The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

Principles of Information Systems 13th Edition 2018

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Pusat Sumber Al-Fairuz KVSP2, 2021-08-04 01:16:24

Principles of Information Systems 13th Edition 2018

Principles of Information Systems 13th Edition 2018

Keywords: Principles of Information Systems 13th Edition 2018

628 PART 5 • Information Systems in Business and Society

Key Terms Fourth Amendment
law
Children’s Online Privacy Protection Act (COPPA) morals
code of ethics
ergonomics
filtering software

Chapter 14: Self-Assessment Test

Policies and procedures must be established to 8. is a tool used by the NSA and FBI
avoid waste and mistakes associated with computer
usage. to access the servers of major Internet services

such as Facebook, Google, YouTube, and others

1. Wasting time online costs U.S. businesses more to collect the content of emails, video, photos, file
than annually.
a. $385 billion transfers, and live chats.
b. $285 billion
c. $185 million 9. In 2015, the European Court of Justice found that
d. $85 billion
the Safe Harbor Framework (an agreement that
2. Which of the following is not a common
computer-related mistake? had been in place since 2000 between the United
a. Programming errors
b. Shopping online while at work States and the European Union (EU), allowing the
c. Data-entry or data-capture errors
d. Errors in handling files transfer of personal data from the EU to the

3. The Government Accounting Office uncovered United States) did not adequately protect the
a total of $321 million spent in the six-year
period 2008 to 2013 on projects that duplicated personal data of citizens residing in EU countries.
other efforts within the Defense Department,
Department of Homeland Security, and the True or False?
Department of Health and Human Services.
True or False? 10. The Children’s Online Privacy Protection Act

4. Preventing waste and mistakes involves estab- (COPPA) was passed by Congress in October
lishing, implementing, monitoring,
and policies and procedures. 1998. This act, directed at Web sites catering to

5. Few companies have found it necessary to limit children, requires site owners to post compre-
employee access to non-work-related Web sites.
True or False? hensive privacy policies and to obtain parental

The use of technology requires balancing the needs consent before they collect any personal infor-
of those who use the information that is collected
against the rights of those whose information is mation from children under years
being used.
of age.

a. 10

b. 13

c. 18

d. 21

Jobs, equipment, and working conditions must be
designed to avoid negative health effects from
computers.

11. Heavy computer use can negatively affect one’s

physical health. True or False?

12. Two primary causes of computer-related health

problems are a poorly designed

6. The United States has implemented few laws and failure to take regular breaks to stretch the

addressing personal privacy. True or False? muscles and rest the eyes.

7. The imposes limitations on the 13. The study of designing and positioning computer

bulk collection of the telecommunications meta- equipment is called .

data of U.S. citizens; prohibits large-scale indis- Practitioners in many professions subscribe to a
code of ethics that states the principles and core
criminate data collection (such as all records values that are essential to their work.

from an entire zip code); and requires the NSA

to obtain permission from the Foreign Intelli- 14. Morals are one’s personal beliefs about right and

gence Surveillance Court (FISC) to access the wrong, whereas the term describes

metadata records, which are now held by tele- standards or codes of behavior expected of an

communication companies rather than by the individual by a group (nation, organization, and

government. profession) to which an individual belongs.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 14 • Ethical, Legal, and Social Issues of Information Systems 629

15. Just because an activity is defined as legal does and boasts more than 200,000 members in more
not mean that it is ethical. True or False? than 120 countries. True or False?

16. Founded in 1977, the Association for Computing
Machinery (ACM) is the oldest computing society

Chapter 14: Self-Assessment Test Answers

1. d 9. True
2. b 10. b
3. True 11. True
4. reviewing 12. work environment
5. False 13. ergonomics
6. False 14. ethics
7. USA Freedom Act (2015) 15. True
8. PRISM 16. False

Review Questions 7. What is sexting? What issues can arise from
sexting?
1. What issues and problems are raised by the use of
unintegrated information systems? 8. What is mobile crowd sensing? How might it be
used?
2. What is ergonomics? How can it be applied to
office workers? 9. Provide a brief summary of the various attempts
by Congress to limit children’s exposure to online
3. Provide a few examples of actions organizations pornography,
are taking to help eliminate workers’ nonpro-
ductive computer-related activity. 10. In collecting telephone call data, what is meta-
data? How might it be used?
4. What is the First Amendment? What is the Fourth
Amendment? What rights do they guarantee? 11. What changes did the USA Freedom Act make in
the collection and viewing of telephone call
5. What is meant by “reasonable expectation of pri- data?
vacy”? How does this impact the application of
the Fourth Amendment? 12. What is a code of ethics? Give an example.

6. What is the purpose of the Safe Harbor Frame-
work and Privacy Shield?

Discussion Questions forth? Should such sharing of data be prohibited or
does it sometimes provide a useful service?
1. Identify recent examples of information system 5. What are your feelings about the PRISM tool used
snafus causing disruptions. Do research to iden- the FBI and NSA to collect private electronic data
tify the root cause of the problem. belonging to users of major Internet services
without having to request this data from the
2. Identify and briefly discuss the most common service providers and without having to obtain
examples you observe of coworkers wasting individual court orders?
time in nonproductive use of information 6. Imagine that you are starting a dating Web site to
system resources. Do you believe your help match compatible couples. What sort of
organization should take action to limit or end personal data might you need to gather? What
to these practices? What actions could be measures would need to be taken to protect this
taken? sensitive data? What key statements would
potential users likely want to see in the privacy
3. Do you feel that the measures in place to protect statement of this Web site?
your personal data you provide to health care 7. Your 13-year-old nephew shows you a half-dozen
organizations are sufficient? Why or why not? or so innocent photos of himself and a brief
What would you like to see changed? biography, including address and cell phone
number that he plans to post on a social network
4. How do you feel about the data you provide your
bank being shared with other financial institutions
who can use that data to tailor special offers and
promotions for you to refinance your home, obtain
an auto loan, buy additional insurance, and so

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

630 PART 5 • Information Systems in Business and Society

for teens. What advice might you offer him about 9. Do you think that there is a difference
posting personal information and photos? between acting ethically and acting legally?
8. Identify and briefly discuss a difficult decision Explain.
you had to make that had some ethical consid-
erations. How do you feel about your decision- 10. Should employers be able to monitor the email,
making process in reaching a decision in this text, and phone calls of employees? Is there any
case? With 20–20 hindsight, is there anything you degree of “monitoring” that you find acceptable/
would have done differently? unacceptable?

Problem-Solving Exercises study this network analysis, what conclusions
might they draw about you?
1. Do research to identify the latest findings on 3. Create an algorithm that rates how well indivi-
the negative effects of sitting for long hours duals protect their privacy based on the data they
working at a computer. Find recommendations reveal in their user profile and postings to social
on how to arrange your desk and computer networks. The algorithm should generate a score
to avoid health problems. Prepare a brief pre- of 0 for anyone who is completely oblivious of
sentation that summarizes your findings and the need to protect their privacy and identity and
identifies what can be done to offset these 100 for someone who does an excellent job at
negative effects. this. Factors to consider include how discrete
they are in revealing personal information such
2. Organizational network analysis is a method for as sexual orientation, health conditions, addic-
studying communication among individuals. tions, income data, and personal details about
Read the article: Making the Invisible Visible: friends. Now test your algorithm using data from
SNA of the NSA by Joseph A.E. Shaheen at https:// two of your contacts. Based on the results, adjust
www.josephshaheen.com/nsa-sna-xkeyscore/370. the algorithm as you see fit. Now test the revised
The NSA uses the techniques described there to algorithm with two other contacts. Summarize
analyze communications among individuals. Use your findings from this exercise.
graphics software to create an organizational
network analysis that depicts your email and text
communications for a week. If someone were to

Team Activities team would use to assess the effectiveness of
these policies and procedures in reducing mis-
1. Your team has been asked to develop your takes, waste, and costs.
school’s first student code of ethics. How might 3. Have each member of your team access six dif-
you approach this task? Who might you try to ferent Web sites and summarize their findings in
involve? What might be some key tenants of such terms of the existence of data privacy policy
a code of ethics? statements. Did each site have such a policy? Was
it easy to find? Did it seem complete and easy to
2. Imagine that your team has been hired to conduct understand? Does it adequately cover any con-
a review of the information system policies and cerns you might have as a visitor to that site?
procedures employed in the student registration
department at your school or university. Develop
a list of at least 10 specific questions that your

Web Exercises 2. Do research to determine the current status of the
Privacy Shield as a framework for governing
1. Do research on Edward Snowden the U.S. transborder data flow. Write a brief report sum-
computer professional, former Central Intelli- marizing your findings.
gence Agency employee, and former contrac-
tor for the United States government who 3. Request a current copy of your free credit report
copied and leaked classified information through the AnnualCreditReport.com Web site.
from the National Security Agency in 2013 Review the report carefully for any inaccuracies.
without prior authorization. Do you consider Follow the necessary steps to remove these
him to be a traitor, patriot, or something inaccuracies.
else? Why?

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 14 • Ethical, Legal, and Social Issues of Information Systems 631

Career Exercises

1. You have been offered an entry-level manage- other data that has been obtained through For-
ment position with a military aircraft manufac- eign Intelligence Surveillance Court (FISC) orders
turer. Due to national security concerns, the in an attempt to identify terrorists and stop
organization has very strong policies against the impending terrorist acts. Obviously, you will not
personal use of computers and smartphones be able to talk to anyone about your work; how-
while you are at ework. They have also made it ever, your total compensation will be more than
clear that all forms of employee communications 10 percent greater than any position for which
are closely monitored to avoid the intentional or you have applied. Would you accept this posi-
unintentional leak of classified material. How tion? Why or why not?
might these policies affect your decision to accept 3. Do research to find any professional organization
a position with this firm? or code of ethics associated with your current or
desired future career. What might be the benefits
2. You have been approached by the NSA to work of joining such a professional organization? How
in an information systems group that will use might a code of ethics help guide you in career-
high-powered computers and advanced analytic related decision making?
techniques to study phone call metadata and

Case Studies

Case One In the weeks following the shootings, Apple
representatives cooperated with the FBI’s investigation,
FBI Orders Apple to Unlock iPhone providing some older data backups from the phone as well as
suggesting possible methods the agency could use to access
On December 2, 2015, Syed Rizwan Farook and Tashfeen the data on the phone itself. The company balked, however,
Malik burst into a holiday gathering of county employees at when the FBI demanded that the company develop new
the Inland Regional Center in San Bernardino, California, and software that would disable the functionality that wipes the
began shooting—ultimately killing 14 people and wounding phone’s memory when too many wrong passcodes are entered
another 21. In the hours after the attack, the couple became in a row. The FBI also wanted Apple to eliminate the built-in
involved in a shootout with police, and both were killed. delay between passcode attempts, which, by Apple’s
estimates, meant that a brute-force attack on a phone with a
With their deaths, the investigation into the deadliest six-digit passcode could take more than five years to complete.
terrorist attack in the United States since September 11, 2001,
entered a new phase, as hundreds of FBI agents in California The FBI’s demand that Apple develop new software that
and around the world began investigating the attackers’ would allow it to unlock the phone in this case is an extension
online and offline activities in the hours, weeks, and months of an ongoing debate about whether tech companies should
leading up to the shootings. In addition to the stockpile of be compelled to build a “backdoor” into their software that
weapons and homemade pipe bombs found in the home of would allow the government to access data even when secure
Farook and Malik, investigators found multiple electronic encryption has been used to protect it. Without it, some law
devices. While attempts had been made by the couple to enforcement experts warn, the United States could be faced
delete data and damage some of the devices, FBI Director with the prospect of what has been dubbed the “Going Dark”
James Comey reported two weeks after the attack that problem, which some experts fear would lead to the inability
investigators had found private messages between the two of law enforcement to access electronic data even with a
that showed their “joint commitment to jihad and to warrant. That concern was heightened for some when Apple
martyrdom.” In addition, Malik posted a note on Facebook announced in 2014 that it had altered its software so that it
shortly after the shootings, pledging the couple’s allegiance was no longer “technically feasible for us to respond to
to the leader of ISIS, a terrorist network also known as the government warrants for the extraction of data from devices”
Islamic State. running iOS 8 or later versions of that software.

In order to further investigate possible connections to On February 16, 2016, a U.S. magistrate in California
extremist groups, the FBI attempted to access the data on an ordered Apple to assist the government by creating a custom
iPhone used by Farook. The phone, which belonged to version of iOS that would run only on the iPhone in question
Farook’s employer, the San Bernardino County Health and that would provide the functionality demanded by the
Department, was locked by a passcode, and neither the FBI. In its motion requesting the order, the Department of
county nor the FBI were able to unlock the phone. The iOS Justice cited the All Writs Act, a law signed by President
software installed on Apple’s phones allows only 10 George Washington, which, among other things, gives
unsuccessful passcode attempts before it wipes the phone’s federal judges the power to issue court orders compelling
memory clean. This security feature prevented the FBI from people to do things within the limits of the law and which
attempting a “brute-force” attack, which is essentially a trial- has frequently been used as the basis for court orders
and-error method in which all possible passcodes are tried compelling telecommunications companies to install and
systematically until the correct one is uncovered.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

632 PART 5 • Information Systems in Business and Society

operate call-tracking devices. In its filing, the DOJ alleged Clues, but No Clear Motive,” New York Times, December 3, 2015, www
that Apple “deliberately raised technological barriers that .nytimes.com/2015/12/04/us/san-bernardino-shooting.html?_r=0; Gold-
now stand between a lawful warrant and an iPhone man, Adam and Mark Berman, “FBI: San Bernardino Attackers Didn’t
containing evidence related to the terrorist mass murder of Show Public Support for Jihad On Social Media,” Washington Post,
14 Americans.” December 16, 2015, www.washingtonpost.com/news/post-nation/wp
/2015/12/16/fbi-san-bernardino-attackers-didnt-show-public-support
Apple challenged the judge’s order, arguing that it would -for-jihad-on-social-media; Green, Chloe, “Brute Force Attacks: How You
set dangerous legal precedent. The company also issued a Can Stop Hackers Breaking Your Door In,” Information Age, May 11,
statement on its Web site that said, in part, “The implications 2016, www.information-age.com/technology/security/123461414/brute
of the government’s demands are chilling. If the government -force-attacks-how-you-can-stop-hackers-breaking-your-door; “Opera-
can use the All Writs Act to make it easier to unlock your tional Technology: Going Dark Issue,” Federal Bureau of Investigation,
iPhone, it would have the power to reach into anyone’s www.fbi.gov/about-us/otd/going-dark-issue, accessed May 9, 2016;
device to capture their data. The government could extend Panzarino, Matthew, “No, Apple Has Not Unlocked 70 iPhones for Law
this breach of privacy and demand that Apple build Enforcement,” TechCrunch, February 18, 2016, http://techcrunch.com
surveillance software to intercept your messages, access your /2016/02/18/no-apple-has-not-unlocked-70-iphones-for-law-enforce
health records or financial data, track your location, or even ment; Palazzolo, Joe and Devlin Barrett, “Roots of Apple-FBI Standoff
access your phone’s microphone or camera without your Reach Back to 2008 Case,” Wall Street Journal, www.wsj.com/articles
knowledge.” According to Apple, “Opposing this order is not /roots-of-apple-fbi-standoff-reach-back-to-2008-case-1460052008?
something we take lightly. We feel we must speak up in the mg=id-wsj; Timberg, Craig, “Apple Will No Longer Unlock Most iPhones,
face of what we see as an overreach by the U.S. government.” iPads for Police, Even with Search Warrants,” Washington Post,
September 18, 2014, www.washingtonpost.com/business/technology
The case took another turn before the scheduled court /2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html;
hearing on the issue in March 2016, when the Justice Lewis, Danny, “What the All Writs Act of 1789 Has to Do with the
Department announced that it had successfully accessed the iPhone,” Smithsonian, February 24, 2016, www.smithsonianmag.com
contents of the phone using a tool provided the government /smart-news/what-all-writs-act-1789-has-do-iphone-180958188/?no-ist;
by an unnamed third party. After its announcement, the Hollister, Sean and Connie Guglielmo, “How an iPhone Became the FBI’s
Justice Department withdrew its motion to compel Apple to Public Enemy No. 1 (FAQ),” CNET, February 25, 2016, www.cnet.com
develop the requested software; however, according to a /news/apple-versus-the-fbi-why-the-lowest-priced-iphone-has-the-us-in-
Justice Department spokeswoman, “It remains a priority for a-tizzy-faq; “A Message to Our Customers,” Apple, February 16, 2016,
the government to ensure that law enforcement can obtain www.apple.com/customer-letter; Barrett, Devlin, “FBI Paid More than $1
crucial digital information to protect national security and Million to Hack San Bernardino iPhone,” Wall Street Journal, April 21,
public safety, either with cooperation from relevant parties, 2016, www.wsj.com/articles/comey-fbi-paid-more-than-1-million-to
or through the court system when cooperation fails.” -hack-san-bernardino-iphone-1461266641; Zetter, Kim, “Apple’s FBI
Battle Is Complicated. Here’s What’s Really Going On,” Wired, February
Critical Thinking Questions 18, 2016, www.wired.com/2016/02/apples-fbi-battle-is-complicated
-heres-whats-really-going-on; Barrett, Devlin, “Judge Sides with Apple in
1. Why did Apple object to the court order in this case? N.Y. Drug Case Involving Locked Phone,” Wall Street Journal, March 1,
What was the government’s rationale for compelling 2016, www.wsj.com/articles/judge-sides-with-apple-in-drug-case-invol
Apply to comply with the order? ving-locked-phone-1456785910.

2. Do you think Americans should be willing to surrender Case Two
some of their privacy for increased security by allow-
ing backdoors that enable law enforcement access to Protecting Health Care Privacy
smartphones and other devices after a search warrant The U.S. Health Insurance Portability and Accountability
has been issued? Why or why not? Act (HIPAA) addresses (among other things) the privacy of
health information. Title 2 of the act regulates the use and
3. The FBI and Apple are involved in similar disputes in disclosure of protected health information (PHI), such as
other cases, including one in New York involving an billing services, by healthcare providers, insurance carriers,
alleged drug conspiracy. Shortly before the govern- employers, and business associates.
ment dropped its legal action against Apple in the San
Bernardino case, the judge in the New York case ruled Email is often the best way for a hospital to communicate
against the government, rejecting the argument that with off-site specialists and insurance carriers about a patient.
the All Writs Act gave prosecutors the authority to Unfortunately, standard email is insecure. It allows
compel Apple to bypass the lock on the seized phone. eavesdropping, later retrieval of messages from unprotected
Do your opinions about the issues involved in the San backups, message modification before it is received, potential
Bernardino case change when they arise in connection invasion of the sender’s privacy by providing access to
with a case that does not have national security impli- information about the identity and location of the sending
cations? Why or why not? computer, and more. Since healthcare provider email often
includes PHI, healthcare facilities must be sure their email
SOURCES: Almasy, Steve, “FBI Asks for Help Filling in San Bernardino systems meet HIPAA privacy and security requirements.
Terrorist Attack Timeline,” CNN, January 5, 2016, www.cnn.com/2016
/01/05/us/san-bernardino-terrorist-attack; Nelson, Joe, “Investigation Children’s National Medical Center (CNMC) of
into San Bernardino Mass Shooting Will Be ‘Expansive and Expensive’,” Washington, D.C., “The Nation’s Children’s Hospital,” is
San Bernardino County Sun, www.sbsun.com/general-news/20151220 especially aware of privacy concerns because its patients are
/investigation-into-san-bernardino-mass-shooting-will-be-expansive children. CNMC did what many organizations do when faced
-and-expensive; Medina, Jennifer, Richard Perez-Pena, Michael S. with a specialized problem: rather than try to become
Schmidt, and Laurie Goldstein, “San Bernardino Suspects Left Trail of specialists or hire specialists for whom the hospital has no
long-term full-time need, it turned to a specialist firm.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 14 • Ethical, Legal, and Social Issues of Information Systems 633

CNMC chose Proofpoint of Sunnyvale, California, for its user organization’s server necessarily relies on that
security as a service (SaaS) email privacy protection service. organization to manage storage; for example, deleting
Matt Johnston, senior security analyst at CNMC, says that messages from the server after four weeks as HIPAA
children are “the highest target for identity theft. A small kid’s requires.
record is worth its weight in gold on the black market. It’s
not the doctor’s job to protect that information. It’s my job.” As people become more aware of the privacy risks
associated with standard email, the use of more secure
Johnston explains that he likes several things about the solutions such as these will undoubtedly become more
Proofpoint service: common in the future.

● “I don’t have to worry about backups.” Proofpoint han- Critical Thinking Questions
dles those.
1. What requirement does HIPAA institute to safeguard
● “I don’t have to worry about if a server goes down. [If it patient privacy?
was a CNMC server, I would have to] get my staff
ramped up and bring up another server. Proofpoint does 2. Universities use email to communicate private
that for us. It’s one less headache.” information. For example, an instructor might
send you an email explaining what you must do to
● “We had a product in-house before. It required several raise your grade. The regulations about protecting
servers which took a full FTE [full-time employee] just to that information under the Family Educational
manage this product. It took out too much time.” Rights and Privacy Act (FERPA) are not as strict
as those under HIPAA. Do you think they should
● “Spam has been on the rise. Since Proofpoint came in, be as strict as HIPAA’s requirements? Why or
we’ve seen a dramatic decrease in spam. It takes care of why not?
itself. The end user is given a digest daily.”
3. How does Proofpoint safeguard patient privacy? Could
● Email can be encrypted or not, according to rules that Proofpoint do the same for university and corporate
the end user need not be personally concerned with. emails? Why or why not?

● “Their tech support has been great.” SOURCES: Children’s National Medical Center Web site, www.children
snational.org, accessed August 28, 2014; LuxSci Web site, www.luxsci
Proofpoint is not the only company that provides .com, accessed August 28, 2014; Proofpoint Web site, www.proofpoint.
healthcare providers with email security services. LuxSci of com, accessed August 28, 2014; Staff, “HIPAA Email Security Case Study:
Cambridge, Massachusetts, also offers HIPAA-compliant Children’s National Medical Center,” Proofpoint, www.youtube.com
email hosting services, as do several other firms. They all /watch?v=RVaBaNvwkQE, accessed August 7, 2014.
provide the same basic features: user authentication,
transmission security (encryption), logging, and audit.
Software that runs on the provider’s computers can also
deliver media control and backup. Software that runs on a

Notes

1. Vest, Joshua R., Issel, L. Michele, and Lee, Sean, “Expe- 2016, www.wsj.com/articles/the-key-to-getting-workers
rience of Using Information Systems in Public Health -to-stop-wasting-time-online-1457921545?mg=id-wsj.
Practice: Findings from a Qualitative Study,” February 5, 7. “New CareerBuilder Survey,” CareerBuilder.
2014, www.ncbi.nlm.nih.gov/pmc/articles/PMC 8. Zakrzewski, “Stop Wasting Time Online.”
3959909/. 9. Rein, Lisa,” Watchdog: IRS Sent Out $46M in Tax
Refunds Flagged as Potentially Fraudulent,” Chicago
2. Thibodeau, Patrick, “Government Wants to Increase IT Tribune, December 23, 2015, www.chicagotribune
Spending 1.3% in Proposed Budget,” Computerworld, .com/news/nationworld/ct-irs-tax-refunds-flagged
February 9, 2016, www.computerworld.com/article -fraudulent-20151223-story.html.
/3031664/it-management/government-wants-to-increase 10. Kaste, Martin, “2 Prisoners Mistakenly Released Early
-it-spending-13-in-proposed-budget.html. Now Charged in Killings,” NPR, January 1, 2016, www
.npr.org/2016/01/01/461700642/computer-glitch-leads
3. Gallagher, Sean, “De-Dupe Time: GAO Finds $321 -to-mistaken-early-release-of-prisoners-in-washington.
Million in Redundant Government IT Spending,” Ars 11. Lorenzetti, Laura, “NYSE Explains Why It Went Down
Technica, September 17, 2013, http://arstechnica.com Wednesday,” Fortune, July 9, 2015, http://fortune.com
/information-technology/2013/09/de-dupe-time /2015/07/09/nyse-explains-why-it-went-down-
-gao-finds-321-million-in-redundant-government-it wednesday.
-spending. 12. Gandel, Stephen, “This Is Why the NYSE Shut Down
Today,” Fortune, July 8, 2015, http://fortune.com/2015
4. “Federal Strategic Sourcing Initiative (FSSI),” General /07/08/nyse-halt.
Services Administration, accessed May 6, 2016, www.gsa 13. Golson, Jordan, “Honda Accidentally Charges Many
.gov/portal/content/105156. Customers Twice for Single Car Payment,” Verge, April 6,
2016, www.theverge.com/2016/4/6/11380448/honda-
5. “New CareerBuilder Survey Reveals the Most Common car-payment-overcharge-double-price-error-mistake.
and Strangest Productivity Killers at Work,” Career- 14. Lutz, Hannah, “Honda ’Working Feverishly’ to Fix Cus-
Builder, June 11, 2015, www.careerbuilder.com/share tomer Billing Glitch,” Automotive News, April 6, 2016,
/aboutus/pressreleasesdetail.aspx?sd=6%2F11%
2F2015&id=pr898&ed=12%2F31%2F2015.

6. Zakrzewski, Cat, “The Key to Getting Workers to Stop
Wasting Time Online,” Wall Street Journal, March 13,

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

634 PART 5 • Information Systems in Business and Society

www.autonews.com/article/20160406/OEM/160409849 30. Makarechi, Kia, “Julian Assange Goes Where Glenn
/honda-working-feverishly-to-fix-customer-billing-glitch. Greenwald Wouldn’t,” Vanity Fair, May 19, 2014, www
15. “Corporate E-Learning,” Error Prevention Training Insti- .vanityfair.com/online/daily/2014/05/julian-assange
tute, smartpeopledumbthings.com/e-learning -glenn-greenwald-nsa-afghanistan.
/corporate-training/, accessed July 21, 2014.
16. McCormick, Jonathan, “How to Manage IT in a Growing 31. “NSA Recording All Phone Calls,” Associated Press.
Business: Implementing IT Policies,” NetworkWorld, 32. Nakashima, Ellen, “Top Spy Bemoans Loss of Key
April 11, 2016, www.networkworld.com/article
/3054601/careers/how-to-manage-it-in-a-growing Information-Gathering Program,” Washington Post,
-business-implementing-it-policies.html. September 9, 2015, www.washingtonpost.com/world
17. Kanowitz, Stephanie, “VA’s Information Security Still /national-security/top-spy-bemoans-loss-of-key-intelli
Lacking, Audit Shows,” FierceGovernmentIT, March 17, gence-program/2015/09/09/a214bda4-5717-11e5
2016, www.fiercegovernmentit.com/story/vas-information -abe9-27d53f250b11_story.html.
-security-still-lacking-audit-shows/2016-03-17. 33. Savage, Charlie, “Obama Administration Set to Expand
18. Healy, Beth, “State Street Overbilled Customers $200M Sharing of Data That N.S.A. Intercepts,” New York Times,
over 18 Years,” Boston Globe, December 17, 2015, www www.nytimes.com/2016/02/26/us/politics/obama
.bostonglobe.com/business/2015/12/17/state-street-says -administration-set-to-expand-sharing-of-data-that
-overbilled-customers-million-over-years/eiHpkMswIB9 -nsa-intercepts.html.
glkZO9z06VO/story.html. 34. Grossman, Lev, “Inside Apple CEO Tim Cook’s Fight
19. Healy, Beth, “State Street Hit by Galvin for Overbilling with the FBI,” Time, March 17, 2016, http://time.com
Clients,” Boston Globe, April 20, 1016, www.bostonglobe /4262480/tim-cook-apple-fbi-2.
.com/business/2016/04/20/state-street-hit-galvin-for 35. Miller, Ron, “Employees Have No Reasonable Expecta-
-overbilling-clients/8j3n0XMwUOLddJQcijtMRK/story.html. tion to Privacy for Material Viewed or Stored on
20. “Edward Snowden, Whistle-Blower,” New York Times, Employer-Owned Computers or Servers,” Wolters
January 1, 2014, www.nytimes.com/2014/01/02/opinion Kluwer, November 24, 2011, www.employmentlawdaily
/edward-snowden-whistle-blower.html. .com/index.php/2011/11/24/employees-have-no-reason
21. Diamond, Jeremy, “Thought Bulk Data Collection Was able-expectation-to-privacy-for-materials-viewed-or
Gone? Think Again,” CNN, June 2, 2015, www.cnn.com -stored-on-employer-owned-computers-or-servers, access
/2015/06/02/politics/bulk-data-collection-coming-back August 28, 2014.
-usa-freedom-act. 36. Hancock, Jay and Julie Appleby, “7 Questions to Ask
22. Kelly, Erin, “Senate Approves USA Freedom Act,” USA Your Employer about Wellness Privacy,” Kaiser Health
Today, June 2, 2015, www.usatoday.com/story/news News, September 30, 2015, http://khn.org/news
/politics/2015/06/02/patriot-act-usa-freedom-act-senate /7-questions-to-ask-your-employer-about-wellness-privacy.
-vote/28345747. 37. Hancock. Jay, “Workplace Wellness Programs Put
23. Rampton, Rebecca, “Obama to Propose Ending NSA Employee Privacy at Risk,” CNN, October 2, 2015, www
Bulk Collection of Phone Records: Official,” Reuters, .cnn.com/2015/09/28/health/workplace-wellness-privacy
March 24, 2014, www.reuters.com/article/2014/03/25 -risk-exclusive.
/us-usa-security-obama-nsa-idUSBREA2O03O20140325. 38. Haggin, Patience, “As Wearables in Workplace Spread,
24. Walker, Laura, “NSA to Destroy Data Collected from So Do Legal Concerns,” Wall Street Journal, March 13,
Mass Phone Surveillance,” Newsweek, July 27, 2015, 2016, www.wsj.com/articles/as-wearables-in-workplace
www.newsweek.com/nsa-destroy-data-collected-mass -spread-so-do-legal-concerns-1457921550.
-phone-surveillance-357500. 39. Thiel, Scott, “Wearables at Work: Data Privacy and
25. Sutton, James, “NSA Obtains Permission to Collect Employment Law Implications,” DLA Piper, April 22,
Metadata under New Law,” The Hill Talk, April 24, 2016, 2016, www.dlapiper.com/en/us/insights/publications
http://thehilltalk.com/2016/04/24/17121. /2016/04/wearables-at-work.
26. Hosenball, Mark, “Secret U.S. Court Issues First Order 40. “Protection of Personal Data,” European Commission,
for Phone Data under New Law,” Reuters, April 19, 2016, http://ec.europa.eu/justice/data-protection, accessed
www.reuters.com/article/usa-surveillance-court- August 17, 2014.
idUSL2N17M26C. 41. Meltzer, Joshua, “Examining the EU Safe Harbor Deci-
27. “NSA Prism Program Taps into User Data of Apple, Goo- sion and Impacts for Transatlantic Data Flows,” The
gle and Others,” Guardian, June 6, 2013, www.theguar Brookings Institute, November 3, 2015, www.brookings.
dian.com/world/2013/jun/06/us-tech-giants-nsa-data. edu/research/testimony/2015/11/03-eu-safe-harbor
28. Nakashima, Ellen, “Public Advocate: FBI’s Use of PRISM -decision-transatlantic-data-flows-meltzer.
Surveillance Data Is Unconstitutional,” Washington Post, 42. Cline, Jay, “Five Predictions for the EU-U.S. Safe Harbor
April 20, 2016, www.washingtonpost.com/world Showdown,” Computerworld, October 27, 2015, www
/national-security/public-advocate-fbis-use-of-prism .computerworld.com/article/2997882/data-privacy/five
-surveillance-data-is-unconstitutional/2016/04/20 -predictions-for-the-eu-u-s-safe-harbor-showdown
/0282ed52-0693-11e6-b283-e79d81c63c1b_story.html. .html.
29. “NSA Reportedly Recording All Phone Calls in a Foreign 43. Scott, Mark, “U.S. and Europe in ‘Safe Harbor’ Data Deal,
Country,” Associated Press, March 19, 2014, www but Legal Fight May Await,” New York Times, www.
.foxnews.com/politics/2014/03/19/nsa-reportedly-recording nytimes.com/2016/02/03/technology/us-europe-safe
-all-phone-calls-in-foreign-country/. -harbor-data-deal.html.
44. Gibbs, Samuel, “Data Regulators Reject EU-US Privacy
Shield Safe Harbour Deal,” Guardian, April 14, 2016,

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

CHAPTER 14 • Ethical, Legal, and Social Issues of Information Systems 635

www.theguardian.com/technology/2016/apr/14/data 52. Worstall, Tim, “Now Google Autocomplete Could Be
-regulators-reject-eu-us-privacy-shield-safe-harbour-deal. Found Guilty of Libel in Hong Kong,” Forbes, August 6,
45. Urbon, Steve, “Freetown Selectmen Hit with $1,000 Civil 2014, www.forbes.com/sites/timworstall/2014/08/06
Penalty in Open Meeting Law Violation,” SouthCoast /now-google-autocomplete-could-be-found-guilty-of
Today, March 10, 2016, www.southcoasttoday.com -libel-in-hong-kong.
/article/20160310/NEWS/160319911.
46. “The Commonwealth of Massachusetts Open Meeting 53. Matthew, Lee, “Defamation, Celebrities, and the Inter-
Law, G.L. c. 30A, §§ 18-25,” Commonwealth of Massa- net,” Harvard Journal on Sports and Entertainment
chusetts, www.mass.gov/ago/docs/government/oml Law, April 17, 2014, http://harvardjsel.com/2014/04
/open-meeting-law-gl-c-30a-18-25.pdf, accessed May 9, /defamation-internet/.
2016.
47. Botelho, Greg and Michael Martinez, “DA: No Charges 54. “2016 Best Internet Filter Software Reviews,” TopTen-
against Colorado Students in Sexting Scandal,” CNN, Reviews, http://internet-filter-review.toptenreviews.com,
December 9, 2015, www.cnn.com/2015/12/09/us accessed May 9, 2016.
/colorado-sexting-scandal-canon-city.
48. “Two App Developers Settle FTC Charges They Violated 55. “2016 Best Mac Internet Filter Software Reviews,”
Children’s Online Privacy Protection Act,” Federal Trade http://internet-filter-review.toptenreviews.com/mac
Commission, December 17, 2015, www.ftc.gov/news -internet-filter-software, accessed May 10, 2016.
-events/press-releases/2015/12/two-app-developers-settle
-ftc-charges-they-violated-childrens. 56. “BBB Sample Privacy Policy,” www.bbb.org/dallas
49. “Top 15 Most Popular Social Networking Sites,” Ebizma, /for-businesses/bbb-sample-privacy-policy1, accessed
May 2016,” http://www.ebizmba.com/articles/social August 14, 2014.
-networking-websites.
50. “Number of Monthly Active Facebook Users Worldwide 57. “Can I Review My Credit Report?,” Consumer Financial
as of 1st Quarter 2016 (in Millions),” Statista, http://www Protection Bureau, www.consumerfinance.gov/askcfpb
.statista.com/statistics/264810/number-of-monthly /5/can-i-review-my-credit-report.html, accessed May 8,
-active-facebook-users-worldwide, accessed May 9, 2016. 2016.
51. Kaysen, Ronda, “When Neighbors Tangle Online,” New
York Times, November 6, 2016, www.nytimes.com/2015 58. “How to Sit at a Computer,” American Academy of
/11/08/realestate/when-neighbors-tangle-online.html?_r=0. Orthopedic Surgeons, http://orthoinfo.aaos.org/topic
.cfm?topic=a00261, accessed May 10, 2016.

59. “What Is ACM?” www.acm.org/about, accessed August
14, 2014.

60. “ACM Code of Ethics and Professional Conduct,” www
.acm.org/about/code-of-ethics, accessed August 14, 2014.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

Glossary

A are accumulated over a period of time and backbone that serves as a shared communi-
prepared for processing as a single unit or cations medium.
ACID properties Properties (atomicity, batch.
consistency, isolation, durability) that guar- business analytics The extensive use of
antee relational database transactions are best practices The most efficient and data and quantitative analysis to support
processed reliably and ensure the integrity effective ways to complete a business fact-based decision making within
of data in the database. process. organizations.

advanced persistent threat (APT) A net- big data A term used to describe data col- business intelligence (BI) A wide range of
work attack in which an intruder gains access lections that are so enormous (think petabytes applications, practices, and technologies for
to a network and stays there—undetected— or larger) and complex (from sensor data to the extraction, transformation, integration,
with the intention of stealing data over a long social media data) that traditional data man- visualization, analysis, interpretation, and
period of time. agement software, hardware, and analysis presentation of data to support improved
processes are incapable of dealing with them. decision making.
agile development An iterative system
development process that develops the bioprinting The use of 3D printers to build business rule management system
system in “sprint” increments lasting from human parts and organs from actual human (BRMS) Software used to define, execute,
two weeks to two months. cells. monitor, and maintain the decision logic
that is used by the operational systems and
antivirus software Software that scans a bit A binary digit (i.e., 0 or 1) that repre- processes that run the organization.
computer’s memory, disk drives, and USB sents a circuit that is either on or off.
ports regularly for viruses. business-to-business (B2B) e-commerce
blade server A server that houses many A subset of e-commerce in which all the
application programming interface (API) individual computer motherboards that participants are organizations.
A set of programming instructions and include one or more processors, computer
standards that enables one software program memory, computer storage, and computer business-to-consumer (B2C) e-commerce
to access and use the services of another network connections. A form of e-commerce in which customers
software program. deal directly with an organization and avoid
blended threat A sophisticated threat that intermediaries.
application software Programs that help combines the features of a virus, worm,
users solve particular computing problems. Trojan horse, and other malicious code into byte (B) Eight bits that together represent a
a single payload. single character of data.
artificial intelligence The ability to mimic
or duplicate the functions of the human brain. Bluetooth A wireless communications C
specification that describes how cell phones,
artificial intelligence system The people, computers, faxes, printers, and other electronic CAPTCHA (Completely Automated Public
procedures, hardware, software, data, and devices can be interconnected over distances Turing Test to Tell Computers and
knowledge needed to develop computer sys- of 10 to 30 feet at a rate of about 2 Mbps. Humans Apart) Software that generates
tems and machines that can simulate human and grades tests that humans can pass all but
intelligence processes, including learning (the botnet A term used to describe a large the most sophisticated computer programs
acquisition of information and rules for using group of computers, which are controlled cannot.
the information), reasoning (using rules to from one or more remote locations by
reach conclusions), and self-correction (using hackers, without the knowledge or consent cache memory A type of high-speed
the outcome from one scenario to improve its of their owners. memory that a processor can access more
performance on future scenarios). rapidly than main memory.
bring your own device (BYOD) A busi-
assistive technology system An assistive, ness policy that permits, and in some cases Cascading Style Sheet (CSS) A markup
adaptive, or rehabilitative device designed encourages, employees to use their own language for defining the visual design of a
to help people with disabilities perform mobile devices (smartphones, tablets, or Web page or group of pages.
tasks that they were formerly unable to laptops) to access company computing
accomplish or had great difficulty resources and applications, including email, central processing unit (CPU) The part of
accomplishing. corporate databases, the corporate intranet, a computer that sequences and executes
and the Internet. instructions.
attribute A characteristic of an entity.
broadband communications High-speed certificate authority (CA) A trusted third-
autonomic computing The ability of IT Internet access that is always on and that is party organization or company that issues
systems to manage themselves and adapt to faster than traditional dial-up access. digital certificates.
changes in the computing environment,
business policies, and operating objectives. bus A set of electronic circuits used to route certification A process for testing skills
data and instructions to and from the various and knowledge; successful completion of a
B components of a computer. certification exam results in a statement
by the certifying authority that confirms
batch processing system A form of data bus network A network in which all net- an individual is capable of performing
processing whereby business transactions work devices are connected to a common particular tasks.

636

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

GLOSSARY 637

change management model A description computer forensics A discipline that com- provided the messages meet a few basic
of the phases an individual or organization bines elements of law and computer science requirements.
goes through in making a change and to identify, collect, examine, and preserve
principles for successful implementation of data from computer systems, networks, and conversion funnel A graphical representa-
change. storage devices in a manner that preserves tion that summarizes the steps a consumer
the integrity of the data gathered so that it is takes in making the decision to buy your
channel bandwidth The rate at which data admissible as evidence in a court of law. product and become a customer.
is exchanged, usually measured in bits per
second (bps). computer graphics card A component of a coprocessor The part of the computer that
computer that takes binary data from the speeds processing by executing specific
character A basic building block of most CPU and translates it into an image you see types of instructions while the CPU works
information, consisting of uppercase letters, on your display device. on another processing activity.
lowercase letters, numeric digits, or special
symbols. computer network The communications core competency Something that a firm
media, devices, and software connecting can do well and that provides customer
Children’s Online Privacy Protection Act two or more computer systems or devices. benefits, is hard for competitors to imitate,
(COPPA) An act directed at websites and can be leveraged widely to many
catering to children, requires site owners to computer-aided design (CAD) The use of products and markets.
post comprehensive privacy policies and to software to assist in the creation, analysis,
obtain parental consent before they collect and modification of the design of a compo- core value A widely accepted principle
any personal information from children nent or product. that guides how people behave and make
under 13 years of age. decisions in the organization.
computer-aided engineering (CAE) The
client/server architecture An approach to use of software to analyze the robustness cost management A set of activities that
computing wherein multiple computer plat- and performance of components and include the development and management
forms are dedicated to special functions, assemblies. of the project budget.
such as database management, printing,
communications, and program execution. computer-aided manufacturing (CAM) cost-reimbursable contract A contract that
The use of software to control machine tools requires the buyer to pay the provider an
clock speed A series of electronic pulses and related machinery in the manufacture of amount that covers the provider’s actual
produced at a predetermined rate that components and products. costs plus an additional amount or percent-
affects machine cycle time. age for profit.
computer-based information system
cloud computing A computing environ- (CBIS) A single set of hardware, software, critical path All project activities that, if
ment where software and storage are pro- databases, networks, people, and procedures delayed, would delay the entire project.
vided as an Internet service and are accessed that are configured to collect, manipulate,
with a Web browser. store, and process data into information. Cross-Industry Process for Data Mining
(CRISP-DM) A six-phase structured
code of ethics A code that states the prin- concurrency control A method of dealing approach for the planning and execution of
ciples and core values that are essential to a with a situation in which two or more users a data mining project.
set of people and that, therefore, govern or applications need to access the same
these people’s behavior. record at the same time. culture A set of major understandings and
assumptions shared by a group, such as
cold site A computer environment that consumerization of IT The trend of within an ethnic group or a country.
includes rooms, electrical service, telecom- consumer technology practices influencing
munications links, data storage devices, and the way business software is designed and customer relationship management
the like. delivered. (CRM) system A system that helps a
company manage all aspects of customer
command-based user interface A user consumer-to-consumer (C2C) e-commerce encounters, including marketing, sales, dis-
interface that requires you to give text com- A subset of e-commerce that involves elec- tribution, accounting, and customer service.
mands to the computer to perform basic tronic transactions between consumers
activities. using a third party to facilitate the process. cutover The process of switching from an
old information system to a replacement
communications management The gen- contactless payment card A card with an system.
eration, collection, dissemination, and stor- embedded chip that only needs to be held
age of project information in a timely and close to a terminal to transfer its data; no PIN cybercriminal A computer hacker who is
effective manner. number needs to be entered. motivated by the potential for monetary
gain; cybercriminals hack into computer
communications medium Any material container A way for software developers systems to steal, often by transferring money
substance that carries an electronic signal to and hardware managers to package appli- from one account to another or by stealing
support communications between a sending cations and software components into a and reselling credit card numbers, personal
and a receiving device. well-defined, compact envelope that can be identities, and financial account information.
used to more easily manage it, including
community of practice (CoP) A group moving it across various hosts. cyberespionage The deployment of
whose members share a common set of malware that secretly steals data in the
goals and interests and regularly engage in content streaming A method for transfer- computer systems of organizations, such as
sharing and learning as they strive to meet ring large media files over the Internet so government agencies, military contractors,
those goals. that the data stream of voice and pictures political organizations, and manufacturing
plays more or less continuously as the file is firms.
compact disc read-only memory (CD-ROM) being downloaded.
A common form of optical disc on which cyberterrorism The intimidation of a
data cannot be modified once it has been continuous improvement Constantly government or a civilian population by
recorded. seeking ways to improve business processes using information technology to disable
and add value to products and services. critical national infrastructure (e.g., energy,
compiler A special software program that transportation, financial, law enforcement,
converts the programmer’s source code into Controlling the Assault of Non-Solicited emergency response) to achieve political,
the machine-language instructions, which Pornography and Marketing (CAN-SPAM) religious, or ideological goals.
consist of binary digits. Act An act that states that it is legal to spam,

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

638 GLOSSARY

D time when it becomes outdated and is multiple information systems share a pool of
deleted. related data.
dashboard A presentation of a set of KPIs
about the state of a process at a specific data management An integrated set of database as a service (DaaS) An arrange-
point in time. functions that defines the processes by ment where the database is stored on a ser-
which data is obtained, certified fit for use, vice provider’s servers and accessed by the
data Raw facts such as an employee num- stored, secured, and processed in such a service subscriber over a network, typically
ber or total hours worked in a week. way as to ensure that the accessibility, the Internet, with the database administra-
reliability, and timeliness of the data meet tion handled by the service provider.
data administrator An individual respon- the needs of the data users within an
sible for defining and implementing consis- organization. database management system (DBMS) A
tent principles for a variety of data issues. group of programs used to access and man-
data manipulation language (DML) A age a database as well as provide an inter-
data breach The unintended release of specific language, provided with a DBMS, face between the database and its users and
sensitive data or the access of sensitive data which allows users to access and modify other application programs.
by unauthorized individuals. the data, to make queries, and to generate
reports. Department of Homeland Security (DHS)
data center A climate-and-access-controlled A large federal agency with more than
building or a set of buildings that houses the data mart A subset of a data warehouse 240,000 employees and a budget of almost
computer hardware that delivers an organi- that is used by small- and medium-sized $65 billion whose goal is to provide for a
zation’s data and information services. businesses and departments within large “safer, more secure America, which is resil-
companies to support decision making. ient against terrorism and other potential
Data cleansing (data cleaning/data threats.”
scrubbing) The process of detecting and data mining A BI analytics tool used to
then correcting or deleting incomplete, explore large amounts of data for hidden desktop computer A nonportable com-
incorrect, inaccurate, or irrelevant records patterns to predict future trends and beha- puter that fits on a desktop and provides
that reside in a database. viors for use in decision making. sufficient computing power, memory, and
storage for most business computing tasks.
data collection Capturing and gathering all data model A diagram of data entities and
data necessary to complete the processing of their relationships. DevOps The practice of blending the tasks
transactions. performed by the development and IT
data processing Performing calculations operations groups to enable faster and more
data correction Reentering data that was and other data transformations related to reliable software releases.
not typed or scanned properly. business transactions.
diffusion of innovation theory A theory
data cube A collection of data that contains data scientist A person who understands developed by E.M. Rogers to explain how a
numeric facts called measures, which are the business and the business analytics new idea or product gains acceptance and
categorized by dimensions, such as time and technology, while also recognizing the diffuses (or spreads) through a specific
geography. limitations of their data, tools, and techni- population or subset of an organization.
ques; a data scientist puts all of this together
data definition language (DDL) A collec- to deliver real improvements in decision digital audio player A device that can
tion of instructions and commands used to making within an organization. store, organize, and play digital music files.
define and describe data and relationships in
a specific database. data steward An individual responsible for digital certificate An attachment to an
the management of critical data elements, email message or data embedded in a Web
data dictionary A detailed description of all including identifying and acquiring new site that verifies the identity of a sender or
the data used in the database. data sources; creating and maintaining Web site.
consistent reference data and master data
data editing Checking data for validity and definitions; and analyzing data for quality digital divide The gulf between those who
completeness to detect any problems. and reconciling data issues. do and those who don’t have access to
modern information and communications
data entry Converting human-readable data data storage Updating one or more technology such as smartphones, personal
into a machine-readable form. databases with new transactions. computers, and the Internet.

data-flow diagram (DFD) A diagram used data visualization The presentation of data digital video disc (DVD) A form of optical
during both the analysis and design phases in a pictorial or graphical format. disc storage that looks like a CD but that can
to document the processes of the current store more data and access it more quickly.
system or to provide a model of a proposed data warehouse A database that stores
new system. large amounts of historical data in a form direct conversion A cutover strategy that
that readily supports analysis and manage- involves stopping the old system and start-
data governance The core component of ment decision making. ing the new system on a given date; also
data management; it defines the roles, called plunge or direct cutover.
responsibilities, and processes for ensuring database A well-designed, organized, and
that data can be trusted and used by the carefully managed collection of data. disaster recovery plan A documented
entire organization, with people identified process to recover an organization’s busi-
and in place who are responsible for fixing database administrators (DBAs) Skilled ness information system assets including
and preventing issues with data. and trained IS professionals who hold dis- hardware, software, data, networks, and
cussions with business users to define their facilities in the event of a disaster.
data input Transferring machine-readable data needs; apply database programming
data into the system. languages to craft a set of databases to meet discrete manufacturing The production of
those needs; test and evaluate databases; distinct items such as autos, airplanes, fur-
data item The specific value of an attribute. implement changes to improve the perfor- niture, or toys that can be decomposed into
mance of databases; and assure that data is their basic components.
data lake (enterprise data hub) A “store secure from unauthorized access.
everything” approach to big data that saves distributed denial-of-service (DDoS)
all the data in its raw and unaltered form. database approach to data management attack An attack in which a malicious
An approach to data management where hacker takes over computers via the Internet
data lifecycle management (DLM) A
policy-based approach to managing the flow
of an enterprise’s data, from its initial
acquisition or creation and storage to the

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

GLOSSARY 639

and causes them to flood a target site with embedded system A computer system maker to understand how the expert system
demands for data and other small tasks. (including some sort of processor) that is arrived at certain conclusions or results.
implanted in and dedicated to the control of
document production Generating output another device. explicit knowledge Knowledge that is
records, documents, and reports. documented, stored, and codified—such as
enterprise application integration (EAI) standard procedures, product formulas,
domain The range of allowable values for a The systematic tying together of disparate customer contact lists, market research
data attribute. applications so that they can communicate. results, and patents.

domain expert The person or group enterprise data model A data model that exploit An attack on an information system
with the expertise or knowledge the expert provides a roadmap for building database that takes advantage of a particular system
system is trying to capture (domain). and information systems by creating a single vulnerability.
definition and format for data that can
downsizing Reducing the number of ensure data compatibility and the ability to Extensible Markup Language (XML) The
employees to cut costs. exchange and integrate data among systems. markup language designed to transport and
store data on the Web.
drill-down analysis The interactive exami- enterprise IS An information system that
nation of high-level summary data in an organization uses to define structured extract-transform-load (ETL) The process
increasing detail to gain insight into certain interactions among its own employees and/ by which raw data is extracted from various
elements—sort of like slowly peeling off the or with external customers, suppliers, sources, transformed into a format to
layers of an onion. government agencies, and other business support the analysis to be performed, and
partners. loaded into the data warehouse.
driving forces The beliefs, expectations,
and cultural norms that tend to encourage a enterprise resource planning (ERP) extranet A network based on Web tech-
change and give it momentum. system A system that supports an organi- nologies that allows selected outsiders, such
zation’s routine business processes, main- as business partners and customers, to
e-book The digital media equivalent of a tains records about those processes, and access authorized resources of a company’s
conventional printed book. provides extensive reporting and data intranet.
analysis capabilities.
e-commerce Involves the exchange of extreme programming (XP) A form of
money for goods and services over enterprise search The application of agile software development that promotes
electronic networks and encompasses many search technology to find information within incremental development of a system using
of an organization’s outward facing an organization. short development cycles to improve pro-
processes—such as sales, marketing, order ductivity and to accommodate new customer
taking, delivery, procurement of goods and enterprise search software Software that requirements.
services, and customer service—that touch matches a user’s query to many sources of
customers, suppliers, and other business information in an attempt to identify the F
partners. most important content and the most
reliable and relevant source. feasibility analysis An assessment of the
E technical, economic, legal, operational, and
enterprise sphere of influence The sphere schedule feasibility of a project.
economic feasibility The process of deter- of influence that serves the needs of an
mining whether the project makes financial organization in its interactions with its field Typically a name, a number, or a
sense and whether predicted benefits offset environment. combination of characters that describes an
the cost and time needed to obtain them. aspect of a business object or activity.
enterprise system A system central to the
e-government The use of information and organization that ensures information can be file A collection of related records.
communications technology to simplify the shared with authorized users across all
sharing of information, speed formerly business functions and at all levels of man- firewall A system of software, hardware, or
paper-based processes, and improve the agement to support the running and man- a combination of both that stands guard
relationship between citizens and aging of a business. between an organization’s internal network
government. and the Internet and limits network access
entity A person, place, or thing for which based on the organization’s access policy.
electronic business (e-business) The use data is collected, stored, and maintained.
of information systems and networks to fixed-price contract A contract in which
perform business-related tasks and functions ergonomics The science of designing the buyer and provider agree to a total fixed
beyond those performed for e-commerce. machines, products, and systems to maxi- price for a well-defined product or service.
mize the safety, comfort, and efficiency of
electronic cash An amount of money that the people who use them. filtering software Software used to help
is computerized, stored, and used as cash for protect personal data and screen objection-
e-commerce transactions. entity-relationship (ER) diagram A data able Internet content.
model that uses basic graphical symbols to
electronic discovery (e-discovery) Any show the organization of and relationships force field analysis An approach to iden-
process in which electronic data is sought, between data. tifying both the driving (positive) and
located, secured, and searched with the restraining (negative) forces that influence
intent of using it as evidence in a civil or ethics A set of beliefs about right and whether change can occur.
criminal legal case. wrong behavior. Ethical behavior conforms
to generally accepted social norms—many forming-storming-norming-performing-
electronic exchange An electronic forum of which are almost universally accepted. adjourning model A model that describes
where manufacturers, suppliers, and com- how teams develop and evolve.
petitors buy and sell goods, trade market expert system A system that consists of
information, and run back-office operations. hardware and software that stores knowl- Fourth Amendment This amendment to
edge and makes inferences, enabling a the U.S. constitution protects individuals
Electronic Product Environmental novice to perform at the level of an expert. against unreasonable searches and seizures
Assessment Tool (EPEAT) A system that and requires that warrants be issued only
enables purchasers to evaluate, compare, explanation facility Component of an upon probable cause and specifying the
and select electronic products based on a set expert system that allows a user or decision place to be searched and the persons or
of environmental criteria. things to be seized.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

640 GLOSSARY

functional decomposition A frequently without concern for the specific underlying input/output device A computer compo-
used technique to define the scope of an hardware. nent that provides data and instructions to
information system by identifying the the computer and receives results from it.
business processes it will affect. hot site A duplicate, operational hardware
system that is ready for use (or immediate installation The process of physically
G access to one through a specialized vendor). placing the computer equipment on the site
and making it operational.
game theory A mathematical theory for hierarchy of data Bits, characters, fields,
developing strategies that maximize gains records, files, and databases. instant messaging The online, real-time
and minimize losses while adhering to a communication between two or more peo-
given set of rules and constraints. human resource management Activities ple who are connected via the Internet.
designed to make the most effective use of
Gantt chart A graphical tool used for the people involved with a project. instruction set architecture (ISA) A basic
planning, monitoring, and coordinating set of commands (opcodes) that the proces-
projects; it is essentially a grid that lists hybrid cloud A cloud computing environ- sor can execute.
activities and deadlines. ment is composed of both private and public
clouds integrated through networking. intangible benefit A benefit that cannot
genetic algorithm An approach to solving directly be measured and cannot easily be
problems based on the theory of evolution; hyperlink Highlighted text or graphics in a quantified in monetary terms.
uses the concept of survival of the fittest as a Web document that, when clicked, opens a
problem-solving strategy. new Web page containing related content. integrated circuit (IC) A set of electronic
circuits on one small piece of semiconductor
gigahertz (GHz) A unit of frequency that is Hypertext Markup Language (HTML) The material, normally silicon.
equal to one billion cycles per second; a standard page description language for Web
measure of clock speed. pages. integration testing Testing that involves
linking all of the individual components
goal A specific result that must be achieved I together and testing them as a group to
to reach an objective. uncover any defects in the interfaces
identity theft The theft of personal infor- between individual components.
goals-based strategic planning A multi- mation, which is then used without the
phase strategic planning process that begins owner’s permission, often to commit fraud intelligent agent Programs and a knowl-
by performing a situation analysis to identify or other crimes. edge base used to perform a specific task for
an organization’s strengths, weaknesses, a person, a process, or another program;
opportunities, and threats. IF-THEN statement A rule that suggests also called an intelligent robot or bot.
certain conclusions
graphical user interface (GUI) An inter- intelligent behavior The ability to learn
face that displays pictures (icons) and menus inference engine Part of the expert system from experiences and apply knowledge
that people use to send commands to the that seeks information and relationships acquired from those experiences; to handle
computer system. from the knowledge base and provides complex situations; to solve problems when
answers, predictions, and suggestions simi- important information is missing; to deter-
graphics processing unit (GPU) A pow- lar to the way a human expert would. mine what is important and to react quickly
erful processing chip that renders images on and correctly to a new situation; to under-
the screen display. informatics The combination of informa- stand visual images, process and manipulate
tion technology with traditional disciplines, symbols, and be creative and imaginative;
green computing A program concerned such as medicine or science, while consid- and to use heuristics.
with the efficient and environmentally ering the impact on individuals, organiza-
responsible design, manufacture, operation, tions, and society. Internet backbone One of the Internet’s
and disposal of IS-related products. high-speed, long-distance communications
information A collection of data organized links.
grid computing The use of a collection and processed so that it has additional value
of computers, often owned by multiple beyond the value of the individual facts. Internet censorship The control or sup-
individuals or organizations, that work in a pression of the publishing or accessing of
coordinated manner to solve a common information silo An isolated information information on the Internet.
problem. system not easily capable of exchanging
information with other information systems. Internet of Everything A network that
group IS An information system that encompasses not only machine-to-machine
improves communications and support col- information system (IS) A set of interre- but also people-to-people and people-
laboration among members of a workgroup. lated components that collect, process, store, to-machine connections.
and disseminate data and information; an
H information system provides a feedback Internet of Things (IoT) A network of
mechanism to monitor and control its oper- physical objects or “things” embedded with
Hadoop An open-source software frame- ation to make sure it continues to meet its sensors, processors, software, and network
work including several software modules goals and objectives. connectivity capability to enable them to
that provide a means for storing and pro- exchange data with the manufacturer of the
cessing extremely large data sets. infrastructure as a service (IaaS) An device, device operators, and other con-
information systems strategy in which an nected devices.
Hadoop Distributed File System (HDFS) organization outsources the equipment used
A system used for data storage that divides to support its data processing operations, Internet Protocol (IP) A communication
the data into subsets and distributes the including servers, storage devices, and net- standard that enables computers to route
subsets onto different servers for processing. working components. communications traffic from one network to
another as needed.
hard disk drive (HDD) A direct access in-memory database (IMDB) A database
storage device used to store and retrieve management system that stores the entire Internet service provider (ISP) Any
data from rapidly rotating disks coated with database in random access memory (RAM). organization that provides Internet access to
magnetic material. people.
innovation The application of new ideas to
hardware independence The ability of a the products, processes, and activities of a Internet The world’s largest computer
software program to run on any platform, firm, leading to increased value. network, consisting of thousands of

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

GLOSSARY 641

interconnected networks, all freely collaboration and innovation, and exchang- for storing backups of critical organizational
exchanging information. ing insights. data in the event of a disaster.

intranet A network that enables communi- knowledge management system (KMS) main memory The component of a com-
cation, collaboration, search functions, and An organized collection of people, proce- puter that provides the CPU with a working
information sharing between the members dures, software, databases, and devices that storage area for program instructions and
of an organization’s team using a Web stores and retrieves knowledge, improves data.
browser. collaboration, locates knowledge sources,
captures and uses knowledge, or in some mainframe computer A large, powerful
intrusion detection system (IDS) Software other way enhances the knowledge man- computer often shared by hundreds of
and/or hardware that monitors system and agement process. concurrent users connected to the machine
network resources and activities and notifies over a network.
network security personnel when it detects knowledge user The person or group who
network traffic that attempts to circumvent uses and benefits from the expert system. make-or-buy decision The act of compar-
the security measures of a networked com- ing the pros and cons of in-house produc-
puter environment. L tion versus outsourcing of a given product
or service.
IP address A 64-bit number that identifies a laptop A personal computer designed for
computer on the Internet. use by mobile users, being small and light managed security service provider (MSSP)
enough to sit comfortably on a user’s lap. A company that monitors, manages, and
issues-based strategic planning A strate- maintains computer and network security
gic planning process that begins by identi- law A system of rules that tells us what we for other organizations.
fying and analyzing key issues that face the can and cannot do.
organization, setting strategies to address management information system An
those issues, and identifying projects and legal feasibility The process of determin- organized collection of people, procedures,
initiatives that are consistent with those ing whether laws or regulations may prevent software, databases, and devices that pro-
strategies. or limit a system development project. vides routine information to managers and
decision makers.
J learning system A combination of software
and hardware that allows a computer to MapReduce program A composite pro-
joining Manipulating data to combine two change how it functions or how it reacts to gram that consists of a Map procedure that
or more tables. situations based on feedback it receives. performs filtering and sorting and a Reduce
method that performs a summary operation.
joint application development (JAD) A Leavitt’s diamond An organizational
structured meeting process that can acceler- change model that proposes that every market segmentation The identification of
ate and improve the efficiency and effec- organizational system is made up of four specific markets to target them with tailored
tiveness of the investigation, analysis, and main components—people, tasks, structure, advertising messages.
design phases of a system development and technology—that all interact; any
project. change in one of these elements will neces- massively parallel processing system A
sitate a change in the other three elements. system that speeds processing by linking
joint problem solving A process used to hundreds or thousands of processors to
capture tacit knowledge where the novice Lewin’s change model A three stage operate at the same time, or in parallel, with
and the expert work side by side to solve a approach for implementing change that each processor having its own bus, memory,
problem so that the expert’s approach is involves unfreezing, moving, and refreezing. disks, copy of the operating system, and
slowly revealed to the observant novice. applications.
linear regression A mathematical proce-
K dure to predict the value of a dependent memory A component of the computer that
variable based on a single independent provides the processor with a working storage
kernel The heart of the operating system variable and the linear relationship between area to hold program instructions and data.
that controls the most critical processes of the two.
the OS. mesh network A network that uses multi-
linking The ability to combine two or more ple access points to link a series of devices
key performance indicator (KPI) A metric tables through common data attributes to that communicate with each other to form a
that tracks progress in executing chosen form a new table with only the unique data network connection across a large area.
strategies to attain organizational objectives attributes.
and goals and consists of a direction, mea- meta tag An HTML code, not visible on the
sure, target, and time frame. local area network (LAN) A network that displayed Web page, that contains keywords
connects computer systems and devices representing your site’s content, which
knowledge The awareness and under- within a small area, such as an office, home, search engines use to build indexes pointing
standing of a set of information and the or several floors in a building. to your Web site.
ways that information can be made useful to
support a specific task or reach a decision. logic bomb A form of Trojan horse mal- metadata Data that describes other data.
ware that executes when it is triggered by a
knowledge acquisition facility Part of the specific event. metropolitan area network (MAN) A net-
expert system that provides a convenient work that connects users and their compu-
and efficient means of capturing and storing Long Term Evolution (LTE) A standard for ters in a geographical area that spans a
all the components of the knowledge base. wireless communications for mobile phones campus or city.
based on packet switching.
knowledge engineer A person who has Michael Porter’s Five Forces Model A
training or experience in the design, devel- M model that identifies the fundamental factors
opment, implementation, and maintenance that determine the level of competition and
of an expert system. magnetic stripe card A type of card that long-term profitability of an industry.
stores a limited amount of data by modifying
knowledge management (KM) A range of the magnetism of tiny iron-based particles middleware Software that allows various
practices concerned with increasing aware- contained in a band on the card. systems to communicate and exchange data.
ness, fostering learning, speeding
magnetic tape A type of sequential sec- mission statement A statement that con-
ondary storage medium, now used primarily cisely defines an organization’s fundamental
purpose for existing.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

642 GLOSSARY

mission-critical process A process that and devices on a network and allows them operational feasibility The process of
plays a pivotal role in an organization’s to communicate with each other. determining how a system will be accepted
continued operations and goal attainment. by people and how well it will meet various
network topology The shape or structure system performance expectations.
mobile commerce (m-commerce) The of a network, including the arrangement of
buying and selling of goods and/or services the communication links and hardware optical storage device A form of data
using a mobile device, such as a tablet, devices on the network. storage that uses lasers to read and write
smartphone, or other portable device. data.
network-attached storage (NAS) A hard
mobile device management (MDM) disk drive storage device that is set up with organic strategic planning A strategic
software Software that manages and trou- its own network address and provides file- planning process that defines the organiza-
bleshoots mobile devices remotely, pushing based storage services to other devices on tion’s vision and values and then identifies
out applications, data, patches, and settings the network. projects and initiatives to achieve the vision
while enforcing group policies for security. while adhering to the values.
network-management software Software
monitoring The process of measuring sys- that enables a manager on a networked organization A group of people that is
tem performance by tracking the number of desktop to monitor the use of individual structured and managed to meet its mission
errors encountered, the amount of memory computers and shared hardware (such as or set of group goals.
required, the amount of processing or CPU printers), scan for viruses, and ensure com-
time needed, and other performance pliance with software licenses. organizational change How forprofit and
indicators. nonprofit organizations plan for, implement,
neural network A computer system that and handle change.
morals One’s personal beliefs about right can recognize and act on patterns or trends
and wrong. that it detects in large sets of data. organizational complement A key com-
ponent that must be in place to ensure suc-
MP3 A standard format for compressing a next-generation firewall (NGFW) A cessful implementation and use of an
sound sequence into a small file. hardware- or software-based network secu- information system.
rity system that is able to detect and block
multicore processor A microprocessor that sophisticated attacks by filtering network organizational culture The major under-
has two or more independent processing traffic dependent on the packet contents. standings and assumptions for a business,
units, called cores, which are capable of corporation, or other organization.
sequencing and executing instructions. NoSQL database A way to store and
retrieve data that is modeled using some organizational learning The adaptations
multimedia Content that uses more than means other than the simple two dimen- and adjustments made within an organiza-
one form of communication—such as text, sional tabular relations used in relational tion based on experience and ideas over
graphics, video, animation, audio, and other databases. time.
media.
O organizational network analysis (ONA) A
multiprocessing The simultaneous execu- technique used for documenting and mea-
tion of two or more instructions at the same objective A statement of a compelling suring flows of information among indivi-
time. business need that an organization must duals, workgroups, organizations,
meet to achieve its vision and mission. computers, Web sites, and other information
N sources.
offshore outsourcing (offshoring) An
natural language processing An aspect of outsourcing arrangement where the organi- outsourcing A long-term business
artificial intelligence that involves technol- zation providing the service is located in a arrangement in which a company contracts
ogy that allows computers to understand, country different from the firm obtaining the for services with an outside organization
analyze, manipulate, and/or generate “natu- services. that has expertise in providing a specific
ral” languages, such as English. function.
off-the-shelf software Software produced
near field communication (NFC) A very by software vendors to address needs that P
short-range wireless connectivity technology are common across businesses, organiza-
that enables two devices placed within a few tions, or individuals. parallel computing The simultaneous
inches of each other to exchange data. execution of the same task on multiple pro-
online analytical processing (OLAP) A cessors to obtain results faster.
net neutrality The principle that Internet method to analyze multidimensional data
service providers (ISPs) should be required from many different perspectives, enabling parallel start-up A cutover strategy that
to treat all Internet traffic running over their users to identify issues and opportunities as involves running both the old and new sys-
wired and wireless broadband networks the well as perform trend analysis. tems for a period of time and closely com-
same—without favoring content from some paring the output of the new system with
sources and/or blocking or slowing (also online transaction processing (OLTP) A the output of the old system; any differences
known as throttling) content from others. form of data processing where each trans- are reconciled. When users are comfortable
action is processed immediately without the that the new system is working correctly, the
nettop A very small, inexpensive desktop delay of accumulating transactions into a old system is eliminated.
computer typically used for Internet access, batch.
email, accessing Web-based applications, Pareto principle (80–20 rule) An obser-
document processing, and audio/video open source software Software that is vation that for many events, roughly
playback. distributed for free, with access permitted to 80 percent of the effects come from
the source code so that it can be studied, 20 percent of the causes.
network A group or system of connected changed, and improved by software profes-
computers and equipment—in a room, sionals at the various user organizations— patch A minor system change to correct a
building, campus, city, across the country, or with no maintenance charges. problem or make a small enhancement; it is
around the world—that enables electronic usually an addition to an existing program.
communication. operating system (OS) A set of computer
programs that controls the computer hard- p-card (procurement card or purchasing
network operating system (NOS) Systems ware and acts as an interface to application card) A credit card used to streamline the
software that controls the computer systems software. traditional purchase order and invoice pay-
ment processes.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

GLOSSARY 643

perceptive system A system that approxi- procedure A set of steps that need to be project integration management The
mates the way a person sees, hears, and followed to achieve a specific end result, such coordination of all appropriate people,
feels objects. as enter a customer order, pay a supplier resources, plans, and efforts to complete a
invoice, or request a current inventory report. project successfully.
performance evaluation test A compari-
son of vendor options conducted in a com- process A set of logically related tasks project management The application of
puting environment (e.g., computing performed to achieve a defined outcome. knowledge, skills, and techniques to project
hardware, operating system software, data- activities to meet project requirements.
base management system) and with a process manufacturing The production of
workload (e.g., number of concurrent users, products—such as soda, laundry detergent, project milestone A critical date for com-
database size, and number of transactions) gasoline, and pharmaceutical drugs—that pleting a major part of the project, such as
that matches its intended operating are the result of a chemical process; these program design, coding, testing, and release
conditions. products cannot be easily decomposed into (for a programming project).
their basic components.
personal area network (PAN) A network project risk An uncertain event or condi-
that supports the interconnection of infor- processor family A set of processors from tion that, if it occurs, has a positive or a
mation technology devices close to one the same manufacturer that have similar negative effect on a project objective.
person. features and capabilities.
project schedule A plan that identifies the
personal IS An information system that procurement management A set of activi- project activities that must be completed, the
improves the productivity of individual ties related to the acquisition of goods and/ expected start and end dates, and what
users in performing stand-alone tasks. or services for the project from sources out- resources are assigned to each task.
side the performing organization.
personal productivity software Software project scope A definition of which tasks
that enables users to improve their personal product lifecycle management (PLM) An are included and which tasks are not
effectiveness, increasing the amount of work enterprise business strategy that creates a included in a project.
and quality of work they can do. common repository of product information
and processes to support the collaborative project sponsor A senior manager from the
personal sphere of influence The sphere creation, management, dissemination, and business unit most affected by a project and
of influence that serves the needs of an use of product and packaging definition who ensures the project will indeed meet
individual user. information. the needs of his or her organization.

personalization The process of tailoring product lifecycle management (PLM) project stakeholders The people involved
Web pages to specifically target individual software Software that provides a means for in the project or those affected by its
consumers. managing the data and processes associated outcome.
with the various phases of the product life
pilot start-up A cutover strategy that cycle, including sales and marketing, research project steering team A group of senior
involves running the complete new system and development, concept development, managers representing the business and IS
for one group of users rather than for all product design, prototyping and testing, pro- organizations that provide guidance and
users. cess design, production and assembly, delivery support to a project.
and product installation, service and support,
phase-in approach A cutover strategy that and product retirement and replacement. projecting Manipulating data to eliminate
involves slowly replacing components of the columns in a table.
old system with those of the new one; this product owner A person who represents
process is repeated for each application until the project stakeholders and is responsible proprietary software One-of-a-kind soft-
the new system is running every application for communicating and aligning project pri- ware designed for a specific application and
and performing as expected; also called a orities between the stakeholders and devel- owned by the company, organization, or
piecemeal approach. opment team. person that uses it.

phishing The act of fraudulently using Program Evaluation and Review Tech- public cloud computing A means of pro-
email to try to get the recipient to reveal nique (PERT) A formal method for esti- viding computing services wherein a service
personal data. mating the duration of a project using three provider organization owns and manages
time estimates for an activity: shortest pos- the hardware, software, networking, and
platform as a service (PaaS) An approach sible time, most likely time, and longest storage devices, with cloud user organiza-
that provides users with a computing plat- possible time; working with those estimates, tions (called tenants) accessing slices of
form, typically including operating system, a formula is used to determine a single PERT shared resources via the Internet.
programming language execution environ- time estimate.
ment, database services, and Web server. Q
programming languages Sets of key-
podcast An audio broadcast you can listen words, commands, symbols, and rules for quality The degree to which a project meets
to over the Internet. constructing statements by which humans the needs of its users.
can communicate instructions to a
point-of-sale (POS) device A device used computer. quality assurance The evaluation of the
to enter data into a computer system. progress of the project on an ongoing basis
project A temporary endeavor undertaken to ensure that it meets the identified quality
policy-based storage management The to create a unique product, service, or result. standards.
automation of storage using previously
defined policies. project champion A well respected man- quality control The checking of project
ager with a passion to see a project succeed results to ensure that they meet identified
portable computer A computer small and who removes barriers to the success of quality standards.
enough to carry easily. the project.
quality management A set of activities
predecessor task A task that must be project deadline The date the entire project designed to ensure that a project will meet
completed before a later task can begin. should be completed and operational— the needs for which it was undertaken.
when the organization can expect to begin
primary key A field or set of fields that to reap the benefits of the project. quality planning The determination of
uniquely identifies the record. which quality standards are relevant to
the project and determining how they will
private cloud environment A single tenant be met.
cloud.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

644 GLOSSARY

R risk owner The individual responsible for self-service analytics Training, techni-
developing a risk management strategy and ques, and processes that empower end
radio frequency identification (RFID) A monitoring the project to determine if the users to work independently to access data
technology that employs a microchip with risk is about to occur or has occurred. from approved sources to perform their
an antenna to broadcast its unique identifier own analyses using an endorsed set of
and location to receivers. robotics A branch of engineering that tools.
involves the development and manufacture
random access memory (RAM) A form of of mechanical or computer devices that can semiconductor fabrication plant A factory
memory in which instructions or data can be perform tasks requiring a high degree of where integrated circuits are manufactured;
temporarily stored. precision or that are tedious or hazardous also called a fab or a foundry.
for humans.
ransomware Malware that stops you from server A computer employed by many
using your computer or accessing your data rootkit A set of programs that enables its users to perform a specific task, such as
until you meet certain demands such as user to gain administrator level access to a running network or Internet applications.
paying a ransom or sending photos to the computer without the end user’s consent or
attacker. knowledge. server farm A facility that houses a large
number of servers in the same room, where
read-only memory (ROM) A nonvolatile rule A conditional statement that links access to the machines can be controlled and
form of memory. conditions to actions or outcomes. authorized support personnel can more eas-
ily manage and maintain the servers.
reasonable assurance The IS security S
concept that recognizes that managers must service-oriented architecture (SOA) A
use their judgment to ensure that the cost of scalability The ability to increase the pro- software design approach based on the use
control does not exceed the system’s bene- cessing capability of a computer system so of discrete pieces of software (modules) to
fits or the risks involved. that it can handle more users, more data, or provide specific functions as services to
more transactions in a given period. other applications.
record A collection of data fields all related
to one object, activity, or individual. schedule feasibility The process of deter- shadow IT The information systems and
mining whether the project can be com- solutions built and deployed by departments
redundant array of independent/ pleted within a desired time frame. other than the information systems depart-
inexpensive disks (RAID) A method of ment. In many cases, the information sys-
storing data that generates extra bits of data schema A description that defines the log- tems department may not even be aware of
from existing data, allowing the system to ical and physical structure of the database by these efforts.
create a “reconstruction map” so that if a identifying the tables, the fields in each
hard drive fails, the system can rebuild lost table, and the relationships between fields shadowing A process used to capture tacit
data. and tables. knowledge that involves a novice observing
an expert executing her job to learn how she
reengineering (process redesign/busi- scope management A set of activities that performs.
ness process reengineering, BPR) The include defining the work that must be
radical redesign of business processes, done as part of a project and then control- single-user license A software license that
organizational structures, information sys- ling the work to stay within the agreed- permits you to install the software on one or
tems, and values of the organization to upon scope. more computers, used by one person.
achieve a breakthrough in business results.
scrum An agile development framework site preparation Preparation of the loca-
relational database model A simple but that emphasizes a team based approach in tion of a new system.
highly useful way to organize data into col- order to keep the development effort
lections of two-dimensional tables called focused and moving quickly. slack time The amount of time an activity
relations. can be delayed without delaying the entire
scrum master The person who coordinates project.
release A significant program change that all the scrum activities of a team.
often requires changes in the documentation slipstream upgrade A minor system
of the software. search engine A valuable tool that enables upgrade-typically a code adjustment or
you to find information on the Web by minor bug fix; it usually requires recompil-
request for information (RFI) A document specifying words that are key to a topic of ing all the code, and in so doing, it can cre-
that outlines an organization’s hardware or interest, known as keywords. ate entirely new bugs.
software needs and requests vendors to
provide information about if and how they search engine optimization (SEO) A pro- smart card A credit card embedded with a
can meet those needs and the time and cess for driving traffic to a Web site by using computer chip that contains key consumer
resources required. techniques that improve the site’s ranking in and account data; smart card users must either
search results. enter their PIN (chip-and-PIN) or sign (chip-
restraining forces Forces that make it dif- and-sign) for each transaction to be approved.
ficult to accept a change or to work to secondary storage A device that stores
implement a change. large amounts of data, instructions, and smishing Another variation of phishing
information more permanently than allowed that involves the use of Short Message Ser-
rich Internet application (RIA) A Web- with main memory. vice (SMS) texting.
delivered application combines hardware
resources of the Web server and the PC to security audit A careful and thorough soft side of implementing change The
deliver valuable software services through a analysis that evaluates whether an organi- work designed to help employees embrace a
Web browser interface. zation has a well-considered security policy new information system and way of working.
in place and if it is being followed.
risk assessment The process of assessing software The computer programs that
security-related risks to an organization’s security policy A statement that defines an govern the operation of a particular com-
computers and networks from both internal organization’s security requirements, as well puting device, be it desktop, laptop, tablet,
and external threats. as the controls and sanctions needed to meet smartphone, or some other device.
those requirements.
risk management A deliberate and sys- Software as a Service (SaaS) A service that
tematic process designed to identify, ana- selecting Manipulating data to eliminate allows businesses to subscribe to Web-
lyze, and manage project risks. rows according to certain criteria. delivered application software.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

GLOSSARY 645

software suite A collection of programs Strengths, Weaknesses, Opportunities, system investigation report A summary of
packaged together and sold in a bundle. Threats (SWOT) matrix A simple way to the results of the system investigation, with a
illustrate what a company is doing well, recommendation of a course of action.
software-defined networking (SDN) An where it can improve, what opportunities
emerging approach to networking that are available, and what environmental fac- system maintenance A stage of system
allows network administrators to have pro- tors threaten the future of the organization. development that involves changing and
grammable central control of the network enhancing the system to make it more useful
via a controller without requiring physical subject matter expert Someone who pro- in achieving user and organizational goals.
access to all the network devices. vides knowledge and expertise in a particu-
lar aspect important to the project. system operation Involves the use of a
solid state storage device (SSD) A storage new or modified system under all kinds of
device that stores data in memory chips supercomputers The most powerful com- operating conditions.
rather than on hard disk drives or optical puter systems with the fastest processing
media. speeds. system review The process of analyzing a
system to make sure it is operating as
source data automation Capturing data supply chain A key value chain whose intended.
at its source and recording it accurately in primary activities include inbound logistics,
a timely fashion, with minimal manual operations, outbound logistics, marketing system software Software that includes
effort and in an electronic or digital form and sales, and service. operating systems, utilities, and middleware
so that it can be directly entered into the that coordinate the activities and functions
computer thus ensuring accuracy and supply chain management (SCM) A sys- of the hardware and other programs
timeliness. tem that includes planning, executing, and throughout the computer system.
controlling all activities involved in raw
spam The use of email systems to send material sourcing and procurement, the system testing Testing the complete, inte-
unsolicited email to large numbers of conversion of raw materials to finished pro- grated system (hardware, software, data-
people. ducts, and the warehousing and delivery of bases, people, and procedures) to validate
finished products to customers. that the information system meets all speci-
spear-phishing A variation of phishing in fied requirements.
which the phisher sends fraudulent emails syntax A set of rules associated with a
to a certain organization’s employees. programming language. T

speech-recognition technology Input system acquisition The process used to tablet A portable, lightweight computer
devices that recognize human speech. obtain the information system resources with no keyboard that allows you to roam
needed to provide the services necessary to the office, home, or factory floor carrying
sphere of influence The scope of the pro- meet a specific set of needs. the device like a clipboard.
blems and opportunities that the software
addresses. system analysis The phase of system tacit knowledge The know-how that some-
development that focuses on gathering data one has developed as a result of personal
sponsoring business unit The business on the existing system, determining the experience; it involves intangible factors such
unit most affected by the project and the one requirements for the new system, considering as beliefs, perspective, and a value system.
whose budget will cover the project costs. alternatives within identified constraints, and
investigating the feasibility of alternative tag A code that tells the Web browser how
SQL A special-purpose programming lan- solutions. to format text—as a heading, as a list, or as
guage for accessing and manipulating data body text—and whether images, sound, and
stored in a relational database. system construction The phase of system other elements should be inserted.
development that converts the system
star network A network in which all net- design into an operational system by tangible benefit A benefit that can be mea-
work devices connect to one another acquiring and installing hardware and soft- sured directly and assigned a monetary value.
through a single central device called the ware, coding and testing software programs,
hub node. creating and loading data into databases, technical documentation Written details
and performing initial program testing. used by computer operators to execute the
storage area network (SAN) A high-speed, program and by analysts and programmers
special-purpose network that integrates dif- system design The stage of system devel- to solve problems or modify the program.
ferent types of data storage devices (e.g., opment that answers the question, “How will
hard disk drives, magnetic tape, solid state the information system solve a problem?” technical feasibility The process of deter-
secondary storage devices) into a single mining whether a project is feasible within
storage system and connects that to com- system development The activity of the current limits of available technology.
puting resources across an entire building information systems to meet users’
organization. needs. technical resource A subject matter expert
in an IS topic of value to the project.
storage as a service A data storage model system disposal A stage of system devel-
where a data storage service provider rents opment that involves those activities that technology acceptance model (TAM) A
space to individuals and organizations. ensure the orderly dissolution of the system, model that specifies the factors that can lead to
including disposing of all equipment in an better attitudes about an information system,
storefront broker A company that acts as environmentally friendly manner, closing along with higher acceptance and usage of it.
an intermediary between your Web site and out contracts, and safely migrating informa-
online merchants who have the products tion from the system to another system or technology infrastructure All the hard-
and retail expertise. archiving it in accordance with applicable ware, software, databases, networks, peo-
records management policies. ple, and procedures that are configured to
strategic planning A process that helps collect, manipulate, store, and process data
managers identify desired outcomes and system investigation The initial phase in into information.
formulate feasible plans to achieve their the development of a new or modified
objectives by using available resources and business information system whose purpose thin client A low-cost, centrally managed
capabilities. is to gain a clear understanding of the spe- computer with no internal or external
cifics of the problem to solve or the oppor- attached drives for data storage.
strategy A plan that describes how an tunity to address.
organization will achieve its vision, mission, time and material contract A contract that
objectives, and goals. requires the buyer to pay the provider for

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

646 GLOSSARY

both the time and materials required to utility program A program that helps to development process in which work on the
complete the contract. perform maintenance or correct problems next stage cannot begin until the results of
with a computer system. the current stage are reviewed and approved
time management A set of activities that or modified as necessary.
includes defining an achievable completion V
date that is acceptable to the project stake- wearable computer An electronic device
holders, developing a workable project value chain A series (chain) of activities capable of storing and processing data that
schedule, and ensuring the timely comple- that an organization performs to transform is incorporated into a person’s clothing or
tion of the project. inputs into outputs in such a way that the personal accessories.
value of the input is increased.
transaction Any business-related exchange Web 2.0 The Web as a computing platform
such as a payment to an employee, a sale to version A major program change, typically that supports software applications and the
a customer, or a payment to a supplier. encompassing many new features. sharing of information among users.

transaction processing cycle The process virtual private network (VPN) A secure Web browser Web client software—such
of data collection, data editing, data correc- connection between two points on the as Chrome, Edge, Firefox, Internet Explorer,
tion, data processing, data storage, and Internet; VPNs transfer information by and Safari—used to view Web pages.
document production. encapsulating traffic in IP packets and
sending the packets over the Internet. Web log (blog) A Web site that people and
transaction processing system (TPS) An businesses use to share their observations,
organized collection of people, procedures, virtual reality system A system that experiences, and opinions on a wide range
software, databases, and devices used to enables one or more users to move and react of topics.
process and record business transactions. in a computer-simulated environment.
wide area network (WAN) A network that
Transport Layer Security (TLS) A com- virtual server A method of logically divid- connects large geographic regions.
munications protocol or system of rules that ing the resources of a single physical server
ensures privacy between communicating to create multiple logical servers, each acting Wi-Fi A medium-range wireless communi-
applications and their users on the Internet. as its own dedicated machine. cations technology brand owned by the Wi-
Fi Alliance.
Trojan horse A seemingly harmless pro- virtual tape A storage device for less fre-
gram in which malicious code is hidden. quently needed data. With virtual tape sys- wireless communication The transfer of
tems, data appears to be stored entirely on information between two or more points
U tape cartridges, although some parts of it that are not connected by an electrical
might actually be located on faster hard disks. conductor.
Uniform Resource Locator (URL) A Web
address that specifies the exact location of a virtual team A group of individuals whose word cloud A visual depiction of a set of
Web page using letters and words that map members are distributed geographically, but words that have been grouped together
to an IP address and a location on the host. who collaborate and complete work through because of the frequency of their
the use of information systems. occurrence.
unit testing Testing of individual compo-
nents of code (subroutines, modules, and virus A piece of programming code, usually work breakdown structure (WBS) An
programs) to verify that each unit performs disguised as something else, that causes a outline of the work to be done to complete
as designed. computer to behave in an unexpected and the project.
usually undesirable manner.
U.S. Computer Emergency Readiness workgroup Two or more people who work
Team (US-CERT) A partnership between virus signature A sequence of bytes that together to achieve a common goal.
the Department of Homeland Security and indicates the presence of a specific virus.
the public and private sectors; established to workgroup application software Software
provide timely handling of security incidents vishing Similar to smishing except that the that supports teamwork, whether team
as well as conducting improved analysis of victims receive a voice mail message telling members are in the same location or dis-
such incidents. them to call a phone number or access a persed around the world.
Web site.
user acceptance document A formal workgroup sphere of influence The
agreement that the organization signs stat- vision A concise statement of what an sphere of influence that helps workgroup
ing that a phase of the installation or the organization intends to achieve in the future. members attain their common goals.
complete system is approved.
vision system The hardware and software workstation A more powerful personal
user acceptance testing (UAT) Testing that permit computers to capture, store, and computer used for mathematical computing,
performed by trained system users to verify manipulate visual images. computer-assisted design, and other high-
that the system can complete required tasks end processing but still small enough to fit
in a real-world operating environment and vision/mission statement A statement that on a desktop.
perform according to the system design communicates an organization’s overarching
specifications. aspirations to guide it through changing World Wide Web (WWW) A network of
objectives, goals, and strategies. links on the Internet to files containing text,
user documentation Written descriptions graphics, video, and sound.
developed for people who use a program; in volume testing Testing to evaluate the
easy-to-understand language, it shows how performance of the information system worm A harmful program that resides in
the program can and should be used to meet under varying yet realistic work volume and the active memory of the computer and
the needs of its various users. operating conditions to determine the work duplicates itself.
load at which systems performance begins
user interface The element of the operating to degrade and to identify and eliminate any zero-day attack An attack that takes place
system that allows people to access and issues that prevent the system from reaching before the security community and/or soft-
interact with the computer system. its required service-level performance. ware developers become aware of and fix a
security vulnerability.
user preparation The process of readying W
managers, decision makers, employees, Z
other users, and stakeholders to accept and waterfall systems development process
use the new system. A sequential, multistage systems zombie A computer that has been taken
over by a hacker to be used as part of a
botnet.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

Subject Index

Note: A boldface page number indicates a key term and the location of its definition in the text.

A audio data, 5 bring your own device (BYOD), 563
audio, multimedia, 433–434 BRMS (business rules management systems),
ACM (Association for Computing Machinery), automated teller machine (ATM) devices,
417–419
624 105 broadband communications, 245
automatic data processing (ADP), 348 BTO (Business Technology Optimization),
ADP (automatic data processing), 348 autonomic computing, 283
advanced persistent threat (APT), 570–571 AWS (Amazon Web Services), 16, 162–163, 535
advertising, 316–317 Building Energy Data Exchange Specification
agile development, 539–542 262, 282
(BEDES), 209
advantages and disadvantages of, 540 B Burke, Brian, 613
firm’s first agile project, 542 bus, 87
Airbnb, 162–163 B (byte), 91 bus network, 241
alpha testing, 530 B2B (business-to-business) e-commerce, business analytics, 25, 384

alphanumeric data, 5 298–299, 302 application software, 173
B2C (business-to-consumer) e-commerce, business intelligence (BI), 25, 385
Amazon DynamoDB, 226
Amazon Web Services (AWS), 16, 162–163, 299–302 benefits of, 385–386
banking, 320–321 components required, 387
262, 282 bar-code scanners, 105 business intelligence and analytics tools
bartering dashboards, 395–397, 396
analysis, 365 data mining, 394–395
couponing, 318–319 data visualization tools, 389–391
Android Emulator, 175 price comparison, 318 drill-down analysis, 392–393
retargeting, 318 linear regression, 393–394
Android operating system, 150 Websites, 318 online analytical processing, 391–392
animation, 434–435 batch processing systems, 347–348 querying tools, 389
antivirus software, 581–582 BBB Code of Business Practices, 615 reporting tools, 389
API (application programming interface), BCI (brain-computer interface), 424 self-service analytics, 397–399
BEDES (Building Energy Data Exchange spreadsheets, 388–389
144 business process reengineering (BPR), 53
Apple Computer operating system, 148–149 Specification), 209 continuous improvement vs., 54
Application Continuous Availability, 525 beta testing, 530 business rules management systems
BI. See business intelligence
application programming interface (API), big data, 14 (BRMS), 417–419
Business Technology Optimization (BTO),
144 challenges of, 218–219
characteristics of, 216 535
application software, 138 database systems and, 13–15 businesses
business analytics, 173 free sources of, 217
competitive advantage, 173 life cycle, 221 information systems in, 18–20
enterprise, 171–172 sources of, 216 virtual reality, 438–439
overview of, 160–163 technologies for, 222–228 business-to-business (B2B) e-commerce,
personal, 163–170 uses of, 217–218
programming languages, 173–175 variety, 216 298–299, 302
transaction processing, 173 velocity, 216 business-to-consumer (B2C) e-commerce,
workgroup, 170–171 volume, 216
Bill of Rights, 607 299–302
APT (advanced persistent threat), 570–571 Bing search engine, 266 buy versus build, 504–506
ARM, computer processor, 88–89 bioinformatics, 441 buying off-the Shell, 542–547
biomedical informatics, 441
artificial intelligence (AI), 421 bioprinting, 110 finalizing contract, 545–546
brain-computer interface, 424 bit, 195 implementation, 546
conceptual model of, 425 black hat hacker, hiring, 576–577 integration and testing, 546
expert system, 424–428 blade server, 120 software package evaluation phase,
learning system, 430 blended threat, 567
natural language processing, 429–430 blog, 269 543–545
nature of, 422–424 BLS (U.S. Bureau of Labor Statistics), 63 BYOD (bring your own device), 563
neural network, 430–431 Bluetooth, 247–248 byte (B), 91
other applications, 431–432 botnet, 569
overview of, 421–422 BPR. See business process reengineering C
in perspective, 422 brain-computer interface (BCI), 424
robotics, 428–429 brain-machine interface, 425 C2C (consumer-to-consumer) e-commerce,
vision system, 429 302

artificial intelligence systems, 422 CA (certificate authority), 329
assistive technology system, 439–440 cache memory, 92
CAD (computer-aided design), 367
Association for Computing Machinery CAE (computer-aided engineering), 368

(ACM), 624

atomicity, consistency, isolation, durability

(ACID) properties, 206

attached storage, 97
attribute, 196–197

647

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

648 SUBJECT INDEX

CAM (computer-aided manufacturing), common personal computer input devices, Internet, 15
368 network, 15
101 software, 12
CAN-SPAM (Controlling the Assault of computer-related health problems, 619
Non-Solicited Pornography and Communications Decency Act, 615 computer-related jobs, BLS projections, 63
Marketing) Act, 568 computer-related mistakes, 601–603
communications devices, 251 concurrency control, 210
CAPTCHA (Completely Automated Public conferencing, 268–269
Turing Test to Tell Computers and communications hardware, 251 consumerization of IT, 13
Humans Apart), 568 consumer-to-consumer (C2C) e-commerce,
communications management, 484–485
card verification value (CVV), 574 communications media, 245–251 302
careers contact data, importing, 366
4G wireless communications, 250–251 contact management, 365
best places to work, 66 5G wireless communications, 251 contactless payment card, 104
certification, 71 guided transmission media types, 245–246 container, 120
development roles, 68–69 microwave transmission, 249–250 content streaming, 270
in information systems, 62–73 wireless technologies, 246–249 continuous improvement, 53
operations roles, 68
other IS, 72 communications medium, 241 business process reengineering vs., 54
roles outside IS organization, 70–71 Controlling the Assault of Non-Solicited
support roles, 69–70 communications software
titles in information systems, 67–70 mobile device management, 252 Pornography and Marketing
top H-1B visa employers, 65 network operating system, 251–252 (CAN-SPAM) Act, 568
carpal tunnel syndrome (CTS), 619 network-management software, 252 controls
Cascading Style Sheet (CSS), 260–261 software-defined networking, 253 design system, 523
category management dashboard system, 518–519
for Northwest region, 397 community of practice (CoP), 415 conversion funnel, 390
for U.S. region, 396 CoP (community of practice), 415
CBIS. See computer-based information compact disc read-only memory (CD-ROM), COPPA (Children’s Online Privacy Protection
Act), 612
system 96 coprocessor, 89
CCSP (Cisco Certified Security Professional), copyright, 177
compiler, 174 core competency, 471–472
71 core value, 462
CD-ROM (compact disc read-only memory), Completely Automated Public Turing Test to corporate privacy policy, 615–617
cost management, 478–481
96 Tell Computers and Humans Apart cost-reimbursable contract, 489
central processing unit (CPU), 87 COTS (commercial off the- shelf software),
certificate authority (CA), 329 (CAPTCHA), 568 542
certification, 71 couponing, 318–319
Certified Information Systems Security compliance departments, 523 CPU (central processing unit), 87
credit card, 331–332
Professional (CISSP), 71 computer(s) crime risk assessment, 577–578
change management model, 57 desktop, 116 CRISP-DM (Cross-Industry Process for Data
channel bandwidth, 244–245 enterprise storage options, 97–99 Mining), 394–395
character, 195 input devices, 100–107 critical path, 477–478
charge card, 331–332 mainframe, 117 Cross-Industry Process for Data Mining
chief information officer (CIO), 8, 67 memory, 91–93 (CRISP-DM), 394–395
chief technology officer (CTO), 67–68 mobile, 113–114 CSS. See Cascading Style Sheet
Child Online Protection Act, 615 multiple-user, 112 CSS (Cascading Style Sheet), 260–261
Children’s Internet Protection Act (CIPA), nettop, 116 CTO (chief technology officer), 67–68
network, 241 CTS (carpal tunnel syndrome), 619
615 nonportable, 112 culture, 56
Children’s Online Privacy Protection Act operational supercomputers, 118 organizational, 56
output devices, 107–111 current operating system, 145–146
(COPPA), 612 portable, 113–114 Customer Experience Community of
chip card, 104 processors, 87–91 Practice (CX-COP), 415
Chrome operating system, 150 secondary data storage devices, 93–97 customer relationship management (CRM)
CIO (chief information officer), 8, 67 servers, 116–117 system, 363–367
CIPA (Children’s Internet Protection Act), special-purpose, 141–142 highly rated, 367
storage units, 91 implementation reasons, 364–365
615 supercomputers, 117–118 key features of, 365–366
Cisco Certified Security Professional (CCSP), thin client, 115 customer support, 365
types of, 111–118 cutover, 532–534
71 wearable, 113 CVV (card verification value), 574
client/server architecture, 244 workstation, 116 CX-COP (Customer Experience Community
clock speed, 87 of Practice), 415
cloud computing, 279–283 computer forensics, 586–588 cybercrimes, 30–31, 562–577
classifying perpetrators of, 565
data disaster recovery planning, 525 computer graphics card, 108 computer incidents, 562–565
hybrid, 283 federal laws for, 576–577
networks and, 15–17 computer incidents, reasons for, 562–565
private, 283 expanding and changing systems, 563
public, 281–282 growing reliance on software with known
coaxial cable, 248 vulnerabilities, 563–564
code of ethics, 624 higher computer user expectations, 563
Code Red worm, 566 increase in prevalence of bring your own
cold site, 524 device (BYOD) policies, 563
Collins, Jim, 8 increasing computing complexity, 563
command-based user interface, 142–143 increasing sophistication of those who
commercial off the- shelf (COTS) software, would do harm, 565

542 computer network, 241
computer waste, 600–601

computer-aided design (CAD), 367

computer-aided engineering (CAE), 368

computer-aided manufacturing (CAM), 368

computer-based information system

(CBIS), 6
components, 7–8
databases, 13
hardware, 11

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

SUBJECT INDEX 649

cybercriminal, 30 generating reports, 211–212 e-book, 111
cyberespionage, 574–575 manipulating data, 211–212 e-book readers, 111
cyberloafing, 605–606 modifying, 208–210
cyberterrorism, 30, 575–576 NoSQL, 224–226 e-business (electronic business), 21
with other software, 214
D primary key, 197 e-commerce. See electronic commerce
Query by Example, 211
DaaS (database as a service), 214 retrieving data, 210–211 economic feasibility, 511
DAMA (Data Management Association), SQL, 206–207
database administrator (DBA), 69–70, e-discovery (electronic discovery), 420
219–220
dashboards, 395–397, 396 212 education
data, 4 database applications, 166 virtual reality, 438
database approach to data management, World Wide Web, 265
backup, 538
breach, 573–574 197–198 e-government, 303–304
cleaning, 204 database as a service (DaaS), 214
cleansing, 204–205 database management system (DBMS), 194 EHR (electronic health record) software,
creation and loading for system
creating database, 208–210 546–547
development, 528 generating reports, 211–212
differences from information, 4–5 manipulating data, 211–212 electronic business (e-business), 21
hierarchy of, 195 modifying database, 208–210
organizing/processing, 5–6 retrieving data, 210–211 electronic cash, 330–331
relational database manipulation, 202–204 storing data, 210–211
scrubbing, 204 user view, 208 electronic commerce (e-commerce), 20
sensitive, deletion, 538 database model, relational, 200–204 advantages of, 305–307
types of, 5 data-flow diagram (DFD), 516–517 advertising, 316–317
units of measure, 15 data-flow line, 516 after-sales service, 309
data administrator, 213 DBA (database administrator), 69–70, banking, 320–321
data breach, 573–574 bartering, 318–319
data center, 120–122 212 benefits of, 21
managers, 68 DBMS. See database management system business-to-business, 298–299, 302
modular, 121 DDL (data definition language), 208, 525 business-to-consumer, 299–302
data collection, 353–354 DDoS (distributed denial-of-service) attack, challenges, 310–313
data correction, 354–355 consumer privacy concerns, 310–311
data cube, 391–392 569–570 consumer-to-consumer, 302
data definition language (DDL), 208, 525 debit card, 331–332 effective model, 322
data dictionary, 208, 525 decision making, ethical considerations in, e-government, 303–304
data dictionary entry, 209 finance, 319–320
data editing, 354 622–625 investment, 319–320
data entry, 100 demand management, 362 manufacturing, 314–315
data governance, 219 desktop computer, 116 marketing, 315–316
data input, 100 detailed scheduling, 362 multistage model of, 307–309
data item, 196 DevOps, 540–542 overcoming consumers’ lack of trust,
data lake, 224 DFD (data-flow diagram), 516–517 311–312
data lifecycle management (DLM), 221 diffusion of innovation theory, 61 overcoming global issues, 312–313
data management, 219–221, 399 digital audio player, 110 personalized shopping, 321
Data Management Association (DAMA), digital certificate, 329 products and services delivery, 308–309
digital divide, 32 scope of, 20
219–220 digital video disc (DVD), 96 search and identification, 308
data manipulation language (DML), 211 direct conversion, 533 selection and negotiation, 308
data mart, 224 direct cutover, 533 software, 328
data mining, 394–395 Direct Marketing Association Web site, 618 strategies for successful, 322–326
data model, 199 disaster recovery plan, 523–525 technology infrastructure, 326–333
discrete manufacturing, 370 wholesale, 313–314
enterprise, 199–200 display screen, 107–108
data modeling, 517 disruptive innovation, 52–53 electronic discovery (e-discovery), 420
data processing, 355 distributed denial-of-service (DDoS) attack,
data scientists, 25, 386–387 electronic exchange, 314–315
data steward, 220 569–570
data storage, 355 DLM (data lifecycle management), 221 electronic health record (EHR) software,
data store symbol, 517 DML (data manipulation language), 211 546–547
data visualization, 389 document production, 355
data visualization tools, 389–391 domain, 202 electronic payment systems, 329–333
data warehouse, 13–14, 222–224 domain expert, 427 certificate authority, 329
database(s), 13, 194 downsizing, 55 charge card, 331–332
drill-down analysis, 392–393 credit card, 331–332
activities, 207–212 driving forces, 57 debit card, 331–332
administration, 212–213 DVD (digital video disc), 96 digital certificate, 329
attribute, 196–197 electronic cash, 330–331
creating, 208–210 E p-card, 333
data definition language, 208 smart card, 331–332
data dictionary, 208 EAI (enterprise application integration), transport layer security, 330
designing, 525 158
entities, 195 electronic pointing devices, 439
eBay, 272
Electronic Product Environmental

Assessment Tool (EPEAT), 123

email, privacy, 610–611
embedded operating system, 153–155

embedded system, 153

enterprise application integration (EAI),

158

enterprise application software, 171–172

enterprise data hub, 224

enterprise data model, 199–200

enterprise information system, 9

enterprise operating system, 152

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

650 SUBJECT INDEX

enterprise resource planning (ERP) system, phishing, 571–572 Geostationary Operational Environmental
ransomware, 565–566 Satellite program, 250
22 spam, email, 567–568
advantages of, 357–359 Trojan horse, 566–567 geo-tagging, 274
benefits, 23–25 virus, 566 gigahertz (GHz), 87
best practices, 359 worms, 566 GISs (geographic information systems),
components of, 23–24 Extensible Markup Language (XML),
decision making, 357–358 274
legacy systems, 358 260–261 global positioning system (GPS) device,
software, 24 extract, transform, load (ETL), 13, 223–224
technology infrastructure upgrades, 359 extranet, 16, 274–275 153
work processes improvement, 358–359 extreme programming (XP), 540 global software support, 180
extreme ultraviolet lithography (EUVL), 90 Global Terrorism Database (GTD), 196
enterprise search, 419 goal, 463–464
F goals-based strategic planning, 459
enterprise search software, 419–420 Good to Great (Collins), 8
fab/foundry. See semiconductor fabrication Google Chrome, 259
enterprise search solutions, 419 plant Google Maps, 273–274
government-to-business (G2B) e-commerce,
enterprise sphere of influence, 139 failover, 525
FCC (Federal Communications Commis- 303
enterprise storage government-to-customer (G2C) e-commerce,
attached storage, 97 sion), 246
network-attached, 97–98 feasibility analysis, 510–512, 520, 525 303
storage area network, 98–99 Federal Communications Commission government-to-government (G2G)
storage as a service, 99
(FCC), 246 e-commerce, 303–304
enterprise systems, 21–25, 356 Federal Financial Institutions Examination Gramm-Leach-Bliley Financial Services
customer relationship management,
363–367 Council, 330 Modernization Act, 617
enterprise resource planning, 356–361 federal government and privacy, 606–609 graphical user interface (GUI), 143–144
hosted software model for, 372–373 federal laws for cybercrimes, 576–577 graphics, 433
overcoming challenges in implementing, Federal Trade Commission (FTC), 310 graphics processing unit (GPU), 108
371–372 fiber-optic cable, 248 green computing, 122–123
product lifecycle management, 367–371 field, 195 grid computing, 89
supply chain management, 361–363 file, 195 group information system, 9
file conversion and compression, 435 GSA (General Services Administration),
entity, 195 file management, 145
file-compression utilities, 156 415
entity symbol, 517 filtering software, 614 GTD (Global Terrorism Database), 196
finance, 319–320 GUI (graphical user interface), 143–144
entity-relationship (ER) diagram, 200–201 5G wireless communications, 251 guided transmission media types, 245–246
simplified, 202 fixed-price contract, 489
Flickr, 264 H
entrepreneurs and transaction processing force field analysis, 57
Ford Sync 3 user interface, 154 H-1B program, 65
systems, 352 forming-storming-norming-performing- Hadoop, 226–227
Hadoop Distributed File System (HDFS),
EPEAT (Electronic Product Environmental adjourning model, 481–482
4G wireless communications, 250–251 226–227
Assessment Tool), 123 Fourth Amendment, 609 hard disk drive (HDD), 94
Free Software Foundation, 177 hardware, 11. See also computer(s)
ER (entity-relationship) diagrams, 517 freeware, 177–180
FTC (Federal Trade Commission), 310 bus, 87
eradication effort, 585 functional decomposition, 475–476, central processing unit, 87
desktop computer, 116
ergonomics, 619 509–510, 516 disposal, 538
mainframe computer, 117
ethical issues, 622–625 G memory, 91–93
mobile commerce, 328–329
ethics, 31 G2B (government-to-business) e-commerce, mobile devices and, 11–12
303 nettop, 116
ETL (extract, transform, load), 13, 223–224 secondary storage devices, 93–97
G2C (government-to-customer) e-commerce, software expenditures spending on, 138
EU (European Union), 610 303 supercomputers, 117
tablet, 114
European Union (EU), 610 G2G (government-to-government) e-com- utilities, 155–156
merce, 303–304 workstation, 116
EUVL (extreme ultraviolet lithography), 90 hardware independence, 144
game theory, 440–441 Harvard Business Review, 46
expert system shell, 428 Gantt chart, 478–479 Hawking, Stephen, 440
General Electric (GE), 17, 54 HDD (hard disk drive), 94
expert systems, 424–428 General Services Administration (GSA), HDFS (Hadoop Distributed File System),
components of, 425–427
domain expert, 427 415 226–227
explanation facility, 427 genetic algorithm, 431 Health Insurance Portability and Account-
inference engine, 427 geographic information systems (GISs),
knowledge acquisition facility, 427 ability Act (HIPAA), 283
knowledge base, 426–427 274 healthcare informatics, 441
knowledge engineer, 427 geolocation, 273–274 help desk, 534
knowledge user, 427–428 hierarchy of data, 195
participants in developing and using,
427–428
shells and products, 428
user interface, 427

explanation facility, 427

explicit management, 410–411
exploits, on information system, 563–564
exploits, types of, 565–576

advanced persistent threat (APT),
570–571

blended threat, 567
cyberespionage, 574–575
cyberterrorism, 575–576
distributed denial-of-service (DDoS)

attack, 569–570
identity theft, 573–574

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

SUBJECT INDEX 651

HIPAA (Health Insurance Portability and information systems security analyst, 68 ISA (instruction set architecture), 88
infrastructure as a service (IaaS), 281 ISP (Internet service provider), 257
Accountability Act), 283 issues-based strategic planning, 459
in-memory database (IMDB), 227–228
Holmes v Petrovich Development Company, J
609 innovation, 52
adopters, 62 JAD (joint application development),
hosted software model diffusion, 61 508–509
advantages and disadvantages of, 373 disruptive, 52–53
enterprise software, 372–373 products, 52 joining data, 202
joint application development ( JAD),
hot site, 524 input devices
“How Information Gives You Competitive automated teller machine devices, 105 508–509
bar-code scanners, 105 joint problem solving, 411
Advantage,” 46 chip card, 104
HTML (Hypertext Markup Language), common personal computer input K
devices, 101
259–261 contactless payment cards, 104 kernel, 142
human resource management, 481–484 data entry, 100 key performance indicators (KPIs), 395–396
hybrid cloud, 283 data input, 100 KM. See knowledge management
definition, 87 KMS (knowledge management system), 25
hyperlinks, 259 magnetic ink character recognition, 103 knowledge, 5
magnetic stripe cards, 103–104 knowledge acquisition facility, 427
Hypertext Markup Language (HTML), motion-sensing input devices, 102 knowledge base, 426–427
259–261 optical data readers, 102–103 knowledge engineer, 427
pen devices, 106 knowledge management (KM), 410
I point-of-sale devices, 104–105
RFID devices, 105–106 business rules management systems,
IaaS (infrastructure as a service), 281 scanning devices, 102 417–419
smart cards, 104
IBM Healthcare Provider Data Model, 200 source data automation, 100–101 capturing expertise of individuals, 413
speech-recognition technology, 101–102 community of practice, 415
IBM Notes Social Edition, 171 touch screens, 106–107 electronic discovery, 420
employees, 414–415
IC (integrated circuit), 90 installation, 532 enterprise search software, 419–420
enthusiasts, 414
IDE (integrated development environment), instant messaging, 267 free flow of ideas, 412
and privacy, 611 leveraging expertise of people, 412–413
174 organizational goals and objectives, 414
identity theft, 310, 573–574 instruction set architecture (ISA), 88 organizational network analysis, 415–417
IEEE 802.11 network standard, 248 selling and implementing project,
intangible benefit, 470
IF-THEN statements, 426 413–415
integrated circuit (IC), 90 tacit knowledge, 414
image data, 5 technologies, 415–420
IMDB (in-memory database), 227–228 integrated development environment Web 2.0 technologies, 417
implementation tasks, key, 546 knowledge management system (KMS), 25
(IDE), 174 knowledge user, 427–428
incident KPIs (key performance indicators), 395–396
containment, 584–585 integrated software packages, 168–169
follow-up, 585–586 L
notifications, 584 integration testing, 529, 546
LAN (local area network), 243
inference engine, 427 Intel Atom processor, 88 laptop, 113
informatics, 441–442 Large Hadron Collider (LHC), 90
information, 4 intelligent agent, 432 law, 622
lead time, 362
data and, 4–5 intelligent behavior, 422 learning system, 430
privacy, 614 Leavitt’s diamond, 59–60
quality, 6–7 interface devices, 436–437 legal feasibility, 511
value of, 5–6 legal versus ethical, 625
information silo, 22 Internet, 15 Lewin, Kurt, 57
accessing, 257–258 Lewin’s change model, 57
information system (IS), 6 backbone, 255 Lewin’s force field analysis, 57–59
in businesses, 18–20 intranets, 274–275 LexisNexis, 267
careers in, 62–73 IP addresses, 255 LHC (Large Hadron Collider), 90
characteristics of, 10 libel concerns and privacy, 613–614 Library of Congress (LOC), 215
components of, 7–8 online conferencing, 268–269 licenses, 177–178
computer-based, 6–7 online media, 269–272 LifeKeeper, 525
cybercrime, 30–31 privacy, 612–613 linear regression, 393–394
enterprise, 9–10 routing messages, 255 LinkedIn, 266
ethical issues, 622–625 shopping, 272–273 linking data, 202
ethical issues of, 31–33 Uniform Resource Locator, 256 Linux operating system, 149–150
examples of, 10 utilities, 156–157 LinxCRM, 527
finding job, 72–73 Web applications and, 263–274
group, 9–10 working of, 255–257
legal issues of, 31–33 World Wide Web, 259–261
occupational outlook, 64
organization and, 46–51 Internet censorship, 32
in organizations, 9
personal, 9–10 Internet of Everything (IoE), 17
social issues of, 31–33
specialized, 25–26 Internet of Things (IoT), 17, 276–279
strategies, 29
supply versus demand, 65 Internet protocol (IP), 255

information system strategic planning Internet service provider (ISP), 257
identifying projects and initiatives, 469
organizational strategy, 467–468 intranet, 16, 274–275
prioritizing projects and initiatives, intrusion detection system, 583–584
469–470 investment, 319–320

IoE (Internet of Everything), 17

IoT (Internet of Things), 17, 276–279

IP (Internet protocol), 255

IP addresses, 255

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

652 SUBJECT INDEX

LOC (Library of Congress), 215 middleware, 158 communications software, 251–253
local area network (LAN), 243 MIS (management information system), 22 computer, 241
mission statement, 462 Wi-Fi, 248–249
administrators, 68 mission-critical processes, 524 network operating system (NOS), 251–252
logic bomb, 567 mobile applications, software, 12–13, 170 network topology, 241–242
Long Term Evolution (LTE), 250 mobile commerce (m-commerce), 21 bus network, 241
lot size, 362 mesh network, 242
low earth orbit (LEO) satellite system, 250 advantages of, 305–307 star network, 241
LTE (Long Term Evolution), 250 advertising, 316–317 network types, 242–244
banking, 320–321 local area network, 243
M bartering, 318–319 metropolitan area network, 244
finance, 319–320 personal area network, 243
Mac operating systems, 148 improved customer service, 307 wide area network, 244
Mac OS X Server, 151 increasing accuracy, 306–307 network utilities, 156–157
macro viruses, 566 investment, 319–320 network-attached storage (NAS), 97
magnetic ink character recognition (MICR) manufacturing, 314–315
marketing, 315–316 network-management software, 252
devices, 103 personalized shopping, 321 neural network, 430–431
magnetic stripe card, 103 in perspectives, 305 next-generation firewall (NGFW), 580–581
magnetic tape, 94 reaching new customers, 305–306 NFC (near field communication), 246–247
main memory, 91 reduced costs, 306 NGFW (next-generation firewall), 580–581
mainframe computer, 117 strategies for successful, 322–326 NOS (network operating system), 251–252
mainframe utilities, 157–158 technology infrastructure, 326–333 NoSQL database, 224–226
make-or-buy decision, 488 Websites, 305 NSA (National Security Agency), 225–226
MAN (metropolitan area network), 244 mobile crowd sensing (MCS), 612
managed security service provider (MSSP), O
mobile device management (MDM)
586 software, 158, 252 objective, 462
management information system (MIS), 22
manipulating data, 202–204 mobile devices OCR (optical character recognition),
manufacturing, electronic commerce, accessing, 366 102–103
hardware and, 11–12
314–315 offshore outsourcing, 54
manufacturing processors, 90–91 mobile operating system, 152–153
MapReduce program, 227 monitoring, 534–535 offshoring, 54
market segmentation, 315 Moore v University Hospital Cleveland
marketing, 315–316 off-the-shelf software, 160
marketing automation, 365 Medical Center, 609
marketing databases, 13 morals, 622 OLAP (online analytical processing),
massively parallel processing system, 89 motion-sensing input devices, 102 391–392
materials requirement planning (MRP), 362 MP3 (MPEG-1 Audio Layer-3), 110
m-commerce. See mobile commerce MPEG-1 Audio Layer-3 (MP3), 110 OLTP (online transaction processing),
MCS (mobile crowd sensing), 612 M-Pesa, 320–321 348–349
MCSE (Microsoft Certified Systems MRP (materials requirement planning), 362
MS-DOS (Microsoft Disk Operating System), OMR (optical mark recognition), 102
Engineer), 71
medicine, virtual reality, 437 146 ONA (organizational network analysis),
Melissa worms, 566 MSSP (managed security service provider), 415–417
memory
586 online analytical processing (OLAP),
cache memory, 92 multicore processor, 89 391–392
definition, 87 multimedia, 433
main memory, 91 online transaction processing (OLTP),
random access memory, 91–92 animation, 434–435 348–349
read-only memory, 93 audio, 433–434
types of, 91–93 designing applications, 435 Open Meeting Law, 610
memory management, 144 file conversion and compression, 435 open source software, 28, 177–180
menu-creation software, 527 overview of, 433–435 openSUSE operating system, 150
menu-driven system, 522 text and graphics, 433
mesh network, 242 video, 434–435 operating system (OS), 141
meta tag, 324 multiprocessing, 89 access to system resources and security,
metadata, 416 multithreading, 145 145
metropolitan area network (MAN), 244 Apple Computer, 148–149
Michael Porter’s Five Forces Model, 460–461 MYSTIC, 608 current, 145–146
microblogging, 268 embedded, 153–155
Microsoft Certified Systems Engineer N enterprise, 152
file management, 145
(MCSE), 71 NAS (network-attached storage), 97 Google, 150
Microsoft Disk Operating System (MS-DOS), National Security Agency (NSA), 225–226 hardware functions, 142
natural language processing, 429–430 hardware independence, 144
146 navigation, 273–274 input/output management, 142–144
Microsoft Outlook, 140 near field communication (NFC), 246–247 kernel, 142
Microsoft PC operating systems, 146–147 .NET, 527 Linux, 149–150
Microsoft Windows 10, 146 net neutrality, 32 memory management, 144
Microsoft Windows operating systems, 147 nettop, 116 mobile, 152–153
microwave transmission, 249–250 network, 15 multiple computers with multiple users,
141
client/server architecture, 244 networking capability, 145
cloud computing, 15–17 personal, 146–148
communications hardware, 251 processing tasks, 144–145
communications media, 245–251 role of, 141
single computer with multiple simultaneous
users, 141
single computer with single user, 141

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

SUBJECT INDEX 653

special-purpose computers, 141–142 examples of, 164 private cloud environment, 283
by sphere of influence, 145 integrated software packages, 168–169 procedure, 8
user interface, 142–144 mobile application software, 170
workgroup, 150–151 other, 169–170 process, 5
operational feasibility, 511 personal information management,
process manufacturing, 370
operational supercomputers, 118 167–168
presentation graphics program, 166–167 process redesign, 53
optical character recognition (OCR), software suites, 168–169
102–103 spreadsheet analysis, 163–166 process symbol, 517
word-processing applications, 163
optical data readers, 102–103 processor
optical mark recognition (OMR), 102 personal area network (PAN), 243 families of, 88–89
manufacturing, 90–91
optical storage device, 96 personal assistive listening devices, 439 multiprocessing, 89
parallel computing, 89–90
Oracle Certified Professional, 71 personal emergency response systems, 440 phases of processing, 87–88

order processing systems, 350 personal information management (PIM) processor family, 88
software, 167–168
organic strategic planning, 459 procurement card (p-card), 333
personal information system, 9 procurement management, 488–489
organization(s) personal operating system, 146–148
business process reengineering, 53 personal privacy, 617–618 product lifecycle management (PLM),
change in, 51–54 367–371
definition, 46 personal productivity software, 139
downsizing, 55 benefits, 370
educating employees and contract personal sphere of influence, 139 business strategy, 369
workers, 579–580 highly rates software products, 370
general model, 47 personalization, 325 scope of software, 367–368
implement detection systems, 583–584 product lifecycle management (PLM)
information systems and, 46–51 PERT (Program Evaluation and Review
offshore outsourcing, 54 software, 367
outsourcing, 54 Technique), 478
prevention of attacks, 580–583 product owner, 539
process redesign, 53 phase-in approach, 534
reengineering, 53 phishing, 571–572 production, 362
response to attacks, 584–586
risk assessment, 577–578 piecemeal approach, 534 products, innovative, 52
security policy, 579
technology acceptance model, 60 pilot start-up, 534 Program Evaluation and Review Technique
user satisfaction, 60–61
value chain, 47 platform as a service (PaaS), 282 (PERT), 478

organizational change, 56 PLM. See product lifecycle management programmers, 69
diffusion of innovation theory, 61–62 plotters, 108–109 programming languages, 173, 173–175
Leavitt’s diamond, 59–60
Lewin’s change model, 57 plunge, 533 project, 26
Lewin’s force field analysis, 57–59
technology acceptance model, 60–61 podcast, 269 project budget, 480
user satisfaction, 60–61
podcasting, 269 project champion, 483
organizational complements, 9
point-of-sale (POS) device, 104 project deadline, 477
organizational culture, 56 project integration management, 489–490
policies and procedures project management, 27–28, 475
organizational learning, 60 establishing, 603
implementing, 603–604 complexity levels, 471
organizational network analysis (ONA), monitoring, 604–605 core competency, 471–472
415–417 reviewing, 605 variables, 472–474
project management knowledge areas
OS. See operating system policy-based storage management, 99 communications management, 484–485
cost management, 478–481
output devices portable computer, 113 human resource management, 481–484
3D printers, 109–110 procurement management, 488–489
definition, 87 Porter, Michael, 46 project integration management,
digital audio players, 110–111
display screen, 107–108 predecessor task, 478 489–490
e-book readers, 111 presentation graphics program, 166–167 quality management, 481
printers and plotters, 108–109 risk management, 485–488, 486
prevention of attack scope management, 475–477
outsourcing, 54 critical internet security threats, 582 time management, 477–478
installing antivirus software, 581–582 project milestone, 477
P installing corporate firewall, 580–583
safeguard against attacks by malicious project organization, 484
PaaS (platform as a service), 282 insiders, 582
security audit, 582–583 project risk, 485
PAN (personal area network), 243 security dashboard, utilizing, 581 assessment of, 486
identification of, 486
parallel computing, 89 price comparison, 318
project schedule, 477
parallel start-up, 534 primary key, 197
Pareto principle (80–20 rule), 520 printers, 108–109 project scope, 472
patch, 536
PRISM, 608 project sponsor, 483
p-card, 333
privacy project stakeholders, 475
pen input device, 106 corporate policies, 615–617 project steering team, 483–484
and email, 610–611
perceptive system, 424 and fairness in information use, 614 project variables
and the federal government, 606–609 costs, 472–473
performance evaluation test, 545 and filtering and classifying Internet quality, 474
content, 614–615 scope, 472
personal application software individual efforts to protect, 617–618 time, 473–474
database applications, 166 and instant messaging (IM), 611 user expectations, 474–475
Internet, 612–613
and Internet libel concerns, 613–614 projecting data, 202
issues, 606–618
and personal sensing devices, 611–612 proprietary Linux-based systems, 155
RFID tags, 611
at work, 609–610 proprietary software, 160
PRTG Network Monitor, 156–157

public cloud computing, 15

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

654 SUBJECT INDEX

purchasing card (p-card), 333 risk assessment, crime, 577–578 selecting data, 202
purchasing systems, 351, 362 risk management, 485–488, 486 self-service analytics, 397–399
risk management plan, 487
Q risk owner, 487 semiconductor fabrication plant, 90
robotics, 428–429 senior IS managers, 67–68
QBE (Query by Example), 211 ROM (read-only memory), 93
quality, 474 rootkit, 570 SEO (search engine optimization), 266
quality assurance, 481 RSI (repetitive strain injury), 619
quality control, 481 rule, 426 server, 116
quality information characteristics, 7 blade, 120
quality management, 481 S utilities, 157–158
quality planning, 481 virtual, 119
Query by Example (QBE), 211 SaaS (software as a service), 162, 281–282
querying tools, 389 sales and operations plan, 361 server farm, 119–120
Quintessentially Gifts, 321 sales forecasting, 361 service-oriented architecture (SOA), 159
sales management, 365
R sales order entry window, 363 shadow IT, 70
sales ordering, 362 pros and cons of, 71
radio frequency identification (RFID), 105 sample stakeholder analysis matrix, 485
Radio Frequency Identification (RFID) tag, SAN (storage area network), 98 shadow system, 601
SAP Contact Manager, 366
105, 611 SAP ERP Financials, 13 shadowing, 411
RAID (redundant array of independent/ scalability, 116 shopping online, 272–273
scanning devices, 102
inexpensive disks), 95 schedule feasibility, 511 sign-on procedure, 522
RAM (random access memory), 91 Schein, Edgar, 57
random access memory (RAM), 91 schema, 208 simple linear regression, 393
ransomware, 565–566 SCM (supply chain management), 48,
Raskin, Jef, 522 simplified entity-relationship (ER) diagram,
read-only memory (ROM), 93 361–363
reasonable assurance, 578 scope management, 475–477 202
record, 195 screen readers, 439
Red Hat Enterprise Virtualization (RHEV), scrum, 539 single-user license, 177
scrum master, 539
151–152 SDKs (software development kits), 174 SirCam worms, 566
Red Hat Linux, 151–152 SDN (software-defined networking), 253
Reduced Instruction Set Processing (RISC), search engine optimization (SEO), 266 SIT (seated immobility thromboembolism),
search engines, 265–267
88 seated immobility thromboembolism 619
redundant array of independent/inexpen-
(SIT), 619 site preparation, 532
sive disks (RAID), 95 secondary storage
reengineering, 53 slack time, 477
relational database model, 200–204 cost comparison with forms of storage, 93
definition, 93 slipstream upgrade, 536
building and modifying, 204 devices, 93–97
linking data tables, 203 enterprise storage, 97–99 small and medium-sized enterprises (SMEs),
simplified ER diagram, 202 magnetic, 94–96
release, software, 536 optical, 96–97 352
repetitive strain injury (RSI), 619 solid state, 97 smart card, 104, 331–332
report generator software, 527 Section 814 of the USA Patriot Act, 576 SMART goals, 464
reporting tools, 389 secure, private and reliable computing,
request for information (RFI), 543 smartphone operating systems, 153
request for maintenance form, 536 577–588
response for attacks computer forensics, 586–588 SMEs (small and medium-sized enterprises),
eradication efforts, 585 educating employees and contract
incident containment, 584–585 352
incident follow-up, 585–586 workers, 579–580 smishing, 572–573
response to attacks establishing security policy, 579
incident notifications, 584 implementing detection systems, 583–584 SOA (service-oriented architecture), 159
protection of evidence and activity logs, 584 organizations response for attacks,
restraining forces, 57 social networking, 366
retail Web sites, 327 584–586
retargeting, 318 prevention of attacks, 580–583 soft side of implementing change, 56
RFI (request for information), 543 risk assessment, 577–588
RFID (radio frequency identification), 105 using managed security service provider software, 12
tag, 611 application, 138
Rhapsody, 270 (MSSP), 586 buying off-the Shell, 542–547
RHEV (Red Hat Enterprise Virtualization), security coding for system development, 527
commercial off the- shelf (COTS), 542
151–152 IoT applications, 279 copyright, 177
RIA (rich Internet application), 160 and system requirements, 518–519 enterprise application, 171–172
rich Internet application (RIA), 160 systems design, 523 freeware, 177–180
RISC (Reduced Instruction Set Processing), utilities, 156 global support, 180
Websites, 312 licenses, 177–178
88 security audit, 582–583 menu-creation, 527
security dashboard, utilizing, 581 mobile applications and, 12–13
security policy, organizations, 579 mobile commerce, 328–329
off-the-shelf, 160
open-source software, 177–180
proprietary, 160
release, 536
report generator, 527
spending, 138
system, 138
version, 536
workgroup application, 170–171

software as a service (SaaS), 162, 281–282
software bug, 176–177

software codes, 527

software developers, 68

software development kits (SDKs), 174
software package evaluation phase, 543–545

identifying potential solutions, 543–544
making selection, 545
researching top contenders, 544–545
selecting top contenders, 544
software suites, 168–169

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

SUBJECT INDEX 655

software-defined networking (SDN), 253 team recruitment, 521 10-Gigabit Ethernet, 248
solid state storage device (SSD), 97 system development, 28 testing, 529–530
system disposal, 537–538 text-to-speech synthesizers, 439
source data automation, 100, 353 The New Yorker, 282
spam, email, 567–568 communicate intent, 537 thin client, 115
data backup, 538 3D printers, 109–110
spam-filtering utilities, 156 hardware disposal, 538 TIGTA (Treasury Inspector General for Tax
sensitive data deletion, 538
spear-phishing, 572 terminate contracts, 538 Administration), 602
system implementation, 530–534 time
spear-phishing attack, 588 cutover, 532–534
specialized information systems, 25–26 installation, 532 and material contract, 489
special-purpose computers, 141–142 site preparation, 532 project variables, 473–474
user preparation, 530–532 time management, 477–478
speech recognition software, 439 System Integrity Protection (SIP), 564 Tivoli OMEGAMON XE, 535
TLS (transport layer security), 330
speech-recognition technology, 100 system operation, 534 touch screens, 106–107
TPSs. See transaction processing systems
sphere of influence, 139 system operator, 68 traditional systems development life cycle
coding software components, 527
sponsoring business unit, 472 system performance, 519 training
spreadsheet analysis, 163–166 virtual reality, 438
spreadsheets, 388–389 system review, 535 World Wide Web, 265
SQL (Structured Query Language), 206–207 transaction, 21
SQL databases, 206–207 system software, 138 transaction processing cycle, 353
transaction processing systems (TPSs), 21
SSD (solid state storage device), 97 system support specialist, 70 accounting systems, 350–351
activities, 352–355
star network, 241 system testing, 529, 546 batch processing systems, 347–348
steering team, 513–514, 520–521, 526 data collection, 353–354
stock management system project, 475–476 systems analysis data correction, 354–355
additional candidates for, 520 data editing, 354
storage area network (SAN), 98 alternative solutions, 519–520 data processing, 355
draft report, 520 data storage, 355
storage as a service, 99 feasibility analysis, 520 document production, 355
reviewing results, 520–521 for entrepreneurs, 352
storefront broker, 323 objectives, 347–352
strategic planning, 27–28, 458 systems analyst, 68–69 online transaction processing, 348–349
systems design order processing systems, 350
benefits, 458–459 overview of, 346–347
defining strategies, 464–465 report, 526 point-of-sale, 354
deploying plan, 465–466 result review, 526 purchasing systems, 351
direction-setting phase, 461–464 systems investigation, 507–514 for small and medium-sized enterprises,
goals-based, 459 budget development, 508
issues-based, 459 feasibility analysis, 510–512 352
organic, 459 functional decomposition, 509–510 transport layer security (TLS), 330
situation analysis, 459–462 joint application development (JAD), travel, 273
strategic planning pyramid Treasury Inspector General for Tax
core value, 462 508–509
goals, 463–464 report, 513 Administration (TIGTA), 602
mission statement, 462 request, 508 Trojan horse, 566–567
objectives, 462 result review, 513–514 Tumblr, 612
strategies, 464 systems investigation request, 508 20Q Web site, 423
vision, 462 tasks during, 508 twisted-pair wire, 248
vision/mission statement, 462 team recruitment, 508 Twitter, 612
strategy, 464 systems maintenance, 535–537
systems software U
Strengths, Weaknesses, Opportunities, current operating system, 145–146
embedded operating system, 153–155 UAT (user acceptance testing), 529–530
Threats (SWOT) matrix, 461 middleware, 158–159 Uniform Resource Locator (URL), 256
Structured Query Language (SQL), 206–207 mobile operating system, 152–153 universal serial bus (USB) flash drive, 97
operating system, 141–155 Unix operating system, 151
subject matter expert, 483 personal operating system, 146–148 URL (Uniform Resource Locator), 256
utility programs, 155–158 U.S. Bureau of Labor Statistics (BLS), 63
supercomputers, 117 workgroup operating system, 150–151 U.S. Supreme Court, 615
user acceptance document, 530
supply chain, 47 T user acceptance testing (UAT), 529–530

supply chain management (SCM), 48, Tableau software, 162 for new accounting system, 538
361–363 user documentation, 527
tablet, 114 user interface, 142, 427
Syndicat Mixte Autolib, 154
tablet computer operating systems, 153 command-based, 142–143
syntax, 173 tacit management, 410–411, 414 designing, 522–523
tags, 260 graphical, 143–144
Sysinternals Suite, 155 user preparation, 530–532
TAM (technology acceptance model), 60,
system acquisition, 28 531
system analysis, 514–521
tangible benefit, 469–470
budget development, 514 technical documentation, 527
identifying requirements and prioritizing
technical feasibility, 511
them, 515–519
study existing system, 514–515 technical resource, 483
team recruitment, 514
system construction, 526–529, 527 technology acceptance model (TAM), 60,
coding software components, 527 531
creating and loading data, 528
unit testing, 529 technology infrastructure, 7, 326–333
system design, 521–526 tendonitis, 619
design database, 525
designing user interface, 522–523
disaster recovery plan, 523–525
draft preparation of, 526
schedule and budget development, 522
security and controls, 523

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

656 SUBJECT INDEX system operation, 534–535 workstation, 116
WBS (work breakdown structure), World Wide Web (WWW), 16
user satisfaction, 60–61
user testing, 546 478–480 blogging, 269
utility programs, 155, 155–158 wearable computer, 113 Cascading Style Sheet, 260–261
Web 2.0 technologies, 263–265, 264, 417 conferencing, 268–269
V Web browser, 259 developing content and applications,

value chain, 47 Web developers, 69 262–263
Verizon 4G LTE Coverage, 258 education, 265
version, software, 536 Web log, 269 entertainment, 269–272
video data, 5 Extensible Markup Language, 260–261
video, multimedia, 434–435 Web server geolocation, 273–274
virtual private network (VPN), 275 hardware, 327–328 Hypertext Markup Language, 259–261
virtual reality software, 328 instant messaging, 267
intranets, 274–275
applications, 437–439 Web services, 262 job information, 265
forms of, 437 microblogging, 268
interface devices, 436–437 Web sites navigation, 273–274
large-scale environment, 436 bartering, 318 online media, 269–272
overview of, 435–436 building traffic, 324–325 podcasting, 269
virtual reality system, 435 establishing, 323–324 programming languages, 261
virtual server, 119 functions of, 322–323 search engines, 265–267
virtual tape, 95 improving, 325–326 shopping online, 272–273
virtual team, 50 maintaining, 325–326 social Web, 263–265
virus, 566 measures for retail, 327 training, 265
virus signature, 581 mobile commerce, 305 travel, 273–274
vishing, 573 privacy policy, 612–613 Web 2.0, 263–265, 264, 417
Visible Developer, 527 security, 312 working of, 259–261
vision, 462 travel, 273 Worldwide LHC Computing Grid (WLCG)
vision system, 429
vision/mission statement, 462 Web-based application suite, 169 project, 90
Vogue, 282 wholesale electronic commerce, 313–314 worms, 566
volume testing, 529, 546 wide area network (WAN), 244 WWW. See World Wide Web
VPN (virtual private network), 275 Wi-Fi network, 248–249
vulnerabilities, software, 563 Windows Embedded, 154 X
Windows Server, 150–151
W Windows XP, 537 x86 family processor, 88
XML (Extensible Markup Language),
WAN (wide area network), 244 Wired, 282
waterfall system development process, 260–261
wireless communication, 246 XP (extreme programming), 540
506–538 frequency ranges, 248
advantages and disadvantages of, 507 Y
system analysis, 514–521 wireless technologies, 246–249
system construction, 526–529, 527 WM97/Resume.A virus, 566 YouTube EDU, 271
system design, 521–526 word cloud, 389–390
system implementation, 530–534 word-processing applications, 163 Z
system integration and testing, 529–530
system investigation, 507–514 work breakdown structure (WBS), zero-day attack, 564
system maintenance, 535–538 478–480 zombie, 569

work environment
environmental problems, 619–621
health concerns, 619

work stressors, 619

workgroup, 139
workgroup application software, 170–171
workgroup operating system, 150–151
workgroup sphere of influence, 139

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

Company Index

A Association for Computing Machinery CareFirst BlueCross Blue Shield, 310
(ACM), 73, 624–625 Casio, 151
Abas, 360 CD-adapco, 97–98
Accenture, 54, 65, 72, 371 Association of American Railroads, 79 CDW, 13
Accenture Interactive, 299 Association of Information Technology Center for Medical Interoperability, 41
AccessData, 587 Cerner Corporation, 149–150
Acer, 163 Professionals (AITP), 73 CGI, 473–474
ACM (Association for Computing Machinery), Atos, 490 Chaos Computer Club, 565
ATS Solutions, 72 Chapters Health System, 115
73, 624–625 AT&T, 120, 151, 248, 250, 255, 258, 304, 586 Chase, 571
Acorn Computer Group, 130 Audi, 42 CHD, 13
ACS (American Cancer Society), 432 Autodesk, 66 Check Point, 580
Adidas, 373 Automatic Data Processing (ADP), 348 Chevron, 386
Adobe, 418, 434 Avaap, Inc., 581 CHG Health Services, 66
AdRem, 157 Avanade, 66 Ciber, Inc., 371
Advantage Sign & Graphic Solutions, 172 Avon Products, 61 Cincom Systems, 360
Agnitum, 580 Axxess, 66 Cisco Systems, 16, 156, 281
AHFC (American Honda Finance Corporation), Citibank, 571
B Citizens Bank, 55
602 Citrix, 535
Airbnb, 163 Banco Popular, 205 Clark Realty Capital (CRC), 171
AITP (Association of Information Technology Bank of America, 120, 571 CNET, 158
Barbecana, 488 Coca-Cola, 93, 373, 386
Professionals), 73 Barnes & Noble, 111, 300 The Code For America (CFA), 177
Akamai, 66 Barracuda Networks, 156 Cognizant, 65, 120
Akimbo Financial, 311 Bayerische Motoren Werke AG, 41–42 Coles, 49, 51
Algoma Central Corporation, 581 Ben & Jerry’s, 20 Colorado Technical University, 386
Allina Health, 442 Best Buy, 327 Columbia Sportswear Company, 158
Allscripts, 535 Bidz.com, 302 Commonwealth Financial Network, 66
Almighty Music Marketing, 13 BlackBerry, 154 Comodo, 580
Alstom Transport, 465 BloomNation, 306 Compiere, 360, 361
Amazon, 16, 48, 49, 65, 99, 111, 114, 160, Bluebee Software, 360 Computer Sciences Corporation, 586
Blue Cross and Blue Shield, 157 Connectria, 66
214, 253, 270, 281, 300, 301, 302, 305, BMW Group, 41 Container Store, 162
325, 465, 504 Boeing, 45, 54, 55 Continental Airlines, 14
AmazonFresh, 48 Borders, 310 Costco, 327
AMD, 88, 90 Boston Medical Center (BMC), 441 Covell Group, 252
American Airlines Admiral Club, 109 Bounce Exchange, 66 Craigslist, 302, 318
American Cancer Society (ACS), 432 British Telecom (BT), 255, 556 Cray, 118
American Express, 104, 331, 373 Broadcom, 131 Creative, 111
American Honda Finance Corporation BroadSpire, 323 The Creative Wedge, 354
(AHFC), 602 Burberry, 305 Credit Acceptance, 66
American National Standards Institute Burton Corporation, 180 Criteo, 225
(ANSI), 206 Burton Snowboards, 180 CrossFit, 324
American Red Cross, 365 Butterfleye, 52 Curry’s Art Store, 363
AMR Research, 325
AOL, 608 C D
ApliedMicro, 131
Apple, 12–13, 42, 99, 103, 106, 110, 113, Caesar’s Palace, 574 DaimlerChrysler, 385–386
114, 116, 119, 120, 123, 130, 131, 137, Cal, 355–356 Database.com, 214
143, 148, 151, 226, 301, 304, 305, 330, California Case Management System, 472 Data Management Association (DAMA)
434, 474, 522, 561, 564, 608, 609 California Department of Consumer
Apple Store, 327 International, 219
Apple User Groups, 73 Affairs, 56 DBS (Development Bank of Singapore), 418
Applicor, 372 Campbell’s, 5 Dell, 72, 111, 114, 121, 123, 248, 538
Arbor Networks, 569 Canonical, 149 Dell SecureWorks, 586
Argonne National Laboratory, 118 CapGemini, 65 Delta Sky Club, 109
Argosy, 387 Carbanak, 571
ARM, 130–131 Career Builders, 73
Ascribe, 388
Ashley Madison, 573

657

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

658 COMPANY INDEX

Deutsche Bank, 54 G 161, 171, 214, 265, 281, 283, 383, 397,
Development Bank of Singapore 398, 409, 432, 532, 535, 586
GAF, 468 ICA (Industrial Control Associates Inc.),
(DBS), 418 Gartner, 56 370–371
DHL Express, 49, 66, 309, 347 GCS Software, 360 IGATE Technologies, 65
DHS, 349 Geek Squad, 72, 536 iHealth, 52
Domino’s, 306 GEICO, 519 IKEA, 438
Dun & Bradstreet, 316 Geico, 433 Indeed, 73
Dunkin’ Donuts, 379 Genentech, 66 Industrial Control Associates Inc. (ICA),
DuPont Chemical, 371 General Accounting Office, 121 370–371
General Electric (GE), 17, 45, 53, 223, Infobright Inc., 276
E Infor, 360
277, 324 Information Builders, 397
eBay, 273, 300, 302, 305, 331 General Motors, 121, 373 Infosys, 65
eBid, 302 General Services Administration (GSA), 415 InMobi, 317
Echo Valley Irrigation, 352 GitHub, 324 Instagram, 301, 601, 612
Embassy Suites, 109 Globacom, 292–293 Intacct, 372
EMC, 98, 99, 525 GlobalScape, 66 Intaver Institute, 488
Epicor, 360 Goldman Sachs, 120 Intel, 73, 88, 90, 116, 119, 131
Equifax, 617 Google, 12–13, 65, 72, 73, 99, 103, 113, 114, Intelex, 488
Erickson Living, 66 Intelitek, 429
Error Prevention Institute, 603 120, 121, 150, 152, 156, 161, 162, 163, International Securities Exchange, 120
ESP Technologies, 360 214, 226, 253, 266, 364, 430, 436, 438, Intuit, 160, 214
Etsy, 302, 555 462, 463, 568, 608, 613 Iomega, 111
Excite, 300 Google Plusþ, 389, 612 iProspect, 373
eXelate, 316 Google Shopping, 300 iRobot, 428
Expensify, 364 Government Accounting Office (GAO), Iron Mountain, 113
Experian, 5, 617 599, 601
Grainger, 299 J
F Grant Thornton International, 586, 587
Greyston Bakery, 20–21 Jaguar, 42
Facebook, 73, 120, 226, 270, 301, 339, 389, Groupon, 105, 319 Jama Software, 481
429, 436, 464, 601, 608, 612, 613 GSA (General Services Administration), 415 JasperSoft, 397
Guidance Software, 587 JCPenney, 272
FBI (Federal Bureau of Investigation), 566, JGC Corporation, 139
573, 584, 608, 609 H John Lewis, 305
Johns Hopkins Medicine, 466
FDA (Food and Drug Administration), 41 Halifax Health, 66
FDNY (Fire Department of the City of New HanseMerkur Krankenversicherung, 418 K
Harrah’s, 14
York), 399 Harris Corporation, 419 Kaboodle, 5
Federal Bureau of Investigation (FBI), 573, Hawaii Department of Transportation Kaspersky, 156, 580
Katharinenhospital, 430
584 (HDOT), 371 KDDI Corporation, 227
Federal Communications Commission H.B. Fuller, 371 Kerry Group, 380
HCL, 65 Kijiji, 302
(FCC), 246 HDOT (Hawaii Department of Transporta- Kobo, 111
Federal Express (FedEx), 16, 49, 309, 347, Kraft, 55
tion), 371 Kraft Heinz Company, 169
504 Heinz, 55 Kroger, 10, 385, 391
Federal Railroad Administration (FRA), 79 Helen Ross McNabb Center, 347
Federal Trade Commission (FTC), 310, Heroku, 214 L
Hershey’s, 532–533
612 Hewlett-Packard (HP), 72, 121, 123, 151, 152, Lafayette General Health, 66
FFF Enterprises, 389 Land Rover, 42
Financial Industry Regulatory Authority, 154, 156, 309, 371, 397, 481, 535, 538 Larsen & Toubro, 65
Hilton, 109 Larson & Darby Group, 116
66 HiSilico, 131 Lawrence Livermore National Laboratory,
Financial Insurance Management Hitachi Data Systems Corporation, 98
H.J. Heinz Company, 169 89, 118
Corporation (FIMC), 188–189 Home Depot, 301 Lawson, 360
Fire Department of the City of New York Honda Motors, 424 Legato Systems, 99
HostWay, 323 Lenovo, 114, 304
(FDNY), 399 H&R Block, 161 Levi Strauss & Co, 113
FitBit, 113 HTC, 436 LG, 113, 154, 304
Fiverr, 302 Huawei, 113, 304 LinkedIn, 66, 73, 389, 612
Flickr, 301 Linux, 567
Food and Drug Administration (FDA), 41 I Liquid Mercury Solutions, 509
Foo Fighters, 324
Ford Motor Company, 48, 110, 373, 438 Ibidfree, 302
Foreign Intelligence Surveillance Court IBM, 16, 55, 65, 72, 94, 98, 99, 111–112, 117,

(FISC), 608 118, 122, 137, 139, 146, 151, 156, 157,
Forrester Research Inc., 300
Free Software Foundation, 177
Frontier Software, 360
FTC (Federal Trade Commission), 612
FUJIFILM Corporation, 94
Fujitsu, 118

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

COMPANY INDEX 659

Liquidnet, 66 North Tees and Hartlepool National Health S
LivingSocial, 319 Services Trust, 388
Lizard Squad, 565 Salesforce, 162, 326
LoneStar Heart, 372–373 NTSB (National Transportation Safety Sam’s Club, 14
Lukas Nursery, 351 Board), 79 Samsung, 90, 97, 111, 113, 114, 115, 131,
Lush, 305
NUDT, 118 163, 304, 436
M Nu Skin Enterprises, 366 SAP, 13, 140, 162, 299, 359, 360, 372, 397,
NuStar Energy, 66
Macy’s, 14, 247, 301 Nvidia, 90, 114, 131 533, 534
Malaysia Airlines, 428 Saudi Telecom Company (STC), 242
Manugistics, 533 O Seattle Computer Products, 146
Marriott International, 321 Secure-24, 66
Marvell Technology Group, 131 Oak Ridge National Laboratory, 118 Sendmail, Inc., 180
MasterCard, 330, 571 Oculus VR, 436 Serv1Tech, 66
McAfee, 581 Oddity Software, 13 Sharp Electronics, 373
MCH, 13 Office Depot, 151 Sharp HealthCare, 66
McKinsey Global Institute, 387 Ogilvy & Mather, 51 Shell, 533, 534
Mercedes, 42 Optum, 474 Shipwire, 49
Mercy’s, 235–236 Oracle, 72, 151, 162, 204, 214, 359, Shoe Carnival, 306
MetLife, 383, 385 Shopify, 323–324
Microsoft, 16, 65, 72, 73, 99, 102, 114, 121, 360, 397 Shopping.com, 300
Orscheln, 222 Shopzilla, 300
131, 143, 146, 152, 155, 156, 163, 170, Overstock, 302 Shutterfly, 306
214, 226, 248, 253, 270, 281, 360, 397, Owens Corning, 66 Siebel, 533
434, 436, 438, 478, 527, 530, 568, 608 Simply Hired, 73
MobiKash, 339–340 P SK & A, 13
Monster, 73 SK Solutions, 277
Motorola, 111 Paessler, 156 Skype, 226, 608
M-Pesa, 320 Palm, 154 Snagged a Job, 73
M&T Bank, 532 Patreon, 310 Société de transport de Montréal (STM),
MyOwnDB, 214 PayPal, 105, 331
MyTheresa, 321 PC Pinpoint, 536 187–188
PDS, 360 Sony, 111, 113, 114, 155, 436
N Pebble, 113 Sony Computer Entertainment, 102
Penn National Gaming, 26 Southern California Edison, 65
National Center for Atmospheric Research, Pentaho, 397 Speak with a Geek, 72
94 Pinterest, 99, 301, 389, 612 Sprint, 250, 255, 258
Plex, 360 Sprint/Nextel, 304
National Foreign Language Center (NFLC), PMI (Project Management Institute), 475 Standish Group, 27, 56, 471
95 Presbyterian Medical Center, 566 Starwood, 541
PriceGrabber, 300 State Street Corporation (Boston), 605
National Hockey League (NHL), 613–614 Prime Meats, 359 SteelEye, 525
National Rural Electric Cooperative PrinterOn Enterprise, 109 Steinwall Scientific, 358
Procter & Gamble Company (P&G), 52, 117, Sticker Mule, 307
Association, 66 St. Lawrence Seaway system, 581
National Security Agency (NSA), 606–607 160, 371 STMicroelectronics, 90, 131
National Transportation Safety Board Project Management Institute (PMI), 475 Sumerian, 348
Prudential Financial, 66 Sun, 161
(NTSB), 79 SUSE, 149
National University of Defense Technology, Q Swapagift.com, 318
Swapstyle.com, 318
118 Quad, 114 Swaptrees.com, 318
National Westminster Bank (NatWest), 536 Qualcomm, 90, 131, 248 Swiss Medical Group, 16
NBTY, Inc., 504 Quicken Loans, 66 Symantec, 156, 311, 581, 586
Net-a-Porter, 321 Syntel, 65
NetApp, 98 R Syracuse University, 386
Netflix, 16, 159 Syspro, 360
NetSuite, 162, 360, 372 Rackspace, 16, 120, 161, 281 Systems and Proposal Engineering
NeuroMetrix, 52 Radixx International, 117
NeverFail, 525 Rakuten, 49 Company, 481
Newman Technology, 361 Red Bull, 324
New York Stock Exchange (NYSE), 602 Red Cloud, 121 T
NHL (National Hockey League), 613–614 Red Hat, 141, 149–150, 151, 180
Nicklaus Children’s Hospital, 66 Revere Electric Supply, 347 Taobao, 302
Nielsen, 316 Riken Advanced Institute for Target Corporation, 3, 106, 247, 272, 301,
Nike, 300–301, 327
Nintendo, 102, 433 Computational Science, 118 310–311
Noah Consulting, 66 Rockchip, 131 Tata, 65
Nokia, 248 Room & Board, 326 Tech Mahindra, 65
Nordstrom Inc., 80 Royal Bank of Scotland (RBS), 536 Telefonica Brasil, 228
North American Aerospace Defense Tesla Motors, 324
TeslaTeam, 565
Command (NORAD), 575

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

660 COMPANY INDEX U.S. Bureau of Labor Statistics (BLS), Ward Systems Group, 430
63, 64 Water Pik, 369
TheLadders, 73 Wells Fargo Bank, 367, 571
TinyCo, 214 U.S. Coast Guard, 441 Western Digital, 95
Tinypass, 315 U.S. Department of Defense (DoD), 601 Westwood Professional Services, Inc.,
T-Mobile, 250, 304, 310 U.S. Department of Health and Human
TMW Systems, 412 416
TomTom, 113 Services, 601 Whirlpool, 359
Toshiba, 114 U.S. Department of Homeland Security, 567, White & Case, 412–413
Total Defense, 580 WholeWorldBand, 234–235
Toyota Financial Services (TFS), 414 601 Wipro, 65
Trackvia, 214 U.S. Department of Veterans Affairs, 604 Women’s World Banking, 358
TradeAway.com, 318 U.S. foreign intelligence agencies, 575 Workday, 372
TransUnion, 617 U.S. Labor Department, 65
Treasury Inspector General for Tax U.S. Postal Service, 386, 618

Administration (TIGTA), 602 V X
Tumblr, 389, 612
TUMI, 365 Vera Bradley, 301 Xiaomi, 113, 304
Twitter, 73, 268, 301, 389, 612 Veritas Software Corporation, 99 Xiotech, 98
Tyson Foods, 371 Verizon, 250, 255, 258, 304, 586
Verizon Communications Inc., 16, 281 Y
U VIA Technologies, 88
Villanova University, 386 Yahoo!, 73, 226, 568, 608
Ubid, 302 Virgin Trains, 465 Yahoo Messenger, 566
United Parcel Service, 309 Visa, 104, 329, 571 Yahoo! Shopping, 300
University of Arizona, 601 Vivobarefoot, 131–132 YourTechOnline.com, 536
University of Connecticut, 571 VMWare, 16, 158, 281 YouTube, 226, 264, 301, 608
University of Illinois, 436
University of Iowa, 395 W Z
University of Nevada, 601
University of Notre Dame, 66 Waldenbooks, 300 Zappos, 327
UPS, 49, 222, 504 Walgreens, 247 Zara, 49
USAA, 66 Walmart, 14, 222, 270, 272, 301, 315, 325,
Usable Databases, 13
462, 463

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203

This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.

Important Notice: Media content referenced within the product description or the product
text may not be available in the eBook version.

Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203


Click to View FlipBook Version