partners. For these reasons, a course in information systems is essential for students in today’s high-tech world. Principles of Information Systems, Tenth Edition, continues the tradition and approach of the previous editions. Our primary objective is to provide the best information systems text and accompanying materials for the first information systems course required of all business students. We want you to learn to use information systems to ensure your personal success in your current or future job and to improve the success of your organization. Through surveys, questionnaires, focus groups, and feedback that we have received from current and past adopters, as well as others who teach in the field, we have been able to develop the highest-quality set of teaching materials available to help you achieve these goals. Principles of Information Systems, Tenth Edition, stands proudly at the beginning of the IS curriculum and remains unchallenged in its position as the only IS principles text offering the basic IS concepts that every business student must learn to be successful. In the past, instructors of the introductory course faced a dilemma. On one hand, experience in business organizations allows students to grasp the complexities underlying important IS concepts. For this reason, many schools delayed presenting these concepts until students completed a large portion of the core business requirements. On the other hand, delaying the presentation of IS concepts until students have matured within the business curriculum often forces the one or two required introductory IS courses to focus only on personal computing software tools and, at best, merely to introduce computer concepts. This text has been written specifically for the introductory course in the IS curriculum. Principles of Information Systems, Tenth Edition, treats the appropriate computer and IS concepts together with a strong managerial emphasis on meeting business and organizational needs. APPROACH OF THE TEXT Principles of Information Systems, Tenth Edition, offers the traditional coverage of computer concepts, but it places the material within the context of meeting business and organizational needs. Placing information system concepts in this context and taking a general management perspective has always set the text apart from general computer books, thus making it appealing not only to MIS majors but also to students from other fields of study. The text isn’t overly technical, but rather deals with the role that information systems play in an organization and the key principles a manager needs to grasp to be successful. These principles of IS are brought together and presented in a way that is both understandable and relevant. In addition, this book offers an overview of the entire IS discipline, while giving students a solid foundation for further study in advanced IS courses such as programming, systems analysis and design, project management, database management, data communications, Web site and systems development, electronic commerce and mobile commerce applications, and decision xvii Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User support. As such, it serves the needs of both general business students and those who will become IS professionals. The overall vision, framework, and pedagogy that made the previous editions so popular have been retained in the tenth edition, offering a number of benefits to students. We continue to present IS concepts with a managerial emphasis. While the fundamental vision of this market-leading text remains unchanged, the tenth edition more clearly highlights established principles and draws out new ones that have emerged as a result of business, organizational, and technological change. IS Principles First, Where They Belong Exposing students to fundamental IS principles is an advantage for students who do not later return to the discipline for advanced courses. Since most functional areas in business rely on information systems, an understanding of IS principles helps students in other course work. In addition, introducing students to the principles of information systems helps future business managers and entrepreneurs employ information systems successfully and avoid mishaps that often result in unfortunate consequences. Furthermore, presenting IS concepts at the introductory level creates interest among general business students who may later choose information systems as a field of concentration. Author Team Ralph Stair and George Reynolds have teamed up again for the tenth edition. Together, they have more than sixty years of academic and industrial experience. Ralph Stair brings years of writing, teaching, and academic experience to this text. He wrote numerous books and a large number of articles while at Florida State University. George Reynolds brings a wealth of computer and industrial experience to the project, with more than thirty years of experience working in government, institutional, and commercial IS organizations. He has written numerous college IS texts and has taught the introductory IS course at the University of Cincinnati, the College of Mount St. Joseph, and Strayer University. The Stair and Reynolds team brings a solid conceptual foundation and practical IS experience to students. GOALS OF THIS TEXT Because Principles of Information Systems, Tenth Edition, is written for all business majors, we believe it is important not only to present a realistic perspective on IS in business but also to provide students with the skills they can use to be effective business leaders in their organization. To that end, Principles of Information Systems, Tenth Edition, has four main goals: 1. To provide a core of IS principles with which every business student should be familiar 2. To offer a survey of the IS discipline that will enable all business students to understand the relationship of IS courses to their curriculum as a whole 3. To present the changing role of the IS professional 4. To show the value of the discipline as an attractive field of specialization By achieving these goals, Principles of Information Systems, Tenth Edition, will enable students, regardless of their major, to understand and use fundamental information systems principles so that they can function more efficiently and effectively as workers, managers, decision makers, and organizational leaders. IS Principles Principles of Information Systems, Tenth Edition, although compre-hensive, cannot cover every aspect of the rapidly changing IS discipline. The authors, having recognized this, provide students an essential core of guiding IS principles to use as they face the career challenges ahead. Think of principles as basic truths or rules that remain constant regardless of the xviii Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User situation. As such, they provide strong guidance in the face of tough deci-sions. A set of IS principles is highlighted at the beginning of each chapter. The application of these principles to solve real-world problems is driven home from the opening vignettes to the end-of-chapter material. The ultimate goal of Principles of Information Systems is to develop effective, thinking, action-oriented employees by instilling them with principles to help guide their decision making and actions. Survey of the IS Discipline This text not only offers the traditional coverage of computer concepts but also provides a broad framework to impart students with a solid grounding in the business uses of technology. In addition to serving general business students, this book offers an overview of the entire IS discipline and solidly prepares future IS professionals for advanced IS courses and their careers in the rapidly changing IS discipline. Changing Role of the IS Professional As business and the IS discipline have changed, so too has the role of the IS professional. Once considered a technical specialist, today the IS professional operates as an internal consultant to all functional areas of the organization, being knowledgeable about their needs and competent in bringing the power of information systems to bear throughout the organization. The IS professional views issues through a global perspective that encompasses the entire organization and the broader industry and business environment in which it operates. The scope of responsibilities of an IS professional today is not confined to just his or her employer but encompasses the entire interconnected network of employees, suppliers, customers, competitors, regulatory agencies, and other entities, no matter where they are located. This broad scope of responsibilities creates a new challenge: how to help an organization survive in a highly interconnected, highly competitive global environment. In accepting that challenge, the IS professional plays a pivotal role in shaping the business itself and ensuring its success. To survive, businesses must now strive for the highest level of customer satisfaction and loyalty through innovative products and services, competitive prices, and ever- improving product and service quality. The IS professional assumes the critical responsibility of determining the organization’s approach to both overall cost and quality performance and therefore plays an important role in the ongoing survival of the organization. This new duality in the role of the IS employee—a professional who exercises a specialist’s skills with a generalist’s perspective—is reflected throughout the book. IS as a Field for Further Study Despite the deep recession and effects of outsourcing, a survey of Human Resources professionals still puts technology and health care as the top fields of study. And business administration and computer science remain among the most sought after majors by employers. Indeed, the long-term job prospects for skilled and business savvy information systems professionals is optimistic. Employment of such workers is expected to grow faster than the average for all occupations through the year 2018. A career in IS can be exciting, challenging, and rewarding! It is important to show the value of the discipline as an appealing field of study and that the IS graduate is no longer a technical recluse. Today, perhaps more than ever before, the IS professional must be able to align IS and organizational goals and to ensure that IS investments are justified from a business perspective. The need to draw bright and interested students into the IS discipline is part of our ongoing responsibility. Upon graduation, IS graduates at many schools are among the highest paid of all business graduates. Throughout this text, the many challenges and opportunities available to IS professionals are highlighted and emphasized. xix Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User CHANGES IN THE TENTH EDITION We have implemented a number of exciting changes to the text based on user feedback on how to align the text even more closely with current IS principles and concepts courses. The following list summarizes these changes: • All new opening vignettes. All of the chapter-opening vignettes are new and continue to raise actual issues from foreign-based or multinational companies. • All new Information Systems @ Work special interest boxes. Highlighting current topics and trends in today’s headlines, these boxes show how information systems are used in a variety of business career areas. • All new Ethical and Societal Issues special interest boxes. Focusing on ethical issues today’s professionals face, these boxes illustrate how information systems professionals confront and react to ethical dilemmas. • All new case studies. Two new end-of-chapter cases provide a wealth of practical information for students and instructors. Each case explores a chapter concept or problem that a real-world company or organization has faced. The cases can be assigned as individual homework exercises or serve as a basis for class discussion. • Extensive changes and updates in each chapter. The authors worked hard to provide the most current information available in this latest edition. Over 800 new references and all new examples of organizations using information systems are included in this new edition. The full extent of these updates makes it impractical to cover them completely in this forward, however, please see our Web site at www.cengage.com/ mis/stairreynolds.com for a detailed listing of the changes. The following list summarizes these changes: Chapter 1, An Introduction to Information Systems includes over 80 new references, examples, and material on how organizations can convert raw data into useful information. Topics include high-frequency trading, knowledge workers and knowledge management systems, and organizational efficiency and effectiveness. We updated the material on computer-based information systems, EDR, operating systems such as Android by Google and Mobile 6.5 by Microsoft, database systems, social networking sites, intranets and extranets, corporate IS usage, and chief information officers (CIOs). We also updated coverage of ERP systems, information and decision support systems, special-purpose systems, the business use of multimedia, robotics and expert systems, systems development, and social issues. Chapter 2, Information Systems in Organizations includes more than 90 new references, examples, and material on the use of information systems in today’s business organizations to deliver the right information to the right person at the right time. Specific topics include supply chain management and customer relationship management, employee empowerment, organizational change, reengineering, outsourcing, utility computing, and return on investment. We also have new information on organizational structure and change, virtual teams, social networking sites in business organizations, and competitive advantage. In addition, we provide new coverage of performance-based information systems, software that reduces costs and increases IS performance, and information systems that improve productivity. Other updates cover quality control, careers in information systems, the H-1B program, the best places to work in the information systems field, the U.S. federal government’s CIO position, IS entrepreneurs, professional organizations and users groups, and guidelines for finding a good IS job. Chapter 3, Hardware: Input, Processing, and Output Devices includes over 60 new references and examples of organizations using the latest hardware devices to obtain substantial business benefits. Updates cover the latest hardware developments such as chip sets and graphics processors, fuel cells that replace batteries in portable devices, and smaller and less energy-consuming processors. We highlight the latest developments in netbooks, nettop xx Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User computers, and popular smartphones. We also compare the relative power usage of plasma, LCD, and OLED monitors, and discuss how server manufacturers are competing to reduce power requirements and are citing “performance per watt” to differentiate their products. We provide the latest information on the world’s most powerful supercomputers. A new section titled “Green Computing” examines the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products. Chapter 4, Software: Systems and Application Software includes new examples and material on mobile applications, PC software, server software, and mainframe software. We provide new material, figures, and photos on the latest business software, rich Internet applications, software for smartphones and other mobile devices, touch display interfaces and spoken commands, Windows 7, application programming interfaces (APIs), software development kits (SDKs), Mac OS X Snow Leopard, Linux-based Chrome OS from Google, and enterprise-scale systems such as z/OS and HP-UX. We also explore Ford Sync, utility programs, virtualization software, application service providers (ASPs), software as a Service (SaaS), cloud computing, and software suites from Microsoft and others. Chapter 5, Database Systems, Data Centers, and Business Intelligence has a new title, new material, and updated examples on data centers in today’s organizations, including modular data centers built in shipping containers packed with racks of prewired servers. We highlight new database applications, the effort to collect data on the damage caused by the 2010 oil spill disaster, the importance of database security in database administration, relational database management techniques and vendors, the Unified Database of Places, popular database management systems, open source database systems, databases as a service (DaaS), and a variety of database applications for mobile devices, PCs, workgroup systems, and mainframe computers. We provide new material on middleware, data warehouses, data marts, data mining, predictive analysis, online transaction processing, distributed databases, Online Analytical Processing (OLAP), and Object-Relational Database Management Systems. Chapter 6, Telecommunications and Networks includes new material and examples of circuit switching and packet switching networks, the practical use of 10 Gigabit Ethernet, broadband over power lines, Near Field Communications, Bluetooth communications, ultra wideband communications, infrared, Zigbee, Wi-Fi, and satellite communications. We trace the evolution of 3G and 4G networks and cover the latest developments in 3G and 4G communications, including China Mobil (the world’s largest 3G network), AT&T’s planned expansion of a 4G network based on LTE technology, and the Clearwire Communications 4G WiMAX network. We provide new examples of networks that achieve business benefits, including personal area networks, local area networks, metropolitan area networks, and wide area networks. Other new examples illustrate the use of remote network monitoring, virtual private networks, voice over Internet protocol (VoIP), electronic document distribution, call centers, telecommuting, video conferencing, electronic data interchange, and unified communications. We also expanded coverage of smartphones, smartphone applications, and global positioning satellites. Chapter 7, The Internet, Web, Intranets, and Extranets includes a wealth of new examples and material on the Internet, intranets, and extranets, and the transformation of the Web to a platform for computing and community. We revamped many sections to reflect today’s developments, including the material on cloud computing, the World Wide Web, how the Web works, Web programming languages, and developing Web content and applications. We reorganized the section on Internet and Web applications to make it easier to understand and retain the material, including sections on “Online Information Sources,” “Search Engines and Web Research,” ”Communication and Collaboration,” “Web 2.0,” “Blogging and Podcasting,” “Online Media and Entertainment,” “Shopping Online,” “Travel and Navigation,” and “Internet Utilities.” Chapter 8, Electronic and Mobile Commerce discusses how these technologies have grown and affect the economy. We introduce the concepts of buy-side and sell-side e-commerce. New tables summarize the primary differences between B2B, B2C, and C2C; list the top-rated m-commerce retail Web sites; and compare the top-rated B2C Web sites based on the use of the American Consumer Satisfaction Index. We discuss Google Product Search xxi Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User and Frucall as two popular mobile price comparison services. We expanded the coverage of mobile advertising to discuss mobile advertising networks, including blind networks, premium blind networks, and premium networks. We explain the controversy behind Google’s purchase of Admob. We provide new examples of phishing, click fraud, and online fraud. The discussion of PayPal now reflects more recent estimates of transaction volume and PayPal’s acquisition of Bill Me Later. We discuss how the p-card can streamline traditional purchase order and invoice payment processes. We updated the section on using mobile phones for payment and discuss new services and modes of payments such as Obopay and Boku. Chapter 9, Enterprise Systems now includes dozens of new examples of organizations that have implemented transaction processing systems or ERP systems to improve their operations. The “Control and Management Issues” section is removed from this chapter and covered in Chapter 13. We cite Waste Management and online retailer Overstock.com as examples of organizations that had significant problems implementing their ERP systems. We added a new section that identifies and describes the leading ERP systems from SAP, Oracle, Infor, and Microsoft. The section titled “Production and Supply Chain Management” in the previous edition is retitled “Supply Chain Management.” We define the term supply chain management and describe the business processes in SCM. We moved the material on Financial and Accounting into this section as most organizations that adopt ERP include these important business processes within the scope of the ERP implementation. Chapter 10, Information and Decision Support Systems includes more than 80 new references and new material, including a potential data security breakthrough in the section on the intelligence stage of decision making. We also discuss the importance of cost reduction, saving money, and preserving cash reserves. Among the many new examples of management information systems are a children’s hospital that monitored and then reduced the death rate for its patients by improving its information systems and a company that used optimization to assign medical personnel to home healthcare patients in Sweden. Other examples include how many drug manufacturing companies use JIT to produce flu vaccinations just before the flu season and how Chrysler uses FMS to quickly change from manufacturing diesel minivans with right-hand drive to gasoline minivans with left-hand drive. We completely updated the DSS section, providing new material and examples, such as a California software company executive that used his cell phone to get rapid feedback on corporate financial performance and timely reports on the performance of his key executives; Organic’s use of a team of economists and statisticians to develop models that predicted the effectiveness of advertising alternatives; and a new pilot program from IBM that allows companies to analyze data and make strategic decisions on the fly. Chapter 11, Knowledge Management and Specialized Information Systems includes about 80 new references, examples, and material on knowledge management and specialized business information systems, artificial intelligence, expert systems, multimedia, virtual reality, and many other specialized systems. A study of a large information systems consulting firm found a return of $18.60 on every dollar invested in its knowledge management system, representing over 1,000 percent return on investment (ROI). We also updated the material on communities of practice, the brain computer interface (BCI), robotics, voice recognition, neural networks, expert systems, and virtual reality. The section on virtual reality now includes a new section on multimedia. Chapter 12, Systems Development: Investigation and Analysis includes about 80 new references, examples, and material on systems development. We included a new section on individual systems developers and users that covers developing applications for Apple’s applications store (App Store), BlackBerry’s App World, and Google’s Android Market store. The section on long-range planning in systems development projects has new material and examples. We also have new examples in the section on IS planning and aligning corporate and IS goals and systems development failure. Chapter 13, Systems Development: Design, Implementation, Maintenance, and Review includes more than 70 new references, examples, and material on systems design and implementation. We updated the section on disaster recovery with new material and references. We discuss the failover approach, including SteelEye’s LifeKeeper and Continuous xxii Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User Protection by NeverFail. We have new material and examples on environmental design (green design) including systems development efforts that slash power consumption, take less physical space, and result in systems that can be disposed of without harming the environment. We updated the sections on systems implementation and maintenance and review to include new references, material, or examples. Chapter 14, The Personal and Social Impact of Computers includes all new examples and updated statistics. We quote CIA Director Leon Panetta and FBI Director Robert Mueller to illustrate the increasing concern about potential cyberterrorist attacks. We present new information about the potential of Internet gambling as an untapped source of income for state and federal governments. We added a new section called “The Computer as a Tool to Fight Crime,” which provides examples of systems used by law enforcement. We reorganized the material in the “Computer as the Object of Crime” section to consolidate information about types of computer crimes and criminals, and now discuss all the tools and measures to prevent crime in the “Preventing Computer-Related Crime” section. A single table now summarizes the common types of malware. We also discuss vishing (a variation on phishing), explain that Google is involved in the largest copyright infringement case in history, and cover HTC and Apple as examples of competing organizations that sue each other over patent infringement. We also discuss money laundering with an example of one person arrested for laundering over $500 million. WHAT WE HAVE RETAINED FROM THE NINTH EDITION The tenth edition builds on what has worked well in the past; it retains the focus on IS principles and strives to be the most current text on the market. • Overall principle. This book continues to stress a single all-encompassing theme: The right information, if it is delivered to the right person, in the right fashion, and at the right time, can improve and ensure organizational effectiveness and efficiency. • Information systems principles. Information systems principles summarize key concepts that every student should know. These principles are highlighted at the start of each chapter and covered thoroughly in the text. • Global perspective. We stress the global aspects of information systems as a major theme. • Learning objectives linked to principles. Carefully crafted learning objectives are included with every chapter. The learning objectives are linked to the Information Systems Principles and reflect what a student should be able to accomplish after completing a chapter. • Opening vignettes emphasize international aspects. All of the chapter-opening vignettes raise actual issues from foreign-based or multinational companies. • Why Learn About features. Each chapter has a “Why Learn About” section at the beginning of the chapter to pique student interest. The section sets the stage for students by briefly describing the importance of the chapter’s material to the students—whatever their chosen field. • Information Systems @ Work special interest boxes. Each chapter has an entirely new “Information Systems @ Work” box that shows how information systems are used in a variety of business career areas. • Ethical and Societal Issues special interest boxes. Each chapter includes an “Ethical and Societal Issues” box that presents a timely look at the ethical challenges and the societal impact of information systems xxiii Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User • Current examples, boxes, cases, and references. As in each edition, we take great pride in presenting the most recent examples, boxes, cases, and references throughout the text. Some of these were developed at the last possible moment, literally weeks before the book went into publication. Information on new hardware and software, the latest operating systems, mobile commerce, the Internet, electronic commerce, ethical and societal issues, and many other current developments can be found throughout the text. Our adopters have come to expect the best and most recent material. We have done everything we can to meet or exceed these expectations. • Summary linked to principles. Each chapter includes a detailed summary, with each section of the summary tied to an associated information systems principle. • Self-assessment tests. This popular feature helps students review and test their understanding of key chapter concepts. • Career exercises. End-of-chapter career exercises ask students to research how a topic discussed in the chapter relates to a business area of their choice. Students are encouraged to use the Internet, the college library, or interviews to collect information about business careers. • End-of-chapter cases. Two end-of-chapter cases provide students with an opportunity to apply the principles covered to real-world problems from actual organizations. The cases can be assigned as individual homework exercises or serve as a basis for class discussion. • Integrated, comprehensive, Web case. The Altitude Online case at the end of each chapter provides an integrated and comprehensive case that runs throughout the text. The cases follow the activities of two individuals employed at the fictitious Altitude Online consulting firm as they are challenged to complete various IS-related projects. The cases provide a realistic fictional work environment in which students may imagine themselves in the role of systems analyst. Information systems problems are addressed using the state-of-the-art techniques discussed in the chapters. STUDENT RESOURCES CourseMate The more you study, the better the results. Make the most of your study time by accessing everything you need to succeed in one place. Read your textbook, take notes, review flashcards, and take practice quizzes—online with CourseMate. Principles of Information Systems, Tenth Edition CourseMate includes: • An interactive eBook with highlighting, note taking, and an interactive glossary • Interactive learning tools, including: • Quizzes • Flashcards • PowerPoint presentations • Classic cases • Links to useful Web sites • and more! xxiv Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User PowerPoint Slides Direct access is offered to the book’s PowerPoint presentations that cover the key points from each chapter. These presentations are a useful study tool. Classic Cases A frequent request from adopters is that they’d like a broader selection of cases to choose from. To meet this need, a set of over 200 cases from the fifth, sixth, seventh, eighth, and ninth editions of the text are included here. These are the authors’ choices of the “best cases” from these editions and span a broad range of companies and industries. Links to Useful Web Sites Chapters in Principles of Information Systems, Tenth Edition reference many interesting Web sites. This resource takes you to links you can follow directly to the home pages of those sites so that you can explore them. There are additional links to Web sites that the authors think you would be interested in checking out. Hands-On Activities Use these hands-on activities to test your comprehension of IS topics and enhance your skills using Microsoft® Office applications and the Internet. Using these links, you can access three critical-thinking exercises per chapter; each activity asks you to work with an Office tool or do some research on the Internet. Quizzes This tool allows you to access 20 multiple-choice questions for each chapter; test yourself and then submit your answers. You will immediately find out what questions you got right and what you got wrong. For each question that you answer incorrectly, you are given the correct answer and the page in your text where that information is covered. Glossary of Key Terms The glossary of key terms from the text is available to search. Online Readings This feature provides you access to a computer database that contains articles relating to hot topics in Information Systems. INSTRUCTOR RESOURCES The teaching tools that accompany this text offer many options for enhancing a course. And, as always, we are committed to providing one of the best teaching resource packages available in this market. CourseMate Cengage Learning’s Principles of Information Systems, Tenth Edition’s CourseMate brings course concepts to life with interactive learning, study, and exam preparation tools that support the printed textbook. Watch student comprehension soar as your class works with the printed textbook and the textbook-specific Web site. CourseMate goes beyond the book to deliver what you need! Learn more at cengage.com/coursemate. xxv Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User • Engagement Tracker How do you assess your students' engagement in your course? How do you know your students have read the material or viewed the resources you've assigned? How can you tell if your students are struggling with a concept? With CourseMate, you can use the included Engagement Tracker to assess student preparation and engagement. Use the tracking tools to see progress for the class as a whole or for individual students. Identify students at risk early in the course. Uncover which concepts are most difficult for your class. Monitor time on task. Keep your students engaged. • Interactive Teaching and Learning Tools CourseMate includes interactive teaching and learning tools: • Quizzes • Flashcards • Games • and more These assets enable students to review for tests, prepare for class, and address the needs of students’ varied learning styles. • Interactive eBook In addition to interactive teaching and learning tools, CourseMate includes an interactive eBook. Students can take notes, highlight, search for, and interact with embedded media specific to their book. Use it as a supplement to the printed text, or as a substitute—the choice is your students’ with CourseMate. Instructor’s Manual An all-new Instructor’s Manual provides valuable chapter overviews; highlights key principles and critical concepts; offers sample syllabi, learning objectives, and discussion topics; and features possible essay topics, further readings and cases, and solutions to all of the end-ofchapter questions and problems, as well as suggestions for conducting the team activities. Additional end-of-chapter questions are also included. As always, we are committed to providing the best teaching resource packages available in this market. Sample Syllabus A sample syllabus for both a quarter and semester-length course are provided with sample course outlines to make planning your course that much easier. Solutions Solutions to all end-of-chapter material are provided in a separate document for your convenience. Test Bank and Test Generator ExamView® is a powerful objective-based test generator that enables instructors to create paper-, LAN- or Web-based tests from test banks designed specifically for their Course Technology text. Instructors can utilize the ultra-efficient QuickTest Wizard to create tests in less than five minutes by taking advantage of Course Technology’s question banks or customizing their own exams from scratch. Page references for all questions are provided so you can cross-reference test results with the book. PowerPoint Presentations A set of impressive Microsoft PowerPoint slides is available for each chapter. These slides are included to serve as a teaching aid for classroom presentation, to make available to students on the network for chapter review, or to be printed for classroom distribution. Our xxvi Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User presentations help students focus on the main topics of each chapter, take better notes, and prepare for examinations. Instructors can also add their own slides for additional topics they introduce to the class. Figure Files Figure files allow instructors to create their own presentations using figures taken directly from the text. ACKNOWLEDGMENTS A book of this scope and undertaking requires a strong team effort. We would like to thank all of our fellow teammates at Course Technology for their dedication and hard work. We would like to thank Charles McCormick, our Sr. Acquisitions Editor, for his overall leadership and guidance on this effort. Special thanks to Kate Mason, our Product Manager. Our appreciation goes out to all the many people who worked behind the scenes to bring this effort to fruition including Abigail Reip, our photo researcher. We would like to acknowledge and thank Lisa Ruffolo, our development editor, who deserves special recognition for her tireless effort and help in all stages of this project. Thanks also to Jill Braiewa, our Sr. Content Project Manager, who shepherded the book through the production process. We are grateful to the salesforce at Cengage Learning whose efforts make this all possible. You helped to get valuable feedback from current and future adopters. As Cengage Learning product users, we know how important you are. We would especially like to thank Ken Baldauf for his excellent help in writing the boxes and cases and revising several chapters for this edition. Ken also provided invaluable feedback on other aspects of this project. Ralph Stair would like to thank the Department of Management and its faculty members in the College of Business Administration at Florida State University for their support and encouragement. He would also like to thank his family, Lila and Leslie, for their support. George Reynolds would like to thank his wife, Ginnie, for her patience and support in this major project. To Our Previous Adopters and Potential New Users We sincerely appreciate our loyal adopters of the previous editions and welcome new users of Principles of Information Systems, Tenth Edition. As in the past, we truly value your needs and feedback. We can only hope the Tenth Edition continues to meet your high expectations. OUR COMMITMENT We are committed to listening to our adopters and readers and to developing creative solutions to meet their needs. The field of IS continually evolves, and we strongly encourage your participation in helping us provide the freshest, most relevant information possible. We welcome your input and feedback. If you have any questions or comments regarding Principles of Information Systems, Tenth Edition, please contact us through Course Technology or your local representative, or via the Internet at www.cengage.com/mis/stairreynolds.com. xxvii Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User GLOSSARY acceptance testing Conducting any tests required by the user. accounting MIS An information system that provides aggregate information on accounts payable, accounts receivable, payroll, and many other applications. ad hoc DSS A DSS concerned with situations or decisions that come up only a few times during the life of the organization. alpha testing Testing an incomplete or early version of the system. antivirus program Software that runs in the background to protect your computer from dangers lurking on the Internet and other possible sources of infected files. application flowcharts Diagrams that show relationships among applications or systems. attribute A characteristic of an entity. auditing Analyzing the financial condition of an organization and determining whether financial statements and reports produced by the financial MIS are accurate. backbone One of the Internet’s highspeed, long-distance communications links. batch processing system A form of data processing whereby business transactions are accumulated over a period of time and prepared for processing as a single unit or batch. benchmark test An examination that compares computer systems operating under the same conditions. best practices The most efficient and effective ways to complete a business process. application program interface (API) An interface that allows applications to make use of the operating system. beta testing Testing a complete and stable system. application service provider (ASP) A company that provides software, support, and the computer hardware on which to run the software from the user’s facilities over a network. blade server A server that houses many individual computer motherboards that include one or more processors, computer memory, computer storage, and computer network connections. arithmetic/logic unit (ALU) The part of the CPU that performs mathematical calculations and makes logical comparisons. Bluetooth A wireless communications specification that describes how cell phones, computers, faxes, personal digital assistants, printers, and other electronic devices can be interconnected over distances of 10–30 feet at a rate of about 2 Mbps. ARPANET A project started by the U.S. Department of Defense (DoD) in 1969 as both an experiment in reliable networking and a means to link the DoD and military research contractors, including many universities doing military-funded research. artificial intelligence (AI) A field in which the computer system takes on the characteristics of human intelligence. artificial intelligence systems People, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that demonstrate the characteristics of intelligence. asking directly An approach to gather data that asks users, stakeholders, and other managers about what they want and expect from the new or modified system. brainstorming A decision-making approach that consists of members offering ideas “off the top of their heads.” bridge A telecommunications device that connects two LANs together using the same telecommunications protocol. broadband communications A relative term but generally means a telecommunications system that can exchange data very quickly. business intelligence (BI) The process of gathering enough of the right information in a timely manner and usable form and analyzing it to have a positive impact on business strategy, tactics, or operations. business-to-business (B2B) e-commerce A subset of e-commerce in which all the participants are organizations. business-to-consumer (B2C) e-commerce A form of e-commerce in which customers deal directly with an organization and avoid intermediaries. byte (B) Eight bits that together represent a single character of data. cache memory A type of high-speed memory that a processor can access more rapidly than main memory. Cascading Style Sheet (CSS) A markup language for defining the visual design of a Web page or group of pages. CASE repository A database of system descriptions, parameters, and objectives. central processing unit (CPU) The part of the computer that consists of three associated elements: the arithmetic/logic unit, the control unit, and the register areas. centralized processing An approach to processing wherein all processing occurs in a single location or facility. certificate authority (CA) A trusted third-party organization or company that issues digital certificates. certification A process for testing skills and knowledge, which results in a statement by the certifying authority that confirms an individual is capable of performing particular tasks. change model A representation of change theories that identifies the phases of change and the best way to implement them. channel bandwidth The rate at which data is exchanged, usually measured in bits per second (bps). character A basic building block of most information, consisting of uppercase letters, lowercase letters, numeric digits, or special symbols. chief knowledge officer (CKO) A toplevel executive who helps the organization use a KMS to create, store, and use knowledge to achieve organizational goals. 639 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User 640 Glossary | chip-and-PIN card A type of card that employs a computer chip that communicates with a card reader using radio frequencies; it does not need to be swiped at a terminal. choice stage The third stage of decision making, which requires selecting a course of action. circuit switching network A network that sets up a circuit between the sender and receiver before any communications can occur; this circuit is maintained for the duration of the communication and cannot be used to support any other communications until the circuit is released and a new connection is set up. click fraud A problem arising in a payper-click online advertising environment where additional clicks are generated beyond those that come from actual, legitimate users. clickstream data The data gathered based on the Web sites you visit and the items you click. client/server architecture An approach to computing wherein multiple computer platforms are dedicated to special functions, such as database management, printing, communications, and program execution. compact disc read-only memory (CD-ROM) A common form of optical disc on which data cannot be modified once it has been recorded. consumer-to-consumer (C2C) e-commerce A subset of e-commerce that involves consumers selling directly to other consumers. competitive advantage A significant and ideally long-term benefit to a company over its competition. contactless card A card with an embedded chip that only needs to be held close to a terminal to transfer its data; no PIN number needs to be entered. competitive intelligence One aspect of business intelligence limited to information about competitors and the ways that knowledge affects strategy, tactics, and operations. compiler A special software program that converts the programmer’s source code into the machine-language instructions, which consist of binary digits. computer literacy Knowledge of computer systems and equipment and the ways they function; it includes the knowledge of equipment and devices (hardware), programs and instructions (software), databases, and telecommunications. computer network The communications media, devices, and software needed to connect two or more computer systems or devices. computer programs Sequences of instructions for the computer. clock speed A series of electronic pulses produced at a predetermined rate that affects machine cycle time. computer-aided software engineering (CASE) Tools that automate many of the tasks required in a systems development effort and encourage adherence to the SDLC. cloud computing A computing environment where software and storage are provided as an Internet service and are accessed with a Web browser. computer-assisted manufacturing (CAM) A system that directly controls manufacturing equipment. code of ethics A code that states the principles and core values that are essential to a set of people and that therefore govern their behavior. cold site A computer environment that includes rooms, electrical service, telecommunications links, data storage devices, and the like; also called a shell. command-based user interface A user interface that requires you to give text commands to the computer to perform basic activities. computer-based information system (CBIS) A single set of hardware, software, databases, telecommunications, people, and procedures that are configured to collect, manipulate, store, and process data into information. content streaming A method for transferring large media files over the Internet so that the data stream of voice and pictures plays more or less continuously as the file is being downloaded. continuous improvement Constantly seeking ways to improve business processes to add value to products and services. control unit The part of the CPU that sequentially accesses program instructions, decodes them, and coordinates the flow of data in and out of the ALU, the registers, the primary storage, and even secondary storage and various output devices. coprocessor The part of the computer that speeds processing by executing specific types of instructions while the CPU works on another processing activity. cost center A division within a company that does not directly generate revenue. cost/benefit analysis An approach that lists the costs and benefits of each proposed system. After they are expressed in monetary terms, all the costs are compared with all the benefits. counterintelligence The steps an organization takes to protect information sought by “hostile” intelligence gatherers. creative analysis The investigation of new approaches to existing problems. computer-integrated manufacturing (CIM) Using computers to link the components of the production process into an effective system. criminal hacker (cracker) A computer-savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files and programs, or even transfer money. concurrency control A method of dealing with a situation in which two or more users or applications need to access the same record at the same time. critical analysis The unbiased and careful questioning of whether system elements are related in the most effective ways. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | critical path Activities that, if delayed, would delay the entire project. critical success factors (CSFs) Factors that are essential to the success of a functional area of an organization. cross-platform development A software development technique that allows programmers to develop programs that can run on computer systems having different hardware and operating systems, or platforms. culture A set of major understandings and assumptions shared by a group. customer relationship management (CRM) system A system that helps a company manage all aspects of customer encounters, including marketing and advertising, sales, customer service after the sale, and programs to retain loyal customers. cybermall A single Web site that offers many products and services at one Internet location. cyberterrorist Someone who intimidates or coerces a government or organization to advance his political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them. data Raw facts, such as an employee number, total hours worked in a week, inventory part numbers, or sales orders. data administrator A nontechnical position responsible for defining and implementing consistent principles for a variety of data issues. data analysis The manipulation of collected data so that the development team members who are participating in systems analysis can use the data. data center A climate-controlled building or set of buildings that house database servers and the systems that deliver mission-critical information and services. data correction The process of reentering data that was not typed or scanned properly. Glossary data store Representation of a storage location for data. data definition language (DDL) A collection of instructions and commands used to define and describe data and relationships in a specific database. data warehouse A large database that collects business information from many sources in the enterprise, covering all aspects of the company’s processes, products, and customers, in support of management decision making. data dictionary A detailed description of all the data used in the database. database An organized collection of facts and information. data editing The process of checking data for validity and completeness. database administrator (DBA) A skilled IS professional who directs all activities related to an organization’s database. data entry Converting humanreadable data into a machine-readable form. data input Transferring machinereadable data into the system. data item The specific value of an attribute. database approach to data management An approach to data management whereby a pool of related data is shared by multiple information systems. data loss prevention (DLP) Systems designed to lock down—to identify, monitor, and protect—data within an organization. database management system (DBMS) A group of programs that manipulate the database and provide an interface between the database and the user of the database and other application programs. data manipulation The process of performing calculations and other data transformations related to business transactions. data-flow diagram (DFD) A model of objects, associations, and activities that describes how data can flow between and around various objects. data manipulation language (DML) A specific language, provided with a DBMS, which allows users to access and modify the data, to make queries, and to generate reports. data-flow line Arrows that show the direction of data element movement. data mart A subset of a data warehouse, used by small and mediumsized businesses and departments within large companies to support decision making. data mining An information-analysis tool that involves the automated discovery of patterns and relationships in a data warehouse. data model A diagram of data entities and their relationships. data cleanup The process of looking for and fixing inconsistencies to ensure that data is accurate and complete. data preparation, or data conversion Making sure all files and databases are ready to be used with new computer software and systems. data collection Capturing and gathering all data necessary to complete the processing of transactions. data storage The process of updating one or more databases with new transactions. decentralized processing An approach to processing wherein processing devices are placed at various remote locations. decision room A room that supports decision making, with the decision makers in the same building, combining face-to-face verbal interaction with technology to make the meeting more effective and efficient. decision support system (DSS) An organized collection of people, procedures, software, databases, and devices used to support problemspecific decision making. decision-making phase The first part of problem solving, including three stages: intelligence, design, and choice. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 641 Licensed to: iChapters User 642 Glossary | delphi approach A decision-making approach in which group decision makers are geographically dispersed; this approach encourages diversity among group members and fosters creativity and original thinking in decision making. direct access A retrieval method in which data can be retrieved without the need to read and discard other data. demand report A report developed to give certain information at someone’s request rather than on a schedule. direct conversion (also called plunge or direct cutover) Stopping the old system and starting the new system on a given date. design report The primary result of systems design, reflecting the decisions made and preparing the way for systems implementation. direct observation Directly observing the existing system in action by one or more members of the analysis team. design stage The second stage of decision making, in which you develop alternative solutions to the problem and evaluate their feasibility. desktop computer A relatively small, inexpensive, single-user computer that is highly versatile. dialogue manager A user interface that allows decision makers to easily access and manipulate the DSS and to use common business terms and phrases. digital audio player A device that can store, organize, and play digital music files. digital camera An input device used with a PC to record and store images and video in digital form. digital certificate An attachment to an e-mail message or data embedded in a Web site that verifies the identity of a sender or Web site. digital rights management (DRM) Refers to the use of any of several technologies to enforce policies for controlling access to digital media such as movies, music, and software. digital subscriber line (DSL) A telecommunications service that delivers high-speed Internet access to homes and small businesses over the existing phone lines of the local telephone network digital video disc (DVD) A storage medium used to store software, video games, and movies. direct access storage device (DASD) A device used for direct access of secondary storage data. disaster recovery The implementation of the disaster plan. disk mirroring A process of storing data that provides an exact copy that protects users fully in the event of data loss. distributed database A database in which the data can be spread across several smaller databases connected via telecommunications devices. distributed processing An approach to processing wherein processing devices are placed at remote locations but are connected to each other via a network. document production The process of generating output records and reports. documentation Text that describes a program’s functions to help the user operate the computer system. domain The allowable values for data attributes. domain expert The person or group with the expertise or knowledge the expert system is trying to capture (domain). downsizing Reducing the number of employees to cut costs. drill-down report A report providing increasingly detailed data about a situation. dumpster diving Going through the trash cans of an organization to find secret or confidential information, including information needed to access an information system or its data. e-commerce Any business transaction executed electronically between companies (business-to-business, or B2B), companies and consumers (business-to-consumer, or B2C), consumers and other consumers (consumer-to-consumer, or C2C), business and the public sector, and consumers and the public sector. economic feasibility The determination of whether the project makes financial sense and whether predicted benefits offset the cost and time needed to obtain them. economic order quantity (EOQ) The quantity that should be reordered to minimize total inventory costs. effectiveness A measure of the extent to which a system achieves its goals; it can be computed by dividing the goals actually achieved by the total of the stated goals. efficiency A measure of what is produced divided by what is consumed. e-Government The use of information and communications technology to simplify the sharing of information, speed formerly paperbased processes, and improve the relationship between citizens and government. electronic business (e-business) Using information systems and the Internet to perform all business-related tasks and functions. electronic cash An amount of money that is computerized, stored, and used as cash for e-commerce transactions. electronic commerce Conducting business activities (e.g., distribution, buying, selling, marketing, and servicing of products or services) electronically over computer networks. electronic document distribution A process that enables the sending and receiving of documents in a digital form without being printed (although printing is possible). electronic exchange An electronic forum where manufacturers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | electronic retailing (e-tailing) The direct sale of products or services by businesses to consumers through electronic storefronts, typically designed around an electronic catalog and shopping cart model. environmental design Also called green design, it involves systems development efforts that slash power consumption, require less physical space, and result in systems that can be disposed of in a way that doesn’t negatively affect the environment. empowerment Giving employees and their managers more responsibility and authority to make decisions, take certain actions, and have more control over their jobs. ergonomics The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them. encryption The process of converting an original message into a form that can be understood only by the intended receiver. encryption key A variable value that is applied (using an algorithm) to a set of unencrypted text to produce encrypted text or to decrypt encrypted text. end-user systems development Any systems development project in which the primary effort is undertaken by a combination of business managers and users. enterprise data modeling Data modeling done at the level of the entire enterprise. enterprise resource planning (ERP) system A set of integrated programs capable of managing a company’s vital business operations for an entire multisite, global organization. enterprise sphere of influence The sphere of influence that serves the needs of the firm in its interaction with its environment. enterprise system A system central to the organization that ensures information can be shared across all business functions and all levels of management to support the running and managing of a business. event-driven review A review triggered by a problem or opportunity such as an error, a corporate merger, or a new market for products. exception report A report automatically produced when a situation is unusual or requires management action. execution time (E-time) The time it takes to execute an instruction and store the results. executive support system (ESS) Specialized DSS that includes all hardware, software, data, procedures, and people used to assist senior-level executives within the organization. expert system A system that gives a computer the ability to make suggestions and function like an expert in a particular field. explanation facility Component of an expert system that allows a user or decision maker to understand how the expert system arrived at certain conclusions or results. Extensible Markup Language (XML) The markup language designed to transport and store data on the Web. external auditing Auditing performed by an outside group. entity A general class of people, places, or things for which data is collected, stored, and maintained. extranet A network based on Web technologies that allows selected outsiders, such as business partners and customers, to access authorized resources of a company’s intranet. entity symbol Representation of either a source or destination of a data element. feasibility analysis Assessment of the technical, economic, legal, operational, and schedule feasibility of a project. entity-relationship (ER) diagrams Data models that use basic graphical symbols to show the organization of and relationships between data. feedback Output that is used to make changes to input or processing activities. Glossary field Typically a name, number, or combination of characters that describes an aspect of a business object or activity. file A collection of related records. File Transfer Protocol (FTP) A protocol that provides a file transfer process between a host and a remote computer and allows users to copy files from one computer to another. final evaluation A detailed investigation of the proposals offered by the vendors remaining after the preliminary evaluation. financial MIS An information system that provides financial information for executives and for a broader set of people who need to make better decisions on a daily basis. five-forces model A widely accepted model that identifies five key factors that can lead to attainment of competitive advantage, including (1) the rivalry among existing competitors, (2) the threat of new entrants, (3) the threat of substitute products and services, (4) the bargaining power of buyers, and (5) the bargaining power of suppliers. flat organizational structure An organizational structure with a reduced number of management layers. flexible manufacturing system (FMS) An approach that allows manufacturing facilities to rapidly and efficiently change from making one product to making another. forecasting Predicting future events to avoid problems. front-end processors Special-purpose computers that manage communications to and from a large computer serving hundreds or even thousands of users. full-duplex channel A communications channel that permits data transmission in both directions at the same time; a full-duplex channel is like two simplex channels. game theory The use of information systems to develop competitive strategies for people, organizations, or even countries. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 643 Licensed to: iChapters User 644 Glossary | Gantt chart A graphical tool used for planning, monitoring, and coordinating projects. gateway A telecommunications device that serves as an entrance to another network. genetic algorithm An approach to solving large, complex problems in which many related operations or models change and evolve until the best one emerges. geographic information system (GIS) A computer system capable of assembling, storing, manipulating, and displaying geographic information, that is, data identified according to its location. gigahertz (GHz) Billions of cycles per second, a measure of clock speed. Global System for Mobile Communications (GSM) A globally accepted standard for digital cellular communications. graphical user interface (GUI) An interface that displays pictures (icons) and menus that people use to send commands to the computer system. graphics processing unit (GPU) A specialized processor that offloads the tasks associated with 3D graphics rendering from the CPU. green computing A program concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS related products. grid chart A table that shows relationships among the various aspects of a systems development effort. group support system (GSS) Software application that consists of most elements in a DSS, plus software to provide effective support in group decision making; also called group support system or computerized collaborative work system. identity theft Someone using your personally identifying information without your permission to commit fraud or other crimes. hacker A person who enjoys computer technology and spends time learning and using computer systems. image log A separate file that contains only changes to applications. half-duplex channel A communications channel that can transmit data in either direction, but not simultaneously. handheld computer A single-user computer that provides ease of portability because of its small size. IF-THEN statements Rules that suggest certain conclusions. implementation stage A stage of problem solving in which a solution is put into effect. incremental backup A backup copy of all files changed during the last few days or the last week. hardware The physical components of a computer that perform the input, processing, storage, and output activities of the computer. inference engine Part of the expert system that seeks information and relationships from the knowledge base and provides answers, predictions, and suggestions similar to the way a human expert would. heuristics “Rules of thumb,” or commonly accepted guidelines or procedures that usually find a good solution. informatics A specialized system that combines traditional disciplines, such as science and medicine, with computer systems and technology. hierarchy of data Bits, characters, fields, records, files, and databases. information A collection of facts organized and processed so that they have additional value beyond the value of the individual facts. highly structured problems Problems that are straightforward and require known facts and relationships. hot site A duplicate, operational hardware system or immediate access to one through a specialized vendor. HTML tags Codes that tell the Web browser how to format text—as a heading, as a list, or as body text—and whether images, sound, and other elements should be inserted. information center A support function that provides users with assistance, training, application development, documentation, equipment selection and setup, standards, technical assistance, and troubleshooting. information service unit A miniature IS department attached and directly reporting to a functional area in a large organization. grid computing The use of a collection of computers, often owned by multiple individuals or organizations, to work in a coordinated manner to solve a common problem. human resource MIS (HRMIS) An information system that is concerned with activities related to previous, current, and potential employees of an organization, also called a personnel MIS. information system (IS) A set of interrelated components that collect, manipulate, store, and disseminate data and information and provide a feedback mechanism to meet an objective. group consensus Decision making by a group that is appointed and given the responsibility of making the final evaluation and selection. hyperlink Highlighted text or graphics in a Web document, that, when clicked, opens a new Web page containing related content. information systems literacy Knowledge of how data and information are used by individuals, groups, and organizations. group consensus approach A decision-making approach that forces members in the group to reach a unanimous decision. Hypertext Markup Language (HTML) The standard page description language for Web pages. information systems planning Translating strategic and organizational goals into systems development initiatives. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | infrared transmission A form of communications that sends signals at a frequency of 300 GHz and above— higher than those of microwaves but lower than those of visible light. input The activity of gathering and capturing raw data. insider An employee, disgruntled or otherwise, working solo or in concert with outsiders to compromise corporate systems. installation The process of physically placing the computer equipment on the site and making it operational. instant messaging A method that allows two or more people to communicate online in real time using the Internet. institutional DSS A DSS that handles situations or decisions that occur more than once, usually several times per year or more. An institutional DSS is used repeatedly and refined over the years. instruction time (I-time) The time it takes to perform the fetch-instruction and decode-instruction steps of the instruction phase. integrated development environments (IDEs) A development approach that combines the tools needed for programming with a programming language into one integrated package. integration testing Testing all related systems together. intellectual property Includes works of the mind such as books, films, music, processes, and software, which are unique and are owned or created by a single entity. intelligence stage The first stage of decision making, in which you identify and define potential problems or opportunities. intelligent agent Programs and a knowledge base used to perform a specific task for a person, a process, or another program; also called intelligent robot or bot. intelligent behavior The ability to learn from experiences and apply knowledge acquired from those experiences, handle complex situations, solve problems when important information is missing, determine what is important and to react quickly and correctly to a new situation, understand visual images, process and manipulate symbols, be creative and imaginative, and use heuristics. internal auditing Auditing performed by individuals within the organization. Internet The world’s largest computer network, consisting of thousands of interconnected networks, all freely exchanging information. Internet Protocol (IP) A communication standard that enables computers to route communications traffic from one network to another as needed. Internet service provider (ISP) Any organization that provides Internet access to people. intranet An internal network based on Web technologies that allows people within an organization to exchange information and work on projects. intrusion detection system (IDS) Software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion. Glossary key-indicator report A summary of the previous day’s critical activities, typically available at the beginning of each workday. knowledge The awareness and understanding of a set of information and ways that information can be made useful to support a specific task or reach a decision. knowledge acquisition facility Part of the expert system that provides a convenient and efficient means of capturing and storing all the components of the knowledge base. knowledge base The collection of data, rules, procedures, and relationships that must be followed to achieve value or the proper outcome. knowledge engineer A person who has training or experience in the design, development, implementation, and maintenance of an expert system. knowledge user The person or group who uses and benefits from the expert system. laptop computer A personal computer designed for use by mobile users; it is small and light enough to sit comfortably on a user’s lap. IP address A 64-bit number that identifies a computer on the Internet. LCD display Flat display that uses liquid crystals—organic, oil-like material placed between two polarizers—to form characters and graphic images on a backlit screen. Java An object-oriented programming language from Sun Microsystems based on the C++ programming language, which allows applets to be embedded within an HTML document. learning systems A combination of software and hardware that allows the computer to change how it functions or reacts to situations based on feedback it receives. joining Manipulating data to combine two or more tables. legal feasibility The determination of whether laws or regulations may prevent or limit a systems development project. just-in-time (JIT) inventory An inventory management approach in which inventory and materials are delivered just before they are used in manufacturing a product. kernel The heart of the operating system, which controls its most critical processes. key A field or set of fields in a record that is used to identify the record. linking Data manipulation that combines two or more tables using common data attributes to form a new table with only the unique data attributes. local area network (LAN) A network that connects computer systems and devices within a small area, such as an office, home, or several floors in a building. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 645 Licensed to: iChapters User 646 Glossary | logical design A description of the functional requirements of a system. megahertz (MHz) Millions of cycles per second, a measure of clock speed. machine cycle The instruction phase followed by the execution phase. magnetic disk A direct-access storage device, with bits represented by magnetized areas. meta tag An HTML code, not visible on the displayed Web page, that contains keywords representing your site’s content, which search engines use to build indexes pointing to your Web site. magnetic stripe card A type of card that stores a limited amount of data by modifying the magnetism of tiny ironbased particles contained in a band on the card. metropolitan area network (MAN) A telecommunications network that connects users and their computers in a geographical area that spans a campus or city. magnetic tape A type of sequential secondary storage medium, now used primarily for storing backups of critical organizational data in the event of a disaster. microcode Predefined, elementary circuits and logical operations that the processor performs when it executes an instruction. mainframe computer A large, powerful computer often shared by hundreds of concurrent users connected to the machine via terminals. maintenance team A special IS team responsible for modifying, fixing, and updating existing software. make-or-buy decision The decision regarding whether to obtain the necessary software from internal or external sources. management information system (MIS) An organized collection of people, procedures, software, databases, and devices that provides routine information to managers and decision makers. market segmentation The identification of specific markets to target them with advertising messages. marketing MIS An information system that supports managerial activities in product development, distribution, pricing decisions, promotional effectiveness, and sales forecasting. massively parallel processing A form of multiprocessing that speeds processing by linking hundreds or thousands of processors to operate at the same time, or in parallel, with each processor having its own bus, memory, disks, copy of the operating system, and applications. material requirements planning (MRP) A set of inventory-control techniques that help coordinate thousands of inventory items when the demand of one item is dependent on the demand for another. middleware Software that allows various systems to communicate and exchange data. MIPS Millions of instructions per second, a measure of machine cycle time. mission-critical systems Systems that play a pivotal role in an organization’s continued operations and goal attainment. mobile commerce (m-commerce) The use of mobile, wireless devices to place orders and conduct business. model base Part of a DSS that allows managers and decision makers to perform quantitative analysis on both internal and external data. model management software (MMS) Software that coordinates the use of models in a DSS. multicore microprocessor A microprocessor that combines two or more independent processors into a single computer so they can share the workload and improve processing capacity. multimedia Text, graphics, video, animation, audio, and other media that can be used to help an organization efficiently and effectively achieve its goals. multiplexer A device that combines data from multiple data sources into a single output signal that carries multiple channels, thus reducing the number of communications links needed and lowering telecommunications costs. multiprocessing The simultaneous execution of two or more instructions at the same time. natural language processing Processing that allows the computer to understand and react to statements and commands made in a “natural” language, such as English. Near Field Communication (NFC) A very short-range wireless connectivity technology designed for cell phones and credit cards. netbook computer The smallest, lightest, least expensive member of the laptop computer family. nettop computer An inexpensive desktop computer designed to be smaller, lighter, and consume much less power than a traditional desktop computer. modem A telecommunications hardware device that converts (modulates and demodulates) communications signals so they can be transmitted over the communication media. network operating system (NOS) Systems software that controls the computer systems and devices on a network and allows them to communicate with each other. monitoring stage The final stage of the problem-solving process, in which decision makers evaluate the implementation. network-attached storage (NAS) Hard disk storage that is set up with its own network address rather than being attached to a computer. Moore’s Law A hypothesis stating that transistor densities on a single chip will double every two years. networking protocol A set of rules, algorithms, messages, and other mechanisms that enable software and hardware in networked devices to communicate effectively. MP3 A standard format for compressing a sound sequence into a small file. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | network-management software Software that enables a manager on a networked desktop to monitor the use of individual computers and shared hardware (such as printers); scan for viruses; and ensure compliance with software licenses. networks Computers and equipment that are connected in a building, around the country, or around the world to enable electronic communications. neural network A computer system that can act like or simulate the functioning of a human brain. nominal group technique A decisionmaking approach that encourages feedback from individual group members, and the final decision is made by voting, similar to the way public officials are elected. nonprogrammed decision A decision that deals with unusual or exceptional situations. notebook computer Smaller than a laptop computer, an extremely lightweight computer that weighs less than 6 pounds and can easily fit in a briefcase. object-oriented database A database that stores both data and its processing instructions. object-oriented database management system (OODBMS) A group of programs that manipulate an object-oriented database and provide a user interface and connections to other application programs. object-oriented systems development (OOSD) An approach to systems development that combines the logic of the systems development life cycle with the power of object-oriented modeling and programming. object-relational database management system (ORDBMS) A DBMS capable of manipulating audio, video, and graphical data. off-the-shelf software Software massproduced by software vendors to address needs that are common across businesses, organizations, or individuals. on-demand computing Contracting for computer resources to rapidly respond to an organization’s varying workflow. Also called on-demand business and utility computing. online analytical processing (OLAP) Software that allows users to explore data from a number of perspectives. online transaction processing (OLTP) A form of data processing where each transaction is processed immediately, without the delay of accumulating transactions into a batch. open-source software Software that is distributed, typically for free, with the source code also available so that it can be studied, changed, and improved by its users. operating system (OS) A set of computer programs that controls the computer hardware and acts as an interface with applications. operational feasibility The measure of whether the project can be put into action or operation. optical storage device A form of data storage that uses lasers to read and write data. optimization model A process to find the best solution, usually the one that will best help the organization meet its goals. organic light-emitting diode (OLED) display Flat display that uses a layer of organic material sandwiched between two conductors, which, in turn, are sandwiched between a glass top plate and a glass bottom plate so that when electric current is applied to the two conductors, a bright, electroluminescent light is produced directly from the organic material. organization A formal collection of people and other resources established to accomplish a set of goals. organizational change How forprofit and nonprofit organizations plan for, implement, and handle change. organizational culture The major understandings and assumptions for a business, corporation, or other organization. Glossary organizational learning The adaptations to new conditions or adjustments based on experience and ideas over time. organizational structure Organizational subunits and the way they relate to the overall organization. output Production of useful information, usually in the form of documents and reports. outsourcing Contracting with outside professional services to meet specific business needs. packet switching network A network in which no fixed path is created between the communicating devices and the data is broken into packets, with each packet transmitted individually and capable of taking various paths from sender to recipient. parallel computing The simultaneous execution of the same task on multiple processors to obtain results faster. parallel start-up Running both the old and new systems for a period of time and comparing the output of the new system closely with the output of the old system; any differences are reconciled. When users are comfortable that the new system is working correctly, the old system is eliminated. password sniffer A small program hidden in a network or a computer system that records identification numbers and passwords. patch A minor change to correct a problem or make a small enhancement. It is usually an addition to an existing program. p-card (procurement card or purchasing card) A credit card used to streamline the traditional purchase order and invoice payment processes. perceptive system A system that approximates the way a person sees, hears, and feels objects. personal area network (PAN) A network that supports the interconnection of information technology within a range of 33 feet or so. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 647 Licensed to: iChapters User 648 Glossary | personal productivity software The software that enables users to improve their personal effectiveness, increasing the amount of work and quality of work they can do. personal sphere of influence The sphere of influence that serves the needs of an individual user. personalization The process of tailoring Web pages to specifically target individual consumers. phase-in approach Slowly replacing components of the old system with those of the new one; this process is repeated for each application until the new system is running every application and performing as expected; also called a piecemeal approach. phishing A practice that entails sending bogus messages purportedly from a legitimate institution to pry personal information from customers by convincing them to go to a “spoofed” Web site. physical design The specification of the characteristics of the system components necessary to put the logical design into action. pilot start-up Running the new system for one group of users rather than all users. pipelining A form of CPU operation in which multiple execution phases are performed in a single machine cycle. pixel A dot of color on a photo image or a point of light on a display screen. planned data redundancy A way of organizing data in which the logical database design is altered so that certain data entities are combined, summary totals are carried in the data records rather than calculated from elemental data, and some data attributes are repeated in more than one data entity to improve database performance. point evaluation system An evaluation process in which each evaluation factor is assigned a weight, in percentage points, based on importance. Then each proposed system is evaluated in terms of each factor and given a score ranging from 0 to 100. The scores are totaled, and the system with the greatest total score is selected. point-of-sale (POS) device A terminal used to enter data into the computer system. policy-based storage management Automation of storage using previously defined policies. portable computer A computer small enough to carry easily. predictive analysis A form of data mining that combines historical data with assumptions about future conditions to predict outcomes of events, such as future product sales or the probability that a customer will default on a loan. preliminary evaluation An initial assessment whose purpose is to dismiss the unwanted proposals; begins after all proposals have been submitted. primary key A field or set of fields that uniquely identifies the record. primary storage (main memory; memory) The part of the computer that holds program instructions and data. private branch exchange (PBX) A telephone switching exchange that serves a single organization. problem solving A process that goes beyond decision making to include the implementation stage. procedures The strategies, policies, methods, and rules for using a CBIS. plasma display A type of display using thousands of smart cells (pixels) consisting of electrodes and neon and xenon gases that are electrically turned into plasma (electrically charged atoms and negatively charged particles) to emit light. process A set of logically related tasks performed to achieve a defined outcome. Platform for Privacy Preferences (P3P) A screening technology in Web browsers that shields users from Web sites that don’t provide the level of privacy protection they desire. processing Converting or transforming data into useful outputs. process symbol Representation of a function that is performed. productivity A measure of the output achieved divided by the input required. profit center A department within an organization that focuses on generating profits. Program Evaluation and Review Technique (PERT) A formalized approach for developing a project schedule. programmed decision A decision made using a rule, procedure, or quantitative method. programmer A specialist responsible for modifying or developing programs to satisfy user requirements. programming languages Sets of keywords, commands, and symbols and a system of rules for constructing statements by which humans can communicate instructions to a computer. project deadline The date the entire project is to be completed and operational. project milestone A critical date for the completion of a major part of the project. project organizational structure A structure centered on major products or services. project schedule A detailed description of what is to be done. projecting Manipulating data to eliminate columns in a table. proprietary software One-of-a-kind software designed for a specific application and owned by the company, organization, or person that uses it. prototyping An iterative approach to the systems development process in which at each iteration requirements and alternative solutions to a problem are identified and analyzed, new solutions are designed, and a portion of the system is implemented. quality The ability of a product or service to meet or exceed customer expectations. quality control A process that ensures that the finished product meets the customers’ needs. questionnaires A method of gathering data when the data sources are spread over a wide geographic area. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | Radio Frequency Identification (RFID) A technology that employs a microchip with an antenna to broadcast its unique identifier and location to receivers. random access memory (RAM) A form of memory in which instructions or data can be temporarily stored. rapid application development (RAD) A systems development approach that employs tools, techniques, and methodologies designed to speed application development. read-only memory (ROM) A nonvolatile form of memory. record A collection of data fields all related to one object, activity, or individual. redundant array of independent/ inexpensive disks (RAID) A method of storing data that generates extra bits of data from existing data, allowing the system to create a “reconstruction map” so that if a hard drive fails, the system can rebuild lost data. reengineering (process redesign) The radical redesign of business processes, organizational structures, information systems, and values of the organization to achieve a breakthrough in business results. register A high-speed storage area in the CPU used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the CPU. relational model A database model that describes data in which all data elements are placed in two-dimensional tables, called relations, which are the logical equivalent of files. release A significant program change that often requires changes in the documentation of the software. reorder point (ROP) A critical inventory quantity level that calls for more inventory to be ordered for an item when the inventory level drops to the reorder point or critical level. replicated database A database that holds a duplicate set of frequently used data. Glossary report layout A technique that allows designers to diagram and format printed reports. scheduled report A report produced periodically, such as daily, weekly, or monthly. request for maintenance form A form authorizing modification of programs. schema A description of the entire database. request for proposal (RFP) A document that specifies in detail required resources such as hardware and software. requirements analysis The determination of user, stakeholder, and organizational needs. return on investment (ROI) One measure of IS value that investigates the additional profits or benefits that are generated as a percentage of the investment in IS technology. revenue center A division within a company that generates sales or revenues. reverse 911 service A communications solution that delivers emergency notifications to users in a selected geographical area. rich Internet application (RIA) Software that has the functionality and complexity of traditional application software, but does not require local installation and runs in a Web browser. robotics The development of mechanical or computer devices that perform tasks requiring a high degree of precision or that are tedious or hazardous for humans. router A telecommunications device that forwards data packets across two or more distinct networks toward their destinations, through a process known as routing. rule A conditional statement that links conditions to actions or outcomes. satisficing model A model that will find a good—but not necessarily the best—solution to a problem. scalability The ability to increase the processing capability of a computer system so that it can handle more users, more data, or more transactions in a given period. schedule feasibility The determination of whether the project can be completed in a reasonable amount of time. screen layout A technique that allows a designer to quickly and efficiently design the features, layout, and format of a display screen. script bunny A cracker with little technical savvy who downloads programs called scripts, which automate the job of breaking into computers. search engine A valuable tool that enables you to find information on the Web by specifying words that are key to a topic of interest, known as keywords. secondary storage Devices that store large amounts of data, instructions, and information more permanently than allowed with main memory. Secure Sockets Layer (SSL) A communications protocol used to secure sensitive data during ecommerce. security dashboard Software that provides a comprehensive display on a single computer screen of all the vital data related to an organization’s security defenses, including threats, exposures, policy compliance and incident alerts. selecting Manipulating data to eliminate rows according to certain criteria. semistructured or unstructured problems More complex problems in which the relationships among the pieces of data are not always clear, the data might be in a variety of formats, and the data is often difficult to manipulate or obtain. sequential access A retrieval method in which data must be accessed in the order in which it is stored. sequential access storage device (SASD) A device used to sequentially access secondary storage data. server A computer used by many users to perform a specific task, such as running network or Internet applications. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 649 Licensed to: iChapters User 650 Glossary | service-oriented architecture (SOA) A modular method of developing software and systems that allows users to interact with systems and systems to interact with each other. simplex channel A communications channel that can transmit data in only one direction and is seldom used for business telecommunications. single-user license A software license that permits only one person to use the software, typically on only onecomputer. site preparation Preparation of the location of a new system. slipstream upgrade A minor upgrade—typically a code adjustment or minor bug fix—not worth announcing. It usually requires recompiling all the code and, in so doing, it can create entirely new bugs. smart card A credit card–sized device with an embedded microchip to provide electronic memory and processing capability. smartphone A phone that combines the functionality of a mobile phone, personal digital assistant, camera, Web browser, e-mail tool, and other devices into a single handheld device. social engineering Using social skills to get computer users to provide information that allows a hacker to access an information system or its data. software The computer programs that govern the operation of the computer. Software as a Service (SaaS) A service that allows businesses to subscribe to Web-delivered business application software by paying a monthly service charge or a per-use fee. software piracy The act of unauthorized copying or distribution of copyrighted software. software suite A collection of single programs packaged together in a bundle. source data automation Capturing and editing data where it is initially created and in a form that can be directly input to a computer, thus ensuring accuracy and timeliness. speech-recognition technology Input devices that recognize human speech. spyware Software that is installed on a personal computer to intercept or take partial control over the user’s interaction with the computer without knowledge or permission of the user. stakeholders People who, either themselves or through the organization they represent, ultimately benefit from the systems development project. start-up The process of making the final tested information system fully operational. statistical sampling Selecting a random sample of data and applying the characteristics of the sample to the whole group. steering committee An advisory group consisting of senior management and users from the IS department and other functional areas. storage area network (SAN) A special-purpose, high-speed network that provides high-speed connections among data-storage devices and computers over a network. storage as a service Storage as a service is a data storage model where a data storage service provider rents space to individuals and organizations. storefront broker A company that acts as an intermediary between your Web site and online merchants who have the products and retail expertise. strategic alliance (or strategic partnership) An agreement between two or more companies that involves the joint production and distribution of goods and services. strategic planning Determining longterm objectives by analyzing the strengths and weaknesses of the organization, predicting future trends, and projecting the development of new product lines. structured interview An interview where the questions are written in advance. supercomputers The most powerful computer systems with the fastest processing speeds. supply chain management (SCM) A system that includes planning, executing, and controlling all activities involved in raw material sourcing and procurement, converting raw materials to finished products, and warehousing and delivering finished product to customers. switch A telecommunications device that uses the physical device address in each incoming message on the network to determine to which output port it should forward the message to reach another device on the same network. syntax A set of rules associated with a programming language. system A set of elements or components that interact to accomplish goals. system performance measurement Monitoring the system— the number of errors encountered, the amount of memory required, the amount of processing or CPU time needed, and other problems. system performance products Software that measures all components of the computer-based information system, including hardware, software, database, telecommunications, and network systems. system performance standard A specific objective of the system. system testing Testing the entire system of programs. systems analysis The systems development phase involving the study of existing systems and work processes to identify strengths, weaknesses, and opportunities for improvement. systems analyst A professional who specializes in analyzing and designing business systems. systems controls Rules and procedures to maintain data security. systems design The systems development phase that defines how the information system will do what it must do to obtain the solution. systems development The activity of creating or modifying business systems. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | systems implementation The systems development phase involving the creation or acquisition of various system components detailed in the systems design, assembling them, and placing the new or modified system into operation. systems investigation The systems development phase during which problems and opportunities are identified and considered in light of the goals of the business. systems investigation report A summary of the results of the systems investigation and the process of feasibility analysis and recommendation of a course of action. systems maintenance A stage of systems development that involves checking, changing, and enhancing the system to make it more useful in achieving user and organizational goals. systems maintenance and review The systems development phase that ensures the system operates and modifies the system so that it continues to meet changing business needs. systems operation Use of a new or modified system. systems request form A document filled out by someone who wants the IS department to initiate systems investigation. technology acceptance model (TAM) A model that describes the factors leading to higher levels of acceptance and usage of technology. making and authority flows from the strategic management at the top down to operational management and nonmanagement employees. technology diffusion A measure of how widely technology is spread throughout the organization. transaction Any business-related exchange, such as payments to employees, sales to customers, and payments to suppliers. technology infrastructure All the hardware, software, databases, telecommunications, people, and procedures that are configured to collect, manipulate, store, and process data into information. technology infusion The extent to which technology is deeply integrated into an area or department. telecommunications The electronic transmission of signals for communications; enables organizations to carry out their processes and tasks through effective computer networks. telecommunications medium Any material substance that carries an electronic signal to support communications between a sending and receiving device. telecommuting The use of computing devices and networks so that employees can work effectively away from the office. systems review The final step of systems development, involving the analysis of systems to make sure that they are operating as intended. thin client A low-cost, centrally managed computer with essential but limited capabilities and no extra drives (such as CD or DVD drives) or expansion slots. tablet computer A portable, lightweight computer with no keyboard that allows you to roam the office, home, or factory floor carrying the device like a clipboard. time-driven review Review performed after a specified amount of time. team organizational structure A structure centered on work teams or groups. technical documentation Written details used by computer operators to execute the program and by analysts and programmers to solve problems or modify the program. technical feasibility Assessment of whether the hardware, software, and other system components can be acquired or developed to solve the problem. Glossary total cost of ownership (TCO) The sum of all costs over the life of an information system, including the costs to acquire components such as the technology, technical support, administrative costs, and end-user operations. traditional approach to data management An approach to data management whereby each distinct operational system used data files dedicated to that system. traditional organizational structure An organizational structure in which the hierarchy of decision transaction processing cycle The process of data collection, data editing, data correction, data manipulation, data storage, and document production. transaction processing system (TPS) An organized collection of people, procedures, software, databases, and devices used to perform and record business transactions. Transmission Control Protocol (TCP) The widely used Transportlayer protocol that most Internet applications use with IP. tunneling The process by which VPNs transfer information by encapsulating traffic in IP packets over the Internet. ultra wideband (UWB) A form of short-range communications that employs extremely short electromagnetic pulses lasting just 50 to 1,000 picoseconds that are transmitted across a broad range of radio frequencies of several gigahertz. Uniform Resource Locator (URL) A Web address that specifies the exact location of a Web page using letters and words that map to an IP address and a location on the host. unit testing Testing of individual programs. unstructured interview An interview where the questions are not written in advance. user acceptance document A formal agreement signed by the user that states that a phase of the installation or the complete system is approved. user documentation Written descriptions developed for people who use a program; shows how the program can and should be used, in easy to understand language. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 651 Licensed to: iChapters User 652 Glossary | user interface The element of the operating system that allows you to access and command the computer system. user preparation The process of readying managers, decision makers, employees, other users, and stakeholders for new systems. users People who will interact with the system regularly. utility program Program that helps to perform maintenance or correct problems with a computer system. value chain A series (chain) of activities that includes inbound logistics, warehouse and storage, production, finished product storage, outbound logistics, marketing and sales, and customer service. version A major program change, typically encompassing many new features. videoconferencing A set of interactive telecommunications technologies which enable people at multiple locations to communicate using simultaneous two-way video and audio transmissions. virtual organizational structure A structure that uses individuals, groups, or complete business units in geographically dispersed areas; these groups can last for a few weeks or years, often requiring telecommunications and the Internet. virtual private network (VPN) A private network that uses a public network (usually the Internet) to connect multiple remote locations. virtual reality The simulation of a real or imagined environment that can be experienced visually in three dimensions. virtual reality system A system that enables one or more users to move and react in a computer-simulated environment. virtual tape A storage device for less frequently needed data so that it appears to be stored entirely on tape cartridges, although some parts of it might actually be located on faster hard disks. virtual workgroups Teams of people located around the world working on common problems. vision systems The hardware and software that permit computers to capture, store, and manipulate visual images. voice mail Technology that enables users to send, receive, and store verbal messages to and from other people around the world. voice mail-to-text service A service that captures voice mail messages, converts them to text, and sends them to an e-mail account. volume testing Testing the application with a large amount of data. Web Server and client software, the hypertext transfer protocol (http), standards, and mark-up languages that combine to deliver information and services over the Internet. Web 2.0 The Web as a computing platform that supports software applications and the sharing of information among users. Web application framework Web development software that provides the foundational code—or framework— for a professional, interactive Web site, allowing developers to customize the code to specific needs. Web browser Web client software such as Internet Explorer, Firefox, Chrome, Safari, and Opera used to view Web pages. Web log (blog) A Web site that people can create and use to write about their observations, experiences, and opinions on a wide range of topics. Web portal A Web page that combines useful information and links and acts as an entry point to the Web— they typically include a search engine, a subject directory, daily headlines, and other items of interest. Many people choose a Web portal as their browser’s home page (the first page you open when you begin browsing the Web). wide area network (WAN) A telecommunications network that connects large geographic regions. Wi-Fi A medium-range wireless telecommunications technology brand owned by the Wi-Fi Alliance. wireless mesh A form of communication that uses multiple WiFi access points to link a series of interconnected local area networks to form a wide area network capable of serving a large campus or entire city. workgroup Two or more people who work together to achieve a common goal. workgroup application software Software that supports teamwork, whether team members are in the same location or dispersed around the world. workgroup sphere of influence The sphere of influence that serves the needs of a workgroup. workstation A more powerful personal computer used for mathematical computing, computeraided design, and other high-end processing, but still small enough to fit on a desktop. Worldwide Interoperability for Microwave Access (WiMAX) The common name for a set of IEEE 802.16 wireless metropolitan area network standards that support various types of communications access. ZigBee A form of wireless communications frequently used in security systems and heating and cooling control systems. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User INDEX Subject Note: A boldface page number indicates a key term and the location of its definition in the text. Numbers Numbers 3D printers, 114 3G wireless communications, 243–244 4G wireless communications, 242, 244, 280 5GLs (fifth-generation languages), 170 A acceptance testing, 577 access to data for decision making, 383 illegal, to computers, 607–609 Internet, 279–281, 353 secondary storage, 98–99 system resources and security, 144 access BPL, 237 accessing the Internet, 279–281 accounting, enterprise resource planning, 392 accounting MISs, 433 accounting systems, 378 accredited domain name registrars, 278–279 ACDs (automatic call distributors), 259 activating software, 173 activity modeling, 537–538 actors in use case diagrams, 533 ad hoc DSSs, 436 Adaptive Software Development (ASD), 524 Address Verification System, 350 ADSL (asymmetric DSL), 257 advertising, 346–348, 489 advice and support, online, 294–295 aggregator software, 306 agile development, 523–524 AI. See artificial intelligence (AI) AJAX (Asynchronous JavaScript and XML), 288 Al-Awar, Mahmoud Kassim, 384 alpha testing, 578 ALU (arithmetic/logic unit), 90 American Recovery and Reinvestment Act, 25 animation, 484 anomalies, 201 antivirus programs, 616, 616–617 API (application programming interface), 143 applets, 288 application flowcharts, 538, 539 application programming interface (API), 143 application service providers (ASPs), 158, 159 application software, 14, 139, 140, 156–168 enterprise, 167–168 for information, decision support, and specialized purposes, 168 mobile, 165, 166 off-the-shelf, 157–158 personal, 159–165 proprietary, 157 workgroup, 165–167 arithmetic/logic unit (ALU), 90 ARPANET, 276, 277 artificial intelligence (AI), 25, 25–27, 465–474 applications, 468–474 Brain Computer Interface, 467 expert systems, 468 major branches, 467–468 nature of intelligence, 465–467 artificial intelligence systems, 465 ASD (Adaptive Software Development), 524 asking directly, 540 aspect ratio, 112 ASPs (application service providers), 158, 159 assistive technology, 490 asymmetric DSL (ADSL), 257 Asynchronous JavaScript and XML (AJAX), 288 ATM (automated teller machine) devices, 108 attached storage, 101 attributes, 190 auctions, online, 313–314 fraud, 353 audio, 483–484 streaming, 483 audio books, 311 auditing, 424 augmented reality, 487 AUSFTA (Australia-United States Free Trade Agreement), 35 Australia-United States Free Trade Agreement (AUSFTA), 35 automated teller machine (ATM) devices, 108 automatic call distributors (ACDs), 259 automobiles, software-driven, 172 autonomic computing, 580 B backbone, 277 back-end applications, 211 background, 144 Baker, Simon, 316 banking, 348–349 bar-code scanners, 109 Baron, Robert, 12 batch processing systems, 375, 375–376 B2B (business-to-business) e-commerce, 20, 333 B2C (business-to-consumer) e-commerce, 20, 333, 333–334, 337, 338 BCI (Brain Computer Interface), 467 benchmark tests, 567 Berners-Lee, Tim, 284 best practices, 385 beta testing, 578 BI. See business intelligence (BI) bioinformatics, 492 biometric devices, 562 blade servers, 122 bloggers, 306 blogging, 303, 306 blogosphere, 306 blogs, 16, 306, 306–307 Blue Gene, 13 Bluetooth, 238 bots, 474 BPL (broadband over power lines), 236, 237 Brain Computer Interface (BCI), 467 brainstorming, 442 bridges, 254 broadband communications, 234 653 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User 654 Index | infrastructure, 242 broadband over power lines (BPL), 236, 237 Brown, Paul, 241 Bs (bytes), 94 bugs, software, 171 bulk e-mail, 302 Bumpus, Rick, 63 Burke, John, 90 business. See also e-business (electronic business); e-commerce (electronic commerce); m-commerce (mobile commerce) virtual reality, 488–489 business continuity, 560 business information, online, 294 business information systems, 18–28 business intelligence (BI), 216, 218, 463 enterprise resource planning, 392–393 reasons to study, 188 business-to-business (B2B) e-commerce, 20, 333 business-to-consumer (B2C) e-commerce, 20, 333, 333–334, 337, 338 buy-side e-commerce, 333 bytes (Bs), 94 C CA (certificate authority), 361 Cable Act of 1992, 625 cable modems, 252 cache memory, 95, 95–96 CAD. See computer-assisted design (CAD) CAFTA (Central American Free Trade Agreement), 35 call centers, 259 CAM (computer-assisted manufacturing), 33, 164 cameras, digital, 105–106 Cameron, Bobby, 515 Cameron, James, 112 CAN-SPAM Act, 599 Capability Maturity Model (CMM), 528 Card Verification Number, 350 careers in information systems, 70–76 finding jobs, 76 project teams, 76 carpal tunnel syndrome (CTS), 627 Carr, Nicholas, 628 cars, software-driven, 172 Cascading Style Sheets (CSSs), 286, 287 CASE repositories, 539 CASE (computer-aided software engineering) tools, 529, 529–530, 539 cash, electronic, 361 cathode-ray tubes (CRTs), 110 CBISs (computer-based information systems), 12, 12–17 C2C (consumer-to-consumer) e-commerce, 20, 335 CDMA (Code-Division Multiple Access), 243 CD-R (CD-recordable), 100 CD-recordable (CD-R), 100 CD-rewritable (CD-RW), 100 CD-ROM (compact disc read-only memory), 100 CD-RW (CD-rewritable), 100 Cell Broadband Engine Architecture, 93 cell phones, making payments, 363 cellular modems, 252 cellular phone services, 256–257 Central American Free Trade Agreement (CAFTA), 35 central processing unit (CPU), 90, 93–94 centralized processing, 248 certificate authority (CA), 361 certification, 75 Chalmers Matthew, 238 change management, systems development, 527 change models, 56, 56–57 channel bandwidth, 234 channels, telecommunications, 234 characters, 189 charge cards, 361, 362 chief information officers (CIOs), 17, 74–75 chief knowledge officers (CKOs), 462 chief technology officers (CTOs), 74–75 Child Online Protection Act of 1998, 622 Children’s Internet Protection Act of 2000 (CIPA), 622 Children’s Online Privacy Protection Act of 1998 (COPPA), 621 chip sets, 90 chip-and-pin cards, 107 choice stage (decision making), 412 Chrome OS, 150 CIM (computer-integrated manufacturing), 33, 426 CIOs (chief information officers), 17, 74–75 CIPA (Children’s Internet Protection Act of 2000), 622 circuit switching networks, 235 CIX (Commercial Internet Exchange), 277 CKOs (chief knowledge officers), 462 cladding, 237 clearinghouses, online, 313 click fraud, 353 click through rate (CTR), 346 clickstream data, 353 client/server architecture, 249, 249–250 Clinger-Cohen Act of 1996, 74 clip art, 162 clock speed, 92 cloud computing, 15, 28–29, 158–159, 281, 281–284 globalization, 273–274 healthcare, 573 shortcomings, 283 systems development, 510 CMM (Capability Maturity Model), 528 Coatney, Mike, 393 coaxial cable, 236, 238 Cockburn, Alistair, 524 Code-Division Multiple Access (CDMA), 243 codes of ethics, 630 cold sites, 561 collaborative software, 165 collaborative work, 55 collaborative work systems, computerized. See group support systems (GSSs) Collins, Jim, 62 command-based user interfaces, 142 commerce. See business; e-commerce (electronic commerce); m-commerce (mobile commerce) Commercial Internet Exchange (CIX), 277 commercial off-the-shelf (COTS) development process, 572 Communications Decency Act of 1996, 621, 622 communications satellites, 240–241 communities of practice (COP), 462 community cloud service, 282 compact disc read-only memory (CD-ROM), 100 competitive advantage, 62, 64–66 factors leading firms to seek, 62, 64 strategic planning for, 64–66 systems development, 514, 516 competitive intelligence, 218 compilers, 170 computational biology, 492 computed fields, 189 Computer Abuse Amendments Act of 1994, 625 computer downsizing, 122 Computer Fraud and Abuse Act of 1986, 613 computer literacy, 33 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | Computer Matching and Privacy Act of 1988, 625 computer networks, 246. See also networks computer programs, 139. See also application software; software; systems software computer systems. See system entries computer waste, 599–600 preventing, 600–603 computer-aided software engineering (CASE) tools, 529, 529–530, 539 computer-assisted design (CAD), 33, 164 manufacturing MISs, 424 computer-assisted manufacturing (CAM), 33, 426 computer-based information systems (CBISs), 12, 12–17 computer-integrated manufacturing (CIM), 33, 426 computerized collaborative work systems. See group support systems (GSSs) computer-related mistakes, 600 preventing, 600–603 computers disposal of, 611 special-purpose, 117, 123 concurrency control, 205 concurrent-user licenses, 173 conferencing, online, 303–304 consulting firms, 75 consumer-to-consumer (C2C) e-commerce, 20, 335 contactless cards, 107 containers, 202 content streaming, 307 continuous improvement, 45, 58, 58–59 systems development, 526–527 contracts, systems design, 569 control unit, 90 convertible tablet PCs, 119 COP (communities of practice), 462 COPPA (Children’s Online Privacy Protection Act of 1998), 621 coprocessors, 96 copyrights software, 173 violations, 611–612 corporate culture, globalization, 45–46 corporate portals, 300 corporations crime prevention by, 613–616 privacy policies, 624–626 cost centers, 423 cost leadership, competitive advantage and, 65 cost objectives, systems development, 518 cost per action (CPA), 346 cost per click (CPC), 346 cost per thousand (CPM), 346 cost-benefit analysis, 567 COTS (commercial off-the-shelf) development process, 572 counterintelligence, 218 coupons, m-commerce, 347–348 CPA (cost per action), 346 CPC (cost per click), 346 CPM (cost per thousand), 346 CPU (central processing unit), 90, 93–94 crackers, 608 creative analysis, 514 creativity, 467 credit cards, 361, 362 Crier, Catherine, 622 crime, computer as tool to fight, 605–607 crime, computer, 603 computer as tool to commit, 604–605 computers as objects of, 607–613 international, 613 prevention, 613–618 Index criminal hackers, 608 critical analysis, 516 critical path, 528 critical success factors (CSFs), 516, 540 CRM. See customer relationship management (CRM) cross-platform development, 575 crowd sourcing, 298 CRTs (cathode-ray tubes), 110 Crystal Methodologies, 524 CSFs (critical success factors), 516, 540 CSSs (Cascading Style Sheets), 286, 287 CTOs (chief technology officers), 74–75 CTR (click through rate), 346 CTS (carpal tunnel syndrome), 627 cultural challenges, globalization and, 35, 341, 397 culture, 55 organizational, 55 currency challenges, globalization and, 35, 341, 398 customer relationship management (CRM), 49–50, 282 customer relationship management (CRM) systems, 393, 393–396 customer resource management (CRM), globalization, 555–556 customization, competitive advantage and, 66 customized manufacturing, 51 customs rules, globalization and, 398 cutover, 578–579 cybermalls, 343, 343–344 cyberterrorists, 604 D DaaS (Database as a Service), 209–210, 575 DARPA Grand Challenge, 470 DASDs (direct access storage devices), 99 dashboards, 300 data, 5, 460 clickstream, 353 hierarchy of, 190 human- and machine-readable, 104 manipulating, 198–200 theft, 609–611 turning into information, 6–7 types, 6 data administrators, 209 data analysis, 536, 536–539 data centers, 194, 194–195, 196 environmental impact, 196 reasons to study, 188 data cleanup, 200, 200–201, 387 data collection, 380, 380–381 systems analysis, 534–536 data conversion, 577 data correction, 381 data definition languages (DDLs), 203 data dictionaries, 203, 203–205 data editing, 381 data entry, 104 data input, 104 data items, 190 data loading, 387 data loss prevention (DLP), 218 data manipulation, 382 data manipulation languages (DMLs), 206 data mapping, 387 data marts, 214, 214–215 data mining, 215, 215–216, 220, 463 data modeling, 195, 197, 536–537 data models, 197 data preparation, 577 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 655 Licensed to: iChapters User 656 Index | data redundancy, planned, 195 data storage, 382 data store, 538 data synchronization, 218 data warehouses, 212, 212–214 data workers, 462 database administrators (DBAs), 189, 208–209 database approach to data management, 192, 193 Database as a Service (DaaS), 209–210, 575 database controls, systems design, 562 database management systems (DBMSs), 24, 189, 192, 201–211 administration, 208–209 creating and modifying databases, 203–205 manipulating data and generating reports, 206–208 object-oriented, 220 object-relational, 220 popular, 209–210 selecting, 210–211 special-purpose, 210 storing and retrieving data, 205 types, 202–203 user view, 203 using with other software, 211 database normalization, 201 database software, 160, 161–162 databases, 15, 186–223. See also database management systems (DBMSs) applications, 211–221 approaches, 192–193 data centers, 194, 194–195, 196 data modeling, 195, 197 decision support systems, 438–439 distributed, 218, 218–219 linking to Internet, 212 object-oriented, 220 reasons to study, 188 relational model, 197, 197–201 replicated, 218 virtual, 575 data-driven DSSs, 438–439 data-entry operators, 71 data-flow diagrams (DFDs), 538 data-flow line, 538 Datler, Bernd, 217 Davis, Tom, 331, 332 DBAs (database administrators), 189, 208–209 DBMSs. See database management systems (DBMSs) DDLs (data definition languages), 203 DDR SDRAM (double data rate synchronous dynamic random access memory), 95 debit cards, 361, 362 decentralized processing, 248 decision making, 410–415 approaches, 413–414 as component of problem solving, 411–412 data access, 383 decision support systems. See decision support systems (DSSs) group support systems. See group support systems (GSSs) information and decision support systems, 414–415 programmed versus nonprogrammed decisions, 412–413 decision room, 445, 446 decision support systems (DSSs), 23–25, 24, 433–440 ad hoc, 436 benefits, 414–415 capabilities, 436 characteristics, 434–435 components, 438–440 data-driven, 438–439 ESSs, 446, 446–448 institutional, 436 MISs compared, 438 model-driven, 439–440 reasons to study, 410 decision-making phase (decision making), 411 delphi approach, 442 demand management, 390 demand reports, 419, 419–420 demodulation, 251 design report, 569 design stage (decision making), 411, 411–412 desktop computers, 117, 120 desktop publishing (DTP) software, 160 detailed scheduling, 390 development teams, 507 DFDs (data-flow diagrams), 538 dialogue manager, 438, 440 dial-up Internet connections, 280 differentiation, competitive advantage and, 65 digital audio players, 115, 115–116 digital cameras, 105, 105–106 digital certificates, 361 digital divide, 353 digital rights management (DRM), 153, 308, 352 Digital Subscriber Line (DSL), 252, 257 digital video discs (DVDs), 100 Digital Video Interface (DVI), 113 direct access, 99 direct access storage devices (DASDs), 99 direct conversion, 578 direct cutover, 578 direct observation, 535, 535–536 disaster planning, 560–561 disaster recovery, 560, 560–561 disintermediation, 334 disk mirroring, 99 display monitors, 110, 112–113 disruptive changes, 56 distance challenges, globalization and, 35, 341 distance education, 293 distributed databases, 218, 218–219 distributed processing, 248 distributions, 149 DLP (data loss prevention), 218 DMLs (data manipulation languages), 206 DNS (Domain Name System), 278 document production, 382 documentation, 139 domain, 198 domain expert, 479 Domain Name System (DNS), 278 domain names, 278–279 dot pitch, 113 double data rate synchronous dynamic random access memory (DDR SDRAM), 95 downsizing, 62 downstream management, 48 DRAM (dynamic random access memory), 95 drill-down reports, 420 drilling down, 212 DRM (digital rights management), 352, 153308 DSL (Digital Subscriber Line), 252, 257 DSL Access Multiplexer (DSLAM), 257 DSLAM (DSL Access Multiplexer), 257 DSSs. See decision support systems (DSSs) DTP (desktop publishing) software, 160 dual booting, 147 dumpster diving, 604 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | DVDs (digital video discs), 100 DVI (Digital Video Interface), 113 dynamic programming, 472 dynamic random access memory (DRAM), 95 E e-books, 116, 310–311 e-boutiques, 349–350 EBs (exabytes), 94 e-business (electronic business), 20. See also e-commerce (electronic commerce); m-commerce (mobile commerce) e-commerce (electronic commerce), 20, 20–21, 332, 332–341 advantages, 343 applications, 343–350 B2B, 333 B2C, 333, 333–334 buy-side, 333 C2C, 335 challenges, 338–341 consumer privacy, 339–340 consumers’ lack of trust, 340–341 e-government, 335, 335–336 global issues, 341 globalization, 331–332 multistage model, 336–338 sell-side, 333 software, 359–360 successful, strategies for, 354–358 technology infrastructure requirements, 358–363 threats to, 350, 352–354 virtual models, 351 Web sites, 354–358 e-commerce Web sites, 354–358 building traffic, 355–356 defining functions, 354–355 establishing, 355 maintaining and improving, 356, 358 economic feasibility, 532 economic order quantity (EOQ), 425, 425–426 EDI (Electronic Data Interchange), 261–262 e-discovery (electronic discovery), 562 EDRs (event data recorders), 13–14 education online, 292–294 virtual reality, 488 EEPROM (electrically erasable programmable read-only memory), 95 effectiveness, 9 efficiency, 9 EFT (electronic funds transfer), 262 e-government, 335, 335–336 E-Government Act of 2002, 625 EHRS (electronic health record system), 573 Einstein, Albert, 514 EISs (executive information systems), 24–25, 446–448 electrically erasable programmable read-only memory (EEPROM), 95 electronic business (e-business), 20. See also e-commerce (electronic commerce); m-commerce (mobile commerce) electronic cash, 361 electronic commerce. See e-commerce (electronic commerce) Electronic Communications Privacy Act of 1986, 624, 625 Electronic Data Interchange (EDI), 261–262 Electronic Device Recycling Research and Development, 125 electronic discovery (e-discovery), 562 Index electronic document distribution, 259 electronic exchanges, 314, 344, 344–345 electronic funds transfer (EFT), 262 Electronic Funds Transfer Act of 1979, 625 electronic health record system (EHRS), 573 electronic meetings, 260–261 electronic payment systems, 360–363 electronic procurement (e-procurement), 20 Electronic Product Environmental Assessment Tool (EPEAT), 126–127, 564 electronic records management (ERM) systems, 5–6 electronic retailing, 343, 343–344 e-mail, 300–302 privacy, 619 unwanted, 30 embedded operating systems (embedded systems), 152 empowerment, 53 encryption, 255 keys, 255 End-User License Agreements (EULAs), 139 end-user systems development, 510 Energy Star standards, 126, 196, 564 Enterprise 2.0, 305 enterprise data modeling, 197 enterprise operating systems, 151 enterprise resource planning systems (ERPs), 3, 22, 167–168, 373, 382–393 advantages, 383, 385–386 available systems, 388 business intelligence, 392 disadvantages, enterprise resource planning (ERP) advantages 386–387 financial accounting, 392 GSSs, 444 managerial accounting, 392 overview, 383 for small and medium-size enterprises, 388–389 supply chain management, 389–391 enterprise software, hosted software model, 396–397 enterprise sphere of influence, 140 enterprise storage, 101–103 enterprise systems, 21–22, 372–401, 374 customer relationship management systems, 393–396 enterprise resource planning. See enterprise resource planning systems (ERP) globalization, 373 hosted software model, 396–397 transaction processing. See transaction processing systems (TPSs) entertainment, virtual reality, 489 entities, 190 entity symbol, 538 entity-relationship (ER) diagrams, 197, 199, 536–537 environmental design, 563, 563–569 contracts, 569 design report, 569 evaluation techniques, 566–568 generating systems design alternatives, 564–566 environmental impact, data centers, 196 environmental responsibility, 63 EOQ (economic order quantity), 425, 425–426 EPEAT (Electronic Product Environmental Assessment Tool), 126–127, 564 e-procurement (electronic procurement), 20 EPROM (erasable programmable read-only memory), 95 ER (entity-relationship) diagrams, 197, 199, 536–537 erasable programmable read-only memory (EPROM), 95 ergonomic keyboards, 105 ergonomics, 629 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 657 Licensed to: iChapters User 658 Index | ERM (electronic records management) systems, 5–6 ERPs. See enterprise resource planning systems (ERPs) errors computer-related mistakes, 599–603 preventing, detecting, and correcting, 560 software bugs, 171 ESSs (executive support systems; executive information systems), 24–25, 446, 446–448 e-tailing, 343–344 ethical issues, 32, 630 e-time (execution time), 91 EULAs (End-User License Agreements), 139 European Union (EU), 35 Directive 2002/95/EC, 126 Directive 95/96/EC of 1998, 398 evaluating systems design, 565–568 Evans, Mark, 260–261 event data recorders (EDRs), 13–14 event-driven review, 584, 584–585 e-waste, 125 exabytes (EBs), 94 exception reports, 420 execution time (e-time), 91 executive information systems (EISs), 24–25, 446–448 executive support systems (executive information systems; ESSs), 24–25, 446, 446–448 capabilities, 447–448 expert system shells, 481 expert systems, 27, 468, 474–482 components, 475–477 development tools and techniques, 481–482 explanation facility, 477 inference engine, 477 knowledge acquisition facility, 477, 477–478 participants in developing and using, 478–479 user interface, 478 when to use, 474–475 explanation facility, 477 explicit knowledge, 461 explicit personalization, 358 Extensible Markup Language (XML), 287, 289 external auditing, 424 extranets, 16, 17, 318 extreme programming (XP), 523, 524 F failover, 561 Fair and Accurate Credit Transactions Act of 2003, 625 Fair Credit Reporting Act of 1970, 625 fairness in information use, 622–623 Family Education Privacy Act of 1974, 625 FDD (Feature-Driven Development), 524 feasibility analysis, 532 feasibility studies, 533 Feature-Driven Development (FDD), 524 Federal Information Security Management Act of 2002, 557 federated database systems, 221 feedback, 11, 11–12 feedback mechanisms, 8 FeRAM, 95 fiber-optic cable, 236, 237 fields, 189 fifth-generation languages (5GLs), 170 file compression, multimedia, 485 file conversion, multimedia, 484 file management, operating systems, 144–145 file server systems, 249 File Transfer Protocol (FTP), 317 file-compression utilities, 154 files, 190 filtering software, 622 final evaluation, 565 finance services, m-commerce, 348 financial accounting, 392 financial management software, 160 financial MISs, 421, 421–424 FiOS, 237 firewalls, 32 five-forces model, 62 fixed WiMAX, 245 Flash, 288 flash drives, 101 flat files, 202 flat organizational structure, 53 Fletcher, Brad, 263 flexible manufacturing systems (FMSs), 426 FMSs (flexible manufacturing systems), 426 Food Allergen and Consumer Protection Act of 2006, 206 forecasting, 12 foreground, 144 fraud click, 353 Internet, 352–353 freeware, 173–174 freezing design specifications, 568 Friedman, Thomas, 34–35 front-end applications, 211 front-end processors, 253 FTP (File Transfer Protocol), 317 fuel cells, 92 full-duplex channels, 234 functional requirements, 542 G gambling, online, 311 game theory, 491, 491–492 games, online, 311–312 Gantt charts, 528 gateways, 254 G2B (government-to-business) e-commerce, 335, 336 GBs (gigabytes), 94 G2C (government-to-citizen) e-commerce, 335–336 Genachowski, Julius, 242 general-purpose computers, 117 genetic algorithms, 473 geographic information systems (GISs), 315, 433, 433–434 in law enforcement, 606–607 geolocation tools, online, 314–316 geostationary satellites, 241 geo-tagging, 315 G2G (government-to-government) e-commerce, 335, 336 GHz (gigahertz), 92 gigabytes (GBs), 94 gigahertz (GHz), 92 GISs. See geographic information systems (GISs) Global Positioning System (GPS), 262, 264 global software support, 175 global supply management (GSM), 314 Global System for Mobile (GSM), 243 globalization, 34–35 e-commerce, 341 enterprise systems, 397–398 international computer crime, 613 Internet, 275–276 GNU (GNU General Public License), 149, 174 GNU General Public License (GPL), 149, 174 goals, information system, aligning with corporate goals, 513–514 Godin, Seth, 305 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | Gonzales, Albert, 608, 610 Good to Great (Collins), 62 government, systems development, 511, 512 government-to-business (G2B) e-commerce, 335, 336 government-to-citizen (G2C) e-commerce, 335–336 government-to-government (G2G) e-commerce, 335, 336 GPS (Global Positioning System), 262, 264 Grable, Betty, 12 Gramm-Leach-Bliley Act of 1999, 624, 625, 626 Grant, Pauline, 189 graphical user interfaces (GUIs), 142 graphics, 482–483 graphics processing units (GPUs), 97 graphics software, 160 green computing, 126, 126–127 green death, 564 green design. See environmental design grid charts, 538, 538–539 grid computing, 97, 153 group consensus, 567 group consensus approach, 442 group decision support systems. See group support systems (GSSs) group support systems (GSSs), 24, 441, 441–446 alternatives, 445–446 characteristics enhancing decision making, 442–443 software, 444–445 groupthink, 443 groupware, 165, 444, 463 GSM. See global supply management (GSM); Global System for Mobile (GSM) GSSs. See group support systems (GSSs) guided transmission media, 235, 236 GUIs (graphical user interfaces), 97, 142 Index information system use, 34 Medicaid, 29 performance-based information systems, 67, 69 robotics, 470 special-purpose systems, 490 systems development, 510 transaction processing systems, 376 virtual reality, 488 The Heart of Change (Kotter), 57 help desk, 580 help facilities, 559 heuristics, 414, 467 hierarchical structure, 52–53 hierarchy of data, 190 highly structured problems, 436 Highsmith, James, 524 high-speed Internet services, 280 HMDs (head-mounted displays), 28, 486 Holographic Versatile Discs (HVDs), 100 home networks, 258–259 hosted software model, enterprise software, 396–397 hosts, 277 hot sites, 561 HP-UX, 151 HRMISs (human resource MISs), 430, 430–433 HTML (Hypertext Markup Language), 284, 284–286 Huber, George, 411 human resource MISs (HRMISs), 430, 430–433 Hurd, Mark, 194 HVDs (Holographic Versatile Discs), 100 hybrid cloud service, 282 hydropower, globalization, 87–88 hyperlinks, 284 Hypertext Markup Language (HTML), 284, 284–286 Hypertext Preprocessor (PHP), 288 Hypertext Transport Protocol, 278 H hackers, 608 Hahn, Dave, 118 half-duplex channels, 234 handheld computers, 111, 117, 118 haptic interfaces, 486 hard copy, 113 hard disks, 99 Hardin, Michael, 106 hardware, 13, 13–14, 86–129. See also specific hardware components components, 90–91 computer system types, 117–124 e-commerce, 358–359 green computing, 126–127 input devices. See input devices m-commerce, 359–360 memory characteristics and functions, 94–96 multiprocessing, 96–97 operating system independence from, 143 output devices. See output devices parallel computing, 97 processing characteristics and functions, 92–94 reasons to study, 88 secondary storage. See secondary storage telecommunications, 250–254 head-mounted displays (HMDs), 28, 486 health concerns, workplace, 627 healthcare artificial intelligence, 467 cloud computing, 573 databases, 212, 215 ERM systems, 5–6 I IaaS (Infrastructure as a Service), 512 ICANN (Internet Corporation for Assigned Names and Numbers), 278–279, 341 identity theft, 340, 605 prevention, 616 IDEs (integrated development environments), 171, 575 IDSs (intrusion detection systems), 614 IF-THEN statements, 476 image logs, 561 imagination, 467 IMAP (Internet Message Access Protocol), 301 immersive virtual reality, 485 implementation stage (problem solving), 412 implicit personalization, 358 incremental backup, 561 individual systems developers, 509, 510 individual users, 509–510 industry altering structure, competitive advantage and, 65 information system use, 34 inference engines, 477 informatics, 492 information, 5, 460 described, 5–7 fairness in use of, 622–623 theft, 609–611 valuable, characteristics, 7–8 value of, 8 information centers, 73 “Information Resources Operating Values” (Wilson), 45 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 659 Licensed to: iChapters User 660 Index | information service units, 73 information systems (ISs), 4. See also specific types of information systems benefits, 414–415 components and processes, 10–17 in global economy, 3–4, 409–410 globalization, 459 reasons to study, 4, 46, 410 value, 68–69 information systems literacy, 33 information systems planning, 513 infrared transmission, 239 Infrastructure as a Service (IaaS), 512 infrastructure challenges, globalization and, 35, 341, 397 inkjet printers, 114 innovation, competitive advantage and, 66 in-premise BPL, 237 input controls, systems design, 562 input devices, 103–110 inputs, 8, 11 data, 104 GSSs, 443 MISs, 418 insiders, 608 installation, 577 instant messaging, 302 privacy, 620 institutional DSSs, 436 instruction time (I-time), 91 integrated application packages, 164 integrated development environments (IDEs), 171, 575 integration testing, 577 intellectual property, 352 intelligence stage (decision making), 411 intelligent agents, 474 intelligent behavior, 465, 465–466 intelligent robots, 474 interactive voice response (IVR) systems, 105 interface devices, virtual reality, 486 internal auditing, 424 Internet, 15, 272–284. See also Web access, 353 accessing, 279–281 cloud computing, 15, 28–29, 158–159, 281–284 communication and collaboration, 300–304 dependence on, 628 development, 276–277 filtering and classifying content, 622 international scope, 275–276 libel concerns, 621–622 linking company database to, 212 media and entertainment, 307–312 operation, 277–279 personal and social impact, reasons to study, 598 privacy, 620–621 utilities, 317 Internet careers, 75 Internet Corporation for Assigned Names and Numbers (ICANN), 278–279, 341 Internet Message Access Protocol (IMAP), 301 Internet protocol (IP), 276 Internet Service Providers (ISPs), 280, 280–281 Internet utilities, 155 interpreters, 170 interviews, structured and unstructured, 535 intranets, 16, 317–318 intrusion detection systems (IDSs), 614 investment, m-commerce, 348 IP (Internet protocol), 276 IP addresses, 278 IS personnel, hiring and training, 576 IS plan, 540 IS vendors, 571 ISPs (Internet Service Providers), 280, 280–281 ISs. See information systems (ISs) I-time (instruction time), 91 IVR (interactive voice response) systems, 105 J Java, 288 JIT (just-in-time) inventory, 48, 426 job search sites, 295 “John Doe” lawsuits, 621–622 joining, 199 just-in-time (JIT) inventory, 48, 426 K Kaminsky, Daniel, 70 kasumi encryption code, 256 KBs (kilobytes), 94 kernel, 142 key-indicator reports, 419 keys, 191 encryption, 255 primary, 191 Kilar, Jason, 309 kilobytes (KBs), 94 kiosks, 5, 12, 108 KMSs. See knowledge management systems (KMSs) knowledge, 6, 460 explicit and tacit, 461 knowledge acquisition facility, 477, 477–478 knowledge base, 27 expert systems, 476–477 knowledge engineers, 479 knowledge management systems (KMSs), 6, 25, 460–464 communities of practice, 462 globalization, 459 obtaining, storing, sharing, and using knowledge, 462–463 personnel, 462 technology to support, 463–464 knowledge maps, 463 knowledge repositories, 463 knowledge users, 479 knowledge workers (KWs), 6, 70, 462 Korean-United States Free Trade Agreement (KORUSFTA), 35 KORUSFTA (Korean-United States Free Trade Agreement), 35 Kotter, John, 57 Kundra, Vivek, 74, 512 Kurzweil, Ray, 465 KWs (knowledge workers), 6, 70, 462 L LAN (local area network) administrators, 75 LAN servers, 279 language challenges, globalization and, 35, 341, 397 Lanier, Jaron, 485 LANs (local area networks), 246, 246–247 LAP (logical access paths), 205 laptop computers, 117, 118 Large Hadron Collider (LHC), 153 laser printers, 114 laws. See also specific laws Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | e-commerce, 354 globalization and, 35, 341, 398 LCD displays, 112 LCG (LHC Computing Grid) project, 153 LDP (Lean Document Production) solutions, 68 Leadership in Energy and Environmental Design (LEED) rating system, 563 Leading Change (Kotter), 57 Lean Document Production (LDP) solutions, 68 Lean Software Development, 524 learning, organizational, 57, 57 learning management systems (LMSs), 305 learning systems, 472, 472 LEED (Leadership in Energy and Environmental Design) rating system, 563 legacy systems, maintenance, 580 legal feasibility, 532 LEO (low earth orbit) satellite systems, 241 Lepecki, Stefan Lanna, 3 Lewin, Kurt, 56 LHC (Large Hadron Collider), 153 LHC Computing Grid (LCG) project, 153 libel, Internet, 621–622 licenses, software, 173 Limbaugh, Rush, 307 linking, 199 Linux, 149, 151 proprietary systems based on, 152–153 LMSs (learning management systems), 305 local area decision network, 445 local area network (LAN) administrators, 75 local area networks (LANs), 246, 246–247 Loebner Prize, 465–466 logic bombs, 608 logical access paths (LAP), 205 logical design, 195, 557 Long Term Evolution (LTE), 244 lookup tables, 559 low earth orbit (LEO) satellite systems, 241 lower-CASE tools, 530 LTE (Long Term Evolution), 244 M Mac OS, 146–147 Mac OS X Server, 151 machine cycle, 91 machine cycle time, 92 magnetic disks, 99 magnetic ink character recognition (MICR) devices, 107 magnetic stripe cards, 107 magnetic tape, 99 magnetoresistive random access memory (MRAM), 95 main memory, 91, 94–96 mainframe computers, 117, 122, 122–123 linking personal computers to, 258 mainframe utilities, 155 maintenance teams, 583 make-or-buy decision, 572, 574–575 malware, 608 malware attacks, prevention, 616–617 managed security service providers (MSSPs), 615–616 management information systems (MISs), 22, 22–23, 415–434 accounting, 433 characteristics, 420 DSSs compared, 438 financial, 421, 421–424 geographic, 433, 433–434 globalization, 409–410 Index human resource, 430, 430–433 inputs, 418 manufacturing, 424–426 marketing, 427, 427–430 outputs, 418–420 managerial accounting, 392 Managing at the Speed of Change (Conner Partners), 57 MANs (metropolitan area networks), 247 manufacturing, electronic exchanges, 344, 344–345 manufacturing MISs, 424–426 manufacturing, repair, and operations (MRO) goods and services, 344 mapping tools, online, 314–316 Marean, Browning, 118 market segmentation, 346 marketing globalization, 187–188 m-commerce, 345–346 marketing MISs, 427, 427–430 marketplaces, online, 313 Marriott, J. W., Jr., 45 Marriott, J. Willard, 45 mashups, 315 massively multiplayer online role-playing games (MMORPGs), 311 massively parallel processing, 97 material requirements planning (MRP), 390, 426 MBs (megabytes), 94 McCarthy, John, 465 McCaw, Craig, 245 McDermott, Jim, 605 m-commerce (mobile commerce), 20, 341–343, 360 advantages, 343 applications, 343–350 successful, strategies for, 354–358 technology infrastructure requirements, 358–363 threats to, 350, 352–354 Web sites, 342 Medicaid, 29 medical informatics, 492 medium-range wireless telecommunications, 239–240 megabytes (MBs), 94 megahertz (MHz), 92 memory, 91 main (primary), 91, 94–96 operating system management of, 143–144 storage capacity, 94 types, 94–96 menu-driven systems, 559 meta tags, 356 metropolitan area networks (MANs), 247 MHz (megahertz), 92 MICR (magnetic ink character recognition) devices, 107 microblogging, 303 microcode, 92 microloans, 421–422 microwave transmission, 240–241 middleware, 156 Miggo, Scott, 122 millions of instructions per second (MIPS), 92 MILNET, 276 MIPS (millions of instructions per second), 92 MISs. See management information systems (MISs) mission-critical systems, 516 MMORPGs (massively multiplayer online role-playing games), 311 MMS (model management software), 440 MMSs (model management systems), 24 mobile application software, 165, 166 mobile commerce. See m-commerce (mobile commerce) Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 661 Licensed to: iChapters User 662 Index | mobile telephone subscriber office (MTSO), 257 mobile WiMAX, 245 model base, 439, 439–440 model management software (MMS), 440 model management systems (MMSs), 24 model-driven DSSs, 439–440 modems, 251, 251–252 modulation, 251 monitoring stage (problem solving), 412 Moore, Gordon, 93 Moore’s Law, 93 Motion Pictures Experts Group-Layer 3 (MP3) format, 115, 154 movies, online, 309–310 MP3 (Motion Pictures Experts Group-Layer 3) format, 115, 154 MRAM (magnetoresistive random access memory), 95 MRO (manufacturing, repair, and operations) goods and services, 344 MRP (material requirements planning), 390, 426 MS-DOS, 145 MSSPs (managed security service providers), 615–616 MTSO (mobile telephone subscriber office), 257 Mueller, Robert, 604 multicore microprocessors, 96 multimedia, 27–28, 482, 482–485 designing applications, 485 multiple-user computer systems, 117, 121–124 multiple-user database management systems, 203 multiplexers, 252. 252–253 multiprocessing, 96, 96–97 multitasking, 144 multiuser licenses, 173 music, online, 308–309 N NAFTA (North American Free Trade Agreement), 35, 398 nanoseconds, 92 Nanotouch technology, 109 NAS (network-attached storage), 101, 101–102, 103 National Do Not Call Registry, 259 National ePrescribing Patient Safety Initiative, 67, 69 National LambdaRail (NLR), 276, 277 National Medal of Technology and Innovation, 13 natural language processing, 26, 471 natural languages, 170 near field communication (NFC), 238 netbook computers, 117, 118, 118–119 nettop computers, 117, 120 network neutrality, 242 network nodes, 246 network operating systems (NOSs), 254 network service providers (NSPs), 277 network utilities, 155 network-attached storage (NAS), 101, 101–102, 103 networking, operating system capabilities, 144 networking protocols, 233, 233–234 network-management software, 254 networks, 15, 246–256 circuit switching, 235 client/server systems, 249–250 home and small business, 258–259 linking personal computers to, 258 neural, 472, 472–473 packet switching, 235 processing alternatives, 248–249 reasons to study, 232 securing data transmission, 254–256 telecommunications hardware, 250–254 telecommunications software, 254 types, 246–248 neural networks, 26, 472, 472–473 Newmark, Craig, 75–76 news feeds, 303 news services, online, 291–292 Newton, Isaac, 514 NFC (near field communication), 238 niche strategy, competitive advantage and, 65 Nickerson, Chris, 604 NLR (National LambdaRail), 276, 277 nominal group technique, 442 nonoperational prototypes, 521 nonprogrammed decisions, 412, 412–413 normalization, databases, 201 North American Free Trade Agreement (NAFTA), 35, 398 NOSs (network operating systems), 254 notebook computers, 117, 118 NSPs (network service providers), 277 O Obama, Barack, 13, 212, 604 Object Data Standard, 220 Object Database Management Group, 220 object-oriented database management systems (OODBMSs), 220 object-oriented databases, 220 object-oriented design, 558–559 object-oriented programming languages, 169–170 object-oriented systems analysis, 542 object-oriented systems development (OOSD), 530 object-oriented systems investigation, 533 object-relational database management systems (ORDBMSs), 220 objects, 169 observe, orient, decide, and act (OODA) approach, 437 OCR (optical character recognition), 106 off-the-shelf software, 157 OLAP (online analytical processing), 219, 219–220 OLEDs (organic light-emitting diodes), 112 OLTP (online transaction processing), 212, 213, 214, 376, 376–377 O’Malley, Brendan H., 581 OMR (optical mark recognition), 106 on-demand business and utility computing, 61–62 on-demand computing, 61, 61–62 systems development, 525 One Laptop per Child, 13 online analytical processing (OLAP), 219, 219–220 online auctions, 313–314 fraud, 353 online games, 311–312 online information services, 291–295 online profiling, 353 online transaction processing (OLTP), 212, 213, 214, 376, 376–377 OODA (observe, orient, decide, and act) approach, 437 OODBMSs (object-oriented database management systems), 220 OOSD (object-oriented systems development), 530 Open Web Application Security Project (OWASP), 209 open-source software, 174, 174–175 operating systems (OSs), 141 activities performed by, 142–145 current, 145–150 enterprise, 151 network, 254 preferences, 148 for small computers, embedded computers, and specialpurpose devices, 152–153 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | workgroup, 150–151 operational feasibility, 532 operational prototypes, 521 operations, careers, 71 optical character recognition (OCR), 106 optical data readers, 106 optical mark recognition (OMR), 106 optical storage devices, 100 optimization, 160 optimization model, 413 ORDBMSs (object-relational database management systems), 220 order processing systems, 378 organic light-emitting diodes (OLEDs), 112 organizational change, 55, 55–57, 463 organizational culture, 55 organizational learning, 57, 463 organizational structure, 52, 52–55 types, 52–55 organizations, 44–78, 47 general model, 47 OSs. See operating systems (OSs) outplacement, 433 output controls, systems design, 562 output devices, 103–104, 110, 112–116 outputs, 8, 11 MISs, 418–420 outsourcing, 60, 60–61 systems development, 524–526 OWASP (Open Web Application Security Project), 209 P PaaS (Platform as a Service), 512 packet switching networks, 235 packets, 277 Palmer, Brad, 123 Panetta, Leon, 604 PANs (personal area networks), 246 PAP (physical access path), 205 parallel communication, GSSs, 443 parallel computing, 97 parallel start-up, 579 password sniffers, 609 patches, 582 patent violations, 611–612 PATN (Postal Advanced Telecommunications Network), 256 Payment Card Industry (PCI) security standard, 350 PBs (petabytes), 94 PBXs (private branch exchanges), 253, 253–254 p-cards, 362, 362–363 PC-DOS, 145 PCI (Payment Card Industry) security standard, 350 PCM (phase change memory), 95 PDCA (plan-do-check-act) approach, 437 pen input devices, 108, 109 perceptive systems, 467 performance objectives, systems development, 516–518 performance-based information systems, 67–69 personal advice and support, online, 294–295 personal area networks (PANs), 246 personal computers, linking to mainframes and networks, 258 Personal Genome Project (PGP), 102 personal information management (PIM) software, 163 personal productivity software, 140, 159–165 personal sensing devices, privacy, 620 personal sphere of influence, 140 personalization, 358 personnel controls, systems design, 562 personnel MISs, 430–433 Index PERT (Program Evaluation and Review Technique), 528 petabytes (PBs), 94 Petan, Ales, 87 petrochemical industry, globalization, 3–4 PGP (Personal Genome Project), 102 PGP Encryption, 255 phase change memory (PCM), 95 phase-in approach, 578 phishing, 352, 352–353, 612 PHP (Hypertext Preprocessor), 288 physical access path (PAP), 205 physical design, 195, 557, 557–558 picocells, 257 picoseconds, 92 piecemeal approach, 578 pilot start-up, 579 PIM (personal information management) software, 163 pipelining, 91 pixels, 110 plan-do-check-act (PDCA) approach, 437 planned data redundancy, 195 planning, systems development, 527–528 plasma displays, 112 Platform as a Service (PaaS), 512 Platform for Privacy Preferences (P3P), 621 plotters, 115 plug-ins, 284 plunge, 578 podcasts, 307 point evaluation, 568 point-of-sale (POS) devices, 107, 107–108 policies, preventing computer-related waste and mistakes, 600–603 policy-based storage management, 103 POP (Post Office Protocol), 301 Poppendieck, Mary and Tom, 524 portable computers, 117, 118, 118–119 Porter, Michael, 48, 62, 64–65, 67 POS (point-of-sale) devices, 107, 107–108 Post Office Protocol (POP), 301 Postal Advanced Telecommunications Network (PATN), 256 Power Usage Effectiveness (PUE), 196 P3P (Platform for Privacy Preferences), 621 predictive analysis, 216 preliminary evaluation, 565 presence, 262 presentation graphics software, 160 price comparison, m-commerce, 347 primary key, 191 primary memory, 91, 94–96 primary storage, 91 printers, 113––115 privacy, 30–31, 32, 618–622 e-commerce, 339–340 e-mail, 619 federal laws regarding, 618–619, 622–624, 625, 626 individual efforts to protect, 626 instant messaging, 620 Internet, 620–621 online profiling, 353 personal sensing devices, 620 workplace, 619 Privacy Act of 1974, 32, 623 private branch exchanges (PBXs), 253, 253–254 private cloud computing, 15, 282 problem solving, 412 DSSs, 436 intelligence, 466 procedures, 17 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 663 Licensed to: iChapters User 664 Index | preventing computer-related waste and mistakes, 600–603 process redesign, 57, 57–58, 59 process symbol, 538 processes, 6 work, improving, 385 processing, 11 characteristics and functions, 92–94 transaction processing systems. See transaction processing systems (TPSs) processing controls, systems design, 562 processing mechanisms, 8 procurement cards, 362, 362–363 production, 390 productivity, 67, 67–68 products existing, competitive advantage and, 66 globalization and, 35 new, competitive advantage and, 66 professional advice and support, online, 294–295 profiling, online, 353 profit centers, 423 program code, 168 Program Evaluation and Review Technique (PERT), 528 programmable read-only memory (PROM), 95 programmed decisions, 412 programmers, 507 programming languages, 168, 168–171 evolution, 168–169 expert systems, 481 Web, 288–289 Project Change Management (Conner Partners), 57 project deadline, 528 Project Gutenberg, 116 project management software, 160 project managers, 507 project milestones, 528 project organizational structure, 53 project schedule, 528 project teams, 76 projecting, 198 projects, 507 unplanned, 514 PROM (programmable read-only memory), 95 proprietary software, 157 prototyping, 521, 521–523 public cloud computing, 15, 282 PUE (Power Usage Effectiveness), 196 purchasing, 390 purchasing cards, 362, 362–363 purchasing systems, 378 push e-mail, 301 Q QBE (Query-By-Example), 206 qualitative analysis, DSSs, 438 quality, 60 quality control, 426 quantitative analysis, DSSs, 439, 439–440 Query-By-Example (QBE), 206 questionnaires, 536 RAID (redundant array of independent disks), 99, 99–100 RAM (random access memory), 94, 94–95 random access memory (RAM), 94, 94–95 rapid application development (RAD), 519, 523 Rational Unified Process (RUP), 524 RDF (Resource Description Framework), 212 read-only memory (ROM), 95 real estate, selling using Google Maps, 316 Real Simple Syndication (RSS), 306 recordkeeping, GSSs, 443 records, 189, 189–190 redundant array of independent disks (RAID), 99, 99–100 reengineering, 57, 57–58, 59 systems development, 526–527 registering software, 173 registers, 90 Reinforcement Learning, 472 relational model, 197, 197–201 releases, 582 reorder point (ROP), 426 repetitive stress injury (RSI), 629–630 replicated databases, 218 Repliee Q1 and Q2 robots, 471 report layout, 541 reports DBMSs, 208 MISs, 419–420 request for maintenance forms, 582 request for proposal (RFP), 565 requirements analysis, 540, 540–542 tools, 542 rescue disks, 141 research, online, 296–299 Resource Description Framework (RDF), 212 Restriction on the Use of Hazardous Substances (RoHS), 125 return on investment (ROI), 68 revenue centers, 423 reverse 911 service, 258 RFID. See Radio Frequency Identification (RFID) RFP (request for proposal), 565 RIAs (rich Internet applications), 288 Rich, Barnaby, 628 rich Internet applications (RIAs), 139, 288, 305–306, 306 Richards, Keith, 12 Right to Financial Privacy Act of 1978, 625 risk, 69 Robertson, Tom, 373 robotics, 468, 470–471 Rochelle, Jonathan, 283 RoHS (Restriction on the Use of Hazardous Substances), 125 ROI (return on investment), 68 rolling up, 212 ROM (read-only memory), 95 rootkits, 608 ROP (reorder point), 426 Rothbaum, Barbara, 488 routers, 254 RSI (repetitive stress injury), 629–630 RSS (Real Simple Syndication), 306 rules, 476 rules of thumb, 414 RUP (Rational Unified Process), 524 S R RAD (rapid application development), 519, 523 Radio Frequency Identification (RFID), 109, 109–110, 213, 381, 491 privacy issues, 620 SaaS (Software as a Service), 158, 159, 282, 512, 574 sales and operations plans (S&OPs), 389 sales forecasting, 389 sales growth, competitive advantage and, 66 sales ordering, 390 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | SANs (storage area networks), 101, 102, 102–103 SASDs (sequential access storage devices), 99 satisficing model, 414 scalability, 121, 144, 517 scaling out, 121 scaling up, 121 scams, 612, 617–618 scanning devices, 106 scenarios, 558 schedule feasibility, 532 scheduled reports, 419 Schein, Edwin, 56 schemas, 203, 204 Schroeder, Scott, 575 SCM (supply chain management), 48–49, 389, 389–391 screen layout, 541 script bunnies, 608 scripts, 608 SDLCs. See system development life cycles (SDLCs) SDSL (symmetric DSL), 257 search engine optimization (SEO), 297 search engines, 296, 296–297 secondary storage, 98, 98–103 access methods, 98–99 enterprise storage options, 101–103 storage devices, 99–101 secure shell (SSH), 317 Secure Socket Layer (SSL), 361 security, 30–32 data transmission, 254–256 e-commerce, 350, 352 systems design, 559–561 wireless networks, 255–256 security dashboards, 615 security testing, 578 security utilities, 154 selecting, 198 sell-side e-commerce, 333 semantic Web, 212 semistructured problems, 436 SEO (search engine optimization), 297 sequential access, 98 sequential access storage devices (SASDs), 99 server farms, 121 server utilities, 155 server virtualization software, 155 servers, 117, 121, 121–122 service set identifier (SSID), 255 service-oriented architecture (SOA), 156 services existing, competitive advantage and, 66 globalization and, 35 new, competitive advantage and, 66 sex offenders, monitoring, 606 shared electronic calendars, 444 Shatner, William, 20 shells, 561 shopping, online, 312–314 short-range wireless telecommunications, 238–239 sign-on procedure, 559 Silverlight, 288 Simon, Herbert, 411 Simple Object Access Protocol (SOAP), 289 simplex channels, 234 single-user computer systems, 117 nonportable, 117, 119–121 portable, 117, 118–119 single-user database management systems, 203 single-user licenses, 173 The Singularity is Near (Kurzweil), 465 Index site licenses, 173 site preparation, 576, 576–577 Six Sigma, 60, 61 slate computers, 119 slipstream upgrades, 582 small and medium-size enterprises (SMEs) enterprise resource planning, 388–389 transaction processing systems, 379–380 small business networks, 258–259 smart cards, 361, 362 smartphones, 118, 250–251, 301 customer relationship management systems, 394 malware, 609 operating systems, 152 SMEs. See small and medium-size enterprises (SMEs) Smith, Brad, 283 SOA (service-oriented architecture), 156 SOAP (Simple Object Access Protocol), 289 social engineering, 604 social networking, globalization, 137–138, 273–274, 597–598 social networking sites, 32, 33, 55, 304–305 customer relationship management systems, 394 harvesting of information, 31 social responsibility, 63 software, 14, 136–178 aggregator, 306 antivirus, 616–617 application. See application software in automobiles, 172 bugs, 171 copyrights and licenses, 173 e-commerce, 359–360 filtering, 622 freeware, 173–174 global support, 175 make-or-buy decision, 572, 574–575 m-commerce, 360 model management, 440 network-management, 254 off-the-shelf, 157 open-source, 174, 174–175 operating systems. See operating systems (OSs) programming languages. See programming languages proprietary, 157 reasons to study, 138 spheres of influence, 139–140 systems. See systems software upgrades, 175 using databases with other software, 211 workgroup, 444 Software as a Service (SaaS), 158, 159, 282, 512, 574 software piracy, 611 software suites, 163, 163–164, 165 solid state storage devices (SSDs), 101 S&OPs (sales and operations plans), 389 source data automation, 104 spam, 302, 599–600 spam filters, 599–600 spam-filtering utilities, 154 spatial data technology, 221 special-purpose computers, 117, 123 special-purpose database systems, 210 special-purpose systems, 490–492 speech-recognition technology, 105 spheres of influence, 139–140 The Spirit to Serve (Marriott), 45 spreadsheet software, 160, 161 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 665 Licensed to: iChapters User 666 Index | spyware, 609 SQL (Structured Query Language), 206–207 SRAM (static random access memory), 95 SSDs (solid state storage devices), 101 SSH (secure shell), 317 SSID (service set identifier), 255 SSL (Secure Socket Layer), 361 stakeholders, 507 start-up, 578, 578–579 static random access memory (SRAM), 95 statistical sampling, 536 status updates, online, 303 steering committees, 533, 533–534 Steinhorn, Jeff, 515 stock trading, 12 stolen property, recovery of, 605–607 storage, 11 cost comparisons, 98 network-attached, 101, 101–102, 103 primary, 91 secondary, 98, 98–103 storage area networks (SANs), 101, 102, 102–103 storage as a service, 103 storefront brokers, 355 strategic alliance (strategic partnership), 65 strategic planning, 447 streaming audio, 483 streaming video, 484 Strickling, Larry, 242 striping, 99 structured interviews, 535 Structured Query Language (SQL), 206–207 Sullivan, Ted, 509 supercomputers, 117, 123, 123–124 supply chain management (SCM), 48–49, 389, 389–391 support, careers, 73 sustaining change, 56 switches, 254 Symbian, 152 symbols, intelligence, 467 symmetric DSL (SDSL), 257 syntax, 168 system controls, 561, 561–562 system development life cycles (SDLCs), 519–526 approaches, 523–524 on-demand computing, 525 outsourcing, 524–525 prototyping, 521, 521–523 RAD, 519, 523 systems analysis phase. See systems analysis systems investigation phase, 531–534 traditional, 520–521 system maintenance, design related, 583–584 system operators, 71 system performance measurement, 585 system performance products, 585 system performance standards, 9 system request forms, 531 system software, 14 system testing, 577 system unit, 92 systems, 8, 8–10 definition, 8 performance and standards, 9–10 types, 117–124 systems analysis, 29–30, 520, 534–543 data analysis, 536, 536–539 data collection, 534–536 object-oriented, 542 participants, 534 report, 542–543 requirements analysis, 540, 540–542 systems analysis reports, 542–543 systems analysts, 71, 507, 508 systems design, 30, 520, 557, 557–562 interface design and controls, 559 logical and physical, 557–558 maintenance related, 583–584 object-oriented, 558–559 system security and controls, 559–562 systems developers, individual, 509, 510 systems development, 28, 28–30, 504–546 aligning corporate and IS goals, 513–514 careers, 71–72 competitive advantage, 514, 516 end-user, 510 factors affecting success, 526–530 globalization, 505–506 individual developers and users, 509–510 information systems planning, 513 initiating, 510–511 life cycles. See system development life cycles (SDLCs); systems analysis objectives, 516–518 object-oriented, 530 participants, 507–508 reasons to study, 506 systems implementation, 30, 520, 570, 570–579 acquiring database and telecommunications systems, 575 acquiring hardware from IS vendors, 571 data preparation, 577 hiring and training personnel, 576 installation, 577 make-or-buy decision, 572, 574–575 site preparation, 576, 576–577 start-up, 578, 578–579 testing, 577–578 user acceptance document, 579 user preparation, 576 systems investigation, 29, 520, 531–534 feasibility analysis, 532 initiating, 531 object-oriented, 533 participants, 531–532 report, 533–534 systems investigation reports, 533 systems maintenance, 580, 582–584 systems maintenance and review, 30, 520, 521 systems operation, 580 systems review, 584, 584–585 performance measurement, 585 procedure types, 584–585 systems software, 139, 140 Szygenda, Ralph, 262 T tablet computers, 117, 119 tacit knowledge, 461 TAM (technology acceptance model), 59 Task-Technology Fit (TTF), 60 Tax Reform Act of 1976, 625 taxes, e-commerce, 354 Taylor, Fred, 417 TBs (terabytes), 94 TCO (total cost of ownership), 69 TCP (Transmission Control Protocol), 277 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | TD-SCDMA (Time-Division Synchronous Code Division Multiple Access) technology, 244 team organizational structure, 53 technical documentation, 575 technical feasibility, 532 technology acceptance model (TAM), 59 technology diffusion, 59, 59–60 technology infrastructure, 12 upgrading, 385–386 technology infusion, 59, 59–60 technology transfer, 35 telecommunications, 15, 233–245 cellular phone services, 256–257 channel characteristics, 234–238 definition, 233 medium-range wireless options, 239–240 reasons to study, 232 short-range wireless options, 238–239 voice mail, 258 wide area wireless network types, 240–245 telecommunications controls, systems design, 562 telecommunications media, 233, 235 telecommuting, 260 teleconferencing, 445 telemarketing, 259 Telephone Consumer Protection Act of 1991, 625 telepresence, globalization, 231–232 telepresence systems, 303 television, online, 309–310 Telnet, 317 Tennant, Robert S., 386 terabytes (TBs), 94 terminals, 106 testing in systems implementation, 577–578 text, 482 TFTs (thin-film transistors), 112 theft of hardware and data, prevention, 616 identity, prevention, 616 of information, 609–611 thin clients, 117, 119, 119–120 thin-film transistors (TFTs), 112 Tiller, Rob, 612 time challenges, globalization and, 35, 341 Time-Division Synchronous Code Division Multiple Access (TD-SCDMA) technology, 244 time-driven review, 585 Torvalds, Linus, 149 total cost of ownership (TCO), 69 total quality management (TQM), 60, 61 touch-sensitive screens, 108–109 toxic heavy materials, 125 TPSs. See transaction processing systems (TPSs) TQM (total quality management), 60, 61 trade agreements, 35, 398 traditional approach to data management, 192, 193 traditional organizational structure, 52, 52–53 training online, 292–294 virtual reality, 488 transaction processing cycle, 380 transaction processing systems (TPSs), 21, 21–22, 374–382 activities, 380–382 for small and medium-size enterprises, 379–380 traditional, 375–379 transactions, 21 transborder data flow, 247–248 Transmission Control Protocol (TCP), 277 travel Web sites, 314 Tribes (Godin), 305 Index trigger points, 420 Trojan horses, 608 trust, lack of, in online purchasing, 340–341 TTF (Task-Technology Fit), 60 tunneling, 318 Turing, Alan, 465 Turing Test, 465–466 twisted-pair wire, 235–236 U UCAVs (unmanned combat air vehicles), 470 UDDI (Universal Discovery Description and Integration), 289 Ulevitch, David, 70 ultra wideband (UWB), 239 UML (Unified Modeling Language), 533 UMTS (Universal Mobile Telephone System), 243 unattended systems, 258 unified communication, GSSs, 443 unified communications, 262, 263 Unified Modeling Language (UML), 533 Uniform Resource Locators (URLs), 278 unit testing, 577 Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, 624, 625 Universal Discovery Description and Integration (UDDI), 289 Universal Mobile Telephone System (UMTS), 243 UNIX, 150 unmanned combat air vehicles (UCAVs), 470 unplanned projects, 514 unstructured interviews, 535 unstructured problems, 436 upgrades, software, 175 upper-CASE tools, 530 upstream management, 48 URLs (Uniform Resource Locators), 278 USA Patriot Act of 2001, 624, 625 use case diagrams, 533 use interface, expert systems, 478 user acceptance documents, 579 user documentation, 575 user interfaces, 142 command-based, 142 DSSs, 438, 440 user preparation, 576 user software, 159–165 users, 507 individual, 509–510 utility programs, 153, 153–156 utility software, categories, 156 UWB (ultra wideband), 239 V value added, 8 value chain, 48 variants, 608 versions, 582 very small aperture terminal (VSAT), 241 video, 484 online, 309–310 streaming, 484 video logs, 306 Video Privacy Act of 1988, 625 videoconferencing, 260, 260–261 virtual database systems, 221 virtual databases, 575 virtual memory, 144 virtual models, 351 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 667 Licensed to: iChapters User 668 Index | virtual organizational structure, 53, 53–55 virtual private cloud (VPC) service, 282 virtual private networks (VPNs), 256, 282, 318 virtual reality, 27, 485–489 applications, 487–489 forms, 486–487 immersive, 485 interface devices, 486 virtual reality systems, 485 virtual tape, 100 virtual tape servers, 100 virtual workgroups, 445 virtualization, 570 viruses, 608 visa programs, 71 vishing, 612 vision systems, 471 visual programming, 169 vitual workers, 260 vlogs, 306 voice mail, 258 voice mail-to-text service, 258 voice recognition, 472 volume testing, 577 VPC (virtual private cloud) service, 282 VPNs (virtual private networks), 256, 282, 318 VSAT (very small aperture terminal), 241 W Walters, Dean, 103 WANs. See wide area networks (WANs) war driving, 256 warehouse management software, 213 Waste Electrical and Electronic Equipment (WEEE), 125 Watowich, Stan, 97 Web, 16, 284, 284–289 blogging, 306–307 communication and collaboration, 300–304 content and application development, 289–291 e-commerce Web sites, 354–358 geolocation, 314–316 mapping, 314–316 media and entertainment, 307–312 mobile commerce sites, 342 online information services, 291–295 operation, 284–287 podcasting, 307 search engines and Web research, 296–299 shopping, 312–314 travel sites, 314 Web 2.0, 304–306 Web portals, 300 Web programming languages, 288–289 Web services, 289 Web 2.0, 16, 304, 304–306 rich Internet applications, 139, 288, 305–306, 306 social network sites, 304–305 Web analytics software, 297 Web application frameworks, 290 Web browsers, 284 Web logs, 16, 306, 306–307 Web plug-ins, 284 Web portals, 300 Web server software, e-commerce and m-commerce, 359 Web services, 289 Web Services Description Language (WSDL), 289 WEEE (Waste Electrical and Electronic Equipment), 125 WEP (wired equivalent privacy), 255 wide area decision networks, 445 wide area networks (WANs), 247, 247–248 wireless, 240–245 Wi-Fi, 239, 239–240, 280 Wi-Fi Protected Access (WPA), 255 wikis, 297–298 Wilson, Carl, 45, 46 WiMAX (Worldwide Interoperability for Microwave Access), 245 Windows 7, 145–146 Windows Embedded, 152 Windows Server, 150 Windows Server 2008, 150 Windows Vista, 145 Windows XP, 145 wired equivalent privacy (WEP), 255 wireless communications, 237–238 medium-range, 239–240 short-range, 238–239 wide area wireless network types, 240–245 wireless mesh, 243 wireless networks security, 255–256 wide area, 240–245 word processing software, 160, 161 Work Community Grid project, 97 work stressors, 629–630 workgroup application software, 165, 165–167 workgroup software, 444 workgroup sphere of influence, 140 workgroups, 140, 260 virtual, 445 workplace, 626, 629–630 avoiding health and environmental problems, 629–630 health concerns, 627 privacy, 619 workstations, 117, 121 The World is Flat (Friedman), 34–35 World Wide Web (WWW). See Web entries Worldwide Interoperability for Microwave Access (WiMAX), 245 worms, 608 WPA (Wi-Fi Protected Access), 255 WSDL (Web Services Description Language), 289 WWW. See Web entries X XHTML, 287 XML (Extensible Markup Language), 287, 289 XP (extreme programming), 523, 524 XXAgile Modeling, 523–524 XXCrystal, 523–524 XXDynamic Systems Development Method, 523–524 Y Yoshida, Kazuo, 437 Z ZigBee, 239 z/OS, 151 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | Index Company Names Numbers 8coupons, 347 7-Eleven, 248 1-800-flowers.com, 214 3M Company, 337 37signals, 281 1StopTireShop, 343 A ABC, 309, 622 ABI Research, 342 Accenture, 75, 76, 525, 571 AccuFund, 379 AccuWeather, 439 ACE Electric, 362 Acer, 119, 611 Achmea, 385 ACME, 393 AdMob, Inc., 347, 427 AdModa/Adultmoda, 347 Adobe, 14, 148, 159, 160, 164, 165, 281, 288, 289, 291, 305, 353, 463, 482–483, 484, 611 Advanced Research Projects Agency (ARPA), 276 Advent, 25, 461 Advertising.com/AOL, 347 Aéroports de Paris, 40–41 Aetna, 610 Aldra Fenester und Türen GmbH, 51 Allstate Insurance Company, 440 Aloft, 240 Alterian, 31 Amazon.com, 59, 75, 103, 116, 210, 212, 215, 282, 289, 308, 310, 312, 325, 333, 338, 344, 417, 510, 512, 525 Amazon Grocery, 312 AMC, 309 AMD, 96, 120, 571 Amdocs, 396 Amenities Inc., 437 American Airlines, 216 American Diversified Holdings, 65 American Express, 107, 361, 610 American National Standards Institute (ANSI), 206 American Psychiatric Association, 628 America Online (AOL), 296, 300, 302, 308, 310, 313, 616, 622 AMR Research, 356, 386 Amtrak, 74 Amusitronics, 486 AOK, 151 Apache, 359, 388 APL Global Container Transport, 132 Appirio, 273, 274 Apple Computer, 13, 16, 19, 20, 28, 66, 97, 115, 116, 118, 119, 120, 125, 127, 145, 146–147, 150, 155, 160, 164, 165, 210, 244, 245, 250, 251, 281, 304, 307, 308, 309, 310, 334, 352, 394, 429, 484, 490, 506, 509, 517, 571, 611, 612, 621, 629 Apple User Groups, 76 Applicor, 396 Applied Mathematics, 439 Applix, 219 Apptio, 67 Aquafil, 390 Aquent, 187–188 Archaeology Technologies Laboratory, 488 Ardexus, 396 Arts Umbrella, 455 Ascendant Technology, 480 ASFINAG Maut Service GmbH, 218 Asia Pacific Breweries Singapore, 243 Ask.com, 296, 297 Associated Press, 15, 292 Association for Computer Machinery (ACM), 76, 630 Association of Information Technology Professionals (AITP), 76 Asus, 119, 611 ATG, 331–332, 428 Atlanta, GA, 418 AT&T, 103, 150, 239, 243, 244, 245, 250, 251, 256, 264, 277, 280, 281, 341 Attensity, 31 Atwatch, 155 Audi, 439 Austar, 103 Austin Energy, 480 Autodesk, 27, 444, 454–455, 483 Autumn Leaves, 81 Avendra, 345 Avent, 356 Aviva, 103 Avon Products, 15, 273–274, 344, 353 B Baidu, 296 Ball Aerospace, 48 Bank of America, 16, 349, 575 Baptist Health Organization, 239 Barloworld Handling UK, 385–386 Barnes and Noble, 116, 333, 342, 353 Barracuda Networks, 154 Baxter Healthcare Corporation, 303 BBC, 292 B2B Computer Products, 333 BBVA, 57, 58 Bebo, 621 Bell South, 622 Berje, 391 Berkeley Graduate School of Journalism, 292 Bertelsmann AG, 255 Best Buy, 334, 342, 404, 571 Betawave, 428 Beth Israel Deaconess Medical Center, 15, 510, 573 Better Business Bureau, 340, 341, 626 Bidzcom, 335 Billerud, 434 Bing, 295, 296, 297, 314, 315 Bioshell, 390 Bit Defender, 616 Blackbaud, Inc., 455 Blancco, 580 Blue Moon Beads, 81 Blue Mountain Resort, 219 Blue Sky Studios, 121 BlueStar Energy Services, 181–182 BMG, 308 BMI, 308 BMW, 427, 549 Boehringer Ingelheim, 420 Boeing, 15, 27, 424, 488 Boku, 363 Borders, 338 Borland, 160 BOSaNOVA, 120 Boston College, 490 Boston Dynamics, 470 Boston Medical Center, 100 Box.net, 103 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 669 Licensed to: iChapters User 670 Index | Braskem S.A., 3–4 BRE Bank, 517 Brightkite, 202, 427 British Retail Consortium, 602 British Sky Broadcasting, 483 British Telecom (BT), 196, 232, 277, 622 BroadSpire, 355 Brooks Brothers, 215 Bruce Power, 601 Buchner Motorex, 395 Burger King, 429 Burt’s Bees, 389 Business Objects, 219 Business Software Alliance (BSA), 611 BuzzCity, 347 BVGARI, 45 C Cablevision, 236 Caldera, 149 Calpella, 245 Camp Logan Cement, 379–380 Canadian Press, 82 Canon, 106 Capgemini, 459 Carbonetworks, 564 Carbonite, 103 CareerBuilder.com, 76 Carnegie Mellon Robotics Institute, 470 Carnegie Mellon University, 468, 528 Cartoon Network, 410 Casio, 106 CBS, 309 CDW, 334 Cellfire, 347 Cengage Learning, 317 Center for Open Sustainable Learning, 293 Center for the Study of the Presidency and Congress, 146 CERN, 153, 284 Certiport, 293–294 Charles Schwab & Co., 349 Charlotte County, Florida Public School District, 236 Charm Boutique, 349 CheapTickets, 355 CheckFree, 339 Chevron, 491 Chicago Mercantile Exchange, 517, 518 Chicago & Northwestern Railroad, 132 Chico’s FAS, Inc., 221, 391 China Datang Corporation, 248 China Mobile, 244 Chrysler, 426, 440 CIA, 117, 604 CIM National Bank, 464 Cingular, 341 Circuit City, 404 Cisco Systems, 154, 231, 303, 325–326, 412, 509 Citibank, 352, 361 Citysearch, 342 Classmates, 621 Clear Channel Communications, 307 ClearContext, 302 Clearwire Corporation, 245 Clicker.com, 309 ClubCorp, 345 C2Net, 175 CNN, 309, 410, 622 CNN International, 620 Coca-Cola, 98, 491 Code Green, 218 Cognos, 219, 418, 591 Columbian Retirement Home, 603 Comcast, 31, 236, 245, 280, 281, 585 Comic Relief, 188 Commerce One, 621 Compiere, 388 Computer Associates, 472, 523 Computer Emergency Response Team (CERT), 613 Computerjobs.com, 76 Continental Airlines, 126 Convergys, 49 Conversion, 31 Corel, 160, 163, 164, 222 CortexPro, 464 Corus Automotive Engineering Group, 282 Coty Fragrance, 12 Council of Better Business Bureaus, 621 Counterpane, 615 Courtyard, 45 Cox Communications, 236 Craig’s List, 75–76, 314, 335, 342 Crate and Barrel, 342 Cray, 124 Creative, 115 Creativity Inc., 81–82 Crop in Style, 81 CrossView, 351 Cuil, 297 CVS Caremark, 618–619 CVS Corporation, 221, 389 D Dallas Cowboys, 393 Danger, Inc., 283 Dartmouth Smokehouse, 602 Dassault Systems, 27 Data Synch Systems, 254 Dean Health Plan (DHP), 376 Defense Advanced Research Projects Agenct (DARPA), 276, 470 Defense Information Systems Agency (DISA), 260 DEKA, 468 Dell Computer, 22–23, 66, 75, 115, 119, 120, 122, 127, 132, 133, 149, 239, 244, 245, 312, 333, 424, 564, 571, 611 Del Monte Foods, 615 Deloitte, 232 Deloitte & Touche, 424 Delphi Group, 464 Denver & Rio Grande Western Railroad, 132 DHL, 337, 389 Dice.com, 76 Digg, 292 Digital Insight, 63 Direct Marketing Association, 626 DLA Piper, 118 DND, 81 Docklands Light Railway, 246 Dooney & Bourke, 342 Doster Construction Company, 119 DoubleClick, 635 Doubletree Hotels, 19 Dow Chemical, 3 Dragon Hotel, 362 Drew Shoe Corporation, 355 Dropbox, 282 Drugstore.com, 396 DTR Research, 120 Dubai Bank, 404–405 Duke Energy, 49 Dunkin’ Donuts, 418 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | E E!, 309 eBay, 75, 150, 191, 212, 232, 289, 313, 314, 334, 335, 342, 353, 354, 361, 580, 605, 611 eBid, 335 eClinicalWorks, 573 Eclipse Foundation, 575 Eddie Bauer, 118 EDS, 75 Educational Credit Management Corp. (ECMC), 610 eHarmony.com, 212 eHow, 293 El Camino Hospital, 158 Electronic Data Systems, 525 Electronic Visualization Laboratory, 486 Element, 240 Embarcadero, 529 Embassy Suites, 19 EMC, 103, 561, 564 Emergency Medical Associates (EMA), 41 Emory University, 488 Empire Online, 311 Endeca Technologies, Inc., 24 ePier, 335 Epinions, 304 Epson, 571 Equifax, 508, 626 Ericsson, 341, 621 Estee Lauder, 427 Etailers Mall, 343–344 Etsy, 335 European Organization for Nuclear Research, 284 Excite, 334 Exeros, 439 Expedia, 199, 314, 355 Experian, 626 Exsys, 482 ExxonMobile, 3, 238 EZ-Xpert, 482 Index Fossil, 342 Four Seasons Hotels and Resorts, 240 FOX, 309 Fox News Channel, 622 Free Software Directory, 174 Free Software Foundation, 173 Frucall, 347 Fujitsu, 245, 611 G Gartner, 555 Gazelle, 30 G-Data, 616 Geek Squad, 75, 580 Genalytics, 216 Genentech, 517 General Electric, 66, 473, 557, 572 General Mills, 70 General Motors, 132, 262, 490 Genetech, 70 Gensym, 499 Geospatial, 336 Getco, 8 Ghana Investment Promotion Center, 61 Gillette, 62 Gilt, 349–350 G&J Pepsi-Cola Bottling Company, 133 Gmail, 301 GoDaddy, 399 Goodwill, 396 Google, 14, 19, 75, 103, 140, 141, 150, 152, 154, 158, 160, 164, 166–167, 171, 194, 202, 210, 212, 232, 245, 251, 264, 281, 282, 283, 288, 289, 292, 295, 296, 297, 300, 302, 304, 305, 306, 310, 311, 314, 315, 316, 334, 347, 353, 399, 417, 427, 433, 434, 459, 471, 509, 512, 574, 597, 609, 612, 636 Government Accountability Office, 111 Green Electronics Council, 126 Greenpeace, 125 Grupo AMSA SA, 247 Guardent, 615 F Fab Lab, 14, 490 Facebook, 16, 31, 32, 33, 55, 76, 137, 273–274, 281, 283, 288, 303, 304–305, 315, 325, 353, 410, 441–442, 444, 597–598, 621, 635 Fairfield, 45 Fairmont Hotels, 345 Fandango, 353 Fannie Mae, 584 FBI, 490, 604, 608, 636 Federal Financial Institutions Examination Council, 352 Federal Reserve Board, 605 FedEx (Federal Express), 5, 16, 17, 337, 338, 373–374, 375, 379, 389, 419–420 FGI Research, 343 Financial Accounting Standards Board, 392 Financial Industry Regulatory Authority, 513 First Fidelity, 525 Firstwave, 396 Fiserv, 339 Flambeau, 383 Flickr, 281, 288, 304, 315 Florida, State of, 526 Florida State University, 304 Fluid, 357 Flypaper, 281 Ford Motor Company, 153, 172, 427, 430, 490 ForeSee Results, 343 Forrester Research, 158, 164, 515, 555 H Hackensack University Medicine, 411 Hamilton County, Ohio, 606 Hands, 347 Harris Corporation, 111 Harris Interactive, 560 Hayes, 251 HCL Technologies Ltd, 82 Healthland, 25 Healthways Inc., 259 Heartland Payment Systems, 209, 339, 340, 610 Henny Penny, 263 Hess Corporation, 515 Hewlett Packard, 73 Hi5, 621 Hilton Hotels, 19 Hilton Worldwide, 19 Hip in a Hurry, 81 Hitachi Data Systems Corporation, 103 Holiday Inn Express, 19 Home Depot, 221 Honda Italia, 213 Honda Motors, 26, 27, 429, 467 Honeywell, 592 HopeLab, 27 HostWay, 355 HotJobs, 274 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 671 Licensed to: iChapters User 672 Index | Hotmail, 301 Hotwire.com, 549–550 HP (Hewlett-Packard), 103, 114, 119, 120, 121, 127, 132, 133, 141, 145, 149, 150, 151, 155, 175, 194, 195, 303, 338, 418, 445, 525, 564, 571, 585, 611 HPShopping.com, 344 HTC Corporation, 251, 612 HughesNet, 280 Hulu, 281, 309 Humane Society of the United States, 574 Hyatt, 345 Hybrid Assistive Limb (HAL) Laboratory, 470 Hyundai Motor America, 427 I IAG Research, 429 Ibidfree, 335 IBM, 13, 40, 57, 75, 81, 87, 93, 96–97, 103, 122, 123, 124, 132, 137–138, 140, 145, 146, 149, 150, 151, 155, 166, 175, 195, 198, 203, 209, 220, 221, 222, 228, 237, 259, 295, 304, 351, 357, 368–369, 393, 418, 430, 438–439, 444, 463, 472, 476, 480, 490, 506, 523, 524, 525, 529, 532, 570, 571, 574, 576, 580, 581, 585, 591, 611, 615–616, 622 IBM Research Laboratory, 206 IBS, 591 Idaho National Laboratory, 150 Identity Guard, 616 ID Watchdog, 616 iHealthRecord, 439 Illinois State University, 252–253 Imbee, 621 Imprint Business Systems, 482 IMS Health, 216 Incheon, South Korea, 454–455 Indian Ministry of External Affairs, 609 Infor Corporation, 51, 219 Infor Global Solutions, 396 Informix, 288 ING DIRECT Canada, 16 InMobi, 347 Innovative Marketing, 603 Institute for Policy Innovation, 611 Institute of Electrical and Electronic Engineers (IEEE), 233 Intacct, 396 Intel, 13, 90, 93, 94, 96, 119, 120, 121, 146, 147, 149, 245, 490, 571, 625 Intelitek, 468 IntelliVid, 157 Intercontinental Hotels Group, 345 Internal Revenue Service, 22, 392, 498 International Broadband Electric Communications, 237 International Energy Agency (IEA), 188 International Multilateral Partnership Against Cyber Terrorism, 604 International Telecommunication Union (ITU), 233–224 International Trade Commission, 612 International Underwriting Association (IUA), 221 Internaxx, 227 Internet Conga Line, 304 Internet Content Rating Association (ICRA), 622 Internet Corporation for Assigned Names and Numbers (ICANN), 278–279, 341 Internet Society (ISOC), 277 Intuit Corporation, 63, 160, 168, 210, 379–380 Invent Pharma, 65 I-O Display Systems, 486 Iomega, 115 Iridium Communications Inc., 241 IRobot, 468 ISM, Inc., 396 ITSM Academy, 395 J JasperSoft, 393 JCPenny, 158, 313 JDA Software, 391 JD Edwards, 387, 388, 409 JEA, 498–499 Jet Blue, 427 Jigsaw, 394 Jive Software, 420 JM Family Enterprises, 70 Johns Hopkins University, 470 Johnson & Johnson, 429 JP Morgan Chase, 508 Jubilations Cheesecake, 395 JumpStart.com, 293 Jumptap, 347 Jupiter Research, 611 K Kabbani Construction Group (KCG), 384 Kashi, 294 Kaspersky Lab, 616 Keane, Inc., 525 Kennedy Space Center, 442 Kijjiji, 335 Kindred Healthcare, 572 Kiva, 324–325, 421 Kmart, 630 KnowledgeBase, 464 Knowledge Management Consortium International, 464 Knowledge Management Resource Center, 464 Knowledge Management Solutions, Inc., 464 Knowledge Management Web Directory, 464 Kodak, 64, 68, 525 Kroger, 248, 334 L Laplink, 155 Laps Care, 60 Last.fm, 308 Law Clip Knowledge Manager, 464 Layar, 315 Leads Online, 605–606 Legato Systems, Inc., 103 LEGO, 505–506 Lenovo, 149, 245, 611, 614 LexisNexis, 299, 463 LG Phillips, 113 Library of Congress, 94, 311 Life Lock, 616 LimeWire, 611–612 Linde Group, 203 LinkedIn.com, 76, 148, 303, 304, 444 Lions Gate Entertainment, 429, 621 LLBean.com, 344, 360 Lloyd’s of London Insurance, 12, 221 Lockheed Martin, 603 Logica, 196 LoJack Corporation, 355 Loopt, 427, 433 Los Angeles, City of, 283 Lotus, 163, 164 Louisiana Bucket Brigade, 188 Lyons Bakeries, 167 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | M MAA Bozell, 61 Madhouse, 347 Magnify, 216 Mahalo, 296 Mandalay Bay Hotel & Casino, 239 Mantis Development Corporation, 488 MapQuest, 314 Marin Municipal Water District, California, 385 Marketing Architects, 101 Marriott, 19 Marriott International, Inc., 45–46, 345, 413, 429 Massachusetts General Hospital, 467 Massachusetts Institute of Technology (MIT), 5, 293, 294, 490 MasterCard, 107, 361, 363 Mayo Clinic, 627 Mazda, 368–369 McAfee, 154, 580, 616 McDonalds, 280 McMaster-Carr, 344 Media Grid, 485 Metacafe, 310 Microcom, 251 Micro Focus, 583 Microsoft, 14, 73, 75, 76, 103, 105, 108, 133, 140, 141, 142, 145, 147, 148, 150, 152, 153, 154, 155, 158, 159, 160, 161, 162, 163, 164, 165, 167, 168, 169, 171, 175, 194, 196, 198, 202, 203, 207, 209, 210, 212, 215, 219, 222, 231, 232, 239, 250, 281, 282, 283, 288, 289, 290, 291, 296, 297, 304, 305, 306, 308, 311, 315, 359, 384, 388, 393, 396, 399, 405, 414, 418, 437, 440, 444, 463, 483, 484, 491, 512, 528, 529, 532, 549, 555, 571, 572, 575, 611, 621, 622, 629, 636 Microsoft Mobile Advertising, 347 MicroStrategy, 219 Millennial Media, 347 Minardos Group, 380 Mindjet, 140 Mine Safety and Health Administration, 600 Mint Software, 424 Missouri-Kansas-Texas Railroad, 132 Missouri Pacific Railroad, 132 MITRE Corporation, 498 Mobileye, 490 Mobil Mammoth, 342 Monsanto, 70 Monster.com, 76, 274, 433 Motion Picture Association of America (MPAA), 352 Motorola, 61, 115, 146, 245, 251, 264, 341, 592 Mozilla, 285 Mozy, 103 MSI, 119 MSN, 297, 300, 301, 302, 313 mTLD (Top Level Domain Ltd.), 341 MTV, 309 MWEB, 616 MWH Global, 441, 462 MyOwnDB, 210 MySpace, 16, 31, 32, 33, 76, 98, 273, 303, 304, 342, 410, 441, 444, 597, 621 My Virtual Model, 312, 351 Index National Infrastructure Protection Center, 604 National Oceanic and Atmospheric Administration (NOAA), 89 National Public Radio, 307 National Telecommunications and Information Administration (NTIA), 242 National Weather Service, 241 Nationwide Auto Insurance, 122 Natural Selection, 66, 473 NCR Teradata, 216 NEATO, 387 Nestlé, 156 Netflix, 344 Net Suite, 158 NetSuite, 396 Network Solutions, 355 NeverFail, 561 Nevsun Resources, 507 Newcastle Permanent Building Association, 375 Newegg.com, 334, 344 Newmont Leeville Gold Mine, 109 News Corp UK, 82 Newsvine, 292 New York City, 335–336 New York City Police Department, 218 New York Stock Exchange (NYSE), 15, 68, 558 New York Yankees, 3 Next Generation Data, 196 Nickelodeon, 311 Nielsen, 31, 346, 601 Nikon, 106 Nissan Motor Company, 26, 563 Nokia, 125, 152, 239, 245, 341 Nokia Interactive Advertising, 347 North Carolina State Employees’ Credit Union, 89 North Coast Electric Company, 63 North Face, 357 Novell, 254 Nuance Communications, Inc., 472 Nvidia, 14, 471 O Objectivity, 220 Obopay, 363 Office Depot, 182–183, 334, 343 OfficeMax, 334, 342 Olympus, 106 On with Nature, 355 OpenBravo, 388 Open Courseware Consortium, 293 OpenDNS, 70 OpenPro, 379 OpenSteetMap, 298 Optima Technologies, 396 Optimum Energy, 564 Oracle, 41, 49, 156, 158, 164, 198, 203, 209, 210, 211, 213, 216, 219, 220, 222, 288, 387, 388, 393, 396, 409–410, 439, 523, 529, 571, 575, 580, 585 Orbitz, 199, 355 Organization of Petroleum Exporting Countries (OPEC), 188 Overstock.com, 386 Oxford Archaeology, 149 N Namesdatabase, 621 Napster, 308 NASA, 117 NASA Ames Research Center, 56 NASA Jet Propulsion Laboratory, 474 National Football League, 483 National Geographic, 227–228 P PacifiCare, 525 Pagemasters, 82 Palm, 19, 118, 250 Panasonic, 106, 245, 304 Pandora, 281, 308 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 673 Licensed to: iChapters User 674 Index | Papa Johns, 303, 489 ParaScale, 103 PARC (Palo Alto Research Center), 142 PartyGaming, 311 PayPal, 325 PBS, 309 PC Pinpoint, 580 Peapod, 312 Penril/Bay Networks, 251 Penske Truck Leasing, 16 Pentaho, 393 Pentax, 106 PeopleSoft, 387, 388 Pepsi, 82 Performance Management Institute, 25 PersonalHealthKey, 439 Pfizer, 29, 524 PFSWeb, 334 Pick n Pay, 22 Pitney Bowes, 221 Pixar, 484, 485 Podcast Alley, 309 Point360, 99–100 Popkin Software, 529 Porche, 65, 66 Porter Adventist Hospital, 470 Portfolio Monkey, 424 Portland, Oregon, City of, 584 PostgreSQL, 220 Precise Software Solutions, 585 PriceGrabber, 334 Priceline.com, 19, 314, 355 PricewaterhouseCoopers, 424 Privacy Rights Clearinghouse, 339 Privacy Study Commission, 623 Pro BTP, 259 Procter & Gamble, 55, 210, 231–232, 334, 424, 440, 442 Progressive Insurance Company, 517 Prosper, 422 Protect My ID, 616 Providence Washington Insurance Company, 418 Pudding Media, 347 Puma North America, 216 Purdue Employees Federal Credit Union, 352 Q Quadstone, 216 Qualcomm, 239, 341 Qualys, 574 Quantivo Corporation, 469 Quark, 160 Quattro Wireless, 347 QVC.com, 344 R Rabble+Rouser, 575 Radian6, 31 Raiffeisen Informatik GmbH, 218 Rapid Advance, 158 Razorfish, 210 REA Group, 316 RealSpace Vision Communication Inc., 487 Recording Industry Association of America, 611–612 Red Brick Systems, 216 Red Hat Software, 149, 151, 175, 259, 572, 612 Redwing, 379 Reebok, 393 REI Mobile, 342 Relavis, 396 Renaissance, 45 RentCell, 55 Residence Inn, 45 ResMed, 151, 202 ReSTART, 628 ResumePlanet.com, 312 Reuters, 292 Rhapsody, 308 Rheinmetal, 137–138 Right Group, 384 RIM, 19, 152 Riptech, 615 RiteAid, 389 Ritz-Carlton, 45 Robot Learning Laboratory, 468 Rockford, Illinois, City of, 606 RockYou, 340 Rolex, 65 Roundarch, 109 RSA, 218 Rural Utilities Service (RUS), 242 Ryder Levett Bucknall, 260–261 Ryder System, Inc., 555–556 S Sabre Airline Solutions, 524 Sacramento Municipal Utility District, 419 Safend, 218 Sage, 379, 380, 396 SalesForce, 14, 49, 158, 159, 273–274, 282, 305, 396, 427, 550, 555–556 Salespage Technologies, 396 Salzburg, Austria, 454–455 Samsung, 115, 116, 125, 245, 304 Sandia National Laboratories, 482 San Diego Gas and Electric, 70 SanDisk, 13, 101, 571 Santa Cruz Operations, 150 SAP, 3, 23, 41, 137, 158, 187, 219, 388, 391, 393, 395, 396, 404, 437, 463, 505–506, 515, 580, 602 SAS Institute, 216, 440 SBC Fulfillment, 389 SBI Funds Management, 105 SCAN, 53 ScanScout, 429 Schumacher Group, 439 Scitor, 160 Seagate, 102 Seaport Hotel, 90 Sears, 149, 158, 351, 630 Sears Canada, 156 Sears Holding Corporation, 334, 630–631 Second Life, 304, 427, 428, 488–489 Securian Financial Group, 70 Securities and Exchange Commission (SEC), 392, 412 Sendmail, Inc., 175 Serco Docklands, 246 Serena, 24, 434, 441–442 Seriosity, 302 SGI, 124 Shermag, 8, 413 ShopLaTiDa, 349 Shopzilla, 334 Shutterfly.com, 344 Siebel Systems, 387, 388 Sightward, 216 Singularity University, 56 Sirius XM Radio, 575 SkillSoft, 293 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: iChapters User | Skullcraft, 404 Skype, 220, 304 Smith Drug, 491 Société Générale, 602 Society for Information Management, 74 Software AG, 215 Software Engineering Institute, 528 Sonic Restaurants, 221 Sony, 93, 106, 115, 116, 152, 404, 427, 571, 611 Sony Music, 308 Sophos, 218 Southern Pacific Railroad, 132 Southwest Airlines, 417, 575 Sovereign Bank, 395 Spartan Foods of America, 392 Speak with a Geek, 75 Sportmaster Group, 591–592 Sprint, 277, 280, 310 Sprint Nextel, 243, 245, 264, 341 SPSS, 216, 440 St. Peters, Missouri Police Department, 106 Stanford University, 490 Staples, 26, 334, 353 Staples Inc., 433 Starbucks, 159, 313 Starwood Hotels, 240, 625 StatoilHydro, 413 StayInFront, 396 SteelEye, 561 Strayer University, 234 Success Factors, 158 SugarSync, 103, 282 Sunglass Hut, 342 Sun Microsystems, 147, 150, 151, 160, 163, 165, 288, 291 Sunoco, 74 Sun Trust Mortgage, 619 SuSE, 151 Swedish Medical Center, 157, 262 Sybase, 175, 198, 203, 209, 215, 216 Symantec, 103, 153, 154, 160, 218, 414, 615, 616 Sysco, 49, 429 T Tactician Corporation, 433 Tagged, 621 Tandem, 216 Target, 313, 334, 342, 348, 389, 404, 424 Tasty Baking Company, 581 TD Ameritrade, 605 Teamspace, 55 Technology Research Institute, 194 TeleNav, 264 Teliasonera, 244 TELUS Corporation, 123 Tesla, 109 Texas, State of, 194 TheLadders.com, 76 The Rivers, 108 The Shack, 571 Thinkfree, 164 Ticketmaster Entertainment, 20, 248 Tickets, 20 TigerDirect.com, 344 Time Warner, 236, 245, 410, 427 TJX Companies, 209 T-Mobile, 243, 244, 264, 280, 283 Tokio Marine and Nichido Fire Insurance Company, 120 Tommy Hilfiger, 331–332 TopCoder, 72 Toronto Star, 82 Index Toshiba, 92, 93, 119, 245, 611, 614 Touch Bionics, 490 Toyota, 172, 429 Toyota Material Handling USA (TMHU), 378 Trackvia, 210 Tradus, 335 Transco, 482 Transplace, 61 Transportation Security Agency (TSA), 584 TransUnion, 67, 625, 626 TravelCell, 55 Travelocity, 199, 314, 355 Trend Micro, 218 Trimac Corporation, 376–377 TRUSTe, 340, 341, 626 Trusted ID, 616 Tru-Test, 409–410 Turboinstitute, 87–88 Tween Brands, 439 TweetPhoto, 427 Twitter, 16, 32, 76, 137, 202, 273, 283, 303, 304, 305, 315, 342, 351, 427, 444, 584, 585, 620 U Ubid, 335 UNAIDS, 233 Unesco, 311 Unilever, 427 Union Pacific (UP), 132 United Nations, 188, 234 United Parcel Service (UPS), 62, 337, 375, 389, 417, 574, 592, 625 U.S. Air Force, 66, 470, 473 U.S. Army, 27, 241, 474, 579 U.S. Bureau of Labor Statistics, 70 U.S. Census Bureau, 111 U.S. Civil Service Commission, 623 U.S. Coast Guard, 439 U.S. Cyber Consequences Unit, 584 U.S. Department of Defense, 215, 276, 498, 613, 623 U.S. Department of Energy, 123, 564 U.S. Department of Health and Human Services, 619 U.S. Department of Homeland Security, 106, 498, 604 U.S. Department of Justice, 599 U.S. Department of Veterans Affairs, 498, 610 U.S. Environmental Protection Agency, 125, 126, 196, 563 U.S. Federal Aviation Administration, 498 U.S. Federal Bureau of Investigation, 190 U.S. Federal Communication Commission (FCC), 242, 292 U.S. Federal Trade Commission (FTC), 259, 427, 616, 618–619, 635 U.S. General Services Administration, 482, 512 U.S. Geological Survey, 600 U.S. Green Building Council, 563 U.S. Livermore National Laboratories, 13 U.S. Marines, 488 U.S. Navy, 439 U.S. Patent Office, 612 U.S. Postal Service, 256, 626 U.S. Robotics, 251 U.S. Supreme Court, 622 Univa UD, 282 Universal Music, 308 University Corporation for Advanced Internet Development (UCAID), 276 University of Alabama, 71 University of California Los Angeles (UCLA), 488 University of Florida-Gainesville, 610 University of Maryland, 628 University of Miami, 70 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 675 676 Index | University of Pennsylvania, 70 University of Texas Medical Branch (UTMB), 97 University of Warwick Digital Lab, 486 UNIX Systems Lab, 150 Upland International, 423 Upper Big Branch Mine, 600 Uptrends, 155 Urbanspoon, 210, 282 USAA, 70 Utah Division of Wildlife, 359 UUNet, 622 V Valero Energy, 446 Valpak, 348 Vancouver, Canada, 454–455 Varolii Corporation, 417 Veripark, 405 VeriSign, 56 Veritas Software Corporation, 103 Verizon, 61, 70, 237, 243, 244, 245, 251, 264, 277, 280, 341, 622 Vermont, State of, 195 Versant, 220 Viacom, 76 VictoriaSecret.com, 344 Village Books, 303 Virgin Blue, 61 Virginia Housing Development Authority, 163 Virtual Realities, 486 Visa, 107, 350, 361, 610, 625 Visa Canada, 107 Visible Systems Corporation, 529 Visible Technologies, 31 VistaPrint, 563 VMware, 133 Vocollect, Inc., 491 Vodaphone, 66, 251, 524, 578 Voltaic Generator, 564 Warner Music, 308 Waste Management, Inc., 386 Weber Grills, 575 WebEx, 445, 469 WebMD, 439 Wells Fargo, 62 Western Pacific Railroad, 132 Westrim Crafts, 81 Weta Digital, Ltd, 121 Wetpaint, 298 Widget Software, 155 Wi-Fi Alliance, 239 Wikimedia, 298 Wikipedia, 297–298, 299, 304, 325, 342, 498, 622 Wikispaces, 298 Windstream Communication, 346 Winn-Dixie, 122 Wipro Technologies Ltd., 9, 49, 53, 74, 82, 525, 563 Workday, 396 World Digital Library (WDL), 311 World Wide Web Consortium (W3C), 212, 284, 621 Wrangler Jeans, 368–369 Wyse, 120 x Xcerion, 305 Xerox, 68, 142, 413 Xiotech, 103 Xobni, 302 XuQa, 621 Y Yahoo!, 75, 232, 281, 292, 295, 296, 297, 300, 302, 308, 310, 313, 334, 353, 424, 508, 597 YOC Group, 347 YourTechOnline.com, 580 YouTube, 281, 292, 304, 310, 325, 410, 427 Yowza, 347 YuMeNetworks, 429 W Waldenbooks, 333 Walgreens, 62, 342, 389, 439 Wall Street Systems, 121 Wal-Mart, 8, 49, 65, 149, 158, 167, 192, 308, 313, 334, 343, 345, 389, 424, 575 Walt Disney Internet Group, 625 Ward Systems Group, 473 Z Zavers, 347 Znode, 355 Zobrist Consulting Group, 357 Zoho, 159, 164, 281, 298 Zynga, 305 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.