The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

Management Information Systems - Managing the Digital Firm,13th Edition.

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Gerahan Novianto, 2016-09-09 19:53:05

Management Information Systems - Managing the Digital Firm

Management Information Systems - Managing the Digital Firm,13th Edition.

Keywords: MIS,management,information,system.Digital Firm

618 Glossary during a specified time period. Also called on-demand computing
or usage-based pricing.
trade secret Any intellectual work or product used for a business
purpose that can be classified as belonging to that business, value chain model Model that highlights the primary or support
provided it is not based on information in the public domain. activities that add a margin of value to a firm’s products or
services where information systems can best be applied to
transaction costs Costs incurred when a firm buys on the achieve a competitive advantage.
marketplace what it cannot make itself.
value web Customer-driven network of independent firms
transaction cost theory Economic theory stating that firms grow who use information technology to coordinate their
larger because they can conduct marketplace transactions value chains to collectively produce a product or service for a
internally more cheaply than they can with external firms in the market.
marketplace.
virtual company Organization using networks to link people,
transaction fee revenue model An online e-commerce revenue assets and ideas to create and distribute products and services
model where the firm receives a fee for enabling or executing without being limited to traditional organizational boundaries or
transactions. physical location.

transaction processing systems (TPS) Computerized systems Virtual Private Network (VPN) A secure connection between
that perform and record the daily routine transactions necessary two points across the Internet to transmit corporate data.
to conduct the business; they serve the organization’s operational Provides a low-cost alternative to a private network.
level.
Virtual Reality Modeling Language (VRML) A set of
transborder data flow The movement of information across specifications for interactive three-dimensional modeling on the
international boundaries in any form. World Wide Web.

Transmission Control Protocol/Internet Protocol (TCP/ virtual reality systems Interactive graphics software and
IP) Dominant model for achieving connectivity among hardware that create computer-generated simulations that
different networks. Provides a universally agree-on method for provide sensations that emulate real-world activities.
breaking up digital messages into packets, routing them to the
proper addresses, and then reassembling them into coherent virtualization Presenting a set of computing resources so that they
messages. can all be accessed in ways that are not restricted by physical
configuration or geographic location.
transnational Truly global form of business organization with no
national headquarters; value-added activities are managed from a Voice over IP (VoIP) Facilities for managing the delivery of voice
global perspective without reference to national borders, information using the Internet Protocol (IP).
optimizing sources of supply and demand and local competitive
advantage. war driving Technique in which eavesdroppers drive by buildings
or park outside and try to intercept wireless network traffic.
Trojan horse A software program that appears legitimate but
contains a second hidden function that may cause damage. Web 2.0 Second-generation, interactive Internet-based services that
enable people to collaborate, share information, and create new
tuple A row or record in a relational database. services online, including mashups, blogs, RSS, and wikis.

Unified communications Integrates disparate channels for voice Web 3.0 Future vision of the Web where all digital information is
communications, data communications, instant messaging, woven together with intelligent search capabilities.
e-mail, and electronic conferencing into a single experience
where users can seamlessly switch back and forth between Web beacons Tiny objects invisibly embedded in e-mail messages
different communication modes. and Web pages that are designed to monitor the behavior of the
user visiting a Web site or sending e-mail.
unified threat management (UTM) Comprehensive
security management tool that combines multiple security Web browser An easy-to-use software tool for accessing the World
tools, including firewalls, virtual private networks, intrusion Wide Web and the Internet.
detection systems, and Web content filtering and anti-spam
software. Web hosting service Company with large Web server computers to
maintain the Web sites of fee-paying subscribers.
uniform resource locator (URL) The address of a specific
resource on the Internet. Web mining Discovery and analysis of useful patterns and
information from the World Wide Web.
unit testing The process of testing each program separately in the
system. Sometimes called program testing. Web server Software that manages requests for Web pages on the
computer where they are stored and that delivers the page to the
UNIX Operating system for all types of computers, which is user’s computer.
machine independent and supports multiuser processing,
multitasking, and networking. Used in high-end workstations and Web services Set of universal standards using Internet technology
servers. for integrating different applications from different sources
without time-consuming custom coding. Used for linking systems
unstructured decisions Nonroutine decisions in which the of different organizations or for linking disparate systems within
decision maker must provide judgment, evaluation, and insights the same organization.
into the problem definition; there is no agreed-upon procedure
for making such decisions. Web site All of the World Wide Web pages maintained by an
organization or an individual.
user interface The part of the information system through which
the end user interacts with the system; type of hardware and the Wi-Fi Standards for Wireless Fidelity and refers to the 802.11 family
series of on-screen commands and responses required for a user of wireless networking standards.
to work with the system.
Wide Area Network (WAN) Telecommunications network that
user-designer communications gap The difference in spans a large geographical distance. May consist of a variety of
backgrounds, interests, and priorities that impede cable, satellite, and microwave technologies.
communication and problem solving among end users and
information systems specialists. wiki Collaborative Web site where visitors can add, delete, or modify
content, including the work of previous authors.
Utilitarian Principle Principle that assumes one can put values in
rank order and understand the consequences of various courses WiMax Popular term for IEEE Standard 802.16 for wireless
of action. networking over a range of up to 31 miles with a data transfer
rate of up to 75 Mbps. Stands for Worldwide Interoperability for
utility computing Model of computing in which companies pay Microwave Access.
only for the information technology resources they actually use

Glossary 619

Windows Microsoft family of operating systems for both network
servers and client computers. The most recent version is
Windows Vista.

Windows 8 Most recent Microsoft Windows operating system,
which runs on tablets as well as PCs, and includes multitouch
capabilities.

Wintel PC Any computer that uses Intel microprocessors (or
compatible processors) and a Windows operating system.

wireless sensor networks (WSNs) Networks of interconnected
wireless devices with built-in processing, storage, and radio
frequency sensors and antennas that are embedded into the
physical environment to provide measurements of many points
over large spaces.

wisdom The collective and individual experience of applying
knowledge to the solution of problems.

wisdom of crowds The belief that large numbers of people can
make better decisions about a wide range of topics or products
than a single person or even a small committee of experts (first
proposed in a book by James Surowiecki).

World Wide Web A system with universally accepted standards for
storing, retrieving, formatting, and displaying information in a
networked environment.

worms Independent software programs that propagate themselves
to disrupt the operation of computer networks or destroy data
and other programs.



Index James, Bill, 483 U
Jobs, Steve, 89 Ubert, Kevin, 526
Name Index
K W
A Kant, Immanuel, 161 Wallace, Sanford, 181
Ahmadinejad, Mahmoud, 336 Kern, Frank, 561 Weiss, Larry, 561
Allen, Reedy and Padma, 587 Kim, Jong Pyo, 555 Witte, Michele, 264
Archer, Michael, 109
Assante, Michael, 336 L Y
Lautenbach, Marc, 561 Yach, David, 175
B Lucas, Tom, 15-29, 15-30, 15-31 Yadati, Chandrasekhar A., 15-29, 15-30
Barney, Jay, 557 Yang, Jerry, 301
Beane, Billy, 483, 484 M
Bharara, Preet, 587 Mason, Andrew, 401 Z
Bloomberg, Michael, 586-588 Matejicek, Christian, 278 Zagat, Tim and Nina, 443, 444
Boger, Joshua, 447 McConnell, Mike, 336-337 Zuckerberg, Mark, 188
Boire, Ron, 110 McCormick, Matt, 428
Brin, Sergey, 301 McDonald, Bob, 84 Organizations Index
Brynjolfsson, Erik, 181 McIntosh, Madeline, 148
Metcalfe, Robert, 204 A
C Mintzberg, Henry, 489 Accenture, 586-588
Camara, Amy, 557 Moore, Gordon, 201 Activision Blizzard, 513
Carpenter, Jake Burton, 526 Myhrvold, Nathan, 443 Adku, 401
Castro, George, 332 Advanced Micro Design (AMD), 38
Clark, Denise, 15-18 N Aetna, 68
Claypool, Alan, 561, 562 Ng, Andrew Y., 471 AIC, 525
Columbus, Christopher, 38 AKM Semiconductor, 15-4
Connor Christopher, 15-29 O Albassami, 469-470
Cui, Jean, 448 Obama, Barack, 337 Alcatel-Lucent, 209, 434
Orwell, George, 176 Alcoa, 372
D Oxley, Michael, 339 Allot Communications, 352
Daines, David, 557 Alta Vista, 117
D'Ambrosio, Lou, 109, 110 P Amazon Merchant Platform, 415
Dean, Jeff, 471 Page, Larry, 301 Amazon, 75, 127, 128, 133-134, 140, 147, 148,
DePodesta, Paul, 483 Page, Mark, 587
Palmisano, Sam, 561 165, 177, 200, 202, 214-215, 225, 234, 236,
E Pincus, Mark, 512 249, 302, 305, 333, 352, 403, 412, 414, 415,
Elli, Alberto, 15-30 Pitt, Brad, 483 420, 434
Pontefract, Dan, 72 AMD, 207
F Porter, Michael, 124 America Online (AOL), 168, 174
Fayol, Henri, 488 Price, Mark, 460 American Airlines, 140
Filo, David, 301 American Bar Association (ABA), 161
Flynn, John, 578 R American Management Association (AMA),
Ford, Bill, Jr., 134 Ratliff, John, 39 296
Ford, Henry, 89 Rockefeller, Jay D., 164 American Medical Association (AMA), 161
Friedman, Thomas, 38 Rudin, Ken, 512 American National Insurance Company
(ANCO), 525
G S Ancestry.com, 419
Gates, Bill, 89 Sarbanes, Paul, 339 Ann Taylor, 138
Gosling, James, 219-220 Schultz, Howard, 130 Anthem Group, 213
Sheets, Don, 39 Apache Software Foundation, 255
H Simon, Herbert, 487 Apple Inc., 39, 40, 43, 44, 89, 117, 123, 127, 128,
Hassenfeld, Henry, 15-17 Soloway, Robert, 181 140, 147, 148, 165, 170, 171, 172, 173, 177,
Hassenfeld, Herman, 15-17 Sullivan, Jim, 110 207, 220, 318, 412, 415, 419, 433, 473, 15-3-
Hassenfeld, Hilal, 15-17 15-4
Hunt, Neil, 235 T Armani Exchange, 434
Hyman, Nev, 460 Thompson, William C., 587 Association for Computing Machinery (ACM),
Torvalds, Linus, 219 161
J
Jackson, Eric, 39 621

622 Index Countrywide Financial Corp., 136, 137 Frito Lay, 15-6
Credit Suisse, 235
Association of Information Technology Crown Books, 147, 148 G
Professionals (AITP), 161 CVM Solutions, LLC, 457 Galleon Group, 154
Cybercom, 337 Gap.com, 419
AstraZeneca, 154 Gartner Inc., 266
Asus, 319 D Gateway Ticketing Systems, 494
AT&T, 117, 140, 209, 279, 288, 292, 307, 434 Daimler, 135 Genealogy.com, 419
Austin Energy, 561-562 DEC (Digital Equipment Corp.), 117, 197, 320 General Electric (GE), 39, 42, 93, 117, 389, 473
Avis Rent A Car, 434 Deckers Outdoor Corp., 547 General Motors Corp. (GM), 41, 42, 119, 135,
Delicious, 456
B Dell Inc., 119, 200, 207, 209, 219, 389 210, 543
B. Dalton, 147, 148 Delta Airlines, 457 GlaxoSmithKline, 154, 448
BAE Systems, 239-240, 431 Dictionary.com, 167 Go2Paper, 431
Ball State University, 352 Disney World, 46-47 GoDaddy, 350
Bank of America, 136, 137, 433 Disney.com, 415 Good Technology, 353
Bank of New York, 136 Dollar General Corp., 64 Google, 36, 41, 42, 117, 123, 126-127, 128, 140,
Barclays Bank PLC, 154 Dollar Rent A Car, 222
Barnes & Noble (B&N), 147-149 Doostang, 416 165, 167, 168, 170, 173, 177, 200, 207, 210,
Barrick Gold, 455-456 Dow Corning, 39 224, 236, 300, 301, 302, 303, 305, 318, 334,
Basex, 296 Dow Jones, 421 412, 413, 418, 419, 433, 434, 443, 468, 471,
Bear Stearns, 490 DP World, 377-378 491
Becker Acroma, 15-29 Dr. Pepper Snapple Group, 390 Gowalla, 433
Best Buy, 75, 427, 434 DroidSecurity, 353 Grokster, 173
Betfair, 421 Drugstore.com, 414 Groupon, 401-402, 443
BJ's Wholesale Club, 338 Dunkin' Donuts, 129 GRT Hotels & Resorts, 390
Black & Veatch, 502 DuPont, 462 GUESS, 138
Blackburn Rovers, 179
Blockbuster, 117, 147 E H
Blogger.com, 304 E*Trade, 42, 419 Hallmark Cards, 492-493
Blue Nile, 403, 414 EarthLink, 288 Harrah's Entertainment, 259
Bluefly, 438 Eastman Chemical Company, 120 Harris Interactive, 68
BMW, 134, 135, 421 Eastman Kodak, 147 Hasbro, 15-17-15-18
The Body Shop, 498, 15-1 eBay, 41, 127, 128, 138, 140, 333, 415, 437, 499 Haworth Incorporated, 376
Boeing Corp., 109, 431 eHarmony, 419 Heartland Payment Systems, 334
Borders, 147, 148 Electronic Arts, 513 Heinz, 93
Boston Red Sox, 483 Electronic Privacy Information Center (EPIC), Heroku, 235
BrightStar Partners, 494 Hertz, 62
British Library, 261 189 Hewlett Packard (HP), 117, 172, 200, 207, 209,
Burton Snowboards, 526-527 Eli Lilly & Co., 154, 448
Business Software Alliance, 173 EMC Corp., 208, 455 219, 256, 438, 500
Emerson Process Management, 270 Hilton Hotels, 128, 434
C Engine Yard, 235 Hitachi, 474
Cablevision, 279, 297 Enron, 339 Home Depot, 109, 434
Caesars Entertainment, 259 Epinions, 420 Hon Hai Group, 15-4
California Pizza Kitchen, 502 ePolicy Institute, 296 Honam Petrochemical Corp. (HPC), 554-555
Canadian Tire, 477 Epsilon, 334 HootSuite, 235
CBS, 220 Etsy, 235 Hulu.com, 174, 419
Cemex, 223 Exostar, 431 Humana, 68
CenterPoint Properties, 298 Hunch.com, 499
Champion Technologies, 344 F Hyatt, 434
Charles Schwab, 260 Facebook, 36, 89, 97, 165, 167, 171, 188-190, Hyperpublic, 401
ChoicePoint, 158
Chrysler Corp., 119, 128 210, 234, 263, 296, 297, 303, 305, 381, 389, I
Cincinnati Zoo, 493, 494-495 402, 413, 416, 418, 420, 425, 433, 434, 512- i2 Technologies, 387
Circuit City, 147 514, 548 IBM, 42, 93, 117, 139, 154, 197, 200, 202, 207,
Cisco Systems, 42, 119, 209, 235, 320 Famous Footwear, 253
Citibank, 45, 109, 118, 140, 335, 480 FBI, 331 209, 211, 218, 219, 235, 256, 261, 297, 320,
Citigroup, 15-10 Federal Communications Commission (FCC), 371, 438, 453, 455, 493, 494, 500, 561-562
CityTime System, 586-588 292 ICA, 95
CNN, 220 FedEx, 36, 74, 133, 308, 434, 498 Infor Global Solutions, 371
Coca-Cola, 371, 456 FeeFighters, 401 Intel Corp., 38, 117, 139, 207, 219, 434
Colgate-Palmolive Co., 457, 508-509 Financial Services Modernization Act (1999), Intercontinental Hotels, 235
Colloquy, 110 339 International Data Corp., 173, 493
Columbia University Medical Center, 332 Fireclay Tile, 390 Internet Architecture Board (IAB), 314
Comcast, 167, 279, 292-293 Firewire Surfboards, 460 Internet Corporation for Assigned Names and
Comdisco Disaster Recovery Services, 344 First Citizens Bank, 499 Numbers (ICANN), 291
Comodo, 350 Flextronics, 119 Intrawest, 81
Computer Security Institute, 178 Flickr, 304, 419 Iowa Electronic Markets (IEM), 421
ComScore, 426 Ford Motor Company, 119, 134-135, 461, 15-10 iVillage, 138, 416
Con-Way transportation, 465 Foursquare, 235, 433
Consumer Federation of America, 264 Fox Sports, 434 J
Consumer Reports, 419 FoxConn, 15-4 Jackson Kayak, 39
Continental Tires, 277-278, 311-312 Javelin Strategy & Research, 333
JCD Repair, 428

Index 623

JCPenney, 44 Mrs. Meyers, 427 Procter & Gamble (P&G), 64, 83, 84, 137, 296,
J.D. Power, 566 MSN, 167, 413, 434 434, 457, 473, 491
JDA Software, 376 MSNBC, 434
JPMorgan Chase, 136, 433 MWEB, 354-355 Progressive Insurance, 502-503
Juniper Networks, 209 MyPoints, 420
MySpace, 331, 420, 425, 426, 434 Q
K Qantas Airways, 232
Kaboodle, 420 N Quantcast, 167
Kaspersky Labs, 336, 353 Napster, 173 Quora, 235
Kazaa, 173 National Board of Information Security
Kennametal, 388 R
KFC, 15-10 Examiners, 336 Rackspace, 438
Kickstarter.com, 421 National Cyber Security Center (NCSC), 305 Radian6, 389
Kiehl Stores, 433 Netflix, 174, 235, 285, 292, 403, 412, 419, 421, Random House, 148
Kimberly-Clark, 390 Raytheon, 431
Kmart, 109, 387-388 499 Real Networks, 209
Knight Capital, 491 Netscape, 403 Real Time Crime Center, 261
Kodak, 120, 389 NetSuite, 389, 427 Recording Industry Association of America,
Kurt Salmon, 109 Network Advertising Initiative, 164
NetZero, 288 331
L New York City Automated Personnel System Red Hat, 219
Lancôme, 15-1 Reddit, 235
Land O'Lakes, 376 (NYCAPS), 586-588 Redken, 15-1
Lands' End, 110, 128 New York City Police Department (NYPD), 261 Reebok, 138
Lego Group, 273-274 New York Stock Exchange, 491 Research in Motion (RIM), 140, 174-175
Lehman Brothers, 490 New York Times, 220, 306 Ricoh, 474
Leighs Paints, 15-29 NextBio, 256 Roland Corp., 96
Leiner Health Products, 82 Nike, 127, 373-374 Rolls-Royce plc, 431
Levi Strauss, 138, 427 Nikko Securities, 474 Royal Dutch/Shell Group, 211
LG, 140, 15-4 Nissan, 434 Ryland Homes, 548
Li & Fung, 138 Nordea, 217-218
Lilly Pulitzer, 434 Nortel, 209 S
LinkedIn, 305, 323-324, 389, 416, 420, 425 Novo Nordisk, 213 Sabre Holdings, 249
LLBean.com, 419 NTUC Income, 105-107 Salesforce.com, 117, 200, 215, 224, 352-353, 383,
Lockheed Martin, 431 Nu Skin Enterprises, 557-558
Lookout, 353 Nucleus Research, 296 389, 390
Loopt, 433 Nvidia, 367-368 Samsung, 173, 319, 15-4
L'Oréal Group, 15-1-15-2 NYU Langone Medical Center, 461 Sanofi SA, 448
Lowe's, 109 Sanyo, 474
Lufthansa, 525 O SAP AG, 93, 117, 208, 219, 223, 312, 367-368,
O2, 417-418
M Oakland Athletics, 483, 484 371, 376, 383, 387, 388, 389, 396, 493, 500,
Macy's, 110, 145, 434 OMGPop Inc., 514 526, 527, 15-1, 15-2, 15-17, 15-18
Magnum AS Group, 95 1-800-Flowers, 434 SAS Institute, 493, 500
Mandarin Oriental, 44 Open Handset Alliance, 207 Schiphol, 78-79
MapInfo, 499 Open Text Corp., 455 Schneider Logistics Services, 379
Marvel Entertainment, 15-17 Opensource.org, 219 Science Applications International Corporation
Mashaweer, 66-68 Oracle Corp., 117, 200, 207, 208, 209, 219, 253, (SAIC), 587, 588
MasterCard, 158, 344 Seagate, 208
Match.com, 419 256, 371, 376, 383, 387, 388, 438, 455, 493, Sears, 42, 126
Matsushita, 474 500, 562 Sears Holding Company, 109
Maybelline, 15-1 Oracle-PeopleSoft, 223, 312 Sears, Roebuck, 109-110
McAfee, 218, 328 Outback Steakhouse, 235 7-Eleven, 97
McDonald's, 129 Overstock.com, 388 Sherwin-Williams, 15-29-15-31
McKinsey & Company, 88, 91, 154 Shopkick, 434
McKinsey Global Institute, 262 P Siemens, 154, 336
Meditronics, 54 Pampers, 375 Simple Shoes, 547
Memorial Sloan-Kettering Cancer Center, 480 Pandora, 134, 173, 174, 296, 419 Singapore (government), 193-194
Merrill Lynch, 462 PayPal, 127, 333, 517 Sirius Decisions, 266
Microsoft Corp., 89, 117, 118, 139, 148, 167, Penguin Books, 148 Six Flags, 87
PeopleSoft, 208 Skype, 292, 336
168, 169, 172, 177, 200, 208, 209, 236, 256, Pepsico, 93, 434 Slashdot, 456
305, 318, 337, 383, 434, 443, 493, 500 Pfizer, 154 Snyders of Hanover, 64
Millenial Media, 434 Pharmacia, 448 SoftSheen-Carson, 15-1
Milton Bradley, 15-17 PharMark, 502 Sony, 333, 334, 15-10
MITS, 117 Ping, 127 Southwest Airlines, 222
Mitsubishi, 474 Pinterest, 235, 420, 456 SpectorSoft Corp., 296
Moneygram, 517-518 Pitney Bowes, 390 Sports Authority, 434
Morpheus, 173 Pixar Animation Studios, 305 Sportsvite, 416
Motion Picture Association of America, 331 Placecast, 434 Spotify, 174
Motorola, 140, 173, 319 Plex Online, 389 Sprint, 140
Mozilla Foundation, 168 Ponemon Institute, 296, 323, 332, 333 Standish Group, 559
Mrs. Fields Cookies, 15-10 Ponsse, 33 Staples.com, 414
Pratt & Whitney, 54 Star Alliance, 525
Priceline, 415 Star Wars, 15-17
Primark, 15-23-15-24 Starbucks, 129-130, 390, 428, 496

624 Index

Stylehive, 420 Vertex Pharmaceuticals, 447, 448 on Facebook, 188
Summit Electric Supply, 396-398 Vertica Systems, 512 geoadvertising, 432, 433
Sun Microsystems, 207, 209, 220, 500 Vestas, 261-262 mobile advertising, 170, 433-434
Sunbelt Rentals, 40 VEVO, 412 See also marketing; online marketing
SunGard Availability Services, 344 Virgin Entertainment Group, 297 advertising exchanges, 424
Sybase, 208 Visa, 158, 171 advertising networks, 424
Symantec, 296, 329, 350, 355 advertising revenue model, 416, 418
Symphony Consulting, 557 W AdWord (Google), 418
Wachovia, 93 AeroScout MobileView (software), 277
T Wall Street Journal, 129, 390, 419 Afaria (Sybase), 213
T-Mobile, 140, 145, 307 Walmart Inc., 42, 43, 44, 109, 126, 128, 139, 154, affiliate revenue model, 420
Taco Bell, 502 affiliate Web sites, 420
TAL Apparel Ltd., 44 311, 312, 333, 434, 499, 517 "agency pricing" model, 148
Target, 43, 109, 110 Walmart.com, 414, 434 agency theory, 120, 142
Tasty Baking Company, 371 Wedbush Securities, 296 agent-based modeling, 473
Tata Consultancy Services, 479-480 WellPoint Inc., 480 agile development, 544, 549
Technodyne, 587 Western Digital, 208 AI. See artificial intelligence
Telus, 71, 72 Westinghouse Electric Co., 578-579 airline industry, 77, 249
Teva, 547 Wi-Fi Alliance, 349 Altair 8800 (computer), 117, 197
Texas Instruments (TI), 117, 15-4 Wizards of the Coast, 15-17 Amazon Kindle, 75, 174, 210
ThisNext, 420 World Bank, 453 Amazon Kindle Fire, 319
Thomas Cook France, 390-391 World Wide Web Consortium (W3C), 221, 306, Amazon Relational Database Service (Amazon
ThomasNet.com, 263 RDS), 249
3M, 42 314 Amazon SimpleDB, 249
TicketDirect, 249 WorldCom, 339 Amazon Stores, 437
Time Warner, 288, 297 Wrigleyville Sports, 427 Amazon Web Services, 215, 249
TJX, 334 ambient data, 340
Tofino Security, 336 X America Online (AOL), 168, 174, 413, 422
Tonka, 15-17 Xanga.com, 304 American Standard Code for Information
Tower Records, 117 Interchange. See ASCII
Toyota, 123 Y analytic platforms, 256-257, 268
Tumblr, 36, 416, 420, 425, 426 Yahoo!, 129, 140, 152, 166, 168, 177, 210, 224, analytical customer relationship management,
Twitter, 36, 89, 97, 210, 297, 304, 305, 329, 381, 386
256, 300, 302, 304, 305, 413, 434 Analytics App, 39
389, 402, 416, 425, 426, 427, 428, 433, 434, Yelp, 420, 428, 443, 444 Android apps, 432
548 YouTube, 168, 296, 389, 426, 434, 548 Android mobile devices, 36, 39, 434
TypePad.com, 304 Android operating system, 173, 205, 207, 225,
Tyson Foods, 154 Z 318, 319, 328
Zagat Surveys, 443-445 Android smartphones, 53, 170, 174, 210, 307,
U Zagat.com, 444 330, 428, 434
UBS Financial Services, 462 Zillow.com, 225 antispyware software, 348
UGG Australia, 547 ZipRealty, 225 antivirus software, 348, 357
Unilever, 342 Zynga, 234-235, 512-514 Apache Hadoop, 208, 255-256, 261
United Airlines, 525 Apache HTTP Web server, 219
United Parcel Service (UPS), 36, 44, 50, 51, 52, Subject Index Apache Open for Business (OFBiz), 388-389
Apache OpenOffice, 219
53-54, 74, 76, 133, 389 A APL (programming language), 540
Universal Music, 331 A4 and A5 processors (Apple), 216 Apple A4 and A5 processors, 216
University of Pittsburgh Medical Center acceptable use policy (AUP), 342 Apple FaceTime, 93
acceptance testing, 530 Apple iAd platform, 434
(UPMC), 232 access, equal access to information and Apple iOS, 205, 207, 208, 318, 473, 546
UPS Supply Chain Solutions, 379 Apple iPad, 36, 39, 43, 110, 127, 173, 207, 208,
Uptake, 401 computing, 182 210, 220, 225, 319, 415, 428, 473
U.S. Consumer Product Safety Commission Access (Microsoft), 246, 250, 251, 540, 15-18 Apple iPhone, 36, 39, 40, 43, 53, 127, 140, 170,
accountability, 156, 160 173, 175, 207, 208, 210, 225, 292, 307, 318,
(CPSC), 264 accounting practices, and international 355, 415, 428, 431, 434, 473, 546
U.S. Copyright Office, 331 Apple iPod, 43, 123, 127, 173, 415
U.S. Department of Commerce, 165 information systems, 15-8 Apple iPod Touch, 110, 207, 208
U.S. Department of Defense, 335 active RFID tags, 311 Apple iTunes, 43, 75, 123, 129, 173-174, 403,
U.S. Department of Homeland Security, 305 ad networks, 422 411-412, 415, 419
U.S. Department of Justice, 331, 332 Adaptive Server Enterprise (Sybase), 208 Apple Macintosh OS, 205
U.S. Federal Highway Administration, 453 additive manufacturing, 459 Apple Safari, 220
U.S. Federal Trade Commission, 163, 338 adhocracy, 118 application controls, 340, 357
U.S. Internal Revenue Service, 76 administrative controls, 341 application development, 544-546
U.S. National Institute of Standards and AdMob platform (Google), 434 application generator, 540
Adobe Connect, 94 Application layer, 284
Technology (NIST), 214 Adobe Creative Suite, 209 application proxy filtering, 348
U.S. National Marine Fisheries Service, 500 Adobe Dreamweaver, 437 application servers, 200
U.S. Pharma Corp., 477 Adobe InDesign, 437 application software packages, 540, 541-542,
U.S. Social Security Administration, 76 AdSense (Google), 167, 418 549
U.S. Veterans Affairs Department (VA), 334 Advanced Planning and Optimization (APO)
USAA, 547-548
USAData, 185 system (SAP), 368
advertising
V
Verizon, 44, 117, 140, 209, 279, 434 advertising networks, 424
"blast and scatter" advertising, 424

Index 625

application software services, IT infrastructure, boundaries, family, work, and leisure business process management (BPM) tools,
196 boundaries, 177 524-525

apps, 225, 230, 432, 545-548 BPM. See business performance management; business process redesign (BPR), 521, 522-525,
Apriso FlexNet, 15-1 business process management 548, 574
AR. See augmented reality
ARM (processor), 216 BPM monitoring software (Sajus), 525 business processes
artificial intelligence (AI), 463, 474 BPR. See business process redesign about, 41, 73-75, 101, 114, 115
ASAP (CombineNet), 15-23-15-24 brick-and-mortar stores, 147 collaborative, 91-92
ASCII (American Standard Code for "bricks-and-clicks", 414 information technology and, 75
"bring your own device" (BYOD), 210, 212-213, Internet technology and, 123
Information Interchange), 205
Asia, imports and exports, 38 353 business restructuring, 491
associations (data analysis), 259 broadband connections, 280, 314 business-to-business e-commerce. See B2B
Atom (Intel), 216 Brown Bag Software v. Symantec Corp., 172
Attensity Analyze (software), 260 browser-based malware, 355 e-commerce
attribute, 241 browsers. See Web browsers business-to-consumer e-commerce. See B2C
audioconferencing, 93 browsing behavior, online tracking, 164, 165,
auditing, 344-345 e-commerce
augmented reality (AR), 462, 475 166, 169, 421-422, 423, 424 business value
AUP. See acceptable use policy bugs, 176, 335
authentication, 336, 345, 346, 357 build-to-order model, 379, 451 co-creation of, 37
auto retailing, 409 build-to-stock model, 379 of controls, 338-340
automated high-speed decision making, 491 bullwhip effect, 374-375 of CRM systems, 386, 387
automated teller machines (ATMs), 45, 118, business analytics (BA), 492, 495, 500-501, 508 of decision making, 485
Business ByDesign (SAP), 389 of enterprise systems, 371-372, 392
140, 175 business continuity planning, 344 of information systems projects, 567-571,
automation business drivers, 15-4, 15-5 582
business ecosystems, 138-140, 143 of SCM systems, 379-381
organizational change, 520, 548 business firms business value chain model, 55-56, 131-133, 143
sales force automation (SFA), 383 BusinessObjects (SAP), 578, 15-18
automotive industry, 134 business processes and, 114, 115 BusinessObjects Dashboards (SAP), 368, 554
autonomic computing, 218, 230 ethical and legal judgment of, 154 BusinessObjects Web Intelligence (SAP), 368,
Azure (Microsoft), 235 reorganizing for international scale, 15-10- 506, 554
15-12 Buzzient (Oracle), 389
B business functions, 49, 50 BYOD. See "bring your own device"
B2B e-commerce (business-to-business business information value chain, 55-56, 131-
133, 143 C
e-commerce), 413, 426, 428-431, 439 business intelligence (BI), 492-508 C2C e-commerce (consumer-to-consumer
B2C e-commerce (business-to-consumer about, 492-493, 508, 15-18
analytic platforms, 256-257 e-commerce), 413
e-commerce), 413 Apache Hadoop, 208, 255-256, 261 CA. See certificate authority
BA. See business analytics "big data", 36, 37, 254, 261-262, 498-499 cable Internet connections, 288, 314
backward chaining, 465 capabilities, 496-499 cable modems, 285
Baidu (search engine), 300 case study, 512-514 CAD. See computer-aided design
balanced scorecard method, 504-505 constituencies, 501-508 call options, 570
bandwidth, networks and networking, 287-288 data mining, 258-259, 268, 454, 462, 463 campus area networks. See CANs
banking, 45, 333, 433 data warehouses, 255, 257 CAN-SPAM Act (2003), 181
banner display ad marketing, 152-153 in enterprise applications, 389 CANs (campus area networks), 286
Barnes & Noble Nook (e-reader), 147, 148 environment, 493-496, 508 capital, 112
baseball, decision-making in, 483, 484 in-memory computing, 256, 268 capital budgeting, 569-570
behavioral models, 488 infrastructure, 493 car rental companies, 222, 262
behavioral targeting, 167, 421-422, 439 management strategies for, 500 carpal tunnel syndrome (CTS), 182
OLAP (online analytical processing), 257- CASE. See computer-aided software
technical solutions to, 169 258, 268
U.S. legislation, 164 software tools, 15-18 engineering
benchmarking, 133 text mining, 259-260, 268 case-based reasoning, 463, 466-467, 475
best practices, 133 user interface, 496 Categorical Imperative, 161
BI. See business intelligence users, 497 CDMA (Code Division Multiple Access), 307,
"big data", 36, 37, 254, 261-262, 498-499 vendors, 493
Bing (Microsoft), 300, 318, 413 Web mining, 260, 268 314
biometric authentication, 346, 357 business intelligence applications, 37 cell phones, 307
biometric database, 189 Business Intelligence Enterprise Edition
BlackBerry (RIM), 36, 39, 53, 140, 174-175, 210, (Oracle), 389 location-based services, 170-171, 432-433,
212, 307, 353, 431 business intelligence infrastructure, 254-257 439
blade servers, 207 business intelligence systems, 77, 79-83, 101 statistics, 35, 36
"blast and scatter" advertising, 424 business models, 43, 56-57, 143 See also smartphones
blogosphere, 304 business objectives centers of excellence, 15-16
blogroll, 304 of information systems (IS), 42-43 centralized systems, 15-10
blogs, 90, 304, 329, 420 information technology and, 141 certificate authority (CA), 350
Bluetooth, 308-309, 314, 327, 328, 336 Business Objects (SAP), 389 CGI. See Common Gateway Interface
bookmarks, 456 Business One (SAP), 15-17 change
bookstore Business One OnDemand (SAP), 389 business process redesign (BPR), 521, 522-
case study, 147-149 business performance management (BPM), 505 524, 548, 574
process redesign, 522-524 business process management (BPM), 522, 548 change management, 572-574, 15-14-15-15
botnets, 180, 181, 331, 334 implementation of new project, 572-574,
577-579, 582, 15-15-15-16
rapidity of, 177
change agent, 572
change management, 572-574, 15-14-15-15
chat, 294

626 Index

Chatter (Salesforce), 93, 96, 389 unified communications, 298 handheld computers, 277
chief information officer (CIO), 99 See also networks and networking; health risks, 182-183
chief knowledge officer (CKO), 99, 453 telecommunications technology history and evolution of, 197-201
chief privacy officer (CPO), 99 communities, 90 history of, 117
chief security officer (CSO), 99, 323 communities of practice (COPs), 453 as instruments of crime, 332
child domain, 289 competition, Porter's competitive forces model, legacy systems, 209, 223, 519
Child Pornography Act, 333 124-125, 138, 142, 228-229 machine learning, 468, 475
Children's Online Privacy Protection Act competitive advantage mainframes, 197, 207, 209
as business objective, 44-45 netbooks, 210
(COPPA), 164 information systems for, 123-140 scalability, 226
China Internet and, 128, 130-137 servers, 197, 281
sustaining, 140 supercomputers, 211
cyberwarfare and, 334 competitive forces model, 124-125, 138, 142, tablet computers, 36-37, 173, 210, 319
imports and exports, 38 228-229 as targets of crime, 332
monitoring and blocking of Internet Compiere (open source software), 388-389 "zombie" PCs, 331
access, 15-20 complementary assets, about, 56-58, 62 computing
Chrome OS (Google), 207, 220 component-based development, 544-545, 549 autonomic computing, 218, 230
churn rate, 387, 512 computer abuse, 180 client/server computing, 199-200, 282-283,
CIO. See chief information officer computer-aided design (CAD), 459-461, 462, 293, 295
Cisco TelePresence, 84 475 cloud computing, 36-38, 200, 213-216, 224,
Cisco WebEx, 94 computer-aided software engineering (CASE), 226, 230, 234-236
Citrix Systems XenDesktop, 213 536 computer abuse, 180
CityVille (online game), 513 computer crime, 177, 330-335 computer crime, 178
CKO. See chief knowledge officer botnets, 180, 181, 331, 334 decentralized vs. centralized, 176-177
class, 535 bugs, 335 downtime, 351
classical model of management, 488 click fraud, 334 end-user computing, 541
classification (data analysis), 259 cyberterrorism and cyberwarfare, 334-336 enterprise computing, 200
click fraud, 334 cybervandalism, 330-331 fault-tolerant computer systems, 351, 357
clickstream behavior, 421, 422 data breaches, 333 green computing (green IT), 216, 217-218,
client/server computing, 199-200, 282-283, 293, defined, 332 230
295 denial-of-service (DoS) attacks, 331, 357 grid computing, 211, 230
client/server network, 199 digital piracy, 173-174, 184 health risks, 182-183
clients (computers), 199 employees and, 335 high-availability computing, 351, 357
cloud-based data management services, 249 evil twins, 333 history and evolution of, 197-201
cloud-based software, 215, 224, 389 identity theft, 332-333 in-memory computing, 256, 268
cloud computing, 36-38, 200, 213-216, 230 keyloggers, 330, 336 lifestyle and, 177
about, 352, 542 legislation, 333-334 mobile computing, 177, 201, 207
case study, 234-236 pharming, 333 on-demand computing, 215
customer relationship management spoofing and sniffing, 331 recovery-oriented computing, 351
(CRM), 390-391 spyware, 167, 330 system availability, 350-352
data management services, 249 See also malware; security ubiquitous computing, 177
databases in, 247, 249 Computer Crime and Security Survey (Computer utility computing, 215
hybrid cloud computing, 216 Security Institute), 178 virtualization, 211, 213, 230
limitations of, 215 computer forensics, 339-340 computing platforms, 36-38, 51, 195, 210-
private cloud, 215 Computer Fraud and Abuse Act (1986), 333 216
public cloud, 215 computer hardware. See hardware See also mobile digital platform
reliability, 235 computer literacy, 48 concurrent supply chains, 379
scalability, 226 Computer Matching and Privacy Protection Act Conficker (malware), 329
security, 352-353 (1988), 163 conflict, 50
software as a service, 215, 224 computer networks. See networks and Connect (Adobe), 94
cloud infrastructure, as a service, 214-215 networking Connections (IBM), 93, 96
cloud platform, as a service, 215 computer operations controls, 341 connectivity, global IS, 15-20-15-21
CLTV. See customer lifetime value computer programs. See software consumer privacy
clustering (data analysis), 259 computer security. See security clickstream behavior, 421, 422
coaxial cable, 287 Computer Security Act (1987), 163 European legislation, 165
COBOL (Common Business Oriented computer software. See software "right to be forgotten", 165
Language), 205 Computer Software Copyright Act (1980), 172 U.S. legislation, 164
Code Division Multiple Access. See CDMA computer viruses and worms, 328-329, 336, Consumer Product Safety Act, 264
codes of conduct, 161 348, 357 consumer-to-consumer e-commerce. See C2C
Cognos Business Intelligence (IBM), 494, 15-18 computer vision syndrome (CVS), 183 e-commerce
collaboration, 37, 72, 88-92, 456, 475 computers, 47 consumerization, of IT, 210-211
collaboration tools, 37, 92-98, 101, 15-22 "bring your own device" (BYOD), 210, 212- contact point, 381
collaborative business culture, 91 213, 353 content management systems, 455-456
collaborative shopping, with social commerce, clients, 197 content providers, 414, 415
426 computer-related liability problems, 174- continuous replenishment system, 126
CombineNet ASAP (software system), 15-23-15- 175 controls, 156, 325, 340-341
24 dependence on and vulnerability, 177-178 business value of, 338-340, 357
Common Business Oriented Language. doubling of computing power every 18 formal control tools, 575
See COBOL months, 157 "conversations", 89-90
Common Gateway Interface (CGI), 263 equal access to information and conversion, 530, 532
communication computing, 182 cookies, 165, 166, 184
digital vs. analog signals, 285
trends in, 279-285

Index 627

cooptation, 15-16 data administration, 265-266, 269 data mining, 258-259, 268, 454, 462, 463
COPPA. See Children's Online Privacy data governance, 266 defined, 244
data mining, 258-259, 268, 454, 462, 463 designing, 251-253, 268
Protection Act data scrubbing, 267 entity-relationship diagram, 253, 268
COPs. See communities of practice defined, 45-46, 449 knowledge management and, 452
copyright, 172, 184 encryption, 349-350, 352, 357 non-relational databases, 247, 249, 268
core business processes, 41 in enterprise applications, 388 normalization, 252
core competencies, 137, 143 file organization, 241-244 product safety complaints, 264-265
core systems, 15-14 globalization and, 15-7 Web and, 262-263, 268
CORENET, 193-194 international information systems, 15-7 Web-enabled databases, 262-263, 268
corporate strategic planning group, 563 multidimensional data model, 258 See also database management systems
cost transparency, 408 packet switching, 283, 295 DB2 (IBM), 246, 250
counterimplementation, 577 quality, 184, 266, 269 DBMSs. See database management systems
CPO. See chief privacy officer security of, 357 DCVs. See destination-coded vehicles
Creative Suite (Adobe), 209 storage on secure medium, 339 DDos attacks. See distributed denial-of-service
credit card companies, 128, 158 text mining, 259-260, 268 (DDoS) attacks
credit scoring, 498 transborder data flow, 15-7 debugging, 355
critical success factors, 566 data administration, 265-266, 269 decentralized systems, 15-10
CRM on Demand (Oracle), 390 data analysis, nonobvious relationship Decision Cockpits, 85
CRM systems. See customer relationship awareness (NORA), 158-159 decision making, 50, 484-491, 508
data analysis techniques, 157 automated high-speed decision making,
management (CRM) systems data breaches, 333 491
cross-selling, 384 data brokers, 152 business intelligence and analytics for, 495
crowdsourcing, 89, 90, 420-421, 439 data centers, 352 as business objective, 44
Crystal Reports (software), 251, 540 green centers, 217-218 business value of, 485
CSO. See chief security officer data cleansing, 267 case study, 483-484
CTS. See carpal tunnel syndrome data communication, 280 enterprise systems, 372
culture data definition, 249 geographic information systems, 499
data dictionary, 242, 249, 250, 534 information quality and, 490
collaborative, 91 data-driven management, 83 management filters, 490
organizational, 49, 50, 114-115 data encryption, 349-350, 352, 357 managerial roles, 486, 488-489
of work and business, 89 data error, 176 managers and, 486, 488-489, 496
Custom Board Design system (Firewire data error rates, 176 organizational politics and inertia, 490-491
Surfboards), 460 data flow diagram (DFD), 533-534 process, 487-488, 508
customer intimacy, 44, 128 data governance, 266 semistructured knowledge for, 454
customer lifetime value (CLTV), 386 data inconsistency, 243 stages in, 487-488, 508
customer loyalty management, 384, 385 data management decision-support systems (DSS), 79-82, 101,
Customer Relationship Management (SAP database approach, 244-253 496, 501-502, 504, 509
software), 578 database management system (DBMS), digital dashboard, 44, 82, 85, 101, 368, 390,
customer relationship management (CRM) 244-247, 249-251, 268 496, 508-509
systems, 86, 101, 381-387, 392 executive-support systems (ESS), 82, 101,
about, 381, 382, 518 relational DBMS, 246-247, 248, 268 496, 505, 509
analytical CRM, 386 traditional file environment, 241-244, 268 group decision-support systems (GDSS),
business value of, 386, 387 data management services 505, 507-508, 509
cloud computing, 390-391 cloud-based, 249 pivot tables, 502, 503
cost of, 387 IT infrastructure, 196 voyage-estimating systems, 81
defined, 381 data manipulation language, 250 decisional roles, of management, 489
marketing and, 383-384 data mart, 255 decisions
operational customer relationship data mining, 258-259, 268, 454, 462, 463 semistructured decisions, 486, 501-502,
management, 386 data quality, 184, 266, 269 508
software, 382-385, 392 data quality audit, 267 structured decisions, 486, 508
customer service, as benefit of collaboration, 91 data redundancy, 243 types, 485-487, 508
customer service modules, in CRM, 383 data resources unstructured decisions, 486, 508, 509
customers information policy, 265-266, 269 See also decision making; decision-support
competitive advantage and, 125 managing, 265-267 systems
"wisdom of crowds", 89, 389, 420-421, 439 data scrubbing, 267 deep-content analysis, 480
customization Data Security and Breach Notification Act, 333- deep packet inspection (DPI), 352
in e-commerce, 407, 409 334 "deep Web", 300
of software packages, 541 data security controls, 341 Delivery Information Acquisition Device
CVS. See computer vision syndrome data storage, 157 (DIAD), 53, 54
cybercrime. See computer abuse; computer data visualization, 499 demand-driven supply chains, 379, 392
crime data warehouses, 255, 257 demand planning, 376
cyberlockers, 93, 94-95 data workers, 49 denial-of-service (DoS) attacks, 331, 357
cyberterrorism, 334 Database Cloud Service (Oracle), 249 Descartes' rule of change, 161
cybervandalism, 330-331 Database Lite (Oracle), 246 DFD. See data flow diagram
cyberwarfare, 334-336 database management systems (DBMSs), 244- dial-up service, 326
cycletime, 372 247, 249-251, 268 digital asset management systems, 456
database server, 263 digital certificates, 350, 351, 357
D databases, 244-253 digital content delivery, 415, 432
dashboards, 44, 82, 85, 101, 368, 390, 496, "big data", 36, 37, 254, 261-262, 498-499 digital dashboard, 44, 82, 85, 101, 368, 390, 496,
in the cloud, 247, 249 508-509
508-509
data, 47

ambient data, 340
"big data", 36, 37, 254, 261-262, 498-499

628 Index

digital data. See data E employee relationship management (ERM),
digital divide, 182 e-book readers, 210 382, 383
digital firms, 41-42, 138, 139 e-books, 147, 148
digital goods, 411-412, 439 e-business, 87 employees
digital information E-Business Suite (Oracle), 388, 518, 519, 15-29, "bring your own device" (BYOD), 210, 212-
213, 353
growth of, 208 15-30 computer crime and, 335
retention of, 36 e-business suites, 388 decision-making by, 487
digital logistics nervous system, 379, 380 e-commerce, 87, 401-439, 439 e-mail policies, 296-297
digital markets, 410, 411, 439 e-mail use, 294-295, 326
See also e-commerce B2B e-commerce, 413, 426, 428-431, 439 empowerment of, 120, 177
digital media B2C e-commerce, 413 monitoring employee Internet activity,
business impact of, 36 "bricks-and-clicks", 414 296-297
piracy and theft, 173-174, 184 building an e-commerce presence, 434-
streaming, 415 438, 440 employment. See work
Digital Millennium Copyright Act (DMCA) business models, 413-416, 439 encryption, 349-350, 352, 357
(1998), 174 C2C e-commerce, 413 end-user computing, 541
digital music, 173, 411-412 computer crime and, 333 end-user development, 539-541, 549
digital photography, 117 features of, 405, 407-409, 439 end-user interface, 538
digital records, retention of, 36, 45, 339, 357 growth of, 403-405, 406, 412 end users, 99, 572-573
digital signal, 285 key concepts in, 409-412 enhanced e-books, 148
digital social graph, 425 m-commerce, 413, 432-434, 439 enterprise application software, 83, 85-87, 101,
digital subscriber line (DSL), 288, 314, 326 marketing and, 421-426, 439
Digitec Knowledge Direct, 457 present status of, 403-405 208, 370-371, 388-389
direct cutover strategy, systems development, revenue models, 416, 418-420, 439 enterprise applications
531 social commerce, 90, 425, 427-428
direct goods, 430 social networking and, 416, 420-421 business intelligence in, 389
Directive on Data Protection (European trends in, 402 challenges, 387-389, 392
Commission), 165 "wisdom of crowds", 89, 389, 420-421, 439 definition of data, 388
disaster recovery planning, 343-344 e-commerce Web Site next-generation applications, 388-389
disintermediation, 410 building, 436-438, 440 enterprise computing, 200
display ad marketing, 152-153, 422, 424 planning, 435-436 enterprise content management (ECM)
disruptive technologies, 117-118 e-government, 87-88 systems, 455-456
distributed denial-of-service (DDoS) attacks, E-Government Act (2002), 163 enterprise performance management (EPM),
331 e-hubs, 430 15-18
divisionalized bureaucracy, 118 e-mail enterprise resource planning (ERP), 83, 369,
DNS. See Domain Name System about, 92, 93, 294 396, 518
Do Not Track list, 164 computer crime and, 333 enterprise social business, 90, 93
Do-Not-Track Online Act (2011), 164 as electronic evidence, 339 enterprise social networking tools, 93, 96
Do Not Track system, 152, 169 for international companies, 15-12 enterprise software, 370-371, 388-389, 392
document management systems, 452 liability law, 175 enterprise solutions, 388
documentation, systems development, 531 for marketing, 422 enterprise suites, 388
domain extensions, 290 phishing, 178, 333 enterprise systems, 83, 85, 369-391
domain name, 289 security vulnerabilities, 326 about, 369-370
Domain Name System (DNS), 289-290, 314 spam, 180, 331 business processes supported by, 370, 371
domestic exporter strategy, 15-9 spoofing, 331, 333 business value of, 371-372, 392
DoS attacks. See denial-of-service (DoS) attacks tracking, 167-168 customer relationship management
DOS operating system, 197 E-Mail Threats and Harassment Act, 333 (CRM) systems, 86, 101, 381-387, 392, 518
DoubleClick (Google), 157-158, 166, 167, 168, e-tailers, 415-416 enterprise resource planning (ERP), 83,
418, 422, 423 EC2. See Elastic Compute Cloud 369, 396, 518
Downadup (malware), 329 ECM systems. See enterprise content software, 83, 85-87, 101, 208, 370-371
downtime, 351 management (ECM) systems supply chain management systems, 85-86,
Downup (malware), 329 Economic Espionage Act, 333 372-381, 392, 518, 15-21
DPI. See deep packet inspection economists, on information systems, 59, 62 enterprise-wide knowledge management
Draw Something (mobile game), 514 EDI. See electronic data interchange systems, 453-454, 454-457, 475
Dreamweaver (Adobe), 437 efficient customer response system, 126 entity, 241
drilldown capability, 505 Egypt, cyberwarfare and, 336 entity-relationship diagram, 253, 268
drive-by downloads, 328 Elastic Compute Cloud (EC2), 215 entrepreneurial firms, 118
Driver's Privacy Protection Act (1994), 163 electronic business. See e-business environmental scanning, 116
Dropbox (cyberlocker service), 94, 95, 210 electronic commerce. See e-commerce EPM. See enterprise performance management
drug development, structure-based design, 447, Electronic Communications Privacy Act (1986), equity, equal access to information and
448 163, 333 computing, 182
DSL. See digital subscriber line electronic data interchange (EDI), 429, 526, ergonomics, 579-580
DSL modems, 285 15-22 ERM. See employee relationship management
DSS. See decision-support systems electronic marketing, in Europe, 181 ERP. See enterprise resource planning
dual-core processors, 216 electronic medical record system (EMR), 164, ERP Human Capital Management (HCM)
due process, 160 338 (SAP), 557
duplicated systems, 15-10 electronic records management, security and, ESS. See executive-support systems
DuPont HyperPlant, 462 338-340, 357 Ethernet, 205, 286
Duqu (worm), 336 electronic surveillance. See monitoring ethical analysis, 160
dynamic pricing, 410 Empires & Allies (online game), 512 ethical and moral issues
employee learning, 72 accountability, 156, 160
facing the user of technologies for the
aged community, 151-152

Index 629

failed judgment by senior managers, 153- Federal Managers Financial Integrity Act global reach, in e-commerce, 405, 407
154 (1982), 163 global supply chain, 378-379
information rights, 162-169, 170-171 Global System for Mobile Communication. See
in information society, 159-183 feedback, 46
intellectual property rights, 156, 169, 172- fiber optic cable, 287 GSM
174, 184 field, 241, 242 global value chains, 15-19-15-22
Internet and, 153 file, 241, 242 globalization
monitoring employee Internet activity, file sharing, 90
296-297 challenges and opportunities, 38, 41, 62
privacy and freedom, 162-169, 170-171, illegal, 173-174 global culture, 15-5-15-6
184 file-sharing services, 173 particularism, 15-7
quality of life, 156, 176-183 File Transfer Protocol. See FTP Third World countries, 15-6
responsibility, 159 finance and accounting, business processes, 74 transborder data flow, 15-7
system quality, 156, 176 financial performance, as benefit of See also international information systems
in technology, 156-159 Gmail (Google), 94, 167, 210, 416
See also privacy collaboration, 91 Golden Rule, 161
ethical "no free lunch" rule, 161 financial services Google, 36, 41, 42, 117, 123, 126-127, 128, 140,
ethical principles, 161, 184 165, 167, 168, 170, 173, 177, 200, 207, 210,
ethics credit scoring, 498 224, 236, 300, 301, 302, 303, 305, 318, 334,
defined, 155 investment workstations, 462 412, 413, 418, 419, 433, 434, 443, 468, 471,
ethical analysis, 160 m-commerce, 433 491
ethical principles, 161 privacy legislation, 164 Google +, 36, 416, 420, 425, 428, 433, 444
in information society, 155-183 records retention, 339 Google +1, 303, 420
professional codes of conduct, 161 fingerprint technology, 346 Google AdMob platform, 434
Europe FIP. See Fair Information Practices Google AdSense, 167, 418
cell phone standards, 307 Firefox (Mozilla), 169, 219 Google AdWord, 418
imports and exports, 38 firewalls, 347-348, 357 Google Android operating system, 173, 205,
spamming regulation, 181 Firewire Surfboards Custom Board Design 207, 225, 318, 319, 328
European Commission Directive on Data system, 460 Google Android phones, 53, 170, 174, 210, 307,
Protection, 165 "first movers", 117 330
European legislation FishVille (online game), 513 Google Apps, 210, 215, 225, 416
computer crime, 333 Flame (malware), 336 Google Apps/Google Sites, 93, 94
consumer privacy, 165 Flash (plug-in), 220 Google Calendar, 94
personal data privacy, 190 Flash cookies, 166-167 Google Chrome, 207, 220
privacy, 163, 165 flattened organizations, 120-121 Google Docs, 94
spamming regulation, 181 FlexNet (Apriso), 15-1 Google DoubleClick, 157-158, 166, 167, 168,
transborder data flow, 15-7 folksonomies, 456 418, 422, 423
European Union Data Protection Directive Ford Immersive Virtual Environment, 461 Google Drive, 94
(1998), 15-7 forecasting (data analysis), 259 Google Gmail, 94, 167, 210, 416
evidence-based learning, 480 foreign key, 247 Google MapReduce, 255
evil twins, 333 formal control tools, 575 Google Maps, 225, 319
Exadata (Oracle), 256 formal planning tools, 575 Google Places, 443
Exalytics (Oracle), 256 forward chaining, 465 Google Product Search, 304
Excel (Microsoft), 95, 502, 540, 15-18 4G networks, 307, 314 Google Reader, 220
exchanges, 431 Foursquare (software), 129, 171 Google Search, 167
executive-support systems (ESS), 82, 101, 496, fourth-generation languages, 539-540 Google Sites, 94, 416
505, 509 franchising, 15-9-15-10, 15-11, 15-25 Google Talk, 94, 294
expert systems, 452, 454, 462, 463-466, 475 free/freemium revenue model, 419 Google video chat tools, 93
explicit knowledge, 450, 455 Freedom of Information Act (1966), 163 GPOs. See global process owners
Explorer 10 (Microsoft), 152, 168 FTP (File Transfer Protocol), 294 GPS. See global positioning services
Expression (Microsoft), 437 Fusion (Oracle), 388 Gramm-Leach-Bliley Act (1999), 164, 339, 357
Expression Studio (Microsoft), 209 fuzzy logic, 454, 463, 467-468, 475 graphics language, 540
Extensible Markup Language. See XML green computing (green IT), 216, 217-218, 230
external integration tools, 575 G grid computing, 211
extranets, 51, 87, 101 Galaxy POS (Gateway), 494 group decision-support systems (GDSS), 505,
games and entertainment, as m-commerce, 434 507-508, 509
F Gantt chart, 575, 576 Grum botnet, 331
Facebook, 36, 89, 97, 165, 167, 171, 188-190, Gateway Galaxy POS, 494 GSM (Global System for Mobile
GDSS. See group decision-support systems Communication), 307, 314
210, 234, 263, 296, 297, 303, 305, 381, 389, general controls, 340, 341, 357
402, 413, 416, 418, 420, 425, 427, 433, 434, genetic algorithms, 454, 463, 472-473, 475 H
512-514, 548 geoadvertising, 432, 433 hackers, 323, 324, 327, 328, 329, 330, 331, 333,
FaceTime (Apple), 93 geographic information systems (GIS), 499
facial recognition technology, 189, 303, 346 geoinformation services, 432, 433 338, 357
facilities management services, IT geosocial services, 432, 433 Hadoop (Apache), 208, 255-256, 261
infrastructure, 196 Gigabit Ethernet, 286 Hadoop Distributed File System (HDFS), 255
Fair Information Practices (FIP), 163-164 GIS. See geographic information systems Hadoop MapReduce, 255
FarmVille (online game), 512 global business drivers, 15-4, 15-5 HANA. See High Performance Analytics
"fast followers", 117 global business strategies, 15-9-15-10
fault-tolerant computer systems, 351, 357 global culture, 15-5-15-6 Appliance
feasibility study, 528 global information systems. See international handheld computers, 277
handheld devices. See mobile handheld devices
information systems hardware, 207
global markets, 15-6
global positioning services (GPS), 432-433 controls, 341
global process owners (GPOs), 517 defined, 51

630 Index

networking, 209 defined, 45, 46, 449 postimplementation audit, 531-532
theft, 341 equal access to information and potential for catastrophic failure, 176
total cost of ownership (TCO), 227, 568 computing, 182 production and maintenance, 531-532
HBase, 255, 256 See also business analytics; business project management, 559-581
HDFS. See Hadoop Distributed File System intelligence quality of life, 156, 176-183
health care, electronic medical records, 164, Information Age, moral dimensions of, 155-156 scalability, 226
338, 357 information asymmetry, 409-410, 439 security, 323-357
health information, privacy legislation, 164 information density, in e-commerce, 407, 408 security policy, 342-343, 357
Health Insurance Portability and information policy, 265-266, 269 sociotechnical perspective on, 59-61
Accountability Act (HIPAA) (1996), 164, information quality, 490 strategic business objectives of, 42-43
338, 357 information requirements, 528 supply chain management and, 374-376
hertz (unit), 287 information resource protection, 345-353 system availability, 350-352
high-availability computing, 351, 357 antivirus and antispyware solutions, 348, system quality, 156, 176
High Performance Analytics Appliance 357 systems analysis, 528, 532, 549
(HANA), 256 auditing, 344-345 systems design, 528-536, 549
HIPAA. See Health Insurance Portability and authentication, 336, 345, 346 technical approach to, 58, 59
Accountability Act digital certificates, 350, 351, 357 testing, 530-531, 532
homeland security, nonobvious relationship encryption, 349-350, 352, 357 total cost of ownership (TCO), 227, 568
awareness (NORA), 158-159 ensuring system availability, 350-352 transaction processing systems (TPS),
host country systems units, 15-11 firewalls, 347-348, 357 76-77, 101, 501
hosting, Web sites, 437-438 identity management, 345-346 types, 75-83
hotspots, 309, 310 intrusion detection systems, 348, 357 See also systems development
HTML (Hypertext Markup Language), 220, public key infrastructure (PKI), 350 information systems controls, 156, 325, 340-341
291, 314 securing wireless networks, 349 risk assessment, 341-342
HTML5, 220, 230 unified threat management (UTM) security policy, 342-343, 357
HTTP (Hypertext Transfer Protocol), 284, 299 systems, 348-349 information systems department, 98, 99-100
hubs, 281 See also information systems controls information systems literacy, 48
human resources, business processes, 74 information rights, 156 information systems managers, 99
hybrid AI systems, 474 information society, ethical and moral issues, information systems plan, 564-566
hybrid cloud computing, 216 155-156, 159-183, 184 information systems projects
HyperPlant (DuPont), 462 information systems (IS) business value of, 567-571, 582
Hypertext, 299 about, 62 cooptation, 15-16
Hypertext Transfer Protocol. See HTTP activities producing information, 46 evaluating, 566-567, 582
auditing, 344-345 failure, 176, 558, 559-560, 573
I behavioral approach to, 58-59 implementation, 572-574, 577-579, 582,
iAd platform (Apple), 434 behavioral impact of, 122 15-15-15-16
IBM BigSheets, 261 building, 517-546 information systems plan, 564-566
IBM Cognos Business Intelligence, 494, 15-18 business continuity planning, 344 key performance indicators (KPIs), 504,
IBM Connections, 93, 96 business impact of, 35-36, 42-43, 62, 101 563, 566, 582
IBM DB2, 246, 250 business intelligence systems, 77, 79-83 management structure for project team,
IBM InfoSphere BigInsights software, 261 business perspective on, 52, 55-56 563-564
IBM Lotus Domino server, 95 capital budgeting for, 569-570 objectives, 560, 562-563
IBM Lotus Notes, 92, 93, 95, 304, 15-19 for competitive advantage, 123-140 pricing models, 570-571
IBM Lotus Quickr, 96 contemporary approaches to, 58-59 project management, 559-581
IBM Netezza, 256 controls, 156, 325, 340-341 project risk, 572-574, 582
IBM SmartCloud for Business, 93 costs and benefits analysis, 568-569 See also project management; systems
IBM SmartCloud for Social Business, 96 defined, 45, 62 development
IBM WebSphere, 562 design of, 123 information systems steering committee, 563
IC3. See Internet Crime Complaint Center documentation, 531 information technology (IT), 184
IdeaExchange (Salesforce), 389 economic impacts of, 119-120 about, 51
Identity Fraud Report (Javelin Strategy & equal access to information and behavioral impact of, 122
computing, 182 "bring your own device" (BYOD), 210, 212-
Research), 333 ethical and moral issues, 155-156, 162-183, 213, 353
identity management, 342, 345-346 184 business ecosystems and, 139, 143
identity theft, 332-333 ethical dilemmas, 162 business objectives and, 141
illegal file sharing, 173-174 failure, 176, 558, 559-560, 573 business processes, 75
ILOVEYOU (malware), 329 functions of, 47 capital investment statistics, 35
IM. See instant messaging globalization and, 41, 62 defined, 45
Immersive Virtual Environment (Ford), 461 information requirements, 528 economic impacts of, 119-120
implementation information rights and, 162-169, 170-171 equal access to information and
international information systems, 15-3- computing, 182
case study, 578-579 15-24 flattened organizations and, 120-121
controls, 341 liability law, 160, 175, 176 information rights, 162-169, 170-171
counterimplementation, 577 management and, 50 job loss due to technology, 181-182, 184
postimplementation audit, 531-532 managerial roles supporting IS, 489 liability law, 160, 175, 176
process, 572-574, 577, 582, 15-15-15-16 new themes in, 36 organizational change and, 114, 115, 122,
in-memory computing, 256, 268 organization in companies, 100, 101 520-525, 548
Incentive Compensation module (Oracle), 518 organizational change and, 114, 115, 122, organizational impacts of, 120-122
InDesign (Adobe), 437 520-525, 548 postindustrial organizations, 121-122
indirect goods, 430 organizational impacts of, 120-122 potential for catastrophic failure, 176
Industrial Revolution, 38 organizations and, 48-50, 111-119 quality of life, 156, 176-183
inference engine, 464, 465
information, 47

Index 631

return on investment, 56, 570 patents, 172-173 hypertext, 299
system performance, 176 protection of digital media, 173 intelligent agent shopping bots, 304
system quality, 156, 176 trade secrets, 169 as international communications system,
information technology (IT) education Intelligent agent shopping bots, 304, 473 41
services, 196 intelligent agents, 454, 473-474, 475 international use statistics, 15-21
information technology (IT) governance, 100, intelligent techniques, 454, 463-474, 475 Internet service providers (ISPs), 174, 181,
226 artificial intelligence (AI), 463, 474 288, 292
information technology (IT) infrastructure, 51 case-based reasoning, 463, 466-467, 475 Internet2, 291
autonomic computing, 218, 230 data mining, 258-259, 268, 454, 463, 463 IP addresses, 288-289, 299, 326
cloud computing, 36-38, 200, 213-216 expert systems, 452, 454, 463, 463-466, 475 IPv6, 291
competitive forces model, 124-125, 138, fuzzy logic, 454, 463, 467-468, 475 leisure use, 177
142, 228-229 genetic algorithms, 454, 463, 472-473, 475 marketing and, 421
components, 195-196, 206-209, 230 intelligent agents, 454, 473-474, 475 monitoring and blocking of Internet
computer hardware platforms, 207 machine learning, 468, 475 access, 15-20
computing platforms, 195 neural networks, 454, 463, 468-472, 475 net neutrality, 292-293
consulting and system integration interactivity, in e-commerce, 407, 408 organizations and, 123
services, 209 internal integration tools, 574 privacy, 162-164, 190
data management and storage, 208 internal rate of return (IRR), 570 search engines, 300-301
declining communication costs and, 204 international information systems, 15-3-15-24, security vulnerabilities, 326-327
defined, 195-197 15-25 software platforms, 209
ecosystem, 206 accounting practices and, 15-8 supply chain and, 376, 379
enterprise software applications, 208 business challenges to, 15-7-15-8 supply chains and, 379
green computing (green IT), 216, 217-218, business drivers, 15-4, 15-5 URL (uniform resource locator), 299
230 case studies, 15-17-15-18, 15-23-15-24, wikis, 305, 329, 475
grid computing, 211, 230 15-29-15-31 wireless Internet access, 309-310
hardware platform trends, 210-216 change management, 15-14-15-15 See also Web
history and evolution of, 197-201 computing platforms, 15-19 Internet architecture, 290-291
hybrid cloud computing model, 216 connectivity, 15-20-15-21 Internet connection speed, 280
Internet platforms, 209 core systems, 15-14 Internet Crime Complaint Center (IC3), 178
Law of Mass Digital Storage, 202, 203, 230 currency fluctuations and, 15-8 Internet Explorer (Microsoft), 152, 168, 169,
as major investment, 226 foreign franchiSees, 15-10, 15-11, 15-25 220
management issues, 225-229, 230 global business strategies, 15-9-15-10 Internet governance, 291, 292
Metcalfe's law, 204, 230 global value chains, 15-19-15-22 Internet layer, 284
mobile digital platform, 210 language barriers, 15-8 Internet network architecture, 290-291
Moore's law, 201-202, 230 managing, 15-12-15-19 Internet Protocol (IP), 284
network infrastructure, 281-282 organizing, 15-9-15-12 Internet Protocol (IP) addresses, 288-289, 299,
networking/telecommunications particularism, 15-7 326
platforms, 208-209 reorganizing for international scale, 15-10- Internet radio services, 173-174
operating system platforms, 207-208, 219- 15-12 Internet security. See security
225, 230 software localization, 15-21-15-22 Internet service providers (ISPs), 174, 181, 288,
rent vs. buy decision, 226 state of the art, 15-8 292
technology standards, 205 systems architecture, 15-4 Internet services, 294
telecommunications services, 195 systems integration, 15-19 Internet telephony, 281
total cost of ownership (TCO), 227-228, telecommunication systems, 15-10-15-11 Internet2, 291
568 transborder data flow, 15-7 interorganizational systems, 86
virtualization, 211, 213, 230 international information systems architecture, interpersonal roles, of management, 489
Web services, 215, 221, 230, 545, 549 15-4 intranets, 51, 87, 101, 137
information technology (IT) management Internet intrusion detection systems, 348, 357
services, 196 about, 51, 210, 288, 293, 314 inventory control, 311
information technology (IT) research and addressing, 288-289, 299 inventory management, case study, 367-368
development services, 196 architecture, 290-291 investment workstations, 462
information technology (IT) standards services, behavioral targeting, 164, 167, 169, 421- IP. See Internet Protocol
196 422, 439 IP addresses. See Internet Protocol addresses
information value chain, 55-56, 131-133, 143 case study, 318-320 IP phone system, 297
informational roles, of management, 489 client/server computing, 199-200, 282-283, iPad (Apple), 36, 39, 40, 43, 110, 127, 173, 207,
informed consent, 165, 168 293, 295 208, 210, 220, 225, 319, 415, 428, 473
InfoSphere BigInsights (IBM), 261 competitive advantage and, 128, 130-137 iPhone (Apple), 36, 39, 40, 43, 53, 127, 140,
inheritance, 535 connection speed, 280 170, 173, 175, 207, 208, 210, 225, 292, 307,
innovation, 89, 91 copyrighted information and, 173 318, 415, 428, 431, 434, 473, 546
InnovationNet (intranet), 137 cyberwarfare, 334-336 iPod (Apple), 43, 123, 127, 173, 415
input, 46 declining communication costs and, 204 iPod Touch (Apple), 110, 207, 208
input controls, 340 Domain Name System (DNS), 289-290, 314 IPv6, 291
instant messaging (IM), 92, 93, 326, 294 e-business, 87 Iran
intangible benefits, 568, 582 e-commerce, 87, 401-439 cyberwarfare and, 336
integrated presence technology, 298 e-government, 87-88 monitoring and blocking of Internet
Intel Atom, 216 future of, 291 access, 15-20
Intel i7 quad-core processor, 202 governance, 291, 292 IRR. See internal rate of return
intellectual property, defined, 415 hardware platforms, 209 IS. See information systems
intellectual property rights, 156, 169, 172-174, history of, 117 ISPs. See Internet service providers
184 HTTP (Hypertext Transfer Protocol), 284, Israel, cyberwarfare and, 336
copyright, 172 299 IT. See information technology

632 Index

iterative process, 538 Law of Mass Digital Storage, 202, 203, 230 management information systems (MIS)
iTunes (Apple), 43, 75, 123, 129, 173-174, 403, lead generation, 422 about, 48, 59, 77, 79, 80, 102, 496, 501, 508
leadership, low-cost, 126, 128 globalization and, 41, 62
411-412, 415, 419 learning management system (LMS), 457
Lebanon, cyberwarfare and, 336 management issues, IT infrastructure, 225-229,
J legacy systems, 209, 223, 519 230
JAD. See joint application design legal issues
Java (Oracle-Sun), 209, 219, 220, 230 managerial complementary assets, 57, 58
Java Virtual Machine (Sun), 220 computer crime and abuse, 178, 180 managers, 50, 486, 488-489, 496
Jive (software), 93, 96 computer forensics, 339-340 MANs (metropolitan area networks), 286, 287,
jobs due process, 160
liability, 160, 174-175, 176 314
globalization and, 38, 41 privacy, 157-158, 162-169, 170-171, 184, manufacturing, business processes, 74
growth in IS/MIS jobs, 99-100 190 MapReduce (Google), 255
job loss due to technology, 181-182, 184 See also European legislation; U.S. MapReduce (Hadoop), 255
knowledge work, 49, 177, 449, 457 legislation market creators, 414, 415
teamwork in, 88-89 legitimacy, 15-16 market entry costs, 408
join operation, 247, 248 leisure, Internet use, 177 market niche, 127-128
joint application design (JAD), 544, 549 liability, 160, 174-175, 176 marketing
jQuery Mobile (software), 548 lifestyle, family, work, and leisure boundaries,
just-in-time strategy, 374, 429 177 and CRM systems, 383-384
Line-haul (Con-Way), 465 display ad marketing, 152-153, 422, 424
K "link farms", 302 e-commerce, 421-426
Kant's Categorical Imperative, 161 LinkedIn, 305, 323-324, 389, 416, 420, 425 long tail marketing, 421
key corporate assets, 42 Linux, 205, 207, 208, 209, 211, 219, 230, 286 micromarketing, 15-6
key field, 247 Live Meeting (Microsoft), 94 predictive analytics, 498
key performance indicators (KPIs), 504, 563, LMS. See learning management system social media and, 426
local area networks. See LANs "wisdom of crowds", 89, 389, 420-421, 439
566, 582 "Local Shared Object" files, 167 marketspace, 405
keyloggers, 330, 336 localization, software, 15-21-15-22 mashups, 224-225, 230, 304
keywords, 456 location-based advertising, 417-418 mass customization, 127
"kickbucks", 434 location-based services, 170-171, 432-433, 439 Massively Parallel Processing (MPP)
Kindle (Amazon), 75, 174, 210 logical view, 245 architecture (Vertica), 512
Kindle Fire (Amazon), 319 long tail marketing, 421 material inventory tracking system software,
KMS. See knowledge management systems Long Term Evolution networks. See LTE 277
networks material master data management (MMDM),
(KMS) "look and feel" copyright infringement, 172 15-18
knowledge, 450 Lotus Notes (IBM), 92, 93, 95, 304, 15-19 McAfee, Andrew P., 181
Lotus Quickr (IBM), 96 medical records
dimensions of, 449-451 loyalty programs, 110 HIPAA legislation, 164, 338, 357
equal access to information and LTE networks (Long Term Evolution security, 338-339
computing, 182 networks), 307 medical research, drug development by
explicit knowledge, 450, 455 structured design, 447-448
structured knowledge, 455 M medicine, neural network applications, 471
tacit knowledge, 450, 454, 463, 475 m-commerce (mobile commerce), 413, 432-434, Megaupload (file-sharing site), 331
knowledge acquisition, 452 Melissa (malware), 329
knowledge application, 453 439 menu costs, 410, 439
knowledge base, 465 machine bureaucracy, 118 Metcalfe's law, 204, 230
Knowledge Direct (Digitec), 457 machine learning, 468, 475 metropolitan area networks. See MANs
knowledge discovery, 463 Mafia Wars (online game), 512 microblogging, 304
knowledge dissemination, 72, 452-453 mainframes, 197, 207, 209 micromarketing, 15-6
knowledge management (KM), 449-474 maintenance, 532 micropayment systems, 419
about, 451-452, 475 malware, 178, 328-330, 333, 336, 337-338 microprocessor chips, 117
case study, 447-448 microprocessors, 201-202
taxonomies, 456, 475 browser-based malware, 355 case study, 367-368
value chain, 451-453 drive-by downloads, 328 high-performance processors, 216
knowledge management systems (KMS), 86-87, keyloggers, 330, 336 Moore's law, 201, 230
101 smartphones, 353 multicore processors, 216, 230
enterprise-wide knowledge management spyware, 167, 330 power-saving processors, 216, 230
systems, 453-454, 454-457, 475 SQL injection attacks, 330 Microsoft Access, 246, 250, 251, 540, 15-18
intelligent techniques, 454, 463-474, 475 Trojan horses, 329-330 Microsoft Advertising, 166
knowledge work systems (KWS), 454, 457-462 viruses and worms, 328-329, 336, 348, 357 Microsoft Azure, 235
taxonomies, 456, 475 managed security service providers (MSSPs), Microsoft Bing, 300, 318, 413
types, 453-454, 475 352 Microsoft Dynamics CRM, 383
knowledge management value chain, 451-453 management Microsoft Dynamics suite, 388
knowledge managers, 453 classical model, 488 Microsoft Excel, 95, 502, 540, 15-18
knowledge network systems, 456 decision making by, 490 Microsoft Expression, 437
knowledge storage, 452 implementation of new project, 573-574, Microsoft Expression Studio, 209
knowledge work systems (KWS), 454, 457-462 15-15-15-16 Microsoft Internet Explorer, 220
knowledge workers, 49, 177, 449, 457 information systems (IS) and, 50, 62 Microsoft Internet Explorer 9, 169
KPIs. See key performance indicators of international information systems, Microsoft Internet Explorer 10, 152, 168
KWS. See knowledge work systems 15-12-15-19 Microsoft Live Meeting, 94
management capital, 57, 452 Microsoft .NET family, 209, 222
L management decision making, 50 Microsoft Office, 95, 148, 473
labor, 112 Microsoft Office Project 2010, 580-581
LANs (local area networks), 219, 286-287, 314,

327

Index 633

Microsoft Office Project Professional 2010, 581 multiple input multiple output. See MIMO routers, 281
Microsoft Office Project Server 2010, 581 multitiered client/server architecture, 199, 325 SANs (storage area networks), 208
Microsoft OneNote, 95 multitouch interface, 208 securing wireless networks, 349
Microsoft PowerPoint, 95 music files, piracy, 173 security vulnerabilities, 325-327
Microsoft SharePoint, 93, 95, 493 music industry, 43 software-defined networking (SDN), 281
Microsoft SharePoint MySites, 71 MyDoom.A (malware), 329 switches, 281
Microsoft SharePoint Server 2010, 71, 72, 95 mySAP ERP, 540 TCP/IP and connectivity, 200, 205, 209,
Microsoft SkyDrive, 94, 95 MySimon (bot), 304 284-285, 288, 314
Microsoft SQL Azure Database, 249 MySpace, 331, 420, 425, 426, 434 transmission media, 287
Microsoft SQL Server, 246, 249, 250, 493 MySQL (software), 208, 246, 249 transmission speed, 287
Microsoft Web Apps, 95 unified communications, 298
Microsoft Windows 7 Service Pack 1, 337 N VPNs (virtual private networks), 298, 299,
Microsoft Windows operating system, 139, 148, N-tier client/server architecture, 199 314, 349, 15-20
NAI. See Network Advertising Initiative WANs (wide area networks), 286, 287, 314
200, 207 nanotechnology, 202, 203 wireless LANs, 309
Microsoft Windows Server, 207, 209 NAT. See Network Address Translation wireless networks, 309, 349, 357
Microsoft Word, 95 National Information Infrastructure Protection wireless sensor networks (WSNs), 313, 314
Microsoft Xbox, 318, 419 See also Internet
Microsoft Yammer, 93, 96, 97 Act (1996), 333 neural networks, 454, 463, 468-472, 475
middle management, 49, 486, 501-502, 508, 509 natural language processing, 480 newsgroups, 294
MIMO (multiple input multiple output), 310 .NET family (Microsoft), 209, 222 newspapers, 36
minicomputers, 197 net marketplaces, 430, 431, 439 Nexus 7 tablet, 319
net neutrality, 292-293 niche firms, 139
See also computers netbooks, 210 NIKEiD program, 127
MIPS (millions of instructions per second), 201- Netezza (IBM), 256 Ninth Annual Global Software Piracy Study,
Netflix, 174, 235, 285, 292, 403, 412, 419, 421 173
202 NetWare (Novell), 200 "no free lunch" rule, 161
MIS. See management information systems NetWeaver Business Warehouse (SAP), 397, nomad computing, 177
MIS audit, 344, 357 Nomad2 (programming language), 540
MITS Altair 8800 (computer), 197 506, 578 non-relational database management systems
MMarketPay.A (malware), 330 NetWeaver Business Warehouse Accelerator (NoSQL), 247, 249, 268
MMDM. See material master data management nonobvious relationship awareness (NORA),
mobile advertising, 170, 433-434 (SAP), 506 158-159
mobile apps, 225, 230, 545-548 Network Address Translation (NAT), 348 Nook (e-reader), 147, 148
mobile commerce. See m-commerce Network Advertising Initiative (NAI), 168 normalization, 252
mobile computing, 177, 201 network-based strategies, 137-138, 143 NOS. See network operating system
mobile computing devices, DBMS for, 246 network economics, 137-138, 204 NoSQL. See non-relational database
mobile device management, virtualization for, network infrastructure, 281-282 management systems
Network Interface layer, 284, 285 NoSQL Database (Oracle), 249
213 network notification, with social commerce, Novell, 286
mobile digital platform, 36-38, 207, 210, 230 Novell NetWare, 200
426 nuclear energy industry, 578-579
apps, 225, 230, 545-548 network operating system (NOS), 281
mobile digital platforms, security, 353 network service providers, 290 O
mobile handheld devices, 39, 207 networked systems, 15-10, 15-11 object, 534-535
networks and networking object-oriented development, 534-536, 549
accessing corporate systems, 353 Office (Microsoft), 95, 148, 473
games and entertainment, 434 about, 51, 280-282 Office Project 2010 (Microsoft), 580-581
m-commerce, 413, 432-434, 439 bandwidth, 287-288 Office Project Professional 2010 (Microsoft),
malware and, 328 Bluetooth networks, 308-309, 314, 327,
search, 302 328, 336 580-581
security for, 353 CANs (campus area networks), 286 Office Project Server 2010 (Microsoft), 581
security vulnerabilities, 326, 328 client/server computing, 282-283 offshore outsourcing, 41, 224, 542-543
Mobile SalesPro app, 40 client/server network, 199 OLAP. See online analytical processing
mobile search, 302 components of simple computer network, on-demand computing, 215
MobileView (AeroScout), 277 280 OneNote (Microsoft), 95
MobiTV (service), 434 controlling network traffic, 352 online advertising, 168, 427
modeling digital networking, 282 online analytical processing (OLAP), 257-258,
object-oriented development, 534-536, 549 digital vs. analog signals, 285
structured methodologies, 532-534, 549 extranets, 51, 87, 101 268, 386
modems, 285 hardware providers, 209 online collaboration, 37, 38
Moneyball (movie), 483, 484 hubs, 281 online marketing, 421-426
monitoring international information systems, 15-19- Online Privacy Alliance, 168
employee Internet activity, 296-297 15-21 online tracking, 164, 165, 166, 169, 171, 421-
Web monitoring tools, 184 Internet network architecture, 290-291
workplace, 179-180 intranets, 51, 87, 101, 137 422, 423, 424
Moore's law, 201-202, 230 LANs (local area networks), 219, 286-287, online transaction processing, 351
Mozilla Firefox, 169, 219 314, 327 ooVoo (software), 93
MP3 music files, piracy, 173 in large companies, 281-282 Open for Business (OFBiz) (Apache), 388-389
MSSPs. See managed security service providers MANs (metropolitan area networks), 286, open source software, 219, 230, 388-389
multicore processors, 216, 230 287, 314 Openbravo (open source software), 388-389
multidimensional data model, 258 modems, 285 OpenOffice (Apache), 219
multidivisional firms, 118 packet switching, 283, 295 OpenProj (software), 581
multilevel marketing, 557 PANs (personal area networks), 308, 314 OpenWorkbench (software), 581
multinational business organization, 15-9 private industrial networks, 430, 439
multinational information systems. See private networks, 347
international information systems

634 Index

operating systems, 207-208 output controls, 340 demand planning, 376
operational customer relationship outsourcing, 41, 549 disaster recovery planning, 343-344
e-commerce Web site, 435-438
management, 386 of global supply chain management, 379 enterprise resource planning (ERP), 83,
operational excellence, as business objective, of security, 352 369, 396, 518
of software development, 224, 230 formal planning tools, 575
43 of systems development, 542-543, 549 information systems plan, 564-566
operational management, 49, 487, 501, 508 strategic planning group, 563
opt-in policy, 164, 168, 190 P supply chain planning systems, 376
opt-out model, 168 package tracking systems, 53 platform, 51
options, 570 packet filtering, 348 podcasting, 415
Oracle Business Intelligence Enterprise packet switching, 283, 295 Point-to-Point Tunneling Protocol. See PPTP
PageRank algorithm, 117 portals, 82, 413-414, 475
Edition, 389 PageRank System, 301 Porter's competitive forces model, 48, 124-125,
Oracle Buzzient, 389 Pandora, 134, 173, 174, 296, 419 142, 228-229
Oracle CRM, 389 PANs (personal area networks), 308, 314 portfolio analysis, 566
Oracle CRM on Demand, 390 paradigm shift, 521, 548 Post Sales Order Management System (OMS),
Oracle Database, 246, 249 parallel strategy, systems development, 530 53
Oracle Database Cloud Service, 249 parameterized reports, 496 postimplementation audit, 531-532
Oracle Database Lite, 246 particularism, 15-7 postindustrial organizations, 121-122
Oracle E-Business Suite, 388, 518, 519, 15-29, partner relationship management (PRM), 382- power-saving processors, 216, 230
Power Usage Effectiveness. See PUE
15-30 383 PowerPoint (Microsoft), 95
Oracle Exadata, 256 passive RFID tags, 311 PPTP (Point-to-Point Tunneling Protocol), 298
Oracle Exalytics, 256 passwords prediction markets, 421
Oracle Fusion, 388 predictive analytics, 497-498
Oracle Incentive Compensation module, 518 authentication, 346, 357 price discrimination, 408
Oracle NoSQL Database, 249 "salting", 323, 324 price transparency, 408
Oracle PeopleSoft HCM, 540 theft, 323-324 primary activities, business value chain model,
Oracle Product Information Management Data patch management, 337 132
patches, 337 primary key, 247
Hub, 15-30 patient information. See medical records privacy
Oracle-Sun Java, 209 payback method, 570 behavioral targeting, 164, 167, 169, 421-
order fulfillment, 74-75, 83 Paybacks and Chargebacks (SAP), 397 422, 439
organizational capital, 57, 452 "payload", malware, 328 clickstream behavior, 421, 422
organizational change payroll processing, transaction processing consumer privacy, 164, 165
system for, 76-77 cookies, 165, 166, 184
automation, 520, 548 PDP-11 (computer), 197 as ethical and moral issue, 162-169, 170-
business process redesign, 521, 522-525, PDS Movement Planner, 39 171, 184
548, 574 peer-to-peer architecture, 286, 326 Facebook and, 189
paradigm shift, 521, 548 Pega BPM workflow software, 525 Internet challenges to, 165-166
rationalization of procedures, 521, 548 people, inter-connectedness of, 425 monitoring employee Internet activity,
reengineering, 521 PeopleSoft HCM (Oracle), 540 296-297
resistance to, 114, 115, 122, 575 personal area networks. See PANs nonobvious relationship awareness
risks and rewards, 520 personal computers. See computers (NORA), 158-159
systems development and, 520-525, 548 personal information online tracking, 164, 165
organizational complementary assets, 57 behavioral targeting, 164, 167, 169, 421- opt-in policy, 164, 168
organizational culture, 49, 50, 114-115 422, 439 opt-out model, 168
organizational environments, 116 credit card purchases, 158 personal data privacy, 190
organizational impact analysis, 580 on Facebook, 189-190 profiling, 157-158
organizational intelligence, 466-467 nonobvious relationship awareness technical solutions to tracking, 169
organizational learning, 451 (NORA), 158-159 U.S. legislation, 162-164
organizational politics, 114 profiling, 157 Privacy Act (1974), 162-163
organizational structure, 49 U.S. legislation, 164, 168 "privacy by design", 164
changing nature of, 89 See also privacy private cloud, 215
flattened organizations, 120-121 personal services, 42 private exchanges, 430
types, 118 personalization, in e-commerce, 407, 408-409, private industrial networks, 430, 439
organizations 422, 423 PRM. See partner relationship management
about, 48-50, 62, 112-113 PERT charts, 575, 577 process redesign, 521, 522-524, 548, 574
behavioral view of, 112-113 pharming, 333 process specifications, 534
components of, 48 phased approach strategy, systems processing, 46
defined, 112 development, 531 processing controls, 340
disruptive technologies, 117-118 phishing, 178, 333 procurement, 429
features of, 114-119 physical data storage, 208 product differentiation, 125, 126-127, 128
flattened organizations, 120-121 physical view, 245 Product Information Management Data Hub
hierarchies in, 49 pilot study strategy, systems development, 531 (Oracle), 15-30
information systems and, 48-50, 111-119 piracy Product Search (Google), 304
Internet and, 123 digital media, 173-174 production, 531-532
organizational culture, 49, 50, 114-115 software, 173 production reports, 496, 497, 498
organizational environments, 116 pivot tables, 502, 503 production workers, 49
organizational politics, 114 Pixar Wiki, 305 productivity, as benefit of collaboration, 91
postindustrial organizations, 121-122 PKI. See public key infrastructure
routines and business processes, 114, 115, planning
142 business continuity planning, 344
structure, 49
technical view of, 113
output, 46

Index 635

products, 112 QuickBase (software), 540 SANs (storage area networks), 208
professional bureaucracy, 118 SAP Advanced Planning and Optimization
professional codes of conduct, 161 R
profiling, 157 RAD. See rapid application development (APO) system, 368
program-data dependence, 244 radio-frequency identification (RFID) tags, 277, SAP Business ByDesign, 389
programmers, 99, 197, 542 SAP Business Objects, 389
programming 310-312, 314, 377-378 sAP Business One, 15-17
rapid application development (RAD), 544, 549 SAP Business One OnDemand, 389
fourth-generation languages, 539-540 rationalization of procedures, 521, 548 SAP Business Suite, 388
systems development, 530, 532 real options pricing models (ROPMs), 570-571 SAP BusinessObjects, 578, 15-18
project management, 559-581 record, 241, 242 SAP BusinessObjects Dashboards, 368, 554
about, 560, 582 records retention, 36, 45, 339, 357 SAP BusinessObjects Web Intelligence, 368,
change management, 572-574 recovery-oriented computing, 351
cooptation, 15-16 reengineering, 521 506, 554
evaluating projects, 566-567, 582 referential integrity, 253 SAP Customer Relationship Management
formal planning and control tools, 575 regional systems units, 15-11
implementation, 572-574, 577-579, 582, relational database management system (CRM), 578
15-15-15-16 SAP ERP Human Capital Management (HCM),
information systems plan, 564-566 (DBMS), 246-247, 248, 268
key performance indicators (KPIs), 504, Relational Database Service (Amazon RDS), 557
563, 566, 582 SAP ERP system, 554, 15-1, 15-17, 15-18
linking systems projects to business plan, 249 SAP High Performance Analytics Appliance
564-566, 582 relational databases, 253, 268
management structure for project team, relations, 246 (HANA), 256
563-564 rent vs. buy decision, 226 SAP NetWeaver Business Warehouse, 397, 506,
managing technical complexity, 574-575 repetitive stress injury (RSI), 182
objectives of, 560, 562-563, 582 report generators, 540, 554-555 578
project failure, 176, 558, 559-560, 573 reporting, 250 SAP NetWeaver Business Warehouse
project risk, 563, 571-578, 582 Request for Proposals (RFPs), 541
project scope, 562 resistance, to organizational change, 114, 115, Accelerator, 506
project team, 564 SAP Paybacks and Chargebacks, 397
quality, 563 122, 575 SAP/R3, 15-17
"runaway" projects, 559 responsibility, 159 Sarbanes-Oxley Act (2002), 45, 339, 357
selecting projects, 563-567, 582 responsive Web design, 545 SAS Analytics, 492
software tools, 580-581 retailing industry, 110, 126, 262, 433-434 SAS/GRAPH (software), 540
time required, 563 return on investment (ROI), 56, 570 Sasser.ftp (malware), 329
user-designer communications gap, 573 revenue models Saudi Arabia
project management tools, 580-581
project operation, 247, 248 defined, 416 cyberwarfare and, 336
project portfolio management software, 581 e-commerce, 416, 418-420 monitoring and blocking of Internet
project risk, 563, 571-578 RFPs. See Request for Proposals access, 15-20
controlling, 574 rich media, 422 SCADA software. See Supervisory Control and
managing, 571-578, 582 richness, in e-commerce, 407, 408 Data Acquisition (SCADA) software
project scope, 562 "right to be forgotten", 165 scalability, 226
project team, 564 RightMedia (Yahoo), 422 SCM systems. See supply chain management
Project Z (gaming platform), 514 risk, 563 (SCM) systems
property rights, 169, 172-174 health risks of computers, 182-183 scope (of project), 562
protocol, 284 See also project risk scorecards, 496
prototype, 537 risk assessment, 341-342 scoring models, 567, 568
prototyping, 538-539, 549 Risk Aversion Principle, 161 SDN. See software-defined networking
psychologists, on information systems, 59, 62 Roambi Visualizer app, 39 search
public cloud, 215 ROI. See return on investment search engines, 300-301
public key encryption, 349, 350, 355 routers, 281 semantic search, 303
public key infrastructure (PKI), 350 routines, 114, 115, 142 social search, 303
publishing companies, 147-148 RSI. See repetitive stress injury search costs, 408, 439
pull-based supply chain model, 379, 380 RSS, 304-305 search engine marketing, 302, 422
push-based supply chain model, 379, 380 rule of change, 161 Search engine optimization (SEO), 302
"runaway" projects, 559 search engines, 300-301
Q Russia, cyberwarfare and, 334 second-level domain, 289
quad-core processors, 202 Rustock botnet, 181 Second Life (online game), 93, 513
quality "second movers", 117
S Secure Hypertext Transfer Protocol (S-HTTP),
as benefit of collaboration, 91 S-HTTP. See Secure Hypertext Transfer Protocol 349
data quality, 184, 266, 269 S3. See Simple Storage Service Secure Sockets Layer (SSL), 349, 352
information quality for decision making, SaaS. See software as a service security, 323-357
490 sabermetrics, 483, 484 antivirus and antispyware software, 348,
six sigma, 521, 548 Safari (Apple), 220 357
software quality, 353, 355-356 safe harbor, 165 auditing, 344-345
system quality, 156, 176 Sajus BPM monitoring software, 525 authentication, 336, 345, 346
total quality management (TQM), 521, 548 sales and marketing, business processes, 74 botnets, 178, 181, 331, 334
quality of life, 156, 176-183 sales force automation (SFA), 383 "bring your own device" and, 212-213
query languages, 540 sales revenue model, 418-419 business continuity planning, 344
querying, 250, 251 Salesforce Chatter, 93, 96, 389 business value of, 338-340, 357
Salesforce IdeaExchange, 389 case history, 323-324
"salting", of passwords, 323, 324 chief security officer (CSO), 99, 323
Samsung Galaxy, 173 cloud computing, 352-353
computer abuse, 180
computer forensics, 339-340
Computer Security Act (1987), 163

636 Index

controls, 325, 340-341 Simple Storage Service (S3), 215 application software packages, 540, 541-
cyberterrorism and cyberwarfare, 334-336 SimpleDB (Amazon), 249 542, 549
data breaches, 333 The Sims (online game), 513 big data analysis and visualization, 261
defined, 325 Singapore, monitoring and blocking of Internet bugs, 176, 335
digital certificates, 350, 351, 357 business intelligence, 15-18
disaster recovery planning, 343-344 access, 15-20 click fraud, 334
electronic evidence, 339-340 Siri (Apple), 473 cloud-based software, 215, 224, 389
electronic records management, 338-340, six sigma, 521, 548 as cloud service, 224
357 SkyDrive (Microsoft), 94, 95 contemporary platform trends, 219-225,
encryption, 349-350, 352, 357 Skype (software), 93 230
firewalls, 347-348, 357 SLA. See service level agreement copyright, 172
hackers, 323, 324, 327, 328, 329, 330, 331, slippery-slope rule, 161 customer relationship management
333, 338, 357 small world theory, 425 (CRM) systems, 86, 101, 382-385, 392, 518
homeland security, 158-159 smart cards, 346, 357 database management system (DBMS),
identity management, 345-346 "smart" label, 53 244-247, 249-251, 268
internal threats from employees, 335 SmartCloud for Business (IBM), 93 debugging, 355
intrusion detection systems, 348, 357 SmartCloud for Social Business (IBM), 96 defined, 51
malicious software (malware), 167, 178, smartphones, 36-37, 53, 109, 134, 140, 210, 307 e-business suites, 388
328-330, 333, 336, 337-338 enterprise applications, 83, 85-87, 101, 208,
medical records, 338-339 apps, 225 370-371, 392
mobile platforms, 353 "bring your own device" (BYOD), 210, 212- enterprise solutions, 388
outsourcing, 352 213, 353 enterprise suites, 388
passwords, 323-324, 346, 357 games and entertainment, 434 facial recognition software, 189, 303, 346
protecting information resources, 345-353 location-based services, 170-171, 432-433, flaws in, 337
public key infrastructure (PKI), 350 439 intrusive, 167
risk assessment, 341-342 m-commerce, 413, 432-434, 439 keyloggers, 330, 336
security policy, 342-343, 357 processors for, 216 liability for software bugs, 176
smartphones, 353 security, 353 liability law, 175, 176
spyware, 167, 330 Wikitude.me (service), 433 localization, 15-21-15-22
system vulnerability, 325-337 sniffers, 331 malware, 167, 178, 328-330, 333, 336, 337-
unified threat management (UTM), snowboarding, 526-527 338
systems, 348-349 SOA. See service-oriented architecture mashups, 224-225, 230, 304
war driving, 327 Sobig.F (malware), 329 material inventory tracking system, 277
wireless networks, 349 social bookmarking, 456, 475 open source software, 219, 230
See also computer crime social business, 37, 89-91 outsourcing, 224, 230
security audits, 344 applications of, 90 patches, 337
security policy, 342-343, 357 business benefits of, 90-91 patents, 172-173
select operation, 247, 248 tools for, 96-98, 101 piracy, 173
semantic search, 303 social business tools, 92-97 potential for catastrophic failure, 176
Semantic Web, 306 social classes, equal access to information and as product, 416
semistructured decisions, 486, 501-502, 508 computing, 182 project management tools, 580-581
senior managers, 49, 89, 91-92 social commerce, 90, 425, 427-428 project portfolio management software,
decision-making by, 486, 504-505 social complementary assets, 57 581
failed ethical judgment by, 153-154 social computing guidelines, 297 quality, 353, 355-356
sensitivity analysis, 502, 503 social e-commerce, 425 RFID, 312
sentiment analysis software, 260 social engineering, 335 sentiment analysis software, 260
SEO. See search engine optimization social gaming, 512 sniffers, 331
sequences (data analysis), 259 social graph, 512, 513 software packages, 223, 541, 549
sequential supply chains, 379 social investments, 58 spam filters, 181
Server (Microsoft), 207, 209, 286 social marketing, 90 spyware, 167, 330
servers, 197, 281 social media, 425 supply chain management, 376, 392
service industries, 42 social networking, 90, 97, 305, 425-426 system performance and, 176
service jobs, offshoring, 41 business impact of, 36 total cost of ownership (TCO), 227, 568
service level agreement (SLA), 224 e-commerce and, 416, 420-421, 425, 434- tracking files, 167
service-oriented architecture (SOA), 221, 388, 438 trade secret protection, 169
392 enterprise tools, 93, 96 virtualization software, 211
"service platform" perspective, 196 games and networking, 434 vulnerability of, 335, 337-338
service providers, 415, 416 malware and, 329 for the Web, 219-220
service set identifiers. See SSIDs social search, 303, 426 Web application development tools, 209
service workers, 49 social shopping, 420 Web browsers, 263
services, 112 social sign-on, 426 wikis, 305, 329, 475
SFA. See sales force automation social technology, in e-commerce, 407, 409 zero defects in, 335, 337
shared workspaces, 90 social tools, 456 See also collaboration tools
SharePoint (Microsoft), 93, 95, 493 sociologists, on information systems, 59, 62 Software and Information Industry Association
SharePoint MySites (Microsoft), 71 sociotechnical design, 580 (SIIA), 174
SharePoint Server 2010 (Microsoft), 71, 72, 95 sociotechnical perspective, on information software as a service (SaaS)
Shopkick (mobile app), 434 systems, 58-61 about, 224, 230, 249, 389, 416, 541, 15-23
shopping bots, 304 software, 47 cloud software, 215, 224
SIIA. See Software and Information Industry as a service (SaaS), 215, 224, 230, 249, 389, Web service, 117
Association 416, 541, 15-23 software bugs, 176
Silverlight (plug-in), 220 antivirus and antispyware software, 348, software controls, 340
357
application server, 200

Index 637

software-defined networking (SDN), 281 business value of, 379-381 tangible benefits, 568, 582
software integration, 209 cost of, 387 task force-networked organizations, 121
software localization, 15-21-15-22 requirements for, 387 taxonomies, 456, 475
software metrics, 353 supply chain planning systems, 376 TCP/IP (Transmission Control Protocol/
software outsourcing, 224, 230 support activities, business value chain model,
software packages, 223, 541, 549 132 Internet Protocol), 200, 205, 209, 284-285,
software patents, 172-173 switches, 281 288, 314
software quality, 353, 355-356 switching costs, 128 teams, 88
South Korea, 334 Sybase Adaptive Server Enterprise, 208 teamwork, 88
space shifting, 41 Sybase Afaria, 213 technology
spam, 180, 331 Symantec Social Media Protection Flash Poll, disruptive technologies, 117-118
spam filtering software, 181 296 ethical issues in, 156-183, 184
spear phishing, 333 symmetric key encryption, 349 job loss due to, 181-182, 184
spoofing, 331, 333 synergies, 136, 143 technology standards, 205
SPOs. See subprocess owners Syria, cyberwarfare and, 336 technostress, 183
spyware, 167, 330 Systat (software), 540 telecommunications platforms, 209
SQL (Structured Query Language), 250, 268, system failure, 176, 558, 559-560, 573 telecommunications services, information
system performance, software bugs and, 176 technology infrastructure, 195, 208-209
540 system quality, 156, 176 telecommunications technology
SQL Azure Database (Microsoft), 249 system specifications, 529 about, 51, 279, 314
SQL injection attacks, 330 system testing, 530 international information systems, 15-10-
SQL Server (Microsoft), 246, 249, 250, 493 systems analysis, 528, 532, 549 15-11
SSIDs (service set identifiers), 327 systems analysts, 99 RFID, 277, 310-312, 314
SSL. See Secure Sockets Layer systems architecture, international information VoIP, 295, 297-298, 326
standard operating procedures, 114 systems, 15-4 See also networks and networking
standards, 314 systems design, 528-536, 549 telecommuting, 177
systems development, 517-546 telephone systems, liability law, 175
cell phone standards, 307 application software packages, 540, 541- TelePresence (Cisco), 84
e-commerce, 407-408 542, 549 telepresence technology, 93, 102
encryption, 349 computer-aided software engineering telework, 37
technology standards, 205 (CASE), 536 Telnet, 294
wireless networking standards, 308 conversion, 530, 532 test plan, 530
State of Mobility survey (Symantec), 355 cooptation, 15-16 testing, 530-531, 532
stateful inspection, 348 direct cutover strategy, 531 text mining, 259-260, 268
"stickiness", 418 documentation, 531 textbooks, digital, 148
storage area networks. See SANs end-user development, 539-541, 549 theft
Storm (malware), 329 end users and, 529 digital media piracy, 173-174, 184
strategic information systems, 143 implementation of new system, 572-574, hardware, 178
strategic planning group, 563 577-579, 582, 15-15-15-16 See also piracy
strategic systems analysis, 141 object-oriented development, 534-536, 549 third-party cookies, 165
strategic transitions, 142 organizational change and, 114, 115, 122, third-party plug-in applications, 220
streaming, 415 520-525, 548 Third World, 15-6
structure-based design, 447, 448 outsourcing, 542-543, 549 3-D printing, 459
structure chart, 534 overview of, 525-536 3G networks, 307, 314
structured decisions, 486, 508 parallel strategy, 530 time shifting, 42
structured knowledge, 455 phased approach strategy, 531 time/space matrix, 97-98
structured methodologies, 532-534, 549 pilot study strategy, 531 tokens, 346, 357
Structured Query Language. See SQL programming, 530, 532 top-level domain, 289
Stuxnet (worm), 336 project failure, 176, 558, 559-560, 573 total cost of ownership (TCO), 227-228, 568
subprocess owners (SPOs), 517-518 project management, 559-581 total quality management (TQM), 521, 548
subscription revenue model, 419 prototyping, 538-539, 549 touch point, 381
Sudan, cyberwarfare and, 336 sociotechnical design, 580 touch technology, 208
SugarCRM (software), 390, 391 structured methodologies, 532-534, 549 Toxic Substances Control Act (1976), 45
super cookies, 165, 166-167 system specifications, 529 TPS. See transaction processing systems
supercomputers, 211 systems analysis, 528, 532, 549 TQM. See total quality management
Supervisory Control and Data Acquisition systems design, 528-536, 549 trackbacks, 304
(SCADA) software, 336 systems life cycle, 537-538, 549 tracking, 164, 165, 166, 169, 421-422, 423, 424
supplier intimacy, 128 testing, 530-531, 532 tracking files, 167
as business objective, 44 See also project management "tradable service" jobs, 41
suppliers, competitive advantage and, 125 systems integration services, 209 trade secrets, 169
supply chain, 372-374 systems life cycle, 537-538, 549 traditional file environment, 241-244, 268
concurrent supply chains, 379 systems operators, 197 transaction brokers, 414, 415
demand-driven supply chains, 379 transaction cost theory, 119, 142
global supply chain, 378-379 T transaction costs, 405, 439
Internet and, 376, 379 T1 lines, 288, 314 transaction fee revenue model, 419
sequential supply chains, 379 tablet computers, 36-37, 173, 210, 319 transaction processing systems (TPS), 76-77,
supply chain management, 54, 311, 312 101, 501
global supply chain, 378-379 "bring your own device" (BYOD), 210, 212- transborder data flow, 15-7
information systems and, 374-376 213, 353 Transformer Monitoring app, 39
Internet and, 376, 379 tacit knowledge, 450, 454, 463, 475 Transmission Control Protocol/Internet
software, 376 tagging, 456 Protocol. See TCP/IP
supply chain management (SCM) systems, Taiwan, 334
85-86, 372-381, 392, 518, 15-22

638 Index

transnational information systems. See virtual reality systems, 459, 461, 462, 475 WebFOCUS (software), 540
international information systems "virtual water cooler", 97 WebSphere (IBM), 562
virtual worlds, 93 WEP. See Wired Equivalent Privacy
transnational strategy, 15-10, 15-25 virtualization, 211, 213, 230 Wi-Fi, 309, 314, 327, 357
transnational systems units, 15-11 viruses. See computer viruses and worms Wi-Fi Protected Access 2 (WPA2), 349
Transport layer, 284 VMware, 211 wide area networks. See WANs
transportation management, 378, 379 VoIP (voice over IP), 295, 297-298, 326 WikiLocation-based services, 432
Trojan horses, 329-330 voyage-estimating decision-support system, 81 Wikipedia, 93
TRUSTe, 168 VPNs (virtual private networks), 298, 299, 314, wikis, 90, 93, 305, 329, 475
tuples, 247 Wikitude.me (service), 433
twisted pair wire, 287 349, 15-20 WiMax, 307, 310, 314
Twitter, 36, 89, 97, 210, 297, 304, 305, 329, 381, VRML (Virtual Reality Modeling Language), Windows 38 operating system, 148, 208
Windows domain network model, 287
389, 402, 416, 425, 426, 427, 428, 433, 434, 462 Windows Messenger, 294
548 Windows operating system, 139, 148, 200, 207,
two-tiered client/server architecture, 199 W
W3C. See World Wide Web Consortium 208, 286, 318
U walkthrough, 355 Windows Server (Microsoft), 207, 209, 286
ubiquity, in e-commerce, 405, 407 WANs (wide area networks), 286, 287, 314 Wintel PCs, 197, 199, 205
unified communications, 298 war driving, 327 Wire Fraud Act, 333
unified threat management (UTM), 348-349 warehouse management, 376, 379, 397 Wired Equivalent Privacy (WEP), 349
unit testing, 530 Warehouse Management System (WMS), 376 wireless modems, 285
United States Web, 298-307 wireless networking standards, 308
wireless networks, 309, 349, 357
cell phone standards, 307 databases and, 262-263, 268 wireless sensor networks (WSNs), 313, 314
cybersecurity, 336-337 "deep Web", 300 wireless technology, 307-313
electrical grid infiltrated, 336 future trends, 305-307
imports and exports, 38 mashups, 225, 230, 304 Bluetooth, 308-309, 314, 327, 328, 336
privacy as constitutional right, 162 pharming, 333 cell phones, 35, 36, 170-171, 307
spamming regulation, 181 portals, 82, 413-414, 475 hotspots, 309, 310
universal standards, in e-commerce, 407-408 Semantic Web, 306 Internet access, 309-310
Unix, 205, 207, 209 software for, 219-220 malware and, 328
unstructured decisions, 486, 508, 509 URL (uniform resource locator), 299 RFID, 277, 310-312, 314
URL (uniform resource locator), 299 Web 2.0, 304-305 securing wireless networks, 349
U.S. Cost of a Data Breach Study (Ponemon Web 3.0, 305-306 security vulnerabilities, 327-328
Institute), 333 Web servers, 199, 209, 300 Wi-Fi, 309, 314, 327, 357
U.S. legislation See also Internet WiMax, 307, 310, 314
behavioral targeting, 164, 167, 439 Web 2.0, 304-305, 420 wireless sensor networks (WSNs), 313, 314
collection of personal information, 168 Web 3.0, 305-306 See also mobile handheld devices;
computer crime, 333-334 Web addresses, 288-289, 299 smartphones
copyright, 172, 184 Web Apps (Microsoft), 95 wireless transmission media, 287
medical records, 338-339 Web-based online meeting tool, 94 Wiretap Act, 333
privacy, 162-164, 190 Web-based supply chain management tools, wisdom, 450
record retention, 45, 357 376, 379 "wisdom of crowds", 89, 389, 420-421, 439
spamming regulation, 181 Web beacons, 167 WMS. See Warehouse Management System
trade secrets, 169 Web browsers, 152, 220, 263 Word (Microsoft), 95
user-designer communications gap, 573 Web bugs, 167, 168 work
user interface, 560 Web conferencing, 42, 93 changing nature of, 88
Utilitarian Principle, 161 Web-enabled databases, 262-263, 268 growth of professional work, 89
utility computing, 215 Web hosting service, 209 job loss due to technology, 181-182, 184
UTM. See unified threat management Web mashups, 225, 230, 304 See also jobs
Web mining, 260, 268 workgroup network model, 286
V Web monitoring, tools for, 184 World Wide Web
value chain Web protocols, 221 about, 51, 205
Web servers, 199, 209, 300 copyrighted information and, 173, 184
business information, 55-56, 131-133, 143 Web services, 215, 221, 230, 545, 549 history of, 117
global value chains, 15-19-15-22 Web Services (Amazon), 215, 249 World Wide Web Consortium (W3C), 221, 306,
knowledge management, 451-453 Web sites, 299 314
value chain model, 55-56, 131-133, 143 affiliate Web sites, 420 Worldwide Interoperability for Microwave
value web, 133, 135-136, 143 budgets, 438 Access. See WiMax
VAX machines (computers), 197 building, 435-438, 440 worms (malware), 329, 336
Vertica Massively Parallel Processing (MPP) for e-commerce, 435-438 WPA2. See Wi-Fi Protected Access 2
architecture, 512 failure of, 560 WSNs. See wireless sensor networks
video files, piracy, 174 hosting, 437-438
videoconferencing, 42, 93 personalization, 422, 423 X
viral coefficient, 512 search engine optimization (SEO), 302 Xalkori (drug), 447
virtual companies (virtual organizations), 138, social sign-on, 426 Xbox (Microsoft), 318, 419
143 visitor tracking, 164, 165, 166, 169, 421- XenDesktop (Citrix Systems), 213
virtual meeting software, 93 422, 423, 424 Xerox Alto (computer), 197
virtual meetings, 37 Web tracking. See online tracking XML (Extensible Markup Language), 221, 545
virtual private networks. See VPNs WebEx (Cisco), 94
Virtual Reality Modeling Language. See VRML

Index 639

Y
Yahoo!, 129, 140, 152, 166, 168, 177, 210, 224,

256, 300, 302, 304, 305, 413, 434
Yahoo! Merchant Solutions, 437
Yahoo! Messenger, 294
Yahoo! RightMedia, 422
Yammer (Microsoft), 93, 96, 97
YouTube, 168, 296, 389, 426, 434, 548

Z
"zombie" PCs, 331
Zoom.us (software), 93
Zynga With Friends (service), 514

INTEGRATING BUSINESS WITH TECHNOLOGY

By completing the projects in this text, students will be able to demonstrate business knowledge, application
software proficiency, and Internet skills.These projects can be used by instructors as learning assessment
tools and by students as demonstrations of business, software, and problem-solving skills to future employers.
Here are some of the skills and competencies students using this text will be able to demonstrate:

Business Application skills: Use of both business and software skills in real-world business applications.
Demonstrates both business knowledge and proficiency in spreadsheet, database, and Web page/blog creation
tools.
Internet skills: Ability to use Internet tools to access information, conduct research, or perform online
calculations and analysis.

Analytical, writing and presentation skills: Ability to research a specific topic, analyze a problem, think
creatively, suggest a solution, and prepare a clear written or oral presentation of the solution, working either
individually or with others in a group.

Business Application Skills SOFTWARE SKILLS CHAPTER

BUSINESS SKILLS Spreadsheet charts Chapter 2*
Finance and Accounting Spreadsheet formulas Chapter 10
Financial statement analysis Spreadsheet downloading and formatting Chapter 5
Spreadsheet formulas Chapter 5*
Pricing hardware and software Spreadsheet formulas Chapter 7
Technology rent vs. buy decision Chapter 8
Total Cost of Ownership (TCO) analysis Spreadsheet formulas Chapter 11
Analyzing telecommunications services and costs Spreadsheet charts and formulas Chapter 14
Risk assessment Spreadsheet formulas and logical functions Chapter 14*
Retirement planning Spreadsheet formulas
Capital budgeting Chapter 13*
Chapter 15
Human Resources Database design
Employee training and skills tracking Database querying and reporting Chapter 2
Job posting database and Web page Database design
Manufacturing and Production Web page design and creation Chapter 6
Analyzing supplier performance and pricing Chapter 12*
Spreadsheet date functions
Inventory management Database functions Chapter 1
Bill of materials cost sensitivity analysis Data filtering
Sales and Marketing Importing data into a database
Sales trend analysis Database querying and reporting
Spreadsheet data tables
Spreadsheet formulas

Database querying and reporting

Customer reservation system Database querying and reporting Chapter 3
Improving marketing decisions Chapter 12
Customer profiling Spreadsheet pivot tables Chapter 6*

Customer service analysis Database design Chapter 9
Database querying and reporting
Sales lead and customer analysis Chapter 13
Database design
Blog creation and design Database querying and reporting Chapter 4

Database design Chapter 1
Database querying and reporting Chapter 2
Chapter 3
Blog creation tool Chapter 4
Chapter 5
Internet Skills Chapter 6
Chapter 7
Using online software tools to calculate shipping costs Chapter 8
Using online interactive mapping software to plan efficient transportation routes Chapter 9
Researching product information and evaluating Web sites for auto sales Chapter 10
Using Internet newsgroups for marketing Chapter 11
Researching travel costs using online travel sites Chapter 12
Searching online databases for products and services Chapter 13
Using Web search engines for business research Chapter 14
Researching and evaluating business outsourcing services Chapter 15
Researching and evaluating supply chain management services
Evaluating e-commerce hosting services CHAPTER
Using shopping bots to compare product price, features, and availability Chapter 1
Using online software tools for retirement planning Chapter 3
Redesigning business processes for Web procurement
Researching real estate prices Chapter 4
Researching international markets and pricing Chapter 7
Chapter 8
Analytical, Writing and Presentation Skills* Chapter 9
Chapter 10
BUSINESS PROBLEM Chapter 11
Management analysis of a business Chapter 15
Value chain and competitive forces analysis
Business strategy formulation
Formulating a corporate privacy policy
Employee productivity analysis
Disaster recovery planning
Locating and evaluating suppliers
Developing an e-commerce strategy
Identifying knowledge management opportunities
Identifying international markets

*Dirt Bikes Running Case on MyMISLab

REVIEWERS AND CONSULTANTS

CONSULTANTS SWITZERLAND

AUSTRALIA Andrew C. Boynton, International Institute for
Management Development
Robert MacGregor, University of Wollongong
Alan Underwood, Queensland University of Walter Brenner, University of St. Gallen
Donald A. Marchand, International Institute for
Technology
Management Development
CANADA
UNITED KINGDOM
Wynne W. Chin, University of Calgary
Len Fertuck, University of Toronto ENGLAND
Robert C. Goldstein, University of British Columbia
Rebecca Grant, University of Victoria G.R. Hidderley, University of Central England,
Kevin Leonard, Wilfrid Laurier University Birmingham
Anne B. Pidduck, University of Waterloo
Christopher Kimble, University of York
GERMANY Jonathan Liebenau, London School of

Lutz M. Kolbe, University of Göttingen Economics and Political Science
Detlef Schoder, University of Cologne Kecheng Liu, Staffordshire University

GREECE SCOTLAND

Anastasios V. Katos, University of Macedonia William N. Dyer, Falkirk College of Technology

HONG KONG UNITED STATES OF AMERICA

Enoch Tse, Hong Kong Baptist University Tom Abraham, Kean University
Evans Adams, Fort Lewis College
INDIA Kamal Nayan Agarwal, Howard University
Roy Alvarez, Cornell University
Sanjiv D. Vaidya, Indian Institute of Chandra S. Amaravadi, Western Illinois University
Management, Calcutta Beverly Amer, Northern Arizona University
John Anderson, Northeastern State University
ISRAEL Rahul C. Basole, Georgia Institute of Technology
Jon W. Beard, University of Richmond
Phillip Ein-Dor, Tel-Aviv University Patrick Becka, Indiana University Southeast
Peretz Shoval, Ben Gurion University Michel Benaroch, Syracuse University
Cynthia Bennett, University of Arkansas at Pine Bluff
MEXICO Nancy Brome, Southern NH University
Kimberly Cass, University of Redlands
Noe Urzua Bustamante, Universidad Jason Chen, Gonzaga University
Tecnológica de México Edward J. Cherian, George Washington University
P. C. Chu, Ohio State University, Columbus
NETHERLANDS Kungwen Chu, Purdue University, Calumet
Richard Clemens, West Virginia Wesleyan College
E.O. de Brock, University of Groningen Lynn Collen, St. Cloud State University
Theo Thiadens, University of Twente Jakov Crnkovic, SUNY Albany
Charles Van Der Mast, Delft University of Technology John Dalphin, SUNY Potsdam
Marica Deeb, Waynesburg College
PUERTO RICO, William DeLone, American University
Cindy Drexel, Western State College of Colorado
Commonwealth of the United States Warren W. Fisher, Stephen F. Austin State University
Brunilda Marrero, University of Puerto Rico Sherry L. Fowler, North Carolina State University
William B. Fredenberger, Valdosta State University
SOUTH AFRICA Bob Fulkerth, Golden Gate University
Mark A. Fuller, Baylor University
Daniel Botha, University of Stellenbosch Minnie Ghent, Florida Atlantic University
Amita Goyal, Virginia Commonwealth University
SWEDEN Bobby Granville, Florida A&M University

Mats Daniels, Uppsala University

Richard Grenci, John Carroll University Alan Graham Peace, West Virginia University
Jeet Gupta, Ball State University Leah R. Pietron, University of Nebraska
Vijay Gurbaxani, University of California, Irvine Jack Powell, University of South Dakota
Rassule Hadidi, University of Illinois, Springfield Leonard Presby, William Patterson University
Jeff Harper, Indiana State University Sheizaf Rafaeli, University of Michigan
William L. Harrison, Oregon State University Sasan Rahmatian, California State University, Fresno
Joe Harrison, Union University Eliot Rich, University at Albany, SUNY
Dorest Harvey, University of Nebraska Omaha Leasa Richards-Mealy, Columbia College
Shohreh Hashemi, University of Houston—Downtown James Riha, Northern Illinois University
Albert M. Hayashi, Loyola Marymount University Stephanie Robbins, University of North Carolina,
Anthony Hendrickson, Iowa State University
Michelle Hepner, University of Central Oklahoma Charlotte
Rick Hicks, Florida Atlantic University Marcel Robelis, University of North Dakota
Marianne Hill, Furman University Ian Robinson, University of San Francisco
Bart Hodge, Virginia Commonwealth University Alan Roper, Golden Gate University
Jack Hogue, University of North Carolina, Charlotte Peter A. Rosen, University of Evansville
Rui Huang, Binghamton University, SUNY Paula Ruby, Arkansas State University
Duke Hutchings, Elon University Naveed Saleem, University of Houston, Clear Lake
George Jacobson, California State University, Los Angeles Joko W. Saputro, University of Wisconsin, Madison
Carolyn Jacobson, Marymount University David Scanlan, California State University, Sacramento
Murray Jennex, University of Phoenix Donna M. Schaeffer, Marymount University
Rob Kauffman, University of Minnesota Werner Schenk, University of Rochester
Timothy Kayworth, Baylor University Kala Chand Seal, Loyola Marymount University
Robert W. Key, University of Phoenix Richard S. Segall, Arkansas State University
Stephen Klein, Ramapo College Ivan J. Singer, University of Hartford
Virginia Kleist, West Virginia State University Rod Sink, Northern Illinois University
Cenk Kocas, Michigan State University Guy Smith, Embry-Riddle Aeronautical University
Brian Kovar, Kansas State University Kathy Stevens, Merrimack College
Al Lederer, University of Kentucky Troy Strader, Drake University
Ingyu Lee, Troy University Dennis Strouble, Bowling Green State University
Robert Lee, Chapman University Michael JD Sutton, Kent State University
Roger Letts, Fairleigh Dickinson University Gladys Swindler, Fort Hays State University
Stanley Lewis, The University of Southern Mississippi Bernadette Szajna, Texas Christian University
Teresita Leyell, Washburn University John Tarjan, California State University, Bakersfield
Susan K. Lippert, George Washington University Pam Taylor, University of Tennessee at Chattanooga
Jeffrey Livermore, Walsh College Claire Theriault-Perkins, University of Maine at Augusta
Bruce Lo, University of Wisconsin-Eau Claire Jennifer Thomas, Pace University
Carl Longnecker, Loyola University Jon C. Tomlinson, University of Northwestern Ohio
Treise Lynn, Wingate University Kranti Toraskar, Penn State University
Jane Mackay, Texas Christian University Goran Trajkovski, Towson University
Efrem G. Mallach, University of Massachusetts, Lowell Duane Truex, Georgia State University
Gary Margot, Ashland University B.S. Vijayaraman, University of Akron
Kipp Martin, University of Chicago Patrick J. Walsh, State University of New York,
Khris McAlister, University of Alabama, Birmingham
Sue McDaniel, Bellevue University Binghamton
Ronald E. McGaughey, Arkansas Tech University Diane Walz, University of Texas, San Antonio
Roger McHaney, Kansas State University Frederick Wheeler, University of Maryland, University
Patricia McQuaid, California Polytechnic State Institute
Charles Menifield, University of Memphis College
Lisa Miller, University of Central Oklahoma Lanny Wilke, Montana State University-Northern
Cindi Nadelman, New England College Karen L. Williams, University of Texas at San Antonio
Peter J. Natale, Regent University Jennifer Williams, University of Southern Indiana
Denise Nitterhouse, DePaul University Paul Witman, California Lutheran University
Michelle Parker, Indiana University—Purdue University Fort Erma Wood, University of Arkansas, Little Rock
Kathie Wright, Purdue University
Wayne Marie A. Wright, Western Connecticut State University
James H. Yu, Santa Clara University
Fan Zhao, Florida Gulf Coast University

MyMISLab™

Could you increase your knowledge—and raise your grade—
if you…
…used an online tutorial that assisted you with Access and Excel
skills mapped to this book?
…learned to use Microsoft’s SharePoint, the number one
organizational tool for file sharing and collaboration?
…had access to an online version of this textbook?

MyMISLab is a valuable tool for your student success and your
business career.

Visit www.pearsonglobaleditions.com/mymislab to learn more.


Click to View FlipBook Version